Type: Application. Filed: February 8, Publication date: August 11, Inventors: Christopher Antos, Chuck Reeves. Efficient retrieval of 4G LTE capabilities. Patent number: Type: Grant. The replication specifications describe the protocol used for UDDI Operator Nodes to synchronize registry information. Implementers will find information in this document that defines one required protocol Custody Transfer [1] , as well as recommendations and the operational behaviors all UDDI Node Operators are required to implement as a part of their UDDI services.
The goal of these policies and behaviors is to ensure that UDDI services works smoothly and consistently, both for the user community as a whole, and for the individual Node Operators.
The document also touches upon such topics as site security and data management. This document does not stand alone. In order to fully understand the full scope of the UDDI specifications, each of the documents referenced in Section 9 of this document should be reviewed in detail. This section provides general guidelines for managing and maintaining this information within the UDDI registry.
Publisher registration and custody transfer services are exposed by a Web browser based interface implemented at each Operator Node.
An Operator Node is exclusively responsible for allowing the publisher to update or delete directory entries that were originally entered through its interfaces. As such, the Operator Node is described as having 'custody' of the set of registry entries created through its site. When storing information within the UDDI registry, the Node Operator must maintain a valid email address for the publisher of each businessEntity, tModel, and relationship assertion in its custody. The only exception to this requirement is in the implementation of the Custody Transfer operation described in Section 5 of this document.
The operator may not rely in this regard on the ability to communicate with and receive old changes from other extant Node Operators in order to restore themselves in the face of a system failure or other outage.
The UDDI registry contains multiple types of related information. When making updates to the registered information, the integrity of the overall registry must be maintained.
In this case, the process described below must be followed in order to facilitate migration of the information from the resigning Operator Node to the remaining UDDI registry sites.
An orderly resignation of an Operator Node is one that is facilitated and supported by the Node Operator for the duration of the transition period. If an operator determines that they will no longer continue to operate their registry node, they must provide written notification to the remaining UDDI registry sites participating in the replication scheme.
The Node Operator must also provide notice to all of its registered publishers and facilitate the transfer of registry information to the other operator sites.
The transition period is 45 calendar days from when receipt of notification is acknowledged by the other operators. The process for transition is as follows:.
The Node Operator must post a visible notice of their shutdown schedule on their web site. The Node Operator must provide an email notification to all of its registered publishers indicating that it is no longer operating a UDDI Operator Node, and that entries must be transferred to an alternate Operator Node.
Each publisher must initiate the custody transfer process at the Source Operator [3] , and select the Target Operator for their entries to be migrated. The publisher is given a 15 calendar day notice to complete the custody transfer operation.
After 15 calendar days from the initial notification message, a second notification is to be sent to the remaining publisher accounts with entries at the Source Operator. Again, the publisher must be instructed to respond within 15 calendar days and complete the migration to another site.
After a total of 30 calendar days from the initial notification, any remaining entries at the Source Operator are considered 'orphaned'. The registry entries remaining in the custody of the Source Node are processed in the same manner as required by the abrupt resignation described in Section 2. The Source Operator must remain online for at least 15 additional calendar days, or until all other operator nodes have successfully processed all the replication updates, before shutting down.
The Source Operator is required to remain online for a maximum of 30 days. If the other Operator Nodes have not successfully processed all the pending updates in that time period, any remaining issues will be resolved out of band through coordination with the other Node Operators participating in the replication cloud. Once notification that the operator is resigning from UDDI operation is sent to the publishers, it is strongly recommended that the Node Operator no longer accept any new publisher accounts, or additional entries or changes to the registry [4] — either from the Web browser or UDDI programming interfaces.
Read, replication, and custody transfer operations must be supported until the site is shut down. Once the final replication file is generated by the resigning Operator Node, no further changes to registry information, or initiation of the custody transfer operation may be permitted at the Source Operator site. When the Operator Node is shut down, the other Node Operators participating in the replication cloud must update and distribute a revised replication configuration file as appropriate for the remaining Operator Nodes.
Should an operator fail to fulfill its responsibilities for a transition period, and cease operation in an abrupt manner, the UDDI operators will attempt to facilitate the transfer of registry entries to minimize the negative effect on other registered organizations. As account information for each publisher is not available to the other Operator Nodes, this is a best effort activity only, and some information is likely to fail to be transitioned properly. The other UDDI Node Operators participating in the replication cloud will coordinate distribution of the transition effort amongst themselves.
Guidelines are as follows:. Should the contact confirm their responsibility for the entry and desire to transfer to another Operator Node, the operator site will coordinate the creation of new publisher accounts, and associating business entities with them. In this case, manual intervention may be required.
As this is an expensive process, only those tModels that are in use referenced by a bindingTemplate or other registry entry will be considered for transition. The remaining UDDI Node Operators will make a best effort to determine the contact responsible for the entry through specifications or information in the entry.
Should this information not be available, or the expense in manually facilitating the transition be determined too significant by the other Node Operators participating in the replication cloud, the remaining in use tModels will be transitioned in fair proportion to the remaining Operator Nodes and held in 'custody' of the operator's respective publisher account.
Any entries that are successfully transitioned to a new operator will be confirmed at the other UDDI Operator Nodes through the replication process described in the custody transfer protocol. Each Node Operator is responsible for implementing its own security mechanisms, but all operators need to adhere to certain policies to ensure interoperability and to implement a core set of common security policies.
Each operator must have a set of clearly stated policies for data replication, data integrity and confidentiality, availability, administration, and audit registered with the other UDDI operators participating in the replication cloud, and visibly posted on their UDDI registry web site.
Additionally, the following policies must be followed. This section describes how operators store and modify information, and with who is allowed to modify the information. Each operator must implement these policy assertions and document them in its policy files. This section details the efforts required to ensure that users have continued access to UDDI registry information and resources. In the event of an outage at any UDDI Operator Node, all registry information is available from each of the alternate operators.
Additionally, each Node Operator must adhere to the following:. Each operator is responsible for collecting audit information for the 12 most recent months of operation and for making this information available to the Operators Council should a dispute be filed with that body.
The process of handling a dispute claim is documented in Section 3. As a point of implementation, it should be noted that the requirements for the replication change record journal and the audit log are similar in nature, and can likely share much implementation within a UDDI Operator Node. Audit requirements are related to interaction through both the API, and replication processing. Publisher account: This is a unique identifier for the authenticated account that was used to complete the operation in the UDDI registry.
It may be either an internal identifier, or the identifier that is returned as the value of the authorizedName attribute. In either case, the identifier value must be sufficient to uniquely identify a specific publisher account.
Time Stamp: The date and time the operation was performed. This value should be in the standard XML timeInstant [8] data type. Name of API: The name of the message processed. This value generally corresponds to the name of the first element within the SOAP body of the message. UUID of major entity s : The unique identifiers for each registry entry that was changed. These include businessKey , serviceKey , bindingKey , and tModelKey attributes, as well as identifiers for changes to relationship assertions.
Email address: The validated email address that was used by the publisher when their account was created at the Operator Node, and any subsequent updates made by the publisher. However, unscrupulous individuals may choose to violate this agreement and publish unauthorized information. In this case, the Node Operator should follow the process outlined here in a best effort attempt to address the issue.
In any case, the Node Operator is not responsible for arbitration between the parties, and may choose to remove any entries at any time. An effort should be made to assist in resolving any issues, but only in those cases where it is clear that a business is being misrepresented. All other issues should be settled directly between the parties though established legal processes.
Operators must obtain their X. Any additions to this list will be available from the uddi. In certificates that the Certificate Authorities issue, the 'issuer name' field will, respectively, be:.
Each UDDI operator must adhere to certain rules regarding manipulation and management of registry data. These rules are described below. Specific additional requirements layered upon these standards may be included in the UDDI specification. Each operator is responsible for implementing these additional requirements as well as those defined by the published standards. Leading and trailing white space space, tab, carriage return, line feed, etc.
Processing includes all functions carried out by an operator once it receives any API call. For example, before performing a query the operator must strip all leading and trailing white space from the query keys. As another example, a business entity to be saved must first have all leading and trailing white space stripped from its fields. As a matter of explanation, this requirement is intended to address challenges around predictably managing leading white space in terms of searching, name matching, and the like.
Removing any leading and trailing white space simplifies the ability to match data values in the registry. Note that stripping of white space only occurs for element and attribute values. White space between tags must be handled properly per the XML specifications.
A save request includes the data. Embedded white space in this example is a single space character as well. Again, the trailing space is trimmed, and the string that is saved to the registry is:. This garbage can impact UDDI in two ways. The primary concern is that garbage not be permitted to collect at such a rate as to actually shut down one or more UDDI operators.
This could be, for example, a vast amount of data added to UDDI as a form of a denial of service attack upon the registry. The secondary concern is that dense groups of garbage data not be permitted to cloud query results for specific entities. In order to make it more difficult for such garbage data to be created, publisher accounts are grouped into two categories, Tier 1 and Tier 2, each of which have different limits on the number of entities they may create.
Each Tier 1 account at an Operator Node is restricted in the number of entities it is allowed to create by default.
Note that private implementations may implement alternate limits, or may remove publication limits altogether. It is often the case that certain users such as market makers, registrars, and large organizations have a legitimate need to create more than the limit of entities placed on Tier 1 publisher accounts. To do so, such users must contact their operator to negotiate higher limits. An operator must verify the identity of the user requesting higher limits and must track the new limits of such users.
Operators have the right to reject such requests for any reason. UDDI Operators are required to implement length restrictions on data stored in the registry. Changing your name in Hollywood is as old as the industry itself. Even today stars who have difficult to spell last names, or who have similar names as already established stars, might change their name. He was born in Beirut to an English mother and a native Hawaiian father who also had Chinese and Portuguese in his background.
The name Keanu is a native Hawaiian word. Maybe there were other names that would have worked for Keanu Reeves , but clearly none of the names that were presented to him sounded any good. The one name that he mentions here, Chuck Spadina, is…a choice. So it checks all those boxes. But did somebody really look at Keanu Reeves at 20 and think he looked like anybody would ever call him Chuck?
0コメント