US 12,238,183 B2
Graph-based deployment tool
Adam Gilat, Holon (IL); Alexander Abugov, Gan Ner (IL); Regev Dekel, Netanya (IL); Roy Antman, Ramat Gan (IL); Or Yosef Sela, Zoran (IL); and Eyal Cohen, Givatayim (IL)
Assigned to Chicago Mercantile Exchange Inc., Chicago, IL (US)
Filed by Chicago Mercantile Exchange Inc., Chicago, IL (US)
Filed on Oct. 11, 2023, as Appl. No. 18/484,599.
Application 18/484,599 is a continuation of application No. 17/868,110, filed on Jul. 19, 2022, granted, now 11,824,949.
Application 17/868,110 is a continuation of application No. 16/814,271, filed on Mar. 10, 2020, granted, now 11,425,217, issued on Aug. 23, 2022.
Prior Publication US 2024/0048630 A1, Feb. 8, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 67/00 (2022.01); H04L 67/01 (2022.01); H04L 67/125 (2022.01); H04L 67/51 (2022.01)
CPC H04L 67/34 (2013.01) [H04L 67/01 (2022.05); H04L 67/125 (2013.01); H04L 67/51 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for validating deployment of a service, the method comprising:
assigning a catalog data structure to a catalog layer of a plurality of layers of a graph data structure, the catalog data structure including data associated with an initial tenant at an address associated with a hosted location;
providing a service offering to the catalog data structure of the catalog layer;
generating an item node, associated with the service offering, for the graph data structure, wherein the graph data structure associates the item node to the catalog data structure of the catalog layer and the initial tenant; and
validating, through a static analysis of the graph data structure, the item node with respect to a build that exposes the service offering;
determining, via the static analysis, that the build that exposes the service offering deviates from a pre-declared listing of allowed of one or more dependencies; and
rejecting, responsive to the determination, the deployment of the service after the deployment is inserted into the graph data structure to enforce, at least in part, a default security policy to deny deviations from pre-declared execution parameters.