SHARING OBJECTS THAT RELY ON LOCAL RESOURCES WITH OUTSIDE SERVERS
First Claim
1. A method for sharing information, the method comprising, at a first system:
- receiving an instruction to send a copy of a first item to a second system;
wherein the first item comprises a reference to a first object;
wherein the first object is accessible to the first system;
wherein the first object is inaccessible to the second system;
generating first data that describes the first object;
wherein the first data is not identical to the reference;
sending, to the second system, the copy of the first item and the first data;
wherein the method is performed by one or more computing devices.
8 Assignments
0 Petitions
Accused Products
Abstract
To prevent potential confusion when referencing an object by name, a party may supplementary or alternatively include referential metadata, other than the name by which the object is known to the party, that describes the referenced object. A party receiving information that includes such referential metadata for an object may utilize the referential metadata to identify a local object that matches or may substitute for the object referenced by the sending party. For example, a broker operating a financial system may generate a chart based on a first named object. The broker may wish to send the chart to another broker operating a different financial system. Since the first name object may be known by a different name in the different financial system, the financial system may replace the name of the object with referential metadata prior to sending the chart.
-
Citations
44 Claims
-
1. A method for sharing information, the method comprising, at a first system:
-
receiving an instruction to send a copy of a first item to a second system; wherein the first item comprises a reference to a first object; wherein the first object is accessible to the first system; wherein the first object is inaccessible to the second system; generating first data that describes the first object; wherein the first data is not identical to the reference; sending, to the second system, the copy of the first item and the first data; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for sharing information from a first system with a second system, the method comprising, at the second system:
-
receiving (a) a first item that relies upon a first object accessible to the first system and (b) first data describing the first object; wherein the first object has a first name; wherein the first data is not identical to the first name; in response to determining that the first item relies upon the first object, using the first data to identify a second object accessible to the second system that may substitute for the first object; and generating and storing a copy of the first item, wherein the copy of the first item is identical to the first item except that the copy of the first item relies upon the second object instead of the first object; wherein the method is performed by one or more computing devices. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. One or more storage media storing instructions for sharing information, which instructions, when executed by one or more processors at a first system, cause:
-
receiving an instruction to send a copy of a first item to a second system; wherein the first item comprises a reference to a first object; wherein the first object is accessible to the first system; wherein the first object is inaccessible to the second system; generating first data that describes the first object; wherein the first data is not identical to the reference; sending, to the second system, the copy of the first item and the first data. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. One or more storage media storing instructions for sharing information from a first system with a second system, which instructions, when executed by one or more processors at the second system, cause:
-
receiving (a) a first item that relies upon a first object accessible to the first system and (b) first data describing the first object; wherein the first object has a first name; wherein the first data is not identical to the first name; in response to determining that the first item relies upon the first object, using the first data to identify a second object accessible to the second system that may substitute for the first object; and generating and storing a copy of the first item, wherein the copy of the first item is identical to the first item except that the copy of the first item relies upon the second object instead of the first object. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
Specification