Write-access control system
First Claim
1. A method of processing requests, the method comprising:
- routing at least one request for access to a first software application to a second software application, wherein the second application is trusted by the first software application;
validating the at least one request using the second software application; and
sending the at least one request to the first software application in response to the at least one request being successfully validated by the validating step, wherein the validating using the second software application reduces a processing overhead of the first software application.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system is provided so that requests to a first application (e.g., an LDAP directory) are routed to a second application, the second application being trusted by the first application. The second application validates the requests and sends the request to the first software application when the first application is available. Requests may be queued for processing until the first application is available so that the requests remain pending. A reply may be sent to the requester indicating the results of the request. The second software application processes authentication and validation of the request thereby relieving the first application of this function. Since the second application is a trusted application, the request to the first application may be applied with improved efficiencies increasing the overall performance of the first software application.
20 Citations
30 Claims
-
1. A method of processing requests, the method comprising:
-
routing at least one request for access to a first software application to a second software application, wherein the second application is trusted by the first software application;
validating the at least one request using the second software application; and
sending the at least one request to the first software application in response to the at least one request being successfully validated by the validating step, wherein the validating using the second software application reduces a processing overhead of the first software application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for reducing processing demands, the method comprising:
-
queueing at least one request for a first software application at a second software application in response to the first software application being unavailable, wherein the second software application is trusted by the first software application;
validating the at least one request using the second software application; and
sending the at least one request from the second software application to the first software application in response to the first application resuming availability and the at least one request being successfully validated by the validating, wherein the validating step reduces a processing overhead of the first software application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product comprising a computer usable medium having readable program code embodied in the medium, the computer program product includes at least one component to:
-
route at least one request for access to a first software application to a second software application, wherein the second software application is trusted by the first software application;
validate the at least one request using the second software application; and
send the at least one request to the first software application in response to the at least one request being successfully validated by the validating. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification