17453887. Securing Microservices Utilizing a Proactive Condition Map simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

Securing Microservices Utilizing a Proactive Condition Map

Organization Name

International Business Machines Corporation

Inventor(s)

Peng Hui Jiang of Beijing (CN)

Meng Wang of Beijing (CN)

Kun Yang of Beijing (CN)

Jun Su of Beijing (CN)

Securing Microservices Utilizing a Proactive Condition Map - A simplified explanation of the abstract

This abstract first appeared for US patent application 17453887 titled 'Securing Microservices Utilizing a Proactive Condition Map

Simplified Explanation

The patent application describes a method for validating microservice calls. Here are the key points:

  • The method determines if a microservice call to a computer-hosted microservice is valid based on a policy in a proactive condition map of a validation proxy.
  • If the microservice call is found to be invalid based on the matching policy in the proactive condition map, the call is blocked from reaching the microservice.
  • The method also checks if the microservice call needs to be redirected to another microservice based on the policy.
  • If redirection is required, the microservice call is redirected to the specified microservice with a callback to the original microservice.

Potential applications of this technology:

  • This method can be used in microservice architectures to ensure that only valid calls are allowed to reach the microservices.
  • It can help in enforcing security policies and access control for microservices.
  • The method can be applied in various industries that rely on microservices, such as cloud computing, e-commerce, and financial services.

Problems solved by this technology:

  • Ensures that only valid microservice calls are processed, reducing the risk of unauthorized access or malicious attacks.
  • Provides a centralized mechanism for validating and redirecting microservice calls, simplifying the management and control of microservice interactions.
  • Helps in maintaining the integrity and reliability of microservice-based systems by blocking invalid calls and redirecting them to appropriate services.

Benefits of this technology:

  • Improved security by blocking invalid microservice calls and enforcing access control policies.
  • Enhanced reliability and integrity of microservice-based systems by ensuring that calls are directed to the correct services.
  • Simplified management and control of microservice interactions through a centralized validation and redirection mechanism.


Original Abstract Submitted

Validating microservice calls is provided. It is determined whether a microservice call to a microservice hosted by a computer is valid based on a policy in a proactive condition map of a validation proxy that matches the microservice call. In response to determining that the microservice call is invalid based on the policy in the proactive condition map that matches the microservice call, the microservice call is blocked to the microservice. It is determined whether the microservice call needs to be redirected to another microservice based on the policy. In response to determining that the microservice call does need to be redirected to another microservice based on the policy, the microservice call is redirected to the other microservice with a callback to the microservice.