Sign In to Follow Application
View All Documents & Correspondence

A Cloud Based Server Provisioning Platform And A Method Thereof

Abstract: "A CLOUD-BASED SERVER PROVISIONING PLATFORM AND A METHOD THEREOF” The present invention provides a cloud-based platform (200), operationally connected to cloud infrastructure environments (210) that includes an interface (220), an approval router (230), an execution mechanism (240), an orchestration engine (250), and a trail recorder (285). The present invention further provides a method (1000) that enables structured intake of server build requests (R1, R2), routes them through tenant-specific approval chains (500, 600), and authorizes execution only upon validated approvals (A1, A2). Provisioning actions are automated using infrastructure-as-code tools and cloud-native APIs. Audit trails and execution logs are maintained for compliance. The invention supports multi-tenant operations, integrates with ITSM workflows, and enforces policy-compliant deployment across hybrid and multi-cloud environments. Technical benefits include enhanced governance, reduced manual overhead, improved traceability, and secure infrastructure provisioning. Figure 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
28 September 2025
Publication Number
44/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

TRIANZ DIGITAL CONSULTING PRIVATE LIMITED
165/2, 1st Floor, Wing B, Kalyani Magnum, Doraisanipalya, Bannerghatta Road, Bangalore South, Karnataka, India – 560076

Inventors

1. Anil Kumar Gupta
165/2, 1st Floor, Wing B, Kalyani Magnum, Doraisanipalya, Bannerghatta Road, Bangalore South, Karnataka, India – 560076
2. Kalpana Mandloi
165/2, 1st Floor, Wing B, Kalyani Magnum, Doraisanipalya, Bannerghatta Road, Bangalore South, Karnataka, India – 560076
3. Jayaganesh K
165/2, 1st Floor, Wing B, Kalyani Magnum, Doraisanipalya, Bannerghatta Road, Bangalore South, Karnataka, India – 560076
4. Musunuri Balaram Prasad
165/2, 1st Floor, Wing B, Kalyani Magnum, Doraisanipalya, Bannerghatta Road, Bangalore South, Karnataka, India – 560076
5. Sanil Raj K P
165/2, 1st Floor, Wing B, Kalyani Magnum, Doraisanipalya, Bannerghatta Road, Bangalore South, Karnataka, India – 560076

Specification

Description:FIELD OF THE INVENTION
[0001] The present invention relates to the field of information technology infrastructure management, and more specifically to systems and methods for automated server provisioning within enterprise environments (cloud).
BACKGROUND FOR THE INVENTION:
[0002] In modern enterprise IT environments, server provisioning is a critical operation that involves coordination between hardware resources, virtualization platforms, and configuration management systems. Despite advancements in infrastructure automation, provisioning workflows often remain fragmented, relying on manual inputs and disparate approval mechanisms that are not natively integrated with the provisioning logic.
[0003] One major challenge in automated server provisioning is the absence of embedded approval workflows within the provisioning system itself. Typically, approval processes are handled externally via ticketing or communication platforms, leading to asynchronous execution and potential bypass of governance protocols. This disconnects between approval and execution layers increases the risk of unauthorized resource allocation and complicates auditability.
[0004] Another technical issue arises from the inability to enforce strict conditional execution based on approval status. In many systems, provisioning scripts or orchestration engines can be triggered prematurely, without verifying whether all required approvals have been obtained. This lack of gating logic between workflow validation and infrastructure deployment can result in resource sprawl, misconfigured environments, and non-compliance with enterprise IT policies.
[0005] CN108346028A discloses a service approval processing method, device, and system that dynamically configure approval workflows for target services. The invention supports quick access to approval flows. However, the system does not address automated server provisioning, lacks a structured intake mechanism for server build requests.
[0006] IN202541060604A describes a system and a cloud platform for implementing landing zones using modular user interfaces, iterative configuration refinement, and approval authorities. However, the system does not provide a dedicated server provisioning mechanism, an embedded approval workflow integrated into provisioning.
[0007] Therefore, there is a need for a system (cloud platform) or such provisions which overcome the problems of the prior art.
OBJECTS OF THE INVENTION:
[0008] An object of the present invention is to enable structured intake of server provisioning requests aligned with enterprise IT workflows.
[0009] One more object of the present invention is to ensure consistent and policy-compliant approval routing prior to infrastructure deployment.
[0010] One more object of the present invention is to prevent unauthorized provisioning by enforcing approval-dependent execution logic.
[0011] One more object of the present invention is to support governance and traceability through integrated audit logging during provisioning.
SUMMARY OF THE INVENTION:
[0012] Automated server provisioning within enterprise IT environments faces challenges due to fragmented workflows and disconnected approval mechanisms. Existing systems often rely on external ticketing platforms for authorization, resulting in asynchronous execution and governance gaps. The invention addresses these issues by integrating approval workflows directly into the provisioning logic and enforcing conditional execution. The objective is to streamline provisioning, ensure policy compliance, and enhance traceability. Technical advantages include embedded validation, automated orchestration, and audit-ready logging.
[0013] The cloud-based server provisioning platform is configured to operate across public, private, hybrid, and on-premises cloud environments. The platform includes an interface for structured intake of server build requests, an approval router for routing through tenant-specific chains, an execution mechanism for conditional authorization, an orchestration engine for automated deployment, and a trail recorder for audit logging.
[0014] The interface supports multiple input mechanisms including direct user input, artificial intelligence modules, service request systems, and external APIs. Extensible formats such as JSON and YAML are used to validate requests against ITSM workflows.
[0015] The approval router dynamically maps server build requests to approval chains based on tenant identity, request type, and resource classification. Hierarchical and parallel approval models are supported, enabling flexible workflow design. Approval decisions are captured through secure digital interfaces and logged with metadata for auditability.
[0016] The execution mechanism enforces conditional logic by authorizing provisioning only after all required approvals are validated. Approval metadata is verified against execution criteria such as digital signatures and role-based authorization levels. Rollback and exception handling procedures are supported to ensure infrastructure resilience.
[0017] The orchestration engine initiates provisioning actions upon receiving authorization from the execution mechanism. Approved requests are translated into executable workflows using infrastructure-as-code tools and cloud-native APIs. Task sequencing, rollback procedures, and post-deployment configuration are supported. Provisioning actions include virtual machine creation, system configuration, and deployment across heterogeneous cloud environments. Execution pathways include cloud provider APIs, infrastructure-as-code scripts, workflow automation routines, and managed service platform commands.
[0018] The trail recorder maintains comprehensive audit trails and execution logs, capturing metadata such as timestamps, approver identities, and orchestration outcomes.
BRIEF DESCRIPTION OF DRAWINGS:
[0019] Figures 1 and 2 show schematic block diagrams of a cloud platform in accordance with the present invention; and
[0020] Figure 3 shows a flowchart of a method for Server Provisioning using the cloud platform shown in figure 1.
DETAILED DESCRIPTION OF DRAWINGS:
[0021] The present invention provides a cloud-based server provisioning platform (200) (Figure 1) is configured to operate in coordination with one or more cloud infrastructure environments (210). The platform (200) serves as a centralized orchestration system that automates the deployment, configuration, and management of virtual server instances across distributed cloud ecosystems. The operational connection between the platform (200) and the cloud infrastructure environments (210) enables dynamic resource provisioning, real-time scalability, and consistent policy enforcement across heterogeneous cloud systems.
[0022] The cloud infrastructure environments (210) may include public cloud services, private cloud data centers, or hybrid cloud architectures. Each environment (210) typically comprises virtualized compute nodes, storage arrays, and network fabric components that support programmable interfaces for resource management. For instance, the platform (200) may integrate with infrastructure environments (210) such as public cloud platforms and enterprise cloud services.
[0023] The platform (200) incorporates a provisioning engine that interprets declarative templates and configuration manifests to instantiate server instances with specific attributes. These attributes may include operating system images, virtual CPU cores, memory allocations, disk volumes, and network interface configurations.
[0024] The cloud-based server provisioning platform (200) from herein afterwards is referred to as a platform (200). The platform (200) includes an interface (220), an approval router (230), an execution mechanism (240), an orchestration engine (250).
[0025] The interface (220) is configured within a memory (201) of a network-enabled computing device (205) and is processed by a processor (203) of the network-enabled computing device (205). The interface (220) is designed to serve as a communication and control layer that facilitates the intake of server build requests (SBRs) (R1, R2). The SBRs (R1, R2) are aligned with enterprise-grade Information Technology Service Management (ITSM) workflows, ensuring that the provisioning actions conform to standardized operational procedures and governance models applicable to the connected cloud infrastructure environment (210).
[0026] The interface (220) supports synchronous and asynchronous communication protocols, enabling real-time request handling as well as queued processing for batch operations. In one implementation, the interface (220) may utilize RESTful APIs to receive SBRs (R1, R2) from external ITSM systems, while also supporting message queue systems such as Apache Kafka® or RabbitMQ ™ (Trade-name) for high-throughput environments.
[0027] The interface (220) also supports audit logging and traceability features, which record each received SBR (R1, R2) along with associated metadata such as timestamps, user credentials, and action outcomes. These logs are stored in secure repositories and may be accessed for compliance reporting.
[0028] The approval router (230) is embedded within the interface (220), configured in the memory (201) and executed by the processor (203) of the network-enabled computing device (205). The approval router (230) is designed to manage and enforce tenant-specific authorization workflows for server build requests (SBRs) (R1, R2). The approval router (230) ensures that each SBR (R1, R2) is routed through a tenant-specific approval chain (500, 600) that corresponds to the governance policies of the respective tenant (280, 290).
[0029] The approval router (230) supports hierarchical and parallel approval models, allowing flexibility in workflow design. In a hierarchical model, each approver (330, 340) must sequentially validate the SBR (R1, R2) before it progresses to the next stage. In a parallel model, multiple approvers (330, 340) may review the request simultaneously, and the approval router (230) aggregates their decisions to determine the outcome.
[0030] The approval router (230) receives approval decisions (A1, A2) from one or more authorized approvers (330, 340) within the respective tenant (280, 290). The approval decisions (A1, A2) may include approvals, rejections, or requests for modification, and are captured through secure digital interfaces such as web portals, mobile applications, or integrated ITSM platforms. For instance, the approver (330) may use a IT service management platforms to approve an SBR (R1) for a production server deployment, while another approver (340) may reject the SBR (R2) due to non-compliance with internal security policies.
[0031] To ensure auditability and compliance, the approval router (230) logs each routing action and decision event along with associated metadata such as timestamps, approver credentials, and decision rationale.
[0032] The execution mechanism (240) is configured in the memory (201) and executed by the processor (203) of the network-enabled computing device (205). The execution mechanism (240) is coupled with the approval router (230) and is designed to enforce conditional execution logic for server provisioning operations. The execution mechanism (240) ensures that no server provisioning action is initiated unless all required approvals (A1, A2) have been received and validated by the approval router (230).
[0033] The execution mechanism (240) operates as a gatekeeper module that continuously monitors the approval status of each server build request (SBR) (R1, R2). Upon confirmation that all designated approvers (330, 340) within the respective tenant (280, 290) have submitted valid approval decisions (A1, A2), the execution mechanism (240) transitions the request into an executable state. For example, if an SBR (R1) for a production database server receives approvals from both the security and infrastructure teams, the execution mechanism (240) triggers the provisioning workflow in the connected cloud infrastructure environment (210).
[0034] The Execution mechanism (240) enforces policies using approval metadata. The execution mechanism (240) rejects SBR (R2) if approval (A2) is unauthorized or approval chain (600) is incomplete.To support auditability and traceability, the execution mechanism (240) logs each execution event along with contextual metadata such as the SBR identifier, execution timestamp, cloud environment target, and provisioning outcome. These logs are stored in secure, tamper-evident repositories and may be used for compliance audits, incident investigations, or operational analytics
[0035] The execution mechanism (240) may also support rollback and exception handling procedures. In scenarios where a provisioning task fails due to infrastructure errors or policy violations, the execution mechanism (240) may initiate compensatory actions such as reverting partial deployments, notifying stakeholders, or queuing the request for re-execution.
[0036] The orchestration engine (250) is coupled with the execution mechanism (240) and the cloud infrastructure environments (210). The orchestration engine (250) is configured to automatically initiate server provisioning actions upon receiving authorization from the execution mechanism (240). These provisioning actions include, but are not limited to, virtual machine creation, system configuration, and deployment of server instances within the connected cloud infrastructure environment (210).
[0037] The orchestration engine (250) functions as a centralized automation controller that translates the approved server build requests (SBRs) (R1, R2) into executable provisioning workflows. These workflows are composed of sequential and parallel tasks such as selecting virtual machine templates, allocating compute and storage resources, configuring operating systems, and applying network policies. For example, upon receiving authorization, the orchestration engine (250) may initiate the creation of a Linux-based virtual machine with 8 vCPUs, 32 GB RAM, and a 500 GB SSD volume in a specified availability zone.
[0038] The orchestration engine (250) supports integration with infrastructure-as-code (IaC) frameworks and cloud-native orchestration tools. These may include platforms such as infrastructure automation tools which allow the orchestration engine (250) to execute declarative provisioning scripts across heterogeneous cloud environments. In a practical implementation, the orchestration engine (250) may invoke the infrastructure automation tools to deploy a multi-tier web application stack, including web servers, application servers, and database instances, in a coordinated manner.
[0039] The orchestration engine (250) also supports dynamic scaling and post-deployment configuration. After initial provisioning, the orchestration engine (250) may trigger additional tasks such as installing software packages, registering the instance with monitoring systems, or applying security hardening scripts.
[0040] In one more embodiment of the platform (200a), the platform (200a) includes a trail recorder (285) (Figure 2) is included within a cloud-based server provisioning platform (200a) to maintain comprehensive audit trails and execution logs. The trail recorder (285) is configured as a persistent logging subsystem that operates in conjunction with the platform’s orchestration and execution components. The trail recorder (285) is implemented using secure storage modules and logging frameworks that support structured data formats such as JSON, XML, or relational database entries. The primary function of the trail recorder (285) is to ensure compliance, traceability, and governance across all provisioning activities initiated within the platform (200a).
[0041] The trail recorder (285) captures metadata associated with each server build request (SBR), including timestamps, request origin, approval decisions (A1, A2), execution status, and orchestration outcomes. This metadata is collected from the interface (220), the approval router (230), the execution mechanism (240), and the orchestration engine (250), ensuring end-to-end visibility of the provisioning lifecycle.
[0042] In a practical implementation, the trail recorder (285) may forward logs to a Security Information and Event Management (SIEM) system for threat detection and audit validation. The integration is achieved using standard protocols such as REST APIs, syslog, or message queues.
[0043] Logs may be retained for configurable durations and archived in encrypted cloud storage systems with access controls. Compression algorithms and lifecycle management policies are applied to optimize storage usage.
[0044] The trail recorder (285) is designed to operate in multi-tenant environments, ensuring logical isolation of audit data across organizational units. Role-based access control (RBAC) is enforced to restrict access to logs based on user roles and permissions. Each tenant’s provisioning activities are logged independently, and access to audit records is governed by tenant-specific policies.
[0045] In addition to compliance and governance, the trail recorder (285) supports operational analytics by enabling trend analysis. Aggregated log data can be used to identify provisioning bottlenecks, frequent failure patterns, or approval delays.
[0046] The cloud infrastructure environment (210), operationally connected to the cloud-based server provisioning platform (200), includes deployment models selected from a public cloud (211), a private cloud (212) , a hybrid cloud (213), or an on-premises environment (214). Each model offers distinct architectural, operational, and security characteristics, enabling the platform (200) to support diverse enterprise requirements and deployment strategies.
[0047] The public cloud (211) refers to a multi-tenant infrastructure managed by third-party service providers, offering elastic computers, storage, and networking resources over the internet. The platform (200) may integrate with the public cloud (211) environments such as Amazon Web Services (Trade names) utilizing their native APIs for provisioning virtual machines, configuring network topologies, and managing storage volumes. For example, the orchestration engine (250) may deploy a web server cluster in the public cloud (211) region optimized for global content delivery.
[0048] The private cloud (212) represents a dedicated infrastructure operated exclusively for a single organization, either hosted internally or by a managed service provider. The platform (200) may interact with private cloud (212) environments built using technologies such as OpenStack ® enabling secure and policy-compliant provisioning workflows (Trade names).
[0049] The hybrid cloud (213) combines elements of both public cloud (211) and private cloud (212), allowing workload portability and resource optimization across environments. The platform (200) may orchestrate provisioning actions that span both domains, such as deploying front-end services in the public cloud (211) while maintaining sensitive data in the private cloud (212). The orchestration engine (250) may use federated identity management and unified policy enforcement to ensure consistent governance across the hybrid cloud (213).
[0050] The on-premises environment (214) refers to infrastructure physically located within an organization’s data center, managed directly by internal IT teams. The platform (200) may interface with on-premises environment (214) systems using virtualization platforms such as Hyper-V or KVM, (Trade names) enabling provisioning of virtual machines and containers within enterprise-controlled hardware. For example, a manufacturing company may use the platform (200) to provision edge computing nodes in the on-premises environment (214) for real-time analytics at factory locations.
[0051] The interface (220) of a cloud-based server provisioning platform (200) is further configured to receive server build requests (SBRs) through input mechanisms, including a direct user input (221), a service request system (223),
[0052] The direct user input (221) mechanism allows administrators or authorized personnel to manually submit SBRs using graphical user interfaces, command-line tools, or web-based dashboards. The interface (220) may present structured forms or interactive wizards that guide users through the specification of server parameters such as operating system type, CPU and memory allocation, storage configuration, and network settings. For example, an IT administrator may use a web portal to request a virtual machine with Ubuntu OS, 4 vCPUs, and 16 GB RAM for a development environment.
[0053] The service request system (223) refers to an enterprise ITSM platform that manages structured workflows for resource requests, approvals, and fulfillment.
[0054] The approval router (230) is embedded within the interface (220) of the cloud-based server provisioning platform (200) as one or more structural implementations, including an software module (231), a microservice (232), an plug-in (233), or a containerized component (234). Each implementation offers distinct architectural advantages, enabling flexible deployment, scalability, and maintainability of the approval router (230) within the platform (200).
[0055] The software module (231) refers to a logically encapsulated set of functions integrated directly into the interface (220). The software module (231) may be implemented using object-oriented or functional programming paradigms and compiled into the core application runtime.
[0056] The microservice (232) represents a standalone service that communicates with the interface (220) over network protocols such as HTTP or gRPC. The microservice (232) may be deployed independently and scaled horizontally based on workload demands. In a practical implementation, the approval router (230) may be exposed as a RESTful microservice that receives SBR metadata, evaluates tenant-specific approval chains (500, 600), and returns approval status to the execution mechanism (240).
[0057] The plug-in (233) refers to a dynamically loadable component that extends the functionality of the interface (220) without modifying core codebase thereof. The plug-in (233) may be developed using standard extension frameworks such as OSGi or browser-based plug-in APIs. For instance, the approval router (230) may be implemented as the plug-in that adds approval routing capabilities to an existing ITSM dashboard.
[0058] The containerized component (234) encapsulates the approval router (230) within a lightweight, portable container image that includes all necessary dependencies and runtime configurations. The containerized component (234) may be orchestrated using platforms such as Kubernetes ® (Trade name). For example, the approval router (230) may be deployed as a Docker™ (Trade-name) container that interacts with the interface (220) via service discovery and API endpoints, supporting multi-cloud and hybrid deployments.
[0059] A tenant-specific approval chain (500, 600), as utilized by the approval router (230) within a cloud-based server provisioning platform (200), is defined based on one or more organizational constructs, including an organizational hierarchy (501), project-specific roles (502), user groups (503).
[0060] The organizational hierarchy (501) refers to a structured representation of reporting relationships and authority levels within a tenant (280, 290). The approval chain (500, 600) may be configured to route SBRs through designated approvers (330, 340) based on their position in the hierarchy. For example, a request for production infrastructure may require approval from a team leader, department head, and IT director, in that order.
[0061] The project-specific role (502) defines approval responsibilities based on the functional roles assigned within a particular project or initiative. The approval chain (500, 600) may include approvers such as project managers, technical architects, or security analysts, depending on the nature of the requested resources.
[0062] The user group (503) represents a logical collection of users with shared responsibilities or access privileges. The approval chain (500, 600) may be configured to route SBRs to any member of a designated user group, enabling flexible and distributed approval workflows.
[0063] The execution mechanism (240) of (figure 2) a cloud-based server provisioning platform (200) is further configured to authorize or block server provisioning based on one or more conditional control parameters. These parameters include automated policy compliance validation (245), multi-factor approval verification (246), manual override by an administrator (249),
[0064] The automated policy compliance validation (245) involves the execution mechanism (240) verifying that each server build request (SBR) conforms to enterprise policies related to security, resource usage, and operational standards.
[0065] The multi-factor approval verification (246) ensures that all required approvals (A1, A2) are not only received but also authenticated using multiple verification methods.
[0066] The manual override by at the administrator (249) allows authorized personnel to bypass automated controls under exceptional circumstances.
[0067] The orchestration engine (250) of a cloud-based server provisioning platform (200) is configured to initiate server provisioning actions using one or more execution pathways. These pathways include invoking cloud provider APIs (261), triggering infrastructure-as-code scripts (262), executing workflow automation routines (263), and dispatching provisioning commands to managed service platforms (264). Each pathway enables automated, scalable, and policy-compliant deployment of server resources across cloud infrastructure environments (210).
[0068] The invocation of cloud provider APIs (261) involves the orchestration engine (250) sending structured requests to native interfaces exposed by cloud service providers. These APIs may include endpoints for creating virtual machines, configuring storage volumes, assigning IP addresses, and applying security policies. For example, the orchestration engine (250) may use the EC2 API to provision compute instances in Amazon Web Services (Trade names). API-based provisioning ensures real-time execution and fine-grained control over infrastructure parameters.
[0069] The triggering of infrastructure-as-code scripts (262) allows the orchestration engine (250) to execute declarative configuration files that define the desired state of infrastructure components.
[0070] The execution of workflow automation routines (263) enables the orchestration engine (250) to initiate predefined sequences of tasks that coordinate provisioning actions with auxiliary operations such as monitoring setup, software installation, and compliance checks. These routines may be implemented using platforms such as Apache Airflow (Trade names).
[0071] The dispatching of provisioning commands to managed service platforms (264) involves the orchestration engine (250) interacting with third-party platforms.
[0072] The trail recorder (285) is included within a cloud-based server provisioning platform (200) to maintain comprehensive audit trails and execution logs. The trail recorder (285) is designed to support compliance, traceability, and governance by capturing, storing, and analyzing detailed records of provisioning activities, approval workflows, and system interactions. The trail recorder (285) ensures that all actions performed within the platform (200) are documented in a secure and verifiable manner.
[0073] The generation of audit trails (286) involves the trail recorder (285) creating structured records that chronologically document each step in the server provisioning lifecycle. These records may include timestamps, user identities, one or more approval decisions (A1, A2), execution triggers, and orchestration outcomes. For example, when the SBR (R1) is submitted, routed through the approval chain (500), and executed by the orchestration engine (250).
[0074] The storage of execution logs (not shown) refers to the persistent retention of detailed logs generated during the provisioning process. These logs may include system-level events, API call responses, error messages, and resource allocation details. The execution logs are stored in secure repositories using formats such as JSON, CSV, or relational database entries, enabling efficient retrieval and analysis. For instance, an execution log may record the exact parameters used to deploy a virtual machine in the public cloud including instance type, region, and network configuration.
[0075] The retrieval of audit records (not shown) enables authorized users or systems to access historical data for compliance audits, incident investigations, or performance reviews. The trail recorder (285) may support query interfaces, reporting dashboards, or integration with external analytics platforms.
[0076] In one embodiment, a method (1000) (Figure 3) for enabling server provisioning using the cloud platform (200) is provided.
[0077] The method (1000) starts at step (1000a).
[0078] At step (1001), configure the interface (220), the approval router (230), the execution mechanism (240), and the orchestration engine (250) of the cloud platform (200) in the memory (201) of the network-enabled computing device (205).
[0079] The interface (220) is configured to allow users to submit server provisioning requests through a graphical user interface (GUI) or an API endpoint. Input data includes server specifications such as CPU, memory, storage, operating system, and network configurations.
[0080] At step (1002), receive server build requests (SBRs) (R1, R2) through the interface (220), wherein the server build requests (R1, R2) are aligned with enterprise Information Technology Service Management (ITSM) workflows applicable to the connected cloud infrastructure environment (210).
[0081] At step (1003), route each received SBR (R1, R2) through the tenant-specific approval chain (500, 600) by the approval router (230) embedded within the interface (220).
[0082] At step (1004), receive approval decisions (A1, A2) from one or more authorized approvers (330, 340) within the respective tenant (280, 290) by the approval router (230).
[0083] The approval router (230) receives approval decisions (A1, A2) through secure communication channels such as REST APIs, webhook callbacks, or integrated ITSM platforms.
[0084] At step (1005), couple the execution mechanism (240) with the approval router (230) and the execution mechanism (240). The execution mechanism (240) is coupled with the approval router (230) through a service integration layer or internal API binding.
[0085] At step (1006), authorize execution of server provisioning by the execution mechanism (240) only upon receipt of all required approvals (A1, A2) by the approval router (230).
[0086] At step (1007), couple the orchestration engine (250) with the execution mechanism (240) and the cloud infrastructure environment(s) (210). The orchestration engine (250) is coupled with the execution mechanism (240) through a service bus or orchestration framework that supports event-driven or API-based communication.
[0087] At step (1008), initiate the server provisioning actions such as virtual machine creation, configuration, and deployment within the connected cloud infrastructure environment (210) automatically by the orchestration engine (250) upon authorization by the execution mechanism (240).
[0088] The method (1000) ends at step (1000b).
[0089] In enterprise IT operations, the platform (200) streamlines server provisioning by automating intake, validation, and deployment of server build requests (SBRs) (R1, R2) through the interface (220). Integration with ITSM platforms like IT service management platforms enables standardized workflows, reducing manual errors and ensuring compliance with governance models.
[0090] For cloud infrastructure management, the orchestration engine (250) facilitates seamless provisioning across the public cloud (211), the private cloud (212), the hybrid cloud (213), and the on-premises environments (214). By invoking the cloud-native APIs (261) and the infrastructure-as-code scripts (262), the platform (200) ensures consistent deployment of virtual machines, storage, and network configurations. This supports scalable, multi-cloud strategies and accelerates time-to-value for IT services.
[0091] In hardware-software integration scenarios, the execution mechanism (240) enforces conditional logic to authorize provisioning only after receiving validated approvals (A1, A2) via the approval router (230). This mechanism supports rollback procedures and exception handling, ensuring infrastructure resilience.
[0092] In multi-tenant enterprise environments, the platform (200) enables secure and isolated operations through role-based access control (RBAC), identity federation, and the tenant-specific approval chains (500, 600). The approval router (230) supports hierarchical and parallel models, allowing flexible workflow design to be tailored to organizational structures.
[0093] The method (1000) enables structured and policy-compliant server provisioning across cloud infrastructure environments (210) by orchestrating a sequence of tightly integrated components. The interface (220) receives server build requests (SBRs) (R1, R2) aligned with ITSM workflows, while the approval router (230) routes them through tenant-specific approval chains (500, 600). Upon receiving validated decisions (A1, A2), the execution mechanism (240) triggers provisioning workflows, which are then coordinated by the orchestration engine (250) using infrastructure-as-code templates and cloud-native APIs. This method (1000) ensures traceable, scalable, and secure provisioning with full auditability and governance enforcement.
[0094] The platform (200) addresses the lack of integrated approval mechanisms by embedding the approval router (230) directly within the interface (220), enabling real-time routing of server build requests (SBRs) (R1, R2) through tenant-specific approval chains (500, 600). The method (1000) reinforces this by enforcing approval-dependent execution logic at step (1006), ensuring that provisioning is gated by verified authorization.
[0095] To solve the problem of conditional execution dependencies, the execution mechanism (240) operates as a gatekeeper that monitors approval status and enforces strict execution criteria such as digital signatures, timestamps, and role-based authorization levels. This ensures that provisioning workflows are triggered only when all required approvals (A1, A2) are received and validated.
[0096] All third-party trademarks, service marks, and trade names referenced in this specification are the property of their respective owners and are used solely for descriptive and identification purposes to identify compatible systems and services. Such use does not imply endorsement, affiliation, or sponsorship by the trademark owners, and all trademark rights are acknowledged. , Claims:CLAIMS
We Claim:
1) A cloud-based server provisioning platform (200), the platform (200) is operationally connected with one or more cloud infrastructure environments (210), the platform (200) comprising:
an interface (220), configured in a memory (201) of a network-enabled computing device (205) and processed by a processor (203) of the network-enabled computing device (205), the interface (220) being configured to receive server build requests (SBRs) (R1, R2) aligned with enterprise Information Technology Service Management (ITSM) workflows applicable to the connected cloud infrastructure environment (210);
an approval router (230) embedded within the interface (220), configured in the memory (201) and executed by the processor (203), the approval router (230) being configured to:
route each received SBR (R1, R2) through a tenant-specific approval chain (500, 600); and
receive approval decisions (A1, A2) from one or more authorized approvers (330, 340) within the respective tenant (280, 290);
an execution mechanism (240) configured in the memory (201) and executed by the processor (203), the execution mechanism (240) is coupled with the approval router (230), the execution mechanism (240) being configured to authorize execution of server provisioning only upon receipt of all required approval decisions (A1, A2) by the approval router (230);
an orchestration engine (250) coupled with the execution mechanism (240) and the cloud infrastructure environment(s) (210), the orchestration engine (250) being configured to initiate server provisioning actions within the connected cloud infrastructure environment (210) upon authorization by the execution mechanism (240).
