Abstract: This disclosure relates generally to identity management, and more particularly to systems and methods for managing performance of identity mamangement services. In one embodiment, a processor-implemented identity management performance control method is disclosed. The method may include receiving, via one or more hardware processors, an identity management architecture specification. The method may also include identifying, via the one or more hardware processors, a plurality of identity management attributes for the identity management architecture specification. The method may include selecting, via the one or more hardware processors, measurement criteria based on a target environment for implementing the identity management architecture. The method may include calculating, via the one or more hardware processors, an attribute measurement quotient for the plurality of identified identity management attributes using the selected measurement criteria.
CLIAMS:WE CLAIM:
1. A processor-implemented identity management performance control method, comprising:
receiving, via one or more hardware processors, an identity management architecture specification;
identifying, via the one or more hardware processors, a plurality of identity management attributes for the identity management architecture specification;
selecting, via the one or more hardware processors, measurement criteria based on a target environment for implementing the identity management architecture;
calculating, via the one or more hardware processors, an attribute measurement quotient for the plurality of identified identity management attributes using the selected measurement criteria; and
generating, via the one or more hardware processors, instructions to improve performance of the identity management architecture in the target environment based on the calculated attribute measurement quotient.
2. The method of claim 1, wherein identifying, via the one or more hardware processors, a plurality of identity management attributes for the identity management architecture specification comprises:
determining, via the one or more hardware processors, attributes used by services performed by components of the identity management architecture specification; and
identifying required attributes that are a subset of the determined attributes,
wherein the attribute measurement quotient is based on the required attributes.
3. The method of claim 2, wherein identifying required attributes comprises:
accessing a predetermined list of required attributes;
updating the predetermined list of required attributes based on real-time values;
determining whether the determined attributes are required based the updated list of required values.
4. The method of claim 2, wherein identifying required attributes comprises:
accessing a form used by one of the services;
analyzing the form to identify required fields;
identifying attributes associated with the required fields.
5. The method of claim 1, wherein selecting, via the one or more hardware processors, measurement criteria based on a target environment for implementing the identity management architecture comprises:
determining, via the one or more hardware processors, that the target environment is a standalone environment and that a first resource threshold of the identity management architecture specification is met.
6. The method of claim 5, wherein calculating, via the one or more hardware processors, an attribute measurement quotient for the plurality of identified identity management attributes using the selected measurement criteria comprises:
calculating, via the one or more hardware processors, for each of the plurality of identified identity management attributes a single measurement that is a ratio of expected performance to actual performance.
7. The method of claim 1, wherein selecting, via the one or more hardware processors, measurement criteria based on a target environment for implementing the identity management architecture comprises:
determining, via the one or more hardware processors, that the target environment is a cluster environment, that a second resource threshold of the identity management architecture specification is met, and the identity management architecture operates in active-active and active-passive mode.
8. The method of claim 7, wherein calculating, via the one or more hardware processors, an attribute measurement quotient for the plurality of identified identity management attributes using the selected measurement criteria comprises:
calculating, via the one or more hardware processors, a single measurement that is a ratio of the sum of expected performance for the plurality of identified identity management attributes to a sum of actual performance for the plurality of identified identity management attributes.
9. The method of claim 1, wherein the generated instructions identify a service that produces incorrect results.
10. The method of claim 9, wherein the generated instructions further describe a system upgrade that cause the service to produce correct results.
11. A non-transitory computer-readable medium storing computer-executable application programming interface economy indexing instructions for:
receiving, via one or more hardware processors, an identity management architecture specification;
identifying, via the one or more hardware processors, a plurality of identity management attributes for the identity management architecture specification;
selecting, via the one or more hardware processors, measurement criteria based on a target environment for implementing the identity management architecture;
calculating, via the one or more hardware processors, an attribute measurement quotient for the plurality of identified identity management attributes using the selected measurement criteria; and
generating, via the one or more hardware processors, instructions to improve performance of the identity management architecture in the target environment based on the calculated attribute measurement quotient.
12. The computer-readable medium of claim 11, wherein identifying, via the one or more hardware processors, a plurality of identity management attributes for the identity management architecture specification comprises:
determining, via the one or more hardware processors, attributes used by services performed by components of the identity management architecture specification; and
identifying required attributes that are a subset of the determined attributes,
wherein the attribute measurement quotient is based on the required attributes.
13. The computer-readable medium of claim 12, wherein identifying required attributes comprises:
accessing a predetermined list of required attributes;
updating the predetermined list of required attributes based on real-time values;
determining whether the determined attributes are required based the updated list of required values.
14. The computer-readable medium of claim 12, wherein identifying required attributes comprises:
accessing a form used by one of the services;
analyzing the form to identify required fields;
identifying attributes associated with the required fields.
15. The computer-readable medium of claim 11, wherein selecting, via the one or more hardware processors, measurement criteria based on a target environment for implementing the identity management architecture comprises:
determining, via the one or more hardware processors, that the target environment is a standalone environment and that a first resource threshold of the identity management architecture specification is met.
16. The computer-readable medium of claim 15, wherein calculating, via the one or more hardware processors, an attribute measurement quotient for the plurality of identified identity management attributes using the selected measurement criteria comprises:
calculating, via the one or more hardware processors, for each of the plurality of identified identity management attributes a single measurement that is a ratio of expected performance to actual performance.
17. The computer-readable medium of claim 11, wherein selecting, via the one or more hardware processors, measurement criteria based on a target environment for implementing the identity management architecture comprises:
determining, via the one or more hardware processors, that the target environment is a cluster environment, that a second resource threshold of the identity management architecture specification is met, and the identity management architecture operates in active-active and active-passive mode.
18. The computer-readable medium of claim 17, wherein calculating, via the one or more hardware processors, an attribute measurement quotient for the plurality of identified identity management attributes using the selected measurement criteria comprises:
calculating, via the one or more hardware processors, a single measurement that is a ratio of the sum of expected performance for the plurality of identified identity management attributes to a sum of actual performance for the plurality of identified identity management attributes.
19. The computer-readable medium of claim 11, wherein the generated instructions identify a service that produces incorrect results.
20. The computer-readable medium of claim 19, wherein the generated instructions further describe a system upgrade that cause the service to produce correct results.
Dated this 30th day of June, 2015
R Ramya Rao
Of K&S Partners
Agent for the Applicant
,TagSPECI:Technical Field
This disclosure relates generally to identity management, and more particularly to systems and methods for managing performance of identity mamangement services.
| # | Name | Date |
|---|---|---|
| 1 | 3329-CHE-2015 FORM-9 30-06-2015.pdf | 2015-06-30 |
| 2 | 3329-CHE-2015 FORM-18 30-06-2015.pdf | 2015-06-30 |
| 3 | IP31746-spec.pdf | 2015-07-06 |
| 4 | IP31746-fig.pdf | 2015-07-06 |
| 5 | FORM 5-IP31746.pdf | 2015-07-06 |
| 6 | FORM 3-IP31746.pdf | 2015-07-06 |
| 7 | 3329CHE2015_Prioritydocumentrequest.pdf | 2015-07-06 |
| 8 | 3329-CHE-2015-Power of Attorney-281215.pdf | 2016-06-13 |
| 9 | 3329-CHE-2015-Form 1-281215.pdf | 2016-06-13 |
| 10 | 3329-CHE-2015-Correspondence-F1-PA-281215.pdf | 2016-06-13 |
| 11 | 3329-CHE-2015-FER.pdf | 2019-12-26 |
| 12 | 3329-CHE-2015-FORM 3 [10-06-2020(online)].pdf | 2020-06-10 |
| 13 | 3329-CHE-2015-FER_SER_REPLY [10-06-2020(online)].pdf | 2020-06-10 |
| 14 | 3329-CHE-2015-FER_SER_REPLY [10-06-2020(online)]-1.pdf | 2020-06-10 |
| 15 | 3329-CHE-2015-US(14)-HearingNotice-(HearingDate-31-07-2023).pdf | 2023-07-07 |
| 16 | 3329-CHE-2015-POA [25-07-2023(online)].pdf | 2023-07-25 |
| 17 | 3329-CHE-2015-FORM 13 [25-07-2023(online)].pdf | 2023-07-25 |
| 18 | 3329-CHE-2015-Correspondence to notify the Controller [25-07-2023(online)].pdf | 2023-07-25 |
| 19 | 3329-CHE-2015-AMENDED DOCUMENTS [25-07-2023(online)].pdf | 2023-07-25 |
| 20 | 3329-CHE-2015-Written submissions and relevant documents [14-08-2023(online)].pdf | 2023-08-14 |
| 21 | 3329-CHE-2015-PETITION UNDER RULE 137 [14-08-2023(online)].pdf | 2023-08-14 |
| 22 | 3329-CHE-2015-FORM-26 [14-08-2023(online)].pdf | 2023-08-14 |
| 23 | 3329-CHE-2015-FORM 3 [14-08-2023(online)].pdf | 2023-08-14 |
| 24 | 3329-CHE-2015-PatentCertificate21-09-2023.pdf | 2023-09-21 |
| 25 | 3329-CHE-2015-IntimationOfGrant21-09-2023.pdf | 2023-09-21 |
| 1 | SearchStrategyMatrix_18-12-2019.pdf |