Christopher G. Kaler - Sammamish WA, US John P. Shewchuck - Redmond WA, US David Langworthy - Kirkland WA, US Donald Box - Bellevue WA, US Steven E. Lucco - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/04
US Classification:
707102
Abstract:
Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. Communication of metadata is expedited using hash digests to confirm metadata versions, and by piggybacking policy metadata requests and responses on other substantive data communication messages, thereby dynamically altering future communications.
Christopher G. Kaler - Sammamish WA, US John P. Shewchuck - Redmond WA, US David Langworthy - Kirkland WA, US Donald Box - Bellevue WA, US Steven E. Lucco - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/00
US Classification:
707102, 707101, 707100
Abstract:
Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. Communication of metadata is expedited using hash digests to confirm metadata versions, and by piggybacking policy metadata requests and responses on other substantive data communication messages, thereby dynamically altering future communications.
Efficient Retrieval Of Information From A Network Service Using Soap
Jeffrey C. Schlimmer - Redmond WA, US Donald F. Box - Bellevue WA, US Luis Felipe Cabrera - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 13/00
US Classification:
719313, 719315, 709217, 709218, 709219
Abstract:
Information can be retrieved by a requesting computer system from a responding computer system using a SOAP-based get operation. In one implementation, a requesting computer system identifies an endpoint reference for content at a responding computer system. The requesting computer system then creates a SOAP get message for retrieving the content, where the message can include one or more constraints for receiving the content, and sends the message to the responding computer system using any appropriate transport protocol. The responding computer system receives the message, determines an extent to which the content can be provided, and creates a response message that relates to the first message. In one implementation, the reply can include an error message, at least a portion of the content, and, in some cases, another endpoint reference for retrieving the rest of the requested content.
Mechanisms For Transferring Raw Data From One Data Structure To Another Representing The Same Item
Sowmyanarayanan K. Srinivasan - Redmond WA, US Natasha H. Jethanandani - Seattle WA, US Stefan H. Pharies - Seattle WA, US Douglas M. Purdy - Carnation WA, US Donald F. Box - Bellevue WA, US Gopala Krishna R. Kakivaya - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709232, 707201, 707203
Abstract:
The transfer of raw data from a source data structure to a target data structure that represent the same item. During the data transfer, if there is a given field in the target data structure that does not correspond to a field supplied by the source data structure, the transfer mechanism determines whether or not it is mandatory that the source data structure supply the field. If it is mandatory, the transfer fails. Otherwise, the transfer continues. If there is field of the source data structure that does not correspond to a field of the target data structure, the transfer mechanism determines whether or not it is mandatory that the target data structure have the field. If it is mandatory, the transfer fails. Otherwise, the corresponding data may be provided to a residual field of the target data structure dedicated for unknown data.
Andrew D. Milligan - Redmond WA, US Donald F. Box - Bellevue WA, US Harris Syed - Kirkland WA, US Max Attar Feingold - Bellevue WA, US Saji Abraham - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 3/00 G06F 7/00 G06F 15/177 G06F 9/44
US Classification:
719328, 707 9, 709220, 717100
Abstract:
The present invention provides a mechanism that allows an administrative event to trigger or cause the generation of a dynamic web service during initialization of legacy application components. Similar to other types of static tooling approaches, the dynamic approach—as supported herein—uses available metadata describing an interface for communicating with legacy components. Rather than generating and manifesting the web service via tooling on a one time or occasional bases, however, example embodiments provide for the generation of the web service by the supporting infrastructure as a standard part of application initialization. Upon stopping the application, a termination sequence is provided that stops the corresponding dynamic web service and deletes the web service description used to generate the dynamic web service. Accordingly, every time the application is started the available metadata will need to be consulted and a consistent service will be built on-the-fly.
Flexible Context Management For Enumeration Sessions Using Context Exchange
Alan S. Geller - Redmond WA, US Donald F. Box - Bellevue WA, US Luis Felipe Cabrera - Bellevue WA, US Raymond W. McCollum - Monroe WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16 H04J 3/22
US Classification:
709207, 370471
Abstract:
Mechanisms for providing requested data items in a request-driven enumeration session while retaining control over how much inter-message context information is retained by the data provider. Upon receiving a request for the data items, the data provider identifies a portion of the data items to be provided in the first response along with context information that reflects that the first portion of information has been provided. The data provider then makes a determination of how much of the context is to be provided to the data receiver system, and then provides that appropriate context information to the data receiver. Furthermore, the data provider provides a response that includes the first portion of the data items. The data receiver includes this first provided context information in the second request for the next portion of the data items, allowing continuity in the data transfer session.
Valid Transformation Expressions For Structured Data
Christopher G. Kaler - Sammamish WA, US Donald F. Box - Bellevue WA, US Martin Gudgin - Sale, GB
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/00 G06F 17/00
US Classification:
707101, 707103 Y
Abstract:
Structuring a data structure that is of a particular type that has a particular schema used for validation, in a manner that permits selected components of the data structure to be optionally transformed while retaining the ability to validate the data structure. The data structure includes information that is sufficient to identify one or more transformations that may occur on at least one component of the data structure while still being valid.
John P. Shewchuk - Redmond WA, US Arun K. Nanda - Sammamish WA, US Donald F. Box - Bellevue WA, US Douglas A. Walter - Issaquah WA, US Hervey O. Wilson - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 29/06 H04L 9/32
US Classification:
726 10, 713178
Abstract:
A cryptographic session key is utilized to maintain security of a digital identity. The session key is valid only for a limited period of time. Additional security is provided via a bimodal credential allowing different levels of access to the digital identify. An identity token contains pertinent information associated with the digital identity. The identity token is encrypted utilizing public-key cryptography. An identifier utilized to verify the validity of the digital identity is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are provided to a service for example. The service decrypts the encrypted identity token utilizing public key cryptography, and decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted.