Creation and execution of secure containers

    公开(公告)号:GB2594225B

    公开(公告)日:2022-03-02

    申请号:GB202112113

    申请日:2020-01-31

    Applicant: IBM

    Abstract: A computer-implemented method for creating a secure software container. The method comprises providing a first layered software container image, transforming all files, except corresponding metadata, of each layer of the first layered software container image into a volume, the volume comprises a set of blocks, wherein each layer comprises an incremental difference to a next lower layer, encrypting each block of the set of blocks of a portion of the layers, and storing each encrypted set of the blocks as a layer of an encrypted container image along with unencrypted metadata for rebuilding an order of the set of blocks equal to an order of the first layered software container image, so that a secure encrypted software container is created.

    Transparent secure interception handling

    公开(公告)号:GB2546609A

    公开(公告)日:2017-07-26

    申请号:GB201620899

    申请日:2016-12-08

    Applicant: IBM

    Abstract: A method and system for transparent secure interception handling comprises: deploying a virtual machine (VM) 128 in an environment comprising a hypervisor 112 and a firmware 124; providing a buffer 140, 142, 144 to the firmware in response to deploying the VM; executing VM instructions; intercepting VM instructions which require access to instruction data stored in VM memory 235; copying the VM state into a shadow VM state 140; copying the instruction data to the buffer 142, 144; executing the intercepted VM instruction using the buffer; updating the shadow VM state buffer and the VM data in the VM memory 235 using result data in the buffer in response to the executing of the intercepted VM instruction results; and executing VM instructions following the intercepted VM instruction based on a state stored in the shadow VM state buffer. Firmware and a hypervisor are also provided.

Patent Agency Ranking