SYSTEM AND METHOD FOR TRANSPARENT CLOUD ACCESS
First Claim
1. A system for providing transparent cloud access, the system comprising:
- an enterprise computing environment;
a cloud computing environment;
a secure bridge mechanism for interconnecting the enterprise computing environment and the cloud computing environment, the secure bridge mechanism comprising;
a first secure bridge portion associated with the enterprise; and
a second secure bridge portion associated with the cloud computing environment;
wherein the first and second secure bridge portions interoperate to provide transparent and secure access by resources of one of the computing environments to those of the other computing environment.
16 Assignments
0 Petitions
Accused Products
Abstract
System and method for transparent cloud access are described. In one embodiment, the system comprises an enterprise computing environment maintained by an enterprise and a cloud computing environment maintained by a cloud provider; and a secure bridge mechanism for interconnecting the enterprise computing environment and the cloud computing environment. The secure bridge mechanism comprises a first secure bridge portion associated with the enterprise and a second secure bridge portion associated with the cloud computing environment. The first and second secure bridge portions interoperate to provide transparent and secure access by resources of one of the computing environments to those of the other computing environment.
107 Citations
20 Claims
-
1. A system for providing transparent cloud access, the system comprising:
-
an enterprise computing environment; a cloud computing environment; a secure bridge mechanism for interconnecting the enterprise computing environment and the cloud computing environment, the secure bridge mechanism comprising; a first secure bridge portion associated with the enterprise; and a second secure bridge portion associated with the cloud computing environment; wherein the first and second secure bridge portions interoperate to provide transparent and secure access by resources of one of the computing environments to those of the other computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for providing transparent access to resources maintained within an enterprise computing environment and a cloud computing environment, the method comprising:
-
providing a secure bridge mechanism between the enterprise computing environment and the cloud computing environment, the providing a secure bridge mechanism comprising; providing a first secure bridge associated with the enterprise; and providing a second secure bridge associated with the cloud computing environment; and causing the first and second secure bridges to interoperate to provide transparent access by resources of one of the computing environments to those of the other computing environment. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for providing transparent access to resources maintained within an enterprise computing environment and a cloud computing environment, the system comprising:
-
means for providing a secure bridge mechanism between the enterprise computing environment and the cloud computing environment, the providing a secure bridge mechanism comprising; means for providing a first secure bridge associated with the enterprise; and means for providing a second secure bridge associated with the cloud computing environment; and means for causing the first and second secure bridges to interoperate to provide transparent access by resources of one of the computing environments to those of the other computing environment. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification