Mobile cloud service architecture
First Claim
1. A method comprising:
- receiving, through an interface of a computer system, from a computing device, a request for one or more services provided by one or more enterprise computer systems, wherein the interface supports a first protocol for communication with the computer system, and wherein the request has a format corresponding to the first protocol;
determining, by the computer system, that the request for the one or more services received from the computing device is for a plurality of services;
determining, by the computer system, that access to each of the plurality of services is supported by a different security protocol of one or more security protocols;
generating, by the computer system, according to the security protocol supporting the access to each of the plurality of services, a security token for each of the plurality of services based on an authentication of a user;
generating, by the computer system, a plurality of converted requests, wherein each of the plurality of converted requests is generated for a different service of the plurality of services, wherein each of the plurality of converted requests includes the security token generated according to the security protocol supporting the access to the different service, wherein each of the plurality of converted requests has a format corresponding to a second protocol for communication with the one or more enterprise computer systems that provides the different service, and wherein generating each of the plurality of converted requests includes converting the request from the format of the first protocol to the format of the second protocol;
sending, by the computer system, each of the plurality of converted requests to one of the one or more enterprise computer systems;
converting, by the computer system, a response to one or more of the plurality of converted requests, wherein the response has the format of the second protocol, wherein the response is converted from the format of the second protocol to the format of the first protocol, and wherein the response is received from an enterprise computer system of the one or more enterprise computer systems and has the format of the second protocol; and
providing, by the computer system, the converted response to the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In certain embodiments, the cloud computer system may receive, from a computing device, a request for a service provided by an enterprise computer system. The cloud computer system may determine security authentication of a user for the requested service. A security protocol may be determined for a requested enterprise computer system and a security token may be generated for the request according to the determined security protocol. The request may be sent to the requested enterprise computer system. In some embodiments, security authentication for a request to an enterprise computer system may be determined based on previous authentication. The cloud computer system may be configured to communicate with several different enterprise computer systems according to their supported protocols (e.g., communication protocol and/or security protocol).
-
Citations
16 Claims
-
1. A method comprising:
-
receiving, through an interface of a computer system, from a computing device, a request for one or more services provided by one or more enterprise computer systems, wherein the interface supports a first protocol for communication with the computer system, and wherein the request has a format corresponding to the first protocol; determining, by the computer system, that the request for the one or more services received from the computing device is for a plurality of services; determining, by the computer system, that access to each of the plurality of services is supported by a different security protocol of one or more security protocols; generating, by the computer system, according to the security protocol supporting the access to each of the plurality of services, a security token for each of the plurality of services based on an authentication of a user; generating, by the computer system, a plurality of converted requests, wherein each of the plurality of converted requests is generated for a different service of the plurality of services, wherein each of the plurality of converted requests includes the security token generated according to the security protocol supporting the access to the different service, wherein each of the plurality of converted requests has a format corresponding to a second protocol for communication with the one or more enterprise computer systems that provides the different service, and wherein generating each of the plurality of converted requests includes converting the request from the format of the first protocol to the format of the second protocol; sending, by the computer system, each of the plurality of converted requests to one of the one or more enterprise computer systems; converting, by the computer system, a response to one or more of the plurality of converted requests, wherein the response has the format of the second protocol, wherein the response is converted from the format of the second protocol to the format of the first protocol, and wherein the response is received from an enterprise computer system of the one or more enterprise computer systems and has the format of the second protocol; and providing, by the computer system, the converted response to the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer system comprising:
-
one or more processors; and a memory operatively coupled to the one or more processors, wherein the memory stores instructions that, when executed by the one or more processors, causes the one or more processors to; receive, through an interface of the computer system, from a computing device, a request for one or more services provided by one or more enterprise computer systems, wherein the interface supports a first protocol for communication with the computer system, and wherein the request has a format corresponding to the first protocol; determine that the request for the one or more services received from the computing device is for a plurality of services; determine that access to each of the plurality of services is supported by a different security protocol of one or more security protocols; generate, according to the security protocol supporting the access to each of the plurality of services, a security token for each of the plurality of services based on an authentication of a user; generate a plurality of converted requests, wherein each of the plurality of converted requests is generated for a different service of the plurality of services, wherein each of the plurality of converted requests includes the security token generated according to the security protocol supporting the access to the different service, wherein each of the plurality of converted requests has a format corresponding to a second protocol for communication with the one or more enterprise computer systems that provides the different service, and wherein each of the plurality of converted requests includes converting the request from the format of the first protocol to the format of the second protocol; send each of the plurality of converted requests to one of the one or more enterprise computer systems; convert a response to one or more of the plurality of converted requests, wherein the response has the format of the second protocol, wherein the response is converted from the format of the second protocol to the format of the first protocol, and wherein the response is received from an enterprise computer system of the one or more enterprise computer systems and has the format of the second protocol; and provide the converted response to the computing device. - View Dependent Claims (15)
-
-
16. A non-transitory machine-readable storage medium storing instructions that are executable by one or more processors to cause the one or more processors to:
-
receive, through an interface of a computer system, from a computing device, a request for one or more services provided by one or more enterprise computer systems, wherein the interface supports a first protocol for communication with the computer system, and wherein the request has a format corresponding to the first protocol; determine that the request for the one or more services received from the computing device is for a plurality of services; determine, by the computer system, that access to each of the plurality of services is supported by a different security protocol of one or more security protocols; generate, by the computer system, according to the security protocol supporting the access to each of the plurality of services, a security token for each of the plurality of services based on an authentication of a user; generate a plurality of converted requests, wherein each of the plurality of converted requests is generated for a different service of the plurality of services, wherein each of the plurality of converted requests includes the security token generated according to the security protocol supporting the access to the different service, wherein each of the plurality of converted requests has format corresponding to a second protocol for communication with the one or more enterprise computer systems that provides the different service, and wherein each of the plurality of converted requests includes converting the request from the format of the first protocol to the format of the second protocol; send, by the computer system, each of the plurality of converted requests to one of the one or more enterprise computer systems; convert a response to one or more of the plurality of converted requests, wherein the response has the format of the second protocol, wherein the response is converted from the format of the second protocol to the format of the first protocol, and wherein the response is received from an enterprise computer system of the one or more enterprise computer systems and has the format of the second protocol; and provide the converted response to the computing device.
-
Specification