摘要:
A method, system, and computer program product for using Java Server Pages to enable transcoding the content of a document requested by a client, in order to tailor the output document according to application-specific characteristics. In particular, the present invention enables the JSP author to override input source request characteristics and to specify transcoding hints to be used by a transcoding filter for selecting an appropriate style sheet.
摘要翻译:一种用于使用Java Server Pages来实现对客户端请求的文档的内容进行代码转换的方法,系统和计算机程序产品,以便根据应用特定的特征定制输出文档。 特别地,本发明使得JSP作者能够覆盖输入源请求特性,并且指定要由代码转换滤波器使用的用于选择适当样式表的代码转换提示。
摘要:
Enforcing data policy using style sheet processing. A Document Type Definition (DTD) associated with an Extensible Markup Language document is modified to specify a reference to stored data policy to be applied to document elements. Each data element may specify a different data policy. This technique uses minimal network transmission overhead, as the policy itself is not transmitted through the network until the DTD reaches the node where the data policy will be applied. Programming code implementing the data policy is then retrieved, using the references, by an Extensible Stylesheet Language (XSL) processor instrumented according to the present invention. Data policy is preferably enforced by overriding the existing XSL “value-of” method. DTD information describing a document element may be suppressed from a DTD being generated for the output document of the data policy enforcement process, providing privacy protection for the details of the associated policy.
摘要:
A method, system, and computer-readable code for a technique with which files encoded according to the Extensible Markup Language (XML) notation can be marked up to indicate that the content of the file (or some portion thereof) is dynamic in nature and is to be updated automatically to reflect changing information. The proposed technique provides a novel way to specify that a data repository should be accessed as the source of the updates. Techniques are defined for specifying that this data repository access occurs once, and for specifying that it occurs when a set of conditions are satisfied (which may include periodically repeating the data repository access and content update). In one aspect, the data repository is a database; in another aspect, the data repository is a file system. Preferably, the Lightweight Directory Access Protocol (LDAP) is used as an access method when the data repository being accessed is a database storing an LDAP directory.
摘要:
A method and apparatus for allowing dynamic applet access to servers from which the applet did not originate wherein an application on the originating server redirects communications between the applet and network resources.
摘要:
Packet messages transmitted on a packet communications network include origin and destination addresses in the form of stacked address elements which can be pushed or popped off of the stack. A plurality of interconnected packet communications network include routing nodes which utilize the top address element on the destination stack to route the message. Such routing nodes also include stack element editing facilities for popping elements from the stocks, constructing new elements to be pushed onto the stacks, and amending the contents of elements on the stack. This arrangement allows messages to be launched on the networks where the originating station does not have full knowledge of the destination station, and the routing nodes add the necessary destination information as it becomes necessary for routing.
摘要:
A method and system for efficiently establishing secure communications between mobile devices in a radio network. The present invention utilizes public key cryptography and unique hardware identifiers to enable authorizations for access to wireless networks, such as picocells. The present invention prevents the mobile user from maintaining a plurality of secrets such as user identifier/password pairs, PINs, or encryption keys, for access to each device to which he might require access.
摘要:
A method and system for enabling wireless devices to be paired or permanently associated by a user or a network administrator. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and associate the devices with eachother. This is extremely useful for associating a wireless headset with a telephone or associating a wireless mouse with a computer.
摘要:
A data processing system for accessing a host computer. A smart card is detected at the data processing system, which in turn queries the smart card for an indication of a location of user information. A secure channel is established with the location of user information. User information is retrieved associated with the smart card from the location. A connection is established to the host computer with the user information. Key to this invention is the ability to use this infrastructure for authentication when a smart card cannot be used at the data processing system.
摘要:
A system for scheduling meetings by matching a scheduler-defined meeting profile against a pool of virtual resources is provided. The system includes an electronic data storage comprising data defining a set of virtual resources, at least one property being associated with each resource. The system also includes a meeting profiler module that is configured to define a meeting profile which specifies one or more resources required for a meeting based upon received user input. The system further includes a profile-resource matching module that searches the data of the electronic data storage and matches elements of the set of virtual resources to the one or more resources required for the meeting defined by the meeting profiler module, and, based thereon, automatically generates at least one meeting schedule candidate.
摘要:
A method and system for enabling wireless devices distributed throughout an enterprise to be efficiently initialized for secure communications. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and initialize the wireless devices.