Check Point Software Technologies has been granted a patent for a system that secures containers by dynamically installing selected security modules during runtime based on parameters of the application and container. The system optimizes security by using different technical structures for specific circumstances. GlobalData’s report on Check Point Software Technologies gives a 360-degree view of the company including its patenting strategy. Buy the report here.

According to GlobalData’s company profile on Check Point Software Technologies, IoT network security was a key innovation area identified from patents. Check Point Software Technologies's grant share as of January 2024 was 64%. Grant share is based on the ratio of number of grants to total number of patents.

Dynamic security module installation in containerized applications

Source: United States Patent and Trademark Office (USPTO). Credit: Check Point Software Technologies Ltd

A recently granted patent (Publication Number: US11843614B2) discloses a system and method for securing a container by dynamically installing and configuring selected security modules during the runtime of an application within the container. The system includes a non-transitory computer-readable storage medium storing program code and a processor executing the code to instantiate an application in the container. The selected security modules are chosen based on parameters of the application and queried parameters of the container, such as the operating system of the host machine, the container's framework, and information about the host machine provider. These security modules, each with a unique technical structure optimized for specific circumstances, defend against the same security vector, enhancing the overall security of the container.

Furthermore, the system allows for the execution of various actions during the application's runtime, such as invoking preinstalled security modules, reconfiguring selected security modules based on container parameters, retiring invalid security modules, downloading and installing new security modules remotely, and deploying external containers as sidecars for packet inspection. The processor queries container parameters, including cloud provider details, access control lists, encryption methods, and network protocols, to determine appropriate security actions. Additionally, predefined rules are processed to decide on actions like installing, retiring, reconfiguring, or deploying specific inspection methods. This innovative approach to container security offers a dynamic and adaptable solution tailored to the unique requirements of each application and container environment.

To know more about GlobalData’s detailed insights on Check Point Software Technologies, buy the report here.

Premium Insights

From

The gold standard of business intelligence.

Blending expert knowledge with cutting-edge technology, GlobalData’s unrivalled proprietary data will enable you to decode what’s happening in your market. You can make better informed decisions and gain a future-proof advantage over your competitors.

GlobalData

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData Patent Analytics tracks bibliographic data, legal events data, point in time patent ownerships, and backward and forward citations from global patenting offices. Textual analysis and official patent classifications are used to group patents into key thematic areas and link them to specific companies across the world’s largest industries.