System and method for dynamically enabling components to implement data transfer security mechanisms
First Claim
Patent Images
1. A system comprising:
- a computer system coupled to a network;
a first component coupled to the network; and
a security system coupled to the network;
wherein the computer system comprises;
a discovery mechanism whichdiscovers one or more components which are present on the network; and
obtains one or more proxy objects from discovered components,wherein a proxy object for a component indicates types of data which the component can receive and understand and one or more data-type-handler interfaces which the component can accept and execute; and
wherein the first component comprises an interface system that communicates with a data type handler object and accesses at least one interface provided by the data type handler object, wherein the data type handler object is a software object that includes mobile code for handling at least one type of data that otherwise cannot be read or understood by the first component, and wherein the interface system implements at least one data transfer security mechanism;
wherein the security system accesses the interface provided by the data type handler object to obtain a data transfer security mechanism and implements the data transfer security mechanism; and
wherein the data type handler object employed by the interface system on the first component is employed as a function of data type and security that is applied to the data type by the data transfer security mechanism.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for implementing data transfer security mechanisms. The method includes a first component transferring a data type handler object to a second component. The second interface invokes an interface accessible through the date type handler object which includes instructions that are executed by the second component to implement a data transfer security mechanism. Further, the data type handler interface can be encrypted, include cryptographic keys, and/or include digital signatures.
11 Citations
36 Claims
-
1. A system comprising:
-
a computer system coupled to a network; a first component coupled to the network; and a security system coupled to the network; wherein the computer system comprises; a discovery mechanism which discovers one or more components which are present on the network; and obtains one or more proxy objects from discovered components, wherein a proxy object for a component indicates types of data which the component can receive and understand and one or more data-type-handler interfaces which the component can accept and execute; and wherein the first component comprises an interface system that communicates with a data type handler object and accesses at least one interface provided by the data type handler object, wherein the data type handler object is a software object that includes mobile code for handling at least one type of data that otherwise cannot be read or understood by the first component, and wherein the interface system implements at least one data transfer security mechanism; wherein the security system accesses the interface provided by the data type handler object to obtain a data transfer security mechanism and implements the data transfer security mechanism; and wherein the data type handler object employed by the interface system on the first component is employed as a function of data type and security that is applied to the data type by the data transfer security mechanism. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
providing a proxy object for a component in response to a discovery request sent by a computer system, wherein the proxy object indicates types of data which the component can receive and understand one or more data-type-handler interfaces which the component can accept and execute; communicating with a data type handler object, wherein the data type handler object is a software object that includes mobile code for handling at least one type of data that otherwise cannot be read or understood by a first component, wherein the first component comprises an interface system, wherein the interface system communicates with the data-type-handler object and accesses at least one interface provided by the data-type-handler object, and wherein the interface system implements at least one data transfer security mechanism; accessing at least one interface provided by the data type handler object to obtain a data transfer security mechanism; and implementing the data transfer security mechanism, wherein the data type handler object employed by the interface system on the first component is employed as a function of data type and security that is applied to the data type by the data transfer security mechanism. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer-readable medium having stored thereon instructions, which when executed by at least one processor, causes the processor to perform:
-
providing a proxy object for a component in response to a discovery request sent by a computer system, wherein the proxy object indicates types of data which the component can receive and understand one or more data-type-handler interfaces which the component can accept and execute; communicating with a data type handler object, wherein the data type handler object is a software object that includes mobile code for handling at least one type of data that otherwise cannot be read or understood by a first component, wherein the first component comprises an interface system, wherein the interface system communicates with the data-type-handler object and accesses at least one interface provided by the data-type-handler object, and wherein the interface system implements at least one data transfer security mechanism; accessing at least one interface provided by the data type handler object to obtain a data transfer security mechanism; and implementing the data transfer security mechanism, wherein the data type handler object employed by the interface system on the first component is employed as a function of data type and security that is applied to the data type format by the data transfer security mechanism. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification