US 11,874,692 B2
Method for deploying containerized security technologies on embedded devices
Eric Green, Denver, CO (US); Michael Gray, Denver, CO (US); and Rachel Taylor, Denver, CO (US)
Assigned to Nubix, Inc., Denver, CO (US)
Filed by Nubix, Inc., Denver, CO (US)
Filed on Feb. 16, 2022, as Appl. No. 17/673,732.
Application 17/673,732 is a continuation in part of application No. 17/209,100, filed on Mar. 22, 2021.
Application 17/209,100 is a continuation in part of application No. PCT/IB2020/057689, filed on Aug. 14, 2020.
Claims priority of provisional application 62/993,577, filed on Mar. 23, 2020.
Claims priority of provisional application 62/887,972, filed on Aug. 16, 2019.
Prior Publication US 2022/0171863 A1, Jun. 2, 2022
Int. Cl. G06F 21/57 (2013.01); G06F 21/31 (2013.01); G06F 21/87 (2013.01); G06F 21/55 (2013.01); G06F 9/455 (2018.01); G06F 8/61 (2018.01)
CPC G06F 21/577 (2013.01) [G06F 8/61 (2013.01); G06F 9/45558 (2013.01); G06F 21/31 (2013.01); G06F 21/554 (2013.01); G06F 21/87 (2013.01); G06F 2009/45562 (2013.01)] 6 Claims
OG exemplary drawing
 
1. A computer implemented method comprising:
by a computer system, receiving a user input from a user associated with an embedded device comprising physical memory storing a native real-time operating system, the user input comprising a security technology configured to secure the embedded device;
by the computer system, accessing a set of hardware parameters characterizing the embedded device;
by the computer system, identifying a set of supported container functions based on the set of hardware parameters;
by the computer system, identifying a set of selected container functions based on the set of supported container functions, the set of selected container functions comprising the security technology;
by the computer system, generating a hardware abstraction layer for the embedded device;
by the computer system, generating a container runtime environment configured to execute, at the embedded device, a containerized application via the hardware abstraction layer, the containerized application comprising the set of selected container functions;
by the computer system, installing the hardware abstraction layer and the container runtime environment onto the native real-time operating system of the embedded device by:
allocating, by the native real-time operating system, a portion of the physical memory as a protected memory region from the containerized application; and
storing the container runtime environment and the hardware abstraction layer in the protected memory region; and
by the computer system, installing the containerized application onto the embedded device via the container runtime environment.