Administration of services executing in cloud platform based datacenters using token with data structure

    公开(公告)号:US12231423B2

    公开(公告)日:2025-02-18

    申请号:US18612708

    申请日:2024-03-21

    Abstract: A cloud infrastructure is configured and deployed for managing services executed on a cloud platform. The cloud infrastructure includes a control datacenter configured to communicate with one or more service datacenters. The service datacenter deploys one or more application programming interfaces (API's) associated with a service. The service datacenter also deploys an administration agent. The control datacenter hosts an engine that receives requests from users to perform administration operations by invoking the administration API's. In this manner, the control datacenter functions as a centralized control mechanism that effectively distributes administration operation requests as they are received from users to service datacenters that can service the requests. The cloud infrastructure provides an auditable, compliant and secure management system for administering services for distributed systems running in the cloud.

    Vault Encryption Abstraction Framework System

    公开(公告)号:US20250015986A1

    公开(公告)日:2025-01-09

    申请号:US18887799

    申请日:2024-09-17

    Abstract: A vault encryption abstraction framework computing system provides interface functionality to facilitate integration of client applications with vaulting solutions. The vault encryption abstraction framework manages custom authentication and authorization using the vaulting solution application for one or more client applications such as by periodically rotating or renewing any authentication tokens. The vault encryption abstraction framework includes a scheduler to manage timing requirements and to configure the client application to the schedule by setting the renewed token value to an API endpoint (e.g., a function return) and/or a configuration file for access by one or more client applications. This event triggers the client application to update to the latest token value. The vault encryption abstraction framework then triggers the vaulting solution to create and return the new key. The new key is then returned to the client application. A history of the key generation messages and subsequent status is saved in a data log.

    APPLICATION SERVICE BEHAVIOR MANAGEMENT USING REQUEST CONTEXT

    公开(公告)号:US20240372924A1

    公开(公告)日:2024-11-07

    申请号:US18776510

    申请日:2024-07-18

    Applicant: SAP SE

    Abstract: Techniques for managing application service behavior using request context are disclosed. In some embodiments, a computer system performs a method comprising: detecting a request sent by a service of an application, the service being one of a plurality of services included in a microservice architecture of the application, the request including a service type data that identifies the application and a service identification data that identifies the service; determining a behavior configuration for the request based on the service type data and the service identification data; and executing the service or another service of the plurality of services based on the determined behavior configuration.

    Vault encryption abstraction framework system

    公开(公告)号:US12132833B2

    公开(公告)日:2024-10-29

    申请号:US18221074

    申请日:2023-07-12

    CPC classification number: H04L9/0891 G06F9/44505 H04L9/3213 H04L67/133

    Abstract: A vault encryption abstraction framework computing system provides interface functionality to facilitate integration of client applications with vaulting solutions. The vault encryption abstraction framework manages custom authentication and authorization using the vaulting solution application for one or more client applications such as by periodically rotating or renewing any authentication tokens. The vault encryption abstraction framework includes a scheduler to manage timing requirements and to configure the client application to the schedule by setting the renewed token value to an API endpoint (e.g., a function return) and/or a configuration file for access by one or more client applications. This event triggers the client application to update to the latest token value. The vault encryption abstraction framework then triggers the vaulting solution to create and return the new key. The new key is then returned to the client application. A history of the key generation messages and subsequent status is saved in a data log.

    Application service behavior management using request context

    公开(公告)号:US12113869B2

    公开(公告)日:2024-10-08

    申请号:US17830752

    申请日:2022-06-02

    Applicant: SAP SE

    CPC classification number: H04L67/51 G06F16/2455 H04L41/084 H04L67/133

    Abstract: Techniques for managing application service behavior using request context are disclosed. In some embodiments, a computer system performs a method comprising: detecting a request sent by a service of an application, the service being one of a plurality of services included in a microservice architecture of the application, the request including a service type data that identifies the application and a service identification data that identifies the service; determining a behavior configuration for the request based on the service type data and the service identification data; and executing the service or another service of the plurality of services based on the determined behavior configuration.

    Techniques for consistent multi-tenant behavior in microservices based applications

    公开(公告)号:US12067426B2

    公开(公告)日:2024-08-20

    申请号:US18231748

    申请日:2023-08-08

    Abstract: Techniques are disclosed for using a multi-tenant framework for microservices in a microservices-based application to handle tenant-specific circuit breaking. The microservices-based application can include at least one microservice that incorporates the multi-tenant framework. The multi-tenant framework includes software components configured to provide multi-tenant functionality for the microservice. A first microservice may receive an indication associated with a tenant that a second microservice is overloaded. The first microservice can then receive a request containing tenant context data at an interface. A first software component of the multi-tenant framework can extract the tenant context data from the request. The first microservice may determine whether the tenant context data corresponds to the tenant. The first microservice can then trigger a circuit breaker for the second microservice.

Patent Agency Ranking