WO2001071638A1 - An internet storage service system and method - Google Patents

An internet storage service system and method Download PDF

Info

Publication number
WO2001071638A1
WO2001071638A1 PCT/KR2001/000365 KR0100365W WO0171638A1 WO 2001071638 A1 WO2001071638 A1 WO 2001071638A1 KR 0100365 W KR0100365 W KR 0100365W WO 0171638 A1 WO0171638 A1 WO 0171638A1
Authority
WO
WIPO (PCT)
Prior art keywords
subscriber
file
data
information
server
Prior art date
Application number
PCT/KR2001/000365
Other languages
French (fr)
Inventor
Sung-Young Chun
Original Assignee
Zoi Net Co.,Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zoi Net Co.,Ltd filed Critical Zoi Net Co.,Ltd
Priority to AU41234/01A priority Critical patent/AU4123401A/en
Priority to JP2001569740A priority patent/JP2003528399A/en
Publication of WO2001071638A1 publication Critical patent/WO2001071638A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Definitions

  • This invention relates to an Internet storage service system and, more
  • subscriber can be stored, backed up and restored and in which a subscriber can
  • a conventional computer backup system merely provides a backup
  • the backup data can be interchanged between
  • accesses may occur within the storage device at the same time, and a computer virus
  • a computer virus protection program can only protect the system
  • the protection program must be updated as frequently as
  • TCP/IP Transfer Protocol
  • Control Protocol / Internet Protocol
  • the Internet provides several layers of access to remote
  • a news layer provides various news and the information typically relates to
  • computers such as a new virus, latest information on an upcoming system or a
  • Telnet is used to provide remote login to other remote systems
  • NFS Network File System
  • RFS Remote File System
  • FTP File Transfer Protocol
  • PPC is also used to provide
  • remote system to be defined by the Internet with a node and assigns a unique address
  • NFS and RFS can utilize
  • a LAN Local Area Network
  • a LAN or WAN Wide Area Network
  • interconnect computers provides more efficient and faster means for data transfer than
  • a LAN can improve business
  • the file server processes
  • the user computer has
  • user computer can . store the document locally, that is on hard disk of the user's
  • a critical problem with a LAN is that a user can directly access resources of a
  • a computer virus is a special kind of computer
  • viruses could be fatal to the computer while other viruses are less harmful.
  • anti-virus software can only protect against the specific types of viruses the software is
  • Internet storage service system provides the storage device in which the users' data are
  • the subscriber's data are kept and managed automatically or manually.
  • the data file is compressed and
  • FIG. 1 is a block diagram of the conventional Internet storage
  • an on-line service system 100 includes: an on-line service system 100; user computer 50; and a public communication
  • the on-line service system 100 consists of: a host computer 104,
  • IBM AS/400 having at least one main processor 106; a main memory device 108
  • a communication controller 112 coupled to the main
  • processor 106 for controlling a printer 114; and a peripheral device controller 110 for controlling a printer 114; and a peripheral device controller 110 for controlling a printer 114; and a peripheral device controller 110 for controlling a printer 114; and a peripheral device controller 110 for controlling a printer 114; and a peripheral device controller 110 for controlling a printer 114; and a peripheral device controller 110 for controlling a printer 114; and a peripheral device controller 110 for controlling a
  • remote large disk storage device 116 and other large capacity storage devices 118 such as
  • a subscriber private disk 164 for use in storing
  • a subscriber's private service computer 160 for storing and
  • public communication network 150 utilizes a public data network such as ISDN
  • the user computer 50 may be a
  • the virtual disk drive is set-up on the on-line service system 100 which
  • the fixed capacity is allocated on the on-line service system 100, which is then set-up
  • the subscriber's data are stored on the allocated virtual disk
  • the conventional Internet storage service system is not a method in
  • remote computer is set-up as the virtual disk drive which is considered as part of the
  • the present invention to provide a method and an apparatus in which the backup and the
  • a new version of a virus prevention program is updated by checking the version of the virus prevention program when the subscriber logs in and the data file is
  • server software a network array device for storing the subscriber backup data
  • a main control server for performing the subscriber certification process
  • a data backup device for storing the subscriber's data.
  • a web server placed with the main control server or separately for running homepages for advertisement purposes
  • Fig. 1 is a block diagram for the Internet storage service system related to the
  • Fig. 2 is a block diagram for the Internet storage service system related to this
  • Fig. 3 is a flow diagram of the overall operation for the Internet storage service
  • Fig. 4 is a block diagram for the process structure of the operation of the
  • Fig. 5 is a block diagram of the user module program of Fig. 4.
  • Fig. 6 is a block diagram of the main control server process of Fig. 4.
  • Fig. 7 is a block diagram of the service server process of Fig. 4.
  • Fig. 8 is a block diagram of the system management process of Fig. 4.
  • Fig. 9 is a block diagram of the CD-ROM making process of Fig. 4.
  • Fig. 10 is a block diagram of the Billing process of Fig. 4.
  • Fig. 11 is a block diagram of the subscriber compensation process of Fig. 4.
  • Fig. 12 is a flowchart of the overall operation of the Internet storage service
  • Fig. 13 is a flowchart of the subscriber registration operation of Fig. 12.
  • Fig. 14 is a flowchart of the subscriber login operation of Fig. 12.
  • Fig. 15 is a flowchart of the communication cryptograph operation of Fig. 12.
  • Fig. 16 is a flowchart of the data backup operation of Fig. 12 for storing the
  • Fig. 17 is a flowchart of the data restoring operation of Fig. 12 for restoring the
  • Fig. 18 is a flowchart of the verification operation of Fig. 12 for the subscriber
  • Fig. 19 is a flowchart of the recoding information operation of Fig. 12 for the
  • Fig. 20 is a flowchart of the storing operation of Fig. 12 for storing the
  • Fig. 21 is a flowchart of the scheduling operation of Fig. 12.
  • Fig. 22 is a flowchart of the subscriber information modification operation of Fig.
  • Fig. 23 is a flowchart of the virus checking operation of Fig. 12.
  • Fig. 24 is a flowchart of the subscriber compensation operation of Fig. 12.
  • Fig. 25 is a block diagram of the database structure for the Internet storage
  • Fig 26 is a block diagram of the input specification database for the main control
  • Fig. 27 is a block diagram of the output specification database for the main
  • Fig. 28 is a block diagram of the input specification database for the service
  • Fig. 29 is a block diagram of the output specification database for the service
  • Fig. 30 is a block diagram of the input specification database for the system
  • Fig. 31 is a block diagram of the output specification database for the system
  • Fig. 32 is a block diagram of the subscriber information database of Fig. 25.
  • Fig. 33 is a block diagram of the log-in information database of Fig. 25.
  • Fig. 34 is a block diagram of the subscriber backup file information of the
  • the Internet storage service system related to this invention has a Web version
  • JAVA that uses JAVA, ASP, and CGI, and comprises a user and server program; a control
  • the communication server is appropriately distributed to the subscriber; and a service
  • the storage device may be organized in the
  • the stored data may be backed up on the NFS server or the disk array.
  • the stored data may be backed up on the NFS server or the disk array.
  • off-line storage media such as magnetic tape connected to the network.
  • Fig. 2 is an overall block diagram of the Internet storage service system of this
  • Fig. 3 is a flowchart of the overall operation of the Internet storage
  • service system comprises a main control server 200 for performing subscriber
  • system in accordance with the present invention further comprises: an automatic
  • response service processing device 230 which is installed at the front portion of the
  • a network array device 240 which is the data storage device used in a LAN for storing the
  • a service server 250 comprising the N-machines arranged in
  • the conventional system comprises a main control server 200, a data
  • the main control server 200 is different in the present invention. That is, the main control server 200
  • server 200 checks the status of the service server 250 and provides the connecting
  • the main control server 200 searches the subscriber
  • the login information is recorded on the system management device 260 and the
  • the certification information is returned to the subscriber.
  • the certification information is
  • the main control server 200 provides the
  • the operating system of the main control server 200 in the preferred embodiment is the operating system of the main control server 200 in the preferred embodiment
  • the operating system of the main control server 200 may use UNIX or LINUX.
  • the hard-disk capacity of the main control server 200 is described hereinafter.
  • the hard-disk capacity of the main control server 200 equals the size of the operating
  • the data backup device 210 of the conventional system uses disk or magnetic
  • the present invention uses the network array 240.
  • the present invention uses the network array 240.
  • the data backup device 210 is used as the storage space of the subscriber
  • the subscriber's data are
  • capacity of the network array 240 is set up according to the following formula: capacity
  • the Web server 220 is used to start the Homepage for the public information and
  • the Web server 220 may either be constructed apart from the main control server
  • the automatic response service processing device 230 supports TCP/IP
  • front portion of the Internet storage service system of the present invention and operates independently from the software of the main control server 200.
  • the service server 250 is organized as N-machines arranged in parallel, and
  • the service server 250 also performs the confirmation
  • the service server When the subscriber requests backup information, the service server
  • the operating system of the service server 250 may use the Windows
  • server 250 is set up as the size of the operating system plus the size of the processing
  • the system management device 260 performs the subscriber registration and
  • the system management device 260 also searches and manages
  • system log information individually, and performs the operation of storing the
  • backup data to the storage device such as a floppy disk, a CD-ROM or magnetic tape.
  • the first method is storing with the preservation
  • the second method is storing on the CD-ROM or
  • Fig. 3 is a flowchart illustrating the overall operation process of the Internet storage service system in accordance with the present invention. As illustrated in Fig.
  • the first step is the request made by the subscriber for the connection onto the main
  • control server 200 via the Internet or the telephone (step 310).
  • server 200 transfers the public key to the subscriber when it receives the subscriber's
  • the main control server conducts the verification process of the subscriber
  • the main control server transfers the file list stored on the main control server
  • the subscriber refers to the file list transferred from the main control server
  • the request signal is transmitted and then the restored file list is
  • the main control server 200 transfers to the main control server 200 (step 319).
  • the main control server 200 controls the main control server 200
  • control server 200 (step 322) which then removes the file stored in the main control server 200 and then transfers the deleted file list back to the subscriber (step 323).
  • Fig. 11 is described hereinafter.
  • Fig. 4 is a block diagram of the operation of the
  • the Internet storage service system according to the present invention.
  • storage service system further comprises: a main control server for performing the
  • a data backup device for storing the subscriber's
  • the user module program 410 as illustrated in Fig. 5, comprises: a subscriber
  • the data backup storing process 520 includes the
  • the main control server process comprises-' a subscriber
  • management process 610 for processing the subscriber certification and the subscriber registration procedures, and managing the version of the user module program used by
  • the subscriber management process 610 distributes management of the load by
  • the service server process 430 includes the following
  • the file transfer control process comprises: a subscriber confirmation process for
  • an IP address filtering process for extracting the
  • IP address of the subscriber in order to restrict the subscriber's function
  • FTP File Transfer Protocol
  • the file storage management process 720 as illustrated in Fig. 7, comprises: an index part which includes the file list information of the subscriber and the file
  • the system management process 440 as illustrated in Fig. 8 comprises: a system
  • system monitoring process 820 for monitoring the subscriber's status; a system log
  • a media specification process 840 for selecting the general media such as
  • a PC media to store the backup data
  • a subscriber status monitoring process 850 for
  • the CD-ROM making process 450 is performed manually by
  • the CD-ROM making process may be performed through the backup
  • the recording media such as CD-ROM or diskette type media, based on a request by the recording media
  • the Billing process 460 as referred to in Fig. 10, organizes the fee charge
  • the subscriber compensation process 470 accesses the
  • Fig. 12 is a flowchart of the overall operation of the Internet storage service
  • the subscriber login is checked (step 1240), and if the login subscriber is a new
  • step 1241 whereas if the login subscriber is not a new subscriber, then the Internet
  • the communication coding operation is performed in order to transfer the
  • step 1211 for selecting the storage method of the subscriber data file; selecting the schedule specification (step 1212) for determining the storage schedule of
  • step 1205 the perusal step (step 1206) for storing/retrieving lists and the downloading step
  • step 1207 For downloading the latest storing information (step 1207) are individually performed
  • step (step 1221) is performed. Then, the status of the subscriber connection is
  • control server 200 via the Internet (step 1303). And, if the connection to the main
  • control server 200 fails, the main control server 200 transfers a message indicating the
  • the subscriber ID transferred to the main control server 200 is checked to
  • step 1305) determine whether the ID has been used twice at the same time. In event
  • step 1301 is performed again.
  • step 1309 a message indicating that the registration is complete is transferred to
  • the group is not recorded on the network array 240 so
  • the service server 250 is equipped with the path to obtain a list of users within the group when the subscriber requests a file list.
  • the main control server 200 so that the necessary information may be obtained from the
  • step (step 1201) and the confirmation process (step 1202) are performed.
  • the subscriber inputs the security key or the certification key (step 1403).
  • step 1404 to verify the inputted subscriber ID and password (step 1405).
  • step 1401 is repeated. If the inputted subscriber ID and password
  • control server 200 manages the login status of the subscriber and the information of the
  • main control server 200 is shared with the service server 250 through the shared
  • the IP address of the subscriber is stored for use in the IP address filtering and
  • the service server 250 grants the subscriber access authority, then the service server
  • the service server 250 denies the subscriber access authority, then a report packet
  • step 1201 and step 1202 After the certification process and the confirmation process for the subscriber is conducted in step 1201 and step 1202, the communication coding operation for the file
  • the subscriber and the main control server 200 use a defined DES key the first
  • step 1501 time the subscriber signs on to the system to transfer a coded data file.
  • the main control server 200 creates a private key and a public key for communication
  • control server 200 transfers the public key encoded using the DES key to the subscriber
  • step 1503 The subscriber who receives the transmitted public key creates a session
  • step 1504 The subscriber then transfers the session key to the main control
  • the main control server 200 after encoding it using the public key (step 1505).
  • the main control server 200 After encoding it using the public key (step 1505).
  • the session key generated in step 1502 is initially obtained by the main control
  • service server 250 can use the session key in order to provide actual service.
  • main control server 200 transfers the public key coded by the DES key to the
  • the subscriber in order to receive the session key.
  • the subscriber decodes the coded
  • the main control server 200 generates a communication packet to the subscriber using the session key received from the
  • the main control server 200 is not used.
  • the data storing procedure (step 1204) is performed when
  • the subscriber requests the backup of the data file to the service server 250.
  • step 1204 when the subscriber requests backup of
  • the service server 250 receives and analyzes the corresponding
  • server 250 verifies the size of the backup data file based on the information analyzed in
  • step 1601 (step 1602).
  • the service server compares the file transferred by the subscriber to the file lists
  • the subscriber file is stored on the network array 240 (step 1606).
  • step 1607 the over-write of the file is determined before storing.
  • network array 240 is extracted (step 1608), and it is analyzed to determine whether the
  • step 1601 is repeated. If the size of the backup data file does not exceed the permitted
  • step 1612 event that a computer virus is discovered.
  • step 1205 The following is the data-restoring step (step 1205), as illustrated in Fig. 17.
  • the service server 250 checks the file size (step 1702) to determine
  • the service server 250 transmits the file to the subscriber (step 1704).
  • step 1707 the process of checking whether the same file as the received file exists on the subscriber computer is performed. If the received file is the same as a file
  • step 1708 If the subscriber decides not to overwrite the existing file, then
  • the file received is designated to another folder within the subscriber's computer (step
  • the file is stored on the office computer and it is restored on the home
  • step 1206 The subscriber transfers the date when the
  • Fig. 19 performs as follows.
  • the subscriber requests the transfer of the storing file list from the service server 250 (step 1901), and then the storing file list is
  • the service is finished. If it does exist, then the file is opened (step 1905), and the file
  • step 2002 If the file exists, then the corresponding file is opened (step 2002) and encoded
  • step 2003 Thereafter, the storing function specifications, such as the maximum
  • step 2006 may be modified by the subscriber if needed (step 2006) and then encoded using the
  • the scheduling function setup (step 1212) is conducted in the
  • the user information change function setup (step 1213) is
  • the modified subscriber information is
  • the virus checking function setup (step 1214), as referred to in Fig. 23, is
  • the damage compensation function setup (step 1221), as illustrated in Fig. 24, is
  • the service server 250 transfers the
  • the service server 250 compares the date the subscriber's data file was stored to the
  • the service server 250 checks whether the subscriber reporting the data loss or damage is a paying subscriber (step 2405) to determine
  • the value of the data file is estimated (step 2407)
  • control server process 420 an output database 2502 of the main control server process
  • subscriber request information that includes
  • subscriber database subscriber certification request information to verify the subscriber as registered by searching the subscriber database", a comparison between
  • the output database 2502 of the main control service server process 420 as
  • Fig. 27 comprises the following items: a security key to transfer the public
  • log-in time log-in time
  • user program file for modifying the user program
  • subscriber is the certified subscriber through the main control server 200; a function for
  • FTP FTP or MODEM
  • a function for requesting the information of the restored file a
  • the output database 2504 of the service server process 430 as illustrated in Fig.
  • the input database 2505 of the system management process 440 as illustrated in
  • Fig. 30, comprises: a system specification part including information for IP address filtering and the scope of IP address accessibility for limiting the accessibility at the
  • a media storage part for storing on the media the data information, such as a
  • the output database 2506 of the system management process 440 as illustrated
  • Fig. 31 comprises: a system monitoring part for managing overall subscribers or the
  • Fig. 32 comprises: an initial sign-up date; an IP address at
  • the position information of the network array 240 is left blank at the time of the registration.
  • the login information database 2508 having the login information, as illustrated in
  • Fig. 33 comprises: a connection time for confirmation or recertification of the
  • the login information database 2508 is composed of a SAM (Sequential Access
  • index directory on the network array 240 below the index directory on the network array 240, and the index file has the same file
  • the index file name and the name of the directory storing the data file are identical to the subscriber ID.
  • the group information for the group is obtained by searching the subscriber
  • the group file information is generated by adding the
  • the service server grants the name of the backup data file in order to
  • the backup file name is made up of 'ID name +
  • the first 'MM' represents the month
  • 'DD' represents the date
  • the data of the users PDA is damaged, it provides the method to manage the users data
  • Fig. 36 That is, the telephone number, the address book,
  • PIMS Personal Information Management System
  • the users general file such as document file and the text file can be stored.
  • the Internet storage service according to this invention provides the method so
  • the Internet storage service according to this invention provides the method to
  • This method provides the function to transmit the information to the many users,
  • the Internet storage service according to this mvention provides the method that
  • the users voice information can be managed. That is, the users can store the voice
  • the Billing process 460 as described above provides the Internet billing service by using the receipts method not using the bankbook or the
  • bankbook proceeds as follows : the Internet user requests the charged Internet storage
  • Billing process 460 of the Billing server 3730 performs the procedure of the
  • the credit card is verified on the receipts method verification procedure 3770, and it is

Abstract

An Internet storage service system including: a main control server for conducting subscriber certification and subscriber registration and allocating the subscriber to a service server; a data backup device for storing the subscriber"s data; a web server placed within the main control server or apart from the main server for running homepages for advertisement purposes and subscriber registration; an automatic response service system supporting TCP/IP communication via PPP for the telephone user and placed in the front portion of the system so that there is no interaction with the server software; a network array device for storing the subscriber backup data placed within the data storage device on the same LANs; a service server formed with an N-machine arranged in parallel for storing, backing up and restoring the subscriber"s data; and a system management device monitoring the system status. The Internet storage service system further includes a user module program installed on the subscriber computer; a system management process for modifying and monitoring the contents of the Internet storage service system and operating with a Billing process; a CD-ROM making process for storing the subscriber data to CD-ROM; a Billing process for managing the service fees charged to the users by managing the log-in information recorded on the server process and the subscriber database information; and a subscriber compensation process for compensating the subscriber in the event that the data become lost or damaged.

Description

AN INTERNET STORAGE SERVICE SYSTEM AND METHOD
Technical Field
This invention relates to an Internet storage service system and, more
particularly, to an Internet storage service system, in which data of a registered
subscriber can be stored, backed up and restored and in which a subscriber can
estimate the value of the subscriber's data.
Background Art
In general, a conventional computer backup system merely provides a backup
system that stores the data in the storage devices, such as a hard disk or a fixed disk, in
order to prevent data pollution, data loss and the spread of a computer virus. With the
introduction of networked systems, the backup data can be interchanged between
computers and the information also can be exchanged through storage devices such as
floppy disk and magnetic tape. With the introduction of the World Wide Web (the Web),
information can be interchanged between computers on the Internet. However, since
anyone may be able to access the information of another computer, multiple information
accesses may occur within the storage device at the same time, and a computer virus
may be propagated. A computer virus protection program can only protect the system
from the specific virus types recognized by the program. Therefore, in order to treat
the newly created viruses, the protection program must be updated as frequently as
possible which can be costly and time consuming. Moreover, the program update must
be periodically monitored.
Many users connect to the Internet by using a protocol called TCP/IP (Transfer
Control Protocol / Internet Protocol) which allows a personal computer access to information and services. The Internet provides several layers of access to remote
users. A news layer provides various news and the information typically relates to
computers, such as a new virus, latest information on an upcoming system or a
hardware product. Telnet is used to provide remote login to other remote systems
connected to the Internet. NFS (Network File System) and RFS (Remote File System)
assign a portion of the local system for use as a file system on the network. Drives of
the remote system defined using NFS and RFS are available for setup by the other
remote systems on the Internet. The FTP (File Transfer Protocol) is also available on
the Internet to access files of the remote system. PPC is also used to provide
interconnection between the remote system and the Internet, and the PPC allows a
remote system to be defined by the Internet with a node and assigns a unique address
within the Internet system to allow other remote systems to access the remote system
defined by using PPC.
One of the problems with the Internet is that the local computer can have direct
access to the resources of another computer allowing a local computer to transfer a
boot sector virus to the file system disk of the remote computer such that the remote
computer will become infected the next time it is booted. NFS and RFS can utilize
security controls by setting up a discretionary control, such as a public access setup by
the user, and a mandatory control, which is a secured access defined through system
maintained security attributes for each object on the system when allowing a local file
system to be available on the network. However, a remote user with proper
authorization still has direct access to the remote system's storage device. And, thus it
is still possible to transport unwanted data and programs to the remote system. A LAN (Local Area Network) is another common way to interconnect computers.
Many companies now store most or all of their important data on a special shared
computer called the file server and the users access the files stored in the file server
via a high-speed data network called a LAN or WAN (Wide Area Network). A LAN
interconnects data equipment within a limited geographical area, allowing the user
computers to communicate with each other and share central resources such as printers,
data storage devices and long distance data communications. Using a LAN to
interconnect computers provides more efficient and faster means for data transfer than
the traditional file transfer methods. All users on a LAN can share resources such as
printers, data storage device, and telecommunication, thus saving the costs associated
with duplication of data and equipment. Moreover, a LAN can improve business
functions through interconnected workstations accessing E-mail and various shared
applications, such as the subscriber service inquiry. For example, when a user wants
to edit a word processing document stored in the shared file server, a user computer
sends an electronic request for the document via the LAN. The file server processes
the received request, and sends the corresponding document through the network to the
address of the electronic message server of the user computer. The user computer
then downloads the document onto its internal memory for editing. Once edited, the
user computer can . store the document locally, that is on hard disk of the user's
computer or a floppy disk, or transfer it back to the file server via the network where it
can later be restored by others.
A critical problem with a LAN is that a user can directly access resources of a
different computer. This creates the possibility that a computer virus can be transferred to a user's computer without the user's knowledge because only limited
detection capabilities are available. A computer virus is a special kind of computer
program that takes over the operation of a computer. A virus through an executable
computer program received from another computer can infect computers. Some
viruses could be fatal to the computer while other viruses are less harmful.
Nevertheless, all viruses are potentially damaging in terms of wasting computer
resources and causing all kinds of problems to the computer users. Virus protection
software can be loaded onto computers to protect them from virus infections, but this
anti-virus software can only protect against the specific types of viruses the software is
programmed to detect. Therefore, it is necessary to update the virus protection
software with the latest versions as often as possible. This can become expensive and
time consuming, and it often becomes troublesome to an administrator responsible for
updating the virus protection program regularly. However, even if the data are stored
on the backup devices using the above described method, it is still possible that the data
may be damaged or lost due to the problems that may arise while using the software,
operational mistakes by the user or computer hardware problems. Often times these
problems result from lack of understanding by the user.
As a result, an Internet storage service system is introduced as a means to
prevent the above mentioned problems by storing the important data of an individual or
a company at a remote place on the Internet or the computer network system. The
Internet storage service system provides the storage device in which the users' data are
stored away from their PCs in a remote place, and then the ID and the password are
assigned to the users. The subscriber's data are kept and managed automatically or manually. In the Internet storage service system, the data file is compressed and
transmitted in a specific form on the Internet in order to improve the transmission
efficiency. A cryptographic secret key and an encoding operation on the subscriber's
data is performed in order to protect the subscriber's data file.
An example of the conventional method as described above is illustrated in US
Patent No. 5,771,354. Fig. 1 is a block diagram of the conventional Internet storage
service system according to the teachings of US Patent No. 5,771,354. The Internet
storage service system according to the US Patent No. 5,771,354, as illustrated in Fig. 1,
includes: an on-line service system 100; user computer 50; and a public communication
network 150 for transmitting the data between the on-line service system 100 and the
user computer 50. The on-line service system 100 consists of: a host computer 104,
such as IBM AS/400 having at least one main processor 106; a main memory device 108
for storing the temporary data; a communication controller 112 coupled to the main
processor 106; a printer 114; and a peripheral device controller 110 for controlling a
remote large disk storage device 116 and other large capacity storage devices 118 such
as tape for storing the subscriber's data; a subscriber private disk 164 for use in storing
the subscriber data; a subscriber's private service computer 160 for storing and
operating on the subscriber's data; and a modem 102, 162 for transmitting the data to
the user computer 50 via the public communication network 150. The above described
public communication network 150 utilizes a public data network such as ISDN
(Integrated Service Data Network) or X.25 and LANs. The user computer 50 may be a
personal computer having a modem 80 which is used for transmitting the subscriber
data to the on-line service system 100 via the public communication network 150. In the conventional Internet storage service system having the above-described
configuration, the virtual disk drive is set-up on the on-line service system 100 which
is then allocated to the subscriber for storing the data, and the subscriber data is stored
on the virtual disk drive using the user computer 50. That is, the memory space with
the fixed capacity is allocated on the on-line service system 100, which is then set-up
as the virtual disk drive. The subscriber's data are stored on the allocated virtual disk
drive through the public communication network 150. In the conventional Internet
Storage service system the virtual disk drive is considered as part of the user computer
50. Therefore, the conventional Internet storage service system is not a method in
which the subscriber's data are stored on a remote computer by using Internet or other
public communication network. The allocated memory space with a fixed space on the
remote computer is set-up as the virtual disk drive which is considered as part of the
disk drive on the subscriber's computer. As a result, the problem of accessing the
subscriber's computer from another computer still exists, and also the data file may be
subject to a computer virus. And, in the conventional Internet storage service system,
since the location of the subscriber backup data is recognized as the disk drive of the
subscriber computer, damaging or losing the subscriber's data still has not been
resolved.
Disclosure of Invention
To overcome the disadvantages in the prior art method, it is a primary object of
the present invention to provide a method and an apparatus in which the backup and the
restore operations are performed on the subscriber's data and the subscriber's group
data, and a new version of a virus prevention program is updated by checking the version of the virus prevention program when the subscriber logs in and the data file is
stored.
It is another object of the present invention to provide an optimal Internet storage
service system in which the subscriber's data can be stored by compressing and
enciphering the subscriber's data.
It is still another object of the present invention to provide a compensation system
in the event that the subscriber's data file is lost or damaged.
In order to achieve the above described objects, an Internet storage service
system is provided comprising: a main control server for conducting subscriber
certification and subscriber registration, and allocating the subscriber to a service
server; a data backup device for storing the subscriber's data; and a web server placed
within the main control server or separately from the main server for running
homepages for advertisement purposes and subscriber registration,' an automatic
response service system supporting TCP/IP communication via PPP for the telephone
user and placed in the front portion of the system so that there is no interaction with the
server software; a network array device for storing the subscriber backup data and
placed within the data storage device on the same LANs; a service server formed with
the N-machine placed in parallel for storing, backing up and restoring the certified
subscriber's data; and a system management device for monitoring the system status.
Other objects are satisfied by an Internet storage service system that further
comprises: a main control server for performing the subscriber certification process and
the subscriber registration process, and allocating the subscriber to the service server;
a data backup device for storing the subscriber's data.' a web server placed with the main control server or separately for running homepages for advertisement purposes
and subscriber registration; a user module program for installation onto the subscriber's
computer in order to use the Internet storage service system according to the present
invention; a main control server process for performing the subscriber certification
process, the subscriber registration process and distributing the usage space when a
subscriber logs in; a service server process for performing the backup operation and
the restore operation of the data file of the certified or registered subscriber; a system
management process for performing the modification and the monitoring of the contents
of the Internet storage service system, and operating with the Billing process; a CD-
ROM making process for storing the subscriber data to CD-ROM; a Billing process for
managing the service fees charged to the users by managing the log-in information
recorded on the server process and the subscriber database information, and connecting
with the system management process; and a subscriber compensation process for
compensating the subscriber in the event that the data becomes lost or damaged.
Brief Description of Drawings
Fig. 1 is a block diagram for the Internet storage service system related to the
conventional method.
Fig. 2 is a block diagram for the Internet storage service system related to this
invention.
Fig. 3 is a flow diagram of the overall operation for the Internet storage service
system related to this invention.
Fig. 4 is a block diagram for the process structure of the operation of the
Internet storage service system related to this invention. Fig. 5 is a block diagram of the user module program of Fig. 4.
Fig. 6 is a block diagram of the main control server process of Fig. 4.
Fig. 7 is a block diagram of the service server process of Fig. 4.
Fig. 8 is a block diagram of the system management process of Fig. 4.
Fig. 9 is a block diagram of the CD-ROM making process of Fig. 4.
Fig. 10 is a block diagram of the Billing process of Fig. 4.
Fig. 11 is a block diagram of the subscriber compensation process of Fig. 4.
Fig. 12 is a flowchart of the overall operation of the Internet storage service
system in accordance with this invention.
Fig. 13 is a flowchart of the subscriber registration operation of Fig. 12.
Fig. 14 is a flowchart of the subscriber login operation of Fig. 12.
Fig. 15 is a flowchart of the communication cryptograph operation of Fig. 12.
Fig. 16 is a flowchart of the data backup operation of Fig. 12 for storing the
subscriber data.
Fig. 17 is a flowchart of the data restoring operation of Fig. 12 for restoring the
subscriber data.
Fig. 18 is a flowchart of the verification operation of Fig. 12 for the subscriber
stored or restored data information.
Fig. 19 is a flowchart of the recoding information operation of Fig. 12 for the
modified data recoding information.
Fig. 20 is a flowchart of the storing operation of Fig. 12 for storing the
subscriber data.
Fig. 21 is a flowchart of the scheduling operation of Fig. 12. Fig. 22 is a flowchart of the subscriber information modification operation of Fig.
12.
Fig. 23 is a flowchart of the virus checking operation of Fig. 12.
Fig. 24 is a flowchart of the subscriber compensation operation of Fig. 12.
Fig. 25 is a block diagram of the database structure for the Internet storage
service system related to this invention.
Fig 26 is a block diagram of the input specification database for the main control
server process of Fig. 25.
Fig. 27 is a block diagram of the output specification database for the main
control server process of Fig. 25.
Fig. 28 is a block diagram of the input specification database for the service
server process of Fig. 25.
Fig. 29 is a block diagram of the output specification database for the service
server process of Fig. 25.
Fig. 30 is a block diagram of the input specification database for the system
management process of Fig. 25.
Fig. 31 is a block diagram of the output specification database for the system
management process of Fig. 25.
Fig. 32 is a block diagram of the subscriber information database of Fig. 25.
Fig. 33 is a block diagram of the log-in information database of Fig. 25.
Fig. 34 is a block diagram of the subscriber backup file information of the
Internet storage service system related to this invention. Best Mode for Carrying Out the Invention
The Internet storage service system related to this invention has a Web version
that uses JAVA, ASP, and CGI, and comprises a user and server program; a control
server in which subscriber certification and the traffic environment is analyzed and then
the communication server is appropriately distributed to the subscriber; and a service
server for managing the user's program and the subscriber's data, and transferring the
subscriber's data to the storage device. The storage device may be organized in the
form of the NFS server or the disk array. The stored data may be backed up on the
off-line storage media such as magnetic tape connected to the network. The overall
operation of the Internet storage service system in accordance with the present
invention is described hereinafter with reference to the relevant drawings
Fig. 2 is an overall block diagram of the Internet storage service system of this
invention, and Fig. 3 is a flowchart of the overall operation of the Internet storage
service system of the present invention. Referring to Fig. 2, the Internet storage
service system comprises a main control server 200 for performing subscriber
certification and registration and then distributing the subscriber to the service server; a
data backup device 210 for storing the subscriber data; and a Web server 220 for
starting the Homepage in which the service for the public information and the subscriber
registration is performed. The preferred embodiment of the Internet storage service
system in accordance with the present invention further comprises: an automatic
response service processing device 230, which is installed at the front portion of the
Internet storage service system and which is not associated with the server program,
supporting TCP/IP communication through PPP for subscribers using telephone lines; a network array device 240 which is the data storage device used in a LAN for storing the
subscriber's backup data; a service server 250 comprising the N-machines arranged in
parallel and performing the operations such as storing, backup and retrieving the
certified subscriber's data; and a system management device 260 monitoring the system
status.
Although the conventional system, comprises a main control server 200, a data
backup device 210 and a Web server 220, the construction and the function of those
devices are different in the present invention. That is, the main control server 200
performs a certification procedure when the a subscriber connects to the system by
comparing the subscriber information and the information stored in the system database,
and performs the registration of a non-certified subscriber and then records the new
subscriber information. When the registration process is completed, the main control
server 200 checks the status of the service server 250 and provides the connecting
path to the subscriber. The main control server 200 searches the subscriber
information in the database during the first certification operation of the subscriber and
then the login information is recorded on the system management device 260 and the
certification information is returned to the subscriber. The certification information is
used in the second certification operation. The main control server 200 provides the
new connecting path to the subscriber when the service server 250 is connected to the
subscriber.
The operating system of the main control server 200 in the preferred embodiment
uses the Windows NT 4.0 operating system or higher, but the operating system is not
limited to such operating system. The operating system of the main control server 200 may use UNIX or LINUX.
The hard-disk capacity of the main control server 200 is described hereinafter.
The hard-disk capacity of the main control server 200 equals the size of the operating
system plus the size of the database engine plus the number of all subscribes multiplied
5 by the size of the database per certified subscriber plus the size of the processing
module of the main control server 200.
The data backup device 210 of the conventional system uses disk or magnetic
tape whereas, the present invention uses the network array 240. In the present
invention, the data backup device 210 is used as the storage space of the subscriber
10 data, and the network array 240 which is storage space within the same LAN is used for
storing the backup of the subscriber's data. As a result, the subscriber's data are
stored in two separate places improving the protection of the subscriber's data. The
capacity of the network array 240 is set up according to the following formula: capacity
of the service server 250 multiplied by the number of service servers 250 plus the basic
15 installed capacity of the driver of the network array 240.
The Web server 220 is used to start the Homepage for the public information and
the subscriber registration. It is written using the IIS (Internet Information Server) 4.0
program or higher to run under the operating system of Windows NT 4.0 or higher.
Also, the Web server 220 may either be constructed apart from the main control server
20 200, or within the main control server 200.
The automatic response service processing device 230 supports TCP/IP
communication via PPP for the subscriber using a telephone line, and is installed in the
front portion of the Internet storage service system of the present invention and operates independently from the software of the main control server 200.
The service server 250 is organized as N-machines arranged in parallel, and
performs the backup and the retrieval of the certified subscriber data by controlling the
network array 240. Moreover, the service server 250 also performs the confirmation
of the subscriber by using the certification information provided by the main control
server 200, and acquires the IP address of the connected subscriber to restrict function
and accessibility. When the subscriber requests backup information, the service server
250 transfers the backup information along with the compressed and encrypted file to
the subscriber. The operating system of the service server 250 may use the Windows
NT 4.0 operating system or higher. The capacity of the hard-disk of the service
server 250 is set up as the size of the operating system plus the size of the processing
module of the service server 250, and the storing cycle is set up at one month.
The system management device 260 performs the subscriber registration and
cancellation procedures, the addition and deletion of subscriber data and monitors the
subscriber's status. The system management device 260 also searches and manages
the system log information individually, and performs the operation of storing the
backup data to the storage device such as a floppy disk, a CD-ROM or magnetic tape.
Since storing the backup data onto a CD-ROM or a floppy disk cannot be performed in
real time, a system manager performs the backup operation manually. There are two
methods to store the backup data. The first method is storing with the preservation
mode the same as the server data, and the second method is storing on the CD-ROM or
the floppy disk with the encoded information supported by the subscriber.
Fig. 3 is a flowchart illustrating the overall operation process of the Internet storage service system in accordance with the present invention. As illustrated in Fig.
3, the first step is the request made by the subscriber for the connection onto the main
control server 200 via the Internet or the telephone (step 310). The main control
server 200 transfers the public key to the subscriber when it receives the subscriber's
5 connection request (step 311). And then, when the subscriber receives the public key
from the main control server 200, the subscriber transfers back the session key coded
with the public key to the main control server 200 (step 312) along with the request for
subscriber certification and or registration of the subscriber information (step 313).
Thereafter, the main control server conducts the verification process of the subscriber
10 certification/registration request before granting permission to register (step 314).
The main control server transfers the file list stored on the main control server
200 to the subscriber (step 316) upon receiving the request from the subscriber (step
315). The subscriber refers to the file list transferred from the main control server
200 as a guideline for which file is to be stored on the main control server 200 (step
15 317). Before the actual file is transferred to the main control server 200, the virus
checking and the file compression/coding are performed.
When the subscriber requests retrieval of the file from the main control server
200 (step 318), the request signal is transmitted and then the restored file list is
transferred to the main control server 200 (step 319). The main control server 200
20 then transfers the file stored in the main control server 200 to the subscriber (step 320).
And, when the subscriber sends the signal requesting deletion of the file from the
main control server 200 (step 321), the deletion file list is transferred to the main
control server 200 (step 322) which then removes the file stored in the main control server 200 and then transfers the deleted file list back to the subscriber (step 323).
The overall operation of the process of the Internet storage service system in
accordance with the present invention and, as referenced by appended drawings, Fig. 4-
Fig. 11, is described hereinafter. Fig. 4 is a block diagram of the operation of the
Internet storage service system according to the present invention. The Internet
storage service system further comprises: a main control server for performing the
subscriber certification process and the subscriber registration process, and allocating
the subscriber to the service server; a data backup device for storing the subscriber's
data', a web server placed with the main control server or separately for running
homepages for advertisement purposes and subscriber registration; a user module
program for installing onto the subscriber's computer in order to use the Internet
storage service system according to the present invention; a main control server
process for performing the subscriber certification process, the subscriber registration
process and distributing the usage space when the subscriber logs in; a service server
process for performing the backup operation and the restore operation of the data file of
the certified or registered subscriber; a system management process for performing the
modification and monitoring the contents of the Internet storage service system, and
operating with the Billing process; a CD-ROM making process for storing the subscriber
data to CD-ROM; a Billing process for managing the service fees charged to the users
by managing the log-in information recorded on the server process and the subscriber
database information, and connecting with the system management process; and a
subscriber compensation process for compensating the subscriber in the event that the
data become lost or damaged. The user module program 410, as illustrated in Fig. 5, comprises: a subscriber
registration process 510 for performing subscriber registration for using the Internet
storage service system related to this invention through inputting subscriber information
such as the subscriber ID, password and security key; a data backup storing process
520 for performing the backup operation of the subscriber data; a virus protection
process 530 for performing a virus detection operation and a virus curing operation for
the subscriber data file, and the download operation of the new version of the virus-
preventing engine; a data retrieving process 540 for retrieving the stored subscriber
data; and a group management process 550 to allow sharing of the data file among the
subscribers in an identical group.
The data backup storing process 520, as illustrated in Fig. 5, includes the
following functions: an automatic backup specification function for conducting a backup
procedure for the subscriber data at a pre-set specified time; a backup recording
method having specific functions, such as storing only the newest data file, for storing
the backup file according to the date or selecting between the full backup method or the
incremental backup method; a password modification operation for changing the
subscriber's password; a backup file specification function for selecting either the disk,
the folder or the file format to back up the subscriber file; a data compression function
to compress the subscriber data file before transferring to the server in order to
increase communication efficiency; and a data code function for encoding the data file
with a security key assigned by the subscriber.
As shown in Fig. 6, the main control server process comprises-' a subscriber
management process 610 for processing the subscriber certification and the subscriber registration procedures, and managing the version of the user module program used by
the subscriber and the evaluation version of the user module program; and a database
management process 620 for managing the subscriber information database and the
subscriber data file information database.
The subscriber management process 610 distributes management of the load by
monitoring the usage status of the service server 250 and then transferring the
connected path to the subscriber.
The service server process 430, as referred to in Fig. 7, includes the following
processes: a file transfer control process 710 for controlling the receiving and
transmitting of files; and a file storage management process 720 for storing the
transmitted file from the subscriber using the proper file system.
The file transfer control process comprises: a subscriber confirmation process for
confirming the certification of the subscriber based on the certification information
provided from the main control server; an IP address filtering process for extracting the
IP address of the subscriber in order to restrict the subscriber's function and
accessibility; a file list transfer process for transferring the file list to the subscriber
when the backup information is requested; a file transfer protocol for transferring the
compressed and coded file via FTP (File Transfer Protocol); a file storing process for
storing the received file as the backup when the request is made by the subscriber; a
file comparison process for processing both the same file and a different file when the
received file is being stored; and a file deletion function for deleting the file from the
network array upon a request from the subscriber.
The file storage management process 720, as illustrated in Fig. 7, comprises: an index part which includes the file list information of the subscriber and the file
information on the network array 240, and displays the information of the data file; and
a data part in which the transmitted file from the subscriber is assigned a new name by
the service server process before it is stored on the network array 240 and the
corresponding information is recorded on the index part.
The system management process 440, as illustrated in Fig. 8 comprises: a system
setup process 810 for conducting subscriber IP address extraction, limitation of the IP
address, subscriber registration and termination and data insertion and deletion; a
system monitoring process 820 for monitoring the subscriber's status; a system log
information management process 830 for storing, classifying and deleting the system log
information; a media specification process 840 for selecting the general media, such as
a PC media, to store the backup data; a subscriber status monitoring process 850 for
monitoring the subscriber's information in real-time.' and a database management
process 860 for managing the database of the system server.
Referring to Fig. 9, the CD-ROM making process 450 is performed manually by
the manager. The CD-ROM making process may be performed through the backup
operation in the same manner as used with the server data or simply saving the data on
the recording media, such as CD-ROM or diskette type media, based on a request by the
subscriber. If a request for CD-ROM making is made, then the encoded information
must be inputted by the subscriber.
The Billing process 460, as referred to in Fig. 10, organizes the fee charge
particulars when the subscriber uses the backup service by calculating the total usage
time during the specific date, the number of the connections made, the capacity variance of the backup data, and the value of the backup data as determined by the customer to
determine the total cost for using the service.
Referring to Fig. 11, the subscriber compensation process 470 accesses the
stored log information of the lost or damaged subscriber's data from the server, and
estimates the data loss and damage and assesses the value of the lost and damaged data.
Thereafter, the evaluated amount for the lost or damaged data is reported to the
insurance company to compensate the subscriber.
The overall operation of the Internet storage service system according to the
present invention is described hereinafter with reference to Fig. 12 through Fig. 25.
Fig. 12 is a flowchart of the overall operation of the Internet storage service
system related to this invention. First, the subscriber performs the login operation in
order to use the Internet storage service system (step 1200). Thereafter the status of
the subscriber login is checked (step 1240), and if the login subscriber is a new
subscriber, then the subscriber registration operation for a new subscriber is performed
(step 1241), whereas if the login subscriber is not a new subscriber, then the Internet
storage service corresponding to the log -in subscriber is performed. The subscriber
certification process (step 1201) and the confirmation or recertification process (step
1202) are performed at the main control server 200 and the service server 250. And
then, the communication coding operation is performed in order to transfer the
subscriber's file between the subscriber and the Internet storage service system (step
1203). The environment setup (step 1210) to transfer the data file between the
subscriber and the Internet service system includes the steps of: storing the rule
specification (step 1211) for selecting the storage method of the subscriber data file; selecting the schedule specification (step 1212) for determining the storage schedule of
the subscriber data file; selecting the method for changing the information of the
registered subscriber (step 1213); and checking for the existence of the virus (step
1214).
The data storing step (step 1204), the data retrieving or restoring step (step
1205), the perusal step (step 1206) for storing/retrieving lists and the downloading step
for downloading the latest storing information (step 1207) are individually performed
based on the subscriber's request.
If the subscriber data file is lost or damaged (step 1220), a damage compensation
step (step 1221) is performed. Then, the status of the subscriber connection is
checked (step 1230) to determine whether the subscriber connection should be
terminated. If the subscriber connection is terminated, then the Internet storage
* service is ended. However, if the subscriber connection has not been terminated, then
the above-described steps may be selectively repeated according to the subscriber's
request.
The detailed operation of the Internet storage service system in accordance with
the present invention is described in detail hereinafter with reference to the relevant
drawings.
First, referring to Fig. 13 the new subscriber registration process (step 1241)
comprises the steps of: inputting the subscriber information, such as the subscriber ID,
the password and the subscriber identification number by the subscriber (step 1301);
checking the status of the subscriber identification number for possible error (step
1302); and repeating the above steps if it is determined that the subscriber identification number has an error. If it is determined that the subscriber identification number
consists of no error, then the inputted subscriber information is transferred to the main
control server 200 via the Internet (step 1303). And, if the connection to the main
control server 200 fails, the main control server 200 transfers a message indicating the
connection failure, and that message is displayed on the subscriber computer (step
1304). The subscriber ID transferred to the main control server 200 is checked to
determine whether the ID has been used twice at the same time (step 1305). In event
that there is another user using the same ID, then the step 1301 is performed again.
However, if it is determined that there is no other user with the same ID, then the
subscriber association with a specific group is checked (step 1306). If the subscriber is
associated with the specific group, then the information on the group association of the
subscriber in the group table is recorded (step 1307). Thereafter, the subscriber
information is registered on the main control server 200 (step 1308). Once the
registration process is completed, the storage space used by the subscriber is allocated
(step 1309), and a message indicating that the registration is complete is transferred to
the subscriber (step 1310).
The above-described step 1307 of recording the subscriber information in the
group table is described below.
When the backup information is being downloaded to the subscriber from the
service server 250, the group information to which the subscriber belongs is
downloaded also, and the group information is recorded on the subscriber database of
the main control server 200. The group is not recorded on the network array 240 so
that the subscriber may change groups. To obtain a list of users within the group when the subscriber requests a file list, the service server 250 is equipped with the path to
the main control server 200 so that the necessary information may be obtained from the
subscriber database.
When the login process is completed and the subscriber requests use of the
Internet storage service system of the present invention, the subscriber certification
step (step 1201) and the confirmation process (step 1202) are performed.
When the subscriber inputs the subscriber's ID and password (step 1401), the
verification process determines whether the computer used by the subscriber is the one
used when the subscriber registered for the first time (step 1402). If the computer is
not the computer which the subscriber used when the subscriber registered for the first
time, then the subscriber inputs the security key or the certification key (step 1403).
And then, the login information of the subscriber is transferred to the main control
server 200 (step 1404) to verify the inputted subscriber ID and password (step 1405).
If the verified subscriber ID or password does not match the registered information of
the subscriber, then step 1401 is repeated. If the inputted subscriber ID and password
match the registered information of the subscriber, then the computer virus protection
program used by the subscriber is checked to determine whether it is the current
version (step 1406). If the computer virus protection program used by the subscriber
is not the current version, then a request is made to download the latest version of the
virus protection program (step 1407) and the subscriber downloads the latest version of
the virus protected program from the main control server 200 (step 1408). The
subscriber login operation is completed once the service server 250 is allocated to the
subscriber. In the subscriber login step, the certification information for the subscriber
connected to the main control server 200 is used in the confirmation process in the
service server 250 performing the actual service processing. The certification
information is also used to transmit the session key defined by the certification
operation to the service server 250 from the main control server 200. The main
control server 200 manages the login status of the subscriber and the information of the
main control server 200 is shared with the service server 250 through the shared
memory of the system. The following items are shared by the main control server 200
and the service server 250 at the time the subscriber certification operation and the
confirmation operation are being performed: a connecting time; a subscriber ID; a group
name which identifies the group the subscriber belongs to; a most recent connecting
time; a coding key for the subscriber information; and a certification key for the
subscriber information.
If the confirmation process on the service server 250 is successfully completed,
the IP address of the subscriber is stored for use in the IP address filtering and
recordation functions. If the confirmation process indicates that the login by the
subscriber is not valid, then the termination message packet is transferred to the
subscriber and the connection is terminated. If the IP address filtering performed on
the service server 250 grants the subscriber access authority, then the service server
becomes ready to accept a request from the subscriber. If the IP address filtering on
the service server 250 denies the subscriber access authority, then a report packet
limiting the access authority is transferred and the connection is terminated.
After the certification process and the confirmation process for the subscriber is conducted in step 1201 and step 1202, the communication coding operation for the file
transfer between the subscriber and the service system, as illustrated in Fig. 15, is
processed in the following steps:
The subscriber and the main control server 200 use a defined DES key the first
time the subscriber signs on to the system to transfer a coded data file (step 1501).
The main control server 200 creates a private key and a public key for communication
when the subscriber connects to the main control server 200 (step 1502). The main
control server 200 transfers the public key encoded using the DES key to the subscriber
(step 1503). The subscriber who receives the transmitted public key creates a session
key (step 1504). The subscriber then transfers the session key to the main control
server 200 after encoding it using the public key (step 1505). The main control server
200 holds the session key and then uses the session key to decode the data (step 1506).
The session key generated in step 1502 is initially obtained by the main control
server 200 which then transfers the session key to the service server 250 so that the
service server 250 can use the session key in order to provide actual service.
The following provides a more detailed description of the coding procedure for
the on-line communication.
When the subscriber requests to be connected to the system for the first time, the
main control server 200 transfers the public key coded by the DES key to the
subscriber in order to receive the session key. The subscriber decodes the coded
public key with the DES key known to both the subscriber and the main control server
200, and the generated session key is transferred to the main control server 200 after
encoding it using the public key. The main control server 200 generates a communication packet to the subscriber using the session key received from the
subscriber. Since the encoding of the data file is processed by the subscriber when the
file is stored or retrieved, the main control server 200 is not used.
Once the connection between the subscriber and the Internet storage service
system is successful, the services are provided to the subscriber according to the
subscriber's request. With reference to the attached drawings, each service provided
by the Internet storage service system in accordance with the present invention is
described hereinafter.
Referring to Fig. 16, the data storing procedure (step 1204) is performed when
the subscriber requests the backup of the data file to the service server 250.
In the data storing procedure (step 1204), when the subscriber requests backup of
the data file, the service server 250 receives and analyzes the corresponding
information in the form of the communication packet (step 1601). And then, the service
server 250 verifies the size of the backup data file based on the information analyzed in
step 1601 (step 1602). When the system is ready to provide the backup service, the
transfer of the file list is requested from the subscriber (step 1603). The subscriber
transfers the designated file to the service server 250 via a communication protocol
such as ZMODEM or FTP, and the service server 250 transmits a completion message
back to the subscriber when the files are successfully received, (step 1604). At this
time, the service server compares the file transferred by the subscriber to the file lists
stored on the service server 250 (step 1605), and if modification of the file is not
necessary, then the subscriber file is stored on the network array 240 (step 1606).
However, if modification of the file is required, then the over-write of the file is determined before storing (step 1607). The file list of the subscriber stored on the
network array 240 is extracted (step 1608), and it is analyzed to determine whether the
size of the backup data file exceeds the permitted storage space granted to the
subscriber (step 1609). If the size of the backup data file exceeds the permitted
storage space, then an error message is transmitted to the subscriber (step 1610) and
step 1601 is repeated. If the size of the backup data file does not exceed the permitted
storage space, then the computer virus inspection procedure is performed on the
subscriber's file (step 1611), and any computer viruses are automatically treated in the
event that a computer virus is discovered (step 1612).
When the above steps are completed, the subscriber file is compressed (step
1613), and encoded by the security key (step 1614). And then, the coded file is
transferred to the service server 250 (step 1616) for storage on the file system of the
network array (step 1617) and the subscriber information table and the file information
table is updated (step 1618), and the storage verification message is transferred to the
subscriber (step 1619).
The following is the data-restoring step (step 1205), as illustrated in Fig. 17.
When the file to be restored is selected from the file list of the service server 250
(step 1701), the service server 250 checks the file size (step 1702) to determine
whether the restoring process is ready. Once the process is ready, the subscriber
transfers the list of the information to be restored to the service server (step 1703), and
the service server 250 transmits the file to the subscriber (step 1704). The subscriber
decodes the received file using the security key (step 1705 and step 1706). And then,
the process of checking whether the same file as the received file exists on the subscriber computer is performed (step 1707). If the received file is the same as a file
on the subscriber's computer, then the overwrite command is requested from the
subscriber (step 1708). If the subscriber decides not to overwrite the existing file, then
the file received is designated to another folder within the subscriber's computer (step
1709). And then, the file is decompressed (step 1710) and stored on the subscriber
computer (step 1711), and the restoration complete message is sent back to the service
server 250 (step 1712).
In the event that a subscriber wishes to conduct the file storing or the file
restoring at computers other than the one where the initial registration was conducted,
for example, the file is stored on the office computer and it is restored on the home
computer or another computer, then the services are provided but with a certain level of
restriction for security reasons. For example, if the limitation of IP address is set up
on the system management device 260 and the IP address of the user's computer does
not match the pre-set IP address, then the request for file restoring is rejected.
Referring to the Fig. 18, the following are the steps for the storing/restoring list
verification process (step 1206). The subscriber transfers the date when the
transaction to the service server 240 occurred (step 1801), and then the log file stored
on the subscriber computer is opened (step 1802). And then, the log file corresponding
to the date and the storing information or the restoring information is read (step 1803)
and displayed on the subscriber computer (step 1804). Finally, the log file is closed
(step 1805).
Similarly, the latest stored information download process (step 1207), as
illustrated in Fig. 19, performs as follows. The subscriber requests the transfer of the storing file list from the service server 250 (step 1901), and then the storing file list is
transferred to the subscriber (step 1902), and the information is displayed on the
subscriber computer (step 1903). And then, a determination is made as to whether the
storing list file exists on the subscriber computer (step 1904). If it does not exist, then
the service is finished. If it does exist, then the file is opened (step 1905), and the file
list is stored (step 1906), and the file is closed (step 1907).
The following are the detailed description of the setting up procedure for the on¬
line communication for transferring data between the subscriber and the service server
250.
Referring to Fig. 20, in the storing function specification setup (step 1211), the
subscriber computer is checked to determine whether a subscriber file with an ".idx"
extension exists (step 2001). If it does not exist, then an error message is displayed
and the service is ended.
If the file exists, then the corresponding file is opened (step 2002) and encoded
(step 2003). Thereafter, the storing function specifications, such as the maximum
capacity and the automatic connection time are read for the file (step 2004), and then
displayed on the subscriber computer (step 2005). The storing function specification
may be modified by the subscriber if needed (step 2006) and then encoded using the
security key (step 2007) before storing (step 2008). After completion, the file with the
storing specification is closed (step 2009).
Referring to Fig. 21, the scheduling function setup (step 1212) is conducted in the
same manner as the storing function specification setup (step 1211) except for the
modification of the information of the storing schedule. Referring to Fig. 22, the user information change function setup (step 1213) is
conducted in the same manner as the storing function specification setup (step 1211)
and the scheduling function specification process (step 1213) except for the following
steps. When the user information is modified, the modified subscriber information is
transferred to the main control server 200 (step 2208) along with a request for the
modification of the subscriber information (step 2207). The main control server
transmits the verification message for the modification of the subscriber information to
the subscriber (step 2209).
The virus checking function setup (step 1214), as referred to in Fig. 23, is
performed in the same manner as the storing specification process (step 1211) and the
schedule specification step (step 1213), except for the information on the virus checking
functions.
The damage compensation function setup (step 1221), as illustrated in Fig. 24, is
performed in the following steps. When the request for verification on the loss or the
damage of the subscriber's file is received, the service server 250 transfers the
corresponding log information to the subscriber (step 2401), and also the storage log
information for the lost or damaged data file is transferred to the subscriber (step 2402).
The service server 250 compares the date the subscriber's data file was stored to the
date indicated on the subscriber's data file (step 2403), and if two dates are the same,
then the message stating that an error has occurred on the original data file is
transferred to the subscriber (step 2404).
If the two dates are not the same, then the subscriber data file is identified as the
lost or damaged file. And then, the service server 250 checks whether the subscriber reporting the data loss or damage is a paying subscriber (step 2405) to determine
whether or not the subscriber is entitled to compensation. If the subscriber is not a
paying subscriber, then a message stating that the subscriber is not entitled to
compensation is transferred to the subscriber (step 2406). On the other hand, if the
subscriber is a paying subscriber, then the value of the data file is estimated (step 2407)
and a request for compensation is sent to the insurance office (step 2408), and then the
subscriber is compensated (step 2409).
The database structure of the Internet storage service system in accordance with
the present invention with reference to the relevant attached drawings is described
hereinafter.
Referring to Fig. 25, the database structure of the Internet storage service system
in accordance with the present invention comprises: an input database 2501 of the main
control server process 420; an output database 2502 of the main control server process
420; an input database 2503 of the service server process 430; an output database 2504
of the service server process 420; an input database 2505 of the system management
process 440; an output database 2506 of the system management process 440; a
subscriber information database 2507 for the subscriber information; and a log-in
information database 2508 for the log-in information.
Referring to the Fig. 26, input database 2501 of the main control server process
420 comprises the following items: subscriber request information that includes
information on registration and certification,' an encoded session key which is generated
using the public key,' subscriber registration request information that is recorded on the
subscriber database! subscriber certification request information to verify the subscriber as registered by searching the subscriber database", a comparison between
the version of the subscriber's data file and the data file of the service server 250; and
a modification request which requests an update of the subscriber's data file in the
event that the subscriber's data file version is lower than the data file version of the
service server 250. .
The output database 2502 of the main control service server process 420 as
illustrated in Fig. 27 comprises the following items: a security key to transfer the public
key to the subscriber after encoding with the defined DES key; certification verification
information including the log-in time, the subscriber ID, the group name and the last
log-in time; and a user program file for modifying the user program.
Referring to Fig. 28, the input database 2503 of the service server process 430
comprises: a function for verifying the status of the subscriber to check whether the
subscriber is the certified subscriber through the main control server 200; a function for
requesting the file list information for transferring the backup file list; a function for
requesting information on a file that needs to be backed up and starting the backup
process; a backup file which is actually being backed up using the transfer protocol such
as FTP or MODEM; a function for requesting the information of the restored file; a
function for requesting the information of the file to be removed; and a function for
representing the information of the file stored in the CD-ROM or the floppy diskette.
The output database 2504 of the service server process 430, as illustrated in Fig.
29, comprises file list information representing the list of the backup files.
The input database 2505 of the system management process 440, as illustrated in
Fig. 30, comprises: a system specification part including information for IP address filtering and the scope of IP address accessibility for limiting the accessibility at the
time of file backup or file restoring, and the information on the subscriber regarding
registration and termination; a system monitoring part for managing overall subscribers
or the individual subscriber per the service server 250; a system log management part
including log removal information representing the removed subscriber information, and
information for aligning the information according to the date, class or alphabetically;
and a media storage part for storing on the media the data information, such as a
subscriber ID, a password, a directory and a file name, and a data size that would be
classified into a CD-ROM or a floppy diskette.
The output database 2506 of the system management process 440, as illustrated
in Fig. 31, comprises: a system monitoring part for managing overall subscribers or the
individual subscriber per the service server 250; a system log management part having
the log information representing the information of the log file; and a media storage part
having the files that are suitable to store to the media.
The subscriber information database 2507 for recording the subscriber
information, as illustrated in Fig. 32, comprises: an initial sign-up date; an IP address at
the time of the registration; a subscriber computer name specified by the OS; a
subscriber ID; a password; a name of the office to which the subscriber belongs; a name
of the department where the subscriber works; a telephone number of the subscriber;
an E-mail address of the subscriber; an address of the subscriber; a post office number
of the subscriber; a last log-in time which changes each time the subscriber logs on; a
group to which the subscriber belongs! a comment and; position information on the
network array 240. The position information of the network array 240 is left blank at the time of the registration. When the subscriber connects for the first time, the
directory is created at the place where there is enough blank space, and the location is
recorded on the database file such that after the first connection a direct path is created
to the directory. If the subject directory does not exist, then the new directory is
created and updated on the database file accordingly.
The login information database 2508 having the login information, as illustrated in
Fig. 33, comprises: a connection time for confirmation or recertification of the
verification information; a subscriber ID for confirmation of the verification information;
a group name for confirmation of the verification information; a previous log-in time
recorded on the subscriber database; a security key', a confirmation flag; a current IP
address of the connected subscriber; subscriber capacity information for previously
stored files; modified or added backup data capacity; capacity of the downloaded data;
capacity of the data removed from the service server 250; capacity of the media
requested; the remaining space available at the time of the termination; a termination
time recorded by the service server 250; a total time for using the service', and
information on the network array 240 providing the position of the ID directory.
The login information database 2508 is composed of a SAM (Sequential Access
Method) file, not the database file.
As shown in Fig. 34, the backup file information stored with the subscriber file
associates the backup file information with the index and the data directory placed
below the backup root directory on the network array 240. The index file is placed
below the index directory on the network array 240, and the index file has the same file
name as the directory storing the data file. The index file name and the name of the directory storing the data file are identical to the subscriber ID. The index file
comprises overall path information for the original file; an original file name; a version
number of the data file which is used for verifying that the backup files are different
from each other; a backup file name,' and a SAM file composed of the information
regarding sharing status among the subscribers in same group.
The group information for the group is obtained by searching the subscriber
database of the main control server 200, and reading the file sharing information of the
subscribers in the same group. The group file information is generated by adding the
sharing file information to the index file of the subscriber, and then supplying the
generated group file information in the event that the subscriber requests the file list.
Since the actual backup file is the compressed file, and the file path is determined
internally, when it is stored on the network array 240, only the data file is stored and
not the file path. The service server grants the name of the backup data file in order to
avoid having the same file name. The backup file name is made up of 'ID name +
original file name + YYYYMMDDHHMMSS'. Wherein, 'YYYY' represents the year the
backup was created, the first 'MM' represents the month, 'DD' represents the date, 'HH'
represents the hour, the second 'MM' represents the minute, and 'SS' represents the
second. For example, if the original file name is 'NOTEPAD.EXE' and the subscriber ID
is 'BruceO', the backup file name is 'BruceO_Notepadexe_2OOOO3211OO8110 When
creating the backup file name, if the length of the original file name exceeds 20
characters, only the first 20 characters are used.
And, as shown in Fig. 35, the Internet storage service according to this invention
provides the method to store the data of the PDA (Personal Digital Assistant) users. That is, as the PDA users 3410 and 3420 stores the data storing on the users PDA to
the Internet storage service according to this invention, in case which the PDA is lost or
the data of the users PDA is damaged, it provides the method to manage the users data
in safety.
The data to be managed between the PDA and the Internet storage service according
to this invention is shown by Fig. 36. That is, the telephone number, the address book,
the users schedule, PIMS (Personal Information Management System) data as such the
memo book and the account book, E-mail contents to be received or transmitted, and
the users general file such as document file and the text file can be stored.
Also, the Internet storage service according to this invention provides the method so
as to share the data of the storage by using the sharing method as described. That is, it
provides the method so as to share the data of the storage among the sharing users
entirely or optionally. Thus, as the storage area of the data is shared, the effective
service can be provided.
Also, the Internet storage service according to this invention provides the method to
transmit the users information storing on the storage to the designated person by using
E-mail. This method provides the function to transmit the information to the many users,
and in case of the E-mail transmission, it provides the function that the designated user
can be recognized the information of the transmitted file.
And, the Internet storage service according to this mvention provides the method that
the users voice information can be managed. That is, the users can store the voice
information, and it can be transmitted to the designated users by using E-mail.
And, as shown in Fig. 37, the Billing process 460 as described above provides the Internet billing service by using the receipts method not using the bankbook or the
credit card. That is, the Billing service by using the receipts method not using the
bankbook proceeds as follows : the Internet user requests the charged Internet storage
service by using the first web server 3710 or the second web server 3720, and then it is
verified the method of the receipts not using the bankbook, and it is connected to the
Billing process 460 of the Billing server 3730, and then it performs the procedure of the
receipts verification 3740, and the users is translated to the charged waiting person, and
then after the verification of the receipts method not using the bankbook, the users is
translated to the charged subscriber 3750.
Also, as shown in Fig. 37, the Billing service by using the credit card proceeds as
follows : the Internet user requests the charged Internet storage service by using the
first web server 3710 or the second web server 3720, and then the receipts method of
the credit card is verified on the receipts method verification procedure 3770, and it is
connected to the Billing process 460 of the Billing server 3730 by the server 3760 of
the vicarious execution company, and then the users is translated to the charged
subscriber 3750.

Claims

CLAIMSWhat is claimed is:
1. An Internet storage service system comprising: a main control server for
conducting subscriber certification and subscriber registration, and allocating a
subscriber to a service server; a data backup device for storing the subscriber's data',
and a web server for running homepages for advertisement purposes and subscriber
registration; an automatic response service system for communicating with the
subscriber,' a network array device for storing the subscriber's backup data; a service
server formed with an N-machine placed in parallel for storing, backing up and restoring
the subscriber's data; and a system management device for monitoring the system status.
2. The system according to claim 1, wherein said main control server transmits a
connection path to the subscriber after a current usage status of the service server is
checked, and the subscriber is connected through said connection path.
3. The system according to claim 1, wherein said service server transfers a file
list to the subscriber when the subscriber installs a new system software.
4. The system according to claim 1, wherein a transferred data file is coded
using a DES key defined when the subscriber initially registers to transfer a coded data
file between the subscriber and the main control server, and a private key and a public
key generated by the main control server for coded communication when the subscriber
connects onto the Internet storage service system.
5. The system according to claim 4, wherein the data file is coded by using 128-
bit SEED coding algorithm.
6. The system according to claim 1, wherein a backup file name is made up of an ID name, an original file name, and YYYYMMDDHHMMSS', and wherein 'YYYY'
represents a year the backup file was created, 'MM' represents a month, 'DD' represents
a date, 'HH' represents an hour, 'MM' represents a minute, and 'SS' represents a second.
7. An Internet storage service system comprising", a main control server for
performing a subscriber certification process and a subscriber registration process, and
allocating a subscriber to a service server; a data backup device for storing the
subscriber's data; a web server for running homepages for the purpose of advertisement
and subscriber registration; a user module program installed on the subscriber's
computer in order to use the Internet storage service system," a main control server
process for performing the subscriber certification process, the subscriber registration
process and distributing usage space when the subscriber logs in', a service server
process for performing a backup operation and a restore operation of the subscriber's
data; a system management process for modifying and monitoring the contents of the
Internet storage service system, and operating with the billing process; a CD-ROM
making process for storing the subscriber data to CD-ROM; a billing process for
managing the service fees charged to the users through managing login information
recorded on the server process and subscriber database information, and connecting with
the system management process; and a subscriber compensation process for
compensating the subscriber in the event that the data become lost or damaged.
8. A system according to claim 7, wherein the main control server process
comprises-' a subscriber management process for processing the subscriber certification
and the subscriber registration processes, and managing a version of the user module
program used by the subscriber and an evaluation version of the user module program; and a database management process for managing a subscriber information database and
a subscriber data file information database.
9. The system according to claim 8, wherein the subscriber management process
downloads an upgraded version of the user module program.
10. The system according to claim 7, wherein said service server process
comprises: a file transfer control process for receiving and transmitting of the
subscriber's data files; and a file storing management process for storing the transmitted
subscriber is data.
11. The system according to claim 10, wherein said file transfer control process
comprises-' the subscriber confirmation process for confirming a certification of the
subscriber based on certification information provided from the main control server; an
IP address filtering process for extracting an IP address of the subscriber in order to
restrict the subscriber's function and accessibility', a file list transfer process for
transferring a file list to the subscriber when backup information is requested; a file
transfer protocol for transferring a compressed and coded file is via FTP (File Transfer
Protocol); a file storing process for storing a received file as a backup when a request is
made by the subscriber; a file comparison process for processing both a same file and a
different file when the received file is being stored; and a file deletion function for
deleting a file from a network array when a request is made from the subscriber.
12. The system according to claim 10, wherein said file storing management
process comprises: an index part which contains information including file list information
of the subscriber and file information on the network array, and displays information of
the data file; and a data part in which the transmitted file from the subscriber is assigned a new name by the service server process before storing on a network array and the
corresponding information is recorded on the index part.
13. The system according to claim 7, wherein said system management process
comprises: a system setup specification process for conducting subscriber IP address
extraction, limitation of the IP address, subscriber registration and termination, and the
data insertion and deletion; a system monitoring process for monitoring the subscriber's
status; a system log information management process for storing, classifying and deleting
system log information; a media specification process for selecting general media in
order to store backup data; a subscriber status monitoring process for monitoring
subscriber information for the subscriber who uses the system in real-time; and a
database management process for managing a database of the system server.
14. The system according to claim 7, wherein said billing process organizes fee
charge particulars when the subscriber uses a backup service by calculating a total usage
time for a specific date, a number of connections made, a capacity variance of backup
data, and a value of the backup data determined by the subscriber to determine the total
cost for using the service.
15. The system according to claim 7, wherein a shared memory system is used to
exchange information between the main control server process and the service server
process.
16. In an Internet storage service system, a method comprising the steps of:
performing a login operation in which a subscriber logs in to establish a connection with
the Internet storage service system; checking a status of the subscriber and if the login
subscriber is a new subscriber, then performing a new subscriber registration operation; otherwise, if the login subscriber is not a new subscriber, then performing an Internet
storage service corresponding to the login subscribers; validating the status of the
subscriber using a main control server; confirming the validation of the subscriber on a
service server; encoding a communication in order to transfer a subscriber file from the
subscriber to. the Internet storage service system', providing an environment set up for:
storing data for backing up the subscriber file upon request by the subscriber! restoring
the subscriber file upon request by the subscriber; providing a storing/restoring list when
the subscriber requests! downloading latest information of the stored subscriber's data
file upon request by the subscriber; and compensating the subscriber in the event that
the subscriber data file is lost or damaged.
17. The method according to claim 16, wherein providing an environment setup
further includes: establishing a storing rule specification process to specify a method for
storing the subscriber file; performing a schedule specification process for specifying a
storing schedule for the subscriber file; establishing a subscriber information change
process for specifying a method to change registered customer information; and
establishing a virus checking specification for checking and curing a virus contained in
the subscriber file.
18. The method according to claim 16, wherein subscriber certification
information is used to confirm the validation of the subscriber when the confirmation
operation is performed on the service server.
19. An Internet storage service system comprising: an input database of a main
control server process; an output database of a main control server process; an input
database of a service server process," an output database of a service server process; an input database of a system management process; an output database of a system
management process; a subscriber information database containing subscriber
information; and a login information database containing login information.
20. The system according to claim 19, wherein said login information database
containing login information comprises SAM (Sequential Access Method) files.
21. An Internet storage service system characterized to provide the data storage
method of the PDA users, and the type of the stored data is the telephone number, the
address book, the users schedule, PIMS (Personal Information Management System) data
as such the memo book and the account book, E-mail contents to be received or
transmitted, and the users general file such as document file and the text file.
22. An Internet storage service system characterized to provide the sharing
method that the users data is shared among the users registered the sharing function.
23. An Internet storage service system characterized to provide the method that
the users voice information can be managed. That is, the users can store the voice
information, and it can be transmitted to the designated users by using E-mail.
24. An Internet storage service system characterized to provide the method that
Internet billing service by using the receipts method not using the bankbook or the credit
card
PCT/KR2001/000365 2000-03-20 2001-03-09 An internet storage service system and method WO2001071638A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU41234/01A AU4123401A (en) 2000-03-20 2001-03-09 An internet storage service system and method
JP2001569740A JP2003528399A (en) 2000-03-20 2001-03-09 Internet personal safe service and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR2000-0014098 2000-03-20
KR1020000014098A KR20010089012A (en) 2000-03-20 2000-03-20 An Internet Safe Service System And Its Method

Publications (1)

Publication Number Publication Date
WO2001071638A1 true WO2001071638A1 (en) 2001-09-27

Family

ID=19656848

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2001/000365 WO2001071638A1 (en) 2000-03-20 2001-03-09 An internet storage service system and method

Country Status (4)

Country Link
JP (1) JP2003528399A (en)
KR (2) KR20010089012A (en)
AU (1) AU4123401A (en)
WO (1) WO2001071638A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2854090A1 (en) * 2013-09-30 2015-04-01 DeNA Co., Ltd. Server, system and method for providing service using application
US9262426B2 (en) 2006-02-17 2016-02-16 Makoto Goto File storage apparatus
CN112055075A (en) * 2020-09-02 2020-12-08 韦张恒 Internet product monitoring method, device, server and readable storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9239686B2 (en) 2003-07-22 2016-01-19 Sheng Tai (Ted) Tsao Method and apparatus for wireless devices access to external storage
JP5984151B2 (en) 2014-08-26 2016-09-06 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Data recovery method, program, and data processing system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1097483A (en) * 1996-06-07 1998-04-14 Internatl Business Mach Corp <Ibm> State storing method and device in non-state network protocol
US5771354A (en) * 1993-11-04 1998-06-23 Crawford; Christopher M. Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services
KR19990088682A (en) * 1998-05-31 1999-12-27 루센트 테크놀러지스 인크 Method for computer internet remote management of a telecommunication network element

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1011336A (en) * 1996-06-24 1998-01-16 Meidensha Corp File management system
US5794254A (en) * 1996-12-03 1998-08-11 Fairbanks Systems Group Incremental computer file backup using a two-step comparison of first two characters in the block and a signature with pre-stored character and signature sets
JPH11143907A (en) * 1997-11-14 1999-05-28 Ricoh Co Ltd File system and recording medium recording program used to the system
KR20010001954A (en) * 1999-06-10 2001-01-05 김장중 Centralized File System On Internet
KR100361160B1 (en) * 2000-01-08 2002-11-18 주식회사 그래텍 Managing system for web-based desktop service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5771354A (en) * 1993-11-04 1998-06-23 Crawford; Christopher M. Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services
US6014651A (en) * 1993-11-04 2000-01-11 Crawford; Christopher M. Commercial online software distribution systems and methods using encryption for security
JPH1097483A (en) * 1996-06-07 1998-04-14 Internatl Business Mach Corp <Ibm> State storing method and device in non-state network protocol
KR19990088682A (en) * 1998-05-31 1999-12-27 루센트 테크놀러지스 인크 Method for computer internet remote management of a telecommunication network element

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9262426B2 (en) 2006-02-17 2016-02-16 Makoto Goto File storage apparatus
EP2854090A1 (en) * 2013-09-30 2015-04-01 DeNA Co., Ltd. Server, system and method for providing service using application
CN112055075A (en) * 2020-09-02 2020-12-08 韦张恒 Internet product monitoring method, device, server and readable storage medium
CN112055075B (en) * 2020-09-02 2022-09-09 上海基玉金融信息服务股份有限公司 Internet product monitoring method, device, server and readable storage medium

Also Published As

Publication number Publication date
JP2003528399A (en) 2003-09-24
AU4123401A (en) 2001-10-03
KR20010089012A (en) 2001-09-29
KR20020010892A (en) 2002-02-06
KR100401178B1 (en) 2003-10-10

Similar Documents

Publication Publication Date Title
US6023766A (en) Software license control system and software license control equipment
US6067582A (en) System for installing information related to a software application to a remote computer over a network
US6014651A (en) Commercial online software distribution systems and methods using encryption for security
JP4039923B2 (en) Software execution management device, software execution management method, and software execution management program
RU2408069C2 (en) Coordinated authority
US20030097342A1 (en) Method for verifying employment data
US20040255143A1 (en) Data integrity
US20070033395A1 (en) Method and system for hierarchical license servers
US20030009752A1 (en) Automated content and software distribution system
US6633978B1 (en) Method and apparatus for restoring computer resources
US20040128551A1 (en) Remote feature activation authentication file system
CA2223565A1 (en) System and method for access control for data storage media
US20070283346A1 (en) System and method for remote management and facilitating installation and registration of software
WO1998016034A1 (en) Secured electronic information delivery system having a three-tier structure
JP2001067135A (en) Prevention against illegal usage of function work in electric communication system
CN104603740A (en) Archival data identification
WO2001025914A2 (en) Operations architectures for netcentric computing systems
US20020007347A1 (en) Secured electronic information delivery system having a metering device
CN105391689A (en) Phishing notification service
JP3660274B2 (en) Method and system for automatically tracking certificate genealogy
US8850563B2 (en) Portable computer accounts
US20060031927A1 (en) Information management system, information management method, and system control apparatus
JP4109470B2 (en) Digital certificate management method, digital certificate distribution server, digital certificate transmission client, digital certificate management program, and recording medium
WO2001071638A1 (en) An internet storage service system and method
JP2005038124A (en) File access control method and control system

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 1020017010292

Country of ref document: KR

Ref document number: 1020017010324

Country of ref document: KR

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2001 569740

Kind code of ref document: A

Format of ref document f/p: F

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWP Wipo information: published in national office

Ref document number: 1020017010324

Country of ref document: KR

WWR Wipo information: refused in national office

Ref document number: 1020017010292

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1020017010292

Country of ref document: KR

122 Ep: pct application non-entry in european phase
WWG Wipo information: grant in national office

Ref document number: 1020017010324

Country of ref document: KR