MESSAGING PROTOCOL
First Claim
Patent Images
1. A computer system comprising:
- one or more processors; and
one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to;
detect a request to transmit a message to a destination, wherein the destination is within a separate domain and a target endpoint address of the destination is unknown;
determine whether the destination is associated with a role;
upon determining the destination is associated with a role, identify an intended target associated with the role;
generate a transmission for the intended target without the target endpoint address; and
electronically communicate the transmission to the intended target within the separate domain.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods provide for implementation of a messaging protocol that provides security necessary for clinical messaging while also providing scalability needed to properly function within a clinical setting. The messaging protocol provides for federation of messages across messaging domains with a direct target address or via a role or group endpoint address that resolves to one or more target addresses. The messaging protocol also provides the ability to include content other than text in messages.
-
Citations
20 Claims
-
1. A computer system comprising:
-
one or more processors; and one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to; detect a request to transmit a message to a destination, wherein the destination is within a separate domain and a target endpoint address of the destination is unknown; determine whether the destination is associated with a role; upon determining the destination is associated with a role, identify an intended target associated with the role; generate a transmission for the intended target without the target endpoint address; and electronically communicate the transmission to the intended target within the separate domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method, the method comprising:
-
detecting a request to transmit a message to a destination, wherein the destination is within a separate domain and a target endpoint address of the destination is unknown; determining whether the destination is associated with a role; upon determining the destination is associated with a role, identifying an intended target associated with the role; generating a transmission for the intended target without the target endpoint address; and electronically communicating the transmission to the intended target within the separate domain. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. One or more computer storage media storing computer-useable instructions that, when executed by a computing device, cause the computing device to perform operations, the operations comprising:
-
detecting a request from a source device within a first domain to transmit a message to a plurality of destinations within a second domain without an endpoint address for each of the plurality of destinations; identifying one or more intended targets associated with the plurality of destinations, wherein the one or more intended targets are discoverable within a network including the second domain; generating a transmission for the one or more intended targets without the endpoint address; electronically communicating the transmission to the one or more intended targets within the second domain; receiving a plurality of responses from the one or more intended targets; electronically communicating each of a device acknowledgement and a read acknowledgement to the source device, wherein only one device acknowledgement and one read acknowledgment are communicated to the source device; and electronically communicating a response from each of the one or more intended targets to the source device. - View Dependent Claims (17, 18, 19, 20)
-
Specification