-
公开(公告)号:US20200374291A1
公开(公告)日:2020-11-26
申请号:US16416680
申请日:2019-05-20
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Daniel Yaniro, JR.
IPC: H04L29/06
Abstract: A method includes identifying a first validation parameter of a first network node and a second validation parameter of a second network node. The method includes creating an authentication node based on the first and second validation parameters. The method also includes receiving a request to access a microservice that utilizes the first network node and the second network node. The authentication node analyzes the request to make a validation determination indicative of whether the request satisfies the first and second validation parameters and controls access to the microservice based on the validation determination.
-
公开(公告)号:US20220086164A1
公开(公告)日:2022-03-17
申请号:US17532155
申请日:2021-11-22
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Daniel Yaniro, JR.
IPC: H04L29/06
Abstract: A method includes identifying a first validation parameter of a first network node and a second validation parameter of a second network node. The method includes creating an authentication node based on the first and second validation parameters. The method also includes receiving a request to access a microservice that utilizes the first network node and the second network node. The authentication node analyzes the request to make a validation determination indicative of whether the request satisfies the first and second validation parameters and controls access to the microservice based on the validation determination.
-
公开(公告)号:US20200374368A1
公开(公告)日:2020-11-26
申请号:US16702888
申请日:2019-12-04
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Joseph Soryal , Daniel Yaniro, JR.
Abstract: A method includes identifying a first validation parameter of a first network node and a second validation parameter of a second network node. The method includes creating an authentication node based on the first and second validation parameters. The method also includes receiving a request to access a microservice that utilizes the first network node and the second network node. The authentication node analyzes the request to make a validation determination indicative of whether the request satisfies the first and second validation parameters and controls access to the microservice based on the validation determination.
-
-