US20120079389A1 - Method and Apparatus For Information Exchange Over a Web Based Environment - Google Patents
Method and Apparatus For Information Exchange Over a Web Based Environment Download PDFInfo
- Publication number
- US20120079389A1 US20120079389A1 US13/282,445 US201113282445A US2012079389A1 US 20120079389 A1 US20120079389 A1 US 20120079389A1 US 201113282445 A US201113282445 A US 201113282445A US 2012079389 A1 US2012079389 A1 US 2012079389A1
- Authority
- US
- United States
- Prior art keywords
- user
- web
- resource information
- administrator
- enterprise network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/168—Details of user interfaces specifically adapted to file systems, e.g. browsing and visualisation, 2d or 3d GUIs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0879—Manual configuration through operator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5054—Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
- H04L65/403—Arrangements for multi-party communication, e.g. for conferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
- H04L41/0253—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using browsers or web-pages for accessing management information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
- H04L41/0266—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using meta-data, objects or commands for formatting management information, e.g. using eXtensible markup language [XML]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Definitions
- the present invention generally relates to communications network. More specifically, the present invention relates to web based communications system.
- a problem associated with a conventional network is limited size and speed. For example, a typical email system limits the size of each email, such as 10 megabytes, thereby a reasonable speed of delivery of such email can be achieved.
- Another problem associated with a conventional network is that various hosts require software installation before a user can use their platform. For example, SkypeTM requires users to install its proprietary software on the user's systems before it allows them to use its platform.
- the present invention relates to a method and apparatus for information exchange over a web environment.
- one or more login users of the CCDSVM each using a browser of any system and from anywhere, can instantly perform tasks. For example, each user can post or un-post messages, files, folders, or other resources resided on systems of the CCDSVM with group-based model or non-group 1-to-1 personal based model for one or more audiences on the network to access.
- This technology will also achieve larger scales of secure information exchange without size limitation and installation of special software.
- the implementation of this invention has provided users with a web-browser based, 1-click system that is capable of securing exchanges of messages, files, folders, or other resource information resided on the systems crossing network domains without size limitation.
- FIG. 1 is a block diagram illustrating a layout of a CCDSVM with a central control management system, multiple provisioned systems, client systems, and console systems in accordance with one embodiment of the present invention
- FIG. 2A is a block diagram illustrating a layout of a CCDSVM with which users from their web-browser of provisioned system can communicate with each other in accordance with another embodiment of the present invention
- FIG. 2B is a block diagram illustrating a layout of a CCSDVM with only a single control management system to be accessed by massive client systems in accordance with another embodiment of the present invention
- FIG. 3 is a block diagram illustrating an example of a software for a CCDSVM in accordance with one embodiment of the present invention
- FIG. 4A illustrates an example of a dynamic work space in accordance with one embodiment of the present invention
- FIG. 4B illustrates an example of resources which may be assigned to a user-group common work space in accordance with one embodiment of the present invention
- FIG. 4C illustrates an example of a user private work space and possible assigned system resources in accordance with one embodiment of the present invention
- FIG. 5 illustrates an example of resource objects resided on the systems in accordance with one embodiment of the present invention
- FIG. 6A illustrates an example of displaying a web-page with 4 sections in a web-browser of user X in a user-group during an interactive online meeting in accordance with one embodiment of the present invention
- FIG. 6B illustrates an example of displaying a web-page with 4 sections in a web-browser of a user Y in a user group during an interactive online meeting in accordance with another embodiment of the present invention
- FIG. 6C illustrates an example of displaying a web-page with 4 sections in a web-browser of a user X in the user group before the interactive online meeting in accordance with another embodiment of the present invention
- FIG. 6D illustrates an example of displaying a web-page with 4 sections in the web-browser of the user Y in the user group before the interactive online meeting in accordance with another embodiment of the present invention
- FIG. 6E illustrates an example of a displayed web-page that each massive online user can access and view from each of their browsers without login to the CCDSVM during said user X and user Y in the user group online meeting in accordance with another embodiment of the present invention
- FIG. 7A illustrates one-to-one, peer-to-peer post or un-post messages and folders of the user X in accordance with one embodiment of the present invention
- FIG. 7B illustrates one-to-one, peer-to-peer post or un-post messages and folders of the user Y in accordance with another embodiment of the present invention
- FIG. 8A is an example of a web-based graphic presentation of the assigned resources in a user X's private work space in accordance with one embodiment of the present invention
- FIG. 8B is an example of a web-based graphic presentation of assigned resources in the private work space of a user Y in accordance with another embodiment of the present invention.
- FIG. 8C is an example of a web-based graphic presentation of the user Y's private work space after the user X dynamically posted and shared “folder 2 ” in the user X's private space in accordance with another embodiment of the present invention
- FIG. 9A is an example of a pop-up menu for folders in accordance with one embodiment of the present invention.
- FIG. 9B is an example of a pop-up menu for files in accordance with another embodiment of the present invention.
- FIG. 10A is an example of a non pop-up operation menu for folders in accordance with one embodiment of the present invention.
- FIG. 10B is an example of a non pop-up operation menu for files in accordance with another embodiment of the present invention.
- FIG. 11 is an example of a center view of a list of posted files or folders in a file & folder area of a private work space of a user X in accordance with one embodiment of the present invention.
- Embodiments of the present invention are described herein in the context of a method, system and apparatus for providing a web based communications network with fast, volume, and secure information exchange.
- Those of ordinary skill in the art will realize that the following detailed description of the present invention is illustrative only and is not intended to be in any way of limiting. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure.
- the components, process steps, and/or data structures described herein may be implemented using various types of operating systems, computing platforms, computer programs, and/or general purpose machines.
- devices of a less general purpose nature such as hardwired devices, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or the like, may also be used without departing from the scope and spirit of the inventive concepts disclosed herein.
- a method comprising a series of process steps is implemented by a computer or a machine and those process steps can be stored as a series of instructions readable by the machine, they may be stored on a tangible medium such as a computer memory device (e.g., ROM (Read Only Memory), PROM (Programmable Read Only Memory), EEPROM (Electrically Eraseable Programmable Read Only Memory), FLASH Memory, Jump Drive, and the like), magnetic storage medium (e.g., tape, magnetic disk drive, and the like), optical storage medium (e.g., CD-ROM, DVD-ROM, paper card and paper tape, and the like) and other known types of program memory.
- ROM Read Only Memory
- PROM Programmable Read Only Memory
- EEPROM Electrically Eraseable Programmable Read Only Memory
- FLASH Memory Jump Drive
- magnetic storage medium e.g., tape, magnetic disk drive, and the like
- optical storage medium e.g., CD-ROM, DVD-ROM, paper card and paper tape, and the like
- FIG. 1 illustrates a CCDSVM in accordance with an embodiment of the present invention.
- a CCDSVM includes a group of provisioned systems 3 , a control management system 2 , console systems 1 , and client systems 10 .
- the control management system (“control system”) 2 is configured to control a group of systems (“provisioned system”) 3 .
- provisioned system systems
- provisioned system systems
- console systems console systems
- client systems initiate accessing the provisioned systems 3 via a web-browser over a network infrastructure, such as the Intranet, an Internet, and/or a LAN.
- the network infrastructure (“network”) includes all necessary hardware and software that facilitate various users from different geographic locations to communicate through the Internet, an Intranet, and/or a LAN.
- the hardware of the network includes wired network connection media, wireless connecting media, circuitry components, and communication equipments.
- the network connection media includes various cables such as Ethernet and/or optical fiber.
- the wireless connecting media is capable of establishing wireless communication links through air.
- the circuitry components include processor, data bus, memory devices, and/or circuit board.
- the communication equipments such as switches, routers, gateways, and/or adapters, are used to provide a communications network. It should be noted that there are other possible elements of communication equipment that may be needed to form a communication link, but they are not necessary to understand the present invention.
- IP Internet Protocol
- DNS Domain Name System
- IP gateway set-up software
- IP broadcast and so forth.
- IP-based standard or non-standard proprietary protocols such as Hypertext Transfer Protocol (“HTTP”) over Transmission Control Protocol/Internet Protocol (“TCP/IP”) or Simple Object Access Protocol (“SOAP”) over TCP/IP.
- HTTP Hypertext Transfer Protocol
- TCP/IP Transmission Control Protocol/Internet Protocol
- SOAP Simple Object Access Protocol
- IP based protocols are proprietary protocols and some are non-IP based protocols.
- a web-browser is an application program that allows a user to access information over the Web, such as Windows Internet Explorer (“IE”), FireFox, Netscape, and/or Mozillar.
- a web-browser could also be any proprietary software, which uses web-protocols such as HTTP, WAP, SOAP for communication over the network.
- the web-browser can be implemented with any suitable programming languages such as C, C++, Java, or XML, or a combination of the suitable languages.
- a web page is comprised with displayable information that is accessible through the web-browser.
- the web page may be hosted by a web server via a web server software and can be transmitted (or retrieved) by a web-browser.
- the provisioned systems 3 , client systems 10 , console systems 1 , and control management system 2 are computational systems that could be server system, desktop or laptop computer, handheld devices such as PDA, wireless phone, and so forth.
- Each computational system include CPUs, storage devices, and memory controller.
- the storage devices include internal memory such as read-only memory (“ROM”) and/or random access memory (“RAM”).
- the storage devices may further include external storage devices such as magnetic disks or tapes, which include redundant array of redundant inexpensive disk drives (“RAID”), just bunch of disk drive (“JBOD”), and memory stick.
- the associated storage controller can be Integrated Drive Electronics (“IDE”), Small Computer System Interface (“SCSI”), Fiber optical controller, or a combination of above-mentioned devices.
- IDE Integrated Drive Electronics
- SCSI Small Computer System Interface
- Fiber optical controller or a combination of above-mentioned devices.
- the computational systems also include non-embedded or real-time embedded operating system (“OS”), which could be Linux, or Windows, Unix, or proprietary OS.
- OS real-time embedded operating system
- the present invention may include multiple control systems at different layers of system configuration topology wherein each of the control systems is capable of communicating with each other through a network.
- the control systems at middle layers play dual roles as both control system and provisioned system in the system configuration topology.
- FIG. 1 illustrates a CCDSVM platform with multiple clients 10 in accordance with one embodiment of the present invention.
- the CCDSVM includes the console systems 1 , a control management system 2 , the provisioned systems 3 , and networks 11 - 12 , wherein networks 11 - 12 are used inter-connecting with all systems of the CCDSVM and the client systems 10 .
- the console system 1 is a computational system having a web-browser or web-console 9 wherein the web-browser is used by privileged users for accessing the CCDSVM platform.
- the web browser 9 which could be resided on any mentioned systems, permits a user to access information from the CCDSVM by following a web URL link. For example, a privileged user enters a URL of “https://69.107.28.123/stt/sttwebos” into an URL address input area of the web browser 9 and once the link based on the entered URL is established, the user can obtain information hosted by the web-based computer user work/operation environment (“WCUWE”) of the CCDSCM.
- the console system 1 in one embodiment, further includes software modules 13 , wherein the software modules 13 may be used to facilitate communication between the console system 1 the and control management system 2 .
- the control system 2 in one embodiment, is a server system, a desktop or a laptop computer with the memory and storage capabilities.
- the control system 2 includes web server software 7 and console supporting software 6 .
- the console supporting software 6 includes web server interface software modules 5 and control management software modules 4 .
- the control management system 2 may also have a native web-browser 9 used as a web-console 9 of the control system 2 .
- the web server software 7 sends/receives data to/from the web-console 9 of the console system 1 or the client system 10 or the control system 2 itself.
- the web server software 7 is configured to provide secure sockets layer (“SSL”) encryption to encrypting the data before transmission to enhance the security.
- SSL secure sockets layer
- the web server software 7 could be commercially available software such as ApacheTM from open source, or IIS from Microsoft or a proprietary software.
- the web server software modules 7 and console support software modules 6 can be implemented by any suitable or a combination of any suitable programming languages such as C, C++, Java, JavaScript, HTML, or XML.
- the console supporting software 6 communicates with the service software modules 8 of the provisioned systems 3 .
- the web server interface 5 of the console support software 6 is capable of providing special functions that are otherwise performed by the web server 7 . If there is no any provisioned systems 3 coupled to the CCDSVM platform, the control management system 2 , in one embodiment, is reconfigured to continue monitoring systems over the network and the CCDSVM platform is also reconfigured to become a single stand-alone system, as shown in FIG. 2B , therefore, users can access and/or obtain resource objects or system resources via the web-browser 9 , which can be resided at on any client system 3 or console system 1 .
- the provisioned system 3 contains suitable operating system (“OS”).
- the provisioned systems 3 can be automatically provisioned by the control management system 2 through an automatic system service pool construction protocol.
- Provision process also known as pooling process, is a method allowing the control system 2 to control one or more network systems by reconfiguring the network systems. For example, when a provisioned system boots up via the automatic system service pool construction communication protocol, the control system 2 automatically obtains provisioned system's name, IP address, and system information from the provisioned system, wherein the system information includes network information, storage information, file system information and so forth.
- each provisioned system 3 can be monitored, accessed, and/or operated by a user(s) through the web-browser 9 resided, for example, on the console system 1 .
- provisional system 3 is controlled by users through client systems 10 via the control system 2 with proper user authentication.
- Each provisioned system 3 contains service software modules 8 , which is used to communicate across over the Web.
- the service software modules 8 of provisioned system 3 can communicate with the control management software modules 4 of the control management system 2 to carry out tasks for viewing or operating resources of provisioned system 3 .
- the service software 8 can communicate with the web-browser 9 of the client system 10 or console system 1 to transfer data between them or deliver service to them, or to communicate with another provisioned system 3 to send or receive data.
- the service software modules 8 may include special software modules having compatible functionalities of the web-server software 7 of the control system 2 for dedicatedly handling HTTP protocol or other web protocols if there is needs for web-based communication with the client 10 or with the other provisioned systems 3 or with the control system 2 .
- the software modules 8 could be commercially available web server software 7 or any proprietary software.
- the service software modules 8 could be implemented with any suitable programming languages such as C, C++, Java, or JavaScript.
- Net 11 and Net 12 are the network infrastructures that are capable of providing communication links between the control management system 2 , console systems 1 , client systems 10 , and/or provisioned systems 3 .
- the client systems 10 may not be a part of the CCDSVM, but with the permission and authorization, users from the web-browser 9 of the client system 10 can login on the CCDSVM and access the permitted resources of the CCDSVM by following a web URL link of the CCDSVM. While the privileged users can obtain, manage, access, and/or operate system resources resided in the CCDSVM through the WCUWE, regular (non-privileged) users at the client systems 10 may be permitted to access only limited system resources of the CCDSVM.
- the CCDSVM configuration in one embodiment, includes four data flow paths.
- First data path is a communication links between the web browser 9 of the client host 10 (or console host 1 or control management system 2 ) and the web handling software on the control system 2 (such as web-server 7 or console support software 6 ).
- the console support software 6 collects required information from target, for example, provisioned systems 3 and converts them into standard structured information (web-format) for web communication.
- the targeted system could be one of the provisioned systems 3 or the control system 2 .
- the information collected by the console support software 6 of the control system 2 could be the system status, or the storage information, or the network information, or the user authentication profile, or the file system information, or files & folders information resided on the control system 2 , or on any targeted provisioned system 3 .
- the console support software 6 then passes this converted structured information to web server software 7 and further transmits to the web-browser 9 through a communication link of the Net 11 and Net 12 so that the collected information can be displayed and viewed by a conventional web browser 9 , as shown in FIG. 1 .
- the communication protocols used between the web-browser 9 of the client system 10 (or the console system 1 or the control system 2 ) and the web server 7 of the control system 2 could be HTTP, HTTPS (SSL encrypted HTTP protocol) or any suitable web protocols for web communication, which could successfully transmit the data across the web or could be other standard or proprietary IP-based on non-IP-based protocols.
- This data path may be referred to as the console support software 6 transmits data to/from the web-browser 9 .
- the second data path is the data flow through communication links between the control system 2 and provisioned systems 3 .
- Requests targeted to a provisioned system 3 are received at and then passed from the console support software 6 of the control system 2 to the service modules 8 of the provisioned systems 3 through communication link network 12 .
- the service modules 8 of the provisioned system 3 carry out the requested tasks, and then send the response back to the console support software 6 of the control system 2 .
- the implementation of the actual products of this invention on the second data path may use proprietary TCP/UDP/IP based protocols for the communication between the provisioned systems 3 and the control system 2 .
- other standards or proprietary IP-based or any suitable non-IP-based protocol are also possible.
- the communication protocols used between the console support software 6 of the control system 2 and the service modules 8 of the provisioned system 3 can be any suitable IP based or non-IP based protocols, whichever is suitable to transmit data between them.
- the typical data flow through this path could be the boot message, system status, network information, or storage information of the provisioned system 3 as shown in FIG. 1 .
- the third data path is the data flow between the provisioned systems 3 and the client system 10 or the console system 1 via the communication links of the net 11 - 12 .
- the console support software 6 of the control system 2 may, in one embodiment, present a web link, which points to an object on a provisioned system 3 , to a user working at the web-browser 9 of the client system 10 or the console system 1 or the control system 2 .
- the object pointed by the web link on the provisioned system 3 could be a text file, MPEG video, PDF document, MS Power Point, Word documentation, etc. It also could be a link of another web service application program.
- the service modules 8 of the provisioned system 3 also include web server software modules 7 or equivalent one to directly support the web browser 9 as mentioned before.
- the communication protocols with the third path could be web protocols such as HTTP or WAP. Alternatively, the communication protocols can be other standards or proprietary IP-based or non-IP-based protocols. To simplify the discussion, the data transmitted on this path will be mentioned as the service software module 8 that send data to or receive data from the web-browser 9 and/or vice versa.
- the fourth data path is data flow through communication link between a provisioned system 3 and another provisioned system 3 .
- the service modules 8 of one provisioned system 3 can directly transmit data or information to the service modules 8 of another provisioned system 3 via a communication link of the Net 12 without going through the control system 2 .
- the implementation of the actual products of this invention uses a proprietary IP-based protocol for communications between the two provisioned systems 3 .
- the principle of this invention does not rely on or limit to proprietary protocol. It should be noted that other standard or proprietary IP-based or any suitable non-IP-based protocol may also be possible.
- the data and information transmitted through the fourth data path can be various types of data.
- a user at a web-browser 9 on a system may open a file folder on a provisioned system 3 .
- the user can also instruct to transfer a file from a current target provisioned system 3 to another provisioned system 3 by, for example, a mouse click.
- the data file will then be transferred directly between the two provisioned systems 3 without going through the control system 2 .
- FIG. 2A illustrates a variation of the CCDSVM platform for the web based communication in accordance with one embodiment of the present invention.
- the CCDSVM platform illustrated in FIG. 2A is similar to the platform illustrated in FIG. 1 except every provisioned systems 3 includes a web-browser 9 .
- each user of provisioned systems 3 may access, manage their own provisioned system 3 from the web-browser 9 either on their own local provisioned system 3 or on any client system anywhere on the network.
- the user is authorized to access provisioned system 3 locally but not with the CCDSVM.
- the user is then authorized to access the multiple provisioned systems 3 and the control system 2 of the CCSDVM.
- FIG. 2B illustrates another example of a variation of CCDSVM, in which there is no provisioned systems 3 in the CCDSVM.
- the Control system 2 can run on its own and the CCDSVM has degenerated into a single stand-alone system ( FIG. 2B ), and users through web-browser 9 on any client system 3 (or on console system 1 , or on stand-alone control system 2 ) are allowed to access and operate the permitted resource objects and system resources on the stand-alone control system 2 .
- console support software modules 6 of the control system 2 , the provisioned systems 3 , the service software modules 8 of provisioned system 3 , and the web-browser 9 on the control system 2 , the client system 10 , and the console system 1 are referred to the WCUWE of the CCDSVM platform illustrated in FIG. 1 .
- a web-based computer user work/operation environment (“WCUWE”) of CCDSVM is a software infrastructure, shown in FIG. 3 , which provides each permitted user to log on the CCDSVM and further provide each user a private web-browser based operating environment, which is a private work space including the assigned and permitted resources on the control system 2 or on the provisioned system 3 on the network.
- the WCUWE further provides each user from a single web-browser to perform various permitted tasks and operations over various system resources ( FIG. 5 ), further, the tasks can be performed concurrently from a single web-browser.
- the tasks include allowing privileged users to create users, groups, assign users to each group, to assign initial associated system resources to each user or group, and to save the information of created users and groups into a database stored on a storage media of the control system 2 .
- the information needed for creating users or groups include user names, user IDs, assigned security permissions, passwords, access points, group names, group IDs, maximum members in a group, and so forth.
- the tasks also include various system operations such as manage network, storage, file system, folder, files, messages, user security, without limits.
- the database is organized as one or more lists of tables, wherein each of the lists contains information for various resources.
- the resources could be one or multiple users' information, one or multiple systems' information, one or more network cards, and one or more disk drives information.
- the storage media could be internal storage or disk drive of a mentioned system, for example.
- the WCUWE of the CCDSVM includes software modules of present invention.
- the software includes the console support modules 6 of the control system 2 , the service software modules 8 of the provisioned system 3 , the other service software 13 of the console system 1 .
- the current implementation of the WCUWE is based on a proprietary design of this invention. However, the nature and spirit of this invention does not limit to proprietary designed software.
- the WCUWE of the CCDSVM also includes other proprietary software modules or conventional software such as the web-server 7 of the control system 2 , the web-browser 9 of the control system 2 , the client system 10 , and console system 1 .
- the WCUWE of the CCDSVM can be implemented with any suitable or combination of various suitable programming languages such C, C++, Java, JavaScripts, HTML, XML, and so on. To simplify the discussion, the WCUWE will be used to represent software modules in the CCDSVM described above.
- CCDSVM Users of the CCDSVM may be created by the CCDSVM though a given process or any users on the Internet, Intranet, LAN without registering with CCDSVM.
- the WCUWE of the CCDSVM provides user to access various resources and perform various tasks through a preferred interacting model of, for example, via mouse clicking on graphically represented resource objects displayed in the browser 9 .
- the WCUWE is designed to be operated on a CCDSVM platform, and specially is designed to provide dynamic work space ( FIG. 4A ) to each user associated with various CCDSVM.
- the WCUWE further performs tasks of instantly posting or un-posting user's private resources information to peers in a group or to each peer user of the CCDSVM not in a group or not in same group, or to massive public users on the network, wherein the massive public users may do not have accounts with the CCDSVM platform.
- the dynamic work space of the WCUWE is a centrally controlled collection of each group's work space and/or user's work space.
- the console support software 6 of the control system 2 of the CCDSVM will assign each user a private work space and each group a common work space when each user or group account is created by a privileged user after corresponding WCUWE software modules on the control system 2 and provisioned system 3 enter into an operational mode.
- each user is assigned to a specific user security scope and permission.
- An important aspect of the WCUWE of the CCDSVM is that it assigns each user and/or each user-group a working space based on user and group security permission.
- a work space is an organized information structure, which can be saved on storage media of memory or disk drives or both of memory and disk drives by the console support software modules 6 .
- a work space is created during a privileged user performing the asks of creating user or group.
- the work space will be initiated and assigned with resources of the CCDSVM as shown in FIG. 5 .
- Various system resources on either the provisioned system 3 and/or on the control system 2 include respective memory, system-groups, systems in system-group, file system, file folders, files, storage media, network media and so on.
- the common work space 15 shown in FIG. 4A and FIG. 4B , of each group may be initially assigned with information of system resources ( FIG.
- the resources information in the common work space may also be dynamically assigned or allocated by permitted user after creating group account. For example, during an online interactive meeting, a user posts a file to the common work space, so that a new entry of a file node is added to a file and a folder tree area of common work space.
- each group may be assigned to one or multiple users, wherein each user can also be assigned with a private work space 16 of FIG. 4A and FIG. 4C during user account creation time.
- the private work space may also be initially assigned with system resources of the CCDSVM during user account creation time. Alternatively, the private work space can be dynamically assigned with the resources of the CCDSVM after the user account is created.
- a privileged user can dynamically permit or deny a general user to access a list of storage devices.
- the user may see the list of the storage devices from user's web-browser, and at another second, the general user will no longer see the list of the storage devices.
- the user can further take one of the storage devices offline so that the list of the storage devices on the provisioned system 3 will have one less devices to be displayed.
- a privileged user grants a general user to access a file J in a folder N resided on a system M of the CCDSVM, and at another second, the privileged user resets the previously granted permission, therefore, the general user can view and access the file J in the folder N on the system M of the CCDSVM at one time, and a second later, the general user can no longer view and access the file J.
- console support software 6 of control system 2 has achieved this capability.
- each type of resources in the work space is organized as a list of tables and can be stored in storage media in the control system 2 .
- the integrity of security of each group is protected by limiting different resources to different group. As such, each group is authorized to have a limited view over assigned system resources on the provisioned system 3 as well as on the control system 2 .
- the same security integrity at user level can be achieved by assigning different system resources of the provisioned system 3 and/or the control system 2 to different individual user based on assigned security permission. Therefore, each user is authorized to access and view the assigned resources.
- FIG. 4B has shown an example of assigned resources in the user area 17 , message area 18 , and folders and files area 19 , and other area 20 in the common work space 15 of a user group.
- the messages from each user in the common message area 18 , and the information of folders and files in common files and folder area 19 can be shared by all users in the same user group.
- All resources in each common work space of the user group can be selectively displayed in the web-browser 9 of each login user, who belongs to the same user group, wherein the resources accessible via in the group workspace are converted to presentable web-format (web-page) by the console support software 6 of the control system 2 of CCDSVM for displaying.
- FIG. 4C has shown an example of resources in private work space ( 16 ) assigned to a user.
- the private workspace has private message area 21 , private file, folder area 22 , and private network or storage or other information area 23 .
- the assigned resources only can be exclusively viewed and accessed by the designated user unless he/she agrees to share with peer user crossing group boundary or with peer users in a same group.
- the folder (directory) is a data structure which can hold one more files and sub-folders at logical file system level and to be stored at physical level on storage media.
- FIG. 8A has shown an example of displaying an actually implemented portion of web-page encoded with assigned resources in private work space of a user X.
- the web page includes a system-group-A 33 on said network, multiple provisioned systems 3 under the system-group-A, private folders 32 and 34 of the user X resided on a system of the CCDSVM, and files under the folders 32 in the displayed private work space of the user X.
- FIG. 8B has shown another example of displaying an actually implemented portion of a web-page encoded with assigned resources in a private work space of a user Y, which includes control system 2 , private folder and files 35 of the user Y.
- the private work space of the user X and user Y may also include private message area 21 and other resources, which are not displayed in FIG. 8A & FIG. 8B because the WCUWE is designed to dynamically display part of user's private work space whenever there is needs.
- said user X and user Y may be in same user-group such as in said group- 1 , however, each of them could have a significant different scope of the private work space assigned by the console support software 6 of the control system 2 due to each of them is assigned with very different resources on the systems of the CCDSVM depending on each user's role and security permission, which is setup by said privileged user of the CCDSVM through web-based user interface provided by the said console support software 6 .
- FIG. 6C and FIG. 6D are examples of a web-page displayed in said web-browser 9 of the user X and user Y in said user group before an interactive online meeting.
- the user X or user Y or other users (who's web-page/browser did not depicted) in the same user group have entered a group online meeting after each of them logs on the CCDSVM via each browser 9 on any computing system across said network.
- each of the users will get an identical web-page layout provided by the console support software 6 of the control system 2 except with different contents in the displayed private work space section of the web-page due to each user has assigned with different resources.
- the web-page screen layout provided by the console support software modules 6 contains four sections:
- the section- 1 , section- 2 , and section- 3 are all empty due to no one has post any file or message yet.
- the console support software 6 of the control system 2 obtains each login user's portion of assigned folders and files for the online meeting from the stored private file and folder area 22 , illustrated in FIG. 4C , of the private work space 16 of each user in said storage media, and further converts said file or folder information to presentable web-format (web-page) for being displayable in said section- 4 of the web-page in web-browser 9 of each user.
- the choice of total four sections of the web-page layout and the order of each section on the browser screen 9 is irrelevant to this invention since other choices of designing are also possible, and further, this invention does not have limitation on what web-screen layout shall be.
- the information of the file or folder includes the system name where the file or folder resided, the named and path of the file or folder, the owner of file or folder, the time stamps, the size of the file and so on without limitation.
- the console support software modules 6 provide each user to post or un-post files or folders to said section- 3 of displayed group's common documents and contents management section with several steps. First, for example, providing said user X to click on one targeted file “Doc 1 ” 24 or folder at a time in section- 4 of displayed said file and folder management area of the user private work space. Second, select the operation of either post or un-post from an operation menu (see FIG. 9A , FIG. 9B , FIG. 10A and FIG. 10B ). Finally click on the selected operation to submit the task of either post or un-post on the selected file or folder.
- Each user with permission may perform un-post operation if such user has at least a previously posted file or folder, which has already displayed in section- 3 of the common document and content management section of the web-browser 9 of each of the users in the same user-group, see FIG. 6A or FIG. 6B for example.
- the operation menu either can be pop-up menu for folder as shown in FIG. 9A or pop-up menu for file as shown in FIG. 9B , or non-pop-up menu for folder as shown in FIG. 10A or non-pop-up menu for file as shown in FIG. 10B .
- the choice of operation menu is irrelevant to this invention although the actual implementation of this part of invention has used pop-up menu, and as matter of the facts that there is no limitation on how the operation menu is to be designed in this invention.
- the user X can post a file named “Doc 1 ” 24 to said section- 3 of the common document and contents display section displayed in web-browser 9
- the user Y also can post a file named “picture 1 ” 25 to the common document and contents display section displayed in the web-browser 9
- another not depicted user Z posted a file of “project code”.
- the files or folders could be one resided on the control system 2 or on any provisioned system 3 of the CCDSVM.
- the console support software 6 of the control system 2 also provides each user to post message to massive users in same group from said section- 1 of the private user message input section after typing a message and click on the “send” button.
- the user X posted a message of “Msg 1 of user X” 26 .
- the user Y also posted a message of “Msg 2 of user Y” 27 .
- another non depicted user Z posted a message of “Msg 3 of user Z”. As a result, all of three messages were displayed in the same section- 2 of each user's browser.
- the console support software 6 also provides permitted user to un-post the previously posted message.
- the console support software 6 provides the permitted user X to select a previously posted “Msg 2 of user Y” 27 from said section- 2 of the common message display section of said web-browser 9 of user X, and select un-post operation from said operation menu and submit the selected un-post task.
- the action of the “post” information such as posting information of files or folders or messages or other resources is equivalent to the action of “share” the information.
- the action of “un-post” information is equivalent to the action of “un-share” the previously posted or shared information, in other words, “remove” the previously posted or shared information.
- the console support software 6 of the control system 2 After user transmitting information data of the post or un-post task from the web-browser 9 of the console system 1 or client system 10 or control system 2 to the control system 2 , the console support software 6 of the control system 2 obtains and parses the data to determine: who is the original user initiating the task; what type of task; what type of associated resources for task to work on; who is the targeted user; and what is the time stamp, and may also include other information without limitation.
- the console support software 6 further determines that if the task is to post a file or folder from the original user, the console support software 6 picks up the corresponding file or folder information from file and folder area 22 of FIG. 4C of the private work space of the original user and deposits such information to the file and folder area 19 of FIG. 4B of the common work space of the group in this case.
- the console support software 6 search for the corresponding information of the file or folder in the file folder area of the common work space of the group and further remove the entry of matched information from the common work space of the group after it is found.
- the parsed message will be stored in the private message area 21 , illustrated in FIG. 4C , of the original user's private work space 16 , illustrated in FIGS. A and 4 C, and also is copied to the message area 18 , illustrated in FIG. 4B , of the common work space 15 , illustrated in FIGS. 4A and 4B of the user-group by the console support software 6 .
- the console support software 6 searches for a matching message in the common message area 18 , illustrated in FIG. 4B , of the common work space of the user group and remove such message entry if it is found based on the message and original user's identification and other associated information such as time stamp, security permission and so on without limitation.
- a lock protection mechanism is deployed whenever a message or information of a file or folder is written, stored, or deposited to either said private space or said common work space that are resided on disk drives or other storage media.
