Market data domain and enterprise system implemented by a master entitlement processor
First Claim
1. A computer system comprising:
- a first domain including a first server computer, the first server computer including;
program code stored on the first server computer configured to, when executed by the first server computer, cause the first server computer to receive a user login;
memory storing a permission list that defines permissions specific to the user login as a variable length string of bits wherein the length of the string of bits corresponds to a number of available services, and wherein each of the bits in the string of bits represents an access permission of a corresponding available service;
memory storing a dynamic table;
program code configured to, when executed by the first server computer, expand the permission list into expanded permission information of a predetermined format using information contained in the dynamic table at least in part by mapping a bit of the permission list to one or more codes stored in the dynamic table, the predetermined format being a format that can be utilized by an application; and
program code configured to, when executed by the first server computer, modify the length of the variable length string of bits in accordance with a change in the number of available services.
10 Assignments
0 Petitions
Accused Products
Abstract
A computer system including a master entitlement processor for storing user information, such as user passwords and access permissions, and a user computer system for allowing a user to operate an application in accordance with the user information corresponding to the user. The user computer system preferably includes a plurality of server computers organized into an enterprise including a plurality of domains. Two-way communication between the master entitlement processor and the server computers facilitates accurate storage, reliable access and easy modification of the user information. Organization of the server computers into domains allows good fault tolerance and robust failover and failback operations through static and dynamic loadbalancing.
43 Citations
33 Claims
-
1. A computer system comprising:
a first domain including a first server computer, the first server computer including; program code stored on the first server computer configured to, when executed by the first server computer, cause the first server computer to receive a user login; memory storing a permission list that defines permissions specific to the user login as a variable length string of bits wherein the length of the string of bits corresponds to a number of available services, and wherein each of the bits in the string of bits represents an access permission of a corresponding available service; memory storing a dynamic table; program code configured to, when executed by the first server computer, expand the permission list into expanded permission information of a predetermined format using information contained in the dynamic table at least in part by mapping a bit of the permission list to one or more codes stored in the dynamic table, the predetermined format being a format that can be utilized by an application; and program code configured to, when executed by the first server computer, modify the length of the variable length string of bits in accordance with a change in the number of available services.
-
2. A computer system comprising:
a first domain including a first server computer, the first server computer including a non-transitory memory storing computer-readable instructions that, when executed by the first server computer, cause the first server computer to; receive a user login; store a permission list that defines permissions specific to the user login as a variable length string of bits wherein the length of the string of bits corresponds to a number of available services, and wherein each of the bits in the string of bits represents an access permission of a corresponding available service; store a dynamic table; expand the permission list into expanded permission information of a predetermined format using information contained in the dynamic table at least in part by mapping a bit of the permission list to one or more codes stored in the dynamic table, the predetermined format being a format that can be utilized by an application; and modify the length of the variable length string of bits in accordance with a change in the number of available services. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
19. A method comprising:
-
receiving, at a first server computer, a user login request; storing, at the first server computer, a permission list that defines permissions specific to the user login as a variable length string of bits wherein the length of the string of bits corresponds to a number of available services, each of the bits in the string of bits represents an access permission of a corresponding available service; storing, in the first server computer, a dynamic table; expanding, at the first server computer, the permission list into expanded permission information of a predetermined format using information contained in the dynamic table at least in part by mapping a bit of the permission list to one or more codes stored in the dynamic table, the predetermined format being a format that can be utilized by an application; and modifying the length of the variable length string of bits in accordance with a change in the number of available services. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. An apparatus comprising:
-
a processor; and a memory storing computer executable instructions that, when executed by the processor, cause the apparatus to; receive a user login; store a permission list that defines permissions specific to the user login as a variable length string of bits wherein the length of the string of bits corresponds to a number of available services, each of the bits in the string of bits represents an access permission of a corresponding available service; store a dynamic table; expand the permission list into expanded permission information of a predetermined format using information contained in the dynamic table at least in part by mapping a bit of the permission list to one or more codes stored in the dynamic table, the predetermined format being a format that can be utilized by an application; and modify the length of the variable length string of bits in accordance with a change in the number of available services. - View Dependent Claims (32, 33)
-
Specification