US20160182645A1 - Managing messages sent between services - Google Patents
Managing messages sent between services Download PDFInfo
- Publication number
- US20160182645A1 US20160182645A1 US15/056,236 US201615056236A US2016182645A1 US 20160182645 A1 US20160182645 A1 US 20160182645A1 US 201615056236 A US201615056236 A US 201615056236A US 2016182645 A1 US2016182645 A1 US 2016182645A1
- Authority
- US
- United States
- Prior art keywords
- message
- service
- messages
- request
- call
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000004044 response Effects 0.000 claims abstract description 55
- 238000000034 method Methods 0.000 claims abstract description 48
- 238000012545 processing Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 10
- 230000000717 retained effect Effects 0.000 abstract description 15
- 238000013515 script Methods 0.000 description 44
- 238000012384 transportation and delivery Methods 0.000 description 21
- 230000008569 process Effects 0.000 description 15
- 230000015654 memory Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 9
- 230000008520 organization Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000010354 integration Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 235000008694 Humulus lupulus Nutrition 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000002596 correlated effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 101100339496 Caenorhabditis elegans hop-1 gene Proteins 0.000 description 2
- 101100339504 Schizosaccharomyces pombe (strain 972 / ATCC 24843) meu13 gene Proteins 0.000 description 2
- 238000013474 audit trail Methods 0.000 description 2
- 230000000875 corresponding effect Effects 0.000 description 2
- 238000013501 data transformation Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 240000005020 Acaciella glauca Species 0.000 description 1
- 206010000210 abortion Diseases 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011112 process operation Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 235000003499 redwood Nutrition 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/465—Distributed object oriented systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/44—Distributed routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/142—Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H04L67/327—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/63—Routing a service request depending on the request content or context
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/50—Aspects of automatic or semi-automatic exchanges related to audio conference
- H04M2203/5063—Centrally initiated conference, i.e. conference server dials participants
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q11/00—Selecting arrangements for multiplex systems
- H04Q11/04—Selecting arrangements for multiplex systems for time-division multiplexing
- H04Q11/0407—Selecting arrangements for multiplex systems for time-division multiplexing using a stored programme control
Definitions
- Some of the disclosed implementations relate to methods and apparatus for processing data within a computer network. More specifically, some of the implementations relate to correlating messages sent within such computer network.
- EAI enterprise application integration
- EAI suppliers typically offer end point solutions for managing business process interactions between end points within a computer network.
- a specific enterprise software package may be designed to transparently handle diverse business processes carried out by two or more end nodes
- each specific enterprise software package requires releasing customized connectors or adapters which will work for the specific business processes and applications used by the specific end nodes.
- these enterprise solutions are not easily scalable.
- scores of adapters need to be built for each vendor (for example, Oracle corporation of Redwood Shores, Calif., SAP AG of Waldorf, Germany, and PeopleSoft Inc. of Pleasanton, Calif.).
- EAI vendors find themselves unable to gain traction under the burden of supporting their existing adapters.
- EAI software costs and resource investments of EAI prevent small-to-medium enterprise (SME) customers from embracing EAI solutions.
- SME small-to-medium enterprise
- ASPs application service providers
- the web service provider market is one of the fastest growing segments of the software industry.
- Service providers make enterprise applications (e.g., human resources administration, recruiting, travel and expense management, sales force automation) available to customers over the web at a server device. Those applications are fully managed and hosted by the provider, providing significant cost savings to enterprises.
- Some providers merely host and manage third-party packaged software for their customers (“managed hosts”). Others build new applications from the ground up to take advantage of the benefits and cost-savings of web service provider model. Service providers enjoy the profit margins and operational scalability of consumer Web companies like eBay Inc. of San Jose, Calif., and Yahoo! Inc. of Sunnyvale, Calif., while at the same time offering the feature sets of complex enterprise software applications such as software applications by PeopleSoft and Siebel Systems Inc. of San Mateo, Calif.
- the service provider approach allows a single business to set up a host server for allowing itself and its business partners to use third party or customs applications, this approach does not allow the set up and dismantling of complex arrangements between business partners. For instance, a first business may wish to allow a second business to access a first set of services, while the second business may wish to provide a second different set of services to the first business.
- a method for correlating services within a computer network is disclosed.
- a message interchange network for exchanging application-level messages between services, which are located outside the message interchange network, is provided.
- a plurality of application-level messages which each specify which one or more receiving services are to receive the each application-level message, are received.
- Each received application-level message is forward towards the one or more receiving services.
- Correlation information regarding each application-level message that is received into message interchange network is retained.
- the application-level messages are sent between pairs of the services, and the retained correlation information for each application-level message pertains to each application-level message and any other application-level messages related to the each application-level message.
- a query can then be received, at the message interchange network from a first service, to search the retained correlation information for specific one or more portions of the retained correlation information.
- a response to the query which includes the specific one or more portions of the retained correlation information, is sent to the first service.
- each service is registered at the message interchange network so that each registered service is specified as being accessible by one or more specific services.
- the retained correlation information for each application-level message further includes an indication as to whether the each application-level message has completed transmission.
- the session information for each session includes a Session Identifier (ID) uniquely identifying the each session and the session information for each session further includes an indication as to whether the each session is complete and a reason for the session not being complete if the each session fails to complete.
- the query for the retained correlation information is regarding a particular session or call and wherein the specific portions of the retained correlation information that are sent to the first service are related to the particular session or call of the query.
- a computer system is operable to correlate services within a computer network.
- the computer system includes one or more processors and one or more memory. At least one of the memory and processors are adapted to provide at least some of the above described method operations.
- a computer program product provides correlation of services within a computer network.
- the computer program product has at least one computer readable medium and computer program instructions stored within at least one of the computer readable product configured to perform at least some of the above described method operations.
- FIG. 1 illustrates a message exchange network in accordance with some implementations.
- FIG. 2 illustrates components in a message exchange network in accordance with some implementations.
- FIG. 3 illustrates a request response pattern example
- FIG. 4A is a diagrammatic representation of a communication exchange between a plurality of services in accordance with some implementations.
- FIG. 4B illustrates a group of related messages within another example communication exchange in accordance with some implementations.
- FIG. 4C is a flowchart illustrating a procedure for correlating messages in accordance with some implementations.
- FIG. 4D is illustrates a Message Correlation Table for correlating information regarding each message, a Call Correlation Table for correlating information regarding each call, and a Session Correlation Table for correlating information regarding each session, in accordance with some implementations.
- FIG. 5 is a diagrammatic representation of an example computer system in which some implementations may be provided.
- EAI enterprise application integration
- This open platform overlays a public network (e.g., the Internet) and does not require business entities to heavily invest in specialized software and resources.
- a public network e.g., the Internet
- SME small- and medium-sized enterprise
- the open platform can be used to support services provided by business-to-business (B2B) enablers, system integrators, and other node enablers.
- B2B business-to-business
- FIG. 1 illustrates a high-level overview of a message interchange system 100 .
- Message interchange system 100 includes a Message Interchange Network 150 that enables SMEs 110 - m , webware ASPs 120 - n , and in-transit processors (ITPs) 130 - p to connect to one another, integrate business processes and applications, and exchange data for mission-critical business functions.
- ITPs 130 - p are operative to process messages that are in-transit from a sender to a recipient.
- ITPs 130 - p can be designed to perform a variety of functions such as data transformation, enrichment, cross-reference ID mapping, filtering, credit scoring, or the like.
- a directory (not shown) includes a list of all SMEs 110 - m , webware ASPs 120 - n and ITPs 130 - p that can be accessed via Message Interchange Network 150 . Only publicly available services (i.e., those services that organizations register as accessible by any user of the network) are viewable in the directory.
- all applications that are connected to Message Interchange Network 150 can be referred to as a service.
- applications owned by SMEs 110 - m , webware ASPs 120 - n and ITPs 130 - p can each be referred to as services.
- Each service is owned by an organization, and an organization can have any number of services connected to Message Interface Network 150 . The message exchange within Message Interface Network 150 is therefore between services.
- services that receive messages can take a set of arguments that further define the intended action the service will perform on a received message.
- a service may receive the name of an operation, or may permit configuration parameters.
- the service would provide a means (e.g., through a URL to documentation) for message composers to know about arguments accepted by the particular service.
- the message composer can then include selected arguments as a part of the service declaration in a message.
- services registered with Message Interface Network 150 represent applications that send or receive messages.
- An organization may, however, wish to create virtual services which act as proxies to other services.
- a business X may have a relationship with business Y such that messages sent to business X's service are redirected to business Y's service.
- Services can implement redirection through routing scripts that map invocations of the service to invocations of another service, including redirection of replies.
- Message Interface Network 150 For each service registered by an organization with Message Interface Network 150 , there are a number of properties and permissions that can be associated with the service. Examples include a unique service identifier, authentication information, mode of message delivery, windows of time during which messages are accepted, URL address of service, permission to invoke other services to act on a message, and rules that modify the invocation of services. These properties and permissions affect the routing of messages from or to the service.
- FIG. 2 illustrates the primary functional components that operate within message interchange system 100 .
- the five primary functional components include service software development kit (SDK) component 210 , web interface component 220 , message router component 230 , repository component 240 , and billing component 250 .
- SDK service software development kit
- SDK component 210 serves as a foundation for supported development of client applications that interface with Message Interface Network 150 . Owning organizations can use SDK component 210 for custom integration with their software applications. As would be appreciated, SDK component 210 is not required to enable a service to access Message Interface Network 150 . A service can use any development tool or process that would enable the service to leverage the application programming interface (API) that is supported by message router component 230 .
- API application programming interface
- SDK component 210 enables the provision of an interface that would be available on most common platforms, and in most popular languages. In this manner, SDK component 210 abstracts away the complex technical requirements of transferring messages using Message Interface Network 150 .
- SDK component 210 need not have any business logic built into it. SDK component 210 can be used to develop plug-ins to shrink-wrapped applications, thereby greatly reducing development time. As would be appreciated, SDK component 210 can provide convenient libraries and utilities that a service may optionally use to facilitate the (1) creation and reading of messages conforming to the message router component API, and (2) authentication of users of Message Interface Network 150 .
- Repository component 240 is the primary database of Message Interface Network 150 .
- Repository component 240 includes information on customer profiles, message logs, and directories.
- message router component 230 uses repository component 240 to retrieve customer and application information that affects message routing.
- Message router component 230 also writes message log information to repository component 240 about messages that are processed through Message Interface Network 150 .
- Billing component 250 uses the message log information in repository component 240 to derive actual usage of Message Interface Network 150 by customers, and handles the invoicing and payment collection from customers.
- the billing within message interchange system 100 can be based upon actual customer usage of Message Interface Network 150 .
- billing component 250 can charge customers based on a per transaction basis.
- the per-transaction cost is based on the size of the messages being processed. As would be appreciated, these per transaction costs can be assessed to parties in a variety of ways. For example, the costs can be assessed against the originator of the message, the intermediate services, the recipient of the message, or any combination of those parties. This billing flexibility is in sharp contrast to conventional EAI solutions that generate revenue through software license fees.
- Web interface component 220 is the front-end component of Message Interface Network 150 .
- Web interface component 220 interfaces directly with users by enabling login, registration, account maintenance, directory lookup, rules configuration, reporting, billing, and customer support functionality.
- the web interface provides online forms for data entry and can perform preliminary validations on the data.
- the user can also perform queries against repository component 240 for directory lookups or reporting.
- Message Interface Network 150 is an open network architecture that not only facilitates the easy introduction of services into the network, but also enables businesses to access a robust suite of services via one connection to the Message Interface Network 150 .
- message router component 230 provides the core function of message routing and delivery within Message Interface Network 150 .
- message router component 230 is implemented as an Internet-based message exchange service that provides a transport level messaging service. In other words, message router component 230 need not be aware of the application semantics of a message exchange.
- Message Interface Network 150 need not inherently provide business process modeling. This is in contrast to conventional EAI solutions that may require a continual traversal up and down a protocol stack in routing a message from a sending service to a recipient service. For example, if the protocol stack included transport, routing, transformation, and work flow layers, then each message exchange segment may require analysis and processing at each layer to determine the next service (intermediate or final) that should receive the message.
- services can post messages to and retrieve messages from message router component 230 using an API.
- This provision of a standardized interface enables parties to easily connect to and use Message Interface Network 150 without being restricted in the type of message content.
- the protocol for posting and retrieving messages with Message Interface Network 150 is the Simple Object Access Protocol (SOAP).
- SOAP messaging protocol defines a mechanism to pass commands and parameters between HTTP clients and servers. Through this standard object invocation protocol, HTTP is used for transport and XML is used for data encoding.
- the SOAP messaging protocol does not rely on the use of particular operating systems, programming languages, or object models on either the server side or the client side. As would be appreciated, other protocols can also be supported by Message Interface Network 150 .
- the message body can accommodate any type of data, whether it be text or binary, encrypted or unencrypted. If the message body is also in XML form, then the message body can opt to use a schema based on an industry standard such as ebXML, BizTalk, RosettaNet, OAGIS, or any other suitable standard.
- XML extensible markup language
- message exchange through Message Interface Network 150 is asynchronous.
- Recipient services can be configured to poll Message Interface Network 150 for incoming messages, or, if they have their own server, can have Message Interface Network 150 push messages to them.
- in-transit services 130 - p can operate on the message before it reaches the recipient service.
- In-transit services can perform useful operations on messages, such as data transformation, enrichment, cross-reference ID mapping, filtering, credit scoring, or the like.
- in-transit services 130 - p can independently join the Message Interface Network 150 and operate on messages. This flexibility encourages independent third parties to build services that can be plugged into Message Interface Network 150 . Such an open network would encourage third parties to market a data service that generates revenue based upon the level of utilization of the service.
- in-transit services can be included in a message path that begins at a sending service and terminates at a recipient service.
- sending services can explicitly specify a set of services to operate on a given message.
- recipient services can specify services that should operate on messages before delivery to the recipient service. In one example, a recipient may always want messages to pass through a filtering service to screen out messages from unknown senders.
- Messaging through Message Interface Network 150 can be as secure as the participants desire.
- Each service registered with Message Interface Network 150 can specify a security policy declaring encryption and authentication levels for Message Interface Network 150 to enforce.
- a sender can also specify the permissions for each in-transit service to access or operate on parts of the message.
- Message Interface Network 150 uses the secure HTTPS protocol to support secure transport connections when a service posts a message or polls for messages, and when Message Interface Network 150 pushes messages to a client server. Authentication can be based on either username/password or certificates.
- SSL encryption as part of HTTP can be used to provide data protection during message transmission over the public Internet. In general, this level of protection is sufficient for most situations. Services can, however, perform their own extra encryption of message documents to keep them private even from Message Interface Network 150 . Services that add extra encryption can ensure, however, that all services that operate on the message documents have the necessary keys to decrypt the documents.
- the authentication protocol of SSL includes a server's presentation of a certificate to clients. Accordingly, Message Interface Network 150 presents a server certificate to services that connect for posting or polling. The connecting service has the option of then providing either a username/password or certificate for Message Interface Network 150 to authenticate the service.
- the form of client authentication is a configuration option within the profile Message Interface Network 150 maintains for each service.
- the service's server can present a server certificate to Message Interface Network 150 for authentication of the service.
- the service can then require either a username/password or certificate from Message Interface Network 150 . Again, that option can be configured in the profile information Message Interface Network 150 maintains for the service.
- Message Interface Network 150 maintains an audit trail of all operations on the message and all services that touched the message.
- the audit trail serves several purposes. First, it enables Message Interface Network 150 to reconstruct the message history in the case of queries on the message trail. Second, it allows Message Interface Network 150 to compile a usage report for any service for reporting and billing purposes.
- a message can be embodied as a self-contained collection of information to serve a particular purpose, such as a request, a response, a notification, or an acknowledgement.
- Message Interface Network 150 can generally be agnostic about the content of a message other than header information that affects routing of the message.
- request, response, and notification messages can be defined.
- a request message expects a subsequent response message from the recipient(s) to be returned to the sender.
- Request messages may represent inquiries, but might also represent update requests that only expect a return status response. If an error occurs in routing a request message, Message Interface Network 150 returns an error response message to the sender.
- a response message is issued by a recipient of a request message.
- the response message references the original request message. Failure of the response message may result in an error response message being returned to the sender of the original request message.
- a notification message is a one-way message. No response to the notification message is expected back to the sender. Message interchange network 150 can regard any response message referencing a notification message as an invalid message. If a notification message fails, no error message is returned to the sender.
- a cancel message can also be defined, wherein the cancel message is used by the sender to cancel a previous message.
- FIG. 3 This illustration demonstrates a typical example of a sending service 310 , such as an enterprise, making an inquiry to a recipient service 360 , such as a webware provider.
- a sender's application 312 that connects to Message Interface Network 150 is a desktop application.
- a sender's application 312 that connects to Message Interface Network 150 is an enterprise server, or an EAI package.
- the first step in the message transaction process is the creation of a message.
- a sender formats the messages to conform to an XML schema for messages. This XML schema prescribes the format for message headers while allowing any kind of data to be included in the message body (or payload).
- sending service 310 specifies the recipient service(s) 360 of the message.
- a recipient service's name includes an organization and a specific service provided by that organization. The service name can be generally represented in the message via a globally unique ID.
- a message includes a header element, a body element and/or attachments.
- the attachments are based on multi-part Multipurpose Internet Mail Extensions (MIME).
- MIME Multipurpose Internet Mail Extensions
- An embodiment of a message includes header and body elements.
- the actual message format can differ depending on the protocol.
- protocols other than the SOAP protocol can be used.
- the header element may include routing and invocation information.
- the header as posted by a sending service may often be modified by Message Interface Network 150 for delivery to the receiving service.
- the body element may include the documents the sender is sending to the recipient(s). These documents can also be operated upon by one or more services.
- the documents can be in the form of XML or any other representation, including text, binary, etc. In one embodiment, all or part of the documents that are being sent are included in an attachment to the message.
- While messages preferably have a similar overall structure, the actual composition of elements can differ between the various message types and between messages as posted and as delivered. For example, some elements in a sent message can be changed or not be included in the message as delivered, such as elements particular to constructing a route. Some elements can also be inserted only in the message as delivered, such as identifier elements.
- the sending service can specify an explicit sequence of services that should operate on the message.
- the sender can also implicitly include services in the route for a message through the specification of routing scripts associated with the defining service. Routing scripts are described in greater detail below.
- FIG. 3 illustrates an example posting of a message by application 312 to message post interface 324 .
- the posting of a message is performed using the SOAP messaging protocol.
- sending service 310 posts a message that does not have well-formed XML
- the message posting is rejected and an error response is returned.
- messages can be rejected for a variety of other reasons. For example, a message can be rejected if the service indicated in the message header as the sender is not the same as the actual sender of the message, the message is a duplicate posting of a previous message, a service attempts to reply to a message for which it was not a recipient, or a response message does not reference a prior message.
- each message posted by a service can have a unique handle assigned by the service to identify the message. This unique handle can be used to provide a means for Message Interface Network 150 to detect duplicate postings of the same message. Duplicate postings can occur in the case of failure recovery by the service.
- a service specifies that Message Interface Network 150 should reject duplicate postings of a message, then the service could provide unique handles for messages and set a “potential duplicate” flag in messages that may be a duplicate posting.
- Message Interface Network 150 can assign a globally unique session identifier to each posted message.
- Message Interface Network 150 routes the message to the recipient service(s) 360 .
- the routing of the message is based upon a route calculation by Message Interface Network 150 .
- the calculated route includes all intermediary services 350 that are scheduled to operate on the message en route to recipient service(s) 360 .
- the calculated route can be based on routing instructions specified explicitly in the message header and/or on routing scripts pre-defined by the sending service 310 , recipient service 360 , or any in-transit services 350 that have been included within the calculated route.
- routing scripts define a procedure for enabling determination of at least part of a route. This procedure can be based on any type of criteria. For example, a procedure can be defined that determines a next destination of a message based on the existence of one or more attributes of the message. In another example, a procedure can be defined that effects a determination based on the comparison of one or more attributes of the message to a reference value. In yet another example, a procedure can be defined that effects a determination based on pattern matching (e.g., regular expression matching). As would be appreciated, routing scripts can embody any of a variety of criteria-based procedures.
- Routing scripts can specify a sequence of services that operate on either inbound or outbound messages for a service. As noted, in-transit services may themselves have routing scripts requiring processing by other services. Therefore, the route calculation can be recursively defined based upon routing scripts specified by all services that interact with the message.
- the sending service 310 may specify a routing script that requires a cross-reference mapping service to be included in the calculated route whenever sending service 310 sends a message to recipient service 360 .
- recipient service 360 may specify a routing script that requires that any incoming request messages must first pass through a filter service to block messages from a list of sending services 310 .
- Routing scripts enable sending services to include services into the message route without having to explicitly specify the services in the message itself. Also, routing scripts enable recipient services 360 to require services 350 to be in the calculated route, regardless of the sending service's route specification.
- a routing script is embodied as a routing rule.
- a routing rule includes two parts: a condition and one or more resultant actions.
- the conditional part of a rule can be based on any elements or element attributes in a message's header. Additionally, content-based routing can be supported through conditional rules based on attributes of an element in a message's body and/or attachments.
- Every rule generally has at least one condition.
- Conditions include an operator and zero or more operands.
- Example operators include equals, notEquals equalsOneOf, lessThan, greaterThan, and exists operators. In one embodiment, operators act on XML elements, XML attributes, or on other conditions.
- XML elements contain either child elements or character data. Therefore, the operands for an element comparison both represent the same type of content: either elements or character data. Character data can be in the form of a string, number, or date. Conditions involving elements that do not appear in the message will evaluate to false.
- Attributes generally have a type of character data, which can be string, number, or date. Many attributes are implicitly included in an XML document with default values. Therefore, an attribute identified in a condition can refer to either an explicit or implicit attribute. Conditions involving optional attributes that do not appear in the message will evaluate to false.
- Example condition operators include AND, OR, XOR, and NOT condition operators.
- rule actions can be defined, and several are described further in the above reference Lev Brouk et al. U.S. patent application.
- a service can maintain an evaluation sequence for the scripts associated with each role that the service can have with respect to a message. That sequence determines the order in which the scripts for that service are applied.
- scripts are evaluated in the following order: (1) scripts for the sender of the message; (2) scripts for services included by the scripts for the sender (this is recursive); (3) scripts for the recipients of the message, in the order of recipients in the message header; and (4) scripts for services included by scripts for the recipients (this is recursive).
- scripts for a service When multiple scripts for a service include services into a route, the order of services in the route will follow the order of the scripts. That is, if script 1 inserts service A, and script 2 inserts service B, and if script 1 is evaluated before script 2, then service B follows service A in the route.
- routing scripts are evaluated only once during the initial calculation of the route for a message.
- the message header contains the basic information to initially construct a route, such as sending service 310 and recipient services 360 .
- the message can also contain an explicit specification of a set of services to include in the route. Once the route is constructed from the header information, routing scripts are applied to further elaborate the route.
- At least part of the message route is calculated after the physical routing of the message has begun. Dynamic routing is described in greater detail below in the context of physical and logical routing.
- Message Interface Network 150 routes a message to a service by delivering the message through the Internet to a physical machine on which the service resides. That service operates on the message and, if the message is a request, returns a response message back through the Internet to Message Interface Network 150 .
- the sequence of message deliveries and responses between Message Interface Network 150 and services represents the physical routing of a message.
- Message interchange network 150 also provides a mechanism for a service to act on a message without the message being physically delivered to the service over the Internet. This mechanism is enabled through the logical routing of the message to the service. With logical routing, a service can modify the routing of the message or modify the context of the message for delivery to the next service. Significantly, a service can be logically included in a message routing, without being included as part of the physical routing of the message.
- logical routing of messages is implemented through the specification of routing scripts.
- a service can define one or more routing scripts. These defined routing scripts are stored within Message Interface Network 150 and are processed to determine what routing behavior should occur when a message is logically routed to the service.
- Logical routing can take place statically or dynamically. With static logical routing, a message is logically routed to all services prior to any physical routing. In other words, Message Interface Network 150 logically routes the message to all services prior to the physical delivery of a message to any services. This logical routing is represented by the sequential evaluation of the routing scripts that are defined by those services. As noted above, in one embodiment, the routing scripts are evaluated in the following order: (1) scripts for the sender, (2) scripts for the services included by the sender (recursive), (3) scripts for the recipient, and (4) scripts for the services included by the recipient (recursive).
- the logical routing is not completed prior to the start of the physical routing. Rather, the logical routing takes place in sequence with the physical routing of the message. The relation between logical routing and physical routing is described in greater detail below.
- Message Interface Network 150 delivers a message logically to every service participating in a message's routing. Of those services, some subset will also accept physical delivery of the message.
- Service A includes service B into the message route.
- Service A can include service B into the route either prior to itself in the route (provided service A is not the originator of the message) or after itself in the route.
- Message Interface Network 150 would logically route the message first to service A, which includes service B into the route.
- Message interchange network 150 then logically routes the message to service B, and after service B produces a response, Message Interface Network 150 logically returns the response to service A.
- the point at which service A physically receives the message depends on whether service A included service B prior or after itself in the route. If service A includes service B prior to itself in the route, then the order of physical delivery is first to service B then to service A.
- service A includes service B after itself into the route, then the order of physical delivery is first to service A then to service B. In the latter case, the response from B is not necessarily physically delivered back to service A. Rather, it may be only logically delivered back to service A.
- Services to which a message is logically routed do not necessarily have to also physically receive the message.
- service A could have been logically routed, with physical delivery only to service B.
- service X includes service A into the route and service A includes service B into the route.
- the logical routing of the message would proceed from service X to service A to service B back to service A back to service X.
- Service A can choose not to be included into the route for physical delivery, in which case the physical routing of the message is from service X to service B.
- the act of routing a message (physically or logically) to a service can be thought of as an invocation of the service.
- a service includes another service into the route of a message, the including service is effectively invoking the included service.
- the invocation of a service does not necessarily imply the physical delivery of information to the invoked service.
- the logical routing of a message is then the logical invocation of services.
- a route that includes a progression of services including other services can effectively be modeled as a progression of invocations.
- each service is not only able to manage the inclusion of other services into the route but is also able to manage the context of those inclusions.
- an invoking service is able to set the context for the invocation.
- An invoked service can also set the context of its return.
- Message interchange network 150 can also affect context management on behalf of invoking services. As noted, while an invoking service can be logically included in a message routing, it need not be included as part of the physical routing of the message. In general, Message Interface Network 150 can persistently store contexts of a message, thereby enabling proper restoration of contexts upon return from an invocation. Several embodiments of context management are described in the above referenced Lev Brouk et al. U.S. patent application.
- Message Interface Network 150 validates the route. There are numerous conditions that can cause a route to be invalid. For example, there may be routing permission violations or a service may be currently disallowed by Message Interface Network 150 due to, for example, the non-payment of usage bills.
- Message Interface Network 150 rejects the posted message and may return an error to the sending service 310 either in the response to the posting call or in an error message.
- Message interchange network 150 routes the message to all services in the calculated route. In the event of failure at any stage in the routing, Message Interface Network 150 aborts the message routing and, if the original message was a request, returns an error message back to sending service 310 . For messages with multiple recipients, an error in the routing to one recipient will not necessarily affect routing to other recipients. Errors during routing can occur due to several circumstances. For example, a message may fail to reach a recipient within the expiration time for the message, a service may fail to return a reply to a delivered message, or a service may return an error status for a message.
- Message Interface Network 150 sequentially delivers a message to each service identified in the message route. In FIG. 3 , this process is illustrated as a flow of the posted message through message routing element 340 , and on to one or more services 350 . In one embodiment, Message Interface Network 150 includes all of the message documents in the message delivered to service 350 , even if service 350 only expects to operate on one document or documents of a particular content-type. Service 350 would ignore documents that it does not expect.
- Message Interface Network 150 invokes in-transit services in the same way as delivering a message to any sending or recipient service.
- a service does not necessarily need to be aware whether it is being invoked as an in-transit service or as a recipient service.
- service 350 After processing the message, service 350 sends the results in a response message back to Message Interface Network 150 . If service 350 is unable to produce a valid result for its operation on a message, then service 350 may return an error code in its response message to Message Interface Network 150 . If service 350 fails to respond to a received message, the message will ultimately expire, and Message Interface Network 150 may return an error message back to the sending service 310 .
- Message Interface Network 150 Upon receipt of the response message from service 350 , Message Interface Network 150 then routes the message to the next destination (e.g., another service 350 ) on the routing list. After passing through each of the intermediate destinations on the routing list, the message is then stored in queue 334 for recipient service 360 . Queues can also be associated with in-transit services 350 . For simplicity, these queues are not shown in the illustrated embodiment of FIG. 3 .
- Application 372 in recipient service 360 can retrieve the message from queue 334 via message poll interface 328 .
- application 372 In the poll mode, application 372 periodically issues a call to message poll interface 328 to ask for any waiting messages. If there are queued messages waiting for delivery to that service, then the one or more messages are returned in a reply.
- a service can provide selectors on the messages to fetch. For example, a service can retrieve messages based upon the sender, message type, topic, etc.
- message delivery is enabled through a push mode.
- the recipient In the push mode, the recipient would have its own server to which Message Interface Network 150 can send messages.
- a service can specify a maximum number of tries, as well as the retry interval, for Message Interface Network 150 to send the message to the service before aborting pushed delivery.
- a service to which Message Interface Network 150 pushes messages can also optionally poll for messages.
- a service can also specify a delivery window in which it will accept pushed messages. For example, a service might only accept messages between the hours of 1 AM and 2 AM.
- a response message can be posted by recipient service 360 to message post interface 326 .
- the message is then routed through one or more services 350 prior to being stored in message queue 332 .
- the message can then be retrieved by sending service 310 through message poll interface 322 .
- the return path would not necessarily match the forward path.
- the sender of a message can specify a time by which the routing of a message must complete. If that expiration time passes before delivery of the message to it final destination, Message Interface Network 150 will abort further routing of the message.
- the final destination for a request message is the delivery of a response message back to the original request sender. In this embodiment, senders of response messages cannot specify an expiration since the response is considered part of the routing of the original request message. If a request message expires, Message Interface Network 150 will return an error response back to the sender. If the sender does not specify an expiration time, then a default message expiration time (e.g., 48 hours) can be used. Message expiration is not the same as document expiration. Document expiration is associated with a specific document and indicates how long the document's information is valid.
- Message Interface Network 150 logs all posted messages, including invalid messages. For each message, Message Interface Network 150 logs relevant information to track the history of the message. Message Interface Network 150 also maintains a correlation between messages. That is, for request messages, Message Interface Network 150 associates the log of the response message(s) with the log of the request message.
- logged information can include the message header, the calculated route for the message (unless route calculation fails), the status of route validation, the size of the message at each stage of the route, and the routing history, including the status for each service along the message's route.
- the status values for each service depends on the role of the service.
- Message Interface Network 150 correlates all messages for the same message transaction. That is, for request messages, Message Interface Network 150 associates the log of the response message(s) with the log of the request message. Similarly, if a message causes an error message, then Message Interface Network 150 associates the log of the generated error message with the log of the original message.
- FIG. 4A is a diagrammatic representation of a communication exchange 400 between a plurality of services.
- any type of service may exchange messages with any other type of service through Message Interchange Network which operates to correlate such messages.
- a service 402 initially sends a request message 404 through Message Interchange Network 406 to Service 408 .
- Service 408 sends a response message 410 back to Service 402 in reply to the request 404 .
- Service 408 also sends a request message 411 to Service 412 in response to the original request message 404 from Service 402 .
- Service 412 then sends a response message 414 back to Service 408 in reply to the request 411 .
- a service may represent any computer application or device accessible to other entities through an interface such as an application programming interface (API), user interface, or Internet web user interface, by any of a variety of protocols over a network within an entity or over the public Internet.
- API application programming interface
- a service may also be comprised of multiple methods or applications implemented on a single device or distributed across multiple devices.
- a message may also be sent to a routing script, as described above.
- a routing script can also be defined as a service.
- an application type service may send a message to a routing script type service.
- routing programs can be session participants.
- one of the major uses of sessions may be that a session encompasses the set of calls into and from a routing script.
- the messages in this communication exchange 400 are all related and are preferably correlated together.
- Response message 410 is in reply to request message 404 , and hence, related to request message 404 .
- response message 414 is in reply to request 411 , and hence, related to request message 411 .
- These two pairs of messages may each be referred to as a call. As shown, request 404 and response 410 form a call, while request 411 and response 414 form a call.
- each message is given a Hop Identifier (ID) and each call is given a Call ID.
- ID Identifier
- request 404 and response 410 are given Call ID 416
- request 411 and response 414 are given Call ID 418 .
- the messages belonging to Call ID 416 are also related to the messages belonging to Call ID 418 since the latter messages were initiated in response to the former messages.
- the messages associated with both Call ID 416 and 418 are given a Session ID 420 .
- each message is given a Hop ID
- each set of related messages exchanged between two services is given a Call ID
- each set of messages belonging to related calls are given a Session ID.
- FIG. 4B illustrates a group of related messages within another example communication exchange 450 .
- a first service 454 initiates a call between itself and service 452 .
- service 452 then has a plurality of resulting calls between itself and a plurality of services 456 , 458 , 460 , and 462 .
- a first invocation to a service may initiate the invocation of a second service.
- the invocations can be recursive and rather complex and are only limited to the computational and storage resources of the Message Interchange Network 406 .
- a call is a predefined set of messages (e.g., as preconfigured in the Message Interchange Network), such as a notification message or a pair of request and response messages.
- a call may be predefined as any number and type of messages.
- a session in this implementation depends on how the particular services define sessions. That is, a service may be implemented to define its messages any suitable manner.
- a service may send a first message with the intention of the message being part of a first session and send a second message with the intention of the message being part of a second session.
- the sending service may include a first Session ID in the first message and a second Session ID in the second message.
- the Message Interchange Network may predefine what constitutes a session. For instance, messages which are spawned from a service in response to a message received into such service may be defined as part of a same session.
- a call may include any predefined number and type of messages.
- each call may include any number of request and response messages and/or any number of notification messages (e.g., a response is not sent by the receiving service).
- Each session may include any number of calls between any number of service pairs. While the definition of sessions is general, common uses of sessions include grouping calls comprising a conversation between services, comprising a transaction involving multiple services, or comprising a trace of routing a message through diverse services.
- a same message may be passed through any number of services or hops. That is, a particular message may result in multiple Hop ID's, one Hop ID for each hop of its route.
- a same message may also be modified by such services as it passes through such services.
- a message which enters a service, is modified by such service, and output from such service may be defined as two different messages: a first message which is received by such service and a second modified message which exits the service.
- FIG. 4C is a flowchart illustrating a procedure 470 for correlating messages. Initially, a message is received into Message Interchange Network 406 in operation 472 .
- the message may be any form, such as a request, response, or notification message. Any of these three message types can also include error messages, alert messages, cancel messages, acknowledge messages, etc.
- a Session ID may still be returned back to the message sender in an alternative implementation, as well as storing information about the message. In either implementation, a new Session ID is not assigned, but rather the Session ID of the current session is used for correlating with the current message.
- Messages which are sent by either the sender service or the receiver service after the first message will include the either the assigned Session ID or Call ID if they belong to the current session.
- a message which is in reply to a request message may simply include a Call ID which is the same as the Call ID of the corresponding request message.
- the response message does not include a Session ID and the Message Interchange Network 406 determines that the response message belongs to the session to which the Call ID is associated.
- a Call ID may still be returned back to the message sender in an alternative implementation, as well as storing information about the message. In either implementation, a new Call ID is not assigned, but rather the Call ID of the current call is used for correlating with the current message.
- This Call ID assignment operation 480 is also performed after the Session ID assignment operation 476 , where a determination is not made as to whether the message is the first message in the current call. When it is determined that the message is the first message for the current session, it is also assumed that it is the first message for the current call.
- the Message Interchange Network 406 may then assign a Hop ID to the received message in operation 482 .
- the Hop ID generally identifies the current message and its associated “hop” between its sender and receiver.
- the Session ID, Call ID and Hop ID may be assigned to a message in any suitable order, besides the order illustrated in FIG. 4C .
- the messages may not be able to embed a Session ID and/or a Call ID.
- the assigned Hop ID, Call ID, and Session ID and their corresponding message information may still be stored as described below.
- Information regarding the received message, the current call, and the current session is then stored in operation 484 .
- This information can be stored at the same time or individually for the received message, current call, and current session at various points in the message handling process. No matter when the information is stored, it may be stored in any suitable one or more memory device(s).
- the Hop ID, Call ID, and Session ID and their associated information regarding the message, call, and session are stored in a repository.
- FIG. 4D is illustrates a Message Correlation Table 490 for correlating information regarding each message, a Call Correlation Table 492 for correlating information regarding each call, and a Session Correlation Table 494 for correlating information regarding each session.
- the Tables 490 , 492 , and 494 may be stored in repository 240 .
- the repository may be formed from any suitable number of databases stored on any suitable number of memories on any suitable number of computer systems.
- the Message Correlation Table 490 includes one or more entries for each message.
- Each entry includes correlation information for each message.
- each entry corresponds to a particular message and includes the particular message's Hop ID, message information regarding the particular message, the particular message's Call ID, and the particular message's Session ID.
- the message information may include any information relevant to the particular message, such as the message's sending service and receiving service, whether the message has completed its transmission (e.g., to its intended destination service), and a reason or error log regarding why a message has failed to complete its hop, selected message content, the size of the message, the receiving and sending times for the message, the topic of the message, the status on processing steps taken on the message, the protocols used in receiving and sending the message, etc.
- the message's session ID may be assigned by the Message Interchange Network, embedded in the message received into the Message Interchange Network, or inferred from the Call ID embedded in the message (e.g., the same session to which the Call ID is associated).
- a message having Hop ID equal to “hop1” belongs to the same call as a message identified by Hop ID “hop2.” This same call is identified by Call ID “call1.” Additionally, another message having Hop ID “hop3” belongs to a call identified by Call ID “call2”, while another message having Hop ID “hop4” belongs to a call identified by Call ID “call3.” Also illustrated in the example of FIG. 4D , messages having Hop ID's “hop1”, “hop2”, and “hop3” all belong to a same session identified by Session ID “session1.” In contrast, the message having Hop ID “hop4” belongs to a different session having a Session ID “session2.”
- a service could define a message field that is to be used as a message identifier.
- the profile information for a service could include an XPath expression designating a field in XML messages.
- the Message Interchange Network would extract the value of the field from a received message and store the custom message identifier along with the assigned Call or Session ID.
- This alternative implementation then enables a service to query for correlation information using their own identifier, rather then necessarily the assigned Call or Session ID's.
- the Call Correlation Table 492 also includes one or more entries for each call. As shown, each entry includes a Call ID for a particular call and call information regarding the particular call.
- the call information for a particular call may include an indication as to whether the particular call is complete, a reason for the particular call not completing, the type of call, the receiving and sending times for the call, the sender and recipient services of the call, the status of policy evaluation for the call, the set of hops in the call, etc.
- the Session Correlation Table 494 includes one or more entries for each session.
- Each entry for a particular session generally includes a Session ID for the particular session and session information regarding the particular session.
- the session information for a particular session may include any information relevant to a particular session such as, the calculated or executed route for messages sent within such particular session, the size of each message at each stage in the route, the identity and status of each service within the route paths of the particular session, whether a session has been completed, and reasons for a session failing to complete, the initiating time and completion time for the session, the set of calls in the session, etc.
- the tables shown in FIG. 4D illustrate only one embodiment of storing correlation information. Any other suitable set of tables and relationships among tables may be used to store correlation information.
- the message route of a session may not be stored directly in one table, but rather may be inferred from the set of calls and hops related to the session as stored in one or more other tables.
- an entity may query the Message Interchange Network 406 for information which has been correlated together.
- a service may request correlation information regarding a particular session.
- the Message Interchange Network 406 collects all entries within the Correlation Tables 490 , 492 , and 494 that relate to the requested session's Session ID Likewise, an entity may request correlation information regarding a particular service, route, call, time period, message status, etc.
- the Message Interchange Network 406 preferably determines whether a request service is authorized to receive a compilation of its requested correlation information. This determination may be performed in any suitable manner.
- the requesting service is authorized when the requested information is in any way related to a service owned by the requesting service's organization. For example, a service may request correlation information regarding any messages sent by such requesting service, and any messages from calls or sessions belonging to the same call or session as the sent messages. In another implementation, the requesting service may request correlation information which is related to any one message which contains an identifier of the requesting service.
- the correlation techniques allow end points or services to correlate through an intermediary which handles ID assignments.
- the end points or services do not have to separately negotiate the use of an ID for their communication exchanges with every service.
- this approach greatly simplifies correlation of complex message interchanges over a computer network between diverse services and/or end point entities.
- an intermediary network e.g., message interchange network
- an intermediary network handles identification of messages, calls, and sessions, as well as correlation of information related to same
- users of such intermediary network do not have to implement any procedures for correlation.
- an intermediary is performing the correlation of messages sent between diverse and distributed services, any end point or service can also easily gain a clear picture as to what is happening with messages sent as a result of its interactions with such diverse services. Since the retained correlation information is performed by a single intermediary network, the correlation information is standardized and easily compiled into a clear summary of interactions results.
- Message Interface Network 150 enables flexible interaction between services.
- Several embodiments for provisioning or setting up services with Message Interface Network 150 and routing messages through Message Interface Network 150 between such provisioned services are further described in the above referenced Lev Brouk et al. U.S. patent application.
- the correlation techniques may be implemented on software and/or hardware.
- it can be implemented in an operating system kernel, in a separate user process, in a library package bound into network applications, on a specially constructed machine, or on a network interface card.
- the techniques are implemented in software such as an operating system or in an application running on an operating system.
- a software or software/hardware hybrid packet processing system is preferably implemented on a general-purpose programmable machine selectively activated or reconfigured by a computer program stored in memory.
- portions of the correlation system e.g., Message Interchange Network
- a computer system 500 suitable for implementing some disclosed techniques includes a master central processing unit (CPU) 502 , one or more memory 504 , input and output interfaces 506 , and a bus 508 (e.g., a PCI bus).
- CPU 502 When acting under the control of appropriate software or firmware, the CPU 502 is responsible for implementing various portions of the disclosed techniques. It preferably accomplishes all these functions under the control of software including an operating system and any appropriate applications software.
- CPU 502 may include one or more processors such as a processor from the Intel family of microprocessors or the MIPS family of microprocessors.
- a memory 504 such as non-volatile RAM and/or ROM also forms part of CPU 502 .
- Memory block 504 may be used for a variety of purposes such as, for example, caching and/or storing data, programming instructions, etc.
- the input and output interfaces 506 typically provide an interface to various I/O devices, such as mouse, keyboard, display, as well as providing an communication interface with other computer systems over a computer network.
- the communication interfaces that may be provided are Ethernet interfaces, frame relay interfaces, cable interfaces, DSL interfaces, token ring interfaces, and the like.
- various very high-speed interfaces may be provided such as fast Ethernet interfaces, Gigabit Ethernet interfaces, ATM interfaces, HSSI interfaces, POS interfaces, FDDI interfaces and the like.
- these interfaces may include ports appropriate for communication with the appropriate media. In some cases, they may also include an independent processor and, in some instances, volatile RAM.
- FIG. 5 Although the system shown in FIG. 5 is one specific computer system, it is by no means the only system architecture on which the disclosed implementations can be provided.
- system may employ one or more memories or memory modules (such as, for example, memory block 504 ) configured to store data, program instructions for the general-purpose network operations and/or the inventive techniques described herein.
- the program instructions may control the operation of an operating system and/or one or more applications, for example.
- the memory or memories may also be configured to store information in repository 240 , etc.
- machine readable media that include program instructions, state information, etc. for performing various operations described herein.
- machine-readable media include, but are not limited to, magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks and DVDs; magneto-optical media such as floptical disks; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory devices (ROM) and random access memory (RAM).
- program instructions include both machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Computer And Data Communications (AREA)
Abstract
Disclosed are some implementations of methods and apparatus for managing services within a computer network. In one embodiment, a message interchange network for exchanging application-level messages between services, which are located outside the message interchange network, is provided. At the message interchange network, a plurality of application-level messages, which each specify which one or more receiving services are to receive the each application-level message, are received. Each received application-level message is forward towards the one or more receiving services. Correlation information regarding each application-level message that is received into message interchange network is retained. The application-level messages are sent between pairs of the services, and the retained correlation information for each application-level message pertains to each application-level message and any other application-level messages related to the each application-level message. A query can then be received, at the message interchange network from a first service, to search the retained correlation information for specific one or more portions of the retained correlation information. A response to the query, which includes the specific one or more portions of the retained correlation information, is sent to the first service.
Description
- This patent document is a continuation and claims priority of co-pending U.S. patent application Ser. No. 14/687,729, entitled MANAGING MESSAGES SENT BETWEEN SERVICES, filed Apr. 15, 2015 by Panec et al., which is a continuation and claims priority of U.S. patent application Ser. No. 11/773,931, entitled APPARATUS AND METHODS FOR MANAGING MESSAGES SENT BETWEEN SERVICES, filed Jul. 5, 2007 by Panec et al., which is a continuation and claims priority of U.S. patent application Ser. No. 10/728,356, now U.S. Pat. No. 7,249,195, entitled APPARATUS AND METHODS FOR CORRELATING MESSAGES SENT BETWEEN SERVICES, filed Dec. 3, 2003 by Panec et al., which is a continuation-in-part and claims priority of U.S. patent application Ser. No. 09/820,966, now U.S. Pat. No. 7,689,711 entitled SYSTEM AND METHOD FOR ROUTING MESSAGES BETWEEN APPLICATIONS, filed Mar. 30, 2001 by Brouk et al. The above-identified applications and patents are hereby incorporated by reference in their entirety for all purposes.
- Some of the disclosed implementations relate to methods and apparatus for processing data within a computer network. More specifically, some of the implementations relate to correlating messages sent within such computer network.
- Corporate reliance on technology has become more complex and more pervasive. Increasingly, companies are identifying opportunities to extend their core business or cut costs using the Internet. Both trends have put increasing priority on integrating disparate business applications. For this reason, enterprise application integration (EAI) has emerged as a solution for allowing information technology departments to build bridges that are designed to unify their legacy systems into a single enterprise application. Ideally, the creation of this single enterprise application would not require sweeping changes to the underlying structures.
- EAI suppliers typically offer end point solutions for managing business process interactions between end points within a computer network. Although a specific enterprise software package may be designed to transparently handle diverse business processes carried out by two or more end nodes, each specific enterprise software package requires releasing customized connectors or adapters which will work for the specific business processes and applications used by the specific end nodes. As a result, these enterprise solutions are not easily scalable. Additionally, scores of adapters need to be built for each vendor (for example, Oracle corporation of Redwood Shores, Calif., SAP AG of Waldorf, Germany, and PeopleSoft Inc. of Pleasanton, Calif.). As each supplier releases new versions of their software, EAI vendors find themselves unable to gain traction under the burden of supporting their existing adapters.
- Notwithstanding the benefits of EAI, the software costs and resource investments of EAI prevent small-to-medium enterprise (SME) customers from embracing EAI solutions. For SMEs, reliance on application service providers (ASPs) represents an increasingly attractive alternative.
- The web service provider market is one of the fastest growing segments of the software industry. Service providers make enterprise applications (e.g., human resources administration, recruiting, travel and expense management, sales force automation) available to customers over the web at a server device. Those applications are fully managed and hosted by the provider, providing significant cost savings to enterprises.
- Some providers merely host and manage third-party packaged software for their customers (“managed hosts”). Others build new applications from the ground up to take advantage of the benefits and cost-savings of web service provider model. Service providers enjoy the profit margins and operational scalability of consumer Web companies like eBay Inc. of San Jose, Calif., and Yahoo! Inc. of Sunnyvale, Calif., while at the same time offering the feature sets of complex enterprise software applications such as software applications by PeopleSoft and Siebel Systems Inc. of San Mateo, Calif.
- Although the service provider approach allows a single business to set up a host server for allowing itself and its business partners to use third party or customs applications, this approach does not allow the set up and dismantling of complex arrangements between business partners. For instance, a first business may wish to allow a second business to access a first set of services, while the second business may wish to provide a second different set of services to the first business.
- Additionally, message correlation in EAI or service provider approaches is nonexistent or cumbersome at best. In an end point based EAI, each end point must first agree on message identifiers before sending messages between each so that the related message can be correlated. This process is time consuming and difficult to implement and coordinate among diverse end point users.
- In view of the above, improved mechanisms for correlating messages sent between diverse entities in a scalable manner are needed.
- In one embodiment, a method for correlating services within a computer network is disclosed. A message interchange network for exchanging application-level messages between services, which are located outside the message interchange network, is provided. At the message interchange network, a plurality of application-level messages, which each specify which one or more receiving services are to receive the each application-level message, are received. Each received application-level message is forward towards the one or more receiving services. Correlation information regarding each application-level message that is received into message interchange network is retained. The application-level messages are sent between pairs of the services, and the retained correlation information for each application-level message pertains to each application-level message and any other application-level messages related to the each application-level message. A query can then be received, at the message interchange network from a first service, to search the retained correlation information for specific one or more portions of the retained correlation information. A response to the query, which includes the specific one or more portions of the retained correlation information, is sent to the first service.
- In a specific implementation, each service is registered at the message interchange network so that each registered service is specified as being accessible by one or more specific services. In a specific aspect, the retained correlation information for each application-level message further includes an indication as to whether the each application-level message has completed transmission. In yet another aspect, the session information for each session includes a Session Identifier (ID) uniquely identifying the each session and the session information for each session further includes an indication as to whether the each session is complete and a reason for the session not being complete if the each session fails to complete. In an alternative embodiment, the query for the retained correlation information is regarding a particular session or call and wherein the specific portions of the retained correlation information that are sent to the first service are related to the particular session or call of the query. In another aspect, it is determined whether the first service is authorized to make the query and specific one or more portions of the retained correlation information are only sent to the first service when it is determined that the first service is authorized.
- In another embodiment, a computer system is operable to correlate services within a computer network. The computer system includes one or more processors and one or more memory. At least one of the memory and processors are adapted to provide at least some of the above described method operations. In yet a further embodiment, a computer program product provides correlation of services within a computer network. The computer program product has at least one computer readable medium and computer program instructions stored within at least one of the computer readable product configured to perform at least some of the above described method operations.
- These and other features and advantages of some implementations will be presented in more detail in the following specification and the accompanying figures which illustrate by way of example some of the disclosed principles.
- The foregoing and other features and advantages will be apparent from the following, more particular descriptions of some disclosed implementations, as illustrated in the accompanying drawings.
-
FIG. 1 illustrates a message exchange network in accordance with some implementations. -
FIG. 2 illustrates components in a message exchange network in accordance with some implementations. -
FIG. 3 illustrates a request response pattern example. -
FIG. 4A is a diagrammatic representation of a communication exchange between a plurality of services in accordance with some implementations. -
FIG. 4B illustrates a group of related messages within another example communication exchange in accordance with some implementations. -
FIG. 4C is a flowchart illustrating a procedure for correlating messages in accordance with some implementations. -
FIG. 4D is illustrates a Message Correlation Table for correlating information regarding each message, a Call Correlation Table for correlating information regarding each call, and a Session Correlation Table for correlating information regarding each session, in accordance with some implementations. -
FIG. 5 is a diagrammatic representation of an example computer system in which some implementations may be provided. - Reference will now be made in detail to some specific implementations. An example of this embodiment is illustrated in the accompanying drawings. While some features will be described in conjunction with these specific implementations, it will be understood that it is not intended to limit the invention. On the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the appended claims. In the following description, numerous specific details are set forth in order to provide a thorough understanding. Some implementations may be practiced without some or all of these specific details. In other instances, well known process operations have not been described in detail in order not to unnecessarily obscure the disclosed implementations.
- In accordance with the present disclosure, the interchange of enterprise data is supported through an open platform for enterprise application integration (EAI). This open platform overlays a public network (e.g., the Internet) and does not require business entities to heavily invest in specialized software and resources. As will be described in greater detail below, the provision of extra-enterprise application integration as a service is provided. This service facilitates EAI efficiently and affordably to the businesses that need it the most (i.e., the small- and medium-sized enterprise (SME) market). More generally, the open platform can be used to support services provided by business-to-business (B2B) enablers, system integrators, and other node enablers.
-
FIG. 1 illustrates a high-level overview of amessage interchange system 100.Message interchange system 100 includes aMessage Interchange Network 150 that enables SMEs 110-m, webware ASPs 120-n, and in-transit processors (ITPs) 130-p to connect to one another, integrate business processes and applications, and exchange data for mission-critical business functions. In general, ITPs 130-p are operative to process messages that are in-transit from a sender to a recipient. ITPs 130-p can be designed to perform a variety of functions such as data transformation, enrichment, cross-reference ID mapping, filtering, credit scoring, or the like. - A directory (not shown) includes a list of all SMEs 110-m, webware ASPs 120-n and ITPs 130-p that can be accessed via
Message Interchange Network 150. Only publicly available services (i.e., those services that organizations register as accessible by any user of the network) are viewable in the directory. - In general, all applications that are connected to
Message Interchange Network 150 can be referred to as a service. In the illustrated embodiment ofFIG. 1 , applications owned by SMEs 110-m, webware ASPs 120-n and ITPs 130-p can each be referred to as services. Each service is owned by an organization, and an organization can have any number of services connected toMessage Interface Network 150. The message exchange withinMessage Interface Network 150 is therefore between services. - In one embodiment, services that receive messages can take a set of arguments that further define the intended action the service will perform on a received message. For example, a service may receive the name of an operation, or may permit configuration parameters. In this environment, the service would provide a means (e.g., through a URL to documentation) for message composers to know about arguments accepted by the particular service. The message composer can then include selected arguments as a part of the service declaration in a message.
- As described, services registered with
Message Interface Network 150 represent applications that send or receive messages. An organization may, however, wish to create virtual services which act as proxies to other services. For example, a business X may have a relationship with business Y such that messages sent to business X's service are redirected to business Y's service. Services can implement redirection through routing scripts that map invocations of the service to invocations of another service, including redirection of replies. - For each service registered by an organization with
Message Interface Network 150, there are a number of properties and permissions that can be associated with the service. Examples include a unique service identifier, authentication information, mode of message delivery, windows of time during which messages are accepted, URL address of service, permission to invoke other services to act on a message, and rules that modify the invocation of services. These properties and permissions affect the routing of messages from or to the service. -
FIG. 2 illustrates the primary functional components that operate withinmessage interchange system 100. The five primary functional components include service software development kit (SDK)component 210,web interface component 220,message router component 230,repository component 240, andbilling component 250. -
SDK component 210 serves as a foundation for supported development of client applications that interface withMessage Interface Network 150. Owning organizations can useSDK component 210 for custom integration with their software applications. As would be appreciated,SDK component 210 is not required to enable a service to accessMessage Interface Network 150. A service can use any development tool or process that would enable the service to leverage the application programming interface (API) that is supported bymessage router component 230. - In general,
SDK component 210 enables the provision of an interface that would be available on most common platforms, and in most popular languages. In this manner,SDK component 210 abstracts away the complex technical requirements of transferring messages usingMessage Interface Network 150. -
SDK component 210 need not have any business logic built into it.SDK component 210 can be used to develop plug-ins to shrink-wrapped applications, thereby greatly reducing development time. As would be appreciated,SDK component 210 can provide convenient libraries and utilities that a service may optionally use to facilitate the (1) creation and reading of messages conforming to the message router component API, and (2) authentication of users ofMessage Interface Network 150. -
Repository component 240 is the primary database ofMessage Interface Network 150.Repository component 240 includes information on customer profiles, message logs, and directories. As will be described in greater detail below,message router component 230 usesrepository component 240 to retrieve customer and application information that affects message routing.Message router component 230 also writes message log information torepository component 240 about messages that are processed throughMessage Interface Network 150. -
Billing component 250 uses the message log information inrepository component 240 to derive actual usage ofMessage Interface Network 150 by customers, and handles the invoicing and payment collection from customers. In one embodiment, the billing withinmessage interchange system 100 can be based upon actual customer usage ofMessage Interface Network 150. For example,billing component 250 can charge customers based on a per transaction basis. In one embodiment, the per-transaction cost is based on the size of the messages being processed. As would be appreciated, these per transaction costs can be assessed to parties in a variety of ways. For example, the costs can be assessed against the originator of the message, the intermediate services, the recipient of the message, or any combination of those parties. This billing flexibility is in sharp contrast to conventional EAI solutions that generate revenue through software license fees. -
Web interface component 220 is the front-end component ofMessage Interface Network 150.Web interface component 220 interfaces directly with users by enabling login, registration, account maintenance, directory lookup, rules configuration, reporting, billing, and customer support functionality. The web interface provides online forms for data entry and can perform preliminary validations on the data. Throughweb interface component 220, the user can also perform queries againstrepository component 240 for directory lookups or reporting. - In one implementation,
Message Interface Network 150 is an open network architecture that not only facilitates the easy introduction of services into the network, but also enables businesses to access a robust suite of services via one connection to theMessage Interface Network 150. - As noted,
message router component 230 provides the core function of message routing and delivery withinMessage Interface Network 150. In one embodiment,message router component 230 is implemented as an Internet-based message exchange service that provides a transport level messaging service. In other words,message router component 230 need not be aware of the application semantics of a message exchange. - Preferably,
Message Interface Network 150 need not inherently provide business process modeling. This is in contrast to conventional EAI solutions that may require a continual traversal up and down a protocol stack in routing a message from a sending service to a recipient service. For example, if the protocol stack included transport, routing, transformation, and work flow layers, then each message exchange segment may require analysis and processing at each layer to determine the next service (intermediate or final) that should receive the message. - As noted, services can post messages to and retrieve messages from
message router component 230 using an API. This provision of a standardized interface enables parties to easily connect to and useMessage Interface Network 150 without being restricted in the type of message content. - In one embodiment, the protocol for posting and retrieving messages with
Message Interface Network 150 is the Simple Object Access Protocol (SOAP). The SOAP messaging protocol defines a mechanism to pass commands and parameters between HTTP clients and servers. Through this standard object invocation protocol, HTTP is used for transport and XML is used for data encoding. The SOAP messaging protocol does not rely on the use of particular operating systems, programming languages, or object models on either the server side or the client side. As would be appreciated, other protocols can also be supported byMessage Interface Network 150. - While the message header can use extensible markup language (XML) syntax, the message body can accommodate any type of data, whether it be text or binary, encrypted or unencrypted. If the message body is also in XML form, then the message body can opt to use a schema based on an industry standard such as ebXML, BizTalk, RosettaNet, OAGIS, or any other suitable standard.
- In one embodiment, message exchange through
Message Interface Network 150 is asynchronous. Recipient services can be configured to pollMessage Interface Network 150 for incoming messages, or, if they have their own server, can haveMessage Interface Network 150 push messages to them. - After a sending service posts a message to
Message Interface Network 150, one or more in-transit services 130-p can operate on the message before it reaches the recipient service. In-transit services can perform useful operations on messages, such as data transformation, enrichment, cross-reference ID mapping, filtering, credit scoring, or the like. Through the standardized interface, in-transit services 130-p can independently join theMessage Interface Network 150 and operate on messages. This flexibility encourages independent third parties to build services that can be plugged intoMessage Interface Network 150. Such an open network would encourage third parties to market a data service that generates revenue based upon the level of utilization of the service. - As noted, in-transit services can be included in a message path that begins at a sending service and terminates at a recipient service. As will be described in greater detail below, sending services can explicitly specify a set of services to operate on a given message. In addition, recipient services can specify services that should operate on messages before delivery to the recipient service. In one example, a recipient may always want messages to pass through a filtering service to screen out messages from unknown senders.
- Messaging through
Message Interface Network 150 can be as secure as the participants desire. Each service registered withMessage Interface Network 150 can specify a security policy declaring encryption and authentication levels forMessage Interface Network 150 to enforce. For messages that flow through in-transit services, a sender can also specify the permissions for each in-transit service to access or operate on parts of the message. - In one embodiment,
Message Interface Network 150 uses the secure HTTPS protocol to support secure transport connections when a service posts a message or polls for messages, and whenMessage Interface Network 150 pushes messages to a client server. Authentication can be based on either username/password or certificates. - SSL encryption as part of HTTP can be used to provide data protection during message transmission over the public Internet. In general, this level of protection is sufficient for most situations. Services can, however, perform their own extra encryption of message documents to keep them private even from
Message Interface Network 150. Services that add extra encryption can ensure, however, that all services that operate on the message documents have the necessary keys to decrypt the documents. - As is well known, the authentication protocol of SSL includes a server's presentation of a certificate to clients. Accordingly,
Message Interface Network 150 presents a server certificate to services that connect for posting or polling. The connecting service has the option of then providing either a username/password or certificate forMessage Interface Network 150 to authenticate the service. The form of client authentication is a configuration option within the profileMessage Interface Network 150 maintains for each service. - When
Message Interface Network 150 pushes messages to a service, the service's server can present a server certificate toMessage Interface Network 150 for authentication of the service. For the reverse authentication, the service can then require either a username/password or certificate fromMessage Interface Network 150. Again, that option can be configured in the profile informationMessage Interface Network 150 maintains for the service. - As a message flows through a selection of services on the way to the recipient service, and as the recipient service's response returns to the sending service,
Message Interface Network 150 maintains an audit trail of all operations on the message and all services that touched the message. The audit trail serves several purposes. First, it enablesMessage Interface Network 150 to reconstruct the message history in the case of queries on the message trail. Second, it allowsMessage Interface Network 150 to compile a usage report for any service for reporting and billing purposes. - Having described the general framework of
Message Interface Network 150, a more detailed description of a message transaction lifecycle withinMessage Interface Network 150 is provided with reference toFIG. 3 . - In this framework, a message can be embodied as a self-contained collection of information to serve a particular purpose, such as a request, a response, a notification, or an acknowledgement. As noted,
Message Interface Network 150 can generally be agnostic about the content of a message other than header information that affects routing of the message. - In one embodiment, request, response, and notification messages can be defined. A request message expects a subsequent response message from the recipient(s) to be returned to the sender. Request messages may represent inquiries, but might also represent update requests that only expect a return status response. If an error occurs in routing a request message,
Message Interface Network 150 returns an error response message to the sender. - A response message is issued by a recipient of a request message. The response message references the original request message. Failure of the response message may result in an error response message being returned to the sender of the original request message.
- A notification message is a one-way message. No response to the notification message is expected back to the sender.
Message interchange network 150 can regard any response message referencing a notification message as an invalid message. If a notification message fails, no error message is returned to the sender. - As would be appreciated, further messages can be defined for
Message Interface Network 150. For example, a cancel message can also be defined, wherein the cancel message is used by the sender to cancel a previous message. - The operation of these messages is now described with reference to the request/response illustration of
FIG. 3 . This illustration demonstrates a typical example of a sendingservice 310, such as an enterprise, making an inquiry to arecipient service 360, such as a webware provider. In one embodiment, a sender'sapplication 312 that connects toMessage Interface Network 150 is a desktop application. In another embodiment, a sender'sapplication 312 that connects toMessage Interface Network 150 is an enterprise server, or an EAI package. - The first step in the message transaction process is the creation of a message. In one embodiment, a sender formats the messages to conform to an XML schema for messages. This XML schema prescribes the format for message headers while allowing any kind of data to be included in the message body (or payload). As part of message construction, sending
service 310 specifies the recipient service(s) 360 of the message. In one embodiment, a recipient service's name includes an organization and a specific service provided by that organization. The service name can be generally represented in the message via a globally unique ID. - The actual set of elements contained in a message depend on whether the message is being posted or delivered. In one embodiment, a message includes a header element, a body element and/or attachments. In one embodiment, the attachments are based on multi-part Multipurpose Internet Mail Extensions (MIME).
- An embodiment of a message includes header and body elements. As would be appreciated, the actual message format can differ depending on the protocol. In particular, protocols other than the SOAP protocol can be used. The header element may include routing and invocation information. The header as posted by a sending service may often be modified by
Message Interface Network 150 for delivery to the receiving service. - The body element may include the documents the sender is sending to the recipient(s). These documents can also be operated upon by one or more services. The documents can be in the form of XML or any other representation, including text, binary, etc. In one embodiment, all or part of the documents that are being sent are included in an attachment to the message.
- While messages preferably have a similar overall structure, the actual composition of elements can differ between the various message types and between messages as posted and as delivered. For example, some elements in a sent message can be changed or not be included in the message as delivered, such as elements particular to constructing a route. Some elements can also be inserted only in the message as delivered, such as identifier elements.
- If the sending service wishes to have the message routed through any services before delivery to the recipient service(s), the sending service can specify an explicit sequence of services that should operate on the message. The sender can also implicitly include services in the route for a message through the specification of routing scripts associated with the defining service. Routing scripts are described in greater detail below.
- After a message is constructed, the message is posted to
Message Interface Network 150.FIG. 3 illustrates an example posting of a message byapplication 312 tomessage post interface 324. As noted, in one embodiment, the posting of a message is performed using the SOAP messaging protocol. - If sending
service 310 posts a message that does not have well-formed XML, the message posting is rejected and an error response is returned. In general, messages can be rejected for a variety of other reasons. For example, a message can be rejected if the service indicated in the message header as the sender is not the same as the actual sender of the message, the message is a duplicate posting of a previous message, a service attempts to reply to a message for which it was not a recipient, or a response message does not reference a prior message. - In one embodiment, each message posted by a service can have a unique handle assigned by the service to identify the message. This unique handle can be used to provide a means for
Message Interface Network 150 to detect duplicate postings of the same message. Duplicate postings can occur in the case of failure recovery by the service. In one embodiment, if a service specifies thatMessage Interface Network 150 should reject duplicate postings of a message, then the service could provide unique handles for messages and set a “potential duplicate” flag in messages that may be a duplicate posting. Regardless of whether or not a service provides a unique handle for a message,Message Interface Network 150 can assign a globally unique session identifier to each posted message. - After a message is posted,
Message Interface Network 150 routes the message to the recipient service(s) 360. The routing of the message is based upon a route calculation byMessage Interface Network 150. The calculated route includes allintermediary services 350 that are scheduled to operate on the message en route to recipient service(s) 360. The calculated route can be based on routing instructions specified explicitly in the message header and/or on routing scripts pre-defined by the sendingservice 310,recipient service 360, or any in-transit services 350 that have been included within the calculated route. - In general, routing scripts define a procedure for enabling determination of at least part of a route. This procedure can be based on any type of criteria. For example, a procedure can be defined that determines a next destination of a message based on the existence of one or more attributes of the message. In another example, a procedure can be defined that effects a determination based on the comparison of one or more attributes of the message to a reference value. In yet another example, a procedure can be defined that effects a determination based on pattern matching (e.g., regular expression matching). As would be appreciated, routing scripts can embody any of a variety of criteria-based procedures.
- Routing scripts can specify a sequence of services that operate on either inbound or outbound messages for a service. As noted, in-transit services may themselves have routing scripts requiring processing by other services. Therefore, the route calculation can be recursively defined based upon routing scripts specified by all services that interact with the message.
- In one example, the sending
service 310 may specify a routing script that requires a cross-reference mapping service to be included in the calculated route whenever sendingservice 310 sends a message torecipient service 360. In another example,recipient service 360 may specify a routing script that requires that any incoming request messages must first pass through a filter service to block messages from a list of sendingservices 310. - Routing scripts enable sending services to include services into the message route without having to explicitly specify the services in the message itself. Also, routing scripts enable
recipient services 360 to requireservices 350 to be in the calculated route, regardless of the sending service's route specification. - In one embodiment, a routing script is embodied as a routing rule. A routing rule includes two parts: a condition and one or more resultant actions. The conditional part of a rule can be based on any elements or element attributes in a message's header. Additionally, content-based routing can be supported through conditional rules based on attributes of an element in a message's body and/or attachments.
- Every rule generally has at least one condition. Conditions include an operator and zero or more operands. Example operators include equals, notEquals equalsOneOf, lessThan, greaterThan, and exists operators. In one embodiment, operators act on XML elements, XML attributes, or on other conditions.
- From the standpoint of the element operators, XML elements contain either child elements or character data. Therefore, the operands for an element comparison both represent the same type of content: either elements or character data. Character data can be in the form of a string, number, or date. Conditions involving elements that do not appear in the message will evaluate to false.
- Attributes generally have a type of character data, which can be string, number, or date. Many attributes are implicitly included in an XML document with default values. Therefore, an attribute identified in a condition can refer to either an explicit or implicit attribute. Conditions involving optional attributes that do not appear in the message will evaluate to false.
- The usual boolean operators can combine conditions into more complex conditions. Condition operators act on other conditions. Example condition operators include AND, OR, XOR, and NOT condition operators.
- The result of satisfying a rule's conditions is that an action will be triggered to modify the route for a message. Probably the most common result of a rule is to add one or more services into the route for a message. Several rule actions can be defined, and several are described further in the above reference Lev Brouk et al. U.S. patent application.
- A service can maintain an evaluation sequence for the scripts associated with each role that the service can have with respect to a message. That sequence determines the order in which the scripts for that service are applied.
- In one embodiment, scripts are evaluated in the following order: (1) scripts for the sender of the message; (2) scripts for services included by the scripts for the sender (this is recursive); (3) scripts for the recipients of the message, in the order of recipients in the message header; and (4) scripts for services included by scripts for the recipients (this is recursive).
- When multiple scripts for a service include services into a route, the order of services in the route will follow the order of the scripts. That is, if
script 1 inserts service A, and script 2 inserts service B, and ifscript 1 is evaluated before script 2, then service B follows service A in the route. - In one embodiment, routing scripts are evaluated only once during the initial calculation of the route for a message. The message header contains the basic information to initially construct a route, such as sending
service 310 andrecipient services 360. The message can also contain an explicit specification of a set of services to include in the route. Once the route is constructed from the header information, routing scripts are applied to further elaborate the route. - In an alternative embodiment, at least part of the message route is calculated after the physical routing of the message has begun. Dynamic routing is described in greater detail below in the context of physical and logical routing.
- At the transport level,
Message Interface Network 150 routes a message to a service by delivering the message through the Internet to a physical machine on which the service resides. That service operates on the message and, if the message is a request, returns a response message back through the Internet toMessage Interface Network 150. The sequence of message deliveries and responses betweenMessage Interface Network 150 and services represents the physical routing of a message. -
Message interchange network 150 also provides a mechanism for a service to act on a message without the message being physically delivered to the service over the Internet. This mechanism is enabled through the logical routing of the message to the service. With logical routing, a service can modify the routing of the message or modify the context of the message for delivery to the next service. Significantly, a service can be logically included in a message routing, without being included as part of the physical routing of the message. - In one embodiment, logical routing of messages is implemented through the specification of routing scripts. As described above, a service can define one or more routing scripts. These defined routing scripts are stored within
Message Interface Network 150 and are processed to determine what routing behavior should occur when a message is logically routed to the service. - Logical routing can take place statically or dynamically. With static logical routing, a message is logically routed to all services prior to any physical routing. In other words,
Message Interface Network 150 logically routes the message to all services prior to the physical delivery of a message to any services. This logical routing is represented by the sequential evaluation of the routing scripts that are defined by those services. As noted above, in one embodiment, the routing scripts are evaluated in the following order: (1) scripts for the sender, (2) scripts for the services included by the sender (recursive), (3) scripts for the recipient, and (4) scripts for the services included by the recipient (recursive). - In dynamic logical routing, the logical routing is not completed prior to the start of the physical routing. Rather, the logical routing takes place in sequence with the physical routing of the message. The relation between logical routing and physical routing is described in greater detail below.
- As noted,
Message Interface Network 150 delivers a message logically to every service participating in a message's routing. Of those services, some subset will also accept physical delivery of the message. - To illustrate this concept, consider an example where service A includes service B into the message route. Service A can include service B into the route either prior to itself in the route (provided service A is not the originator of the message) or after itself in the route. In either case,
Message Interface Network 150 would logically route the message first to service A, which includes service B into the route.Message interchange network 150 then logically routes the message to service B, and after service B produces a response,Message Interface Network 150 logically returns the response to service A. The point at which service A physically receives the message depends on whether service A included service B prior or after itself in the route. If service A includes service B prior to itself in the route, then the order of physical delivery is first to service B then to service A. Conversely, if service A includes service B after itself into the route, then the order of physical delivery is first to service A then to service B. In the latter case, the response from B is not necessarily physically delivered back to service A. Rather, it may be only logically delivered back to service A. - Services to which a message is logically routed do not necessarily have to also physically receive the message. In the above example, service A could have been logically routed, with physical delivery only to service B. Consider the following scenario. Suppose service X includes service A into the route and service A includes service B into the route. The logical routing of the message would proceed from service X to service A to service B back to service A back to service X. Service A can choose not to be included into the route for physical delivery, in which case the physical routing of the message is from service X to service B.
- In general, the act of routing a message (physically or logically) to a service can be thought of as an invocation of the service. When a service includes another service into the route of a message, the including service is effectively invoking the included service. The invocation of a service does not necessarily imply the physical delivery of information to the invoked service. The logical routing of a message is then the logical invocation of services. A route that includes a progression of services including other services can effectively be modeled as a progression of invocations.
- In logical routing, each service is not only able to manage the inclusion of other services into the route but is also able to manage the context of those inclusions. From the standpoint of invocations, an invoking service is able to set the context for the invocation. An invoked service can also set the context of its return.
-
Message interchange network 150 can also affect context management on behalf of invoking services. As noted, while an invoking service can be logically included in a message routing, it need not be included as part of the physical routing of the message. In general,Message Interface Network 150 can persistently store contexts of a message, thereby enabling proper restoration of contexts upon return from an invocation. Several embodiments of context management are described in the above referenced Lev Brouk et al. U.S. patent application. - Having touched on a framework for logical routing and invocation of services, the description of the physical routing process is continued with reference to
FIG. 3 . In this example, it is assumed that static logical routing has produced a route for the message. - After deriving the route for a message,
Message Interface Network 150 validates the route. There are numerous conditions that can cause a route to be invalid. For example, there may be routing permission violations or a service may be currently disallowed byMessage Interface Network 150 due to, for example, the non-payment of usage bills. - If the route is determined to be invalid, then
Message Interface Network 150 rejects the posted message and may return an error to the sendingservice 310 either in the response to the posting call or in an error message. -
Message interchange network 150 routes the message to all services in the calculated route. In the event of failure at any stage in the routing,Message Interface Network 150 aborts the message routing and, if the original message was a request, returns an error message back to sendingservice 310. For messages with multiple recipients, an error in the routing to one recipient will not necessarily affect routing to other recipients. Errors during routing can occur due to several circumstances. For example, a message may fail to reach a recipient within the expiration time for the message, a service may fail to return a reply to a delivered message, or a service may return an error status for a message. -
Message Interface Network 150 sequentially delivers a message to each service identified in the message route. InFIG. 3 , this process is illustrated as a flow of the posted message throughmessage routing element 340, and on to one ormore services 350. In one embodiment,Message Interface Network 150 includes all of the message documents in the message delivered toservice 350, even ifservice 350 only expects to operate on one document or documents of a particular content-type.Service 350 would ignore documents that it does not expect. - As noted,
Message Interface Network 150 invokes in-transit services in the same way as delivering a message to any sending or recipient service. In general, a service does not necessarily need to be aware whether it is being invoked as an in-transit service or as a recipient service. - After processing the message,
service 350 sends the results in a response message back toMessage Interface Network 150. Ifservice 350 is unable to produce a valid result for its operation on a message, then service 350 may return an error code in its response message toMessage Interface Network 150. Ifservice 350 fails to respond to a received message, the message will ultimately expire, andMessage Interface Network 150 may return an error message back to the sendingservice 310. - Upon receipt of the response message from
service 350,Message Interface Network 150 then routes the message to the next destination (e.g., another service 350) on the routing list. After passing through each of the intermediate destinations on the routing list, the message is then stored inqueue 334 forrecipient service 360. Queues can also be associated with in-transit services 350. For simplicity, these queues are not shown in the illustrated embodiment ofFIG. 3 . -
Application 372 inrecipient service 360 can retrieve the message fromqueue 334 viamessage poll interface 328. In the poll mode,application 372 periodically issues a call tomessage poll interface 328 to ask for any waiting messages. If there are queued messages waiting for delivery to that service, then the one or more messages are returned in a reply. When making poll requests, a service can provide selectors on the messages to fetch. For example, a service can retrieve messages based upon the sender, message type, topic, etc. - In an alternative embodiment, message delivery is enabled through a push mode. In the push mode, the recipient would have its own server to which
Message Interface Network 150 can send messages. A service can specify a maximum number of tries, as well as the retry interval, forMessage Interface Network 150 to send the message to the service before aborting pushed delivery. A service to whichMessage Interface Network 150 pushes messages can also optionally poll for messages. - In the push mode, a service can also specify a delivery window in which it will accept pushed messages. For example, a service might only accept messages between the hours of 1 AM and 2 AM.
- As further illustrated in
FIG. 3 , a response message can be posted byrecipient service 360 tomessage post interface 326. The message is then routed through one ormore services 350 prior to being stored inmessage queue 332. The message can then be retrieved by sendingservice 310 throughmessage poll interface 322. As noted, the return path would not necessarily match the forward path. - In one embodiment, the sender of a message can specify a time by which the routing of a message must complete. If that expiration time passes before delivery of the message to it final destination,
Message Interface Network 150 will abort further routing of the message. In one embodiment, the final destination for a request message is the delivery of a response message back to the original request sender. In this embodiment, senders of response messages cannot specify an expiration since the response is considered part of the routing of the original request message. If a request message expires,Message Interface Network 150 will return an error response back to the sender. If the sender does not specify an expiration time, then a default message expiration time (e.g., 48 hours) can be used. Message expiration is not the same as document expiration. Document expiration is associated with a specific document and indicates how long the document's information is valid. - As part of the message delivery process,
Message Interface Network 150 logs all posted messages, including invalid messages. For each message,Message Interface Network 150 logs relevant information to track the history of the message.Message Interface Network 150 also maintains a correlation between messages. That is, for request messages,Message Interface Network 150 associates the log of the response message(s) with the log of the request message. - In one embodiment, logged information can include the message header, the calculated route for the message (unless route calculation fails), the status of route validation, the size of the message at each stage of the route, and the routing history, including the status for each service along the message's route. The status values for each service depends on the role of the service.
-
Message Interface Network 150 correlates all messages for the same message transaction. That is, for request messages,Message Interface Network 150 associates the log of the response message(s) with the log of the request message. Similarly, if a message causes an error message, thenMessage Interface Network 150 associates the log of the generated error message with the log of the original message. -
FIG. 4A is a diagrammatic representation of acommunication exchange 400 between a plurality of services. In general, any type of service may exchange messages with any other type of service through Message Interchange Network which operates to correlate such messages. As shown inFIG. 4A , aservice 402 initially sends arequest message 404 throughMessage Interchange Network 406 toService 408.Service 408 sends aresponse message 410 back toService 402 in reply to therequest 404.Service 408 also sends arequest message 411 toService 412 in response to theoriginal request message 404 fromService 402.Service 412 then sends aresponse message 414 back toService 408 in reply to therequest 411. - A service may represent any computer application or device accessible to other entities through an interface such as an application programming interface (API), user interface, or Internet web user interface, by any of a variety of protocols over a network within an entity or over the public Internet. A service may also be comprised of multiple methods or applications implemented on a single device or distributed across multiple devices.
- In particular cases, a message may also be sent to a routing script, as described above. In a correlation implementation, a routing script can also be defined as a service. For example, an application type service may send a message to a routing script type service. Accordingly, routing programs can be session participants. In fact, one of the major uses of sessions may be that a session encompasses the set of calls into and from a routing script.
- The messages in this
communication exchange 400 are all related and are preferably correlated together.Response message 410 is in reply to requestmessage 404, and hence, related torequest message 404. Likewise,response message 414 is in reply to request 411, and hence, related torequest message 411. These two pairs of messages may each be referred to as a call. As shown,request 404 andresponse 410 form a call, whilerequest 411 andresponse 414 form a call. - In one embodiment, each message is given a Hop Identifier (ID) and each call is given a Call ID. As shown,
request 404 andresponse 410 are givenCall ID 416, andrequest 411 andresponse 414 are given Call ID 418. In this example, the messages belonging to CallID 416 are also related to the messages belonging to Call ID 418 since the latter messages were initiated in response to the former messages. Hence, the messages associated with bothCall ID 416 and 418 are given aSession ID 420. In sum, each message is given a Hop ID, each set of related messages exchanged between two services is given a Call ID, and each set of messages belonging to related calls are given a Session ID. -
FIG. 4B illustrates a group of related messages within anotherexample communication exchange 450. As shown, afirst service 454 initiates a call between itself andservice 452. In response to this initial call,service 452 then has a plurality of resulting calls between itself and a plurality ofservices Message Interchange Network 406. - In this example, the messages of these related calls all have the same assigned unique Session ID. Similarly, each call has a unique Call ID, while each message within each call has a unique Hop ID. However, not all calls initiated by a particular service have to be part of the same session. For example,
service 452 can choose that some of the resulting calls are not part of the same session. In one implementation, a call is a predefined set of messages (e.g., as preconfigured in the Message Interchange Network), such as a notification message or a pair of request and response messages. A call may be predefined as any number and type of messages. A session in this implementation depends on how the particular services define sessions. That is, a service may be implemented to define its messages any suitable manner. For example, a service may send a first message with the intention of the message being part of a first session and send a second message with the intention of the message being part of a second session. In this example, the sending service may include a first Session ID in the first message and a second Session ID in the second message. Alternatively, the Message Interchange Network may predefine what constitutes a session. For instance, messages which are spawned from a service in response to a message received into such service may be defined as part of a same session. - In summary, a call may include any predefined number and type of messages. For instance, each call may include any number of request and response messages and/or any number of notification messages (e.g., a response is not sent by the receiving service). Each session may include any number of calls between any number of service pairs. While the definition of sessions is general, common uses of sessions include grouping calls comprising a conversation between services, comprising a transaction involving multiple services, or comprising a trace of routing a message through diverse services.
- A same message may be passed through any number of services or hops. That is, a particular message may result in multiple Hop ID's, one Hop ID for each hop of its route. A same message may also be modified by such services as it passes through such services. A message which enters a service, is modified by such service, and output from such service may be defined as two different messages: a first message which is received by such service and a second modified message which exits the service.
- Any suitable technique may used to correlate related messages.
FIG. 4C is a flowchart illustrating aprocedure 470 for correlating messages. Initially, a message is received intoMessage Interchange Network 406 inoperation 472. The message may be any form, such as a request, response, or notification message. Any of these three message types can also include error messages, alert messages, cancel messages, acknowledge messages, etc. - It is then determined whether this is the first message for the current session in
operation 474. In other words, it is determined whether the received message is the start of a new session. This determination may be performed in any suitable manner. In one implementation, if the received message does not include a Session ID or a Call ID, then it is determined that it is the first message in the session (e.g., that this is the start of a new session). TheMessage Interchange Network 406 then assigns a unique session ID for the current session inoperation 476. TheMessage Interchange Network 406 may also return the assigned Session ID to the sender of the message and embeds the Session ID in the received message before forwarding the message to the recipient service inoperation 476. When the received message is not the first message in the current session, assignment of a new Session ID is skipped. - If the message is not the first message in the current session, a Session ID may still be returned back to the message sender in an alternative implementation, as well as storing information about the message. In either implementation, a new Session ID is not assigned, but rather the Session ID of the current session is used for correlating with the current message.
- Messages which are sent by either the sender service or the receiver service after the first message will include the either the assigned Session ID or Call ID if they belong to the current session. A message which is in reply to a request message may simply include a Call ID which is the same as the Call ID of the corresponding request message. In this case, the response message does not include a Session ID and the
Message Interchange Network 406 determines that the response message belongs to the session to which the Call ID is associated. - It may then be determined whether the received message is the first message in the current call in
operation 478. In one example, if the message already includes a Call ID, then it is determined that the message is not the first message for such call. If the message does not include a Call ID, then it is determined that this is the first message for the current call and theMessage Interchange Network 406 then assigns a Call ID inoperation 480. The Call ID may also be returned to the message sender and embedded in the received message inoperation 480. If it is determined that this message is not the first message for the current call, then thisoperation 480 for assigning a new Call ID is skipped. - If the message is not the first message in the current call, a Call ID may still be returned back to the message sender in an alternative implementation, as well as storing information about the message. In either implementation, a new Call ID is not assigned, but rather the Call ID of the current call is used for correlating with the current message.
- This Call
ID assignment operation 480 is also performed after the SessionID assignment operation 476, where a determination is not made as to whether the message is the first message in the current call. When it is determined that the message is the first message for the current session, it is also assumed that it is the first message for the current call. - The
Message Interchange Network 406 may then assign a Hop ID to the received message inoperation 482. The Hop ID generally identifies the current message and its associated “hop” between its sender and receiver. - The Session ID, Call ID and Hop ID may be assigned to a message in any suitable order, besides the order illustrated in
FIG. 4C . For particular protocols, the messages may not be able to embed a Session ID and/or a Call ID. For these protocols, the assigned Hop ID, Call ID, and Session ID and their corresponding message information may still be stored as described below. - Information regarding the received message, the current call, and the current session is then stored in
operation 484. This information can be stored at the same time or individually for the received message, current call, and current session at various points in the message handling process. No matter when the information is stored, it may be stored in any suitable one or more memory device(s). - In one implementation, the Hop ID, Call ID, and Session ID and their associated information regarding the message, call, and session are stored in a repository.
FIG. 4D is illustrates a Message Correlation Table 490 for correlating information regarding each message, a Call Correlation Table 492 for correlating information regarding each call, and a Session Correlation Table 494 for correlating information regarding each session. The Tables 490, 492, and 494 may be stored inrepository 240. The repository may be formed from any suitable number of databases stored on any suitable number of memories on any suitable number of computer systems. - As shown, the Message Correlation Table 490 includes one or more entries for each message. Each entry includes correlation information for each message. In this embodiment, each entry corresponds to a particular message and includes the particular message's Hop ID, message information regarding the particular message, the particular message's Call ID, and the particular message's Session ID. The message information may include any information relevant to the particular message, such as the message's sending service and receiving service, whether the message has completed its transmission (e.g., to its intended destination service), and a reason or error log regarding why a message has failed to complete its hop, selected message content, the size of the message, the receiving and sending times for the message, the topic of the message, the status on processing steps taken on the message, the protocols used in receiving and sending the message, etc. The message's session ID may be assigned by the Message Interchange Network, embedded in the message received into the Message Interchange Network, or inferred from the Call ID embedded in the message (e.g., the same session to which the Call ID is associated).
- As shown, a message having Hop ID equal to “hop1” belongs to the same call as a message identified by Hop ID “hop2.” This same call is identified by Call ID “call1.” Additionally, another message having Hop ID “hop3” belongs to a call identified by Call ID “call2”, while another message having Hop ID “hop4” belongs to a call identified by Call ID “call3.” Also illustrated in the example of
FIG. 4D , messages having Hop ID's “hop1”, “hop2”, and “hop3” all belong to a same session identified by Session ID “session1.” In contrast, the message having Hop ID “hop4” belongs to a different session having a Session ID “session2.” - In an alternative embodiment, a service could define a message field that is to be used as a message identifier. For example, the profile information for a service could include an XPath expression designating a field in XML messages. In this embodiment, the Message Interchange Network would extract the value of the field from a received message and store the custom message identifier along with the assigned Call or Session ID. This alternative implementation then enables a service to query for correlation information using their own identifier, rather then necessarily the assigned Call or Session ID's.
- The Call Correlation Table 492 also includes one or more entries for each call. As shown, each entry includes a Call ID for a particular call and call information regarding the particular call. The call information for a particular call may include an indication as to whether the particular call is complete, a reason for the particular call not completing, the type of call, the receiving and sending times for the call, the sender and recipient services of the call, the status of policy evaluation for the call, the set of hops in the call, etc.
- The Session Correlation Table 494 includes one or more entries for each session. Each entry for a particular session generally includes a Session ID for the particular session and session information regarding the particular session. The session information for a particular session may include any information relevant to a particular session such as, the calculated or executed route for messages sent within such particular session, the size of each message at each stage in the route, the identity and status of each service within the route paths of the particular session, whether a session has been completed, and reasons for a session failing to complete, the initiating time and completion time for the session, the set of calls in the session, etc.
- The tables shown in
FIG. 4D illustrate only one embodiment of storing correlation information. Any other suitable set of tables and relationships among tables may be used to store correlation information. For example, the message route of a session may not be stored directly in one table, but rather may be inferred from the set of calls and hops related to the session as stored in one or more other tables. - At any time during the correlation process, an entity may query the
Message Interchange Network 406 for information which has been correlated together. For example, a service may request correlation information regarding a particular session. In this example, theMessage Interchange Network 406 collects all entries within the Correlation Tables 490, 492, and 494 that relate to the requested session's Session ID Likewise, an entity may request correlation information regarding a particular service, route, call, time period, message status, etc. - The
Message Interchange Network 406 preferably determines whether a request service is authorized to receive a compilation of its requested correlation information. This determination may be performed in any suitable manner. In one implementation, the requesting service is authorized when the requested information is in any way related to a service owned by the requesting service's organization. For example, a service may request correlation information regarding any messages sent by such requesting service, and any messages from calls or sessions belonging to the same call or session as the sent messages. In another implementation, the requesting service may request correlation information which is related to any one message which contains an identifier of the requesting service. - The correlation techniques allow end points or services to correlate through an intermediary which handles ID assignments. Thus, the end points or services do not have to separately negotiate the use of an ID for their communication exchanges with every service. As a result, this approach greatly simplifies correlation of complex message interchanges over a computer network between diverse services and/or end point entities.
- In summary, since an intermediary network (e.g., message interchange network) handles identification of messages, calls, and sessions, as well as correlation of information related to same, users of such intermediary network do not have to implement any procedures for correlation. Since an intermediary is performing the correlation of messages sent between diverse and distributed services, any end point or service can also easily gain a clear picture as to what is happening with messages sent as a result of its interactions with such diverse services. Since the retained correlation information is performed by a single intermediary network, the correlation information is standardized and easily compiled into a clear summary of interactions results.
- As thus described,
Message Interface Network 150 enables flexible interaction between services. Several embodiments for provisioning or setting up services withMessage Interface Network 150 and routing messages throughMessage Interface Network 150 between such provisioned services are further described in the above referenced Lev Brouk et al. U.S. patent application. - Generally, the correlation techniques may be implemented on software and/or hardware. For example, it can be implemented in an operating system kernel, in a separate user process, in a library package bound into network applications, on a specially constructed machine, or on a network interface card. In a specific embodiment, the techniques are implemented in software such as an operating system or in an application running on an operating system.
- A software or software/hardware hybrid packet processing system is preferably implemented on a general-purpose programmable machine selectively activated or reconfigured by a computer program stored in memory. In one embodiment, portions of the correlation system (e.g., Message Interchange Network) may be implemented on a general-purpose network host machine such as a personal computer or workstation.
- Referring now to
FIG. 5 acomputer system 500 suitable for implementing some disclosed techniques includes a master central processing unit (CPU) 502, one ormore memory 504, input andoutput interfaces 506, and a bus 508 (e.g., a PCI bus). When acting under the control of appropriate software or firmware, theCPU 502 is responsible for implementing various portions of the disclosed techniques. It preferably accomplishes all these functions under the control of software including an operating system and any appropriate applications software.CPU 502 may include one or more processors such as a processor from the Intel family of microprocessors or the MIPS family of microprocessors. In a specific embodiment, a memory 504 (such as non-volatile RAM and/or ROM) also forms part ofCPU 502. However, there are many different ways in which memory could be coupled to the system.Memory block 504 may be used for a variety of purposes such as, for example, caching and/or storing data, programming instructions, etc. - The input and
output interfaces 506 typically provide an interface to various I/O devices, such as mouse, keyboard, display, as well as providing an communication interface with other computer systems over a computer network. Among the communication interfaces that may be provided are Ethernet interfaces, frame relay interfaces, cable interfaces, DSL interfaces, token ring interfaces, and the like. In addition, various very high-speed interfaces may be provided such as fast Ethernet interfaces, Gigabit Ethernet interfaces, ATM interfaces, HSSI interfaces, POS interfaces, FDDI interfaces and the like. Generally, these interfaces may include ports appropriate for communication with the appropriate media. In some cases, they may also include an independent processor and, in some instances, volatile RAM. - Although the system shown in
FIG. 5 is one specific computer system, it is by no means the only system architecture on which the disclosed implementations can be provided. - Regardless of system's configuration, it may employ one or more memories or memory modules (such as, for example, memory block 504) configured to store data, program instructions for the general-purpose network operations and/or the inventive techniques described herein. The program instructions may control the operation of an operating system and/or one or more applications, for example. The memory or memories may also be configured to store information in
repository 240, etc. - Because such information and program instructions may be employed to implement some examples of systems/methods described herein, also disclosed are machine readable media that include program instructions, state information, etc. for performing various operations described herein. Examples of machine-readable media include, but are not limited to, magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks and DVDs; magneto-optical media such as floptical disks; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory devices (ROM) and random access memory (RAM). Examples of program instructions include both machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter.
