摘要:
A method, system, and computer usable program product for providing consistent cryptographic operations in a data processing environment using protected structured data objects are provided in the illustrative embodiments. A data input is received from an originating application by a security plug-in, both the application and the security plug-in executing in the data processing system. A security schema object is received by the security plug-in, the security schema object describing a sequence of cryptographic operations, wherein the security schema object includes a plurality of components each component describing an aspect of the cryptographic operations. The data input is transformed into a secure structured data object by the security plug-in using the sequence of cryptographic operations. A property of the secure structured data object is populated using data about the security schema object. The secure structured data object is transmitted to a consumer application.
摘要:
A method, system, and computer usable program product for providing consistent cryptographic operations in a data processing environment using protected structured data objects are provided in the illustrative embodiments. A data input is received from an originating application by a security plug-in, both the application and the security plug-in executing in the data processing system. A security schema object is received by the security plug-in, the security schema object describing a sequence of cryptographic operations, wherein the security schema object includes a plurality of components each component describing an aspect of the cryptographic operations. The data input is transformed into a secure structured data object by the security plug-in using the sequence of cryptographic operations. A property of the secure structured data object is populated using data about the security schema object. The secure structured data object is transmitted to a consumer application.
摘要:
Providing consistent cryptographic operations across several applications using secure structured data objects includes a security middleware component, using an application programming interface, receiving a data input from an originating application operating in application space. Both the application and the middleware component execute in the data processing system. A security schema object is retrieved by the security middleware component from an object store, the security schema object describing a sequence of cryptographic operations and includes several components describing aspects of the cryptographic operations. The data input is transformed from a first format to a second format where one of the formats is a secure structured data object formed using the sequence of cryptographic operations. A property of the secure structured data object contains data about the security schema object. The data input is transmitted in the second format to a consumer application operating in application space.
摘要:
Providing consistent cryptographic operations across several applications using secure structured data objects includes a security middleware component, using an application programming interface, receiving a data input from an originating application operating in application space. Both the application and the middleware component execute in the data processing system. A security schema object is retrieved by the security middleware component from an object store, the security schema object describing a sequence of cryptographic operations and includes several components describing aspects of the cryptographic operations. The data input is transformed from a first format to a second format where one of the formats is a secure structured data object formed using the sequence of cryptographic operations. A property of the secure structured data object contains data about the security schema object. The data input is transmitted in the second format to a consumer application operating in application space.
摘要:
Embodiments of the invention relate to the automated processing of web tasks to provide information relevant to user tasks based on past user actions and web histories. An aspect of the invention includes a system for automating the processing of web tasks in response to user requests. The system may include a transport router that receives a user task from a transport such as a short messaging system (SMS), an email system, or a telephone system. The system may further include a web task synthesizer that generates a sequence of actions to accomplish the task, typically in the form of a script for execution by a browser automation server. The script is based on past user actions, logs, and web browsing histories. The system compiles the most relevant information from the visited web pages and returns the results to the user.
摘要:
Embodiments of the invention relate to the automated processing of web tasks to provide information relevant to user tasks based on past user actions and web histories. An aspect of the invention includes a system for automating the processing of web tasks in response to user requests. The system may include a transport router that receives a user task from a transport such as a short messaging system (SMS), an email system, or a telephone system. The system may further include a web task synthesizer that generates a sequence of actions to accomplish the task, typically in the form of a script for execution by a browser automation server. The script is based on past user actions, logs, and web browsing histories. The system compiles the most relevant information from the visited web pages and returns the results to the user.