International Business Machines Corporation
Secure network connections

Last updated:

Abstract:

A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.

Status:
Grant
Type:

Utility

Filling date:

11 Nov 2019

Issue date:

3 Aug 2021