Approaches for managing restrictions for middleware applications
First Claim
Patent Images
1. A computer-implemented method, comprising:
- determining, by a management computing system, an access request provided by an application running on a computing device that seeks to interact with one or more backend systems through a middleware application system, wherein the access request is provided through an endpoint associated with the management computing system, and wherein the middleware application system provides a serverless application framework for processing the access request; and
enforcing, by the management computing system, one or more predefined restrictions on the application, the middleware application system, or the one or more backend systems, the enforcing further comprising;
determining, by the management computing system, that the application is performing one or more operations to perform service discovery;
enforcing, by the management computing system, a predefined restriction that requires the application to use a predefined library to perform the service discovery;
logging, by the management computing system, the one or more operations by the application to perform service discovery through the middleware application system in a log associated with the application, wherein the log associated with the application is isolated from logs associated with other applications.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for determining an access request provided by an application that seeks to interact with one or more backend systems through a computing system. One or more predefined restrictions can be enforced on the application, the computing system, or the one or more backend systems.
-
Citations
16 Claims
-
1. A computer-implemented method, comprising:
-
determining, by a management computing system, an access request provided by an application running on a computing device that seeks to interact with one or more backend systems through a middleware application system, wherein the access request is provided through an endpoint associated with the management computing system, and wherein the middleware application system provides a serverless application framework for processing the access request; and enforcing, by the management computing system, one or more predefined restrictions on the application, the middleware application system, or the one or more backend systems, the enforcing further comprising; determining, by the management computing system, that the application is performing one or more operations to perform service discovery; enforcing, by the management computing system, a predefined restriction that requires the application to use a predefined library to perform the service discovery; logging, by the management computing system, the one or more operations by the application to perform service discovery through the middleware application system in a log associated with the application, wherein the log associated with the application is isolated from logs associated with other applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
one or more processors; and a memory storing instructions that, when executed by the one or more processors, cause the system to perform; determining an access request provided by an application running on a computing device that seeks to interact with one or more backend systems through a middleware application system, wherein the access request is provided through an endpoint associated with the system, and wherein the middleware application system provides a serverless application framework for processing the access request; and enforcing one or more predefined restrictions on the application, the middleware application system, or the one or more backend systems, the enforcing further comprising; determining that the application is performing one or more operations to perform service discovery; enforcing a predefined restriction that requires the application to use a predefined library to perform the service discovery; logging the one or more operations by the application to perform service discovery through the middleware application system in a log associated with the application, wherein the log associated with the application is isolated from logs associated with other applications. - View Dependent Claims (10, 11, 12)
-
-
13. A non-transitory computer readable medium comprising instructions that, when executed, cause one or more processors of a computing system to perform:
-
determining an access request provided by an application running on a computing device that seeks to interact with one or more backend systems through a middleware application system, wherein the access request is provided through an endpoint associated with the system, and wherein the middleware application system provides a serverless application framework for processing the access request; and enforcing one or more predefined restrictions on the application, the middleware application system, or the one or more backend systems, the enforcing further comprising; determining that the application is performing one or more operations to perform service discovery; enforcing a predefined restriction that requires the application to use a predefined library to perform the service discovery; logging the one or more operations by the application to perform service discovery through the middleware application system in a log associated with the application, wherein the log associated with the application is isolated from logs associated with other applications. - View Dependent Claims (14, 15, 16)
-
Specification