发明名称 Mobile cloud service architecture
摘要 Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In certain embodiments, the cloud computer system may receive, from a computing device, a request for a service provided by an enterprise computer system. The cloud computer system may determine security authentication of a user for the requested service. A security protocol may be determined for a requested enterprise computer system and a security token may be generated for the request according to the determined security protocol. The request may be sent to the requested enterprise computer system. In some embodiments, security authentication for a request to an enterprise computer system may be determined based on previous authentication. The cloud computer system may be configured to communicate with several different enterprise computer systems according to their supported protocols (e.g., communication protocol and/or security protocol).
申请公布号 US9231946(B2) 申请公布日期 2016.01.05
申请号 US201414475285 申请日期 2014.09.02
申请人 Oracle International Corporation 发明人 Loo Kaj van de
分类号 H04L29/06;G06Q10/10 主分类号 H04L29/06
代理机构 Kilpatrick Townsend & Stockton LLP 代理人 Kilpatrick Townsend & Stockton LLP
主权项 1. A method comprising: receiving, by a cloud computer system, from a mobile computing device, a request for a service from an enterprise computer system, wherein the cloud computer system is located at a first geographical location that is different from a second geographical location of the enterprise computer system, wherein the cloud computer system and the enterprise computer system communicate over a public communication network, and wherein the cloud computer system provides an application programming interface (API), the API using a first communication protocol to receive requests for services; obtaining, by the cloud computer system, for a user of the mobile computing device associated with the request, a security authentication to obtain at least one service through the cloud computer system; storing, by the cloud computer system, information indicating the security authentication; identifying, based on the security authentication of the user, by the cloud computer system, a plurality of enterprise computer systems accessible to the user through the cloud computer system, wherein each enterprise computer system of the plurality of enterprise computer systems uses a second communication protocol to receive the requests for services, and wherein the second communication protocol is different from the first communication protocol; verifying, by the cloud computer system, that the enterprise computer system is included in the plurality of enterprise computer systems accessible to the user; determining, by the cloud computer system, a security protocol for requesting the service from the enterprise computer system; generating, by the cloud computer system, a security token corresponding to the determined security protocol for the enterprise computer system, wherein the security token is generated based on the information indicating the security authentication of the user; converting the request from a format of the first communication protocol to a different format corresponding to the second communication protocol; sending, by the cloud computer system, to the enterprise computer system, the converted request for the service, wherein the converted request includes the generated security token; receiving, from the enterprise computer system, a response to the converted request, wherein the response has a format of the second communication protocol used by the enterprise computer system; converting the response from the format of the second communication protocol to the format of the first communication protocol; and providing the converted response to the mobile computing device.
地址 Redwood Shores CA US