Containerized software discovery and identification

A computer-implemented method, comprising: discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more computing nodes, wherein the portions of computer memory are allocated to persistent storage of computer data...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Michal Paluch, Piotr P Godowski, Andrzej Pietrzak, Szymon Kowalczyk, Tomasz Hanusiak
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Michal Paluch
Piotr P Godowski
Andrzej Pietrzak
Szymon Kowalczyk
Tomasz Hanusiak
description A computer-implemented method, comprising: discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more computing nodes, wherein the portions of computer memory are allocated to persistent storage of computer data, and wherein each container remnant contains computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications; identifying among the plurality of container remnants one or more inactive container remnants unutilized by a currently running application; categorizing each inactive container remnant, wherein the categorizing is based on system-generated execution attributes contained in each container remnant identified as an inactive container remnant; and based on the categorizing, identifying a previously run containerized application by reference to a database comprising data whose structure maps identities of containerized applications to patterns of execution attributes.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_GB2613127A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>GB2613127A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_GB2613127A3</originalsourceid><addsrcrecordid>eNrjZDB2zs8rSczMSy3KrEpNUSjOTyspTyxKVUjJLE7OL0stqlRIzEtRyExJzSvJTMtMTizJzM_jYWBNS8wpTuWF0twM8m6uIc4euqkF-fGpxQWJyal5qSXx7k5GZobGhkbmjsaEVQAAovYsQQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Containerized software discovery and identification</title><source>esp@cenet</source><creator>Michal Paluch ; Piotr P Godowski ; Andrzej Pietrzak ; Szymon Kowalczyk ; Tomasz Hanusiak</creator><creatorcontrib>Michal Paluch ; Piotr P Godowski ; Andrzej Pietrzak ; Szymon Kowalczyk ; Tomasz Hanusiak</creatorcontrib><description>A computer-implemented method, comprising: discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more computing nodes, wherein the portions of computer memory are allocated to persistent storage of computer data, and wherein each container remnant contains computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications; identifying among the plurality of container remnants one or more inactive container remnants unutilized by a currently running application; categorizing each inactive container remnant, wherein the categorizing is based on system-generated execution attributes contained in each container remnant identified as an inactive container remnant; and based on the categorizing, identifying a previously run containerized application by reference to a database comprising data whose structure maps identities of containerized applications to patterns of execution attributes.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230524&amp;DB=EPODOC&amp;CC=GB&amp;NR=2613127A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230524&amp;DB=EPODOC&amp;CC=GB&amp;NR=2613127A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Michal Paluch</creatorcontrib><creatorcontrib>Piotr P Godowski</creatorcontrib><creatorcontrib>Andrzej Pietrzak</creatorcontrib><creatorcontrib>Szymon Kowalczyk</creatorcontrib><creatorcontrib>Tomasz Hanusiak</creatorcontrib><title>Containerized software discovery and identification</title><description>A computer-implemented method, comprising: discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more computing nodes, wherein the portions of computer memory are allocated to persistent storage of computer data, and wherein each container remnant contains computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications; identifying among the plurality of container remnants one or more inactive container remnants unutilized by a currently running application; categorizing each inactive container remnant, wherein the categorizing is based on system-generated execution attributes contained in each container remnant identified as an inactive container remnant; and based on the categorizing, identifying a previously run containerized application by reference to a database comprising data whose structure maps identities of containerized applications to patterns of execution attributes.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB2zs8rSczMSy3KrEpNUSjOTyspTyxKVUjJLE7OL0stqlRIzEtRyExJzSvJTMtMTizJzM_jYWBNS8wpTuWF0twM8m6uIc4euqkF-fGpxQWJyal5qSXx7k5GZobGhkbmjsaEVQAAovYsQQ</recordid><startdate>20230524</startdate><enddate>20230524</enddate><creator>Michal Paluch</creator><creator>Piotr P Godowski</creator><creator>Andrzej Pietrzak</creator><creator>Szymon Kowalczyk</creator><creator>Tomasz Hanusiak</creator><scope>EVB</scope></search><sort><creationdate>20230524</creationdate><title>Containerized software discovery and identification</title><author>Michal Paluch ; Piotr P Godowski ; Andrzej Pietrzak ; Szymon Kowalczyk ; Tomasz Hanusiak</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_GB2613127A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Michal Paluch</creatorcontrib><creatorcontrib>Piotr P Godowski</creatorcontrib><creatorcontrib>Andrzej Pietrzak</creatorcontrib><creatorcontrib>Szymon Kowalczyk</creatorcontrib><creatorcontrib>Tomasz Hanusiak</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Michal Paluch</au><au>Piotr P Godowski</au><au>Andrzej Pietrzak</au><au>Szymon Kowalczyk</au><au>Tomasz Hanusiak</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Containerized software discovery and identification</title><date>2023-05-24</date><risdate>2023</risdate><abstract>A computer-implemented method, comprising: discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more computing nodes, wherein the portions of computer memory are allocated to persistent storage of computer data, and wherein each container remnant contains computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications; identifying among the plurality of container remnants one or more inactive container remnants unutilized by a currently running application; categorizing each inactive container remnant, wherein the categorizing is based on system-generated execution attributes contained in each container remnant identified as an inactive container remnant; and based on the categorizing, identifying a previously run containerized application by reference to a database comprising data whose structure maps identities of containerized applications to patterns of execution attributes.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_GB2613127A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Containerized software discovery and identification
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T12%3A35%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Michal%20Paluch&rft.date=2023-05-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EGB2613127A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true