Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs

Protecting Sensitive Data in Cloud Clusters: Smarter Access Controls for Containerized Applications

Inventiv.org
November 19, 2025
Apple

Invented by Chester; Alan, Elemenshawy; Ayman Mohamed Aly Hassan, Heiss; Karl, Horwitz; Joshua, Mishra; Abhinav, Pieczul; Olgierd, Muralidhar Rao; Praveen Kumar, Tulsian; Rishabh Ramakant, Oracle International Corporation

Cloud systems have changed how we run and protect computer programs. With so many users and apps sharing the same space, keeping things separate and safe is very important. Let’s explore a new way to keep everything in its place, based on a recent patent application. We’ll unpack why this matters, what came before, and what this invention brings to the table.

Your browser does not support the video tag.

Background and Market Context

In today’s world, companies use big computer groups called clusters to run many small programs inside containers. These are like boxes that keep apps and their stuff together, so they work anywhere. People and other programs, called users and non-human users, use these clusters every day. Some are admins, some are customers, and some are parts of the system itself.

Cloud clusters are shared by many. This means one company’s app might be running next to another company’s app, all on the same hardware. Think of it like a big apartment building where each family needs their own space. In the cloud, these spaces are called namespaces. Each namespace holds things like data, apps, and secrets. Sometimes, a customer gets their own namespaces to keep their stuff private and safe.

But here’s the problem: if someone from one namespace tries to sneak into another, they could see or change things they shouldn’t. These “cross-boundary” problems can cause big trouble, like leaks or broken apps. That’s why companies work hard to keep each namespace locked down.

The market for these systems is huge. Cloud services like Amazon, Google, and Microsoft all offer clusters where customers run their own apps. The demand for strong separation grows as more people trust the cloud with sensitive work. If a cluster can’t keep things apart, customers might take their business elsewhere.

With so many shared users and apps, cloud providers need to make sure each part of the cluster stays in its own lane. This is called isolation. Good isolation means users only see their own stuff, and nothing else.

But isolation is not just about stopping all traffic. Sometimes, certain users have permission to cross boundaries, like when an admin needs to help another team. The system must be smart enough to know when to allow this, and when to block it. That’s where things get tricky.

Because clusters are always changing—new users come in, apps are added, permissions change—the system needs to keep up, and always check who is allowed to do what, and where. Failing to do this can lead to mistakes, breaches, or outages.

In short, as clusters grow and more people use them, keeping everything separate and secure is a top priority. This is the market challenge that the new patent aims to solve.

Scientific Rationale and Prior Art

To understand why this new patent matters, let’s look at how things have been done before and why those ways don’t always work.

In cloud clusters, separation is usually handled by giving each team or customer their own namespace. Each namespace is like a room with its own walls. The system uses rules and policies to say who can go in each room. These rules are often managed by things called identity and access management (IAM) and role-based access control (RBAC).

IAM lets admins set broad rules, like “Sally can manage all apps in her department.” RBAC lets them get more detailed, like “Sally can only read files, not change them.” These systems work together to keep things safe. Other methods, like attribute-based access control (ABAC), use labels or tags to make decisions.

But, in practice, these systems have weak spots. Sometimes, a program or user can get a token—a digital pass—that lets them do things they shouldn’t. For example, if a service account token is leaked, someone might use it to sneak into another namespace. Or, if policies are set up wrong, a user might get more access than they need.

People have tried to fix these problems by making rules stricter, or by adding more checks. But as clusters grow, keeping all these rules updated and correct becomes very hard. Mistakes happen. Sometimes, the system is too strict and blocks things that should be allowed. Other times, it misses a loophole, and someone gets through.

Some older systems just check if a user is allowed in the cluster, but don’t always check if they’re allowed in a specific namespace. Others let service accounts move too freely, because their tokens are too broad. As a result, it’s possible for users or programs to cross boundaries, even if they shouldn’t.

What’s missing is a smart, automatic way to check both the origin and the destination of each request. The system needs to know not just who is asking, but where they’re asking from, and where they want to go. And it needs to do this every time, for every request, without slowing things down.

This is the gap the new patent tries to fill. It introduces a way for the system to always look at both sides of a request—where it came from, and where it wants to go. If the request tries to cross a boundary it shouldn’t, the system blocks it, no matter what other permissions might say. Only if all the right checks pass does the request go through.

In short, older systems either check too little, or not at the right time. They don’t always look at the whole path of a request. This leaves room for mistakes and breaches. The new patent’s approach addresses these blind spots by enforcing checks at every step, using both tokens and metadata about namespaces.

Invention Description and Key Innovations

Now, let’s break down what this invention does, and how it changes the game.

At its heart, the invention is a method and system for making sure every request in a cluster stays within its allowed space. It does this by watching requests for access to namespaces, checking where they come from, and matching them against strict rules.

Here’s how it works, step by step:

When a user or program wants to do something in the cluster—like read a file or run a command—it sends a request. This request comes with a token. The token has special information inside, like which namespace the user or program belongs to.

