US 12,254,119 B2
Securing a container ecosystem
Wan-Yen Hsu, Cupertino, CA (US); Chih-Hao Chang, Taipei (TW); and Lin-Chan Hsiao, Taipei (TW)
Assigned to Hewlett Packard Enterprise Development LP, Spring, TX (US)
Filed by Hewlett Packard Enterprise Development LP, Spring, TX (US)
Filed on Sep. 7, 2022, as Appl. No. 17/930,286.
Application 17/930,286 is a continuation of application No. 17/929,814, filed on Sep. 6, 2022, granted, now 12,135,826.
Prior Publication US 2024/0078341 A1, Mar. 7, 2024
Int. Cl. G06F 21/64 (2013.01); G06F 9/50 (2006.01); G06F 21/12 (2013.01); G06F 21/71 (2013.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC G06F 21/64 (2013.01) [G06F 9/5072 (2013.01); G06F 21/121 (2013.01); G06F 21/71 (2013.01); H04L 9/0825 (2013.01); H04L 9/3236 (2013.01); H04L 9/3247 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
obtaining a container image comprising a plurality of instruction layers, wherein each of the plurality of instruction layers comprises a set of objects;
generating instruction layer digital signatures corresponding to the plurality of instruction layers based on first-level cryptographic hash values corresponding to objects in the respective sets of objects; and
transmitting the instruction layer digital signatures to a runtime host system to verify an authenticity of the container image during a life-cycle action of one or both of the container image or a container created using the container image.