摘要:
System and method for providing secure resource management. The system includes a first device that creates a secure, shared resource space and a corresponding root certificate for the shared space. The first device associates one or more resources that it can access with the shared space. The first device invites one or more other devices to join as members of the space, and establishes secure communication channels with the devices that accept this invitation. The first device generates a member certificate for each accepting device, and sends the root certificate and the generated member certificate to the device through the secure channel. These devices may then access resources associated with the shared space by presenting their member certificates. Further, members of the shared space may invite other device to join the space, and may create member certificates in the same manner as the first device.
摘要:
Methods and systems for enabling arbitrary components to control communications, such as data transfers, without having or requiring prior knowledge of each other. The system includes a component that creates controller objects for a communication, such as a data transfer involving several components. Further, the component associates the controller objects with a communication session object of the data transfer, such as a data transfer session object. One or more of the components involved in the data transfer obtain the controller objects through the data transfer session object and execute source-specific instructions included in the obtained controller objects to generate user interfaces. The user interfaces enable the components to control aspects of the communication, such as the data transfer.
摘要:
A system for enabling components on arbitrary networks to communicate includes a plurality of arbitrary components, such as computers, servers, laptops, facsimile machines, copier machines and cellular telephones, including applications operating on those components, such as word processing or data base applications, connected together by one or more networks that may use the same or different protocols. A method includes a first component, such as a computer, obtaining aggregate objects from other components, such as a laptop or server. Each of the aggregate objects are associated with discovered component objects of the other components, such as the laptop or server. The first component selects at least one of the components associated with the aggregate objects, and invokes universal interfaces associated with the selected arbitrary components to communicate with other arbitrary components.
摘要:
Handling data at one of a plurality of components, wherein the plurality of components includes at least a sink component and a source component. The source component transfers data to the sink component, and the sink component accesses an obtained data type handler object to invoke an interface implemented by the handler object. The invoked type handler interface includes source-specific instructions that are executed by the sink component regardless of whether the data is a format that the sink natively understands.
摘要:
A method and system for unifying component metadata includes components, such as computers, laptops or flat panel display devices and software entities, connected together by one or more networks. A method includes a first component, such as a laptop device, obtaining intrinsic metadata associated with one or more other components, such as a computer and a flat panel display device. The first component combines intrinsic metadata received from each component with extrinsic metadata of the first component, and provides the combined metadata to the other components, although the first component may also utilize the combined metadata. The components are able to obtain a consistent, unified view of the combined metadata without needing any prior programming and without requiring the use of centralized servers.
摘要:
A system and method for assessing component capability to accept and execute mobile code includes a first component coupled via a network to a second component. The first component uses a predicate object to determine whether the second component can accept mobile code, such as a data type handler object or an applet. The instructions included in the predicate object are executed in the environment of the second component, although they can be executed in the first component environment. The execution of these instructions in the second component environment causes the second component to respond to a series of basic tests, such as whether the second component has access to required libraries, software versions and/or peripherals. Additionally, a predicate object creation module is disclosed for generating predicate objects that are specific to the objects desired, such as a data type handler object or a controller object.
摘要:
A system and method for providing self-installing software components for network service execution is presented. A basic communication framework is established with a service host system executing a network service software component to provide a network service. Availability of the network service software component is determined and prerequisites against a runtime environment are verified through the service host system. A code bundle providing the network service software component through the service host system logically grouped with installation instructions for the network service software component is executed.
摘要:
One embodiment of the present invention provides a system that facilitates dynamic delivery of service profiles to a client. During operation, the system performs a discovery operation to allow the client to discover new services on a network. If a new service is discovered for which the client does not possess a service profile, the client to obtains the service profile from the new service and subsequently installs it, thereby enabling the client to interact with the new service.
摘要:
A method of accessing a data resource identifies the data resource, the data resource accessible through a first device and associated with a resource locator, the first device configured to provide access to the data resource responsive to possession of a whitelisted credential. The method includes receiving a second-device credential from a second device by a personal domain controller, the personal domain controller and the first device within a first trusted relationship and provides, by the personal domain controller, the second-device credential to the first device for whitelisting subject to the first trusted relationship. The method uses, by the second device, the second-device credential to access the data resource responsive to the resource locator.
摘要:
System and method for enabling arbitrary components to control communications without having or requiring prior knowledge of each other. The system includes a first component that creates controller objects and provides the objects to other components. The controller objects include instructions which when executed by the other components enable the components to generate user interfaces for controlling the first component. Further, the controller objects are encrypted and are used to authenticate the senders or receivers of the objects.