Transaction processing in a distributed data processing system

    公开(公告)号:GB2379039A

    公开(公告)日:2003-02-26

    申请号:GB0120370

    申请日:2001-08-22

    Applicant: IBM

    Abstract: A method of pre-processing a transaction within an application program in a distributed data processing system. The system comprises a network, a first computer system, a second computer system and a communication channel between the computer systems for communicating over the network. Each of the computer systems comprises a processor, memory for storing transactions and an operating system for executing the application program. Firstly, the first computer system sends a transaction, which is received by the second computer system. Next, the second computer system determines whether the transaction is current. If the transaction is current, the second computer system forwards the transaction for processing. If the transaction is not current, the second computer system sends software to the first computer system, in order to update the transaction. Once the first computer system has received the software, it applies the software to the transaction. In one embodiment, a first computer (eg a client) sends a transaction to a second computer (eg a server), the second computer checks to see if the transaction software version is current, if it is not then the second computer sends means for updating the transaction software to the first computer.

    A METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR ACCESS CONTROL

    公开(公告)号:CA2619229A1

    公开(公告)日:2007-02-15

    申请号:CA2619229

    申请日:2006-08-03

    Applicant: IBM

    Abstract: An access control method for a resource, the resource having associated a current authentication identifier for providing access to the resource, a previous authentication identifier and an incorrect authentication submissions limit, the method being responsive to receiving an authentication submission from an entity requesting access to the resource, wherein the authentication submission does not correspond to the current authentication identifier, the method comprising the steps of: preventing access to the resource by the requester; in response to a determination that the authentication submission does not correspond to the previous authentication identifier, and the incorrect authentication submissions limit is met, causing the current authentication identifier to become revoked; and in response to a determination that the authentication submission does correspond to the previous authentication identifier, maintaining the current authentication identifier for providing access to the resource.

    Transaction processing in a distributed data processing system

    公开(公告)号:GB2379039B

    公开(公告)日:2005-03-23

    申请号:GB0120370

    申请日:2001-08-22

    Applicant: IBM

    Abstract: A method of pre-processing a transaction within an application program in a distributed data processing system. The system comprises a network, a first computer system, a second computer system and a communication channel between the computer systems for communicating over the network. Each of the computer systems comprises a processor, memory for storing transactions and an operating system for executing the application program. Firstly, the first computer system sends a transaction, which is received by the second computer system. Next, the second computer system determines whether the transaction is current. If the transaction is current, the second computer system forwards the transaction for processing. If the transaction is not current, the second computer system sends software to the first computer system, in order to update the transaction. Once the first computer system has received the software, it applies the software to the transaction.

    Redrafting text strings using a vocabulary

    公开(公告)号:GB2503223A

    公开(公告)日:2013-12-25

    申请号:GB201210811

    申请日:2012-06-19

    Applicant: IBM

    Abstract: A method of redrafting rules being submitted into a rules database which replaces terms in the submitted rule with terms already found in a rules vocabulary or adds those terms to the rules vocabulary where a rule is submitted from a free form input and terms within the submitted rule are identified, the rules vocabulary is then searched for objects matching the terms and if the term is not found as an object then searching the rules vocabulary for attributes matching the terms the user then deciding either to use the terms found in searching or to add the terms to the rules vocabulary. Also disclosed is a method of determining semantic equivalence between a plurality of rules using a rules database having preferred terms, comprising: identifying at least one of objects, attributes, values, relationships or verbs in each of said plurality of rules; replacing each of said at least one of objects, attributes, values, relationships or verbs in each of said plurality of rules with a preferred term found in the rules database to form a plurality of respective amended rules; and comparing a first of said plurality of amended rules and a second of said plurality of amended rules to determine if they are equivalent (or near equivalent).

    Refining hierarchies in object-oriented models

    公开(公告)号:GB2505714A

    公开(公告)日:2014-03-12

    申请号:GB201216166

    申请日:2012-09-11

    Applicant: IBM

    Abstract: A Method and system for refining hierarchies in object-oriented models which comprise i) providing a business object model in the form of an object-oriented model having one or more members with multiple distinct verbalizations (synonyms); ii) identifying distinct verbalizations of a given business object model member; iii) reviewing existing rules of the business object model to produce mappings of the distinct verbalizations and any attributes or operations used in conjunction with the distinct verbalizations of members of the business object model; iv) analysing the mappings to identify patterns of use of the distinct verbalizations; and vi) categorising a distinct verbalization as a superclass or subclass. The step of producing mappings produces tuples of the form (a1, a2, and a3) wherein a1 is the distinct verbalization used, a2 is the attribute or operation used in conjunction with a1 and a3 is the number of occurrences of the combination of a1 and a2.

    6.
    发明专利
    未知

    公开(公告)号:BRPI0615153A2

    公开(公告)日:2011-05-03

    申请号:BRPI0615153

    申请日:2006-08-03

    Applicant: IBM

    Abstract: An access control method for a resource, the resource having associated a current authentication identifier for providing access to the resource, a previous authentication identifier and an incorrect authentication submissions limit, the method being responsive to receiving an authentication submission from an entity requesting access to the resource, wherein the authentication submission does not correspond to the current authentication identifier, the method comprising the steps of: preventing access to the resource by the requester; in response to a determination that the authentication submission does not correspond to the previous authentication identifier, and the incorrect authentication submissions limit is met, causing the current authentication identifier to become revoked; and in response to a determination that the authentication submission does correspond to the previous authentication identifier, maintaining the current authentication identifier for providing access to the resource.

    A method of processing a message received by a message server, and a message server

    公开(公告)号:GB2530533A

    公开(公告)日:2016-03-30

    申请号:GB201416921

    申请日:2014-09-25

    Applicant: IBM

    Abstract: A method of processing a message by a message server 2 (e.g. a stock quote decision making system) which comprises a query store 2d for storing query requests, value data for the query requests, and response time data for the query requests. The method comprises the steps of receiving a message, determining a query request from the message, and sending the query request to a query server 4a, 5a. A timeout period is determined from the response time data for the query request stored in the query store. In the case that no response to the query request is received within the timeout period, a value is determined from the value data for the query request stored in the query store. Alternatively, in the case that a response to the query request is received within the timeout period, a value is determined from the response, value data for the value is stored in the query store, and response time data for the period the response took to be received is stored in the query store. An action in response to the message is then determined using the value data.

    Node attribute validation in a network

    公开(公告)号:GB2505208A

    公开(公告)日:2014-02-26

    申请号:GB201214950

    申请日:2012-08-22

    Applicant: IBM

    Abstract: A method of operating a network of connected nodes comprises the steps of maintaining a trust value for each node in the network, maintaining one or more attributes for each node in the network, each attribute comprising a value and a respective confidence level, and performing a validation of a specific attribute of a specific node. The validation comprises the steps of querying nodes S1, S2 connected to the specific node for specific attribute values for the specific node, creating a results set S3 from the returned attribute values from the connected nodes and the trust values of the connected nodes, and processing the results set S4 according to a predefined algorithm to determine a new value and/or a new confidence level for the specific attribute of the specific node. The method provides a distributed validation of a nodes attribute, for example, by connected nodes, e.g. friends in a social network. Age is one example of the validated attribute wherein for some embodiments a high degree of confidence in the age value is required e.g. to provide access for the node to age-restricted services/information. The trust values of the nodes may be updated S5 in response to the returned attribute values e.g. in response to conflicting results indicating a node(s) providing bogus results compared to results supplied from nodes with high reliability/trust levels.

Patent Agency Ranking