Connecting and retrieving security tokens based on context
First Claim
Patent Images
1. A system for accessing resources by a user across a plurality of distributed computing networks, the system comprising:
- a first cloud system implemented using a hardware processor; and
a memory storing instructions for execution by the hardware processor, wherein the hardware processor is configured by the instructions to;
host a first resource having a first extension and a second extension,wherein the first cloud system comprises a first identity system and a first API layer used by the first resource and the first extension; and
wherein the second extension is loaded from a second cloud system different and separate from the first cloud system having a second identity system and second API layer and the user is simultaneously connected to both of the first and the second cloud systems, andstore a plurality of security tokens associated with the user, the plurality of security tokens allowing the user to access extensions of resources from a plurality of cloud systems through the security tokens and associated API layers, wherein each of the plurality of security tokens corresponding to the user is a key chain for the user and is indicative of an association between one or more cloud systems which the user has subscribed such that the first cloud system loads security tokens from the second identity system to allow the second extension to communicate using the second API layer.
1 Assignment
0 Petitions
Accused Products
Abstract
An application may be configured with two or more cloud contexts and one or more identity Systems. Using this information, the application has the ability to identify the remote cloud environment that a particular subsystem needs to interact with. The application communicates with the appropriate identity system to retrieve tokens dynamically for targeting that remote cloud.
18 Citations
20 Claims
-
1. A system for accessing resources by a user across a plurality of distributed computing networks, the system comprising:
-
a first cloud system implemented using a hardware processor; and a memory storing instructions for execution by the hardware processor, wherein the hardware processor is configured by the instructions to; host a first resource having a first extension and a second extension, wherein the first cloud system comprises a first identity system and a first API layer used by the first resource and the first extension; and wherein the second extension is loaded from a second cloud system different and separate from the first cloud system having a second identity system and second API layer and the user is simultaneously connected to both of the first and the second cloud systems, and store a plurality of security tokens associated with the user, the plurality of security tokens allowing the user to access extensions of resources from a plurality of cloud systems through the security tokens and associated API layers, wherein each of the plurality of security tokens corresponding to the user is a key chain for the user and is indicative of an association between one or more cloud systems which the user has subscribed such that the first cloud system loads security tokens from the second identity system to allow the second extension to communicate using the second API layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for accessing resources by a user across a plurality of distributed computing networks, comprising:
-
providing a resource on a first computing network, the resource comprising a first extension associated with a first identity system and a first API layer in the first computing network and a second extension associated with a second identity system and a second API layer in a different remote computing network and the user is simultaneously connected to both of the first and the second computing networks, wherein the first identify system is hosted on the first computing network and the second identity system is hosted on the remote computing network; loading one or more first security tokens from the first identity system to allow a user on the first computing network to access the first extension; and loading one or more second security tokens from the remote computing network to allow the user on the first computing network to access the second extension using the second API layer, wherein storing a plurality of security tokens associated with the user, the plurality of security tokens allowing the user to access extensions of the resources from a plurality of computing networks through the security tokens via associated API layers, wherein each of the plurality of security tokens corresponding to the user is a key chain for the user and is indicative of an association between one or more computing networks which the user has subscribed. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system for accessing resources by a user across a plurality of distributed computing networks, the system comprising:
-
a first distributed computing network implemented using a hardware processor; and a memory storing instructions for execution by the hardware processor, wherein the hardware processor is configured by the instructions to; host a resource having a first extension, wherein the resource and the first extension make use of a first identity system and a first API layer in the first distributed computing network, and wherein the resource comprises a second extension loaded from a second distributed computing network having a second identity system and a second API layer in the second distributed computing network different and separate from the first distributed computing network and the user is simultaneously connected to both of the first and the second distributed computing networks; and wherein the hardware processor of the first distributed computing network loads security tokens from the second identity system to allow users to access the second extension of the resource using the second API layer; and store a plurality of security tokens associated with the user, the plurality of security tokens allowing the user to access extensions of the resources from a plurality of distributed computing networks through the security tokens and associated API layers, wherein each of the plurality of security tokens corresponding to the user is a key chain for the user and is indicative of an association between one or more distributed computing networks which the user has subscribed. - View Dependent Claims (17, 18, 19, 20)
-
Specification