WO1999022332A1 - A system and method for acquiring remote programs for performing a task - Google Patents

A system and method for acquiring remote programs for performing a task Download PDF

Info

Publication number
WO1999022332A1
WO1999022332A1 PCT/US1998/022581 US9822581W WO9922332A1 WO 1999022332 A1 WO1999022332 A1 WO 1999022332A1 US 9822581 W US9822581 W US 9822581W WO 9922332 A1 WO9922332 A1 WO 9922332A1
Authority
WO
WIPO (PCT)
Prior art keywords
application servers
client computer
public network
requests
applications
Prior art date
Application number
PCT/US1998/022581
Other languages
French (fr)
Inventor
Ravi Shah
Hilla Pedramparsi
Original Assignee
Interdesign Hdl
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdesign Hdl filed Critical Interdesign Hdl
Priority to AU11991/99A priority Critical patent/AU1199199A/en
Publication of WO1999022332A1 publication Critical patent/WO1999022332A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • the present invention relates to acquiring remote data and program and more particularly to a method and system which securely selects, configures and accesses computing resources and applications required to perform a given task.
  • the Internet provides a cost-effective network delivery mechanism to virtually any point in the world, and readily facilitates communications and the sharing of information between those points; in fact, if properly used, it is essentially a virtual network.
  • a design file could be sent to personnel or outside contract/consulting firms, but what if they do not use the same design tools? It is cost prohibitive to purchase a copy of a tool for everyone involved, and in fact may be cost prohibitive for the firm to purchase a single copy, if the firm is a small one (or perhaps a startup). Even if the tools unique to the task at hand can be provided, how is licensing addressed? Where is the data stored? Who manages the server (s)? How is access to tools and data authorized, tracked and managed? How does the firm accurately track the expenses incurred in providing and managing these tools?
  • An architecture in accordance with the present invention allows users, from the World Wide Web (WWW), the ability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task.
  • the result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely.
  • the architecture comprises a universally available network (the Internet), servers which are proprietary and owned by third parties (Citrix Winframe and ICA), and the concept of allowing the user to actually build a business object specifically suited to their needs, which in turn is physically represented by and accessible through a programrnaticaHy-generated Web page.
  • Figure 1 is a block diagram of an architecture in accordance with the present invention for acquiring data.
  • the present invention relates to an improvement in acquiring remote data and program.
  • the following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements.
  • Various modifications to the preferred embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments.
  • the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.
  • FIG. 1 is a block diagram of an architecture 100 in accordance with the present invention for acquiring data.
  • the architecture comprises: a Network delivery mechanism 102 such as the Internet;
  • Client-side computer 104 including a Java-capable browser 104;
  • Server-side Java object request broker (ORB) 106 capable of providing object services such as (but certainly not limited to) security, transactions, relationships and licensing.
  • Client-side Java applets 108 capable of communicating with an ORB 106.
  • Request processor 110 capable of programmatically, in response to client-side requests from users, constructing dynamically extensible business objects that incorporate the required object services, and provide access to computing resources and applications unique to the user task at hand.
  • the request processor 110 is also capable of displaying user-selected applications back to client-side platform.
  • the server objects 112 are capable of ensuring availability of, configuration of, extensibility of, automatic administration of, and ultimately providing access to, the computing resources and application unique to the user task at hand.
  • the server objects 112 are also capable of providing access control, user authentication, auditing, tracking, database and billing services.
  • a plurality of application servers 114 providing a plurality of application resources.
  • Network delivery mechanism 102 using the Internet, for example, as a network delivery mechanism provides universal access.
  • the Internet is available
  • Client-side Java-capable WWW browser 104 this provides a key characteristic of the present invention: a universally used cross-platform client application such as Netscape or Internet Explorer. Web browsers of this type are available on virtually every computing platform, and are now moving into network computers (i.e. the oracle NC), "network appliances", smart phones, television (i.e. Web-TV) and a variety of other specialized and embedded applications.
  • Server-side Java Object Request Broker (ORB) 106 is server- side middleware that provides a number of services and inter-object communication capabilities that are fundamental to the concept of allowing users to select, configure and access the unique computing resources and applications required to perform a given task.
  • ORB Java Object Request Broker
  • This business object is dynamically extensible, and is comprised of a number of other objects, some of which are ORB 106 services, and some of which are server-side objects.
  • the ORB 106 provides access to its internal services such as (but certainly not limited to) security, transactions, relationships and licensing, provides access to external server-side objects, and provides inter-object communication.
  • Client-side Java applets 108 these applets supply the user interface, and give the user the capability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. What differentiates these applets from a standard downloadable applet is that they provide this functionality by communicating with an ORB 106. While they give the appearance of performing all functionality on the client-side, the work is actually perfomed on the server-side, by direct communication with the ORB 106, remote server-object method invocation, or a combination thereof.
  • Request processor 110 capable of constructing business objects: when a user defines their "toolset", a business object is built that is specifically suited to the user's needs.
  • This business object can, for example, manifest itself as the Web page (and Java applets contained therein) through which the user gains access to the computing resources and applications unique to their task.
  • the server-side Java applications In order to "build" this business object for the user, the server-side Java applications must perform (but are not limited to) the following functions:
  • ASIC design The end purpose of the processor is to give users access to the computing resources and applications unique to a given task (i.e. ASIC design). These applications are numerous in number, and may be native to a specific (MS-Windows) platform or entirely generic (Java). The key is that the application does not permanently reside on the client, and therefore must be supplied by a server.
  • a system and method in accordance with the present invention provides the following types of application servers:
  • Citrix Winframe servers these servers allow for the remote display of Windows95 and WindowsNT applications on independent computing architecture (ICA)-enabled clients.
  • ICA is a proprietary protocol similar in concept to Windows. It requires a thin-client to be executing on the client platform in order to receive, interpret and display Windows GUI graphic objects.
  • the thin client may be a Java or non-Java version.
  • the ICA protocol also provides for end-to-end encryption of the ICA data stream.
  • Java Servers these servers will allow for the downloading of applications written entirely in Java. Like the ICA protocol, these servers will provide for end-to- end encryption of the Java data stream.
  • Server objects 112 capable of providing computing resources and applications part of the user business object comprises other objects which represent the computing resources and applications the user has selected. These objects in turn must be intelligent enough to convey to the user the information needed in order to make informed choices about the way they construct their business object; this information includes (but is not limited to) the following with respect to applications and resources:
  • Server-side Java objects 112 capable of providing access control and administrative services: part of the user business object consists of other objects which represent the access control and administrative services the user has selected.
  • An architecture in accordance with the present invention allows users, from the World Wide Web (WWW), the ability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task.
  • the result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely.
  • the architecture comprises a universally available network (the Internet), servers which are proprietary and owned by third parties (Citrix Winframe and ICA), and the concept of allowing the user to actually build a business object specifically suited to their needs, which in turn is physically represented by and accessible through a programmatically-generated Web page.

Abstract

An architecture in accordance with the present invention allows users (104), from the World Wide Web (WWW) (102), to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. The result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely. The architecture comprises a universally available network (the Internet) (102), servers which are proprietary and owned by third parties (Citrix Winframe and ICA) (112), and the concept of allowing the user to actually build a business object specifically suited for their needs, which in turn is physically represented by and accessible through a programmatically-generated Web page (108).

Description

A SYSTEM AND METHOD FOR ACQUIRING REMOTE PROGRAMS FOR PERFORMING A TASK
FIELD OF THE INVENTION
The present invention relates to acquiring remote data and program and more particularly to a method and system which securely selects, configures and accesses computing resources and applications required to perform a given task.
BACKGROUND OF THE INVENTION
The ever-changing global networked world in which we currently live presents interesting challenges to individuals and workgroups trying to remain competitive in this environment. While technologies such as the Internet have had a profound and positive impact on our lives, they bring with them a new set of challenges. For example, the Internet has made communications (email) and sharing of files (email attachment, ftp), with individuals or groups a triviality. What it has not done is solve the problem of how to leverage the ability to communicate and share so easily into a true competitive advantage. In other words, how can individuals and workgroups gain global access, from any networked client device, and in an economic, efficient and secure manner, to a dynamically extensible set of computing resources and applications that are unique to, and required in order to, perform a given task?
To illustrate, take the case of a small ASIC design firm that has an idea which, if turned into a product, can be very lucrative. If the firm can provide the appropriate personnel with access to the required computing resources and applications unique to ASIC design, and do it in timely, economic, efficient and secure manner, it has the opportunity to produce a profitable product. Taken a step further, if the firm could provide these unique resources at a moment's notice, and make them accessible from any platform, virtually anywhere in the world, they gain a sustainable competitive advantage.
The Internet provides a cost-effective network delivery mechanism to virtually any point in the world, and readily facilitates communications and the sharing of information between those points; in fact, if properly used, it is essentially a virtual network. However, that does not necessarily allow the firm to design a product, nor does it give the firm a competitive advantage. Certainly a design file could be sent to personnel or outside contract/consulting firms, but what if they do not use the same design tools? It is cost prohibitive to purchase a copy of a tool for everyone involved, and in fact may be cost prohibitive for the firm to purchase a single copy, if the firm is a small one (or perhaps a startup). Even if the tools unique to the task at hand can be provided, how is licensing addressed? Where is the data stored? Who manages the server (s)? How is access to tools and data authorized, tracked and managed? How does the firm accurately track the expenses incurred in providing and managing these tools?
The costs incurred in resolving these problems, whether it be financial, time, or otherwise can be significant, and have a direct impact on a firm's ability to remain competitive.
What is needed is a system and method to overcome the above-mentioned problems. The present invention addresses such a need.
SUMMARY OF THE INVENTION
An architecture in accordance with the present invention allows users, from the World Wide Web (WWW), the ability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. The result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely.
The architecture comprises a universally available network (the Internet), servers which are proprietary and owned by third parties (Citrix Winframe and ICA), and the concept of allowing the user to actually build a business object specifically suited to their needs, which in turn is physically represented by and accessible through a programrnaticaHy-generated Web page. BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a block diagram of an architecture in accordance with the present invention for acquiring data.
DETAILED DESCRIPTION
The present invention relates to an improvement in acquiring remote data and program. The following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements. Various modifications to the preferred embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. Thus, the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.
Figure 1 is a block diagram of an architecture 100 in accordance with the present invention for acquiring data. The architecture comprises: a Network delivery mechanism 102 such as the Internet;
Client-side computer 104 including a Java-capable browser 104;
Server-side Java object request broker (ORB) 106 capable of providing object services such as (but certainly not limited to) security, transactions, relationships and licensing.
Client-side Java applets 108 capable of communicating with an ORB 106.
Request processor 110 capable of programmatically, in response to client-side requests from users, constructing dynamically extensible business objects that incorporate the required object services, and provide access to computing resources and applications unique to the user task at hand. The request processor 110 is also capable of displaying user-selected applications back to client-side platform.
The server objects 112 are capable of ensuring availability of, configuration of, extensibility of, automatic administration of, and ultimately providing access to, the computing resources and application unique to the user task at hand. The server objects 112 are also capable of providing access control, user authentication, auditing, tracking, database and billing services. A plurality of application servers 114 providing a plurality of application resources.
The components in this architecture are described in detail below:
Network delivery mechanism 102: using the Internet, for example, as a network delivery mechanism provides universal access. The Internet is available
(though not necessarily 100% available) on a global 24x7 basis. It is accessible through multiple mediums: analog phone, ISDN, wireless, satellite and corporate intranet to name a few. By using the Internet as a virtual private network, users pay for access and usage, and minimize or eliminate network administration and infrastructure costs. Client-side Java-capable WWW browser 104: this provides a key characteristic of the present invention: a universally used cross-platform client application such as Netscape or Internet Explorer. Web browsers of this type are available on virtually every computing platform, and are now moving into network computers (i.e. the oracle NC), "network appliances", smart phones, television (i.e. Web-TV) and a variety of other specialized and embedded applications.
Server-side Java Object Request Broker (ORB) 106: the ORB 106 is server- side middleware that provides a number of services and inter-object communication capabilities that are fundamental to the concept of allowing users to select, configure and access the unique computing resources and applications required to perform a given task. When a user defines their "toolset" , what they are actually doing is building a business object specifically suited to their needs. This business object is dynamically extensible, and is comprised of a number of other objects, some of which are ORB 106 services, and some of which are server-side objects. The ORB 106 provides access to its internal services such as (but certainly not limited to) security, transactions, relationships and licensing, provides access to external server-side objects, and provides inter-object communication.
Client-side Java applets 108: these applets supply the user interface, and give the user the capability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. What differentiates these applets from a standard downloadable applet is that they provide this functionality by communicating with an ORB 106. While they give the appearance of performing all functionality on the client-side, the work is actually perfomed on the server-side, by direct communication with the ORB 106, remote server-object method invocation, or a combination thereof.
Request processor 110 capable of constructing business objects: when a user defines their "toolset", a business object is built that is specifically suited to the user's needs. This business object can, for example, manifest itself as the Web page (and Java applets contained therein) through which the user gains access to the computing resources and applications unique to their task. In order to "build" this business object for the user, the server-side Java applications must perform (but are not limited to) the following functions:
• Provide information on the computing resources and application available
• Provide information on the ORB services available (licensing options, security, etc.).
• Provide information on the administration services available. • Provide access on access control, billing and related services that are available.
• Determine which service objects the user has selected.
• Combine all service objects into a single business object.
• Make that business object physically represented by and accessible through a Web page.
• Store the business object to a business object data base.
•Allow the user to modify their business object at will, then update to reflect changes.
The end purpose of the processor is to give users access to the computing resources and applications unique to a given task (i.e. ASIC design). These applications are numerous in number, and may be native to a specific (MS-Windows) platform or entirely generic (Java). The key is that the application does not permanently reside on the client, and therefore must be supplied by a server. A system and method in accordance with the present invention provides the following types of application servers:
Application servers 114: Citrix Winframe servers: these servers allow for the remote display of Windows95 and WindowsNT applications on independent computing architecture (ICA)-enabled clients. ICA is a proprietary protocol similar in concept to Windows. It requires a thin-client to be executing on the client platform in order to receive, interpret and display Windows GUI graphic objects. The thin client may be a Java or non-Java version. The ICA protocol also provides for end-to-end encryption of the ICA data stream.
Java Servers: these servers will allow for the downloading of applications written entirely in Java. Like the ICA protocol, these servers will provide for end-to- end encryption of the Java data stream.
Server objects 112 capable of providing computing resources and applications: part of the user business object comprises other objects which represent the computing resources and applications the user has selected. These objects in turn must be intelligent enough to convey to the user the information needed in order to make informed choices about the way they construct their business object; this information includes (but is not limited to) the following with respect to applications and resources:
• Verification of availability
• Version information • Cost of usage
• License mechanism
• Security options (i.e. is encryption of a data stream available?) Server-side Java objects 112 capable of providing access control and administrative services: part of the user business object consists of other objects which represent the access control and administrative services the user has selected.
These objects in turn must be intelligent enough to convey to the user the information needed in order to make informed choices about the way they construct their business object; this information includes (but is not limited to) the following with respect to these services: • Access control (time constraints, approved user list, inter-company workgroups) • Authentication (method used)
• Auditing
• Usage tracking and profiling
• Billing services • Individual or corporate information
An architecture in accordance with the present invention allows users, from the World Wide Web (WWW), the ability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. The result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely.
The architecture comprises a universally available network (the Internet), servers which are proprietary and owned by third parties (Citrix Winframe and ICA), and the concept of allowing the user to actually build a business object specifically suited to their needs, which in turn is physically represented by and accessible through a programmatically-generated Web page.
Although the present invention has been described in accordance with the embodiments shown, one of ordinary skill in the art will readily recognize that there could be variations to the embodiments and those variations would be within the spirit and scope of the present invention. Accordingly, many modifications may be made by one of ordinary skill in the art without departing from the spirit and scope of the appended claims.

Claims

1. A system for acquiring remote programs for performing a task comprises: a public network; a web server for receiving information from and transmitting information to the public network; at least one client computer capable of accessing the public network via the web server; a plurality of application servers for receiving information from and transmitting information to the public network; a request processor located within one of the plurality of application servers for passing requests between the plurality of application servers and the client computer; and an object request broker responsive to requests from the client computer for providing access to computing resources of the application servers.
2. The system of claim 2 wherein the client computer includes a browser.
3. The system of claim 2 wherein the public network comprises the internet.
4. The system of claim 3 wherein the request processor is capable of constructing business objects suited to a user's needs.
5. The system of claim 4 wherein the plurality of application servers comprise server objects.
6. The system of claim 5 wherein a portion of the plurality of server objects are capable of providing computing resources and applications.
7. The system of claim 6 wherein a portion of the plurality of server objects are capable of providing access control and administrative services.
8. A system for displaying user selected applications on a client computer in a public network comprising: a plurality of applications servers; a request processor within one of the application servers for processing requests between the plurality of application servers and the client computer; and an object request broker which communicates with the plurality of application servers responsive to requests from the client computer.
9. A system for brokering requests from on a public network comprising: a client computer coupled to the public network; a plurality of application servers coupled to the public network; a request processor within one of the application servers for receiving requests from and transmitting information concerning requests to the client computer; and an object request broker for providing access to internal services within the application servers based upon requests from the client computer.
10. A system for constructing business objects in a public network comprising: a client computer coupled to the public network; and a plurality of servers coupled to the public network; the servers including a plurality of applications; and a request processor within one of the application servers for processing requests between the plurality of application servers and the client computer; wherein the applications build a business object based on the user need.
PCT/US1998/022581 1997-10-27 1998-10-23 A system and method for acquiring remote programs for performing a task WO1999022332A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU11991/99A AU1199199A (en) 1997-10-27 1998-10-23 A system and method for acquiring remote programs for performing a task

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US6333297P 1997-10-27 1997-10-27
US6361397P 1997-10-27 1997-10-27
US6333197P 1997-10-27 1997-10-27
US6333097P 1997-10-27 1997-10-27
US60/063,613 1997-10-27
US60/063,332 1997-10-27
US60/063,330 1997-10-27
US60/063,331 1997-10-27

Publications (1)

Publication Number Publication Date
WO1999022332A1 true WO1999022332A1 (en) 1999-05-06

Family

ID=27490357

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/022581 WO1999022332A1 (en) 1997-10-27 1998-10-23 A system and method for acquiring remote programs for performing a task

Country Status (2)

Country Link
AU (1) AU1199199A (en)
WO (1) WO1999022332A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0990984A2 (en) * 1999-12-15 2000-04-05 Galilei Software GmbH Method for transmitting process data, and method for generating user-specific data and data generated by this process
WO2001093025A2 (en) * 2000-06-01 2001-12-06 Allegrix, Inc. Systems and methods for application service provision
WO2002003220A2 (en) * 2000-07-05 2002-01-10 Ernst & Young Llp Method and apparatus for providing computer services
WO2002019651A2 (en) * 2000-08-25 2002-03-07 Flatrock, Incorporated Method and apparatus for providing network dependent application services
WO2002086768A2 (en) * 2001-03-08 2002-10-31 Tririga, Inc. Data storage and access system employing clustering of servers
US7050963B2 (en) 2000-09-12 2006-05-23 Progress Software Corporation Method and apparatus for flash load balancing
GB2403049B (en) * 2002-03-22 2006-08-30 Citrix Systems Inc Methods and systems for providing access to an application
US7398195B2 (en) 2001-06-01 2008-07-08 Progress Software Corporation One to many mapping of application service provision
FR2912272A1 (en) * 2007-02-05 2008-08-08 Montferrier Patrick De Combined Internet and telephone access communication terminal i.e. Internet protocol multimedia subsystem type terminal, has handset with Internet identification referred to switch and paired identification Internet of control structure
US20080288875A1 (en) * 2007-05-18 2008-11-20 Samsung Electronics Co., Ltd. Method and apparatus for managing control ownership for application of remote user interface server
WO2009053474A1 (en) * 2007-10-26 2009-04-30 Q-Layer Method and system to model and create a virtual private datacenter

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5347632A (en) * 1988-07-15 1994-09-13 Prodigy Services Company Reception system for an interactive computer network and method of operation
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US5826244A (en) * 1995-08-23 1998-10-20 Xerox Corporation Method and system for providing a document service over a computer network using an automated brokered auction
US5835712A (en) * 1996-05-03 1998-11-10 Webmate Technologies, Inc. Client-server system using embedded hypertext tags for application and database development

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5347632A (en) * 1988-07-15 1994-09-13 Prodigy Services Company Reception system for an interactive computer network and method of operation
US5826244A (en) * 1995-08-23 1998-10-20 Xerox Corporation Method and system for providing a document service over a computer network using an automated brokered auction
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US5835712A (en) * 1996-05-03 1998-11-10 Webmate Technologies, Inc. Client-server system using embedded hypertext tags for application and database development

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0990984A3 (en) * 1999-12-15 2000-07-19 Galilei Software GmbH Method for transmitting process data, and method for generating user-specific data and data generated by this process
EP0990984A2 (en) * 1999-12-15 2000-04-05 Galilei Software GmbH Method for transmitting process data, and method for generating user-specific data and data generated by this process
WO2001093025A3 (en) * 2000-06-01 2002-04-04 Allegrix Inc Systems and methods for application service provision
WO2001093025A2 (en) * 2000-06-01 2001-12-06 Allegrix, Inc. Systems and methods for application service provision
KR100846530B1 (en) * 2000-07-05 2008-07-15 언스트 앤 영 엘엘피 Method and apparatus for providing computer services
WO2002003220A3 (en) * 2000-07-05 2002-07-25 Ernst & Young Llp Method and apparatus for providing computer services
WO2002003220A2 (en) * 2000-07-05 2002-01-10 Ernst & Young Llp Method and apparatus for providing computer services
WO2002019651A3 (en) * 2000-08-25 2002-09-26 Flatrock Inc Method and apparatus for providing network dependent application services
WO2002019651A2 (en) * 2000-08-25 2002-03-07 Flatrock, Incorporated Method and apparatus for providing network dependent application services
US7003481B2 (en) 2000-08-25 2006-02-21 Flatrock Ii, Inc. Method and apparatus for providing network dependent application services
US7050963B2 (en) 2000-09-12 2006-05-23 Progress Software Corporation Method and apparatus for flash load balancing
WO2002086768A2 (en) * 2001-03-08 2002-10-31 Tririga, Inc. Data storage and access system employing clustering of servers
US7069267B2 (en) 2001-03-08 2006-06-27 Tririga Llc Data storage and access employing clustering
WO2002086768A3 (en) * 2001-03-08 2004-04-01 Tririga Inc Data storage and access system employing clustering of servers
US7398195B2 (en) 2001-06-01 2008-07-08 Progress Software Corporation One to many mapping of application service provision
GB2403049B (en) * 2002-03-22 2006-08-30 Citrix Systems Inc Methods and systems for providing access to an application
FR2912272A1 (en) * 2007-02-05 2008-08-08 Montferrier Patrick De Combined Internet and telephone access communication terminal i.e. Internet protocol multimedia subsystem type terminal, has handset with Internet identification referred to switch and paired identification Internet of control structure
US20080288875A1 (en) * 2007-05-18 2008-11-20 Samsung Electronics Co., Ltd. Method and apparatus for managing control ownership for application of remote user interface server
US9231778B2 (en) * 2007-05-18 2016-01-05 Samsung Electronics Co., Ltd. Method and apparatus for managing control ownership for application of remote user interface server
WO2009053474A1 (en) * 2007-10-26 2009-04-30 Q-Layer Method and system to model and create a virtual private datacenter

Also Published As

Publication number Publication date
AU1199199A (en) 1999-05-17

Similar Documents

Publication Publication Date Title
US7627658B2 (en) Presentation service which enables client device to run a network based application
US6341351B1 (en) Method for communicating and controlling transactions between unsecured parties
US6438600B1 (en) Securely sharing log-in credentials among trusted browser-based applications
CA2448918C (en) Method and system for automatically configuring a client-server network
US8612514B2 (en) Serving software applications from servers to client computers
US6915519B2 (en) Pluggable JMS providers in a J2EE server
US6871286B1 (en) Method and apparatus for resetting passwords in a computer system
KR100998515B1 (en) Methods for distributed program execution with file-type association in a client-server network
US20130124695A1 (en) Mobility Device Method
EP1241858A2 (en) Provisioning computing services via an online networked computing environment
US20130275472A1 (en) Individualized data sharing
JP2009525531A (en) Computer service providing system and method
MXPA04005524A (en) System and method for delivering advertising signage remotely.
US20050071439A1 (en) Mobility device platform
WO1999022332A1 (en) A system and method for acquiring remote programs for performing a task
US20020120786A1 (en) System and method for managing application integration utilizing a network device
Furht et al. An innovative internet architecture for application service providers
KR20030010031A (en) Business integration system based internet
US20020103905A1 (en) Method and system for providing business partners with access to a company's internal computer resources
WO2002011357A2 (en) Method and apparatus for cryptographic key management using url programming interface
US20090272797A1 (en) Dynamic information card rendering
US20070099594A1 (en) Computer-implemented method, system, and program product for tracking a location of a user of a wireless device in a public network environment
Jacob Service discovery: Access to local resources in a nomadic environment
EP1428156A1 (en) System and method for integrating multiple trading engines
Johnson The structure of the OpenVMS Management Station

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase