Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Container system management method and device, terminal equipment and storage medium

A system management and container technology, applied in the computer field, can solve problems such as product code leakage, product counterfeiting, application loss of security, etc., and achieve the effect of ensuring safety and avoiding potential safety hazards

Pending Publication Date: 2021-07-16
SIMPLECREDIT MICRO LENDING CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while the container provides convenience and flexibility, it ignores the biggest issue of security access and control permissions, because the container itself is an open source project, and many companies currently only use it as a tool for publishing their own applications, without considering There will be follow-up issues in the future release of products, so once the enterprise needs to develop the application in the container into a product, it is easy to cause risks such as product code leakage, product counterfeiting, and product application modification.
Existing technologies only protect the security of the applications running in the container when they are accessed or used externally, without considering the security of the container itself. In this case, once the container system itself is maliciously modified and accessed, it will lead to running Applications on it completely lose security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container system management method and device, terminal equipment and storage medium
  • Container system management method and device, terminal equipment and storage medium
  • Container system management method and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0024] The container system management method provided by the embodiment of the present invention avoids potential security risks that may arise from the container system itself, and more comprehensively guarantees the security of the container and the applications running on the container. The implementation details of the technical solutions of the embodiments of the present invention are described in detail below:

[0025] See figure 1 , is a schematic diagram ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a container system management method and device, terminal equipment and a storage medium, and the method comprises the steps of obtaining account information which is submitted by a user and is used for accessing a container system, and the account information comprises a user name and a password; after verification of the account information is passed, obtaining a target token corresponding to the account information from a database, wherein the target token is formed according to the account information of the user and operation authority data of the user on the container system; obtaining operation authority data of the user on the container system according to the target token; and when an operation instruction of the user on the container system is detected, performing permission verification on the operation instruction according to the operation permission data, and executing an operation corresponding to the operation instruction on the container system under the condition that the verification is passed, so that access and use of the container system can be effectively managed and controlled, and the safety of the container system and the application running on the container system is ensured.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a container system management method, device, terminal equipment and storage medium. Background technique [0002] At present, enterprise applications or systems basically use containers to reduce the complexity of deploying applications and systems, thereby improving efficiency, and enabling rapid deployment and rapid use. It is built on virtualization and has good portability. It brings great convenience and flexibility to the enterprise. However, while the container provides convenience and flexibility, it ignores the biggest issue of security access and control permissions, because the container itself is an open source project, and many companies currently only use it as a tool for publishing their own applications, without considering There will be follow-up issues in releasing products in the future, so once an enterprise needs to develop the application in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/33G06F21/60
CPCG06F9/45558G06F21/33G06F21/604G06F2009/45587
Inventor 张登超
Owner SIMPLECREDIT MICRO LENDING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products