Private cloud API
First Claim
Patent Images
1. A system, comprising:
- a central registry server structured with a memory and a processor, the processor in communication with the memory to perform operations comprising;
receiving, from a first client computing device, at least one private cloud descriptor corresponding to a first private cloud, the at least one private cloud descriptor comprising a location and a public key;
testing an ability of the first private cloud to respond to a function of a central registry server, wherein the testing includes sending, by the central registry server to the first private cloud, a function call to access data on the first private cloud;
determining, based on the testing, that the first private cloud implements a function in the function call by comparing a response from the first private cloud to an expected response;
registering, responsive to the determining, the first private cloud on the central registry server using the received private cloud descriptor;
receiving, from a second client computing device associated with a second registered private cloud on the central registry server, a request for the at least one private cloud descriptor;
locating, by the central registry server, the at least one private cloud descriptor, and sending the at least one private cloud descriptor to the second client computing device;
receiving, from the second client computing device, an encrypted access request at the location provided by the at least one private cloud descriptor to access the registered first private cloud, wherein the encrypted access request is encrypted by the second client computing device using the at least one private cloud descriptor, and wherein the encrypted access request includes an encrypted identifier that is encrypted using a private key of a user;
determining, based on the encrypted access request, that the second client computing device is configured with access privileges to access the first private cloud; and
granting access to the second client computing device to access the first private cloud based on the determining that the second client computing device is configured with access privileges.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer program for implementing a private cloud are provided. A computer-implemented method may include registering a private cloud in a central registry; retrieving private cloud registration data from the central registry; sharing the private cloud registration data with other users; and allowing other users to connect to the private cloud using the shared private cloud registration data.
13 Citations
20 Claims
-
1. A system, comprising:
a central registry server structured with a memory and a processor, the processor in communication with the memory to perform operations comprising; receiving, from a first client computing device, at least one private cloud descriptor corresponding to a first private cloud, the at least one private cloud descriptor comprising a location and a public key; testing an ability of the first private cloud to respond to a function of a central registry server, wherein the testing includes sending, by the central registry server to the first private cloud, a function call to access data on the first private cloud; determining, based on the testing, that the first private cloud implements a function in the function call by comparing a response from the first private cloud to an expected response; registering, responsive to the determining, the first private cloud on the central registry server using the received private cloud descriptor; receiving, from a second client computing device associated with a second registered private cloud on the central registry server, a request for the at least one private cloud descriptor; locating, by the central registry server, the at least one private cloud descriptor, and sending the at least one private cloud descriptor to the second client computing device; receiving, from the second client computing device, an encrypted access request at the location provided by the at least one private cloud descriptor to access the registered first private cloud, wherein the encrypted access request is encrypted by the second client computing device using the at least one private cloud descriptor, and wherein the encrypted access request includes an encrypted identifier that is encrypted using a private key of a user; determining, based on the encrypted access request, that the second client computing device is configured with access privileges to access the first private cloud; and granting access to the second client computing device to access the first private cloud based on the determining that the second client computing device is configured with access privileges. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method comprising:
-
receiving, on a machine that includes a memory and a processor, at least one private cloud descriptor from a first client computing device corresponding to a first private cloud, the at least one private cloud descriptor comprising a location and a public key; testing an ability of the first private cloud to respond to a function of a central registry server, wherein the testing includes sending, by the central registry server to the first private cloud, a function call to access data on the first private cloud; determining, based on the testing, that the first private cloud implements a function in the function call by comparing a response from the first private cloud to an expected response; registering, responsive to the determining, the first private cloud on the central registry server using the received private cloud descriptor; receiving, from a second client computing device associated with a second registered private cloud on the central registry server, a request for the at least one private cloud descriptor; locating, by the central registry server, the at least one private cloud descriptor, and sending the at least one private cloud descriptor to the second client computing device; receiving, from the second client computing device, an encrypted access request at the location provided by the at least one private cloud descriptor to access the registered first private cloud, wherein the encrypted access request is encrypted by the second client computing device using the at least one private cloud descriptor, and wherein the encrypted access request includes an encrypted identifier that is encrypted using a private key of a user; determining, based on the encrypted access request, that the second client computing device is configured with access privileges to access the first private cloud; and granting access to the second client computing device to access the first private cloud based on the determining that the second client computing device is configured with the access privileges. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium storing instructions executable to cause one or more processors to perform operations comprising:
-
receiving, from a first client computing device, at least one private cloud descriptor corresponding to a first private cloud, the at least one private cloud descriptor comprising a location and a public key; testing an ability of the first private cloud to respond to a function of a central registry server, wherein the testing includes sending, by the central registry server to the first private cloud, a function call to access data on the first private cloud; determining, based on the testing, that the first private cloud implements a function in the function call by comparing a response from the first private cloud to an expected response; registering, responsive to the determining, the first private cloud on the central registry server using the received private cloud descriptor; receiving, from a second client computing device associated with a second registered private cloud on the central registry server, a request for the at least one private cloud descriptor; locating, by the central registry server, the at least one private cloud descriptor, and sending the at least one private cloud descriptor to the second client computing device; receiving, from the second client computing device, an encrypted access request at the location provided by the at least one private cloud descriptor to access the registered first private cloud, wherein the encrypted access request is encrypted by the second client computing device using the at least one private cloud descriptor, and wherein the encrypted access request includes an encrypted identifier that is encrypted using a private key of a user; determining, based on the encrypted access request, that the second client computing device is configured with access privileges to access the first private cloud; and granting access to the second client computing device to access the first private cloud based on the determining that the second client computing device is configured with the access privileges. - View Dependent Claims (17, 18, 19, 20)
-
Specification