BEA Systems, Inc. Patent applications |
Patent application number | Title | Published |
20110125760 | USING TAGS IN AN ENTERPRISE SEARCH SYSTEM - An interface can allow for associating documents with tags. A search system can use connections between the tags and documents to determine search-independent rank values for the documents. The search-independent rank values can be combined with term matching indications to get a total relevance of the document. | 05-26-2011 |
20110047611 | User Role Mapping in Web Applications - Roles and policies are used to provide display and access to data in a flexible manner. Users and/or web applications can be mapped to user roles that dictate which displays or other application resources are available to the user or application. Roles are assigned to web applications individually, allowing for user roles to be used without requiring an independent mapping of users to roles. In some cases, application roles can be centrally managed, so that presentation systems also avoid the need for an independent mapping of user or application roles. | 02-24-2011 |
20110029811 | SYSTEM AND METHOD FOR SUPPORTING COMPENSATION WORK - A method for supporting compensation work comprises the steps of associating a data structure with a compensation function, and associating the data structure with the at least one event that can be encountered during execution of a forward work. The data structure contains a pair of pointers, which includes a first pointer to a code to be executed for the compensation function, and a second pointer to a stack frame of a closest lexically enclosing scope of a declaration of the compensation function in a computer program text. | 02-03-2011 |
20110023095 | SYSTEM AND METHOD FOR SUPPORTING SECURITY ADMINISTRATION - A transactional server is configured to receive a transactional procedure call from a client to initiate one or more transaction processes. Said transactional server includes a Lightweight Directory Access Protocol (LDAP) authentication server which is configured to forward the transactional procedure call from the transactional server to a distributed authentication server for authentication. When the transactional procedure call to initiate a transaction is received at the transactional server, the LDAP authentication server identifies a user associated with the transactional procedure call, determines that the distributed authentication server should authenticate the user, and initiates an LDAP session between the transactional server and the distributed authentication server. Then, after receiving from the distributed authentication server corresponding user information, the LDAP authentication server creates a token reflecting an authentication result based on the corresponding user security information, which is subsequently used to authenticate the client to participate in the transaction. | 01-27-2011 |
20110016203 | SYSTEM AND METHOD FOR ACHIEVING SCALABILITY IN DOMAIN COMPUTING - A connection management system can achieve scalability for domain computing among a plurality of domains. Each of the plurality of domains comprises a collection of machines and resources that are administrated as a unit. A connection concentrator can connect, and support communication between, a plurality of processes in a first domain and a plurality of processes in a second domain. The connection concentrator uses one connection to communicate with any one of the plurality of processes in the first domain, and can communicate with each one of the plurality of processes in the second domain. | 01-20-2011 |
20100251131 | SYSTEM AND METHOD FOR REUSING CONTROL TREE - A portal containing a plurality of controls that are represented by a meta control hierarchy representing, wherein each node in the meta control hierarchy holds information of one of the plurality of controls. Upon receiving a request from a user for rendering of the portal, a control hierarchy can be created based on the meta control hierarchy. A portal managing component is operable to retrieve a portion of the meta control hierarchy from a cache and create the remaining portion of the meta control hierarchy that does not exist in cache from an XML markup file of the portal. | 09-30-2010 |
20100242022 | SYSTEM AND METHOD FOR MANAGING CROSS PROJECT DEPENDENCIES AT DEVELOPMENT TIME - A method for responding to a change in source code, said method comprising: interconnecting a plurality of nodes to form a graph data structure wherein the graph embodies at least one dependency between a plurality of software projects; traversing the graph to identify dependent code affected by the change; evaluating the identified dependent code; and wherein the changed source code is from a first software project and the identified dependent code is from a second software project. | 09-23-2010 |
20100205263 | SIP SERVER ARCHITECTURE FOR IMPROVING LATENCY DURING MESSAGE PROCESSING - Systems and methods are provided for improving latency during message processing in a network environment via the use of SIP server architecture. The SIP server can be comprised of an engine tier and a state tier distributed on a cluster network. The engine tier can send and receive messages and execute various processes. The state tier can maintain in-memory state data associated with various SIP sessions. The state tier can store various long lived data objects and the engine tier can contain short lived data objects. The state data can be maintained in partitions comprised of state replicas. When processing messages, the engine can pull state data objects from the state tier, use the objects and push them back to the state tier after processing is complete. If one state replica is unavailable, such as during garbage collection, the engine can retrieve the objects from another replica in the partition. | 08-12-2010 |
20100174944 | COMPOSITE TASK FRAMEWORK - A primary task manager, which is a local task manager, can perform a distributed task on a local server. If the performing of the task with the local task manager succeeds, the distributed task can then be propagated to at least one secondary task manager, which is a remote task manager. The remote task manager is capable of performing the distributed task. If the performing of the task with the local task manager fails, an undo task that is associated with the distributed task can be performed. | 07-08-2010 |
20100100624 | PARALLEL TRANSACTION EXECUTION WITH A THREAD POOL - A method for using available server threads to process resources and reduce the overall time of performing XA interactions in two-phase commit protocol implemented by the transaction manager. A TM processing XA interactions dispatches interaction commands for multiple resources to a thread manager, which dispatches the commands to idle server threads. In one embodiment, the TM attempts to dispatch all but one of the interaction commands to separate threads. The primary thread then processes the remaining resource command. Any commands relating to dispatch requests that were unable to be dispatched to separate threads due to unavailability are processed by the primary thread. Once the primary server has processed its interaction commands and received a signal indicating the threads receiving dispatch requests have completed their respective processing of dispatched commands, the next group of commands is processed in a similar manner. | 04-22-2010 |
20090300656 | MOBILE APPLICATIONS - Providing a framework for developing, deploying and managing sophisticated mobile solutions, with a simple Web-like programming model that integrates with existing enterprise components. Mobile applications may consist of a data model definition, user interface templates, a client side controller, which includes scripts that define actions, and, on the server side, a collection of conduits, which describe how to mediate between the data model and the enterprise. In one embodiment, the occasionally-connected application server assumes that data used by mobile applications is persistently stored and managed by external systems. The occasionally-connected data model can be a METAdata description of the mobile application's anticipated usage of this data, and be optimized to enable the efficient traversal and synchronization of this data between occasionally connected devices and external systems. | 12-03-2009 |
20090292877 | EVENT SERVER USING CACHING - An event server adapted to receive events from an input stream and produce an output event stream. The event server uses a processor using code in an event processing language to process the events. The event server obtaining input events from and/or producing output events to a cache. | 11-26-2009 |
20090292759 | EVENT SERVER USING CLUSTERING - An event server receiving input streams of events and producing output streams of events is adapted to be clustered with other event servers. The event server uses configuration data to control the event processing. The event server multicasting updates of the configuration data to the other event servers of the cluster and receiving multicasted configuration updates from one of the other event servers of the cluster. | 11-26-2009 |
20090271505 | SYSTEM AND METHOD FOR EXECUTING THIRD PARTY MODULE WITH WEB SERVERS - A computer-implemented system that can support executing a third party module with Web Servers comprises one or more web server instances, a third party module that interacts with the one or more web server instances, and an execution environment that contains a web server wrapper instance that can encapsulate a web server instance of the one or more web server instances. The web server wrapper instance is associated with a web server configuration tool that can configure the one or more web server instances based on the third party module. | 10-29-2009 |
20090271498 | SYSTEM AND METHOD FOR LAYERED APPLICATION SERVER PROCESSING - A system and method for layered application server processing. Embodiments of the system are particularly useful in extreme transaction processing (XTP) environments to support hundreds of thousands of simultaneous users, and perhaps millions of simultaneous transactions. Applications can be built from service components. Mashups can be performed on applications, services, and data, to create a more dynamic form of application. Data center consolidation and server virtualization techniques can be used to distribute applications over multiple machines or data centers. A horizontal Operating System (OS) fabric is then used to integrate components of the data centers in a dynamic fashion, including for example integrating portal or Service Component Architecture (SCA) components into personality profiles that can be federated over many (e.g. thousands) of Java machines and data centers. The net result is that the system can be quickly and dynamically modified or distributed over different machines and different applications, even over distances of different continents, to respond to the immediate needs of the enterprise. | 10-29-2009 |
20090259715 | SYSTEM AND METHOD FOR CLIENT INTEROPERABILITY - Disclosed herein is a system and method for client interoperability. In one embodiment, a method for client interoperability comprises establishing a network connection between a client and a proxy. The client requests a connection factory from the proxy. The proxy then obtains the connection factory from an application server using a Java Naming and Directory Interface (JNDI). Using the connection factory, a connection to a connection host from the client is created. When the client sends a message, the proxy receives the message and routes the message to a destination server. Similarly, when the client receives a message, the proxy receives the message from a destination server and passes the message to the client. The client can be specifically configured to extend JMS operability to a desired language. In one embodiment the client is a .NET client. | 10-15-2009 |
20090222295 | METHOD FOR MANAGING AN INFORMATION TECHNOLOGY SERVICE ACCOUNT - A method to manage an information technology service account comprises engaging a customer to establish the information technology service account and engaging in four phases of management. In the reactive phase, the steps of training the customer on support and assessing technical needs of the customer are performed. In the proactive phase, the steps of establishing a problem reporting procedure, deploying the problem reporting procedure to the customer, identifying known issues of the information technology service account based at least in part on the problem reporting procedure, identifying solutions to the identified known issues are performed. In the planning phase, the steps of determining additional or substitutive tools for the information technology service account based on the problem reporting procedure, querying product releases of the customer, querying technology roadmap of the customer, determining additional or substitutive tools based on the product releases and technology roadmap are performed. In the maintenance phase, the steps of collecting customer feedback data, and determining modification of one or both of steps of the previous phases and one or more tools based on the customer feedback data. | 09-03-2009 |
20090210631 | MOBILE APPLICATION CACHE SYSTEM - Providing a framework for developing, deploying and managing sophisticated mobile solutions, with a simple Web-like programming model that integrates with existing enterprise components. Mobile applications may consist of a data model definition, user interface templates, a client side controller, which includes scripts that define actions, and, on the server side, a collection of conduits, which describe how to mediate between the data model and the enterprise. In one embodiment, the occasionally-connected application server assumes that data used by mobile applications is persistently stored and managed by external systems. The occasionally-connected data model can be a METAdata description of the mobile application's anticipated usage of this data, and be optimized to enable the efficient traversal and synchronization of this data between occasionally connected devices and external systems. | 08-20-2009 |
20090198899 | SYSTEM AND METHOD FOR TRANSACTIONAL CACHE - A computer-implemented method and system to support transactional caching service comprises configuring a transactional cache that are associated with one or more transactions and one or more work spaces; maintaining an internal mapping between the one or more transactions and the one or more work spaces in a transactional decorator; getting a transaction with one or more operations; using the internal mapping in the transactional decorator to find a work space for the transaction; and applying the one or more operations of the transaction to the workspace associated with the transaction. | 08-06-2009 |
20090183150 | SYSTEM AND METHOD FOR SOFTWARE PRODUCT VERSIONING PACKAGING, DISTRIBUTION, AND PATCHING - A system and method for software product versioning, packaging, distribution, and patching. The system provides for convergence of registry models, adding critical information to a home registry and simplifying processing algorithms in the install framework. In accordance with an embodiment, a product alias element is added to a Product Provisioning model, referencing one or more products. This provides a loose coupling between the external market-oriented product name and version, and the internal product names and versions. The internal product names and versions are captured in the registry and used for all code-based decisions during installation and other provisioning related activities. In accordance with an embodiment, a Feature Model is also added to the Product Provisioning model, and modules are grouped under features. | 07-16-2009 |
20090178111 | SYSTEM AND METHOD FOR MAINTAINING SECURITY IN A DISTRIBUTED COMPUTER NETWORK - A system for maintaining security in a distributed computing environment comprises a policy manager located on a server to maintain policy data files and distribute local security policies to a plurality of clients, and a plurality of application guards, wherein each application guard is located at one of the plurality of clients to manage access by individual transactions to at least one application associated with the application guard, wherein the application guard controls access to the application based on a local security policy received from the policy manager. | 07-09-2009 |
20090172094 | Connection Pool and Prepared Statement Cache - An improved resource pool is provided that provides for dynamic configuration and is comprised of code that is configured to be used for different subsystems, including JDBC, Connector, and JMS subsystems. Pool maintenance, resource object creation and timeout, multiple deque management, and pool state transition features are provided. An application server may include at least one resource pool object, wherein each resource pool object represents a resource pool in the application server. An improved prepared statement cache is also provided that works in conjunction with the resource pool implementation to more effectively provide for prepared statement processing. | 07-02-2009 |
20090150502 | SYSTEM AND METHOD FOR HYPERTEXT TRANSFER PROTOCOL PUBLISH AND SUBSCRIBE SERVER - A system and method for providing a publish and subscribe server that includes channels to allow web based clients to send and receive asynchronous messages. In accordance with an embodiment, the system provides a Hypertext Transfer Protocol (HTTP) publish and subscribe (pub/sub) server that includes a channels-based means to allow web based clients to send and receive asynchronous messages over HTTP, including in some embodiments messages published by a JMS provider. | 06-11-2009 |
20090144728 | MODULE BASED SOFTWARE SYSTEM LINKING RUNTIME TO INSTALL TIME - A software product can comprise multiple components. At least one component comprising multiple feature sets. The feature sets can each define multiple OSGi bundles. The installation can include installing the OSGi bundles as indicated by the feature sets. The runtime can include loading the OSGi bundles as indicated by the feature sets. | 06-04-2009 |
20090144727 | INTERPRETED MULTIPLE PRODUCT INSTALLATION - An installer can do a combined installation of multiple software products. The installer can do a combined pre-install phase, a combined install phase, and a combined post-install phase for the multiple software products. | 06-04-2009 |
20090144726 | USE OF ALIASING IN AN INSTALLER - An installer can use an alias to indicate a combined software program. The combined program can include multiple software products. The software products can each be independently runnable. The alias can be used by the installer system to install the multiple software products automatically. | 06-04-2009 |
20090144716 | PATCH ATTACHMENT FACILITY - A computer-based system can comprise a patch management system to a load patch to a software program; and an installer to install components of the software program. The installer can interpret metadata to instruct the patch management system to automatically load the patch to the software program. | 06-04-2009 |
20090138856 | SYSTEM AND METHOD FOR SOFTWARE PERFORMANCE TESTING AND DETERMINING A FRUSTRATION INDEX - A system and method for determining a frustration index for a software suite based upon the measurements of the software's performance. The frustration index communicates the overall state of a customer's performance-related user experience as defined by a set of testing criteria and specified testing scenarios. Actual test measurements of one or more pre-specified criteria in one or more pre-specified testing scenarios or operating environments are first received, calculated or otherwise determined. Priority weights are provided for each of the pre-specified criteria in each of the pre-specified testing scenarios. Actual test measurements are then compared to target quantities, to provide a delta percentage between the actual measurements and the target quantities. The frustration index (or indices) is calculated as the result of a ratio of the delta percentage between the actual and the target to the priority weight of the criterion. | 05-28-2009 |
20090138792 | SYSTEM AND METHOD FOR EXTENDING AD HOC INFORMATION AROUND STRUCTURED DATA - Systems and methods for extending ad hoc information around structured data. The method for one embodiment comprises several steps. One step is creating a web interface for structured data. One step is combining the structured data through the web interface with unstructured data, wherein one or more users can collaborate to combine the structured data through the web interface with the unstructured data without administrative approval. One step is producing groups of pages extending ad hoc information around the structured data, wherein versions of the groups of pages are tracked. | 05-28-2009 |
20090132801 | CONFIGURATION MANAGEMENT FOR REAL-TIME SERVER - A Realtime Event Server comprising a component to operate on data from data streams; and a configuration system adapted to supply configuration for the realtime event server, the configuration including dynamic configuration, the dynamic configuration being changeable without restarting the component. | 05-21-2009 |
20090132692 | SYSTEM AND METHOD FOR STARTING SERVER SERVICES - In one embodiment, services are not loaded if they are not needed by the user and if no services needed by the user are dependent upon them. In one embodiment, server services are represented as nodes in a graph data structure. Connections between the nodes indicate dependencies between the server services. The graph is sorted to create an ordered list of services which can be used to startup the services. In another embodiment a server services manager reads license files and user inputs and marks the ordered list of services to indicate which services are to startup. | 05-21-2009 |
20090125881 | SYSTEM AND METHOD FOR DYNAMICALLY REDEFINING CLASS FILES IN AN APPLICATION SERVER ENVIRONMENT - Disclosed herein is a system and method for dynamically redefining class files in a Java-based development environment. The existing development cycle in Java generally requires developers to edit, build, and deploy before they can test changes to the code. This process can be quite time consuming. There is a need for dynamically redefining and testing class files in a development environment without a significant time delay or loss of data. In one embodiment, when a developer modifies the class definition a ClassFileTransformer function is used to maintain the original shape of a redefinable class, i.e. its declared fields and methods, without affecting the redefined class' behavior or appearance to outside code. | 05-14-2009 |
20090119674 | COMMON HANDLER FRAMEWORK - A common handler framework can allow handlers for multiple different types of web services programming models to be used in a single handler chain. | 05-07-2009 |
20090113419 | SYSTEM AND METHOD FOR A LIGHT WEIGHT SERVER INSTALLER - In one embodiment a light weight server installer is provided which enables a user to install a Java Platform Enterprise Edition compatible application server with no additional functionality. The user can then select the functionality he or she requires and the light weight server installer installs only the components necessary to implement the selected functionality. In another embodiment the user uses a graphical user interface to make his or her selections. In another embodiment the light weight server installer is an internet installer, enabling the user to download over the internet only the components necessary to implement the selected functionality. | 04-30-2009 |
20090070786 | XML-BASED EVENT PROCESSING NETWORKS FOR EVENT SERVER - An event server running an event driven application implementing an event processing network. The event processing network can include at least one processor to implement a rule on at least one input stream. The event driven application can be specified by XML that is an extension of SPRING framework XML. | 03-12-2009 |
20090070785 | CONCURRENCY IN EVENT PROCESSING NETWORKS FOR EVENT SERVER - An event server running an event driven application implementing an event processing network. The event processing network can include at least one processor to implement a rule on at least one input stream. The event processing network can define concurrent operation of at least two components of the event processing networks. | 03-12-2009 |
20090070765 | XML-BASED CONFIGURATION FOR EVENT PROCESSING NETWORKS - An event server running an event driven application implementing an event processing network the event processing network can include at least one processor to implement a rule an at least one input stream. Priority for parts of the event processing network can be settable by a user. | 03-12-2009 |
20090043897 | SYSTEM AND METHOD FOR DETECTING A CONNECTION LEAK IN A J2EE CONNECTOR ARCHITECTURE - A connector architecture implementation that is J2EE compliant and provides improved connection management capabilities. The connector architecture implementation provides a connector leak detection mechanism that detects connection leaks both automatically and manually. The connector architecture implementation pre-configures and manages the growth and reduction of a connection pool. The connector architecture implementation may be pre-configured by pre-populating the connection pool. Connection pool growth may be managed by generating connections in response to connection requests. A connection pool may also be configured to reduce the number of connections in the pool. The number of connections may be reduced if the connection demand decreases. Password credentials allowing access to services are used to provide additional connection management. | 02-12-2009 |
20090043892 | METHOD FOR STORING CREDENTIALS IN A J2EE CONNECTOR ARCHITECTURE - A connector architecture implementation that is J2EE compliant and provides improved connection management capabilities. The connector architecture implementation provides a connector leak detection mechanism that detects connection leaks both automatically and manually. The connector architecture implementation pre-configures and manages the growth and reduction of a connection pool. The connector architecture implementation may be pre-configured by pre-populating the connection pool. Connection pool growth may be managed by generating connections in response to connection requests. A connection pool may also be configured to reduce the number of connections in the pool. The number of connections may be reduced if the connection demand decreases. Password credentials allowing access to services are used to provide additional connection management. | 02-12-2009 |
20090037925 | SMART STUB OR ENTERPRISE JAVA BEAN IN A DISTRIBUTED PROCESSING SYSTEM - A clustered enterprise distributed processing system. The distributed processing system includes a first and a second computer coupled to a communication medium. The first computer includes a virtual machine (JVM) and kernel software layer for transferring messages, including a remote virtual machine (RJVM). The second computer includes a JVM and a kernel software layer having a RJVM. Messages are passed from a RJVM to the JVM in one computer to the JVM and RJVM in the second computer. Messages may be forwarded through an intermediate server or rerouted after a network reconfiguration. Each computer includes a Smart stub having a replica handler, including a load balancing software component and a failover software component. Each computer includes a duplicated service naming tree for storing a pool of Smart stubs at a node. | 02-05-2009 |
20090031401 | ANNOTATIONS FOR ENTERPRISE WEB APPLICATION CONSTRUCTOR - A web-based application constructor can be used constructing a web display. The web-based application constructor can obtain data from heterogeneous data sources having Web Services schemas to produce the web display. The web display can contain page components and can display the data from at least some heterogeneous data sources. A versioning system can keep track of changes to page components, page layouts, searches, and text to allow users to make changes without administrative approval. Users can annotate page components, page layouts, records, and text with comments. | 01-29-2009 |
20090024939 | WEB BASED APPLICATION CONSTRUCTOR USING QUERYING ACROSS DATA - A web-based application constructor can be used for constructing a web display. The web-based application constructor can obtain data from heterogeneous data sources to produce the web display. The web display can contain page components and display the data from at least some of the heterogeneous data sources. The application constructor can allow querying of the data sources. | 01-22-2009 |
20090024915 | WEB BASED APPLICATION CONSTRUCTOR USING OBJECTS AS PAGES - A web-based application constructor can be used for constructing a web display. The web-based application constructor can obtain data from heterogeneous data sources to produce the web display. The web display can contain page components and display the data from at least some of the heterogeneous data sources. The application constructor can convert at least one object from a heterogeneous data source into a page component. | 01-22-2009 |
20090024851 | SYSTEMS AND METHODS FOR MUTUALLY AUTHENTICATED TRANSACTION COORDINATION MESSAGES OVER INSECURE CONNECTIONS - Systems and methods are provided that enable authentication of transaction coordination messages sent via insecure connections. Also provided are systems and methods for controlling transaction coordination and recovery. In many embodiments, there is an exchange between a coordinator and a sub-coordinator, such that the coordinator provides the sub-coordinator with a coordinator token, and the sub-coordinator provides the coordinator with a sub-coordinator token. The coordinator and sub-coordinator tokens are used to authenticate transaction coordination messages sent over one or more insecure connections between the coordinator and the sub-coordinator. | 01-22-2009 |
20090024561 | SYSTEM AND METHOD FOR SYNCHRONIZING SERVICE METADATA - A system and method for synchronizing service metadata into a format for canonical representation of service metadata and publishing the synchronized service metadata into a metadata repository. The method comprises: receiving service metadata from a service producer; normalizing the service metadata into the format for canonical representation of service metadata; and publishing normalized service metadata into a metadata repository that supports the format for canonical representation of service metadata. The system comprises: at least one connector for each service producer, wherein the connector permits a synchronization system to communicate bi-directionally with the service producer; one normalizer for each service producer, wherein the normalizer transforms the service metadata into a format for the canonical representation of service metadata; and at least one provider for each service producer, wherein the provider publishes the canonical representation of service metadata into a metadata repository. | 01-22-2009 |
20090019522 | WEB BASED APPLICATION CONSTRUCTOR USING DATA SPACES - A web-based application constructor can be used for constructing a web display. The web-based application constructor can obtain data from heterogeneous data sources to produce the web display. The web display can contain page components and display the data from at least some of the heterogeneous data sources. The system can allow for the construction of user interfaces to access different types of data. | 01-15-2009 |
20090019357 | WEB BASED APPLICATION CONSTRUCTOR USING PAGE COMPONENTS ACCESSIBLE BY URL - A web-based application constructor can be used for constructing a web display. The web-based application constructor can obtain data from heterogeneous data sources to produce the web display. The web display can contain page components and display the data from at least some of the heterogeneous data sources. The page components can be accessible by URLs. | 01-15-2009 |
20090019312 | System and Method for Providing an Instrumentation Service Using Dye Injection and Filtering in a SIP Application Server Environment - An instrumentation service is described that uses dye injection and filtering in a Session Initiation Protocol (SIP) application server environment. The instrumentation service can provide a flexible mechanism for selectively adding diagnostic code to the SIP application server and the various applications running on it. It can allow flexible selection of locations in the server and application code, at which instrumentation code can be added. The process of adding diagnostic code can be deferred to the time of running the server at the deployment site. The instrumentation service further allows flexible selection of diagnostic actions, which can be executed at selected locations. In various embodiments, the execution of diagnostic code can be dynamically enabled or disabled while the server is running. Also, the behavior of diagnostic code executed at such locations can be dynamically changed while the server is running. | 01-15-2009 |
20090019158 | Engine Near Cache for Reducing Latency in a Telecommunications Environment - The SIP server can be comprised of an engine tier and a state tier distributed on a cluster network environment. The engine tier can send, receive and process various messages. The state tier can maintain in-memory state data associated with various SIP sessions. A near cache can be residing on the engine tier in order to maintain a local copy of a portion of the state data contained in the state tier. Various engines in the engine tier can determine whether the near cache contains a current version of the state needed to process a message before retrieving the state data from the state tier. Accessing the state from the near cache can save on various latency costs such as serialization, transport and deserialization of state to and from the state tier. Furthermore, the near cache and JVM can be tuned to further improve performance of the SIP server. | 01-15-2009 |
20090013267 | CONSTRUCTOR WEB-BASED CHANGE CONTROL SYSTEM AND METHOD - A Web-based application constructor can be used to construct a web display. The web-based application constructor can obtain data from heterogeneous data sources having Web Services schemas to produce the web display. The web display containing page components and displaying the data from at least some heterogeneous data sources. A versioning system can keep track of changes to page components, page layout, searches, and text to allow users to make changes without administrative approval. A change control system can allow users to dynamically undo changes to page components, page layout, searches, and text while using the web-based application constructor. | 01-08-2009 |
20090013246 | WEB BASED APPLICATION CONSTRUCTOR USING EXTENSIBILITY POINTS FOR PAGE COMPONENTS, PAGE LAYOUTS/TEMPLATES, SECURITY ROLES, SHELLS, AND ASSOCIATING DATA SPACES WITH TEMPLATES - A web-based application constructor can be used for constructing a web display. The web-based application constructor can obtain data from heterogeneous data sources having Web Services schemas to produce the web display. The web display can contain page components and display the data from at least some of the heterogeneous data sources wherein the page components are extensible. | 01-08-2009 |
20090013245 | ENTERPRISE WEB APPLICATION CONSTRUCTOR XML EDITOR FRAMEWORK - A web-based application constructor can be used for constructing a web display. The web-based application Constructor can obtain data from heterogeneous data sources having web services schemas to produce the web display. The web display can contain page components and display the data from at least some of the heterogeneous data sources. An XML editor framework can be adapted to use web services schemas to automatically create a user interfaces for inputting data in fields determined from the web service schemas. | 01-08-2009 |
20090013244 | ENTERPRISE WEB APPLICATION CONSTRUCTOR SYSTEM AND METHOD - A web-based application constructor can be used to construct a web display. The web-based application constructor can obtain data from heterogeneous data sources having Web Services schemas to produce the web display. The web display can contain page components and can display the data from at least some heterogeneous data sources. A versioning system can keep track of changes to page components, page layout, searches, and text to allow users to make changes without administrative approval. | 01-08-2009 |
20090007262 | COMPUTER READABLE MEDIUM FOR RESOLVING PERMISSION FOR ROLE ACTIVATION OPERATORS - A computer-readable storage medium storing instructions executable by a processor for resolving permissions using role activation operators to evaluate permissions assigned to a user in a role context inheritance hierarchy. The stored instructions comprise several steps: a step of retrieving a plurality of activated roles within a role context that match roles assigned to a user, wherein one or more permissions in the role context inherit from one or more permissions in a parent role context in a role context permission inheritance hierarchy; a step of determining an aggregate permission for each of the plurality of activated roles, wherein a role activation operator determines how an activated role is evaluated; a step of processing the aggregate permissions for the plurality of activated roles; and a step of resolving a final permission for the user. | 01-01-2009 |
20090006598 | System and Method for Efficient Storage of Long-Lived Session State in a SIP Server - A SIP server can be deployed in a two-tier architecture, including an engine tier for processing of SIP communications and a state tier for maintaining the state associated with these communications. The state tier can include RAM-based replicas that provide data to the engines. Some of the SIP session state can be moved to the database in order to reduce the memory requirements of the state tier. Upon determining that a transaction boundary has been reached where the session state is steady, the state replica can save the data to the database. A hint can be received from the engine tier by the state replica indicating that the state data is ready to be saved. Subsequently, the data can be removed from the state tier by nulling out the bytes of actual data, while preserving the primary key, locking and timer information so as not to impact latency. | 01-01-2009 |
20090006412 | METHOD FOR RESOLVING PERMISSION FOR ROLE ACTIVATION OPERATORS - A method for resolving permissions using role activation operators to evaluate permissions assigned to a user in a role context inheritance hierarchy. The method comprises several steps. A step of retrieving a plurality of activated roles within a role context that match roles assigned to a user, wherein one or more permissions in the role context inherit from one or more permissions in a parent role context in a role context permission inheritance hierarchy. A step of determining an aggregate permission for each of the plurality of activated roles, wherein a role activation operator determines how an activated role is evaluated. A step of processing the aggregate permissions for the plurality of activated roles. A step of resolving a final permission for the user. | 01-01-2009 |
20090006167 | System and Method for Integrating a Business Process Management System with an Enterprise Service Bus - A system and method are described for integrating a business process management (BPM) system with an enterprise service bus. The BPM system is used to model business processes which contain a set of activities linked by transitions. The BPM system is used to define, publish, deploy and execute the processes in a distributed computing environment. The service bus is used to manage web services and perform routing and transformation of messages between the web services. A transport is used to describe each process defined by the BPM system as a web service on the service bus and provide the ability to connect the BPM component to the enterprise service bus. This allows each of the processes to be exposed as a web service by injecting data retrieved from the process definition into the enterprise service bus. Furthermore, the processes defined in BPM can consume web services from the service bus. | 01-01-2009 |
20080319988 | USE OF FIXED FIELD ARRAY FOR DOCUMENT RANK DATA - A computer based search server can comprise an archive including a fixed-width field array storing numeric rank data associated with documents. The search server can provide search results using the numeric rank data obtained from the fixed-width field array. | 12-25-2008 |
20080313728 | INTERSTITIAL PAGES - A reverse proxy server can provide access to web applications. The reverse proxy system can produce interstitial pages not generated with the web application code and optionally block access to the web application until the interstitial pages have been processed. | 12-18-2008 |
20080313293 | SYSTEM AND METHOD FOR EXACTLY ONCE MESSAGE STORE COMMUNICATION - A system for managing a message store in a network includes an object acting as a message store. In one embodiment, the message store is for Java Message Service. A lead server is selected from several servers. The lead server uses a distributed consensus algorithm to select a host server. The selected host server hosts the message store, providing sole access to the message store. The other servers are notified of the new host by messaging. In one embodiment, servers can send messages to the message store on the host and pick up any messages from the message store. | 12-18-2008 |
20080307098 | METHOD FOR INTELLIGENT, SELF-MANAGED, DECENTRALIZED CONNECTION POOL MANAGEMENT POOL - A server can be connected to a set of other servers using a connection pool of connections. When information is to be sent to one of the set of other servers, the server can obtain a connection from the connection pool. | 12-11-2008 |
20080307088 | Performance Monitoring Web Console for Distributed Transaction Service - A computer-implemented system to support performance monitoring of distributed transaction service can comprise one or more distributive transaction monitoring infrastructures, wherein each distributive transaction monitoring infrastructure contains at least one local monitor server that receiving monitoring data from one or more distributive transaction monitoring processes; a central monitor server that accepts monitoring data from one or more distributive transaction monitoring infrastructures and stores monitoring data into a database; and a web application that communicates with the central monitor server and provides interaction with a user. | 12-11-2008 |
20080307044 | SYSTEM AND METHOD FOR URL COMPRESSION - A computer-implemented method can be used to support Uniform Resource Locator (URL) compression. Such a method can comprises the steps of receiving a Web request associated with an original URL from a client by a Web component; saving the original URL in a database; generating a compression key in a compressed URL; getting the original URL from the database using the compression key; and responding to the client. | 12-11-2008 |
20080306939 | USE OF FIXED-WIDTH FIELD ARRAY WITH INVERTED INDEX - A computer based system can comprise an inverted index for a number of documents and a fixed-width field array storing data associated with the documents. The system provides results data using information obtained from the fixed-width field array. | 12-11-2008 |
20080306712 | Performance Monitoring Infrastructure for Distributed Transaction Service - A computer-implemented system to support performance monitoring of distributed transaction service can comprise a monitoring management tier that provides services to a monitoring logic and policy control module; one or more monitoring processes that are controlled by the monitoring logic and policy control module; and a plug-in framework that includes one or more plug-ins that is capable of receiving monitoring data from the one or more monitoring processes. | 12-11-2008 |
20080301625 | SYSTEM AND METHOD FOR CREATING AND UPDATING A DATA MODEL FROM DISPARATE EVENTS RECEIVED ON ARBITRARY APPLICATION THREADS - An abstract component model can be used to drive an editor by providing an underlying stateful model for component implementation without the need to re-implement details, such as event listening, lifecycle and update management, etc. An implementation needs to provide objects that make up the model, some logic to listen to environmental changes and recognize when an update is needed, and a builder which can generate a lightweight version of the model based on the current “state of the world.” In addition, abstract component model is operable to support an editor such as page flow. | 12-04-2008 |
20080301257 | SYSTEM AND METHOD FOR CONSUMER ENTITLEMENTS IN PORTAL SERVICES - A system to support consumer entitlement that allows Producer web applications to decide which portlets to be offered to Consumer web applications can comprise: a role set which includes a plurality of roles; a Consumer web application adapted to interact with end users; and a Producer web application with a set of portlets operable to be combined in a unified portal for end users. The Producer web application operates to: define a property set that allows end users to input values for the property set; map the Consumer web application to one particular role in the role set; and check for portlets that are available among the set of portlets based on the particular role. | 12-04-2008 |
20080301135 | EVENT PROCESSING QUERY LANGUAGE USING PATTERN MATCHING - An event processor can use event processing queries to operate on an event stream. Event processing queries can include a “matching” function that matches a pattern in the event stream. | 12-04-2008 |
20080301125 | EVENT PROCESSING QUERY LANGUAGE INCLUDING AN OUTPUT CLAUSE - An event processor can use queries to operate on event streams. Event processing queries can include an output clause to restrict the output of the query. | 12-04-2008 |
20080301124 | EVENT PROCESSING QUERY LANGUAGE INCLUDING RETAIN CLAUSE - An event processor can use event processing queries to operate an event. Event processing queries can include a “retain” clause that limits the amount of data over which the query is run. | 12-04-2008 |
20080294754 | SYSTEM AND METHOD FOR CONFIGURATION-DRIVEN DEPLOYMENT - A computer enabled method and system that can expose distributed transaction services as web services from a service architecture comprises steps of configuring the service architecture; receiving a invocation request through web services from a client; invoking a distributed transaction service from a distributed transaction application, wherein the distributed transaction service is defined in the invocation request; and exporting the distributed transaction service in the form of web services. | 11-27-2008 |
20080294712 | SYSTEM AND METHOD FOR WEB SERVICES GATEWAY SERVER - A computer enabled transaction service architecture gateway system and method for exposing distributed transaction services as web services comprises a transaction service gateway server including: a web service message engine to convert between web service messages and distributed transaction data structures and interface for allowing customized plug-in mechanism to expand functionality and provide additional service. The transaction service architecture gateway server operate to invoke distributed transaction services on a distribute transaction server upon receiving a request from a web service client. | 11-27-2008 |
20080289010 | Managing Secured Resources in Web Resources that are Accessed by Multiple Portals - A method, apparatus, and computer-readable media for authorizing users of network portals to access a secure resource hosted by a secure server comprises storing a plurality of user identifiers, each representing a user of an owning portal; storing for each of the user identifiers an access privilege to the secure resource; storing a proxy user identifier representing a guest portal and a guest access privilege to the secure resource for all of the users of the guest portal; receiving from the owning portal a first request for access to the secure resource, the first request comprising a first user identifier representing a user of the owning portal; granting to the user of the owning portal access to the secure resource according to the access privilege stored for the first user identifier; receiving from the guest portal a second request for access to the secure resource, the second request comprising a second user identifier representing a user of the guest portal and a portal identifier representing the guest portal; and granting to the user of the guest portal access to the secure resource according to the guest access privilege stored in the authorization table for the proxy user identifier. | 11-20-2008 |
20080288579 | Ubiquitous Content Subscription and Delivery via a Smart Electronic Paper Device - A portable electronic paper device can include a flexible display substrate for displaying dynamic content received from a content provider. The device can also include a CPU, memory storage and a wireless communication component for establishing a connection with the content provider. The memory of the device can be loaded with software needed to display the content, such as a hypervisor, a virtual machine and an interface layer between them such that no operating system is required in order to render content onto the flexible display. The electronic device can be distributed to users from the content provider and loaded with an application deployed on the virtual machine to display and personalize the content. Periodic updates can be transmitted from the content provider to the device thereby enabling real-time updatable content delivery to the users. | 11-20-2008 |
20080288433 | System and Method for Employing Decision Activities for Providing Inferences in a Process Execution Environment - A set of decision activities can be provided to a business process management and design software tool. The tool can be used to define various processes that contain one or more activities linked by transitions. During process design time, a business analyst can identify process-relevant data of the process to be presented to the end users. The relevant data can be rendered to the end users at runtime, along with a set of possible options for the activities in a process instance. Upon receiving a decision of the user, the process instance can follow the selected transition to a different activity. Over time, the system can capture the decisions taken by users and enter the data associated with these decisions into a data classifier. In doing so, the software tool can generate suggestions, provide probabilities, automate and distribute workloads, flag abnormalities and deviations and generally improve process design and management. | 11-20-2008 |
20080288304 | System and Method for Enabling Decision Activities in a Process Management and Design Environment - A set of decision activities can be provided to a business process management and design software tool. The tool can be used to define various processes that contain one or more activities linked by transitions. During process design time, a business analyst can identify process-relevant data of the process to be presented to the end users. The relevant data can be rendered to the end users at runtime, along with a set of possible options for the activities in a process instance. Upon receiving a decision of the user, the process instance can follow the selected transition to a different activity. Over time, the system can capture the decisions taken by users and enter the data associated with these decisions into a data classifier. In doing so, the software tool can generate suggestions, provide probabilities, automate and distribute workloads, flag abnormalities and deviations and generally improve process design and management. | 11-20-2008 |
20080281898 | PORTLETS IN NON-PORTAL PAGES - A JSR 168 compliant portlet can expose a URL to allow the portlet to be inserted into an external page. | 11-13-2008 |
20080271007 | SYSTEM AND METHOD FOR MANAGED TUXEDO WRAPPER FOR .NET APPLICATIONS - A system supports managed wrapping of Tuxedo functions for .NET applications, comprising Wrapper Interfaces and Wrapper Utilities. The Wrapper Interfaces that wrap around one or more Tuxedo functions used by a .NET application are operable to encapsulate the one or more unmanaged Tuxedo libraries and provide connectivity between the one or more unmanaged Tuxedo libraries and the .NET application. The Wrapper Utilities are operable to build .NET applications using the Wrapper Interfaces, wherein the .NET applications are operable to invoke the one or more unmanaged Tuxedo libraries through Wrapper Interfaces to run under Common Language Runtime (CLR). | 10-30-2008 |
20080271002 | SYSTEM AND METHOD FOR PROVIDING A FILTERING CLASSLOADER IN A COMPUTER ENVIRONMENT - A system and method for providing a filtering classloader within a Java-based or other application environment. In one embodiment, a filtering classloader is placed between two other classloaders, e.g. between the system classloader and the application classloader. The filtering classloader is provided with a set of patterns which throw a “class not found exception” if an application makes a request for that class or package. The exception leads the application classloader to believe (perhaps correctly) that there is no class with that name in the system classloader. The application classloader then loads the class itself. The class may or may not exist in the system classloader; the filtering classloader in essence overrides any retrieval from that classloader in favor of the application classloader, for certain specified patterns of request. | 10-30-2008 |
20080270531 | UNICAST CLUSTERING MESSAGING - A system for clustering messaging in application server specific environment can comprise group leader application server nodes that are inter-connected to each other directly and with group member application server nodes. A group can include at least one group leader application server node and at least one group member server nodes. The group member application server nodes can send and receive messages through associated group leader application server nodes. | 10-30-2008 |
20080270487 | AUTOMATIC JTA MIGRATION - The failure of a first application server instance of a cluster can be detected and transaction recovery service can be automatically migrated from the first application server instance to a second application server instance without requiring rebooting the first application server instance. | 10-30-2008 |
20080267209 | SYSTEM AND METHOD FOR STORE AND FORWARD ROUTING FOR DISTRIBUTED DESTINATIONS - The present invention enables a store-and-forward service providing an efficient and reliable forwarding of messages stored in a message queue to a distributed destination. It provides customers with high availability and scalability for applications such as JMS queues and topics. It achieves load balancing and failover amongst all individual members of the distributed destination while ensuring that each message is delivered exactly once. | 10-30-2008 |
20080263564 | SYSTEM AND METHOD FOR MESSAGE SERVICE WITH UNIT-OF-ORDER - The present invention enables “unit-of-order”, which allows a message producer to group messages into a single unit. It guarantees that messages are not only delivered to consumers in order, they are also are processed in order. The unit-of-order will be delivered to consumers as one unit and only one consumer will process messages from the unit at a time. The processing of a single message is complete when it is acknowledged, committed, recovered, or rolled back. Until message processing for a message is complete, the remaining unprocessed messages for that unit-of-order are blocked. | 10-23-2008 |
20080263221 | SYSTEM AND METHOD FOR STORE-AND-FORWARD FOR HIGHLY AVAILABLE MESSAGE PRODUCTION - The present invention enables a store-and-forward service that provides higher availability for application residing or connecting to a server to reliably deliver messages and allows an application to send messages to a destination on another server even when the destination is not available at the moment the messages are sent because of network problems or system failures. The messages will be stored durably and temporarily on a local server, and then be efficiently forwarded to the destination once it becomes available. | 10-23-2008 |
20080256610 | SYSTEM AND METHOD FOR DYNAMIC ROLE ASSOCIATION - A pluggable architecture allows security and business logic plugins to be inserted into a security service hosted by a server, and to control access to one or more secured resources on that server, on another server within the security domain, or between security domains. The security service may act as a focal point for security enforcement, and access rights determination, and information used or determined within one login process can flow transparently and automatically to other login processes. Entitlements denote what a particular user may or may not do with a particular resource, in a particular context. Entitlements reflect not only the technical aspects of the secure environment (the permit or deny concept), but can be used to represent the business logic or functionality required by the server provider. In this way entitlements bridge the gap between a simple security platform, and a complex business policy platform. | 10-16-2008 |
20080250388 | PAGELETS IN ADAPTIVE TAGS - A tag in first web application code can be interpreted to indicate a pagelet web application. Code from the pagelet web application can be inserted into a page of the first application. | 10-09-2008 |
20080250272 | LOGGING LAST RESOURCE SYSTEM - A logging last resource (LLR) system can provide a transaction log and transaction data to a LLR resource after a number of two-phase-commit resources have been prepared. The LLR resource manager can operate on the transaction log and transaction data in an atomic fashion so that the local commit can be done. The local commit can be done by the LLR manager in an atomic manner. | 10-09-2008 |
20080244693 | SMART WEB SERVICES POLICY SELECTION USING MACHINE LEARNING - A computer-implemented method to select a Web Service policy alternative can use previously collected data concerning Web Service to select a desirable Web Service policy alternative at runtime. The selected Web Service policy alternative can then be applied to a Web Service message such as a SOAP message. | 10-02-2008 |
20080244692 | SMART WEB SERVICES SECURITY POLICY SELECTION AND VALIDATION - A computer-implemented method to select a web service security policy alternative can comprise selecting a web service security policy alternative at runtime based on previously collected data concerning web service and using the selected web service security policy alternative for a web service message. In addition, a computer-implemented method to prevent intrusion can use a honey policy that can be defined by the administrator in order to attract and closely monitor the hackers. | 10-02-2008 |
20080228839 | APPARATUS FOR HIGHLY AVAILABLE TRANSACTION RECOVERY FOR TRANSACTION PROCESSING SYSTEMS - A highly available transaction recovery service migration system in accordance with one embodiment of the present invention implements a server=s Transaction Recovery Service (TRS) as a migratable service. In one embodiment of the present invention, the TRS is a server instance or software module implemented in JAVA. The TRS migrates to an available server that resides in the same cluster as the failed server. The migrated TRS obtains the TLOG of the failed server, reads the transaction log, and performs transaction recovery on behalf of the failed server. The migration may occur manually or automatically on a migratable services framework. The TRS of the failed server migrates back in a fail back operation once the failed primary server is restarted. Failback operation may occur whether recovery is completed or not. This expedites recovery and improves availability of the failed server thereby preserving the efficiency of the network and other servers. | 09-18-2008 |
20080228829 | PARTITIONING FACT TABLES IN AN ANALYTICS SYSTEM - An analytics system can obtain analytics data. The analytics system can automatically partition data based on months or another time period, into fact tables. A scrolling window system can combine multiple eligible fact tables into a single view. A reporting engine can then use the single view. | 09-18-2008 |
20080216063 | COMPILER FOR JAVA AND .NET - A computer implemented method analyzing a first code in a first managed computer language and generating intermediate code in a completed language. The intermediate code into linking code that allows the second code in a second managed runtime language to interact with the first code. | 09-04-2008 |
20080215924 | METHOD FOR PERFORMING A CORRECTIVE ACTION UPON A SUB-SYSTEM - A server self health monitor (SHM) system monitors the health of the server it resides on. The health of a server is determined by the health of all of a server's sub-systems and deployed applications. The SHM may make health check inquiries to server sub-systems periodically or based on external trigger events. The sub-systems perform self health checks on themselves and provide sub-system health information to requesting entities such as the SHM. Sub-systems self health updates may be based on internal events such as counters or changes in status or based on external entity requests. Corrective action may be performed upon sub-systems by the SHM depending on their health status or the health status of the server. Corrective action may also be performed by a sub-system upon itself. | 09-04-2008 |
20080215918 | METHOD FOR MONITORING SERVER SUB-SYSTEM HEALTH - A server self health monitor (SHM) system monitors the health of the server it resides on. The health of a server is determined by the health of all of a server's sub-systems and deployed applications. The SHM may make health check inquiries to server sub-systems periodically or based on external trigger events. The sub-systems perform self health checks on themselves and provide sub-system health information to requesting entities such as the SHM. Sub-systems self health updates may be based on internal events such as counters or changes in status or based on external entity requests. Corrective action may be performed upon sub-systems by the SHM depending on their health status or the health status of the server. Corrective action may also be performed by a sub-system upon itself. | 09-04-2008 |
20080215637 | LOGGING LAST RESOURCE - A logging last resource (LLR) system can provide a transaction log and transaction data to a LLR resource after a number of two-phase-commit resources have been prepared. The LLR resource manager can operate on the transaction log and transaction data in an atomic fashion so that the one-phase or local commit can be done. The one-phase or local commit can be done by the LLR manager in an atomic manner. | 09-04-2008 |
20080215549 | Method and Apparatus for Query and Analysis - A data handling method combines search capabilities with analytical functionality. The invention provides advantages when dealing with structured documents (such as electronic catalogs, XML documents, text documents, HTML documents, Internet documents, etc.) and other data stored in a computer system. Various embodiments include simplified ways to express search/analysis requests of a data set and also to express results to such requests. | 09-04-2008 |
20080211672 | RFID DIRECTION TRIGGER DRIVER - One embodiment of the present invention is an RFID system comprising a first detector at a first position and a second detector at a second position. An RFID edge server can include software to check the first and second detector to determine a direction of an object. The direction information can be used to trigger the start or stop of the collection of data for an RFID detector. | 09-04-2008 |
20080211632 | RFID EDGE SERVER HAVING A PROGRAMMABLE LOGIC CONTROLLER API - An RFID edge server is adapted to receive RFID data from RFID readers. The RFID edge server can have a PLC API to allow the RFID edge server to control and receive data from devices. | 09-04-2008 |