Messaging infrastructure for identity-centric data access
First Claim
1. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a computer-readable medium storing or carrying thereon a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the data structure including the following data fields that are structured in accordance with the message schema:
- one or more data fields that identify an identity whose data object is desired to be operated upon;
one or more data fields that identify an address of a service that manages data objects for a plurality of identities including the identity whose data object is desired to be operated upon, at least some of the data objects being organized in accordance with a data type schema;
one or more data fields that identify the data type schema, wherein a particular data object that is desired to be operated upon may be identified using at least the identification of the identity and the identification of the predetermined data type schema; and
one or more data fields that identify the operation to be performed on the particular data object.
2 Assignments
0 Petitions
Accused Products
Abstract
A messaging data structure for accessing data in an identity-centric manner. An identity may be a user, a group of users, or an organization. Instead of data being maintained on an application-by-application basis, the data associated with a particular identity is stored by one or more data services accessible by many applications. The data is stored in accordance with a schema that is recognized by a number of different applications and the data service. The messaging data structure includes fields that identify the target data object to be operated upon using an identity field, a schema field, and an instance identifier field. In addition, the desired operation is specified. Thus, the target data object is operated on in an identity-centric manner.
44 Citations
88 Claims
-
1. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a computer-readable medium storing or carrying thereon a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the data structure including the following data fields that are structured in accordance with the message schema:
-
one or more data fields that identify an identity whose data object is desired to be operated upon;
one or more data fields that identify an address of a service that manages data objects for a plurality of identities including the identity whose data object is desired to be operated upon, at least some of the data objects being organized in accordance with a data type schema;
one or more data fields that identify the data type schema, wherein a particular data object that is desired to be operated upon may be identified using at least the identification of the identity and the identification of the predetermined data type schema; and
one or more data fields that identify the operation to be performed on the particular data object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 68, 69, 70, 71)
-
-
67. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a method for generating a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the method including the following:
-
generating and inserting a first set of one or more data fields into the data structure in accordance with the message schema, the first set of one or more data fields identifying an identity whose data object is desired to be operated upon;
generating and inserting a second set of one or more data fields into the data structure in accordance with the message schema, the second set of one or more data fields identifying an address of a service that manages data objects for a plurality of identities including the identity whose data object is desired to be operated upon, at least some of the data objects being organized in accordance with a data type schema;
generating and inserting a third set of one or more data fields into the data structure in accordance with the message schema, the third set of one or more data fields identifying the data type schema, wherein a particular data object that is desired to be operated upon may be identified using at least the identification of the identity and the identification of the data type schema;
generating and inserting a fourth set of one or more data fields into the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information that may be used to correlate the request with a response to the request; and
generating and inserting a fifth set of one or more data fields into the data structure in accordance with the message schema, the fifth set of one or more data fields identifying the operation to be performed on the particular data object.
-
-
72. A computer program product for use in a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, the computer-program product for implementing a method for generating a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the computer program product comprising a computer-readable medium having stored thereon the following:
-
computer-executable instructions for generating and inserting a first set of one or more data fields into the data structure in accordance with the message schema, the first set of one or more data fields identifying an identity whose data object is desired to be operated upon;
computer-executable instructions for generating and inserting a second set of one or more data fields into the data structure in accordance with the message schema, the second set of one or more data fields identifying an address of a service that manages data objects for a plurality of identities including the identity whose data object is desired to be operated upon, at least some of the data objects being organized in accordance with a data type schema;
computer-executable instructions for generating and inserting a third set of one or more data fields into the data structure in accordance with the message schema, the third set of one or more data fields identifying the data type schema, wherein a particular data object that is desired to be operated upon may be identified using at least the identification of the identity and the identification of the data type schema;
computer-executable instructions for generating and inserting a fourth set of one or more data fields into the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information that may be used to correlate the request with a response to the request; and
computer-executable instructions for generating and inserting a fifth set of one or more data fields into the data structure in accordance with the message schema, the fifth set of one or more data fields identifying the operation to be performed on the particular data object. - View Dependent Claims (73, 74, 75, 76, 77, 79, 80, 81, 82)
-
-
78. In a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, a method for interpreting a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the method including the following:
-
extracting and interpreting a first set of one or more data fields from the data structure in accordance with the message schema, the first set of one or more data fields identifying an identity whose data object is desired to be operated upon;
extracting and interpreting a second set of one or more data fields from the data structure in accordance with the message schema, the second set of one or more data fields identifying an address of a service that manages data objects for a plurality of identities including the identity whose data object is desired to be operated upon, at least some of the data objects being organized in accordance with a data type schema;
extracting and interpreting a third set of one or more data fields from the data structure in accordance with the message schema, the third set of one or more data fields identifying the data type schema;
identifying a particular data object that is desired to be operated upon based at least on the identification of the identity and the identification of the data type schema;
extracting and interpreting a fourth set of one or more data fields from the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information that may be used to correlate the request with a response to the request;
extracting and interpreting a fifth set of one or more data fields from the data structure in accordance with the message schema, the fifth set of one or more data fields identifying the operation to be performed on the particular data object;
performing the requested operation on the particular data object; and
returning a response to the request, the response including at least some of the correlation information.
-
-
83. A computer program product for use in a computer network that includes a plurality of applications that operate on data objects associated with identities, the computer network also including a plurality of services that maintain data objects associated with the identity, each service managing at least data objects that follow a corresponding data type schema, the computer program product for implementing a method for interpreting a data structure that represents a request to perform an operation on a data object associated with an identity, the data structure following a message schema, the computer program product comprising a computer-readable medium having stored thereon the following:
-
computer-executable instructions for extracting and interpreting a first set of one or more data fields from the data structure in accordance with the message schema, the first set of one or more data fields identifying an identity whose data object is desired to be operated upon;
computer-executable instructions for extracting and interpreting a second set of one or more data fields from the data structure in accordance with the message schema, the second set of one or more data fields identifying an address of a service that manages data objects for a plurality of identities including the identity whose data object is desired to be operated upon, at least some of the data objects being organized in accordance with a data type schema;
computer-executable instructions for extracting and interpreting a third set of one or more data fields from the data structure in accordance with the message schema, the third set of one or more data fields identifying the data type schema;
computer-executable instructions for identifying a particular data object that is desired to be operated upon based at least on the identification of the identity and the identification of the data type schema;
computer-executable instructions for extracting and interpreting a fourth set of one or more data fields from the data structure in accordance with the message schema, the fourth set of one or more data fields identifying correlation information that may be used to correlate the request with a response to the request;
computer-executable instructions for extracting and interpreting a fifth set of one or more data fields from the data structure in accordance with the message schema, the fifth set of one or more data fields identifying the operation to be performed on the particular data object;
computer-executable instructions for causing the requested operation to be performed on the particular data object; and
computer-executable instructions for causing a response to the request to be returned, the response including at least some of the correlation information. - View Dependent Claims (84, 85, 86, 87, 88)
-
Specification