Embodiments of the present invention relate to software reuse, and more particularly relate to techniques for reusing logic implemented in an existing software application in the context of a Web service.
Over the years, many enterprises have invested significant resources in developing and/or deploying business applications that rely on specific application technologies. Examples of such application technologies include Oracle Forms and Oracle Applications Framework (both developed by Oracle Corporation), Java Server Pages (JSP), and the like. Now, there is a growing trend in the IT industry towards integrating the functionalities of these business applications via a loosely-coupled, service-oriented architecture (SOA). To realize this goal, there is a need to expose the business logic implemented in these existing business applications as new Web services.
Unfortunately, the nature of many application technologies makes it difficult to reuse program code written via these technologies in a Web service context. For example, applications built using Oracle Forms (hereinafter “Forms”) or Oracle Applications Framework (hereinafter “OAF”) are typically self-contained entities with limited capability for exposing the business logic implemented therein to external consumers. In addition, the business logic in Forms or OAF-based applications is often tied to user interface components specific to those technologies, thus making it difficult to reuse this logic in a generic manner.
One method for addressing the difficulties above is to re-factor a portion of the program code for an existing application into an alternative format that can be more easily exposed as a Web service. For example, in the case of a Forms-based application, business logic implemented within the form can be re-written as one or more PL/SQL APIs, which can then be directly invoked by a Web service. However, this approach involves the creation and maintenance of two parallel code lines (e.g., the Forms-based application and the PL/SQL APIs), thus requiring significant development time and effort. If a large number of existing applications need to re-factored in this manner, this approach may not be practical or feasible.
Another method for addressing the difficulties above is to completely convert/migrate the existing application to an alternative application technology that is more amenable to the generation of component Web services. Using this method, a Forms-based application may, for example, be converted into a Java/J2EE-based implementation. However, this approach also requires a significant amount of development resources. In addition, the complete, componentized conversion of all business logic within the existing application would not be guaranteed because the aim of this approach is the conversion of existing application code, rather than the reuse of that code.
Accordingly, it would be desirable to have techniques that allow existing application logic to be reused for new Web services without any need for modifying or re-factoring existing code.
Embodiments of the present invention provide techniques for reusing logic implemented in an existing software application such that the logic can be exposed as a Web service or in any other service-oriented context. In one set of embodiments, a design-time technique is provided that comprises, inter alia, receiving program code for an existing software application, generating metadata based on the program code, and customizing the metadata to align with an intended Web service. Artifacts for the Web service are then generated based on the customized metadata. In another set of embodiments, a run-time technique is provided that comprises, inter alia, receiving a payload representing an invocation of a Web service operation of the generated Web service, processing the payload, and, based on the processing, causing the existing software application to execute an operation in response to the invocation of the Web service operation.
According to one embodiment of the present invention, a method for facilitating the reuse of logic implemented in an existing software application comprises receiving, at a computer system, a selection of an existing software application, and generating, by the computer system, metadata based on program code for the existing software application. The method further comprises receiving, at the computer system, one or more customizations to be applied to the metadata, and modifying, by the computer system, the metadata based on the one or more customizations. Artifacts for a Web service are then generated by the computer system based on the modified metadata, where the Web service is configured to expose a Web service operation that, when executed, causes an existing operation implemented in the existing software application to be executed.
In one set of embodiments, the metadata comprises a first metadata file defining the existing operation implemented in the existing software application, a second metadata file defining one or more data objects associated with the existing operation, and a third metadata file defining names for the existing operation and its associated data objects.
In one set of embodiments, the one or more customizations include an alternative operation name for the existing operation and alternative data object names for the one or more data objects associated with the existing operation.
In one set of embodiments, modifying the metadata based on the one or more customizations comprises modifying the metadata to include the alternative operation name and/or the alternative data object names.
In one set of embodiments, generating artifacts for the Web service based on the modified metadata comprises generating an operation definition file defining the Web service operation, the Web service operation being identified in the operation definition file by the alternative operation name; and generating an object definition file defining Web service data objects corresponding to the one or more data objects associated with the existing operation.
In one set of embodiments, generating artifacts for the Web service based on the modified metadata further comprises generating a mapping file identifying the existing operation, its associated data objects, and a mapping between the existing operation and the alternative operation name; and generating a template payload file defining a template payload to be transmitted to the existing software application at a time of invocation of the Web service operation. In various embodiments, the template payload includes an invocation of the existing operation and a sequence of zero or more sub-operations to be executed by the existing software application in order to carry out the existing operation.
In one set of embodiments, generating artifacts for the Web service based on the modified metadata further comprises generating program code and related metadata for the Web service, where the program code and related metadata includes one or more Java classes and one or more Web Service Description Language (WSDL) files, and where the one or more WSDL files are generated based on the operation definition file.
In one set of embodiments, the method above further comprises executing a script for packaging the program code and related metadata for the Web service into an archive, deploying the archive to an application server in a run-time environment, and storing the mapping file and the template payload file in a repository accessible to the application server.
In one set of embodiments, the method above further comprises receiving, at another computer system configured to run the Web service, a payload file representing an invocation of the Web service operation and including one or more input parameter values for the Web service operation, and invoking, at the another computer system, an orchestration process for processing the payload file. In one set of embodiments, the orchestration process is a Business Process Execution Language (BPEL) process.
In one set of embodiments, the orchestration process is configured to invoke a first utility Web service by passing the payload file as input, receive from the first utility Web service a name of the existing software application and a name of the existing operation, invoke the first utility Web service by passing the name of the existing software application and the name of the existing operation as input, and receive from the first utility Web service the mapping file and the template payload file. The orchestration process is further configured to invoke a second utility Web service by passing the mapping file, the template payload file, and the payload file as input, and receive from the second utility Web service a final payload file generated based on the mapping file, the template payload file, and the payload file, where the final payload file identifies the existing operation, a sequence of zero or more sub-operations to be performed by the existing software application in order to carry out the existing operation, and the one or more input parameter values included in the payload file. The orchestration process is further configured to invoke a third utility Web service by passing the final payload file as input, where the third utility Web service is configured to communicate with the existing software application and cause the existing software application to execute the existing operation.
In one set of embodiments, the orchestration process is further configured to the orchestration process is further configured to receive from the third utility Web service one or more output parameter values outputted by the existing operation; invoke a fourth utility Web service by passing the one or more output parameter values as input, the fourth utility Web service being configured to transform a format of the one or more output parameter values into a format understood by the Web service; receive the one or more transformed output parameter values; and pass the one or more transformed output parameter values to the Web service.
According to another embodiment of the present invention, a system for facilitating the reuse of logic implemented in an existing software application is provided. The system comprises a first computer system in a design-time environment, where the first computer system is configured to receive a selection of an existing software application and generate metadata based on program code for the existing software application. The first computer system is further configured to receive one or more customizations to be applied to the metadata and modify the metadata based on the one or more customizations. Artifacts for a Web service are then generated based on the modified metadata, where the Web service is configured to expose a Web service operation that, when executed, causes an existing operation implemented in the existing software application to be executed.
In one set of embodiments, the system above further comprises a second computer system in a run-time environment, where the second computer system is configured to receive a payload file representing an invocation of the Web service operation and including one or more input parameter values for the Web service operation, and invoke an orchestration process for processing the payload file.
According to another embodiment of the present invention, a machine-readable medium is provided, the machine-readable having stored thereon program code which, when executed by a processing component of a computer system, facilitates the reuse of logic implemented in an existing software application. In various embodiments, the program code comprises code for receiving a selection of an existing software application, code for generating metadata based on program code for the existing software application, code for receiving one or more customizations to be applied to the metadata, code for modifying the metadata based on the one or more customizations, and code for generating artifacts for a Web service based on the modified metadata, the Web service being configured to expose a Web service operation that, when executed, causes an existing operation implemented in the existing software application to be executed.
In one set of embodiments, the program code further comprises code for receiving a payload file representing an invocation of the Web service operation and including one or more input parameter values for the Web service operation, and code for invoking an orchestration process for processing the payload file.
A further understanding of the nature and advantages of the embodiments disclosed herein may be realized by reference to the remaining portions of the specification and the attached drawings.
In the following description, for the purposes of explanation, numerous details are set forth in order to provide an understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these details.
Embodiments of the present invention provide a framework for generating and running Web services that reuse logic implemented in existing software applications (e.g., Forms-based applications, OAF-based applications, etc.). By reusing existing logic in this manner, enterprises can enhance the value of their investments in their existing applications. For example, Web service-enabled versions of these applications can be incorporated into Business Process Execution Language (BPEL) processes, Web-based applications (such as PHP, ASP, JSP, and the like), and other types of Web services clients. In addition, by making these Web services available to internal and external partners, enterprises can use these Web services as the basis of enterprise “mashups” or composite applications.
Embodiments of the present invention provide several advantages over prior art approaches for creating Web services based on existing applications. First, the techniques described herein allow for the reuse of existing application logic with requiring any modification or re-factoring of the existing application code base. Second, since the Web services generated using embodiments of the present invention rely on the actual logic/code implemented in existing applications, the run-time behavior of these Web services is identical to the run-time behavior of the existing applications. Third, embodiments of the present invention natively provide for the ability to generate web services that are primitive or composite in nature. For example, a BPEL-based composite service can be created that invokes operations performed by multiple, different applications. Fourth, the design-time process of creating a Web service can be either fully or partially automated, thereby reducing development effort and expense. Fifth, embodiments of the present invention can run on J2EE standards compatible middleware environments. Sixth, the Web services generated using embodiments of the present invention have the same performance characteristics as the underlying existing applications. In other words, there is minimal or no performance degradation in invoking logic via the generated Web service versus via the existing application.
In one set of embodiments, the techniques described herein can be implemented as an adapter to the BPEL P2P pack delivered as part of the Oracle AIA and Oracle eBusiness Suite Integration Foundation Pack, developed by Oracle Corporation. This provides customers greater flexibility to integrate the business logic implemented in existing applications into their process-to-process flows.
At step 102, an existing software application (or a component thereof) is identified, where the existing application is to be reused in the form of a new Web service. In one set of embodiments, the existing application is a Forms or OAF-based application. Alternatively, the existing application may be an application built using any type of application technology.
At step 104, program code for the existing application is parsed and metadata based on the program code is generated. In various embodiments, the metadata comprises information pertaining to the operations and/or data objects implemented in the existing application.
Once the metadata is generated at step 104, the metadata is customized based on one or more inputs (step 106). Generally speaking, this customization determines how the operations and data objects included in the generated metadata will map to operations and/or data objects to be exposed/used by the new Web service. For example, the customization process may include selecting one or more operations included in the metadata to be exposed as a Web service operation by the new Web service. The customization process may also include specifying alternative names for operations and/or data objects included in the metadata, where the alternative names will be used to refer to corresponding operations and/or data objects in the program code for the new Web service.
At step 108, artifacts for the new Web service are generated based on the customized metadata. The artifacts may include, for example, program code and related metadata for running the Web service, such as Java classes, Web Service Description Language (WSDL) files, and the like. In a particular set of embodiments, the artifacts may also include one or more files that are used at Web service run-time to invoke an operation implemented in the existing application when a corresponding Web service operation of the Web service is invoked. The process of generating these artifacts, as well as the content of the artifact files, is discussed in greater detail with respect to
Once the artifacts for the Web service are generated, a subset of these artifacts is packaged into an archive and deployed on one or more systems in a run-time environment (step 110). In addition, a service specification for the newly-generated Web service may be registered in a service directory/repository. The Web service can then be started in the run-time environment to provide services to one or more service consumers. As indicated above, when a Web service operation exposed by the Web service is invoked, a corresponding operation in the existing application is executed. In this manner, logic implemented in the existing application can be reused through the Web service. The run-time flow for running the generated Web service is discussed in greater detail with respect to
It should be appreciated that the specific steps illustrated in
In one set of embodiments, design-time user 202 is configured to select an existing software application (or a component of an existing application) and provide that selection to design-time-environment 204 (per step 102 of
Metadata generator 206 is configured to receive program code for the existing application and generate metadata based on the program code (per step 104 of
Web service generator 208 is configured to receive one or more customizations to the metadata generated by metadata generator 206, apply the customizations to the metadata, and generate artifacts for a new Web service based on the customized metadata (per steps 106, 108 of
Once artifacts for the Web service are generated by Web service generator 208, one or more of these artifacts are packaged by deployment archive generator 210. This packaging process may include compiling program code for the Web service, copying required libraries, and generating an archive file (e.g., a WAR/EAR archive). In one set of embodiments, this packaging process is facilitated by a utility such as the Oracle Web Services Assembler (OWSA). The generated archive is then deployed to a run-time environment (per step 110 of
At step 302, a selection of a existing software application (or a component thereof) to be reused as a Web service is received. As discussed previously, the existing application may be a Forms-based application, an OAF-based application, or an application built using any other type of application technology.
At step 304, metadata is generated based on the program code for the existing application. In one set of embodiments, the metadata generated at step 304 comprises at least three metadata files. The first metadata file defines one or more existing operations implemented in the existing application. For example, if the existing application is a Forms-based application, the operations defined in the first metadata file may include button-based or menu-based operations implemented in a particular form. Alternatively, if the existing application is an OAF-based application, the operations defined in the first metadata file may include button-based operations implemented in a particular OA page. In a specific embodiment, the first metadata file is generated as a Microsoft Excel workbook, and each sheet in the workbook corresponds to an operation in the existing application.
The second metadata file defines one or more data objects associated with the one or more existing operations. For example, if the existing application is a Forms-based application, the data objects defined in the second metadata file may include form blocks and form items. Alternatively, if the existing application is an OAF-based application, the data objects defined in the second metadata file may include one or more class definitions. In a specific embodiment, the second metadata file is also generated as a Microsoft Excel workbook, and each sheet in the workbook corresponds to a form block or a Java class. The workbook may also include a “Relationship” sheet that defines parent/child relationships between the blocks or classes.
The third metadata file defines one or more names associated with the existing operations and data objects defined in the first and second metadata files. As discussed in detail below, the names in the third metadata file represent names for corresponding Web service operations and data objects to be exposed/used by the new Web service. In a specific embodiment, the third metadata file is also generated as a Microsoft Excel workbook, and each sheet in the workbook includes names for a single operation and its associated data objects.
Once the first, second, and third metadata files are generated, customizations to be applied to these files are received (step 306). In an embodiment, this step comprises presenting the generated metadata files to a design-time user (such as design-time user 202 of
At steps 308, 310, 312, 314, various artifacts are created for the new Web service based on the customized metadata of step 306. For example, at step 308, an operation definition file and an object definition file are created for the Web service. The operation definition file defines one or more Web service operations to be exposed by the Web service, and is based on the existing operations defined in the first metadata file and the alternative names defined in the third metadata file. Returning to the example above, if the first metadata file defines an existing operation “Operation1” and if the third metadata file defines an alternative name “WSOperation1” for “Operation1,” the operation definition file would define a Web service operation named “WSOperation1” that corresponds to the existing operation “Operation1” implemented in the existing application.
Similarly, the object definition file defines one or more Web service data objects to be used by the Web service, and is based on the existing data objects defined in the second metadata file and the alternative names defined in the third metadata file. For example, if the second metadata file defines existing data objects “DataObject1” and “DataObject2” and if the third metadata file defines alternative names “WSDataObject1” and “WSDataObject2”for “DataObject1” and “DataObject2,” the object definition file would define data objects for the Web service named “WSDataObject1” and “WSDataObject2” corresponding to the existing data objects “DataObject1” and “DataObject2” respectively.
At step 310, one or more mapping files are generated based on the second and third metadata files. In various embodiments, one mapping file is created for each existing operation defined in the second metadata file. Each mapping file identifies the existing operation, its associated data objects, and mappings between those entities and the alternative names defined in the third metadata file. As discussed in further detail below, these mapping files are used to determine how to map an invocation of an operation of the new Web service to an existing operation implemented in the existing application at run-time.
At step 312, one or more template payload files are generated based on the mapping files of step 310 and the program code for the existing application. In various embodiments, one template payload file is created for each existing operation defined in the second metadata file. Each template payload file defines a template payload to be delivered to the existing application when a Web service operation corresponding to that existing operation is invoked. In one set of embodiments, the template payload includes an invocation of the existing operation and placeholder (or null) values for the input parameters of the operation. These placeholder values are populated with actual input parameter values at service run-time, and the populated template payload is then transmitted to the existing application for execution. The template payload may also include a sequence of zero or more sub-operations to be executed by the existing application in order to fully carry out the existing operation. For example, if the existing application is a Forms-based application, these sub-operations may include a sequence of one or more form triggers that should be processed upon execution of the existing operation. If the existing application is an OAF-based application, these sub-operations may include a sequence of one or more methods that should be processed upon execution of the existing operation.
At step 314, program code and related metadata for the Web service is generated, where the program code and related metadata comprise one or more Java classes and one or more service definitions (e.g., WSDL files). In one set of embodiments, the Java classes generated at this step include a method that takes a payload file (representing an invocation of an operation of the Web service) as input and calls an orchestration process for processing the payload file and causing a corresponding operation implemented the existing application to be executed. This run-time processing is discussed in greater detail with respect to
Once all of the artifacts for the Web service are generated, a script is executed for packaging the program code and related data into an archive. In one set of embodiments, the script is an ANT script configured to copy required libraries for the Java classes, compile the Java code, and invoke an assembler tool such as OWSA to generate a WAR/EAR archive.
The archive is then deployed to an application server in a run-time environment (step 318). In this manner, the generated Web service is made available for consumption by various service clients. In some embodiments, the mapping and template payload files generated at steps 310, 312 may be included in the archive generated at step 316. In other embodiments, the mapping and template payload files may be stored separately in an integration repository (e.g., integration repository 212 of
It should be appreciated that the specific steps illustrated in
Run-time client 402 is configured to send to generated Web service 408 a payload file representing an invocation of an operation exposed by the service. In response, generated Web service 408 is configured to invoke a run-time orchestration process 406 for processing the payload file and causing a corresponding operation implemented in existing application 416 to be executed.
In various embodiments, run-time orchestration process is adapted to call one or more run-time Web services 404 to facilitate this processing. The run-time Web services include a metadata retriever Web service 410 configured to retrieve artifacts for generated Web service 408 from integration repository 212, a payload generator Web service 412 configured to generate a final payload for existing application 416 based on the payload received from run-time client 402, an application launcher Web service 414 configured to communicate the final payload to existing application 416 and receive any output values, and an\ response transformation Web service 418 configured to convert those output values into a format appropriate for generated Web service 408. The processing performed by run-time orchestration process 406 is discussed in greater detail with respect to
At step 502, a Web service operation exposed by the Web service generated per flowchart 300 is invoked by a run-time client. In one set of embodiments, this invoking comprises sending to the Web service a payload file identifying the invoked Web service operation and one or more input parameter values for the Web service operation. For example, assume that the run-time client invokes a Web service operation named “WSOperation1” that comprises input parameters “WSParam1” and “WSParam2.” In this case, the payload file would include a reference to “WSOperation1” with values for “WSParam1” and “WSParam2” respectively.
At steps 504 and 506, the Web service receives the payload file and passes the file to a run-time orchestration process (e.g., orchestration process 406 of
For example, at step 508, the orchestration process invokes a metadata retriever Web service (e.g., service 410 of
At step 512, the orchestration process invokes the metadata retriever Web service a second time and passes the existing application name and existing operation name received at step 510 as input. In response, the metadata retriever Web service returns to the orchestration process the mapping file and template payload file generated for that existing operation at design-time of the Web service (e.g., steps 310, 312 of flowchart 300). Returning to the example above, assume that the Web service operation “WSOperation1” referenced in the payload file corresponds to an existing operation “Operation1” with input parameters “DataObject1” and “DataObject2.” In this case, the mapping file would include a first mapping between existing operation “Operation1” and alternative operation name “WSOperation1,” a second mapping between the existing data object “DataObject1” and alternative data object name “WSDataObject1,” and a third mapping between existing data object “DataObject2” and alternative data object name “WSDataObject2.” Further, the template payload file would include an invocation of “Operation1” with null values for input parameters “DataObject1” and “DataObject2” and a sequence of zero or more sub-operations for “Operation1.”
At step 516, the run-time orchestration process invokes a payload generator Web service (e.g., service 412 of
Once the final payload file is generated and received at the orchestration process, the final payload file is passed to an application launcher Web service (e.g., service 414 of
Although not shown in flowchart 500, the orchestration process may also receive one or more output parameter values resulting from the execution of the existing operation by the existing application. These output values may be passed back to the generated Web service directly, or may be passed to a response transformation Web service (e.g., service 418 of
It should be appreciated that the specific steps illustrated in
Forms communication servlet 602 acts as a lifecycle manager for the Forms-based application. In one set of embodiments, servlet 602 receives a form name, the final payload file generated at step 518 of
Once Forms client 606 is started, PJC communicator bean 608 is instantiated. PJC communicator bean 608 is configured to communicate with Forms instance 610 and wait for a response from instance 610 indicating that the operation(s) in the final payload have been executed. When PJC communicator bean 608 receives the response, the bean sets the “isResponseArrived” variable in shared cache 604 to true. Forms communication servlet 602 detects this change in the “isResponseArrived” variable, retrieves a response object from the shared cache, and sends the response object to application launcher Web service 414. Forms communication servlet 602 also closes the instance of Forms client 606.
Client computing devices 702, 704, 706, 708 may be general purpose personal computers (including, for example, personal computers and/or laptop computers running various versions of Microsoft Windows and/or Apple Macintosh operating systems), cell phones or PDAs (running software such as Microsoft Windows Mobile and being Internet, e-mail, SMS, Blackberry, and/or other communication protocol enabled), and/or workstation computers running any of a variety of commercially-available UNIX or UNIX-like operating systems (including without limitation the variety of GNU/Linux operating systems). Alternatively, client computing devices 702, 704, 706, and 708 may be any other electronic device capable of communicating over a network (e.g., network 712 described below) with server computer 710. Although system environment 700 is shown with four client computing devices and one server computer, any number of client computing devices and server computers may be supported.
Server computer 710 may be a general purpose computer, specialized server computer (including, e.g., a LINUX server, UNIX server, mid-range server, mainframe computer, rack-mounted server, etc.), server farm, server cluster, or any other appropriate arrangement and/or combination. Server computer 710 may run an operating system including any of those discussed above, as well as any commercially available server operating system. Server computer 710 may also run any of a variety of server applications and/or mid-tier applications, including web servers, Java virtual machines, application servers, database servers, and the like. In various embodiments, server computer 710 is adapted to run one or more Web services or software applications described in the foregoing disclosure. For example, server computer 710 may run any of the run-time or design-time components/services depicted in
As shown, client computing devices 702, 704, 706, 708 and server computer 710 are communicatively coupled via network 712. Network 712 may be any type of network that can support data communications using any of a variety of commercially-available protocols, including without limitation TCP/IP, SNA, IPX, AppleTalk, and the like. Merely by way of example, network 712 may be a local area network (LAN), such as an Ethernet network, a Token-Ring network and/or the like; a wide-area network; a virtual network, including without limitation a virtual private network (VPN); the Internet; an intranet; an extranet; a public switched telephone network (PSTN); an infra-red network; a wireless network (e.g., a network operating under any of the IEEE 802.11 suite of protocols, the Bluetooth protocol known in the art, and/or any other wireless protocol); and/or any combination of these and/or other networks.
System environment 700 may also include one or more databases 714. Database 714 may correspond to an instance of integration repository 214 of
Computer system 800 may additionally include a computer-readable storage media reader 812, a communications subsystem 814 (e.g., a modem, a network card (wireless or wired), an infra-red communication device, etc.), and working memory 818, which may include RAM and ROM devices as described above. In some embodiments, computer system 800 may also include a processing acceleration unit 816, which can include a digital signal processor (DSP), a special-purpose processor, and/or the like.
Computer-readable storage media reader 812 can further be connected to a computer-readable storage medium 810, together (and, optionally, in combination with storage device(s) 808) comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information. Communications system 814 may permit data to be exchanged with network 712 of
Computer system 800 may also comprise software elements, shown as being currently located within working memory 818, including an operating system 820 and/or other code 822, such as an application program (which may be a client application, Web browser, mid-tier application, RDBMS, etc.). In a particular embodiment, working memory 818 may include executable code and associated data structures for one or more of the design-time or runtime components/services illustrated in
In one set of embodiments, the techniques described herein may be implemented as program code executable by a computer system (such as a computer system 800) and may be stored on machine-readable media. Machine-readable media may include any appropriate media known or used in the art, including storage media and communication media, such as (but not limited to) volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as machine-readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store or transmit the desired information and which can be accessed by a computer.
Although specific embodiments of the present invention have been described, various modifications, alterations, alternative constructions, and equivalents are within the scope of the invention. For example, while embodiments of the present invention have been described in the context of generating Web services based on Forms or OAF-based applications, it should be appreciated that the techniques described herein may be applied to generate Web services based on any type of existing application built using any type of application technology.
Further, while embodiments of the present invention have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are also within the scope of the present invention. The present invention may be implemented only in hardware, or only in software, or using combinations thereof.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.
The present application is a continuation of U.S. patent application Ser. No. 12/487,004 filed Jun. 18, 2009, entitled “SYSTEM AND METHOD FOR META-DATA DRIVEN, SEMI-AUTOMATED GENERATION OF WEB SERVICES BASED ON EXISTING APPLICATIONS,” which claims the benefit and priority under 35 U.S.C. 119(e) of U.S. Provisional Application No. 61/098,571, filed Sep. 19, 2008, entitled “SYSTEM AND METHOD FOR META-DATA DRIVEN, SEMI-AUTOMATED GENERATION OF WEB SERVICES BASED ON EXISTING APPLICATIONS,” the entire contents of which are incorporated herein by reference for all purposes. Further, the present application is related to commonly-owned U.S. patent application Ser. No. 12/203,816, filed Sep. 3, 2008 and entitled “SYSTEM AND METHOD FOR INTEGRATION OF BROWSER-BASED THIN CLIENT APPLICATIONS WITHIN DESKTOP RICH CLIENT ARCHITECTURE,” the entire contents of which are incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
4595981 | Leung | Jun 1986 | A |
5659754 | Grove et al. | Aug 1997 | A |
5790778 | Bush et al. | Aug 1998 | A |
5850518 | Northrup | Dec 1998 | A |
5946492 | Bates | Aug 1999 | A |
6047332 | Viswanathan et al. | Apr 2000 | A |
6078745 | De et al. | Jun 2000 | A |
6117180 | Dave et al. | Sep 2000 | A |
6138270 | Hsu | Oct 2000 | A |
6154877 | Ramkumar et al. | Nov 2000 | A |
6161219 | Ramkumar et al. | Dec 2000 | A |
6397254 | Northrup | May 2002 | B1 |
6401134 | Razavi et al. | Jun 2002 | B1 |
6421705 | Northrup | Jul 2002 | B1 |
6442751 | Cocchi et al. | Aug 2002 | B1 |
6487713 | Cohen et al. | Nov 2002 | B1 |
6546413 | Northrup | Apr 2003 | B1 |
6601233 | Underwood | Jul 2003 | B1 |
6641746 | Houge et al. | Nov 2003 | B2 |
6671713 | Northrup | Dec 2003 | B2 |
6671746 | Northrup | Dec 2003 | B1 |
6779000 | Northrup | Aug 2004 | B1 |
6807636 | Hartman et al. | Oct 2004 | B2 |
6901580 | Iwanojko et al. | May 2005 | B2 |
6922675 | Chatterjee et al. | Jul 2005 | B1 |
6922705 | Northrup | Jul 2005 | B1 |
6947992 | Shachor | Sep 2005 | B1 |
6954792 | Kang et al. | Oct 2005 | B2 |
6973460 | Mitra | Dec 2005 | B1 |
6990532 | Day et al. | Jan 2006 | B2 |
7028019 | McMillan et al. | Apr 2006 | B2 |
7062749 | Cyr et al. | Jun 2006 | B2 |
7086009 | Resnick et al. | Aug 2006 | B2 |
7117216 | Chakraborty et al. | Oct 2006 | B2 |
7146607 | Nair et al. | Dec 2006 | B2 |
7177878 | Wason | Feb 2007 | B2 |
7188158 | Stanton et al. | Mar 2007 | B1 |
7203938 | Ambrose et al. | Apr 2007 | B2 |
7263686 | Sadiq | Aug 2007 | B2 |
7343360 | Ristanovic et al. | Mar 2008 | B1 |
7349913 | Clark et al. | Mar 2008 | B2 |
7505990 | Krishna et al. | Mar 2009 | B2 |
7535927 | Northrup | May 2009 | B1 |
7536606 | Andrews et al. | May 2009 | B2 |
7555712 | Croft et al. | Jun 2009 | B2 |
7584207 | Mortensen et al. | Sep 2009 | B2 |
7590644 | Matsakis et al. | Sep 2009 | B2 |
7603674 | Cyr et al. | Oct 2009 | B2 |
7644262 | Bromley et al. | Jan 2010 | B1 |
7680752 | Clune, III et al. | Mar 2010 | B1 |
7685604 | Baartman et al. | Mar 2010 | B2 |
7693851 | Becker | Apr 2010 | B2 |
7721158 | Lee | May 2010 | B2 |
7774477 | Zintel | Aug 2010 | B2 |
7783782 | Cromp et al. | Aug 2010 | B2 |
7788338 | Savchenko et al. | Aug 2010 | B2 |
7793340 | Kiester et al. | Sep 2010 | B2 |
7827494 | Hedayatpour et al. | Nov 2010 | B1 |
7840941 | Brookins et al. | Nov 2010 | B2 |
7853899 | Damaschke et al. | Dec 2010 | B1 |
7865544 | Kordun et al. | Jan 2011 | B2 |
7895512 | Roberts | Feb 2011 | B2 |
7908162 | Jennings | Mar 2011 | B2 |
7933946 | Livshits et al. | Apr 2011 | B2 |
7945907 | Dreiling et al. | May 2011 | B2 |
7950424 | Ozanne et al. | May 2011 | B2 |
7954111 | Waguet | May 2011 | B2 |
7984424 | Dengler et al. | Jul 2011 | B2 |
7992130 | Bozza et al. | Aug 2011 | B2 |
8015545 | Seto et al. | Sep 2011 | B2 |
8032390 | Waguet | Oct 2011 | B2 |
8065668 | Bosworth et al. | Nov 2011 | B2 |
8074214 | Isaacson et al. | Dec 2011 | B2 |
8108825 | Goodwin et al. | Jan 2012 | B2 |
8122292 | Nanjundaswamy | Feb 2012 | B2 |
8141064 | Chipman | Mar 2012 | B2 |
8166450 | Fuhler et al. | Apr 2012 | B2 |
8196125 | Maes | Jun 2012 | B2 |
8209672 | Ivanov | Jun 2012 | B2 |
8209675 | Zhao et al. | Jun 2012 | B2 |
8271609 | Addala et al. | Sep 2012 | B2 |
8332654 | Anbuselvan | Dec 2012 | B2 |
8375362 | Brette | Feb 2013 | B1 |
8423973 | Saunders et al. | Apr 2013 | B2 |
8494832 | Krishnan et al. | Jul 2013 | B2 |
8538998 | Barrow | Sep 2013 | B2 |
8555266 | Copeland et al. | Oct 2013 | B2 |
8560938 | Barrow et al. | Oct 2013 | B2 |
8561089 | Leff et al. | Oct 2013 | B2 |
8601454 | Christophe | Dec 2013 | B2 |
8667031 | Konduri et al. | Mar 2014 | B2 |
8782604 | Konduri et al. | Jul 2014 | B2 |
8788542 | Barrow | Jul 2014 | B2 |
8799319 | Srinivasan et al. | Aug 2014 | B2 |
8856658 | Brosh et al. | Oct 2014 | B2 |
8856737 | Kand et al. | Oct 2014 | B2 |
8869108 | Utschig-Utschig et al. | Oct 2014 | B2 |
8875306 | Lowes | Oct 2014 | B2 |
8954942 | Krishnamurthy | Feb 2015 | B2 |
8966465 | Konduri | Feb 2015 | B2 |
8996658 | Anbuselvan | Mar 2015 | B2 |
9122520 | Addala et al. | Sep 2015 | B2 |
20020013938 | Duesterwald et al. | Jan 2002 | A1 |
20020023140 | Hile et al. | Feb 2002 | A1 |
20020103660 | Cramon et al. | Aug 2002 | A1 |
20020129060 | Rollins et al. | Sep 2002 | A1 |
20020133515 | Kagle et al. | Sep 2002 | A1 |
20020143735 | Ayi et al. | Oct 2002 | A1 |
20020147757 | Day et al. | Oct 2002 | A1 |
20020188613 | Chakraborty et al. | Dec 2002 | A1 |
20030005117 | Kang et al. | Jan 2003 | A1 |
20030023587 | Dennis et al. | Jan 2003 | A1 |
20030025732 | Prichard | Feb 2003 | A1 |
20030033310 | Factor et al. | Feb 2003 | A1 |
20030034989 | Kondo | Feb 2003 | A1 |
20030074653 | Ju et al. | Apr 2003 | A1 |
20030084424 | Reddy et al. | May 2003 | A1 |
20030088857 | Balva et al. | May 2003 | A1 |
20030172127 | Northrup et al. | Sep 2003 | A1 |
20030172168 | Mak et al. | Sep 2003 | A1 |
20030172193 | Olsen | Sep 2003 | A1 |
20030192031 | Srinivasan et al. | Oct 2003 | A1 |
20030204518 | Lang et al. | Oct 2003 | A1 |
20030204645 | Sharma et al. | Oct 2003 | A1 |
20030233631 | Curry et al. | Dec 2003 | A1 |
20030233642 | Hank | Dec 2003 | A1 |
20040046787 | Henry et al. | Mar 2004 | A1 |
20040046789 | Inanoria | Mar 2004 | A1 |
20040054991 | Harres | Mar 2004 | A1 |
20040073565 | Kaufman et al. | Apr 2004 | A1 |
20040078424 | Yairi et al. | Apr 2004 | A1 |
20040111533 | Beisiegel et al. | Jun 2004 | A1 |
20040111673 | Bowman et al. | Jun 2004 | A1 |
20040148588 | Sadiq | Jul 2004 | A1 |
20040181534 | Mortensen et al. | Sep 2004 | A1 |
20040194016 | Liggitt | Sep 2004 | A1 |
20040205117 | Hertling et al. | Oct 2004 | A1 |
20040205765 | Beringer et al. | Oct 2004 | A1 |
20040216094 | Bosworth et al. | Oct 2004 | A1 |
20040230639 | Soluk et al. | Nov 2004 | A1 |
20040261066 | Ringseth et al. | Dec 2004 | A1 |
20050044197 | Lai | Feb 2005 | A1 |
20050050527 | McCrady et al. | Mar 2005 | A1 |
20050091639 | Patel | Apr 2005 | A1 |
20050097503 | Zintel et al. | May 2005 | A1 |
20050183074 | Alexander et al. | Aug 2005 | A1 |
20050193061 | Schmidt et al. | Sep 2005 | A1 |
20050223361 | Belbute | Oct 2005 | A1 |
20050240858 | Croft et al. | Oct 2005 | A1 |
20050251788 | Henke et al. | Nov 2005 | A1 |
20050273772 | Matsakis et al. | Dec 2005 | A1 |
20060010163 | Herzog et al. | Jan 2006 | A1 |
20060015847 | Carroll et al. | Jan 2006 | A1 |
20060031264 | Bosworth et al. | Feb 2006 | A1 |
20060031750 | Waldorf et al. | Feb 2006 | A1 |
20060036463 | Patrick et al. | Feb 2006 | A1 |
20060075387 | Martin et al. | Apr 2006 | A1 |
20060080117 | Carr et al. | Apr 2006 | A1 |
20060101038 | Gabriel et al. | May 2006 | A1 |
20060106626 | Jeng et al. | May 2006 | A1 |
20060117073 | Bosworth et al. | Jun 2006 | A1 |
20060130047 | Burugapalli | Jun 2006 | A1 |
20060136832 | Keller et al. | Jun 2006 | A1 |
20060143229 | Bou-ghannam et al. | Jun 2006 | A1 |
20060150156 | Cyr et al. | Jul 2006 | A1 |
20060165105 | Shenfield et al. | Jul 2006 | A1 |
20060168115 | Loupia | Jul 2006 | A1 |
20060168132 | Bunter et al. | Jul 2006 | A1 |
20060168355 | Shenfield et al. | Jul 2006 | A1 |
20060168557 | Agrawal et al. | Jul 2006 | A1 |
20060184866 | Rees | Aug 2006 | A1 |
20060206858 | Becker et al. | Sep 2006 | A1 |
20060235733 | Marks | Oct 2006 | A1 |
20060235986 | Kim | Oct 2006 | A1 |
20060242636 | Chilimbi et al. | Oct 2006 | A1 |
20060253490 | Krishna et al. | Nov 2006 | A1 |
20060253586 | Woods | Nov 2006 | A1 |
20060265702 | Isaacson et al. | Nov 2006 | A1 |
20060271537 | Chandrasekharan et al. | Nov 2006 | A1 |
20060277542 | Wipfel | Dec 2006 | A1 |
20060282767 | Suryanarayana et al. | Dec 2006 | A1 |
20060294474 | Taylor et al. | Dec 2006 | A1 |
20060294506 | Dengler et al. | Dec 2006 | A1 |
20070016429 | Bournas et al. | Jan 2007 | A1 |
20070027742 | Emuchay | Feb 2007 | A1 |
20070055936 | Dhanjal et al. | Mar 2007 | A1 |
20070106975 | DeLine | May 2007 | A1 |
20070113191 | Keller et al. | May 2007 | A1 |
20070130205 | Dengler et al. | Jun 2007 | A1 |
20070157078 | Anderson | Jul 2007 | A1 |
20070169199 | Quinnell et al. | Jul 2007 | A1 |
20070174763 | Chang et al. | Jul 2007 | A1 |
20070174822 | Moser et al. | Jul 2007 | A1 |
20070203956 | Anderson et al. | Aug 2007 | A1 |
20070220429 | Kureshy et al. | Sep 2007 | A1 |
20070240096 | Pontoppidan et al. | Oct 2007 | A1 |
20070245340 | Cohen et al. | Oct 2007 | A1 |
20070260575 | Robinson et al. | Nov 2007 | A1 |
20070266377 | Ivanov | Nov 2007 | A1 |
20070271552 | Pulley | Nov 2007 | A1 |
20070277095 | Ukigawa | Nov 2007 | A1 |
20070282885 | Baude et al. | Dec 2007 | A1 |
20070294586 | Parvathy et al. | Dec 2007 | A1 |
20070294664 | Joshi | Dec 2007 | A1 |
20070299705 | Chen | Dec 2007 | A1 |
20080004887 | Brunswig et al. | Jan 2008 | A1 |
20080022257 | Baartman et al. | Jan 2008 | A1 |
20080028302 | Meschkat | Jan 2008 | A1 |
20080033988 | Narayan | Feb 2008 | A1 |
20080065675 | Bozich et al. | Mar 2008 | A1 |
20080077848 | Roberts | Mar 2008 | A1 |
20080083012 | Yu et al. | Apr 2008 | A1 |
20080104617 | Apacible et al. | May 2008 | A1 |
20080120557 | Offenhartz et al. | May 2008 | A1 |
20080120620 | Lett et al. | May 2008 | A1 |
20080126396 | Gagnon | May 2008 | A1 |
20080127087 | Brookins et al. | May 2008 | A1 |
20080127124 | Gilfix et al. | May 2008 | A1 |
20080162208 | Waguet | Jul 2008 | A1 |
20080162304 | Ourega | Jul 2008 | A1 |
20080162565 | Waguet | Jul 2008 | A1 |
20080163164 | Chowdhary et al. | Jul 2008 | A1 |
20080183479 | Iwashita et al. | Jul 2008 | A1 |
20080183744 | Adendorff et al. | Jul 2008 | A1 |
20080184201 | Burns et al. | Jul 2008 | A1 |
20080189358 | Charles | Aug 2008 | A1 |
20080189617 | Covell et al. | Aug 2008 | A1 |
20080196024 | Barfield et al. | Aug 2008 | A1 |
20080243901 | Super et al. | Oct 2008 | A1 |
20080250313 | Kamdar et al. | Oct 2008 | A1 |
20080275844 | Buzsaki et al. | Nov 2008 | A1 |
20080276218 | Taylor et al. | Nov 2008 | A1 |
20080276260 | Garlick et al. | Nov 2008 | A1 |
20080295109 | Huang et al. | Nov 2008 | A1 |
20080313648 | Wang et al. | Dec 2008 | A1 |
20080320246 | Fuhler et al. | Dec 2008 | A1 |
20090031280 | Koehler | Jan 2009 | A1 |
20090037896 | Grechanik | Feb 2009 | A1 |
20090083297 | Pohl et al. | Mar 2009 | A1 |
20090089741 | Bornhoevd et al. | Apr 2009 | A1 |
20090094588 | Chipman | Apr 2009 | A1 |
20090106494 | Knebel | Apr 2009 | A1 |
20090125893 | Copeland et al. | May 2009 | A1 |
20090144716 | Felts | Jun 2009 | A1 |
20090144729 | Guizar | Jun 2009 | A1 |
20090150565 | Grossner et al. | Jun 2009 | A1 |
20090157859 | Morris | Jun 2009 | A1 |
20090158237 | Zhang et al. | Jun 2009 | A1 |
20090158263 | Christophe | Jun 2009 | A1 |
20090178020 | Goodwin et al. | Jul 2009 | A1 |
20090204567 | Barrow | Aug 2009 | A1 |
20090204629 | Barrow | Aug 2009 | A1 |
20090204884 | Barrow et al. | Aug 2009 | A1 |
20090204943 | Konduri | Aug 2009 | A1 |
20090205013 | Lowes | Aug 2009 | A1 |
20090217153 | Oshima et al. | Aug 2009 | A1 |
20090259993 | Konduri et al. | Oct 2009 | A1 |
20090292797 | Cromp et al. | Nov 2009 | A1 |
20090313256 | Konduri et al. | Dec 2009 | A1 |
20090320007 | Krishnaswamy et al. | Dec 2009 | A1 |
20100057482 | Radhakrishnan et al. | Mar 2010 | A1 |
20100057836 | Anbuselvan | Mar 2010 | A1 |
20100070553 | Addala et al. | Mar 2010 | A1 |
20100070973 | Addala et al. | Mar 2010 | A1 |
20100082556 | Srinivasan et al. | Apr 2010 | A1 |
20100131937 | Misra et al. | May 2010 | A1 |
20100132009 | Khemani et al. | May 2010 | A1 |
20100146291 | Anbuselvan | Jun 2010 | A1 |
20100162220 | Cui et al. | Jun 2010 | A1 |
20100236660 | Ozanne et al. | Sep 2010 | A1 |
20100313038 | Bradley et al. | Dec 2010 | A1 |
20100332401 | Prahlad et al. | Dec 2010 | A1 |
20100332454 | Prahlad et al. | Dec 2010 | A1 |
20100333116 | Prahlad et al. | Dec 2010 | A1 |
20110010692 | Hattori et al. | Jan 2011 | A1 |
20110023071 | Li et al. | Jan 2011 | A1 |
20110047415 | Nanjundaswamy | Feb 2011 | A1 |
20110119649 | Kand et al. | May 2011 | A1 |
20110119651 | Utschig-utschig et al. | May 2011 | A1 |
20110282829 | Rangaswamy et al. | Nov 2011 | A1 |
20120116980 | Mercuri | May 2012 | A1 |
20120296624 | Jeng et al. | Nov 2012 | A1 |
20130024424 | Prahlad et al. | Jan 2013 | A1 |
20130086568 | Krishnamurthy | Apr 2013 | A1 |
20140081896 | Ranganathan et al. | Mar 2014 | A1 |
20140282602 | Addala et al. | Sep 2014 | A1 |
Entry |
---|
Belushi et al., “An approach to wrap legacy applications into web services,” IEE International Conference on Service Systems and Service Management, Issue Date: Jun. 9-11, 2007. |
Soap Basics, http://web.archive.org/web/20050413022320/http://www.soapuser.com/basics1.html, archived Apr. 13, 2005. |
Liu et al., “Reengineering legacy systems with RESTful web service,” 32nd Annual IEEE International Conference on Computer Software and Applications, Jul. 28-Aug. 1, 2008. |
Oracle BPEL 10g Purging Strategies, An Oracle White Paper, Oracle, Aug. 2010, 21 pages. |
Oracle SOA Suite 11 g: Essential Concepts, vol. I—Student Guide, Edition 1.0, Oracle, Sep. 2010, pp. 8-18 to 8-21. |
Bohn et al., WS-BPEL Process Compiler for Resource-Constrained Embedded Systems, 22nd International Conference on Advanced Information Networking and Applications, IEEE, 2008, pp. 1387-1392. |
U.S. Appl. No. 12/029,724, Advisory Action mailed on Aug. 12, 2013, 2 pages. |
U.S. Appl. No. 13/360,127, Notice of Allowance mailed on Nov. 4, 2014, 10 pages. |
U.S. Appl. No. 12/029,615, Corrected Notice of Allowability mailed on Jan. 29, 2015, 4 pages. |
U.S. Appl. No. 12/203,816, Corrected Notice of Allowability mailed on Feb. 10, 2015, 6 pages. |
U.S. Appl. No. 12/203,816, Notice of Allowance mailed on Dec. 19, 2014, 8 pages. |
Non-Final Office Action for U.S. Appl. No. 14/288,265 mailed on Apr. 11, 2016, all pages. |
AJAX & Security: Vulnerability in DWR Security Logic Identified Can Potentially be exploited to launce DoS attacks and break into back-end servers, AjaxWorld™ Magazine, downloaded on Oct. 6, 2008 from http:/lajax.sys-con.com/node/319868, Jan. 8, 2007, 4 pages. |
Business Process Language (BPEL) and Oracle BPEL Process Manager, Oracle FAQ,at URL: http://www .oracle.com/tech no logy/prod ucts/ias/bpel/htdocs/orabpel—faq. html? template= . . . , Nov. 11, 2009, 3 pages. |
Client-Server Modernization—From Oracle® Forms to Java, VGO Software Products, printed at URL: http://www.vgosoftware.com/products/evo/index.php, Aug. 28, 2009, 2 pages. |
Direct Web Remoting, About DWR's Javascript Security, downloaded from http://directwebremoting.org/dwr/security/script-tag-protection, Oct. 6, 2008, 4 pages. |
Direct Web Remoting, DWR version 2—New and Noteworthy, downloaded from http://directwebremoting.org/dwr/changelog/dwr20, Dec. 5, 2008, 4 pages. |
Direct Web Remoting, DWR: Easy AJAX for JAVA, downloaded from http://directwebremoting.org/dwr/overview/dwr, Oct. 6, 2008, 2 pages. |
Direct Web Remoting, Safari, GET and Request Forgery, downloaded from http://directwebremoting.org/dwr/security/allowGetForSafariButMakeForgeryEasier, Oct. 6, 2008, 1 page. |
Direct Web Remoting, Security, downloaded from http://directwebremoting.org/dwr/security, Oct. 6, 2008, 4 pages. |
Dynamic Structure in ADF UIX Pages, Oracle ADF UIX Developer's Guide, downloaded from http://www.oracle.com/webapps/online-help/jdeveloper/1 0.1.2/state/content/navId.4/navSetld /vtAnchor. Delta Tree!vtTopicFile.uixheip%7Cuixdevguide%7Cdynamic%7Ehtml/, Apr. 21, 2008, pp. 1-11. |
Exodus—Main Features Benefits, CipherSoft Inc, Products, at URL: http://www.ciphersoftinc.com/products/expdus-features benefits.html, Aug. 28, 2009, 3 pages. |
Exodus® Products, CipherSoft Inc. at URL: http://www.ciphersoftinc.com/products/migration-products-overview.html, Aug. 28, 2009, 3 pages. |
File and Registry Virtualization—the good, the bad, and the ugly, Jerry's Incoherent Babbling;Windows Connected Blog; at URL: http://windowsconnected.com/blogs/jerry/archive/2005/12/19/file-and-registry-virtualization-the-Good-the-bad-and-t . . . , Dec. 19, 2005, 6 pages. |
Google Web Toolkit, Product Overview, downloaded from http://code.google.com/webtoolkiUoverview. html, Oct. 6, 2008, 3 pages. |
Oracle Application Framework, Oracle, Dec. 2006, pp. 1-242. |
Oracle Forms to Java Modernization, at URL: http://www.vgosoftware.com/products/evo/walkthrough.php; VGO Software Information, Aug. 28, 2009, 5 pages. |
Vgo Software First to Convert Oracle Forms to Oracle ADF V11, VGO News http://www.vgosoftware.com/abouUnews/view article.php?new id=35;, Aug. 28, 2009, 2 pages. |
U.S. Appl. No. 12/029,600, Final Office Action mailed on Oct. 19, 2011, 21 pages. |
U.S. Appl. No. 12/029,600, Non-Final Office Action mailed on Apr. 27, 2011, 29 pages. |
U.S. Appl. No. 12/029,600, Notice of Allowance mailed on Jun. 11, 2013, 6 pages. |
U.S. Appl. No. 12/029,600, Notice of Allowance mailed on Nov. 7, 2012, 9 pages. |
U.S. Appl. No. 12/029,600, Notice of Allowance mailed on Feb. 5, 2013, 9 pages. |
U.S. Appl. No. 12/029,600, Non-Final Office Action mailed on Sep. 17, 2012, 24 pages. |
U.S. Appl. No. 12/029,600, Terminal Disclaimer mailed on Oct. 25, 2011, 1 page. |
U.S. Appl. No. 12/029,605, Advisory Action mailed on Dec. 18, 2013, 4 pages. |
U.S. Appl. No. 12/029,605, Final Office Action mailed on Nov. 2, 2011, 13 pages. |
U.S. Appl. No. 12/029,605, Final Office Action mailed on Sep. 28, 2010, 13 pages. |
U.S. Appl. No. 12/029,605, Final Office Action mailed on Sep. 6, 2013, 19 pages. |
U.S. Appl. No. 12/029,605, Non-Final Office Action mailed on May 12, 2010, 11 pages. |
U.S. Appl. No. 12/029,605, Non-Final Office Action mailed on Jul. 20, 2011, 13 pages. |
U.S. Appl. No. 12/029,605, Non-Final Office Action mailed on Apr. 10, 2013, 14 pages. |
U.S. Appl. No. 12/029,605, Notice of Allowance mailed on Mar. 3, 2014, 9 pages. |
U.S. Appl. No. 12/029,605, Notice of Allowance mailed on May 28, 2014, 2 pages. |
U.S. Appl. No. 12/029,609, Final Office Action mailed on Nov. 8, 2011, 13 pages. |
U.S. Appl. No. 12/029,609, Final Office Action mailed on Oct. 13, 2010, 14 pages. |
U.S. Appl. No. 12/029,609, Non-Final Office Action mailed on May 26, 2010, 17 pages. |
U.S. Appl. No. 12/029,609, Non-Final Office Action mailed on Jul. 28, 2011, 29 pages. |
U.S. Appl. No. 12/029,609, Notice of Allowance mailed on May 29, 2013, 14 pages. |
U.S. Appl. No. 12/029,609, Notice of Allowance mailed on Feb. 4, 2013, 24 pages. |
U.S. Appl. No. 12/029,615, Advisory Action mailed on Oct. 16, 2012, 5 pages. |
U.S. Appl. No. 12/029,615, Non-Final Office Action mailed on Feb. 15, 2012, 28 pages. |
U.S. Appl. No. 12/029,615, Non-Final Office Action mailed on Mar. 21, 2014, 29 pages. |
U.S. Appl. No. 12/029,615, Final Office Action mailed on Jul. 31, 2012, 33 pages. |
U.S. Appl. No. 12/029,724, Final Office Action mailed on Apr. 30, 2013, 22 pages. |
U.S. Appl. No. 12/029,724, Final Office Action mailed on May 5, 2011, 21 pages. |
U.S. Appl. No. 12/029,724, Non-Final Office Action mailed on Dec. 14, 2010, 22 pages. |
U.S. Appl. No. 12/029,724, Notice of Allowance mailed on Jun. 24, 2014, 13 pages. |
U.S. Appl. No. 12/029,724, Non-Final Office Action mailed on Jan. 7, 2013, 31 pages. |
U.S. Appl. No. 12/101,420, Final Office Action mailed on Feb. 24, 2012, 20 pages. |
U.S. Appl. No. 12/101,420, Non-Final Office Action mailed on Oct. 5, 2011, 18 pages. |
U.S. Appl. No. 12/101,420, Notice of Allowance mailed on Mar. 17, 2014, 8 pages. |
U.S. Appl. No. 12/101,420, Notice of Allowance mailed on Aug. 28, 2013, 9 pages. |
U.S. Appl. No. 12/138,997, Final Office Action mailed on Dec. 5, 2011, 13 pages. |
U.S. Appl. No. 12/138,997, Non Final Office Action mailed on Jun. 24, 2011, 15 pages. |
U.S. Appl. No. 12/138,997, Notice of Allowance mailed on Nov. 27, 2013, 13 pages. |
U.S. Appl. No. 12/203,816, Advisory Action mailed on Aug. 15, 2013, 3 pages. |
U.S. Appl. No. 12/203,816, Final Office Action mailed on Jan. 20, 2011, 23 pages. |
U.S. Appl. No. 12/203,816, Final Office Action mailed on Jul. 5, 2013, 25 pages. |
U.S. Appl. No. 12/203,816, Non-Final Office Action mailed on Sep. 2, 2010, 17 pages. |
U.S. Appl. No. 12/203,816, Non-Final Office Action mailed on Oct. 26, 2012, 30 pages. |
U.S. Appl. No. 12/210,657, Final Office Action mailed on Apr. 3, 2012, 24 pages. |
U.S. Appl. No. 12/210,657, Non-Final Office Action mailed on Sep. 30, 2011, 22 pages. |
U.S. Appl. No. 12/210,657, Non-Final Office Action mailed on Apr. 25, 2011, 23 pages. |
U.S. Appl. No. 12/210,657, Notice of Allowance mailed on Jun. 26, 2012, 7 pages. |
U.S. Appl. No. 12/212,599, Corrected Notice of Allowance mailed on Oct. 2, 2013, 4 pages. |
U.S. Appl. No. 12/212,599, Non-Final Office Action mailed on Dec. 22, 2011, 11 pages. |
U.S. Appl. No. 12/212,599, Notice of Allowance mailed on Feb. 7, 2014, 5 pages. |
U.S. Appl. No. 12/212,599, Notice of Allowance mailed on Jul. 15, 2014, 5 pages. |
U.S. Appl. No. 12/212,599, Notice of Allowance mailed on Sep. 25, 2014, 3 pages. |
U.S. Appl. No. 12/212,599, Notice of Allowance mailed on Jun. 19, 2013, 6 pages. |
U.S. Appl. No. 12/212,599, Non-Final Office Action mailed on Aug. 2, 2012, 14 pages. |
U.S. Appl. No. 12/330,008, Final Office Action mailed on Apr. 10, 2012, 14 pages. |
U.S. Appl. No. 12/330,008, Non-Final Office Action mailed on Dec. 21, 2011, 15 pages. |
U.S. Appl. No. 12/330,008, Notice of Allowance mailed on Aug. 7, 2012, 17 pages. |
U.S. Appl. No. 12/330,008, Notice of Allowance mailed on Jun. 11, 2012, 8 pages. |
U.S. Appl. No. 12/487,004, Advisory Action mailed on May 24, 2012, 3 pages. |
U.S. Appl. No. 12/487,004, Final Office Action mailed on Dec. 27, 2013, 18 pages. |
U.S. Appl. No. 12/487,004, Final Office Action mailed on Mar. 19, 2012, 31 pages. |
U.S. Appl. No. 12/487,004, Non Final Office Action mailed on Sep. 24, 2013, 22 pages. |
U.S. Appl. No. 12/487,004, Non-Final Office Action mailed on Sep. 28, 2011, 30 pages. |
U.S. Appl. No. 12/487,004, Notice of Allowance mailed on Jun. 16, 2014, 2 pages. |
U.S. Appl. No. 12/487,004, Notice of Allowance mailed on Mar. 6, 2014, 5 pages. |
U.S. Appl. No. 12/790,437, Final Office Action mailed on Jul. 12, 2013, 12 pages. |
U.S. Appl. No. 12/790,437, Non-Final Office Action mailed on Dec. 30, 2013, 15 pages. |
U.S. Appl. No. 12/790,437, Notice of Allowance mailed on Jun. 12, 2014, 5 pages. |
U.S. Appl. No. 12/790,437, Final Office Action mailed on Jan. 30, 2013, 26 pages. |
U.S. Appl. No. 12/790,437, Supplemental Notice of Allowability mailed on Aug. 13, 2014, 2 pages. |
U.S. Appl. No. 12/790,445, Final Office Action mailed on Jul. 5, 2013, 10 pages. |
U.S. Appl. No. 12/790,445, Non Final Office Action mailed on Dec. 31, 2013, 13 pages. |
U.S. Appl. No. 12/790,445, Non-Final Office Action mailed on Dec. 19, 2012, 23 pages. |
U.S. Appl. No. 12/790,445, Notice of Allowance mailed on Jun. 4, 2014, 5 pages. |
U.S. Appl. No. 13/360,127, Non-Final Office Action mailed on Apr. 22, 2014, 16 pages. |
U.S. Appl. No. 12/029,615, Notice of Allowance mailed on Oct. 2, 2014, 15 pages. |
Altenhofen et al., ASMs in Service Oriented Architectures, Journal of Universal Computer Science, vol. 14, No. 12, 2008, 25 pages. |
Belsiegel et al., SCA Service Component Architecture—Assembly Model Specification, SCA version 1.00 BEA Systems, Inc., Mar. 15, 2007, 91 pages. |
Box et al., Web Services Addressing (WS-Addressing), http://www.w3.org/Submission/ws-addressing/#Toc77464317, Aug. 18, 2009, 23 pages. |
Carey et al., Making BPEL Processes Dynamic, Oracle Technology Network, Aug. 18, 2009, 8 pages. |
Cetin et al., A mashup-based strategy for migration to service-oriented computing, IEEE International Conference on Pervasive Services, IEEE, Jul. 20, 2007. |
Chapman et al., SCA Service Component Architecture—Client and Implementation Model Specification for WS-BPEL, SCA version 1.00, BEA Systems, Inc., Mar. 21, 2007, 15 pages. |
Chappell et al., Introducing SCA, David Chappell & Associates, Jul. 2007, pp. 1-22. |
Chappell et al., Ready for Primetime: The Next-Generation, Grid-Enabled Service-Oriented Architecture, SOA—The SOA Magazine, Sep. 3, 2007, pp. 1-10. |
Chen et al., Feature Analysis for Service-Oriented Reengineering, IEEE 12th Asia-Pacific Software Engineering Conference (APSEC 2005), Taipei, Taiwan, Dec. 2005, 8 pages. |
Claessens et al., A Tangled World Wide Web of Security Issues, First Monday, vol. 7 No. 3-4, Mar. 2002. |
Claypool et al., Optimizing Performance of Schema Evolution Sequences, Objects and Databases, Lecture Notes in Computer Science vol. 1944, Mar. 1999, pp. 114-127. |
Curphey et al., Web Application Security Assessment Tools, IEEE, 2006, pp. 32-41. |
Dipaola et al., Subverting Ajax, 23rd CCC Conference, Dec. 2006, pp. 1-8. |
Hildebrandt, Web-based Document Management, BTU 2001, 2001, pp. 1-21. |
Hohpe et al., Messaging Systems, Enterprise Integration Patterns Chapter 3, Pearson Education, Inc., Boston, Massachusetts, 2004, 45 pages. |
Li et al., Leveraging legacy codes to distributed problem-solving environments: a Web services approach, Software: Practice and experience, vol. 34, No. 13, 2004, pp. 1297-1309. |
Li et al., SGrid: a service-oriented model for the Semantic Grid, Future Generation Computer Systems, vol. 20, No. 1, 2004, pp. 7-18. |
Ma, Discovery-Based Service Composition, National Central University, Doctoral Dissertation, Jan. 2007, 109 pages. |
Mietzner et al., Defining Composite Configurable SaaS Application Packages Using SCA Variability Descriptors and Multi-Tenancy Patters, Third International Conference on Internet and Web Applications and Services, 2008. ICIW '08, Jun. 2008, pp. 156-161. |
Nagappan et al., XML Processing and Data Binding with Java APIs, Developing Java Web Services: Architecting and Developing Secure Web Services Using Java [online] Retrieved from Internet :<http://java.sun.com/developer/Books/j2ee/devjws/>, 2003, pp. 313-399. |
Phanouriou, UIML: A Device-Independent User Interface Markup Language, Virginia Polytechnic Institute and State University, Sep. 26, 2000, 172 pages. |
Phillips, File and Registry Virtualization—the good, the bad and the ugly, Window's Connected UserID: Jerry. Jerry's Incoherent Babbling:<http://windowsconnected.com/blogsfjerry/archive/2005/12/19/file-and-registry-virtualization-the-good-the thebad-and-the-ugly.aspx>, Dec. 19, 2005, 6 pages. |
Shepherd et al., Oracle SCA-The Power of the Composite, An Oracle White Paper, Aug. 2009, pp. 1-19. |
Smith, Toward an Application Framework for Interoperability, Communications of the ACM, Oct. 2004, vol. 47, No. 10, pp. 93-97. |
Sneed et al., Integrating legacy software into a service oriented architecture, Software Maintenance and Reengineering, CSMR, IEEE, 2006. |
Steinberg, Data Binding with JAXB, <https://www6.software.ibm.com/developerworks/education/x-jaxb/x-jaxb-a4.pdf>, 2003, pp. 1-34. |
Vesperman, Essential CVS, O'Reilly Media Inc., Jun. 9, 2003. |
Yang et al., Web Component: A Substrate for Web Service Reuse and Composition, Proceedings of the 14th International Conference on Advanced Information Systems Engineering, 2002, pp. 21-36. |
Zhang et al., Schema Based XML Security: RBAC Approach, IFIP International Federation for Information Processing vol. 142, 2004, pp. 330-343. |
U.S. Appl. No. 14/288,265, Final Office Action mailed on Oct. 6, 2016, 19 pages. |
Number | Date | Country | |
---|---|---|---|
20140310686 A1 | Oct 2014 | US |
Number | Date | Country | |
---|---|---|---|
61098571 | Sep 2008 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12487004 | Jun 2009 | US |
Child | 14313514 | US |