The present invention is directed to an extra net architecture, and more particularly, to an extra net architecture utilizing Web based technology that provides a large variety of applications to non-related subscribers.
Various forms of intranets have provided companies with intraoffice communications for some time. An intranet may be defined as a private application of the same internetworking technology, software and applications within a private network for use within an organization. It may be entirely disconnected from the public Internet or it may be linked to it and protected from unauthorized access by security systems. Such known networks are commonly called “intraoffice” networks because they only allow communications within an organization.
Other networks, often referred to as “extranets” or private internets allow communications and application sharing between designated, non-related organizations. Extranets are generally closed networks that allow communications between designated parties. Various types of “extranet” architectures are known. One type of extranet architecture is often referred to as a shared private network where the organizations that have access to the network are enumerated and often a third party is in charge of updating the list of enumerated users and managing passwords. One such type of shared private network between two organizations, for example, a shipping dock and receiving dock, may be linked to exchange information regarding orders. This is generally the oldest type of extranet. Such extranets have also been used for electronic data interchange (EDI) and involve coupling two organizations through a third party provider using typically XO.25 protocols and not necessarily using Internet Protocols (“IP”). This type of extra net architecture has certain disadvantages. For one, the connection is for a specific purpose and thus has very limited application. Second, only a limited number of an organization's business partners have reason to connect in this manner. Third, typically lower data communications and lack of IP capabilities limit the general usefulness of such configurations.
Another type of extranet architecture couples a plurality of nonrelated organizations together with appropriate routing and traffic management capabilities. The organizations may communicate with one another and share various applications. Some implementations are managed by one business partner. This obviously has the drawback that such a system is expensive to implement and particularly burdensome for one party to maintain. While cost-sharing arrangements may be created, one part must still consume the same organizational resources needed to maintain a network for others. While these types of extra nets provide good security, they lack the bandwidth to accommodate a large number of applications. Other types of extranets utilize the Internet which provides increased bandwidth but lacks the security of shared private networks. One such type of network which couples organizations through the Internet is referred to as a virtual private network. The variety of virtual private network extranet utilizes facilities of one or more Internet service providers combined with the user's own VPN software instead of setting up a dedicated private network. In order to maintain a level of security, communications over the Internet must be encrypted. A main difference between a virtual private network extranet and the Internet, in general, is that for a virtual private network extranet access is encrypted and limited to designated organizations and/or individuals rather than the world at large. Of course in selecting a particular extranet architecture, the benefits in cost savings must be weighed against security risks.
It is thus desirable to provide an extranet architecture coupled to a wide diversity of applications that may be shared by non-related organizations while eliminating the need for any one organization to maintain the available applications. It is also desirable to provide an extranet architecture that provides an appropriate degree of security and privacy. It is furthermore desirable to provide an extranet architecture that is flexible and can be easily modified and updated.
According to a first aspect of the embodiments, there is provided a method for providing an extranet service between at least two subscribers. The method includes the steps of: interconnecting the plurality of subscribers by digital data circuits to form an extranet; coupling a server to the extranet wherein the server stores a plurality of applications and data including collaboration software, office productivity software, and electronic data interchange software; loading at least one of the plurality of applications onto the extranet for use by the plurality of subscribers in response to a request by a subscriber for a particular application.
According to a second aspect of the embodiments, there is provided a method for providing an extranet service between subscribers. The method includes the steps of: (a) establishing a subscriber database listing customers who subscribe to the extranet service; (b) establishing a communication link between the subscribers listed in the subscriber database to form an extranet; (c) providing collaboration software applications on the extranet; (d) providing workflow software applications on the extranet; (e) providing transaction software applications on the extra net; (f) providing electronic mail software applications on the extra net; (g) providing electronic data interchange software applications on the extranet; (h) sharing the software application provided in steps (b)-(g) among the subscribers listed in the subscriber database.
According to a third aspect of the embodiments, there is provided a method for providing an extranet service between customers, the method comprising the steps of: (a) establishing a communication link between customers to form an extra net; (b) providing workgroup software on the extra net; (c) providing transaction software on the extra net; (d) providing security software on the extranet; (e) providing transport software; (f) sharing the software provided in steps (b)-(e) to the customers on the extranet.
According to a fourth aspect of the embodiments, there is provided an extranet including a network coupling a plurality of non-related participants wherein each participant is located remotely from the other participants, and a server coupled to the network, the server storing a plurality of applications including workgroup applications, transaction applications, security applications and transport applications wherein the server is programmed to load particular ones of the plurality of applications onto the network for use by the plurality of participants in response to a request by one of the plurality of participants.
In general, the subscribers are non-related entities, for example, different companies and/or organizations, or individuals. A subscriber on the shared network 18 may have access to some or all of the applications and data available on the server farm 20 through their network connection. Access for an individual user would be determined by what applications the user or user's organization has subscribed to; the access granted to data and applications granted by the user's organization; and the access granted to particular data files by owners of those files. This could mean access to a server-based application through a client's browser or distributing, updating and connecting a client/server application. In a preferred embodiment, Web browser technology is used to present each subscriber with a menu of applications from which they may choose merely by clicking on a particular icon displayed on a display unit (not shown).
Shown in
Security may be provided in various ways such as by what is commonly referred to as a firewall 56, one time passwords, encryption programs, digital certificates and user application security, for example. Various combinations of these security features may be used. In a preferred embodiment, these security approaches would be layered to provide a highly secure environment in which subscribers can share ideas and information. Encrypting may be accomplished by the use of virtual private networking technology or other technologies that evolve. In addition, security can be administered at the network, application, application module and user file levels to continually update needed profile information. The server farm 20 includes at least one application server 58 and a plurality of storage units 60 coupled together and to the firewall 56 by a hub 61 and local area network 62, for example. The number of storage units 60 will of course depend upon the number of applications provided and amount of user data stored on the server farm 20.
The operation of the extranet will now be described in detail. Various non-related subscribers are coupled to server farm 20 by access routers. The non-related subscribers are able to access applications and data stored by the application servers 58 and storage units 60 although access of some applications and/or data may be restricted based upon security concerns.
The present invention allows non-related entities to collaborate with one another in a simple, flexible manner without requiring any particular subscriber to maintain the integrity or currentness of the extranet. For example, company A may be working with non-related company B on the production of a part and require a logical project extranet 82 to be created between them. By using the extranet according to the present invention, companies A and B may securely exchange email, participants in discussion for a collaboratively work on documentation, spread sheets, workflow schedules, etc. Importantly, the communications and data exchanged between companies A and Bare secured from access by other subscribers on the extranet. Thus subscribers can flexibly add or delete subscribers on the extranet according to their needs. In addition, each subscriber has access to a large number of applications without having to maintain such applications. Thus, a communication link is established between the subscribers listed in a subscriber database by establishing appropriate routing tables within an established security policy.
Returning to
The foregoing description of the preferred embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations will be apparent to practitioners skilled in the art.
Furthermore, the preferred embodiments of the present invention would be customer driven in the applications hosted. Therefore, customers could suggest applications to include on the servers. For example, different subscribers using common computer aided design (CAD) software could request the inclusion on the servers of a file library developed by their CAD software vendor.
Similarly, any process steps described might be interchangeable with other steps in order to achieve the same result. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, thereby enabling others skilled in the art to understand the invention for various embodiments and with various modifications as are suited to the particular use contemplated.
This application is a continuation of U.S. patent application Ser. No. 10/744,961 filed Dec. 23, 2003, which is a continuation of U.S. patent application Ser. No. 10/246,430 filed on Sep. 17, 2002 now U.S. Pat. No. 6,697,861, which is a continuation of U.S. patent application Ser. No. 09/187,556 filed on Nov. 6, 1998 now U.S. Pat. No. 6,453,348. The disclosures of each of these references are hereby incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
5051822 | Rhoades | Sep 1991 | A |
5329619 | Page et al. | Jul 1994 | A |
5586312 | Johnson | Dec 1996 | A |
5675802 | Allen | Oct 1997 | A |
5721913 | Ackroff | Feb 1998 | A |
5754782 | Masada | May 1998 | A |
5757925 | Faybishenko | May 1998 | A |
5771354 | Crawford | Jun 1998 | A |
5774667 | Garvey et al. | Jun 1998 | A |
5779549 | Walker | Jul 1998 | A |
5790127 | Anderson | Aug 1998 | A |
5813007 | Nielsen | Sep 1998 | A |
5832511 | Beck | Nov 1998 | A |
5835911 | Nakagawa | Nov 1998 | A |
5845090 | Collins | Dec 1998 | A |
5852809 | Abel | Dec 1998 | A |
5862325 | Reed | Jan 1999 | A |
5862346 | Kley | Jan 1999 | A |
5884035 | Butman et al. | Mar 1999 | A |
5925127 | Ahmad | Jul 1999 | A |
5946464 | Kito | Aug 1999 | A |
5963207 | Brewer | Oct 1999 | A |
5970475 | Barnes | Oct 1999 | A |
6014651 | Crawford | Jan 2000 | A |
6015344 | Kelly | Jan 2000 | A |
6032118 | Tello | Feb 2000 | A |
6035423 | Hodges | Mar 2000 | A |
6061796 | Chen | May 2000 | A |
6076105 | Wolff | Jun 2000 | A |
6088796 | Cianfrocca | Jul 2000 | A |
6098054 | McCollom | Aug 2000 | A |
6115040 | Bladow | Sep 2000 | A |
6119149 | Notani | Sep 2000 | A |
6131120 | Reid | Oct 2000 | A |
6167433 | Maples | Dec 2000 | A |
6185551 | Birrell | Feb 2001 | B1 |
6199204 | Donohue | Mar 2001 | B1 |
6205147 | Mayo | Mar 2001 | B1 |
6212549 | Page | Apr 2001 | B1 |
6223177 | Tatham | Apr 2001 | B1 |
6226748 | Bots | May 2001 | B1 |
6226751 | Arrow | May 2001 | B1 |
6237020 | Leymann | May 2001 | B1 |
6282709 | Reha | Aug 2001 | B1 |
6289511 | Hubinette | Sep 2001 | B1 |
6353926 | Parthesarathy | Mar 2002 | B1 |
6378069 | Sandler | Apr 2002 | B1 |
6453348 | Barnier | Sep 2002 | B1 |
6526456 | Allan | Feb 2003 | B1 |
6692359 | Williams | Feb 2004 | B1 |
6697861 | Barnier | Feb 2004 | B2 |
6985941 | Schweitzer et al. | Jan 2006 | B2 |
20020013841 | Schweitzer et al. | Jan 2002 | A1 |
20020013842 | Schweitzer et al. | Jan 2002 | A1 |
20020013843 | Schweitzer et al. | Jan 2002 | A1 |
20020091811 | Schweitzer et al. | Jul 2002 | A1 |
Entry |
---|
“Ameritech Offers Online Bond Info”, (PublicFinance.com Enables Local Governments to Provide Bond Information Online (Company Business and Marketing), located at https://www.thedacs.com/techs/abstractl75495, 6 pages, retrieved Nov. 4, 2008. |
“AT&T Intranet/Extranet Service”, located at http://www.att.net.hk/products/intranet extranet.html, 2 pages, retrieved on Dec. 4, 1997. |
“getAccess Data Sheet”, located at http:/ /www.encommerce.com/Qublic/Qroducts/docs/gads/resource. html, 1 page, retrieved Aug. 26,1997. |
“getAccess Fact Sheet”, How Get Access Works, located at http://www.encommerce.com/Qublic/Qroducts/docs/getaccess/getaccess2.html, 3 pages retrieved Aug. 26, 1997. |
“getAccess Fact Sheet, Integrated Environment for User Access and Resource Deployment on the Extranet”, http://www.encommerce.com/Qublic/Qroducts/docs/getaccess/getaccess.html, 3 pages, retrieved Aug. 26, 1997. |
“Harbinger Overview”, http://ww.harbinger.com/infoloverview.htm, 7 pages, retrieved on Apr. 6, 1998. |
“Intranet to Extranet”, http://www.tw2.com/extra.html, 1 page, retrieved on Dec. 4, 1997. |
“Open Text Offers Livelink as a Subscription Service”, http://newswire.ca/releases/Januarv1998/12/c2081.html, 1 page, retrieved on Apr. 6, 1998. |
“Oracle Applications”, http://www.oracle.com/groducts/al2l2lications, 2 pages, retrieved on Apr. 6, 1998. |
“Overview of Extranet Standards, Extending the Networked Enterprise”, http://home.netscaQe.com/comQrod/at work/white QaQer/extranetstds.html, 5 pages, retrieved on Aug. 26, 1997. |
“The Rise of the Extranet, Linking Business Partners Via Internet Technology”, http://octodav.com/editorial/aoinonline/970235a.html, 2 pages, retrieved on Dec. 4, 1997. |
“What IS . . . extranet (a definition)”, http://whatis.com/extranet.htm, 1 page, retrieved Aug. 26, 1997. |
“What Is . . . intranet (a definition)”, http://whatis.com/intranet.htm, 1 page, retrieved Dec. 4, 1997. |
“White Paper—Lotus's Internet Applications: Bringing Extensible Business Solutions to the Net”, http://www.lotus.com/corocomm/3582.htm, 6 pages, retrieved Aug. 27, 1997. |
“White Paper—Notes and Transaction System: mQSeries and CICS Link for Lotus Notes”, Integrating Transaction and Client/Server Systems, located at http://www.lotus.com/corocomm/2596.htm, 6 pages, retrieved Aug. 27, 1997. |
Adlai-Gail, “Opinion and Outlook: Extra! Extra! Now's the Time to Build an Extranet, It's a Win-Win Tool in Line for Explosive Growth”, http://www.otcg.com/html/body build an extranet.html, 2 pages, retrieved on Dec. 4, 1997. |
Andreesen, “The Networked Enterprise: Netscape Enterprise Vision and Product”, http://home.netscal2e.com/coml2rod/at work/white l2al2er/vision/intro.html, 5 pages, retrieved Aug. 27, 1997. |
Bhardwaj, “Re; VPN, Extranet, Internet”, http://www.innergy.com/ix/arc/886.html, 1 page, retrieved Dec. 4, 1997. |
Fitzloff, “Ameritech Expands EBX Extranet Offerings”, InfoWorld, vol. 19, Issue 42, Oct. 20, 1997, 2 pages. |
Highleyman, “OL TP Middleware Integrates Client and Server Applications”, http://www.xstar.comcarnt/info/olto.html, 4 pages, retrieved Aug. 27, 1997. |
Jilovec, “The Role of EDI in Extranets”, http://www.midrangesystems.com/Archive/1997/oct1 0/ji101 016.htm, 2 pages, retrieved on Dec. 4, 1997. |
NetMinute #405, “Intranet, Internet, Extranet”, http://www.netminute.com/NM100405.htm, retrieved on Dec. 4, 1997. |
ONESOFT Corporation, “The Extranet Solution, The Business Software Application for the 21st Century”, Extranet Components, located at http://www.gxinet.com/scriQtsllAS.DLL ?SubSystemID=1&ComQonentID=265, 4 pages, retrieved Aug. 26, 1997. |
ONESOFT Corporation, “The Extranet Solution, The Business Software Application for the 21st Century”, Sample Extranet Scenarios, located at http://www.gxinet.com/scriQtsllAS.DLL ?SubSystemID=1&ComQonentID=263, 5 pages, retrieved Aug. 26, 1997. |
ONESOFT Corporation, “The Extranet Solution, The Business Software Application for the 21st Century, Introduction: The Third Wave of Internet Evolution”, http://www.gxinet.com/scril2ts/IAS.DLL?SubS˜stemID=1 &Coml2onentID=260, 2 pages, retrieved Aug. 26, 1997. |
ONESOFT Corporation, “The Extranet Solution, The Business Software Application for the 21st Century, The Extranet”, http://www.gxinet.com/scril2ts/IAS.DLL ?SubS˜stemID=1&Coml2onentID=261, 1 page, retrieved Aug. 26, 1997. |
Reisman, “Extranets and Intergroupware, A convergence for the next generation in electronic media-based activity”, http://www.teleshuttle.com/mediallnterGW.html, 4 pages, retrieved on Aug. 26, 1997. |
Reisman, “Extranets and Intergroupware: A convergence for the next generation in electronic”, http://www.teleshuttle.com/media/IngerGW.htm, 4 pages, retrieved Aug. 26, 1997. |
Reisman, “What's an extranet? and other key terms”, http://www.teleshuttle.com/media/extradef, 1 pages, retrieved Aug. 27, 1997. |
Tebbe, “Extranets intelligently link intranets”, http://www8.zzzdnet.com/Qcweek/oQinion/1111/11 neteff.html, 1 page, Nov. 11, 1996. |
Vitro Crop, “Chooses Open Text's Livelink Intranet to Improve Systems Engineering Document Management”, http://www.newswire.ca/releases/March1997/26/c5800.html, 2 pages, retrieved on Apr. 6, 1998. |
Number | Date | Country | |
---|---|---|---|
20120060201 A1 | Mar 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10744961 | Dec 2003 | US |
Child | 13294484 | US | |
Parent | 10246430 | Sep 2002 | US |
Child | 10744961 | US | |
Parent | 09187556 | Nov 1998 | US |
Child | 10246430 | US |