摘要:
Methods and arrangements to handle network messages containing security information are disclosed. Embodiments include transformations, code, state machines or other logic to handle network messages containing security information by configuring an application to generate messages containing security information. The configuring may include creating a data structure to store security information of network messages and storing security information, including a specification of a cryptographic key and a specification of a format to represent information about the cryptographic key in the data structure. The embodiments may also include dynamically linking to a runtime module, executing the runtime module, accessing the data structure to identify the cryptographic key and the format to represent the cryptographic key, storing security information in temporary storage based upon the identification of the cryptographic key, constructing a security token based upon the security information stored in temporary storage, and inserting the security token in a message.
摘要:
Methods and arrangements to handle network messages containing security information are disclosed. Embodiments include transformations, code, state machines or other logic to handle network messages containing security information by configuring an application to generate and process security information of network messages. An embodiment may involve creating a data structure to store security information of network messages and storing security information in the data structure. The security information may include a specification of a cryptographic key, a format to represent information about the cryptographic key, a policy to select a security token of a requestor when multiple security tokens are contained in network messages, or a policy to select a security token to determine the degree of trust to provide a message sender. The embodiment may include the generation of security information or consumption of security information of a message utilizing security information stored in the data structure.
摘要:
The present invention creates a SOAP message without using DOM by generating a body part by sequentially performing such a process of a message as encryption or signing for each piece of the message, generating a header part by using information acquired during the process, and by combining the body part and the header part. The present invention also breaks a SOAP message without using DOM by acquiring header information with parsing a received SOAP message and sequentially performing decode or verification of a signature of a body part according to the header information.
摘要:
The present invention creates a SOAP message without using DOM by generating a body part by sequentially performing such a process of a message as encryption or signing for each piece of the message, generating a header part by using information acquired during the process, and by combining the body part and the header part. The present invention also breaks a SOAP message without using DOM by acquiring header information with parsing a received SOAP message and sequentially performing decode or verification of a signature of a body part according to the header information.
摘要:
The present invention creates a SOAP message without using DOM by generating a body part by sequentially performing such a process of a message as encryption or signing for each piece of the message, generating a header part by using information acquired during the process, and by combining the body part and the header part. The present invention also breaks a SOAP message without using DOM by acquiring header information with parsing a received SOAP message and sequentially performing decode or verification of a signature of a body part according to the header information.
摘要:
The present invention creates a SOAP message without using DOM by generating a body part by sequentially performing such a process of a message as encryption or signing for each piece of the message, generating a header part by using information acquired during the process, and by combining the body part and the header part. The present invention also breaks a SOAP message without using DOM by acquiring header information with parsing a received SOAP message and sequentially performing decode or verification of a signature of a body part according to the header information.
摘要:
An authentication system with a single sign on having less influence on the service performance to provide a service via a network. The authentication system comprises a provider 20 for providing a service, a security token service 40, and a proxy service 30 interposed between the security token service 40 and the provider 20. The proxy service 30 preserves an authentication result of the security token service 40, and vicariously executes the authentication for a client based on the authentication result preserved by itself without transferring an authentication request received from the provider 20 to the security token service 40 under certain conditions. Moreover, when it is clear that a service can be provided to the client based on the service use history of the client 10 preserved by itself, the provider 20 provides the service to the client 10 without making the authentication request.
摘要:
A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters targets executable content and is instantiated based on a set of one or more rule sets selected based, at least in part, on a type of the network message. For each of the plurality of executable content filters, it is determined if one or more of the stream of parsed elements includes executable content targeted by the executable content filter. The executable content message stream filter modifies those of the stream of parsed elements that include the executable content targeted by the plurality of executable content filters to disable the executable content.
摘要:
Determining confidentiality of an office document shared by multiple organizations. Each block of a document data set is stored in association with confidentiality information indicating whether the block is confidential. The document data set is dividable into blocks each being a unit including properties evaluated as having a certain characteristic. A document data set targeted for the confidentiality determination is acquired, and it is determined whether a document data set, including a block similar to each block of the acquired document data set, is stored. If the document data set including the similar block is stored, it is determined whether the confidentiality information indicating that the block is confidential is assigned to the block of the acquired document data corresponding to the similar block. If the confidentiality information indicating that the block is confidential is assigned, the acquired document data set is determined as confidential.
摘要:
Reduces time for processing a request Simple Object Access Protocol, SOAP, message in a request means such as mobile equipment or the like. Sequence definition means divides one parent SOAP message as one request concerning a Web Service into segments of a Simple Object Access Protocol header and a SOAP body. Segment creation means creates the segment of the Simple Object Access Protocol body of the parent SOAP message and the segment of the SOAP header of the parent Simple Object Access Protocol message in this order. Sending means executes sending processing in parallel with creation processing by the segment creation means. Specifically, the sending means assigns one child Simple Object Access Protocol message enveloping the content of a segment to each of the segments, and sends each of the child Simple Object Access Protocol messages to the provider in accordance with a creation sequence of the segments.