SECURE DATA ACCESSING SYSTEM AND METHOD
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for accessing data located behind a security mechanism is provided. In the preferred embodiment, the system may use the common HTTP protocol and JDBC drivers. In more detail, a client may execute a Java applet that generates database proxy objects that are communicated to an application server using the HTTP protocol. The application server may use a servlet to process the objects and generate database requests using JDBC drivers so that the data is retrieved from the database for the client Java applet without the security problems.
-
Citations
17 Claims
- 1. (canceled)
-
2. A method, comprising:
-
receiving, at an application server computing device, a first message from a database proxy object on a client computing device, the first message including a request for information from a database; generating, by the application server computing device, a database communication object, wherein the database communication object sends a second message to the database, the second message including the request for information; receiving, by the database communication object, a response from the database; and transmitting, by the application server computing device, a result from the database communication object to the database proxy object. - View Dependent Claims (3, 4, 5, 6)
-
-
8. A system, comprising:
-
an application server computing device configured to accept first messages from database proxy objects on client computing devices, and further configured to generate database communication objects corresponding to the database proxy objects; wherein the database communication objects are usable by the application server to send second messages to a database server computing device; wherein the database communication objects are further usable by the application server to receive responses including database information from the database server computing device; and wherein the database communication objects are further usable by the application server to respond to the first messages with the database information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having instructions stored thereon that, in response to execution by a computer-based system, cause the computer-based system to perform operations comprising:
-
receiving a first message from a database proxy object on a client computing device, the first message including a request for information from a database; generating a database communication object, wherein the database communication object is usable by the computer-based system to send a second message to the database, the second message including the request for information; receiving a response from the database; and transmitting a result from the database communication object to the database proxy object. - View Dependent Claims (16, 17)
-
Specification