US 12,423,454 B2
Architecture having a protective layer at the data source
Manav Ratan Mital, Mountain View, CA (US); and Srinivas Nageswarrao Vadlamani, San Jose, CA (US)
Assigned to Cyral Inc., Milpitas, CA (US)
Filed by Cyral Inc., Milpitas, CA (US)
Filed on Oct. 27, 2023, as Appl. No. 18/496,429.
Application 18/496,429 is a continuation of application No. 17/732,425, filed on Apr. 28, 2022, granted, now 11,968,208.
Application 17/732,425 is a continuation of application No. 16/548,732, filed on Aug. 22, 2019, granted, now 11,477,196, issued on Oct. 18, 2022.
Claims priority of provisional application 62/840,847, filed on Apr. 30, 2019.
Claims priority of provisional application 62/758,223, filed on Nov. 9, 2018.
Claims priority of provisional application 62/733,013, filed on Sep. 18, 2018.
Prior Publication US 2024/0056445 A1, Feb. 15, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 11/30 (2006.01); G06F 11/34 (2006.01); G06F 16/2453 (2019.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01); H04L 9/40 (2022.01); H04L 69/326 (2022.01); H04L 69/329 (2022.01)
CPC G06F 21/6218 (2013.01) [G06F 11/3006 (2013.01); G06F 11/3438 (2013.01); G06F 11/3476 (2013.01); G06F 16/24547 (2019.01); G06F 21/31 (2013.01); G06F 21/604 (2013.01); G06F 21/6227 (2013.01); G06F 21/6254 (2013.01); H04L 63/0281 (2013.01); H04L 63/0884 (2013.01); H04L 63/101 (2013.01); H04L 63/102 (2013.01); H04L 63/104 (2013.01); H04L 63/105 (2013.01); H04L 63/1425 (2013.01); H04L 63/166 (2013.01); H04L 63/168 (2013.01); H04L 69/326 (2013.01); H04L 69/329 (2013.01); G06F 2221/2107 (2013.01); H04L 2463/082 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, from a client, a communication for a data source at a wrapper, the wrapper including a dispatcher and a service, the dispatcher receiving the communication and being data agnostic;
providing the communication from the dispatcher to the service;
determining, using the service, whether the client is authorized to access the data source utilizing multi-factor authentication (MFA); and
preventing access to the data source if the success indication indicates that the authentication is unsuccessful.