×

Mobile cloud service architecture

  • US 9,712,511 B2
  • Filed: 11/16/2015
  • Issued: 07/18/2017
  • Est. Priority Date: 02/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, through an interface of a computer system, from a computing device, a request for one or more services provided by one or more enterprise computer systems, wherein the interface supports a first protocol for communication with the computer system, and wherein the request has a format corresponding to the first protocol;

    determining, by the computer system, that the request for the one or more services received from the computing device is for a plurality of services;

    determining, by the computer system, that access to each of the plurality of services is supported by a different security protocol of one or more security protocols;

    generating, by the computer system, according to the security protocol supporting the access to each of the plurality of services, a security token for each of the plurality of services based on an authentication of a user;

    generating, by the computer system, a plurality of converted requests, wherein each of the plurality of converted requests is generated for a different service of the plurality of services, wherein each of the plurality of converted requests includes the security token generated according to the security protocol supporting the access to the different service, wherein each of the plurality of converted requests has a format corresponding to a second protocol for communication with the one or more enterprise computer systems that provides the different service, and wherein generating each of the plurality of converted requests includes converting the request from the format of the first protocol to the format of the second protocol;

    sending, by the computer system, each of the plurality of converted requests to one of the one or more enterprise computer systems;

    converting, by the computer system, a response to one or more of the plurality of converted requests, wherein the response has the format of the second protocol, wherein the response is converted from the format of the second protocol to the format of the first protocol, and wherein the response is received from an enterprise computer system of the one or more enterprise computer systems and has the format of the second protocol; and

    providing, by the computer system, the converted response to the computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×