Automated compliance exception approval

    公开(公告)号:US09773122B2

    公开(公告)日:2017-09-26

    申请号:US14953260

    申请日:2015-11-27

    IPC分类号: G06F21/62 G06F21/55 G06F9/455

    摘要: The invention relates to a computer-implemented method for automated approval of a non-compliance of a modified configuration of a computer system with one or more compliance rules, the method comprising: receiving by a package management system a pre-approved modification pattern in form of a software package, deploying a modification pattern of the software package and providing compliance exception pre-approvals of the software package to a compliance management system, performing a compliance check of the resulting modified configuration of the computer system, in response to detecting a non-compliance with a compliance rule, comparing the detected non-compliance with the one or more pre-approved non-compliances, in response to a matching of the detected non-compliance with one or more of the respective pre-approved non-compliances, automatically approving the detected non-compliance by the compliance management system.

    Stateful container migration
    5.
    发明授权

    公开(公告)号:US11119976B2

    公开(公告)日:2021-09-14

    申请号:US16580637

    申请日:2019-09-24

    IPC分类号: G06F16/11 G06F16/182

    摘要: A computer-implemented method for migrating a source container with a running application to a target container may be provided. The method includes providing a source container motion daemon being executed in the source container management system, and a target container motion daemon being executed in the target container management system, and creating a host container hosting an encapsulated container environment in the target container management system. The host container is executing a host container motion daemon and the target container. The method also includes connecting a container motion controller to the source container motion daemon, the target container motion daemon and the host container motion daemon, and copying content of a source memory of the source container to a target memory via the source container motion daemon and the host container motion daemon under control of the container motion controller.

    Automated compliance exception approval

    公开(公告)号:US10055249B2

    公开(公告)日:2018-08-21

    申请号:US15650639

    申请日:2017-07-14

    IPC分类号: G06F9/455 G06F21/57 G06F8/61

    摘要: Automated approval of a non-compliance of a modified configuration of a computer system includes performing a compliance check by a compliance management system. The modified configuration results from deploying a pre-approved modification pattern by a package management system modifying an initial configuration of the computer system. The modification pattern is provided by a software package that specifies at least one modification to be applied to the initial configuration and at least one compliance exception pre-approval specifying pre-approved non-compliances of modifications with compliance rules. Responsive to detecting a non-compliance, the non-compliance is compared with the pre-approved non-compliances. In response to determining that the detected non-compliances are not matching any pre-approved non-compliances, a compliance exception approval is requested. The detected non-compliance is approved in response to receiving the compliance exception approval for the detected non-compliances.

    PROTECTION OF SENSITIVE DATA FROM UNAUTHORIZED ACCESS

    公开(公告)号:US20170149737A1

    公开(公告)日:2017-05-25

    申请号:US15403643

    申请日:2017-01-11

    IPC分类号: H04L29/06 G06F21/62

    摘要: A method and associated computing system. A first computing environment receives data that includes first sensitive data. The first computing environment includes a hypervisor, a virtual machine running on the hypervisor, and a compliance gateway coupled to the virtual machine and the hypervisor. The compliance gateway intercepts the request. The compliance gateway inspects the intercepted request, does not find sensitive data in the request from inspecting the intercepted request, and forwards the request directly to the virtual machine in response to not finding sensitive data in the request. The virtual machine receives the request from the compliance gateway and in response. The virtual machine initiates performance of an operation indicated in the request. The hypervisor determines that the performance of the request requires the first sensitive data that is sensitive, and in response the hypervisor prevents the virtual machine from completing performance of the operation, by intercepting the operation.

    STATEFUL CONTAINER MIGRATION
    8.
    发明申请

    公开(公告)号:US20210089495A1

    公开(公告)日:2021-03-25

    申请号:US16580637

    申请日:2019-09-24

    IPC分类号: G06F16/11 G06F16/182

    摘要: A computer-implemented method for migrating a source container with a running application to a target container may be provided. The method includes providing a source container motion daemon being executed in the source container management system, and a target container motion daemon being executed in the target container management system, and creating a host container hosting an encapsulated container environment in the target container management system. The host container is executing a host container motion daemon and the target container. The method also includes connecting a container motion controller to the source container motion daemon, the target container motion daemon and the host container motion daemon, and copying content of a source memory of the source container to a target memory via the source container motion daemon and the host container motion daemon under control of the container motion controller.

    Protection of sensitive data from unauthorized access

    公开(公告)号:US09912702B2

    公开(公告)日:2018-03-06

    申请号:US15403643

    申请日:2017-01-11

    IPC分类号: H04L29/06 G06F21/62

    摘要: A method and associated computing system. A first computing environment receives data that includes first sensitive data. The first computing environment includes a hypervisor, a virtual machine running on the hypervisor, and a compliance gateway coupled to the virtual machine and the hypervisor. The compliance gateway intercepts the request. The compliance gateway inspects the intercepted request, does not find sensitive data in the request from inspecting the intercepted request, and forwards the request directly to the virtual machine in response to not finding sensitive data in the request. The virtual machine receives the request from the compliance gateway and in response. The virtual machine initiates performance of an operation indicated in the request. The hypervisor determines that the performance of the request requires the first sensitive data that is sensitive, and in response the hypervisor prevents the virtual machine from completing performance of the operation, by intercepting the operation.