Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Java servlet" patented technology

A Java servlet is a Java software component that extends the capabilities of a server. Although servlets can respond to many types of requests, they most commonly implement web containers for hosting web applications on web servers and thus qualify as a server-side servlet web API. Such web servlets are the Java counterpart to other dynamic web content technologies such as PHP and ASP.NET.

System and method for merging security constraints when using security annotations

A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints. These merged security constraints are then applied to process a request being handled by the application server.
Owner:IBM CORP

HTML5-based remote desktop access system and remote desktop access method

The invention discloses an HTML5-based remote desktop access system and a remote desktop access method based on the system. The system comprises HTDesktop clients, HTML5 browsers, an HT remote desktop server and remote desktops, wherein the HT remote desktop server comprises Java Servlet containers and HT desktop proxy services, the HTDesktop clients communicate with the remote desktops via the HT desktop proxy services by use of an HT desktop protocol; and the Java Servlet containers communicate with the remote desktops via the HT desktop proxy services by use of the HT desktop protocol. The method comprises the following steps: 1, the HTML5 browsers establish links with the Java Servlet containers, and the Java Servlet containers forward HT desktop protocol instructions from the HTML5 browsers; 2, the HT desktop proxy services, according to information of the remote desktops, convert the HT desktop protocol instructions into instructions corresponding to the remote desktops; and 3, the HT desktop proxy services forward screen data of the remote desktops to the front HTML5 browsers. The system and method provided by the invention have the advantages of convenience in use, good user experience, higher work efficiency, facilitated maintenance of existing remote desktops and the like.
Owner:恒泰艾普(北京)云技术有限公司

System and method for merging security constraints when using security annotations

A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints. These merged security constraints are then applied to process a request being handled by the application server.
Owner:INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products