Container security execution method and device and storage medium
An execution method and container technology, applied in the computer field, can solve problems such as lack of comparison and verification, failure to provide services normally, lack of planning, etc., and achieve the effect of solving the isolation problem between containers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] In order to make the objectives, technical solutions and advantages of the present invention more clearly understood, the embodiments of the present invention will be further described in detail below with reference to the specific embodiments and the accompanying drawings.
[0044] like figure 1 As shown, the present invention provides a container security execution method, including:
[0045] Step S1, establish a main monitor and multiple sub-monitors based on SGX, and manage the container through the main monitor and multiple sub-monitors;
[0046] Step S2, in response to the first startup of the container system, perform integrity measurement on the structural file of the container system, calculate the integrity measurement value of the structural file of the container system, and use the integrity measurement value as The integrity metric base value of the container system is saved to the master monitor.
[0047]In the present invention, the present invention pr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com