Virtual application manager

Information

  • Patent Grant
  • 8812613
  • Patent Number
    8,812,613
  • Date Filed
    Thursday, June 2, 2005
    19 years ago
  • Date Issued
    Tuesday, August 19, 2014
    10 years ago
Abstract
A system and method are provided for managing applications over a network between a server system and client computers. In one example, the method involves receiving user login information from a client computer, then accessing on the server system a user profile associated with the login information. The user profile includes a user environment configuration for a client environment. Transport protocols are selected based on the user profile. The transport protocols are protocols for transporting information between the server system and the client computer. The user environment configuration stored on the server system is then synchronized with a client environment configuration on the client computer.
Description
FIELD OF THE INVENTION

The present invention relates to software applications. More particularly, the present invention relates to managing software applications over a network.


BACKGROUND OF THE INVENTION

In the past, the process of installing and updating applications as well as sharing information on a plurality of computers was arduous and time-consuming. Professionals would install software on each computer using compact discs (CDs), network shares or other similar methods. As mentioned, this is time-consuming as well as difficult to synchronize throughout an entire company. With the advent of computer networking, where a plurality of computers communicate together, the process became much more streamlined. Specifically, two techniques for delivering applications have been developed over the years, remote execution and local delivery.


In a remote execution embodiment, a user accesses software which is loaded and executed on a remote server under the control of the user. One example is the use of Internet-accessible CGI programs which are executed by Internet servers based on data entered by a client. A more complex system is the Win-to-Net system provided by Menta Software. This system delivers client software to the user which is used to create a Microsoft® Windows® style application window on the client machine. The client software interacts with an application program executing on the server and displays a window, which corresponds to one which would be shown if the application were installed locally. The client software is further configured to direct certain I/O operations, such as printing a file, to the client's system, to replicate the “feel” of a locally running application. Other remote-access systems, such as provided by Citrix Systems, are accessed through a conventional Internet Browser or a proprietary client and present the user with a “remote desktop” generated by a host computer which is used to execute the software.


Since the applications are already installed on the server system, remote execution permits the user to access the programs without transferring a large amount of data. However, this type of implementation requires the supported software to be installed on the server. Thus, the server must utilize an operating system which is suitable for the hosted software. In addition, the server must support separately executing program threads for each user of the hosted software. For complex software packages, the necessary resources can be significant, limiting both the number of concurrent users of the software and the number of separate applications which can be provided.


In a local delivery embodiment, the desired application is packaged and downloaded to the user's computer. Preferably, the applications are delivered and installed as appropriate using automated processes. After installation, the application is executed. Various techniques have been employed to improve the delivery of software, particularly in the automated selection of the proper software components to install and initiation of automatic software downloads. In one technique, an application program is broken into parts at natural division points, such as individual data and library files, class definitions, etc., and each component is specially tagged by the program developer to identify the various program components, specify which components are dependent upon each other, and define the various component sets which are needed for different versions of the application.


Once such tagging format is defined in the Open Software Description (“OSD”) specification, jointly submitted to the World Wide Web Consortium by Marimba Incorporated and Microsoft Corporation on Aug. 13, 1999. Defined OSD information can be used by various “push” applications or other software distribution environments, such as Marimba's Castanet product, to automatically trigger downloads of software and ensure that only the needed software components are downloaded in accordance with data describing which software elements a particular version of an application depends on.


Although on-demand local delivery and execution of software using OSD/push techniques is feasible for small programs, such as simple Java applets, for large applications, the download time can be prohibitively long. Thus, while suitable for software maintenance, this system is impractical for providing local application services on-demand because of the potentially long time between when the download begins and the software begins local execution.


In the more recent past, attempts have been made to use streaming technology to deliver software to permit an application to begin executing before it has been completely downloaded. Streaming technology was initially developed to deliver audio and video information in a manner which allowed the information to be output without waiting for the complete data file to download. For example, a full-motion video can be sent from a server to a client as a linear stream of frames instead of a complete video file. As each frame arrives at the client, it can be displayed to create a real-time full-motion video display. However, unlike the linear sequences of data presented in audio and video, the components of a software application can be executed in sequences which vary according to user input and other factors.


To address the deficiencies in prior data streaming and local software delivery systems, an improved technique of delivering applications to a client for local execution has been developed. This technique called “Streaming Modules” is described in U.S. Pat. No. 6,311,221 to Raz et al. In a particular embodiment of the “Streaming Modules” system, a computer application is divided into a set of modules, such as the various Java classes and data sets which comprise a Java applet. Once an initial module or modules are delivered to the user, the application begins to execute while additional modules are streamed in the background. The modules are streamed to the user in an order which is selected to deliver the modules before they are required by the locally executing software. The sequence of streaming can be varied in response to the manner in which the user operates the application to ensure that needed modules are delivered prior to use as often as possible. To reduce streaming time, the size of code files, such as library modules, can be reduced by substituting various coded procedures with shortened streaming “stub” procedures which act as link-time substitutes for the removed code. Suitable modules to replace are those which are not required for the initial execution of the application. As the application is running locally on the client, additional modules are streamed to the client and the stub code can be dynamically replaced as the substituted procedures are received. The stub procedure can point to a streaming engine which will request a missing procedure if the program calls it before it has been received at the client. Although effective, the stub-code substitution technique used in the “Streaming Modules” system may require a reasonable degree of processing to prepare a given application for streaming. In addition, the client software required to manage the streamed modules does not necessarily integrate cleanly with the normal routines used by the operating system executing on the client machine.


To remedy some of the remaining issues, U.S. Pat. No. 6,574,618 to Eylon et al. disclosed a method and system for executing network streamed applications. Within the system, a client computer executes an application while parts of the application code are still being retrieved from the server over a network. The additional components of the application not required for startup are continuously loaded in the background until the entire application resides on the client computer. There are a number of drawbacks with this system though. The client cannot function without the server being available. Although, the application is physically available on the client once downloaded, due to encryption or other proprietary methods of preventing unauthorized access, the application is unavailable. Further, the prior art does not permit a user to access the server and applications from multiple client locations.


SUMMARY OF THE INVENTION

What is needed is an improved system having features for addressing the problems mentioned above and new features not yet discussed. Broadly speaking, the present invention fills these needs by providing a virtual application manager. It should be appreciated that the present invention can be implemented in numerous ways, including as a method, a process, an apparatus, a system or a device. Inventive embodiments of the present invention are summarized below.


In one embodiment, a method for managing one or more applications over a network is provided. The network is connected to a server system and to a client computer. The method comprises receiving user login information; accessing a user profile associated with the login information, wherein the user profile includes a user environment configuration; selecting transport protocols based on the user profile, wherein the transport protocols are protocols for transporting information between the server system and the client computer; and synchronizing the user environment configuration with a client environment configuration on the client computer.


In another embodiment, a system for managing one or more applications over a network is provided. The system comprises a client computer including a client environment; and a server system including a database, wherein the server system is configured to be connected to the client computer via the network, to store the one or more applications, to store a user profile including a user environment configuration, and to synchronize the client environment with the user environment configuration.


In yet another embodiment, a server system for managing one or more applications over a network is provided. The server system comprises a database, wherein the server system is connected to a client computer having a client environment, to store the one or more applications, to store a user profile including a user environment configuration, and to synchronize the client environment with the user environment configuration.


In still another embodiment, a method for managing one or more applications over a network is provided. The network is connected to a server system, a first client computer and a second client computer. The method comprises receiving user login information from the second client computer; accessing a user profile associated with user login information, wherein the user profile includes a user environment configuration received from the first client computer; selecting transport protocols based on the user profile, wherein the transport protocols are protocols for transporting information between the server system and the second client computer; and synchronizing the user environment configuration with a client environment configuration on the second client computer.


The invention encompasses other embodiments are configured as set forth above and with other features and alternatives.





BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be readily understood by the following detailed description in conjunction with the accompanying drawings. To facilitate this description, like reference numerals designate like structural elements.



FIG. 1 is a graphical representation of a virtual application manager (VAM), in accordance with the present invention;



FIG. 2 is a more detailed, graphical representation of the VAM, in accordance with the present invention;



FIG. 3 is a flowchart for a user environment maintenance process of the VAM, in accordance with the present invention;



FIG. 4 is a flowchart of the synchronization process of the VAM, in accordance with the present invention;



FIG. 5 is a sample database record for an application of the VAM, in accordance with the present invention;



FIG. 6 is a flowchart for a document type compatibility process of the VAM, in accordance with the present invention;



FIG. 7 is a flowchart for an operating system and hardware compatibility process of the VAM, in accordance with the present invention; and



FIG. 8 is a flowchart for a transfer process of the VAM for when a user moves to a different client computer, in accordance with the present invention.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)

An invention for a virtual application manager is disclosed. Numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be understood, however, to one skilled in the art, that the present invention may be practiced with other specific details.


Overview of a Virtual Application Manager



FIG. 1 is a graphical representation of a virtual application manager (VAM) 100, in accordance with the present invention. The VAM 100 is a group of technologies that enable a client computer 101 and other personal computing hardware devices to execute software installed and maintained on a remote server system 104. The client computer 101 includes a client environment 102, which is a graphical interface on a display device that allows the user to interact with the VAM 100. A user may define certain preferences of the client environment 102. These preferences define icons, links, colors, fonts, and other characteristics to be displayed on the display device. The client environment 102 is preferably a desktop environment, a thin client environment, a laptop environment, a personal digital assistant environment, a palmtop environment, a workstation environment, or other type of environment suitable for user interaction. The client environment 102 is stored as a user environment configuration on the server system 104. The user environment configuration is part of the user profile for the particular user.


User profiles follow a user at network login and allow the user to run the same software defined in his user profile on different hardware devices. The server system 104 maintains login security, application catalogs, billing information for each user, and application profiles. This information, maintained at a central location, increases user flexibility and mobility by eliminating reliance on a single personal hardware device. Software is installed and maintained at a central server system 104 and can be utilized at an almost unlimited number of network locations having client computers 101.


Components of a Virtual Application Manager



FIG. 2 is a more detailed, graphical representation of the VAM 100, in accordance with the present invention. The VAM 100 maintains an application environment, providing fast installation distribution to remote end-user hardware devices, such as a client computer 101. Each user has an account and a user profile. The user profile is centrally located on a central server system 104. The server system 104 includes a server transaction processor 204 and a relational database 206. The server system 104 maintains the user profile, which includes a list of applications to which the user is subscribed and authorized, the user's local preferences for each application, the client environment 102, and configuration of the local hardware and operating system. Such remote maintenance allows a user to move to different hardware platforms and operating environments without re-installing applications.


The VAM 100 supports multiple server and network technologies that allow an application to appear to be installed locally. However, the application is not necessarily installed locally. The application may be installed locally at the client computer 101, installed locally with the code hosted and stored remotely on the server system 104, or stored and executed on the remote server system 104.


The VAM 100 includes but is not limited to a server transaction processor 204, an application catalog, an application installation scripter, a server relational database 206, a client program launcher 212, a client application database 210, a client processor 202, and a client environment 102.


The server transaction processor 204 is a network server processor, executing requests from a client computer 101. Such requests include but are not limited to login, send list of user applications, send list of all applications, send icon graphic file, and send application detailed information.


The application catalog is a database of applications installed on the central servers of the server system 104. The application list is transmitted via the server transaction processor 204.


The application installation scripter is distributed to clients via the server transaction processor 204. The application installation scripter contains instructions for the client processor 202 on environment updates to the client environment 102. Such updates include but are not limited to registry updates, application group, and start up menu instructions.


The server relational database 206 is a commercial relational database used to support high volume, high uptime requirements of daemon processes of the server transaction processor 204.


The client program launcher 212 is a proxy program launcher that manages which application is processed, which transport is activated, etc. Accordingly, an application is not launched directly by the user. The user launches the client program launcher, which in turn handles the launching of the application.


The client application database 210 is a transient database on the client computer 101. An entire user environment is transferred over the network 105 from the server transaction processor 204 onto this transient database created on the client computer 101. This database includes such things as the list of user applications and application descriptions.


A user login client uses the server transaction processor 204 to manage the login state of the user session, receive the user password from the client computer 101, and authenticate the username and password. When the user is authenticated, the client environment maintenance modules are activated.


The client environment maintenance modules include a client software catalog module. When the user requests to add or remove an application, the client software catalog module is activated. This module updates the user profile, adding or removing the application, and updating the personal computer environment to accommodate the new application. The application installation scripter completes the application install process, allowing immediate access to the application.


In a related technology, two transport technologies for distributed virtual applications are supported, including remote network file system technology and server based computing technology. An example of remote network file system technology is a remote network operating system remote drives. Such a system allows applications to be implemented and stored on a remote storage system, but executed locally on a personal computing device. Another example of a remote network file system technology is a virtual distributed file system. In this technology, the application code is completely hosted remotely; the applications are partially and temporarily stored and executed locally; local files may or may not be available on the local file system but will have a “backing stored” copy on a remote server. Such technology is described in further detail in U.S. patent application Ser. No. 10/912,652, entitled “Virtual Distributed File System”, filed Aug. 4, 2004, which is herein incorporated by reference in its entirety.


An example of a server based computing technology is Unix® X11 xterminal protocol. In such technology, applications are stored and run on a remote Unix® system; the screen, keystroke and mouse movements are transferred over the network 105. Another example of a server based computing technology is Citrix® Technologies and Tarantella® Technologies. In such technologies, Microsoft® Windows® or Unix® applications are stored and run on a remote Unix® or Windows® server; the screen, keystroke, audio and mouse movement data is transmitted over the network 105.


A single user on a single personal computer device supports all the transport technologies described above. Such a setup provides maximum flexibility for the system administrator and shelters the user from this higher level of complexity.


In another related technology, a communications manager handles network monitoring, troubleshooting on end-user operating environments. Network deficiencies are immediately apparent and viewable by the dashboard gauges displaying network status and performance. In cases where other network paths are available, the communications manager can select alternate paths. The communications manager manages network monitoring and troubleshooting tools, network automatic disconnect and reconnect solutions, network interface, and technology arbitration technologies.


In yet another related technology, a virtual distributed data manager manages user files and databases often associated with user applications. The virtual distributed data manager includes remote network storage management of user data, synchronization of local data to a remote location and vice versa, and secure encrypted storage and management of remote data. The virtual distributed data manager is described in further detail in concurrently filed U.S. patent application. Ser. No. 11/144,179, entitled “Transaction Based Virtual File System Optimized For High-Latency Network Connections”, which is herein incorporated by reference in its entirety.


Processes of a Virtual Application Manager



FIG. 3 is a flowchart for a user environment maintenance process 300 of the VAM 100, in accordance with the present invention. A user initially logs into the VAM 100. Accordingly, in step 302, the VAM 100 receives user login information input by a user. Such login information may contain, for example, a username and a password. Each user account has an associated user profile. The user profile includes, among other things, a list of installed applications. The user profile is editable by the user. Moving to step 304, the VAM 100 selects the appropriate transport protocols or network access methods based on the user profile and parameters initially defined by the central administrator's installation selection. Each of the network access methods support server based remote hosted application storage or server based application execution. Accordingly, moving from one client to a different client is a rapid process because transferring the application code from the server system 104 to the different client is not required. Then, in step 306, the manager synchronizes the user environment configuration on the server system 104 with the client environment on the client computer 101. In an alternative embodiment, the step of synchronization takes place at a time other than during the time of login. For example, the user may input a request to perform synchronization procedures at another convenient time while the user is logged into the VAM 100.



FIG. 4 is a flowchart of the synchronization process 306 of the VAM 100, in accordance with the present invention. In step 402, the VAM 100 checks the user profile for updates to the previously installed applications. If the VAM 100 determines in decision operation 404 that no new updates are available, the synchronization process 306 proceeds to step 408. However, if the VAM 100 determines in decision operation 404 that new updates are available, the VAM 100 updates the appropriate applications in step 406. This update process involves downloading application updates from the server system 104 to the client computer 101. The synchronization process 306 then proceeds to step 408.


The VAM 100 checks the user profile in step 408 for new applications to be installed on the client computer 101. If the VAM 100 determines in decision operation 410 that no new applications are to be installed, the synchronization process proceeds to step 414. On the other hand, if the VAM 100 determines in decision operation 410 that new applications are to be installed, the VAM 100 installs the new applications in step 412. Many applications have server based installation mechanisms provided by software vendors. In the cases where network installation is not provided, tools and technologies are built into the VAM 100. Examples of such tools include tracking of new install net change to the system and distributing custom install scripting language throughout the system. Smaller software packages run from the network substantially the same as when installed to a local drive. Larger applications are more sophisticated and often require administrator customization. The software tools help administrators tune network installations to reduce or eliminate end-user interaction with installations on end-user systems. The synchronization process 306 then proceeds to step 414.


The VAM 100 checks the user profile in step 414 for any new environment configurations. If the VAM 100 determines in decision operation 416 that no new environment configurations are available, the synchronization process proceeds to step 420. However, if the VAM 100 determines in decision operation 416 that new environment configurations are available, the VAM 100 reconfigures the environment in step 418. Environment configurations include but are not limited to registry entries, temporary file directories created and file permissions, application icons, and application links. Application icons are downloaded from the server system 104 and stored locally for use on the client computer 101. As an example, when a particular icon is not on the local client computer 101 but is part of the environment configuration, that particular icon is transferred from the server system 104 to the local client computer 101. Likewise, application links are added to the desktop, user groups, the start menu and other locations as defined by the environment configuration. The synchronization process 306 then proceeds to step 420.


The VAM 100 checks the client computer 101 in step 420 for expired applications. If the VAM 100 determines in decision operation 422 that the client computer 101 has no expired applications, the synchronization process 306 is completed. On the other hand, if the VAM 100 determines in decision operation 422 that the client computer 101 does have expired applications, the VAM 100 performs expiration procedures in step 424. Upon user login, user profiles stored on the server system 104 contain an application expiration time and date value. Each application has its own expiration stamp. The central server system 104 maintains this expiration information. Application modules are stored on the client computer 101 encrypted. Accordingly, these application modules are unavailable for use outside of the virtual application manager program launcher 212. Such encryption prevents the user from executing the software in violation of the expiration time and date stamps. For an expired application, desktop icons and start menu links disappear from the client environment 102, or are grayed out to indicate the application is inactive or unavailable. The synchronization process 306 is then completed.


Note that the steps of the synchronization process 306 may be executed in an order other than the specific order illustrated by FIG. 4. For example, in an alternative embodiment, step 408 checking for new applications may come before step 402, checking for application updates. Further, the synchronization process 306 is not limited to the specific synchronization steps illustrated in FIG. 4, and may include other appropriate synchronization steps. Conversely, the synchronization process 306 does not necessarily have to include all of the steps illustrated in FIG. 4.



FIG. 5 is a sample database record 500 for an application of the VAM 100, in accordance with the present invention. The server system 104 maintains such records for available applications installed on the server system 104. Application attributes stored in this database record 500 include but are not limited to the application vendor 502; the application type 504; the application name and alias names 506; the application version, mirror version and patch level 508; the hardware and operating system compatibility 510; the application version group 512; the transport and access methods 514; the XML or HTML descriptions; and the HTTP links. Other information related to the application that may be stored in the server system 104 includes but is not limited to usage statistics by user, software modules related to each application, software module usage statistics, software reviews and ratings, user software feedback ratings, billing prices and billing usage logs, and statistics such as size of application.



FIG. 6 is a flowchart for a document type compatibility process 600 of the VAM 100, in accordance with the present invention. The VAM 100 maintains a mapping between document (or file) types and appropriate applications that can support the document data formats. In some cases, a user may select a document outside of an application. Accordingly, in step 602, the VAM 100 receives the selection of the document that the user made outside of an application. The manager then checks, in step 604, for a default document type that may already be associated with the selected document. If the VAM 100 determines in decision operation 606 that a default association is available, the compatibility process 600 proceeds to step 612. On the other hand, if the manager determines in decision operation 606 that a default association is not available, the compatibility process 600 moves to step 608.


The VAM 100 provides, in step 608, a list of installed applications that may be associated with the selected document. As an alternative to step 608, the VAM 100 may provide another mechanism for selecting a document type. For example, the VAM 100 may respond to a user right clicking the mouse on a document by providing a list of installed applications having the ability to utilize the selected document and to read the document formats. The user may then select from the provided list of installed applications. In step 610, the VAM 100 receives the selected application association. The compatibility process 600 then proceeds to step 612.


The manager opens the file in the associated application in step 612. The compatibility process is then completed.



FIG. 7 is a flowchart for an operating system and hardware compatibility process 700 of the VAM 100, in accordance with the present invention. The VAM 100 maintains a mapping between document (or file) types and the appropriate application compatible with the particular hardware device and its operating system. When a user logs into the VAM 100, the VAM 100 receives the configuration of the hardware device and operating system in step 702. Also, the VAM 100 undergoes a synchronization process 306, as mentioned above with reference to FIG. 4. During the synchronization process 306, the manager may install new applications in step 412. Alternatively, the user may instruct the VAM 100 to install an application at a time other than during the time of login. For the application to be installed, the VAM 100 checks whether the application is compatible with the particular hardware and its operating system. The VAM 100 can check compatibility because the server system 104 keeps a database record 500 for each application and because the VAM 100 obtained configuration information in step 702.


Performing the compatibility process 700 allows the VAM 100 to do at least the following: prevent an incompatible application from being installed on a particular environment; select the compatible version of the application to be installed; and support a user moving from one client computer to another client computer, even when the hardware and operating system are not compatible and require different applications or application versions.


If the manager determines in decision operation 706 that the application to be installed is not compatible with the particular hardware and operating system, the compatibility process 700 proceeds to step 710. In such a case, the VAM 100 does not install the application. On the other hand, if the VAM 100 determines that the application is compatible with the particular hardware and operating system, the compatibility process 700 proceeds to step 708. In such a case, the VAM 100 downloads the application from the server system 104 and installs the application on the client computer 101. The compatibility process 700 is then completed.



FIG. 8 is a flowchart for a transfer process 800 of the VAM 100 for when a user moves to a different client computer, in accordance with the present invention. The client computer 101 contains a client application database 210, which includes a replication of the application software catalog on the server system 104 and a catalog of the applications to which the user is subscribed. The client application database 210 also contains a copy of the user preferences stored centrally on the server system 104. As mentioned above with reference to FIG. 2, an entire user environment is transferred over the network 105 from the server transaction processor 204 onto this transient database created on the client computer 101.


When a user moves to a different client computer, the user may log into the VAM 100. In such a case, the VAM 100 receives the user login information from the different computer in step 802. Such login information may contain, for example, a username and a password. Each user account has an associated user profile. The user profile includes, among other things, a list of installed applications. The user profile is editable by the user. In step 804, the VAM 100 selects the appropriate transport protocols or network access methods based on the user profile and parameters initially defined by the central administrator's installation selection. Each of the network access methods support server based remote hosted application storage or server based application execution. Accordingly, the VAM 100 can make this movement to the different client computer a process that is relatively seamless. The VAM 100, in step 806, transfers the user environment configuration stored on the server system 104 to the client environment on the different client computer.


The VAM 100 may be used in conjunction with the virtual distributed file system (VDFS), which is discussed in further detail in U.S. Provisional Pat. App. No. 60/577,148, filed Jun. 3, 2004, entitled “Virtual Management System”. Accordingly, the VAM 100 may have the ability to provide application module installation pipelining, which is a process that is initiated when a user moves to a different client computer. When a user initially logs into a new client computer, the VDFS modules transfer the statistically often-used program modules to this different client computer. Such a transfer process prevents delays when running applications on the different client computer for the first time. The VAM 100 knows the entire application set to which the user is subscribed and has statistics on how often each module is accessed. With this knowledge, the VAM 100 can initiate the preloading of often-used user applications on the client computer. The VDFS transfers only the statistically often-used modules. This process is done in the background, using network resources not used by the user. This process, thereby, does not impede network performance.


According to systems and methods described above, the VAM 100 allows a user to use and run applications on a client computer 101, while the applications are stored and managed by a centralized server system 104. The VAM 100 includes but is not limited to hardware, software, firmware or any combination thereof.


Advantageously, the user may move freely from one client computer 101 to another client computer. When a user logs into the VAM 100 using the other client computer, the user's entire user environment, or a compatible portion thereof, is transferred from the server system 104 to the other client computer. Accordingly, the user is not limited to using only one particular client computer 101. Nor is the user limited to one particular type of operating system. The user also does not have to worry about carrying around applications to be installed on other client computers. The management of the applications, the user environment configuration, the client environment configuration, the transport protocols and the access methods, among other things, are handled by the server system 104. Such central management allows software vendors to rent software packages and to control time limits on applications via the VAM 100. Software vendors can thereby manage application subscriptions, even if the software packages are stored locally on a client computer 101.


Capabilities of a Virtual Application Manager


The VAM 100 provides desirable capabilities discussed above and further highlighted in the following discussion.


Centralization—This technology provides the ability for a user to use and run applications that are stored on and managed by a centralized location.


ASP—The technology has the facilities to support an application service provider (ASP).


Enterprise—The technology can benefit business enterprise application architectures.


Robust—The VAM 100 is capable of executing and managing resource intensive applications requiring support for high CPU utilization, high-end graphics and audio support.


Movable applications—The applications defined within a user's profile will run on any hardware system the user logs into. The user can thereby move from one client computer to another and have his application follow.


Offline operation—The software applications have the ability to run disconnected from the central server and network. The applications do not have to be stored and run solely at the server system 104. The applications may be stored and run from client computer, thereby allowing offline operation.


Quick installation—the software is capable of running on a user's computer with a minimal setup delay. Minimal setup time is required to allow applications to move from one client computer to another.


Installation management—The system provides an infrastructure for systems to provide installation and configuration management.


Full software install—The software should optionally be fully installable to support full offline usage when disconnected from the network.


Patch management—User applications should be automatically updated and maintained from the central location. This allows the application of patches and updates to be managed centrally and automatically.


Scalability—The system should be scaleable to support extremely large ASP user bases over disparate network topologies.


License/subscription management—The system supports subscription licenses. So, when the subscription is void or expired, the desktop software will become disabled and inactive.


Versatile—The system provides support for disparate end user hardware, including IBM® compatible PC's, Apple® PC's, thin clients and personal digital assistants.


Multiple transports—The system will run over multiple network and application protocols, including server based computing transports created by Citrix® and Tarantella® corporations, Unix X11 xTerm® protocols, and network file access protocols including Microsoft® SMB/Netbios, Netware®, Unix NFS®, and the virtual distributed file system (VDFS).


Billing—Usage data should be available to track application usage, including access times and durations.


Subscriptions—Control over application usage has to be available to allow centrally an application's usage, such as allowing a time limit on an application, after which the application even if stored locally will expire and be inoperable.


System and Method Implementation of a Virtual Application Manager


Portions of the present invention may be conveniently implemented using a conventional general purpose or a specialized digital computer or microprocessor programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art.


Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art. The invention may also be implemented by the preparation of application specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art.


The present invention includes a computer program product which is a storage medium (media) having instructions stored thereon/in which can be used to control, or cause, a computer to perform any of the processes of the present invention. The storage medium can include, but is not limited to, any type of disk including floppy disks, mini disks (MD's), optical disks, DVD, CD-ROMS, micro-drive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices (including flash cards), magnetic or optical cards, nanosystems (including molecular memory ICs), RAID devices, remote data storage/archive/warehousing, or any type of media or device suitable for storing instructions and/or data.


Stored on any one of the computer readable medium (media), the present invention includes software for controlling both the hardware of the general purpose/specialized computer or microprocessor, and for enabling the computer or microprocessor to interact with a human user or other mechanism utilizing the results of the present invention. Such software may include, but is not limited to, device drivers, operating systems, and user applications. Ultimately, such computer readable media further includes software for performing the present invention, as described above.


Included in the programming (software) of the general/specialized computer or microprocessor are software modules for implementing the teachings of the present invention, including but not limited to receiving user login information, accessing a user profile associated with the login information wherein the user profile includes a user environment configuration, selecting transport protocols based on the user profile wherein the transport protocols are protocols for transporting information between the server system and the client computer, and synchronizing the user environment configuration with a client environment configuration on the client computer, according to processes of the present invention.


In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims
  • 1. A method for managing one or more applications over a network according to a user profile associated with user login information, wherein the network is configured to be connected to a server system and to a client computer, the method comprising: first, receiving user login information;second, accessing the user profile associated with the login information, wherein the user profile includes a user environment configuration based on the user profile;selecting transport protocols based on the user profile, wherein the transport protocols are protocols for transporting information between the server system and the client computer;synchronizing the user environment configuration with a client environment configuration on the client computer; andpreloading at least one of the one or more applications according to the user profile onto the client computer from the server system by loading application modules from one or more application modules that have been requested at least a predetermined number of times such that the at least one of the applications is able to run on the client computer without further downloading from the server system, wherein the at least one application is able to run on an operating system of the client computer.
  • 2. The method of claim 1, wherein the client computer contains a pre-installed application of the server system, wherein synchronizing the user environment comprises at least one of: checking for an update to the pre-installed application;determining that an update is available for the pre-installed application; andupdating the pre-installed application.
  • 3. The method of claim 1, wherein synchronizing the user environment comprises at least one of: checking for a new application to be installed onto the client computer;determining that a new application is available to be installed onto the client computer; andinstalling the new application onto the client computer.
  • 4. The method of claim 1, wherein synchronizing the user environment comprises at least one of: checking for a new client environment configuration;determining that a new client environment configuration is available; andreconfiguring the client computer according to the new client environment configuration.
  • 5. The method of claim 1, wherein synchronizing the user environment comprises at least one of: checking for an expired application stored on the client computer;determining that the client computer contains an expired application; andperforming an expiration procedure.
  • 6. The method of claim 1, wherein synchronizing the user environment comprises one of: synchronizing the user environment automatically during a time of user login; orsynchronizing the user environment upon receiving a user initiated request to perform the synchronization.
  • 7. The method of claim 1, wherein the user environment configuration includes at least one of: a registry entry;a temporary file directory;a file permission;an application icon description; andan application link description.
  • 8. The method of claim 1, further comprising: receiving a request to open a document, wherein the request is initiated outside of the one or more applications; andchecking for a default document type having an associated installed application on the client computer.
  • 9. The method of claim 8, further comprising at least one of: determining that a default document type is attached to the document; andopening the document with the associated installed application.
  • 10. The method of claim 8, further comprising at least one of: determining that a default document type is not attached to the document; andproviding a list of installed applications that are compatible with the document and with the client computer.
  • 11. The method of claim 1, further comprising: receiving a configuration of the client computer, wherein the client computer includes a hardware device and an operating system;receiving a request to install an application onto the client computer; and checking compatibility of the application with the configuration of the client computer.
  • 12. The method of claim 11, further comprising: determining that the application is compatible with the configuration of the client computer; andinstalling the application onto the client computer.
  • 13. The method of claim 1, further comprising maintaining database records including at least one of: login security information;an application catalog;billing information for each user; andan application profile for each of the one or more applications, wherein each application profile includes at least one of:application vendor information;an application type;an application name;an alias name;an application version;a minor version;a patch level;hardware and operating system compatibility information;a list of compatible comparable applications;an application version group;transport and access methods;an XML description;an HTML description; andan HTTP link.
  • 14. The method of claim 1, wherein the preloading comprises streaming the at least one of the one or more applications onto the client computer from the servers, wherein the streaming is not initiated by a request for the at least one of the one or more applications by a user.
  • 15. The method of claim 1, wherein the preloading comprises loading components of the at least one of the one or more applications required for local operation of the applications onto the client computer without request from a user for the at least one of the one or more applications.
  • 16. A system for managing one or more applications over a network, the system comprising: a client computer including a client environment; andone or more servers including a database, at least one of the servers comprising a processor, wherein the processor is configured to be connected to the client computer via the network, to store the one or more applications, to store a user profile including a user environment configuration accessed by a user login, and to synchronize the client environment with the user environment configuration, wherein the processor is configured to preload at least one of the one or more applications onto the client computer from the servers by loading application modules from one or more application modules that have been requested at least a predetermined number of times such that the at least one of the applications is able to run on the client computer without further downloading from the servers, wherein the at least one application is able to run on an operating system of the client computer, and further wherein the user environment is based on the user profile which is accessed after receiving the user login.
  • 17. The system of claim 16, wherein the servers further include a transaction processor configured to execute requests from the client computer, wherein the transaction processor is connected to the network and to the database.
  • 18. The system of claim 16, wherein the client computer further includes a display device, wherein the client computer is configured to render the client environment on the display device in accordance with the user environment configuration.
  • 19. The system of claim 18, wherein the client environment is one of: a desktop environment;a thin client environment;a laptop environment;a personal digital assistant environment;a palmtop environment; anda workstation environment.
  • 20. The system of claim 16, wherein the database contains one or more stored applications to which a user may subscribe.
  • 21. The system of claim 20, wherein the user profile further includes a list of one or more authorized applications to which the user is subscribed, wherein the one or more stored applications includes at least the one or more authorized applications.
  • 22. The system of claim 20, wherein the one or more stored applications includes one or more unauthorized applications to which the user is not subscribed.
  • 23. The system of claim 16, wherein the user profile further includes the application local preferences including preferences of an application defined by a user.
  • 24. The system of claim 16, wherein the client computer further includes local hardware and an operating system, wherein the user profile further includes a configuration of the client computer, wherein the servers are configured to collect and store the configuration of the client computer, wherein the servers are configured to compare compatibility of the one or more applications with the configuration of the client computer.
  • 25. The system of claim 17, wherein the client computer further includes a client processor, wherein the transaction processor is configured to send an application installation scripter to the client computer, wherein the application installation scripter includes instructions for the client processor on updates to the client environment, wherein updates to the client environment are consistent with the user environment configuration stored on the servers.
  • 26. The system of claim 16, wherein the client computer further includes a client program launcher configured to launch an authorized application, wherein the client program launcher is a proxy program launcher.
  • 27. The system of claim 16, wherein the servers maintain at least one of: login security information;an application catalog;billing information; andapplication profiles.
  • 28. The system of claim 16, further comprising another client computer including another client environment, wherein the servers are further configured to synchronize the user environment configuration with the other client environment, wherein the user environment configuration stored on the servers includes preferences defined by the client computer, wherein the preferences defined by the client computer are transferred to the other client computer during synchronization of the user environment configuration with the other client environment.
  • 29. A system for managing one or more applications over a network, the system comprising one or more servers having a database, at least one of the servers comprising a processor, wherein the processor is configured to be connected to a client computer having a client environment, to store the one or more applications, to store a user profile including a user environment configuration accessed by a user login, and to synchronize the client environment with the user environment configuration, wherein the processor is configured to preload at least one of the one or more applications onto the client computer from the servers by loading application modules from one or more application modules that have been requested at least a predetermined number of times such that the at least one of the applications is able to run on the client computer without further downloading from the servers, wherein the at least one application is able to run on an operating system of the client computer, and further wherein the user environment configuration is based on the user profile which is accessed after receiving the user login.
  • 30. The system of claim 29, wherein the servers further include a transaction processor configured to execute requests from the client computer, wherein the transaction processor is connected to the network and to the database.
  • 31. The system of claim 29, wherein the database contains one or more stored applications to which a user may subscribe.
  • 32. The system of claim 31, wherein the user profile further includes a list of one or more authorized applications to which the user is subscribe, wherein the one or more stored applications includes at least the one or more authorized applications.
  • 33. The system of claim 31, wherein the one or more stored applications includes one or more unauthorized applications to which the user is not subscribed.
  • 34. The system of claim 29, wherein the user profile further includes the application local preferences including preferences of an application defined by a user.
  • 35. The system of claim 29, wherein the servers are further configured to collect and store the configuration of the client computer, wherein the servers are configured to compare compatibility of the one or more applications with the configuration of the client computer.
  • 36. The system of claim 29, wherein the database is a commercial relational database configured to support high volume, high uptime requirements of daemon processes of the server transaction processor.
  • 37. The system of claim 29, wherein the servers maintain at least one of: login security information;an application catalog;billing information; andapplication profiles.
  • 38. A client computer configured to connect to a server system via a network, wherein the server system is configured to manage applications over the network, the client computer comprising: a client environment; anda processor;wherein the client computer is configured to synchronize the client environment with a user environment configuration received from the server system, wherein the user environment is based on a user profile accessed by a user login, wherein the user profile is stored on the server system and customized for a user, wherein the client computer is configured to be preloaded with at least one of the applications from the server system by being loaded with application modules from one or more application modules that have been requested at least a predetermined number of times such that the at least one of the application modules is able to run on the client computer without further downloading from the server system, wherein the at least one application is able to run on an operating system of the client computer.
  • 39. The client computer of claim 38, further comprising: a database configured to store the client environment; anda display device, wherein the client computer is configured to render the client environment on the display device in accordance with the user environment configuration.
  • 40. The client computer of claim 38, wherein the client computer is configured to send a request to the server system to update the user profile stored on the server system.
  • 41. The client computer of claim 40, wherein the request to update the user profile is at least one of: a request to update a pre-installed application stored on the client computer, wherein the user profile includes a user subscription and a user authorization to the pre-installed application;a request to install a new application onto the client computer, wherein the new application is stored on a database of the server system;a request to change a user environment stored on the server system, wherein the user environment configuration is based on a client environment configuration of the client computer; anda request to subscribe to an expired application stored on the server system.
  • 42. A method for managing one or more applications over a network according to a user profile associated with user login information, wherein the network is configured to be connected to a server system, a first client computer and a second client computer, the method comprising: first, receiving user login information from the second client computer; second, accessing the user profile associated with user login information, wherein the user profile includes a user environment configuration received from the first client computer and based on the user profile; selecting transport protocols based on the user profile, wherein the transport protocols are protocols for transporting information between the server system and the second client computer;synchronizing the user environment configuration with a client environment configuration on the second client computer; andpreloading at least one of the one or more applications according to the user profile onto the second client computer from the server system by loading application modules from one or more application modules that have been requested at least a predetermined number of times such that the at least one of the applications is able to run on the second client computer without further downloading from the server system, wherein the at least one application is able to run on an operating system of the second client computer.
  • 43. The method of claim 42, wherein the second client computer contains a pre-installed application of the server system, wherein synchronizing the user environment comprises at least one of: checking for an update to the pre-installed application;determining that an update is available for the pre-installed application; andupdating the pre-installed application.
  • 44. The method of claim 42, wherein synchronizing the user environment comprises at least one of: checking for a new application to be installed onto the second client computer;determining that a new application is available to be installed onto the second client computer; andinstalling the new application onto the second client computer.
  • 45. The method of claim 42, wherein synchronizing the user environment comprises at least one of: checking for a new client environment configuration for the second client computer;determining that a new client environment configuration is available; andreconfiguring the second client computer according to the new client environment configuration.
  • 46. The method of claim 42, wherein synchronizing the user environment comprises at least one of: checking for an expired application stored on the second client computer;determining that the second client computer contains an expired application; andperforming an expiration procedure.
  • 47. The method of claim 42, wherein synchronizing the user environment comprises one of: synchronizing the user environment automatically during a time of user login; orsynchronizing the user environment upon receiving a user initiated request to perform the synchronization.
  • 48. The method of claim 42, further comprising at least one of: receiving a request to open a document, wherein the request is initiated on the second client computer outside of the one or more applications; andchecking for a default document type having an associated installed application on the second client computer.
  • 49. The method of claim 42, further comprising: receiving a configuration of the second client computer, wherein the second client computer includes a hardware device and an operating system;receiving a request to install an application onto the second client computer; andchecking compatibility of the application with the configuration of the second client computer.
  • 50. The method of claim 49, further comprising at least one of: determining that the application is compatible with the configuration of the second client computer; andinstalling the application onto the second client computer.
  • 51. A non-transitory computer storage medium carrying one or more instructions for managing one or more applications over a network according to a user profile associated with user login information, wherein the network is configured to be connected to a server system, comprising a server processor, and to a client computer, comprising a client processor, wherein the one or more instructions, when executed by one of the server processor or the client processor, cause the one of the server processor or the client processor to perform the steps of: first, by the server processor, receiving user login information;second, by the server processor, accessing the user profile associated with the login information, wherein the user profile includes a user environment configuration based on the user profile;by the server processor, selecting transport protocols based on the user profile, wherein the transport protocols are protocols for transporting information between the server system and the client computer;by the client processor, synchronizing the user environment configuration with a client environment configuration on the client computer; andby the client processor, preloading at least one of the one or more applications according to the user profile onto the client computer from the server system by loading application modules in the background from one or more application modules that have been requested at least a predetermined number of times such that the at least one of the applications is able to run on the client computer without further downloading from the server system, wherein the at least one application is able to run on an operating system of the client computer.
RELATED APPLICATIONS

This Patent Application claims priority under 35 U.S.C. 119(e) of the U.S. Provisional Pat. App. No. 60/577,148, filed Jun. 3, 2004, entitled “Virtual Management System”, which is hereby incorporated by reference. The Patent Application is related to U.S. patent application Ser. No. 10/912,652, entitled “Virtual Distributed File System”, filed Aug. 4, 2004, which is herein incorporated by reference in its entirety; and concurrently filed U.S. patent application Ser. No. 11/144,179, entitled “Transaction Based Virtual File System Optimized For High-Latency Network Connections”, which is herein incorporated by reference in its entirety.

US Referenced Citations (255)
Number Name Date Kind
4866635 Kahn et al. Sep 1989 A
5602990 Leete Feb 1997 A
5649196 Woodhill et al. Jul 1997 A
5659743 Adams et al. Aug 1997 A
5787409 Seiffert et al. Jul 1998 A
5802364 Senator et al. Sep 1998 A
5812751 Ekrot et al. Sep 1998 A
5835911 Nakagawa et al. Nov 1998 A
5897635 Torres et al. Apr 1999 A
5933647 Aronberg et al. Aug 1999 A
5950010 Hesse et al. Sep 1999 A
5974547 Klimenko Oct 1999 A
6012152 Douik et al. Jan 2000 A
6029196 Lenz Feb 2000 A
6067582 Smith et al. May 2000 A
6144959 Anderson et al. Nov 2000 A
6170065 Kobata et al. Jan 2001 B1
6189101 Dusenbury, Jr. Feb 2001 B1
6209089 Selitrennikoff et al. Mar 2001 B1
6212660 Joeressen et al. Apr 2001 B1
6282711 Halpern et al. Aug 2001 B1
6292827 Raz Sep 2001 B1
6301612 Selitrennikoff et al. Oct 2001 B1
6311221 Raz et al. Oct 2001 B1
6314428 Brew et al. Nov 2001 B1
6317761 Landsman et al. Nov 2001 B1
6339826 Hayes et al. Jan 2002 B2
6349137 Hunt et al. Feb 2002 B1
6356915 Chtchetkine et al. Mar 2002 B1
6363400 Chtchetkine et al. Mar 2002 B1
6366296 Boreczky et al. Apr 2002 B1
6378035 Parry et al. Apr 2002 B1
6421777 Pierre-Louis et al. Jul 2002 B1
6449658 Lafe et al. Sep 2002 B1
6459499 Tomat Oct 2002 B1
6463530 Sposato Oct 2002 B1
6473794 Guheen et al. Oct 2002 B1
6477531 Sullivan et al. Nov 2002 B1
6490677 Aquilar et al. Dec 2002 B1
6536037 Guheen et al. Mar 2003 B1
6553375 Huang et al. Apr 2003 B1
6556950 Schwenke et al. Apr 2003 B1
6574618 Eylon et al. Jun 2003 B2
6578142 Anderson et al. Jun 2003 B1
6606744 Mikurak Aug 2003 B1
6625651 Swartz et al. Sep 2003 B1
6625754 Aguilar et al. Sep 2003 B1
6633782 Schleiss et al. Oct 2003 B1
6636857 Thomas et al. Oct 2003 B2
6654797 Kamper Nov 2003 B1
6654801 Mann et al. Nov 2003 B2
6694375 Beddus et al. Feb 2004 B1
6697852 Ryu Feb 2004 B1
6704886 Gill et al. Mar 2004 B1
6718464 Cromer et al. Apr 2004 B2
6728530 Heinonen et al. Apr 2004 B1
6735625 Ponna May 2004 B1
6751658 Haun et al. Jun 2004 B1
6757729 Devarakonda et al. Jun 2004 B1
6757894 Eylon et al. Jun 2004 B2
6816462 Booth, III et al. Nov 2004 B1
6816882 Conner et al. Nov 2004 B1
6820180 McBrearty et al. Nov 2004 B2
6854009 Hughes Feb 2005 B1
6871210 Subramanian Mar 2005 B1
6880108 Gusler et al. Apr 2005 B1
6885481 Dawe Apr 2005 B1
6886020 Zahavi et al. Apr 2005 B1
6915343 Brewer et al. Jul 2005 B1
6954853 Wang et al. Oct 2005 B2
6954930 Drake et al. Oct 2005 B2
6959235 Abdel-Malek et al. Oct 2005 B1
6985967 Hipp Jan 2006 B1
7003560 Mullen et al. Feb 2006 B1
7003663 Lagosanto et al. Feb 2006 B2
7024471 George et al. Apr 2006 B2
7058698 Chatterjee et al. Jun 2006 B2
7080118 Hildebrand Jul 2006 B2
7143307 Witte et al. Nov 2006 B1
7149698 Guheen et al. Dec 2006 B2
7175078 Ban et al. Feb 2007 B2
7178166 Taylor et al. Feb 2007 B1
7194445 Chan et al. Mar 2007 B2
7200779 Coss, Jr. et al. Apr 2007 B1
7210143 Or et al. Apr 2007 B2
7237122 Kadam et al. Jun 2007 B2
7260597 Hofrichter et al. Aug 2007 B1
7287053 Bodin Oct 2007 B2
7328367 Ukai et al. Feb 2008 B2
7337311 Chen et al. Feb 2008 B2
7392046 Leib et al. Jun 2008 B2
7401125 Uchida et al. Jul 2008 B1
7480822 Arbon et al. Jan 2009 B1
7487383 Bensinger Feb 2009 B2
7512584 Keith, Jr. Mar 2009 B2
7571467 Priestley et al. Aug 2009 B1
7624086 Keith, Jr. Nov 2009 B2
7627694 Sreenivasan et al. Dec 2009 B2
7664834 Keith, Jr. Feb 2010 B2
7698487 Rothman et al. Apr 2010 B2
7752486 Satran et al. Jul 2010 B2
7788524 Wing et al. Aug 2010 B2
7840514 Keith, Jr. Nov 2010 B2
7844686 Keith, Jr. Nov 2010 B1
7908339 Keith, Jr. Mar 2011 B2
7912902 Cheng et al. Mar 2011 B2
8099378 Keith, Jr. Jan 2012 B2
8126722 Robb et al. Feb 2012 B2
8175418 Keith, Jr. May 2012 B1
8234238 Keith, Jr. Jul 2012 B2
8307239 Keith, Jr. Nov 2012 B1
8423821 Keith, Jr. Apr 2013 B1
20010034736 Eylon et al. Oct 2001 A1
20010037323 Moulton et al. Nov 2001 A1
20010037399 Eylon et al. Nov 2001 A1
20010037400 Raz et al. Nov 2001 A1
20010044850 Raz et al. Nov 2001 A1
20010049793 Sugimoto Dec 2001 A1
20020007418 Hegde et al. Jan 2002 A1
20020013827 Edstrom et al. Jan 2002 A1
20020035674 Vetrivelkumaran et al. Mar 2002 A1
20020042833 Hendler et al. Apr 2002 A1
20020049764 Boothby et al. Apr 2002 A1
20020083183 Pujare et al. Jun 2002 A1
20020087625 Toll et al. Jul 2002 A1
20020087717 Artzi et al. Jul 2002 A1
20020087883 Wohlgemuth et al. Jul 2002 A1
20020087963 Eylon et al. Jul 2002 A1
20020091763 Shah et al. Jul 2002 A1
20020094868 Tuck et al. Jul 2002 A1
20020099934 Cromer et al. Jul 2002 A1
20020104080 Woodard et al. Aug 2002 A1
20020107920 Hotti Aug 2002 A1
20020107945 George et al. Aug 2002 A1
20020116585 Scherr Aug 2002 A1
20020124092 Urien Sep 2002 A1
20020129089 Hegde et al. Sep 2002 A1
20020131404 Mehta et al. Sep 2002 A1
20020138640 Raz et al. Sep 2002 A1
20020157089 Patel et al. Oct 2002 A1
20020161868 Paul et al. Oct 2002 A1
20020161908 Benitez et al. Oct 2002 A1
20020169797 Hegde et al. Nov 2002 A1
20020188941 Cicciarelli et al. Dec 2002 A1
20030004882 Holler et al. Jan 2003 A1
20030005096 Paul et al. Jan 2003 A1
20030009538 Shah et al. Jan 2003 A1
20030031164 Nabkel et al. Feb 2003 A1
20030033379 Civanlar et al. Feb 2003 A1
20030036882 Harper et al. Feb 2003 A1
20030037328 Cicciarelli et al. Feb 2003 A1
20030041136 Cheline et al. Feb 2003 A1
20030046371 Falkner Mar 2003 A1
20030051128 Rodriguez et al. Mar 2003 A1
20030055878 Fletcher et al. Mar 2003 A1
20030061067 Atwal et al. Mar 2003 A1
20030078960 Murren et al. Apr 2003 A1
20030110188 Howard et al. Jun 2003 A1
20030120502 Robb et al. Jun 2003 A1
20030126242 Chang Jul 2003 A1
20030140160 Raz et al. Jul 2003 A1
20030177381 Ofek et al. Sep 2003 A1
20030191730 Adkins et al. Oct 2003 A1
20030204562 Hwang Oct 2003 A1
20030233383 Koskimies Dec 2003 A1
20030233493 Boldon et al. Dec 2003 A1
20040010716 Childress et al. Jan 2004 A1
20040068554 Bales et al. Apr 2004 A1
20040073787 Ban et al. Apr 2004 A1
20040093492 Daude et al. May 2004 A1
20040104927 Husain et al. Jun 2004 A1
20040107273 Biran et al. Jun 2004 A1
20040123153 Wright et al. Jun 2004 A1
20040128346 Melamed et al. Jul 2004 A1
20040148306 Moulton et al. Jul 2004 A1
20040180721 Rowe Sep 2004 A1
20040193876 Donley et al. Sep 2004 A1
20040201604 Kraenzel et al. Oct 2004 A1
20040236843 Wing et al. Nov 2004 A1
20040243650 McCrory et al. Dec 2004 A1
20040243928 Hesmer et al. Dec 2004 A1
20050027846 Wolfe et al. Feb 2005 A1
20050033808 Cheng et al. Feb 2005 A1
20050044197 Lai Feb 2005 A1
20050044544 Slivka et al. Feb 2005 A1
20050060281 Bucher et al. Mar 2005 A1
20050071267 Takahashi et al. Mar 2005 A1
20050096920 Matz et al. May 2005 A1
20050108297 Rollin et al. May 2005 A1
20050108546 Lehew et al. May 2005 A1
20050108593 Purushothaman et al. May 2005 A1
20050144218 Heintz Jun 2005 A1
20050149729 Zimmer et al. Jul 2005 A1
20050160289 Shay Jul 2005 A1
20050188315 Campbell et al. Aug 2005 A1
20050193245 Hayden et al. Sep 2005 A1
20050198196 Bohn et al. Sep 2005 A1
20050198239 Hughes Sep 2005 A1
20050216524 Gomes et al. Sep 2005 A1
20050216902 Schaefer Sep 2005 A1
20050226059 Kavuri et al. Oct 2005 A1
20050256952 Mouhanna et al. Nov 2005 A1
20050262503 Kane Nov 2005 A1
20050268145 Hufferd et al. Dec 2005 A1
20050273486 Keith, Jr. Dec 2005 A1
20050283606 Williams Dec 2005 A1
20050286435 Ogawa et al. Dec 2005 A1
20060021040 Boulanger et al. Jan 2006 A1
20060031377 Ng et al. Feb 2006 A1
20060031407 Dispensa et al. Feb 2006 A1
20060031529 Keith, Jr. Feb 2006 A1
20060041641 Breiter et al. Feb 2006 A1
20060041759 Kaliski, Jr. et al. Feb 2006 A1
20060047716 Keith, Jr. Mar 2006 A1
20060047946 Keith, Jr. Mar 2006 A1
20060074943 Nakano et al. Apr 2006 A1
20060095705 Wichelman et al. May 2006 A1
20060129459 Mendelsohn Jun 2006 A1
20060143709 Brooks et al. Jun 2006 A1
20060149955 Velhal et al. Jul 2006 A1
20060179061 D'Souza et al. Aug 2006 A1
20060224544 Keith, Jr. Oct 2006 A1
20060224545 Keith, Jr. Oct 2006 A1
20060233310 Adams, Jr. et al. Oct 2006 A1
20070011292 Fritsch et al. Jan 2007 A1
20070078982 Aidun et al. Apr 2007 A1
20070094269 Mikesell et al. Apr 2007 A1
20070143374 D'Souza et al. Jun 2007 A1
20070174658 Takamoto et al. Jul 2007 A1
20070174690 Kambara et al. Jul 2007 A1
20070185936 Derk et al. Aug 2007 A1
20070233633 Keith, Jr. Oct 2007 A1
20070255604 Seelig Nov 2007 A1
20070271290 Keith, Jr. Nov 2007 A1
20070271428 Alturi Nov 2007 A1
20070274315 Keith, Jr. Nov 2007 A1
20070276836 Chatterjee et al. Nov 2007 A1
20080016387 Bensinger Jan 2008 A1
20080034019 Cisler et al. Feb 2008 A1
20080034071 Wilkinson et al. Feb 2008 A1
20080072002 Kuwahara et al. Mar 2008 A1
20080077622 Keith, Jr. Mar 2008 A1
20080077630 Keith, Jr. Mar 2008 A1
20080127294 Keith, Jr. May 2008 A1
20080209142 Obernuefemann Aug 2008 A1
20080216168 Larson et al. Sep 2008 A1
20080294860 Stakutis et al. Nov 2008 A1
20080313632 Kumar et al. Dec 2008 A1
20090094362 Huff Apr 2009 A1
20100050011 Takamoto et al. Feb 2010 A1
20100125770 Keith, Jr. May 2010 A1
20110047118 Keith, Jr. Feb 2011 A1
20120198154 Keith, Jr. Aug 2012 A1
20120272099 Keith, Jr. Oct 2012 A1
20130031405 Keith, Jr. Jan 2013 A1
Foreign Referenced Citations (11)
Number Date Country
WO2005119493 Dec 2005 WO
WO2005119494 Dec 2005 WO
WO2005119495 Dec 2005 WO
WO2006010131 Jan 2006 WO
WO2006094282 Sep 2006 WO
WO2006094301 Sep 2006 WO
WO2007139962 Dec 2007 WO
WO2007139963 Dec 2007 WO
WO2008039386 Apr 2008 WO
WO2008039394 Apr 2008 WO
WO2008039395 Apr 2008 WO
Non-Patent Literature Citations (24)
Entry
Microsoft Press, Microsoft® Computer Dictionary, Fifth Edition; May 1, 2002; Fifth Ed.
IEEE100, “The Authoritative Dictionary Of IEEE Standards Terms”, Seventh Edition, Jan. 2003, 3 pages.
VMWARE, VMware Infrastructure Architecture Overview, Jun. 14, 2006, http:/www.vmware.com/resourse/techresources/, pp. 1-14.
VMWARE, Using VMware Infrastructure for Backup and Restore, Oct. 26, 2006, http:/www.vmware.com/resourse/techresources/, pp. 1-20.
IBM Corporation, AFS: “User Guide”, First Edition, Version 3.6. Apr. 2000, pp. 112.
Shepler et al. “RFC 3530—Network File System (NFS) version 4 Protocol”, Standards Track, Apr. 2003, pp. 278, http://tools.ietf.org/html/rfc3530#page-119.
Tridgell, A., “Efficient Algorithms for Sorting and Synchronization,” Thesis, The Australian National University, Feb. 1999, 106 pages.
MacDonald, J.P., “File System Support for Delta Compression,” University of California at Berkeley, Dept. of Electrical Engineering and Computer Sciences, May 19, 2000, 32 pages.
Microsoft@ Computer Dictionary, Fifth Edition, 2002, 3 pages.
Muthitacharoen et al., “A Low-bandwidth Network File System,” MIT Laboratory for Computer Science and NYU Department of Computer Science, 2001. 14 pages.
Yu et al., “Scalable network resource management for large scale Virtual Private Networks,” Simulation Modeling Practice and Theory, 12 (2004) pp. 263-285.
Cisco PIX “Configuring an IPSec Tunnel Between a Cisco Secure PIX Firewall and a Checkpoint NG Firewall,” May 12, 2006, document ID 23785.
Random House Unabridged Dictionary, “device: meaning and definitions,” 1997, Random House Inc., retrieved via “http://dictionary.infoplease.com/device”.
Definition of Plug-in (computing) from http:/en.wikipedia.org/wiki/Plug-in—(computing), printed Jun. 18, 2011, 1 page.
Plug-in definition from Wikipedia, http://en.wikipedia.org/wiki/Plug-in—(computing) printed Nov. 6, 2011, 5 pages.
Bandwidth Capping at Source http://www.24onlinebilling.com/download/whitepapers/Bandwidth%20Capping%20At%20Source.pdf pp. 1-9, Feb. 7, 2006.
http://www.macrovision.com/products/flexnet—installshield/installshield/overview/index.shtml, pp. 1-3, Sep. 15, 2006.
http://macrovision.com/products/flexnet—installshield/installshield/index.shtml, pp. 1-2, Sep. 15, 2006.
http:/ www.stealthbits.com/, pp. 1-2, Sep. 15, 2006.
http://www.microsoft.com/technet/prodtechnol/windows2000serv/maintain/featusability/inmnwp.mspx, pp. 1-36, Sep. 16, 2006.
http://en.wikipedia.org/wik/Expert—system, pp. 1-9, Sep. 15, 2006.
http://www.pctools.com/registry-mechanic/, pp. 1-2, Sep. 15, 2006.
http://www.backup.com, Dec. 15, 2006.
http://www.swapdrive.com/sdbackup.asp, Dec. 15, 2006.
Related Publications (1)
Number Date Country
20060031529 A1 Feb 2006 US
Provisional Applications (1)
Number Date Country
60577148 Jun 2004 US