18077753. SECURE EXECUTION OF MICROSERVICES simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

SECURE EXECUTION OF MICROSERVICES

Organization Name

Dell Products L.P.

Inventor(s)

Teja Madhukar Manakame of Bangalore (IN)

Shibi Panikkar of Bangalore (IN)

Jennifer Ann Felch of Austin TX (US)

SECURE EXECUTION OF MICROSERVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18077753 titled 'SECURE EXECUTION OF MICROSERVICES

Simplified Explanation

This patent application describes methods, apparatus, and storage media for securely executing microservices in a microservice architecture. It involves generating session identifiers, identifying execution plans, maintaining data structures to track execution order, and preventing execution of microservices if the order does not match the specified order.

  • Securely executing microservices in a microservice architecture
  • Generating session identifiers for requests
  • Identifying execution plans based on plan identifiers
  • Maintaining data structures to track execution order
  • Preventing execution of microservices if the order does not match the specified order

Potential Applications

This technology can be applied in various industries where secure execution of microservices is crucial, such as finance, healthcare, and e-commerce.

Problems Solved

This technology addresses the problem of ensuring the secure and accurate execution of microservices in a specified order within a microservice architecture.

Benefits

The benefits of this technology include enhanced security, improved reliability of microservice execution, and better control over the order of execution.

Commercial Applications

Title: Secure Microservice Execution Technology This technology can be commercially used in cloud computing platforms, enterprise software systems, and any application that relies on microservices for its functionality.

Prior Art

Readers can explore prior art related to secure microservice execution, session management, and execution order tracking in microservice architectures.

Frequently Updated Research

Stay updated on the latest research developments in secure microservice execution, session management techniques, and optimization of microservice architectures.

Questions about Secure Microservice Execution Technology

How does this technology improve the security of microservice execution?

This technology enhances security by tracking and enforcing the specified order of microservice execution, preventing unauthorized access or disruptions.

What are the key features of this technology that set it apart from existing solutions?

The key features include session-based identification, execution plan tracking, and prevention of out-of-order execution, ensuring secure and reliable microservice operation.


Original Abstract Submitted

Methods, apparatus, and processor-readable storage media for securely executing microservices are described herein. An example computer-implemented method includes: generating a session identifier for a request associated with executing one or more microservices in a microservice architecture; identifying an execution plan for the request based at least in part on a plan identifier specified for a first one of the microservices, wherein the execution plan indicates a specified order for executing the microservices for the request; maintaining a set of chained data structures to track an execution order of the microservices based on the session identifier; detecting, based at least in part on the set of chained data structures, that the execution order of the identified execution plan does not match the specified order for at least a given one of the of the one or more microservices; and in response to the detecting, preventing at least the given microservice from being executed.