主权项 |
1. A system comprising:
a memory that stores machine readable instructions; and at least one processor that receives the machine readable instructions from the memory to execute operations comprising: returning an initial context container to a service consumer implemented on a first other processing system in response to receiving a service request from the service consumer, the service consumer comprising a first entity of a plurality of entities required to be linked to complete a complex transaction or task; receiving, from the service consumer, a populated context container comprising the initial context container to which the service consumer has added one or more context categories associated with the service request; checking a service consumer identity of the service consumer; verifying a consumer permission set associated with the service consumer, the verifying comprising checking a permissions database to verify that the context category value in the populated context container can be set by the service consumer; adding the populated context container to an overall context set of the complex transaction or task, the overall context set further comprising one or more additional context categories received in one or more additional populated context containers from one or more additional service consumers that included in the plurality of entities; accessing the overall context set and a derivation rules container comprising descriptions of one or more constraints imposable on a level of service provided by entities of the plurality of entities, the accessing comprising identifying, from the derivation rules container, at least one of permissions and constraints associated with a service provider identity of a service provider responding to the service request, the service provider comprising a second entity of the plurality of entities that is implemented on a second other processing system distinct from the first other processing system; and providing the at least one of permissions and constraints to the service provider such that the service provider fulfills the service request in accordance with the at least one of permissions and constraints, wherein the returning, receiving, checking, verifying, adding, accessing, and providing are performed by the system comprising the at least one processor, which is distinct from the first other processing system and also distinct from the second other processing system, which are also distinct from each other.
|