US 12,462,054 B2
Data protection implemented by container lifecycle hooks
Yi Yuan, Beijing (CN); Lu Lu, Beijing (CN); and Xiao Hu He, Beijing (CN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Jun. 7, 2023, as Appl. No. 18/330,499.
Prior Publication US 2024/0411909 A1, Dec. 12, 2024
Int. Cl. G06F 21/54 (2013.01); G06F 21/53 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); G06F 21/71 (2013.01); H04L 9/14 (2006.01)
CPC G06F 21/6218 (2013.01) [G06F 21/602 (2013.01); G06F 21/606 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
creating, by one or more processors, a first container before an application container is ready for running, wherein the first container is configured to receive a first key from a key management device, obtain first encrypted data for the application container from a storage device, decrypt the first encrypted data using the first key to obtain first decrypted data, and mount the first decrypted data into the application container, wherein the first decrypted data is present and stored only within a temporary file space of the application container, and wherein the first key is accessible only in the first container, and wherein the first key is removed from the first container after the decryption of the first encrypted data;
exiting, by one or more processors, the first container; and
switching, by one or more processors, the application container to ready for running.