Highly available central controller to store and enforce valid state transitions of distributed components
First Claim
Patent Images
1. A computer-implemented method to provide centralized control of access to a service, the computer-implemented method comprising:
- executing on a processor, computer-executable instructions that, when executed, cause the processor to perform;
storing, in a central database, one or more entity states of the service;
receiving one or more requests to read or manipulate said one or more entity states;
providing a virtual view of said one or more entity states of the service to facilitate handling said one or more requests to read or manipulate said one or more entity states of the service; and
enforcing one or more valid entity state transitions in response to receiving said one or more requests,the one or more entity states comprising a locked state and an internal state that enables testing in response to one of the one or more requests if the one of the one or more requests originates from a restricted set of internet protocol addresses.
2 Assignments
0 Petitions
Accused Products
Abstract
A highly available central controller to store and enforce valid state transitions of distributed components is provided for centrally controlling access to a service. Central control is provided by a database with an API according to a set of stored procedures, which provides a virtual view to requesters that seek to read or manipulate service entities.
14 Citations
20 Claims
-
1. A computer-implemented method to provide centralized control of access to a service, the computer-implemented method comprising:
executing on a processor, computer-executable instructions that, when executed, cause the processor to perform; storing, in a central database, one or more entity states of the service; receiving one or more requests to read or manipulate said one or more entity states; providing a virtual view of said one or more entity states of the service to facilitate handling said one or more requests to read or manipulate said one or more entity states of the service; and enforcing one or more valid entity state transitions in response to receiving said one or more requests, the one or more entity states comprising a locked state and an internal state that enables testing in response to one of the one or more requests if the one of the one or more requests originates from a restricted set of internet protocol addresses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A user interface adapted to facilitate provisioning of centralized control of access to a service, the user interface comprising:
-
a processor; a request receiving component configured to receive one or more requests to read or manipulate one or more entity states of the service; an enforcing component configured to enforce one or more valid entity state transitions in response to the request receiving component receiving said one or more requests, said one or more requests being formed according to a virtual view of said one or more entity states of the service provided to one or more requestors of said service, and the one or more entity states comprising a locked state and an internal state that enables testing in response to one of the one or more requests if the one of the one or more requests originates from a restricted set of internet protocol addresses; and a non-transitory computer-readable storage medium storing instructions that, when executed by the processor, cause the processor to implement at least one of the request receiving component or the enforcing component. - View Dependent Claims (13, 14, 15)
-
-
16. One or more non-transitory computer storage media comprising computer-executable instructions that, when executed by a processor, cause the processor to transmit a data packet between two or more computer components, wherein the data packet comprises:
information associated with a request to read or manipulate one or more entity states of a service according to a virtual view of said one or more entity states provided to a requestor to enforce one or more valid service entity state transitions, the one or more entity states comprising an internal state that enables testing in response to one of the one or more requests if the one of the one or more requests originates from a restricted set of internet protocol addresses.
-
17. A computer-implemented system configured to provide centralized control of access to a service, the computer-implemented system comprising:
-
a database configured to centrally store at least one entity state of the service; a request receiving component configured to receive at least one request to read or manipulate the at least one entity state of the service; an enforcing component configured to enforce at least one valid entity state transition in response to receiving said at least one request; at least one account entity associated with providing said service; at least one repository entity configured to store said at least one account entity, said at least one request being formed according to a virtual view of at least one account entity state or at least one repository entity state; a processor, and the one or more entity states comprising a locked state and an internal state that enables testing in response to one of the one or more requests if the one of the one or more requests originates from a restricted set of internet protocol addresses; and one or more non-transitory computer storage media storing instructions that, when executed by the processor, cause the processor to implement at least one of the database, the request receiving component, the enforcing component, the at least one account entity or the at least one repository entity. - View Dependent Claims (18, 19, 20)
-
Specification