The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 13, 2020

Filed:

Jul. 19, 2017
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Constantin Mircea Adam, Norwalk, CT (US);

Nikolaos Anerousis, Chappaqua, NY (US);

Jinho Hwang, Ossining, NY (US);

Shripad Nadgowda, Pratap Nagar, IN;

Maja Vukovic, New York, NY (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/53 (2013.01); G06F 21/57 (2013.01); G06F 21/56 (2013.01); G06F 21/71 (2013.01); G06F 21/54 (2013.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 21/563 (2013.01); G06F 21/564 (2013.01); G06F 21/54 (2013.01); G06F 21/566 (2013.01);
Abstract

Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.


Find Patent Forward Citations

Loading…