×

Mobile cloud service architecture

  • US 9,231,946 B2
  • Filed: 09/02/2014
  • Issued: 01/05/2016
  • Est. Priority Date: 02/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a cloud computer system, from a mobile computing device, a request for a service from an enterprise computer system, wherein the cloud computer system is located at a first geographical location that is different from a second geographical location of the enterprise computer system, wherein the cloud computer system and the enterprise computer system communicate over a public communication network, and wherein the cloud computer system provides an application programming interface (API), the API using a first communication protocol to receive requests for services;

    obtaining, by the cloud computer system, for a user of the mobile computing device associated with the request, a security authentication to obtain at least one service through the cloud computer system;

    storing, by the cloud computer system, information indicating the security authentication;

    identifying, based on the security authentication of the user, by the cloud computer system, a plurality of enterprise computer systems accessible to the user through the cloud computer system, wherein each enterprise computer system of the plurality of enterprise computer systems uses a second communication protocol to receive the requests for services, and wherein the second communication protocol is different from the first communication protocol;

    verifying, by the cloud computer system, that the enterprise computer system is included in the plurality of enterprise computer systems accessible to the user;

    determining, by the cloud computer system, a security protocol for requesting the service from the enterprise computer system;

    generating, by the cloud computer system, a security token corresponding to the determined security protocol for the enterprise computer system, wherein the security token is generated based on the information indicating the security authentication of the user;

    converting the request from a format of the first communication protocol to a different format corresponding to the second communication protocol;

    sending, by the cloud computer system, to the enterprise computer system, the converted request for the service, wherein the converted request includes the generated security token;

    receiving, from the enterprise computer system, a response to the converted request, wherein the response has a format of the second communication protocol used by the enterprise computer system;

    converting the response from the format of the second communication protocol to the format of the first communication protocol; and

    providing the converted response to the mobile computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×