Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Java servlet" patented technology

A Java servlet is a Java software component that extends the capabilities of a server. Although servlets can respond to many types of requests, they most commonly implement web containers for hosting web applications on web servers and thus qualify as a server-side servlet web API. Such web servlets are the Java counterpart to other dynamic web content technologies such as PHP and ASP.NET.

System for integrating java servlets with asynchronous messages

In a traditional application server that uses servlets, when a request is dispatched to a thread the service( ) method of the appropriate servlet is called. When the service( ) method returns the response is sent. This is sub-optimal in the case that an asynchronous event must occur before the response can be sent, because the thread running the servlet must block until the event occurs. The invention provides for asynchronous processing of such requests. In one embodiment, the invention provides an extension to the Servlet API which allows the service( ) method to return (and thus the thread to be freed) before the response is ready to be sent. Then when the asynchronous event later occurs the response may be completed and sent.
Owner:ORACLE INT CORP

System and method for merging security constraints when using security annotations

A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints. These merged security constraints are then applied to process a request being handled by the application server.
Owner:IBM CORP

HTML5-based remote desktop access system and remote desktop access method

The invention discloses an HTML5-based remote desktop access system and a remote desktop access method based on the system. The system comprises HTDesktop clients, HTML5 browsers, an HT remote desktop server and remote desktops, wherein the HT remote desktop server comprises Java Servlet containers and HT desktop proxy services, the HTDesktop clients communicate with the remote desktops via the HT desktop proxy services by use of an HT desktop protocol; and the Java Servlet containers communicate with the remote desktops via the HT desktop proxy services by use of the HT desktop protocol. The method comprises the following steps: 1, the HTML5 browsers establish links with the Java Servlet containers, and the Java Servlet containers forward HT desktop protocol instructions from the HTML5 browsers; 2, the HT desktop proxy services, according to information of the remote desktops, convert the HT desktop protocol instructions into instructions corresponding to the remote desktops; and 3, the HT desktop proxy services forward screen data of the remote desktops to the front HTML5 browsers. The system and method provided by the invention have the advantages of convenience in use, good user experience, higher work efficiency, facilitated maintenance of existing remote desktops and the like.
Owner:恒泰艾普(北京)云技术有限公司

Web server having function of Java servlet, method for updating Java program and computer program

A Web server storing a Java program for generating an HTML file of a Web page includes a portion for obtaining an HTML file, a first conversion portion for converting the file into Java codes, a portion for replacing the codes with a part of a Java program related to the Web page structure, the Java program being for generating the HTML file, a portion for extracting Java codes of a part related to a designated Web page structure, a second conversion portion for converting the codes into an HTML file, and a portion for transmitting the file to the terminal device. If the HTML file contains a tag indicating an unmodifiable part, the first conversion portion converts the tag into a Java code indicating an unmodifiable part. The second conversion portion converts the code contained in the Java codes into the tag.
Owner:FUJITSU LTD

System and method for merging security constraints when using security annotations

A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints. These merged security constraints are then applied to process a request being handled by the application server.
Owner:INT BUSINESS MASCH CORP

Method to reduce input parameter interface error and inconsistency for servlets

A GUI utility tool running on a web application development environment is presented that acts to eliminate inconsistency between a given HTML user input form description file and a corresponding servlet program file. The tool allows the user to specify an HTML file. The tool may then parse the HTML file to discover input parameters and generate Java servlet program code to receive the input parameters.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products