×

Capability security for transparent distributed object systems

  • US 5,781,633 A
  • Filed: 07/01/1996
  • Issued: 07/14/1998
  • Est. Priority Date: 07/01/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. In a distributed object system wherein communications between objects in different processes are rendered transparent through the use of proxy objects and transports, a proxy object resident in a first process being a local representative of a corresponding remote object resident in a second, different process, said proxy object being responsive to messages associated with said remote object, said transports existing in pairs, a first transport of a pair of transports residing in said first process and including a first in-table and a first out-table matched, respectively, to a second out-table and a second in-table in a second transport of said pair of transports resident in said second process, said pair of transports enabling communication between said proxy object and said corresponding remote object by providing corresponding slots in said first and second in- and out-tables, such that a third object in said first process desiring to send a message to said remote object sends said message locally to said proxy object as if said proxy object were said remote object, said proxy object, upon receiving said message, relaying said message to said first transport designating said remote object as recipient using a first index designated for sole use of said proxy object and said remote object, said first transport being configured to relay said message to said in-table of said second transport at said first index, said second transport being configured to relay said message received at said first index to a unique object in said second process associated with said first index, said unique object being said remote object due to correspondence in transport indices of said proxy and remote objects, a capability security system, comprising:

  • a public and private key associated with each of said processes; and

    an agreed key shared by said first and second processes;

    said first and second processes being configured to generate cooperatively said agreed key from their own public and private keys according to agreed key encryption techniques;

    such that, upon receiving a message from a first object in said first process directed to a second object in said second process identified by a transparent reference, said first transport is configured to encode said message using said agreed key and to transmit said encoded message to a second transport in said second process;

    said second transport being configured to decode said encoded message using said agreed key and to direct the decoded message to said second object based on said transparent reference, messages between said first and second processes being encrypted with said agreed key, thereby ensuring secure inter-process message-passing with transparency.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×