-
公开(公告)号:US12079671B2
公开(公告)日:2024-09-03
申请号:US17822628
申请日:2022-08-26
发明人: Stéphane Yannick Blais , Michael Hassan Atighetchi , Samuel Cunningham Nelson , Christopher Lawrence Willig
IPC分类号: G06F9/54
CPC分类号: G06F9/546
摘要: Techniques are described herein for a messaging system to allow publishers that are aware of the identities of their respective subscribers to target content at those subscribers directly. This may be accomplished by allowing users and other targets (e.g., groups) to register their identities at particular computing nodes of a system. Then publishers (e.g., applications) may send out messages targeted at particular identities, and a publishing system may forward messages to appropriate nodes based on which identities are registered at those nodes. Legacy applications that are not able to target particular identities may instead connect to application adapters that are configured to learn which identities should be targeted by each application. In addition, anonymized identities may be used for application messages that need to cross between domains having differing security levels.
-
公开(公告)号:US20240069990A1
公开(公告)日:2024-02-29
申请号:US17822628
申请日:2022-08-26
发明人: Stéphane Yannick Blais , Michael Hassan Atighetchi , Samuel Cunningham Nelson , Christopher Lawerence Willig
IPC分类号: G06F9/54
CPC分类号: G06F9/546
摘要: Techniques are described herein for a messaging system to allow publishers that are aware of the identities of their respective subscribers to target content at those subscribers directly. This may be accomplished by allowing users and other targets (e.g., groups) to register their identities at particular computing nodes of a system. Then publishers (e.g., applications) may send out messages targeted at particular identities, and a publishing system may forward messages to appropriate nodes based on which identities are registered at those nodes. Legacy applications that are not able to target particular identities may instead connect to application adapters that are configured to learn which identities should be targeted by each application. In addition, anonymized identities may be used for application messages that need to cross between domains having differing security levels.
-