IMPLEMENTING POLICY-BASED CONTAINER-LEVEL ENCRYPTION

A computer-implemented method according to one embodiment includes identifying a creation of a container within a system, selecting a security policy for the container, based on one or more attributes, identifying a key label associated with the security policy for the container, retrieving a data e...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lewis, Cecilia C, Nelson, Mark A, Rhoten, Wayne E, Rossman, Eric D, Dayka, John C
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Lewis, Cecilia C
Nelson, Mark A
Rhoten, Wayne E
Rossman, Eric D
Dayka, John C
description A computer-implemented method according to one embodiment includes identifying a creation of a container within a system, selecting a security policy for the container, based on one or more attributes, identifying a key label associated with the security policy for the container, retrieving a data encryption key, utilizing the key label, and encrypting the container, utilizing the data encryption key. This may enable a highly granular level of automatic container-level security within the system that may be transparently implemented within the system, which may streamline container security and reduce an amount of stored data and processing necessary for implementing container security, and may thereby improve the performance of the system.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019258813A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019258813A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019258813A13</originalsourceid><addsrcrecordid>eNrjZDDx9A3wcfV19Qvx9HNXCPD38XSO1HVyDHZ1UXD29wtx9PRzDdL1cQ1z9VFw9XMOigwI8fT342FgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgaGlkamFhaGxo6GxsSpAgCM5Ci1</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>IMPLEMENTING POLICY-BASED CONTAINER-LEVEL ENCRYPTION</title><source>esp@cenet</source><creator>Lewis, Cecilia C ; Nelson, Mark A ; Rhoten, Wayne E ; Rossman, Eric D ; Dayka, John C</creator><creatorcontrib>Lewis, Cecilia C ; Nelson, Mark A ; Rhoten, Wayne E ; Rossman, Eric D ; Dayka, John C</creatorcontrib><description>A computer-implemented method according to one embodiment includes identifying a creation of a container within a system, selecting a security policy for the container, based on one or more attributes, identifying a key label associated with the security policy for the container, retrieving a data encryption key, utilizing the key label, and encrypting the container, utilizing the data encryption key. This may enable a highly granular level of automatic container-level security within the system that may be transparently implemented within the system, which may streamline container security and reduce an amount of stored data and processing necessary for implementing container security, and may thereby improve the performance of the system.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190822&amp;DB=EPODOC&amp;CC=US&amp;NR=2019258813A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190822&amp;DB=EPODOC&amp;CC=US&amp;NR=2019258813A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Lewis, Cecilia C</creatorcontrib><creatorcontrib>Nelson, Mark A</creatorcontrib><creatorcontrib>Rhoten, Wayne E</creatorcontrib><creatorcontrib>Rossman, Eric D</creatorcontrib><creatorcontrib>Dayka, John C</creatorcontrib><title>IMPLEMENTING POLICY-BASED CONTAINER-LEVEL ENCRYPTION</title><description>A computer-implemented method according to one embodiment includes identifying a creation of a container within a system, selecting a security policy for the container, based on one or more attributes, identifying a key label associated with the security policy for the container, retrieving a data encryption key, utilizing the key label, and encrypting the container, utilizing the data encryption key. This may enable a highly granular level of automatic container-level security within the system that may be transparently implemented within the system, which may streamline container security and reduce an amount of stored data and processing necessary for implementing container security, and may thereby improve the performance of the system.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDDx9A3wcfV19Qvx9HNXCPD38XSO1HVyDHZ1UXD29wtx9PRzDdL1cQ1z9VFw9XMOigwI8fT342FgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgaGlkamFhaGxo6GxsSpAgCM5Ci1</recordid><startdate>20190822</startdate><enddate>20190822</enddate><creator>Lewis, Cecilia C</creator><creator>Nelson, Mark A</creator><creator>Rhoten, Wayne E</creator><creator>Rossman, Eric D</creator><creator>Dayka, John C</creator><scope>EVB</scope></search><sort><creationdate>20190822</creationdate><title>IMPLEMENTING POLICY-BASED CONTAINER-LEVEL ENCRYPTION</title><author>Lewis, Cecilia C ; Nelson, Mark A ; Rhoten, Wayne E ; Rossman, Eric D ; Dayka, John C</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019258813A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Lewis, Cecilia C</creatorcontrib><creatorcontrib>Nelson, Mark A</creatorcontrib><creatorcontrib>Rhoten, Wayne E</creatorcontrib><creatorcontrib>Rossman, Eric D</creatorcontrib><creatorcontrib>Dayka, John C</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lewis, Cecilia C</au><au>Nelson, Mark A</au><au>Rhoten, Wayne E</au><au>Rossman, Eric D</au><au>Dayka, John C</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>IMPLEMENTING POLICY-BASED CONTAINER-LEVEL ENCRYPTION</title><date>2019-08-22</date><risdate>2019</risdate><abstract>A computer-implemented method according to one embodiment includes identifying a creation of a container within a system, selecting a security policy for the container, based on one or more attributes, identifying a key label associated with the security policy for the container, retrieving a data encryption key, utilizing the key label, and encrypting the container, utilizing the data encryption key. This may enable a highly granular level of automatic container-level security within the system that may be transparently implemented within the system, which may streamline container security and reduce an amount of stored data and processing necessary for implementing container security, and may thereby improve the performance of the system.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2019258813A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title IMPLEMENTING POLICY-BASED CONTAINER-LEVEL ENCRYPTION
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T16%3A13%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Lewis,%20Cecilia%20C&rft.date=2019-08-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019258813A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true