Execution of composite services

ABSTRACT

Techniques are described for assisting users in dynamically creating and using composite services that are based on other constituent services. In some situations, each constituent service is a Web service (“WS”), and each composite service is a new WS whose execution involves dynamically invoking multiple specified constituent WSes in a specified manner. Such techniques may be used, for example, in conjunction with an electronic WS marketplace via which third-party WS providers make their WSes available to third-party WS consumers who locate and purchase access to those WSes, such as to allow a user to dynamically create a new composite WS that is based on one or more WSes available from other WS providers and that reflects any constraints of the WS marketplace, with the composite WS available for use by other WS consumers. This abstract is not intended for use in interpreting or limiting the scope of the claims.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional application of co-pending U.S. patentapplication Ser. No. 11/207,179, tiled Aug. 17, 2005 and entitled“Execution of Composite Services,” which is hereby incorporated hereinby reference. U.S. patent application Ser. No. 11/207,179 is acontinuation-in-part of co-pending U.S. patent application Ser. No.10/766,697, filed Jan. 27, 2004 and entitled “Providing A MarketplaceFor Web Services,” and is related to co-pending U.S. patent applicationSer. No. 10/894,347, filed Jul. 19, 2004 and entitled “AutomaticAuthorization Of Programmatic Transactions,” each of which is herebyincorporated by reference in its entirety. This application is alsorelated to U.S. patent application Ser. No. 11/207,178, filed Aug. 17,2005 and entitled “Dynamic Creation Of Composite Services,” which isalso hereby incorporated by reference in its entirety.

TECHNICAL FIELD

The following disclosure relates generally to techniques for dynamicallycreating and using composite services that are based on other services.

BACKGROUND

Various mechanisms exist to allow computers and executing softwareapplications to interact. For example, remote procedure call (“RPC”)protocols have long existed that allow a program on one computer tocause a program on another computer to be executed, and variousobject-oriented and other architectures such as CORBA (“Common ObjectRequest Broker Architecture”), DCOM (“Distributed Component ObjectModel”), Java RMI (“Remote Method Invocation”), JavaSpaces, Jini, JXTA,and UPnP (“Universal Plug-n-Play”) provide similar capabilities. Inaddition, a variety of middleware programs have been implemented toconnect separate applications (often of distinct types and fromunrelated sources) to allow communication. For example, various EDI(“Electronic Data Interchange”) networks exist that provide standardmechanisms to allow a computer system of one user of the network to senddata to a computer system of another user of the network.

The widespread popularity of the World Wide Web (“Web”) has providedadditional opportunities for computers to inter-communicate. Forexample, much current Web use involves users interactively requestingWeb pages from Web servers (e.g., via executing Web browser applicationsof the users) and receiving the requested information in response. Inaddition to such interactive user specification of requestedinformation, there is also growing use of the Web to support theprogrammatic interaction of remote applications to exchange informationvia defined APIs (“application program interfaces”), such as via Webservices. Web services allow heterogeneous applications and computers tointeract, and can be defined and implemented using a variety ofunderlying protocols and techniques. For example, some Web serviceimplementations return data in computer-readable XML (“eXtensible MarkupLanguage”) format using HTTP (“HyperText Transport Protocol”) inresponse to a Web service invocation request specified as a URI(“Uniform Resource Identifier”), such as a URL (“Uniform ResourceLocator”) that includes a specified operation and one or more queryparameters. In other implementations, additional underlying protocolsare used for various purposes, such as SOAP (“Simple Object AccessProtocol”) for standard message exchange, WSDL (“Web ServicesDescription Language”) for description of service invocation interfaces(e.g., using XML format), and UDDI (“Universal Description, Discovery,and Integration service”) for discovery of available services.

Although Web services allow various applications and computers tointeract, the current implementations and uses of Web services havevarious limitations. For example, while Web services are increasinglybeing provided from various companies and other entities for variouspurposes, such available Web services are typically focused on verylimited functionality related to the entity providing the service. Thus,for example, a company that generates driving directions informationmight provide a Web service that enables programmatic access to suchinformation, but would not typically provide Web services that use thedriving directions information (or other types of information) to enablea variety of other types of functionality for potential consumers, suchas to provide the driving directions in alternative formats (e.g., inspoken form or in various languages) or to provide various additionaltypes of location-based information (e.g., corresponding to locations inthe driving directions). While available Web services from variousproviders may each provide useful functionality of a limited type, itmay often be the case that a potential consumer desires a combination ofvarious functionalities that are not provided by a single available Webservice, and the potential consumer may lack the resources orcapabilities to manually invoke and combine those various Web servicesin the proper manner to achieve the desired results.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1L illustrate examples of a user interface for Web serviceprovider users and Web service consumer users to interact with anembodiment of a Web Services Marketplace (“WSM”) system, and ofcorresponding information related to the interactions.

FIG. 2 is a network diagram illustrating components and information flowof an example embodiment of the WSM system.

FIG. 3 is a block diagram illustrating an embodiment of a computingsystem suitable for executing an embodiment of the WSM system.

FIG. 4 is a flow diagram of an embodiment of a WS Registration routine.

FIG. 5 is a flow diagram of an embodiment of a Get WS RegistrationInformation subroutine.

FIG. 6 is a flow diagram of an embodiment of a WS Invocation routine.

FIG. 7 is a flow diagram of an embodiment of a Provide WS subroutine.

DETAILED DESCRIPTION

A software facility is described below that assists in dynamicallycreating and using composite services that are based on otherconstituent services. In at least some embodiments, the constituentservices are each Web services (e.g., Web services provided by multipleunrelated Web service providers), and each composite service is a newWeb service (“WS”) whose execution involves invoking multiple specifiedconstituent WSes in a specified manner.

The creation of a composite service based on one or more otherconstituent services may be performed in various manners in variousembodiments. As discussed in greater detail below, in some embodiments auser may specify various information regarding how to combinecapabilities of various constituent services in order to provide acomposite service, such as in an iterative manner by responding toautomatically generated suggestions or other prompts that are presentedto the user. Such composite service provision information may then bestored for later use when providing the composite service, whether inthe form it was specified or after having been manipulated (e.g., toallow for execution or other evaluation at the time of composite serviceprovision). Furthermore, in some embodiments the composite serviceprovision information is associated with information to be used inaccessing the composite service, such as a unique identifier generatedfor the composite service and/or unique invocation information providedfor the composite service (e.g., a unique network endpoint for acomposite WS that can be accessed from a remote computing device using aspecified network protocol and message format, such as a networkendpoint specified by a WSDL interface or other network address that isdynamically defined or generated for the composite WS).

The composite service provision information regarding how to combine anduse the capabilities of constituent services for a composite service maybe specified in various ways in various embodiments, as discussed ingreater detail below. For example, indications of relationships betweeninput and output parameters for the constituent services may bespecified, such as to indicate that an output parameter for a firstconstituent service is to be mapped to an input parameter for a secondconstituent service in such a manner that an output value from theoutput parameter will be used as an input value for the input parameter(whether without modification, or instead after a specified type ofprocessing is first performed on the output parameter value, such as tochange the data format or to modify the data value in a specifiedmanner). Furthermore, in at least some embodiments such parametermapping may be facilitated by storing and using information about thetypes of information that the various parameters represent, which may beobtained for the parameters of a constituent service in various ways(e.g., when the constituent service is initially registered as anavailable service). For example, such parameter representation typeinformation may indicate that illustrative first and second parameterseach have values that are integers representing a zip code, and that athird parameter's values are strings representing a city name—in such asituation, it may be appropriate to map the first and second parameterstogether in various ways, but it would not typically be appropriate tomap the first parameter and the third parameter since they representdifferent types of information. In some embodiments, the compositeservice provision information may also specify information about anorder in which to execute or otherwise access constituent services inother ways, such as to indicate groups of constituent services to beaccessed in parallel and/or in a serial manner. More generally, in someembodiments the composite service provision information may includevarious user-specified logic to be executed or evaluated as part ofproviding the composite service (e.g., using programming constructs suchas conditional logic, loops, etc.), such as to indicate processing to beperformed on information before it is to be provided to one or more ofthe constituent services and/or after it is received from accessing oneor more of the constituent services. In addition, in an least someembodiments various additional capabilities may be provided tofacilitate interactions between constituent services with differingcapabilities, such as protocol mapping or translation capabilities tofacilitate interactions or other relationships between services usingdifferent communication protocols or communication models, and/or suchas data transformation capabilities to manipulate data values in variousways.

In at least some embodiments, the creation of a composite service basedon one or more constituent services includes dynamically generatingvarious types of interface description information for the compositeservice, such as in an automatic manner based at least in part oninterface description information for the constituent services. Suchinterface description information may include a definition of aninterface (e.g., an API) for accessing the composite service, with theinterface definition information available for later use in accessingthe composite service by the software facility and/or by a third-partyconsumer of the composite service (e.g., in an automatic manner when theinterface description information is specified in a computer-readableformat). For example, when creating a composite WS based on one or moreconstituent WSes, a WSDL interface definition document may bedynamically generated for the composite WS in order to describe in acomputer-readable format how to access one or more interfaces of thecomposite WS, such as by combining information from WSDL documents orother interface definitions for the constituent WSes. Additional detailsregarding WSDL documents are available in the “Web Services DescriptionLanguage (WSDL) Version 2.0 Part 1: Core Language, W3C Working Draft 10May 2005” document, dated May 10, 2005 and available athttp://www.w3.org/TR/2005/WD-wsdl20-20050510, and in the “Web ServicesDescription Language (WSDL) Version 2.0 Part 2: Adjuncts, W3C WorkingDraft 10 May 2005” document, dated May 10, 2005 and available athttp://www.w3.org/TR/2005/WD-wsdl20-adjuncts-20050510, each of which isincorporated herein by reference in its entirety.

As part of creating a composite service and defining appropriateinterface(s) for the composite service, a user performing such compositeservice creation may in at least some embodiments further define variousaspects of the input to and/or output from the composite service, asdiscussed in greater detail below. For example, the user may specify oneor more input parameters to be used with the composite service, such asby naming each input parameter, providing information regarding the typeof information that each parameter represents, and defining how valuesprovided for each input parameter during an invocation will be used bythe composite service (e.g., by mapping a composite service inputparameter to one or more input parameters of one or more constituentservices used by the composite service, such as after the compositeservice input parameter value is modified or manipulated in a specifiedmanner). Similarly, the user may specify how output or other responseinformation from execution of the composite service will be provided toa program that invokes the composite service, such as values of one ormore specified output parameters (e.g., specified in a manner similar tothe input parameters, such as with each composite service outputparameter value based on values from one or more output parameters ofone or more of the constituent services), or instead a more complexoutput document (e.g., generated as output based on specified processingto be performed, such as the output from an XSLT (or “eXtensibleStylesheet Language Transformations”) stylesheet or from another type ofuser-specified information processing).

Furthermore, in some embodiments multiple alternative mechanisms may beprovided for invoking a composite service or otherwise providing inputinformation to the composite service, and similarly multiple alternativemechanisms may be provided for receiving output information from acomposite service. For example, in at least some embodiments access to acomposite service may be provided via multiple alternative protocols,which in some situations may include defining multiple interfaces and/ornetwork endpoints or other addresses for use with the alternativeprotocols. As one illustrative example, in some embodiments a newcomposite WS may be accessible via each of an interface using SOAPmessages, an interface that uses network-addressable resources (e.g., aspart of the REpresentational State Transfer, or “REST”, distributedinteraction model), and an interface based on simple XML documents sentover HTTP (e.g., using an RPC interaction model that focuses onavailable operations), with a user of the composite WS able to selectand use one or more of the interfaces as desired. Similarly, outputinformation may be provided using various protocols and in variousmanners, including using a different protocol for output than was usedfor input, such as selected by a user of the composite WS. Thus, thealternative mechanisms provide greater availability of the compositeservice to potential users using a variety of communication or otherinteraction capabilities. In addition, such multiple alternativemechanisms may be generated in various ways, including automatically bythe software facility and/or based on interactions with a user creatingthe composite service to define the alternative mechanisms. Additionaldetails regarding SOAP are available in the “SOAP Version 1.2 Part 1:Messaging Framework, W3C Recommendation 24 Jun. 2003” document, datedJun. 24, 2003 and available athttp://www.w3.org/TR/2003/REC-soap12-part1-20030624, and in the “SOAPVersion 1.2 Part 2: Adjuncts, W3C Recommendation 24 Jun. 2003” document,dated Jun. 24, 2003 and available athttp://www.w3.org/TR/2003/REC-soap12-part2-20030624, each of which isincorporated herein by reference in its entirety. Additional detailsregarding XSLT and other processing of XML documents are available fromthe “XSL Transformations (XSLT) Version 2.0, W3C Working Draft 4 Apr.2005” document, dated Apr. 4, 2005 and available at“http://www.w3.org/TR/2005/WD-xslt20-20050404”, and the “XML PathLanguage (XPath) 2.0, W3C Working Draft 4 Apr. 2005” document, datedApr. 4, 2005 and available at“http://www.w3.org/TR/2005/WD-xpath20:-20050404”, each of which isincorporated herein by reference.

Moreover, in some embodiments a variety of other types of interfacedescription information may be dynamically generated for a compositeservice, such as by combining related information that is available forthe constituent services. For example, as discussed in greater detailbelow, each composite service may optionally have one or more associateduse prices, documentation regarding the composite service, various otheradministrative information (e.g., contact personnel and/or other contactinformation), and one or more of various types of use conditions thatmay restrict use of the composite service. Such use conditions mayinclude, for example, various access rights or other security-relatedinformation that limit who can gain access to the composite service,such as by identifying who may obtain information about the service andunder what conditions (e.g., the existence of the service, associatedinterface description information for the service, etc.), by identifyingwho may use the composite service and under what conditions (e.g., bydefining specific allowed and/or disallowed users, by definingcharacteristics of allowed and/or disallowed users, by defining detailsof a subscription needed by a user to use the composite service, etc.),and/or by identifying who may modify information about the compositeservice and under what conditions. Similarly, such use conditions mayinclude various other types of information, such as access quotas thatlimit how much access to a service is permitted (whether for a specificuser and/or for all users), and contractual licensing terms governinguse of the composite service. These various types of information for acomposite or constituent service may be enforced by the WSM in variousways, such as by utilizing use conditions for a service to control itsuse with other services, its use by specific users and/or types of users(e.g., users meeting specified criteria), its use with specific programsand/or types of programs, and/or its use based on a variety of types ofother criteria (e.g., geographic location, time-related constraints,etc.).

The disclosed techniques for dynamically creating and using compositeservices that are based on other constituent services may be used in avariety of settings. For example, in some embodiments the techniques maybe provided by a computing system and/or entity that does not provideany of the constituent services, while in other embodiments some or allof the constituent services may be provided by or via the computingsystem and/or entity providing the composite service creation and/or usecapabilities. In some embodiments, an organization may provide suchcomposite service creation and/or use capabilities for internal usebased on constituent services that are available internally, such as ina corporate environment using an intranet. Alternatively, the disclosedtechniques may instead be used in some embodiments in a manner that isnot limited to use by a single organization or group of affiliatedusers, such as when used in a marketplace setting that is available tolarge numbers of unrelated or unaffiliated providers and consumers ofservices. Furthermore, in some embodiments multiple marketplaces mayexist (e.g., marketplaces operated by distinct entities, such as withthe marketplaces unaffiliated with each other and/or the entitiesunaffiliated with each other) to provide access to Web services and/orother types of services, and if so the techniques may be provided foruse with one of the marketplaces in such a manner as to allow use ofservices from another marketplace (e.g., to allow a composite service tobe created at the one marketplace that uses one or more other servicesfrom other marketplaces as constituent services, such as if referencesto at least some of those other services have been registered at the onemarketplace).

As one example, the disclosed techniques may be used in conjunction withan electronic WS marketplace (“WSM”), such as a marketplace that allowsthird-party WS providers to register their WSes with the electronicmarketplace so as to make those WSes available to some or allthird-party WSM users who are potential consumers of the WSes. Inparticular, in some embodiments a WS provider may specify pricinginformation for the use of their WS and/or other WS use conditions atthe time of WS registration. The WS providers may also specify themanner(s) in which their WSes are to be invoked, as well as variousdescription information about their WSes that may be provided topotential consumers to assist in their determination of whether to usethe WS. Once WSes have been registered at the WSM, they can be madeavailable to potential WS consumers in various ways, as discussed ingreater detail below. In some embodiments, a WS provider may also needto first register with the WSM as a user before registering their WSes(e.g., to provide contact information, information on how payments tothe WS provider are to be made, etc.). Such a WSM may, for example, beprovided by an embodiment of the software facility, or a WSM may insteademploy the software facility to provide capabilities related to thecreation and/or use of composite services.

In such embodiments, composite WSes may also be registered with the WSMand used by WS consumers, with each composite WS invoking one or moreother WSes when used (e.g., other registered WSes, including otherpreviously registered composite WSes). As previously noted, a compositeWS may include logic specified by the creator of the composite WS (e.g.,in an executable form, such as based on a scripting language, or in adeclarative format to be processed by other software, such as in XML tobe processed using XSLT and/or XPath or in another format) that isrelated to how and when to invoke the other WSes, such as to provideconditional invocation of one WS based on the response informationreceived from another WS. As one example, a composite WS may invoke twoor more other WSes (e.g., WSes from WS providers unrelated to thecreator of the composite WS) in order to obtain response informationthat is then aggregated to provide the response information for thecomposite WS. As another example, some or all of the constituent WSesspecified for the composite WS may be provided by the composite WScreator, and the composite WS specifies logic such that one of thespecified constituent WSes is invoked only if appropriate information isreceived from earlier invocation of another of the WSes (e.g., if thatreceived information is to be used as part of that later invocation). Asyet another example, a composite WS may invoke a single constituent WS(e.g., from a WS provider other than the composite WS creator) in orderto encapsulate that single constituent WS using additional informationand/or logic specified as part of the composite WS (e.g., to performadditional input and/or output processing and/or to hide details of theunderlying constituent WS from entities that invoke the composite WS).In addition to using specified logic for a composite service todetermine how and when to invoke other constituent services, in at leastsome embodiments such specified logic may instead or additionallyprovide or generate additional information for use in providing theresponse information for the composite service (e.g., by retrievingstored information and/or generating new information), such as inaddition to response information from one or more of the constituentservices. In some embodiments, any third party can create and registercomposite WSes that invoke other WSes provided by other WS providers,while in other embodiments various restrictions may be imposed on thecreation of such composite WSes (e.g., to limit composite WS creation toWS providers that provide at least one of or all of the constituent WSesused by the composite WS). In addition, in some embodiments suchcomposite WSes may have their own specified pricing information andother use conditions, while in other embodiments such pricing and useconditions may instead be automatically determined based on the pricingand use conditions of the underlying constituent WSes invoked by thecomposite WS.

For illustrative purposes, some embodiments of the software facility aredescribed below in which a specific WSM embodiment provides variousspecific types of capabilities and functionalities with respect tovarious specific types of WSes, including creating and using compositeWSes based on constituent WSes, and in which a specific WSM embodimentuses various specific types of user interfaces and other interactions toprovide those functionalities and capabilities. However, those skilledin the art will appreciate that the techniques of the invention can beused in a wide variety of other situations, including with services anditems other than Web services, and that the invention is not limited tothe exemplary details provided.

FIGS. 1A-1C, 1E-1J and 1L illustrate examples of a user interfaceprovided by an embodiment of the WSM to assist WS provider users and WSconsumer users in interacting with the WSM, including exampleinteractions illustrated in FIGS. 1G-1J regarding creating a newcomposite WS based on previously registered constituent WSes. In thisexample embodiment, the WSM is part of a Web store that provides accessto registered WSes and to a variety of other types of items, such asproducts, services or information for purchase, rent, lease, license,trade, evaluation, sampling, subscription to, etc., and including itemsfor physical delivery (e.g., shipment via a governmental postal serviceor private common carrier) and/or electronic delivery (e.g., download orother electronic provision of software and/or non-executable digitalmedia or content), while in other embodiments the WSM may provide accessonly to WSes and/or other invocable network services.

In particular, FIG. 1A illustrates a user interface screen that providesinformation 110 about various registered WSes available via the WSM,which in this example is displayed to a user as search results inresponse to search criteria (not shown) specified by the user in orderto locate Web services related to the search term “map.” The user may,for example, be a potential WS consumer who would like to invoke one ormore map-related WSes (e.g., on a one-time basis, or by incorporatingits functionality in a program that the WS consumer is creating), or mayinstead be a user who would like to create a new composite WS that usesone or more such map-related WSes as constituent WSes. In at least someembodiments, searches for registered WSes may be based on a variety ofother types of information about the registered WSes (e.g., anyattribute or criteria associated with a registered WS, whether alone orin combination, such as name, category, source or provider, price, useconditions, identifier, description, input and/or output parameter name,input and/or output parameter data type information, input and/or outputparameter representation type information, etc.). In addition, in someembodiments information about available WSes can be provided to users ina variety of other ways, such as by browsing within categories, byproviding recommendations of WSes to users, etc.

In this example embodiment, various information about a number ofavailable WSes 110 a-110 f, 110 h and 110 j is displayed to the user,with the WSes divided into several WS categories 111 as shown, and withuser-selectable options 110 g and 110 i available for displayinginformation about additional WSes. A variety of information is providedfor each indicated WS, including a name 112, an indication of the WSprovider 113 that is the source for the WS, one or more prices 114corresponding to use of the WS, any specified use conditions 115 for theWS, and a textual description 117 of the WS. In this example, thesetypes of information are provided by a WS provider when registering aWS, and each WS further has a unique item identifier (“ID”) 116 that isautomatically generated by the WSM, although in other embodiments suchunique item IDs may not be used. In addition, various other informationmay be available for some or all of the WSes but not currently shown,such as a WSDL interface definition and representation type informationfor input and output parameters to indicate the type of information thatthe parameters represent (e.g., if provided by the WS provider whenregistering the WS), while in other embodiments such information may bedisplayed. As is shown, a variety of types of pricing models and useconditions are illustrated in this example. In addition, in thisexample, use conditions of various types are illustrated together,including contractual licensing terms (e.g., for “non-commercial useonly”, or restrictions on the WS provider's liability or ability toterminate the service, not shown) and use restrictions (e.g., “maxuses/month=30000”), although in other embodiments such types of useconditions may instead be specified and displayed separately.

FIG. 1B illustrates an example user interface screen via which apotential WS consumer user can review more detailed information about aspecific WS and select to subscribe to the WS, such as based on aselection of one of the WSes displayed in FIG. 1A or after the WS isidentified in another manner. In particular, the illustrated userinterface includes a section 121 that provides a summary description(not shown) of a particular WS and a section 127 that providesadditional details (not shown) about the WS. The user interface screenalso includes a user-selectable control 123 via which the consumer usercan indicate to save an indication of the WS in a shopping cart of theuser for possible later subscription. In addition, the user interfacescreen includes a section 125 via which the user can select to request asubscription to the WS, including a user-selectable control 125 a tomake the subscription request using the current information inuser-modifiable fields 125 b and 125 c. In particular, field 125 b maybe provided for WSes that have multiple associated subscription types,such as a single-use subscription and a monthly subscription, and theuser-modifiable field 125 c corresponds to situations in which the userhas multiple predefined sources of payment that they can select for use.Thus, in this example, before selecting the control 125 a, the user mayselect a type of subscription (e.g., with a corresponding subscriptionprice) and a payment option to be used for the payment. After the userselects the control 125 a, the WSM determines whether to approve thesubscription request, and if so takes appropriate steps to implement thesubscription. While not illustrated here, the WS consumer will also beprovided in the illustrated embodiment with information regarding how toinvoke or otherwise access the WSes to which the WS consumer subscribes,such as by providing WSDL interface definitions and item identifiers forthose WSes to the WS consumer.

As previously described with respect to FIG. 1A, information aboutregistered WSes may be obtained by users in various ways that includeperforming a search for such WSes and/or reviewing detail informationabout a particular registered WS. While not illustrated here, varioustypes of information about registered WSes can also be provided topotential WS consumers in a variety of other ways in at least someembodiments. For example, various information about each of severaltop-ranked WSes available via the WSM may be presented to users, such asto illustrate a current rank, a rating, indications of similar WSes, andindications of other WSes that may be of interest based on preferencesor actions of other users. Such WS ratings may be user-specified, forexample, and the rankings may be automatically calculated in one of avariety of ways (e.g., cumulative sales volume, recent sales volume,recent trends in sales volume, accuracy or other performance measure forthe WS, total usage based on the number of access requests or otherusage measure, breadth of invocations based on the number of differentWS consumers and/or applications making the access requests, number ofaccess requests per second, etc.), although ratings and/or rankingscould be determined in other ways in other embodiments.

In addition, in some embodiments various personalized recommendations ofregistered WSes may be presented to a user, such as based on previouslyspecified interests of the user and/or other automatic determinations ofWSes of potential interest (e.g., based on usage history for the user).In such a situation, each of the recommended WSes may be illustratedwith various associated information, and each may have an associateduser-selectable control with which the WS can be added to the user'sshopping cart and a user-selectable control with which the user canrequest to immediately subscribe to the WS. As one specific example, auser may be searching for or otherwise interested in identifying aregistered service for use as a constituent service for a compositeservice being created, such as for use in combination with one or moreother designated constituent services, and if so information may bepresented to the user based at least in part on actions of other priorusers, such as to indicate registered services that other users havepreviously used in conjunction with some or all of the other designatedconstituent services. Similarly, if a user is searching for or otherwiseinterested in identifying a registered service having one or moreparameters of interest (e.g., parameters associated with a specifiedrepresentation type, with a specified data type, with a specifiedcategory of representation types, etc.), information may be presented tothe user to indicate registered services having such parameters thatwere previously selected by other users and/or to indicate otherregistered services used by prior users in conjunction with serviceshaving such parameters. Moreover, other types of recommendations maysimilarly be made based on prior user actions, such as recommendationsof other parameter representation types to use based on users havingused those representation types with one or more types of informationspecified by the user (e.g., specified services, types of services,specified representation types, representation types used with otherspecified services, etc.). Furthermore, various information related touser reviews of one or more WSes may also be presented to users (e.g.,reviews of a WS that is selected or described in another portion of thescreen, or of a particular WS indicated to the user), such as variousreview and rating information for the WS provided by one or more otherusers, and users may further be provided with a user-selectable controlwith which the user can select to provide their own review and rating ofa WS (e.g., after use of the WS). While all of these various additionaltypes of WS-related information may in some embodiments be provided to auser together (e.g., as part of a single screen), in other embodimentssome or all of the information could instead be provided at other timesand in other manners (e.g., by providing review and rating informationfor a WS on a detail screen for that WS, such as the screen illustratedin FIG. 1B).

In addition, in some embodiments the user interface may include one ormore screens that allow the user to specify security and/or privacyinformation as desired. For example, a WS consumer may be able toprohibit or otherwise restrict access to WSes on their behalf (e.g., forall or a specified subset of their subscriptions) based on varioususer-configurable settings, including based on IP addresses associatedwith WSes, on developer tokens associated with users making WS accessrequests, on referring URLs, on subscriber ID, via cookies, etc. A WSprovider may similarly be able to prohibit or otherwise restrict accessto WSes that they provide in a variety of ways, and WS providers and WSconsumers may in some embodiments be able to specify various securityand/or privacy information for use in accessing information about theiraccounts and provided and/or accessed WSes. Information regardingsubscriber ID and/or other user identity information may further be usedto facilitate billing and other payment-related actions, as discussed ingreater detail elsewhere.

In the illustrated embodiment, in order to make a WS available for usewith the WSM (including the availability to be searched for andsubscribed to, as well as to used as a constituent service in othercomposite services), the WS is first registered with the WSM. FIG. 1Cillustrates an example user interface screen with which a WS provideruser can initiate registration of a WS from the WS provider so as tomake it available to consumer users via the WSM, with the illustratedinformation in this example corresponding to the prior registration ofWS 110 c of FIG. 1A by a user representative of WS Provider BBB. Inparticular, the example WS registration screen includes instructionalinformation 131, and sections 133-138 in which the WS provider user canspecify various types of information for the WS being registered,including a name, pricing information, use conditions, a textualdescription, one or more optional related keywords or terms (e.g., toassist in automatic categorization of the WS and/or to assist inidentification of the WS as relevant to a potential consumer's search orother expression of interest about WSes), and an indication as towhether the WS may be used as a constituent service for other compositeservices, although in other embodiments various additional types ofinformation may be specified (e.g., a category and/or type of the WS)and/or some of the illustrated types of information may not be used(e.g., not including pricing information, such as for free WSes, or notproviding an option regarding whether the WS may be used as aconstituent service).

In this illustrated example, the pricing information section 135 allowsthe WS provider to specify one or more use prices for different types ofsubscriptions or other uses of the WS (e.g., on a per-use basis, for asubscription that is valid for a specified length of time and/or numberof uses, etc.), although in other embodiments only a single type ofpricing may be allowed. In addition, in this example the WS provider mayfurther specify restrictions on when, how and who may use a particularpricing option—for example, one or more of the restrictions regardingthe monthly subscription pricing 135 b may limit that pricing option toonly certain types of WS consumers (e.g., customers with specifiedattributes, or preferred customers of WS Provider BBB), and if soinformation about that pricing option may not be made available tocustomers who do not satisfy those restrictions (e.g., the customer towhom the search results are provided in FIG. 1A). In addition, in someembodiments after a WS provider specifies one or more use prices for aWS that they have registered, the WSM then sets one or more consumeraccess prices for those WSes that are each based on one or more of thespecified use prices (e.g., access prices that are the same as the useprices, or instead that include additional fees charged by the WSM or areduction in fees provided by the WSM).

Various non-price use conditions may similarly be specified by the WSprovider in some embodiments, such as restrictions on types of consumersallowed to use the WS, restrictions on types of uses allowed for the WSand/or for any information provided by its use, restrictions on howfrequently the WS can be used by a particular consumer or by allconsumers, various contractual licensing terms, etc. —such useconditions may then be enforced in various ways, including automaticallyby the WSM and/or the WS provider (e.g., at the time of WS subscriptionand/or execution), or by legal enforcement (e.g., judicially, viabinding arbitration, or via other contractual enforcement mechanisms)related to contractual violations by a consumer from his/her use of theWS (e.g., after the consumer has agreed to the use conditions in acontractual manner, such as part of a click-wrap agreement at the timethat the consumer subscribes to the WS). In this example embodiment, theWS provider may enter one or more use conditions in the input area 136in a free-form manner, although in other embodiments the use conditionsmay be specified in other manners. In particular, in this example the WSprovider has provided information regarding terms and conditions byreferencing an indicated Web page that contains that information.Alternatively, in some embodiments various types of use conditions maybe predefined and selectable by the WS provider (e.g., from a drop-downlist, not shown), such as to allow selection and/or customization of aselected use condition type (e.g., by selecting options or specifyingparameter values). In addition, various default use conditions may bepredefined in some embodiments (whether the same set of default useconditions for all WSes, or instead with different sets of default useconditions for different WSes, such as based on category of WS and/orspecific to the WS provider), and if so may be displayed or otherwiseavailable to the WS provider, although in other embodiments such defaultuse conditions may not be used.

The illustrated WS registration screen in FIG. 1C also includes auser-selectable control 139 via which the WS provider can indicate tocontinue the WS registration after appropriate information has beensupplied in sections 133-138. After the control has been selected, theWSM determines whether to approve the registration, and if so takesappropriate action to notify the WS provider of the acceptance and tomake the registered WS available to consumers via the WSM. In addition,in the illustrated embodiment the WS provider is further prompted toprovide invocation details for the WS being registered, such as bysupplying a WSDL interface description for the WS and by providingrepresentation type information for the parameters of the WS. In otherembodiments, the registration of a WS may instead involve providinginformation in a different order and/or manner, such as to initiallyprovide the WSDL interface description and the representation typeinformation for the parameters of the WS, and to then provide some orall of types of information discussed with respect to FIG. 1C. Inaddition, while not illustrated here, in at least some embodimentsvarious information about a service being registered may be added by theWSM, whether automatically or in a manner based on interactions with theuser registering the service, such as to add input and/or outputparameters to the interface for the service (e.g., for use by the WSM,such as an input parameter to obtain a subscription identifier for theservice or a subscriber identifier for a user), to add use conditions(e.g., use conditions required by the WSM for some or all services),etc. Similarly, in at least some embodiments various information about aservice being registered may be changed or removed by the WSM, whetherautomatically or in a manner based on interactions with the userregistering the service, such as to obfuscate information about theprovider of the service and/or to allow the WSM to control theinvocation of the service (e.g., by changing the names of input and/oroutput parameters to the interface for the service, by using a networkendpoint or other access information provided by the WSM rather thancorresponding information from the provider of the service, etc.).

In the illustrated embodiment, FIG. 1D illustrates portions of anexample XML-based WSDL interface description for WS 110 c (with someWSDL document details not illustrated for the sake of brevity), such asfrom a WSDL interface description that was previously provided by WSProvider BBB when registering the WS. In this example, the WS takes asinput starting and ending zip codes, and returns textual drivingdirections between those zip codes and a list of cities along thosedriving directions. Lines 2-7 of the example WSDL first define a newdata type for use in the WSDL, which in this example uses SOAP and XSD(“XML Schema Definition”) capabilities to define an array of strings.Lines 8-12 next define input and output messages for use with the WS,with the input message “getDirRequest” having two input integerparameters for the starting and ending zip codes, and with the outputmessage “DirResponse” having an output string parameter to return thetextual directions and an output array of strings to hold the list ofcities. In lines 13-17 the single “getDirections” operation for the WSis defined, indicating use of the input and output messages, and inlines 18-23 a SOAP binding for the messages and operation is specified.Lines 24-37 then specify various additional information for the WS,including specifying a particular network endpoint for the WS in lines35-36 (which in this example is a specific network-accessible URL underthe control of WS Provider BBB), a use price in line 28, variouscontractual licensing terms in lines 30-34, textual descriptiondocumentation for the WS in lines 25-27, and use conditions in line 29.In other embodiments, various other types of information mayadditionally be specified, and some or all of the illustrated types ofinformation in lines 25-34 may instead be specified in other manners ornot at all.

As noted, the example WSDL interface description for WS 110 c isprovided in this example embodiment by WS Provider BBB when previouslyregistering the WS, such as in response to prompts (not shown) afterselecting control 139 from the registration screen shown in FIG. 1C.Furthermore, in this illustrated embodiment, an additional part of theregistration process for WSes includes providing representation typeinformation for the input and output parameters of a WS beingregistered, and FIGS. 1E and 1F illustrate an example of a portion ofthe continuing registration process for WS 110 c by WS Provider BBB. Inparticular, after the WSDL interface description is provided, it isautomatically processed in the illustrated embodiment to identify theoperations of WS 110 c and to identify the input and output parametersfor each of the identified operations. The user is then prompted toprovide appropriate representation type information for the parametersto indicate the type of information that the each of the parametersrepresents. In at least some embodiments, various other types ofinformation may similarly be provided for parameters (e.g., tofacilitate their later use with other services), such as whether aparameter is optional.

In at least some embodiments, the identifying of appropriaterepresentation type information for parameters is facilitated by use ofa set of standard parameter representation type specifications that maybe initially provided and/or incrementally developed during registrationof services. By identifying a type of information represented by eachservice parameter, as well as by optionally identifying various types ofrelationships between parameter representation types, parameters ofdifferent services that represent the same or related types ofinformation may be identified. For example, some services that use zipcode values may use integer numbers to represent 5-digit zip codes,while other services that use zip code values may use text strings torepresent 9-digit zip codes—thus, each type of differing zip coderepresentation may be given a distinct representation type, allowingthem to be distinguished from each other as well as from other types ofinformation represented using integers or text strings. Suchrepresentation types allow easy determination of whether a zip codevalue that is appropriate for one service parameter may be used withanother service parameter that also represents zip codes, such as tofacilitate automated mapping of parameters for distinct services.Furthermore, in at least some embodiments, such different representationtypes for zip code information may be identified as being related, suchas to allow automated translation of a zip code value for one suchrepresentation type to a zip code value of another such representationtype. Such representation types may also be inter-related in variousways, such as by having a hierarchy of representation types (e.g., toindicate that a zip code representation type is one form of locationarea identifier representation type, with a phone area coderepresentation type being another form of location area identifierrepresentation type), and/or by having groupings of relatedrepresentation types (e.g., to indicate that representation typescorresponding to a city name, a state name and a zip code can be usedtogether as part of an address representation type). Thus, for example,when a new service is later identified as having parameterscorresponding to a city name and to a zip code and as having anotherparameter whose associated representation type has not been identified,the address grouping may be used to identify the state namerepresentation type as a possible representation type for the otherparameter (whether based solely on the address grouping or further basedon other information, such as the other parameter having a name of“st”). In addition, in at least some embodiments such groupings and/orhierarchies of representation types may automatically be identifiedbased on analysis of use of the representation types, such as byidentifying the relationship between the representation typescorresponding to city name, state name and zip code due to frequent usetogether, or by identifying the relationship between the zip code andarea code representation types based on frequent use of them asalternatives (whether as actual alternatives within a particularservice, or based on some related services using one parameter type andother of the related services using the other parameter type).

Accordingly, FIG. 1E illustrates an example user interface screen withwhich a WS provider user can continue registration of a WS, and inparticular can provide appropriate representation information for theinput and output parameters for the WS. In this example, FIG. 1E showsinformation for WS 110C based on the example WSDL interface descriptionillustrated in FIG. 1D. In particular, the automated processing of theWSDL interface description has identified the “GetDirections” operation183 a, and entries 183 w-183 z identify the four parameters defined foruse with the operation. The automated processing has identified variousinformation for each of the parameters, including a parameter name 183b, an indication of the direction of data flow 183 c for the parameter(e.g., input or output), and a data type 183 d for the parameter—in someembodiments, the user may be able to override these automaticallyidentified values if so desired, while in other embodiments thisinformation may not be modifiable (e.g., if provided here only forreference purposes).

In addition, as noted above, in the illustrated embodiment eachparameter will be assigned a representation type 183 e—in someembodiments such assignments will be specified only by a user, while inother embodiments the WSM may attempt to automatically identify defaultor suggested representation types for at least some parameters (e.g.,based on parameter name, data flow direction, data type, type orcategory of WS, etc.). For example, in the illustrated embodiment theWSM system has tentatively assigned an integer-based zip coderepresentation type to each of the “fromZipCode” and “toZipCode” inputparameters shown in 183 w and 183 x (such as based on the parameternames and their data types), but did not tentatively assignrepresentation types to either of the output parameters shown in 183 yand 183 z. The user may then modify the default selections for the inputparameters if they are not correct, such as by using dropdown lists inthe illustrated embodiment for those parameters' representation types toselect another more appropriate representation type—such lists mayinclude all defined representation types in some embodiments, while inother embodiments may include only a subset of types identified as beingthe most relevant (e.g., based on similar factors to those previouslydiscussed, on common or typical usage of representation types, etc.).Alternatively, in other embodiments information about representationtypes may be displayed and selected in other manners (e.g., by allowingthe user to search for representation types based on various criteria,by organizing and displaying information about representation types inan organized manner, such as hierarchically or by using categories, byproviding recommendations of one or more representation types for aparameter based at least in part on previous actions by other users,etc.). For example, if other users have previously used theinteger-based zip code representation type for parameters with namessimilar to or matching the “fromZipCode” name, that information mayfurther be used in suggesting that representation type for thatparameter. Similarly, the information that the current user specifiesfor the parameters (e.g., the representation types selected by the userfor the output parameters shown in 183 y and 183 z) will be stored andused to assist in future recommendations for similar and/or matchingparameters, such as based on parameter name and/or type. In addition, inthe illustrated embodiment each representation type has associateddescription information 183 f that is displayed to the user to provideinformation that assists in identifying an appropriate representationtype, although in other embodiments such information may instead not beused or may by available and provided in other manners.

In this example, a representation type was not automatically selectedfor the “cities” output parameter shown in 183 y, but the user hasmanually selected (not shown) a previously defined “list:cityName”representation type for the parameter—as shown in the descriptioninformation 183 f for the “list:cityName” representation type, therepresentation type corresponds to values that are lists of multipletextual names (e.g., implemented as a single-dimension array), such asbased on one or more previously registered services that used lists ofcity names as input values and/or output values. Thus, as previouslynoted, in at least some embodiments such user specification of amatching representation type for a parameter may further be used toassist in future automated matching of representation types, such as tostore an indication that information regarding the parameter correspondsto the matching representation type (e.g., that the name “cities” in aparameter name may reflect the “list:cityName” representationtype)—thus, a later parameter with the same parameter-relatedinformation 183 b-183 d as shown in 183 y may be automatically matchedto the “list:cityName” representation type based on the storedindication from this user-specified match.

In this example, a representation type was also not automaticallyselected for the “directions” output parameter shown in 183 z, and adropdown list is currently displayed for the representation typeselection 183 e for the output parameter (e.g., based on user selectionof the dropdown list control). As is illustrated, a variety of types ofpreviously defined representation types may be shown, such as thosecorresponding to options 184 a-184 d, along with at least basicdescription information in this example for those representation types.In addition, in this example embodiment the user may further indicate todefine a new representation type for use with the “directions”parameter, such as is reflected with respect to option 184 e, and FIG.1F illustrates an example screen for use in defining such a newrepresentation type. After all of the parameter-related information hasbeen specified, the user may select the “Continue” control 155 a tocontinue, or instead may select the “Cancel” control 155 b to insteadcancel the registration of WS 110 c.

As noted, FIG. 1F illustrates an example screen for use in defining anew representation type for the “directions” output parameter shown in183 z of FIG. 1E. In particular, the screen includes summary information185 a regarding the parameter, and provides sections 185 b-185 e viawhich the user can provide a variety of types of information about thenew representation type being defined. For example, in the illustratedembodiment the user is prompted to provide a name 185 b, a textualdescription 185 c for the representation type, a data type 185 e forvalues corresponding to the representation type, and optionally anenumeration 185 d of allowed values for the representation type (e.g.,for use by WS provider users in determine whether the representationtype is appropriate for a parameter of a service being registered, foruse by the WSM system in automatically performing verification or othervalidation for values being used during execution, etc.). In otherembodiments, a variety of other types of information may similarly beprovided, such as keywords and/or categories associated with therepresentation type (e.g., for use in searching for the representationtype and/or automatically matching the representation type toappropriate parameters), indications of relationships of therepresentation type to other defined representation types (e.g., one ormore categories, hierarchical relationships, or other groupings),criteria for allowed types of values for parameters of therepresentation type, etc. In addition, in other embodiments variousinformation for a new representation type being defined may be providedin manners other than interactive user specification, such as by insteadallowing a user to submit a document containing a description of the newrepresentation type. After the new representation type is defined, theuser may select control 156 a to continue, such as to complete theregistration of the WS 110 c or to return to the screen illustrated inFIG. 1E. In the illustrated embodiment, the defined representation typewill then be available for use in subsequent registrations of WSes(whether for WS Provider BBB or for other WS providers), such as tofacilitate the use of a single representation type for any parametersthat represent that type of information, although in other embodimentsthe user may be allowed to specify how and to what degree the newrepresentation type may be used by others (e.g., to limit the use of therepresentation type based on specified access rights).

While not illustrated here, a variety of other types of information maysimilarly be obtained from the WS provider for a WS being registered inother embodiments (e.g., information about communication protocols to beused when supplying input to and/or receiving output from the WS;information about input parameter value pre-processing to be performedfor the WS, such as a script or other executable logic to use inmanipulating input information that is provided before it is used asinput values for one or more input parameters of constituent services;information about output parameter value post-processing to be performedfor the WS, such as an XSLT stylesheet to use to produce output for theWS based on one or more output parameters values; etc.), such as for usein executing the WS and/or in using the WS as a constituent WS forcomposite WSes.

After one or more WSes have been registered with the WSM, a composite WSbased on using those registered WSes as constituent WSes may be createdand used in the illustrated embodiment, although in other embodimentscomposite services may instead be based on other constituent servicesthat have not been registered. FIGS. 1G-1J illustrate examples of a userinterface provided by an embodiment of the WSM to assist users increating a new composite WS based on one or more previously registeredconstituent WSes, and FIG. 1K illustrates an example of a WSDL interfacedescription for the new composite WS that is dynamically generated basedat least in part on WSDL information for the constituent WSes. FIG. 1Lthen illustrates an example user interface screen via which a potentialWS consumer can review information about the composite WS and select tosubscribe to the composite WS in a manner similar to FIG. 1B, althoughin this example the composite WS has only a single access option thatcorresponds to purchasing single-use access (rather than a multi-usesubscription or other type of multi-use access), as indicated in section195. While illustrated here as an interactive process with a user (e.g.,via a Web site), in other embodiments the composite WS creation processmay instead be performed in other manners, such as by one or moreprogrammatic invocations of appropriate WSM functionality in which thevarious described types of information for a composite WS are provided.

In particular, FIG. 1G illustrates a user interface screen via which anexample user may begin to specify a new composite WS, such as inresponse to a previous indication by the user to perform this activity.In the illustrated embodiment, any user may interact with the WSM tocreate a composite WS based on one or more constituent WSes, regardlessof whether the user provides any of the constituent WSes (or moregenerally is the provider of any WS), although in other embodiments thecomposite service creation capabilities may be limited in various ways(e.g., to users who provide and/or are authorized to use the relevantconstituent WSes, to users who pay a specified fee to receive theability to create composite services, etc.). In this example, theinitial composite WS creation screen includes instructional informationsections 151 and 152, and a section 160 in which the user can select oneor more registered constituent WSes for use with the composite WS beingcreated.

In this illustrated example, various potential constituent WSes 160c-160 d and 160 n-160 r are initially displayed in section 160, withvarious types of information 161 and 163-168 displayed for each of theWSes in a manner similar to section 110 of FIG. 1A. Potentialconstituent WSes may be selected and displayed to the user in variousways, including by presenting all registered WSes (e.g., in a scrollablelist and/or in a series of smaller groups), by presenting all WSes thatbelong to one or more specified WS categories (not shown) and/or thatmatch any user-specified search criteria (not shown), by presenting WSesthat are automatically selected for the user and/or for the composite WSbeing created (e.g., based on history information from past interactionswith the user, or based on high-level information that is specified forthe composite WS, not shown, such as a category or type of the compositeWS), etc. Furthermore, as previously noted, potential constituent WSesmay further be selected for the user based on prior actions of that userand/or other users, such as to indicate constituent WSes previously usedtogether and/or constituent WSes previously used by others to providetypes of output information (e.g., based on associated representationtype information) and/or to use types of input information (e.g., basedon associated representation type information). In addition, while notillustrated here, in other embodiments the user may be able to furtherspecify one or more other services that are not registered with the WSMfor use as constituent services (e.g., a service registered with anothermarketplace, or a service provided by the user but not registered), suchas by providing information for those services similar to thatpreviously described with respect to FIG. 1C.

In this illustrated example, the user has selected four registered WSes160 c (previously shown as WS 110 c in FIG. 1A), 160 n, 160 o, and 160 pby selecting appropriate selection boxes in column 162. In someembodiments, some potential constituent WSes may not be displayed to theuser or may be displayed in a non-selectable manner, such as if thosepotential constituent WSes are not available or compatible for use withthe composite WS being created and/or are not available or compatiblefor use with other currently selected constituent WSes. For example, inthis illustrative embodiment, registered WSes 160 q and 160 r have beenautomatically determined to be non-selectable for the composite WScreation based on specified conditions of use for those WSes, includinga specification for WS 160 r that it is not for use in composite WSesand for WS 160 q that it is for non-commercial use only, and thus aredisplayed in an altered visual manner and without correspondingselection boxes. Alternatively, in some embodiments other informationmay be used to restrict which potential constituent WSes are madeavailable for selection, such as based on the user being allowed to usethose WSes (e.g., based on access rights specified for those WSes and/orbased on the user having a current subscription to those WSes). In otherembodiments, such determinations of allowable constituent WSes may bemade in other ways, including by relying on the user to verify that someor all conditions of use for the selected constituent WSes are satisfiedby their use in the composite WS rather than by performing an automatedverification that the use conditions are satisfied. Furthermore, in someembodiments a determination of whether a condition of use is satisfiedmay not be immediately determinable, such as when waiting to see whetherthe composite WS being created is given a specified use price beforedetermining whether a “non-commercial use only” condition is satisfied,or by instead disallowing any use price to be specified for thecomposite WS while such a non-commercial use condition applies for anyof the selected constituent WSes.

After the user selects the user-selectable “Continue” control 152 a inFIG. 1G, the composite WS creation process continues with the exampleuser interface screen illustrated in FIG. 1H, although in otherembodiments the illustrated functionality of FIGS. 1G and 1H may insteadbe part of a single user interface screen. In this example, the user isprovided with an instructional information section 153 that instructsthe user to select one or more operations 173 of the selectedconstituent WSes for use with the composite WS, as well as a section 170in which the user can make the constituent WS operation selections.

In this illustrated example, various potential constituent WS operations170 a-170 f are initially displayed in section 170, with displayedinformation including indications 171 of the corresponding selectedconstituent WSes and indications of corresponding information 174-177regarding parameters of the operations. As with the selection ofpotential constituent WSes, the potential constituent WS operations maybe selected and displayed to the user in various ways, including bypresenting all operations of the selected constituent WSes, presentingall constituent WS operations that match any user-specified searchcriteria (not shown) and/or that belong to one or more specifiedoperation categories or types (not shown), presenting constituent WSoperations that are automatically selected for the user and/or for thecomposite WS being created, etc. In addition, while not illustratedhere, in other embodiments the user may be able to further specify orselect one or more other types of operations or capabilities that arenot from the selected constituent services, such as operations orcapabilities provided by the WSM to facilitate composite WS creation andexecution. Furthermore, in some embodiments some potential constituentWS operations may not be displayed to the user or may be displayed in anon-selectable manner, such as if those potential constituent WSoperations are not available for use with the composite WS being createdand/or are not available for use with other currently selectedconstituent WS operations. As with the selection and display ofpotential constituent WSes, various types of information may be used todetermine which potential constituent WS operations to make available tothe user.

In this illustrated example, the user has selected five constituent WSoperations 170 a, 170 b, 170 c, 170 e and 170 f for use with thecomposite WS being created by selecting appropriate selection boxes incolumn 172. After the user selects the user-selectable “Continue”control 153 a in FIG. 1H, the composite WS creation process continueswith the example user interface screen illustrated in FIG. 1I, althoughin other embodiments the illustrated functionality of Figure may insteadbe part of a single user interface screen with the illustratedinformation of FIGS. 1G and/or 1H.

In this illustrated example, the user is next prompted in FIG. 1I toprovide information about the order and inter-relationships of theselected WS operations. In particular, the constituent WS operations 186a-186 e that were selected in FIG. 1H are displayed in section 186 inthe illustrated embodiment, along with user-specifiable fields 186 y viawhich the user can specify a relative order in which to execute the WSoperations and user-specifiable fields 186 z via which the user canspecify inter-relationships between the selected WS operations. In thisexample embodiment, the user indicates a first group of one or more WSoperations that can be executed in parallel based on input informationto the composite WS (by giving those WS operations a value of “1” fortheir relative order), and optionally specifies one or more subsequentgroups that each have one or more WS operations that can be executed inparallel relative to each other but that are to be executed subsequentto one or more of the WS operation(s) in the prior group. The user alsoindicates specific inter-relationships between WS operations byindicating for WS operations in subsequent groups which one or more WSoperations from a prior group will be used to provide input informationfor the WS operation. After the user is finished, he/she can use the“Continue” control 157 a to continue the creation process for thecomposite WS, or can instead use the “Cancel” control 157 b to cancelthe creation process.

While not illustrated here, in some embodiments the user may further beprompted or allowed to provide additional information to further defineinter-relationships between the selected WS operations and/or otheraspects of the composite service. For example, the user may be allowedto specify various logic to define in greater detail how parameters ofWS operations are to be mapped together, such as to manipulate a valueof an output parameter before the manipulated value is provided as aninput value to an input parameter to which the output parameter ismapped, to provide conditional logic to determine whether and/or how toinvoke one or more subsequent WS operations based on availableinformation (e.g., one or more output values from prior WS operations),to provide looping logic to indicate whether and how one or more WSoperations are to invoked multiple times in order to handle multiplerelated pieces of information, or to accommodate different protocolsand/or messaging models used by two constituent WSes that will interact.For example, one constituent WS may exchange information using SOAPmessages while another uses XML documents sent over HTTP, and if soexecution of the composite WS may include providing output received fromone of the services using one protocol to the other service using theother protocol, with the protocol translation accommodated based on thespecified logic and/or automatically by the WSM. Similarly, theexecution of a composite service may include accommodating differenttypes of models for returning response information, such as synchronousand asynchronous models (e.g., by delaying invocation of laterconstituent services that depend on output information from anasynchronous constituent service until that output information isreceived). Furthermore, the user may be allowed to specify various logicfor a composite service to define in greater detail how values for inputparameters of the composite service will be handled, such as to performspecified processing on an input parameter value before using it (e.g.,providing it as input to one or more constituent services), or toeliminate a constituent service input parameter as an input parameterfor the composite service (e.g., to obfuscate its use) by specifying aprogrammatic manner of determining input for that constituent serviceinput parameter that is not based on received input or on the output ofanother constituent service (e.g., by specifying that a constant valuebe used or that a value be determined in a specified programmaticmanner). In addition, the user may be able to specify a variety of othertypes of information, such as the following: names and other informationfor use as input parameters and/or output parameters for the compositeservice (e.g., to encapsulate a single constituent service of acomposite service, such as to hide details regarding the constituentservice and its interfaces); information about communication protocolsto be used when supplying input to and/or receiving output from the WS;information about input parameter value pre-processing to be performedfor the WS, such as a script or other executable logic to use inmanipulating input information that is provided before it is used asinput values for one or more input parameters; information about outputparameter value post-processing to be performed for the WS, such as anXSLT stylesheet to use to produce output for the WS based on one or moreoutput parameters values; etc.

In this example, after the user selects the “Continue” control 157 a inFIG. 1I, the user is provided with information in FIG. 1J regardingdetails of a proposed execution strategy for the constituent WSes of thecomposite WS, which the user can modify as appropriate in this example.In particular, in this example the WSM system attempts to automaticallymap input and output parameters of the selected WS operations based onthe specified execution order and inter-relationships and on therepresentation type information for the parameters. FIG. 1J includes aninstructional information section 154 that instructs the user to reviewand modify proposed composite service provision information indicatinghow the selected constituent WS operations are to be combined and usedin order to provide one or more operations or other capabilities of thecomposite WS being created, as well as a section 180 with at least someof that composite service provision information. In particular, in thisillustrated example each of the five selected constituent WS operationsis displayed in a box, with the input parameter(s) for the operationdisplayed above the box and the output parameter(s) for the operationdisplayed below the box. The user can then graphically manipulate thedisplayed operations and parameters in this illustrated embodiment tospecify a data flow inter-relationship between the selected constituentWS operations, with the input data entering the specified data flow atthe top and flowing down until an output response preparation process181 is indicated at the bottom—in other embodiments, such informationmay be specified and/or displayed in other manners (e.g., by usingdifferent visual representations, by displaying the information intabular form, by instead specifying textual logic that indicates theflow of processing that is to occur between the various selectedoperations, etc.).

In this example embodiment, the composite WS being created will combinethe functionality of the selected operations to produce two operations.A “city-and-hotel-quality” operation (name not shown) of the compositeWS will take as input a starting and ending zip code, will identifyvarious cities along a typical driving path between the zip codes, andwill provide various output information in a specified form thatincludes a list of hotels ranked by hotel rating for each city as wellas a list of radio stations in the ending zip code area—in this exampleembodiment, this city-and-hotel-quality operation of the composite WS isbased on the constituent WS operations “GetDirections”,“GetHotelsByCityName”, “GetHotelStarRating”, and “GetRSByZipCode”, asdiscussed in greater detail below. A second “hotel-satisfaction”operation (name not shown) of the composite WS will take as input a cityname and hotel name, and will provide output that is an integer between0 and 100 representing the percent of respondents who have stayed atthat hotel who found the hotel to be satisfactory—in this exampleembodiment, this hotel-satisfaction operation of the composite WS isbased on the constituent WS operation “GetHotelSatisfactionPercent”.

In this illustrated embodiment, the composite service provisioninformation indicates that the ending zip code input parameter for the“GetDirections” operation has been mapped to the input parameter for the“GetRSByZipCode” operation in such a manner that these two parametersrepresent the same data value, and a new input parameter “ZZZzipCode”has correspondingly been created for the first operation of thecomposite WS (whether manually or in an automatic manner to representthe indicated mapping) to represent the ending zip code value. At thetime of execution of the city-and-hotel-quality operation of thecomposite WS, the ending zip code value supplied for the ZZZzipCodeinput parameter will then be provided to each of GetDirections andGetRSByZipCode operations based on their toZipCode and zipCode inputparameters being mapped together (as indicated with the “{map}”notation) and to the ZZZzipCode parameter, thus allowing them to beexecuted in parallel. A new “ZZZfromZipCode” input parameter of thecity-and-hotel-quality operation will similarly be supplied to theGetDirections operation to represent the starting zip code. Moreover,while the constituent WS GetRSByZipCode operation can receive anoptional “genre” input parameter to limit the types of radio stationssupplied, in this example embodiment that parameter is not used as partof the composite WS, and thus does not have any corresponding inputparameter for the composite WS's city-and-hotel-quality operation.

The response output parameters from the GetRSByZipCode operation arethen forwarded to an indicated “response preparation” procedure 181 forprocessing to produce the response for the city-and-hotel-qualityoperation of the composite WS, such as to be supplied via one or moreoutput parameters (not shown) of the composite WS operation. While thedetails of the response preparation are not illustrated here, thepreparation procedure can be performed in a variety of ways in variousembodiments (e.g., by mapping each such constituent WS operation outputparameter to a corresponding output parameter of the composite WSoperation, by using an XSLT style sheet or other specification toindicate a manipulation that is to be performed on the output parametervalues before a response is generated, such as to generate a Web pagefor display to a user of an application program that called thecomposite WS operation, etc.).

The response output parameters from the GetDirections operation are notforwarded to the response preparation procedure, however. Instead, asindicated, the value of the textual driving directions output parameter“directions” is not used as part of the composite WS operation in thisexample embodiment. The array of city names that is the value of the“cities” output parameter is used further, however, and in particularthe city names are sent one at a time to the “GetHotelsByCityName”operation (whether via synchronous serial executions of the operation,or instead via multiple executions using different “cityName” inputparameter values that occur asynchronously and/or in parallel), which isindicated in this example embodiment by the indication of the “{loop}”scripting capability. Each city name is also forwarded to the responsepreparation procedure 181 for use in generating the composite WSoperation response, and is further sent as input to the“GetHotelStarRating” operation in conjunction with each hotel name thatis output from the GetHotelsByCityName operation for that city. Inparticular, the hotel names from the “hotelNameListC” output parameterarray are each sent to the “GetHotelStarRating” operation (whether in asynchronous or asynchronous manner and whether in serial or inparallel), which is similarly indicated in this example embodiment bythe indication of the “{loop}” scripting capability. Each hotel namevalue is also forwarded to the response preparation procedure, as iseach value of the “starRating” output parameter from theGetHotelStarRating operation.

In addition to the information regarding the city-and-hotel-qualityoperation of the composite WS, the composite service provisioninformation in this illustrated embodiment also indicates informationregarding the execution of the hotel-satisfaction operation of thecomposite WS. In particular, in this embodiment the hotel-satisfactionoperation is based on a single encapsulated constituent WS operation,that being the GetHotelSatisfactionPercent operation. In particular, thetwo input parameters to the GetHotelSatisfactionPercent operation remainidentical for the hotel-satisfaction operation, and the output parameterof the GetHotelSatisfactionPercent operation is arithmeticallymanipulated before being returned as a response output parameter value(in this example by multiplying the value of the “satisfactionPercent”output parameter by 100 to convert it from a numerical percentagebetween 0 and 1 to an integer value between 0 and 100). In someembodiments, new input parameters and/or output parameter may be createdfor the hotel-satisfaction operation, in a manner similar to thecreation of the ZZZfromZipCode input parameter of thecity-and-hotel-quality operation, while in other embodiments theexisting input and/or output parameters of the constituent WS operationmay instead be used. This composite WS operation may be executed, forexample, after a caller has obtained information about hotel(s) from thecity-and-hotel-quality composite WS operation and would like additionaldetails regarding a specified hotel.

After the composite service provision information is specified in FIG.1J, the composite service creation process continues, such as based on auser selection of an appropriate user-selectable control (not shown). Insome embodiments, the composite WS creation may be completed at thispoint, while in other embodiments a variety of additional informationmay be specified for the composite WS by the user. After the newcomposite WS creation is complete, the composite WS may in someembodiments be treated as being registered with the WSM in the samemanner as other registered WSes (e.g., so that it is transparent to aconsumer whether a registered WS is a composite WS or is not a compositeWS, or is provided directly by the WSM or by a WS provider separate fromthe WSM). For example, after the creation of the new composite WS, FIG.1L illustrates an example user interface screen via which a potential WSconsumer user can review more detailed information about the compositeWS and select to subscribe to the WS, in a manner similar to thatpreviously described with respect to FIG. 1B.

If additional information is to be specified for the composite WS, theuser may be prompted to specify some or all of various types ofinformation for the composite WS (not shown), such as in a mannersimilar to that displayed in FIG. 1C with respect to registering anexisting WS. Such user specification of additional information may occurbefore or after providing other information for the composite WS such asthe composite service provision information, and may include a varietyof types of additional information (e.g., a name, one or more relatedterms, one or more use prices, any use conditions, and a textualdescription). In addition, in some embodiments the user may furtherspecify access rights or other use conditions to restrict the otherusers (if any) to whom the composite service will be available.

Alternatively, in some embodiments some or all of these types ofadditional information may instead be automatically generated for thecomposite WS (e.g., based on corresponding information from theconstituent WSes), such as to provide automatically generated defaultsfor those types of information to the user as suggestions for approvalor modification. For example, various use conditions may be combined inorder to generate an intersection or union of the conditions, orcorresponding terms may instead be combined so as to select the most orleast restrictive of the terms (e.g., if one constituent service allowsa maximum of 100 uses per hour and another allows a maximum of 1000 usesper hour, the term selected for the composite service could be 100 or1000 uses per hour, and the WSM could then automatically enforce theselected term). Similarly, a use price may be determined in variousways, such as to determine a single-use price by summing single-useprices of all of the constituent services, or instead by using aprobabilistic determination or other weighting based on expected use(e.g., when the composite service provision information includesconditional logic). In addition, in a manner similar to the registrationof non-composite services, in at least some embodiments variousinformation about a composite service being created may be added by theWSM (whether automatically or in a manner based on interactions with theuser registering the service), such as to add input and/or outputparameters to the interface for the service (e.g., for use by the WSM,such as an input parameter to obtain a subscription identifier for theservice or a subscriber identifier), to add use conditions (e.g., useconditions required by the WSM for some or all services), to set one ormore consumer access prices for the composite service based at least inpart on one or more specified or determined use prices for the compositeservice (e.g., access prices that are the same as the use prices, orinstead that include additional fees charged by the WSM or a reductionin fees provided by the WSM), etc. Similarly, in at least someembodiments various information about a composite service being createdmay be changed or removed by the WSM (whether automatically or in amanner based on interactions with the user creating the compositeservice), such as to obfuscate information about the creator of theservice and/or the underlying constituent services, as well as to allowthe WSM to control the invocation of the composite service (e.g., bychanging the names of input and/or output parameters to the interfacefor the service, by using a network endpoint or other access informationprovided by the WSM, etc.).

After information for the composite WS has been obtained, a WSDLinterface description for the new composite WS is dynamically generatedin the illustrated embodiment by the software facility, with portions ofan example WSDL interface description for the new composite WS beingillustrated in FIG. 1K. In some embodiments this new WSDL may beautomatically generated and made available for use without anyadditional input by the user, while in other embodiments theautomatically generated WSDL may instead be provided to the user forreview and/or modification. By dynamically generating the new WSDLinterface description in this manner, the new composite WS may be putinto use substantially immediately.

In this example, the dynamically generated WSDL interface description isbased at least in part on WSDL information for the constituent WSes,including the example WSDL interface description for the “DrivingDirections BBB” constituent WS that is illustrated in FIG. 1D. Lines 2-4of the example composite WS WSDL first define a new data type for use inthe WSDL, which in this example will be an array of various types ofinformation produced by the response preparation process 181 indicatedin FIG. 1J. Lines 5-11 next define input and output messages for usewith each of the operations of the composite WS. For example, the inputmessage “ABCgetTripInfo” for the city-and-hotel-quality operation (herenamed “cityAndHotelQuality”) has the two input starting and ending zipcode integer parameters “ZZZfromZipCode” and “ZZZzipCode”, and thecity-and-hotel-quality operation output message “ABCTripInfo” has inthis example a “tripInfo” output parameter whose value is an arrayholding a variety of types of information. Input and output messages forthe hotel-satisfaction operation are similarly defined. In lines 12-18the two operations for the composite WS are defined, indicating use ofthe input and output messages, and in lines 19-24 SOAP bindings for theoperations and their messages are specified (although details for thehost-satisfaction operation are not shown).

Lines 25-39 then specify various additional information for thecomposite WS, including specifying a newly generated network endpointfor the composite WS in lines 37-38 (which in this example is a specificnetwork-accessible URL that is created by the Web Store ZZZ operator ofthe WSM for use with this new composite WS). In addition, a use price isspecified in line 30, such as based on the use prices for the twoconstituent WSes with use fees (e.g., 5 cents per use for the “DrivingDirections BBB” service, and $1 per 100 uses for the “Hotel QualityRatings” service)—in this example, the number of calls to the “HotelQuality Ratings” service may vary with each call to the composite WS,and thus the specified composite WS use price may be estimated based onan expected average number of calls to the “Hotel Quality Ratings”service, or the composite service provision information may instead bealtered to limit the number of calls to the “Hotel Quality Ratings”service (e.g., to be less than 15 per call to the composite WS).Moreover, even if an exact or maximum price of using the constituentWSes can be determined, the use price for the composite WS may be sethigher than that determined price, such as to cover a fee charged by theWSM and/or to provide revenue to the creator of the composite WS.

The example composite WS WSDL also includes various contractuallicensing terms in lines 32-36, textual description documentation forthe composite WS in lines 26-29, and use conditions in line 31. In thisexample, the example license terms are similar to those illustrated inFIG. 1D, although the termination clause is more restrictive (e.g.,based on another of the constituent WSes having this more restrictiveclause, such as from the use condition information 167 for the “RadioStation Finder” service in FIG. 1G), the textual documentation is acombination of the documentation from each of the constituent WSes, andthe use conditions reflect the conditions specified for the “RadioStation Finder” service (as illustrated in FIG. 1G). In addition, one ofthe use conditions for the composite WS from the “Radio Station Finder”service is of a form that in this example is not automatically enforcedby the WSM, that being that the supplied advertisement from the servicemust be displayed to the end user (which is not shown in FIG. 1K for thesake of brevity), although in some embodiments the WSM could verify atleast that the advertisement is sent along with the composite WSresponse information to the caller. In other embodiments, various othertypes of information may additionally be specified, and some or all ofthe illustrated types of information may instead be specified in othermanners or not at all.

Thus, FIGS. 1G-1J illustrate one example of creating a composite servicebased on user input, and FIG. 1K illustrates one example of adynamically generated WSDL interface description for a composite WS.However, the specification of composite service provision informationmay instead be performed in a variety of other manners in otherembodiments. For example, in some embodiments at least some mappings ofoutput parameters of constituent WSes to input parameters of otherconstituent WSes may be performed in an automated manner, such as basedon metadata for the parameter values (e.g., representation typesassociated with the parameters). In the illustrative example of FIG. 1J,such automated mapping may be used, for example, to automaticallyidentify a possible association of the city array output parameter ofthe GetDirections operation and the cityName input parameter of theGetHotelsByCityName operation (in combination with a looping function orother mechanism of extracting a single city name from the array at atime).

In addition, in some embodiments the software facility may furtherassist in the composite service provision information specification byensuring that all parameter names in use within the composite serviceare unique, such as in an automated manner (e.g., addingservice-specific information to each parameter of a service or only toparameters having a name conflict, such as the name of the service ifthe name is specific). Alternatively, in some embodiments at least someparameter names may be re-used (or the name displayed to a user may bere-used), such as the two “hotelName” input parameters in FIG. 1J forthe GetHotelSatisfactionPercent and GetHotelsByCityName operations. Inaddition, in embodiments in which the software facility providescapabilities to automatically map together or otherwise associate inputand output parameters and/or to automatically rename parameters (e.g.,to ensure uniqueness), such activities may be performed automaticallywithout user review (e.g., as part of an automatic generation ofcomposite service provision information for a composite WS), or insteadmay be performed under user review and/or based on user approval (e.g.,to generate recommendations or defaults).

Furthermore, in some embodiments the software facility operates toobfuscate or eliminate information that is available to consumers of acomposite WS regarding the one or more constituent WSes used by thecomposite WS and/or other details regarding how the composite WS isprovided. For example, as previously noted, in some embodiments a newnetwork endpoint that is associated with the WSM or software facility iscreated and used for the composite WS, thus preventing a consumer fromidentifying any other WS provider who may be contacted as part ofinvoking one or more constituent WSes—in such embodiments, the newnetwork endpoint may be provided to a user as a last step in thecreation process for a new composite WS. In addition, the information inthe dynamically generated WSDL interface description for the compositeWS may similarly be generated so as to prevent easy determination ofunderlying constituent WSes, such as by generating new names for anyinput and output parameters of the composite WS rather than using thesame names as used by any constituent WSes. Furthermore, otherinformation accessible to a consumer (e.g., the types of informationdisplayed for services that are illustrated in FIGS. 1A, 1B and 1L) maysimilarly be modified so as to minimize or eliminate any references tounderlying constituent WSes or the providers of those WSes.

In addition, while not illustrated here, various additional types ofprocessing could be performed on any piece of data in the data flowprocess. For example, before executing the GetDirections operation,another constituent WS operation (not shown) could be called to verifythat the supplied starting and/or ending zip codes are valid zip codes(e.g., based on a service provided for free from the United StatesPostal Service), with conditional logic indicating to only execute theGetDirections operation if the zip codes are confirmed valid (e.g., tosave money if the GetDirections operation is not free). As anotherexample, in some embodiments the format of an output parameter value orthe value itself may be modified before it is provided as a value toanother input parameter, such as if each city value for the “cities”output parameter includes a string having a city and state name (e.g.,“Seattle, Wash.”), while the cityName input parameter expects only acity name (e.g., “Seattle”). A variety of types of value translation andtransformation functions may be provided to facilitate such valuemanipulations, including to transfer data between data types (e.g., totransform a zip code value stored as a string to a zip code value storedas an integer).

In addition, as discussed in greater detail below, a variety ofadditional types of capabilities may be provided to assist in thecreation and execution of composite services. For example,execution-time error handling may be performed in various ways, such asto identify invalid data before it is supplied as input to a WSoperation and/or to handle an error response from an invalid attemptedexecution of a WS operation. In addition, various capabilities tofacilitate the creation of composite services may also be provided, suchas automated validation/verification to check specified compositeservice provision information (e.g., to ensure that data types match),interactive debugging capabilities to identify problems (e.g., bytreating one or more WSes being debugged as constituent WSes to acomposite WS that provides the debugging capabilities), test executioncapabilities (e.g., for free, even if the test involves use of one ormore fee-based constituent services), simulation capabilities to testmultiple invocations of the composite service over time or otherspecified use cases, error tolerance calculation capabilities,sensitivity analysis capabilities, etc. Moreover, in at least someembodiments the composite service provision information specified for atleast some composite services (e.g., for frequently used compositeservices) is stored in a manner to facilitate rapid retrieval of thecomposite service provision information at execution time, such as bycaching the composite service provision information.

Moreover, in some embodiments various of the types of capabilitiesdiscussed, whether capabilities for creating composite WSes (e.g.,mapping or otherwise associating multiple constituent WS parameters,determining a standard parameter name or parameter type for aconstituent WS parameter, identifying parameter name conflicts and/orrenaming parameter names, performing validation or verificationfunctions for composite service provision information, providingdebugging capabilities, providing test execution capabilities, etc.)and/or for executing composite WSes (e.g., to provide programmingconstructs such as conditional logic or looping, modifying ormanipulating parameter values or value formats, execution-time errorhandling, etc.), may themselves be implemented as constituent serviceswithin the composite service, such as based on services provided by theWSM or software facility. In addition, in some embodiments the compositeWS creation and/or execution capabilities of the software facility maybe designed in such a manner as to be extensible, such as to allow newcapabilities to be added (e.g., using invocable constituent and/orcomposite services, or in other manners such as executable code modulesor objects).

Once WSes are available at the WSM, whether WSes registered by the WSproviders who provide them and/or registered composite WSes that arecreated by users, potential WS consumers can identify available WSes ofinterest in various ways, such as previously discussed with respect toFIGS. 1A and 1B. The potential WS consumers can then interact with theWSM to obtain access to a selected WS, such as by providing an accessfee payment based on an access price (if any) for the WS and bysatisfying any other specified use conditions for the WS. In someembodiments, some or all consumers obtain access to registered WSes bypurchasing subscriptions to those WSes for later use, and in someembodiments non-subscription use of registered WSes is provided. Forexample, one-time or limited non-subscription uses of a WS may beprovided for a variety of reasons, such as to allow an evaluation ortest use of a WS in order to determine whether to purchase additionaluses, for use of registered WSes that are free, to allow anonymousaccess without a defined subscription, etc. As discussed in greaterdetail below, various types of subscriptions can be provided in variousembodiments, including one-time use subscriptions, subscriptions for aspecified length of time and/or number of uses, etc. In addition, insome embodiments a WS consumer may need to first register with the WSMas a user before obtaining access to registered WSes (e.g., to providecontact information, payment source information, formatting and protocolpreferences for WS invocation response information, etc.).

When a consumer's access to a WS is authorized by the WSM but notprovided immediately (e.g., by purchasing a subscription), the consumerwill in some embodiments receive authorization information for use withlater requests for the authorized access (e.g., a unique subscription IDfor a purchased subscription, or a transaction ID for later-occurringnon-subscription transactions). If so, the later requests from theconsumer to provide the authorized access may include providing thepreviously received authorization information, and may further besupplied or specified in a manner indicated to the consumer at the timeof original access authorization.

After receiving an access request from a consumer for current use of aregistered WS, the WSM determines whether the use of the WS by theconsumer is authorized, such as based on any authorization informationsupplied with the request. In addition, in some embodiments the WSM mayfurther determine at the time of requested WS use whether any paymentobligations and specified use conditions are currently satisfied for aninvocation of the WS. If the WSM determines that the WS use isauthorized, the WSM causes the WS to be provided, and then provides someor all of any response information from the WS invocation to theconsumer. For example, for a registered WS provided by a WS provider,the WSM causes the WS to be provided by interacting with the WS providerto invoke the WS and to obtain any response information, such as byusing invocation information from a WSDL interface description for theWS. For a composite WS, the WSM causes the WS to be provided by usingthe composite service provision information for the WS to cause one ormore constituent WSes to be invoked in the manner indicated, such as byperforming each such constituent WS invocation in a manner similar tothat described for a registered WS provided by a WS provider.

In some embodiments, the WSM performs additional formatting of theresponse information before providing it to the consumer. Theinformation formatting can be performed in various ways and for variouspurposes, such as to act as a translator/adapter that accommodatespreviously specified preferences of the WS consumer (e.g., informationformat and/or protocol preferences requested from the WS consumer whenthey previously registered with the WSM), to combine the responseinformation with other information (e.g., response information fromother invoked WSes), and to obfuscate information related to theinvocation of the WS (e.g., the specific invocation request, informationabout the WS provider, information about the time of invocation of theWS, etc.).

In addition, in some embodiments the WSM and/or software facility mayautomatically provide access to a composite service via multiplealternative protocols, which in some situations may include definingmultiple interfaces and/or network endpoints or other addresses for usewith the alternative protocols. As one illustrative example, in someembodiments a new composite WS may be accessible via each of aninterface using SOAP messages, an interface that usesnetwork-addressable resources (e.g., as part of the REpresentationalState Transfer, or “REST”, distributed interaction model), and aninterface based on simple XML documents sent over HTTP (e.g., using anRPC interaction model that focuses on available operations). Similarly,output information may be provided using various protocols and invarious manners, including using a different protocol for output thanwas used for input.

In addition, in some embodiments the WSM may maintain one or more cachesor other storage mechanisms to store response information from WSinvocations, and if so may in some situations provide such storedresponse information to consumers rather than invoking the WSes toobtain additional response information (e.g., when the stored data wasrecently received and is of a type that is not time-sensitive and/orsubject to rapid change)—such response information may in someembodiments include not only information provided by the WS as theproduct of the invocation, but also status or other response messages(e.g., for a WS that does not otherwise provide information in responseto its invocation) or instead an indication that the WS does not provideany response. Similarly, in some embodiments the provision of acomposite WS may include using stored response information for one ormore of the constituent WSes of the composite WS rather than dynamicallyinvoking the constituent WS. Such caching may provide benefits to bothWS consumers (e.g., by providing response information even if a WSprovider is not currently available, by providing response informationmore rapidly than if the WS was dynamically invoked, etc.) and to WSproviders (e.g., by providing to WS consumers a service invocationvolume higher than the WS provider can actually handle, by providingservice to WS consumers even if the WS provider has temporarilythrottled some or all requests to its WS, etc.), as well as potentiallyproviding cost savings from not invoking fee-based WSes.

As previously noted, potential WS consumers can identify WSes ofinterest in a variety of ways. In some embodiments, the WSM allowspotential WS consumers to search the registered WSes in various ways,such as based on the type of service and/or type of data provided, onthe use price, on the WS provider or other source of the WS (e.g., bytreating the source of a composite WS as the WSM or as the user whocreated the composite WS), on the WS description, etc. In addition, insome embodiments the registered WSes may be categorized into groups ofrelated WSes (e.g., in a hierarchical manner with one or more levels ofsub-categories), and if so potential WS consumers may be able to browsewithin specified categories and sub-categories and/or may be able tolimit their search to specified categories and sub-categories.Furthermore, in some embodiments composite WSes may be identifiable byconsumers, and if so potential WS consumers may be able to search orbrowse only among composite WSes and/or by excluding composite WSes.Moreover, a variety of other types of WS-related information may beprovided to potential WS consumers, such as by providing lists or otherindications of top-ranked and/or top-rated WSes, indications ofrecommended WSes (e.g., personalized to the current potential WSconsumer based on information known about that consumer), etc.

In addition, after identifying one or more WSes of potential interest, apotential WS consumer may be able to review additional information abouteach WS, such as by receiving a Web page specific to a WS that includesdescription information for the WS (e.g., such as previously discussedwith respect to FIGS. 1B and 1L) and that optionally includes variousother information about the WS (e.g., pricing information, informationabout the WS provider, etc.). In some embodiments, such WS-specificinformation may also include a variety of other types of information,including reviews of the WS by other WS consumers that have used the WSand/or summaries of such reviews, indications of rankings and/or ratingsof the WS relative to other WSes based on various criteria (e.g., numberof uses, a recent trend in use, consumer-specified ratings, etc.),indications of similar WSes (e.g., based on category) and/or otherwiserelated WSes (e.g., other WSes by the same WS provider, other WSes thathave been used by other WS consumers that have previously used this WS,etc.). In some embodiments, some or all of such reviews, rankings andratings of composite WSes may be gathered and used independently ofrelated information for the constituent WSes for the composite WS, whilein other embodiments some or all such additional information may insteadbe automatically generated for a composite WS based on the relatedinformation for its constituent WSes.

In some embodiments, some or all of the described actions by WSproviders and/or WS consumers are performed via user interactions with aWeb site for the WSM, such as a Web site dedicated to providing amarketplace for Web services or instead a Web site of a more general Webstore that provides various types of items (e.g., products and/orservices) that include the Web services. Alternatively, in someembodiments, some or all interactions by the WS providers and/or WSconsumers are instead performed by programs acting on behalf of the WSproviders or consumers programmatically interacting with one or morecomputing systems of the WSM, such as via defined APIs (e.g., via Webservices provided by the WSM to implement the underlying functionalitiesfor the WSM)—in some embodiments, such APIs are based on the use of XMLover HTTP (e.g., using the REST distributed interaction model), while inother embodiments the APIs may be based on the use of SOAP and/or otherprotocols related to Web services.

In some embodiments, the WSM further provides a capability for WSproviders and/or WS consumers to monitor and manage their interactionswith the WSM, such as via a portal. For example, a registered WSprovider and/or creator of a composite WS may in some embodimentsmonitor their registered WSes, such as to determine the current leveland/or a historical level of the use of those WSes by WS consumers, orinstead to determine a current status of their WSes (e.g., to verifythat their WSes are currently operating properly). In addition, WSproviders and composite WS creators may be able to manage variousaspects of their registered WSes, such as to modify pricing informationand other use condition information, or to dynamically specify currentthrottling conditions for the use of their WSes (e.g., to limit volumeand/or type of use of the WSes for a specified period of time or untilspecified conditions are satisfied or until further notice). WSproviders may also review and/or manage their user account information,such as to change their current contact information or to review paymentamounts currently owed to the WS provider by the WSM. In a similarmanner, registered WS consumers may monitor and manage their WSsubscriptions or other WS access authorizations (e.g., to review recentuse of their subscriptions and the amount of previously purchased orotherwise approved subscription use remaining, to dynamically specifycurrent throttling or other restriction conditions for the use of theirsubscriptions, etc.), as well as review and manage their user account(e.g., to modify payment source information, or to authorize additionalWS subscriptions or other WS use, such as by purchasing WSM-provided“points” that can later be used to pay for or authorize WS use).

As one example of another type of information that can be specified byWS providers and/or WS consumers in some embodiments (e.g., via the WSMportal or during registration), various types of notification requestsmay be specified for various types of information. For example, a WSprovider may want to receive a standard email notification when theaverage volume of invocations of their WSes over a specified period oftime exceeds a specified threshold, and may further wish to receive anurgent alert notification when one of their WSes goes offline orotherwise generates an error condition. Similarly, WS consumers may wishto receive notifications based on use or current status of theirsubscriptions, on the current availability of specified WSes and/orspecified categories of WSes, on the current status of their useraccount information (e.g., the amount of WSM points remaining), etc.Such notification requests may include specifications of how to performthe notification, as well as the conditions that trigger thenotification when they are satisfied. As the WSM operates in suchembodiments, it monitors defined notification conditions in order todetermine when notifications are appropriate, and performs the requestednotifications in the manner specified.

In addition, while a WS subscription is in some embodiments limited tothe particular WS consumer that created the subscription, in otherembodiments a WS subscription may be shared among multiple differentusers. For example, in some embodiments a WS consumer may specify one ormore affiliate users for one or more of their WS subscriptions, witheach affiliate user given specified rights to use those WS subscriptions(e.g., authorization to make a specified total number of WS invocationrequests based on the subscription or a specified limit on the volume ofsuch WS invocation requests, a specification of conditions under whichuse of the subscription by an affiliate is allowed or disallowed, etc.).In addition, in some situations a WS consumer may create a WSsubscription on behalf of an indicated application (or a specified copyor instance of such an application), such as an application developedand/or distributed by the WS consumer, and may specify that some or allusers of that application are authorized to use that WS subscription insome or all situations. Conversely, in some embodiments such anapplication developer or distributor may instead incorporate one or moreWS invocation requests as part of their application (whether or not inconjunction with a subscription by that WS consumer), but may insteadlimit some or all uses of those WS invocation requests by theapplication users such that those users may instead need to providetheir own payment and/or subscriptions to those WSes in order to usethat functionality of the application.

Moreover, in some embodiments various third parties can interact withthe WSM to obtain various additional functionality for themselves and/orto provide such additional functionality to other users. For example, insome embodiments external computing systems may provide WS coordinationservices to other users, with the computing systems defining WScoordination requests and interacting with the WSM to requestsatisfaction of those requests. Such coordination requests may in someembodiments specify other registered WSes to be invoked and/or specifyvarious logic to be executed, thus providing capabilities similar tothose of registered composite WSes without having to register those WScoordinations. The coordination requests may be supplied to the WSM forexecution (e.g., for a fee charged by the WSM, or instead based on thespecified pricing information for the WSes invoked by the coordination),such as in a manner similar to execute composite service provisioninformation, and may be represented in various ways in variousembodiments (e.g., as data structures, code modules, templates,mappings, portable code, etc.). In other embodiments, such third-partycoordination services may instead execute the coordination logic forcoordinations, such as by interacting with the WSM to individuallyinvoke each WS for the coordination as specified by the logic for thecoordination and then combining any resulting response information to beprovided to the requester of the coordination (e.g., a user of thecoordination service, such as for a fee).

In addition to coordination services, third parties can obtain andprovide a variety of other types of functionality by interacting withthe WSM. For example, in some embodiments some third parties may provideWSM agents that interact with the WSM to provide additionalfunctionality to users, such as to monitor various aspects of theoperation of the WSM in order to provide information or notifications tothe user (e.g., in situations in which the WSM does not providecorresponding notification capabilities for the type of informationbeing monitored by the agent, or instead to replicate a capabilityavailable from the WSM for a user who is not eligible to receive theinformation from the WSM). A variety of other types of interactions withthe WSM can similarly be provided to enable various other types ofadditional functionality and capabilities. For example, in at least someembodiments such agents may be able to search for and discoverregistered services and other types of information (e.g., definedrepresentation types), to register existing services and/or to createcomposite services, to provide or otherwise enable links to databasesand other external information sources, to enable others to search foror otherwise identify additional functionality provided via the agent,etc.

As previously noted, in some embodiments some or all of the registeredWSes may have specified pricing information such that WS consumersprovide payment to use those WSes. In some embodiments, a variety oftypes of billing mechanisms are provided for WS consumers. For example,as previously noted, in some embodiments WS consumers may be able topurchase WS subscriptions that can then be used at later times, and insome embodiments the WSM may sell non-subscription WS access. Inaddition, in some embodiments billing occurrences are based on priorspecified Service Level Agreements (“SLAs”) with certain WS consumersand/or based on the Quality of Service (“QoS”) requested by and/oractually provided to the consumer. For example, a provider of a WS mayspecify a use price for that WS that is based on one or more specifiedQoS levels provided by that WS provider in conjunction with the accessto that WS (e.g., a maximum response time, a minimum level of accuracyof response information, etc.), such as the only use price for that WSor instead one of multiple use prices (e.g., with one or more of theother use prices having other specified QoS levels and/or no QoSlevels), and if so access to that WS that is purchased based on that useprice (e.g., a subscription purchased for an access fee based on thatuse price) is performed in accordance with those specified QoS levelswhen possible. Similarly, an operator of the WSM may in some embodimentsspecify an access price for each of one or more of the registered WSesthat is based on one or more specified QoS levels provided by the WSM inconjunction with access to those WSes (e.g., a maximum response time, aminimum level of accuracy of response information, etc.), such as theonly access price for a WS or instead one of multiple access prices forthe WS (e.g., based on one or more specified use prices for the WS, withone or more of the other access prices having other specified QoS levelsprovided by the WSM and/or no QoS levels), and if so access to that WSthat is purchased based on that access price is performed in accordancewith those specified QoS levels when possible. In some embodiments, ifaccess to a WS is not provided to a consumer in accordance withspecified QoS levels purchased by that consumer and/or is not providedin accordance with any previously specified SLAs for that consumer,various additional actions may be taken to compensate the consumer(e.g., by providing a payment credit, by not counting that access aspart of the paid access for the consumer, etc.) and/or to correct anyproblems (e.g., to correct any internal mechanisms of the electronicmarketplace, such as by notifying appropriate personnel associated withthe electronic marketplace; to correct performance of the provider ofthe WS, such as by notifying appropriate personnel associated with theWS provider and/or by providing a financial incentive to the WSprovider, such as by delaying or reducing payment to that WS provider;etc.).

Moreover, in some embodiments WS consumers can obtain WSM-providedpoints that can be later used to purchase subscriptions and other WSaccess for various WSes—such points may be a WS payment option that WSconsumers can purchase or otherwise earn (e.g., as a reward) for lateruse with a specified group of WSes and/or WS providers (e.g., all WSesand WS providers). The points for a WS may be identified to a potentialWS consumer in various ways in various embodiments (e.g., displayed orotherwise accessible as a subscription or access price for some or allWSes, whether in addition to or instead of one or more prices ingovernmental currencies), and the determination of how many points areneeded to purchase access to a WS subscription or other WS access maysimilarly be determined in various ways in various embodiments (e.g., byspecifying and using a standard exchange rate for all WSes; by allowingeach WS and/or WS provider to have an individualized specified exchangerate, such as one specified at registration time for the WS and/or WSprovider; or by dynamically determining appropriate WSM points for a WSbased on a variety of factors when the price is provided to a potentialWS consumer, such as a current usage rate of the WS, other currentconditions such as a current day/time, information about the WSconsumer, etc.). Similarly, in other embodiments the WSM may accumulatethe costs of some or all of the WS uses for a consumer over a specifiedperiod of time, such as to provide a single monthly bill for all use ofa specified WS or of all WSes.

In addition, in some embodiments the WSM provides various securityand/or privacy mechanisms to ensure that only authorized WS providerscan register and provide WSes, that only authorized users can create andregister composite WSes, and/or that only authorized WS consumers cansubscribe to and/or access registered WSes. Such security and/or privacycan be provided in a variety of ways, including the use of passwords,public key encryption, digital certificates, etc. In addition, the WSMmay use various security and/or privacy mechanisms with respect tomanagement/monitoring interactions by WS consumers, WS providers and/orother users, such as to provide information to users only when they areauthorized to receive it and to allow modification of WS-relatedinformation and of subscriptions only when authorized. Similarly, inembodiments in which affiliates of WS consumers or other users areallowed at least some access to subscriptions of the WS consumer,various security and/or privacy mechanisms may be employed to ensurethat the affiliates are authorized to receive any benefits andinformation provided to them.

Furthermore, in addition to having WSes provided by third-party WSproviders and to providing access to registered WSes for third-party WSconsumers, in some embodiments the WSM itself may act as a WS providerand/or WS consumer for one or more WSes, such as an alternative to otherthird-party provided WSes, to provide WSes that are not otherwiseavailable to WS consumers, and/or as part of providing capabilitiesrelated to composite services. In addition, various other capabilitiesprovided and used by the WSM may also be implemented as WSes, such as aWSM API available to WS providers and/or WS consumers, as well asinternal capabilities used by the WSM (e.g., determining whether aspecific subscription request for a WS satisfies the specified useconditions for that WS by invoking an internal WS that provides theservice of comparing the specified use conditions and requested useinformation to determine whether the specified use conditions aresatisfied).

In addition, as discussed in greater detail below, the WSM can alsoprovide a variety of other types of functionalities and capabilities asdescribed.

FIG. 2 is a network diagram illustrating components and information flowof an example embodiment of the WSM system and of various externalcomputing systems and users interacting with the WSM system. Inparticular, in the illustrated embodiment various WS consumers 210 andWS providers 220 external to the illustrated WSM system 250 interactwith the WSM system to register WSes from WS providers and to registercomposite WSes created by WS consumers and/or WS providers, as well asto identify, subscribe to, and obtain access to registered WSes. Whilenot illustrated in this example embodiment, various optional thirdparties (not shown) external to the WSM system may also interact withthe system to receive or provide various enhanced or alternativecapabilities and functionalities.

In particular, WS providers interact 215 d with a front-end interface255 of the WSM system to register existing WSes and/or interact 215 cwith the front-end interface in order to create new composite WSes—inthe illustrated embodiment, the front-end interface 255 may be a Website with which the user interacts and/or an API (e.g., a WS API) withwhich external computing systems and executing applications interact,although in other embodiments other types of front-end interfaces mayalternatively be used. The WS providers may also in some embodimentsinteract 215 d with the front-end interface to initially registerthemselves as users of the WSM system (e.g., as WS provider users).

In this illustrated embodiment, after the front end 255 receives a userregistration request for a WS provider or a registration or creationrequest for a WS, corresponding information is forwarded to an AccessController component 260 of the WSM system to determine whether toapprove the request (e.g., based on whether sufficient appropriateinformation was provided, and/or on whether other predefined criteriahave been satisfied), and indicates to the front end whether the requestwas approved. With respect to composite service creation, for example,an access request may be sent when the creation process is initiatedand/or when the creation process has been completed and the compositeservice is ready to be put into use. In addition, the Access Controllercomponent stores information about the created composite WS orregistered WS in a WS database 263 for later use, or stores informationabout the registered WS provider in a Consumer/Provider User Accountdatabase 261.

In a similar manner, WS consumers interact 215 a with the front end toobtain information about available WSes, to subscribe to available WSes,and in some embodiments to initially register with the WSM as a user(e.g., a WS consumer user) prior to such subscription requests. Also, ina manner similar to WS providers, WS consumers may interact 215 c withthe front-end interface in order to create new composite WSes. As withrequests from WS providers, the front end forwards information regardingWS consumer user registration, subscription, and WS creation requests tothe Access Controller for determination of whether to approve therequests, and the Access Controller responds to the front end in anappropriate manner. The Access Controller also stores information aboutregistered consumers in the Account database 261, about registeredsubscriptions to WSes and other WS access authorizations in the WSsubscription database 265, and about created composite WSes in the WSdatabase 263 for later use.

After a request to create a new composite WS is received and approved,in the illustrated embodiment a Composite WS component 295 then operatesto facilitate the creation of the composite WS, such as based oninformation received with the request and/or by obtaining correspondinginformation (not shown) from the user who indicated to perform thecomposite WS creation (e.g., in an interactive manner). The Composite WScomponent may also obtain and use various information as part of thecreation process, such as information about registered WSes from the WSdatabase, and information about the user's subscriptions (if any) toregistered WSes from the WS Subscription database. After a composite WSis created, the Composite WS component then stores information about thenew composite WS in the WS database, such as a dynamically generatedWSDL or other interface definition for the composite WS and/or otherassociated information (e.g., one or more use prices, access controlinformation, etc.). Furthermore, in some embodiments the Composite WScomponent may operate to create a new WSM WS network endpoint 255 a foruse in invoking the composite WS (or may associate an existing suchnetwork endpoint with the composite WS).

In other embodiments, some or all of the various types of informationcould instead be stored in other manners, such as to maintain separateaccount database information for WS consumers and WS providers, or toinstead maintain subscription information along with other userinformation in the Account database. In addition, in embodiments inwhich WS providers and/or WS consumers can specify notification requests(e.g., at the time of user registration), such information is alsoforwarded to the Access Controller, which stores the information asappropriate for later use.

While not illustrated here, in some embodiments the WSM system furtherincludes a WSM Portal component (not shown) with which WS consumers andWS providers can interact to obtain information about their accounts andto perform other interactions with the WSM system, such as to monitorand/or manage. WS-related information. In some embodiments, the WSMPortal interacts with the front-end interface to perform requestedretrieval and modification of information, while in other embodimentsinstead interacts directly with the various databases as appropriate.

WS consumers may also interact 215 b with the front end to invoke orotherwise request access to WSes (e.g., WSes to which the consumers havesubscriptions). In some embodiments, all such requests may be forwardedusing the same access point of the front end API, such as if a WS to beinvoked is identified in the request with a unique identifier.Alternatively, in some embodiments some or all registered and/or createdcomposite WSes may instead each have a unique WSM WS network endpoint255 a, and if so a request to such a WS may instead be sent to theunique network endpoint for that WS. Requests for access to registerednon-composite WSes are then forwarded to the Access Controller componentto determine whether to approve the requests, such as to verify that therequester is authorized to access the WS (e.g., has a subscription) andthat other specified use conditions are satisfied. In the illustratedembodiment, requests for access to composite WSes, however, are firstforwarded to a WSM WS Request Handler component 255 b, such as to assistin the determining of whether to approve the WS access request, whetheralone or in conjunction with the Access Controller component. In otherembodiments, invocations of at least some WSes via corresponding networkendpoints 255 a may instead invoke those WSes without interacting withthe WSM WS Request Handler component or Access Controller component,whether directly (e.g., from a WSM WS Provider 273) or via the WSInvoker component 270.

When a WS access request for a non-composite WS is received from a WSconsumer and the Access Controller approves the request, the front endinteracts with a WS Invoker component 270 to perform invocation of oneor more WSes as appropriate, such as based on information retrieved fromthe WS database and/or received from the front end. The WS Invokercomponent then interacts 215 e with one or more WS providers asappropriate to invoke the appropriate WSes and to receive responseinformation. In some embodiments, the WS Invoker stores receivedresponse information in an optional cache 272 for later use, such as touse in lieu of a WS invocation in certain situations as appropriate. Inaddition, in some embodiments one or more of the WS providers from whichthe WS Invoker may invoke WSes can be one or more optional internal WSMWS providers 273. After obtaining the appropriate response information,whether from a WS provider or from the cache, the WS Invoker componentreturns the response information to the front end. In some embodiments,the front-end interface performs additional processing on the receivedresponse information before providing it to the requesting WS consumer,such as to aggregate information from multiple invoked WSes and/or toformat the response information in accordance with previously specifiedpreferences for the WS consumer.

When a WS access request for a composite WS is received from a WSconsumer and the Access Controller approves the request, in theillustrated embodiment the WSM WS Request Handler component of the frontend interacts with the WS Invoker component 270, such as to performcomposite WS invocation in a manner specific to composite WSes. Forexample, in situations in which a composite WS allows executing multipleconstituent WSes in parallel, the WSM WS Request Handler may sendmultiple invocation requests for those multiple constituent WSes to oneor more instances of the WS Invoker, with the WS Invoker then causingthose constituent WSes to be provided in a manner to that previouslydescribed. After obtaining constituent WS response information from theWS Invoker, the WSM WS Request Handler may perform various types ofprocessing on the response information before providing it to therequesting WS consumer via the front end, such as to evaluate theresponse information as part of determining additional processing to beperformed as part of the composite WS (e.g., as part of evaluatingconditional logic specified for the composite WS). Moreover, afterexecution of the composite WS is complete, the WSM WS Request Handlerand/or front end may further perform other activities, such as toaggregate information from multiple invoked WSes and/or to format theresponse information in accordance with previously specified preferencesfor the WS consumer. The WSM WS Request Handler may obtain compositeservice provision information and other related information for acomposite WS in various ways, such as via the Access Controller, orinstead via a direct connection (not shown).

While not illustrated here, in some embodiments the WS Invoker componentmay also provide information to a WS Transaction Monitor component (notshown) regarding some or all processed WS invocation requests, such asfor all requests whether satisfied from the cache or from a WS provider,or instead only for successful requests to an external WS provider, withthe WS Transaction Monitor component in turn storing information aboutthe transactions in a WS Transaction database as appropriate. The WSTransaction Monitor component may also review information regardingrequested notifications to determine whether transactions and/or otherstatus information have triggered one or more specified notificationconditions, such as after each transaction or instead on a periodicbasis. When the WS Transaction Monitor component determines that one ormore notifications have been triggered, the component may then forwardcorresponding information to a Customer/Provider Notifier component (notshown) to perform notifications to WS consumers and/or WS providers asappropriate.

When a received request by the Access Controller and/or WS Invokercorresponds to payment that needs to be obtained (e.g., for subscriptionrequests or other WS access requests), one or more of the componentsinteract with a WS Payment Module component 280 in the illustratedembodiment to provide information about the corresponding request ortransaction, although in other embodiments the front end could insteadinteract directly with the Payment Module. The Payment Module thendetermines appropriate payment that is needed (e.g., by receiving theinformation from another component and/or by retrieving appropriateinformation from one or more of the databases, such as the WSSubscription database, WS database and/or Account database), andperforms the necessary functions to obtain the payment, such as inaccordance with previously provided payment source information and anyspecified preferences. The Payment Module also stores information aboutthe payments obtained from WS consumers and any corresponding paymentsowed to WS providers in a WS Payments database (not shown). In someembodiments, the Composite WS component may also interact with thePayment Module, such as to obtain payment for providing services relatedto creating composite WSes, and/or to determine payment informationrelated to constituent WSes specified for a composite WS.

As previously noted, in some embodiments one or more third-party systemsor users (not shown) may additionally be present to interact with theWSM system, such as via the front-end interface. As discussed in greaterdetail elsewhere, such third-party systems may provide a variety oftypes of services and functionalities, including coordination,agent-based monitoring, etc.

FIG. 3 illustrates a server computing system 300 suitable for executingan embodiment of the Web Services Marketplace (“WSM”) system, as well asvarious WS consumer computing systems 350, WS provider computing systems370, and other computing systems 390. In the illustrated embodiment, theserver computing system includes a CPU 305, various I/O devices 310,storage 320, and memory 330. The I/O devices include a display 311, anetwork connection 312, a computer-readable media drive 313, and otherI/O devices 315.

An embodiment of the WSM system 340 is executing in memory, and itinteracts with the other computing systems over the network 380 usingthe network connection 312 (e.g., via the Internet and/or the World WideWeb). The other computing systems can similarly execute variousinformation as part of the interactions, such as a Web browser 359executing in memory 357 of the WS consumer computing systems to allowusers of the systems to interact with the WSM system, and such as a WSserver 379 executing in memory 377 of the WS provider computing systemsto provide Web service functionality. Such other computing systems alsoinclude a variety of I/O devices in the illustrated embodiment,including network connections to communicate with each other and theserver computing system over the network. In addition, in theillustrated embodiment a variety of datastores (e.g., databases) 321,323 a, 323 b, and 325 are present on the storage 320 for use by the WSMsystem, although in other embodiments some or all such databases mayinstead be located elsewhere and/or be organized in other manners, andvarious other additional data may be accessed and used (e.g.,information regarding previous transactions, regarding previously madeand/or owed payments, regarding notification requests, etc.).

In the illustrated embodiment, a Composite WS component (not shown) andWSM WS Request Handler component (not shown) execute as part of the WSMsystem in order to provide functionality related to composite WSes,although in other embodiments one or both such components may insteadexecute separately from the WSM system (e.g., separately in memory 330,or instead on a remote computing system). In this illustratedembodiment, the Composite WS component may access various information aspart of the composite WS creation process, such as information aboutusers from the Account database 321 and/or information about constituentWSes from the databases 323 a and 323 b having WS-related information.When a composite WS is ready for completion (or a modification of anexisting composite WS is ready for completion), the Composite WScomponent then dynamically generates a WSDL and/or other interfacedefinition for the composite WS and stores that definition in the WSInterface Definition database 323 b, and stores other information aboutthe composite WS in the WS DB 323 a database (e.g., composite serviceprovision information, additional information associated with thecomposite service such as use price(s) and access controls, etc.).

Those skilled in the art will appreciate that the illustrated computingsystems are merely illustrative and are not intended to limit the scopeof the present invention. Computing system 300 may instead be comprisedof multiple interacting computing systems or devices, and may beconnected to other devices that are not illustrated, including throughone or more networks such as the Internet or via the Web. Moregenerally, the “server” and other computing systems may comprise anycombination of hardware or software that can interact in the mannersdescribed, including without limitation desktop and other computers,network devices, internet appliances, PDAs, cellphones and cordlessphones and other wireless phones, devices with walkie-talkie and otherpush-to-talk capabilities, pagers, electronic organizers,television-based systems (e.g., using set-top boxes and/orpersonal/digital video recorders) and various other consumer productsthat include inter-communication capabilities. In addition, thefunctionality provided by the WSM system components illustrated in FIG.2 may in some embodiments be combined in fewer components or distributedin additional components. Similarly, in some embodiments thefunctionality of some of the illustrated components may not be providedand/or other additional functionality may be available.

Those skilled in the art will also appreciate that, while various itemsare illustrated as being stored in memory or on storage while beingused, these items or portions of them can be transferred between memoryand other storage devices for purposes of memory management and dataintegrity. Alternatively, in other embodiments some or all of thesoftware modules and/or components may execute in memory on anotherdevice and communicate with the illustrated computing system or devicevia inter-computer communication. Some or all of the WSM systemcomponents or data structures may also be stored (e.g., as softwareinstructions or structured data) on a computer-readable medium, such asa hard disk, a memory, a computer network or other transmission medium,or a portable media article (e.g., a DVD or flash memory device) to beread by an appropriate drive or via an appropriate connection. Some orall of the WSM system components and data structures can also betransmitted via generated data signals (e.g., by being encoded in acarrier wave or otherwise included as part of an analog or digitalpropagated signal) on a variety of computer-readable transmissionmediums, including wireless-based and wired/cable-based mediums, and cantake a variety of forms (e.g., as part of a single or multiplexed analogsignal, or as multiple discrete digital packets or frames). Suchcomputer program products may also take other forms in otherembodiments. Accordingly, the present invention may be practiced withother computer system configurations.

FIG. 4 is a flow diagram of an embodiment of the WS Registration routine400. The routine may, for example, be provided by an embodiment of theWSM and/or of the software facility. The routine processes requests fromusers to register WSes at the WSM for use by WS consumers, includingfrom WS provider users and/or WS consumer users to create composite WSesto be registered.

The routine begins at step 405 where an indication is received from auser to register a WS. The routine continues in the illustratedembodiment to step 410 to determine whether the user is registered atthe WSM, and if not continues to step 415 to attempt to register theuser (e.g., by obtaining contact information for the user, informationabout how to provide payment to the user based on use of the user'sregistered WSes, etc.). After step 415, the routine continues to step420 to determine whether the registration of the user was successful. Ifso, or if it was instead determined in step 410 that the user wasalready registered (or did not need to be registered), the routinecontinues to step 425 to execute a subroutine that obtains variousinformation corresponding to the WS being registered for use inperforming the registering, as described in greater detail with respectto FIG. 5, although in some embodiments at least some of suchinformation may instead be received as part of step 405.

After step 425, the routine continues to step 430 to determine whetherto accept the WS registration, such as based on an automateddetermination (e.g., on whether appropriate information has beensupplied and any predefined criteria had been satisfied) and/or a manualdetermination (e.g., by a user representing the WSM based on whether theWS is appropriate for the WSM). In step 435, the routine determineswhether the registration was accepted, and if not continues to step 440to generate a registration denial message for the user. If it wasinstead determined in step 435 that the registration was accepted, theroutine continues instead to step 445 to assign a unique item ID to theWS for use by the WSM system in tracking various information related tothe WS. The routine then continues to step 450 to optionally receive oneor more of various types of additional information related to the WS,such as any use throttling conditions (e.g., limits on how manyinvocation requests to allow for the service), availability conditions(e.g., times at which the WS is not available or other conditions underwhich the WS is available or not available), notification conditionsrelated to the WS, etc. The routine then continues to step 455 to storethe various received information related to the WS in one or moredatabases as appropriate, and then makes the registered WS available topotential consumers in accordance with any availability conditions. Instep 460, the routine then generates a registration acceptance messagefor the user.

After steps 440 or 460, the routine continues to step 465 to send thegenerated message to the user, and optionally provides additionalinformation related to the registration (e.g., the assigned item ID). Instep 470, the routine then determines whether to register more WSes forthis user, and if so returns to step 425. If not, the routine continuesto step 495 to determine whether to continue. If so, or if it wasinstead determined in step 420 that the WS provider registration was notsuccessful, the routine returns to step 405. If the routine insteaddetermines not to continue, the routine continues to step 499 and ends.While not illustrated here, in some embodiments the routine couldadditionally use various security information and/or mechanisms, such asto ensure that only authorized users can register new WSes. In addition,as previously described, in some embodiments the routine may be providedas part of a user's interaction with a Web site or other interactiveinterface, while in other embodiments the routine may be performed aspart of a programmatically accessed API. Moreover, in some embodimentsthis or a related routine may further be used to modify informationabout a previously registered WS, such as to treat the modifiedregistered WS as a new WS (e.g., with a new associated item ID) orinstead as a new version of the same WS.

FIG. 5 is a flow diagram of an embodiment of a Get WS RegistrationInformation subroutine 425. The subroutine may, for example, be providedby an embodiment of the WSM and/or of the software facility. Thesubroutine obtains information from a user related to a WS to beregistered, whether for a composite WS or a non-composite WS, andreturns that information. When a composite WS is to be registered, thesubroutine further performs additional operations, such as todynamically generate WSDL or other interface definition information forthe composite WS, and optionally to generate one or more new networkendpoints for use with the composite WS.

The subroutine begins at step 505, where an indication is received froma user to register a WS. It is then determined in step 510 whether theregistration is for a composite WS, and if not the subroutine continuesto step 515 to obtain invocation details for the WS being registered(e.g., as part of a WSDL interface description for the WS), such as frominformation received in step 505 or instead interactively from the user,and stores the invocation details for later use (e.g., use by the WSMsystem in invoking the WS and/or to be provided to WS consumers for useby them in requesting invocations of the WS). In step 520, various otherinformation corresponding to the WS being registered is also obtained(whether interactively from the user or from information received instep 505), such as a name, one or more use prices, a description for useby potential consumers, other non-price use conditions, etc.

If it was instead determined in step 510 that the WS to be registered isa composite WS, the subroutine proceeds in the illustrated embodiment tointeractively gather composite service provision information from theuser for the composite WS, although in other embodiments suchinformation may be gathered in other ways (e.g., by being received instep 505). In particular, the subroutine continues to step 525 to obtainindications from the user of one or more registered WSes for use asconstituent WSes with the composite WS (e.g., selections by the user inresponse to information presented or otherwise provided to the userregarding possible constituent WSes, not shown, and/or indications bythe user of non-registered WSes, such as other WSes available from theuser or affiliated entities). In step 530, the subroutine then retrievesWSDL interface definitions for the indicated WSes, although in otherembodiments other types of interface definitions may instead be used. Instep 535, the subroutine then receives indications from the user of oneor more operations of the indicated WSes to be used in providingcapabilities of the composite WS being created (e.g., selections by theuser in response to information provided to the user regarding theindicated WSes' operations from the retrieved WSDL interfacedefinitions, not shown).

The subroutine then continues to step 540 to obtain one or moreindications of how to use the indicated WS operations to provide one ormore capabilities of the composite WS. Such information may be specifiedin various ways in various embodiments, such as by obtaining executableinstructions from the user that use that indicated WS operations (e.g.,based on a scripting logic, an executable applet or other piece of code,etc.) and/or by receiving selections from the user of inter-operationrelationship options provided to the user by the subroutine (not shown).As one example, the received information may specify one or moreoperations of the composite WS that are to be provided by using one ormore of the indicated operations in a specified manner. Moreover, whilenot illustrated here, in some embodiments the subroutine may furtherperform automated processing to facilitate identification of possibleinter-operation relationships (e.g., by automatically identifying outputparameters of operations that are available to be used as inputparameters of other operations) or other options for using the indicatedWS operations in various ways, and may provide that automaticallyidentified information to the user (e.g., as defaults or assuggestions).

The subroutine in the illustrated embodiment then continues to step 545to generate one or more network endpoints for use with the composite WS,although in other embodiments one or more network endpoints for thecomposite WS may be determined in other manners (e.g., by using apreviously defined network endpoint in a shared manner by multiple WSes,or by obtaining indications of one or more network endpoints from theuser, such as network endpoints provided by the user). In step 550, thesubroutine then dynamically generates a new WSDL interface definitionfor the composite WS, such as based on the retrieved WSDL interfacedefinitions corresponding to the indicated operations of the indicatedWSes and based on any received information related to operations orother interface information for the composite WS. The subroutine thenstores composite service provision information in step 555 for later usein providing the composite WS when invoked.

After step 555, the subroutine continues to step 520 to obtain thevarious other information corresponding to the WS being registered.While not illustrated here, in some embodiments the subroutine mayfurther provide various automated processing to facilitateidentification of at least some such other information in various ways(e.g., by generating a suggested use price for the composite WS bycombining use price information for identified WSes and WS operations tobe used, and/or by similarly combining various other types ofinformation for the constituent WSes to generate corresponding aggregateinformation for the composite WS), and may provide that automaticallyidentified information to the user (e.g., as defaults or assuggestions).

After step 520, the subroutine continues to step 595 to return thevarious information obtained in step 520, as well as optionally toreturn various other information for the WS being registered (e.g.,invocation details for the WS). While not illustrated here, a variety ofother types of additional functionality may further be provided in otherembodiments, such as to allow the user to interactively debug a newcomposite WS that has been created, to automatically validateinformation provided by the user for the new composite WS (e.g., toverify that inter-operation relationships are proper and/or that theindicated composite WS does not actually or potentially violate any useconditions specified for the constituent WSes and/or the WSM), etc.

As with the WS registration routine, the illustrated subroutine can beprovided in various ways in various embodiments, including as part of aninteractive Web site with which a user interacts and/or as part of aprogrammatically accessed API. In addition, while not illustrated here,in some embodiments various security information and/or mechanisms maybe used, such as to ensure that only authorized users are allowed toperform some or all of the indicated types of activities.

FIG. 6 is a flow diagram of an embodiment of a WS Invocation routine600. The routine may, for example, be provided by an embodiment of theWSM and/or of the software facility. The routine receives accessrequests for WSes from consumers, and responds by providing access tothe WSes via invocations of the WSes on behalf of the consumers whenappropriate. In some embodiments, the invocation requests are receivedvia one or more network endpoints or other access mechanisms that eachcorrespond to multiple WSes, while in other embodiments multiple networkendpoints may each be associated with a single WS and invocationrequests received via those endpoints may each be provided to one ormore instances of the routine (e.g., one instance for each networkendpoint).

The illustrated routine begins at step 605 where a WS access request isreceived, such as based on a previously created subscription for acomposite WS or for a non-composite WS. The routine continues to step610 to determine whether the access request is a subscription-basedrequest (e.g., based on whether a subscription ID is received as part ofthe request) or instead if an indication is received that the accessrequest is for immediate invocation without a subscription.

If it is determined in step 610 that the WS invocation request is asubscription-based request, the routine continues to step 615 toretrieve subscription-related information from the received request,such as an indication of the subscription ID for the subscription and ofthe identity of the WS consumer. In step 620, the routine then retrievesstored information for the subscription, and in step 625 determineswhether to approve the request, such as based on whether thesubscription is valid, whether any current subscription-based throttlingconditions and/or WS-based throttling conditions are satisfied, whetherthe requesting user is authorized to use the subscription in therequested manner (e.g., is an authorized affiliate for thesubscription), etc. If it is determined in step 630 that the request isnot approved, the routine continues to step 635 to send an errorresponse message to the requester and to store information about theerror. Otherwise, or if it is instead determined in step 610 that thereceived request was not a subscription-based request, the routinecontinues to step 640 to determine whether any payment is needed for therequest, and if so to attempt to obtain the payment (e.g., for purchasedsubscriptions in which an additional per-access charge applies, or forsubscriptions that a WS consumer has established such that affiliates orend users using the subscription provide their own payment for theiruse). As discussed elsewhere, payment can be obtained in various ways invarious embodiments, including by dynamically purchasing a subscriptionor other access (e.g., as a credit card transaction), via use ofpreviously acquired WSM points, etc. If it is determined in step 645that needed payment is not obtained, the routine continues to step 635.

If it is instead determined in step 645 that any needed payment isobtained, the routine continues instead to step 650 to retrieve storedinformation for the WS that includes information about how to invoke theWS, such as a WSDL or other interface definition. The routine thencontinues to step 655 to execute a subroutine to provide the WS in anappropriate manner as discussed in greater detail with respect to FIG.7, such as to use retrieved WS invocation information for anon-composite WS from a WS provider to invoke the WS from the WSprovider as necessary to obtain response information. In addition, insome embodiments step 655 may be performed regardless of the validationactions in step 625 as to whether to approve the request and in step 645whether any needed payment was obtained, such as to perform step 655 inparallel with such validation steps and to handle any failure of thosesteps by not providing to the requester any response information and/orother benefits resulting from the WS invocation. After step 655, theroutine continues to step 660 to store a record of the WS accesstransaction.

In step 665, the routine then determines if any notification conditionshave been triggered by the request and/or response, as well as whetherany other subscription updates are needed (e.g., to update asubscription after the last authorized use has been made so that anynext attempt to use a subscription would fail), and if so the routineproceeds accordingly to provide such notifications and/or perform suchsubscription updates. After step 665, the routine continues to step 670to determine whether response information was successfully received fromthe providing of the WS service in step 655, and if not continues to 675to credit any payment obtained in step 640 before continuing to step 635(in other embodiments, payment may not be obtained until aftersuccessful invocation to prevent such payment credits, or insteadpayment may be retained even if the invocation fails). If it isdetermined in step 670 that response information was successfullyreceived, the routine continues to step 680 to format the responseinformation as appropriate for the requester (e.g., based on previouslyspecified preferences), and then sends the formatted responseinformation to the requester. After steps 635 or 680, the routinecontinues to step 695 to determine whether to continue. If so, theroutine returns to step 605, and if not the routine continues to step699 and ends.

As with the registration and subscription routines, the WS Invocationroutine can be performed in various ways in various embodiments, such aspart of an interactive Web site in response to an explicit user requestor instead as part of a programmatically accessed API. In addition, insome embodiments various security information and/or mechanisms may beemployed, such as to ensure that only authorized WS consumers are ableto invoke WSes and that any WS to be invoked is from an authorized WSprovider. In addition, in some embodiments the information provided to aWS consumer about how to request a WS invocation and any invocationresponse information returned to the WS consumer is formatted in such away as to obfuscate or mask various types of information, such as thedetails about how to perform the actual invocation request to the WSprovider and/or identity or other information about the WS provider—inthis way, the WSM system is able to ensure that any invocation requestto WS providers come from the WSM system and are thus authorized.Alternatively, in other embodiments, the WSM system may not serve as anintermediary for the invocation of some or all WSes, such as byproviding to WS consumers the details about how to directly interactwith a WS provider to invoke a subscribed-to or otherwiseaccess-approved WS. For example, in some embodiments, when a WS consumerhas purchased or otherwise acquired access to a WS, the WSM system couldprovide access authorization information to the consumer to allow theconsumer to obtain access to the WS directly from the provider of theWS, such as details about how to access the WS and/or a token or otherindication that the WS provider can identify (and optionally verify) ashaving being supplied by the WSM system when the provider receives theinformation from the WS consumer (e.g., a digital signature; informationindicating vending payment to the WSM, such as transferable WSM pointsthat can be used by the WS provider to receive compensation from the WSMsystem; etc.).

FIG. 7 is a flow diagram of an embodiment of a Provide WS subroutine655. The subroutine may, for example, be provided by an embodiment ofthe WSM and/or of the software facility, such as to act as anintermediary when invoking one or more WSes from one or more WSproviders on behalf of a WS consumer. In particular, the subroutineprovides an indicated WS to a WS consumer, whether for a composite WS ora non-composite WS, by obtaining and returning response information forthe WS. When a non-composite WS is to be provided, the subroutineinvokes that WS from the provider of that WS in an appropriate manner.When a composite WS is to be provided, the subroutine further performsadditional operations, such as to coordinate the invocation of one ormore constituent WSes in a manner specified in composite serviceprovision information for the composite WS. While not illustrated here,in some embodiments information from prior WS invocations may be storedin a cache or other storage mechanism, and such cached/storedinformation may be considered for use rather than invoking anon-composite WS and/or a constituent WS from a corresponding WSprovider.

The subroutine begins at step 705, where one or more indications arereceived of a request to invoke or otherwise provide a specified WS andof stored information for the specified WS, although in otherembodiments the subroutine could instead retrieve stored information fora specified WS as needed. The subroutine then continues to step 710 todetermine whether the specified WS is a composite WS, and if notcontinues to step 715 to invoke the specified WS from its WS providerusing WS invocation information received in step 705, and then obtainsresponse information from the invocation. The subroutine then continuesto step 799 and returns the response information.

If it is instead determined in step 710 that the specified WS is acomposite WS, the subroutine continues instead to step 720 to evaluatecomposite service provision information received in step 705 for thecomposite WS in order to determine an initial group of one or moreoperations of constituent WSes that are to be executed and to determineinput (if any) for use in executing those operations (e.g., based oninformation received in step 705 from the WS consumer who requested theinvocation of the composite WS). The determining of the constituent WSoperations and/or input may further in some situations involve executingconditional logic and/or manipulating received input data in variousways. Moreover, in some embodiments other types of capabilities may beexecuted or otherwise accessed (e.g., various types of capabilitiesprovided by the WSM), including by identifying other types of accessibleservices to be invoked.

The subroutine then continues to step 725 to execute the determinedgroup of constituent WS operations in parallel using the determinedinput by invoking the constituent WSes from their providers, and obtainsresponse information from the operations—in other embodiments, theexecution of the determined constituent WS operations may instead beperformed in other manners, such as in a serial but asynchronous mannersuch that execution of a second operation may be initiated beforecompletion of execution of a first operation. In step 730, thesubroutine then optionally manipulates the received response informationin a manner (if any) specified in the composite service provisioninformation, such as to assist in providing input for a next group ofone or more constituent WS operations to be executed. In step 735, themanipulated response information and the composite service provisioninformation is then evaluated to determine the next group of one or moreconstituent WS operations to be executed and to determine input (if any)for use in executing those operations. If it is determined in step 740that any next constituent WS operations are determined, the subroutinereturns to step 725 to continue the execution of those operations.

Otherwise, the subroutine continues to step 745 to generate responseinformation for the composite WS by processing response informationreceived for some or all of the executed constituent WS operations in amanner specified in the composite service provision information, such toas aggregate response information from the invocation of multipleconstituent WSes in various ways and/or to select response informationfrom one or more such constituent WSes. The subroutine then continues tostep 799 to return the generated response information.