The system receives the request and opens up the token to find this information. It checks which namespace the request is coming from (the origin), and which namespace it wants to go to (the target).

If the origin and the target are not the same, and the rules say the user or program shouldn’t cross over, the system blocks the request, right away. It doesn’t matter if some other rule might have allowed it—if the namespaces don’t match, the request is denied.

If the origin and target are the same, the system goes on to check if the user or program has the right permission inside that namespace. Only if everything is allowed does the request go through.

The system does all this automatically, for every request, using a mix of tokens, metadata, and policy checks. The process is enforced by special parts of the system called isolation enforcers. These are always watching, checking tokens, and making sure no one steps out of bounds.

One key innovation is the use of both isolation namespaces and standard namespaces. The system can link these together, or keep them separate, as needed. It keeps a store of metadata about each namespace, so it always knows which is which.

Another big idea is that the system never lets a user or program access two isolation namespaces at once. This means, even if someone has access to more than one, they can’t cross between them in a single step. This stops many common tricks used to get around boundaries.

The system also brings together different ways of checking permissions. It looks at IAM rules, RBAC roles, and even other policies like ABAC. It puts all these checks together, so nothing gets missed.

The process is smooth and works in real time. When namespaces change—maybe a new one is added, or permissions are updated—the system quickly updates its own records. This means there are no windows of time where things are out of sync or unsafe.

If a service account tries to use its token to reach another namespace, the system sees this and says no. If a user’s token tries to claim access to a space it shouldn’t, the system checks the policies and blocks it if needed. And if someone tries to do something they don’t have permission for—even inside their own namespace—the system can stop that too.

All these checks are handled by smart plugins in the system, called handlers. They look at both authentication (who you are) and authorization (what you can do). They talk to the cluster’s metadata store and the policy manager to get all the info they need.

The result is a tight net around every namespace. No more accidental crossovers. No more sneaky tokens. Every request is watched, checked, and only allowed if it’s safe.

This way, cloud customers can trust that their apps and data are really kept apart from others. Admins can fine-tune who gets access, and for what. And the system can grow and change, while always keeping things safe.

This invention stands out because it brings together token checks, namespace metadata, and layered policies, all working in concert. It doesn’t just rely on one tool, but uses several, each catching problems the others might miss. It’s a smart, flexible, and strong way to keep clusters safe.

Conclusion

As cloud computing grows, keeping users and apps safe from each other is more important than ever. This patent lays out a new way to make sure every part of a cluster stays where it belongs. By checking every request, every time, and using both tokens and namespace info, it closes the gaps left by older systems.

With these new checks, cloud providers can promise strong, real isolation for their customers. That means more trust, fewer mistakes, and a safer, better cloud for everyone. This invention is a big step forward for secure, shared computing.

Click here https://ppubs.uspto.gov/pubwebapp/ and search 20250335228.

Tags: Patent Review
Previous Story
Accelerate Business Insights with Smart Storage That Analyzes Data Before It Reaches Your Server
Next Story
Secure Identity Verification for Enterprises Using Zero-Knowledge Proofs with Binary Tree Encryption

Related Articles

Unlocking Secure, Easy-to-Remember Passphrases in Local Languages for Emerging Market Users

Invented by BHAVSAR; Karan Rajesh, DOKE; Pankaj Harish, SHINDE; Sujit...

Seamless Data Uplink Across 5G Networks: Faster, More Reliable Connectivity for Mobile Devices

Invented by Chen; Yuqin, Hu; Haijing, Xu; Fangli, Apple Inc....

Menu

  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs

Disclaimer Communications between you and Inventiv Foundation are protected by our Privacy Policy but not by the attorney-client privilege or as work product. Inventiv Foundation, Inc. can connect you to independent attorneys and self-help services at your specific direction. We are not a law firm or a substitute for an attorney or law firm. We cannot provide any kind of advice, explanation, opinion, or recommendation about possible legal rights, remedies, defenses, options, selection of forms or strategies. Your access to the website is subject to our Terms of Use.

Tags

Alphabet Amazon Facebook/Meta Microsoft Patent Review Samsung
  • Home
  • About
  • Inventiv’s Daily
  • Inventiv Cloud
  • Blogs
  • Contact
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs
Inventiv.org
  • Home
  • About
  • Resources
    • USPTO Pro Bono Program
    • Patent Guide
    • Press Release
  • Patent FAQs
    • IP Basics
    • Patent Basics
      • Patent Basics
      • Set up an Account with the USPTO
      • Need for a Patent Attorney or Agent
    • Provisional Patent Application
      • Provisional Patent Application
      • Provisional Builder
      • After you submit a PPA
    • Utility Patent Application
      • Utility Patent Application
      • File a Utility Patent Application
      • What Happens After Filing Utility Application?
    • Respond to Office Actions
    • Patent Issurance
  • ProvisionalBuilder
  • Login
  • Contact
  • Blogs