Message processing methods and systems
First Claim
1. A method of processing a message during a message exchange in a distributed computing environment, the method includingreceiving a message and, on the basis of the content of the message and an enforcement configuration policy providing a specified set of conditions dictating what enforcement actions should be carried out on the message and what order,selecting a plurality of the enforcement actions, from available enforcement actions, to be applied in a particular order to the message,providing an association or mapping between enforcement actions and respective interceptors;
- identifying interceptors that correspond to each of the enforcement actions based on associations which are administrator-editable anddeploying an ordered interceptor chain comprising the identified interceptors to apply the selected plural enforcement actions in the particular order,wherein, in response to a detection of a fault by a deployed interceptor, determining, based on the fault, if a policy update is required and responsive to the determination;
a) updating the policy; and
b) deploying the updated policy.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for controlling the operation of a distributed application using message interception techniques are disclosed. The message interception software is independent of the software components making up the distributed application. The message interception software processes messages by carrying out a series of actions set out in an interceptor chain configuration policy, that policy being selected on the basis of the contents of the intercepted message. The interceptor chain configuration policy is divided into a separate enforcement configuration policy which dictates what actions should be carried out on a message and in what order, and an interceptor reference policy which indicates references to interceptors which are suitable for carrying out the actions specified in the enforcement configuration policy. In this way, the behavior of the message interception software (and thus the distributed application) can be updated while both the interception software and the distributed application are running without requiring the person updating the behavior of the message interception software to deal with esoteric references to interceptor software routines.
45 Citations
31 Claims
-
1. A method of processing a message during a message exchange in a distributed computing environment, the method including
receiving a message and, on the basis of the content of the message and an enforcement configuration policy providing a specified set of conditions dictating what enforcement actions should be carried out on the message and what order, selecting a plurality of the enforcement actions, from available enforcement actions, to be applied in a particular order to the message, providing an association or mapping between enforcement actions and respective interceptors; -
identifying interceptors that correspond to each of the enforcement actions based on associations which are administrator-editable and deploying an ordered interceptor chain comprising the identified interceptors to apply the selected plural enforcement actions in the particular order, wherein, in response to a detection of a fault by a deployed interceptor, determining, based on the fault, if a policy update is required and responsive to the determination; a) updating the policy; and b) deploying the updated policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of exchanging messages in a distributed computing environment, the method including for each received message
selecting, on the basis of the content of the message and an enforcement configuration policy providing a specified set of conditions, a plurality of enforcement actions, from available enforcement actions, to be applied in a particular order to the message, the enforcement configuration policy dictating what enforcement actions should be carried out and what order, providing an association or mapping between enforcement actions and respective interceptors; -
identifying interceptors that correspond to each of the enforcement actions based on associations which are administrator-editable; and deploying an ordered interceptor chain comprising the identified interceptors to apply the selected plural enforcement actions in the particular order, wherein, in response to a detection of a fault by a deployed interceptor, determining, based on the fault, if a policy update is required and responsive to the determination; a) updating the policy; and b) deploying the updated policy. - View Dependent Claims (18)
-
-
19. A computer system arranged to process a message during a message exchange in a distributed computing environment, the computer system including:
-
an input for receiving a message, an output for delivering a processed message, a computer-readable store, the store storing an enforcement configuration policy providing a specified set of conditions dictating what enforcement actions should be carried out on the message and what order, a computer-readable store, the store storing an association or mapping between enforcement actions and respective interceptors; a processing system having at least one processor, the processing system being arranged to inspect the content of a received message, on the basis of the content of the message and the conditions, identify a plurality of the enforcement actions, from available enforcement actions, to be applied in a particular order to the message, use associations to identify interceptors that correspond to each of the enforcement actions and deploy an ordered interceptor chain comprising the identified interceptors to apply the selected plural enforcement actions in the particular order, said associations being administrator-editable, wherein the processing system is further arranged to, in response to a detection of a fault by a deployed interceptor, determine, based on the fault, if a policy update is required and responsive to the determination to; a) update the policy; and b) deploy the updated policy. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory computer readable medium storing instructions, which upon execution by at least one computer, process a message during a message exchange in a distributed computing environment by at least:
-
selecting plural enforcement actions, from available enforcement actions, to be applied in a particular order to the message on the basis of the content of the message and an enforcement configuration policy providing a specified set of conditions dictating what enforcement actions should be carried out on the message and what order, providing an association or mapping between enforcement actions and respective interceptors; identifying interceptors that correspond to each of the enforcement actions based on associations which are administrator-editable and deploying an ordered interceptor chain comprising the identified interceptors to apply the selected plural enforcement actions in the particular order, wherein, in response to a detection of a fault by a deployed interceptor, determining, based on the fault, if a policy update is required and responsive to the determination; a) updating the policy; and b) deploying the updated policy.
-
Specification