As discussed above, composite services may be dynamically created andused in various ways. In addition, in some embodiments a variety ofadditional types of functionality may be provided. For example, asdiscussed above, in some embodiments the WSM provides a variety of typesof functionality related to registered WSes, such as to allow potentialconsumers to obtain (e.g., based on a search) and review detailedinformation about such WSes, to allow users to provide reviews for suchWSes, to generate recommendations for such WSes and/or to include suchWSes as recommendations, etc. In at least some such embodiments, eachcomposite WS is treated in the same manner as other non-composite WSes,such as to allow the various types of functionality to similarly beprovided for composite WSes.

In addition, as noted above, in some embodiments the WSM and/or softwarefacility may act as an intermediary when invoking one or more WSes fromone or more WS providers on behalf of a WS consumer, such as one or moreconstituent WSes of a composite WS, although in other embodiments acomposite WS may be invoked in other manners (e.g., by providingcomposite service provision information for a composite WS to a WSconsumer for execution or other evaluation by the consumer, or insteadvia a third-party that provides the composite WS execution, such as a WSprovider for a fee). In some embodiments, various of the constituentWSes of a composite WS may differ in various ways, such as by usingdifferent types of communication protocols (e.g., HTTP-based versusSOAP-based) and/or by using different types of interaction orcommunication models, such as request-response versus publish-subscribe(“pub-sub”), object-based versus procedure-based, synchronous versusasynchronous, etc. In at least some such embodiments, the WSM and/orsoftware facility intermediary may further operate to accommodate suchdifferences by using different communication and interaction techniqueswith different constituent WSes, such as by using differentcommunication protocols, and by caching response information from oneconstituent WS until another constituent WS is ready for theinformation.

In addition, in some embodiments the WSM and/or software facilityprovides various functionality to support different versions of WSes,whether for non-composite WSes and/or for composite WSes. For example, aWS provider who has registered a WS that they provide may decide tomodify the WS, such as to modify the invocation details (e.g., theinterface definition) and/or to modify associated information for the WS(e.g., a use price or use conditions)—if so, the modified WS may in somesituations replace the prior WS (e.g., if the WS provider no longersupports the invocation details of the original version of the WS),while in other embodiments both versions may be provided for at least aspecified period of time. In situations where a WS has been modified (orremoved or otherwise suspended from use), WS consumers who use that WS(e.g., WS consumers with subscriptions to that WS) may be notified ofthe modification in various ways, such as to provide the opportunity toalter their use of the WS if appropriate—this can be particularlyimportant in situations in which the original WS is no longer beingoffered (e.g., if the prior invocation details used by the WS consumerwill no longer work, or if the prior types of use by the WS consumerwould no longer be allowed under new use conditions).

In a similar manner, in some embodiments composite WSes may be modifiedby the creator of the composite WS (or other users provided suchmodification access rights), with the modified version of the compositeWS replacing or supplementing the prior version of the composite WS.Moreover, composite WSes may in some embodiments be modified in othercircumstances, such as when a constituent WS of the composite WS hasbeen modified. In some embodiments, a creator of such a composite WS maybe automatically notified of the modification of the constituent WS,such as to allow the creator to modify the composite WS accordingly ifappropriate. Alternatively, in some embodiments at least some suchconstituent WS modifications may automatically be incorporated in thecomposite WS, such as to automatically change how the composite WSinvokes the constituent WS to reflect modified invocation details, toautomatically update a use price for the composite WS based on changesto a use price of the constituent WS, etc. In addition, in situations inwhich a constituent WS has been modified (e.g., when a use price hasincreased or use conditions have become more restrictive) and/orremoved, the software facility may further attempt to automaticallyidentify potential alternative or replacement constituent WSes (e.g.,based on similarities in types of capabilities provided, such as bybelonging to a shared category), such as to notify the composite WScreator and/or to automatically suggest or make changes to the compositeWS to use an alternative or replacement WS. Moreover, in situations inwhich only internal aspects of a composite WS have changed (e.g., forchanges made without changing the input or output data for the compositeWS or changing associated information such as use price or useconditions, such as changes involving scripting logic used as part ofthe composite service provision information, or such as replacing one ormore constituent WSes with one or more other constituent WSes thatprovide equivalent aggregate functionality), however, the modifiedcomposite WS may not in some embodiments be treated as a new version,such as if the changes have no affect on WS consumers that use thecomposite WS.

Those skilled in the art will also appreciate that in some embodimentsthe functionality provided by the routines discussed above may beprovided in alternative ways, such as being split among more routines orconsolidated into less routines. Similarly, in some embodimentsillustrated routines may provide more or less functionality than isdescribed, such as when other illustrated routines instead lack orinclude such functionality respectively, or when the amount offunctionality that is provided is altered. In addition, while variousoperations may be illustrated as being performed in a particular manner(e.g., in serial or in parallel, or synchronous or asynchronous) and/orin a particular order, those skilled in the art will appreciate that inother embodiments the operations may be performed in other orders and inother manners. Those skilled in the art will also appreciate that thedata structures discussed above may be structured in different manners,such as by having a single data structure split into multiple datastructures or by having multiple data structures consolidated into asingle data structure. Similarly, in some embodiments illustrated datastructures may store more or less information than is described, such aswhen other illustrated data structures instead lack or include suchinformation respectively, or when the amount or types of informationthat is stored is altered.

From the foregoing it will be appreciated that, although specificembodiments have been described herein for purposes of illustration,various modifications may be made without deviating from the spirit andscope of the invention. Accordingly, the invention is not limited exceptas by the appended claims and the elements recited therein. In addition,while certain aspects of the invention are presented below in certainclaim forms, the inventors contemplate the various aspects of theinvention in any available claim form. For example, while only someaspects of the invention may currently be recited as being embodied in acomputer-readable medium, other aspects may likewise be so embodied.

1. A computer-implemented method for automatically providing a compositeservice that is based on multiple other constituent services, the methodcomprising: receiving an indication of a request for providing acomposite service that is based on multiple other constituent services,the request being received by one of one or more configured computingsystems using a specified one of multiple distinct alternativeinterfaces that are provided by the one or more configured computingsystems for use in accessing the composite service, wherein the multipleinterfaces are based at least in part on use of multiple distinctcommunication protocols; obtaining information for use in the providingof the composite service, the obtained information including one or moreuse restrictions for the composite service, at least one of the userestrictions being based at least in part on one or more restrictions onuse of at least one of the constituent services; and if it is determinedthat the use restrictions are satisfied, automatically performing theproviding of the composite service by requesting providing of theconstituent services to access capabilities of those constituentservices for the composite service, the automatic performing of theproviding of the composite service being performed by the one or moreconfigured computing systems and being based on the obtainedinformation, the providing of the constituent services being performedin an order based on relationships indicated from the obtainedinformation and being performed using input information from the requestfor providing of the composite service; and providing a response to therequest for the providing of the composite service that is based atleast in part on the providing of the constituent services.
 2. Themethod of claim 1 further comprising obtaining one or more indicationsof a specification for accessing the capabilities of the constituentservices, and wherein the requesting of the providing of the constituentservices is performed based at least in part on the indicatedspecification.
 3. The method of claim 1 wherein the multiple interfacesare each associated with a distinct one of multiple network endpointsthat are provided by the one or more configured computing systems foruse with the composite service, wherein the indicated request for theproviding of the composite service includes an invocation of the networkendpoint associated with the specified one interface, the invocationbeing by a remote executing program on behalf of a user of the program,and wherein the method further comprises determining whether the userestrictions for the composite service are satisfied based at least inpart on information related to at least one of the user and of theremote executing program.
 4. The method of claim 3 wherein the one ormore configured computing systems are part of an entity that providesthe composite service to others, and wherein the user is associated withthe entity.
 5. The method of claim 1 wherein the multiple interfaces arefurther based in part on use of multiple distinct input data formats. 6.The method of claim 1 wherein the multiple distinct interfaces are basedon use of SOAP (“Simple Object Access Protocol”) messages, on use ofnetwork-addressable resources as part of a REST (“REpresentational StateTransfer”) interaction model, and on use of XML (“eXtensible MarkupLanguage”) documents sent over HTTP (“HyperText Transport Protocol”),and wherein the specified one interface for the received request usesone of a SOAP message, a network-addressable resource that is part ofthe REST interaction model, and an XML document sent over HTTP.
 7. Acomputing system configured to automatically provide a composite servicethat is based on multiple other constituent services, comprising: one ormore processors; a first component that is configured to, when executedby at least one of the one or more processors, and for each of multipleusers, receive a request on behalf of the user for providing a compositeservice that is based on multiple other constituent services, therequest being received by the configured computing system using aspecified one of multiple distinct alternative interfaces that areprovided by the configured computing system for use in accessing thecomposite service, wherein the multiple interfaces are based at least inpart on use of multiple distinct input data formats; and a secondcomponent that is configured to, when executed by at least one of theone or more processors, and for each of the received requests: obtaininformation for use in the providing of the composite service for thereceived request, the obtained information including one or more userestrictions for the composite service, at least one of the userestrictions being based at least in part on one or more restrictions onuse of at least one of the constituent services; and if it is determinedthat the use restrictions for the composite service are satisfied forthe received request, automatically perform the providing of thecomposite service for the received request by initiating providing ofthe constituent services to access capabilities of those constituentservices for the composite service, the automatic performing of theproviding of the composite service being based on the obtainedinformation for use in the providing of the composite service for thereceived request, the providing of the constituent services beingperformed in an order based on relationships indicated from thatobtained information and being performed using input information fromthe received request; and provide a response to the received requestthat is based at least in part on the providing of the constituentservices.
 8. The computing system of claim 7 wherein, for one of thereceived requests, the obtaining of the information for use in theproviding of the composite service for the one received request includesobtaining one or more indications of a specification for accessing thecapabilities of the constituent services, and the initiating of theproviding of the constituent services is performed based at least inpart on the indicated specification.
 9. The computing system of claim 7wherein the multiple interfaces are each associated with a distinct oneof multiple network endpoints that are provided by the configuredcomputing system for use with the composite service, wherein, for one ofthe received requests, the one request includes an invocation of thenetwork endpoint associated with the specified one interface for the onerequest, the invocation being by a remote executing program for the useron whose behalf the one received request is made, and the secondcomponent is further configured to determine whether the userestrictions for the composite service are satisfied for the onereceived request based at least in part on information related to atleast one of the user and of the remote executing program.
 10. Thecomputing system of claim 9 wherein the computing system is part of anentity that provides the composite service to others, and wherein theuser on whose behalf the one received request is made is associated withthe entity.
 11. The computing system of claim 7 wherein the firstcomponent and the second component each include software instructionsfor execution by the one or more processors.
 12. The computing system ofclaim 7 wherein the multiple interfaces are further based in part on useof multiple distinct communication protocols.
 13. The computing systemof claim 7 wherein the multiple distinct interfaces are based on use ofSOAP (“Simple Object Access Protocol”) messages, on use ofnetwork-addressable resources as part of a REST (“REpresentational StateTransfer”) interaction model, and on use of XML (“eXtensible MarkupLanguage”) documents sent over HTTP (“HyperText Transport Protocol”),and wherein the specified one interface for the received request usesone of a SOAP message, a network-addressable resource that is part ofthe REST interaction model, and an XML document sent over HTTP.
 14. Anon-transitory computer-readable storage medium whose contents includeinstructions that when executed configure a computing system toautomatically provide a composite service that is based on multipleother constituent services, by performing a method comprising: receivingan indication of a request for a composite service that is based on oneor more other constituent services, the request being received by theconfigured computing system based on invocation of a specified one ofmultiple distinct alternative interfaces that are generated by andprovided by the configured computing system for use in invoking thecomposite service, wherein the multiple interfaces are based on at leastone of use of multiple distinct communication protocols and of use ofmultiple distinct input data formats; obtaining information for use inproviding the composite service, the obtained information including oneor more use restrictions for use of the composite service, at least oneof the use restrictions being based at least in part on one or morerestrictions on use of at least one of the constituent services; and ifthe one or more use restrictions for use of the composite service aresatisfied, automatically requesting providing of the constituentservices to access capabilities of those constituent services for thecomposite service, the requesting being performed by the configuredcomputing system and being based on the obtained information, theproviding of the constituent services being performed in an order basedon relationships indicated from the obtained information and beingperformed using input information from the request for the compositeservice in a manner indicated in the obtained information; and providinga response to the request for the composite service that is based atleast in part on the providing of the constituent services.
 15. Thecomputer-readable storage medium of claim 14 wherein the method furtherincludes obtaining one or more indications of a specification foraccessing the capabilities of the one or more constituent services, andwherein the automatic requesting of the providing of the constituentservices is performed based at least in part on the indicatedspecification.
 16. The computer-readable storage medium of claim 14wherein the multiple interfaces are each associated with a distinct oneof multiple network endpoints that are provided by the configuredcomputing system for use with the composite service, wherein theindicated request for the composite service includes an invocation ofthe network endpoint associated with the specified one interface, theinvocation being by a remote executing program on behalf of a user ofthe program, and wherein the method further includes determining whetherthe use restrictions are satisfied based at least in part on informationrelated to at least one of the user and of the remote executing program.17. The computer-readable storage medium of claim 14 wherein thecomputer-readable medium is a memory of the computing system.
 18. Thecomputer-readable storage medium of claim 14 wherein the one or more userestrictions for use of the composite service include at least one ofthat payment is made available for a use price associated with thecomposite service and that a user associated with the request for thecomposite service has access rights for the providing of the compositeservice.
 19. The computer-readable storage medium of claim 14 whereinthe one or more other constituent services include multiple constituentservices, and wherein the obtaining of the information for use inproviding the composite service includes dynamically determining theorder for performing the multiple constituent services.
 20. Thecomputer-readable storage medium of claim 14 wherein the one or moreother constituent services include multiple constituent services, andwherein the obtaining of the information for use in providing thecomposite service includes determining the relationships on which theorder is based to reflect dependencies between the multiple constituentservices.
 21. The computer-readable storage medium of claim 14 whereinthe one or more other constituent services include multiple constituentservices, and wherein the providing of the multiple constituent servicesincludes obtaining output information from invoking one of theconstituent services using a first protocol and automatically supplyingat least some of the output information as input information duringinvoking of another of the constituent services using a distinct secondprotocol.
 22. The computer-readable storage medium of claim 14 whereinthe one or more other constituent services include multiple constituentservices, and wherein the providing of the multiple constituent servicesincludes obtaining output information from invoking one of theconstituent services and automatically modifying at least some of theoutput information before supplying the modified information as inputinformation during invoking of another of the constituent services. 23.The computer-readable storage medium of claim 14 wherein the obtainedinformation further specifies a manner of generating responseinformation for the composite service, and wherein the provided responseto the request include the response information that is generated forthe composite service in that specified manner based at least in part onthat output information from the providing of the constituent services.24. The computer-readable storage medium of claim 14 wherein thereceived request for the composite service is an invocation of thecomposite service that includes an input value for each of one or moreinput parameters of the composite service, and wherein the providing ofthe constituent services includes invoking at least one of theconstituent services and supplying at least one of the input values to adistinct input parameter of the at least one constituent service. 25.The computer-readable storage medium of claim 14 wherein the configuredcomputing system is part of an organization that provides the one ormore constituent services for use by others, and wherein the requestingof the providing of the constituent services includes performing theconstituent services as part of the providing of the composite service.26. The computer-readable storage medium of claim 14 wherein the one ormore constituent services are provided by one or more entities for useby others, wherein the configured computing system is part of anorganization distinct from the one or more entities that facilitatesaccess to the one or more constituent services, and wherein therequesting of the providing of the constituent services includes sendingone or more requests to perform the constituent services as part of theproviding of the composite service to one or more other computingsystems associated with the one or more entities.
 27. Thecomputer-readable storage medium of claim 14 wherein the multipleinterfaces are based in at least in part on use of multiple distinctcommunication protocols, and wherein the method further comprisesreceiving indications of multiple invocations of the composite serviceon behalf of multiple users that are performed using the multipleinterfaces, each of the multiple users controlling which of the multipleinterfaces is used for the invocation on behalf of that user.
 28. Thecomputer-readable storage medium of claim 14 wherein the multipleinterfaces are based in at least in part on use of multiple distinctinput data formats, and wherein the method further comprises receivingindications of multiple invocations of the composite service on behalfof multiple users that are performed using the multiple interfaces, eachof the multiple users controlling which of the multiple interfaces isused for the invocation on behalf of that user.
 29. Thecomputer-readable storage medium of claim 14 wherein the request for thecomposite service is received from a user, and wherein the providing ofthe composite service includes providing a subscription to the user foreach of one or more of the constituent services.
 30. Thecomputer-readable storage medium of claim 14 wherein the request for thecomposite service is received from a remote executing program, andwherein the method further comprises automatically determining whetherthe one or more use restrictions for use of the composite service aresatisfied by the request for the composite service based at least inpart on information about the remote executing program.
 31. Thecomputer-readable storage medium of claim 14 wherein the request for thecomposite service invocation is made on behalf of a user, and whereinthe method further comprises automatically determining whether the oneor more use restrictions for the composite service are satisfied by therequest for the composite service based at least in part on informationabout the user.
 32. The computer-readable storage medium of claim 14wherein the multiple distinct interfaces are based on use of SOAP(“Simple Object Access Protocol”) messages, on use ofnetwork-addressable resources as part of a REST (“REpresentational StateTransfer”) interaction model, and on use of XML (“eXtensible MarkupLanguage”) documents sent over HTTP (“HyperText Transport Protocol”),and wherein the specified one interface for the received request usesone of a SOAP message, a network-addressable resource that is part ofthe REST interaction model, and an XML document sent over HTTP.