Methods, apparati, and computer-readable media for updating proxy executable code. An apparatus embodiment of the present invention comprises generic universal proxy executable code that can be instantiated multiple times, with each instance being driven by a different set of files comprising a prot
Methods, apparati, and computer-readable media for updating proxy executable code. An apparatus embodiment of the present invention comprises generic universal proxy executable code that can be instantiated multiple times, with each instance being driven by a different set of files comprising a protocol specification file and a proxy activity code file, to control protocol decomposition and proxy functions, respectively. In a method embodiment of the present invention, a protocol specification is created or updated; proxy activity code, separate from the protocol specification, is created or updated; and the proxy executable code is executed using the protocol specification and the proxy activity code.
대표청구항▼
1. A computer program product having a non-transitory computer-readable storage medium having executable computer program instructions embodied therein for implementing a generic reusable computer proxy, the computer program product comprising computer program instructions for: identifying a protoco
1. A computer program product having a non-transitory computer-readable storage medium having executable computer program instructions embodied therein for implementing a generic reusable computer proxy, the computer program product comprising computer program instructions for: identifying a protocol specification associated with a given protocol, the protocol specification including non-executable data facilitating decomposition of the protocol, the non-executable data comprising information identifying a plurality of points in the protocol specification at which to execute proxy activity code;identifying proxy activity code comprising a plurality of elements configured to perform defined features of the protocol;identifying a protocol-code association specifying, for the identified points in the protocol specification, corresponding ones of the elements of the proxy activity code to invoke; andinstantiating at runtime the generic reusable computer proxy that invokes the specified elements of the proxy activity code at the corresponding identified points during decomposition of the protocol. 2. The computer program product of claim 1 wherein the protocol specification consists solely of the non-executable data and does not contain any executable code. 3. The computer program product of claim 1 wherein the proxy activity code consists solely of non-executable data and does not contain any executable code. 4. The computer program product of claim 1 wherein the protocol specification and the proxy activity code are updated independently of each other and independently of execution of the proxy. 5. The computer program product of claim 1 wherein the proxy activity code is written in a scripting language. 6. The computer program product of claim 1 wherein the protocol specification is generated by a protocol specification compiler. 7. The computer program product of claim 6 wherein an input to the protocol specification compiler is a protocol specification in a grammatical form. 8. The computer program product of claim 7 wherein the grammatical form is a grammar from the group of grammars comprising Backus-Naur Form (BNF), Extended Backus-Naur Form (EBNF), Augmented Backus-Naur Form (ABNF), natural language, regular expression, and a grammar understood by a software parser tool Lcx, Yacc, Gold, or Spirit. 9. The computer program product of claim 1 wherein the generic reusable computer proxy invokes the specified elements of the proxy activity code at the appropriate points of the decomposition of the protocol to provide a secure treatment of the protocol. 10. The computer program product of claim 1, the computer program product further comprising computer program instructions for: identifying second proxy activity code configured to perform defined features of the protocol, the second proxy activity code performing different activities than the first proxy activity code;wherein the protocol-code association additionally specifies, for the identified points in the protocol specification, elements of the second proxy activity code to invoke. 11. The computer program product of claim 1, wherein the protocol specification is a data file that represents a grammar defining the protocol. 12. A computer-implemented method for implementing a generic reusable computer proxy, said method comprising the steps of: identifying a protocol specification associated with a given protocol, the protocol specification including non-executable data facilitating decomposition of the protocol, the non-executable data comprising information identifying a plurality of points in the protocol specification at which to execute proxy executable code;identifying proxy activity code comprising a plurality of elements configured to perform defined features of the protocol;identifying a protocol-code association specifying, for the identified points in the protocol specification, corresponding ones of the elements of the proxy activity code to invoke; andinstantiating at runtime the generic reusable computer proxy that invokes the specified elements of the proxy activity code at the corresponding identified points during decomposition of the protocol. 13. The method of claim 12 wherein the protocol-code association consists solely of non-executable data and does not contain any executable code. 14. The method of claim 12 wherein the protocol specification and the proxy activity code are updated independently of each other and independently of execution of the proxy. 15. The method of claim 12 wherein the proxy activity code is written in a scripting language. 16. The method of claim 12 wherein the protocol specification is generated by a protocol specification compiler. 17. The method of claim 16 wherein an input to the protocol specification compiler is a protocol specification in a grammatical form. 18. The method of claim 17 wherein the grammatical form is a grammar from the group of grammars comprising Backus-Naur Form (BNF), Extended Backus-Naur Form (EBNF), Augmented Backus-Naur Form (ABNF), natural language, regular expression, and a grammar understood by a software parser tool. 19. The method of claim 12 wherein the computer proxy invokes the specified elements of the proxy activity code at the appropriate points of the decomposition of the protocol to provide a secure treatment of the protocol. 20. A computer system comprising: a computer processor; anda computer program product having a computer-readable storage medium having computer program instructions executable by the computer processor embodied therein for implementing a generic reusable computer proxy, the computer program product comprising computer program instructions for: identifying a protocol specification associated with a given protocol, the protocol specification including non-executable data facilitating decomposition of the protocol, the non-executable data comprising information identifying a plurality of points in the protocol specification at which to execute proxy activity code;identifying proxy activity code comprising a plurality of elements configured to perform defined features of the protocol;identifying a protocol-code association specifying, for the identified points in the protocol specification, corresponding ones of the elements of the proxy activity code to invoke; andinstantiating at runtime the generic reusable computer proxy that invokes the specified elements of the proxy activity code at the corresponding identified points during decomposition of the protocol. 21. The computer system of claim 20 wherein the protocol specification consists solely of the non-executable data and does not contain any executable code. 22. The computer system of claim 20 wherein the proxy activity code consists solely of non-executable data and does not contain any executable code. 23. The computer system of claim 20 wherein the protocol specification and the proxy activity code are updated independently of each other and independently of execution of the proxy. 24. The computer system of claim 20 wherein the protocol specification is generated by a protocol specification compiler, and wherein an input to the protocol specification compiler is a protocol specification in a grammatical form. 25. The computer system of claim 24 wherein the grammatical form is a grammar from the group of grammars comprising Backus-Naur Form (BNF), Extended Backus-Naur Form (EBNF), Augmented Backus-Naur Form (ABNF), natural language, regular expression, and a grammar understood by a software parser tool. 26. The computer system of claim 20, wherein the generic reusable computer proxy invokes the specified elements of the proxy activity code at the appropriate points of the decomposition of the protocol to provide a secure treatment of the protocol.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (70)
Bau, III,David; Bosworth,Adam; Burd,Gary S.; Chavez,Roderick A.; Marvin,Kyle W., Annotation based development platform for asynchronous web services.
Chess David M. (Mohegan Lake NY) Kephart Jeffrey O. (Yorktown Heights NY) Sorkin Gregory B. (New York NY), Automatic analysis of a computer virus structure and means of attachment to its hosts.
Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
Gladney Henry M. (Saratoga CA) Lorch Douglas J. (San Jose CA) Mattson Richard L. (San Jose CA), Communication for version management in a distributed information service.
Leblang David B. (Wayland MA) McLean ; Jr. Gordon (Acton MA) Spilke Howard (Shrewsbury MA) Chase ; Jr. Robert P. (Boston MA), Computer device for aiding in the development of software system.
Koser Leonard William ; Manges Mary Christine ; Ring Frances Mary ; Rogers Cynthia Ann ; Snyder Michael John ; Vriezen John Joseph, Computer system with downward compatibility function.
Fitzgerald Albion J. (Ridgewood NJ) Fitzgerald Joseph J. (New Paltz NY), Distributed computer network including hierarchical resource information structure and related method of distributing re.
Leblang David B. (Wayland MA) Allen Larry W. (Cambridge MA) Chase ; Jr. Robert P. (Newton MA) Douros Bryan P. (Framingham MA) Jabs David E. (Sudbury MA) McLean ; Jr. Gordon D. (Brookline MA) Minard D, Dynamic rule-based version control system.
Smith Steven P. (Issaquah) Padawer Andrew D. (Redmond) Jones David T. (Preston) Whitten Gregory F. (Bellevue) Wittenberg Craig H. (Redmond WA), Incremental compiler.
Kirouac Donald L. (Thornhill CAX) Porrett William A. (Unionville CAX) Czerwinski Marek J. (Scarborough CAX), Method and apparatus for updating software at remote locations.
Fletcher, James C.; Lidquist, David B.; Wanderski, Michael C.; Wesley, Ajamu A., Programmatic management of software resources in a content framework environment.
Fletcher, James C.; Lindquist, David B.; Wanderski, Michael C.; Wesley, Ajamu A., Programmatic management of software resources in a content framework environment.
Novick Yoram,ILX ; Pinter Ron Yair,ILX ; Rodeh Michael,ILX ; Wecker Alan Jay,ILX, Programming aid for enabling a computer program in source code form to be viewed using a general purpose document brows.
Shing Norman (New Hyde Park NY) Erlikh Leonid (Brooklyn NY) Lim Nicholas R. (London NJ GB2) Lambert Jeffrey L. (East Brunswick NJ) Moskowitz Joel M. (New York NY) Wadhwa Vivek K. (Paramus NJ) Hughes , Software distribution system to build and distribute a software release.
Morris Robert J. T. (Los Gatos CA), System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing.
Beasley Dale E. (Flower Mound TX) Kennedy ; III William C. (Dallas TX) Westerlage Kenneth R. (Fort Worth TX), System and method for remote patching of operating code located in a mobile unit.
Chen Yih-Farn Robin (Bridgewater NJ) Rosenblum David Samuel (Maplewood NJ) Vo Kiem-Phong (Berkeley Heights NJ), System and method for selecting test units to be re-run in software regression testing.
Aronberg David B. ; Goldman Dov J. ; Spiro Peter A., System and method for software distribution and desktop management in a computer network environment.
Heath Clifford,AUX ; Port Graeme,AUX ; Klos Steven ; Greenhill Graeme, Systems and methods for automatic application version upgrading and maintenance.
McGrath Timothy ; Jasper John ; Herbst James, Update transactions and method and programming for use thereof for incrementally updating a geographic database.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.