Schema-based services for identity-based data access
First Claim
1. In a computer network, a method comprising, providing a service schema, the service schema having service-related fields arranged into a content document with defined structures for the fields;
- receiving a data access request directed to service information, the request including associated identity information; and
in response to the data access request, manipulating at least one set of data in a logical service document that includes data therein according to the associated identity information, each set of data in the logical service document structured to correspond to a field in the content document.
2 Assignments
0 Petitions
Accused Products
Abstract
A schema-based contacts service for Internet access to per-user contact data, wherein access to data is based on each user'"'"'s identity. The contacts service includes a schema that defines rules and a structure for each user'"'"'s data, and also includes methods that provide access to the data in a defined way. The contacts schema thus corresponds to a logical document containing the data for each user. The user manipulates (e.g., reads or writes) data in the logical document by data access requests through defined methods. In one implementation, the contacts schemas are arranged as XML documents, and the services provide methods that control access to the data based on the requesting user'"'"'s identification, defined role and scope for that role. In this way, data can be accessed by its owner, and shared to an extent determined by the owner. The structure of the data is defined from the perspective of the data, not from that of an application program or a device, whereby appropriate programs can communicate with the contacts service to access the data, with existing knowledge of the schema-defined format, regardless of the device or application program in use. Extensibility is defined into the schema.
-
Citations
23 Claims
-
1. In a computer network, a method comprising,
providing a service schema, the service schema having service-related fields arranged into a content document with defined structures for the fields; -
receiving a data access request directed to service information, the request including associated identity information; and
in response to the data access request, manipulating at least one set of data in a logical service document that includes data therein according to the associated identity information, each set of data in the logical service document structured to correspond to a field in the content document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. In a computer network, a method comprising,
receiving a data access request, the request including associated identity information; -
accessing a data store to obtain data based on the associated identity information;
constructing a document including at least part of the data, the document arranged according to a defined schema; and
returning the document in response to the request. - View Dependent Claims (20)
-
-
21. A method for providing identity-centric services to end users over a distributed computer network, the method comprising:
-
providing a core set of identity-centric services to end users;
maintaining identity-centric data relating to the end users of the core services; and
providing one or more optional identity-centric services to end users in addition to the core services;
wherein the identity-centric data in the data store is accessible by the core set of services and by the optional services. - View Dependent Claims (22, 23)
-
Specification