Apparatus and method for operational support of remote network systems

Information

  • Patent Grant
  • 8615566
  • Patent Number
    8,615,566
  • Date Filed
    Friday, March 23, 2001
    23 years ago
  • Date Issued
    Tuesday, December 24, 2013
    10 years ago
Abstract
A method for operational support for remote network systems which allows for the rapid replacement of one server with another, in such instances as server malfunctions, routine maintenance, or upgrades. The method generally comprises providing a program storage device containing a machine identifier associated with a first, original server, transferring the program storage device and machine identifier to a second, spare server, and remotely configuring the second, spare server, according to the program storage device and machine identifier associated with the first, original server, such that the second, spare server becomes an identical replacement for the first, original server. Thus, if the first, original server malfunctions, the spare or replacement server can be remotely configured to replace the original server according to the information in the machine identifier stored on the program storage device.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


This invention pertains generally to the remote installation, maintenance and upgrade of servers in a network system. More particularly, the invention is a hardware installation apparatus and method for upgrading as well as repairing malfunctioning servers rapidly and remotely.


2. Description of the Background Art


One of the major problems for large network systems is the maintenance, repair and upgrade of the multitude of servers associated with the network system. There is a need for insuring a certain level of uniformity in the repairs and upgrade procedures completed at different operation centers located around the globe.


The maintenance of network servers residing in different locations can be a time consuming and laborious process. Presently, technicians stationed at a local operations center must manually maintain and upgrade the particular, local servers. Maintenance of a small number of servers is achievable by local personnel, but with larger numbers of servers placed online, manual maintenance becomes problematic. The quality of the manual repairs completed at different operation centers may vary depending on the individual performing the maintenance. There is a need to obtain a certain level of quality control over the maintenance the servers within the network no matter where the server is located.


Another problem for large network systems is the finding the appropriate time and duration or time slot in which the maintenance of servers can be completed. Many network systems cannot disconnect users or disrupt the user's business by abrupt cutoffs to carry out routine maintenance of servers. In some cases maintenance can be completed at off-peak hours, or servers scheduled for maintenance can be shut down gradually to allow users to complete their sessions. Finding the time for maintenance is more problematic for network systems which operate 24 hours a day and seven days a week. Many round-the-clock network systems have applications which can repair and maintain servers remotely from the network system's central server system. These existing remote systems allow the downloading of applications from a central data base to individual servers, but unfortunately, configuration of the software for each unique server must be completed manually.


Presently, if a server of a network system goes down or otherwise malfunctions, a technician must reboot the machine and try and repair the problem as quickly as possible in order to get the server back online. Unfortunately, these quick fixes can cause problems later on for the server and the network system. The repaired server has been altered so it is no longer identical to it's backup server. Such “quick fixes” can effect the overall efficiency of the network system and trying to identify which manual repairs are responsible for the cascading of the network can be difficult.


There is a need to make the maintenance and upgrade of servers in a network system as simplistic as possible. The network industry is interested in implementing methods and procedures for the installation, repair and upgrade of servers which require minimal intervention by personnel stationed at local operation centers.


Accordingly, there is a need for a method and apparatus for hardware installation and maintenance which can be achieved remotely. The present invention satisfies these needs, as well as others, and generally overcomes the deficiencies found in the background art.


SUMMARY OF THE INVENTION

The present invention provides an apparatus and method for operational support for remote network systems. The invention also provides a method which allows for the rapid replacement of one server with another, in such instances as server malfunctions, routine maintenance or upgrades. In general terms, the method of the invention comprises providing a program storage device containing a machine identifier associated with a first, original server, transferring the program storage device and machine identifier to a second, spare server, and remotely configuring the second, spare server, according to the program storage device and machine identifier associated with the first, original server, such that the second, spare server becomes an identical replacement for the first, original server. Thus, if the first, original server malfunctions, the spare or replacement server can be remotely configured to replace the original server according to the information in the machine identifier stored on the program storage device.


The system of the invention comprises generally a network system including a central server system, a plurality of servers, a plurality of program storage devices corresponding to the plurality of servers and each including a machine identifier associated with one of the plurality of servers, and at least one backup server capable of reading the program storage devices and adopting the configuration of one of the plurality of servers according to one of the machine identifiers. Preferably, the network system comprises a plurality of operation centers or nodes, with each operation center including a plurality of servers, at least one backup server, and a corresponding plurality of program storage devices each containing a machine identifier associated with one of the plurality of servers. The central server system includes a database configured such that the spare servers can access the database and download information therefrom according to the machine identifier read from a program storage device, so that the spare server can be re-configured in the manner of the server associated with the machine identifier. In this manner, the spare server can quickly and easily replace one of the plurality of servers in the event of a malfunction.


When it is necessary to replace one of the plurality of servers for any reason, including those stated above, the program storage device may be removed from one server and placed into the blank or spare server. The program storage device allows the spare server to boot up and copy an operating system (“OS”) and a “plug and serve” application to the spare server's hard drive. The OS and “plug and serve” or maintenance application may be on an external CD or may be downloaded from a remote device. The spare server is re-booted using the newly installed OS, and the “plug and serve” application writes and reconfigures the BIOS (“basic input/output system”) settings, and also contacts an administration server associated with the central server system. The administration server will issue a dynamic host configuration protocol (DHCP), a temporary internet protocol (IP) which is external, to enable the spare server to connect with the central server system data base by TCP/IP. The data base will then download applications to the spare server which are appropriate for the machine identifier that the spare server now contains. Once the spare server has received the appropriate applications, the IP address is re-configured to the local non-routable IP address designated for the original server. At this point the spare server re-boots and in all aspects is an identical copy of the original server it has replaced.


The program storage devices are initially generated from the data base of the central server system and then transferred to the appropriate ones of the plurality of servers. The program storage device comprises; the servers unique machine identifier, a kernel for boot up purposes, and a small image copying application such as “Drive Image”.


The machine identifier contained in the program storage device may comprise any machine readable code which identifies the machine number, and the operation center site number, area code and country code. In the preferred embodiments, the machine identifier is a 15 character alphanumeric code which is derived from the machine number (i.e. M001), site number (i.e. S02) of the operations center where the machine resides, the area code (i.e. A408) of the operation center followed by the country code (i.e. C001). Thus, an example of a 15 character machine identifier containing a machine number, site number, area code and country code is M001S02A408C001.


This machine identifier allows the backup or spare server to be recognized by the data base coupled to or integrated within the network's central server system. Once the information stored on the program storage device has been copied onto a spare sever machine, the spare machine will contact the central server data base and receive the appropriate downloads necessary to allow the spare server to run the tasks carried out by the original server machine.


The replacement server and the original server generally must have the same hardware configuration for the implementation of the present invention. Machines purchased from the same vendor may have identical hardware but the BIOS may be slightly different. The BIOS for each machine is pre-configured by the data base, according to the specific machine identifier. By writing over the factory-installed BIOS, the BIOS of each server within the network can be standardized.


The present invention allows for the remote maintenance of servers. The servers are capable of receiving simple messages through SMNP (“signal management network protocol”) from the central server system data base. The SMNP messages indicate that the server should be shut down or turned on. Personnel have access to a web page associated with the network operation support organization which enable the personnel to remotely shut down or start up the servers. Generally, the modes of operation which can be initiated by personnel from the website are turning a server on, immediately shutting down a server, or slowly shutting down a server.


For many network organizations it is very important to be able to slowly shut down a server so as not to leave users disconnected. In these situations, the server is requested not to allow any new users to log on, and soon no users will be utilizing that particular server. The machines program storage device can then placed into a spare server and following the method of the present invention, the new server will replace to the server that has been scheduled for maintenance. The server that has been taken offline can be shipped to a the main service shop of the network organization for repairs or can be cleansed and utilized as an extra spare server. This method allows for staggered re-boots of multiple servers in a organized and timely manner via the web site.


The present invention is capable of setting parameters for shutdowns related to server upgrades and initiate these upgrades remotely. The optimal procedure for the upgrade of severs is to shut down specific servers at a particular time and for a specific duration to insure minimal interruption to users of the system. A similar method used in the shutdown of servers for repair and maintenance via a web page is applied to server upgrades. In this instance, the machine identifier can be accessed by administration personnel via a administration server associated with the central server system, with a request that the server to be shutdown either immediately or slowly for upgrades. Once the server is shut down, the data base can transmit the appropriate upgrades for the that particular servers machine identifier.


Another aspect of the invention is to provide a service which protects the server BIOS from unwanted changes to the pre-configured settings determined by the central server system data base. The “plug and play” (PS) application takes an image of the BIOS and stores it on the hard drive of the server. The PS application can detect when the BIOS has been tampered with and during the next boot up will remove the changed BIOS and revert back to the BIOS configuration specific for that machine ID. The invention allows for no contamination by immediate fixes.


An object of the invention is to provide an efficient and cost effective method for installing and maintaining network servers remotely.


Another object of the invention is to provide network server upgrades remotely.


Another object of the invention is to provide service monitoring through SNMP (signaling network management protocol) to allow a server to receive messages from the data base of the central server system.


Another object of the invention is providing a method which remotely defines and implements the parameters and events associated with server shutdowns.


Another object of the invention is to provide a method which allows for quick recovery from unexpected server crashes.


Another object of the invention is providing security measures to prevent unintentional changes of a server's BIOS settings. This service provided by the invention is associated with the “plug and server” application residing on the local machine.


Further objects and advantages of the invention will be brought out in the following portions of the specification, wherein the detailed description is for the purpose of fully disclosing the preferred embodiment of the invention without placing limitations thereon.





BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be more fully understood by reference to the following drawings, which are for illustrative purposes only.



FIG. 1. is a schematic diagram of a network system in accordance with the present invention.



FIG. 2. is a schematic diagram of a program storage device in accordance with the present invention.



FIG. 3. is an exemplary format structure for a machine identifier in accordance with the present invention.



FIG. 4. is a flowchart generally showing the acts and events associated with the remote upgrade and maintenance method of the present invention.



FIG. 5 is a flow chart showing generally the acts and events associated with the replacement or swap-out of a server in accordance with the present invention.





DETAILED DESCRIPTION OF THE INVENTION

Persons of ordinary skill in the art will realize that the following description of the present invention is illustrative only and not in any way limiting. Other embodiments of the invention will readily suggest themselves to such skilled persons having the benefit of this disclosure.


Referring more specifically to the drawings, for illustrative purposes the present invention is embodied in the apparatus shown generally in FIG. 1 and FIG. 2 and the method outlined generally in FIG. 3 through FIG. 5. It will be appreciated that the apparatus may vary as to configuration and as to details of the parts, and that the method may vary as to details and the order of the steps, without departing from the basic concepts as disclosed herein. The invention is disclosed generally in terms of an apparatus and method for operational support of remote network systems. It should be readily understood, however, that the invention may be used for a variety of types of server maintenance and installation procedures for network systems. Other operational support uses for the invention will suggest themselves to those skilled in the art, and are considered to be within the scope of this disclosure.


Referring first to FIG. 1, there is shown generally a remote operational support network system 10 in accordance with the invention. Generally, the remote operational support system 10 includes a central server system 12 which is operatively coupled with a plurality of operation centers 14 via a conventional TCP/IP network connection. Each operation center 14 includes a plurality of servers 16 operatively connected to the central server system 12. Each operation center 14 further includes a plurality of spare servers 18. Each server 16 includes a program storage device 20 that contains a machine identifier code 22 which can be recognized by the central server system 12.


Central server system 12 is shown as including a web server 24, an administration server 26 and a data base 27, which are used in carrying out remote operational support of the network system 10. Preferably, the central server system also includes a database server 28 which retrieves data from data base 27 upon requests from system 10. The central server system 12 may consist of one or more additional servers (not shown) such as, for example, an account creation server, a server associated with a modem pool, a computer user server, a machine identifier server, and a mobile telephone user server. Such server system configurations are well known in the art. An exemplary multiple server configuration of this type suitable for use with the present invention is disclosed in detail in co-pending U.S. patent application Ser. No. 09/618,954 entitled “METHOD AND APPARATUS FOR A SECURE REMOTE ACCESS SYSTEM”, the disclosure of which is incorporated herein by reference. Such a multiple server configuration would allow for the handling of certain discreet operations by different servers and is preferred in some embodiments of the invention.


The servers 16 and 18 included in the operation centers 14, as well as other servers associated with the central server system 12, may comprise any standard data processing means, including minicomputer, microcomputer, UNIX®, mainframe, personal computer (PC) or clone thereof, an APPLE® computer or clone thereof, a SUN® work station or server, or other appropriate computer. The hardware components of server 16 and spare server 18 are identical, and may include conventional hardware components (not shown) such as a motherboard, central processing unit (CPU), random access memory (RAM), hard disk drive, display adapter, other storage media, a monitor, keyboard, mouse or other user input/output means, a network interface card (NIC), and/or other conventional input/output devices.


Network server 16 generally has loaded in its RAM conventional operating system software (not shown), such as UNIX®, Linux™, Windows NT®, Novell®, Solaris® or other server operating system. Network server 16 may further have loaded in its RAM conventional web server software (not shown) for handling http (hyper text transfer protocol) or web page requests from remote users. Server 16 or data base server (not shown) in central server system 12 will also generally have loaded in its RAM conventional database software (not shown) such as Oracle®, IBM® DB2, Microsoft SQL® or other appropriate database software for storage, update and retrieval of server identification data associated with database 27. In accordance with the invention, servers 16 further include a program storage device 20, as noted above, which may be in the form of a floppy disk, or other such software storage device which can be transferred from server 16 to a spare server 18.


Referring now to FIG. 2, as well as FIG. 1, there is shown a program storage device 20 in accordance with the present invention. Each program storage device 20 preferably comprises a particular server's 16 unique machine identifier or ID 22, a kernel 30 for boot up purposes, and a small image application 32 such as a “Drive Image”. When it is necessary to replace a server 16 for any reason, such as performing upgrades or maintenance, the program storage device 20 may be removed from server 16 and placed into a blank or spare server 18. The program storage device allows the spare server 18 to be re-configured such that it is identical to the original server 16, so that spare server 18 can replace the original server 16 while the original server undergoes maintenance or upgrading.


The program storage device 20 allows a backup server 18 to be re-configured as a replacement for a server 16. The boot kernel 30 included in the program storage device 20 allows for spare server 18 to boot up when it is turned on. The small image software 32 allows an image of an operating system (“OS”) and a maintenance application (not shown) to be copied to the hard drive of spare server 18. The OS and maintenance application may be copied from an external CD (computer disk) (not shown), or may be downloaded from the central server system 12. The spare server 18 is re-booted using the newly installed OS, and the maintenance application writes and reconfigures the BIOS (basic input/output system) settings of the spare server 18, and the maintenance application, which is now on the hard drive of spare server 18, contacts the administration server 26 associated with the central server system 12.


Upon contacting by the maintenance application, the administration server 26 issues a DHCP (dynamic host configuration protocol), and a temporary internet protocol (IP) which is external, to enable the spare server 18 to receive information from data base 27 by TCP/IP. The central server system 12 will then download, from data base 27 to the spare server 18, one or more applications which are appropriate for the machine identifier 22 that the spare server 18 now contains. In other words, the central server 12 provides the applications to spare server 18 required for spare server 18 to replace server 16, and spare server 18 is fully operational as a replacement for server 16. Once the spare server 18 has received the appropriate applications, the IP address for spare server 18 is re-configured to the local non-routable IP address designated for the original server 16. The spare server 18 is then re-booted and, at this point, is in all aspects an identical copy of the original server it has replaced. Maintenance or upgrade operations for server 16 may be carried out without inconvenience to network customers, since spare server 18 acts as an identical replacement for original server 16.


In operation, maintenance and upgrades can be initiated remotely via a web page (not shown), associated with the web server 24 of central server system 12. A request can be made by personnel from the web page to shut down a particular, selected server 16 which corresponds to a specific machine identifier 22. The web server 24 transmits the machine identifier 22 code for the selected server 16 to the data base server 28, which then retrieves data from data base 27 regarding the location of server 16 within the network system 10. The request for shutdown is operatively communicated to server 16 by central server system 12, and shut down of server 16 is initiated. Shut down of server 16 is carried out slowly, and traffic associated with the server 16 being shut down is directed to the other servers of operation center 14 to avoid interruption of customer service. Once server 16 has been shut down, the program storage device 20 corresponding to server 16 is placed or loaded into a spare server 18, and spare server 18 is configured to match or replace server 16, to produce an identical backup machine for server 16. Spare server 18 is started up and placed on line, and the server 18 communicates to central server system 12 that it is on line and operational. Information regarding location and operation of the replacement server 18 preferably is stored in data base 27, to allow remote shut down of server 18 at a future time. The requester for the shut down of server 16 is informed that the replacement server 18 is operational, and customer traffic is redirected to back up server 18, while repairs or upgrades are performed on server 16.


Maintenance and/or upgrades for network servers 16 can also be initiated by requests to the administration server 26 in accordance to the invention. The requests can be made by administration personnel to shutdown or turn-on servers 16 by specifying the appropriate machine identifiers 22 via the administration server 26. The data base server 28 retrieves data on the specified machine identifiers 22 from data base 27, thus allowing the servers 16 to be contacted by the central server system 12 and requested to shutdown. During shut down, traffic associated with server 16 is re-routed through other servers in the operation center 14 to avoid service interruption, as noted above. The program storage device 20 corresponding to server 16 is then loaded into spare server 18, spare server 18 is configured to match or replace server 16, and spare server 18 is brought on line as related above.


Maintenance or upgrading of server 16 as described above may be carried out upon notice by personnel of a malfunction by server 16, or according to a predetermined maintenance or upgrade schedule. In the event that a server 16 “crashes” or catastrophically malfunctions, a back up server 18 may be brought into service to replace server 16 in the same manner as described above, although the crash will result in interruption of customer service.


Referring now to FIG. 3, there is shown one preferred format structure for a machine identifier 22 for a server 16, in accordance with the invention. The machine identifier 22 will generally include a plurality of fields 34, 36, 38, 40, each of which contains one or more cells having a value or symbol therein as described below. The number of fields and cells may vary as required for different implementations of the invention, and it should be understood that the format structure of FIG. 3 is only exemplary. Thus, the number of fields, as well of the number of cells in each field, may vary in different embodiments of the invention.


In the presently preferred embodiments, the machine identifier 22 will comprise fifteen digits or values which collectively represent an alphanumeric code for a server 16 in the network system 10. The field 34 will generally identify a number or code specific for a type of server machine. Thus, the first (left most) cell 42 in field 34 includes an “M” symbol to identify the field 34 as a code for a machine type. Cell 44 includes a value representative of a server class type, while cells 46 and 48 provide values which relate a specific machine number. Cell 50 includes an “S” symbol to indicate that field 36 relates a code for a site location (corresponding to the location of an operation center 14), and cells 52, 54 include values which identify the particular site location. Cell 56 includes an “A” symbol to identify that field 38 identifies a telephone area code corresponding to the site location for an operation center 14, and cells 58, 60, 62 include values representing the area code. Cell 64 includes a symbol “C” to indicate that field 40 is a country code, and cells 66, 68, 70 include values representing a country code corresponding to the country in which an operation center 14 is located.


Thus, in the specific example of FIG. 3, the values of machine identifier 22 provide “M001SO2A408C001” as a fifteen digit alphanumeric code which identifies the type or class of server 16, the number of a particular server machine 16 in an operation center 14, the site location of the operation center 14, and the telephone area code and country code for the operation center 14. In this manner, the machine identifier can be specific for a single server device 16 in a large network system 10 spanning multiple countries. The machine identifier 22 thus provides a method of naming servers 16 within a network system 10 which is very straightforward in comparison to the IP assignment convention or the domain name server (DNS) naming convention used at present. Once again, the machine identifier 22 of the invention may vary. For example, in network systems 10 located in a single country, the country code field 40 may be omitted, or the cells therein may be used to encode different information.


Referring now to FIG. 4, as well as FIG. 1 through FIG. 3, the acts and events associated with the remote upgrade and maintenance method of the present invention will be more fully understood. The events shown in FIG. 4 may be initiated by event 100 or event 110.


In event 100, a request for shut down of a specific server machine 16, for upgrade or maintenance purposes, is made by the administration server 26 pursuant to an instruction from personnel as described above. The request is made by administration personnel, or according to predetermined scheduling, to shutdown server 16, for upgrade purposes, by specifying the appropriate machine identifier 22 via the administration server 26.


In event 110, which may occur alternatively to event 100, a shut down request for a specific server machine 16 is made from web server 24 for upgrade or maintenance purposes. As described above, a web page (not shown) is associated with the web server 24 of central server system 12, and a request is made by personnel, via the web page to shut down a particular, selected server 16 which corresponds to a specific machine identifier 22.


At event 120, database server 28 receives a request for information associated with shut down of a particular server 16. Event 120 may be responsive to a request from the administration server 24 in event 100 or web server 24 in event 110 as noted above. In event 120, data base server 28 retrieves data from data base 27 regarding the location of server 16 within the network system 10.


At event 130, a shut down request is transmitted or communicated by the central server system 12, via machine identifier server 29, to server 16 which is to be shut down.


At event 140, server 16 is shut down. As noted above, shut down of server 16 is carried out slowly, and traffic associated with server 16 is directed to the other servers in the operation center 14, to avoid interruption of customer service.


At event 150, the program storage device 20 corresponding to server 16 is removed from server 16 and is placed or loaded into a spare server 18.


At event 160, spare server 18 is configured to match or replace server 16, in order to produce an identical backup machine for server 16, and the spare server 18 is brought on line. The details of event 160 are described further below with reference to FIG. 5.


At event 170, the replacement server 18, which is fully operational with the machine identifier 22 of the replaced server 16, communicates with central server system 12 and informs central server system 12 that spare server 18 is in operation. Information regarding the location and operation of spare server 18 is stored in data base 27.


At event 180, the central server informs the entity that requested shut down of server 16 that the replacement server 18 is operational. As noted above, the requesting entity may be the web server 24 or administration server 26.


Referring now to FIG. 5, as well as FIG. 1 through FIG. 4, the events associated with the re-configuration of spare server 18 to produce an identical backup machine for server 16 are shown. As noted above, the events shown in FIG. 5 occur generally during event 160 of FIG. 4.


At event 200, the spare server 18, which now contains the program storage device 20 is turned on or otherwise powered up.


At event 210, the spare server 18 is booted up. This event is generally carried out using the boot kernel 30, which is included in the program storage device 20.


At event 220, the operating system and maintenance application associated with the original server 16 are copied to the hard drive of the spare server 18. This event is generally carried out using the small image software 32 included in the program storage device 20. The operating system and maintenance application may be copied from a CD which is manually loaded into spare server 18, or may be downloaded from data base 27 to spare server 18, as related above.


At event 230, the spare server 18 is re-booted using the newly installed operating system and maintenance application which were copied to the spare server 18 in event 220. In this event, the maintenance application writes and reconfigures the BIOS settings of the spare server 18 to that of the original server 16.


At event 240, the administration server 26 is contacted by the spare server 18, which now has the maintenance application loaded on its hard drive.


At event 250, the administration server 26 issues temporary internet protocol and DHCP for the spare server 18, to allow the spare server 18 to receive information from data base 27.


At event 260, data and applications associated with the machine identifier 22 of the original server 16 are retrieved from data base 27 by the data base server 28.


At event 270, the data and applications related to original server 16, which were obtained in event 260, are transmitted or downloaded to the spare server 18.


At event 280, a new internet protocol or IP for the spare server is established. Generally, the IP address for spare server 18 is re-configured to the local non-routable IP address designated for the original server 16.


At event 290, the spare server 18 is re-booted. At this point the spare server 18 is, in all aspects, an identical copy of the original server 16 which it has replaced. Maintenance or upgrade operations for server 16 may be carried out while spare server 18 operates as its replacement, thereby avoiding without inconvenience to customers.


Accordingly, it will be seen that this invention provides an apparatus and method for operational support for remote network systems which allows for the rapid replacement of one server with another, in such instances as server malfunctions, routine maintenance or upgrades. Although the description above contains many specificities, these should not be construed as limiting the scope of the invention but as merely providing an illustration of the presently preferred embodiment of the invention. Thus the scope of this invention should be determined by the appended claims and their legal equivalents.

Claims
  • 1. A method of remotely configuring a spare server in a network system comprising a data base of server configuration information, the method comprising: copying an operating system and a maintenance application to said spare server;after a failure of a first server in the network system, transferring a program storage device to the spare server, the program storage device containing a boot kernel and a unique machine identifier identifying the failed first server;after transferring the program storage to the spare server, booting the spare server from the program storage device; andafter booting the spare server, the spare server configuring itself to be a functionally identical replacement for the failed first server by receiving configuration information from the data base of server configuration information according to the unique machine identifier of the first server, thereby replacing the failed first server with the configured spare server.
  • 2. The method of claim 1 wherein said remotely configuring further comprises sending said machine identifier, by said maintenance application, to the data base associated with a central server system, said central server system operatively coupled to said first server and said spare server.
  • 3. The method of claim 2, wherein said remotely configuring further comprises transmitting at least one application, by said central server system, to said spare server according to said machine identifier.
  • 4. The method of claim 1, wherein said remotely configuring comprises maintaining, by said maintenance application, correct BIOS settings of said first server and said spare server according to said machine identifier.
  • 5. The method of claim 1, further comprising providing a web server operatively coupled to said first server and said spare server, said web server including a web site configured for remote turn-on and shutdown of said first server and said spare server according to requests associated with said machine identifier.
  • 6. The method of claim 1, further comprising providing a central server system operatively coupled to said first server and said spare server, said central server system including an administration server configured for remote turn-on and shutdown of said first server and said spare server according to requests associated with said machine identifier.
  • 7. The method of claim 1, wherein said remotely configuring further comprises providing a central server system operatively coupled to said first server and said spare server, said central server system including the data base, said central server system configured to recognize said machine identifier according to said data base.
  • 8. The method of claim 7, wherein said remotely configuring further comprises transmitting at least one application from said central server system data base to said spare server according to said machine identifier.
  • 9. The method of claim 1 wherein value of said unique machine identifier is static, and wherein said unique machine identifier remains associated with the first server regardless of a physical location of said program storage device.
  • 10. The method of claim 1, wherein the administration server enables the spare server to connect with the central server system data base.
  • 11. The method of claim 1, wherein the data base downloads applications to the spare server according to the unique machine identifier associated with the first server and the program storage device.
  • 12. A system for remotely configuring a functionally identical replacement for a specific server in a network, comprising: a plurality of servers coupled with a central server system in the network, each server of the plurality of servers having a unique machine identifier identify the server;a data base of server configuration information coupled with the central server system in the network comprising server configuration information for each server of the plurality of servers, wherein the configuration formation for each server is associated with the unique machine identifier identifying the server;a backup server coupled to the network having a copy of an operating system and a maintenance application;a plurality of program storage devices corresponding to said plurality of servers, each said program storage device including a boot kernel configured to boot up said at least one backup server after a failure of the specific server and a unique machine identifier identifying the specific server to be replaced of said plurality of servers; andthe at least one backup server is configured to receive and to read said program storage devices and is further configured to adopt a configuration of the specific server to be replaced, after the specific server fails and after the at least one backup server is booted from the program storage device having the machine identifier corresponding to the specific server to be replaced, wherein the machine identifier remains associated with the specific server to be replaced until the at least one backup server adopts the configuration of the specific server such that the at least one backup server becomes a functionally identical replacement for said specific server to be replaced.
  • 13. The system of claim 12 wherein said central server system further comprises: a web server;an administration server;a data base server comprising the data base; andthe data base including data associated with said plurality of servers, said data base server configured to retrieve data from said data base according to instructions from said central server system and the unique machine identifier.
  • 14. The system of claim 12 wherein said program storage device further comprises a small image software program configured to copy an operating system and a maintenance application to a hard drive of said backup server.
  • 15. The system of claim 14 wherein said maintenance application is configured to utilize said machine identifier to retrieve at least one application from a data base associated with said central server system, said at least one application associated with one of said plurality of servers.
  • 16. A system for remote support of a network, comprising: a plurality of servers including a first server to be replaced having a first configuration associated with a unique machine identifier and a separate backup server capable of being configured to the first configuration after the first server fails, the backup server having a copy of an operating system and a maintenance application;a plurality of program storage devices corresponding to said plurality of servers; anda program storage device including a boot kernel configured to boot up the separate backup server after a failure of the first server, and a unique machine identifier that identifies the first configuration of the first server to be replaced by the separate backup server,wherein the program storage device is configured to be transferred to, and boot up, the backup server after a failure of the first server, and the machine identifier enables the backup server to be configured to the first configuration wherein the backup server can be configured remotely after receiving the program storage device, such that the backup server becomes a functionally identical replacement for the first server.
  • 17. The system of claim 16 further comprising a central server system, the central server system includes: a web server;an administration server;a data base server; anda data base including data associated with said plurality of servers by the unique machine identifier included in said program storage device.
  • 18. The system of claim 16 wherein said program storage device further comprises a small image software program configured to copy an operating system and a maintenance application to a hard drive of said backup server.
  • 19. A system for remote support of a network, comprising: a central server system comprising a database of server configurations each accessible by a unique machine identifier;a plurality of servers coupled with said central server system, the plurality of servers including a first server having a first configuration associated with a unique machine identifier and a configurable backup server having a copy of an operating system and a maintenance application;a plurality of program storage devices corresponding to said plurality of servers; anda program storage device, configured to be transferred to the backup server after a failure of the first server, the program storage device including a boot kernel configured to boot up the backup server after the failure of the first server, such that the backup server is then identified by the unique machine identifier associated with the first configuration, and a software application program configured to receive configuration information from the database of server configurations and to configure the backup server to the first configuration, after backup server is booted from the program storage device, according to the server configuration information associated with the unique machine identifier wherein said backup server can be configured remotely after receiving, and being booted up from, the program storage device.
  • 20. The system of claim 19 wherein said program storage device further comprises a small image software program configured to copy an operating system and a maintenance application to a hard drive of said backup server.
  • 21. The system of claim 20 wherein said maintenance application is configured to utilize said machine identifier to retrieve at least one application from a data base coupled to said central server system, said at least one application associated with the first server by the machine identifier.
US Referenced Citations (541)
Number Name Date Kind
4887212 Zamora et al. Dec 1989 A
5111398 Nunberg et al. May 1992 A
5115466 Presttun May 1992 A
5130993 Gutman et al. Jul 1992 A
5146221 Whiting et al. Sep 1992 A
5204902 Reeds et al. Apr 1993 A
5329619 Page et al. Jul 1994 A
5392390 Crozier Feb 1995 A
5418854 Kaufman et al. May 1995 A
5418908 Keller et al. May 1995 A
5425079 Noda et al. Jun 1995 A
5483352 Fukuyama Jan 1996 A
5485161 Vaughn Jan 1996 A
5509070 Schull Apr 1996 A
5519433 Lappington et al. May 1996 A
5519606 Frid-Nielsen et al. May 1996 A
5543789 Behr et al. Aug 1996 A
5544061 Morimoto et al. Aug 1996 A
5561446 Montlick Oct 1996 A
5574906 Morris Nov 1996 A
5579489 Dornier et al. Nov 1996 A
5588009 Will Dec 1996 A
5592470 Rudrapatna et al. Jan 1997 A
5623406 Ichbiah Apr 1997 A
5623661 Hon Apr 1997 A
5628005 Hurvig May 1997 A
5630081 Rybicki et al. May 1997 A
5638508 Kanai et al. Jun 1997 A
5640577 Scharmer Jun 1997 A
5644709 Austin Jul 1997 A
5647002 Brunson Jul 1997 A
5649195 Scott et al. Jul 1997 A
5650800 Benson Jul 1997 A
5657372 Ahlberg Aug 1997 A
5666397 Lamons et al. Sep 1997 A
5666553 Crozier Sep 1997 A
5682524 Freund et al. Oct 1997 A
5684990 Boothby Nov 1997 A
5694596 Campbell Dec 1997 A
5699255 Ellis et al. Dec 1997 A
5701423 Crozier Dec 1997 A
5706509 Man-Hak Tso Jan 1998 A
5710922 Alley et al. Jan 1998 A
5727202 Kucala Mar 1998 A
5727950 Cook et al. Mar 1998 A
5729735 Meyering Mar 1998 A
5729739 Cantin et al. Mar 1998 A
5729743 Squibb Mar 1998 A
5742792 Yanai et al. Apr 1998 A
5745750 Porcaro Apr 1998 A
5745906 Squibb Apr 1998 A
5757920 Misra et al. May 1998 A
5758150 Bell et al. May 1998 A
5758355 Buchanan May 1998 A
5764899 Eggleston et al. Jun 1998 A
5768480 Crawford, Jr. et al. Jun 1998 A
5768597 Simm Jun 1998 A
5771354 Crawford Jun 1998 A
5778346 Frid-Nielsen et al. Jul 1998 A
5778361 Nanjo et al. Jul 1998 A
5778367 Wesinger et al. Jul 1998 A
5778388 Kawamura et al. Jul 1998 A
5781901 Kuzma Jul 1998 A
5787247 Norin et al. Jul 1998 A
5787262 Shakib et al. Jul 1998 A
5794228 French et al. Aug 1998 A
5804803 Cragun et al. Sep 1998 A
5809497 Freund et al. Sep 1998 A
5812773 Norin Sep 1998 A
5812793 Shakib et al. Sep 1998 A
5818437 Grover et al. Oct 1998 A
5826245 Sandberg-Diment Oct 1998 A
5828376 Solimene et al. Oct 1998 A
5832489 Kucala Nov 1998 A
5832518 Mastors Nov 1998 A
5832519 Bowen et al. Nov 1998 A
5832520 Miller Nov 1998 A
5845283 Williams et al. Dec 1998 A
5859973 Carpenter Jan 1999 A
5864864 Lerner Jan 1999 A
5875296 Shi et al. Feb 1999 A
5884323 Hawkins et al. Mar 1999 A
5884325 Bauer et al. Mar 1999 A
5893119 Squibb Apr 1999 A
5896321 Miller Apr 1999 A
5897640 Veghte et al. Apr 1999 A
5897642 Capossela et al. Apr 1999 A
5903723 Beck et al. May 1999 A
5907793 Reams May 1999 A
5909568 Nason Jun 1999 A
5923756 Shambroom Jul 1999 A
5923848 Goodhand et al. Jul 1999 A
5926816 Bauer et al. Jul 1999 A
5933653 Ofek Aug 1999 A
5933778 Buhrmann et al. Aug 1999 A
5933816 Zeanah et al. Aug 1999 A
5935262 Barrett et al. Aug 1999 A
5937405 Campbell Aug 1999 A
5941944 Messerly Aug 1999 A
5943676 Boothby Aug 1999 A
5944787 Zoken Aug 1999 A
5946615 Holmes et al. Aug 1999 A
5948066 Whalen et al. Sep 1999 A
5950193 Kulkarni Sep 1999 A
5951636 Zerber Sep 1999 A
5961572 Craport et al. Oct 1999 A
5961590 Mendez et al. Oct 1999 A
5966717 Sass Oct 1999 A
5968131 Mendez et al. Oct 1999 A
5970149 Johnson Oct 1999 A
5970490 Morgenstern Oct 1999 A
5971277 Cragun et al. Oct 1999 A
5974238 Chase, Jr. Oct 1999 A
5974563 Beeler, Jr. Oct 1999 A
5987381 Oshizawa Nov 1999 A
5987609 Hasebe Nov 1999 A
5995118 Masuda Nov 1999 A
6000000 Hawkins et al. Dec 1999 A
6006215 Retallick Dec 1999 A
6006274 Hawkins et al. Dec 1999 A
6009462 Birrell et al. Dec 1999 A
6012063 Bodnar Jan 2000 A
6012088 Li et al. Jan 2000 A
6014695 Yamashita et al. Jan 2000 A
6016394 Walker Jan 2000 A
6016478 Zhang et al. Jan 2000 A
6023620 Hansson Feb 2000 A
6023708 Mendez et al. Feb 2000 A
6023723 McCormick et al. Feb 2000 A
6026414 Anglin Feb 2000 A
6034621 Kaufman Mar 2000 A
6038665 Bolt et al. Mar 2000 A
6044381 Boothby et al. Mar 2000 A
6049776 Donnelly et al. Apr 2000 A
6052735 Ulrich et al. Apr 2000 A
6058399 Morag et al. May 2000 A
6061790 Bodnar May 2000 A
6061796 Chen et al. May 2000 A
6063134 Peters et al. May 2000 A
6064880 Alanara May 2000 A
6065018 Beier et al. May 2000 A
6067582 Smith et al. May 2000 A
6073133 Chrabaszcz Jun 2000 A
6076109 Kikinis Jun 2000 A
6078960 Ballard Jun 2000 A
6081900 Subramaniam et al. Jun 2000 A
6094618 Harada Jul 2000 A
6101480 Conmy et al. Aug 2000 A
6108330 Bhatia et al. Aug 2000 A
6108703 Leighton et al. Aug 2000 A
6112024 Almond et al. Aug 2000 A
6115797 Kanda et al. Sep 2000 A
6131096 Ng et al. Oct 2000 A
6131116 Riggins et al. Oct 2000 A
6141011 Bodnar et al. Oct 2000 A
6141621 Piwowarski et al. Oct 2000 A
6141659 Barker et al. Oct 2000 A
6141664 Boothby Oct 2000 A
6145088 Stevens Nov 2000 A
6148260 Musk et al. Nov 2000 A
6151606 Mendez Nov 2000 A
6157630 Adler et al. Dec 2000 A
6163773 Kishi Dec 2000 A
6163779 Mantha et al. Dec 2000 A
6163844 Duncan et al. Dec 2000 A
6167120 Kikinis Dec 2000 A
6173310 Yost et al. Jan 2001 B1
6173311 Hassett et al. Jan 2001 B1
6182117 Christie et al. Jan 2001 B1
6182141 Blum et al. Jan 2001 B1
6185598 Farber et al. Feb 2001 B1
6189030 Kirsch et al. Feb 2001 B1
6189096 Haverty Feb 2001 B1
6195695 Cheston et al. Feb 2001 B1
6195794 Buxton Feb 2001 B1
6202085 Benson et al. Mar 2001 B1
6205448 Kruglikov et al. Mar 2001 B1
6209034 Gladwin et al. Mar 2001 B1
6212529 Boothby et al. Apr 2001 B1
6212556 Arunachalam Apr 2001 B1
6216131 Liu et al. Apr 2001 B1
6219680 Bernardo et al. Apr 2001 B1
6219694 Lazaridis et al. Apr 2001 B1
6223187 Boothby et al. Apr 2001 B1
6226650 Mahajan et al. May 2001 B1
6233565 Lewis et al. May 2001 B1
6233589 Balcha et al. May 2001 B1
6243760 Armbruster et al. Jun 2001 B1
6246889 Boltz Jun 2001 B1
6247048 Greer et al. Jun 2001 B1
6247135 Feague Jun 2001 B1
6249690 Mashiko Jun 2001 B1
6252547 Perry et al. Jun 2001 B1
6255989 Munson et al. Jul 2001 B1
6256750 Takeda Jul 2001 B1
6260124 Crockett et al. Jul 2001 B1
6272545 Flanagin et al. Aug 2001 B1
6275831 Bodnar et al. Aug 2001 B1
6278941 Yokoyama Aug 2001 B1
6282435 Wagner et al. Aug 2001 B1
6282698 Baker et al. Aug 2001 B1
6285889 Nykanen et al. Sep 2001 B1
6286029 Delph Sep 2001 B1
6286053 Van Peursem et al. Sep 2001 B1
6286085 Jouenne et al. Sep 2001 B1
6289212 Stein et al. Sep 2001 B1
6292743 Pu et al. Sep 2001 B1
6292905 Wallach et al. Sep 2001 B1
6295502 Hancock et al. Sep 2001 B1
6295541 Bodnar et al. Sep 2001 B1
6304881 Halim et al. Oct 2001 B1
6317755 Rakers et al. Nov 2001 B1
6321236 Zollinger et al. Nov 2001 B1
6324467 Machii et al. Nov 2001 B1
6324526 D'Agostino Nov 2001 B1
6324544 Alam et al. Nov 2001 B1
6327533 Chou Dec 2001 B1
6329680 Yoshida et al. Dec 2001 B1
6330568 Boothby et al. Dec 2001 B1
6332158 Risley et al. Dec 2001 B1
6333973 Smith et al. Dec 2001 B1
6338096 Ukelson Jan 2002 B1
6339710 Suzuki Jan 2002 B1
6341316 Kloba et al. Jan 2002 B1
6345308 Abe Feb 2002 B1
6349336 Sit et al. Feb 2002 B1
6353448 Scarborough et al. Mar 2002 B1
6356910 Zellweger Mar 2002 B1
6356961 Oprescu-Surcobe Mar 2002 B1
6360252 Rudy et al. Mar 2002 B1
6360330 Mutalik et al. Mar 2002 B1
6363249 Nordeman et al. Mar 2002 B1
6363412 Niwa et al. Mar 2002 B1
6374250 Ajtai et al. Apr 2002 B2
6381700 Yoshida Apr 2002 B1
6389462 Cohen et al. May 2002 B1
6396482 Griffin et al. May 2002 B1
6397307 Ohran May 2002 B2
6397351 Miller et al. May 2002 B1
6401104 LaRue et al. Jun 2002 B1
6405218 Boothby Jun 2002 B1
6418309 Moon et al. Jul 2002 B1
6430289 Liffick Aug 2002 B1
6434627 Millet et al. Aug 2002 B1
6437818 Ludwig et al. Aug 2002 B1
6449622 LaRue et al. Sep 2002 B1
6453392 Flynn, Jr. Sep 2002 B1
6457062 Pivowar et al. Sep 2002 B1
6460036 Herz Oct 2002 B1
6462644 Howell et al. Oct 2002 B1
6463464 Lazaridis et al. Oct 2002 B1
6466967 Landsman et al. Oct 2002 B2
6473621 Heie Oct 2002 B1
6480896 Brown et al. Nov 2002 B1
6484143 Swildens et al. Nov 2002 B1
6487560 LaRue et al. Nov 2002 B1
6490655 Kershaw Dec 2002 B1
6496944 Hsiao et al. Dec 2002 B1
6499108 Johnson Dec 2002 B1
6505216 Schutzman et al. Jan 2003 B1
6507891 Challenger et al. Jan 2003 B1
6516314 Birkler et al. Feb 2003 B1
6516327 Zondervan et al. Feb 2003 B1
6519452 Agostino et al. Feb 2003 B1
6523063 Miller et al. Feb 2003 B1
6523079 Kikinis et al. Feb 2003 B2
6532588 Porter Mar 2003 B1
6535743 Kennedy et al. Mar 2003 B1
6535949 Parker Mar 2003 B1
6539494 Abramson et al. Mar 2003 B1
6542933 Durst, Jr. et al. Apr 2003 B1
6546425 Hanson et al. Apr 2003 B1
6549933 Barrett et al. Apr 2003 B1
6549937 Auerbach et al. Apr 2003 B1
6553375 Huang et al. Apr 2003 B1
6553410 Kikinis Apr 2003 B2
6553413 Leighton et al. Apr 2003 B1
6564336 Majkowski May 2003 B1
6567850 Freishtat et al. May 2003 B1
6567857 Gupta et al. May 2003 B1
6581065 Rodkin et al. Jun 2003 B1
6584454 Hummel et al. Jun 2003 B1
6589290 Maxwell et al. Jul 2003 B1
6591266 Li et al. Jul 2003 B1
6591306 Redlich Jul 2003 B1
6591362 Li Jul 2003 B1
6597700 Golikeri et al. Jul 2003 B2
6601071 Bowker et al. Jul 2003 B1
6601143 Lamparter Jul 2003 B1
6609005 Chern Aug 2003 B1
6628194 Hellebust et al. Sep 2003 B1
6636894 Short et al. Oct 2003 B1
6640302 Subramaniam et al. Oct 2003 B1
6643707 Booth Nov 2003 B1
6647399 Zaremba Nov 2003 B2
6654746 Wong et al. Nov 2003 B1
6662212 Chandhok et al. Dec 2003 B1
6665721 Hind et al. Dec 2003 B1
6668254 Matson et al. Dec 2003 B2
6671724 Pandya et al. Dec 2003 B1
6671757 Multer et al. Dec 2003 B1
6684088 Halahmi Jan 2004 B1
6684206 Chen et al. Jan 2004 B2
6684302 Kershaw Jan 2004 B2
6694335 Hopmann et al. Feb 2004 B1
6694336 Multer et al. Feb 2004 B1
6701316 Li et al. Mar 2004 B1
6704849 Steegmans Mar 2004 B2
6714987 Amin et al. Mar 2004 B1
6718336 Saffer et al. Apr 2004 B1
6718348 Novak et al. Apr 2004 B1
6718390 Still et al. Apr 2004 B1
6725239 Sherman et al. Apr 2004 B2
6728530 Heinonen et al. Apr 2004 B1
6732101 Cook May 2004 B1
6732264 Sun et al. May 2004 B1
6738789 Multer et al. May 2004 B2
6741851 Lee et al. May 2004 B1
6745040 Zimmerman Jun 2004 B2
6757696 Multer et al. Jun 2004 B2
6757698 McBride et al. Jun 2004 B2
6757712 Bastian et al. Jun 2004 B1
6781575 Hawkins et al. Aug 2004 B1
6795848 Border et al. Sep 2004 B1
6799214 Li Sep 2004 B1
6804690 Dysert et al. Oct 2004 B1
6804783 Wesinger, Jr. et al. Oct 2004 B1
6810411 Coughlin et al. Oct 2004 B1
6812961 Parulski et al. Nov 2004 B1
6813487 Trommelen Nov 2004 B1
6816481 Adams et al. Nov 2004 B1
6829654 Jungck Dec 2004 B1
6836657 Ji et al. Dec 2004 B2
6836765 Sussman Dec 2004 B1
6839022 Benco et al. Jan 2005 B1
6839568 Suzuki Jan 2005 B2
6842695 Tu Jan 2005 B1
6850944 MacCall et al. Feb 2005 B1
6868451 Peacock Mar 2005 B1
6870921 Elsey et al. Mar 2005 B1
6886013 Beranek Apr 2005 B1
6892225 Tu et al. May 2005 B1
6892245 Crump et al. May 2005 B1
6904449 Quinones Jun 2005 B1
6904460 Raciborski et al. Jun 2005 B1
6920488 Le Pennec et al. Jul 2005 B1
6925476 Multer Aug 2005 B1
6925477 Champagne et al. Aug 2005 B1
6934767 Jellinek Aug 2005 B1
6944651 Onyon et al. Sep 2005 B2
6944676 Armbruster et al. Sep 2005 B1
6954660 Aoyama Oct 2005 B2
6954783 Bodwell et al. Oct 2005 B1
6959331 Traversat et al. Oct 2005 B1
6963914 Breitbart et al. Nov 2005 B1
6973299 Apfel Dec 2005 B2
6996617 Aiken, Jr. et al. Feb 2006 B1
6996631 Aiken, Jr. et al. Feb 2006 B1
7003555 Jungck Feb 2006 B1
7003668 Berson et al. Feb 2006 B2
7007041 Multer et al. Feb 2006 B2
7010578 Lewin et al. Mar 2006 B1
7016964 Still et al. Mar 2006 B1
7023868 Rabenko et al. Apr 2006 B2
7030730 Zondervan Apr 2006 B1
7035878 Multer et al. Apr 2006 B1
7039656 Tsai et al. May 2006 B1
7051275 Gupta et al. May 2006 B2
7054594 Bloch et al. May 2006 B2
7054952 Schwerdtfeger et al. May 2006 B1
7082476 Cohen et al. Jul 2006 B1
7085817 Tock et al. Aug 2006 B1
7096418 Singhal et al. Aug 2006 B1
7099915 Tenereillo et al. Aug 2006 B1
7103794 Malcolm et al. Sep 2006 B2
7107043 Aoyama Sep 2006 B2
7110954 Yung et al. Sep 2006 B2
7116681 Hovell et al. Oct 2006 B1
7146161 Chou Dec 2006 B2
7158805 Park et al. Jan 2007 B1
7159036 Hinchliffe et al. Jan 2007 B2
7162494 Arellano Jan 2007 B2
7167728 Wagner et al. Jan 2007 B1
7181628 Sato et al. Feb 2007 B2
7197574 Ishiyama Mar 2007 B1
7233791 Gilbert et al. Jun 2007 B2
7237027 Raccah et al. Jun 2007 B1
7249175 Donaldson Jul 2007 B1
7269433 Vargas et al. Sep 2007 B2
7284051 Okano et al. Oct 2007 B1
7289964 Bowman-Amuah Oct 2007 B1
7293074 Jellinek et al. Nov 2007 B1
7308651 Kling et al. Dec 2007 B2
7315826 Guheen et al. Jan 2008 B1
7317907 Linkert et al. Jan 2008 B2
7328341 Eun et al. Feb 2008 B1
7343568 Jiang et al. Mar 2008 B2
7349719 Buniatyan Mar 2008 B2
7356559 Jacobs et al. Apr 2008 B1
7363233 Levine Apr 2008 B1
7383061 Hawkins Jun 2008 B1
7392034 Westman et al. Jun 2008 B2
7415486 Multer et al. Aug 2008 B2
7440746 Swan Oct 2008 B1
7447743 Jordan, Jr. Nov 2008 B1
7454500 Hsu et al. Nov 2008 B1
7499888 Tu et al. Mar 2009 B1
7505762 Onyon et al. Mar 2009 B2
7519702 Allan Apr 2009 B1
7539697 Akella et al. May 2009 B1
7587398 Fredricksen et al. Sep 2009 B1
7596609 Refuah et al. Sep 2009 B1
7663652 Reese Feb 2010 B1
7707150 Sundararajan et al. Apr 2010 B2
7853664 Wang et al. Dec 2010 B1
8010095 Natsuno et al. Aug 2011 B2
8073954 Tu et al. Dec 2011 B1
8224308 Gavrylyako et al. Jul 2012 B1
20010005849 Boothby et al. Jun 2001 A1
20010014893 Boothby Aug 2001 A1
20010028363 Nomoto et al. Oct 2001 A1
20010034737 Cane et al. Oct 2001 A1
20010044805 Multer et al. Nov 2001 A1
20010047471 Johnson Nov 2001 A1
20010051920 Joao et al. Dec 2001 A1
20010056473 Arneson et al. Dec 2001 A1
20020007303 Brookler et al. Jan 2002 A1
20020010868 Nakashima et al. Jan 2002 A1
20020016818 Kirani et al. Feb 2002 A1
20020016912 Johnson Feb 2002 A1
20020032751 Bharadwaj Mar 2002 A1
20020040369 Multer et al. Apr 2002 A1
20020049852 Lee et al. Apr 2002 A1
20020055909 Fung et al. May 2002 A1
20020056011 Nardone et al. May 2002 A1
20020059116 Bulatovic et al. May 2002 A1
20020062365 Nishikawa et al. May 2002 A1
20020067816 Bushnell Jun 2002 A1
20020069178 Hoffman Jun 2002 A1
20020072350 Fukuzato Jun 2002 A1
20020073212 Sokol et al. Jun 2002 A1
20020078075 Colson et al. Jun 2002 A1
20020082995 Christie Jun 2002 A1
20020083325 Mediratta et al. Jun 2002 A1
20020087588 McBride et al. Jul 2002 A1
20020091785 Ohlenbusch et al. Jul 2002 A1
20020116444 Chaudhri et al. Aug 2002 A1
20020118192 Couckuyt et al. Aug 2002 A1
20020120600 Schiavone et al. Aug 2002 A1
20020126814 Awada et al. Sep 2002 A1
20020128908 Levin et al. Sep 2002 A1
20020138582 Chandra et al. Sep 2002 A1
20020152278 Pontenzone et al. Oct 2002 A1
20020162011 Tanaka et al. Oct 2002 A1
20020168964 Kraft Nov 2002 A1
20030021274 Siikaniemi et al. Jan 2003 A1
20030028451 Ananian Feb 2003 A1
20030037020 Novak et al. Feb 2003 A1
20030043195 Kling et al. Mar 2003 A1
20030061163 Durfield Mar 2003 A1
20030065934 Angelo et al. Apr 2003 A1
20030069874 Hertzog et al. Apr 2003 A1
20030110280 Hinchliffe et al. Jun 2003 A1
20030158960 Engberg Aug 2003 A1
20030163483 Zingher et al. Aug 2003 A1
20030200023 Matsushita et al. Oct 2003 A1
20030204568 Bhargava et al. Oct 2003 A1
20030217181 Kiiskinen Nov 2003 A1
20030229723 Kangas et al. Dec 2003 A1
20030229898 Babu et al. Dec 2003 A1
20030233418 Goldman Dec 2003 A1
20030236933 Shigeta et al. Dec 2003 A1
20040003390 Canter et al. Jan 2004 A1
20040054746 Shibata Mar 2004 A1
20040093342 Arbo et al. May 2004 A1
20040093385 Yamagata May 2004 A1
20040110497 Little Jun 2004 A1
20040111465 Chuang et al. Jun 2004 A1
20040120477 Nguyen et al. Jun 2004 A1
20040132428 Mulligan Jul 2004 A1
20040146150 Barnes Jul 2004 A1
20040148408 Nadarajah Jul 2004 A1
20040204120 Jiles Oct 2004 A1
20040224665 Kokubo Nov 2004 A1
20040267390 Ben-Yaacov et al. Dec 2004 A1
20040267676 Feng et al. Dec 2004 A1
20050050117 Seo et al. Mar 2005 A1
20050054354 Roman et al. Mar 2005 A1
20050086296 Chi et al. Apr 2005 A1
20050090253 Kim et al. Apr 2005 A1
20050096975 Moshe May 2005 A1
20050114470 Bal May 2005 A1
20050144200 Hesselink et al. Jun 2005 A1
20050144251 Slate Jun 2005 A1
20050191998 Onyon et al. Sep 2005 A1
20050227674 Kopra et al. Oct 2005 A1
20050233800 Jones Oct 2005 A1
20050240494 Cue et al. Oct 2005 A1
20050273632 Kawakami Dec 2005 A1
20050283741 Balabanovic et al. Dec 2005 A1
20060095397 Torres et al. May 2006 A1
20060148477 Reilly Jul 2006 A1
20060190626 Bhogal et al. Aug 2006 A1
20060195474 Cadiz et al. Aug 2006 A1
20060199599 Gupta et al. Sep 2006 A1
20060212482 Celik Sep 2006 A1
20060233335 Pfleging et al. Oct 2006 A1
20060268842 Takahashi et al. Nov 2006 A1
20060277160 Singh et al. Dec 2006 A1
20060288112 Soelberg et al. Dec 2006 A1
20070005504 Chen et al. Jan 2007 A1
20070022469 Cooper et al. Jan 2007 A1
20070047533 Criddle et al. Mar 2007 A1
20070050734 Busey Mar 2007 A1
20070127597 Ammer et al. Jun 2007 A1
20070190983 Goldfarb et al. Aug 2007 A1
20070220419 Stibel et al. Sep 2007 A1
20070226783 Mimlitsch Sep 2007 A1
20080005080 Xiques et al. Jan 2008 A1
20080009268 Ramer et al. Jan 2008 A1
20080022220 Cheah Jan 2008 A1
20080027826 Popick et al. Jan 2008 A1
20080039020 Eskin Feb 2008 A1
20080051071 Vishwanathan et al. Feb 2008 A1
20080051117 Khare et al. Feb 2008 A1
20080064378 Kahan et al. Mar 2008 A1
20080089299 Lindsley et al. Apr 2008 A1
20080104442 Diao et al. May 2008 A1
20080120199 Pirnack et al. May 2008 A1
20080208617 Onyon et al. Aug 2008 A1
20080214167 Natsuno et al. Sep 2008 A1
20080270805 Kean Oct 2008 A1
20090037828 Waite et al. Feb 2009 A1
20090138546 Cruzada May 2009 A1
20090327305 Roberts et al. Dec 2009 A1
20100057777 Williamson Mar 2010 A1
20100205448 Tarhan et al. Aug 2010 A1
20100251230 O'Farrell et al. Sep 2010 A1
20110107203 Nash et al. May 2011 A1
20110269424 Multer et al. Nov 2011 A1
20120151346 McClements, IV Jun 2012 A1
Foreign Referenced Citations (54)
Number Date Country
1202662 Dec 1998 CN
1455522 Nov 2003 CN
1313697 Feb 2005 CN
2003-122958 Jul 2006 CN
0801487 Oct 1997 EP
0836131 Apr 1998 EP
0836301 Apr 1998 EP
0924917 Jun 1999 EP
0930593 Jul 1999 EP
1024441 Feb 2000 EP
0986225 Mar 2000 EP
1139608 Oct 2001 EP
1180890 Feb 2002 EP
1263244 Apr 2002 EP
1998-106683 Dec 1998 FR
2366050 Jun 2001 GB
7303146 Nov 1995 JP
10191453 Jul 1998 JP
11242620 Sep 1999 JP
11242677 Sep 1999 JP
2000232680 Aug 2000 JP
2000316053 Nov 2000 JP
2002142254 May 2002 JP
2002185575 Jun 2002 JP
2002247144 Aug 2002 JP
2002314689 Oct 2002 JP
2003259011 Sep 2003 JP
WO 9704391 Feb 1997 WO
WO 9739564 Oct 1997 WO
WO 9741520 Nov 1997 WO
WO 9803005 Jan 1998 WO
WO 9821648 May 1998 WO
WO 9829994 Jul 1998 WO
WO 9854662 Dec 1998 WO
WO 9856159 Dec 1998 WO
WO 9905813 Feb 1999 WO
WO 9906900 Feb 1999 WO
WO 9936870 Jul 1999 WO
WO 9940514 Aug 1999 WO
WO 9945451 Sep 1999 WO
WO 9945484 Sep 1999 WO
WO 9946701 Sep 1999 WO
WO 9950761 Oct 1999 WO
WO 9965256 Dec 1999 WO
WO 0011832 Mar 2000 WO
WO 0016222 Mar 2000 WO
WO 0029998 May 2000 WO
0133874 May 2001 WO
WO 0171539 Sep 2001 WO
WO 0180535 Sep 2001 WO
0217140 Feb 2002 WO
03056789 Jul 2003 WO
03-083716 Oct 2003 WO
WO 2005112586 Dec 2005 WO
Non-Patent Literature Citations (19)
Entry
Finnigan, Anne, “The Safe Way to Shop Online,” Sep. 1998, p. 162, Good Housekeeping, v. 227 No. 3.
Chase, Larry, “Taking Transactions Online,”Oct. 1998, pp. 124-132, Target Marketing, v.21 No. 10.
Gong, Li, “Increasing Availability and Security of an Authentication Service,” Jun. 1993, pp. 657-662, IEEE Journal on Selected Areas in Communications, v. 11 No. 5.
DeMaio, Harry B., “My MIPS are Sealed,” Sep./Oct. 1993, pp. 46-51, Chief Information Officer Journal, v. 5 iss.7.
Anonymous: “Download filter for MMS”, Research Disclosure, Mason Publications, Hampshire, GB, vol. 457, No. 28, May 1, 2002, XP007130322, ISSN: 0374-4353.
Intellisync Email Accelerator, A detailed guide to functionality-Product functionality paper, Mar. 2004, pp. 1-18.
Lee et al, “Monitoring Data Archives for Grid Environments,” Jul. 2002, 10 pgs.
Batista et al. “Mining Web Access Logs of an On-line Newspaper” Jul. 2002, 8 pgs. http://ectrl.itc.it/rpec/.
Internet Mail Consortium: :vCard Overview, Oct. 13, 1998, 3 pages, Retrieved from the Internet: www.imc.org/pdi/vcardoverview.
Internet Mail Consortium: :vCard The Electronic Business Card, Jan. 1, 1997, 5 pages, Retrieved from the Internet: www.imc.org/pdi/vcardwhite.html.
Reed, Benjamin C., et al.,“Authenticating Network-Attached Storage,”IEEE, Jan.-Feb. 2000, pp. 49-57.
Gaskin, J.E.:Messaging-Instant Enterprise—Once a Novelty item, IM is Becoming a More Serious Tool for Business Users, InternetWeek, No. 810, Apr. 24, 2000, p. 55.
BusinessWire, “FusionOne Partners with WhitePages.com to Deliver Automatic Synchronization for Online Subscriber,”press release, Oct. 11, 2000.
Malone, et al., Semi-Structured Messages are Surprisingly Useful for Computer-Supported Coordination, Proceedings of the Conference on Computer-Supported Cooperative Work, Austin, Texas, Dec. 3-5, 1986, pp. 1-26.
Patel et al.,“The Multimedia Fax-MIME Gateway,” 8440 IEEE MultiMedia No. 4, Jan. 1994, 7 pgs.
Lamb et al.,“LAN-Based Office for the Enterprise, A Case Study,” Advantis Company, White Plains, NY 10605, Jan. 1994 IEEE, pp. 440-447.
Rou et al., “Online File Storage System,” 2002 Student Conference on Research and Development Proceedings, Shah Alam, Malaysia, Nov. 7, 2002, IEEE, pp. 83-86.
Agarwal et al., “On the Scalability of Data Synchronization Protocols for PDAs and Mobile Devices,” Jul. 2002, IEEE Network, pp. 22-28.
“Secure Hash Algorithm”, Wikipedia, accessed Feb. 28, 2012, <http://en.wikipedia.org/wiki/Secure—Hash—algorithm>.