MESSAGE PROCESSING SYSTEM AND METHOD

    公开(公告)号:JPH0383153A

    公开(公告)日:1991-04-09

    申请号:JP21058090

    申请日:1990-08-10

    Applicant: IBM

    Abstract: PURPOSE: To realize a message processing system independent of language to be used which is used with an applicable work by combining information from a file corresponding to a prescribed message with information supplied from the applicable work, and generating a message by a message processor. CONSTITUTION: Message storages 14, 16, and 18 are set in a file to which access can be performed from a message processor 12, and different storage is set for each supported language. When an applicable work 10 calls the message processor 12, and transfers variable information included in a message, the message processor 12 fetches a message syntax and a fixed field from the appropriate storage, assembles and generates the messages by using the information from the storage and information presented by the calling applicable task. Thus, it is possible to realize a message processing system independent of the language to be used for the display of the message, which is used with the computer applicable task.

    ACCESS PERMISSION
    4.
    发明专利

    公开(公告)号:JPH02260060A

    公开(公告)日:1990-10-22

    申请号:JP3753490

    申请日:1990-02-20

    Applicant: IBM

    Abstract: PURPOSE: To control the number of users given access by forming a list of permitted users, and returning access permission to a requesting side only in the case where the list is scanned within the range of a depth parameter, and an identifier matches. CONSTITUTION: A CPU 1 contains application which is connected to terminals 17 to 23 through buses 9 to 15, and which can be executed in communication relation with one terminal on a down-load interface for a work station being accessed through the designated bus. The CPU 1 forms the list of the permitted users, and encodes the depth parameter N as the key of a CPU identifier and the function of an offset. In response to an application software request from the work station or the user, the list is accessed, and depth N is decoded by the key. Then, the list is scanned within the range of the depth N, and only when the identifier matches, the access permission is given to the requesting side.

Patent Agency Ranking