Multiple level security adapter
First Claim
1. A computer executable method of exchanging data, the method comprising:
- receiving data on behalf of a first application using a first protocol standard, the data having a format compatible with the first protocol standard;
determining whether the format of the data is compatible with a second protocol standard;
when the format of the data is not compatible with the second protocol standard, automatically transforming the format of the data to a format that is compatible with the second protocol standard; and
transmitting the data to a second application service using the second protocol standard.
1 Assignment
0 Petitions
Accused Products
Abstract
In exemplary embodiments, data with a format compatible with a first protocol standard is received on behalf of a first application. When the format of the data is not compatible with a second protocol standard, the format of the data is automatically transformed to a format that is compatible with the second protocol standard. The data is transmitted to a second application service using the second protocol standard. The data may be received from the second application. When the format of the data is not compatible with a third protocol standard, the format of the data is automatically transformed to a format that is compatible with the third protocol standard. The data is transmitted on behalf of a third application using the third protocol standard. The first and third applications may be in first and second protected enclaves. The second application may include a security gateway service.
31 Citations
29 Claims
-
1. A computer executable method of exchanging data, the method comprising:
-
receiving data on behalf of a first application using a first protocol standard, the data having a format compatible with the first protocol standard;
determining whether the format of the data is compatible with a second protocol standard;
when the format of the data is not compatible with the second protocol standard, automatically transforming the format of the data to a format that is compatible with the second protocol standard; and
transmitting the data to a second application service using the second protocol standard. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable program product comprising:
-
first computer readable program code means for receiving data on behalf of a first application using a first protocol standard, the data having a format compatible with the first protocol standard;
second computer readable program code means for determining whether the format of the data is compatible with a second protocol standard;
third computer readable program code means for, when the format of the data is not compatible with the second protocol standard, automatically transforming the format of the data to a format that is compatible with the second protocol standard; and
fourth computer readable program code means for transmitting the data to a second application using the second protocol standard. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for exchanging data, the system comprising:
-
a first computer processing component configured to receive data on behalf of a first application using a first protocol standard, the data having a format compatible with the first protocol standard;
a second computer processing component configured to determine whether the format of the data is compatible with a second protocol standard;
a third computer processing component configured to, when the format of the data is not compatible with the second protocol standard, automatically transform the format of the data to a format that is compatible with the second protocol standard; and
a fourth computer processing component configured to transmit the data to a second application service using the second protocol standard. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification