APPARATUS, SYSTEM, AND METHOD FOR ESTABLISHING A REUSABLE AND RECONFIGURABLE MODEL FOR FAST AND PERSISTENT CONNECTIONS IN DATABASE DRIVERS
First Claim
1. A method for establishing a reusable and reconfigurable connection within a trusted context, the method comprising:
- requesting utilizing a set of connection retrieval interfaces to generate a trusted connection request associated with a trusted context between a client application and a data server the trusted connection request specifying one of a normal connection, a pooled connection, and a distribution transaction connection, the set of connection retrieval interfaces configured to be interoperable with the trusted context to selectively establish each of at least a normal connection, a pooled connection, and a distribution transaction connection;
utilizing an authentication module to request authentication of the client application to the data server by utilizing one of a Kerberos protocol, a distributed environment (DCE) protocol, and a user name and password, the authentication module configured to be interoperable with the trusted context to selectively utilize each of a Kerberos authentication protocol a DCE protocol and a user name and password;
establishing a trusted connection in response to receiving an acknowledgment from the server of the trusted connection;
saving unique identifiable information regarding the trusted connection in a persistent storage such that the connection may be reused without re-authentication;
reusing the trusted connection without re-authentication based on the unique identifiable information;
utilizing a set of reconfiguration interfaces to reconfigure the trusted connection without re-authentication based on the unique identifiable information the set of reconfiguration interfaces configured to enable a currently connected client application to selectively request changes to one or more reconfigurable properties of the trusted connection the changes in the properties of the trusted connection changing the functionality of the trusted connection for the currently connected client application.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, system, and method for establishing a reusable and reconfigurable trusted connection within a trusted context. The invention enhances interoperability with any existing authentication methods including the Kerberos, the DCE, and a combination of a user name and a password. The present invention includes common interfaces in a database driver for a middleware server to obtain a trusted connection. The invention enhances trusted context interoperability by allowing different types of trusted connections such as a normal connection, a pooled connection, or even a distribution transaction connection. The database driver generates unique identifiable information once a trusted connection is authenticated that can be utilized to reuse and reconfigure the trusted connection without re-authentication. The present invention allows various types of trusted connections to be established through any authentication mechanisms and allows those trusted connections to be reused and reconfigured, even by a different client, in a fast and persistent way.
41 Citations
24 Claims
-
1. A method for establishing a reusable and reconfigurable connection within a trusted context, the method comprising:
-
requesting utilizing a set of connection retrieval interfaces to generate a trusted connection request associated with a trusted context between a client application and a data server the trusted connection request specifying one of a normal connection, a pooled connection, and a distribution transaction connection, the set of connection retrieval interfaces configured to be interoperable with the trusted context to selectively establish each of at least a normal connection, a pooled connection, and a distribution transaction connection; utilizing an authentication module to request authentication of the client application to the data server by utilizing one of a Kerberos protocol, a distributed environment (DCE) protocol, and a user name and password, the authentication module configured to be interoperable with the trusted context to selectively utilize each of a Kerberos authentication protocol a DCE protocol and a user name and password; establishing a trusted connection in response to receiving an acknowledgment from the server of the trusted connection; saving unique identifiable information regarding the trusted connection in a persistent storage such that the connection may be reused without re-authentication; reusing the trusted connection without re-authentication based on the unique identifiable information; utilizing a set of reconfiguration interfaces to reconfigure the trusted connection without re-authentication based on the unique identifiable information the set of reconfiguration interfaces configured to enable a currently connected client application to selectively request changes to one or more reconfigurable properties of the trusted connection the changes in the properties of the trusted connection changing the functionality of the trusted connection for the currently connected client application. - View Dependent Claims (2, 3, 4)
-
-
5-21. -21. (canceled)
-
22. A method for making a computer implemented process for establishing a reusable and reconfigurable connection within a trusted context, the method comprising:
-
instantiating first computer instructions onto a computer readable medium, the first instructions configured to define a trusted context between a data server comprising at least one processor and a memory and a middleware server comprising at least one processor and a memory; instantiating second computer instructions onto a computer readable medium, the second instructions configured to utilize a set of connection retrieval interfaces to retrieve a trusted connection within the trusted context for communication with the data server, the trusted connection programmatically defined as one of a normal connection, a pooled connection, and a distribution transaction connection, the set of connection retrieval interfaces configured to be interoperable with the trusted context to selectively establish each of at least a normal connection a pooled connection and a distribution transaction connection; instantiating third computer instructions onto a computer readable medium, the third instructions configured to utilize authentication module to authenticate the trusted connection via an authentication mechanism using an authentication protocol programmatically defined as one of a Kerberos authentication protocol, a DCE authentication protocol, a user-defined authentication protocol, and a combination of a user name and a password the authentication module configured to be interoperable with the trusted context to selectively utilize each of a Kerberos authentication protocol a DCE protocol a user-defined protocol and a user name and password; instantiating fourth computer instructions onto a computer readable medium, the fourth instructions configured to generate and store unique identifiable information regarding the trusted connection in a persistent storage; and instantiating fifth computer instructions onto a computer readable medium, the fifth instructions configured to enable reuse of the trusted connection without re-authentication based on the unique identifiable information. - View Dependent Claims (23, 24)
-
Specification