Messaging infrastructure for identity-centric data access
First Claim
1. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a computer-readable medium storing or carrying thereon a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the data structure including the following data fields that are structured in accordance with the message schema:
- one or more data fields that identify one of a plurality of identities who owns a data object to be accessed by one of a plurality of mobile applications in accordance with an identity-centric, as opposed to an application-centric, data access model;
one or more data fields that identify one or more services that manage a plurality of data objects for the plurality of identities including the identity who owns the data object to be accessed, at least some of the data objects being organized in accordance with a data type schema;
one or more data fields that identify one of a plurality of data type schemas corresponding to one of the plurality of mobile applications that access the plurality of data objects managed by the one or more services, wherein a particular data object to be accessed is identifiable from at least the identification of the identity who owns the data object to be accessed and the identification of the data type schema; and
one or more data fields that identify an operation to be performed on the particular data object.
2 Assignments
0 Petitions
Accused Products
Abstract
A messaging data structure for accessing data in an identity-centric manner. An identity may be a user, a group of users, or an organization. Instead of data being maintained on an application-by-application basis, the data associated with a particular identity is stored by one or more data services accessible by many applications. The data is stored in accordance with a schema that is recognized by a number of different applications and the data service. The messaging data structure includes fields that identify the target data object to be operated upon using an identity field, a schema field, and an instance identifier field. In addition, the desired operation is specified. Thus, the target data object is operated on in an identity-centric manner.
-
Citations
88 Claims
-
1. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a computer-readable medium storing or carrying thereon a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the data structure including the following data fields that are structured in accordance with the message schema:
-
one or more data fields that identify one of a plurality of identities who owns a data object to be accessed by one of a plurality of mobile applications in accordance with an identity-centric, as opposed to an application-centric, data access model; one or more data fields that identify one or more services that manage a plurality of data objects for the plurality of identities including the identity who owns the data object to be accessed, at least some of the data objects being organized in accordance with a data type schema; one or more data fields that identify one of a plurality of data type schemas corresponding to one of the plurality of mobile applications that access the plurality of data objects managed by the one or more services, wherein a particular data object to be accessed is identifiable from at least the identification of the identity who owns the data object to be accessed and the identification of the data type schema; and one or more data fields that identify an operation to be performed on the particular data object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a method for generating a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the method including the following:
-
generating and inserting a first set of one or more data fields into the data structure in accordance with the message schema, the first set of one or more data fields identifying one of a plurality of identities who owns a data object to be accessed by one of a plurality of mobile applications in accordance with an identity-centric, as opposed to an application-centric, data access model; generating and inserting a second set of one or more data fields into the data structure in accordance with the message schema, the second set of one or more data fields identifying one or more services that manage a plurality of data objects for the plurality of identities including the identity who owns the data object to be accessed, at least some of the data objects being organized in accordance with a data type schema; generating and inserting a third set of one or more data fields into the data structure in accordance with the message schema, the third set of one or more data fields identifying one of a plurality of data type schemas corresponding to one of the plurality of mobile applications that access the plurality of data objects managed by the one or more services, wherein a particular data object to be accessed is identifiable from at least the identification of the identity who owns the data object to be accessed and the identification of the data type schema; generating and inserting a fourth set of one or more data fields into the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information for use in correlating the request with a response to the request; and generating and inserting a fifth set of one or more data fields into the data structure in accordance with the message schema, the fifth set of one or more data fields identifying an operation to be performed on the particular data object. - View Dependent Claims (68, 69, 70, 71)
-
-
72. A computer program product for use in a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, the computer-program product for implementing a method for generating a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the computer program product comprising a computer-readable medium having stored thereon the following:
-
computer-executable instructions for generating and inserting a first set of one or more data fields into the data structure in accordance with the message schema, the first set of one or more data fields identifying one of a plurality of identities who owns a data object to be accessed by one of a plurality of mobile applications in accordance with an identity-centric, as opposed to an application-centric, data access model; computer-executable instructions for generating and inserting a second set of one or more data fields into the data structure in accordance with the message schema, the second set of one or more data fields identifying one or more services that manage a plurality of data objects for the plurality of identities including the identity who owns the data object to be accessed, at least some of the data objects being organized in accordance with a data type schema; computer-executable instructions for generating and inserting a third set of one or more data fields into the data structure in accordance with the message schema, the third set of one or more data fields identifying one of a plurality of data type schemas corresponding to one of the plurality of mobile applications that access the plurality of data objects managed by the one or more services, wherein a particular data object to be accessed is identifiable from at least the identification of the identity who owns the data object to be accessed and the identification of the data type schema; computer-executable instructions for generating and inserting a fourth set of one or more data fields into the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information for use in correlating the request with a response to the request; and computer-executable instructions for generating and inserting a fifth set of one or more data fields into the data structure in accordance with the message schema, the fifth set of one or more data fields identifying an operation to be performed on the particular data object. - View Dependent Claims (73, 74, 75, 76, 77)
-
-
78. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a method for interpreting a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the method including the following:
-
extracting and interpreting a first set of one or more data fields from the data structure in accordance with the message schema, the first set of one or more data fields identifying one of a plurality of identities who owns a data object to be accessed by one of a plurality of mobile applications in accordance with an identity-centric, as opposed to an application-centric, data access model; extracting and interpreting a second set of one or more data fields from the data structure in accordance with the message schema, the second set of one or more data fields identifying one or more services that manage a plurality of data objects for the plurality of identities including the identity who owns the data object to be accessed, at least some of the data objects being organized in accordance with a data type schema; extracting and interpreting a third set of one or more data fields from the data structure in accordance with the message schema, the third set of one or more data fields identifying one of a plurality of data type schemas corresponding to one of the plurality of mobile applications that access the plurality of data objects managed by the one or more services; identifying a particular data object to be accessed based at least on the identification of the identity who owns the data object to be accessed and the identification of the data type schema; extracting and interpreting a fourth set of one or more data fields from the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information for use in correlating the request with a response to the request; extracting and interpreting a fifth set of one or more data fields from the data structure in accordance with the message schema, the fifth set of one or more data fields identifying an operation to be performed on the particular data object; performing the operation on the particular data object; and returning a response to the request, the response including at least some of the correlation information. - View Dependent Claims (79, 80, 81, 82)
-
-
83. A computer program product for use in a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, the computer program product for implementing a method for interpreting a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the computer program product comprising a computer-readable medium having stored thereon the following:
-
computer-executable instructions for extracting and interpreting a first set of one or more data fields from the data structure in accordance with the message schema, the first set of one or more data fields identifying one of a plurality of identities who owns a data object to be accessed by one of a plurality of mobile applications in accordance with an identity-centric, as opposed to an application-centric, data access model; computer-executable instructions for extracting and interpreting a second set of one or more data fields from the data structure in accordance with the message schema, the second set of one or more data fields identifying one or more services that manage a plurality of data objects for the plurality of identities including the identity who owns the data object to be accessed, at least some of the data objects being organized in accordance with a data type schema; computer-executable instructions for extracting and interpreting a third set of one or more data fields from the data structure in accordance with the message schema, the third set of one or more data fields identifying one of a plurality of data type schemas corresponding to one of the plurality of mobile applications that access the plurality of data objects managed by the one or more services; computer-executable instructions for identifying a particular data object to be accessed based at least on the identification of the identity who owns the data object to be accessed and the identification of the data type schema; computer-executable instructions for extracting and interpreting a fourth set of one or more data fields from the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information for use in correlating the request with a response to the request; computer-executable instructions for extracting and interpreting a fifth set of one or more data fields from the data structure in accordance with the message schema, the fifth set of one or more data fields identifying an operation to be performed on the particular data object; computer-executable instructions for causing the operation to be performed on the particular data object; and computer-executable instructions for causing a response to the request to be returned, the response including at least some of the correlation information. - View Dependent Claims (84, 85, 86, 87, 88)
-
Specification