Secure customer interface for web based data management

ABSTRACT

An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the enterprises services from third parties. In the first layer, an implementation of the Secure Sockets Layer (SSL) version of HTTPS provides communications security, including authentication of the enterprise web server and the security of the transmitted data. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user&#39;s copper wire connection to a legacy system and a user&#39;s remote connection to the enterprise system over a “stateless” public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems. Security for the enterprise network and security for the data maintained by the various enterprise applications is also described.

CROSS-REFERENCE TO RELATED APPLICATIONS

The following patent application is a continuation of U.S. patentapplication Ser. No. 09/159,514, filed Sep. 24, 1998, entitled “SECURECUSTOMER INTERFACE FOR WEB BASED DATA MANAGEMENT”, now U.S. Pat. No.6,598,167, which also claims benefit of U.S. Provisional PatentApplication Ser. No. 60/060,655, filed Sep. 26, 1997, entitled“INTEGRATED CUSTOMER INTERFACE SYSTEM FOR COMMUNICATIONS MANAGEMENT”both having a common assignee and inventorship to the presentapplication.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates in general to computer software, and moreparticularly to a security methodology for connecting users to anenterprise network or extranet over the public Internet.

2. Background Art

In conventional remote connect computer systems, a connection is madewith a large legacy system via a dial-up connection from a customerowned terminal, personal computer or workstation. This connectionfrequently, although not always, is a fixed copper connection throughone or more telco central offices and emulates a terminal addressable bythe legacy systems and employs a security methodology dictated by thelegacy system. The dial-up access requires custom hardware for aterminal or custom software for a workstation to provide a remoteconnection. This includes dial-up services, communication services,emulation and/or translation services and generally some resident customform of the legacy application to interface with the midrange ormainframe computer running the legacy system.

There are several problems associated with the approach. First, theaforementioned software is very hardware dependent, requiring multipleversions of software compatible with each of a wide range ofworkstations customers generally have. In addition, an extensiveinventory of both software and user manuals for distribution to theoutside customers is required if an enterprise desires to make itsresources available to its customers. Moreover, installing the softwaregenerally requires an intensive effort on the customer and the softwaresupport team before any reliable and secure sessions are possible.

Secondly, dial-up, modem, and communications software interact with eachother in many ways which are not always predictable to a customapplication, requiring extensive trouble shooting and problem solvingfor an enterprise desiring to make the legacy system available to thecustomer, particularly where various telephone exchanges, dialingstandards or signal standards are involved.

Thirdly, although businesses are beginning to turn to the Internet toimprove customer service and lower costs by providing Web-based supportsystems, when an enterprise desires to make more than one systemavailable to the customer, the custom application for one legacy systemis not able to connect to a different legacy system, and the customermust generally logoff, logon and re-authenticate to switch from one tothe other. The security and entitlement features of the various legacysystems may be completely different, and vary from system to system andplatform to platform. The security methodology used by the two legacysystems may be different, requiring different logon interfaces, user orenterprise IDs and passwords. Different machine level languages may beused by the two systems, as for example, the 96 character EBCDIClanguage used by IBM, and 127 ASCII character language used bycontemporary personal computers.

It is therefore desired to provide customers with secure remoteconnectivity to enterprise legacy systems over the public Internet. Thepublic Internet provides access connectivity world wide via the TCP/IPprotocol, without need to navigate various disparate security protocols,telephone exchanges, dialing standards or signal standards, therebyproviding a measure of platform independence for the customer.

As contemplated with the present invention the customer can run theirown Internet Web browser and utilize their own platform connection tothe Internet to enable services. This resolves many of the platformhardware and connectivity issues in the customers favor, and leaves thechoice of platform and operating system to the customer. Web-basedprograms can minimize the need for training and support since theyutilize existing client software which the user has already installedand already knows how to use. Further, if the customer later changesthat platform, then, as soon as the new platform is Internet enabled,service is restored to the customer. The connectivity and communicationssoftware burden is thus resolved in favor of standard and readilyavailable hardware and the browser and software used by the publicInternet connection.

Secure World Wide Web (Web)-based online systems are now starting toemerge, generally using security protocols supplied by the browser ordatabase vendors. These Web-based online systems usually employ HTTPSand a Web browser having Secure Sockets Layer (SSL) encryption, and theydisplay Hypertext Markup Language (HTML) pages as a graphical userinterface (GUI), and often include Java applets and Common GatewayInterface (CGI) programs for customer interaction.

For the enterprise, the use of off-the-shelf Web browsers by thecustomer significantly simplifies the enterprise burden. Softwaredevelopment and support resources are available for the delivery of theenterprise legacy services and are not consumed by a need for customersupport at the workstation level.

However, the use of the public Internet also introduces new securityconsiderations not present in existing copper wire connections, as anopen system increases the exposure to IP hijackers, sniffers and varioustypes of spoofers that attempt to collect user id's and passwords, andexposes the availability of the service to the users when the system isassaulted by syn-flooding, war dialers or ping attacks. These measuresalso need to be combined with traditional security measures used toprevent traditional hacker attacks, whether by copper wire or theinternet, that might compromise the enterprise system and its data.

SUMMARY OF THE INVENTION

The present invention is directed to a series of security protocols andan integrated system for the same that enables a user to interact withone or more application services provided by remote servers over thepublic Internet, or an enterprise extranet. The present inventionutilizes the Web paradigm and an integrated graphical user interface toallow easy and convenient access from the user's perspective, whereinthe security provisions are transparent to the user, other than theentry of a customary user id and a strong password.

In order to provide cross-platform software operability that is notdependent on a specific operating system or hardware, the presentinvention is implemented using programming languages, such as Java™which only requires a Java™ enabled Web browser. The system of thepresent invention includes an application backplane unit for controllingand managing the overall user interface system to a number of Webenabled application services, and a common security object for managingsecurity and Java™ applets for a number of disparate services availablefrom the remote servers.

Each remote service includes its own user interface unit, referredheretofore as a client application, independently implemented of oneanother and the backplane. Although the client applications areindependently developed as separate modules, the system of the presentinvention provides a capability of integrating the client applicationsand secured access thereto into one unified system, allowing users toaccess the individual client applications via the backplane unit and thesecurity object.

The present invention includes centralized user authentication to insurethat the user has valid access to the system. The authenticationprocedure generally includes a logon object which prompts for andaccepts the user's name and password. The logon object then communicatesthe logon transaction to a remote server responsible for screening thoseusers attempting to access remote services. Once a user has beenauthenticated by the system of the present invention, the user need notre-enter their name and password each time the user accesses anotherremote server via the respective server's user interface program. Inaddition, each application may supplement the provided authenticationprocedure, with its own method of authentication by communicating withits respective servers independently.

Once a validated user is logged onto the system, the user is presentedwith a set of remote services which the user may obtain. The set ofremote services available for each user is unique and depends on eachuser's subscriptions to the services. The set of service subscription,then forms the user's entitlements for the services. Thus, for example,if a user subscribes to a toll free network management service, the useris entitled to access information regarding the service. On the otherhand, if the user does not subscribe to the toll free network managerservice, that option is not available for the user to select.

The present invention includes a user object to represent a current userlogged onto the system. This user object, inter alia, is responsible forobtaining from a remote server the current user's information includingthe user's entitlements to various remote services. The backplane usesthe entitlement information to provide only those services available tothe user. As explained previously, the backplane will not enable theservices to which the user does not have entitlements, effectuallyblocking the user from accessing those services.

In addition, the user information is maintained for the duration of alogon session, allowing both the backplane and the client applicationsto access the information as needed throughout the duration of thesession. The backplane and the client applications use the informationto selectively provide remote services to users. Accordingly, it is yetanother object of the present invention to provide a mechanism forretrieving and maintaining user information and entitlements such thatthey are available to processes and threads running on the clientplatform without having to communicate with a remote server every timethe information is needed.

The system of the present invention implements a “keep alive message”passed between a client and a server, also called a “heartbeat.” Forexample, a keep alive message is sent every predefined period, e.g., 1minute from a client application to the server. When the clientapplication fails to heartbeat consecutively for a predetermined periodof time, for example, one hour, the server treats this clientapplication as having exited by closing the application and performingcleanup routines associated with the application. This mechanism assistsin restricting authorized access by effectively preventing sessions fromremaining open in the event of client application failure or userneglect. Accordingly, it is a further object of the present invention toprovide a mechanism for detecting communication failures among the“stateless” processes running the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred embodiments of the present invention will now be described, byway of example only, with reference to the accompanying drawings inwhich:

FIG. 1 is a diagrammatic overview of the architectural framework of anenterprise internet network system;

FIG. 2 is an illustrative example of a backplane architecture schematicas invoked from a home page of the present system;

FIG. 3 illustrates an example client GUI presented to theclient/customer as a browser Web page;

FIG. 4 is a diagrammatic overview of the software architecture of theenterprise internet network system;

FIG. 5 is a diagram depicting the physical network architecture in thesystem of the present invention;

FIG. 6 is an example illustrating a logon Web page of the presentinvention;

FIG. 7 is a diagram illustrating a security module design having cleanseparation from the browser specific implementations;

FIG. 8 is a schematic illustration of the message format passed from theuser workstation 10 to the secure web server 24 over the publicinternet;

FIG. 9 is a high head functional overview of the communications andencryption protocols between the web server and the Dispatcher server;

FIG. 10 is a flow diagram illustrating a logon process to the system ofthe present invention;

FIG. 11 is a data flow diagram illustrating the present invention'sprocess flow during logon, entitlement request/response, heartbeattransmissions and logoff procedures;

FIG. 12 is a data flow diagram for various transactions communicated inthe system of the present invention;

FIG. 13(a) is a schematic illustration showing the message format passedbetween the Dispatcher server and the application specific proxy; and

FIG. 13(b) is a schematic illustration of the message format passedbetween the application specific proxy back to the Dispatcher server.

DESCRIPTION OF THE PREFERRED EMBODIMENT

The present invention is directed to a series of security protocols andprocedures used to protect an integrated system that enables a user tointeract with one or more enterprise applications provided by remoteservers over the public Internet, or an enterprise extranet. The presentinvention utilizes the Web paradigm and an integrated graphical userinterface to allow easy and convenient access from the user'sperspective, wherein the security provisions are transparent to theuser, other than the entry of a customary user id and a strong password.

The discussion of the present invention will include an overview of thesystem in which the various security protocols function and detaileddiscussions of Communications Security, User Identification andAuthentication, Session Security, Enterprise Security and Applicationsecurity.

Communications security relates to the authenticity of the enterpriseweb server and the security of the transmitted data through animplementation of the Secure Sockets Layer (SSL) version of HTTPS.

User Identification and Authentication relates to an identification ofthe user, an authentication of the user to ensure the user is who he/sheclaims to be and a determination of entitlements that the user may availthemselves of within the enterprise system.

Session Security is directed to the differences between a remote user'scopper wire connection to a legacy system and a user's remote connectionto the enterprise system over a “stateless” public Internet, where eachsession is a single transmission, rather than an interval of timebetween logon and logoff, as is customary in legacy systems.

Enterprise Security is directed to the security of the enterprisenetwork and the data maintained by the various enterprise applicationswith respect to attacks on the system or data.

Architectural Overview of the Web-Enabled System

The web-enabled system in which the present security protocols are foundis basically organized as a set of common components which together areknown as networkMCI Interact, which includes the following majorcomponents:

1) an object oriented software architecture detailing the client andserver based aspects of networkMCI Interact;

2) a network architecture defining the physical network needed tosatisfy the security and data volume requirements of networkMCIInteract;

3) a data architecture detailing the application, back-end or legacydata sources available for networkMCI Interact; and,

4) an infrastructure covering security, order entry, fulfillment,billing, self-monitoring, metrics and support.

Each of these common component areas will be generally discussedhereinbelow. A detailed description of each of these components can befound in a related, co-pending U.S. patent application U.S. Ser. No.09/160,725 entitled INTEGRATED CUSTOMER INTERFACE SYSTEM FORCOMMUNICATIONS NETWORK MANAGEMENT, the disclosure of which isincorporated herein by reference thereto.

FIG. 1 is a diagrammatic illustration of the software architecture inwhich the present invention functions. A first tier of software servicesare resident on a customer work station 10 and provides customer accessto the enterprise system, having one or more downloadable applicationobjects directed to front end business logic as indicated at 11, one ormore backplane service objects 12 for managing sessions, one or morepresentation services objects 13 for the presentation of customeroptions and customer requested data in a browser recognizable format anda customer supplied browser 14 and operating system environment forpresentation of customer options and data to the customer and forinternet communications over the public Internet.

A second or middle tier 16 is provided, having secure web servers 24 andback end services to provide applications that establish user sessions,govern user authentication and their entitlements, and communicate withadaptor programs to simplify the interchange of data across the network.

A back end or third tier 18 having applications directed to legacy backend services includes database storage and retrieval systems and one ormore database servers for accessing system resources from one or morelegacy systems 20.

Generally, as explained in co-pending U.S. patent application Ser. No.09/159,515, entitled GRAPHICAL USER INTERFACE FOR WEB ENABLEDAPPLICATIONS, the disclosure of which is incorporated herein byreference thereto, the customer workstation 10 includes client softwarecapable of providing a platform-independent, browser-based, consistentuser interface implementing objects programmed to provide a reusable andcommon GUI and problem-domain abstractions. More specifically, theclient-tier software is created and distributed as a set of Java classesincluding the applet classes to provide an industrial strength,object-oriented environment over the Internet. Application-specificclasses are designed to support the functionality and server interfacesfor each application with the functionality delivered through the systembeing of two-types: 1) cross-product, for example, inbox and reportingfunctions, and 2) product specific, for example, Toll Free NetworkManager or Broadband Manager functions. The system is capable ofdelivering to customers the functionality appropriate to their productmix.

FIG. 4 is a diagrammatic illustration of the network and platformcomponents of the networkMCI Interact system, including: the Customerworkstation 10; the Demilitarized Zone 17 (DMZ); a cluster of WebServers 24; the MCI Dispatcher Server 26; the MCI application servers40, and the legacy systems 20.

The customer workstation 10 is browser enabled and includes clientapplications responsible for presentation and front-end services. Itsfunctions include providing a user interface to various MCI services andsupporting communications with MCI's Intranet web server cluster 24. Asillustrated in FIG. 2, and more specifically described in theabove-referenced co-pending U.S. Patent Application GRAPHICAL USERINTERFACE FOR WEB ENABLED APPLICATIONS, the client tier software isresponsible for presentation services to the customer and generallyincludes a web browser 14 and additional object-oriented programsresiding in the client workstation platform 10. The client software isgenerally organized into a component architecture with each componentgenerally comprising a specific application, providing an area offunctionality. The applications generally are integrated using a“backplane” services layer 12 which provides a set of services to theapplication objects which provide the front end business logic 11 andmanages their launch. The networkMCI Interact common set of objectsprovide a set of services to each of the applications such as: 1)session management; 2) application launch; 3) inter-applicationcommunications; 4) window navigation among applications; 5) logmanagement; and 6) version management.

The primary common object services include: graphical user interface(GUI); communications; printing; user identity, authentication, andentitlements; data import and export; logging and statistics; errorhandling; and messaging services.

FIG. 2 is an diagrammatic example of a backplane architecture schemeillustrating the relationship among the common objects. In this example,the backplane services layer 12 is programmed as a Java applet which canbe loaded and launched by the web browser 14. With reference to FIG. 2,a typical user session starts with a web browser 14 creating a backplane12, after a successful logon. The backplane 12, inter alia, presents auser with an interface for networkMCI, Interact application management.A typical user display provided by the backplane 12 may show a number ofapplications the user is entitled to run, each application representedby buttons depicted in FIG. 2 as buttons 58 a,b,c selectable by theuser. As illustrated in FIG. 2, upon selection of an application, thebackplane 12 launches that specific application, for example, ServiceInquiry 54 a or Alarm Monitor 54 b, by creating the application object.In processing its functions, each application in turn, may utilizecommon object services provided by the backplane 12. FIG. 2 showsgraphical user interface objects 56 a,b created and used by a respectiveapplication 54 a,b for its own presentation purposes.

FIG. 3 illustrates an example client GUI presented to theclient/customer as a browser web page 60 providing, for example, a suite70 of network management applications, which may include: TrafficMonitor 72; an Alarm Monitor 73; a Network Manager 74 and IntelligentRouting 75. Access to network functionality is also provided throughReport Requester 76, which provides the ability to define and request avariety of reports for the client/customer and a Message Center 77 forproviding enhancements and functionality to traditional e-mailcommunications by providing access to user requested reports and bulkdata. Additional network MCI Internet applications not illustrated inFIG. 3 include Online Invoice, relating to electronic invoicing andService Inquiry related to Trouble Ticket Management.

As shown in FIGS. 2 and 3, the browser resident GUI of the presentinvention implements a single object, COBackPlane which keeps track ofall the client applications, and which has capabilities to start, stop,and provide references to any one of the client applications.

The backplane 12 and the client applications use a browser 14 such asthe Microsoft Explorer versions 4.0.1 or higher for an access anddistribution mechanism. Although the backplane is initiated with abrowser 14, the client applications are generally isolated from thebrowser in that they typically present their user interfaces in aseparate frame, rather than sitting inside a Web page.

The backplane architecture is implemented with several primary classes.These classes include COBackPlane, COApp, COAppImpl, COParm. andCOAppFrame classes. COBackPlane 12 is an application backplane whichlaunches the applications 54 a, 54 b, typically implemented as COApp.COBackPlane 12 is generally implemented as a Java applet and is launchedby the Web browser 14. This backplane applet is responsible forlaunching and closing the COApps.

When the backplane is implemented as an applet, it overrides standardApplet methods init( ), start( ), stop( ) and run( ). In the init( )method, the backplane applet obtains a COUser user context object. TheCOUser object holds information such as user profile, applications andtheir entitlements. The user's configuration and applicationentitlements provided in the COUser context are used to construct theapplication toolbar and Inbox applications. When an application toolbaricon is clicked, a particular COApp is launched by launchApp( ) method.The launched application then may use the backplane forinter-application communications, including retrieving Inbox data.

The CoBackPlane 12 includes methods for providing a reference to aparticular COApp, for interoperation. For example, the COBackPlane classprovides a getApp( ) method which returns references to applicationobjects by name. Once retrieved in this manner, the application object'spublic interface may be used directly.

The use of a set of common objects for implementing the variousfunctions provided by the system of the present invention, andparticularly the use of browser based objects to launch applications andpass data therebetween is more fully described in the above referencedcopending application GRAPHICAL USER INTERFACE FOR WEB ENABLEDAPPLICATIONS, and Appendix A, attached to that application, providesdescriptions for the common objects which includes various classes andinterfaces with their properties and methods.

As shown in FIG. 4, the aforesaid objects will communicate the data byestablishing a secure TCP messaging session with one of the DMZnetworkMCI Interact

Web servers 24 via an Internet secure communications path 22established, preferably, with a secure socket SSL version of HTTPS. TheDMZ networkMCI Interact Web servers 24 function to decrypt the clientmessage, preferably via the SSL implementation, and unwrap the sessionkey and verify the users session. After establishing that the requesthas come from a valid user and mapping the request to its associatedsession, the DMZ Web servers 24 will re-encrypt the request usingsymmetric encryption and forward it over a second secure socketconnection 23 to the dispatcher server 26 inside the enterpriseIntranet.

As will be hereinafter described in greater detail, a networkMCIInteract session is designated by a logon, successful authentication,followed by use of server resources, and logoff. However, the world-wideweb communication protocol uses HTTP, a stateless protocol, each HTTPrequest and reply is a separate TCP/IP connection, completelyindependent of all previous or future connections between the sameserver and client. The present invention is implemented with a secureversion of HTTP such as S-HTTP or HTTPS, and presently utilizes the SSLimplentation of HTTPS. The present embodiment uses SSL which provides acipher spec message which provides server authentication during asession. The preferred embodiment further associates a given HTTPSrequest with a logical session which is initiated and tracked by a“cookie jar server” 32 to generate a “cookie” or session identifierwhich is a unique server-generated key that is sent to the client alongwith each reply to a HTTPS request. The client holds the cookie orsession identifier and returns it to the server as part of eachsubsequent HTTPS request. As desired, either the Web servers 24, thecookie jar server 32 or the Dispatcher Server 26, may maintain the“cookie jar” to map the session identifier to the associated session. Aseparate cookie jar server 32, as illustrated in FIG. 4 has been founddesirable to minimize the load on the dispatcher server 26. A new cookiewill be generated when the response to the HTTPS request is sent to theclient. This form of session management also functions as anauthentication of each HTTPS request, adding an additional level ofsecurity to the overall process.

As illustrated in FIGS. 4 and 9, after one of the DMZ Web servers 24decrypts and verifies the user session, it forwards the message througha firewall 29 b over a TCP/IP connection 23 to the dispatcher server 26on a new TCP socket while the original socket 22 from the browser isblocking, waiting for a response. The dispatcher server 26 will unwrapan outer protocol layer of the message from the DMZ servicer cluster 24,and will reencrypt the message with a different encryption key andforward the message to an appropriate application proxy via a thirdTCP/IP socket 27. While waiting for the proxy response all three of thesockets 22, 23, 27 will be blocking on a receive. While either symmetricor public key encryption can be used, in the preferred embodiment,public key encryption is utilized, with the “public” keys used betweencomponents of the network, kept secret. A different public key may beemployed for communicating between the dispatcher 26 to the webservers24 than is used from the webserver 24 to the dispatcher 26.Specifically, once the message is decrypted, the wrappers are examinedto reveal the user and the target middle-tier (Intranet application)service for the request. A first-level validation is performed, makingsure that the user is entitled to communicate with the desired service.The user's entitlements in this regard are fetched by the dispatcherserver 26 from StarOE server 49 at logon time and cached.

If the requester is authorized to communicate with the target service,the message is forwarded to the desired service's proxy. Eachapplication proxy is an application specific daemon which resides on aspecific Intranet server, shown in FIGS. 4 and 9 as a suite of mid-rangeservers 40. Each Intranet application server of suite 40(a) is generallyresponsible for providing a specific back-end service requested by theclient, and, is additionally capable of requesting services from otherIntranet application servers by communicating to the specific proxyassociated with that other application server. Thus, an applicationserver not only can offer its browser a client to server interfacethrough the proxy, but also may offer all its services from its proxy toother application servers. In effect, the application servers requestingservice are acting as clients to the application servers providing theservice. Such mechanism increases the security of the overall system aswell as reducing the number of interfaces.

The network architecture of FIG. 4 may also include a variety ofapplication specific proxies having associated Intranet applicationservers including: a StarOE proxy for the StarOE application server 49for handling authentication order entry/billing; an Inbox proxy for theInbox application server 41, which functions as a container forcompleted reports, call detail data and marketing news messages, aReport Manager Proxy capable of communicating with a system-specificReport Manager server 42 for generating, managing and scheduling thetransmission of customized reports including, for example: call usageanalysis information provided from the StarODS server 43; networktraffic analysis/monitor information provided from the Traffic viewserver 44; virtual data network alarms and performance reports providedby Broadband server 45; trouble tickets for switching, transmission andtraffic faults provided by Service Inquiry server 46; and toll freerouting information provided by Toll Free Network Manager server 47.

As partially shown in FIG. 4, it is understood that each mid-rangeserver of suite 40 communicates with one or several consolidated networkdatabases which include each customer's network management informationand data. In the present invention the Services Inquiry server 46include communication with MCI's Customer Service Management legacyplatform 20(a). Such network management and customer network data isadditionally accessible by authorized MCI management personnel. As shownin FIG. 4, other legacy or host platforms 20(b), 20(c) and 20(d) mayalso communicate individually with the Intranet servers for servicingspecific transactions initiated at the client browser. The illustratedhost platforms 20(a)-(d) are illustrative only and it is understoodother host platforms may be interpreted into the network architectureillustrated in FIG. 4 through an intermediate midrange server 40.

Each of the individual proxies may be maintained on the dispatcherserver 26, the related application server, or a separate proxy serversituated between the dispatcher server 26 and the midrange server 40.The relevant proxy waits for requests from an application client runningon the customer's workstation 10 and then services the request, eitherby handling them internally or forwarding them to its associatedIntranet application server 40. The proxies additionally receiveappropriate responses back from an Intranet application server 40. Anydata returned from the Intranet application server 40 is translated backto client format, and returned over the internet to the clientworkstation 10 via the Dispatcher Server 26 and at one of the webservers in the DMZ Services cluster 24 and a secure sockets connection.When the resultant response header and trailing application specificdata are sent back to the client browser from the proxy, the messageswill cascade all the way back to the browser 14 in real time, limitedonly by the transmission latency speed of the network.

The networkMCI Interact middle tier software includes a communicationscomponent offering three (3) types of data transport mechanisms: 1)Synchronous; 2) Asynchronous; and 3) Bulk transfer. Synchronoustransaction is used for situations in which data will be returned by theapplication server 40 quickly. Thus, a single TCP connection will bemade and kept open until the full response has been retrieved.

Asynchronous transaction is supported generally for situations in whichthere may be a long delay in application server 40 response.Specifically, a proxy will accept a request from a customer or client 10via an SSL connection and then respond to the client 10 with a uniqueidentifier and close the socket connection. The client 10 may then pollrepeatedly on a periodic basis until the response is ready. Each pollwill occur on a new socket connection to the proxy, and the proxy willeither respond with the resultant data or, respond that the request isstill in progress. This will reduce the number of resource consuming TCPconnections open at any time and permit a user to close their browser ordisconnect a modem and return later to check for results.

Bulk transfer is generally intended for large data transfers and areunlimited in size. Bulk transfer permits cancellation during a transferand allows the user to resume a transfer at a later point in time.

The DMZ Web servers 24 are found in a special secure network area setaside from the Intranet to prevent potentially hostile customer access.All DMZ equipment is physically isolated and firewalled as illustratedat 29(a), 29(b) in FIGS. 1, 4, 5 and 9 from the company Intranet.Similarly, the DMZ equipment is firewalled and obscured from hostileattacks from the public Internet, except for limited web browser accessto the web servers which are located in the DMZ. The customer's webbrowser connects to a web server in the DMZ which in turn connects tothe Dispatcher server 26 which acts as a proxy to extract selectinformation from midrange servers 40 located in the company Intranet. Auser may not directly connect to any enterprise server in the enterpriseintranet, thus ensuring internal company system security and integrity.

The DMZ also isolates the company Intranet from the public Internetbecause the web servers 24 located in the DMZ never store or computeactual customer sensitive data. The web servers only put the data into aform suitable for display by the customer's web browser. Since the DMZweb servers 24 do not store customer data, there is a much smallerchance of any customer information being jeopardized in case of asecurity breach.

All reporting is provided through the Message Center (Inbox) and aReport Requestor application which supports spreadsheets, a variety ofgraph and chart types, or both simultaneously. For example, thespreadsheet presentation allows for sorting by any arbitrary set ofcolumns. The report viewer may also be launched from the Message Center(Inbox) when a report is selected.

By associating each set of report data which is downloaded via the inboxwith a small report description object, it is possible to present mostreports without report-specific presentation code (the report-specificcode is in the construction of the description object). Thesedescription objects are referred to as “metadata,” or “data about data.”At one level, they function like the catalog in a relational database,describing each row of a result set returned from the middle tier as anordered collection of columns. Each column has a data type, a name, anda desired display format, etc. Column descriptive information will bestored in an object, and the entire result set will be described by alist of these objects, one for each column, to allow for a standardviewer to present the result set, with labeled columns. Nesting thesedescriptions within one another allows for breaks and subtotaling at anarbitrary number of levels. This further enhances the security for thecustomer data, for without the meta-data associated with the report, thereport data is essentially a meaningless block of data.

Communications Security

Communications security, which relates to the authenticity of theenterprise web server and the security of the transmitted data will bedescribed with respect to an implementation in the preferred embodimentof the invention of the Secure Sockets Layer (SSL) version of HTTPS.

In order for a communication to be secure, it must be known that themessage comes from the correct source, that it arrives at the correctdestination, that it has not been modified, and has not been interceptedand understood by a third party. Normal encryption protects againstunderstanding the message, even if intercepted, and certain types ofcipher encryption provide the ability to determine that the message hasbeen tampered with and in some cases reconstruct the message even ifintercepted and intentionally garbled. The disadvantage of normalencryption is the difficulty associated with the secure distribution andupdates of the keys used for encryption and decryption.

Public key encryption solves the distribution and update problem, butdoes not, for the public Internet, ensure the identity of the party withwhom one is communicating. A spoofer who appropriates the DNS address ofan enterprise for a leg of the Internet can substitute the spooferspublic key for the public key of the enterprise with whom the user isattempting to communicate, thereby fooling the user into revealing theuser name and password used on the enterprise system. To avoid thisproblem, digital signatures have been developed to ensure the identityof the sender. They also, simultaneously, commit the sender to themessage, avoiding subsequent repudiation.

The communications link between the enterprise and the user may besecured with S-HTTP, HTTPS, or proprietary encryption methodologies,such as VNP or PPTP tunneling, but in the present embodiment utilizesthe Secure Sockets Layer (SSL) protocol developed by NetscapeCommunications. It is noted that these solutions are intended for usewith IPv4, and that Ipv6, presently under comment by the InternetEngineering Steering Group, may enable secure transmissions betweenclient and server without resort to proprietary protocols. The remainingsecurity protocols of the present invention may be used with Ipv6 whenit becomes an available standard for secure IP communications.

The SSL component of the HTTPS also includes non-repudiation techniquesto guarantee that a message originating from a source is the actualidentified sender. One technique employed to combat repudiation includesuse of an audit trail with electronically signed one-way message digestsincluded with each transaction. This technique employs SSL public-keycryptography with one-way hashing functions.

Another communications issue involving the secure communications link,is the trust associated with allowing the download of the Java commonobjects used by the present invention, as discussed earlier with respectto the browser, since the Java objects used in the present inventionrequire that the user authorize disk and I/O access by the Java object.

Digital Certificates, such as those developed by VeriSign, Inc. entitledverisign Digital ID™ provide a means to simultaneously verify the serverto the user, and to verify the source of the Java object to bedownloaded as a trusted source as will hereinafter be described ingreater detail.

As illustrated in FIG. 10, the process starts with the browser launch asindicated at step 280, and the entry of the enterprise URL, such asHTTPS://www.enterprise.com as indicated at step 282. Following asuccessful connection, the SSL handshake protocol is initiated asindicated at step 283. When a SSL client and server first startcommunicating, they agree on a protocol version, select cryptographicalgorithms, authenticate the server (or optionally authenticate eachother) and use public-key encryption techniques to generate sharedsecrets. These processes are performed in the handshake protocol, whichcan be summarized as follows: The client sends a client hello message towhich the server must respond with a server hello message, or else afatal error will occur and the connection will fail. The client helloand server hello are used to establish security enhancement capabilitiesbetween client and server. The client hello and server hello establishthe following attributes: Protocol Version, Session ID, Cipher Suite,and Compression Method. Additionally, two random values are generatedand exchanged: ClientHello.random and ServerHello.random.

Following the hello messages, the server will send its digitalcertificate. Alternately, a server key exchange message may be sent, ifit is required (e.g. if their server has no certificate, or if itscertificate is for signing only). Once the server is authenticated, itmay optionally request a certificate from the client, if that isappropriate to the cipher suite selected.

The server will then send the server hello done message, indicating thatthe hello-message phase of the handshake is complete. The server willthen wait for a client response. If the server has sent a certificaterequest Message, the client must send either the certificate message ora no_certificate alert. The client key exchange message is now sent, andthe content of that message will depend on the public key algorithmselected between the client hello and the server hello. If the clienthas sent a certificate with signing ability, a digitally-signedcertificate verify message is sent to explicitly verify the certificate.

At this point, a change cipher spec message is sent by the client, andthe client copies the pending Cipher Spec into the current Cipher Spec.The client then immediately sends the finished message under the newalgorithms, keys, and secrets. In response, the server will send its ownchange cipher spec message, transfer the pending to the current CipherSpec, and send its finished message under the new Cipher Spec. At thispoint, the handshake is complete and the client and server may begin toexchange user layer data.

Client Server ClientHello - - - - - - - - > ServerHello Certificate*ServerKeyExchange* CertificateRequest* < - - - - - - - ServerHelloDoneCertificate* ClientKeyExchange CertificateVerify* [ChangeCipherSpec]Finished - - - - - - - - > [ChangeCipherSpec] < - - - - - - - - FinishedLogin Data < - - - - - - - > Login HTML *Indicates optional orsituation-dependent messages that are not always sent.

FIG. 8 is a schematic illustration of a logical message format sent fromthe client browser to the desired middle tier server for a particularapplication.

As mentioned herein with respect to FIG. 4, the messages created by theclient Java software are transmitted to the secure Web Servers 24 overHTTPS. For incoming (client-to-server) communications, the Secure Webservers 24 decrypt a request, authenticate and verify the sessioninformation. The logical message format from the client to the Webserver is shown as follows:

| | TCP/IP | | encryption | | http | | web header | | dispatcher header| | proxy-specific data | |where “| |” separates a logical protocol level, and protocols nestedfrom left to right. FIG. 8 illustrates a specific message sent from theclient browser to the desired middle tier server for the particularapplication. As shown in FIG. 8, the client message 100 includes an SSLencryption header 110 and a network-level protocol HTTP/POST header 112which are decrypted by the Secure web Server(s) 24 to access theunderlying message; a DMZ Web header 114 which is used to generate acookie 111 and transaction type identifier 116 for managing theclient/server session; a dispatcher header 115 which includes the targetproxy identifier 120 associated with the particular type of transactionrequested; proxy specific data 125 including the application specificmetadata utilized by the target proxy to form the particular messagesfor the particular middle tier server providing a service; and, thenetwork-level HTTP/POST trailer 130 and encryption trailer 135 which arealso decrypted by the secure DMZ Web server 24. Alternately, asillustrated in FIG. 5, an alternate message format may be used, as forexample between the client workstation 10 and the RTM web server 52.

Referring to FIG. 4, after establishing that the request has come from avalid user and mapping the request to its associated session, therequest is then forwarded through the firewall 29 b over a socketconnection 23 to one or more decode/dispatcher servers 26 located withinthe corporate Intranet 30. The messaging sent to the Dispatcher Server26 will include the user identifier and session information, the targetproxy identifier, and the proxy specific data. The decode/dispatcherserver 26 then authenticates the user's access to the desiredmiddle-tier service from cached data previously received from the StarOEserver as will be hereinafter described in greater detail in connectionwith User Identification and Authentication.

As shown in FIG. 4, the Secure Web server 24 forwards the Dispatcherheader and proxy-specific data to the Dispatcher Server 26 “enriched”with the identity of the user (and any other session-relatedinformation) as provided by the session data/cookie mapping, the targetproxy identifier and the proxy-specific data. The dispatcher server 26receives the requests forwarded by the Secure Web server(s) 24 anddispatches them to the appropriate application server or its proxy. Themessage wrappers are examined, revealing the user and the targetmiddle-tier service for the request. A first-level validation isperformed, making sure that the user is entitled to communicate with thedesired service. The user's entitlements in this regard are fetched bythe dispatcher server from StarOE server 217 at logon time and cached.Assuming that the Requestor is authorized to communicate with the targetservice, the message is then forwarded to the desired service's proxy.Each of these proxy processes may perform a validation process forexamining incoming requests and confirming that they include validlyformatted messages for the service with acceptable parameters; atranslation process for translating a message into an underlying messageor networking protocol; and, a management process for managing thecommunication of the specific customer request with the middle-tierserver to actually get the request serviced. Data returned from themiddle-tier server is translated back to client format, if necessary,and returned to the dispatcher server as a response to the request.

It should be understood that the application server proxies can eitherreside on the dispatcher server 26 itself, or, preferably, can beresident on the middle-tier application server, i.e., the dispatcherfront end code can locate proxies resident on other servers.

User Identification and Authentication

FIG. 6 is an illustrative example of a logon Web page of the presentinvention. At the time of logon, the SSL protocol handshake has beencompleted, and the logon object and the HTML logon page 230 are thefirst items to be downloaded. Typically the logon page includes name 232and password 234 fields for user to enter. The logon page 230, inaddition, may include hyper links 236 to other services such as productand service center, programs and promotions, and questions and answersconcerning the system of the present invention.

In the preferred embodiment, the invention uses a browser such as theMicrosoft Explorer™ versions 4.01 or higher as the default browser foraccess and Java object distribution. The present invention provides anadditional COSecurity module which is downloaded with the logon page andwraps the security functionality of specific browsers availableoff-the-shelf.

Downloading the Java objects presents a problem for the enterprise,since Netscape Communicator™, Microsoft Explorer™ and Sun's HotJava™employ different techniques for downloading Java applets and classes,and it must be determined which browser the user is using beforedownloading the Java objects and classes.

The browser type is also communicated to assist the enterprise indetermining how the Java common objects should be downloaded. NetscapeCommunicator™ and HotJava™ download Java objects in one or more JARfiles, while Microsoft Explorer presently uses CAB files for the samepurpose. Microsoft CAB (cabinet) files are equivalent to JAR files. TheCAB files are used in the preferred embodiment of the invention for tworeasons. First, for convenience in downloading class files so that theyare locally resident on the PC. The browser tools, common objects andapplication class files are zipped up and downloaded to the java trustedlibrary directory. Only trusted, i.e. signed, applets can make use ofthese class files. Secondly, signing an applet, and obtaining permissionfrom the user, enables the Java objects to break out of the “sandbox”and get around Java security restrictions, and enable local disk andfile access and system I/O such as printing. Signed applets enable theuser to verify the applets as being from a trusted source and allowapplets to write to the local disk, print, read local files, and connectto a server other than the one that launches the applet. In order for anapplet to be signed, the applet requires a digital certificate to beassigned to a JAR (Java ARchive) or equivalent archive file. Asdiscussed previously, this digital certificate may be a softwarepublisher certificate or the certificate used to verify the server as atrusted server during the SSL handshake process.

FIG. 7 is a diagram which illustrates a security module design havingclean separation from the browser specific implementations. The securitymodule includes the main COSecurity class 402, and the interfaceCOBrowserSecurityInterface 404. The COSecurity object checks browsertype upon instantiation. It does so by requesting the “java.vendor”system property. In the preferred embodiment of the invention, MicrosoftInternet Explorer™ is the default browser, but if the browser isNetscape, for example, the class then instantiates by name the concreteimplementation of the Netscape security interface,nmco.security.securityimpls. CONetscape4_(—)0SecurityImpl 406.Otherwise, it instantiates nmco.security.securityimpls.CODefaultSecurityImpl 408.

The COBrowserSecurityInterface 404 mirrors the methods provided byCOSecurity 402. Concrete implementations such asCONetscape4_(—)0SecurityImpl 406 for Netscape Communicator andCODefaultSecurityImpl 408 as a default are also provided. Adding a newimplementation 410 is as easy as implementing theCOBrowserSecurityInterface, and adding in a new hook in COSecurity.

After using “java.vendor” to discover what browser is being used,CoSecurity 402 instantiates by name the appropriate concreteimplementation. This is done by class loading first, then usingClass.newInstance( ) to create a new instance. The newInstance( ) methodreturns a generic object; in order to use it, it must be cast to theappropriate class. COSecurity 402 casts the instantiated object toCOBrowserSecurityInterface 404, rather than to the concreteimplementation. COSecurity 402 then makes calls to theCOBrowserSecurityInterface “object,” which is actually a concreteimplementation “in disguise.” This is an example of the use of objectoriented polymorphism. This design cleanly separates the specificimplementations which are browser-specific from the browser-independentCOSecurity object.

Each COApp object may either create their own CoSecurity object usingthe public constructors, or retrieve the COSecurity object used by thebackplane via COBackPlane.getSecurity( ). In general, the developer ofthe applications to be run will use the CoSecurity object whenever theCOApp needs privileged access to any local resource, i.e., access to thelocal disk, printing, local system properties, and starting externalprocesses. The following represents an example of the code generatedwhen using the security object.

/ / Instantiating COSecurity objectCOSecurity security = new COSecurity( ) ; / / Now access a privileged resource try { String s =security.getSystemProperty(“user.home”) ; System.out.println (s) ; }catch (COSecurityException cose) { / / take care in case of securityexception }

Referring back to FIG. 10, once the browser type has been confirmed, thelogon applet checks for the name/password entry and instantiates asession object in step 292, communicating the name/password pair to theenterprise system. The session object sends a message containing thename/password to the StarOE server 49 for user validation in step 294.

When the user is properly authenticated by the server in step 296,another Web page which launches the backplane object is downloaded insteps 298, 300, 304. This page is referred to as a home page. At thesame time, all the remaining application software objects are downloadedin CAB or JAR files as indicated at step 302. If the system of thepresent invention determines that the backplane and application fileshave been already downloaded, the steps 300, 302, 304 are not performed.The backplane object is then instantiated in step 306.

FIG. 4, as described previously, shows an example of a home page,typically a new Web page having the backplane object. The home page 60is downloaded after the authentication via the logon page. The home page60 comprises icons 70 for each of the application services as well as anapplication tool bar 254 for invoking the services. The application toolbar 254 is different from the icons 70 in that the application tool bar254 remains on a screen, even when the home page 60 is no longerdisplayed. The home page also typically comprises HTML links to otherservices 256. These services may be new information center, featuresbenefits, or a link 259 to the networkMCI Interact support center forthe system of the present invention.

Referring again to FIG. 10, the backplane communicates with the StarOEserver 49 to retrieve the user's entitlements in step 308. Theentitlements represent specific services the user has subscribed and hasprivilege to access. It also describes what entitlements the user mayhave within any single service. For example, from the COUser context,the backplane can obtain the list of applications that the user isentitled to access. In addition, each COApp holds set of entitlementswithin that application in COAppEntitlements object.

Using the information from the COUser context, the backplane knows whichCOApps to provide, e.g., which buttons to install in its toolbar. Thebackplane stores the user specific entitlements in memory for otherprocesses to access. After determining the entitlements, the backplaneinitiates a new thread and starts an application toolbar in step 310.The application toolbar includes the remote services to which the userhas subscribed and may select to run. From the application toolbar, auser is able to select a service to run. Upon user selection, theselection is communicated from the application toolbar to the backplanein steps 312, 314, which then launches the graphical user interfaceprograms associated with the selected service. The application toolbarremains on the user display, even after a particular service has beeninitiated. This is useful when a user desires to start up another remoteservice directly from having run a previous service because the userthen need not retrieve the home page again.

If it is determined that the user entered password is not valid in step290 or step 296, an attempted logon count is incremented in step 316. Ifthe user's attempted logon count is greater than a predefined allowednumber of tries as indicated in step 318, a message is conveyed to theuser in step 320 and the user must restart the browser. If the user'sattempted logon count is not greater than the predefined allowed numberof tries, a “failed login” message is conveyed to the user in step 322,and the user is prompted to reenter name/password in step 288. If it isdetermined that the user password has expired, the user is prompted tochange the password in step 324. For example, the user may be requiredto change the password every 30 days for security reasons. Whenever theuser changes the password, the new password is transmitted in real timeto a server responsible for updating and keeping the password entry forthe user. The user than enters the new password in step 324 andcontinues with the processing described above in step 290.

The present invention includes a user unit for representing a user of acurrent session. The user unit is generally implemented as a COUserclass extending java.lang.Object. The COUser class object typicallyholds information including a user profile, applications and theirentitlements. In order to minimize network traffic, the amount of datacarried by the COUser is minimal initially, and becomes populated asrequests are processed. The requests are generally processed byretrieving information from the Order Entry service. The profileinformation is then stored and populated in the COUser object shouldsuch information be requested again.

A COUser object is created when the user logs in, and holds the usernameand password of the user as an object in the COClientSession object. Thesession object is contained within the backplane, which manages thesession throughout its lifetime. The code below illustrates how thisoccurs:

/ / Within the backplane COClientSession session = new COClientSession () ; try { Session.logon (“username”, “password”) ; } catch(COClientLogonException e) { . . . } ; / / Should the User object berequired COUser user = session.getUser ( ) ;The logon method of the COClientSession object communicates with theOrder Entry server, a back-end authentication mechanism, forauthenticating the user.

The COUser that may be obtained from the COClientSession immediatelyafter the login process is very sparse. It includes a limited set ofinformation such as username, a list of applications that user isentitled to, for example. The details of each entitlement informationare retrieved at the time of actual processing with those information.

Session Security

As described previously, the SSL protocol includes one level of sessionsecurity, and may negotiate and change in cipher code between sessions.Additionally, the present invention employs the “cookie” feature set ofcontemporary browsers to maintain session security, and prevent sessionhijacking or the use of a name and password obtained by sniffing,spoofing or EMR monitoring.

FIG. 11 is a data flow diagram illustrating data flow among theprocessing modules of the “network MCI Interact” during logon,entitlement request/response, heartbeat transmissions and logoffprocedures. As shown in FIG. 11, the client platform includes thenetworkMCI Interact user 340 representing a customer, a logon Web pagehaving a logon object for logon processing 342, a home page having thebackplane object. The Web server 344, the dispatcher server 346, cookiejar server 352, and StarOE server 348 are typically located at theenterprise site.

As described above, following the SSL handshake, certain cab files,class files and disclaimer requests are downloaded with the logon Webpage as shown at 440. At the logon Web page, the customer 340 thenenters a userid and password for user authentication as illustrated at440. The customer also enters disclaimer acknowledgment 440 on the logonpage 342. If the entered userid and password are not valid or if therewere too many unsuccessful logon transactions, the logon object 342communicates the appropriate message to the customer 340 as shown at440. A logon object 342, typically an applet launched in the logon Webpage connects to the Web server 344, for communicating a logon requestto the system as shown at 442. The logon data, having an encrypteduserid and password, is sent to the dispatcher 346 when the connectionis established as shown at 444. The dispatcher 346 then decrypts thelogon data and sends the data to the StarOE 348 after establishing aconnection as shown at 446. The StarOE 348 validates the userid andpassword and sends the results back to the dispatcher 346 as illustratedat 446 together with the user application entitlements. The dispatcher346 passes the data results obtained from the StarOE 348 to the Webserver 344 as shown at 444, which passes the data back to the logonobject 342 as shown at 442. The customer 340 is then notified of thelogon results as shown as 440.

When the customer 340 is validated properly, the customer is presentedwith another Web page, referred to as the home page 350, from which thebackplane is typically launched. After the user validation, thebackplane generally manages the entire user session until the user logsoff the “networkMCI Interact.” As shown at 448, the backplane initiatesa session heartbeat which is used to detect and keep the communicationsalive between the client platform and the enterprise Intranet site. Thebackplane also instantiates a COUser object for housekeeping of allclient information as received from the StarOE 348. For example, todetermine which applications a current customer is entitled to accessand to activate only those application options on the home page forenabling the customer to select, the backplane sends a “get applicationlist” message via the Web server 344 and the dispatcher 346 to theStarOE 348 as shown at 448, 444, and 446. The entitlement list for thecustomer is then sent from the StarOE 348 back to the dispatcher 346, tothe Web server 344 and to the backplane at the home page 350 via thepath shown at 446, 444, and 448. The application entitlements for thecustomer are kept in the COUser object for appropriate use by thebackplane and for subsequent retrieval by the client applications.

The entitlement information for COUser is stored in a cookie jar 352,maintained in the cookie jar server 32 or the dispatcher server 26(illustrated in FIGS. 4 and 5). When the Web server receives theentitlement requests from the backplane at the home page 350 or from anyother client applications, the Web server 344 makes a connection to thecookie jar 352 and checks if the requested information is included inthe cookie jar 352 as shown at 450. The cookie jar 352 is a repositoryfor current customer sessions and the individual session details areincluded in a cookie including the entitlement information from the OEserver 348. During the logon process described above, the OE server 348may include in its response, the entitlements for the validatedcustomer. The dispatcher 346 transfers the entitlement data to the Webserver 344, which translates it into a binary format. The Web server 344then transmits the binary entitlement data to the cookie jar 352 forstorage and retrieval for the duration of a session. Accordingly, if therequested information can be located in the cookie jar 352, no furtherrequest to the StarOE 348 may be made. This mechanism cuts down on theresponse time in processing the request. Although the same information,for example, customer application entitlements or entitlements for corpids, may be stored in the COUser object and maintained at the clientplatform as described above, a second check is usually made with thecookie jar 352 via the Web server 344 in order to insure against acorrupted or tampered COUser object's information. Thus, entitlementsare typically checked in two places: the client platform 10 via COUserobject and the Web server 344 via the cookie jar 352.

When a connection is established with the cookie jar 352, the Web server344 makes a request for the entitlements for a given session as shown at450. The cookie jar 352 goes through its stored list of cookies,identifies the cookie for the session and returns the cookie to the Webserver 344 also shown at 450. The Web server 344 typically converts theentitlements which are received in binary format, to stringrepresentation of entitlements, and sends the entitlement string back tothe backplane running on the client platform 10.

Furthermore, the cookie jar 352 is used to manage heartbeattransactions. Heartbeat transactions, as described above, are used todetermine session continuity and to identify those processes which havedied abnormally as a result of a process failure, system crash or acommunications failure, for example. During a customer sessioninitialization, the cookie jar 352 generates a session id and sets up“heartbeat” transactions for the customer's session. Subsequently, aheartbeat request is typically sent from a process running on a clientplatform to the Web server 344, when a connection is established, asshown at 448. The Web server 344 connects to the cookie jar 352 andrequests heartbeat update for a given session. The cookie jar 352searches its stored list of cookies, identifies the cookie for thesession and updates the heartbeat time. The cookie jar 352 then sendsthe Web server 344 the updated status heartbeat as shown at 450. The Webserver 344 then sends the status back to the client platform process,also as shown at 450.

When a customer wants to logoff, a logoff request transaction may besent to the Web server 344. The Web server 344 then connects to thecookie jar 352 and requests logoff for the session as shown at 450. Thecookie jar 352 identifies the cookie for the session and deletes thecookie. After deleting the cookie, the cookie jar 352 sends a logoffstatus to the Web server 344, which returns the status to the clientplatform.

Other transaction requests are also sent via the Web server 344 and thecookie jar 352 as shown in FIG. 12. FIG. 12 is a data flow diagram forvarious transactions communicated in the system of the presentinvention. Typically, when a customer enters a mouse click on anapplication link as shown at 460, an appropriate transaction requeststream is sent to the Web server as shown at 462. The Web server 344typically decrypts the transaction stream and connects to the cookie jar352 to check if a given session is still valid as shown at 464. Thecookie jar 352 identifies the cookie for the session and sends it backto the Web server 344 as shown at 464. The Web server 344 on receipt ofvalid session connects to the dispatcher 346 and sends the transactionrequest as shown at 466. When the dispatcher 346 obtains the request, itmay also connect to the cookie jar 352 to validate the session as shownat 468. The cookie jar 352 identifies the cookie for the session andsends it back to the dispatcher 346 as shown at 468. The dispatcher 346,upon receiving the valid session connects to a targeted applicationserver or proxy 354, which may include StarOE, and sends the requesttransaction to the target as shown at 470. The server or proxy 354processes the request and sends back the response as stream of datawhich is piped back to the dispatcher 346 as shown at 470. Thedispatcher 346 pipes the data back to the Web server 344 as shown at466, which encrypts and pipes the data to the client platform as shownat 462, referred to as the home page 350 in FIG. 12.

The present invention includes a client communications unit forproviding a single interface from which the backplane and theapplications may send messages and requests to back-end services. Theclient communications unit includes a client session unit and atransactions unit. The client session unit and the transactions unitcomprise classes used by client applications to create objects thathandle communications to the various application proxies and/or servers.Generally, the entire communications processes start with the creationof a client session after a login process. This is started through thelogin process. The user logs into user's Web page with a username andpassword. During a login process, a client session object of classCOClientSession is created, and the COClientSession object passes theusername and password information pair obtained from the login processto a remote system administrative service which validates the pair. Thefollowing code instructions are implemented, for example, to start up asession using the COClientSession class.

COClientSession ss = new COClientSession ( ) ; try { ss.setURL(urlString) ; ss.logon(“jsmith”, “myPassword”) ; } catch(COClientLogonException e) { . . . } catch (MalformedURLException e) { .. . } ;

In addition, the COClientSession object includes a reference to a validCOUser object associated with the user of the current COClientSessionobject.

The client session object also provides a session, where a customer logson to the system at the start of the session, and if successfullyauthenticated, is authorized to use the system until the session ends.The client session object at the same time provides a capability tomaintain session-specific information for the life/duration of thesession. Generally, communications to and from the client takes placeover HTTPS which uses the HTTP protocols over an SSL encrypted channel.Each HTTP request/reply is a separate TCP/IP connection, completelyindependent of all previous or future connections between the sameserver and client. Because HTTP is stateless, meaning that eachconnection consists of a single request from the client which isanswered by a single reply by a server, a novel method is provided toassociate a given HTTP request with the logical session to which itbelongs.

When a user is authenticated at login via the system administrativeserver, the client session object is given a session identifier or“cookie,” a unique server-generated key which identifies a session. Thesession key is typically encapsulated in a class COWebCookie, “publicCOWebCookie (int value).”, where value represents a given cookie'svalue. The client session object holds this key and returns it to theserver as part of the subsequent HTTP request. The Web server maintainsa “cookie jar” which is resident on the dispatcher server and which mapsthese keys to the associated session. This form of session managementalso functions as an additional authentication of each HTTPS request,adding security to the overall process. In the preferred embodiment, asingle cookie typically suffices for the entire session. Alternately, anew cookie may be generated on each transaction for added security.Moreover, the cookie jar may be shared between the multiple physicalservers in case of a failure of one server. This mechanism preventssessions being dropped on a server failure.

In addition, to enable a server software to detect client sessions whichhave “died,” e.g., the client session has been disconnected from theserver without notice because of a client-side crash or network problem,the client application using the client session object “heartbeats”every predefined period, e.g., 1 minute, to the Web server to “renew”the session key (or record). The Web server in turn makes a heartbeattransaction request to the cookie jar. Upon receipt of the request, thecookie jar service “marks” the session record with a timestampindicating the most recent time the client communicated to the serverusing the heartbeat. The cookie jar service also alarms itself, on aconfigurable period, to read through the cookie jar records (sessionkeys) and check the timestamp (indicating the time at which the clientwas last heard) against the current time. If a session record's delta isgreater than a predetermined amount of time, the cookie jar serviceclears the session record, effectively making a session key dead. Anysubsequent transactions received with a dead session key, i.e.,nonexistent in the cookie jar, are forbidden access through theFirewall.

The heartbeat messages are typically enabled by invoking theCoClientSession object's method “public synchronized voidenableSessionHeartbeat (boolean enableHeartbeat),” where enableHeartbeatis a flag to enable or disable heartbeat for a session. The heartbeatmessages are typically transmitted periodically by first invoking theCoClientSession object's method “public synchronized voidsetHeartbeatInterval (long millsecsInterval),” where the heartbeatinterval is set in milliseconds, and by the COClientSession object'smethod “protected int startHeartbeat( )”, where the heartbeat processstarts as soon as the heartbeat interval is reached. Failure to“heartbeat” for consecutive predefined period, e.g., one hour, wouldresult in the expiration of the session key.

Enterprise Security

Enterprise Security is directed to the security of the enterprisenetwork and the data maintained by the various enterprise applicationswith respect to the open nature of the Internet, and the various attackson the system or data likely to result from exposure to the Internet.Usual enterprise security is focused on internal procedures andemployees, since this represents the biggest single area of exposure.Strong passwords, unique user Ids and the physical security of theworkstations are applicable to both internal employees and externalcustomers and users who will access the enterprise applications. It isnoted that many of the previously described features relating to dataencryption for communications security and session security areessential parts of enterprise security, and cooperate with enterprisearchitecture and software infrastructure to provide security for theenterprise.

For example, as will be hereinafter described in detail, the presentinvention uses strong symmetric key encryption for communicationsthrough the firewalls to the application servers. This internalsymmetric key encryption, when coupled with external public keyencryption provides an extra level of security for both the data and thesoftware infrastructure.

FIG. 5 is a diagram depicting the physical networkMCI Interact systemarchitecture 10. As shown in FIG. 5, the system is divided into threemajor architectural divisions including: 1) the customer workstation 10which includes those mechanisms enabling customer connection to theSecure web servers 24; 2) a secure network area 17, known as theDeMilitarized Zone “DMZ” set aside on MCI premises double firewalledbetween the public Internet 25 and the MCI Intranet to preventpotentially hostile customer attacks; and, 3) the MCI Intranet MidrangeServers 40 and Legacy Mainframe Systems 20 which comprise the back endbusiness logic applications.

As illustrated in FIG. 5, the present invention includes a double orcomplex firewall system that creates a “demilitarized zone” (DMZ)between two firewalls 29 a, 29 b.

In the preferred embodiment, a hybrid or complex gateway firewall systemis used, and the firewalls 29(a),(b) of FIGS. 1, 4 and 5 areillustrative to represent the concept diagramatically. In the preferredembodiment, they may include port specific filtering routers, which mayonly connect with a designated port address. For example, router 29(a)may connect only to the addresses set for the HydraWeb® 45 (or webservers 24) within the DMZ, and router 29(b) may only connect to theport addresses set for the dispatcher server 26 within the network. Inaddition, the dispatcher server connects with an authentication server,and through a proxy firewall to the application servers. This ensuresthat even if a remote user ID and password are hijacked, the only accessgranted is to one of the web servers 24 or to intermediate data andprivileges authorized for that user. Further, the hijacker may notdirectly connect to any enterprise server in the enterprise intranetbeyond the DMZ, thus ensuring internal company system security andintegrity. Even with a stolen password, the hijacker may not connect toother ports, root directories or application servers within theenterprise system, and the only servers that may be sabotaged orcontrolled by a hacker are the web servers 24.

The DMZ acts as a double firewall for the enterprise intranet because ofthe double layer of port specific filtering rules. Further, the webservers 24 located in the DMZ never store or compute actual customersensitive data. The web servers only transmit the data in a formsuitable for display by the customer's web browser. Since the DMZ webservers do not store customer data, there is a much smaller chance ofany customer information being jeopardized in case of a security breach.In the preferred embodiment, firewalls or routers 29(a),(b) are acombination of circuit gateways and filtering gateways or routers usingpacket filtering rules to grant or deny access from a source address toa destination address. All connections from the internal applicationservers are proxied and filtered through the dispatcher before reachingthe web servers 24. Thus it appears to any remote site, that theconnection is really with the DMZ site, and identity of the internalserver is doubly obscured. This also prevents and direct connectionbetween any external and any internal network or intranet computer.

The filtering firewalls 29(a),(b) may also pass or block specific typesof Internet protocols. For example, FTP can be enabled only forconnections to the In-Box server 41, and denied for all otherdestinations. SMTP can also be enabled to the In-Box server, but Telenetdenied. The In-box server 41 is a store and forward server for clientdesignated reports, but even in this server, the data and meta-data areseparated to further secure the data.

As previously described, the customer access mechanism is a clientworkstation 10 employing a Web browser 14 for providing the access tothe networkMCI Interact system via the public Internet 15. When asubscriber connects to the networkMCI Interact Web site by entering theappropriate URL, a secure TCP/IP communications link 22 is establishedto one of several Web servers 24 located inside a first firewall 29 a inthe DMZ 17. Preferably at least two web servers are provided forredundancy and failover capability. In the preferred embodiment of theinvention, the system employs SSL encryption so that communications inboth directions between the subscriber and the networkMCI Interactsystem are secure.

In the present embodiment, the DMZ Secure Web servers 24 are DEC 4100systems having Unix or NT-based operating systems for running servicessuch as HTTPS, FTP, and Telnet over TCP/IP. The web servers may beinterconnected by a fast Ethernet LAN running at 100 Mbit/sec orgreater, preferably with the deployment of switches within the EthernetLANs for improved bandwidth utilization. One such switching unitincluded as part of the network architecture is a HydraWEB™ unit 45,manufactured by HydraWEB Technologies, Inc., which provides the DMZ witha virtual IP address so that subscriber HTTPS requests received over theInternet will always be received. The Hydraweb unit 45 implements a loadbalancing algorithm enabling intelligent packet routing and providingoptimal reliability and performance by guaranteeing accessibility to the“most available” server. It particularly monitors all aspects of webserver health from CPU usage, to memory utilization, to available swapspace so that Internet/Intranet networks can increase their hit rate andreduce Web server management costs. In this manner, resource utilizationis maximized and bandwidth (throughput) is improved. It should beunderstood that a redundant Hydraweb unit may be implemented in aHot/Standby configuration with heartbeat messaging between the two units(not shown). Moreover, the networkMCI Interact system architectureaffords web server scaling, both in vertical and horizontal directions.Additionally, the architecture is such that new secure web servers 24may be easily added as customer requirements and usage increases. Theuse of the HydraWEB™ enables better load distribution when needed tomatch performance requirements.

As shown in FIG. 5, the most available Web server 24 receives subscriberHTTPS requests, for example, from interconnected by a fast Ethernet LANrunning at 100 Mbit/sec or greater, preferably with the deployment ofswitches within the Ethernet LANs for improved bandwidth utilization.One such switching unit included as part of the network architecture isa HydraWEB™ unit 45, manufactured by HydraWEB Technologies, Inc., whichprovides the DMZ with a virtual IP address so that subscriber HTTPSrequests received over the Internet will always be received. TheHydraweb unit 45 implements a load balancing algorithm enablingintelligent packet routing and providing optimal reliability andperformance by quaranteeing accessibility to the “most available”server. It particularly monitors all aspects of web server health fromCPU usage, to memory utilization, to available swap space so thatInternet/Intranet networks can increase their hit rate and reduce Webserver management costs. In this manner, resource utilization ismaximized and bandwidth (throughput) is improved. It should beunderstood that a redundant Hydraweb unit may be implemented in aHot/Standby configuration with heartbeat messaging between the two units(not shown). Moreover, the networkMCI Interact system architectureaffords web server scaling, both in vertical and horizontal directions.Additionally, the architecture is such that new secure web servers 24may be easily added as customer requirements and usage increase. The useof the HydraWEB™ enables better load distribution when needed to matchperformance requirements.

As shown in FIG. 5, the most available Web server 24 receives subscriberHTTPS requests, for example, from the HydraWEB™ 45 over a connection 35a and generates the appropriate encrypted messages for routing therequest to the appropriate MCI Intranet midrange web server overconnection 35 b, router 55 and connection 23. Via the Hydraweb unit 45,a TCP/IP connection 38 links the Secure Web server 24 with the MCIIntranet Dispatcher server 26.

Further as shown in the DMZ 17 is a second RTM server 52 having its ownconnection to the public Internet via a TCP/IP connection 32. Asdescribed in co-pending U.S. Patent Application INTEGRATED PROXYINTERFACE FOR WEB BASED TELECOMMUNICATIONS MANAGEMENT TOOLS, U.S. Pat.No. 6,470,386, the disclosure of which is incorporated herein byreference thereto, this server provides real-time session management forsubscribers of the networkMCI TCP/IP Real Time Monitoring system. Anadditional TCP/IP connection 48 links the RTM Web server 52 with the MCIIntranet Dispatcher server 26.

With more particularity, as further shown in FIG. 5, the networkMCIInteract physical architecture includes two routers: a first router 55for routing encrypted subscriber messages from a Secure Web server 24 tothe Dispatcher server 26 located inside the second firewall 29 b; and, asecond router 65 for routing encrypted subscriber messages from the RTMWeb server 52 to the Dispatcher server 26 inside the second firewall. Inthe preferred embodiment, the routers are manufactured by Cisco Systems,Inc. Although not shown, each of the routers 55, 65 may additionallyroute signals through a series of other routers before eventually beingrouted to the nMCI Interact Dispatcher server 26. In operation, each ofthe Secure servers 24 function to decrypt the client message, presentlyvia the SSL implementation, and unwrap the session key and verify theusers session from the COUser object authenticated at Logon.

After establishing that the request has come from a valid user andmapping the request to its associated session, the Secure Web servers 24will re-encrypt the request using public key or RSA encryption andforward it over a second secure socket connection 23 to the dispatcherserver 26 inside the enterprise Intranet.

FIGS. 13(a) and 13(b) are schematic illustrations showing the messageformat passed between the dispatcher 26 and the relevant applicationspecific proxy, (FIG. 13(a)) and the message format passed between theapplication specific proxy back to the Dispatcher 26 (FIG. 13(b)). Asshown in FIG. 13(a), all messages between the Dispatcher and theProxies, in both directions, begin with a common header 150 to allowleverage of common code for processing the messages. A first portion ofthe header includes the protocol version 165 which may comprise a byteof data for identifying version control for the protocol, i.e., themessage format itself, and is intended to prevent undesired mismatchesin versions of the dispatcher and proxies. The next portion includes themessage length 170 which, preferably, is a 32-bit integer providing thetotal length of the message including all headers. Next is the echo/pingflag portion 172 that is intended to support a connectivity test for thedispatcher-proxy connection. For example, when this flag is non-zero,the proxy immediately replies with an echo of the supplied header. Thereshould be no attempt to connect to processes outside the proxy, e.g. theback-end application services. The next portion indicates the Sessionkey 175 which is the unique session key or “cookie” provided by the Webbrowser and used to uniquely identify the session at the browser. Asdescribed above, since the communications middleware is capable ofsupporting several types of transport mechanisms, the next portion ofthe common protocol header indicates the message type/mechanism 180which may be one of four values indicating one of the following fourmessage mechanisms and types: 1) Synchronous transaction, e.g., a binary0; 2) Asynchronous request, e.g., a binary 1; 3) Asynchronouspoll/reply, e.g., a binary 2; 4) bulk transfer, e.g., a binary 3.

Additionally, the common protocol header section includes an indicationof dispatcher-assigned serial number 185 that is unique across alldispatcher processes and needs to be coordinated across processes (likethe Web cookie (see above)), and, further, is used to allow for failoverand process migration and enable multiplexing control between theproxies and dispatcher, if desired. A field 140 indicates the status isunused in the request header but is used in the response header toindicate the success or failure of the requested transaction. Morecomplete error data will be included in the specific error messagereturned. The status field 140 is included to maintain consistencybetween requests and replies. As shown in FIG. 13(a), the proxy specificmessages 178 are the metadata message requests from the report requestorclient and can be transmitted via synchronous, asynchronous or bulktransfer mechanisms. Likewise, the proxy specific responses are metadataresponse messages 180 again, capable of being transmitted via asynchronous, asynchronous or bulk transfer transport mechanism.

It should be understood that the application server proxies can eitherreside on the dispatcher server 26 itself, or, preferably, can beresident on the middle-tier application servers 40, i.e., the dispatcherfront end code can locate proxies resident on other servers.

As mentioned, the proxy validation process includes parsing incomingrequests, analyzing them, and confirming that they may include validlyformatted messages for the service with acceptable parameters. Ifnecessary, the message is translated into an underlying message ornetworking protocol. If no errors are found, the proxy then manages thecommunication with the middle-tier server to actually get the requestserviced. The application proxy supports application specifictranslation and communication with the back-end application server forboth the Web Server (java applet originated) messages and applicationserver messages.

Particularly, in performing the verification, translation andcommunication functions, the Report Manager server, the Report Schedulerserver and Inbox server proxies each employ front end proxy C++ objectsand components. For instance, a utils.c program and a C++ componentslibrary, is provided for implementing general functions/objects. VariousC++ parser objects are invoked which are part of an object class used asa repository for the RM metadata and parses the string it receives. Theclass has a build member function which reads the string which includesthe data to store. After a message is received, the parser object iscreated in the RMDispatcher.c object which is a file which includes thebusiness logic for handling metadata messages at the back-end. It usesthe services of an RMParser class. Upon determining that the client hassent a valid message, the appropriate member function is invoked toservice the request. Invocation occurs in MCIRMServerSocket.C when anincoming message is received and is determined not to be a talarianmessage. RMSErverSocket.c is a class implementing the message managementfeature in the Report Manager server. Public inheritance is fromMCIServerSocket in order to create a specific instance of this object.This object is created in the main loop and is called when a messageneeds to be sent and received; a Socket.c class implementing client typesockets under Unix using, e.g., TCP/IP or TCP/UDP. Socket.C is inheritedby ClientSocket.C:: Socket(theSocketType, thePortNum) andServerSocket.C:: Socket(theSocketType, thePortNum) when ClientSocket orServerSocket is created. A ServerSocket.c class implements client typesockets under Unix using either TCP/IP or TCP/UDP. ServerSocket.C isinherited by RMServerSocket when RMServerSocket is created. AnInboxParser.c class used as a repository for the RM Metadata. The class'“build” member function reads the string which includes the data tostore and the class parses the string it receives. After a message hasbeen received, the MCIInboxParser object is created in inboxutl.c whichis a file which includes the functions which process the Inbox requests,i.e, Add, Delete, List, Fetch and Update. Additional objects/classesinclude: Environ.c which provides access to a UNIX environment;Process.c which provides a mechanism to spawn slave processes in theUNIX environment; Daemon.c for enabling a process to become a daemon;Exception.c for exception handling in C++ programs; and, RMlog.c forfacilitating RM logging. In addition, custom ESQL code for RM/databaseinterface is provided which includes the ESQC C interface (Informix)stored procedures for performing the ARD, DRD, DUR, URS, GRD, CRD, andGPL messages. The functions call the stored procedures according to themessage, and the response is built inside the functions depending on thereturned values of the stored procedures. A mainsql.c program providesthe ESQL C interface for messages from the report manager and reportviewer.

Outgoing (server-to-client) communications follow the reverse route,i.e., the proxies feed responses to the decode/dispatcher server 26 andcommunicate them to the DMZ Web servers 24 over the socket connection.The Web servers 26 will forward the information to the client 10 usingSSL. The logical message format returned to the client from the middletier service is shown as follows:

| | TCP/IP | | encryption | | http | | web response | | dispatcherresponse | | proxy-specific response | |where “| |” separates a logical protocol level, and protocols nestedfrom left to right.

While the invention has been particularly shown and described withrespect to preferred embodiments thereof, it will be understood by thoseskilled in the art that the foregoing and other changes in form anddetails may be made therein without departing from the spirit and scopeof the invention.

1. A security system for communications network management having anintegrated customer interface, said security system comprising: at leastone secure web server for managing secure sessions over the internet,said secure web server supporting secure socket layer for encryptedcommunication, said secure web server also providing session managementincluding customer identification, validation and session management tolink said session with said customer; at least one dispatcher server forcommunicating with said secure web server through a firewall, andcommunicating with a plurality of proxy services and a plurality ofsystem resources using an internal network, said dispatcher serverproviding verification of system access after customer entitlements havebeen verified; and said plurality of system resources providingcommunications network management capabilities for said customer, eachof said system resources responsive to a request to generate client dataor instructions relating to said communications network.
 2. The securitysystem for communications network management as claimed in claim 1further comprising: a plurality of client web browsers that enableinteractive secure communications with said security system and providean integrated interface for said customer, each of said web browserssupporting client identification, client authentication and securesockets layer communications protocol, wherein said system includesdigital certificates to authenticate said secure web server to saidclient web browser.
 3. The security system for communications networkmanagement as claimed in claim 2 wherein said client web browser securesocket layer encrypts client identification, authentication and asession management cookie during each transmission.
 4. The securitysystem for communications network management as claimed in claim 2wherein said system includes a first encryption algorithm fortransmission of all customer data between said secure web server andsaid client browser for transmission of all customer data between saidsecure web server and said dispatcher server and a second encryptionalgorithm.
 5. The security system for communications network managementas claimed in claim 2 wherein each client request from said web browseris encrypted with a public key provided by said communications network,and each of said client requests includes an encrypted client cookie forclient authentication.
 6. The security system for communications networkmanagement as claimed in claim 1 wherein said session management furtherincludes web cookie generation at each instance of client identificationto link a session with said customer through a plurality of discreteclient communications in said session to verify said customer to saiddispatcher server at each transmission in said session.
 7. The securitysystem for communications network management as claimed in claim 6wherein said cookie is generated by a program on a separate serverduring an entitlements communications, after identification andauthentication of the client.
 8. The security system for communicationsnetwork management as claimed in claim 6 wherein said session cookiesprovide simultaneous session management for a plurality of systemresource platforms.
 9. The security system for communications networkmanagement as claimed in claim 1 wherein said secure web servercommunicates with said dispatcher server over an encrypted socketconnection.
 10. The security system for communications networkmanagement as claimed in claim 9 wherein said system includes encryptionbetween said secure web server and said dispatcher server.
 11. Thesecurity system for communications network management as claimed inclaim 1 further comprising: at least one digital certificate forauthenticating said secure web server to a plurality of client webbrowsers that enable interactive secure communications with saidsecurity system and provide an integrated interface for said customer,each of said web browsers supporting client identification, clientauthentication and secure sockets layer communications protocol.
 12. Thesecurity system for communications network management as claimed inclaim 11, wherein said client web browser secure socket layer encryptsclient identification, authentication and a session management cookieduring each transmission.
 13. The security, system for communicationsnetwork management as claimed in claim 11, wherein said system includesa first encryption algorithm for transmission of all customer databetween said secure web server and said client browser for transmissionof all customer data between said secure web server and said dispatcherserver and a second encryption algorithm.
 14. The security system forcommunications network management as claimed in claim 11, wherein eachclient request from said web browser is encrypted with a public keyprovided by said communications network, and each of said clientrequests includes an encrypted client cookie for client authentication.15. A system having an integrated and secure customer interface forcommunications network management, said system including a web browserfor use on a client computer, and a secure web server having a systemhome page, said system comprising: at least one applet embedded in saidhome page to provide interactive sessions with said communicationsnetwork, said sessions including client authentication, sessionauthentication and transaction requests for said communications network;an encryption layer to provide encryption of each client session with apublic key provided by said communications network, each session alsoincluding session authentication with a client cookie generated by saidsystem, said session cookie being encrypted with said public key duringtransmission of each transaction request to said secure server; and atleast one security firewall on either side of said secure server toprevent direct public access to said communications network.
 16. Thesystem for communications network management as claimed in claim 15,said communications network further including a plurality of applicationservers for receiving transaction requests from said secure web server,said secure web server encrypting each of said transaction requests witha public key algorithm before transmission to a selected one of saidapplication servers.
 17. The system for communications networkmanagement as claimed in claim 16, said system further including adispatcher server for receiving transaction requests from said secureweb server, and dispatching said request to said selected one of saidapplication servers.
 18. The system for communications networkmanagement as claimed in claim 15, wherein said communications networkincludes a router based firewall between said secure server and saidpublic Internet, and a proxy based firewall between said secure webserver and any one of said applications servers.
 19. The system forcommunications network management as claimed in claim 15, wherein one ofsaid applets is a user object, said object being populated with a firstset of entitlement at log on, and a second set of entitlement during asession with a selected application sever.
 20. The system forcommunications network management as claimed in claim 15, saidcommunications network further including an authentication server whichdetermines entitlement for a user object following authentication.