Electrical computers and digital processing systems: multicomput – Remote data accessing
Reexamination Certificate
2001-04-12
2003-07-01
Harrell, Robert B. (Department: 2153)
Electrical computers and digital processing systems: multicomput
Remote data accessing
C709S201000, C709S203000, C709S218000, C709S219000, C380S232000, C713S152000, C713S152000, C713S152000
Reexamination Certificate
active
06587872
ABSTRACT:
FIELD OF INVENTION
This invention relates to a network system, in particular to creating flexibility and change ability, and to improvement in manageability for an operator who makes access to it.
BACKGROUND ART
FIG. 14
shows a typical network system. To a host computer
2
are connected a plurality of terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
. Each of the terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
can use the software in the host computer
2
. Also, the data in the host computer
2
may be shared with the terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
. Therefore, an important advantage is provided, for example, in creating a database updated by the terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
. Another advantage is that the terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
can exchange data among themselves through the host computer
2
.
DISCLOSURE OF THE INVENTION
However, conventional network systems such as described above have the following problems.
The terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
respectively have hardware IDs or software protocols by means of which the host computer
2
manages the terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
. Therefore, when the terminal computers
6
1
,
6
2
,
6
3
, . . . ,
6
n
are to be changed in number or type, cumbersome work is required to change the hardware IDs or software protocols of the terminal computers or to change terminal computer registration on the side of the host computer
2
. This prevents the network constitution (connection state of the terminal computers) from being changed flexibly according to the purpose of use of the network.
Another problem with the conventional arrangement in which the management is made at each terminal is that the host computer cannot identify a person who makes access to a terminal computer. As a result, the accessing person is unknown and accurate management is impossible.
Another problem is that, when a network is created through a public communication line, the public communication line has to be connected all the time. This is uneconomical.
The object of the invention is to provide a network system capable of solving the above problems, with advantages of flexibility, changeability, economy, and accurate management of the accessing person.
The network management method and the network system are characterized in that a software program started in each terminal computer is provided with a software code in advance and that the host computer creates a network of software programs, having the same software code, chosen from among the software programs which are started at respective terminal computers. By the way, the term “network” as used herein refers to a state in which the host computer is connected to one or more terminal computers.
The network management method and the network system are also characterized in that a host computer discriminates authenticity of a user ID sent from each of the terminal computers, permits access only when the user ID is authentic, and creates a network.
The network connection possibility display method is characterized in that accessible networks only are displayed on a display device on the basis of user ID codes.
The network management method and the network system are further characterized in that a host computer stores programs or data corresponding to respective networks and that the host computer creates a network by interconnecting the programs or data when creating the network with software programs having the same software code.
The network management method and the network system are still further characterized in that when a software program running on a terminal computer requests data and the data are stored in the terminal computer, the data are obtained from the terminal computer and that when the data are stored in a host computer, the terminal computer is connected to the host computer through a communication path and the data are obtained from the host computer.
The network management method and the network system are also characterized in that when data to be obtained are stored in a host computer, the terminal computer is connected to the host computer through a communication path and the data are obtained from the host computer while both of the computers remain in the state of connection and then the connection is broken.
The network management method and the network system are also characterized in that when data to be obtained are stored in both a host computer and a terminal computer, the terminal computer is connected to the host computer through a communication path, the data in the host computer are compared with the data in the terminal computer and, if the data in the host computer have been updated, the connection is broken after at least the updated portion of the data are copied and stored from the host computer to the terminal computer and, if both data are identical to each other, the connection is broken in that state.
The network management method and the network system are farther characterized in that when data to be obtained are stored in a host computer, the terminal computer is connected to the host computer through a communication path, the data in the host computer are copied from the host computer and stored in the terminal computer and then the connection is broken, and thereafter the data are obtained from the terminal computer.
The network management method and the network system are also characterized in that when data to be obtained are stored in a host computer but cannot be copied, the terminal computer is connected to the host computer through a communication path, the data in the host computer are obtained while both of the computers remain in the state of connection and then the connection is broken.
The network management method and the network system are still further characterized, in that a host computer discriminates authenticity of a user ID sent from each of the terminal computers and permits connection to the host computer only when the user ID is authentic.
REFERENCES:
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5155847 (1992-10-01), Kirouac et al.
patent: 5263157 (1993-11-01), Janis
patent: 5548727 (1996-08-01), Needan
patent: 5586937 (1996-12-01), Menashe
patent: 1 005 100 (1993-04-01), None
patent: 61-216066 (1986-09-01), None
patent: 62-123539 (1987-06-01), None
patent: 62-198248 (1987-09-01), None
patent: 63-90262 (1988-04-01), None
patent: 63-090262 (1988-04-01), None
patent: 3-219742 (1991-09-01), None
patent: 4-216252 (1992-08-01), None
patent: 5-128070 (1993-05-01), None
1994, Patent Abstracts of Japan, vol. 18, No. 447 (E-1594), Aug. 19, 1994 & JP 6-141083 A, Ricoh Co. Ltd., May 20, 1994.
1993, “Transmission Control Protocol/Internet Protocol Networking over Netbios”; IBM Technical Disclosure Bulletin, vol. 36, No. 12, Dec. 1, 1993, pp. 619-624, XP002121686.
1991, Patent Abstracts of Japan, vol. 15, No. 94 (E-1041), Mar. 6, 1991 & JP 02 305140A (Ricoh Co Ltd), Dec. 18, 1990.
Faith Inc.
Harrell Robert B.
Le Hieu
LandOfFree
Network system and network management method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network system and network management method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network system and network management method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3017132