Claims
- 1. A context manager manageable within a vault process for maintaining state information between successive user browser sessions with multiple application domains containing various applications functions, comprising;
a first or global level of storage of variables spanning applications and available to multiple vault applications in different domains; a second or application level of storage defining variables common to a given application domain for a given sequence of operations within the application; a third or instance level of storage for the given sequence of operation within a given application domain; means for initiating the vault process in response to a valid user request; means responsive to the vault process start-up and the user request to initiate application program interfaces applicable to context instances within an application domain and function; and means for opening the instance, application, and global context for non-null values where a scoping level is not identified when performing a retrieval operation.
- 2. In a context manager, a method for maintaining state information between successive user browser sessions with multiple application domains containing various application functions, comprising the steps of:
initiating a user request by invoking Uniform Resource Locator (URL) with embedded application domain and instance context; initiating a vault process running in a secure vault for the user; accessing vault encryption/decryption keys; accessing and reading a global context file stored in memory; accessing and reading each application domain in memory; scanning instance context files to determine if they have expired; determining the application domain as well as the instance context; loading a “local variable pool” from memory; selecting an idle vault process thread to service the request; instantiating the application domain and the instance context in the thread; processing the thread and importing the application function from storage; generating a return code by the application indicating whether the instance should be retained for the next user request; importing the instance context from storage after decryption; and loading the instance context into the application function running the vault process.
- 3. A method for use in establishing a secure exchange of information between an end user and a server in a distributed network environment, the method comprising the steps of:
in accordance with a context manager, manageable within a vault process, wherein the context manager maintains state information between successive user browser sessions with multiple application domains containing various applications, the context manager: accessing data stored on a global level that spans applications and is available to multiple vault applications in different domains; accessing data stored on an application level and common to a given application domain for a given sequence of operations within the vault application; and accessing data stored on an instance level for a given sequence of operations within a given application domain.
- 4. The method of claim 3 further comprising the step of:
scoping the global level, application level, and instance level within the vault process.
- 5. The method of claim 3 further comprising the step of:
generating a new global context file if a global context file does not exist in data stored on the global level.
- 6. The method of claim 3 further comprising the step of:
creating a new application context file based on the request, if an application context file does not exist in data stored on the application level.
- 7. The method of claim 3 further comprising the step of:
storing Common Gateway Interface (CGI) variables within the instance level of storage for each request allowing server side programs to access the data.
- 8. The method of claim 3 further comprising the step of:
importing an instance context from data on the instance level after decryption; and loading the instance context into an application function running in the vault process.
- 9. The method of claim 3, further comprising the steps of:
initiating a user request by invoking a URL with an embedded application domain and instance context; initiating a vault process running a secure vault for the user; accessing vault encryption/decryption keys; scanning instance level data to determine if the instance level data has expired; determining the application domain as well as the instance context; loading a local variable pool from memory; selecting an idle vault process thread to service the request; instantiating the application domain and the instance context in the thread; and processing the thread and importing the application function from storage.
- 10. The method of claim 3, further comprising the step of:
generating a return code indicating whether an application context should be stored on the application level and whether an instance context should be stored on the instance level for later user requests.
- 11. The method of claim 3, further comprising the steps of:
storing global level data, application level data, and instance level data in encrypted form; and storing active contexts on normal vault process.
- 12. The method of claim 3, further comprising the step of:
opening the global level data, application level data, and instance level data for non-null values where a scoping level is not identified when performing a retrieval operation.
- 13. The method of claim 3, further comprising the step of:
setting a lifetime for an instance context on the instance level that is a configurable value but global for vaults.
- 14. Apparatus for use in establishing a secure exchange of information between an end user and a server in a distributed network environment, the apparatus comprising:
a context manager, manageable within a vault process, wherein the context manager maintains state information between successive user browser sessions with multiple application domains containing various applications, operative to: (i) access data stored on a global level that spans applications and is available to multiple vault applications in different domains; (ii) access data stored on an application level and common to a given application domain for a given sequence of operations within the vault application; and (iii) access data stored on an instance level for a given sequence of operations within a given application domain.
- 15. The apparatus of claim 14, further operative to:
initiate a user request by invoking a URL with an embedded application domain and instance context; initiate a vault process running a secure vault for the user; access vault encryption/decryption keys; scan instance level data to determine if the instance level data has expired; determine the application domain as well as the instance context; load a local variable pool from memory; select an idle vault process thread to service the request; instantiate the application domain and the instance context in the thread; and process the thread and importing the application function from storage.
- 16. The apparatus of claim 14, further operative to:
generate a return code indicating whether an application context should be stored on the application level and whether an instance context should be stored on the instance level for later user requests.
- 17. The apparatus of claim 14, further operative to:
store global level data, application level data, and instance level data in encrypted form; and store active contexts on normal vault process.
- 18. The apparatus of claim 14, further operative to:
open the global level data, application level data, and instance level data for non-null values where a scoping level is not identified when performing a retrieval operation.
- 19. The apparatus of claim 14, further operative to:
set a lifetime for an instance context on the instance level that is a configurable value but global for vaults.
- 20. The apparatus of claim 14, further operative to:
scope the global level, application level, and instance level within the vault process.
- 21. The apparatus of claim 14, further operative to:
generate a new global context file if a global context file does not exist in data stored on the global level.
- 22. The apparatus of claim 14, further operative to:
create a new application context file based on the request, if an application context file does not exist in data stored on the application level.
- 23. The apparatus of claim 14, further operative to:
store CGI variables within the instance level of storage for each request allowing server side programs to access the data.
- 24. The apparatus of claim 15, further operative:
import an instance context from data on the instance level after decryption; and load the instance context into an application function running in the vault process.
- 25. An article of manufacture for use in establishing a secure exchange of information between an end user and a server in a distributed network environment, comprising a machine readable medium containing one or more programs which when executed implement the steps of:
in accordance with a context manager, manageable within a vault process, wherein the context manager maintains state information between successive user browser sessions with multiple application domains containing various applications, the context manager: accessing data stored on a global level that spans applications and is available to multiple vault applications in different domains; accessing data stored on an application level and common to a given application domain for a given sequence of operations within the vault application; and accessing data stored on an instance level for a given sequence of operations within a given application domain.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is a continuation of the pending U.S. application identified by Ser. No. 09/343,221, filed Jun. 30, 1999, the disclosure of which is incorporated by reference herein.
[0002] This application is also related to non-provisional application Ser. No. 08/980,022 entitled “Enhanced Web Server Process & Security By Enabling Operating System Integration,” filed Nov. 26, 1997, (SE9-92-005/1963-7131-US 1) assigned to the same assignee as that of the present invention and fully incorporated herein by reference.
[0003] This application is further related to the following co-pending applications, all assigned to the same assignee as that of the present invention and fully incorporated herein by reference:
[0004] 1. Ser. No. 09/223,766 entitled “Secure Server Using Public Key Registration And Methods Of Operation,” filed Dec. 31, 1998 (SE9-98-003/1963-7246).
[0005] 2. Ser. No. 09/223,764, entitled “A Secure Communication System And Method Of Operation For Conducting Electronic Commerce Using Remote Vault Agents Interacting With A Vault Controller,” filed Dec. 31, 1998 (SE9-98021/1963-7260).
[0006] 3. Ser. No. 09/223,834, entitled “Vault Controller Based Registration Application Serving Web Based Registration Authorities and End Users for Conducting Electronic Commerce In A Secure End-to-End Distributed Information System,” filed Dec. 31, 1998 (SE9-98-2/1963-7261).
[0007] 4. Ser. No. 09/223,765, entitled “Vault Controller Supervisor And Method Of Operation For Managing Multiple Independent Vault Processes & Browser Sessions For Users In An Electronic Business System,” Filed Dec. 31, 1998 (SE-98-017/1963-7256).
[0008] 5. Ser. No. 09/343,231, entitled “Vault Controller Secure Depositor For Secure Communication,” filed Jun. 30, 1999 (SE9-98-019/1963-7259).
[0009] 6. Ser. No. 09/343,403, entitled “Vault Controller Dispatcher And Methods of Operation For Handling Interaction Between Browser Sessions & Vault Processes In Electronic Business Systems,” filed Jun. 30, 1999 (SE9-98-01811963-7257).
Continuations (1)
|
Number |
Date |
Country |
| Parent |
09343231 |
Jun 1999 |
US |
| Child |
10771107 |
Feb 2004 |
US |