Object Oriented Message Patents (Class 719/315)
-
Patent number: 7478389Abstract: A small footprint device, such as a smart card, can securely run multiple programs from unrelated vendors by the inclusion of a context barrier isolating the execution of the programs. The context barrier performs security checks to see that principal and object are within the same namespace or memory space and to see that a requested action is appropriate for an object to be operated upon.Type: GrantFiled: November 22, 2004Date of Patent: January 13, 2009Assignee: Sun Microsystems, Inc.Inventors: Joshua Susser, Mitchel B. Butler, Andy Streich
-
Publication number: 20090013331Abstract: The invention provides a method of transmitting tokens over a link between processors, the link comprising a one-line and a zero-line wherein a logical transition on the one-line indicates a logic-one and a logical transition on the zero-line indicates a logic zero. The method comprises: transmitting a first portion of a token; and transmitting a second portion of the token to ensure the total number of logic-one bits in the token is even and the total number of logic-zero bits in the token is zero, such that the link returns to a quiescent state at the end of the token.Type: ApplicationFiled: July 6, 2007Publication date: January 8, 2009Inventor: Michael David May
-
Publication number: 20090013332Abstract: A unique display device called a “Legacy Board”. The device is used in remembering and memorializing the lives of loved ones. The device is related to apparatus and methods to hold a collection of family pictures, documents, artwork and other memorabilia and is used to showcase occasions such as births, baptisms, birthdays, graduations, engagements, reunions, weddings, anniversaries, death and memorials. The device is comprised of a base foam backboard; a predetermined placement template on the backboard with which to place the family collection onto the board; a means to removably attach the collection objects to the board; and a group of pre-cut openings, that correspond and match the placement template in order to reveal the items of the collection, through one or more sheets of flexible, thin and transparent or translucent material which feature stylish artwork images with/without text. The device may be framed or unframed.Type: ApplicationFiled: June 2, 2008Publication date: January 8, 2009Inventors: Deborah Ross, Mark Ross
-
Publication number: 20090007141Abstract: A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node.Type: ApplicationFiled: June 26, 2007Publication date: January 1, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Blocksome, Dong Chen, Mark E. Giampapa, Philip Heidelberger, Sameer Kumar, Jeffrey J. Parker
-
Patent number: 7472401Abstract: A dynamic generated wrapper object to intercept transmissions between a vendor object and an application program and performs server side tasks. To dynamically generate the wrapper at runtime in memory, the application server receives a vendor class, performs reflection on the vendor class, generates a wrapper class, and creates an instance of the wrapper class. In operation, the dynamically generated wrapper object receives a call placed to a method of the wrapped object, initiates pre-processing tasks to be performed, calls the method on the wrapped object, receives a result from the method invocation against the wrapped object, initiates post-processing tasks to be performed, and transmits the wrapped result back to the application program. The pre-processing tasks may include execution of a pre-invocation handler. The post-processing tasks may include execution of a post-invocation handler.Type: GrantFiled: November 12, 2003Date of Patent: December 30, 2008Assignee: BEA Systems, Inc.Inventors: Fei Luo, Alexander Somogyi, William John Gallagher, Rahul Srivastava
-
Patent number: 7472399Abstract: A method and system for a client invoking on an interface defined in a first notation to invoke an object having an interface defined in a second notation is disclosed. In one aspect, the method comprises the steps of: automatically generating an intermediate object that receives a first message from a first object; the message representing at least one data structure; the at least one data structure comprising at least one dynamic data type; the intermediate object converting the representation of the at least one data structure and at least one data type into a representation of at least one statically defined data structure; the intermediate object sending a second message to a second object; the second message comprising the representation of the at least one statically defined data structure. In one preferred embodiment, the method and system facilitate communication between CORBA and Java EJB objects.Type: GrantFiled: April 25, 2002Date of Patent: December 30, 2008Assignee: IONA Technologies, PLCInventor: Alan Conway
-
Patent number: 7472400Abstract: Dynamically generating a wrapper object to intercept transmissions between a vendor object and an application program and performs server side tasks. To dynamically generate the wrapper at runtime in memory, the application server receives a vendor class, performs reflection on the vendor class, generates a wrapper class, and creates an instance of the wrapper class. In operation, the dynamically generated wrapper object receives a call placed to a method of the wrapped object, initiates pre-processing tasks to be performed, calls the method on the wrapped object, receives a result from the method invocation against the wrapped object, initiates post-processing tasks to be performed, and transmits the wrapped result back to the application program. The pre-processing tasks may include execution of a pre-invocation handler. The post-processing tasks may include execution of a post-invocation handler.Type: GrantFiled: November 12, 2003Date of Patent: December 30, 2008Assignee: BEA Systems, Inc.Inventors: Fei Luo, Alexander J. Somogyi, William John Gallagher, Rahul Srivastava
-
Publication number: 20080320493Abstract: Method and system for collecting and filtering messages received at an event source platform and delivering the filtered messages to a collection host platform. According to one embodiment, the system uses a mobile agent object to filter messages received at an event source platform. The mobile agent object determines a filtered set of messages that match predetermined parameters and then delivers the filtered messages to a collection host platform for storage or redirection.Type: ApplicationFiled: September 2, 2008Publication date: December 25, 2008Applicant: TOPIA TECHNOLOGYInventor: Michael R. Manzano
-
Publication number: 20080320556Abstract: A method for analyzing user's behaviors is provided. API function call patterns occurring when operations on various objects are performed on a computer system are configured with contexts. User's behaviors are recognized as associations between the contexts and systematically expressed. Information flow occurring in the user's behaviors (i.e., associations between the contexts) is tracked. The information flow chain is divided into a source and a destination. When the information flow a confidential object to a leakage point occurs, the information leakage is rapidly detected and blocked. By exactly recognizing behaviors belonging to the corresponding information flow chain, user's behaviors related to the information leakage can be detected. Furthermore, the behavior expression based on the contexts configured with the API function call patterns with respect to the system object can be achieved by naturally connecting the API function call occurring on the system as an abstract behavior.Type: ApplicationFiled: February 29, 2008Publication date: December 25, 2008Inventors: Cheolho LEE, Kiwook SOHN
-
Publication number: 20080313649Abstract: Techniques and systems for controlling resources used by a device's web services applications are disclosed. In one technique, web services applications release their allocated resources and enter a “sleep mode” after being inactive for a specified period of time. In one technique, a device maintains a shared pool of memory resources. The pool contains data structures that web services applications are likely to re-use. Before allocating a new instance of a needed data structure from free memory, a web services application first determines whether the shared pool already contains a currently unused but allocated instance of a data structure of the needed type, and, if the shared pool does, then the web service application uses that instance, overwriting existing data in the instance as needed. Web services applications return such data structures to the shared pool when those web services applications are finished using those data structures.Type: ApplicationFiled: June 12, 2007Publication date: December 18, 2008Inventor: Lifen Tian
-
Publication number: 20080313648Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.Type: ApplicationFiled: June 14, 2007Publication date: December 18, 2008Applicant: MICROSOFT CORPORATIONInventors: Jiahe Helen Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
-
Publication number: 20080307432Abstract: A computer implemented method, apparatus, and computer-usable program product for exchanging data using data transformation are provided. A first data binding component receives data from a function selector. A set of data bindings capable of invocation by the first data binding component is available. The function selector determines a content type associated with the data. The first data binding component receives the data and the content type from the function selector. The first data binding component invokes a data binding corresponding to the content type from the set of data bindings to transform the data into a data object. The data object has an object name. A target application is determined based on the object name, and the data object is then routed to a target application.Type: ApplicationFiled: June 5, 2007Publication date: December 11, 2008Inventors: Jason Nathaniel Lacombe, Adriana M. Loghin, Travis Eli Nelson, Venkat Arun Reddy, Suraksha Vidyarthi
-
Publication number: 20080307434Abstract: Provided are methods, computer programs and apparatus for communication in a distributed object-oriented data processing environment. Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations at the target data processing apparatus. This has the advantages of the request implicitly sending data as well as requesting data and allows the request to perform a test on data within an object. Objects within the request can be embedded within each other with different encryption and compression applied to the different objects. As well as achieving communication efficiencies, the ability to selectively encrypt components of a request can be used to provide greater security. For example a store may be able to interpret the request, but credit details may be separately encrypted such that only a bank can decrypt that subcomponent of the request.Type: ApplicationFiled: March 17, 2008Publication date: December 11, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Howard Shelton Lambert, James Ronald Lewis Orchard
-
Publication number: 20080307433Abstract: A method includes receiving identification of an object that includes a plurality of nodes. The object is modeled to provide for association of any of the plurality of nodes into a lock group such that nodes of the lock group are locked together. Identification of a first group of the nodes to form the lock group is received. The method includes storing the object with the first group of the nodes forming the lock group. A method includes receiving identification of an object that includes a plurality of nodes. The object is modeled to provide for association of any of the plurality of nodes into a load group such that nodes of the load group are loaded together. Identification of a first group of the nodes to form the load group is received. The method includes storing the object with the first group of the nodes forming the load group.Type: ApplicationFiled: June 8, 2007Publication date: December 11, 2008Applicant: SAP AGInventors: Daniel Zoch, Henrik Saterdag, Renzo Colle
-
Publication number: 20080301425Abstract: An information handling system includes a host including a central processing unit, a management controller enabled to communicate with the host, a network interface resource in communication with the host and operable to enable the information handling system to communicate via an external network, and a target system in communication with the host through the network interface resource. The management controller comprises an iSCSI initiator operable to generate a request to the target system for an initial OS image.Type: ApplicationFiled: June 1, 2007Publication date: December 4, 2008Applicant: DELL PRODUCTS L.P.Inventors: Balaji Mittapalli, RadhaKrishna Reddy Dasari
-
Publication number: 20080294340Abstract: In a method for generating a generic object exchange profile message, navigation data is inserted into the generic object exchange profile message.Type: ApplicationFiled: May 15, 2008Publication date: November 27, 2008Applicant: INFINEON TECHNOLOGIES AGInventors: Andreas SCHMIDT, Norbert SCHWAGMANN, Achim LUFT
-
Publication number: 20080295113Abstract: Systems and methods for optimizing memory management in a runtime environment are provided. The method comprises monitoring one or more objects loaded into primary memory of a computing system to determine if at least a first object can be removed from the primary memory; instantiating a proxy object to replace the first object in the primary memory; removing the first object from the primary memory; and monitoring calls to the proxy object to determine whether the first object is invoked by a process.Type: ApplicationFiled: May 21, 2007Publication date: November 27, 2008Inventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, Onn Menahem Shehory, Yaron Weinsberg
-
Patent number: 7458072Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes. An “execution context” is a set of data and/or sub-procedures that might be useful at some point during a logical execution flow (to manage and control the execution flow and provide additional services to the execution flow) of computer-executable instructions though the often complex, intertwined, and interconnected conglomeration of procedures of software product(s).Type: GrantFiled: October 6, 2004Date of Patent: November 25, 2008Assignee: Microsoft CorporationInventors: Arun Moorthy, Christopher W. Brumme, Jonathan C. Hawkins, Raja Krishnaswamy
-
Publication number: 20080288498Abstract: Systems and methods for managing data within a networked computer environment including application servers and a plurality of storage devices utilize a collection of service modules, each separately addressable from and in communication with the application servers and the storage devices and providing system-wide services to the application servers and the storage devices.Type: ApplicationFiled: May 14, 2008Publication date: November 20, 2008Inventors: Foster D. Hinshaw, John Chiu, Alan Potter, Timothy J. Bingham, Yongmin Chen, Craig S. Harris
-
Publication number: 20080282261Abstract: A method for managing application modalities using dialogue states can include the step of asserting a set of activation conditions associated with a dialogue state of an application. Each of the activation conditions can be linked to at least one programmatic action, wherein different programmatic actions can be executed by different modality components. The application conditions can be monitored. An application event can be detected resulting in an associated application condition being run. At least one programmatic action linked to the application condition can be responsively initiated.Type: ApplicationFiled: June 27, 2008Publication date: November 13, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Akram Bou-Ghannam, Gerald McCobb
-
Publication number: 20080282260Abstract: Dynamic dispatch for classes and interfaces is encapsulated in a class-less scripting language. A plurality of mechanisms are employed to facilitate dynamic polymorphism. One or more target language constructs such as dictionary objects, prototype objects and/or derived types are utilized to capture class and interface method implementations. These constructs are subsequently referenced at runtime to invoke appropriate code.Type: ApplicationFiled: May 7, 2007Publication date: November 13, 2008Applicant: MICROSOFT CORPORATIONInventors: Bruno S. Bozza, Henricus Johannes Maria Meijer, Steven Thomas Beck, Jeffrey Van Gogh, Wei Zhu
-
Publication number: 20080276251Abstract: A method and system for automatically generating page exception programming based on user-defined rules is disclosed. A page specific metadata in a PDL file can be evaluated against specific rules to automatically create page exception programming. An embedded PDL device control instructions can also be evaluated and converted into page exception programming thereby producing an integrating representation of all page exception programming for a print job. The PDL page extracted as an exception page can then be displayed on a graphical user interface which provides an operator to confirm pages for editing.Type: ApplicationFiled: May 3, 2007Publication date: November 6, 2008Inventors: Javier A. Morales, Michael E. Farrell
-
Patent number: 7448045Abstract: A program may be extended to another program in accordance with information stored in a meta data file. A parent program is associated with the meta data file, and a child program is associated with a child description file created to conform to the information provided in the meta data file. The child description file is stored in a well-known location where it may be accessed by the parent program to learn how communicate with the child program, including which arguments and parameters to use, advantageously providing parent programs with a consistent user interface when interfacing with various child programs as well as the flexibility to add or change child description files to describe new or changed child programs as the need arises.Type: GrantFiled: April 30, 2002Date of Patent: November 4, 2008Assignee: Extreme NetworksInventors: Zihong Lu, Tim Flagg, Larry Ackner
-
Publication number: 20080271051Abstract: The invention relates to a process for component-oriented application servers and thus to the field of distributed applications. This invention expands component-oriented application servers in such a way that the components of an application implemented on this type of application server can provide graphic surfaces. This expansion is an additional function because network communication capabilities can be used without limitations, precisely as in non-expanded components. This makes it possible to assemble distributed applications entirely out of uniform components, while the advantages of application servers remain entirely available.Type: ApplicationFiled: April 17, 2008Publication date: October 30, 2008Inventor: Alexander Auerbach
-
Patent number: 7444647Abstract: A stream class driver for use in a computer operating system functions together with a minidriver. The minidriver is associated with a particular design for an adapter, which is a hardware device that generates or receives streaming data. The stream class driver deals with common operating system tasks such as direct memory access, scatter/gather memory use and Plug n Play. The stream class driver is independent of the hardware design and can therefore function with any type of streaming device or external buses such as USB or IEEE 1394. the minidriver functionality is limited to only those functions required by the unique aspects of the hardware and for the minimum requirements of operation, thereby minimizing the complexity and burden of designing minidrivers for hardware devices.Type: GrantFiled: November 30, 2005Date of Patent: October 28, 2008Assignee: Microsoft CorporationInventor: William G. Parry
-
Patent number: 7444644Abstract: A mechanism for securely decompiling representations of objects into copies of the objects is described. A virtual machine may include extensions for decompiling data representation language representations of objects into objects. The decompiler API may accept a data stream, which includes a representation of the object, and output a copy of the object. In one embodiment, during the decompilation of the representation of objects on a client, each message may be checked to verify that the user has access rights to the object. Access right information for the object may be embedded in the message(s) containing the representation of the object. In one embodiment, when the user is done using the client, the user may log off or otherwise signal the user is finished with the client. The client may detect that the user is finished, and may then proceed to delete objects created by decompilation of representations.Type: GrantFiled: September 15, 2000Date of Patent: October 28, 2008Assignee: Sun Microsystems, Inc.Inventors: Gregory L. Slaughter, Thomas E. Saulpaugh, Bernard A. Traversat
-
Patent number: 7441246Abstract: The present invention relates it directed to configurable collection of computer related metric data. A computer system generates computer related metric data related to an application. The application accesses a manifest that indicates a portion of the generated computer related metric data (e.g., a subset) is to be packaged for delivery. The application sends schema-based package start data to cause the portion of generated computer related metric data to be packaged. A quality metric module receives the schema-based package start data and accesses the indicated portion of computer related metric data. The quality metric module packages the portion of computer related metric data according to a packaging schema. The application sends a package send command to cause the packaged portion of computer related metric data to be delivered. The quality metric module receives the package send command and sends the packaged portion of computer related metric data in response to the package send command.Type: GrantFiled: March 19, 2004Date of Patent: October 21, 2008Assignee: Microsoft CorporationInventors: Alan B. Auerbach, Shawn M. Murphy, Walter R Smith
-
Publication number: 20080256227Abstract: Method, apparatus and product for controlling an automated storage system for laboratory objects. The storage system includes a plurality of storage locations for receiving the laboratory objects. The method includes defining users having access to the storage system and storing the users in a database, defining partitions, with each partition comprising at least part of the storage locations, and storing the partitions in the database, and storing properties for each of the partitions in the database.Type: ApplicationFiled: April 11, 2008Publication date: October 16, 2008Applicant: LICONIC AGInventor: Cosmas G. MALIN
-
Publication number: 20080256554Abstract: A multi-model-view-controller (MMVC) design pattern for generating client-server applications, which overcomes the disadvantages of the MVC design pattern. In an application generated according to the MMVC design pattern initial data is provided by the server model via the controller to the client model. Subsequent data is requested from the server model by the controller and passed to the client model. The initial and subsequent data are fetched according to predetermined rules. The predetermined rules can be based on personal details of the user, such as identity or role, on the server or client computing platforms, on the application, or other factors.Type: ApplicationFiled: April 10, 2007Publication date: October 16, 2008Applicant: SAP PORTALS ISRAEL LTD.Inventor: Ohad YASSIN
-
Publication number: 20080256555Abstract: The forms hosting system allows a developer to design custom Outlook form regions containing standard and custom managed controls using popular development tools. The forms hosting system provides a runtime wrapper that appears to Outlook as a normal ActiveX control. When Outlook invokes the runtime wrapper control, the runtime wrapper control loads the managed controls defined by the developer. The runtime wrapper control translates messages received from Outlook into messages understood by the managed controls.Type: ApplicationFiled: April 10, 2007Publication date: October 16, 2008Applicant: Microsoft CorporationInventors: Dimitar Birov, Michael W. Morton, Daniel A. Molina, John Durant, Thomas E. Quinn, Michael Shneerson, David A. Whitechapel
-
Patent number: 7437733Abstract: Method and system for collecting and filtering messages received at an event source platform and delivering the filtered messages to a collection host platform. According to one embodiment, the system uses a mobile agent object to filter messages received at an event source platform. The mobile agent object determines a filtered set of messages that match predetermined parameters and then delivers the filtered messages to a collection host platform for storage or redirection.Type: GrantFiled: July 29, 2003Date of Patent: October 14, 2008Assignee: Topia Technology, Inc.Inventor: Michael R. Manzano
-
Patent number: 7437453Abstract: The invention discloses a method for remotely monitoring method of computer network. It is an improvement of the RMON (Remote Network Monitoring) alarm group. The method mainly includes: Setting an alarm-extended table in the RMON alarm group; Defining a combination object in MIB (Management Information Base) that is an expression with two or more than two independent objects; A network management center sends a Set-Request packet with the expression to managed devices to initiate a RMON monitoring process; The expression is calculated and its value is compared with a threshold; When calculated value of the expression exceeds the threshold, processing steps preset by the network management center are taken. The invention supports SNMP (Simple Network Management Protocol), optimizes network performance, and saves network bandwidth and CPU resource of the network management center.Type: GrantFiled: April 29, 2002Date of Patent: October 14, 2008Assignee: Huawei Technologies Co., Ltd.Inventors: Haizhou Xiang, Zhenfeng Lv, Hongfei Chen
-
Publication number: 20080250426Abstract: A method for interfacing an object identifier reader to at least one application is disclosed. The method may include receiving object identifier data from the object identifier reader. The object identifier data may include information and formatting characters. The method may then involve identifying the information in the object identifier data. At least one application may then be identified to receive the information. Finally, the information may be sent to the at least one application.Type: ApplicationFiled: June 17, 2008Publication date: October 9, 2008Applicant: The Code CorporationInventors: Paul J. Hepworth, George Powell, Weiyang Zhou
-
Publication number: 20080250425Abstract: A method for interfacing an object identifier reader to at least one application is disclosed. The method may include receiving object identifier data from the object identifier reader. The object identifier data may include information and formatting characters. The method may then involve identifying the information in the object identifier data. At least one application may then be identified to receive the information. Finally, the information may be sent to the at least one application.Type: ApplicationFiled: June 17, 2008Publication date: October 9, 2008Applicant: The Code CorporationInventors: Paul J. Hepworth, George Powell, Weiyang Zhou
-
Publication number: 20080250424Abstract: Described are systems and methods for implementing seamless window support for applications, such as applications based on Windows® Presentation Foundation (WPF). Seamless support for WPF applications can be implemented by remoting information associated with structural representation of the applications from a remote server to a remote client. The structural representation may be replicated at the client in accordance with the structural information. The replicated structural representation is utilized to render visual content associated with the application by local rendering mechanisms at the client.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: MS1 - Microsoft CorporationInventors: Ivan Brugiolo, Leonardo Blanco, Nadim Abdo, Dorin Oreste Ungureanu
-
Patent number: 7433917Abstract: Dynamic management proxies provide type-safe, intuitive, and flexible interfaces to management entities. In an embodiment, a strongly-typed user interface is defined for each management entity. The dynamic proxy receives user requests via this user interface. The dynamic proxies converts user requests into generic requests in compliance with the management entities generic interface. The generic requests are communicated to the management entity via the generic interface. Dynamic management proxies are created at runtime. This allows the management interface to be seamlessly extended.Type: GrantFiled: September 26, 2002Date of Patent: October 7, 2008Assignee: BEA Systems, Inc.Inventor: Benjamin Jean-Baptiste Renaud
-
Patent number: 7434234Abstract: A system using a touch-point specific stub in communication with a stub specific object provides efficient and effective communications between a server operation running the stub specific object and a touch-point running the touch-point specific stub. An On Demand Distribution Service (ODD) distributes the stub to a touch-point and selects and initializes the object such that communications between the stub and the object is established.Type: GrantFiled: May 1, 2002Date of Patent: October 7, 2008Assignee: OutlookSoft CorporationInventors: Christian Gheorghe, Qingwei Lou
-
Publication number: 20080244616Abstract: A system and method for message lifetime management. According to an embodiment of the invention, a front-end application process identifies during a user interface interaction cycle of the front-end application process at least one stateful message reported to the front-end application process by a back-end service process during a prior user interface interaction cycle of the front-end application process, the at least one stateful message having been stored in a message buffer by the front-end application process, queries the back-end service process to determine whether the at least one stateful message is currently valid, and removes the at least one stateful message from the message buffer if it is determined not to be currently valid.Type: ApplicationFiled: March 30, 2007Publication date: October 2, 2008Inventors: Frank Brunswig, Ioannis Grammatikakis, Dinu Pavithran, Guenter Pecht-Seibert, Michael Picht, Alexander Rauh, Holger Schmidt
-
Publication number: 20080244615Abstract: Systems, apparatus and methods related to multiple-party communications conducted between client computers in a computer network. For example, a method and apparatus for supporting multiple-party communications in a computer network including a first server, at least a first client computer in communication with the first server, and a second server are disclosed. The method involves receiving a first input message at the first server, the first input message representing user input received at the first client computer. The method further involves producing a first output message representing the user input provided by the first input message, and transmitting the first output message to the first client computer and to the second server.Type: ApplicationFiled: March 30, 2007Publication date: October 2, 2008Inventor: Alexander Kropivny
-
Patent number: 7428597Abstract: Systems and methods for routing messages between applications in a network are disclosed. Messages are routed from a sending application to one or more receiving applications according to one or more routing rules. Each routing rule is used for determining the one or more receiving applications, and is associated with at least one routing object. The routing object is configured to associate the routing rule to the message based on content of the message. The routing objects are stored in a repository of design-time descriptions of the applications. The routing rules are stored in a directory of runtime descriptions of applications in the runtime landscape, and are accessed by a runtime engine for executing the routing.Type: GrantFiled: March 27, 2003Date of Patent: September 23, 2008Assignee: SAP AGInventor: Frank Beunings
-
Patent number: 7428733Abstract: In accordance with one embodiment of the present invention applications are configured with custom modules. A deployment descriptor of an application includes a definition for a new container type and modules of the new container type. A deployment system reads the deployment descriptor and implements the modules of the new container type. The new containers are then available to assist in the deployment of the application.Type: GrantFiled: October 8, 2004Date of Patent: September 23, 2008Assignee: BEA Systems, Inc.Inventor: Rob Woollen
-
Publication number: 20080229330Abstract: An improved method, apparatus, and computer instructions for creating and running batch jobs in an object oriented environment, such as a J2EE environment. A request to execute a batch job is received. A deployment descriptor file is processed to identify a batch bean to be invoked. This batch job session bean processes the request, parses deployment descriptor file that comprises definitions of relationships between other helper classes, entity and session beans. The identified batch bean is invoked to execute the batch job step in the order described in the deployment descriptor applying checkpoints at intervals specified in the descriptor.Type: ApplicationFiled: May 30, 2008Publication date: September 18, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Geoffrey Martin Hambrick, Robert Howard High, Rodney Alan Little, Sridhar Sudarsan
-
Transformation of objects between a computer programming language and a data representation language
Patent number: 7426721Abstract: A virtual machine (e.g. the Java Virtual Machine (JVM)) may include extensions for compiling objects (e.g. Java Objects) into data representation language (e.g. XML) representations of the objects, and for decompiling representations of objects into objects. The virtual machine may supply an API to the compilation/decompilation extensions. The compiler/decompiler API may accept an object as input, and output a data representation language representation of the object and all its referenced objects (the object graph) in a data stream. In addition, the compiler/decompiler API may accept a data stream, which includes a representation of the object and all its referenced objects (the object graph), and output the object (and all the objects in its object graph). In one embodiment, an intermediary format may be used to represent a data representation language document and may be dynamically processed to generate a class instance from the data representation language document.Type: GrantFiled: September 15, 2000Date of Patent: September 16, 2008Assignee: Sun Microsystems, Inc.Inventors: Thomas E. Saulpaugh, Gregory L. Slaughter, Bernard A. Traversat, Michael J. Duigou, Mohamed M. Abdelaziz -
Publication number: 20080222651Abstract: Embodiments of the present invention address deficiencies of the art in respect to EDI enveloping and provide a method, system and computer program product for multiple message source EDI enveloping with batching support. In one embodiment of the invention, a method for multi-format EDI enveloping can include receiving messages from multiple concurrent message sources, transforming the received messages into an EDI format, inserting the transformed messages into a minimal number of envelopes, and forwarding the envelopes as an EDI interchange to designated trading partners.Type: ApplicationFiled: March 7, 2007Publication date: September 11, 2008Inventors: Rayne S. Anderson, Ashutosh Arora, Tuan T. Dang, Raja Das, David W. Hixon, Sreedhar Janaswamy
-
Publication number: 20080222652Abstract: Provided are methods, computer programs and apparatus for communication in a distributed object-oriented data processing environment. Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations at the target data processing apparatus. This has the advantages of the request implicitly sending data as well as requesting data and allows the request to perform a test on data within a object (such as a comparison with parameters of the request to determine whether the request can be satisfied). Objects within the request can be embedded within each other with different encryption and compression applied to the different objects. As well as achieving communication efficiencies, the ability to selectively encrypt components of a request can be used to provide greater security.Type: ApplicationFiled: March 20, 2008Publication date: September 11, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Howard Shelton Lambert, James Ronald Lewis Orchard
-
Publication number: 20080216092Abstract: A system for requesting data from another includes means for automatically appending a request for certain information to an outgoing message. In one embodiment, an e-mail editor provides the sender-user with an option for causing the email to include a request for missing or desired contact information, such as a picture. The appended request may be in the form of an added e-mail header, e.g. “I need your picture.” On the receiving side of the email, the incoming messages may be parsed for such requests. Any requests that are found in incoming email may be remembered by the receiving system using a dedicated data structure or some indications (e.g. flags) in an existing data structure. When email is composed on the receiving system, the “remembered” request information may be used to facilitate responses to pending requests. In this manner, email correspondents may opportunistically use their email traffic to maintain updated information regarding each other.Type: ApplicationFiled: January 8, 2008Publication date: September 4, 2008Inventor: Bertrand Philippe Serlet
-
Publication number: 20080209440Abstract: A distributed messaging system supporting stateful subscriptions is provided. A stateful publish-subscribe system extends the functionality of the content-based approach to include more general state-valued expressions. Stateful subscriptions may refer to one or more message histories and may include more complex expressions. Therefore, subscribers may receive different information than that provided in the published messages. A plurality of broker machines is provided to deliver messages sent by publishing clients toward subscribing clients based upon the contents of the messages and stateful transformations requested by the subscribing clients. Subscription specifications are analyzed by a compiler and converted into a collection of transform objects and view objects. The messaging system builds a structure containing all transform objects and view objects needed for all intermediate and subscribed views of all subscriptions.Type: ApplicationFiled: May 2, 2008Publication date: August 28, 2008Inventors: Roman Ginis, Robert Evan Strom
-
Patent number: 7418708Abstract: Thus the present invention provides a method which enables a JMS implementation to be integrated into an application server based on the JCA Architecture. In this method the JMS Connection is integrated based on one implementation of the JCA which sets transactional context for the JMS Connection to no transaction, and the JMS Session is integrated based on a second implementation of the JCA which sets the security property to no security. In the method the application is unaware that is it dealing with a JCA implementation and not directly with the JMS implementation and the JMS implementation is unaware that it is being called via the JCA and not directly from the application. The method thus provides an architecture for integration of a JMS into an application server which takes advantage of the JCA such as provision of security properties and transactional context to the JMS in a standard way, and JMS connection pooling and sharing.Type: GrantFiled: May 29, 2003Date of Patent: August 26, 2008Assignee: International Business Machines CorporationInventors: David J. Currie, Vernon M. Green, Doina L. Klinger, Andrew M. Leonard
-
Patent number: 7415712Abstract: An instrumentation system performs operations such as profiling an application and partitioning and distributing units of the application using different versions of metadata describing the application. Performing an operation on an executing application generates overhead. Detailed metadata used in operations such as profiling create unnecessary overhead during other operations. By removing metadata detail unnecessary for a particular operation, an instrumentation system using reduced metadata generates less overhead for that particular operation. Different instrumentation packages include different versions of metadata for performing operations on the application.Type: GrantFiled: June 29, 2005Date of Patent: August 19, 2008Assignee: Microsoft CorporationInventor: Galen C. Hunt
-
Patent number: 7415716Abstract: System and method allow for communication with and management of multiple external components. A component manager communicates with one or more component adapters. Each component adapter communicates with an external component and is able to call the methods, functions, procedures, and other operations of the external component. The component manager associates these external operations with local operations, such that an application may use local operation names to invoke the external operations. Furthermore, the component manager has component definitions and operation definitions that describe the component adapters and operations, including input and output parameters and the like. The component manager is able to receive a group of data including a local operation and a list of input and output parameters and determine from the foregoing information which external operation to call and which component adapter has access to the external operation.Type: GrantFiled: December 23, 2003Date of Patent: August 19, 2008Assignee: International Business Machines CorporationInventors: Mike A. Marin, Daniel S. Whelan, Michael G. Winter