Creation and execution of secure containers

    公开(公告)号:GB2594225A

    公开(公告)日:2021-10-20

    申请号:GB202112113

    申请日:2020-01-31

    Applicant: IBM

    Abstract: A computer-implemented method for creating a secure software container may be provided. The method comprises providing a first layered software container image,transforming all files, except corresponding metadata, of each layer of the first layered software container image into a volume, the volume comprises a set of blocks, wherein each layer comprises an incremental difference to a next lower layer, encrypting each block of the set of blocks of a portion of the layers, and storing each encrypted set of the blocks as a layer of an encrypted container image along with unencrypted metadata for rebuilding an order of the set of blocks equal to an order of the first layered software container image, so that a secure encrypted software container is created.

    Processing a guest event in a hypervisor-controlled system

    公开(公告)号:GB2532415A

    公开(公告)日:2016-05-25

    申请号:GB201420046

    申请日:2014-11-11

    Applicant: IBM

    Abstract: The invention relates to a method of processing guest events in a hypervisor controlled system (10), comprising the steps of triggering a first firmware service on a guest event, it being associated with a guest (20) and with a guest state (52) and a protected guest memory (22) accessible only by the guest (20) and the firmware (70), and a guest key (24). The firmware (70) processes information associated with the guest event, comprising information of the guest state (52) and the protected guest memory (22), and presents only a subset of the information of the guest state (52) and the protected guest memory (22) to a hypervisor (30), wherein the subset of the information is selected to suffice for the hypervisor (30) to process the guest event. Note that the firmware (70) retains part of the information of the guest state (52) and the protected guest memory (22) that is not sent to the hypervisor (30). The hypervisor (30) processes the guest event based on the received subset of the information and sends a process result to the firmware (70) triggering a second firmware service being specific for the guest event. The firmware (70) processes the result together with the part of the information of the guest state (52) and the protected guest memory (22) that was not sent to the hypervisor (30), generating a state and/or memory modification. Then the firmware (70) performs the state and/or memory modification associated with the guest event at the protected guest memory (22).

    Secure storage query and donation

    公开(公告)号:GB2596024A

    公开(公告)日:2021-12-15

    申请号:GB202113906

    申请日:2020-03-06

    Applicant: IBM

    Abstract: A computer implemented method is disclosed, which includes receiving a query for an amount of storage in memory of a computer system to be donated to a secure interface control of the computer system (1505). The secure interface control can determine the amount of storage to be donated based on a plurality of secure entities supported by the secure interface control as a plurality of predetermined values (1510). The secure interface control can return a response to the query indicative of the amount of storage as a response to the query (1515). A donation of storage to secure for use by the secure interface control can be received based on the response to the query (1520).

    Processing guest event in hypervisor-controlled system

    公开(公告)号:GB2548268A

    公开(公告)日:2017-09-13

    申请号:GB201707993

    申请日:2015-10-20

    Applicant: IBM

    Abstract: A method for processing a guest event in a hypervisor-controUed system (lO), comprising the steps: (i) the guest event triggering a first firmware service being specific for the guest event in a firmware (70), the guest event being associated with a guest ( 20) and with a guest state (52) and a protected guest memory (22) accessible only by the guest (20) and the firmware (70), and a guest key (24); (ii) the firmware (70) processing information associated with the guest event, comprising information of the guest state (52) and the protected guest memory (22), and presenting only a subset of the information of the guest state (52) and the protected guest memory (22) to a hypervisor (30), wherein the subset of the information is selected to suffice for the hypervisor(30) to process the guest event; (iii) the firmware(70) retaining a part of the information of the guest state (52) and the protected guest memory (22) that is not being sent to the hypervisor(30); (iv) the hypervisor (30) processing the guest event based on the received subset of the information of the guest state (52) and the protected guest memory (22) and sending a process result to the firmware (70) triggering a second firmware service being specific for the guest even; (v)the firmware (70) processing the received process result together with the part of the information of the guest state (52) and the protected guest memory (22) that was not sent to the hypervisor (30),generating a state and/or memory modification; (vi) the firmware (70) performing the state and/or memory modification associated with the guest event at the protected guest memory (22).

    Deployment management of composite applications

    公开(公告)号:GB2531037A

    公开(公告)日:2016-04-13

    申请号:GB201417780

    申请日:2014-10-08

    Applicant: IBM

    Abstract: The invention relates to a computer system comprising a pattern composer (108) operatively coupled to a source IT-infrastructure (130) and to a tar­get IT-infrastructure (116, 118, 120). The source IT-infrastructure hosts a composite application (128) comprising multiple functional modules (C1-04) connected to each other via communication links. An abstract pattern com­prises first nodes and first links representing the functional module and communication links and lacks resource-related data enabling a deployment engine (110) to instantiate said resource for providing a runtime environ­ment for the functional modules and communication links. The target IT-infrastructures has assigned a resource catalogue (RC1-RC3) comprising, for each resource available in said target IT-infrastructure, a specification of said resource's capabilities, and comprises second nodes and links each second node being a representation of one or more of the resources of the target IT-infrastructure and comprising an indication the capabilities of said one or more resources represented by said second node. The pattern composer is configured for iteratively supplementing the first nodes and links of the abstract pattern by the second nodes and second links. There­by, the requirements of any supplemented first and second nodes and links are inherited to the supplementing nodes and links in each iteration.

    Generating a template in a software environment

    公开(公告)号:GB2631508A

    公开(公告)日:2025-01-08

    申请号:GB202310251

    申请日:2023-07-04

    Applicant: IBM

    Abstract: A method and system for deploying an application in a software environment, the method comprising: analysing an input 300 to extract at least one keyword 302; generating a list of at least one service for the input based on at least one keyword, preferably by associating the keyword with a functional requirement and identifying an available service which satisfies the functional requirement 304; generating a template to satisfy the input request using the list of at least one service 310; and deploying the application by applying the template. There can be a relationship model between available services, wherein the model includes information of how the available services are configured with respect to each other. The method may further include integration mapping between available services, based on the relationship model, wherein the template codifies the mapping. The template can be validated by deploying the application and running it with sample data which is analysed to measure service level indicators (SLIs). The software environment may be a no-code or low-code development platform (NCDP or LCDP).

    Secure storage query and donation
    10.
    发明专利

    公开(公告)号:GB2596024B

    公开(公告)日:2022-04-27

    申请号:GB202113906

    申请日:2020-03-06

    Applicant: IBM

    Abstract: According to one or more embodiments of the present invention, a computer implemented method includes receiving a query for an amount of storage in memory of a computer system to be donated to a secure interface control of the computer system. The secure interface control can determine the amount of storage to be donated based on a plurality of secure entities supported by the secure interface control as a plurality of predetermined values. The secure interface control can return a response to the query indicative of the amount of storage as a response to the query. A donation of storage to secure for use by the secure interface control can be received based on the response to the query.

Patent Agency Ranking