Controlling access to services via usage models
First Claim
1. A computer-implemented method for controlling access of Web service consumers to Web services available from Web service providers, the method comprising:
- receiving a request from a Web service consumer for access to an indicated Web service, the Web service being responsive to invocation requests and being available from a Web service provider in accordance with an indicated usage model, the indicated usage model having an associated use price and one or more associated use restrictions for the indicated Web service;
automatically determining whether to authorize the requested access to the indicated Web service in accordance with the indicated usage model, the automatic determining being performed by one or more programmed computing systems and being based at least in part on whether the one or more associated use restrictions for the indicated usage model are satisfied by the received request from the Web service consumer and at least in part on whether payment for the use price of the indicated usage model is available; and
if it is determined to authorize the requested access in accordance with the indicated usage model, automatically interacting with one or more remote computing systems of the Web service provider to invoke the Web service on behalf of the Web service consumer, the automatic interacting being performed by the one or more programmed computing systems and including sending one or more invocation requests to at least one of the one or more remote computing systems, the one or more remote computing systems being distinct from the one or more programmed computing systems.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for facilitating interactions between computing systems, such as in accordance with usage models that are configured for available services by the providers of the services. In some situations, the services are Web services, and an electronic Web service (“WS”) marketplace is provided via which third-party WS providers make their WSes available to third-party WS consumers who purchase access to those WSes via the electronic marketplace based on configured usage models selected by the consumers. Some or all of the one or more usage models configured for an available WS may each have associated use prices and/or non-price use conditions, and if so access to those WSes using those usage models may be provided only if a consumer requesting access provides appropriate payment and otherwise satisfies the specified use conditions for a selected usage model.
-
Citations
63 Claims
-
1. A computer-implemented method for controlling access of Web service consumers to Web services available from Web service providers, the method comprising:
-
receiving a request from a Web service consumer for access to an indicated Web service, the Web service being responsive to invocation requests and being available from a Web service provider in accordance with an indicated usage model, the indicated usage model having an associated use price and one or more associated use restrictions for the indicated Web service; automatically determining whether to authorize the requested access to the indicated Web service in accordance with the indicated usage model, the automatic determining being performed by one or more programmed computing systems and being based at least in part on whether the one or more associated use restrictions for the indicated usage model are satisfied by the received request from the Web service consumer and at least in part on whether payment for the use price of the indicated usage model is available; and if it is determined to authorize the requested access in accordance with the indicated usage model, automatically interacting with one or more remote computing systems of the Web service provider to invoke the Web service on behalf of the Web service consumer, the automatic interacting being performed by the one or more programmed computing systems and including sending one or more invocation requests to at least one of the one or more remote computing systems, the one or more remote computing systems being distinct from the one or more programmed computing systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A non-transitory computer-readable storage medium whose stored contents configure a computing device to control access of Web service consumers to Web services available from Web service providers, by performing a method comprising:
-
receiving a request from a first computing system of a Web service consumer for access to an indicated Web service, the Web service being responsive to invocation requests and being available from a Web service provider in accordance with an indicated usage model, the indicated usage model having an associated use price and one or more associated use restrictions for the indicated Web service; automatically determining whether to authorize the requested access to the indicated Web service in accordance with the indicated usage model, the automatic determining being performed by the configured computing device and being based at least in part on whether the one or more associated use restrictions for the indicated usage model are satisfied by the received request from the Web service consumer and at least in part on whether payment for the use price of the indicated usage model is available; and if it is determined to authorize the requested access in accordance with the indicated usage model, automatically interacting with one or more remote computing systems of the Web service provider to invoke the Web service on behalf of the Web service consumer, the automatic interacting being performed by the configured computing device and including sending one or more invocation requests to at least one of the one or more remote computing systems, the one or more remote computing systems being distinct from the configured computing device and from the first computing system. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A server computing system configured to control access of Web service consumers to Web services available from Web service providers, comprising:
-
one or more processors; a first component that is configured to, when executed by at least one of the one or more processors, receive a request from a client computing system of a Web service consumer for access to an indicated Web service, the indicated Web service being responsive to invocation requests and being available from a Web service provider in accordance with an indicated usage model, the indicated usage model having an associated use price and one or more associated use restrictions for the indicated Web service, and to automatically determine whether to authorize the requested access to the indicated Web service in accordance with the indicated usage model, the automatic determining being based at least in part on whether the one or more associated use restrictions for the indicated usage model are satisfied by the received request from the Web service consumer and at least in part on whether payment for the use price of the indicated usage model is obtained; and a second component that is configured to, when executed by at least one of the one or more processors, and if it is determined to authorize the requested access in accordance with the indicated usage model, automatically interact with one or more remote computing systems of the Web service provider to invoke the Web service on behalf of the Web service consumer, the automatic interacting including sending one or more invocation requests to at least one of the one or more remote computing systems, the one or more remote computing systems being distinct from the server computing system and from the client computing system. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63)
-
Specification