Providing remote services to legacy applications
First Claim
1. At a client computer device in a computerized environment including one or more legacy applications in communication with one or more service provider subsystems and one or more device drivers, a method of executing one or more legacy application requests through one or more remote services using a service abstraction framework, comprising the acts of:
- sending one or more application program requests, wherein the one or more application program requests are directed to a service provider remote from the client computer device, the remote service provider being configured to handle the one or more requests;
initiating, via communication between a client proxy and a higher level security layer, one or more local authentication managers, wherein the client proxy and the one or more local authentication managers are on the client computer device and operate in different sessions, and wherein the client proxy is hosted through a legacy application program on the client computer device, the legacy application program being limited to awareness of only local computing resources on the client computer device;
establishing a communication channel between the client proxy and the one or more local authentication managers; and
receiving from the remote service provider one or more indicators that the one or more application program requests have been accepted.
2 Assignments
0 Petitions
Accused Products
Abstract
A developer can provide complex services to existing legacy applications using one or more components configured to tap into a service abstraction framework. In one implementation, for example, a developer of a remote service provider adds one or more authentication attributes to the remote service provider, and further creates a local client driver that incorporates a client proxy. When a legacy application generates a function request (e.g., to print, send a text message, initiate a voice communication), the client proxy intercepts the request through an appropriate communication subsystem, and relays the request to the server proxy. The server proxy determines the extent to which authentication measures may be required. If required, the client proxy can initiate out-of-band processing with various authentication managers to validate/process the request at the remote service provider.
-
Citations
20 Claims
-
1. At a client computer device in a computerized environment including one or more legacy applications in communication with one or more service provider subsystems and one or more device drivers, a method of executing one or more legacy application requests through one or more remote services using a service abstraction framework, comprising the acts of:
-
sending one or more application program requests, wherein the one or more application program requests are directed to a service provider remote from the client computer device, the remote service provider being configured to handle the one or more requests; initiating, via communication between a client proxy and a higher level security layer, one or more local authentication managers, wherein the client proxy and the one or more local authentication managers are on the client computer device and operate in different sessions, and wherein the client proxy is hosted through a legacy application program on the client computer device, the legacy application program being limited to awareness of only local computing resources on the client computer device; establishing a communication channel between the client proxy and the one or more local authentication managers; and receiving from the remote service provider one or more indicators that the one or more application program requests have been accepted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. At a server in a computerized environment having one or more server proxies for receiving requests from one or more client computer devices, a method of processing one or more device requests using a service abstraction framework, comprising the acts of:
-
receiving from a client computer device via a server proxy one or more device requests to be processed by a service provider, one or more device requests being received at a server remote from a client computer system, and wherein the server proxy and the service provider are remote relative to the client computer device; identifying from one or more attributes associated with the remote service provider that one or more authentication measures are required to process the one or more device requests; sending one or more authentication requests to an authentication manager that is remote relative to the client computer device, the remote authentication manager being in communication with an authentication manager on the client computer device, wherein the client proxy is hosted through a legacy application program on the client computer device, the legacy application program being limited to awareness of only local computing resources on the client computer device; and sending one or more responses to the client computer device that the one or more requests have been accepted. - View Dependent Claims (16, 17, 18)
-
-
19. At a client computer device in a computerized environment including one or more legacy applications in communication with one or more service provider subsystems and one or more device drivers, a computer program storage device having computer-executable instructions stored thereon that, when executed, cause one or more processors at the client computer device to perform a method comprising the acts of:
-
sending one or more application program requests, wherein the one or more application program requests are directed to a service provider remote from the client computer device, the remote service provider being configured to handle the one or more requests; initiating, via communication between a client proxy and a higher level security layer, one or more local authentication managers, wherein the client proxy and the one or more local authentication managers are on the client computer device and operate in different sessions, and wherein the client proxy is hosted through a legacy application program on the client computer device, the legacy application program being limited to awareness of only local computing resources on the client computer device; establishing a communication channel between the client proxy and the one or more local authentication managers; and receiving from the remote service provider one or more indicators that the one or more application program requests have been accepted. - View Dependent Claims (20)
-
Specification