US 12,395,325 B2
Eavesdropper identification and container image layer invalidation
Leigh Griffin, Waterford (IE); and Stephen Coady, Dublin (IE)
Assigned to Red Hat, Inc., Raleigh, NC (US)
Filed by Red Hat, Inc., Raleigh, NC (US)
Filed on Jun. 1, 2023, as Appl. No. 18/327,198.
Prior Publication US 2024/0405978 A1, Dec. 5, 2024
Int. Cl. H04L 9/08 (2006.01)
CPC H04L 9/0852 (2013.01) 20 Claims
OG exemplary drawing
 
1. A method comprising:
determining, by a computing device, that a container image comprising a plurality of container image layers generated by a container build engine is to be transmitted from a container image repository to a target computing device;
determining, by the computing device, that a first container image layer of the plurality of container image layers is a sensitive container image layer to be encrypted prior to transmission to the target computing device;
obtaining, by the computing device, a first key generated by a quantum computing system that uses a quantum key distribution protocol, a plurality of qubits and a quantum communication channel to generate the first key;
encrypting the first container image layer using the first key to generate a first encrypted container image layer; and
transmitting the first encrypted container image layer to the target computing device.