International Business Machines Corporation
Hardware memory encryption and protection for containers

Last updated:

Abstract:

In an approach for securing container workloads, a processor encrypts workload binaries. A processor uploads the workload binaries to a software repository. A processor encrypts a workload definition. A processor replaces the workload definition with a mock workload definition. A processor references the encrypted workload definition in the mock workload definition. A processor submits the mock workload definition to a master node.

Status:
Grant
Type:

Utility

Filling date:

12 Feb 2020

Issue date:

7 Jun 2022