Browse Prior Art Database

Integrating Secure Connectivity for Third Party Mobile Cloud Services Providers

IP.com Disclosure Number: IPCOM000241712D
Publication Date: 2015-May-26
Document File: 2 page(s) / 109K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method for integrating secure connectivity for third party mobile cloud services providers is disclosed.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Integrating Secure Connectivity for Third Party Mobile Cloud Services Providers

Disclosed is a method for integrating secure connectivity for third party mobile cloud services providers.

Mobile is often viewed as a catalyst to what industry experts refer to as technology disruptors. Mobile has been a key driver of technical innovation extending the reach of the web beyond the desktop browser to a variety of next generation mobile devices including mobile phones, tablets and now even watches. While mobile has been great in terms of innovation, the advancements that were achieved with the shift from the client/server to the browser based delivery model have been negated with mobile. While not often referred to as client server, the introduction of AppStore as the primary model for creating quality mobile applications has created a new class of applications that are split between what is running natively on the device and what is referred to as Web Application Programming Interfaces (APIs) on the server.

The model in which these mobile capabilities are exposed natively on the device are via mobile device Software Development Kit (SDK). When it comes to mobile cloud services, each mobile cloud service typically delivers their own SDK and set of service specific capabilities and rarely have a pluggable model for defining more of the core infrastructure capabilities such as security . The challenge is how to integrate various mobile cloud services each with their own disparate SDKs in a manner in which they can remain independent and isolated but also have the ability to integrate with core enterprise services such as security and analytics.

The article defines a model where 3rd party services can integrate with existing enterprise security models while not requiring these services to be re-engineered to integrate with these services. This disclosure focuses on the authentication flows. A

framework is provided for a work level enforcement p...