International Business Machines Corporation
Hardware memory encryption and protection for containers
Last updated:
Abstract:
In an approach for securing container workloads, a processor encrypts workload binaries. A processor uploads the workload binaries to a software repository. A processor encrypts a workload definition. A processor replaces the workload definition with a mock workload definition. A processor references the encrypted workload definition in the mock workload definition. A processor submits the mock workload definition to a master node.
Status:
Grant
Type:
Utility
Filling date:
12 Feb 2020
Issue date:
7 Jun 2022