US Patent Application 17852302. MUTUAL AUTHENTICATION BETWEEN CLUSTERS simplified abstract

From WikiPatents
Jump to navigation Jump to search

MUTUAL AUTHENTICATION BETWEEN CLUSTERS

Organization Name

MICROSOFT TECHNOLOGY LICENSING, LLC

Inventor(s)

Alex John Hockey of London (GB)

James Warren Turner of London (GB)

MUTUAL AUTHENTICATION BETWEEN CLUSTERS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17852302 titled 'MUTUAL AUTHENTICATION BETWEEN CLUSTERS

Simplified Explanation

The patent application describes a method for processing traffic to provide a service.

  • The method involves using a secure communications protocol with mutual authentication to ensure traffic is communicated within a cluster.
  • A client in the first cluster sends traffic to a second cluster for processing, and the second cluster has access to a root certificate.
  • The traffic is routed to the second cluster using the secure communications protocol with mutual authentication.
  • Mutual authentication is carried out between the first and second clusters using certificate chains with the root certificate.
  • If the mutual authentication is successful, application data is routed to the second cluster using the secure communications protocol.
  • The application data is then processed at the second cluster to provide the desired service.


Original Abstract Submitted

A method of processing traffic to provide a service is described. A first service mesh in a first cluster is used to ensure traffic is communicated within the first cluster using a secure communications protocol with mutual authentication accomplished using a certificate chain having a root certificate. A client in the first cluster originates traffic to a second cluster for processing, the second cluster having access to the root certificate. Using the first service mesh, routing the traffic to the second cluster is done using a secure communications protocol with mutual authentication. Mutual authentication is carried out between the first cluster and the second cluster using certificate chains having the root certificate; and in response to the mutual authentication being successful, application data is routed to the second cluster using the secure communications protocol such that the application data may be processed at the second cluster to provide the service.