- Although the foregoing has been described in some detail for purposes of clarity of understanding, it will be apparent that certain changes and modifications may be practiced within the scope of the appended claims. Therefore, the described embodiments should be taken as illustrative and not restrictive, and the disclosure should not be limited to the details given herein but should be defined by the following claims and their full scope of equivalents.
Claims (21)
1-18. (canceled)
19. A data processing system comprising:
a server system comprising one or more processors configurable to cause:
providing, at a message bus, a service registry, the message bus being configurable to receive request messages from service consumers to service providers, the message bus being configurable to send reply messages from service providers to service consumers, the service registry being a network-based directory comprising a plurality of available services provided by the service providers;
assigning a request identifier to a first request message received at the message bus from a first service consumer to a first service provider, the request identifier being a first token that uniquely identifies the first request message, the first request message being a one of a plurality of request messages from the first service consumer to a plurality of service providers;
associating a correlation identifier with a first reply message from the first service provider to the first service consumer, the first reply message being a response to the first request message, the correlation identifier being a second token having a same value as the first token; and
sending, based on the association of the reply message with the correlation identifier, the first reply message to the first service consumer.
20. The data processing system of claim 19 , wherein the message bus is further configurable to:
accept and store contracts from the service providers, and
provide the contracts to the service consumers.
21. The data processing system of claim 20 , wherein each contract is associated with a service provider and each contract specifies a format of request messages and reply messages corresponding to the associated service provider.
22. The data processing system of claim 19 , wherein the first request message comprises a message header and the message header comprises the request identifier.
23. The data processing system of claim 19 , wherein:
a first group of messages, processed at the message bus, belong to a first one of a plurality of calls, each call being between a pair of services provided by the service providers, at least a portion of the calls being related to each other by invoking or causing invocation of a same service, and
the related calls belong to a first one of a plurality of sessions.
24. The data processing system of claim 23 , the one or more processors further configurable to cause:
associating the first group of messages with a call identifier identifying the first call and a session identifier identifying the first session.
25. The data processing system of claim 23 , the one or more processors further configurable to cause:
processing, at the message bus, a query received from a first requestor to search for a specific message, call, or session; and
sending, to the first requestor, a reply to the query.
26. A method comprising:
providing, at a message bus implemented using a server system, a service registry, the message bus being configurable to receive request messages from service consumers to service providers, the message bus being configurable to send reply messages from service providers to service consumers, the service registry being a network-based directory comprising a plurality of available services provided by the service providers;
assigning a request identifier to a first request message received at the message bus from a first service consumer to a first service provider, the request identifier being a first token that uniquely identifies the first request message, the first request message being a one of a plurality of request messages from the first service consumer to a plurality of service providers;
associating a correlation identifier with a first reply message from the first service provider to the first service consumer, the first reply message being a response to the first request message, the correlation identifier being a second token having a same value as the first token; and
sending, based on the association of the reply message with the correlation identifier, the first reply message to the first service consumer.
27. The method of claim 26 , wherein the message bus is further configurable to:
accept and store contracts from the service providers, and
provide the contracts to the service consumers.
28. The method of claim 27 , wherein each contract is associated with a service provider and each contract specifies a format of request messages and reply messages corresponding to the associated service provider.
29. The method of claim 26 , wherein the first request message comprises a message header and the message header comprises the request identifier.
30. The method of claim 26 , wherein:
a first group of messages, processed at the message bus, belong to a first one of a plurality of calls, each call being between a pair of services provided by the service providers, at least a portion of the calls being related to each other by invoking or causing invocation of a same service, and
the related calls belong to a first one of a plurality of sessions.
31. The method of claim 30 , further comprising:
associating the first group of messages with a call identifier identifying the first call and a session identifier identifying the first session.
32. The method of claim 30 , further comprising:
processing, at the message bus, a query received from a first requestor to search for a specific message, call, or session; and
sending, to the first requestor, a reply to the query.
33. A computer program product comprising computer-readable program code capable of being executed by one or more processors when retrieved from a non-transitory computer-readable medium, the program code comprising instructions configurable to cause:
providing, at a message bus, a service registry, the message bus being configurable to receive request messages from service consumers to service providers, the message bus being configurable to send reply messages from service providers to service consumers, the service registry being a network-based directory comprising a plurality of available services provided by the service providers;
assigning a request identifier to a first request message received at the message bus from a first service consumer to a first service provider, the request identifier being a first token that uniquely identifies the first request message, the first request message being a one of a plurality of request messages from the first service consumer to a plurality of service providers;
associating a correlation identifier with a first reply message from the first service provider to the first service consumer, the first reply message being a response to the first request message, the correlation identifier being a second token having a same value as the first token; and
sending, based on the association of the reply message with the correlation identifier, the first reply message to the first service consumer.
34. The computer program product of claim 33 , wherein the message bus is further configurable to:
accept and store contracts from the service providers, and
provide the contracts to the service consumers.
35. The computer program product of claim 34 , wherein each contract is associated with a service provider and each contract specifies a format of request messages and reply messages corresponding to the associated service provider.
36. The computer program product of claim 33 , wherein the first request message comprises a message header and the message header comprises the request identifier.
37. The computer program product of claim 33 , wherein:
a first group of messages, processed at the message bus, belong to a first one of a plurality of calls, each call being between a pair of services provided by the service providers, at least a portion of the calls being related to each other by invoking or causing invocation of a same service, and
the related calls belong to a first one of a plurality of sessions.
38. The computer program product of claim 37 , the instructions further configurable to cause:
associating the first group of messages with a call identifier identifying the first call and a session identifier identifying the first session.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/056,236 US20160182645A1 (en) | 2001-03-30 | 2016-02-29 | Managing messages sent between services |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/820,966 US7689711B2 (en) | 2001-03-26 | 2001-03-30 | System and method for routing messages between applications |
US10/728,356 US7249195B2 (en) | 2001-03-30 | 2003-12-03 | Apparatus and methods for correlating messages sent between services |
US11/773,931 US9037726B2 (en) | 2001-03-30 | 2007-07-05 | Apparatus and methods for managing messages sent between services |
US14/687,729 US11070626B2 (en) | 2001-03-30 | 2015-04-15 | Managing messages sent between services |
US15/056,236 US20160182645A1 (en) | 2001-03-30 | 2016-02-29 | Managing messages sent between services |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/687,729 Continuation US11070626B2 (en) | 2001-03-30 | 2015-04-15 | Managing messages sent between services |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160182645A1 true US20160182645A1 (en) | 2016-06-23 |
Family
ID=38950565
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/728,356 Expired - Lifetime US7249195B2 (en) | 2001-03-30 | 2003-12-03 | Apparatus and methods for correlating messages sent between services |
US11/773,931 Expired - Lifetime US9037726B2 (en) | 2001-03-30 | 2007-07-05 | Apparatus and methods for managing messages sent between services |
US14/687,729 Expired - Lifetime US11070626B2 (en) | 2001-03-30 | 2015-04-15 | Managing messages sent between services |
US15/056,236 Abandoned US20160182645A1 (en) | 2001-03-30 | 2016-02-29 | Managing messages sent between services |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/728,356 Expired - Lifetime US7249195B2 (en) | 2001-03-30 | 2003-12-03 | Apparatus and methods for correlating messages sent between services |
US11/773,931 Expired - Lifetime US9037726B2 (en) | 2001-03-30 | 2007-07-05 | Apparatus and methods for managing messages sent between services |
US14/687,729 Expired - Lifetime US11070626B2 (en) | 2001-03-30 | 2015-04-15 | Managing messages sent between services |
Country Status (1)
Country | Link |
---|---|
US (4) | US7249195B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9674226B2 (en) | 2004-03-23 | 2017-06-06 | Salesforce.Com, Inc. | Synchronous interface to asynchronous processes |
US11070626B2 (en) | 2001-03-30 | 2021-07-20 | Salesforce.Com, Inc. | Managing messages sent between services |
US11431820B1 (en) | 2021-11-05 | 2022-08-30 | Industrial Technology Research Institute | Method and system for implementing inter-process communications |
US11586533B2 (en) * | 2020-09-21 | 2023-02-21 | International Business Machines Corporation | Creating a mock for an integration flow |
US11950300B2 (en) * | 2021-07-09 | 2024-04-02 | Soundhound, Inc. | Using a smartphone to control another device by voice |
Families Citing this family (107)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060047665A1 (en) * | 2001-01-09 | 2006-03-02 | Tim Neil | System and method for simulating an application for subsequent deployment to a device in communication with a transaction server |
US9948644B2 (en) | 2001-03-26 | 2018-04-17 | Salesforce.Com, Inc. | Routing messages between applications |
US7516191B2 (en) * | 2001-03-26 | 2009-04-07 | Salesforce.Com, Inc. | System and method for invocation of services |
US7788399B2 (en) | 2001-03-26 | 2010-08-31 | Salesforce.Com, Inc. | System and method for mapping of services |
US7689711B2 (en) | 2001-03-26 | 2010-03-30 | Salesforce.Com, Inc. | System and method for routing messages between applications |
US7305454B2 (en) * | 2001-03-30 | 2007-12-04 | Minor Ventures, Llc. | Apparatus and methods for provisioning services |
US7209929B2 (en) * | 2003-04-17 | 2007-04-24 | Salesforce.Com, Inc. | Java object cache server for databases |
US8453196B2 (en) | 2003-10-14 | 2013-05-28 | Salesforce.Com, Inc. | Policy management in an interoperability network |
US7904882B2 (en) | 2003-10-16 | 2011-03-08 | Salesforce.Com, Inc. | Managing virtual business instances within a computer network |
US8775654B2 (en) * | 2003-12-19 | 2014-07-08 | Salesforce.Com, Inc. | Apparatus and methods for mediating messages |
US7451211B2 (en) * | 2004-01-23 | 2008-11-11 | Microsoft Corporation | Message exchange pattern tracking to avoid invalid message exchange |
US7590685B2 (en) * | 2004-04-07 | 2009-09-15 | Salesforce.Com Inc. | Techniques for providing interoperability as a service |
US7756930B2 (en) | 2004-05-28 | 2010-07-13 | Ironport Systems, Inc. | Techniques for determining the reputation of a message sender |
US7873695B2 (en) * | 2004-05-29 | 2011-01-18 | Ironport Systems, Inc. | Managing connections and messages at a server by associating different actions for both different senders and different recipients |
US7849142B2 (en) * | 2004-05-29 | 2010-12-07 | Ironport Systems, Inc. | Managing connections, messages, and directory harvest attacks at a server |
US7870200B2 (en) * | 2004-05-29 | 2011-01-11 | Ironport Systems, Inc. | Monitoring the flow of messages received at a server |
US8606723B2 (en) | 2004-06-04 | 2013-12-10 | Sap Ag | Consistent set of interfaces derived from a business object model |
WO2006038924A2 (en) | 2004-06-18 | 2006-04-13 | Sap Ag | Consistent set of interfaces derived from a business object model |
US7725605B2 (en) * | 2004-08-06 | 2010-05-25 | Salesforce.Com, Inc. | Providing on-demand access to services in a wide area network |
US9552599B1 (en) * | 2004-09-10 | 2017-01-24 | Deem, Inc. | Platform for multi-service procurement |
US7721328B2 (en) | 2004-10-01 | 2010-05-18 | Salesforce.Com Inc. | Application identity design |
US9645712B2 (en) | 2004-10-01 | 2017-05-09 | Grand Central Communications, Inc. | Multiple stakeholders for a single business process |
US20060074703A1 (en) * | 2004-10-04 | 2006-04-06 | Grand Central Communications, Inc. | Providing and managing business processes |
US7613830B2 (en) * | 2004-12-10 | 2009-11-03 | Microsoft Corporation | Reliably transferring queued application messages |
WO2006089386A1 (en) * | 2005-02-22 | 2006-08-31 | Nextair Corporation | Simulating an application for subsequent deployment to a device |
US8744937B2 (en) | 2005-02-25 | 2014-06-03 | Sap Ag | Consistent set of interfaces derived from a business object model |
US8787387B2 (en) * | 2005-03-04 | 2014-07-22 | France Telecom | Method for transmitting data and related service data |
US7854007B2 (en) | 2005-05-05 | 2010-12-14 | Ironport Systems, Inc. | Identifying threats in electronic messages |
US20060282502A1 (en) * | 2005-06-10 | 2006-12-14 | Koshak Richard L | Method and system for translation of electronic data and software transport protocol with reusable components |
US8266327B2 (en) * | 2005-06-21 | 2012-09-11 | Cisco Technology, Inc. | Identity brokering in a network element |
US8220030B2 (en) * | 2005-07-02 | 2012-07-10 | Tara Chand Singhal | System and method for security in global computer transactions that enable reverse-authentication of a server by a client |
US8239820B1 (en) * | 2005-07-18 | 2012-08-07 | Progress Software Corporation | Compliance method and system for XML-based applications |
US20070150349A1 (en) * | 2005-12-28 | 2007-06-28 | Rearden Commerce, Inc. | Method and system for culling star performers, trendsetters and connectors from a pool of users |
US9117223B1 (en) | 2005-12-28 | 2015-08-25 | Deem, Inc. | Method and system for resource planning for service provider |
US20070233736A1 (en) * | 2006-03-28 | 2007-10-04 | Heyletsgo, Inc. | Method and system for social and leisure life management |
US8924269B2 (en) | 2006-05-13 | 2014-12-30 | Sap Ag | Consistent set of interfaces derived from a business object model |
US7805489B2 (en) * | 2006-06-27 | 2010-09-28 | Research In Motion Limited | Electronic mail communications system with client email internet service provider (ISP) polling application and related methods |
US8566193B2 (en) | 2006-08-11 | 2013-10-22 | Sap Ag | Consistent set of interfaces derived from a business object model |
US8606639B1 (en) | 2006-09-28 | 2013-12-10 | Sap Ag | Managing consistent interfaces for purchase order business objects across heterogeneous systems |
US7634553B2 (en) * | 2006-10-09 | 2009-12-15 | Raytheon Company | Service proxy for emulating a service in a computer infrastructure for testing and demonstration |
US9219757B2 (en) * | 2006-12-28 | 2015-12-22 | Cable Television Laboratories, Inc. | Message correlation |
US20080192655A1 (en) * | 2007-02-09 | 2008-08-14 | Ted Vagelos | Systems And Methods For Providing Enhanced Telephone Services |
US7792975B1 (en) * | 2007-03-12 | 2010-09-07 | Cisco Technology, Inc. | Application session management in networking devices |
US7908607B2 (en) * | 2007-08-30 | 2011-03-15 | Microsoft Corporation | Efficient marshalling between soap and business-process messages |
US20120095807A1 (en) * | 2007-09-18 | 2012-04-19 | Kowalonek John A | Methods and apparatus for operating an electronic billing repository |
US20090182816A1 (en) * | 2008-01-10 | 2009-07-16 | Jean Xu Yu | Method and system for managing j2ee and .net interoperating applications |
US9204293B2 (en) * | 2008-02-21 | 2015-12-01 | Telefonaktiebolaget L M Ericsson (Publ) | Apparatuses, methods, and computer program products for data retention and lawful intercept for law enforcement agencies |
US8417593B2 (en) | 2008-02-28 | 2013-04-09 | Sap Ag | System and computer-readable medium for managing consistent interfaces for business objects across heterogeneous systems |
US8930248B2 (en) | 2008-03-31 | 2015-01-06 | Sap Se | Managing consistent interfaces for supply network business objects across heterogeneous systems |
US20090249358A1 (en) * | 2008-03-31 | 2009-10-01 | Sap Ag | Managing Consistent Interfaces for Kanban Business Objects Across Heterogeneous Systems |
US20090248429A1 (en) * | 2008-03-31 | 2009-10-01 | Sap Ag | Managing Consistent Interfaces for Sales Price Business Objects Across Heterogeneous Systems |
US20090248463A1 (en) * | 2008-03-31 | 2009-10-01 | Emmanuel Piochon | Managing Consistent Interfaces For Trading Business Objects Across Heterogeneous Systems |
US9143540B2 (en) * | 2008-04-24 | 2015-09-22 | Oracle International Corporation | System and method for providing service correlation in a service access gateway environment |
US8671064B2 (en) | 2008-06-26 | 2014-03-11 | Sap Ag | Managing consistent interfaces for supply chain management business objects across heterogeneous systems |
