Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Container-oriented trusted software authorization verification method

A technology of software authorization and verification method, which is applied in the field of information security, can solve the problems of increasing the risk of container operation, container attacks, etc., and achieve the effects of improving the timeliness of processing, fast processing speed, and improving security

Active Publication Date: 2022-03-01
GUANGDONG POWER GRID CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The running software in the existing container increases the risk of running the container, and the trusted software after authorization verification may also be malware, making the container vulnerable to malware attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container-oriented trusted software authorization verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the objects and advantages of the present invention clearer, the present invention will be further described below in conjunction with the examples; it should be understood that the specific examples described here are only for explaining the present invention, and are not intended to limit the present invention.

[0056] Preferred embodiments of the present invention are described below with reference to the accompanying drawings. Those skilled in the art should understand that these embodiments are only used to explain the technical principle of the present invention, and are not intended to limit the protection scope of the present invention.

[0057] It should be noted that, in the description of the present invention, terms such as "upper", "lower", "left", "right", "inner", "outer" and other indicated directions or positional relationships are based on the terms shown in the accompanying drawings. The direction or positional relationship shown is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a container-oriented credible software authorization verification method. The method includes detecting the running state of the software in the running container, setting the access preparation time, and the access preparation time is set before the access time; setting an instant standard operation security value , to determine the operation security value of the software to be authorized, if the operation security value of the software to be authorized

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a container-oriented trusted software authorization verification method. Background technique [0002] The current information system security situation is becoming increasingly severe, and security incidents continue to occur. Trusted computing technology adopts security measures from the bottom layer of the terminal, and uses key technologies such as cryptography and network security to ensure terminal security and credibility, providing an active defense, A powerful tool for source control. With the deepening of research on trusted computing technology, the trustworthiness of network systems has gradually been paid attention to. Compared with the traditional concept of network security, the connotation of credibility is broader, emphasizing the credibility and controllability of behavior, which is an attribute obtained by measuring and analyzing the behavior proc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F9/455H04W36/00H04W36/14H04W36/30
CPCG06F21/44G06F9/45558H04W36/0085H04W36/14H04W36/30G06F2009/45587
Inventor 严宇平林细君陈守明钱正浩蔡徽王建永林俊李波李凯吴丽琼彦逸柯康银
Owner GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products