METHOD AND SYSTEM FOR ENABLING AND CONTROLLING COMMUNICATION TOPOLOGY, ACCESS TO RESOURCES, AND DOCUMENT FLOW IN A DISTRIBUTED NETWORKING ENVIRONMENT
First Claim
1. A method for providing a first computing device with a permission to perform an interaction in a network, the method comprising;
- transmitting by the first computing device a message that requests a permission to perform the interaction;
receiving at the first computing device a response to the first message, the response including a contract corresponding to the interaction, the contract restricting one or more capabilities of the first computing device, and said contract specifying one or more actions that are permitted to be performed by the first computing device on information associated with the contract; and
enforcing the contract by a security manager operating locally on the first computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
Described are a system and method for use by a computing device to transmit information over a communication medium. The computing device communicates over the medium according to a protocol stack having a plurality of protocol layers. Information having an identifier is received at a first protocol layer from a higher protocol layer in the protocol stack. The computing device determines whether to present the information to the network communication medium based on at least one term of a contract associated with the identifier. Upon determining to present the information to the communication medium, the computing device incorporates the identifier in the information before placing the information on the network communication medium.
24 Citations
28 Claims
-
1. A method for providing a first computing device with a permission to perform an interaction in a network, the method comprising;
-
transmitting by the first computing device a message that requests a permission to perform the interaction; receiving at the first computing device a response to the first message, the response including a contract corresponding to the interaction, the contract restricting one or more capabilities of the first computing device, and said contract specifying one or more actions that are permitted to be performed by the first computing device on information associated with the contract; and enforcing the contract by a security manager operating locally on the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for providing a first computing device with a permission to perform an interaction with a second computing device in a network, the method comprising;
-
transmitting a first message from the first computing device to the second computing device to initiate an exchange for obtaining the permission to perform the interaction with the second computing device; automatically selecting by the first computing device a contract corresponding to a type of interaction that is supported by the second computing device to provide the second computing device with the permission to perform the interaction, the contract specifying one or more terms that information associated with the contract must satisfy in order to be transmitted between the first computing device and the second computing device; transmitting from the first computing device to the second computing device a second message including the contract, wherein the one or more terms specify one or more actions that are permitted to be performed on the information associated with the contract by the first computing device or by the second computing device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification