Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A SYSTEM AND METHOD FOR ACQUIRING REMOTE PROGRAMS FOR PERFORMING A TASK
Document Type and Number:
WIPO Patent Application WO/1999/022332
Kind Code:
A1
Abstract:
An architecture in accordance with the present invention allows users (104), from the World Wide Web (WWW) (102), to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. The result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely. The architecture comprises a universally available network (the Internet) (102), servers which are proprietary and owned by third parties (Citrix Winframe and ICA) (112), and the concept of allowing the user to actually build a business object specifically suited for their needs, which in turn is physically represented by and accessible through a programmatically-generated Web page (108).

Inventors:
SHAH RAVI
PEDRAMPARSI HILLA
Application Number:
PCT/US1998/022581
Publication Date:
May 06, 1999
Filing Date:
October 23, 1998
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
INTERDESIGN HDL (US)
International Classes:
G06F21/62; H04L29/06; H04L29/08; G06F1/00; (IPC1-7): G06K7/00; G06G7/06
Foreign References:
US5347632A1994-09-13
US5835712A1998-11-10
US5815665A1998-09-29
US5826244A1998-10-20
Attorney, Agent or Firm:
Sawyer Jr., Joseph A. (CA, US)
Download PDF:
Claims:
CLAIMS
1. A system for acquiring remote programs for performing a task comprises: a public network; a web server for receiving information from and transmitting information to the public network; at least one client computer capable of accessing the public network via the web server; a plurality of application servers for receiving information from and transmitting information to the public network; a request processor located within one of the plurality of application servers for passing requests between the plurality of application servers and the client computer; and an object request broker responsive to requests from the client computer for providing access to computing resources of the application servers.
2. The system of claim 2 wherein the client computer includes a browser.
3. The system of claim 2 wherein the public network comprises the internet.
4. The system of claim 3 wherein the request processor is capable of constructing business objects suited to a user's needs.
5. The system of claim 4 wherein the plurality of application servers comprise server objects.
6. The system of claim 5 wherein a portion of the plurality of server objects are capable of providing computing resources and applications.
7. The system of claim 6 wherein a portion of the plurality of server objects are capable of providing access control and administrative services.
8. A system for displaying user selected applications on a client computer in a public network comprising: a plurality of applications servers; a request processor within one of the application servers for processing requests between the plurality of application servers and the client computer; and an object request broker which communicates with the plurality of application servers responsive to requests from the client computer.
9. A system for brokering requests from on a public network comprising: a client computer coupled to the public network; a plurality of application servers coupled to the public network; a request processor within one of the application servers for receiving requests from and transmitting information concerning requests to the client computer; and an object request broker for providing access to internal services within the application servers based upon requests from the client computer.
10. A system for constructing business objects in a public network comprising: a client computer coupled to the public network; and a plurality of servers coupled to the public network; the servers including a plurality of applications; and a request processor within one of the application servers for processing requests between the plurality of application servers and the client computer; wherein the applications build a business object based on the user need.
Description:
A SYSTEM AND METHOD FOR ACQUIRING REMOTE PROGRAMS FOR PERFORMING A TASK FIELD OF THE INVENTION The present invention relates to acquiring remote data and program and more particularly to a method and system which securely selects, configures and accesses computing resources and applications required to perform a given task.

BACKGROUND OF THE INVENTION The ever-changing global networked world in which we currently live presents interesting challenges to individuals and workgroups trying to remain competitive in this environment. While technologies such as the Internet have had a profound and positive impact on our lives, they bring with them a new set of challenges. For example, the Internet has made communications (email) and sharing of files (email attachment, ftp), with individuals or groups a triviality. What it has not done is solve the problem of how to leverage the ability to communicate and share so easily into a true competitive advantage.

In other words, how can individuals and workgroups gain global access, from any networked client device, and in an economic, efficient and secure manner, to a dynamically extensible set of computing resources and applications that are unique to, and required in order to, perform a given task? To illustrate, take the case of a small ASIC design firm that has an idea which, if turned into a product, can be very lucrative. If the firm can provide the appropriate personnel with access to the required computing resources and applications unique to ASIC design, and do it in timely, economic, efficient and secure manner, it has the opportunity to produce a profitable product. Taken a step further, if the firm could provide these unique resources at a moment's notice, and make them accessible from any platform, virtually anywhere in the world, they gain a sustainable competitive advantage.

The Internet provides a cost-effective network delivery mechanism to virtually any point in the world, and readily facilitates communications and the sharing of

information between those points; in fact, if properly used, it is essentially a virtual network. However, that does not necessarily allow the firm to design a product, nor does it give the firm a competitive advantage. Certainly a design file could be sent to personnel or outside contract/consulting firms, but what if they do not use the same design tools? It is cost prohibitive to purchase a copy of a tool for everyone involved, and in fact may be cost prohibitive for the firm to purchase a single copy, if the firm is a small one (or perhaps a startup). Even if the tools unique to the task at hand can be provided, how is licensing addressed? Where is the data stored? Who manages the server (s)? How is access to tools and data authorized, tracked and managed? How does the firm accurately track the expenses incurred in providing and managing these tools? The costs incurred in resolving these problems, whether it be financial, time, or otherwise can be significant, and have a direct impact on a firm's ability to remain competitive.

What is needed is a system and method to overcome the above-mentioned problems. The present invention addresses such a need.

SUMMARY OF THE INVENTION An architecture in accordance with the present invention allows users, from the World Wide Web (WWW), the ability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. The result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely.

The architecture comprises a universally available network (the Internet), servers which are proprietary and owned by third parties (Citrix Winframe and ICA), and the concept of allowing the user to actually build a business object specifically suited to their needs, which in turn is physically represented by and accessible through a programmatically-generated Web page.

BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a block diagram of an architecture in accordance with the present invention for acquiring data.

DETAILED DESCRIPTION The present invention relates to an improvement in acquiring remote data and program. The following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements. Various modifications to the preferred embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. Thus, the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.

Figure 1 is a block diagram of an architecture 100 in accordance with the present invention for acquiring data. The architecture comprises: a Network delivery mechanism 102 such as the Internet; Client-side computer 104 including a Java-capable browser 104; Server-side Java object request broker (ORB) 106 capable of providing object services such as (but certainly not limited to) security, transactions, relationships and licensing.

Client-side Java applets 108 capable of communicating with an ORB 106.

Request processor 110 capable of programmatically, in response to client-side requests from users, constructing dynamically extensible business objects that incorporate the required object services, and provide access to computing resources and applications unique to the user task at hand. The request processor 110 is also capable of displaying user-selected applications back to client-side platform.

The server objects 112 are capable of ensuring availability of, configuration of, extensibility of, automatic administration of, and ultimately providing access to, the computing resources and application unique to the user task at hand. The server objects 112 are also capable of providing access control, user authentication, auditing, tracking, database and billing services.

A plurality of application servers 114 providing a plurality of application resources.

The components in this architecture are described in detail below: Network delivery mechanism 102: using the Internet, for example, as a network delivery mechanism provides universal access. The Internet is available (though not necessarily 100% available) on a global 24x7 basis. It is accessible through multiple mediums: analog phone, ISDN, wireless, satellite and corporate intranet to name a few. By using the Internet as a virtual private network, users pay for access and usage, and minimize or eliminate network administration and infrastructure costs.

Client-side Java-capable WWW browser 104: this provides a key characteristic of the present invention: a universally used cross-platform client application such as Netscape or Internet Explorer. Web browsers of this type are available on virtually every computing platform, and are now moving into network computers (i. e. the oracle NC),"network appliances", smart phones, television (i. e.

Web-TV) and a variety of other specialized and embedded applications.

Server-side Java Object Request Broker (ORB) 106: the ORB 106 is server- side middleware that provides a number of services and inter-object communication capabilities that are fundamental to the concept of allowing users to select, configure and access the unique computing resources and applications required to perform a given task. When a user defines their"toolset", what they are actually doing is building a business object specifically suited to their needs. This business object is dynamically extensible, and is comprised of a number of other objects, some of which are ORB 106 services, and some of which are server-side objects. The ORB 106 provides access to its internal services such as (but certainly not limited to) security, transactions, relationships and licensing, provides access to external server-side objects, and provides inter-object communication.

Client-side Java applets 108: these applets supply the user interface, and give the user the capability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. What differentiates these applets from a standard downloadable applet is that they provide this functionality by communicating with an ORB 106. While they give the appearance

of performing all functionality on the client-side, the work is actually perfomed on the server-side, by direct communication with the ORB 106, remote server-object method invocation, or a combination thereof.

Request processor 110 capable of constructing business objects: when a user defines their"toolset", a business object is built that is specifically suited to the user's needs. This business object can, for example, manifest itself as the Web page (and Java applets contained therein) through which the user gains access to the computing resources and applications unique to their task. In order to"build"this business object for the user, the server-side Java applications must perform (but are not limited to) the following functions: Provide information on the computing resources and application available Provide information on the ORB services available (licensing options, security, etc.).

Provide information on the administration services available.

Provide access on access control, billing and related services that are available.

Determine which service objects the user has selected.

Combine all service objects into a single business object.

Make that business object physically represented by and accessible through a Web page.

Store the business object to a business object data base.

-Allow the user to modify their business object at will, then update to reflect changes.

The end purpose of the processor is to give users access to the computing resources and applications unique to a given task (i. e. ASIC design). These applications are numerous in number, and may be native to a specific (MS-Windows) platform or entirely generic (Java). The key is that the application does not permanently reside on the client, and therefore must be supplied by a server. A system and method in accordance with the present invention provides the following types of application servers: Application servers 114:

Citrix Winframe servers: these servers allow for the remote display of Windows95 and WindowsNT applications on independent computing architecture (ICA)-enabled clients. ICA is a proprietary protocol similar in concept to Windows. It requires a thin-client to be executing on the client platform in order to receive, interpret and display Windows GUI graphic objects. The thin client may be a Java or non-Java version. The ICA protocol also provides for end-to-end encryption of the ICA data stream.

Java Servers: these servers will allow for the downloading of applications written entirely in Java. Like the ICA protocol, these servers will provide for end-to- end encryption of the Java data stream.

Server objects 112 capable of providing computing resources and applications: part of the user business object comprises other objects which represent the computing resources and applications the user has selected. These objects in turn must be intelligent enough to convey to the user the information needed in order to make informed choices about the way they construct their business object; this information includes (but is not limited to) the following with respect to applications and resources: Verification of availability Version information Cost of usage License mechanism Security options (i. e. is encryption of a data stream available?) Server-side Java objects 112 capable of providing access control and administrative services: part of the user business object consists of other objects which represent the access control and administrative services the user has selected.

These objects in turn must be intelligent enough to convey to the user the information needed in order to make informed choices about the way they construct their business object; this information includes (but is not limited to) the following with respect to these services: Access control (time constraints, approved user list, inter-company workgroups)

Authentication (method used) Auditing Usage tracking and profiling Billing services Individual or corporate information An architecture in accordance with the present invention allows users, from the World Wide Web (WWW), the ability to easily and securely select, configure and access the unique computing resources and applications required to perform a given task. The result is a secure, reliable, configurable and scaleable computing infrastructure that can be put together at a moment's notice, modified at will, and discarded or downgraded when no longer needed. Expenses are incurred only for the amount of computing resources and applications used; once downgraded or disbanded, recurring expenses are minimized or eliminated entirely.

The architecture comprises a universally available network (the Internet), servers which are proprietary and owned by third parties (Citrix Winframe and ICA), and the concept of allowing the user to actually build a business object specifically suited to their needs, which in turn is physically represented by and accessible through a programmatically-generated Web page.

Although the present invention has been described in accordance with the embodiments shown, one of ordinary skill in the art will readily recognize that there could be variations to the embodiments and those variations would be within the spirit and scope of the present invention. Accordingly, many modifications may be made by one of ordinary skill in the art without departing from the spirit and scope of the appended claims.