Shim based secure module access
    1.
    发明授权

    公开(公告)号:US12229251B2

    公开(公告)日:2025-02-18

    申请号:US18083324

    申请日:2022-12-16

    Applicant: Red Hat, Inc.

    Abstract: Systems and methods comprising at least one node comprising an application container; a container image associated with the application container; a static analyzer module deployed to analyze the container image, with instructions configured to autonomously parse, code of an application, during compile time of the application, wherein the application is to be deployed in the application container; determine, based on the parsing, for at least one section of the code, at least one module necessary for execution of the at least one section; annotate, the at least one section of the code, based on the determined at least one module; and inject, at least one wrapper around the at least one section of the code, wherein the wrapper adds at least one restriction to an execution of the at least one section at runtime, wherein the restrictions are based on at least one condition.

    SHIM LAYER FOR INTERCEPTING CALLS BETWEEN AN UPPER LAYER AND A LOWER LAYER OF A CONTAINER IMAGE

    公开(公告)号:US20240311104A1

    公开(公告)日:2024-09-19

    申请号:US18673419

    申请日:2024-05-24

    Applicant: RED HAT, INC.

    CPC classification number: G06F8/41 G06F8/60 G06F8/75

    Abstract: A shim layer can be incorporated into a container image for intercepting calls between an upper layer and a lower layer of the container image according to some aspects described herein. For example, a system can build an image file that includes a stacked arrangement of layers configured for deploying a software program within a container. The stacked arrangement of layers can include a lower layer including one or more objects. The stacked arrangement of layers can include an upper layer positioned above the lower layer, where the upper layer includes the software program. And the stacked arrangement of layers can include a shim layer positioned between the lower layer and the upper layer. The shim layer can include a shim, which is configured to intercept calls involving the one or more objects from the software program and responsively allow or reject the calls based on control data.

    Configuring polling times for software applications

    公开(公告)号:US11907142B2

    公开(公告)日:2024-02-20

    申请号:US17592739

    申请日:2022-02-04

    Applicant: RED HAT, INC.

    CPC classification number: G06F13/22 G06F9/4498 G06F9/541 G06N20/00

    Abstract: Excessive polling that may result in wasted computing resources and unnecessary network traffic can be avoided using some techniques described herein. In one example, a method can include obtaining historical data indicating execution times associated with computing operations. The method can also include determining polling times to assign to the computing operations by applying a model to the historical data. The method may also include configuring a software application to implement the polling times in relation to polling processes for transmitting requests to execute the computing operations to one or more destinations.

    INTELLIGENT SCHEDULING OF MAINTENANCE TASKS TO MINIMIZE DOWNTIME

    公开(公告)号:US20230297970A1

    公开(公告)日:2023-09-21

    申请号:US17695182

    申请日:2022-03-15

    Applicant: Red Hat, Inc.

    CPC classification number: G06Q10/20 G06Q10/06311

    Abstract: Processing logic may generate metadata in view of monitoring a response of each of a plurality of components of an application to past maintenance tasks, wherein the metadata comprises an expected downtime of a first of the plurality of components of the application and a second expected downtime of a second of the plurality of components of the application in response to the expected downtime of the first of the plurality of components. Processing logic may obtain a notification to perform a maintenance task for a first of the plurality of components. In view of the metadata, processing logic may schedule the maintenance task for the first of the plurality of components to coincide with a second maintenance task of the second of the plurality of components.

    Enhancing Operator Installation and Upgrade Management and Verification

    公开(公告)号:US20230133312A1

    公开(公告)日:2023-05-04

    申请号:US17518902

    申请日:2021-11-04

    Applicant: Red Hat, Inc.

    Abstract: Processing logic may obtain a resource of a platform fora containerized application. The platform may include custom resources, and an operator that manages the custom resources during runtime of the containerized application. In response to an indication being defined in the resource, processing logic may schedule an upgrade to a new operator. Processing logic may perform one or more pre-installation actions or post-installation actions that are defined in the resource to manage the installation of the new operator in a controlled manner and reduce the risk of incompatibilities between the new operator and the custom resources.

    PRIVACY-ENHANCED COMMON VULNERABILITIES AND EXPOSURES (CVE) DETECTION

    公开(公告)号:US20230344853A1

    公开(公告)日:2023-10-26

    申请号:US17660502

    申请日:2022-04-25

    Applicant: Red Hat, Inc.

    CPC classification number: H04L63/1433 H04L63/0428 H04L9/008

    Abstract: Disclosed are systems and methods for scanning a client codebase for vulnerabilities without exposing the client information. An example method includes receiving, from a client computing device, a scan request to scan a set of encrypted client information to identify vulnerabilities applicable to the client information. The method also includes responsive to the scan request, analyzing, by a processing device, the encrypted client information to generate scan results that identify vulnerabilities applicable to the client information, wherein the analyzing is performed without decrypting the client information. The method also includes returning the scan results to the client, wherein the scan results are in encrypted form when the scan results are generated.

    CONFIGURING POLLING TIMES FOR SOFTWARE APPLICATIONS

    公开(公告)号:US20230251984A1

    公开(公告)日:2023-08-10

    申请号:US17592739

    申请日:2022-02-04

    Applicant: RED HAT, INC.

    CPC classification number: G06F13/22 G06F9/4498 G06F9/541 G06N20/00

    Abstract: Excessive polling that may result in wasted computing resources and unnecessary network traffic can be avoided using some techniques described herein. In one example, a method can include obtaining historical data indicating execution times associated with computing operations. The method can also include determining polling times to assign to the computing operations by applying a model to the historical data. The method may also include configuring a software application to implement the polling times in relation to polling processes for transmitting requests to execute the computing operations to one or more destinations.

Patent Agency Ranking