×

Software container registry inspection

  • US 10,032,032 B2
  • Filed: 12/18/2015
  • Issued: 07/24/2018
  • Est. Priority Date: 12/18/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • one or more processors; and

    memory including executable instructions that, as a result of execution by the one or more processors, cause the system to;

    receive a request to perform a scan of a set of container images stored in at least one repository, a container image of the set of container images comprising encrypted image layers assigned to an account, the request including criteria for identifying insecure image layers associated with a security vulnerability; and

    in response to receiving the request;

    search a set of manifests stored in a database of a structured data store to obtain content-addressable identifiers for the encrypted image layers, the set of manifests comprising metadata about the set of container images;

    determine, based at least in part on the content-addressable identifiers, an insecure image layer at least in part by causing the system to;

    decrypt the encrypted image layers using a decryption key to form decrypted image layers, the decryption key being obtained via an entity associated with the account; and

    determine the insecure image layer from one of the decrypted image layer that is associated with a match to the criteria; and

    flag the insecure image layer as un-referenceable; and

    as a result of an occurrence of a current time corresponding to a time scheduled for performing a deletion operation;

    determine, by analyzing the set of manifests, a superset of image layers that includes one or more image layers that are flagged as un-referenceable; and

    delete the superset of image layers.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×