Data transfer across a network
First Claim
1. A method for communication in a distributed object-oriented data processing environment, comprising:
- receiving from a first data processing apparatus at a second data processing apparatus a request for retrieval of an item from the second data processing apparatus, the request comprising a first embedded object that is targeted at a data processing object of the second data processing apparatus, the first embedded object comprising data and a test executable class function that applies a test condition to data within the target data processing object;
responsive to receipt of the request that comprises the first embedded object at the second data processing apparatus, executing the class function to apply the test condition to the data within the target data processing object;
responsive to a positive result from the test condition;
generating a second object that implements a verification request and that comprises a requested verification check function;
sending the second object to a remote data processing apparatus to perform the requested verification check function;
receiving, from the remote data processing apparatus, a result of the requested verification check function at the second data processing apparatus;
generating a positive reply to the item request in response to the result of the requested verification check function comprising a positive verification result; and
sending the positive reply from the second data processing apparatus to the first data processing apparatus.
0 Assignments
0 Petitions
Accused Products
Abstract
Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations at the target data processing apparatus. This has the advantages of the request implicitly sending data as well as requesting data and allows the request to perform a test on data within an object (such as a comparison with parameters of the request to determine whether the request may be satisfied). Objects within the request may be embedded within each other with different encryption and compression applied to the different objects. As well as achieving communication efficiencies, the ability to selectively encrypt components of a request may be used to provide greater security. For example, a store may be able to interpret the request, while credit details may be separately encrypted such that only a bank may decrypt that subcomponent of the request.
-
Citations
17 Claims
-
1. A method for communication in a distributed object-oriented data processing environment, comprising:
-
receiving from a first data processing apparatus at a second data processing apparatus a request for retrieval of an item from the second data processing apparatus, the request comprising a first embedded object that is targeted at a data processing object of the second data processing apparatus, the first embedded object comprising data and a test executable class function that applies a test condition to data within the target data processing object; responsive to receipt of the request that comprises the first embedded object at the second data processing apparatus, executing the class function to apply the test condition to the data within the target data processing object; responsive to a positive result from the test condition; generating a second object that implements a verification request and that comprises a requested verification check function; sending the second object to a remote data processing apparatus to perform the requested verification check function; receiving, from the remote data processing apparatus, a result of the requested verification check function at the second data processing apparatus; generating a positive reply to the item request in response to the result of the requested verification check function comprising a positive verification result; and sending the positive reply from the second data processing apparatus to the first data processing apparatus. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for ordering goods or services using transmission of objects via a communication network, the transmitted objects comprising executable class functions and data, the method comprising:
-
embedding credit details within a request for goods or services as an embedded object within a first embedded object; setting separate security attributes for the embedded object and the first embedded object, where the security attributes for the embedded object comprise a required cryptor that is used to encrypt the embedded object for subsequent decryption by a target communication partner authorized to decrypt the embedded object; encoding each of the embedded object and the first embedded object in accordance with their respective security attributes for transmission from a first data processing apparatus to a second data processing apparatus; sending the request for goods or services from the first data processing apparatus to a target data processing object of the second data processing apparatus, the request comprising the first embedded object further comprising the data and an executable class function that is responsive to receipt of the request at the second data processing apparatus to process data within the target data processing object to determine whether the request can be satisfied by one of the target data processing object and the second data processing apparatus; and receiving a reply to the request that comprises a result of the determination by the executable class function of the first embedded object regarding whether the request can be satisfied by the one of the target data processing object and the second data processing apparatus. - View Dependent Claims (15, 16)
-
-
17. A method for communication in a distributed object-oriented data processing environment, comprising:
-
receiving from a first data processing apparatus at a second data processing apparatus a request for retrieval of an item from the second data processing apparatus, the request comprising a first embedded object that comprises an executable class function that performs an operation at the second data processing apparatus in response to receipt of the request comprising the first embedded object at the second data processing apparatus; and responsive to receipt of the request comprising the first embedded object at the second data processing apparatus; executing the executable class function to perform the operation, where the operation comprises; generating a second object that implements a verification request and that comprises a requested verification check function; sending the second object to a remote data processing apparatus to perform the requested verification check function; and receiving, from the remote data processing apparatus, a result of the requested verification check function at the second data processing apparatus; generating a positive reply to the request in response to the result of the requested verification check function comprising a positive verification result; and sending the positive reply from the second data processing apparatus to the first data processing apparatus.
-
Specification