US 12,423,455 B2
Architecture having a protective layer at the data source
Manav Ratan Mital, Mountain View, CA (US); and Srinivas Nageswarrao Vadlamani, San Jose, CA (US)
Assigned to Cyral Inc., Milpitas, CA (US)
Filed by Cyral Inc., Milpitas, CA (US)
Filed on Mar. 20, 2024, as Appl. No. 18/611,327.
Application 18/611,327 is a continuation of application No. 17/732,425, filed on Apr. 28, 2022, granted, now 11,968,208.
Application 17/732,425 is a continuation of application No. 16/548,732, filed on Aug. 22, 2019, granted, now 11,477,196, issued on Oct. 18, 2022.
Claims priority of provisional application 62/840,847, filed on Apr. 30, 2019.
Claims priority of provisional application 62/758,223, filed on Nov. 9, 2018.
Claims priority of provisional application 62/733,013, filed on Sep. 18, 2018.
Prior Publication US 2024/0223560 A1, Jul. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 11/30 (2006.01); G06F 11/34 (2006.01); G06F 16/2453 (2019.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01); H04L 9/40 (2022.01); H04L 69/326 (2022.01); H04L 69/329 (2022.01)
CPC G06F 21/6218 (2013.01) [G06F 11/3006 (2013.01); G06F 11/3438 (2013.01); G06F 11/3476 (2013.01); G06F 16/24547 (2019.01); G06F 21/31 (2013.01); G06F 21/604 (2013.01); G06F 21/6227 (2013.01); G06F 21/6254 (2013.01); H04L 63/0281 (2013.01); H04L 63/0884 (2013.01); H04L 63/101 (2013.01); H04L 63/102 (2013.01); H04L 63/104 (2013.01); H04L 63/105 (2013.01); H04L 63/1425 (2013.01); H04L 63/166 (2013.01); H04L 63/168 (2013.01); H04L 69/326 (2013.01); H04L 69/329 (2013.01); G06F 2221/2107 (2013.01); H04L 2463/082 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving a communication for a data source at a wrapper, the wrapper including a dispatcher and at least one service, the dispatcher receiving the communication and being data agnostic, the communication being generated at a client, the at least one service including an authentication service;
providing the communication from the dispatcher to the data source and to the at least one service, the at least one service inspecting the communication;
determining whether the client is authorized to access the data source using the authentication service; and
preventing access to the data source in the event that the client is not authorized to access the data source.