US20090326988A1 (en) | 2008-06-26 | 2009-12-31 | Robert Barth | Managing consistent interfaces for business objects across heterogeneous systems |
US8370440B2 (en) * | 2008-09-30 | 2013-02-05 | Microsoft Corporation | Role-independent context exchange |
US8577760B2 (en) * | 2008-11-25 | 2013-11-05 | Sap Ag | Managing consistent interfaces for tax authority business objects across heterogeneous systems |
US20100153297A1 (en) | 2008-12-12 | 2010-06-17 | Sap Ag | Managing Consistent Interfaces for Credit Portfolio Business Objects Across Heterogeneous Systems |
US8775651B2 (en) * | 2008-12-12 | 2014-07-08 | Raytheon Company | System and method for dynamic adaptation service of an enterprise service bus over a communication platform |
US8230357B2 (en) * | 2008-12-18 | 2012-07-24 | Microsoft Corporation | Visually processing instance data |
US8091016B2 (en) * | 2008-12-18 | 2012-01-03 | Microsoft Corporation | Visually manipulating instance collections |
US20100254388A1 (en) * | 2009-04-04 | 2010-10-07 | Oracle International Corporation | Method and system for applying expressions on message payloads for a resequencer |
US8661083B2 (en) * | 2009-04-04 | 2014-02-25 | Oracle International Corporation | Method and system for implementing sequence start and increment values for a resequencer |
US8254391B2 (en) | 2009-04-04 | 2012-08-28 | Oracle International Corporation | Method and system for performing blocking of messages on errors in message stream |
US8578218B2 (en) * | 2009-04-04 | 2013-11-05 | Oracle International Corporation | Method and system for implementing a scalable, high-performance, fault-tolerant locking mechanism in a multi-process environment |
US9124448B2 (en) * | 2009-04-04 | 2015-09-01 | Oracle International Corporation | Method and system for implementing a best efforts resequencer |
US10552849B2 (en) | 2009-04-30 | 2020-02-04 | Deem, Inc. | System and method for offering, tracking and promoting loyalty rewards |
US8396751B2 (en) | 2009-09-30 | 2013-03-12 | Sap Ag | Managing consistent interfaces for merchandising business objects across heterogeneous systems |
WO2011132928A2 (en) * | 2010-04-20 | 2011-10-27 | 삼성전자 주식회사 | Management method and system for a device that provides m2m services, and an apparatus thereof |
US8417588B2 (en) | 2010-06-15 | 2013-04-09 | Sap Ag | Managing consistent interfaces for goods tag, production bill of material hierarchy, and release order template business objects across heterogeneous systems |
US9135585B2 (en) | 2010-06-15 | 2015-09-15 | Sap Se | Managing consistent interfaces for property library, property list template, quantity conversion virtual object, and supplier property specification business objects across heterogeneous systems |
US8412603B2 (en) * | 2010-06-15 | 2013-04-02 | Sap Ag | Managing consistent interfaces for currency conversion and date and time business objects across heterogeneous systems |
US8732083B2 (en) | 2010-06-15 | 2014-05-20 | Sap Ag | Managing consistent interfaces for number range, number range profile, payment card payment authorisation, and product template template business objects across heterogeneous systems |
US8402311B2 (en) * | 2010-07-19 | 2013-03-19 | Microsoft Corporation | Monitoring activity with respect to a distributed application |
US9449288B2 (en) | 2011-05-20 | 2016-09-20 | Deem, Inc. | Travel services search |
US8521838B2 (en) | 2011-07-28 | 2013-08-27 | Sap Ag | Managing consistent interfaces for communication system and object identifier mapping business objects across heterogeneous systems |
US8775280B2 (en) | 2011-07-28 | 2014-07-08 | Sap Ag | Managing consistent interfaces for financial business objects across heterogeneous systems |
US8560392B2 (en) | 2011-07-28 | 2013-10-15 | Sap Ag | Managing consistent interfaces for a point of sale transaction business object across heterogeneous systems |
US8601490B2 (en) | 2011-07-28 | 2013-12-03 | Sap Ag | Managing consistent interfaces for business rule business object across heterogeneous systems |
US8666845B2 (en) | 2011-07-28 | 2014-03-04 | Sap Ag | Managing consistent interfaces for a customer requirement business object across heterogeneous systems |
US8725654B2 (en) | 2011-07-28 | 2014-05-13 | Sap Ag | Managing consistent interfaces for employee data replication business objects across heterogeneous systems |
US8756274B2 (en) | 2012-02-16 | 2014-06-17 | Sap Ag | Consistent interface for sales territory message type set 1 |
US8762453B2 (en) | 2012-02-16 | 2014-06-24 | Sap Ag | Consistent interface for feed collaboration group and feed event subscription |
US8984050B2 (en) | 2012-02-16 | 2015-03-17 | Sap Se | Consistent interface for sales territory message type set 2 |
US8762454B2 (en) | 2012-02-16 | 2014-06-24 | Sap Ag | Consistent interface for flag and tag |
US9237425B2 (en) | 2012-02-16 | 2016-01-12 | Sap Se | Consistent interface for feed event, feed event document and feed event type |
US9232368B2 (en) | 2012-02-16 | 2016-01-05 | Sap Se | Consistent interface for user feed administrator, user feed event link and user feed settings |
US20130347004A1 (en) * | 2012-06-25 | 2013-12-26 | Sap Ag | Correlating messages |
WO2014000200A1 (en) | 2012-06-28 | 2014-01-03 | Sap Ag | Consistent interface for document output request |
US9400998B2 (en) | 2012-06-28 | 2016-07-26 | Sap Se | Consistent interface for message-based communication arrangement, organisational centre replication request, and payment schedule |
US8949855B2 (en) | 2012-06-28 | 2015-02-03 | Sap Se | Consistent interface for address snapshot and approval process definition |
US9246869B2 (en) | 2012-06-28 | 2016-01-26 | Sap Se | Consistent interface for opportunity |
US8521621B1 (en) | 2012-06-28 | 2013-08-27 | Sap Ag | Consistent interface for inbound delivery request |
US9367826B2 (en) | 2012-06-28 | 2016-06-14 | Sap Se | Consistent interface for entitlement product |
US8615451B1 (en) | 2012-06-28 | 2013-12-24 | Sap Ag | Consistent interface for goods and activity confirmation |
US8756135B2 (en) | 2012-06-28 | 2014-06-17 | Sap Ag | Consistent interface for product valuation data and product valuation level |
US8793669B2 (en) * | 2012-07-17 | 2014-07-29 | Concurix Corporation | Pattern extraction from executable code in message passing environments |
US9547833B2 (en) | 2012-08-22 | 2017-01-17 | Sap Se | Consistent interface for financial instrument impairment calculation |
US9076112B2 (en) | 2012-08-22 | 2015-07-07 | Sap Se | Consistent interface for financial instrument impairment expected cash flow analytical result |
US9043236B2 (en) | 2012-08-22 | 2015-05-26 | Sap Se | Consistent interface for financial instrument impairment attribute values analytical result |
US9191357B2 (en) | 2013-03-15 | 2015-11-17 | Sap Se | Consistent interface for email activity business object |
US9191343B2 (en) | 2013-03-15 | 2015-11-17 | Sap Se | Consistent interface for appointment activity business object |
CN106161192A (en) * | 2015-04-08 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of method and apparatus of Message Processing |
CN107517238A (en) * | 2016-06-17 | 2017-12-26 | 阿里巴巴集团控股有限公司 | A kind of smart machine control method, device and equipment for Internet of Things |
US11138539B2 (en) | 2017-08-25 | 2021-10-05 | Target Brands, Inc. | Robtic business process automation system utilizing reusable task-based microbots |
US11238386B2 (en) | 2018-12-20 | 2022-02-01 | Sap Se | Task derivation for workflows |
CN113810266B (en) * | 2021-08-13 | 2023-05-12 | 北京达佳互联信息技术有限公司 | Retry operation method, device, equipment and storage medium for message object |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6757729B1 (en) * | 1996-10-07 | 2004-06-29 | International Business Machines Corporation | Virtual environment manager for network computers |
US20040189698A1 (en) * | 2003-03-26 | 2004-09-30 | Nortel Networks Limited | Instant messaging to service bureau |
US20040215721A1 (en) * | 2003-03-24 | 2004-10-28 | Yahoo!, Inc. | System and method for instant messaging using an e-mail protocol |
US20050108169A1 (en) * | 2003-11-14 | 2005-05-19 | Mukund Balasubramanian | Contract based enterprise application services |
US7296061B2 (en) * | 2001-11-21 | 2007-11-13 | Blue Titan Software, Inc. | Distributed web services network architecture |
Family Cites Families (192)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5119377A (en) * | 1989-06-16 | 1992-06-02 | International Business Machines Corporation | System and method for software error early detection and data capture |
US5222234A (en) * | 1989-12-28 | 1993-06-22 | International Business Machines Corp. | Combining search criteria to form a single search and saving search results for additional searches in a document interchange system |
US5255389A (en) * | 1990-06-21 | 1993-10-19 | International Business Machines Corporation | Document interchange replace option via a copy command |
EP0462914A3 (en) * | 1990-06-21 | 1993-06-02 | International Business Machines Corporation | A method of creating documents using existing documents |
US5448730A (en) | 1993-12-14 | 1995-09-05 | International Business Machines Corporation | Correlating a response with a previously sent request in a multitasking computer system using pipeline commands |
US5850518A (en) | 1994-12-12 | 1998-12-15 | Northrup; Charles J. | Access-method-independent exchange |
US5724556A (en) | 1995-04-14 | 1998-03-03 | Oracle Corporation | Method and apparatus for defining and configuring modules of data objects and programs in a distributed computer system |
US6571141B1 (en) * | 1995-05-30 | 2003-05-27 | Roy-G-Biv Corporation | Application programs for motion control devices including access limitations |
US5774668A (en) | 1995-06-07 | 1998-06-30 | Microsoft Corporation | System for on-line service in which gateway computer uses service map which includes loading condition of servers broadcasted by application servers for load balancing |
US6230203B1 (en) | 1995-10-20 | 2001-05-08 | Scientific-Atlanta, Inc. | System and method for providing statistics for flexible billing in a cable environment |
US5832483A (en) | 1995-12-15 | 1998-11-03 | Novell, Inc. | Distributed control interface for managing the interoperability and concurrency of agents and resources in a real-time environment |
WO1997022936A1 (en) | 1995-12-19 | 1997-06-26 | Motorola Inc. | Method and apparatus for rate governing communications |
JP3847882B2 (en) | 1996-02-09 | 2006-11-22 | キヤノン株式会社 | Communication apparatus and processing method thereof |
US6032266A (en) | 1996-04-05 | 2000-02-29 | Hitachi, Ltd. | Network system having function of changing route upon failure |
GB2313524A (en) | 1996-05-24 | 1997-11-26 | Ibm | Providing communications links in a computer network |
EP0906703A4 (en) | 1996-06-18 | 2000-03-15 | Compuserve Inc | Integrated voice, facsimile and electronic mail messaging system |
US6065082A (en) | 1996-08-06 | 2000-05-16 | International Business Machines Corporation | HDLC asynchronous to synchronous converter |
US6272457B1 (en) | 1996-09-16 | 2001-08-07 | Datria Systems, Inc. | Spatial asset management system that time-tags and combines captured speech data and captured location data using a predifed reference grammar with a semantic relationship structure |
US5974572A (en) | 1996-10-15 | 1999-10-26 | Mercury Interactive Corporation | Software system and methods for generating a load test using a server access log |
US6499108B1 (en) | 1996-11-19 | 2002-12-24 | R. Brent Johnson | Secure electronic mail system |
US5903652A (en) | 1996-11-25 | 1999-05-11 | Microsoft Corporation | System and apparatus for monitoring secure information in a computer network |
ES2290986T3 (en) | 1997-03-12 | 2008-02-16 | Nomadix, Inc. | NAME TRANSMITTER OR ROUTER. |
US6091714A (en) * | 1997-04-30 | 2000-07-18 | Sensel; Steven D. | Programmable distributed digital switch system |
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US6256667B1 (en) * | 1997-09-29 | 2001-07-03 | Viewlocity Ab | Intelligent messaging |
US6338074B1 (en) | 1997-07-23 | 2002-01-08 | Filenet Corporation | System for enterprise-wide work flow automation |
DE69811790T2 (en) | 1997-08-01 | 2003-11-20 | International Business Machines Corp., Armonk | Deriving process models from audit processes for workflow management systems |
US6023684A (en) * | 1997-10-01 | 2000-02-08 | Security First Technologies, Inc. | Three tier financial transaction system with cache memory |
US7283561B1 (en) * | 1997-12-12 | 2007-10-16 | Level 3 Communications, Llc | Secure network architecture with quality of service |
US6473770B1 (en) | 1998-03-16 | 2002-10-29 | Navigation Technologies Corp. | Segment aggregation and interleaving of data types in a geographic database and methods for use thereof in a navigation application |
JP3450177B2 (en) | 1998-03-20 | 2003-09-22 | 富士通株式会社 | Network monitoring system and monitored control device |
US8650320B1 (en) * | 1998-03-23 | 2014-02-11 | Software Ag | Integration server supporting multiple receiving channels |
US7028312B1 (en) | 1998-03-23 | 2006-04-11 | Webmethods | XML remote procedure call (XML-RPC) |
US6216130B1 (en) | 1998-04-24 | 2001-04-10 | Ingeo Acquisitions, Inc. | Geographic-based information technology management system |
US6184823B1 (en) | 1998-05-01 | 2001-02-06 | Navigation Technologies Corp. | Geographic database architecture for representation of named intersections and complex intersections and methods for formation thereof and use in a navigation application program |
JP3441367B2 (en) * | 1998-05-25 | 2003-09-02 | 三菱電機株式会社 | Multiple communication connection setting method |
US6988274B2 (en) | 1998-06-12 | 2006-01-17 | Microsoft Corporation | Method, system, and computer program product for representing and connecting an underlying connection-oriented device in a known format |
US6470357B1 (en) | 1998-07-28 | 2002-10-22 | International Bussiness Machines Corp. | System and method of enhanced directory services for telecommunications management network applications |
JP2003528358A (en) * | 1998-08-24 | 2003-09-24 | 富士通株式会社 | Workflow system and method |
US6314468B1 (en) * | 1998-09-03 | 2001-11-06 | Mci Worldcom, Inc. | System and method for managing transmission of electronic data between trading partners |
US6493758B1 (en) | 1998-09-08 | 2002-12-10 | Microsoft Corporation | Offline viewing of internet content with a mobile device |
US6463470B1 (en) | 1998-10-26 | 2002-10-08 | Cisco Technology, Inc. | Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows |
US7673323B1 (en) | 1998-10-28 | 2010-03-02 | Bea Systems, Inc. | System and method for maintaining security in a distributed computer network |
US6473740B2 (en) | 1998-11-29 | 2002-10-29 | Qpass, Inc. | Electronic commerce using a transaction network |
US8019881B2 (en) | 1998-11-30 | 2011-09-13 | George Mason Intellectual Properties, Inc. | Secure cookies |
US6393456B1 (en) | 1998-11-30 | 2002-05-21 | Microsoft Corporation | System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type |
US6578147B1 (en) | 1999-01-15 | 2003-06-10 | Cisco Technology, Inc. | Parallel intrusion detection sensors with load balancing for high speed networks |
US6651087B1 (en) | 1999-01-28 | 2003-11-18 | Bellsouth Intellectual Property Corporation | Method and system for publishing an electronic file attached to an electronic mail message |
AU3480100A (en) | 1999-02-02 | 2000-08-25 | Citibank, N.A. | Method and system for providing a user with integrated interactive access to products and services |
US6260062B1 (en) | 1999-02-23 | 2001-07-10 | Pathnet, Inc. | Element management system for heterogeneous telecommunications network |
US7024669B1 (en) | 1999-02-26 | 2006-04-04 | International Business Machines Corporation | Managing workload within workflow-management-systems |
US6304969B1 (en) | 1999-03-16 | 2001-10-16 | Webiv Networks, Inc. | Verification of server authorization to provide network resources |
US6587466B1 (en) | 1999-05-27 | 2003-07-01 | International Business Machines Corporation | Search tree for policy based packet classification in communication networks |
US6526044B1 (en) * | 1999-06-29 | 2003-02-25 | Wandel & Goltermann Technologies, Inc. | Real-time analysis through capture buffer with real-time historical data correlation |
US6725445B1 (en) | 1999-07-08 | 2004-04-20 | International Business Machines Corporation | System for minimizing notifications in workflow management system |
US6823522B1 (en) | 1999-07-15 | 2004-11-23 | International Business Machines Corporation | Methods, systems and computer program products for chaining integration objects to provide web access for legacy data sources |
US6601082B1 (en) | 1999-07-30 | 2003-07-29 | Intel Corporation | System and method for managing actions provided by a network using a policy tree |
US7100195B1 (en) | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US6587876B1 (en) | 1999-08-24 | 2003-07-01 | Hewlett-Packard Development Company | Grouping targets of management policies |
US6636242B2 (en) * | 1999-08-31 | 2003-10-21 | Accenture Llp | View configurer in a presentation services patterns environment |
US6438594B1 (en) | 1999-08-31 | 2002-08-20 | Accenture Llp | Delivering service to a client via a locally addressable interface |
US6332163B1 (en) | 1999-09-01 | 2001-12-18 | Accenture, Llp | Method for providing communication services over a computer network system |
US6578076B1 (en) | 1999-10-18 | 2003-06-10 | Intel Corporation | Policy-based network management system using dynamic policy generation |
GB9925070D0 (en) * | 1999-10-22 | 1999-12-22 | Nokia Networks Oy | Communication control in a telecommunications system |
US6714987B1 (en) * | 1999-11-05 | 2004-03-30 | Nortel Networks Limited | Architecture for an IP centric distributed network |
US6751657B1 (en) | 1999-12-21 | 2004-06-15 | Worldcom, Inc. | System and method for notification subscription filtering based on user role |
JP3356145B2 (en) | 1999-12-22 | 2002-12-09 | 日本電気株式会社 | Transmission line failure relief method, transmission line failure relief system, storage medium, and router |
US6343290B1 (en) | 1999-12-22 | 2002-01-29 | Celeritas Technologies, L.L.C. | Geographic network management system |
US6948063B1 (en) | 1999-12-23 | 2005-09-20 | Checkfree Corporation | Securing electronic transactions over public networks |
US7082532B1 (en) | 1999-12-30 | 2006-07-25 | Intel Corporation | Method and system for providing distributed web server authentication |
US6877023B1 (en) * | 2000-01-28 | 2005-04-05 | Softwired, Inc. | Messaging system for delivering data in the form of portable message formats between message clients |
US7003571B1 (en) | 2000-01-31 | 2006-02-21 | Telecommunication Systems Corporation Of Maryland | System and method for re-directing requests from browsers for communication over non-IP based networks |
AU2001247984A1 (en) * | 2000-02-16 | 2001-08-27 | Bea Systems Inc. | Workflow integration system for enterprise wide electronic collaboration |
US6763104B1 (en) | 2000-02-24 | 2004-07-13 | Teltronics, Inc. | Call center IVR and ACD scripting method and graphical user interface |
CN1419675A (en) | 2000-03-22 | 2003-05-21 | 伟博麦德有限公司 | Method and system for top-down business process definition and execution |
