Controlling transactions in accordance with role based security
First Claim
1. At a computer system, a method for controlling a distributed transaction in accordance with role based security, the method comprising:
- an act of a first transaction related component receiving a transaction related message from a second transaction related component, the transaction related message indicating a request by the second transaction related component to perform a transaction related operation that is to involve the first transaction related component;
an act of the first transaction related component authenticating the second transaction related component;
an act of referring to transaction control information for the first transaction related component, the transaction control information indicating roles the second transaction related component is permitted to assume relative to the first transaction related component;
an act of comparing the transaction related operation indicated in the request to the permitted roles for the second transaction related component; and
an act of implementing the transaction related operation in accordance with the results of the comparison.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention extends to methods, systems, and computer program products for controlling transactions in accordance with role based security. A first transaction related component receives a transaction related message from a second transaction related component. The transaction related message indicates a request by the second transaction related component to perform a transaction related operation that is to involve the first transaction related component. The first transaction related component authenticates the second transaction related component. The first transaction related component refers to transaction control information indicating roles the second transaction component is permitted to assume relative to the first transaction related component. The transaction related operation indicated in the request is compared to the permitted roles for the second transaction related component. The transaction related operation is implemented in accordance with the results of the comparison.
13 Citations
20 Claims
-
1. At a computer system, a method for controlling a distributed transaction in accordance with role based security, the method comprising:
-
an act of a first transaction related component receiving a transaction related message from a second transaction related component, the transaction related message indicating a request by the second transaction related component to perform a transaction related operation that is to involve the first transaction related component;
an act of the first transaction related component authenticating the second transaction related component;
an act of referring to transaction control information for the first transaction related component, the transaction control information indicating roles the second transaction related component is permitted to assume relative to the first transaction related component;
an act of comparing the transaction related operation indicated in the request to the permitted roles for the second transaction related component; and
an act of implementing the transaction related operation in accordance with the results of the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer program product for use at a computer system, the computer program product for implementing a method for controlling a distributed transaction in accordance with role based security, the method comprising one or more computer-readable media having stored thereon computer-executable instructions that, when executed by a processor, cause a first transaction related component at the computer system to perform the following:
-
receive a transaction related message from a second transaction related component, the transaction related message indicating a request by the second transaction related component to perform a transaction related operation that is to involve the first transaction related component;
authenticate the second transaction related component;
refer to transaction control information indicating roles the second transaction related component is permitted to assume relative to the first transaction related component;
compare the transaction related operation indicated in the request to the permitted roles for the second transaction related component; and
implement the transaction related operation in accordance with the results of the comparison. - View Dependent Claims (17, 18, 19)
-
-
20. A computer system, comprising:
-
one or more processors;
system memory; and
one or more computer-readable media having stored thereon a transaction manager, the transaction manger configured to;
receive a transaction related messages from other transaction related components, the transaction related messages indicating requests by the other transaction related components to perform transaction related operations that are to involve the transaction manager;
authenticate other transaction related components;
refer to transaction control information indicating roles that other transaction related components are permitted to assume relative to transaction manager;
compare transaction related operations indicated in requests to the permitted roles for other transaction related components; and
implement transaction related operations in accordance with the results of the comparisons.
-
Specification