- the lock protection is assume to be a default action without further mentioning whenever a write/store/deposit action take place.
- each task of posting file, folder, and message as well as the task of un-posting the previously posted file or folder, or message performed by each of the users in each of the groups of this invention can be executed by the console support software 6 instantly with memory speed.
- FIG. 6A and FIG. 6B illustrate that after the console support software 6 of the control system 2 successfully executing the tasks for each user in each group, any user in the user group can get a fresh view of the section- 2 of the common messages display area of the user group, and a fresh view of the section- 3 of the common documents & contents display area of the user group in each user's web-browser 9 on the client system 10 or on the control system 2 or on the console system 1 .
- the console support software 6 has encoded a run-time script in said web-page, which is encoded in the presentable web-format and to be displayed in the web-browser 9 after each user log on to the CCDSVM and started group online meeting.
- the run-time script will automatically and periodically perform tasks of refreshing said section- 2 and section- 3 of the web browser 9 screen window.
- the frequency of the periodic refreshing can be adjusted by the console support software 6 of the CCDSVM depending on the needs of the meeting, which typically can range from 1 to 3 seconds and there is no limitation on this aspect.
- said run-time script provided by the WCUWE is a JavaScript, however, other type of programming scripts or methods are also possible and there is no limitation on what kind of run-time program shall be used in this invention.
- the console support software 6 provides each user the choices of either automatic or manual refreshing their web-browser 9 .
- a request of updating such screen window will be generated and sent from the web-browser 9 to the control system 2 .
- the console support software 6 obtains and parses each request to determine what user group, and which part of the common work space of the user group need to be updated.
- the console support software 6 of the control system 2 retrieves the updated information of resources and objectives from said common work space 15 , illustrated in FIGS. 4A and 4B , of the user group, which includes recent posted files, folders, or messages from each user in the user group, and also includes the updated list of files and folders or messages after un-post one or more files or folders, or messages by each of the users in the user group. Finally, the console support software 6 of the control system 2 converts retrieved information of the resources and objects to the presentable web-format (web-page).
- the converted information is displayed in the section- 2 of the group common message display area of the web-page in the web browser 9 . If the request is to update the group common files and folders display area, the converted information is displayed in the section- 3 of the web page in the web-browser 9 . Therefore, after refreshing each of the sections in the web-browser 9 , each user can have an identical view of all posted files and folders from the section- 3 of group common document display area in the browser 9 , and can have an identical view of all messages from the section- 2 of the group common message display area in the web-browser 9 that are posted by all other users in a same group. Meanwhile the console support software 6 still allow each user kept most of the resources and objects in their own private work space un-exposed to other users in the same group during the online interactive meeting.
- the User X at his/her web-browser 9 can see “picture 1 ” 25 posted by the user Y in the group common file and folder display area but not other information in the user Y's private work space area, and also see the “Doc 1 ” self posted by the user X.
- the user Y at his/her web-browser 9 can see “Doc 1 ” 24 posted by the user X in the group common file and folder display area but not other information in user X's private file and folder display area, and also can see the “picture 1 ” self posted by the user Y.
- a difference between a conventional Internet group communication model and the group based communication model described in the present invention is that the console support software modules 6 of the control system 2 provide each user to control post or un-post said resources from user's own private work space while the conventional Internet communication model are not capable of performing posting/un-posting task. Also, for example, un-posting a previous posted folder with the WCUWE of the CCDSVM does not require to delete the folder materials in the user's private work space while the delete operation with existing Internet group communication model will completely delete the file or folder.
- the dynamic work space combines with security protection for the information has greatly improved the security, flexibility and efficiency of online meeting provided by the WCUWE of the CCDSVM to each users and groups.
- each user in a user-group can click on the link to download the files posted from the private file and folder area 22 of the private work space 16 of each of the users in the user group from a system of the CCDSVM where the file is located.
- the user X can download said “picture 1 ”, which may reside either on the control system 2 or any provisioned system 3 , posted by the user Y, and the user Y can download the “Doc 1 ”, which may also reside either on the control system 2 or the provisioned system 3 , posted by the user X at same time.
- the console support software modules 6 of the control system 2 also provide each user to perform many other tasks during online meeting through said operation menu such as upload, rename, delete, copy/paste and so on without limitation.
- the upload operation allows each user to dynamically upload files one a time through the web-browser 9 from a local storage of the client system 10 or console system 1 to a location provided by the user's private work space on the control system 2 during the meeting, and further to be posted to the common space of a user group that each user belong to.
- the mouse click driven copy/past operation allows files and folders from permitted folders of the permitted provisioned system 3 to be dynamically physically copied to a location provided by users' private work spaces 16 on the control system 2 , and the information of said files and folders could further to be displayed via said web-page in the browser 9 of each user and further to be posted to common work space of the user group in which each user belong to in addition to direct posting these file or folders without physical copying over.
- operations provided by the console support software 6 of the control system 2 have added efficiency to posting or un-posting files and folders for each user depending on the real needs.
- console support software 6 provides each user of each user group capability of saving the posted messages in the common message area 18 of the common work space 15 of each group into a file in the common file & folder area of the common work space 15 of each group. Further, the saved file can be viewed, downloaded by each user in each user group via the same method of posting. Besides whenever there is a need, the console support software modules 6 provide users to reset message area to be empty by removing all message entries in the message area 18 of said user-group's common work space 15 .
- a important fact is that the designed WCUWE of the CCDSVM has provided concurrent users each from a single web browser anywhere on the network to securely perform permitted various tasks, which could be run concurrent within the single web-browser. Because the console support software 6 of the control system 2 let each users have exclusive view for resource objects in each one's private work space 16 and in the common work space 15 of a user group in which each user belong to, and let each user to manage resource objects via each one's own private space, the multiple users in multiple user groups can concurrently post or un-post files, folders, messages, or other resource objects without interfere users in other user-groups. Thus, the work spaces of each user and each group are well protected.
- the console support software modules 6 of the control system 2 provide privileged users to perform tasks of creating multiple users and user groups on the control system, and each group can be assigned with variable size of users for online interactive meeting.
- the total number of the users and the total number of the user groups, and maximum number of the users per groups of the WCUWE of the CCDSVM can support is an implementation issue and depends on the capacity of the control system 2 .
- the WCUWE of the CCDSVM and the CCDSVM has been designed with unlimited scalability for both users and provisioned systems 3 .
- the spirit of this invention does not limit to with the boundary issues of the WCUWE and the CCDSVM.
- FIG. 8A and FIG. 8B illustrate that each user X and user Y has a different private work space 18 than others, and each of the users has assigned with different system resources.
- the console support software 6 of the control system 2 also can provide user X and user Y to have peer-to-peer instantly posting files or folders one a time to each other, or instantly un-post the previous posted files and folders through similar steps for posting or un-posting materials in the group online meeting model as bellow:
- the user X can follow said steps 1 ) to 3 ) described above to post his “folder 2 ” 32 in the displayed files and folders area 22 of private working space 16 of the user X's web-browser 9 to the user Y.
- FIG. 8B upon the user Y refreshing his/her web-browser 9 on a computing system by walking through any system node or folder node in the displayed resource tree, the user Y will see the “folder 2 ” 32 in his/her displayed private file and folder tree of the private work space 16 of the user Y shown in FIG. 8C .
- a request of refreshing web-page screen is generated and the request is handled as described previously.
- the WCUWE of the CCDSVM also provides each user to post message to each other user in non-group based 1-to-1 message model.
- FIG. 7A and FIG. 7B have shown an example of a user X and a user Y, who may not be in a same user group, however, the console support software modules 6 of the control system 2 provide each user to share and exchange messages with each other from a three-section web-page displayed in the browser 9 .
- the three-section of the web page displayed in the browser 9 allows each of the users to apply the same steps of non-group based 1-to-1 posting files and folders or un-posting the previously posted files or folders as described previously for posting or un-posting messages.
- the three-section included in FIGS. 7A and 7B just for a demonstration of how flexible of this invention is to display information under private work space of each user. Further, the number of sections in the screen layout and the order of each section in web-page display really is not a limitation to this invention.
- the section- 1 is a user message input area together with an additional input field of “To who” due to unlike in group online meeting, the console support software modules 9 have no knowledge of who is the targeted user in this case.
- each user can posting a message by following the similar steps as previously discussed . . . . Nevertheless, unlike with group meeting messaging model, after obtaining and parsing information of the messages from each user, the console support software modules 6 of the control system 2 will deposit the message to both targeted user and the original user's message areas 21 of the private work space 16 . Further, with same said steps of displaying messages in each user's browser each user can view both own message and messages from peer user in section- 2 of the browser 9 .
- the user X input a message of “msg 4 of user X” 30 and type “user Y” in input field of “To who”, and then submit the message by clicking on “Send” button.
- the user Y input a message of “Msg 3 of user Y” 31 , and type “user X” in input field of “To who”, and then submit the message.
- the user X will see the message 30 he/she sent and the message 31 from the user Y. Also the user Y will see both messages 30 and 31 at same time.
- the WCUWE of the CCDSVM has provided a security hierarchy for members of any team to work together cross multiple locations.
- the console support software modules 6 of the control system 2 can specially permit only a team leader with capability of posting folder or file to be viewed, shared, and accessed by all team members in a group environment or by an individual member in a non-group environment.
- the console support software modules 6 also provide each team member to post or un-post his/her file or folders to only a specific peer user one a time in non-group-meeting based environment. Again the said files or folders could be resided on the control system 2 or on any provisioned system 3 .
- the console support software modules 6 of the control system 2 provides a web-page to massive online users, who do not have to login the CCDSVM.
- the web-page in one embodiment, could be layout with two major sections with section- 1 to display messages in the sharable message area 18 in a designated user-group's common work space 15 while the section- 2 to display file or folders in the sharable file or folder area 19 in said designated user-group's common work space 15 .
- each user For users belong to the same designated user group, each user from a web-browser on any system across the network to log in the CCDSVM and get the group online meeting web-page as shown in FIG. 6A for the user X and in FIG. 6B for the user Y. Further as described previously, each user in the user group can instantly post message to the message area 18 of the designated user group's common work space 15 , or post a file or folder to the sharable file and folder area 19 in the designated user group's common work space 15 .
- each user in the user group can instantly un-post the previously posted files or folders by removing the corresponding file or folder entry in the file and folder area 19 of the designated user-group's common work space 15 , or un-post the previously posted messages from the common message area 18 of the common work space 15 of the user-group.
- the web-page in the browser 9 for massive online users can be dynamically updated, displayed, and viewed by the massive users anywhere through their own browser 9 accordingly with the same pace as dynamically displaying of the section- 2 and section- 3 of web-page in the browser 9 that has been shown in FIG. 6A and FIG. 6B .
- the two sections of the web-page display layout is a preferred example and it does not limit this invention because with this invention other layout is also possible, for example, it may be desired to have web-page layout only contains one section, which is either for messages or file or folder's display depending on the application's need.
- FIG. 8A , FIG. 8B , and FIG. 8C with non-group based peer-to-peer post or un-post files and folders, people may often do not remember how many files and folders have been posted for sharing.
- the user X can select “folder 2 ” 32 , select a post operation from an operation menu, and provide target “user Y” to share “folder 2 ” 32 .
- the user Y can see “Folder 2 ” 32 of the user X displayed in the web-browser 9 of the user Y after the user X post “Folder 2 ” 32 .
- the console support software modules 6 of the control system 2 can provide each user, such the user X, a sharing list of how many files or folders have been posted for sharing and shared to whom.
- a personal share list is displayed in the user X's web-browser 9 .
- an entry of posted “Folder 2 ” is listed at bottom of the sharing list and it is posted/shared to the user Y because the user X has posted the “Folder 2 ” 32 depicted in FIG. 8A .
- the console support software modules 6 provide each user to selectively un-post a previously posted files and folders via clicking on a “delete shared?” operating option in an operation menu for an corresponding entry in the sharing list in a web-page and further to submit an un-post task. For example, the user X can click on “delete share?” to un-post a “Folder 2 ”.
- console support software modules 6 of the control system 2 will execute the un-post task.
- the console support software modules 6 of the control system 2 will execute the un-post task.
- the console support software modules 6 of the control system 2 will execute the un-post task.
- the console support software modules 6 of the control system 2 will execute the un-post task.
- the console support software modules 6 of the control system 2 will execute the un-post task.
- the user Y upon refreshing the targeted user Y's web-browser 9 , in stead of seeing “Folder 2 ” 32 as shown in FIG. 8C , the user Y will see an updated web-page as shown in FIG. 8B such that the “Folder 2 ” 32 has been removed.
- the console support software modules 6 of the control system 2 may also provide a privileged user to un-post the previously posted files or files in the displayed file and folder section of a web-page in a browser 9 .
- the console support software modules 6 will provide an operation menu to associate with the displayed files and folders in the display section, further to allow privileged user to perform similar un-post operation.
- the console support software modules 6 After receiving the un-post operation, the console support software modules 6 will perform similar searching for selected file or folder in the group file and folder area 19 , illustrated in FIG. 4B , of the group common work space 15 of the user group, if there is match the corresponding entry will be deleted. Also, the file and folder section of the web-page in the web-browser 9 can be refreshed accordingly as described before.
- FIG. 12 illustrates an example of a computer system 1200 , which is an exemplary client system 10 , provisioned system 3 , control system 2 , or console system 1 in which the features of the present invention may be implemented.
- Process of the web based information exchange can be implemented in any processor-based computer system, such as a PC, a workstation, or a mainframe computer. It will be apparent to those of ordinary skill in the art that other alternative computer system architectures may also be employed.
- computer system 200 includes a processing unit 201 , an interface bus 211 , and an input/output (“I/O”) unit 220 .
- Processing unit 201 includes a processor 202 , a main memory 204 , a system bus 211 , a static memory device 206 , a bus control unit 205 , a mass storage memory 207 , and a web information exchange module 230 .
- Bus 211 is used to transmit information between various components and processor 202 for data processing.
- Processor 202 may be any of a wide variety of general-purpose processors or microprocessors such as PentiumTM microprocessor, MotorolaTM 68040, or Power PCTM microprocessor.
- Main memory 204 which may include multiple levels of cache memories, stores frequently used data and instructions.
- Main memory 204 may be RAM (random access memory), MRAM (magnetic RAM), or flash memory.
- Static memory 206 may be a ROM (read-only memory), which is coupled to bus 211 , for storing static information and/or instructions.
- Bus control unit 205 is coupled to buses 211 - 212 and controls which component, such as main memory 204 or processor 202 , can use the bus.
- Bus control unit 205 manages the communications between bus 211 and bus 212 .
- Mass storage memory 207 which may be a magnetic disk, an optical disk, hard disk drive, floppy disk, CD-ROM, and/or flash memories for storing large amounts of data.
- Web based information exchange 230 in one embodiment, is a network control component for facilitating information exchange over the Web. It should be noted that web based information exchange 230 could be software or hardware or a combination of software and hardware components.
- I/O unit 220 in one embodiment, includes a display 221 , keyboard 222 , cursor control device 223 , and communication device 225 .
- Display device 221 may be a liquid crystal device, cathode ray tube (“CRT”), touch-screen display, or other suitable display device.
- Display 221 projects or displays images of a graphical planning board.
- Keyboard 222 may be a conventional alphanumeric input device for communicating information between computer system 200 and computer operator(s).
- cursor control device 223 is another type of user input device.
- Communication device 225 is coupled to bus 211 for accessing information from remote computers or servers, such as server or other computers, through network 11 or 12 as illustrated in FIG. 1 .
- Communication device 225 may include a modem or a network interface device, or other similar devices that facilitate communication between computer 200 and the network.
- Computer system 200 may be coupled to a number of servers via a network infrastructure such as the infrastructure illustrated in FIG. 1 .
Abstract
Security is an important area for enterprise network management, the posting and removing technology disclosed in present invention can provide a much dynamic and flexible security control for the enterprise network management due to the posting operation becomes a means for instantly granting an administrator personal to perform respective administration jobs, and the removing operation becomes a means for instantly resetting the previously granted privileges to perform certain administration jobs for the enterprise network.
Description
- This application is a divisional application for U.S. patent application Ser. No. 11/732,496 filed on Apr. 2, 2007 in the name of same inventor, which is incorporated herein by reference in its entirety. The application Ser. No. 11/732,496 has claimed the benefit of priority based upon U.S. Provisional Patent Application Ser. No. 60/787,653, filed on Mar. 31, 2006 in the name of the same inventor and entitled “Instant Post Document and Messages to Users from Central Controlled Distributed Scalable Virtual Machine The application Ser. No. 11/732,496 is also a continuation-in-part of U.S. patent application Ser. No. 10/713,904, filed on Aug. 6, 2002 in the name of the same inventor and entitled “Concurrent Web Based Multi-Task Support for Control Management System,” which is converted from the U.S. provisional application No. 60/401,238. The application Ser. No. 11/732,496 is also a continuation-in-part of U.S. patent application Ser. No. 10/713,905, filed on Aug. 12, 2002 in the name of the same inventor and entitled “Method and Apparatus for Web-based Storage On Demand.” which is converted from the U.S. provisional application Ser. No. 60/402,626. Wherein, the patent application Ser. No. 10/713,904 now is a U.S. Pat. No. 7,418,702. The patent application Ser. No. 10/713,905 now is a U.S. Pat. No. 7,373,990. All of the above prior applications are incorporated herein by reference in each one's entirety.
- The present invention generally relates to communications network. More specifically, the present invention relates to web based communications system.
- With increasing popularity of using the Internet and World Wide Web (“the Web”) for the rapidly changing digital world, individuals as well as enterprises, exchange (or swap) large volumes of information through the Web. The demand for larger and faster information exchange has increasingly grown in recent years. For example, various business meetings and conferences are conducted over the Web with attendees scattered around the world. To enhance the communication between the meeting attendees, not only voice (and/or image) information is important, but also information exchange can be critical.
- Fast, volume, and secure information exchange is important in enhancing the efficiency of a communications network. A problem associated with a conventional network is limited size and speed. For example, a typical email system limits the size of each email, such as 10 megabytes, thereby a reasonable speed of delivery of such email can be achieved. Another problem associated with a conventional network is that various hosts require software installation before a user can use their platform. For example, Skype™ requires users to install its proprietary software on the user's systems before it allows them to use its platform.
- Accordingly, there is a need in the art to provide a faster, more secure, volume information exchange over the Web.
- The present invention relates to a method and apparatus for information exchange over a web environment.
- With the development of central controlled distributed scalable virtual machine (CCDSVM) and the web-based computer user working (operating) environment (WCUWE), the problems mentioned in the previous section can easily be solved by introducing a “dynamic work space” technology of this invention within the frameworks of the CCDSVM and the WCUWE.
- With the dynamic work space technology, one or more login users of the CCDSVM, each using a browser of any system and from anywhere, can instantly perform tasks. For example, each user can post or un-post messages, files, folders, or other resources resided on systems of the CCDSVM with group-based model or non-group 1-to-1 personal based model for one or more audiences on the network to access. This technology will also achieve larger scales of secure information exchange without size limitation and installation of special software.
- The implementation of this invention has provided users with a web-browser based, 1-click system that is capable of securing exchanges of messages, files, folders, or other resource information resided on the systems crossing network domains without size limitation.
- Additional features and benefits of the present invention will become apparent from the detailed description, figures, and claims set forth below.
- The present invention will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the invention, which, however, should not be taken to limit the invention to the specific embodiments, but are for explanation and understanding only.
-
FIG. 1 is a block diagram illustrating a layout of a CCDSVM with a central control management system, multiple provisioned systems, client systems, and console systems in accordance with one embodiment of the present invention; -
FIG. 2A is a block diagram illustrating a layout of a CCDSVM with which users from their web-browser of provisioned system can communicate with each other in accordance with another embodiment of the present invention; -
FIG. 2B is a block diagram illustrating a layout of a CCSDVM with only a single control management system to be accessed by massive client systems in accordance with another embodiment of the present invention; -
FIG. 3 is a block diagram illustrating an example of a software for a CCDSVM in accordance with one embodiment of the present invention; -
FIG. 4A illustrates an example of a dynamic work space in accordance with one embodiment of the present invention; -
FIG. 4B illustrates an example of resources which may be assigned to a user-group common work space in accordance with one embodiment of the present invention; -
FIG. 4C illustrates an example of a user private work space and possible assigned system resources in accordance with one embodiment of the present invention; -
FIG. 5 illustrates an example of resource objects resided on the systems in accordance with one embodiment of the present invention; -
FIG. 6A illustrates an example of displaying a web-page with 4 sections in a web-browser of user X in a user-group during an interactive online meeting in accordance with one embodiment of the present invention; -
FIG. 6B illustrates an example of displaying a web-page with 4 sections in a web-browser of a user Y in a user group during an interactive online meeting in accordance with another embodiment of the present invention; -
FIG. 6C illustrates an example of displaying a web-page with 4 sections in a web-browser of a user X in the user group before the interactive online meeting in accordance with another embodiment of the present invention; -
FIG. 6D illustrates an example of displaying a web-page with 4 sections in the web-browser of the user Y in the user group before the interactive online meeting in accordance with another embodiment of the present invention; -
FIG. 6E illustrates an example of a displayed web-page that each massive online user can access and view from each of their browsers without login to the CCDSVM during said user X and user Y in the user group online meeting in accordance with another embodiment of the present invention; -
FIG. 7A illustrates one-to-one, peer-to-peer post or un-post messages and folders of the user X in accordance with one embodiment of the present invention; -
FIG. 7B illustrates one-to-one, peer-to-peer post or un-post messages and folders of the user Y in accordance with another embodiment of the present invention; -
FIG. 8A is an example of a web-based graphic presentation of the assigned resources in a user X's private work space in accordance with one embodiment of the present invention; -
FIG. 8B is an example of a web-based graphic presentation of assigned resources in the private work space of a user Y in accordance with another embodiment of the present invention; -
FIG. 8C is an example of a web-based graphic presentation of the user Y's private work space after the user X dynamically posted and shared “folder 2” in the user X's private space in accordance with another embodiment of the present invention; -
FIG. 9A is an example of a pop-up menu for folders in accordance with one embodiment of the present invention; -
FIG. 9B is an example of a pop-up menu for files in accordance with another embodiment of the present invention; -
FIG. 10A is an example of a non pop-up operation menu for folders in accordance with one embodiment of the present invention; -
FIG. 10B is an example of a non pop-up operation menu for files in accordance with another embodiment of the present invention; -
FIG. 11 is an example of a center view of a list of posted files or folders in a file & folder area of a private work space of a user X in accordance with one embodiment of the present invention. - Embodiments of the present invention are described herein in the context of a method, system and apparatus for providing a web based communications network with fast, volume, and secure information exchange. Those of ordinary skill in the art will realize that the following detailed description of the present invention is illustrative only and is not intended to be in any way of limiting. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure. Reference will now be made in detail to implementations of the present invention as illustrated in the accompanying drawings. The same reference indicators will be used throughout the drawings and the following detailed description to refer to the same or like parts.
- In the interest of clarity, not all of the routine features of the implementations described herein are shown and described. It will, of course, be appreciated that in the development of any such actual implementation, numerous implementation-specific decisions must be made in order to achieve the developer's specific goals, such as compliance with application- and business-related constraints, and that these specific goals will vary from one implementation to another and from one developer to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking of engineering for those of ordinary skill in the art having the benefit of this disclosure.
- In accordance with the present invention, the components, process steps, and/or data structures described herein may be implemented using various types of operating systems, computing platforms, computer programs, and/or general purpose machines. In addition, those of ordinary skill in the art will recognize that devices of a less general purpose nature, such as hardwired devices, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or the like, may also be used without departing from the scope and spirit of the inventive concepts disclosed herein. Where a method comprising a series of process steps is implemented by a computer or a machine and those process steps can be stored as a series of instructions readable by the machine, they may be stored on a tangible medium such as a computer memory device (e.g., ROM (Read Only Memory), PROM (Programmable Read Only Memory), EEPROM (Electrically Eraseable Programmable Read Only Memory), FLASH Memory, Jump Drive, and the like), magnetic storage medium (e.g., tape, magnetic disk drive, and the like), optical storage medium (e.g., CD-ROM, DVD-ROM, paper card and paper tape, and the like) and other known types of program memory.
- Those of ordinary skill in the art will realize that the following detailed description of the present invention is illustrative only and is not intended to be in any way limiting. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure. It will be apparent to one skilled in the art that these specific details may not be required to practice to present invention. In other instances, well-known circuits and devices are shown in block diagram form to avoid obscuring the present invention. In the following description of the embodiments, substantially the same parts are denoted by the same reference numerals.
- While particular embodiments of the present invention have been shown and described, it will now be apparent to those skilled in the art having the benefit of this disclosure that many more modifications than mentioned above are possible without departing from the inventive concepts disclosed herein. Therefore, the appended claims are intended to encompass within their scope all such modifications as are within the spirit and scope of this invention.
- The present invention can be implemented by a web based system operated in a network infrastructure, such as a central controlled distributed scalable virtual machine (“CCDSVM”).
FIG. 1 illustrates a CCDSVM in accordance with an embodiment of the present invention. A CCDSVM includes a group of provisionedsystems 3, acontrol management system 2,console systems 1, andclient systems 10. The control management system (“control system”) 2 is configured to control a group of systems (“provisioned system”) 3. the console systems (“console systems”) 2 provide management for the CCDSVM while the client systems 10 (“client systems”) initiate accessing the provisionedsystems 3 via a web-browser over a network infrastructure, such as the Intranet, an Internet, and/or a LAN. - The network infrastructure (“network”) includes all necessary hardware and software that facilitate various users from different geographic locations to communicate through the Internet, an Intranet, and/or a LAN. The hardware of the network includes wired network connection media, wireless connecting media, circuitry components, and communication equipments. The network connection media includes various cables such as Ethernet and/or optical fiber. The wireless connecting media is capable of establishing wireless communication links through air. The circuitry components include processor, data bus, memory devices, and/or circuit board. The communication equipments, such as switches, routers, gateways, and/or adapters, are used to provide a communications network. It should be noted that there are other possible elements of communication equipment that may be needed to form a communication link, but they are not necessary to understand the present invention.
- The software infrastructure includes Internet Protocol (“IP”) addresses and system name identification software such as Domain Name System (“DNS”), firewall software, IP gateway set-up software, IP broadcast, and so forth. The communication protocols over the network could be IP-based standard or non-standard proprietary protocols such as Hypertext Transfer Protocol (“HTTP”) over Transmission Control Protocol/Internet Protocol (“TCP/IP”) or Simple Object Access Protocol (“SOAP”) over TCP/IP. It should be further noted that some IP based protocols are proprietary protocols and some are non-IP based protocols.
- A web-browser is an application program that allows a user to access information over the Web, such as Windows Internet Explorer (“IE”), FireFox, Netscape, and/or Mozillar. A web-browser could also be any proprietary software, which uses web-protocols such as HTTP, WAP, SOAP for communication over the network. The web-browser can be implemented with any suitable programming languages such as C, C++, Java, or XML, or a combination of the suitable languages.
- A web page, on the other hand, is comprised with displayable information that is accessible through the web-browser. The web page may be hosted by a web server via a web server software and can be transmitted (or retrieved) by a web-browser.
- The provisioned
systems 3,client systems 10,console systems 1, andcontrol management system 2 are computational systems that could be server system, desktop or laptop computer, handheld devices such as PDA, wireless phone, and so forth. Each computational system include CPUs, storage devices, and memory controller. The storage devices include internal memory such as read-only memory (“ROM”) and/or random access memory (“RAM”). The storage devices may further include external storage devices such as magnetic disks or tapes, which include redundant array of redundant inexpensive disk drives (“RAID”), just bunch of disk drive (“JBOD”), and memory stick. The associated storage controller can be Integrated Drive Electronics (“IDE”), Small Computer System Interface (“SCSI”), Fiber optical controller, or a combination of above-mentioned devices. - The computational systems also include non-embedded or real-time embedded operating system (“OS”), which could be Linux, or Windows, Unix, or proprietary OS. It should be noted that the present invention may include multiple control systems at different layers of system configuration topology wherein each of the control systems is capable of communicating with each other through a network. The control systems at middle layers play dual roles as both control system and provisioned system in the system configuration topology.