US7441263B1 (en) | 2000-03-23 | 2008-10-21 | Citibank, N.A. | System, method and computer program product for providing unified authentication services for online applications |
AU2001253043A1 (en) | 2000-03-31 | 2001-10-15 | Coppercom, Inc. | Telecommunications system and methods |
US6782003B1 (en) | 2000-04-12 | 2004-08-24 | Serviceswitch.Com | Data management system and method |
US20020049815A1 (en) * | 2000-04-14 | 2002-04-25 | Kayshav Dattatri | System for monitoring and managing information and information transfers in a computer network |
US7225460B2 (en) | 2000-05-09 | 2007-05-29 | International Business Machine Corporation | Enterprise privacy manager |
US8082491B1 (en) * | 2000-05-09 | 2011-12-20 | Oracle America, Inc. | Dynamic displays in a distributed computing environment |
US7181532B1 (en) | 2000-05-19 | 2007-02-20 | Nortel Networks Limited | Scalable policy server |
US7496637B2 (en) | 2000-05-31 | 2009-02-24 | Oracle International Corp. | Web service syndication system |
US6665393B1 (en) | 2000-06-16 | 2003-12-16 | Cisco Technology, Inc. | Call routing control using call routing scripts |
WO2001098936A2 (en) | 2000-06-22 | 2001-12-27 | Microsoft Corporation | Distributed computing services platform |
US6944662B2 (en) | 2000-08-04 | 2005-09-13 | Vinestone Corporation | System and methods providing automatic distributed data retrieval, analysis and reporting services |
US6910216B2 (en) | 2000-08-08 | 2005-06-21 | International Business Machines Corporation | IMS transaction messages metamodel |
US6965878B1 (en) | 2000-08-16 | 2005-11-15 | Klaus Heuring | Currency and credit rating system for business-to-business transaction |
WO2002020542A2 (en) * | 2000-09-09 | 2002-03-14 | Degussa Ag | Nucleotide sequences which code for the gap2 gene |
US20020103881A1 (en) | 2000-09-11 | 2002-08-01 | Francois Granade | Method and system for integrating applications and mobile networks |
WO2002029682A1 (en) | 2000-10-02 | 2002-04-11 | International Projects Consultancy Services, Inc. | Object-based workflow system and method |
US20040098154A1 (en) | 2000-10-04 | 2004-05-20 | Mccarthy Brendan | Method and apparatus for computer system engineering |
BR0114543A (en) | 2000-10-10 | 2003-08-26 | Nokia Corp | Method for hiding at least one of the names and addresses of network elements in communications between first and second networks, communication system, and contact point apparatus in a system |
US7027997B1 (en) | 2000-11-02 | 2006-04-11 | Verizon Laboratories Inc. | Flexible web-based interface for workflow management systems |
AU2002239620A1 (en) * | 2000-11-06 | 2002-05-27 | Terry Bernard Young | Electronic markets business interchange system and metheo |
US7802174B2 (en) | 2000-12-22 | 2010-09-21 | Oracle International Corporation | Domain based workflows |
US6775704B1 (en) * | 2000-12-28 | 2004-08-10 | Networks Associates Technology, Inc. | System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment |
US7634726B2 (en) * | 2001-01-05 | 2009-12-15 | International Business Machines Corporation | Technique for automated e-business services |
US7562110B2 (en) | 2001-01-11 | 2009-07-14 | F5 Networks, Inc. | File switch and switched file system |
US20020103878A1 (en) | 2001-01-30 | 2002-08-01 | Herbert Moncibais | System for automated configuration of access to the internet |
US6954757B2 (en) * | 2001-02-02 | 2005-10-11 | Hewlett-Packard Development Company, L.P. | Framework, architecture, method and system for reducing latency of business operations of an enterprise |
US6925488B2 (en) | 2001-02-28 | 2005-08-02 | International Business Machines Corporation | Distributed intelligent information technology operations automation |
US7035202B2 (en) | 2001-03-16 | 2006-04-25 | Juniper Networks, Inc. | Network routing using link failure information |
US20020138166A1 (en) * | 2001-03-21 | 2002-09-26 | Milling Systems & Concepts Pte Ltd | Data processing system for implementing an exchange |
US7689711B2 (en) | 2001-03-26 | 2010-03-30 | Salesforce.Com, Inc. | System and method for routing messages between applications |
US7516191B2 (en) | 2001-03-26 | 2009-04-07 | Salesforce.Com, Inc. | System and method for invocation of services |
US7788399B2 (en) | 2001-03-26 | 2010-08-31 | Salesforce.Com, Inc. | System and method for mapping of services |
US6829655B1 (en) | 2001-03-28 | 2004-12-07 | Siebel Systems, Inc. | Method and system for server synchronization with a computing device via a companion device |
US7249195B2 (en) * | 2001-03-30 | 2007-07-24 | Minor Ventures, Llc | Apparatus and methods for correlating messages sent between services |
US7412399B1 (en) | 2001-03-30 | 2008-08-12 | Bea Systems Inc. | Designing business processes using distributed process flows |
US7305454B2 (en) | 2001-03-30 | 2007-12-04 | Minor Ventures, Llc. | Apparatus and methods for provisioning services |
US20020161823A1 (en) | 2001-04-25 | 2002-10-31 | Fabio Casati | Dynamically defining workflow processes using generic nodes |
US7249176B1 (en) | 2001-04-30 | 2007-07-24 | Sun Microsystems, Inc. | Managing user access of distributed resources on application servers |
US7016936B2 (en) | 2001-05-15 | 2006-03-21 | Hewlett-Packard Development Company, L.P. | Real time electronic service interaction management system and method |
US20020187750A1 (en) | 2001-06-12 | 2002-12-12 | Majumdar Kalyan Sankar | Method and apparatus for service management, delegation and personalization |
WO2003001413A1 (en) * | 2001-06-22 | 2003-01-03 | Nosa Omoigui | System and method for knowledge retrieval, management, delivery and presentation |
US20030037250A1 (en) | 2001-06-29 | 2003-02-20 | Doodlebug Online, Inc. | System and method for securely accessing data on content servers using dual encrypted paths from a central authorization host |
US7546629B2 (en) | 2002-03-06 | 2009-06-09 | Check Point Software Technologies, Inc. | System and methodology for security policy arbitration |
SG106621A1 (en) * | 2001-08-04 | 2004-10-29 | Accenture Global Services Gmbh | Training enterprise and method therefor |
US7406424B2 (en) | 2001-08-29 | 2008-07-29 | Hewlett-Packard Development Company, L.P. | Migration of a workflow system to changed process definitions |
US7454750B2 (en) | 2001-10-19 | 2008-11-18 | Amberpoint, Inc. | Integrator adaptor and proxy based composite application provisioning method and apparatus |
US7469299B2 (en) | 2001-10-25 | 2008-12-23 | Verizon Business Global Llc | Bridging user agent and a proxy server for supporting network services |
EP1461679A4 (en) | 2001-11-12 | 2006-01-18 | Worldcom Inc | System and method for implementing frictionless micropayments for consumable services |
US20030149744A1 (en) | 2001-11-20 | 2003-08-07 | Pierre Bierre | Secure identification system combining forensic/biometric population database and issuance of relationship-specific identifiers toward enhanced privacy |
US7853643B1 (en) * | 2001-11-21 | 2010-12-14 | Blue Titan Software, Inc. | Web services-based computing resource lifecycle management |
US20030126001A1 (en) | 2001-12-28 | 2003-07-03 | Margo Northcutt | Process for managing requests for work within an organization through a centralized workflow management system |
CA2469664C (en) * | 2002-01-15 | 2016-08-30 | Avaya Technology Corp. | Communication application server for converged communication services |
US7562339B2 (en) | 2002-01-15 | 2009-07-14 | Bea Systems, Inc. | System architecture for business process development and execution with introspection and generic components |
US7127613B2 (en) | 2002-02-25 | 2006-10-24 | Sun Microsystems, Inc. | Secured peer-to-peer network data exchange |
ES2373647T3 (en) | 2002-02-27 | 2012-02-07 | Opentv, Inc. | METHOD AND DEVICE FOR OBTAINING AN OBJECT OF HIERARCHICAL SAFETY PROFILE. |
US20040054690A1 (en) | 2002-03-08 | 2004-03-18 | Hillerbrand Eric T. | Modeling and using computer resources over a heterogeneous distributed network using semantic ontologies |
US7107285B2 (en) | 2002-03-16 | 2006-09-12 | Questerra Corporation | Method, system, and program for an improved enterprise spatial system |
US20030187676A1 (en) | 2002-03-29 | 2003-10-02 | Stefan Hack | Tool for developing a map of relevant business processes and flows |
US7627631B2 (en) | 2002-05-02 | 2009-12-01 | Bea Systems, Inc. | Systems and methods for collaborative business plug-ins |
US20040025048A1 (en) | 2002-05-20 | 2004-02-05 | Porcari Damian O. | Method and system for role-based access control to a collaborative online legal workflow tool |
US20040003084A1 (en) | 2002-05-21 | 2004-01-01 | Malik Dale W. | Network resource management system |
US8255548B2 (en) | 2002-06-13 | 2012-08-28 | Salesforce.Com, Inc. | Offline web services API to mirror online web services API |
US8037299B2 (en) | 2002-06-18 | 2011-10-11 | Ericsson Ab | Domain-less service selection |
US7007032B1 (en) | 2002-07-01 | 2006-02-28 | Cisco Technology, Inc. | Method and apparatus for removing redundancies from a list of data structures |
US7047488B2 (en) | 2002-07-19 | 2006-05-16 | Open Invention Network | Registry driven interoperability and exchange of documents |
US7130893B2 (en) | 2003-05-19 | 2006-10-31 | International Business Machines Corporation | System and method for representing MFS control blocks in XML for MFS-based IMS applications |
US7340508B1 (en) * | 2002-09-18 | 2008-03-04 | Open Invention Network, Llc | Exposing process flows and choreography controllers as web services |
US20040103014A1 (en) | 2002-11-25 | 2004-05-27 | Teegan Hugh A. | System and method for composing and constraining automated workflow |
US7689709B2 (en) | 2002-12-13 | 2010-03-30 | Sap Ag | Native format tunneling |
US7689430B2 (en) | 2002-12-16 | 2010-03-30 | International Business Machines Corporation | Access to web services |
US7330483B1 (en) * | 2002-12-19 | 2008-02-12 | At&T Corp. | Session initiation protocol (SIP) message incorporating a multi-purpose internet mail extension (MIME) media type for describing the content and format of information included in the SIP message |
US7711694B2 (en) | 2002-12-23 | 2010-05-04 | Sap Ag | System and methods for user-customizable enterprise workflow management |
US20040162741A1 (en) | 2003-02-07 | 2004-08-19 | David Flaxer | Method and apparatus for product lifecycle management in a distributed environment enabled by dynamic business process composition and execution by rule inference |
US20040167834A1 (en) * | 2003-02-12 | 2004-08-26 | Juha-Pekka Koskinen | Method for processing accounting requests in a communications system |
US7853695B2 (en) * | 2003-02-21 | 2010-12-14 | Microsoft Corporation | Using expressive session information to represent communication sessions in a distributed system |
US8700413B2 (en) | 2003-03-03 | 2014-04-15 | International Business Machines Corporation | Web services registration for dynamic composition of web services |
GB0305959D0 (en) | 2003-03-15 | 2003-04-23 | Ibm | Client web service access |
US7366163B1 (en) * | 2003-04-25 | 2008-04-29 | At&T Corp. | Method for providing local and toll services with LNP, and toll-free services to a calling party which originates the call from an IP location connected to a sip-enabled IP network |
JP5154798B2 (en) | 2003-05-07 | 2013-02-27 | エスアーペー アーゲー | Structured workflow system and computer program |
GB0310689D0 (en) * | 2003-05-09 | 2003-06-11 | Ibm | Monitoring operational data in data processing systems |
US20050005164A1 (en) | 2003-06-20 | 2005-01-06 | Bronwyn Syiek | Apparatus and method for precluding e-mail distribution |
US7590701B2 (en) | 2003-07-11 | 2009-09-15 | Salesforce.Com, Inc. | Apparatus and method for generating alert messages in a message exchange network |
US8027922B2 (en) | 2003-07-14 | 2011-09-27 | Sprint Communications Company L.P. | Integration infrastructure |
WO2005022417A2 (en) | 2003-08-27 | 2005-03-10 | Ascential Software Corporation | Methods and systems for real time integration services |
WO2005041490A1 (en) | 2003-09-25 | 2005-05-06 | Siemens Aktiengesellschaft | Use of services within a communication network comprising internet mechanisms and within an automation system |
US8453196B2 (en) | 2003-10-14 | 2013-05-28 | Salesforce.Com, Inc. | Policy management in an interoperability network |
US7904882B2 (en) | 2003-10-16 | 2011-03-08 | Salesforce.Com, Inc. | Managing virtual business instances within a computer network |
US20050119926A1 (en) | 2003-12-01 | 2005-06-02 | Leon Turetsky | Method and system for managing multi-national integrated trade and logistics and processes for efficient, timely, and compliant movement of goods across international borders |
US7181493B2 (en) | 2003-12-23 | 2007-02-20 | Unisys Corporation | Platform independent model-based framework for exchanging information in the justice system |
US20050198121A1 (en) | 2004-01-07 | 2005-09-08 | Daniels Robert W. | Vertical enterprise system |
US7890544B2 (en) | 2004-01-16 | 2011-02-15 | Microsoft Corporation | Metadata driven customization of a software-implemented business process |
EP1716528A1 (en) | 2004-01-30 | 2006-11-02 | Koninklijke KPN N.V. | System and method for developing and implementing business process support systems |
US7496649B2 (en) | 2004-02-20 | 2009-02-24 | Microsoft Corporation | Policy application across multiple nodes |
US7739351B2 (en) | 2004-03-23 | 2010-06-15 | Salesforce.Com, Inc. | Synchronous interface to asynchronous processes |
US8271541B2 (en) | 2004-03-31 | 2012-09-18 | Fusionops Corporation | Method and apparatus for developing composite applications |
US7590685B2 (en) | 2004-04-07 | 2009-09-15 | Salesforce.Com Inc. | Techniques for providing interoperability as a service |
US7802007B2 (en) | 2004-05-19 | 2010-09-21 | Salesforce.Com, Inc. | Techniques for providing connections to services in a network environment |
US8607322B2 (en) | 2004-07-21 | 2013-12-10 | International Business Machines Corporation | Method and system for federated provisioning |
US7725605B2 (en) | 2004-08-06 | 2010-05-25 | Salesforce.Com, Inc. | Providing on-demand access to services in a wide area network |
US20060059423A1 (en) | 2004-09-13 | 2006-03-16 | Stefan Lehmann | Apparatus, system, and method for creating customized workflow documentation |
US7577953B1 (en) | 2004-09-16 | 2009-08-18 | Dst Innovis, Inc. | Configurable business process |
US20060069605A1 (en) | 2004-09-29 | 2006-03-30 | Microsoft Corporation | Workflow association in a collaborative application |
US9645712B2 (en) | 2004-10-01 | 2017-05-09 | Grand Central Communications, Inc. | Multiple stakeholders for a single business process |
US7509628B2 (en) | 2004-12-23 | 2009-03-24 | Microsoft Corporation | Extensibility framework for developing front office (CRM) workflow automation components |
US8918366B2 (en) | 2005-02-07 | 2014-12-23 | Mimosa Systems, Inc. | Synthetic full copies of data and dynamic bulk-to-brick transformation |
US20070088702A1 (en) | 2005-10-03 | 2007-04-19 | Fridella Stephen A | Intelligent network client for multi-protocol namespace redirection |
US8010940B2 (en) | 2005-11-02 | 2011-08-30 | Sourcecode Technologies Holdings, Inc. | Methods and apparatus for designing a workflow process using inheritance |
JP4495669B2 (en) | 2005-12-06 | 2010-07-07 | 株式会社日立製作所 | Business process design support method and system based on role relationship modeling |
US20070143736A1 (en) | 2005-12-09 | 2007-06-21 | Microsystems Technology, Inc. | Workflow Development Platform |
JP4839086B2 (en) | 2006-01-11 | 2011-12-14 | 株式会社リコー | Workflow management system |
AU2008230964A1 (en) | 2007-03-23 | 2008-10-02 | Sourcecode Technology Holding, Inc. | Methods and apparatus for dynamically allocating tasks |
JP2009023739A (en) | 2007-07-17 | 2009-02-05 | Konica Minolta Business Technologies Inc | Paper stacking device, paper treatment device, and image forming system |
US7822892B2 (en) | 2007-07-19 | 2010-10-26 | International Business Machines Corporation | Managing the copying of writes from primary storages to secondary storages across different networks |
US9922295B2 (en) | 2008-01-17 | 2018-03-20 | International Business Machines Corporation | Method for evolving shared to-do lists into business processes |
US9268871B2 (en) | 2008-10-16 | 2016-02-23 | Qualcomm Incorporated | Methods and apparatus for obtaining content with reduced access times |
US8271615B2 (en) | 2009-03-31 | 2012-09-18 | Cloud Connex, Llc | Centrally managing and monitoring software as a service (SaaS) applications |
US8880591B2 (en) | 2011-03-31 | 2014-11-04 | Savigent Software, Inc. | Workflow management in distributed systems |
-
2003
- 2003-12-03 US US10/728,356 patent/US7249195B2/en not_active Expired - Lifetime
-
2007
- 2007-07-05 US US11/773,931 patent/US9037726B2/en not_active Expired - Lifetime
-
2015
- 2015-04-15 US US14/687,729 patent/US11070626B2/en not_active Expired - Lifetime
-
2016
- 2016-02-29 US US15/056,236 patent/US20160182645A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6757729B1 (en) * | 1996-10-07 | 2004-06-29 | International Business Machines Corporation | Virtual environment manager for network computers |
US7296061B2 (en) * | 2001-11-21 | 2007-11-13 | Blue Titan Software, Inc. | Distributed web services network architecture |
US20040215721A1 (en) * | 2003-03-24 | 2004-10-28 | Yahoo!, Inc. | System and method for instant messaging using an e-mail protocol |
US20040189698A1 (en) * | 2003-03-26 | 2004-09-30 | Nortel Networks Limited | Instant messaging to service bureau |
US20050108169A1 (en) * | 2003-11-14 | 2005-05-19 | Mukund Balasubramanian | Contract based enterprise application services |
Non-Patent Citations (1)
Title |
---|
Watson et al Patent no US 6 , 7758,704 B1 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11070626B2 (en) | 2001-03-30 | 2021-07-20 | Salesforce.Com, Inc. | Managing messages sent between services |
US9674226B2 (en) | 2004-03-23 | 2017-06-06 | Salesforce.Com, Inc. | Synchronous interface to asynchronous processes |
US10516700B2 (en) | 2004-03-23 | 2019-12-24 | Salesforce.Com, Inc. | Synchronous interface to asynchronous processes |
US11586533B2 (en) * | 2020-09-21 | 2023-02-21 | International Business Machines Corporation | Creating a mock for an integration flow |
US11950300B2 (en) * | 2021-07-09 | 2024-04-02 | Soundhound, Inc. | Using a smartphone to control another device by voice |
US11431820B1 (en) | 2021-11-05 | 2022-08-30 | Industrial Technology Research Institute | Method and system for implementing inter-process communications |
Also Published As
Publication number | Publication date |
---|---|
US20150222713A1 (en) | 2015-08-06 |
US20040186891A1 (en) | 2004-09-23 |
US20080016242A1 (en) | 2008-01-17 |
US7249195B2 (en) | 2007-07-24 |
US11070626B2 (en) | 2021-07-20 |
US9037726B2 (en) | 2015-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11070626B2 (en) | Managing messages sent between services | |
US9219678B2 (en) | Method, system, and computer program product for sending and receiving messages | |
US9588828B2 (en) | System and method for routing messages between applications | |
US7516191B2 (en) | System and method for invocation of services | |
US9473536B2 (en) | Method, system, and computer program product for facilitating communication in an interoperability network | |
US9948644B2 (en) | Routing messages between applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |