×

Methods and systems for providing a data access layer

  • US 7,680,797 B1
  • Filed: 07/23/2004
  • Issued: 03/16/2010
  • Est. Priority Date: 07/25/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for providing a re-usable data access framework, the system comprising:

  • first and second application modules generating requests for information; and

    a data access layer, including a first server that includes an application program interface and a plurality of service providers, the application program interface configured to;

    receive a request from the first application module, anddelegate the request to at least one of the plurality of service providers to manage data associated with the request,wherein the plurality of service providers comprise;

    a synchronization manager configured to;

    maintain, in response to a determination that the request is an update shared data request for updating the shared data, data consistency for shared data held in a memory of the first server and a memory of a second server andsend information associated with the update shared data request to the second application module from a first message service provider located in the first server to a second message service provider located in the second server;

    a cache manager configured to;

    cache results of a first database query in response to the request being a database access request, andprovide a portion of the results of the first database query to one of the first or second application modules in response to receipt of a second database query from one of the first or the second application modules;

    a pre-fetch service configured to cause the cache manager to;

    perform a third database query in response to the first or the second application module predicting a user action,cache results of the third database query, andprovide the results of the third database query to the application program interface when the user action is received by the one of the first or the second application modules; and

    a security manager configured to determine a restriction on the request based upon a role of a user associated with the request.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×