-
FIG. 1 illustrates a CCDSVM platform withmultiple clients 10 in accordance with one embodiment of the present invention. The CCDSVM includes theconsole systems 1, acontrol management system 2, the provisionedsystems 3, and networks 11-12, wherein networks 11-12 are used inter-connecting with all systems of the CCDSVM and theclient systems 10. - The
console system 1 is a computational system having a web-browser or web-console 9 wherein the web-browser is used by privileged users for accessing the CCDSVM platform. Theweb browser 9, which could be resided on any mentioned systems, permits a user to access information from the CCDSVM by following a web URL link. For example, a privileged user enters a URL of “https://69.107.28.123/stt/sttwebos” into an URL address input area of theweb browser 9 and once the link based on the entered URL is established, the user can obtain information hosted by the web-based computer user work/operation environment (“WCUWE”) of the CCDSCM. Theconsole system 1, in one embodiment, further includessoftware modules 13, wherein thesoftware modules 13 may be used to facilitate communication between theconsole system 1 the andcontrol management system 2. - The
control system 2, in one embodiment, is a server system, a desktop or a laptop computer with the memory and storage capabilities. Thecontrol system 2 includes web server software 7 and console supportingsoftware 6. Theconsole supporting software 6 includes web serverinterface software modules 5 and controlmanagement software modules 4. Thecontrol management system 2 may also have a native web-browser 9 used as a web-console 9 of thecontrol system 2. The web server software 7 sends/receives data to/from the web-console 9 of theconsole system 1 or theclient system 10 or thecontrol system 2 itself. The web server software 7 is configured to provide secure sockets layer (“SSL”) encryption to encrypting the data before transmission to enhance the security. The web server software 7 could be commercially available software such as Apache™ from open source, or IIS from Microsoft or a proprietary software. The web server software modules 7 and consolesupport software modules 6 can be implemented by any suitable or a combination of any suitable programming languages such as C, C++, Java, JavaScript, HTML, or XML. - The
console supporting software 6 communicates with theservice software modules 8 of the provisionedsystems 3. Theweb server interface 5 of theconsole support software 6 is capable of providing special functions that are otherwise performed by the web server 7. If there is no any provisionedsystems 3 coupled to the CCDSVM platform, thecontrol management system 2, in one embodiment, is reconfigured to continue monitoring systems over the network and the CCDSVM platform is also reconfigured to become a single stand-alone system, as shown inFIG. 2B , therefore, users can access and/or obtain resource objects or system resources via the web-browser 9, which can be resided at on anyclient system 3 orconsole system 1. - The provisioned
system 3 contains suitable operating system (“OS”). The provisionedsystems 3 can be automatically provisioned by thecontrol management system 2 through an automatic system service pool construction protocol. Provision process, also known as pooling process, is a method allowing thecontrol system 2 to control one or more network systems by reconfiguring the network systems. For example, when a provisioned system boots up via the automatic system service pool construction communication protocol, thecontrol system 2 automatically obtains provisioned system's name, IP address, and system information from the provisioned system, wherein the system information includes network information, storage information, file system information and so forth. Thus, each provisionedsystem 3 can be monitored, accessed, and/or operated by a user(s) through the web-browser 9 resided, for example, on theconsole system 1. In an alternative embodiment,provisional system 3 is controlled by users throughclient systems 10 via thecontrol system 2 with proper user authentication. Each provisionedsystem 3 containsservice software modules 8, which is used to communicate across over the Web. For example, theservice software modules 8 of provisionedsystem 3 can communicate with the controlmanagement software modules 4 of thecontrol management system 2 to carry out tasks for viewing or operating resources of provisionedsystem 3. Theservice software 8 can communicate with the web-browser 9 of theclient system 10 orconsole system 1 to transfer data between them or deliver service to them, or to communicate with another provisionedsystem 3 to send or receive data. - The
service software modules 8 may include special software modules having compatible functionalities of the web-server software 7 of thecontrol system 2 for dedicatedly handling HTTP protocol or other web protocols if there is needs for web-based communication with theclient 10 or with the other provisionedsystems 3 or with thecontrol system 2. Thesoftware modules 8 could be commercially available web server software 7 or any proprietary software. Theservice software modules 8 could be implemented with any suitable programming languages such as C, C++, Java, or JavaScript. - Net 11 and
Net 12 are the network infrastructures that are capable of providing communication links between thecontrol management system 2,console systems 1,client systems 10, and/or provisionedsystems 3. - The
client systems 10 may not be a part of the CCDSVM, but with the permission and authorization, users from the web-browser 9 of theclient system 10 can login on the CCDSVM and access the permitted resources of the CCDSVM by following a web URL link of the CCDSVM. While the privileged users can obtain, manage, access, and/or operate system resources resided in the CCDSVM through the WCUWE, regular (non-privileged) users at theclient systems 10 may be permitted to access only limited system resources of the CCDSVM. - The CCDSVM configuration, in one embodiment, includes four data flow paths. First data path is a communication links between the
web browser 9 of the client host 10 (orconsole host 1 or control management system 2) and the web handling software on the control system 2 (such as web-server 7 or console support software 6). With this path of data flow, whenever a user sends a request from the web-browser 9 to the web-server 7 or theconsole support software 6, theconsole support software 6 collects required information from target, for example, provisionedsystems 3 and converts them into standard structured information (web-format) for web communication. The targeted system could be one of the provisionedsystems 3 or thecontrol system 2. The information collected by theconsole support software 6 of thecontrol system 2 could be the system status, or the storage information, or the network information, or the user authentication profile, or the file system information, or files & folders information resided on thecontrol system 2, or on any targeted provisionedsystem 3. Theconsole support software 6 then passes this converted structured information to web server software 7 and further transmits to the web-browser 9 through a communication link of the Net 11 andNet 12 so that the collected information can be displayed and viewed by aconventional web browser 9, as shown inFIG. 1 . - The communication protocols used between the web-
browser 9 of the client system 10 (or theconsole system 1 or the control system 2) and the web server 7 of thecontrol system 2 could be HTTP, HTTPS (SSL encrypted HTTP protocol) or any suitable web protocols for web communication, which could successfully transmit the data across the web or could be other standard or proprietary IP-based on non-IP-based protocols. This data path may be referred to as theconsole support software 6 transmits data to/from the web-browser 9. - The second data path is the data flow through communication links between the
control system 2 and provisionedsystems 3. Requests targeted to a provisionedsystem 3 are received at and then passed from theconsole support software 6 of thecontrol system 2 to theservice modules 8 of the provisionedsystems 3 throughcommunication link network 12. When the requests are received by each provisioned system, theservice modules 8 of the provisionedsystem 3 carry out the requested tasks, and then send the response back to theconsole support software 6 of thecontrol system 2. The implementation of the actual products of this invention on the second data path may use proprietary TCP/UDP/IP based protocols for the communication between the provisionedsystems 3 and thecontrol system 2. However, other standards or proprietary IP-based or any suitable non-IP-based protocol are also possible. The communication protocols used between theconsole support software 6 of thecontrol system 2 and theservice modules 8 of the provisionedsystem 3 can be any suitable IP based or non-IP based protocols, whichever is suitable to transmit data between them. The typical data flow through this path could be the boot message, system status, network information, or storage information of the provisionedsystem 3 as shown inFIG. 1 . - The third data path is the data flow between the provisioned
systems 3 and theclient system 10 or theconsole system 1 via the communication links of the net 11-12. Referring back toFIG. 1 , theconsole support software 6 of thecontrol system 2 may, in one embodiment, present a web link, which points to an object on a provisionedsystem 3, to a user working at the web-browser 9 of theclient system 10 or theconsole system 1 or thecontrol system 2. The object pointed by the web link on the provisionedsystem 3 could be a text file, MPEG video, PDF document, MS Power Point, Word documentation, etc. It also could be a link of another web service application program. From theweb browser 9, a user can directly access the information on a provisionedsystem 3 pointed by the web link without go through thecontrol system 2 again. In this case, theservice modules 8 of the provisionedsystem 3 also include web server software modules 7 or equivalent one to directly support theweb browser 9 as mentioned before. The communication protocols with the third path could be web protocols such as HTTP or WAP. Alternatively, the communication protocols can be other standards or proprietary IP-based or non-IP-based protocols. To simplify the discussion, the data transmitted on this path will be mentioned as theservice software module 8 that send data to or receive data from the web-browser 9 and/or vice versa. - The fourth data path is data flow through communication link between a provisioned
system 3 and another provisionedsystem 3. With this path, theservice modules 8 of one provisionedsystem 3 can directly transmit data or information to theservice modules 8 of another provisionedsystem 3 via a communication link of the Net 12 without going through thecontrol system 2. The implementation of the actual products of this invention, for example, uses a proprietary IP-based protocol for communications between the two provisionedsystems 3. The principle of this invention, however, does not rely on or limit to proprietary protocol. It should be noted that other standard or proprietary IP-based or any suitable non-IP-based protocol may also be possible. The data and information transmitted through the fourth data path can be various types of data. For example, a user at a web-browser 9 on a system may open a file folder on a provisionedsystem 3. The user can also instruct to transfer a file from a current target provisionedsystem 3 to another provisionedsystem 3 by, for example, a mouse click. The data file will then be transferred directly between the two provisionedsystems 3 without going through thecontrol system 2. -
FIG. 2A illustrates a variation of the CCDSVM platform for the web based communication in accordance with one embodiment of the present invention. The CCDSVM platform illustrated inFIG. 2A is similar to the platform illustrated inFIG. 1 except every provisionedsystems 3 includes a web-browser 9. Thus, with proper authentication process, each user of provisionedsystems 3 may access, manage their own provisionedsystem 3 from the web-browser 9 either on their own local provisionedsystem 3 or on any client system anywhere on the network. It should be noted that when a user is registered with a provisionedsystem 3, the user is authorized to access provisionedsystem 3 locally but not with the CCDSVM. On the other hand, when a user is registered with CCDSVM, the user is then authorized to access the multiple provisionedsystems 3 and thecontrol system 2 of the CCSDVM. -
FIG. 2B illustrates another example of a variation of CCDSVM, in which there is no provisionedsystems 3 in the CCDSVM. TheControl system 2 can run on its own and the CCDSVM has degenerated into a single stand-alone system (FIG. 2B ), and users through web-browser 9 on any client system 3 (or onconsole system 1, or on stand-alone control system 2) are allowed to access and operate the permitted resource objects and system resources on the stand-alone control system 2. - Unless specifically specified, the console
support software modules 6 of thecontrol system 2, the provisionedsystems 3, theservice software modules 8 of provisionedsystem 3, and the web-browser 9 on thecontrol system 2, theclient system 10, and theconsole system 1 are referred to the WCUWE of the CCDSVM platform illustrated inFIG. 1 . - A web-based computer user work/operation environment (“WCUWE”) of CCDSVM is a software infrastructure, shown in
FIG. 3 , which provides each permitted user to log on the CCDSVM and further provide each user a private web-browser based operating environment, which is a private work space including the assigned and permitted resources on thecontrol system 2 or on the provisionedsystem 3 on the network. The WCUWE further provides each user from a single web-browser to perform various permitted tasks and operations over various system resources (FIG. 5 ), further, the tasks can be performed concurrently from a single web-browser. - The tasks include allowing privileged users to create users, groups, assign users to each group, to assign initial associated system resources to each user or group, and to save the information of created users and groups into a database stored on a storage media of the
control system 2. The information needed for creating users or groups include user names, user IDs, assigned security permissions, passwords, access points, group names, group IDs, maximum members in a group, and so forth. The tasks also include various system operations such as manage network, storage, file system, folder, files, messages, user security, without limits. - The database is organized as one or more lists of tables, wherein each of the lists contains information for various resources. The resources could be one or multiple users' information, one or multiple systems' information, one or more network cards, and one or more disk drives information. The storage media could be internal storage or disk drive of a mentioned system, for example.
- The WCUWE of the CCDSVM includes software modules of present invention. For example, the software includes the
console support modules 6 of thecontrol system 2, theservice software modules 8 of the provisionedsystem 3, theother service software 13 of theconsole system 1. The current implementation of the WCUWE is based on a proprietary design of this invention. However, the nature and spirit of this invention does not limit to proprietary designed software. The WCUWE of the CCDSVM also includes other proprietary software modules or conventional software such as the web-server 7 of thecontrol system 2, the web-browser 9 of thecontrol system 2, theclient system 10, andconsole system 1. - The WCUWE of the CCDSVM can be implemented with any suitable or combination of various suitable programming languages such C, C++, Java, JavaScripts, HTML, XML, and so on. To simplify the discussion, the WCUWE will be used to represent software modules in the CCDSVM described above.
- Users of the CCDSVM may be created by the CCDSVM though a given process or any users on the Internet, Intranet, LAN without registering with CCDSVM. The WCUWE of the CCDSVM provides user to access various resources and perform various tasks through a preferred interacting model of, for example, via mouse clicking on graphically represented resource objects displayed in the
browser 9. - The WCUWE is designed to be operated on a CCDSVM platform, and specially is designed to provide dynamic work space (
FIG. 4A ) to each user associated with various CCDSVM. The WCUWE further performs tasks of instantly posting or un-posting user's private resources information to peers in a group or to each peer user of the CCDSVM not in a group or not in same group, or to massive public users on the network, wherein the massive public users may do not have accounts with the CCDSVM platform. - The dynamic work space of the WCUWE is a centrally controlled collection of each group's work space and/or user's work space. The
console support software 6 of thecontrol system 2 of the CCDSVM will assign each user a private work space and each group a common work space when each user or group account is created by a privileged user after corresponding WCUWE software modules on thecontrol system 2 and provisionedsystem 3 enter into an operational mode. When a user or a group account is created, each user is assigned to a specific user security scope and permission. An important aspect of the WCUWE of the CCDSVM is that it assigns each user and/or each user-group a working space based on user and group security permission. - A work space is an organized information structure, which can be saved on storage media of memory or disk drives or both of memory and disk drives by the console
support software modules 6. A work space is created during a privileged user performing the asks of creating user or group. The work space will be initiated and assigned with resources of the CCDSVM as shown inFIG. 5 . Various system resources on either the provisionedsystem 3 and/or on thecontrol system 2 include respective memory, system-groups, systems in system-group, file system, file folders, files, storage media, network media and so on. The common work space 15, shown inFIG. 4A andFIG. 4B , of each group may be initially assigned with information of system resources (FIG. 5 ) such as users in this group, message area, file systems, folders and files resided on a specific provisionedsystem 3 or on thecontrol system 2, and so on. The resources information in the common work space may also be dynamically assigned or allocated by permitted user after creating group account. For example, during an online interactive meeting, a user posts a file to the common work space, so that a new entry of a file node is added to a file and a folder tree area of common work space. In addition, each group may be assigned to one or multiple users, wherein each user can also be assigned with aprivate work space 16 ofFIG. 4A andFIG. 4C during user account creation time. The private work space may also be initially assigned with system resources of the CCDSVM during user account creation time. Alternatively, the private work space can be dynamically assigned with the resources of the CCDSVM after the user account is created. - For example, a privileged user can dynamically permit or deny a general user to access a list of storage devices. During the operation, at one second, the user may see the list of the storage devices from user's web-browser, and at another second, the general user will no longer see the list of the storage devices. Also, if the user is authorized to access the list of the storage devices on a provisioned
system 3, the user can further take one of the storage devices offline so that the list of the storage devices on the provisionedsystem 3 will have one less devices to be displayed. - In another example, at one second, a privileged user grants a general user to access a file J in a folder N resided on a system M of the CCDSVM, and at another second, the privileged user resets the previously granted permission, therefore, the general user can view and access the file J in the folder N on the system M of the CCDSVM at one time, and a second later, the general user can no longer view and access the file J. The actual implementation of
console support software 6 ofcontrol system 2 has achieved this capability. - In addition, each type of resources in the work space is organized as a list of tables and can be stored in storage media in the
control system 2. The integrity of security of each group is protected by limiting different resources to different group. As such, each group is authorized to have a limited view over assigned system resources on the provisionedsystem 3 as well as on thecontrol system 2. The same security integrity at user level can be achieved by assigning different system resources of the provisionedsystem 3 and/or thecontrol system 2 to different individual user based on assigned security permission. Therefore, each user is authorized to access and view the assigned resources. -
FIG. 4B has shown an example of assigned resources in theuser area 17, message area 18, and folders and files area 19, and other area 20 in the common work space 15 of a user group. The messages from each user in the common message area 18, and the information of folders and files in common files and folder area 19 can be shared by all users in the same user group. All resources in each common work space of the user group can be selectively displayed in the web-browser 9 of each login user, who belongs to the same user group, wherein the resources accessible via in the group workspace are converted to presentable web-format (web-page) by theconsole support software 6 of thecontrol system 2 of CCDSVM for displaying. -
FIG. 4C has shown an example of resources in private work space (16) assigned to a user. The private workspace hasprivate message area 21, private file,folder area 22, and private network or storage orother information area 23. The assigned resources only can be exclusively viewed and accessed by the designated user unless he/she agrees to share with peer user crossing group boundary or with peer users in a same group. The folder (directory) is a data structure which can hold one more files and sub-folders at logical file system level and to be stored at physical level on storage media. -
FIG. 8A has shown an example of displaying an actually implemented portion of web-page encoded with assigned resources in private work space of a user X. The web page includes a system-group-A 33 on said network, multiple provisionedsystems 3 under the system-group-A, private folders 32 and 34 of the user X resided on a system of the CCDSVM, and files under the folders 32 in the displayed private work space of the user X. -
FIG. 8B has shown another example of displaying an actually implemented portion of a web-page encoded with assigned resources in a private work space of a user Y, which includescontrol system 2, private folder and files 35 of the user Y. - The private work space of the user X and user Y may also include
private message area 21 and other resources, which are not displayed inFIG. 8A &FIG. 8B because the WCUWE is designed to dynamically display part of user's private work space whenever there is needs. - It is notable that said user X and user Y, may be in same user-group such as in said group-1, however, each of them could have a significant different scope of the private work space assigned by the
console support software 6 of thecontrol system 2 due to each of them is assigned with very different resources on the systems of the CCDSVM depending on each user's role and security permission, which is setup by said privileged user of the CCDSVM through web-based user interface provided by the saidconsole support software 6. - The
FIG. 6C andFIG. 6D are examples of a web-page displayed in said web-browser 9 of the user X and user Y in said user group before an interactive online meeting. As shown inFIG. 6C andFIG. 6D , the user X or user Y or other users (who's web-page/browser did not depicted) in the same user group have entered a group online meeting after each of them logs on the CCDSVM via eachbrowser 9 on any computing system across said network. Also, each of the users will get an identical web-page layout provided by theconsole support software 6 of thecontrol system 2 except with different contents in the displayed private work space section of the web-page due to each user has assigned with different resources. The web-page screen layout provided by the consolesupport software modules 6 contains four sections: -
- 1) a private user message input area (section-1),
- 2) a message displaying section for common message area 18, illustrated in
FIG. 4B , for all users in user group (section-2), - 3) a file or folder display section for group common file and folder area 19, illustrated in
FIG. 4B , for all users in same user group (section-3), and - 4) a file and folder tree displaying and management section (section-4) for user folder and file tree in private file and
folder area 22, illustrated inFIG. 4C , of a user'sprivate work space 16.
- Initially, the section-1, section-2, and section-3 are all empty due to no one has post any file or message yet. The
console support software 6 of thecontrol system 2 obtains each login user's portion of assigned folders and files for the online meeting from the stored private file andfolder area 22, illustrated inFIG. 4C , of theprivate work space 16 of each user in said storage media, and further converts said file or folder information to presentable web-format (web-page) for being displayable in said section-4 of the web-page in web-browser 9 of each user. The choice of total four sections of the web-page layout and the order of each section on thebrowser screen 9 is irrelevant to this invention since other choices of designing are also possible, and further, this invention does not have limitation on what web-screen layout shall be. The information of the file or folder includes the system name where the file or folder resided, the named and path of the file or folder, the owner of file or folder, the time stamps, the size of the file and so on without limitation. - During the interactive online meeting, the console
support software modules 6 provide each user to post or un-post files or folders to said section-3 of displayed group's common documents and contents management section with several steps. First, for example, providing said user X to click on one targeted file “Doc 1” 24 or folder at a time in section-4 of displayed said file and folder management area of the user private work space. Second, select the operation of either post or un-post from an operation menu (seeFIG. 9A ,FIG. 9B ,FIG. 10A andFIG. 10B ). Finally click on the selected operation to submit the task of either post or un-post on the selected file or folder. - Each user with permission may perform un-post operation if such user has at least a previously posted file or folder, which has already displayed in section-3 of the common document and content management section of the web-
browser 9 of each of the users in the same user-group, seeFIG. 6A orFIG. 6B for example. - If a file is selected, the file operation menu is used and if a folder is selected, the folder operation menu is used respectively. It is also possible to only provide one menu for both file and folder operation by the
console support software 6. The operation menu either can be pop-up menu for folder as shown inFIG. 9A or pop-up menu for file as shown inFIG. 9B , or non-pop-up menu for folder as shown inFIG. 10A or non-pop-up menu for file as shown inFIG. 10B . The choice of operation menu is irrelevant to this invention although the actual implementation of this part of invention has used pop-up menu, and as matter of the facts that there is no limitation on how the operation menu is to be designed in this invention. - In the example of
FIG. 6A , the user X can post a file named “Doc 1” 24 to said section-3 of the common document and contents display section displayed in web-browser 9, In the example ofFIG. 6B , the user Y also can post a file named “picture 1” 25 to the common document and contents display section displayed in the web-browser 9. In addition, another not depicted user Z posted a file of “project code”. The files or folders could be one resided on thecontrol system 2 or on any provisionedsystem 3 of the CCDSVM. - In addition, during the interactive online meeting, the
console support software 6 of thecontrol system 2 also provides each user to post message to massive users in same group from said section-1 of the private user message input section after typing a message and click on the “send” button. In the example ofFIG. 6A , the user X posted a message of “Msg1 of user X” 26. In the example ofFIG. 6B , the user Y also posted a message of “Msg2 of user Y” 27. In addition, another non depicted user Z posted a message of “Msg3 of user Z”. As a result, all of three messages were displayed in the same section-2 of each user's browser. - In a specific situation, the
console support software 6 also provides permitted user to un-post the previously posted message. Just for example, inFIG. 6A , theconsole support software 6 provides the permitted user X to select a previously posted “Msg2 of user Y” 27 from said section-2 of the common message display section of said web-browser 9 of user X, and select un-post operation from said operation menu and submit the selected un-post task. - The detailed information of how the post or un-post task to be implemented will be discussed in next two paragraphs. In addition, with this invention, the action of the “post” information such as posting information of files or folders or messages or other resources is equivalent to the action of “share” the information. The action of “un-post” information is equivalent to the action of “un-share” the previously posted or shared information, in other words, “remove” the previously posted or shared information.
- After user transmitting information data of the post or un-post task from the web-
browser 9 of theconsole system 1 orclient system 10 orcontrol system 2 to thecontrol system 2, theconsole support software 6 of thecontrol system 2 obtains and parses the data to determine: who is the original user initiating the task; what type of task; what type of associated resources for task to work on; who is the targeted user; and what is the time stamp, and may also include other information without limitation. Theconsole support software 6 further determines that if the task is to post a file or folder from the original user, theconsole support software 6 picks up the corresponding file or folder information from file andfolder area 22 ofFIG. 4C of the private work space of the original user and deposits such information to the file and folder area 19 ofFIG. 4B of the common work space of the group in this case. - If the task is to un-post a previously posted file or folder of a specific user, in the common work space of the group, the
console support software 6 search for the corresponding information of the file or folder in the file folder area of the common work space of the group and further remove the entry of matched information from the common work space of the group after it is found. - If the task is to post a message to users in the group, the parsed message will be stored in the
private message area 21, illustrated inFIG. 4C , of the original user'sprivate work space 16, illustrated in FIGS. A and 4C, and also is copied to the message area 18, illustrated inFIG. 4B , of the common work space 15, illustrated inFIGS. 4A and 4B of the user-group by theconsole support software 6. - If a task is to un-post (delete/remove) a previously posted message, the
console support software 6 searches for a matching message in the common message area 18, illustrated inFIG. 4B , of the common work space of the user group and remove such message entry if it is found based on the message and original user's identification and other associated information such as time stamp, security permission and so on without limitation. - It shall be noticed that the task of un-posting a file or folder of this invention does not actually delete the file and folder from original user's private work space. In addition, a lock protection mechanism is deployed whenever a message or information of a file or folder is written, stored, or deposited to either said private space or said common work space that are resided on disk drives or other storage media. Throughout the rest of discuss, the lock protection is assume to be a default action without further mentioning whenever a write/store/deposit action take place. As matter the fact, each task of posting file, folder, and message as well as the task of un-posting the previously posted file or folder, or message performed by each of the users in each of the groups of this invention can be executed by the
console support software 6 instantly with memory speed. -
FIG. 6A andFIG. 6B illustrate that after theconsole support software 6 of thecontrol system 2 successfully executing the tasks for each user in each group, any user in the user group can get a fresh view of the section-2 of the common messages display area of the user group, and a fresh view of the section-3 of the common documents & contents display area of the user group in each user's web-browser 9 on theclient system 10 or on thecontrol system 2 or on theconsole system 1. - User can manually click on a refresh-button, which does not show in the
FIG. 6A andFIG. 6B , to refresh corresponding part of web page screen of either said section-2 or section-3 in thebrowser 9. Also said corresponding part of the web page screen of said section-2 or section-3 in thebrowser 9 can be automatically refreshed. As mater of the fact, optionally, theconsole support software 6 has encoded a run-time script in said web-page, which is encoded in the presentable web-format and to be displayed in the web-browser 9 after each user log on to the CCDSVM and started group online meeting. - The run-time script will automatically and periodically perform tasks of refreshing said section-2 and section-3 of the
web browser 9 screen window. The frequency of the periodic refreshing can be adjusted by theconsole support software 6 of the CCDSVM depending on the needs of the meeting, which typically can range from 1 to 3 seconds and there is no limitation on this aspect. Also, with the preferred example, said run-time script provided by the WCUWE is a JavaScript, however, other type of programming scripts or methods are also possible and there is no limitation on what kind of run-time program shall be used in this invention. In addition, theconsole support software 6 provides each user the choices of either automatic or manual refreshing their web-browser 9. - Upon refreshing the section-2 or section-3 in the web-
browser 9 screen window of each user, a request of updating such screen window will be generated and sent from the web-browser 9 to thecontrol system 2. Theconsole support software 6 obtains and parses each request to determine what user group, and which part of the common work space of the user group need to be updated. - Based on information of each parsed request, the
console support software 6 of thecontrol system 2 retrieves the updated information of resources and objectives from said common work space 15, illustrated inFIGS. 4A and 4B , of the user group, which includes recent posted files, folders, or messages from each user in the user group, and also includes the updated list of files and folders or messages after un-post one or more files or folders, or messages by each of the users in the user group. Finally, theconsole support software 6 of thecontrol system 2 converts retrieved information of the resources and objects to the presentable web-format (web-page). - If the request is to update the group messages, the converted information is displayed in the section-2 of the group common message display area of the web-page in the
web browser 9. If the request is to update the group common files and folders display area, the converted information is displayed in the section-3 of the web page in the web-browser 9. Therefore, after refreshing each of the sections in the web-browser 9, each user can have an identical view of all posted files and folders from the section-3 of group common document display area in thebrowser 9, and can have an identical view of all messages from the section-2 of the group common message display area in the web-browser 9 that are posted by all other users in a same group. Meanwhile theconsole support software 6 still allow each user kept most of the resources and objects in their own private work space un-exposed to other users in the same group during the online interactive meeting. - For example by referring the
FIG. 6A , the User X at his/her web-browser 9 can see “picture 1” 25 posted by the user Y in the group common file and folder display area but not other information in the user Y's private work space area, and also see the “Doc 1” self posted by the user X. Also referring theFIG. 6B , the user Y at his/her web-browser 9 can see “Doc 1” 24 posted by the user X in the group common file and folder display area but not other information in user X's private file and folder display area, and also can see the “picture 1” self posted by the user Y. - A difference between a conventional Internet group communication model and the group based communication model described in the present invention is that the console
support software modules 6 of thecontrol system 2 provide each user to control post or un-post said resources from user's own private work space while the conventional Internet communication model are not capable of performing posting/un-posting task. Also, for example, un-posting a previous posted folder with the WCUWE of the CCDSVM does not require to delete the folder materials in the user's private work space while the delete operation with existing Internet group communication model will completely delete the file or folder. The dynamic work space combines with security protection for the information has greatly improved the security, flexibility and efficiency of online meeting provided by the WCUWE of the CCDSVM to each users and groups. - In addition, with a preferred example, since posted information of each files are encoded by the
console support software 6 with a web link and displayed in the section-3 of the web-browser 9, therefore, each user in a user-group can click on the link to download the files posted from the private file andfolder area 22 of theprivate work space 16 of each of the users in the user group from a system of the CCDSVM where the file is located. For example, the user X can download said “picture 1”, which may reside either on thecontrol system 2 or any provisionedsystem 3, posted by the user Y, and the user Y can download the “Doc 1”, which may also reside either on thecontrol system 2 or the provisionedsystem 3, posted by the user X at same time. This achieves a true peer-to-peer exchanging files resided on permitted systems between permitted users in the user group. In addition, there is no size limitation on the file size for file to be downloaded, which is a gifted benefit from Internet technology. Besides the exampled and understandable method of download, other methods of retrieve peer users' digital documents or contents are also possible by deploying a more efficient proprietary file transfer mechanism to reach the results of said exchanging file. It shall be noted that the method of download is only applicable to the files and does not apply to folder and other resource information. To get a targeted peer user's entire folder and the underneath files and sub folders, a special files and folder transfer method is required. - As shown in
FIGS. 9A & 9B , andFIGS. 10A & 10B , the consolesupport software modules 6 of thecontrol system 2 also provide each user to perform many other tasks during online meeting through said operation menu such as upload, rename, delete, copy/paste and so on without limitation. The upload operation allows each user to dynamically upload files one a time through the web-browser 9 from a local storage of theclient system 10 orconsole system 1 to a location provided by the user's private work space on thecontrol system 2 during the meeting, and further to be posted to the common space of a user group that each user belong to. - In one embodiment, the mouse click driven copy/past operation allows files and folders from permitted folders of the permitted provisioned
system 3 to be dynamically physically copied to a location provided by users'private work spaces 16 on thecontrol system 2, and the information of said files and folders could further to be displayed via said web-page in thebrowser 9 of each user and further to be posted to common work space of the user group in which each user belong to in addition to direct posting these file or folders without physical copying over. As matter of the fact, operations provided by theconsole support software 6 of thecontrol system 2 have added efficiency to posting or un-posting files and folders for each user depending on the real needs. - Additionally, the
console support software 6 provides each user of each user group capability of saving the posted messages in the common message area 18 of the common work space 15 of each group into a file in the common file & folder area of the common work space 15 of each group. Further, the saved file can be viewed, downloaded by each user in each user group via the same method of posting. Besides whenever there is a need, the consolesupport software modules 6 provide users to reset message area to be empty by removing all message entries in the message area 18 of said user-group's common work space 15. - A important fact is that the designed WCUWE of the CCDSVM has provided concurrent users each from a single web browser anywhere on the network to securely perform permitted various tasks, which could be run concurrent within the single web-browser. Because the
console support software 6 of thecontrol system 2 let each users have exclusive view for resource objects in each one'sprivate work space 16 and in the common work space 15 of a user group in which each user belong to, and let each user to manage resource objects via each one's own private space, the multiple users in multiple user groups can concurrently post or un-post files, folders, messages, or other resource objects without interfere users in other user-groups. Thus, the work spaces of each user and each group are well protected. - Hence, the console
support software modules 6 of thecontrol system 2 provide privileged users to perform tasks of creating multiple users and user groups on the control system, and each group can be assigned with variable size of users for online interactive meeting. The total number of the users and the total number of the user groups, and maximum number of the users per groups of the WCUWE of the CCDSVM can support is an implementation issue and depends on the capacity of thecontrol system 2. The WCUWE of the CCDSVM and the CCDSVM has been designed with unlimited scalability for both users and provisionedsystems 3. On the other hand, the spirit of this invention does not limit to with the boundary issues of the WCUWE and the CCDSVM. -
FIG. 8A andFIG. 8B illustrate that each user X and user Y has a different private work space 18 than others, and each of the users has assigned with different system resources. Without joining any group or participating any group meeting, theconsole support software 6 of thecontrol system 2 also can provide user X and user Y to have peer-to-peer instantly posting files or folders one a time to each other, or instantly un-post the previous posted files and folders through similar steps for posting or un-posting materials in the group online meeting model as bellow: -
- 1) Provide each user to interactively perform selecting, for example mouse clicking, a source of file or folder for post or un-post;
- 2) Provide the user to select post operation task from an operation menu if the user want to post any file or folder; or to select un-post operation task from an operation menu if the user like to un-post a previously posted file or folder;
- 3) upon submitting a task, provide each user to input to a prompt of “who is a targeted user?” provided by the
console support software 9, and further submit the selected task; - 4) Instructing the console
support software modules 6 to obtain and parse the task information including original user, source of file or folder, type of operation, and other information; - 5) If the type of the operation task is post file or folder, instructing the console
support software modules 6 to deposit the information of the source file or folder to the private file andfolder area 22 of theprivate work space 16 of a targeted user. If the operation type is un-post a file or folder, instructing the consolesupport software modules 6 to search a corresponding file or folder information from the private file andfolder area 22 of theprivate work space 16 of the targeted user to match the source file or folder, if found a match, the corresponding entry of the file or folder is removed from the private file andfolder area 22 of saidprivate work space 16 of the targeted user; and - 6) Upon each user refreshing the web-page in the web-
browser 9, instructing the consolesupport software modules 6 to retrieve and convert the updated information in the private file andfolder area 22 ofprivate work space 16 of the targeted user into a presentable web-format (web-page) and transmit the web-page to the web-browser 9 of the each user for displaying and viewing.
- For example, as shown in
FIG. 8A , the user X can follow said steps 1) to 3) described above to post his “folder 2” 32 in the displayed files andfolders area 22 of private workingspace 16 of the user X's web-browser 9 to the user Y. As shown inFIG. 8B , upon the user Y refreshing his/her web-browser 9 on a computing system by walking through any system node or folder node in the displayed resource tree, the user Y will see the “folder 2” 32 in his/her displayed private file and folder tree of theprivate work space 16 of the user Y shown inFIG. 8C . As matter of the fact, when walking through each node including system nodes and file & folder nodes in a tree displayed in the web-browser 9, a request of refreshing web-page screen is generated and the request is handled as described previously. - In addition to post messages in the group based communication involving parties with two or more users, the WCUWE of the CCDSVM also provides each user to post message to each other user in non-group based 1-to-1 message model.
FIG. 7A andFIG. 7B have shown an example of a user X and a user Y, who may not be in a same user group, however, the consolesupport software modules 6 of thecontrol system 2 provide each user to share and exchange messages with each other from a three-section web-page displayed in thebrowser 9. - The three-section of the web page displayed in the
browser 9 allows each of the users to apply the same steps of non-group based 1-to-1 posting files and folders or un-posting the previously posted files or folders as described previously for posting or un-posting messages. The three-section included inFIGS. 7A and 7B just for a demonstration of how flexible of this invention is to display information under private work space of each user. Further, the number of sections in the screen layout and the order of each section in web-page display really is not a limitation to this invention. - The section-1 is a user message input area together with an additional input field of “To who” due to unlike in group online meeting, the console
support software modules 9 have no knowledge of who is the targeted user in this case. Thus, each user can posting a message by following the similar steps as previously discussed . . . . Nevertheless, unlike with group meeting messaging model, after obtaining and parsing information of the messages from each user, the consolesupport software modules 6 of thecontrol system 2 will deposit the message to both targeted user and the original user'smessage areas 21 of theprivate work space 16. Further, with same said steps of displaying messages in each user's browser each user can view both own message and messages from peer user in section-2 of thebrowser 9. - For example, as shown in
FIG. 7A , the user X input a message of “msg4 of user X” 30 and type “user Y” in input field of “To who”, and then submit the message by clicking on “Send” button. Similar as shown inFIG. 7B , the user Y input a message of “Msg3 of user Y” 31, and type “user X” in input field of “To who”, and then submit the message. Upon the refreshing a web-page in the web-browser 9 of each user, the user X will see themessage 30 he/she sent and the message 31 from the user Y. Also the user Y will see bothmessages 30 and 31 at same time. - Again, the design choice of three sections of the web-page display layout and the order of each section is just a preferred example of implementation for non-group based peer user communication. This invention does not limited by web-screen display layout, for example, a screen display only with said section-1 and section-2 are also possible and so on without limitation.
- The WCUWE of the CCDSVM has provided a security hierarchy for members of any team to work together cross multiple locations. With the security hierarchy and steps of posting or un-posting file and folder, the console
support software modules 6 of thecontrol system 2 can specially permit only a team leader with capability of posting folder or file to be viewed, shared, and accessed by all team members in a group environment or by an individual member in a non-group environment. In addition, the consolesupport software modules 6 also provide each team member to post or un-post his/her file or folders to only a specific peer user one a time in non-group-meeting based environment. Again the said files or folders could be resided on thecontrol system 2 or on any provisionedsystem 3. - It is relatively straightforward for the WCUWE of the CCDSVM, more specifically the console
support software modules 6, to support massive online users, who do not have account with the CCDSVM to view the dynamically posted files, folders, or messages by users with user account of the CCDSVM. - In a preferred example, such as shown in
FIG. 6E , the consolesupport software modules 6 of thecontrol system 2 provides a web-page to massive online users, who do not have to login the CCDSVM. The web-page, in one embodiment, could be layout with two major sections with section-1 to display messages in the sharable message area 18 in a designated user-group's common work space 15 while the section-2 to display file or folders in the sharable file or folder area 19 in said designated user-group's common work space 15. - For users belong to the same designated user group, each user from a web-browser on any system across the network to log in the CCDSVM and get the group online meeting web-page as shown in
FIG. 6A for the user X and inFIG. 6B for the user Y. Further as described previously, each user in the user group can instantly post message to the message area 18 of the designated user group's common work space 15, or post a file or folder to the sharable file and folder area 19 in the designated user group's common work space 15. Also, each user in the user group can instantly un-post the previously posted files or folders by removing the corresponding file or folder entry in the file and folder area 19 of the designated user-group's common work space 15, or un-post the previously posted messages from the common message area 18 of the common work space 15 of the user-group. - Meanwhile as previously described and as shown in
FIG. 6E , the web-page in thebrowser 9 for massive online users, who have no account with the CCDSVM, can be dynamically updated, displayed, and viewed by the massive users anywhere through theirown browser 9 accordingly with the same pace as dynamically displaying of the section-2 and section-3 of web-page in thebrowser 9 that has been shown inFIG. 6A andFIG. 6B . Again, the two sections of the web-page display layout is a preferred example and it does not limit this invention because with this invention other layout is also possible, for example, it may be desired to have web-page layout only contains one section, which is either for messages or file or folder's display depending on the application's need. - As shown in
FIG. 8A ,FIG. 8B , andFIG. 8C , with non-group based peer-to-peer post or un-post files and folders, people may often do not remember how many files and folders have been posted for sharing. For example, as shown inFIG. 8A , the user X can select “folder 2” 32, select a post operation from an operation menu, and provide target “user Y” to share “folder 2” 32. As show inFIG. 8C , the user Y can see “Folder 2” 32 of the user X displayed in the web-browser 9 of the user Y after the user X post “Folder 2” 32. If the user X selects various files or folders for sharing with dozen of other people, the user X will have difficult time to remember what has been shared and shared to whom. As shown inFIG. 11 , the consolesupport software modules 6 of thecontrol system 2 can provide each user, such the user X, a sharing list of how many files or folders have been posted for sharing and shared to whom. - As shown in
FIG. 11 , a personal share list is displayed in the user X's web-browser 9. For example, an entry of posted “Folder 2” is listed at bottom of the sharing list and it is posted/shared to the user Y because the user X has posted the “Folder 2” 32 depicted inFIG. 8A . Further, the consolesupport software modules 6 provide each user to selectively un-post a previously posted files and folders via clicking on a “delete shared?” operating option in an operation menu for an corresponding entry in the sharing list in a web-page and further to submit an un-post task. For example, the user X can click on “delete share?” to un-post a “Folder 2”. Thereafter, as described before the consolesupport software modules 6 of thecontrol system 2 will execute the un-post task. As a result, upon refreshing the targeted user Y's web-browser 9, in stead of seeing “Folder 2” 32 as shown inFIG. 8C , the user Y will see an updated web-page as shown inFIG. 8B such that the “Folder 2” 32 has been removed. The operation menu for “delete share?” depicted here just for example and it could be displayed in any other form. - In addition to provide original user in a user group to control the un-posting file or folder in a group based communication, the console
support software modules 6 of thecontrol system 2 may also provide a privileged user to un-post the previously posted files or files in the displayed file and folder section of a web-page in abrowser 9. To support this capability, the consolesupport software modules 6 will provide an operation menu to associate with the displayed files and folders in the display section, further to allow privileged user to perform similar un-post operation. After receiving the un-post operation, the consolesupport software modules 6 will perform similar searching for selected file or folder in the group file and folder area 19, illustrated inFIG. 4B , of the group common work space 15 of the user group, if there is match the corresponding entry will be deleted. Also, the file and folder section of the web-page in the web-browser 9 can be refreshed accordingly as described before. - Having briefly described embodiments of the web based network environment in which the present invention operates,
FIG. 12 illustrates an example of a computer system 1200, which is anexemplary client system 10, provisionedsystem 3,control system 2, orconsole system 1 in which the features of the present invention may be implemented. Process of the web based information exchange can be implemented in any processor-based computer system, such as a PC, a workstation, or a mainframe computer. It will be apparent to those of ordinary skill in the art that other alternative computer system architectures may also be employed. - Referring back to
FIG. 12 ,computer system 200 includes aprocessing unit 201, aninterface bus 211, and an input/output (“I/O”) unit 220.Processing unit 201 includes a processor 202, amain memory 204, asystem bus 211, astatic memory device 206, abus control unit 205, amass storage memory 207, and a webinformation exchange module 230.Bus 211 is used to transmit information between various components and processor 202 for data processing. Processor 202 may be any of a wide variety of general-purpose processors or microprocessors such as Pentium™ microprocessor, Motorola™ 68040, or Power PC™ microprocessor. -
Main memory 204, which may include multiple levels of cache memories, stores frequently used data and instructions.Main memory 204 may be RAM (random access memory), MRAM (magnetic RAM), or flash memory.Static memory 206 may be a ROM (read-only memory), which is coupled tobus 211, for storing static information and/or instructions.Bus control unit 205 is coupled to buses 211-212 and controls which component, such asmain memory 204 or processor 202, can use the bus.Bus control unit 205 manages the communications betweenbus 211 andbus 212.Mass storage memory 207, which may be a magnetic disk, an optical disk, hard disk drive, floppy disk, CD-ROM, and/or flash memories for storing large amounts of data. Web basedinformation exchange 230, in one embodiment, is a network control component for facilitating information exchange over the Web. It should be noted that web basedinformation exchange 230 could be software or hardware or a combination of software and hardware components. - I/O unit 220, in one embodiment, includes a display 221, keyboard 222,
cursor control device 223, and communication device 225. Display device 221 may be a liquid crystal device, cathode ray tube (“CRT”), touch-screen display, or other suitable display device. Display 221 projects or displays images of a graphical planning board. Keyboard 222 may be a conventional alphanumeric input device for communicating information betweencomputer system 200 and computer operator(s). Another type of user input device iscursor control device 223, such as a conventional mouse, touch mouse, trackball, or other type of cursor for communicating information betweensystem 200 and user(s). - Communication device 225 is coupled to
bus 211 for accessing information from remote computers or servers, such as server or other computers, throughnetwork 11 or 12 as illustrated inFIG. 1 . Communication device 225 may include a modem or a network interface device, or other similar devices that facilitate communication betweencomputer 200 and the network.Computer system 200 may be coupled to a number of servers via a network infrastructure such as the infrastructure illustrated inFIG. 1 . - The present invention has been described in considerable details with reference to certain examples. However, other versions and examples are also possible, therefore, the spirit of this invention shall not be limited to these examples and/or embodiments. Also, the claims of this invention will label with numbering and in most cases, the numbering does not represent any sequence or order unless specifically described as the steps of a method.
Claims (20)
1. A method for managing an enterprise network via web communication, the enterprise network having at least a server computer and a plurality of provisioned computer, the method comprising:
controlling, by the server computer, automatically forming at least a service pool of the enterprise network, wherein each service pool comprising at least a provisioned computer;
hosting, by the server computer, a web site having at least a first web page dedicated for managing the enterprise network; and
providing, by the server computer, a web user interface (hereinafter “UI”) to at least a first enterprise network management administrator,
the UI comprising at least a resource information of the enterprise network,
the UI transmitted to and displayed on an end-user computing device after the first administrator via the end-user computing device logs on the server computer across the world wide web,
the displayed UI allowing the first administrator to selectively manage the enterprise network via the at least a resource information, and also allowing the first administrator at anytime to input a resource information of the enterprise network and further submit a request of instantly posting the resource information to the first web page, and allowing the first administrator at anytime to remove his/her a previously posted resource information from the first web page; and
permitting another specific administrator from an end-user computing device exclusively retrieving the first web page from the web site, and further managing the physical resource of the enterprise network via the resource information posted by the first administrator.
2. The method of claim 1 , wherein said at least a service pool include at least one of a storage service pool and a video service pool across the enterprise network, wherein the enterprise network is at least one of an enterprise storage network, enterprise Intranet, secure Internet, local area network (“LAN”) or wide area network (“WAN”).
3. The method of claim 1 , wherein each provisioned computer automatically provides resource information to the server computer, and receives, executes and responds to each task transmitted from the server computer.
4. The method of claim 1 , wherein server computer receives and processes each request of posting and removing transmitted from said end-user computing device, the processing including:
depositing a posted resource information into a specific area in a memory of the server computer in response to a posting request,
finding and deleting a previously posted resource information from the specific area in the memory in response to a removing request;
providing a response to the UI from which the request is submitted; and
generating the updated first web page comprising the posted resource information in the specific area of the memory in response to said another administrator from an end-user computing device requesting to manage the physical resource of the enterprise via the posted resource information.
5. The method of claim 4 , wherein said specific area in a memory is divided into multiple sections, wherein at least a section is dedicated for storing a specific type of resource information which is at least a type of text message, file and folder, user profile, or hardware including network and storage information.
6. The method of claim 1 , wherein said posting further comprises:
allowing the first administrator to post information of the entire enterprise network to the first web page, and allowing another specific administrator via displayed posted information in the first web page to further manage the entire enterprise network including managing each service pool.
7. The method of claim 1 , wherein said posting further comprises:
allowing the first administrator to post information of a service pool to the first web page, and allowing another specific administrator via displayed posted resource information in the first web page to further manage the physical service pool including managing each provisioned computer in the service pool.
8. The method of claim 1 , wherein said posting further comprises:
allowing the first administrator to post information of a provisioned computer, and allowing another specific administrator via displayed posted resource information in the first web page to further manage the physical provisioned computer including managing data and hardware resources of the provisioned computers.
9. The method of claim 1 , wherein said posting further comprises:
allowing the first administrator to post information of at least a hardware resource on a provisioned computer, and allowing another specific administrator via displayed posted resource information to further manage the physical hardware resources including managing storage and network hardware.
10. The method of claim 1 , wherein said posting further comprises:
allowing the first administrator to post information of at least a data resource on a provisioned computer, and allowing another specific administrator via displayed posted resource information to further manage the physical data resources including managing file and folder.
11. The method of claim 1 , wherein said managing the enterprise network further comprises:
allowing each administrator via the displayed UI on an end-user computing device to transfer a file object of either file or file folder between the server computer and each provisioned computer or between each provisioned computer without requiring a secondly logging on the server computer.
12. The method of claim 1 , wherein said managing the enterprise network further comprising:
allowing each administrator via the displayed UI to submit at least a second management task without waiting completion of execution of a first management task, wherein each of the first and second management task being executed without blocking the displaying of the UI on said end-user computing device of each administrator.
13. The method of claim 1 , wherein said input a resource information includes at least one of typing a message into a text input filed, selecting a resource information from a resource information tree, or selecting a resource information from non-tree formed resources displayed in the UI.
14. The method of claim 1 , wherein said posting a resource information includes posting a resource information tree.
15. A computing system for supporting web communication for controlling secure managing an enterprise network, the computing system comprising:
a server computer connected to the enterprise network, the enterprise network comprising a plurality of provisioned computers and the server computer,
the server computer controlling automatically forming at least a service pool of the enterprise network, wherein each service pool comprising at least a provisioned computer,
the server computer also configured to host a web site comprising at least a first web page dedicated for managing the enterprise network,
the hosting the web site including:
providing a web user interface (hereinafter “UI”) to at least a first enterprise network management administrator,
the UI comprising at least a resource information of the enterprise network, and allowing the first administrator to selectively manage the enterprise network via the at least a resource information,
the UI transmitted to and displayed on an end-user computing device after the first administrator via the end-user computing device logs on the server computer across the world wide web,
the displayed UI allowing the first administrator at anytime to input a resource information of the enterprise network and further submit a request of instantly posting the resource information to the first web page, and allowing the first administrator at anytime to remove his/her a previously posted resource information from the first web page;
permitting another administrator from an end-user computing device exclusively retrieving the first web page from the web site, and further managing the physical resource of the enterprise network via the resource information posted by the first administrator.
16. The enterprise network of claim 15 , wherein said enterprise network is at least one of an enterprise storage network, enterprise Intranet, Internet, local area network (“LAN”) or wide area network (“WAN”).
17. The enterprise network of claim 15 , wherein each provisioned computer automatically provides resource information to the server computer, and receives, executes and responds to each task transmitted from the server computer.
18. The enterprise network of claim 15 , wherein said displaying the UI includes displaying the UI into a web browser on said end-user computing device, wherein the end-user computing device is at least one of a wireless personal communication device, a laptop computer, a desktop computer or a server computer.
19. The enterprise network of claim 15 , wherein said server computer receives and processes each request of posting and removing transmitted from said end-user computing device, the processing the each request including:
depositing a posted resource information into a specific area in a memory of the server computer in response to a posting request,
finding and deleting a previously posted resource information from the specific area in the memory in response to a removing request;
providing a response to the UI from which the request is submitted; and
generating the updated first web page comprising the posted resource information in the specific area of the memory in response to said another administrator from an end-user computing device requesting to manage the physical resource of the enterprise via the posted resource information.
20. The enterprise network of claim 19 , wherein said specific area in a memory is divided into multiple sections, wherein at least a section is dedicated for storing a specific type of resource information which is at least a type of text message, file and folder, user, or hardware including network and storage information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/282,445 US20120079389A1 (en) | 2002-08-06 | 2011-10-26 | Method and Apparatus For Information Exchange Over a Web Based Environment |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/713,904 US7418702B2 (en) | 2002-08-06 | 2002-08-06 | Concurrent web based multi-task support for control management system |
US10/713,905 US7379990B2 (en) | 2002-08-12 | 2002-08-12 | Distributed virtual SAN |
US78765306P | 2006-03-31 | 2006-03-31 | |
US11/732,496 US20080091761A1 (en) | 2002-08-06 | 2007-04-02 | Method and apparatus for information exchange over a web based environment |
US13/282,445 US20120079389A1 (en) | 2002-08-06 | 2011-10-26 | Method and Apparatus For Information Exchange Over a Web Based Environment |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/732,496 Division US20080091761A1 (en) | 2002-08-06 | 2007-04-02 | Method and apparatus for information exchange over a web based environment |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120079389A1 true US20120079389A1 (en) | 2012-03-29 |
Family
ID=44012136
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/282,445 Abandoned US20120079389A1 (en) | 2002-08-06 | 2011-10-26 | Method and Apparatus For Information Exchange Over a Web Based Environment |
US14/511,129 Active US9288266B1 (en) | 2002-08-06 | 2014-10-09 | Method and apparatus for web based storage on-demand |
US16/102,180 Expired - Lifetime US10686664B1 (en) | 2002-08-06 | 2018-08-13 | System and method for access resources by deploying web based multi-layers item list |
US16/857,041 Expired - Lifetime US11146635B2 (en) | 2002-08-06 | 2020-04-23 | System and method for access resources by deploying web based multi-layers item list |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/511,129 Active US9288266B1 (en) | 2002-08-06 | 2014-10-09 | Method and apparatus for web based storage on-demand |
US16/102,180 Expired - Lifetime US10686664B1 (en) | 2002-08-06 | 2018-08-13 | System and method for access resources by deploying web based multi-layers item list |
US16/857,041 Expired - Lifetime US11146635B2 (en) | 2002-08-06 | 2020-04-23 | System and method for access resources by deploying web based multi-layers item list |
Country Status (1)
Country | Link |
---|---|
US (4) | US20120079389A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080091761A1 (en) * | 2002-08-06 | 2008-04-17 | Stt Webos, Inc. | Method and apparatus for information exchange over a web based environment |
US20110119353A1 (en) * | 2002-08-06 | 2011-05-19 | Tsao Sheng Tai Ted | Method and Apparatus for information exchange over a web based environment |
US9116778B2 (en) | 2010-04-29 | 2015-08-25 | Microsoft Technology Licensing, Llc | Remotable project |
US10250579B2 (en) * | 2013-08-13 | 2019-04-02 | Alcatel Lucent | Secure file transfers within network-based storage |
US10402786B2 (en) * | 2016-12-30 | 2019-09-03 | Dropbox, Inc. | Managing projects in a content management system |
US10452670B2 (en) | 2015-03-23 | 2019-10-22 | Dropbox, Inc. | Processing message attachments in shared folder backed integrated workspaces |
US10484455B2 (en) | 2002-08-06 | 2019-11-19 | Sheng Tai (Ted) Tsao | Method and apparatus for information exchange over a web based environment |
US10719807B2 (en) | 2016-12-29 | 2020-07-21 | Dropbox, Inc. | Managing projects using references |
US10838925B2 (en) | 2018-11-06 | 2020-11-17 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
US10942944B2 (en) | 2015-12-22 | 2021-03-09 | Dropbox, Inc. | Managing content across discrete systems |
US10970656B2 (en) | 2016-12-29 | 2021-04-06 | Dropbox, Inc. | Automatically suggesting project affiliations |
US11226939B2 (en) | 2017-12-29 | 2022-01-18 | Dropbox, Inc. | Synchronizing changes within a collaborative content management system |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114095349B (en) * | 2021-11-18 | 2024-02-27 | 连洁 | Agricultural Internet of things system based on BATS (binary image sensor) coding and deployment method |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030014507A1 (en) * | 2001-03-13 | 2003-01-16 | International Business Machines Corporation | Method and system for providing performance analysis for clusters |
US6571245B2 (en) * | 1998-12-07 | 2003-05-27 | Magically, Inc. | Virtual desktop in a computer network |
US20050091595A1 (en) * | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Group shared spaces |
US20050097440A1 (en) * | 2003-11-04 | 2005-05-05 | Richard Lusk | Method and system for collaboration |
US20060095514A1 (en) * | 2004-10-20 | 2006-05-04 | Inbit, Inc. | Collaborative communication platforms |
US20070255712A1 (en) * | 2005-01-10 | 2007-11-01 | Instant Information Inc. | Methods and systems for enabling the collaborative management of information using controlled access electronic workspace |
US20080091761A1 (en) * | 2002-08-06 | 2008-04-17 | Stt Webos, Inc. | Method and apparatus for information exchange over a web based environment |
US20110119353A1 (en) * | 2002-08-06 | 2011-05-19 | Tsao Sheng Tai Ted | Method and Apparatus for information exchange over a web based environment |
US20130124690A1 (en) * | 2004-03-18 | 2013-05-16 | Andrew Liebman | Novel Media File Access and Storage Solution for Multi-Workstation/Multi-Platform Non-Linear Video Editing Systems |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5897638A (en) * | 1997-06-16 | 1999-04-27 | Ab Initio Software Corporation | Parallel virtual file system |
US6567849B2 (en) * | 1998-08-17 | 2003-05-20 | International Business Machines Corporation | System and method for configuring and administering multiple instances of web servers |
WO2000075788A1 (en) * | 1999-05-26 | 2000-12-14 | Fujitsu Network Communications, Inc. | Network element management system |
US6330560B1 (en) * | 1999-09-10 | 2001-12-11 | International Business Machines Corporation | Multiple manager to multiple server IP locking mechanism in a directory-enabled network |
US6785713B1 (en) * | 2000-05-08 | 2004-08-31 | Citrix Systems, Inc. | Method and apparatus for communicating among a network of servers utilizing a transport mechanism |
US20030061323A1 (en) * | 2000-06-13 | 2003-03-27 | East Kenneth H. | Hierarchical system and method for centralized management of thin clients |
US7693976B2 (en) * | 2000-07-11 | 2010-04-06 | Ciena Corporation | Granular management of network resources |
US7308440B2 (en) * | 2000-12-11 | 2007-12-11 | Microsoft Corporation | System and method for representing an object used in management of multiple network resources |
US20020091819A1 (en) * | 2001-01-05 | 2002-07-11 | Daniel Melchione | System and method for configuring computer applications and devices using inheritance |
US7110936B2 (en) * | 2001-02-23 | 2006-09-19 | Complementsoft Llc | System and method for generating and maintaining software code |
US7082464B2 (en) * | 2001-07-06 | 2006-07-25 | Juniper Networks, Inc. | Network management system |
US6966033B1 (en) * | 2001-09-28 | 2005-11-15 | Emc Corporation | Methods and apparatus for graphically managing resources |
US8244837B2 (en) * | 2001-11-05 | 2012-08-14 | Accenture Global Services Limited | Central administration of one or more resources |
US7035857B2 (en) * | 2002-01-04 | 2006-04-25 | Hewlett-Packard Development Company, L.P. | Method and apparatus for increasing the functionality and ease of use of lights out management in a directory enabled environment |
US7249174B2 (en) * | 2002-06-12 | 2007-07-24 | Bladelogic, Inc. | Method and system for executing and undoing distributed server change operations |
US7316016B2 (en) * | 2002-07-03 | 2008-01-01 | Tripwire, Inc. | Homogeneous monitoring of heterogeneous nodes |
US7818480B2 (en) * | 2002-08-29 | 2010-10-19 | Raritan Americas, Inc. | Wireless management of remote devices |
US20040148372A1 (en) * | 2003-01-27 | 2004-07-29 | Campbell David N | Web-browser based heterogeneous systems management tool |
US20040236752A1 (en) * | 2003-05-19 | 2004-11-25 | Keli Han | Document sharing in a distributed server system |
US20040243945A1 (en) * | 2003-05-30 | 2004-12-02 | International Business Machines Corporation | Representing a storage subsystem logical configuration in a graphical user interface using a tree metaphor |
US8776050B2 (en) * | 2003-08-20 | 2014-07-08 | Oracle International Corporation | Distributed virtual machine monitor for managing multiple virtual resources across multiple physical nodes |
US8166101B2 (en) * | 2003-08-21 | 2012-04-24 | Microsoft Corporation | Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system |
US8176155B2 (en) * | 2003-11-26 | 2012-05-08 | Riip, Inc. | Remote network management system |
US20050198245A1 (en) * | 2004-03-06 | 2005-09-08 | John Burgess | Intelligent modular remote server management system |
US7703019B2 (en) * | 2004-03-26 | 2010-04-20 | Sap Ag | Visual administrator for specifying service references to support a service |
US20060202964A1 (en) * | 2004-05-03 | 2006-09-14 | Yee Liaw | Intelligent modular server management system with enhanced graphical user interface |
US20050278723A1 (en) * | 2004-06-14 | 2005-12-15 | Feinleib David A | System and method for remote administration from a windows client of computer systems running the Linux operating system |
-
2011
- 2011-10-26 US US13/282,445 patent/US20120079389A1/en not_active Abandoned
-
2014
- 2014-10-09 US US14/511,129 patent/US9288266B1/en active Active
-
2018
- 2018-08-13 US US16/102,180 patent/US10686664B1/en not_active Expired - Lifetime
-
2020
- 2020-04-23 US US16/857,041 patent/US11146635B2/en not_active Expired - Lifetime
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6571245B2 (en) * | 1998-12-07 | 2003-05-27 | Magically, Inc. | Virtual desktop in a computer network |
US20030014507A1 (en) * | 2001-03-13 | 2003-01-16 | International Business Machines Corporation | Method and system for providing performance analysis for clusters |
US20080091761A1 (en) * | 2002-08-06 | 2008-04-17 | Stt Webos, Inc. | Method and apparatus for information exchange over a web based environment |
US20110119353A1 (en) * | 2002-08-06 | 2011-05-19 | Tsao Sheng Tai Ted | Method and Apparatus for information exchange over a web based environment |
US20110119594A1 (en) * | 2002-08-06 | 2011-05-19 | Stt Webos, Inc. | Method and apparatus for information exchange over a web based environment |
US20120084658A1 (en) * | 2002-08-06 | 2012-04-05 | Stt Webos, Inc. | Method and apparatus for information exchange over a web based environment |
US20050091595A1 (en) * | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Group shared spaces |
US20050097440A1 (en) * | 2003-11-04 | 2005-05-05 | Richard Lusk | Method and system for collaboration |
US20130124690A1 (en) * | 2004-03-18 | 2013-05-16 | Andrew Liebman | Novel Media File Access and Storage Solution for Multi-Workstation/Multi-Platform Non-Linear Video Editing Systems |
US20060095514A1 (en) * | 2004-10-20 | 2006-05-04 | Inbit, Inc. | Collaborative communication platforms |
US20070255712A1 (en) * | 2005-01-10 | 2007-11-01 | Instant Information Inc. | Methods and systems for enabling the collaborative management of information using controlled access electronic workspace |
Non-Patent Citations (2)
Title |
---|
Decouchant, D. and Martinez-Enriquez, A. "A Cooperative, Deductive, and Self-Adaptive Web Authoring Environment". MICAI 2000. pgs. 443-457. * |
Qu et al. "Implementation of An Enterprise-level Groupware System Based on J2EE Platform and WebDAV Protocol", IEEE, 2000. pgs. 160-169. * |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10484455B2 (en) | 2002-08-06 | 2019-11-19 | Sheng Tai (Ted) Tsao | Method and apparatus for information exchange over a web based environment |
US20110119353A1 (en) * | 2002-08-06 | 2011-05-19 | Tsao Sheng Tai Ted | Method and Apparatus for information exchange over a web based environment |
US20120226746A1 (en) * | 2002-08-06 | 2012-09-06 | Tsao Sheng Tai Ted | Method and Apparatus for Information Exchange Over a Web Based Environment |
US10326770B2 (en) | 2002-08-06 | 2019-06-18 | Stt Webos, Inc. | Method and apparatus for controlling access pools of computing systems in a web based environment |
US20080091761A1 (en) * | 2002-08-06 | 2008-04-17 | Stt Webos, Inc. | Method and apparatus for information exchange over a web based environment |
US9116778B2 (en) | 2010-04-29 | 2015-08-25 | Microsoft Technology Licensing, Llc | Remotable project |
US9990192B2 (en) | 2010-04-29 | 2018-06-05 | Microsoft Technology Licensing, Llc | Remotable project |
US10250579B2 (en) * | 2013-08-13 | 2019-04-02 | Alcatel Lucent | Secure file transfers within network-based storage |
US10558677B2 (en) | 2015-03-23 | 2020-02-11 | Dropbox, Inc. | Viewing and editing content items in shared folder backed integrated workspaces |
US10452670B2 (en) | 2015-03-23 | 2019-10-22 | Dropbox, Inc. | Processing message attachments in shared folder backed integrated workspaces |
US10997188B2 (en) | 2015-03-23 | 2021-05-04 | Dropbox, Inc. | Commenting in shared folder backed integrated workspaces |
US10635684B2 (en) | 2015-03-23 | 2020-04-28 | Dropbox, Inc. | Shared folder backed integrated workspaces |
US11748366B2 (en) | 2015-03-23 | 2023-09-05 | Dropbox, Inc. | Shared folder backed integrated workspaces |
US11567958B2 (en) | 2015-03-23 | 2023-01-31 | Dropbox, Inc. | Content item templates |
US11354328B2 (en) | 2015-03-23 | 2022-06-07 | Dropbox, Inc. | Shared folder backed integrated workspaces |
US11347762B2 (en) | 2015-03-23 | 2022-05-31 | Dropbox, Inc. | Intelligent scrolling in shared folder back integrated workspaces |
US11016987B2 (en) | 2015-03-23 | 2021-05-25 | Dropbox, Inc. | Shared folder backed integrated workspaces |
US10997189B2 (en) | 2015-03-23 | 2021-05-04 | Dropbox, Inc. | Processing conversation attachments in shared folder backed integrated workspaces |
US11816128B2 (en) | 2015-12-22 | 2023-11-14 | Dropbox, Inc. | Managing content across discrete systems |
US10942944B2 (en) | 2015-12-22 | 2021-03-09 | Dropbox, Inc. | Managing content across discrete systems |
US10719807B2 (en) | 2016-12-29 | 2020-07-21 | Dropbox, Inc. | Managing projects using references |
US10970679B2 (en) | 2016-12-29 | 2021-04-06 | Dropbox, Inc. | Presenting project data managed by a content management system |
US10970656B2 (en) | 2016-12-29 | 2021-04-06 | Dropbox, Inc. | Automatically suggesting project affiliations |
US10776755B2 (en) | 2016-12-29 | 2020-09-15 | Dropbox, Inc. | Creating projects in a content management system |
US10402786B2 (en) * | 2016-12-30 | 2019-09-03 | Dropbox, Inc. | Managing projects in a content management system |
US11017354B2 (en) | 2016-12-30 | 2021-05-25 | Dropbox, Inc. | Managing projects in a content management system |
US11900324B2 (en) | 2016-12-30 | 2024-02-13 | Dropbox, Inc. | Managing projects in a content management system |
US11226939B2 (en) | 2017-12-29 | 2022-01-18 | Dropbox, Inc. | Synchronizing changes within a collaborative content management system |
US10929349B2 (en) | 2018-11-06 | 2021-02-23 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
US11194767B2 (en) | 2018-11-06 | 2021-12-07 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
US11194766B2 (en) | 2018-11-06 | 2021-12-07 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
US11593314B2 (en) | 2018-11-06 | 2023-02-28 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
US11100053B2 (en) | 2018-11-06 | 2021-08-24 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
US10896154B2 (en) | 2018-11-06 | 2021-01-19 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
US10838925B2 (en) | 2018-11-06 | 2020-11-17 | Dropbox, Inc. | Technologies for integrating cloud content items across platforms |
Also Published As
Publication number | Publication date |
---|---|
US10686664B1 (en) | 2020-06-16 |
US20200304374A1 (en) | 2020-09-24 |
US9288266B1 (en) | 2016-03-15 |
US11146635B2 (en) | 2021-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11463442B2 (en) | Method and apparatus for information exchange over a web based environment | |
US20170123608A1 (en) | Method and Apparatus For Information exchange Over a Web Based Environment | |
US10484455B2 (en) | Method and apparatus for information exchange over a web based environment | |
US20120079389A1 (en) | Method and Apparatus For Information Exchange Over a Web Based Environment | |
WO2007123785A2 (en) | Method and apparatus for information exchange over a web based environment | |
US20150095799A1 (en) | Method and Apparatus For Information Exchange Over a Web Based Environment | |
US7945652B2 (en) | Display multi-layers list item in web-browser with supporting of concurrent multi-users | |
US20110066948A1 (en) | Method and apparatus for accessing and managing a multi-layered virtual server by deploying web folder tree | |
US9390094B2 (en) | Method and system for displaying and operating multi-layers item list in web-browser with supporting of concurrent multi-users | |
US20100242099A1 (en) | Method and apparatus of UI design for web-based computer user working environment | |
US20240098136A1 (en) | Method and Apparatus For Information exchange Over a Web Based Environment | |
US11533365B2 (en) | System and method for displaying and operating multi-layered item list in web browser with supporting of concurrent users | |
Kumar et al. | Collaborative Engineering Portal. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |