APPROACHES FOR MANAGING RESTRICTIONS FOR MIDDLEWARE APPLICATIONS
First Claim
Patent Images
1. A computer-implemented method, comprising:
- determining, by a computing system, an access request provided by an application that seeks to interact with one or more backend systems through the computing system; and
enforcing, by the computing system, one or more predefined restrictions on the application, the computing system, or the one or more backend systems.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for determining an access request provided by an application that seeks to interact with one or more backend systems through a computing system. One or more predefined restrictions can be enforced on the application, the computing system, or the one or more backend systems.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
determining, by a computing system, an access request provided by an application that seeks to interact with one or more backend systems through the computing system; and enforcing, by the computing system, one or more predefined restrictions on the application, the computing system, or the one or more backend systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
one or more processors; and a memory storing instructions that, when executed by the one or more processors, cause the system to perform; determining an access request provided by an application that seeks to interact with one or more backend systems through the system; and enforcing one or more predefined restrictions on the application, the system, or the one or more backend systems. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium comprising instructions that, when executed, cause one or more processors of a computing system to perform:
-
determining an access request provided by an application that seeks to interact with one or more backend systems through the computing system; and enforcing one or more predefined restrictions on the application, the computing system, or the one or more backend systems. - View Dependent Claims (17, 18, 19, 20)
-
Specification