System And Methods For Secure Service Oriented Architectures
First Claim
Patent Images
1. A method of controlling and securing a service oriented architecture, comprising:
- intercepting a message between a requesting web service and a source web service;
validating the message;
logging a result of the validation; and
adding a security profile to the message if a security profile is not already present.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a method for intercepting a message between a requesting web service and a source web service, validating the message, logging the result of the validations, and adding a security profile to the message. The method may also include examining the message to determine whether a security profile is embedded therein. If the message is valid, access to the message by the requesting web service is permitted. If the message is not valid, access to the message by the requesting web service is prevented.
-
Citations
20 Claims
-
1. A method of controlling and securing a service oriented architecture, comprising:
-
intercepting a message between a requesting web service and a source web service;
validating the message;
logging a result of the validation; and
adding a security profile to the message if a security profile is not already present. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium storing a software program that, when executed by a processor, causes the processor to:
-
intercept a message between a requesting web service and a source web service;
validate the message;
log a result of the validation; and
add a security profile to the message if a security profile is not already present. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A secure service oriented architecture, comprising:
-
one or more web services operable to pass data messages between the one or more web services;
wherein each web service is operably coupled for communication of data messages through an intermediary;
wherein each intermediary is operable to;
intercept a message between a requesting web service and a source web service;
validate the message by examining the message to determine whether a security profile is embedded therein;
if the message is valid, permit access to the message by the requesting web service;
if the message is not valid, prevent access to the message by the requesting web service;
log a result of the validation; and
add a security profile to the message if a security profile is not already present. - View Dependent Claims (18, 19, 20)
-
Specification