Schema-based service for identity-based access to presence data
First Claim
1. In a computer network, a method comprising, providing a presence schema, the presence schema having presence-related fields arranged into a content document with defined structures for the fields;
- receiving a data access request directed to presence information, the request including associated identity information; and
in response to the data access request, manipulating at least one set of data in a logical presence document that includes data therein according to the associated identity information, each set of data in the logical presence document structured to correspond to a field in the content document.
2 Assignments
0 Petitions
Accused Products
Abstract
A schema-based presence service for Internet access to per-user presence data, wherein access to data is based on each user'"'"'s identity. The presence service includes a schema that defines rules and a structure for each user'"'"'s data, and also includes methods that provide access to the data in a defined way. The presence schema thus corresponds to a logical document containing the data for each user. The user manipulates (e.g., reads or writes) data in the logical document by data access requests through defined methods. In one implementation, the presence schemas are arranged as XML documents, and the services provide methods that control access to the data based on the requesting user'"'"'s identification, defined role and scope for that role. In this way, data can be accessed by its owner, and shared to an extent determined by the owner. The structure of the data is defined from the perspective of the data, not from that of an application program or a device, whereby appropriate programs can communicate with the presence service to access the data, with existing knowledge of the schema-defined format, regardless of the device or application program in use. Extensibility is defined into the schema, and argots may be used to contain the presence information.
67 Citations
22 Claims
-
1. In a computer network, a method comprising,
providing a presence schema, the presence schema having presence-related fields arranged into a content document with defined structures for the fields; -
receiving a data access request directed to presence information, the request including associated identity information; and
in response to the data access request, manipulating at least one set of data in a logical presence document that includes data therein according to the associated identity information, each set of data in the logical presence document structured to correspond to a field in the content document. - View Dependent Claims (2, 3, 4)
-
-
5. In a computer network, a method comprising,
receiving a request to retrieve presence data, the request including associated identity information; -
reading from a data store to obtain presence data based on the associated identity information;
constructing a presence document including at least part of the data, the document arranged according to a defined schema for presence data; and
returning the document in response to the request. - View Dependent Claims (6, 7)
-
-
8. A computer-readable medium having stored thereon a data structure, comprising:
-
a first set of data corresponding to activity at an endpoint device;
a second set of data corresponding to anticipated presence at the endpoint device; and
wherein the first and second sets of data are regularized according to a schema by a service for an identity such that access to the service receives information related to a user'"'"'s presence with respect to the endpoint device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-readable medium having stored thereon a data structure, comprising:
-
a first set of data indicating that the data structure contains presence information corresponding to an identity;
a second set of data corresponding to an argot, the argot including presence data with respect to an endpoint device; and
wherein the first and second sets of data are regularized according to a schema by a service for the identity, such that access to the service receives the argot and a software program interprets the argot to determine presence information for a user corresponding to the identity with respect to the endpoint device. - View Dependent Claims (22)
-
Specification