×

Methods and systems for providing security to distributed microservices

  • US 10,178,070 B2
  • Filed: 03/13/2015
  • Issued: 01/08/2019
  • Est. Priority Date: 03/13/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system providing secure virtual boundaries for microservices, the system comprising:

  • a plurality of hardware processors, anda plurality of memories to process;

    a microservice, the microservice comprising a plurality of distributed microservice components, each of the plurality of distributed microservice components communicating with others of the plurality of distributed microservice components, the plurality of distributed microservice components operating collectively to provide a service, the service being at least one of a game, a media service, and an e-commerce application, the plurality of distributed microservice components including;

    a first microservice component being at least one of a first web service, a first application, and a first database, the first microservice component associated with a first workload, the first workload being executed on at least one of a first physical server and a first virtual machine; and

    a second microservice component being at least one of a second web service, a second application, and a second database, the second microservice component associated with a second workload, the second workload being executed on at least one of a second physical server and a second virtual machine;

    a plurality of enforcement points positioned in association with the plurality of distributed microservice components to define a secure virtual boundary around the plurality of distributed microservice components, the plurality of enforcement points including;

    a first enforcement point communicatively coupled to the first microservice component, the first enforcement point performing a first analysis on first network traffic associated with the first microservice component and throttling at least some of the first network traffic using the first analysis; and

    a second enforcement point communicatively coupled to the second microservice component, the second enforcement point performing a second analysis on second network traffic associated with the second microservice component and throttling at least some of the second network traffic using the second analysis; and

    a director module that manages sessions and settings of the plurality of distributed microservice components within the secure virtual boundary.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×