Inter-object messaging

Electrical computers and digital processing systems: interprogra – Interprogram communication using message – Object oriented message

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C719S330000, C719S314000

Reexamination Certificate

active

07055153

ABSTRACT:
A method of communication between a first object and a second object is disclosed. A first method call is made on an intermediary object from the first object. The first direct method call contains information regarding a location in memory of the intermediary object instead of a location in memory of the second object and a name of the method to be called on the second object. The name of the method to be called on the second object is delivered from the intermediary object to a message queue object. The name of the method to be called on the second object is accessed from the message queue object by the second object.

REFERENCES:
patent: 4325120 (1982-04-01), Colley et al.
patent: 5136716 (1992-08-01), Harvey et al.
patent: 5173939 (1992-12-01), Abadi et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5315657 (1994-05-01), Abadi et al.
patent: 5329619 (1994-07-01), Page et al.
patent: 5379426 (1995-01-01), Foss et al.
patent: 5396630 (1995-03-01), Banda et al.
patent: 5414852 (1995-05-01), Kramer et al.
patent: 5450593 (1995-09-01), Howell et al.
patent: 5485617 (1996-01-01), Stutz et al.
patent: 5539909 (1996-07-01), Tanaka et al.
patent: 5551035 (1996-08-01), Arnold et al.
patent: 5619710 (1997-04-01), Travis et al.
patent: 5742848 (1998-04-01), Burgess
patent: 5751962 (1998-05-01), Fanshier et al.
patent: 5758159 (1998-05-01), Collet
patent: 5758186 (1998-05-01), Hamilton et al.
patent: 5761421 (1998-06-01), Van Hoff et al.
patent: 5778222 (1998-07-01), Herrick et al.
patent: 5784560 (1998-07-01), Kingdon et al.
patent: 5822585 (1998-10-01), Noble et al.
patent: 5848234 (1998-12-01), Chernick et al.
patent: 5892946 (1999-04-01), Woster et al.
patent: 5941945 (1999-08-01), Aditham et al.
patent: 5999986 (1999-12-01), McCauley III et al.
patent: 6049838 (2000-04-01), Miller et al.
patent: 6192405 (2001-02-01), Bunnell
patent: 6192419 (2001-02-01), Aditham et al.
patent: 6278532 (2001-08-01), Heimendinger et al.
patent: 6282652 (2001-08-01), Scheifler
patent: 6425017 (2002-07-01), Dievendorff et al.
Black, Andrew P. “The Eden Programming Language.” Department of Computer Science, University of Washington. Technical Report Sep. 1, 1985.
Hsu, Felix Samson. “Reimplementing Remote Procedure Calls.” University of Washington, Mar. 22, 1985.
Bela Ban Dept. of Computer Science. “JavaGroups-Group Communication Patterns in Java”. Jul. 31, 1998, p. 1-16.
Designing object-oriented synchronous groupware with COAST. Christian Schuckman, Lutz Kirchner, Jan Schummer, Jorg M. Haake. IPSI—Integrated Publication and Information Systems Institute. GMD- German National Research Center for Information Technology. Darmstadt, Germany. pp. 1-11.
Session Management for Collaborative Applications. W. Keith Edwards. Graphics, Visualization & Usability Center; College of Computing. Georgia Institute of Technology. Atlanta, Georgia. pp. 323-330.
Generic and Composable Latesomer Accomodations Service for Cetrlized Shared Systems. Goopel Chung, Prasun Dewan & Sadagopan Rajaram. Department of Computer Science, University of North Carolina at Chapel Hill, NC. pp. 1-19.
The Web meets MOO's, IRC and the MBone. Nathan Mates, Mika Nystr&oumlm and Eve Schooler. Project Y Overview. pp. 1-13.
Girdley, Michael et al. “Web Programming with Java”, Jul. 1996.
Erdos, Marlena et al. “Security Reference Model for the Java Developer's Kit 1.0.2” Nov. 13, 1996.
Omg. “Cobra Security Draft”, Sep. 1995.
IBM Corp. 1994, “MQSeries Distributed Queue Management Guide”.
IBM Corp. 1993, “MQSeries Application Programming Guide”.
“Java Remote Method Invocation: Pure Java Distributed Computing”, Downloaded from http://java.sun.com/marketing/collateral/rmi—ds.html on Sep. 7, 2001, pp. 1-7.
“Component Object Model (COM), DCOM, and Related Capabilities”, Downloaded from http://www.sei.cmu.edu/str/descriptions/com—body.html on Sep. 7, 2001, pp. 1-11.
“Component-Based Software Development/COTS Integration”, Downloaded from http://www.sei.cmu.edu/str/descriptions/cbsd—body.html on Sep. 7, 2001, pp. 1-9.
“Middleware:Software Technology Review”, Downloaded from http://www/sei.cmu.edu/str/descriptions/middleware—body.html on Sep. 7, 2001, pp. 1-4.
“Remote Pocedure Call: Software Technology Review”, Downloaded from http://www.sei.cmu.edu/str/descriptions/rpc—body.html on Sep. 7, 2001, pp. 1-4.
“Object Request Broker: Software Technology Review”, Downloaded from http://www.sei.cmu.edu/str/descriptions/orb—body.html on Sep. 7, 2001, pp. 1-5.
“Using the Security Manager: Java Security”, Downloaded from http://www.google.com/search?q=cac . . . 2+and+%22socket+factories%22&hl=en on Aug. 27, 2001, pp. 1-19.
Yialelis, Nicholas, et al., “A Security Framework Supporting Domain Based Access Control in Distributed Systems,” Imperial College Research Report No. DoC 95/14, Sep. 15, 1995, 18 pages, Department of Computing, Imperial College, London, UK.
Yialelis, Nicholas, et al., “An Authentication Service Supporting Domain Based Access Control Policies,” Imperial College Research Report No. DoC 95/13, Sep. 15, 1995, 12 pages, Department of Computing, Imperial College, London, UK.
Lupu, Emil C., et al., “A Policy Based Role Framework For Access Control,” First ACM/NIST Role Based Access Control Workshop, Gaithersburg, USA, Dec. 1995, 9 pages, Department of Computing, Imperial College, London, UK.
Introduction to KeySAFE—Trusted Computer Base Components, Agorics, Inc., Los Altos, CA;7 pages; http://www.cis.upenn.edu/˜KeyKOS/agorics/KeyKos/keysafe/Keysafe.html and http://www.cis.upenn.edu/˜KeyKOS/agorics/KeyKos/keysafe/Trusted.html.
Van Doorn, Leendert, et al., “Secure Network Objects,” Vrije Universiteit, Amsterdam, The Netherlands, and Digital Systems Research Center, Palo Alto, California USA; 11 pages.
Dean, Drew, et al., “Java Security: From HotJava to Netscape and Beyond,” Department of Computer Science, Princeton University, Princeton, New Jersey; 11 pages.
Lampson, Butler W., “Protection” Xerox Corporation, Palo Alto, California; 10 pages.
Shoffner, Michael, et al., “Java and Web-Executable Object Security—How safe is safe?” Nov. 1996: Java and Web Security, Dr. Dobb's Software Tools for the Professional Programmer; 8 pages; http://www.ddj.com/print/documentID=13332.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Inter-object messaging does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Inter-object messaging, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Inter-object messaging will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3634999

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.