Method for securing access by software modules

a software module and access security technology, applied in the field of data security, can solve the problems of short lifetime, short lifetime, and limited ability to store a unique identity

Inactive Publication Date: 2019-08-08
UNBOUND TECH LTD
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention relates to a system that allows different users (called clients) with different types of software modules to have secure access to their data stored on one computer or another. This ensures that only authorized people can read it without being able to modify them afterwards.

Problems solved by technology

The patent describes a challenge with ensuring safe deployment of containers across multiple computer systems without being compromised by malware attacks. Current methods require manual intervention during installation, which makes it difficult to maintain consistency over time. Therefore, this patent proposes a solution called Containerization Software (CSP). CSP allows containers to be hosted separately but still work together seamlessly. It achieves this through a process where each container runs its own code instead of just another program like Java. However, current solutions only allow for isolated boundaries around applications, making it challenging to ensure consistency when deploying new containers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securing access by software modules
  • Method for securing access by software modules
  • Method for securing access by software modules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020]The present invention discloses a method for providing a cryptographically based identity to a software module having a memory, processing module and communication capabilities. Such software module may reside on a personal device, for example an application operating on a smartphone, tablet, laptop, server and the like. A software module may reside on an online server, for example a virtual machine (VM). For simplicity, and due to the short life cycle of containerized software modules, most of the examples below refer to containerized software modules, also defined below as container for simplicity. The container according to the present invention is defined as an operating system feature in which the kernel allows the existence of multiple isolated user-space instances, wherein such an isolated user-space instance is defined herein as a container. The container technology may be, but unlimited to a Docker, LXC, rkt, BSD jails, LXD, etc. An authentication scheme is required in c

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The subject matter discloses a method for providing identity to a software module, comprising splitting a secret key using a split multi-party computation (MPC) process between the software module and a security server and storing one share of the secret key in the software module and another share of the secret in the security server, the security server receiving a request from the software module to access a resource, in response to the request, the security server encrypts a message, said encrypted message is obtained by the software module, the software module initiates a decryption multi-party computation (MPC) process to decrypt the message encrypted by the security server using according to the shares of the secret key, the security server receives the decrypted secret and the public key and the security server signs a certificate associated with the requested resource and the software module and sends the certificate to the software module.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner UNBOUND TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products