Universal data-driven computer proxy
First Claim
1. A computer program product having a non-transitory computer-readable storage medium having executable computer program instructions embodied therein for implementing a generic reusable computer proxy, the computer program product comprising computer program instructions for:
- identifying a protocol specification associated with a given protocol, the protocol specification including non-executable data facilitating decomposition of the protocol, the non-executable data comprising information identifying a plurality of points in the protocol specification at which to execute proxy activity code;
identifying proxy activity code comprising a plurality of elements configured to perform defined features of the protocol;
identifying a protocol-code association specifying, for the identified points in the protocol specification, corresponding ones of the elements of the proxy activity code to invoke; and
instantiating at runtime the generic reusable computer proxy that invokes the specified elements of the proxy activity code at the corresponding identified points during decomposition of the protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparati, and computer-readable media for updating proxy executable code. An apparatus embodiment of the present invention comprises generic universal proxy executable code that can be instantiated multiple times, with each instance being driven by a different set of files comprising a protocol specification file and a proxy activity code file, to control protocol decomposition and proxy functions, respectively. In a method embodiment of the present invention, a protocol specification is created or updated; proxy activity code, separate from the protocol specification, is created or updated; and the proxy executable code is executed using the protocol specification and the proxy activity code.
-
Citations
26 Claims
-
1. A computer program product having a non-transitory computer-readable storage medium having executable computer program instructions embodied therein for implementing a generic reusable computer proxy, the computer program product comprising computer program instructions for:
-
identifying a protocol specification associated with a given protocol, the protocol specification including non-executable data facilitating decomposition of the protocol, the non-executable data comprising information identifying a plurality of points in the protocol specification at which to execute proxy activity code; identifying proxy activity code comprising a plurality of elements configured to perform defined features of the protocol; identifying a protocol-code association specifying, for the identified points in the protocol specification, corresponding ones of the elements of the proxy activity code to invoke; and instantiating at runtime the generic reusable computer proxy that invokes the specified elements of the proxy activity code at the corresponding identified points during decomposition of the protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for implementing a generic reusable computer proxy, said method comprising the steps of:
-
identifying a protocol specification associated with a given protocol, the protocol specification including non-executable data facilitating decomposition of the protocol, the non-executable data comprising information identifying a plurality of points in the protocol specification at which to execute proxy executable code; identifying proxy activity code comprising a plurality of elements configured to perform defined features of the protocol; identifying a protocol-code association specifying, for the identified points in the protocol specification, corresponding ones of the elements of the proxy activity code to invoke; and instantiating at runtime the generic reusable computer proxy that invokes the specified elements of the proxy activity code at the corresponding identified points during decomposition of the protocol. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer system comprising:
-
a computer processor; and a computer program product having a computer-readable storage medium having computer program instructions executable by the computer processor embodied therein for implementing a generic reusable computer proxy, the computer program product comprising computer program instructions for; identifying a protocol specification associated with a given protocol, the protocol specification including non-executable data facilitating decomposition of the protocol, the non-executable data comprising information identifying a plurality of points in the protocol specification at which to execute proxy activity code; identifying proxy activity code comprising a plurality of elements configured to perform defined features of the protocol; identifying a protocol-code association specifying, for the identified points in the protocol specification, corresponding ones of the elements of the proxy activity code to invoke; and instantiating at runtime the generic reusable computer proxy that invokes the specified elements of the proxy activity code at the corresponding identified points during decomposition of the protocol. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification