The present invention generally relates to communications network. More specifically, the present invention relates to web based communications system.
With increasing popularity of using the Internet and World Wide Web (“the Web”) for the rapidly changing digital world, individuals as well as enterprises, exchange (or swap) large volumes of information through the Web. The demand for larger and faster information exchange has increasingly grown in recent years. For example, various business meetings and conferences are conducted over the Web with attendees scattered around the world. To enhance the communication between the meeting attendees, not only voice (and/or image) information is important, but also information exchange can be critical.
Fast, volume, and secure information exchange is important in enhancing the efficiency of a communications network. A problem associated with a conventional network is limited size and speed. For example, a typical email system limits the size of each email, such as 10 megabytes, thereby a reasonable speed of delivery of such email can be achieved. Another problem associated with a conventional network is that various hosts require software installation before a user can use their platform. For example, Skype™ requires users to install its proprietary software on the user's systems before it allows them to use its platform.
Accordingly, there is a need in the art to provide a faster, more secure, volume information exchange over the Web.
The present invention relates to a method and apparatus for information exchange over a web environment.
With the development of central controlled distributed scalable virtual machine (CCDSVM) and the web-based computer user working (operating) environment (WCUWE), the problems mentioned in the previous section can easily be solved by introducing a “dynamic work space” technology of this invention within the frameworks of CCDSVM and WCUWE.
With dynamic work space technology, one or more login users of CCDSVM, each using a browser of any system and from anywhere, can instantly perform tasks. For example, each user can post or un-post messages, files, folders, or other resources on systems of CCDSVM with group-based model or non-group 1-to-1 model to one or more audiences on the network. This technology will also achieve larger scales of secure information exchange without size limitation and the installation of special software.
The implementation of this invention has provided users with a web-browser based, 1-click system that is capable of securing exchanges of messages, files, folders, or other information resources on systems crossing network domains without size limitation.
Additional features and benefits of the present invention will become apparent from the detailed description, figures, and claims set forth below.
The present invention will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the invention, which, however, should not be taken to limit the invention to the specific embodiments, but are for explanation and understanding only.
Embodiments of the present invention are described herein in the context of a method, system and apparatus for providing a web based communications network with fast, volume, and secure information exchange. Those of ordinary skill in the art will realize that the following detailed description of the present invention is illustrative only and is not intended to be in any way limiting. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure. Reference will now be made in detail to implementations of the present invention as illustrated in the accompanying drawings. The same reference indicators will be used throughout the drawings and the following detailed description to refer to the same or like parts.
In the interest of clarity, not all of the routine features of the implementations described herein are shown and described. It will, of course, be appreciated that in the development of any such actual implementation, numerous implementation-specific decisions must be made in order to achieve the developer's specific goals, such as compliance with application- and business-related constraints, and that these specific goals will vary from one implementation to another and from one developer to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking of engineering for those of ordinary skill in the art having the benefit of this disclosure.
In accordance with the present invention, the components, process steps, and/or data structures described herein may be implemented using various types of operating systems, computing platforms, computer programs, and/or general purpose machines. In addition, those of ordinary skill in the art will recognize that devices of a less general purpose nature, such as hardwired devices, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or the like, may also be used without departing from the scope and spirit of the inventive concepts disclosed herein. Where a method comprising a series of process steps is implemented by a computer or a machine and those process steps can be stored as a series of instructions readable by the machine, they may be stored on a tangible medium such as a computer memory device (e.g., ROM (Read Only Memory), PROM (Programmable Read Only Memory), EEPROM (Electrically Eraseable Programmable Read Only Memory), FLASH Memory, Jump Drive, and the like), magnetic storage medium (e.g., tape, magnetic disk drive, and the like), optical storage medium (e.g., CD-ROM, DVD-ROM, paper card and paper tape, and the like) and other known types of program memory.
Those of ordinary skill in the art will realize that the following detailed description of the present invention is illustrative only and is not intended to be in any way limiting. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure. It will be apparent to one skilled in the art that these specific details may not be required to practice to present invention. In other instances, well-known circuits and devices are shown in block diagram form to avoid obscuring the present invention. In the following description of the embodiments, substantially the same parts are denoted by the same reference numerals.
While particular embodiments of the present invention have been shown and described, it will now be apparent to those skilled in the art having the benefit of this disclosure that many more modifications than mentioned above are possible without departing from the inventive concepts disclosed herein. Therefore, the appended claims are intended to encompass within their scope all such modifications as are within the spirit and scope of this invention.
The present invention can be implemented by a web based system operated in a network infrastructure, such as a central controlled distributed scalable virtual machine (“CCDSVM”).
The network infrastructure (“network”) includes all necessary hardware and software that facilitate various users from different geographic locations to communicate through the Internet, an Intranet, and/or a LAN. The hardware of the network includes network connection media, wireless media, circuitry components, and communication equipments. The network connection media includes various cables such as Ethernet and/or optical fiber. The wireless media is capable of establishing wireless communication links through air. The circuitry components include processor, data bus, memory devices, and/or circuit board. The communication equipments, such as switches, routers, gateways, and/or adapters, are used to provide a communications network. It should be noted that there are other possible elements of communication equipment that may be needed to form a communication link, but they are not necessary to understand the present invention.
The software infrastructure includes Internet Protocol (“IP”) addresses and system name identification software such as Domain Name System (“DNS”), firewall software, IP gateway set-up software, IP broadcast, and so forth. The communication protocols over the network could be IP-based standard or non-standard proprietary protocols such as Hypertext Transfer Protocol (“HTTP”) over Transmission Control Protocol/Internet Protocol (“TCP/IP”) or Simple Object Access Protocol (“SOAP”) over TCP/IP. It should be further noted that some IP based protocols are proprietary protocols and some are non-IP based protocols.
A web-browser is an application program that allows a user to access information over the Web, such as Windows Internet Explorer (“IE”), FireFox, Netscape, and/or Mozillar. A web-browser could also be any proprietary software, which uses web-protocols such as HTTP, WAP, SOAP for communication over the network. The web-browser can be implemented with any suitable programming languages such as C, C++, Java, or XML, or a combination of the suitable languages.
A web page, on the other hand, is a displayable information resource that is accessible through web-browser. The web page may be hosted by a web server via a web server system and can be transmitted (or retrieved) by a web-browser.
Provisioned systems 3, client systems 10, console systems 1, and control management system 2 are computational systems, which could be server system, desktop or laptop system, handheld devices such as PDA, wireless phone, and so forth. The computational systems include CPUs, storage devices, and memory controller. The storage devices include internal memory such as read-only memory (“ROM”) and/or random access memory (“RAM”). The storage devices may further include external storage devices such as magnetic disks or tapes, which include redundant array of independent drives (“RAID”), JBOB, and memory stick. The associated storage controller can be Integrated Drive Electronics (“IDE”), Small Computer System Interface (“SCSI”), Fiber optical controller, or a combination of above-mentioned devices.
The computational systems also include non-embedded or real-time embedded OS running, which could be Linux, or Windows, Unix, or proprietary OS. It should be noted that the present invention may include multiple control systems at different layers of system configuration topology wherein each of the control systems is capable of communicating with each other through a network. The control systems at middle layers play dual roles as both control system and provisioned system in the system configuration topology.
Console system 1 is a computational system having a web-browser or web-console 9 wherein web-browser is used by privileged users for accessing the CCDSVM platform. Web browser 9, which could be on any system, permits a user to access information from the CCDSVM by following a web URL link. For example, a privileged user enters a term of “https://69.107.28.123/stt/sttwebos” on a command line of web browser 9 and once the link is established, the user can obtain information hosted by the web-based computer user work/operation environment (“WCUWE”). Console system 1, in one embodiment, further includes software modules 13, wherein modules 13 may be used to facilitate communication between console system 1 and control management system 2.
Control system 2, in one embodiment, is a server system, a desktop or a laptop system with memory and storage capabilities. Control system 2 includes web server software 7 and console supporting software 6. Console supporting software 6 includes web server interface software modules 5 and control management software modules 4. The control management system 2 may also have web-browser 9 used as a web-console 9 of control system 2. Web server software 7 sends/receives data to/from web-console 9 of console system 1 or client system 10 or control system 2. Web server software 7 is configured to provide secure sockets layer (“SSL”) encryption to encrypting the data before transmission to enhance the security. Web server software 7 could be commercially available software such as Apache™ from open source, or IIS from Microsoft or a proprietary software. Web server software modules and console support software modules can be implemented by any suitable or a combination of any suitable programming languages such as C, C++, Java, JavaScript, HTML, or XML.
Console supporting software 6 communicates with service software modules 8 of provisioned systems 3. Web server interface 5 of console support software 6 is capable of providing special functions that are otherwise performed by web server 7. If no provisioned system 3 is coupled to the CCDSVM platform, control management system 2, in one embodiment, is reconfigured to continue monitoring systems over the network while the CCDSVM platform is also reconfigured to a single stand-alone system, as shown in
Provisioned system 3, in one embodiment, is a computational system, wherein the system may contain suitable operating system (“OS”). Provisioned systems 3 can be automatically provisioned by control system 2 through an automatic system service pool construction protocol. Provision process, also known as pooling process, is a method allowing control system 2 to control one or more network systems by reconfiguring the network systems. For example, when a provisioned system boots up via a communication protocol, control system 2 obtains provisioned system's name, IP address, and system information wherein the system information includes network information, storage information, file system information and so forth. Each provisioned system 3 can be monitored, accessed, and/or operated by a user(s) through web-browser 9 of console system 1. In an alternative embodiment, provisional system 3 is controlled by users through client systems 10 via control system 2 with proper users' authentication. Each provisioned system 3 contains service software modules 8, which is used to communicate with servers over the Web. For example, service software modules 8 of provisioned system 3 can communicate with control management software 4 to carry out tasks for viewing or operating on resources of provisioned system 3. Service software 8 can communicate with web-browser 9 of client system 10 or console system 1 to transfer data between them or deliver service to them, or to communicate with another provisioned system 3 to send or receive data.
Service software modules 8 may include special software modules having compatible functionalities of web-server software 7 of control system 2 and to dedicate handling HTTP protocol or other web protocols if there is needs for web-based communication with client 10 or with other provisioned system 3 or with control system 2. Software modules 8 could be commercially available web server software 7 or any proprietary software. The service software modules 8 could be implemented with any suitable programming languages such as C, C++, Java, or JavaScript.
Net 11 and Net 12 are network infrastructures that are capable of providing communication links between control management system 2, console system 1, client system 10, and/or provisioned systems 3.
Client systems 10 may not be a part of CCDSVM, but with the permission and authorization, users from web-browser 9 of client system 10 can login to CCDSVM and access the permitted resources of CCDSVM using web-browser 9 by following a web URL link of CCDSVM. While privileged users can obtain, manage, access, and/or operate system resources from CCDSVM through WCUWE, regular (non-privileged) users at client systems 10 may be permitted to access only limited system resources of CCDSVM.
CCDSVM configuration, in one embodiment, includes four data flow paths. First data path is a communication link between web browser 9 of client host 10 (or console host 1 or control management system 2) and web handling software on control system 2 (such as web-server 7 or console support software 6). With this path of data flow, whenever a user sends a request from web-browser 9 to web-server 7 or console support software 6, console support software 6 collects required information from target provisioned systems 3 and converts them into standard structured information (web-format) for web communication. The targeted system could be one of provisioned systems 3 or control system 2. The information collected by console support software 6 of control system 2 could be the system status, or the storage information, or the network information, or the user authentication profile, or the file system information, or files & folders information on control system 2, or any targeted provisioned system 3. Console support software 6 then passes this converted structured information to web server software 7 and further transmits to web-browser 9 through communication link Net 11 and Net 12 so that it can be displayed and viewed by a conventional web browser 9, as shown in
The communication protocol used between web-browser 9 of client system 10 (or console system 1 or control system 2) and web server 7 of control system 2 could be HTTP, HTTPS (SSL encrypted HTTP protocol) or any suitable web protocols for web communication, which could successfully transmit the data on the web or could be other standard or proprietary IP-based on non-IP-based protocols. This data path may be referred to as console support software 6, which transmits data to/from web-browser 9 or web-server 7.
The second data path is the data flow through communication link between control system 2 and provisioned systems 3. Requests targeted to a provisioned system 3 are passed from console support software 6 of control system 2 to service modules 8 of provisioned systems 3 through communication link network 12. When the responses for those requests are received by control system 2, service modules 8 of provisioned system 3 carry out the requested tasks, and then send the response back to console support software 6 of control system 2. The implementation of the actual products of this invention on the second data path may use proprietary TCP/UDP/IP based protocols for the communication between provisioned systems 3 and control system 2. However, other standards or proprietary IP-based or any suitable non-IP-based protocol are also possible. The communication protocols used between console support software 6 of control system and service modules 8 of provisioned system 3 can be any suitable IP based or non-IP based protocols, whichever is suitable to transmit data between them. The typical data flow through this path could be the boot message, system status, network information, or storage information of provisioned system 3, as shown in
The third data path is the data flow between provisioned systems 3 and client system 10 or console system 1 via communication link 12. Referring back to
The fourth data path is data flow through communication link between provisioned system 3 and another provisioned system 3. With this path, service modules 8 of one provisioned system 3 can directly transmit data or information to service modules 8 of another provisioned system 3 via a communication link Net 12 without going through control system 2. The implementation of the actual products of this invention, for example, uses a proprietary IP-based protocol for communications between the two provisioned systems 3. The principle of this invention, however, does not rely on or limit to proprietary protocol. It should be noted that other standard or proprietary IP-based or any suitable non-IP-based protocol may also be possible. The data and information transmitted through the fourth data path can be various types of data. For example, a user on web browser 9 obtains a file or a folder on a provisioned system 3 provided by control system 2 and also selects a targeted folder on a targeted system provided by control system. The user can also instruct to transfer a file from a current target provisioned system 3 to another provisioned system 3 by a mouse click. The data file will then be transferred directly between the two provisioned systems 3 without going through control system 2.
Unless specifically specified, the console support software modules 6 of control system 2, the provisioned systems 3, the service software modules 8 of provisioned system 3, and the web-browser 9 of control system 2, client system 10, and console system 1 are referred to the CCDSVM platform illustrated in
A web-based computer user work/operation environment (“WCUWE”) of CCDSVM is a software infrastructure, shown in
The tasks also include allowing privileged users to create users, groups, assign users to each group, to assign initial associated system resources to each user or group, and to save the information of created users and groups into a database stored on a storage media of the control system. The information needed for creating users or groups include user names, user IDs, assigned security permissions, passwords, access points, group names, group IDs, maximum members in a group, and so forth. The tasks also include various system operations such as manage network, storage, file system, folder, files, messages, user security, and so forth.
The database is organized as one or more lists of tables, wherein each of the lists contains various resources. For example, the resources could be one or more user's information, one or more system's information, one or more network cards, and one or more disk drive's information. The storage media could be a system's internal storage or disk drive, for example.
The WCUWE of CCDSVM includes software modules of present invention. For example, the software includes console support modules 6 of control system 2, service software modules 8 of provisioned system 3, and other service software 13 of console system 1. The current implementation of WCUWE is based on a proprietary design of this invention. However, the nature and spirit of this invention does not limit to proprietary designed software. The WCUWE of CCDSVM also includes other proprietary software modules or conventional software such as web-server 7 of control system 2, web-browser 9 of the control system 2, the client system 10, and console system 1.
The WCUWE of CCDSVM can be implemented with any suitable or combination of various suitable programming languages such as C, C++, Java, JavaScripts, HTML, or XML for example. To simplify the discussion, the WCUWE will be used to represent software modules in CCDSVM described above.
Users of CCDSVM may be created by CCDSVM through a given process or any users on the Internet, Intranet, or LAN without registering with CCDSVM. The WCUWE of CCDSVM provides user access to various resources and performs various tasks through a preferred model of mouse clicking on graphically represented resource objects on browser.
WCUWE is designed to be operated on a CCDSVM platform, and is specially designed to provide dynamic work space (
The dynamic work space of WCUWE is a centrally controlled collection of each group's work space and/or user's work space. Console support software 6 of control system 2 of CCDSVM will assign each user a private work space and each group a common work space when each user or group account is created by a privileged user after corresponding WCUWE software on control system and provisioned system enter into an operational mode. When a user or a group account is created, each user is assigned to a specific user security scope and permission. An important aspect of WCUWE of CCDSVM is that it assigns each user and/or each user-group a working space based on user and group security permission.
A work space is an organized information structure, which can be saved on storage media of memory or disk drives or both of memory and disk drives by console support software 6. A work space is created while a privileged user is performing the tasks of creating a user or group. The work space will be initiated and assigned with system resources of CCDSVM as shown in
For example, a privileged user can dynamically permit or deny a general user's access to a list of storage devices. During the operation, at one second, a user may see a list from user's web-browser, and at another second, a general user can no longer see the list. Also, if an authorized user can access a list of storage devices on a provisioned system and further, can take one of the devices offline so that the device list on the provisioned system will have one less device to be displayed.
In another example, at one second, a privileged user allows a general user to access a file J in folder N on system M of CCDSVM, and at another second, the privileged user resets previous permission thereby the general user can view and access the file J in folder N on system M of CCDSVM, and a second later, the general user cannot view and access it any more. The actual implementation of console support software 6 of control system 2 has achieved this capability.
In addition, each type of resources in the work space is organized as a list of tables and can be stored in storage media in control system. The integrity of security of each group is protected by limiting different resources to different groups. As such, each group is authorized to have a limited view over assigned system resources on provisioned system 3 as well as control system 2. The same security integrity at user level can be achieved by assigning different system resources of provisioned system 3 and/or control system 2 to different individual user based on assigned security permission. Therefore, each user is authorized to access and view the assigned resources.
The private work space of user X and user Y may also include private message area 21 and other resources, which are not displayed in
It is notable that said user X and user Y, may be in same user-group such as said group-1, however, each of them could have a significant different scope of private work space assigned by the console support software 6 of control system 2 due to they have been assigned with very different resources on systems depending on each user's role and security permission, which setup by privileged user of CCDSVM through web-based user interface provided by the said console support software 6. This is the beauty of the invention of WCUWE for CCDSVM.
The
Initially, the section-1, section-2, and section-3 are all empty due to no one has post any file or message yet. The said console support software 6 gets each login user's portion of assigned folders and files for online meeting from stored private file and folder area 22 of
During the interactive online meeting, the said console support software 6 provides each user to post or un-post files or folders to said section-3 of displayed group's common documents and contents management section with several steps. First, for example, providing said user X to click on one targeted file “Doc 1” 24 or folder a time in section-4 of displayed said file and folder management area of said user private work space. Second, select the operation of either post or un-post from an operation menu (see
Each user with permission may perform un-post operation if such user has at least a previously posted file or folder, which has already displayed in section-3 of common document and content management section of said web-browser 9 of all login users in said same user-group, see
If a file is selected, the said file operation menu is used and if a folder is selected, the said folder operation menu is used respectively. It is also possible to only provide one menu for both file and folder operation by said console support software 6. The said operation menu either can be pop-up menu for folder as shown in
In the example of
In addition, during the interactive online meeting, the console support software 6 of control system 2 also provides each user to post message to massive users in same group from said section-1 of private user message input section after typing a message and click on the “send” button. In the example of
In a specific situation, the said console support software 6 also provides permitted user to un-post the previously posted message. Just for example, in
The detailed information of how the post or un-post task to be implemented will be discussed in next two paragraphs 3.4 and 3.5. In addition, with this invention, the action of the “post” information such as posting information of files or folders or messages or other resources is equivalent to the action of “share” information. The action of “un-post” information is equivalent to the action of “un-share” previously posted or shared information, in other words, “remove” previously posted or shared information.
After user transmitting information data of the post or un-post task from web-browser 9 of console system 1 or client system 10 or control system 2 to control system 2, the console support software 6 of control system 2 obtains and parses the data to determine: who is the original user initiating the task; what type of task; what type of associated resources for task to work on; who is the targeted user; and what is the time stamp, and may also include other information without limitation. Console support software 6 further determines that if the task is to post a file or folder from said original user, the said console support software 6 picks up the corresponding file or folder information from file and folder area 22 of
If the task is to un-post a previously posted file or folder from a specific user in said common work space of said group, the said console support software 6 search for the corresponding information of file or folder from that specific user in the said file folder area of said common work space of said group and further remove the entry of matched information from said common work space of said group after it is found.
If the task is to post a message to users in said group, the parsed message will be stored in private message area 21 of
If a task is to un-post (delete/remove) a previously posted message, the said console support software 6 searches for a matching message in said common message area 18 of
It shall be noticed that the task of un-posting a file or folder of this invention does not actually delete the file and folder from original user's private work space. In addition, a lock protection mechanism is deployed whenever a message or information of a file or folder is written, stored, or deposited to either said private space or said common work space, or to said disk drives or other storage media. Throughout the rest of discuss, the lock protection is assume to be a default action without further mentioning whenever a write/store/deposit action take place. As matter the fact, each task of posting file, folder, and message as well as task of un-posting the previously posted file or folder, or message performed by multiple users in multiple groups with this invention can be executed by the said console support software 6 instantly with memory speed.
User can manually click on a refresh-button, which does not show on
The said run-time script will automatically and periodically perform tasks of refreshing said section-2 and section-3 of web browser screen. The frequency of the periodic refreshing can be adjusted by said console support software 6 of CCDSVM depends on the needs of the meeting, which typically can range from 1 to 3 seconds and there is no limitation on this aspect. Also, with the preferred example, said run-time script provided by WCUWE is a JavaScript, however, other type of programming scripts or methods are also possible and there is no limitation on what kind of run-time program shall be used in this invention. In addition, the said console support software 6 provides each user the choices of either automatic or manual refreshing their said web-browser 9.
Upon refreshing said section-2 or section-3 of said web-browser 9 screen of each user, a request of updating such screen will be generated and sent from said web-browser 9, to control system 2. The said console support software 6 obtains and parses each request to determine what user-group, and which part of said common work space of said group need to be updated.
Based on information of each parsed request, the said console support software 6 of control system 2 retrieves the updated resources and objectives from said common work space 15 of
If the request is to update the group messages, the converted information is sent to the section-2 of group common message display area in corresponding user's said web-page/web browser 9. If the request is to update the group common files and folders display area, the converted information is sent to the section-3 of said web-browser 9. Therefore, after refreshing said sections on said web-browser 9, each user can have an identical view of all posted files and folders from section-3 of group common document display area on said browser 9, and can have an identical view of all messages from section-2 of group common message display area on said web-browser 9, which posted by all other users in a same group. Meanwhile said console support software 6 still allow each user kept most of resources and objects in their own private work space un-exposed to other users in same group during the online interactive meeting.
For example, User X at his/her said web-browser 9 can see “picture 1” 25 of
A difference between a conventional Internet group communication model and the group based communication model described in the present invention is that console support software 6 of control system 2 provides each user to control post or un-post said resources from user's own private work space while the conventional Internet communication model are not capable of performing posting/un-posting task. Also, for example, un-posting a previous posted folder with WCUWE of CCDSVM does not delete the materials in user's private work space while the delete operation with said existing Internet group communication model will completely delete the posted folder. The dynamic work space of this invention represents a true beauty of the combined security protection of information and flexibility and efficiency of online meeting provided by WCUWE of CCDSVM to each users and groups in online meeting.
In addition, with a preferred example, since posted information of each files are encoded by said console support software 6 with a web link and displayed in said section-3 of web-browser 9, therefore, each user in a user-group can click on said link to download the files, which provided in private file and folder area of private work space of their peer users in group, from a system where the file is located. For example, user X can download said “picture 1”, which may reside on either control system 2 or provisioned system 3, from user Y and user Y can download said “Doc 1”, which also may reside on either control system 2 or provisioned system 3 from user X at same time. This achieves a true peer-to-peer exchanging files on permitted system from permitted users in said user-group. In addition, there is no size limitation on the file size for file to be downloaded, which is a gifted benefit from Internet technology. Besides the exampled and understandable method of download, other methods of retrieve peer users' digital documents or contents are also possible by deploying a more efficient proprietary file transfer mechanism to reach the results of said exchanging file. It shall be noted that the said method of download is only applicable to said files and does not apply to folder and other said resource information. To get a targeted peer user's entire folder and the underneath files and sub folders, a special files and folder transfer method is required.
As shown in
The mouse click driven copy/past operation allows files and folders from permitted folders of permitted provisioned system 3 to be dynamically physically copied to each users' private work space on control system 2, and the information of said files and folders could further to be displayed in said web-page/browser of each user and to be posted to common work space of group each user belong to in addition to direct posting these file or folders as described in previous paragraph 3.3 without physical copying over. As matter of the fact, operations provided by console support software 6 of control system 2 have added efficiency to posting or un-posting files and folders for each user depending on the real needs.
Additionally, said console support software 6 provides each user of each group capability of saving the posted messages of common message area of said common work space of said each group into a file in common file & folder area of said common work space of each group. Further, the saved file can be viewed, downloaded by each user in each group with same method of posting. Besides whenever there is needs, said console support software 6 provide users to reset message area to be empty by removing all message entries in message area of said user-group's common work space.
The important fact is that the designed WCUWE of CCDSVM has provided concurrent users each from a single web browser anywhere on the network to securely perform permitted various tasks, which could be run concurrent within a single web-browser. Because of console support software 6 of control system 2 let each users have exclusive view for resource objects in their private work space and in said common work space of a group each user belong to, and let each user to manage resource objects in their own private space, the multiple users in multiple groups can concurrently post or un-post files, folders, messages, or other resource objects without interfere users in other user-groups. Thus, the work spaces of each user and each group are well protected.
Hence, the console support software 6 of control system 2 provides privileged users to perform tasks of creating multiple users and user-groups on control system, and each group can be assigned with variable size of users for online interactive meeting. The total number of users and the total number of groups, and maximum number of users per groups of WCUWE of CCDSVM can support is an implementation issue and depends on the capacity of the control system 2. The WCUWE of CCDSVM and CCDSVM has been designed with unlimited scalability for both users and provisioned systems 3. On the other hand, the spirit of this invention does not limit to with the boundary issues of WCUWE and CCDSVM.
For example, as shown in
In addition to post messages in group-based communication involving parties with two or more users, WCUWE of CCDSVM also provide each user to post message to each other user with non-group based 1-to-1 message model.
The section-3 of web-page in said browser 9 let user to work with same said steps of non-group based 1-to-1 posting files and folders or un-posting previously posted files or folders as described in paragraph 3.9. The section-3 included in
The section-1 is user message input area together with an additional input field of “To who” due to unlike in group online meeting, the said console support software 9 have no knowledge of who is the targeted user in this case. User can posting a message with similar said steps as previous discussed in paragraph 3.3-3.4 of this invention. Nevertheless, unlike with group meeting messaging model, after obtaining and parsing information of the messages from each user, the console support software 6 of control system 2 will deposit the message to both targeted peer user and the original sending user's message areas of private work space. Further, with same said steps of displaying messages in each user's browser, which described in paragraph 3.4-3.5, each user can view both own message and messages from peer user in section-2 of browser.
For example, as shown in
Again, the said design choice of three section of web-page display and the order of each section is just a preferred example of implementation for non-group based peer user communication. This invention does not limited by web-screen display layout, for example, a screen display only with said section-1 and section-2 are also possible and so on without limitation.
The WCUWE of CCDSVM has provided a security hierarchy for members of any team to work together cross multiple locations. With said security hierarchy and said steps of posting or un-posting file and folder, the console support software 6 of control system 2 can specially let only team leader with capability of posting folder or file to be viewed, shared, and accessed by all team members or by an individual member in non-group meeting based environment. In addition, console support software also let each team member to post or un-post his/her file or folders to only a specific peer user one a time in non-group-meeting based environment. Again the said files or folders could be on said control system 2 or on any provisioned said provisioned system 3.
It is relatively straightforward for WCUWE of CCDSVM, more specifically the console support software 6, to support massive online users, who do not have account with CCDSVM and can not login CCDSVM to view the dynamically posted files, folders, or messages by users with account of CCDSVM.
In a preferred example, such as shown in
For users belong to same said designated user-group, each user from a web-browser on any system of said network to login to CCDSVM and get said group online meeting web-page as shown in
Meanwhile as previously described in paragraph 3.4-3.5 and as shown in
As shown in
As shown in
In addition to let original user in a group to control the un-posting file or folder in group based communication, the said console support software 6 of control system 2) may also provide a privileged user to un-post the previously posted files or files in the said displayed file and folder section of said web-page. To support this capability, the said console support software 6 will provide an operation menu to associate with said displayed files and folders in said display section, further to allow privileged user to perform similar un-post operation. After receiving the un-post operation, the said console support software 6 will perform similar said searching for selected file or folder in the group file and folder area 19 of
Having briefly described embodiments of the web based network environment in which the present invention operates,
Referring back to
Main memory 204, which may include multiple levels of cache memories, stores frequently used data and instructions. Main memory 204 may be RAM (random access memory), MRAM (magnetic RAM), or flash memory. Static memory 206 may be a ROM (read-only memory), which is coupled to bus 211, for storing static information and/or instructions. Bus control unit 205 is coupled to buses 211-212 and controls which component, such as main memory 204 or processor 202, can use the bus. Bus control unit 205 manages the communications between bus 211 and bus 212. Mass storage memory 207, which may be a magnetic disk, an optical disk, hard disk drive, floppy disk, CD-ROM, and/or flash memories for storing large amounts of data. Web based information exchange 230, in one embodiment, is a network control component for facilitating information exchange over the Web. It should be noted that web based information exchange 230 could be software or hardware or a combination of software and hardware components.
I/O unit 220, in one embodiment, includes a display 221, keyboard 222, cursor control device 223, and communication device 225. Display device 221 may be a liquid crystal device, cathode ray tube (“CRT”), touch-screen display, or other suitable display device. Display 221 projects or displays images of a graphical planning board. Keyboard 222 may be a conventional alphanumeric input device for communicating information between computer system 200 and computer operator(s). Another type of user input device is cursor control device 223, such as a conventional mouse, touch mouse, trackball, or other type of cursor for communicating information between system 200 and user(s).
Communication device 225 is coupled to bus 211 for accessing information from remote computers or servers, such as server 104 or other computers, through wide-area network 102. Communication device 225 may include a modem or a network interface device, or other similar devices that facilitate communication between computer 200 and the network. Computer system 200 may be coupled to a number of servers via a network infrastructure such as the infrastructure illustrated in
The present invention has been described in considerable details with reference to certain examples. However, other versions and examples are also possible, therefore, the spirit of this invention shall not be limited to these examples and/or embodiments. Also, the claims of this invention will label with numbering and in most cases, the numbering does not represent any sequence or order unless specifically described as the steps of a method.
This application claims the benefit of priority based upon U.S. Provisional Patent Application Ser. No. 60/787,653, filed on Mar. 31, 2006 in the name of the same inventor and entitled “Instant Post Document and Messages to Users from Central Controlled Distributed Scalable Virtual Machine,” and this application is also a continuation-in-part of U.S. patent application Ser. No. 10/713,904, filed on Aug. 12, 2002 in the name of the same inventor and entitled “Concurrent Web Based Multi-Task Support for Control Management System,” and is also a continuation-in-part of U.S. patent application Ser. No. 10/713,905, filed on Aug. 12, 2002 in the name of the same inventor and entitled “Method and Apparatus for Web-based Storage On Demand.”
Number | Date | Country | |
---|---|---|---|
60787653 | Mar 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10713904 | Aug 2002 | US |
Child | 11732496 | Apr 2007 | US |
Parent | 10713905 | Aug 2002 | US |
Child | 11732496 | Apr 2007 | US |