-
公开(公告)号:DE112011100536T5
公开(公告)日:2013-01-31
申请号:DE112011100536
申请日:2011-04-07
Applicant: IBM
Inventor: PENFOLD COLIN RONALD , JOHNSON PAUL
IPC: G06F11/36 , G06F9/46 , G06F11/273
Abstract: Verfahren zum Bearbeiten einer Arbeitseinheit in einem Transaktionsverarbeitungssystem, wobei das System Folgendes umfasst: einen oder mehrere Produktionsbereiche, die ein Mindestmaß an oder keine Diagnosefunktionen verwenden, und einen oder mehrere Diagnosebereiche, die ein Höchstmaß an oder vollständige Diagnosefunktionen verwenden. Das Verfahren umfasst die folgenden Schritte: Empfangen einer Arbeitseinheit, Weiterleiten des Verarbeitungsvorgangs an einen Produktionsbereich, Empfangen einer Benachrichtigung, dass der Verarbeitungsvorgang fehlgeschlagen ist, und Weiterleiten des Verarbeitungsvorgangs an einen Diagnosebereich.
-
公开(公告)号:GB2366399B
公开(公告)日:2005-02-16
申请号:GB0021006
申请日:2000-08-26
Applicant: IBM
Inventor: OSBORNE ANDREW JAMES , PENFOLD COLIN RONALD
-
公开(公告)号:GB2523350A
公开(公告)日:2015-08-26
申请号:GB201403065
申请日:2014-02-21
Applicant: IBM
Inventor: PENFOLD COLIN RONALD , FLAMINI ELISABETTA
Abstract: A federated group of transaction servers (720-745, Figure 1) provide a collaborative environment for processing online transaction requests by establishing a trust relationship to allow single sign on. A security token associated with a transaction request 900 is received and validated 905, security information being extracted from the security token on validation 910 to validate the transaction request. An outcome of the validation is placed into read only data objects 920 and a transaction server is notified of the read only data object for authorising processing of the transaction request. The data objects may be a managed storage area that can hold any form of application data and they may be shared with programs and/or transaction servers across a secure transaction channel 925-935 e.g. a shared area of memory. The security token may be issued by an identity provider.
-
公开(公告)号:GB2493242A
公开(公告)日:2013-01-30
申请号:GB201210245
申请日:2011-04-07
Applicant: IBM
Inventor: PENFOLD COLIN RONALD , JOHNSON PAUL
Abstract: A method of handling a unit of work in a transaction processing system, in which the system comprises one or more production regions operating minimal or no diagnostic functions and one or more diagnostic regions operating maximal or full diagnostic functions. The method comprises the steps of receiving a unit of work, routing the work to a production region, receiving a notification that the work has failed, and routing the work to a diagnostic region.
-
公开(公告)号:GB2523331A
公开(公告)日:2015-08-26
申请号:GB201402992
申请日:2014-02-20
Applicant: IBM
Inventor: FLAMINI ELISABETTA , PENFOLD COLIN RONALD
Abstract: Performing attribute-based access control across a first and a second security domain in a federated distributed processing environment, comprising receiving a security token, from a service provider in a first security domain, extracting access control attributes from the received security token, receiving from an identity provider in the second security domain access control information associated with a request to process the online transaction in the second security domain and mapping the access control information into access control attributes compatible with the format of the access control attributes of the received security token. Then appending the mapped attributes to the received security token to create a modified security token and signing, with a certificate, the modified security token and issuing the modified security token for consuming by a service provider. The token maybe a security assertion markup language (SAML) token used for exchanging authentication and authorization data about a user between service providers.
-
公开(公告)号:GB2366399A
公开(公告)日:2002-03-06
申请号:GB0021006
申请日:2000-08-26
Applicant: IBM
Inventor: OSBORNE ANDREW JAMES , PENFOLD COLIN RONALD
Abstract: A system and method of recognising command related items in a body of object code, such as command names and/or associated option names involves entering a list of required command names and/or option names in programming language form into a filter table. The object code is then scanned for all bit strings potentially representing command names and identifying such names. For each potential command name, succeeding bits are then examined for bits which represent valid options for each said command name so as to further confirm the identity of commands having valid combinations of command names and/or options. Optionally, the command/option syntax may also be checked. The candiate commands, including options, now identified in programming language form are then compared with the entries in the filter table to determine whether or not they match the required list, which may be further refined by use of logical operators.
-
-
-
-
-