US 12,309,202 B2
Enforcing security rules along a trajectory of data movement
Subha Kiran Patnaikuni, Visakhapatnam (IN); Venkata Vara Prasad Karri, Visakhapatnam (IN); Sarbajit K. Rakshit, Kolkata (IN); and Sri Harsha Varada, Vizianagaram (IN)
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Feb. 16, 2022, as Appl. No. 17/673,410.
Prior Publication US 2023/0262094 A1, Aug. 17, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/20 (2013.01) [H04L 63/0263 (2013.01); H04L 63/0407 (2013.01); H04L 63/105 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising operations for:
identifying confidentiality levels of source data and of processed data at different points of an existing trajectory path in an application landscape by analyzing source metadata of the source data and processed metadata of the processed data;
identifying one or more trajectory paths that meet security levels that correspond to the confidentiality levels by analyzing microservice generated logs and an application landscape description with reference to the confidentiality levels of the source data and the processed data;
selecting a trajectory path from the one or more trajectory paths;
generating a workflow to move the source data and the processed data through the selected trajectory path; and
executing the workflow to move the source data and the processed data through microservices of the selected trajectory path while enforcing the security levels.