Software defined SaaS platform
First Claim
Patent Images
1. A method for transforming software applications of a computer system executed by a computer processor, the method comprising:
- analyzing RSA (Runtime Software Artifacts) of a non-SaaS (Software as a Service) application;
identifying a set of non-SaaS application intercepts found in the RSA;
comparing the set of non-SaaS application intercepts against a library to identify a set of transformable non-SaaS intercepts that call a single-tenant system;
generate an interception API (Application Programming Interface) handler that identifies a tenant of an application instance of the non-SaaS application and calls tenant-specific services of a multi-tenant system,wherein the interception API handler links to a tenancy and a user identity manager using SaaS intercepts from the library,wherein the interception API handler catches calls from a call site,wherein the interception API handler determines that a caught call comprises either a non-SaaS application intercept or a Saas application intercept,wherein the interception API handler routes SaaS application intercepts to the multi-tenant system and non-SaaS application intercepts to the single-tenant system, andwherein the interception API handler determines a tenancy identity associated with the caught call to trigger at least one SaaS service associated with the tenancy identity and the SaaS application intercepts;
modifying the set of transformable non-SaaS intercepts to call the interception API handler.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that transforms non-SaaS applications into tenant-aware SaaS applications is disclosed, which analyzes the non SaaS applications to determine which intercepts to external libraries need to be translated into SaaS intercepts that utilize SaaS tenancy services, SaaS operations services, and/or SaaS business services. The system transforms the non-SaaS applications into SaaS applications by providing intercept handlers that call SaaS services on demand when the transformed SaaS application throws a transformed SaaS interrupt.
-
Citations
20 Claims
-
1. A method for transforming software applications of a computer system executed by a computer processor, the method comprising:
-
analyzing RSA (Runtime Software Artifacts) of a non-SaaS (Software as a Service) application; identifying a set of non-SaaS application intercepts found in the RSA; comparing the set of non-SaaS application intercepts against a library to identify a set of transformable non-SaaS intercepts that call a single-tenant system; generate an interception API (Application Programming Interface) handler that identifies a tenant of an application instance of the non-SaaS application and calls tenant-specific services of a multi-tenant system, wherein the interception API handler links to a tenancy and a user identity manager using SaaS intercepts from the library, wherein the interception API handler catches calls from a call site, wherein the interception API handler determines that a caught call comprises either a non-SaaS application intercept or a Saas application intercept, wherein the interception API handler routes SaaS application intercepts to the multi-tenant system and non-SaaS application intercepts to the single-tenant system, and wherein the interception API handler determines a tenancy identity associated with the caught call to trigger at least one SaaS service associated with the tenancy identity and the SaaS application intercepts; modifying the set of transformable non-SaaS intercepts to call the interception API handler. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system that transforms a non-SaaS software application of a computer system comprising a non-transitory computer-readable medium storing instructions that, when executed by a computer processor, cause the computer processor to perform the steps of:
-
analyzing RSA (Runtime Software Artifacts) of a non-SaaS (Software as a Service) application; identifying a set of non-SaaS application intercepts found in the RSA; comparing the set of non-SaaS application intercepts against a library to identify a set of transformable non-SaaS intercepts that call a single-tenant system; generate an interception API (Application Programming Interface) handler that identifies a tenant of an application instance of the non-SaaS application and calls tenant-specific services of a multi-tenant system, wherein the interception API handler links to a tenancy and a user identity manager using SaaS intercepts from the library, wherein the interception API handler catches calls from a call site, wherein the interception API handler determines that a caught call comprises either a non-SaaS application intercept or a Saas application intercept, wherein the interception API handler routes SaaS application intercepts to the multi-tenant system and non-SaaS application intercepts to the single-tenant system, and wherein the interception API handler determines a tenancy identity associated with the caught call to trigger at least one SaaS service associated with the tenancy identity and the SaaS application intercepts; modifying the set of transformable non-SaaS intercepts to call the interception API handler. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification