J2EE CONNECTOR ARCHITECTURE
First Claim
1. A method of automatically detecting a connection leak in a connector architecture implementation comprising:
- terminating an application component, the application component forming a connection with an enterprise information system;
calling a connection object;
determining if the connection used by an application component is closed; and
closing the connection.
2 Assignments
0 Petitions
Accused Products
Abstract
A connector architecture implementation that is J2EE compliant and provides improved connection management capabilities. The connector architecture implementation provides a connector leak detection mechanism that detects connection leaks both automatically and manually The connector architecture implementation pre-configures and manages the growth and reduction of a connection pool. The connector architecture implementation may be pre-configured by pre-populating the connection pool. Connection pool growth may be managed by generating connections in response to connection requests. A connection pool may also be configured to reduce the number of connections in the pool. The number of connections may be reduced if the connection demand decreases. Password credentials allowing access to services are used to provide additional connection management.
102 Citations
26 Claims
-
1. A method of automatically detecting a connection leak in a connector architecture implementation comprising:
-
terminating an application component, the application component forming a connection with an enterprise information system;
calling a connection object;
determining if the connection used by an application component is closed; and
closing the connection. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of manually detecting a connection leak in a connector architecture implementation comprising:
-
determining that an application component is inactive and not actively using a connection between the application component and an enterprise information system;
receiving a connection request; and
determining whether the application component has been inactive for a first time period before said receiving a connection request. - View Dependent Claims (7, 8)
-
-
9. A method for configuring a connection pool in a connector architecture comprising:
-
providing an enterprise information system having a connection pool, the connection pool configured to have multiple connections; and
populating the connection pool at application pool start-up. - View Dependent Claims (10)
-
-
11. A method for configuring a connection pool in a connector architecture comprising:
-
providing an enterprise information system having a connection pool, the connection pool able to support multiple connections to the enterprise information system;
configuring the connector architecture to increment the number of connections by a first increment amount;
receiving an enterprise information system connection request by an application component through a resource adapter; and
processing the connection request. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for managing a connection pool comprising:
-
providing multiple connections in a connection pool to fulfill a demand for connections;
determining that the demand for connections has decreased; and
decreasing the number of connections. - View Dependent Claims (21, 22)
-
-
23. A method for monitoring connections in a connector architecture comprising:
-
choosing a connection to monitor, the connection associated with a connection pool of an enterprise information system; and
viewing data related to the connection, wherein viewing the data includes retrieving data from a call stack where the connection is allocated. - View Dependent Claims (24, 25)
-
-
26. A method of establishing credentials in a connector architecture comprising:
-
instantiating an enterprise information system resource object;
obtaining an initiating principal for a connection request;
obtaining credentials for the initiating principal;
instantiating a subject file; and
adding the credentials to the subject file.
-
Specification