×

Using transient processing containers for security authorization

  • US 10,447,613 B2
  • Filed: 09/01/2017
  • Issued: 10/15/2019
  • Est. Priority Date: 03/26/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, from a user, a request for access to at least one resource in an electronic environment, the at least one resource being provided by a resource provider;

    determining an authorization function corresponding to the request based on a policy corresponding to the request;

    invoking, on behalf of the user, a compute instance in the electronic environment, the compute instance configured to execute the authorization function, within an isolated container of the compute instance, using context information for the request, the context information based at least in part on the policy corresponding to the request and the container configured to execute the authorization function based at least in part on information of the request;

    executing, on the compute instance, the authorization function;

    receiving, from the compute instance, a decision regarding an authorization of the access to the at least one resource; and

    enforcing the decision with respect to the access.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×