This method should be used when a particular shared mechanism is used to receive requests for a variety of interested parties, each with potentially different security permissions possibly more limited than those granted to the code managing the shared mechanism, so that the managing code can verify proper access control for each party.
For example, a TCP-based InboundRequest
implementation typically implements this method by invoking the {@link SecurityManager#checkAccept checkAccept} method of thecurrent security manager (if any) with the client's host address and TCP port. An implementation that supports authentication typically checks that the current security context has the necessary {@link AuthenticationPermission} withaccept
action.
@throws SecurityException if the current security context doesnot have the permissions necessary to receive this request
processRequestData
method
@throws NullPointerException if handle
isnull
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|