Identity-based distributed computing for device resources
First Claim
Patent Images
1. A method comprising:
- discovering, at a first computing device, a resource located at a second computing device;
communicating a request to the second computing device to employ the resource located at the second computing device;
communicating identity information to the second computing device to enable the second computing device to determine whether the first computing device has access to the resource based on the identity information;
receiving data from the second computing device when the second computing device approves access to the resource by the first computing device, the data including resource information associated with the resource at the second computing device formatted according to a resource-based schema understood by the first computing device, the resource-based schema being organized by resource and including information about the second computing device that corresponds to respective resources;
interpreting the data to access the resource located at the second computing device; and
executing a process, at the first device, using the resource of the second computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method and related data structures for discovering and describing computing resources available at various computing devices, and for exposing those resources as services that are addressable by software applications. The data describing the resources is arranged according to an identity-based schema. The computing resources may include, for example, storage capacity, bandwidth, processing power, input methods and mechanism, and rendering methods. The method and system are identity-based, whereby a user (with an identity) has access to the distributed resources commensurate with that identity.
-
Citations
15 Claims
-
1. A method comprising:
-
discovering, at a first computing device, a resource located at a second computing device; communicating a request to the second computing device to employ the resource located at the second computing device; communicating identity information to the second computing device to enable the second computing device to determine whether the first computing device has access to the resource based on the identity information; receiving data from the second computing device when the second computing device approves access to the resource by the first computing device, the data including resource information associated with the resource at the second computing device formatted according to a resource-based schema understood by the first computing device, the resource-based schema being organized by resource and including information about the second computing device that corresponds to respective resources; interpreting the data to access the resource located at the second computing device; and executing a process, at the first device, using the resource of the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for sharing resources between computing devices, comprising:
-
receiving a request from a first computing device at a second computing device to employ a resource located at the second computing device, the request including identity information associated with the first computing device, the identity information including a first credential provided by an authentication service; determining, by the second computing device, whether the first computing device is permitted to access the resource based on the identity information, the determining the access comprising validating the first credential; sending, by the second computing device, resource information associated with the resource to the first computing device responsive to determining that the first computing device is permitted to access the resource, the resource information formatted according to a resource-based schema understood by the first computing device, the resource-based schema being organized by resource and including information about the second computing device in relation to respective resources; allowing, by the second computing device, the first computing device to access the resource to execute a process by employing the resource; and dynamically monitoring the resource to determine whether the resource is exhausted for the request. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification