System and method for transparent cloud access
DCFirst Claim
1. A system for providing transparent cloud access, the system comprising:
- an enterprise computing environment;
a cloud computing environment;
a secure bridge mechanism for interconnecting the enterprise computing environment and the cloud computing environment, the secure bridge mechanism comprising;
a secure enterprise bridge portion associated with the enterprise computing environment; and
a secure cloud bridge portion associated with the cloud computing environment;
wherein the secure enterprise bridge portion is external to the cloud computing environment,wherein the secure enterprise bridge portion is operable to initiate a process such that there is no need to punch a hole through a firewall of the enterprise computing environment, andwherein the secure enterprise bridge portion and the secure cloud bridge portion interoperate to provide transparent and secure access by resources of one of the computing environments to resources within the other computing environment.
16 Assignments
Litigations
0 Petitions
Accused Products
Abstract
System and method for transparent cloud access are described. In one embodiment, the system comprises an enterprise computing environment maintained by an enterprise and a cloud computing environment maintained by a cloud provider; and a secure bridge mechanism for interconnecting the enterprise computing environment and the cloud computing environment. The secure bridge mechanism comprises a first secure bridge portion associated with the enterprise and a second secure bridge portion associated with the cloud computing environment. The first and second secure bridge portions interoperate to provide transparent and secure access by resources of one of the computing environments to those of the other computing environment.
63 Citations
20 Claims
-
1. A system for providing transparent cloud access, the system comprising:
-
an enterprise computing environment; a cloud computing environment; a secure bridge mechanism for interconnecting the enterprise computing environment and the cloud computing environment, the secure bridge mechanism comprising; a secure enterprise bridge portion associated with the enterprise computing environment; and a secure cloud bridge portion associated with the cloud computing environment; wherein the secure enterprise bridge portion is external to the cloud computing environment, wherein the secure enterprise bridge portion is operable to initiate a process such that there is no need to punch a hole through a firewall of the enterprise computing environment, and wherein the secure enterprise bridge portion and the secure cloud bridge portion interoperate to provide transparent and secure access by resources of one of the computing environments to resources within the other computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for providing transparent access to resources maintained within an enterprise computing environment and a cloud computing environment, the method comprising:
-
providing a secure bridge mechanism between the enterprise computing environment and the cloud computing environment, the providing a secure bridge mechanism comprising; providing a first secure bridge associated with the enterprise computing environment, the first secure bridge being external to the cloud computing environment; and providing a second secure bridge associated with the cloud computing environment; and negotiating a connection between the first and second secure bridges to provide transparent access by resources of one of the computing environments to resources within the other computing environment, wherein negotiating the connection includes initiating a process at the first secure bridge such that there is no need to punch a hole through a firewall of the enterprise computing environment. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for providing transparent access to resources maintained within an enterprise computing environment and a cloud computing environment, the system comprising:
-
means for providing a secure bridge mechanism between the enterprise computing environment and the cloud computing environment, the providing a secure bridge mechanism comprising; means for providing a first secure bridge associated with the enterprise computing environment, the first secure bridge being external to the cloud computing environment; and means for providing a second secure bridge associated with the cloud computing environment; and means for negotiating a connection between the first and second secure bridges to provide transparent access by resources of one of the computing environments to resources within the other computing environment wherein means for negotiating the connection includes means for initiating a process at the first secure bridge such that there is no need to punch a hole through a firewall of the enterprise computing environment. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification