INTEROPERABLE SYSTEMS AND METHODS FOR PEER-TO-PEER SERVICE ORCHESTRATION
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs.
92 Citations
23 Claims
-
1-10. -10. (canceled)
-
11. A method comprising:
-
receiving a request from a host application to determine whether a particular operation on a piece of electronic content is permitted; sending a request to a service provided by or on behalf of the host application to verify one or more link objects; receiving a response to the request, the response indicating that the one or more link objects are trusted; evaluating the one or more link objects in accordance with one or more controls securely associated with the piece of electronic content; determining, based at least in part on the evaluating step, that the particular operation is permitted; sending an indication to the host application that the particular operation is permitted; providing one or more cryptographic keys to the host application or a service operating on behalf of the host application, the one or more cryptographic keys being configured to enable the particular operation to be performed. - View Dependent Claims (12, 13, 14)
-
-
15-18. -18. (canceled)
-
19. A computer-readable medium comprising program code, the program code being operable, when executed by a computer system, to cause the computer system to perform steps comprising:
-
receiving a request from a host application to determine whether a particular operation on a piece of electronic content is permitted; sending a request to a service provided by or on behalf of the host application to verify one or more link objects; receiving a response to the request, the response indicating that the one or more link objects are trusted; evaluating the one or more link objects in accordance with one or more controls securely associated with the piece of electronic content; determining, based at least in part on the evaluating step, that the particular operation is permitted; sending an indication to the host application that the particular operation is permitted; and providing one or more cryptographic keys to the host application or a service operating on behalf of the host application, the one or more cryptographic keys being configured to enable the particular operation to be performed. - View Dependent Claims (20, 21, 22)
-
-
23-28. -28. (canceled)
Specification