Proxy Object
First Claim
Patent Images
1. A device-implemented method comprising:
- utilizing a lookup address to access a directory;
retrieving business object information from the directory, the business object information including a business object address and a business object ID; and
communicating the business object information effective to enable construction of a proxy object that is configured to enable access to a business object and one or more invokable functionalities of the business object.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are discussed for methods, systems, and computer readable media for creating a proxy object, comprising calling a second functionality in a proxy class, creating a proxy object by the second functionality, calling a third functionality by the second functionality, calling a fourth functionality by the third functionality, creating a reference object by the fourth functionality, returning the reference object to the third functionality, associating the reference object to the proxy object by the third functionality, and returning the associated proxy object by the second functionality to a first functionality.
117 Citations
20 Claims
-
1. A device-implemented method comprising:
-
utilizing a lookup address to access a directory; retrieving business object information from the directory, the business object information including a business object address and a business object ID; and communicating the business object information effective to enable construction of a proxy object that is configured to enable access to a business object and one or more invokable functionalities of the business object. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device-implemented method comprising:
-
associating an address with an adapter for a business object at a first resource; performing a lookup using the address to determine a proxy object for the adapter; and communicating the proxy object for receipt at a second resource that is remote from the first resource, the proxy object being configured to enable the second resource to invoke one or more functionalities of the business object via the adapter. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A device-implemented method comprising:
-
causing communication of a request for a proxy object to a resource from which the proxy object can be obtained, the request including a uniform resource locator (URL) that identifies the proxy object; responsive to causing communication, receiving the proxy object from the resource, the proxy object including at least one proxy method; and invoking, via the proxy method, one or more functionalities of a business object. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification