Composite locking of objects in a database
First Claim
1. A method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of:
- accepting a request from a user for access to an object and a container, wherein each of said users has multiple sessions, and each of said sessions can own different lock states;
deciding access to the object and container based on;
the lock state owned by one of said sessions for that object or container; and
either, the lock state of a container if the request is for an object contained within that container, or the lock state of objects grouped within a container if the request is for a container wherein said container comprise real containers and conceptual containers; and
sending a message to the requester granting or denying access to said object or said container.
1 Assignment
0 Petitions
Accused Products
Abstract
In a multi-user environment, a method of controlling access to objects is required, such that updates performed by one user are not overwritten by simultaneous updates by another user. There is provided a method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of: accepting a request for access to an object or a container; deciding access based on the lock state for that object or container, the lock state of a container if the request is for an object contained within that container, and the lock state of objects grouped within a container if the request is for a container object; and sending a message to the requester granting or denying access to said object or container object. Updates performed by one user on an object or a container are not overwritten by simultaneous updates by another user. The above supports units of work in a GUI session where a unit of work could be updating a single object, viewing a single object or copying or deleting a container of objects. This extends to manipulating entire voice applications which consist of many containers and other objects.
76 Citations
21 Claims
-
1. A method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of:
-
accepting a request from a user for access to an object and a container, wherein each of said users has multiple sessions, and each of said sessions can own different lock states;
deciding access to the object and container based on;
the lock state owned by one of said sessions for that object or container; and
either, the lock state of a container if the request is for an object contained within that container, or the lock state of objects grouped within a container if the request is for a container wherein said container comprise real containers and conceptual containers; and
sending a message to the requester granting or denying access to said object or said container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of controlling access to objects and containers stored in a multi-user computer system comprising:
-
providing users access to said objects and containers;
identifying multiple sessions for each of said users accessing said objects and containers, wherein each of said sessions can own different lock status; and
restricting said access to said objects and containers based on the lock state owned by one of said sessions for that object or container; and
either, the lock state of a container if the request is for an object contained within that container, or the lock state of objects grouped within a container if the request is for a container, wherein said container comprise real containers and conceptual containers.- View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method of controlling access to objects and containers stored in a multi-user computer system comprising:
-
providing users access to said objects and containers;
identifying multiple sessions for each of said users accessing said objects and containers, wherein each of said sessions has a unique session identifier, and each of said sessions can own different lock states; and
restricting said access to said objects and containers using locks, wherein each of said locks is owned by one session identifier for that object or container; and
either, the lock state of a container if the request is for an object contained within that container, or the lock state of objects grouped within a container if the request is for a container, wherein said container comprise real containers and conceptual containers.- View Dependent Claims (17, 18, 19, 20)
-
-
21. A method of controlling access to entities in a multi-user environment whereby the entities are containers and objects, and lock states of the entities are stored in a common format comprising a record for a container name and a corresponding object name in a common database, said method comprising the steps of:
-
accepting an access request from a requestor for access to an entity wherein each requestor has multiple sessions, and each of said sessions can own different lock states;
deciding access to the entity based on;
the lock state of that object or container; and
either, the lock state of the container if the request is for an object contained within a container, or the lock state of the objects grouped within a container it the request is for a container;
wherein sad container comprise real containers and conceptual containers;
sending a message to the requestor granting or denying access to said entity; and
storing, if access is granted, a new lock state for the entity in the common format, wherein, because said states of said containers and said objects are stored in said common format, the same access request may be performed on any entity irrespective of whether the entity is a container or an object.
-
Specification