MESSAGE PROCESSING METHODS AND SYSTEMS
First Claim
1. A method of controlling a distributed application executable on a distributed computer, said method comprising operating said distributed computer to:
- intercept a message passing between computers within said distributed computer performing said distributed application;
read said message and in dependence upon the contents of said message identify a corresponding run-time-updatable message-handling policy indicating, for predetermined characteristics of the content of a message, lists of actions to be performed on said message;
read action-to-software module mapping data which indicates for each of the actions in said list a software module to carry out the action; and
perform said list of actions by triggering the execution of the corresponding software modules found in said mapping data.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for controlling the operation of a distributed application using message interception techniques are disclosed. The message interception software is independent of the software components making up the distributed application. The message interception software processes messages by carrying out a series of actions set out in an interceptor chain configuration policy, that policy being selected on the basis of the contents of the intercepted message. The interceptor chain configuration policy is divided into a separate enforcement configuration policy which dictates what actions should be carried out on a message and in what order, and an interceptor reference policy which indicates references to interceptors which are suitable for carrying out the actions specified in the enforcement configuration policy. In this way, the behaviour of the message interception software (and thus the distributed application) can be updated whilst both the interception software and the distributed application are running without requiring the person updating the behaviour of the message interception software to deal with esoteric references to interceptor software routines.
269 Citations
33 Claims
-
1. A method of controlling a distributed application executable on a distributed computer, said method comprising operating said distributed computer to:
- intercept a message passing between computers within said distributed computer performing said distributed application;
read said message and in dependence upon the contents of said message identify a corresponding run-time-updatable message-handling policy indicating, for predetermined characteristics of the content of a message, lists of actions to be performed on said message; read action-to-software module mapping data which indicates for each of the actions in said list a software module to carry out the action; and perform said list of actions by triggering the execution of the corresponding software modules found in said mapping data. - View Dependent Claims (19)
- intercept a message passing between computers within said distributed computer performing said distributed application;
- 2. A method of processing a message during a message exchange in a distributed computing environment, the method including receiving a message and, on the basis of the content of the message and a specified set of conditions, selecting plural enforcement actions, from available enforcement actions, to be applied in a particular sequence to the message, identifying interceptors that correspond to each of the enforcement actions and deploying an interceptor chain, comprising a corresponding sequence of interceptor instances, for processing the message.
- 3. A method of exchanging messages in a distributed computing environment, the method including for each received message selecting, on the basis of the content of the message and a specified set of conditions, plural enforcement actions, from available enforcement actions, to be applied in a particular sequence to the message, identifying interceptors that correspond to each of the enforcement actions and deploying an interceptor chain, comprising a corresponding sequence of interceptor instances, for processing the message.
-
22. A distributed computer for performing one or more distributed applications, said distributed computer comprising:
- a plurality of computers connected to one another via communication links;
said distributed computer storing;i) a run-time updatable message handling policy indicating, for predetermined characteristics of the content of a message, lists of actions to be performed on said message being passed between said computers in performance of said distributed application; ii) an administrator-editable action assignment policy indicating one or more descriptions of software routines for performing actions in said lists of actions; iii) message handling software executable, on receipt of said message, to select one of said lists of actions in dependence on the contents of said message and said message handling policy, and to trigger the execution of said software modules in accordance with said action assignment policy.
- a plurality of computers connected to one another via communication links;
- 23. A system arranged to process a message during a message exchange in a distributed computing environment, the system including input means for receiving a message, output means for delivering a processed message and a store, the store storing a specified set of conditions and the system comprising means arranged to inspect the content of a received message, on the basis of the content of the message and the conditions, identify plural enforcement actions, from available enforcement actions, to be applied in a particular sequence to the message, use the associations to identify interceptors that correspond to each of the enforcement actions and deploy an interceptor chain, comprising a corresponding sequence of interceptor instances, for processing the message.
-
33. A method of deploying message processing middleware including:
-
generating an enforcement configuration policy associated with a protected resource; deriving from the enforcement configuration policy a capability exposure policy associated with the protected resource; generating a utility services policy for at least the protected resource; generating an interceptor reference policy instance; providing an interceptor pool; and providing a common meta-model, to be shared by the enforcement configuration policy, the utility services policy and the interceptor reference policy, the common meta-model describing; a common endpoint reference representation for remote services or resources common enforcement action types that are used in enforcement configuration policy and the interceptor reference policy; and common utility service policy static references that serve as rigid local identifiers of respective auxiliary infrastructure services that are available to be invoked.
-
Specification