Kim Cameron - Bellevue WA, US Arun K. Nanda - Sammamish WA, US Andy Harjanto - Sammamish WA, US Stuart L. S. Kwan - Redmond WA, US John P. Shewchuk - Redmond WA, US Bill Barnes - Seattle WA, US Khushru Irani - Redmond WA, US Charles R. Reeves - Snohomish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
US Classification:
726 27
Abstract:
Exemplary embodiments disclosed herein may include a method and system for providing information to a user and safely disclosing identity information over the Internet comprising receiving information from a server, analyzing the information, presenting the analyzed information to a user for validation in a finite number of configurations controlled by a client, and validating of the information by the user.
Andrew D. Milligan - Redmond WA, US Charles R. Reeves - Snohomish WA, US Jeffrey B. Parham - Redmond WA, US Gopal Krishna R. Kakivaya - Sammamish WA, US Lawrence A. Buerk - Issaquah WA, US Angela Mills - Redmond WA, US Richard L. Hasha - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709231, 707 3, 719328
Abstract:
A system and methods for service discovery and publication are disclosed. Application programs write requests for service discovery, publication, and subscription to a service discovery application programming interface. The service discovery application programming interface invokes one or more lower-level protocols to satisfy the discovery, publication and/or subscription request. Service information retrieved from lower-layer protocols is formatted into a consistent data model and returned to the client application. In addition, service information may be stored in a persistent data store managed by a discovery persistence service communicatively connected to the service discovery API.
Jeffrey B. Parham - Redmond WA, US Charles R. Reeves - Snohomish WA, US Lawrence A. Buerk - Issaquah WA, US Angela Mills - Redmond WA, US Richard L. Hasha - Seattle WA, US Gopal Krishna R. Kakivaya - Sammamish WA, US Andrew D. Milligan - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16 G06F 9/46 G06F 17/30
US Classification:
709231, 707803, 719328
Abstract:
A system and methods for service discovery and publication are disclosed. Application programs write requests for service discovery, publication, and subscription to a service discovery application programming interface. The service discovery application programming interface invokes one or more lower-level protocols to satisfy the discovery, publication and/or subscription request. Service information retrieved from lower-layer protocols is formatted into a consistent data model and returned to the client application. In addition, service information may be stored in a persistent data store managed by a discovery persistence service communicatively connected to the service discovery API.
Cross Platform Network Authentication And Authorization Model
A model for authentication and authorization of users and applications that use network services. A client requests a ticket by providing credentials (user ID and password), e.g., over HTTP/SOAP/XML in the UDDI framework. An authentication adapter in a receiving server deserializes the request into a data structure that provides access to the security ID and password attributes, and passes these attributes to an ID management system to perform authentication. The credentials also determine the user's or application's privileges. The authentication adapter constructs a ticket object for the client incorporating the privileges and other information, e.g., the security ID and a date/time stamp. The ticket object is serialized, encrypted, encoded for transmission and inserted into an appropriately-formatted XML message and returned to the requesting client. The client attaches the authentication ticket to subsequent service requests that require authentication. To validate the ticket, the ticket object is reconstructed from the request data.
System And Method For Enabling Client Applications To Interactively Obtain And Present Taxonomy Information
Andrew Milligan - Redmond WA, US Charles Reeves - Snohomish WA, US
Assignee:
MICROSOFT CORPORATION - REDMOND WA
International Classification:
G06F017/30
US Classification:
707/003000
Abstract:
A system and method for enabling UDDI client applications to interactively obtain taxonomy information from a UDDI server and thereby present that information to a user, such as to enable navigation through the taxonomy. An application programming interface is provided by which a client application sends a unique taxonomy identifier and a relationship qualifier (e.g., root, parent and/or child) to a server. The client may also identify a reference node within the taxonomy. The server receives the (e.g., XML) request message, and extracts the data to query a database based on the relationship qualifier (or qualifiers) and the taxonomy/reference node. Based on the query results, the server returns a response that provides relationship information to the client, such as information on root, parent and/or child nodes that satisfy the request. The client interprets the response to present the taxonomy, such as for user navigation through the taxonomy.
System And Method For Managing Access Points To Distributed Services
Charles Reeves - Snohomish WA, US Andrew Milligan - Redmond WA, US Lucas Melton - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F015/173
US Classification:
709225000
Abstract:
A system and method comprising a client-side manager component that manages access points (such as URLs) to distributed services for client applications. The client application hosts the client-side manager, and specifies criteria for a service. The manager component uses the criteria to query a service registry, such as a UDDI-based registry, and caches the returned list. To use a service, the client calls the manager component on a defined interface, and the manager component returns one of the cached access points. The cached access points may be returned based on an ordering, such as to distribute requests among services. If the service fails, the client calls a failure-related method of the manager component with failure details, and retrieves a new access point. The manager component reports the error to an error handling service, whereby the error information may be used in a quality of service statistic at the service registry.
Lucas Melton - Redmond WA, US Charles Reeves - Snohomish WA, US Luc Clement - Sammamish WA, US Eric Lee - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F007/00
US Classification:
707003000
Abstract:
A system and method for use with a taxonomy-based search service that locates expanded information based on a query the client has proposed, by performing an automatically expanded branching of the query. The client specifies a starting point (corresponding to an origin node) in the taxonomy along with one or more genealogical directions to expand the search, such as to parent, children and/or sibling nodes. Variables may specify how many generations upward and/or downward should be included in the expanded search. A middle tier receives the request and converts it to the relevant queries needed to query a database that maintains the taxonomy, such that the client receives a result set that contains expanded results without needing any contextual knowledge of the taxonomy. The middle tier may be implemented, for example, in a UDDI-based environment that helps clients locate web services and other information.
Jan Alexander - Duvall WA, US Christopher G. Kaler - Sammamish WA, US Charles R. Reeves - Snohomish WA, US Hervey O. Wilson - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/04
US Classification:
340 584
Abstract:
The claims based identity model provides a model which associates security identities with claims. The model represents information contained in the claims, as well as, captures relationships between the security identities described in the claims. Finally, the data model can be easily translated to the existing .NET environment without breaking the backward compatibility for existing .NET applications.