US 12,287,896 B2
System and method for implementing data sovereignty safeguards in a distributed services network architecture
Richard D. Shriver, Tinton Falls, NJ (US); Edward T. Pieluc, Jr., Howell, NJ (US); Daniel J. McDonald, Whitehouse Station, NJ (US); Hugh Beverly Appling, Hickory, NC (US); David Alan Hammaker, Oakland Park, FL (US); and Zheng Sun, Greenacres, FL (US)
Assigned to OPEN TEXT HOLDINGS, INC., Menlo Park, CA (US)
Filed by Open Text Holdings, Inc., Menlo Park, CA (US)
Filed on Apr. 18, 2024, as Appl. No. 18/639,267.
Application 18/639,267 is a continuation of application No. 18/310,457, filed on May 1, 2023, granted, now 12,019,777.
Application 18/310,457 is a continuation of application No. 17/850,613, filed on Jun. 27, 2022, granted, now 11,704,428, issued on Jul. 18, 2023.
Application 17/850,613 is a continuation of application No. 16/997,568, filed on Aug. 19, 2020, granted, now 11,403,415, issued on Aug. 2, 2022.
Application 16/997,568 is a continuation of application No. 15/956,045, filed on Apr. 18, 2018, granted, now 10,803,191, issued on Oct. 13, 2020.
Claims priority of provisional application 62/486,757, filed on Apr. 18, 2017.
Prior Publication US 2024/0265127 A1, Aug. 8, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); H04L 9/40 (2022.01); H04L 67/1095 (2022.01); H04L 67/306 (2022.01); H04L 67/10 (2022.01); H04W 4/021 (2018.01)
CPC G06F 21/6218 (2013.01) [H04L 63/20 (2013.01); H04L 67/1095 (2013.01); H04L 67/306 (2013.01); G06F 2221/2111 (2013.01); H04L 63/102 (2013.01); H04L 67/10 (2013.01); H04W 4/021 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A distributed service system, comprising:
a first node comprising one or more computing devices, the first node adapted for providing one or more services and providing a first interface for requesting a first service;
a second node comprising one or more computing devices, the second node adapted for providing one or more services and providing a second interface for requesting the first service;
wherein the first node is adapted for:
receiving a request for the first service, the request received through the first interface provided by the first node;
determining whether data sovereignty enforcement should be implemented with respect to the request;
when it is determined that data sovereignty enforcement should be implemented with respect to the request, determining whether the first service as provided by the first node is data sovereign for the request;
when it is determined that the first service as provided by the first node is not data sovereign for the request:
determining that the second node is data sovereign for the request;
determining a response including second node data; and
sending a communication to the second node or a user associated with the request, wherein the communication includes the determined response.