-
公开(公告)号:WO2004070494A3
公开(公告)日:2005-07-07
申请号:PCT/EP2004050044
申请日:2004-01-27
Applicant: IBM , IBM DEUTSCHLAND
Inventor: GILFIX MICHAEL , MALCOLM JERRY , OKUNSEINDE FOLUSO , STADING TYRON , WILLIAMSON PAUL , WINTERS SCOTT
CPC classification number: G06F9/541
Abstract: Software application integration, including constructing an application integration adapter where the constructing is carried out in dependence upon a profile. The profile includes data describing the adapter. Embodiments include communicating integration messages among applications through the adapter. Profiles include identifications of at least two communications transports, including configuration parameters for the data communications transports. In typical embodiments, constructing an application integration adapter includes creating the transports identified in the adapter profile, and configuring the transports in accordance with the configuration parameters.
Abstract translation: 软件应用程序集成,包括根据配置文件构建构建应用程序集成适配器。 配置文件包括描述适配器的数据。 实施例包括通过适配器在应用之间传送集成消息。 配置文件包括至少两个通信传输的标识,包括数据通信传输的配置参数。 在典型的实施例中,构建应用集成适配器包括创建在适配器简档中识别的传输,并且根据配置参数配置传输。
-
公开(公告)号:DE602005017254D1
公开(公告)日:2009-12-03
申请号:DE602005017254
申请日:2005-02-22
Applicant: IBM
Inventor: OKUNSEINDE FOLU , STADING TYRON
IPC: H04L29/06
Abstract: A method and apparatus is presented for providing transaction-level security. The method comprises determining security information associated with at least one object of a transaction and determining if a remote device is capable of providing a level of security indicated by at least a portion of the security information. The method further comprises transmitting the object to the remote device in response to determining that the remote device is capable of providing the level of security.
-
公开(公告)号:AT446639T
公开(公告)日:2009-11-15
申请号:AT05716766
申请日:2005-02-22
Applicant: IBM
Inventor: OKUNSEINDE FOLU , STADING TYRON
IPC: H04L29/06
Abstract: A method and apparatus is presented for providing transaction-level security. The method comprises determining security information associated with at least one object of a transaction and determining if a remote device is capable of providing a level of security indicated by at least a portion of the security information. The method further comprises transmitting the object to the remote device in response to determining that the remote device is capable of providing the level of security.
-
-