2) The platform (200) as claimed in claim 1, wherein the cloud platform (200a) includes a trail recorder (285) to maintain comprehensive audit trails and execution logs for compliance, traceability, and governance.
3) The platform (200) as claimed in claim 1, wherein the cloud infrastructure environment (210) comprises one or more of: a public cloud (211), a private cloud (212), a hybrid cloud (213), or an on-premises environment (214).
4) The platform (200) as claimed in claim 1, wherein the interface (220) is further configured to receive server build requests (SBRs) via one or more of: direct user input (221) or a service request system (223).
5) The platform (200) as claimed in claim 1, wherein the approval router (230) is embedded within the interface (220) as one or more of: a software module (231), a microservice (232), a plug-in (233), or a containerized component (234).
6) The platform (200) as claimed in claim 1, wherein the tenant-specific approval chain (500, 600) is defined based on one or more of: organizational hierarchy (501), project-specific roles (502), and user groups (503).
7) The platform (200) as claimed in claim 1, wherein the execution mechanism (240) is further configured to authorize or block server provisioning based on one or more of: automated policy compliance validation (245), multi-factor approval verification (246), and integration with external governance systems.
8) The platform (200) as claimed in claim 1, wherein the cloud platform (200) includes the trail recorder (285) to maintain comprehensive audit trails and execution logs for compliance, traceability, and governance, and wherein the trail recorder (285) is further configured to: generate audit trails (286), store execution logs.
9) A method (1000) for server provisioning using a cloud platform (200), the cloud platform (200) is operationally connected with one or more cloud infrastructure environments (210), the method (1000) comprising step of:
configuring an interface (220), an approval router (230), an execution mechanism (240) and an orchestration engine (250) of the cloud platform (200) in a memory (201) of a network enabled computing device (205);
receiving server build request (R1, R2) through the interface (220), wherein the server build requests (SBRs) (R1, R2) are aligned with enterprise Information Technology Service Management (ITSM) workflows applicable to the connected cloud infrastructure environment (210);
routing each received SBR (R1, R2) through a tenant-specific approval chain (500, 600) by the approval router (230) embedded within the interface (220);
receiving approval decisions (A1, A2) from one or more authorized approvers (330, 340) within the respective tenant (280, 290) by the approval router (230);
coupling the execution mechanism (240) with the approval router (230) and the execution mechanism (240);
authorizing execution of server provisioning by the execution mechanism (240) only upon receipt of all required approvals (A1, A2) by the approval router (230);
coupling the orchestration engine (250) with the execution mechanism (240) and the cloud infrastructure environment(s) (210); and
initiating the server provisioning actions such as virtual machine creation; and configuration, and deployment within the connected cloud infrastructure environment (210) automatically by the orchestration engine (250) upon authorization by the execution mechanism (240).
Dated this 28th day of September, 2025

BALIP AMIT ABASAHEB [IN/PA-5184]

Documents

Application Documents

# Name Date
1 202541093098-STATEMENT OF UNDERTAKING (FORM 3) [28-09-2025(online)].pdf 2025-09-28
2 202541093098-REQUEST FOR EXAMINATION (FORM-18) [28-09-2025(online)].pdf 2025-09-28
3 202541093098-REQUEST FOR EARLY PUBLICATION(FORM-9) [28-09-2025(online)].pdf 2025-09-28
4 202541093098-POWER OF AUTHORITY [28-09-2025(online)].pdf 2025-09-28
5 202541093098-FORM-9 [28-09-2025(online)].pdf 2025-09-28
6 202541093098-FORM 18 [28-09-2025(online)].pdf 2025-09-28
7 202541093098-FORM 1 [28-09-2025(online)].pdf 2025-09-28
8 202541093098-DRAWINGS [28-09-2025(online)].pdf 2025-09-28
9 202541093098-DECLARATION OF INVENTORSHIP (FORM 5) [28-09-2025(online)].pdf 2025-09-28
10 202541093098-COMPLETE SPECIFICATION [28-09-2025(online)].pdf 2025-09-28