×

Modeling party identities in computer storage systems

  • US 8,171,057 B2
  • Filed: 03/25/2009
  • Issued: 05/01/2012
  • Est. Priority Date: 10/23/2008
  • Status: Active Grant
First Claim
Patent Images

1. At a computer system including one or more processors and system memory, the computer system connected to a federated identity fabric, the federated identity fabric modeling identity related information in computer storage systems, the federated identity fabric providing a consistent view of and access to identity information across a plurality of different applications, a plurality of different computer systems, a plurality of different contexts, and a plurality of different networks, a method for utilizing the federated identity fabric to locate identity related data, the method comprising:

  • an act of creating a first data object within a data structure, the first data object representing a party, the first data object including a party identifier that uniquely identifies the party, the first data object also including a plurality of role types that each identify a role played by the party, each of the role types having an associated role identifier;

    an act of inserting the first data object into the federated identity fabric;

    an act of creating a second data object containing a first identifier used by the party within the federated identity fabric, the second data object also including a role played by the party within the context of the first identifier associated with the first data object;

    an act of creating a third data object containing a second identifier used by the party within the federated identity fabric, the second data object also including a role played by the party within the context of the second identifier associated with the second data object;

    an act of inserting the second and third data objects into the federated identity fabric;

    an act of including, within the second and third data objects, the party identifier to relate the second and third data objects to the first data object such that the party identifier is associated with the first and second identifiers;

    an act of receiving a request that includes the first identifier, the request requesting an identifier associated with the party in the context of one of the party'"'"'s role;

    an act of subsequently using the first identifier in the second data object as a template for locating the second data object;

    an act of using the party identifier in the second data object to locate the first data object subsequent to using the first identifier to locate the second data object;

    an act of retrieving identity related data for the party from the first data object, including identifying that the third data object exists for representing the party and that the third data object represents the party'"'"'s role identified in the request;

    an act of locating the third data object using the party identifier; and

    an act of retrieving and returning the second identifier contained within the third data object to satisfy the request.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×