Oasis Research, LLC v. Adrive, LLC et al
Filing
1
COMPLAINT against AT&T Inc., Adrive, LLC, CARBONITE, INC., DECHO Corp., Drive Headquarters, Inc., EMC CORP., Godaddy.Com, Inc., IRON MOUNTAIN, INC., Iomega Corp., Iron Mountain Information Management, Inc., Jungle Disk, LLC, NetMass, Inc., Nirvanix, Inc., Officeware Corp., PRO SOFTNET CORP., Rackspace Hosting, Inc., Rackspace US, Inc., Softlayer Technologies, Inc. ( Filing fee $ 350 receipt number 0540-2646072.), filed by Oasis Research, LLC. (Attachments: # 1 Civil Cover Sheet, # 2 Report on the Filing or Determination of an Action Regarding a Patent or Trademark, # 3 Exhibit A-Patent '354, # 4 Exhibit B-Patent '228, # 5 Exhibit C-Patent '943, # 6 Exhibit D-Patent '051)(Tidwell, James) (Main Document 1 replaced on 8/31/2010) (cm, ).
111111111111111111111111111111111111111111111111111111111111111111111111111
US005771354A
United States Patent
[19]
Crawford
[11]
[45]
[54J
INTERNET ONLINE BACKUP SYSTEM
PROVIDES REMOTE STORAGE FOR
CUSTOMERS USING IDS AND PASSWORDS
WHICH WERE INTERACTIVELY
ESTABLISHED WHEN SIGNING UP FOR
BACKUP SERYICES
[76]
Invenlor:
[21J
Christopher M. Crawford, 301 n
Wisconsin Ave., NW., Apt C-S,
Washington, D.C. 20016
App!. No.: 145,825
[22]
Filed:
l51]
[52]
Int. CI.' ..................................................... GOW 13/00
U.S. CI. ................................ 395/200.59; 395/200.49;
NOl'. 4, 1993
[58]
Field of Search ............................. 364/200; 395/800,
395/186; 395/620
395/876, 182'{)4, 182,(19, 20D.59, 2()O.49,
186, 620; 380/4
References Cited
[56]
U.S. PATENT DOCUMENTS
4,649,479
4,901,223
4,954,945
4,982,324
4,994,963
5,005,122
5,007,082
5,023,774
5,OR9,95R
5,107,456
5,109,515
5,181,238.
5,210,866
5,212,784
5,276,867
5,317,728
5,321,430
5,353,411
5,367,698
5,379,418
5,404,527
5,426,594
5,448,718
3/19H7
2/1990
9/1990
1/1991
2/1991
4/1991
4/1991
6/1991
2/1902
4/1992
4/1992
1/1993
5/1993
5/1993
1/1994
5/1994
6/1994
10/1994
11/1994
1/1995
4/1995
6/1995
9/1995
Advnni et Ill. .......................... 395/oRl
Rhyne ...................... ," ............ 364/20U
Inoue cI aL ............................. 364/200
McConaughy et al. ........... 395/200.52
Rorden ct aL .......................... 364/200
Griffin et ul. ...................... 395/200.01
Cummins .................................... 380/4
Snkni cluJ. ............................. 395/849
Horlon ............................... 395/182.03
Schuur .................................... 395/310
Lnggis et al.
.............. 707/10
Medamnna et al. ...................... 379/95
Milligan et al .................... 395/182.04
Sparks ................................ 395/182.04
Kenley ct aL .......................... 707/104
Tevis el at. ............................. 395/600
Smyth el ul. ............................... 380/4
Nakaosa c! aL ........................ 395/275
Webber et al. ......................... 395/800
Shimazaki ct al. ................ 395/182.09
Irwin et a\. ........................ 395/200.52
Wright ct nl. ........................... 364/514
Culm eL al. ............................. 395/404
Patent Number:
Date of Patent:
5,497,479
3/1996
5,515,502 5/1996
5,535,407 7/1996
5,544,320 8/1996
2/1997
5,606,719
5,696,901 12/1997
5,771,354
Jun. 23, 1998
Hornbuckle. ..................
.. 395/491
Wood ................................. 395/18213
Yanagawa et al. ..................... 395/800
Konrnd ............................... 395/200.33
Nichols cl ul. ......................... 395/876
Konrad ............................... 395/200.33
OTHER PUBLICATIONS
Bersbad, "Watcbdogs: Extending the UNIX File System",
Feb. 12, 1988, pp. 267-275.
Needham, "Using Encryption for Authentication in Large
Networks of Computers", Dec. 1978, pp. 993-999.
Arneson, "Mass Storage Archiving In Network Envirom,ots", 1988, IEEE, pp. 45-50.
(List continued on next page,)
Primary Examiner-Frank 1. Asta
Assisfa~Jt £mminer--L.e I-lien LUll
Arrorney, Agellt, or Firm-Nixon & Vandcrhye
[57]
P.c.
ABSTRACT
This invention makes it possible [or a customer computer to
connect to an online service provider computer by phone,
Internet, or other method, pay a fec to said service provider,
and obtain additional processing and storage resources for
the customer's cllmputer. The resources can tal;:c the form of
virtual storagc and prm:essing capabilities. 'Ibese capabilities give the customer computer what appears to be additional local processing power and/or additional local
storage, this storage possibly including pre loaded software
and/or data.
The additional resourL't:s made available tu the customer
computer can be u..<;eu either 10 enhance the cu:-;tomers' 100:al
needs (such as access to virtual storage for additional disk
space, or access to a more powerful processor of similar type
for program execution), Of these additional resources can be
used by the customer computer to support services on-line
that otherwise would be unavailable, impractical, or unaffordable. Examples of services include software and information rental, sales, and release update scrvice:-;, anli-viral
services, baclrup and recovery services, and diagnostic ami
repair services, to name a few.
27 Claims, 63 Drawing Sheets
Snftwnrn anti ServiC05
Online Service
Sy~lem
EXHIBIT
01HER PUBLICATIONS
To Data Ccn, 1989, IEEE, pp.
Ford et
Review
Abstract.
PC Tech Journal, vol.
9, "Forward
1985, pp. 42-53.
IBM Technical Disclosure Bulletin, vol. 34,
With Network File
Mar. 992, pp. 408-409.
Across the
Advertisement, "Rochester Software Connection, Inc.,
What's fast, fun and does the AS/400?" 1 page.
Robert Jourdan,
Problem
Prentice 11all,
1986, pp. 369-394, 395-406.
Thc Waitc
MS-DOS
Sams &
G.
,-.aWf'uvH
... Comp.433.
& J. Helm, PC World, "Thc Bcst of Onlinc
pp. 225-240.
r'n",,.,1J',·,.,a ZifI-Davis, "The World At
52-56.
J.
Section, Wash Tcch,
" Nov. 1993, pp. 19,26.
InternetIldfWIl'7"'P vol. 10, No. 15, "From
Your Nctworks
10,
vol. 10, No. 15,
and Routers, Smart Links Between LAN
pp. 121-169.
vol. 10, No. 15,
PC
"Access Servers,
10, 1991, pp.
1
page.
Advertisement, "PC/TCP® P1us,"1 page.
Advcrtiscmcnt,
3X/400, "Mimix Hi-Nct, Lakcview
__ "HC'"~'"J Inc.,
p. 140.
Advertisement,
Innovation, "Server Based
" 1 page.
Advertisement,News 3X/400, "PC File Mail, Nov. 1991, p.
Advcrtiscmcnt, "HandsOn Softwarc, Monarch 36/400T>1
PC users get their hands on
Advertisement, Andrew, "Netl
the Numbers," page.
Advcrtiscmcnt, "Innovation® Data
FDR.Your
1 pagc.
DASD
Advcrtiscmcnt,
Bundle," 1 page.
Advertisement, "Central Point Software Inc.®, Never
of
Protection," 1
Underestimate the
pagc.
Gazcllc,
Advcrtiscmcnt, Business Communications,
While You Work," Jun. 1992, p. 436.
Advertisement, "Works,"
Advcrtiscmcnt, Intcl®,
fax softwarc that can
send, receive and run with your faxes, 1 page.
Advcrtiscmcnt,
With
call away, 1 page.
M. Tischer, PC
pp. 157-171,208-212, "f'f"vHU'A
Advcrtiscmcnt,
Warc TM:
Windows for Clicnt/Scrvcr
427.
Software Associates, Inc., BPCS
Advertisement,
Client/Server '''f'f'''''''UUH Software, 1 page.
vol. 10, No. 15, "Bulletin Board
J. Salemi, PC
Software, Tools for Wide-Area Communications,
10,
1991, pp. 231-300.
M. Stone, PC
vol. 10, No. 15, .. E-Mail LAN
Links,
the World,"
10, 991, pp. 303-345.
F. Derfler & K. Maxwell, PC
1
15,
10,
I
The Media Move The
1991, pp. 351-374.
F. Derfier & K. Maxwell, PC illlfJUfl'7n,p vol. 10, No. 15,
"Public Data Nctwork'S, Rcliable
10, 1991,pp.
177-227.
Viruses," Oct.
P.
No-Hassle Solutions
" Jul. 1993, pp. 218-219.
for
"Carbon
#1
Remote
Advertisement, MicroCom
Control," page.
IBM
DOS
1990.
IBM
PC
DOS
1990.
IBM
PC
SC21-8195-0,
IBM
DOS
Guide,
1
/
/
\
/
\
I
\
I
I
I
I
\
\
\
\
\
\
I tRI
I
I
I
1..,.--_
\
\
/
\
I
2
1
PC users get their hands on
1 page
Advertisement, Andrew,
the Numbers, 1 page
Advertisement, "Innovation®
FDR.Your
D AS D IVHllla~;" llJL v 111
Advertisement,
Bundle," 1 page
Advertisement, "Central Point Software Inc.®, Never
Underestimate the
of
Protection, 1
page
Advertisement, Business Communications, Gazelle,
While You Work," June 1992, p. 436
Advertisement, "Works," 1 page
Advertisement, "Intcl®,
send, receive and run with your
Advertisement,"1
,ink, With
a
" 1 page
call
1993,
30
Software distrihution can he
on two levels.
access to an executable program
_nrnVIr1C,n virtual storage allows the lIser to run
on
from time to time and/or
the user to
the
try
out
is needed. Execute
cllstomer computer
server memory without
an intermediate disk copy.
the user is
device access includes automatic antiin real time. The most recent anti-virus
ViruS
software releases are
will be detected while
anti-virus ~nl1"!"rf'
at a schedUnattended access/attachment to the host
uled time
40
the customer
pf()bleITIS with their
computer.
The host may route information hetween users and/or
or virtual
to
users to have shared access to a common database, or
customers to move information from one computer to
PC file
Commander
"p 50
Advertisement,
Inc., BPCS
Client/Server
Software, 1 page
Advertisement, "Roehester Software Conneetion, Inc.,
What's fast, fun and does the AS/400?" 1
One of the greatest limitations to
services
is that no
are availahle to execute host hased
for a user's
On-line virtual output facilities such as
facsimile, and electronic mail can he economion
you
basis.
facilities.
system
create a
and other access
file to the user's workbe collected
n"·,,~,,.!nr·"
60
services
a
device attachment.
features:
of on-line 65
virtual
process.
pattern sent
customer computer
certain number of calls, certain number of
9
call, a certain wait
between each
the eustomer computer modem to switch into answer
mode.
access code is
sent
r-,,,m,,,,U'r that identifies a reason for
veril1cation,
task
"U'"'I"""">VU on behalf of customer, mail or data
for download to
The host computer
the customer compattern
customer computer tOjl)
access the host. A Customer
file is used to queue
the
requests. This allows the host
the
customer to call the host when needed, and also allows
the customer
he certain that
his computer can
access the service. When the customer calls the service
pattern
when the customer
computer answers after a certain
pattern will the
host computer allow the customer entry. The customer
accesses the service, hut
after the host
a
pattern match. If the host dials the customer
and gets a
match, then the customer can access
the system
without this dialhack sequence.
the customer
tasks that
processor type to the customer, thus
the
other activities.
the
30
computer
achieve
stored with the request data. A
used for the data.
A 900 area code
number used for pay access to
serVlces.
customer processor executes commands from the
All
for services are initiated
a host comin turn may execute a customer computer
processor command.
Host based anti -viral programs
loaded and executed in
the customer processor
protect access to programs
and data.
Virtual devices to allow the execution
host hased
software within the customer processor.
Host
information maintained in a Host
Filc causes commands to execute on the host which
may in turn cause commands to execute within the
customer processor.
A host hased
command for each service
program which
purposes whenever
command executes within the customer processor.
Media, documents and the like
be converted
of the customer"s computer
tion or conversion software
virtual
the customer.
The service allows customer access on-line service data
the customer computer processor
the
as a virtual drive.
Data and programs can he rented
control
program to restrict attachment to virtual disks
40
the data and programs. A host command lS used to
direct the router to initiate execution of
program in the customer's processor.
Data and
them
created
control program.
Automated
services maintain a table of
the customer that is allowed to
data and programs can he
transferred from a restricted virtual disk to the customer
computer disks or virtual disks
a host control
program.
A
program verifies types of access to restricted
virtual devices attached
control
but
a program
the
transferred hetween the host computer and the customer computer to manage on-line
service requests.
host
program executes programs in hoth the
host processor and customer processor
or at
the same time within a
process achieve desired
results.
on the host system but executed within
are executed as
to the customer computer
a host control program.
of on-line service access via
numbers, Telco's use On-line Service
time and access
assess
which appear on
the customer"s Telco statement.
information is maintained on the
host. This information is
the customer on
pattern and access
the type of message or
the
customer computer
call the on-line service.
The customer computer automated access
a
condition and break out of
continue with additional requests.
The host computer identifies
condition and
cancels the program or session to
the customer
computer to continue with additional requests.
BRIEF DESCRIMON OF 11IE DRAWINGS
50
60
65
an on-line service system
computer in accordance with
a user's
emhodiment of the present invention;
of services
FIG. 2 illustrates various
the
on-line service system of FIG. 1;
FI G. 3
illustrates the components within the
nrfotprrp·rj on-line
system and the customer computer;
FIG. 4 is a detailed schematic
vanous
difIerent arrangements for
servlce
system to customer computers;
of
FIG. 5 is
one
pH.H"",,·U embodiment;
illustrates overall functional conthe
embodiment on-line
nections
computer system to make virtual devices available to the
customcr computcr and othcr systcm componcnts;
FIG. 6B
illustratcs ovcrall functional connections
the
embodiment on-line
computer system to process customer computer
FIG. 6C
illustrates, on
level, the
on-line computer system
handles on-linc scrvicc rcqucsts;
FIG. 6D
handles olT-line service requests;
illustrates different
FIG. 6E
functions
the host computer,
computer
and customcr computcr in thc
cmbodimcnt;
FIG. 7
illustratcs, on a morc dctailed level,
tasks
thc customcr com-
tasks
program control
stcps
thc host computcr systcm in thc prcoff-line
ferred embodiment to effect the
]()
computer;
FIGS. 22A-22G
show
data
in the
structures maintained
nn'tf'rrc,,1 embodiment;
FIG. 22H
shows somc of thc rcqucst
available to on-linc
customcrs in thc prcprogram control steps
computer in the
cmbodimcnt;
of
illustrates, on a more detailed level,
thc
computcr
chart of
tures stored
ment;
FIG. 2513
illustrates some of the requests
startup;
thc customcr and
scrvcr routcr programs
FIG. 11 is schcmatic flowchart of thc "rc-dircct intcrnn'tf'rre,rl embodiment;
block of FIG. 10;
FIG. 26 a flowchart of
30
FIG. 12A is schematic flowchart of
comto boot up and operate
handler
in the
embodiment;
puter in the
embodiment; and
FIG. 12B
schematic flowchart of
timer
FIG. 27
control steps
mt,prnn"t handler tasks in thc
cmbodimcnt;
servIce
up computcr in ordcr to issuc ncw account numbcrs for thc
a schcmatic flowchart of
nications
handler tasks in thc nn'tcrrcIt
on-linc scrvicc.
ment;
DETAILED DESCRIPTION OF A PRESENTLY
FIG. 13 IS a schematic flowchart of v"''-'U'IH'''q
PREFERRED EXEMPLARY EMBODIMENT
the customer computer
seSSlOn with the on-line service system
40
On-Line Service Needs
I. Customer
cmbodimcnt;
FIG. 1 shows
of customer computer
FIGS. 14A-14H arc morc
schcmatic flowcharts
50
an on-line service system 100 in accordance
of the
customer server router" block of I'IG. 13;
cmbodimcnt of this
FIG. 15 is a flowchart of",,,",m,nl:uv
bc a
Customcr computcr 50 may for
of thc
chcck" block
computer
a main processor unit
FIGS. 16A-16C arc schcmatic illustrations of vA'vH~••a,,,,
54, a
and a mouse 58. Main
data structurcs maintaincd
thc customcr computcr in thc
unit 52
slot
embodiment;
62. Customcr computcr
FIG. 17 is a schematic flowchart of
program
pcrfc,rrrls tasks for uscr undcr softwarc control, and
control
the host computer in the prethe results of the tasks on
54
fcrrcd
FIG. 18 is a flowchart of vA'.HlljhH
thc
in FIG. 17;
FIGS. 19Aand 19B
processor unit 52. The user
program control steps
mouse 58 to interact
the
systcm as part of thc
tasks
computer 50.
shown in FIG. 17;
Customer computer 50
FIGS. 20A-20B
60 containcd, stand-alonc unit that
computer
program control steps
of
tasks
wide
embodiment to dTect the
host
system of the
connected to any other computer vLJ'HF""'U
rcqucst task"
thc uscr can run a word
program to
in ncw
FIGS. 21A-21E
documents for storage within the main processor unit 52.
are a flowchart of vA'vH~""'H
program control stcps
thc host
65 Thc uscr can also
financial calculations
system in the
embodiment to elTect the
program and store the results of the I..dJ'I..U,jdIIUI
customer session" block shown in FIG. 17;
within main processor unit 52.
in order to remain effective. For "A'~'" f"'", it is
the user run virus detection software on customer
computer 50 in
to prevent the computer from
viruses introduced when new software is loaded onto the
software loaded into main processor unit 52, the user may be
able to
wide
of additional software tasks
different
10
computer. Even
may take a very
to
out certain results and the user
up
time
II. On-l,ine Services Give Customer
What It Needs
These and other ,,"RH'''''''' and difficulties are eliminated
when customer computer 50 connects to an on-line service
the
embodiment of the
system 100
computer
boards, multi-media
like on occasion to have some of
associated
with this added
Another serious limitation of customer computer 50
relates the amount storage it has.
a so-called
"hard
within main processor unit 52 is used to
all
of the data
the customer computer 50 as well
all of the software to be executed
unit 52 may run out of
programs, or it may fail and
of the data it --.,,,;~,,- I •• stored. The user can "back
data stored on the internal hard drive
and tedious process and the user
of course,
may sometimes
do
The user
his customer computer 50
additional
internal or external storage devices, but this would be
eXIJenlSlv'e and
not be cost effective. Nevertheless, the
limitations on the storage
of customer computer
50 may be troublesome to the user at times
if a hard
disk failure docs occur, of if the user wants to
program but does not have the space on his hard
the new program onto
Another limitation of customer computer 50 relates to the
of diftcrent software it can mn. Customer computer
50 can
run software that has been loaded onto it. In
a new function or
the user must obtain
62
ware store, and then use
to load the new
software to main processor unit 52
software onto the internal hard drive within the main
cessor unit
If the new software
program,
process can take a
time. In addition, the
process may be
the user. Moreover,
no convenient way
out" or
rent
or usc software with customer computer 50. For this reason,
be able
run
the user of customer computer 50 may
and it is difficult
small number of
new programs to that
Another
that the user of customer computer 50
confronts is outdated software. Most software
are
their
Each
time a new version of software becomes available, the user
must obtain the software on
diskettes and go
the
and sometimes
process of
the software onto main
unit 52 via diskeUes 62 and
disk slot
This
a
with certain software that must be
so
to be
the newest strains. 'Ibis is very
inconvenient for the user, since it
the user to
procure
versions of
vims prlJtcctlon
and load them onto customer computer 50.
internal
30
40
to the on-line
customer computer 50 to be located
service system 100. The on-line service system 100
data
program storage,
that enhance the
customer computer 50 in order to solve the
drawbacks and
mentioned above. On-line service
services to
system 100
customer computer 50 in return for fees. Such software and
services can be
valuable to the user of customer
computer 50 in that
enhancements
the
of the customer computer that were available
not at all or
great expense and/or
.
.
lllconvemence.
FIG. 2 is schematic illustration of some
the various
system 100 can
to customer computer 50, "W""U'UlH),'; the
Anti -Viral Services
Offsite Archival Services
50
60
65
for a
are
on-line service virtual disks for offsite
size can exist for each customer.
disks of
Virtu al disks arc mounted and customer files arc
to their
customer disk for restoration.
disks inactive for
on-line service tape
term
virtual disk can
considered an ofi'site archival storcustomer file could be stored on virtual
riH'p,'1nr'v structures maintained. A diskette 62
can be
boot a customer
and
connect to the on-line service and boot a
disk
copy of the customer
disk. An advantage virtual disks
archival is that
attached.
remote storage is accessible as if
and Maintenance Services
include various programs stored on virtual disks to
checkout, troubleshoot, and enhance the customer comcan detect
puter 50.
with memory or system
components. I'Plnnnp.r"
management programs can be used for
storage maintenance, etc., to
Hardwarc crrors dctcctcd
a customer automated session
on a maintcnancc
such as
cxtcrnal
unit 74,
processor unit 52
a
can
conventional device which allows customer computer 50 to
agreement.
communicatc ovcr data link 150 with anothcr computcr
Electronic Media Services
a similar modcm. In thc
cmbodimcnt,
facilitatc mcdia transport
on-line service system 100 includes a modem 102 that
with virtual disks. Files storcd
connected hetween data link 150 and a host computer 104.
can
to a
I
104, which
an IBM
III
customer computer ]()
the
embodiment, includes one or more main proa virtual disk can convert a
from one
108,
ccssors 106, intcrnal random acccss
mcdia format
Fax to WP, WP to
controllers 110, and communication
furthcr screral controllers 110 allow main prc)cess()r
Customer Drive Services
allow customer
acccss to virtual disks undcr on-linc scrvicc
controL A customcr can havc
virtual disks
thc coursc of an
mountcd at thc samc timc.
on-line session, customer can mount and dismount
many different virtual disks. Virtual disks can he shared
groups of uscrs. Virtual disks
all, or sccurcd for
uscr
acccss.
one
more
one
more mass
storagc disks 116, and othcr mass
dcviccs such as a
devices such
tape storage device 118. Additional
as CD ROM drives, Fax machines and the like
may
also bc
and
main proccssor
via the
controller 110. In addition, one or more
local
devices 122 may he connected to host computer 104 to
local control over the host computer. The
AS/400 is
as host computer 104 in the nrp,I"T'r"d
cmbodimcnt duc to its
in tcrms of
secured access to
device access. However, other
tion emulation,
with rental programs and data. Access
the
types of
softwarc protccts
unauthorizcd
could bc uscd
timc, pcr usc, and/or timc
arc asscsscd for
FIG. 4 rcprcscnts somc common communication links
30
information and program access.
150 available to on-linc scrvicc customcrs. A host
104 is shown with various attached
1I4. Communications Condisk 116, tape 1I8, and
trollers 112 attached to the host computer 104 include
Public Data Nctwork
LAN Attachmcnt
temporary customer virtual
Card, ASCII controllcr, and customcr
160
disk is deleted if payment is not
host workstation emulation software.
Dcmos common
all customcrs can
Ier 112
to a
shared, execute
virtual
station 12411. Data may be trans""H~LHLl'" stations 12411, 124b
40
eral means
126, I1her
128,
microwave link 130, Puhlic Data Network 132, or cahle TV
link 134.
For
Customcr computcr
acccsscs systcm
100 via LAN attachmcnt card 82 conncct or rcmotc scssion
gateway connect
connects the
undel1ned users access to on-line services.
computer
uses a modem 80h to connect
a onc timc customcr on-linc scrvicc acccss
computcr
workstation controllcr 112b or thc
on thc customcr
bllL Customcr acccss 50 scrvcr computcr 160. Customcr
the on-line service
a coax
FIG. 4 shows that data link 150 may NHnm""p
controller's modem is attached to Telco pay
dilTerent
of connection:
numbcr in thc
cmbodimcnt. Thc onc
connects host computer 104
timc customcr can acccss most on-linc scrviccs cxccpt
sccond
olTsite archival.
station
connects
tion 124h to a customer computer 50. A customer may
Architccturc
III. Prcfcrrcd
many dilTerent
connect the on-line service system 100
internal comFIG. 3 is a schematic illustration
methods. These methods may
as
60 communications bccomc available. For
poncnts within customcr computcr 50 and on-linc
descrihed ahove, customer computer main
vanous
may
any of ISDN
system 100.
connect, "front end controller," another computer, a telediskette drive 6011
processor unit 52 includes
thc
60 shown in FIG. 1. In
thc main proccssor
company conncction, a dircct conncction, fibcr
unit 52 includes an internal hard disk 64, internal random
link, a cable television link, cellular link, a satellite link, a
65 radio
link and/or a PDN conncction. Thc thrcc
66, proccssor 68 and
controllers 70 allow communication
cahle mediums and softgateways, routers and/or emulations.
between the main processor unit 52 and external
17
On-line service svstem 100 also includes at least one
~
160.
computer
is
to
computer 104 via communication
of
to
controllers 112, and is also
computer
customer computer 50 via a modem 162.
160 is the same
of computer as customer computer
50 and
to
the
of
computer 50 is
160 adds """'P,C'C'",,,
bilitics to host computer
of computer not
of
customer computer 50 is
In the
emhodiment,
computer 160 is
in an on-line mode or in an off-line
mode. In the on-line mode, the
computer 160 comwith customer computer 50 to pertlflJCClSSJI1g tasks. In this on-line mode in the nncTerren
customer computer 50.
In the
embodiment, the
is
attached to host computer
emulation hardware/software
for connection to an AS/400
computer 160 connects
the customer computer 50 with
computer communications software
modems
connected to communications ports COMI on each of the
computers.
The on-line
computer 160 is used to facilitate
customer access to host computer virtual disks
seamof the customer computer into the
communications
The
computer 160 loads
device drivers and runs communications software to estahlish a host session and access host virtual disks. "Dual
the
computer 160
redirection" of drives
with
50, and also
computer 160 and customer computer
the local hard drive 164 of
computer
can he "attached" to customer
50, and the customer computer local hard drive 64
"attached" to the
computer 160. This allows
from the
computer 160 to write to and
customer computer local hard drive 64 and also allows the
customer com puter 50 to write to and read from the
computer local hard drive 164. Comhined with controlled
mouse,
and
execuredirection of
tion
a
computer 160 on-line session can occur
computer
user
in the customer computer 50
transparency.
on
The off-line
computer 160
behalf of the customer without a customer connection. Batch
file
are stored
host computer 104
a date/time to execute.
computer 160 accesses the host comauthorities to certain customer virtual
Off-line
160 reads
conUllllon is met, the request
the customer.
In the
IV. "Virtual" Disks
emhodiment, host computer 104 may
more "virtual" disk drives to customer
In
in the
embodiment
computer
may
one
more
drives to customer computer 50, and the
one or more "virtual" disk
In the context of this
disk drive" can be
some combination local and/or remote
disk
that "looks like" a
30
40
50
60
65
the
"virtual disk
that host
computer 104 attaches to customer
host computer 104 may have several
disk drives
116, those drives
are
the
system customer computer
and in any event
are remote to the customer computer and hence cannot
accessed
the customer computer as one of its
"virtual disks"
local drives. I
files or some other data
may
host computer 104. These
on host disk 116 and/or host random
host computer
on customer computer 50
computer 160, these virtual disks can
customer computer 50
computer
to those computers 50, 160 as additional,
drives. In other words, the opersystems computers 50, 160 can access these virtual
in the same
a
attached
disk drive. Thus, customer computer 50
can write
and read from a virtual disk in
same manner that it can write and read from its own local
computer 104 can
hard disk 64. In addition, the
commands and/or programs on the virtual disk for
remote
the customer computer 50 in order to
control programs stored on
control features. For
virtual disks can be used set
host computer 104
"processor
on the customer computer 50 and the
computer 160. Other control parameters on the
customer
computers are .. _. ___ ... __ ~
control programs stored on
virtual
grams are
called
a command issued
19
form the basis of the virtual disk
disk drivc
attachcd to onc of
hard drivc 64
a "virtual drive"
IJIO'M)Jl'llComputer commands
computcr 160 or
customcr computcr
Ilost computer 104 can create
resources, disk resources or
rcsourccs. Information writtcn
putcr 50 to a host computcr
stored within host
hoth memory
]()
and
hard disk 64 as its "C" drivc. Thc
user of customer computer 50 has hecome accustomed to
these
and it would be verv
thcm for whcn thc customcr comput~r connccts
computer 160. Nevertheless, it would be useful to
allow thc customcr
50 to acccss somc
all of thc
of
computer 160
disk drives
an on-line session as if those
computer disk
drivcs wcrc local thc customcr computcr. In thc
of the customer
embodiment, the normal disk drive
computer 50 is not disturhed
remains the local hard disk
diskette drive 60, and
Instead, the disk drives of the
computer 160 are
"attachcd" to thc customcr computcr 50
"virtual disk
computcr that storcd thc
tomcr computcr. Thc
store information onto
the information via
Communications softwarc
cxccullng on customcr computcr 50 rn,nn,'ro,t"·>O
and other software
on host computer
for the customer computer to access
thcsc host computcr mcmory and disk rcsourccs as if
wcrc a
disk dcvicc.
thc
host computcr 104 can also lW,lllllJUla":
stored on such "virtual
11
execute an executahle PC me stored on the
bccausc in thc 1J""""LlI cmbodimcnt thc host computcr has
diffcrcnt
systcm than docs customcr computcr
50A.
30
IBM. In the
thc
embodiment, host
IBM AS/400
computcr 50
management and PC
this
can he used with other
40
virtual device and
drivcrs arc loadcd from
thc PC IPL proccss. Othcr
host session initiation
bascd on
computcr
to
com puter to
this allows the PC user to
folder, or
Drive"
allows the PC user to
a drivc lettcr to all thc foldcrs thc uscr is authorizcd
Dircctor
this mcthod, thc DOS
from one virtual disk
command can he used to
to another, and normal
system commands
uscd to acccss and
thc virtual disks.
The
embodiment of the present invention also
makcs "virtual disk drivcs"
to customcr computcr
50 in the context of an on-line session hetween a customer
50 and an on-line
computer 160A. In the
~JI.'tlljlJ1\:,a customcr computcr 50
can access a
attached to on-line
computcr can
to the customer
embodiment, the resources that
50
60
the customer computer
customer computer processor 68 if the
maintaincd
thc customcr computcr
tomer
the other hand, commands
the customer computer
56 will be executed
computer 160 processor the
customer computer 50 lS set to
~~"~~~~"~~.l' commands
to
computer
execution via a "PC Execution" command for
he executed
the
computer processor 68
computer is set to
, and such commands will bc cxccutcd
at the
customer computer 50 if the
computer is set to "customer computer."
In the
emhodiment, the states of the customer
computcr
dctcrmincd
a default valuc
non-volatile tahle from the
default
thc host computcr to
processor
state to ensure
executed in a desired one of
Thc "Pf'OC';SSIJr
65
oers(m:lI computers, each "command line"
a "command
one of
drives of "virtual machine" without
to access the drives ,,,,,,VV.W'.vu
with the user's
machine."
embodiment, the
translation tables
customer computer 50 and
160 for commands executed
When a
lS
mand
the eommand prompt is
accessed I1rst to locate an executahle me that meets the
dp,.. ,'rm'um of the
IIllrror
]()
prompt to
one of cus-
.""",,"'.u,,"u
Thus, for
customer computer 50 user can deselect local
prc)cesslng and instead select
the processor of
160
his command
A~J
B~K
C~L
X~A
Y~B
Z~C
then the
for remote
computer 160 drive translation tahle entry
may be set as:
u~,~~,''''~
J~A
K~B
30
L~C
A~X
B~Y
C~Z.
command can execute on either the customer computer 50 or
the
computer 160 in the
embodiment, an
exists since the same
drive ''''''ih'.HHvH''''
may exist at each computer
the
computer may each
drive
as "A" and
Drive translation nrrwllw."
a local drive
For "",au'I"''',
with drive translation ofT, if the user of customer computer
50
the command "COPY
C:"
to "customer
, this will
information from the customer
the cuscomputer
diskette drive 60
local hard drive 64. On the other
tomer computer
customer computer 50 issues the comhand, if the user
mand "COPY A*.* C:" with drive translation on, the
command is translated into new command in which the
drive
"A" and
with different
maps
virtual
computer 160
~~'''5.''U'''' maps into the
computer uses to access the
drive as a virtual
Drive translation
in
emhodiment on the computer that
nrlmn,';'F'" the commands, and not on the computer which
the commands
"PC Execution"
commands are considered local to the
This feature
a
hased on
user's
access desired
40
these drive translation tahles, when a command
"COPY A:*. C:"
issued
the customer computer 50
with the processor
set to "customer
and with
drive translation oft', the command is executed
from the customer's local
diskette drive
customer's hard drive
issued
the customer computer 50 with drive translation
on, it is translated into "COPY J:*.* L", If this translated
command is executed
the
computer 160
diskette drive and customer's
accesses the customer's
hard drive
virtual drives ",/" and
it will
from
the customer's local
diskette
to the
customer's hard drive
50
60
65
FIG. 5
an overview of an
of the virtual
disk drive attachment
of the on-line service
disk drives 116a, 116h are shown
system 100. Two
connected to the host computer 104. The host computer 104
is shown
a customer disk
with host
disks 116a, 116h
disks. IIost computer
different virtual disks
mation associated with
and
host computer
disk drive 116b
stores information associated with a further virtual disk
The host computer 104 is shown with communication link to the
server computer 160 and
customer computer 50a, Two columns of drives shown
within customer computer 50a
the devices addresthe customer processor. The first column, "Local
Disk Drives," identil1es the
drives 64AA-64AC
attached to the customer computer 50a. The
V. On-line and CHT-line Task
"Virtual Disk Drives," identilles the disk
from
divided host
second
drives
50 that have
Drives,
attached to the customer
the
drives
]()
I'nm,,"lf'r
communication
computer and another communication
customer computer.
that both the customer
160 each
their
and
30
manner
both systems are
drives for both systems are
undesirahle to
the drive
well
B:
" drive references on the command line are translated
is
to their
in the
C: of
13:" is same as
a command at prompt E: of
Each computer needs to
where commands actuand also
to
track of where
commands are
maintained
track of where commands are
computer 160 used to
execute. The processor
can
be set
customer each time the default drive prompt
the
system. Thus, commands
a user at the customer computer 50 when the customer's
drive
is set to a customer drive will execute in
customer processor. Commands
customer
SO when the customer's
is set to a
processor. The
processor
UH""'''''"'! determines where a command will
commands while
set to customer drive, the commands
will execute in the customer processor if the P"''-'''''''''Jl
is set
customer.
when user
commands while set to customer drive, the commands
execute in the customer processor if the processor
is set
to customer. When a user at the
PC
commands
while set to
drive, the commands execute in the
processor
the processor
is set to
computer.
40
50
60
65
shows some of the various connections
the
emhodiment to attach
virtual devices such as disks. In FIG. 6A, customer computer
SOA is shown connected to host computer 104 with an
on-line connection via data link 150a.
connection and
on hoth
customer computer 50A and
computer 104, "virtual
the host computer is "attached" to
disk" made available
the customer computer. The customer computer 50A can
read from and write to this "virtual disk" as if it were a
disk
attached to the customer computer.
When the on-line connection hetween customer computer
SOA and host computer 104 terminates, the information
stored on the "virtual disk" continues to reside in the
of host computer 104. This information can he made
ahle
the same
dilTerent customer computer 50A
to
computer 160A,
the "virtual
to that computer.
computer 160A
FIG. 6A also shows an on-line
connected to host computer 104 via local data link 161A
coaxial "twinax" line or twisted
As
ahove, on-line
computer 160A can
have its own local hard
devices. In addition, on-line
an on-line customer computer 50
emhodiment runs "workstation emulation"
software that allows it
attach
to, and communicate with, host computer 104. The workstation session
control program is
the
in the
customer user
on the AS/400. The
ured to
ends. This program
menu
tain command
Customer commands and menu
requests
received and validated.
validation, commands and programs are executed
calls to system programs such as QUSCMDLN or QCMDEXC. These commands
include commands to cause execution in the
processor. This PC execution may
command processor
the customer or
computer user with
computer command prompt. 'Ibis
command processor is ended with control
returned to the caller when "Exit"
computer 160A can attach virtual
made
host computer 104 so that it can read from and write to the
virtual disks.
computer 160A can also access other
virtual
made available to it
host computer 104.
50B can have
with on-line
on-line connection, on-line repsome or all of its resources
lica computer 160A can
those made available to the
to customer computer
on-line
computer 160Acan
some or all of its own local disk drives to customer computer
50B. On-line
computer 160A can also
attach
customer computer 50B some
all of its virtual
disk drives
RAM disks and/or virtual disks made
available
In addition, on-line
computer
can
attach to and access the
drives of customer computer 50B as virtual disk drives. A"
vApHIHlvU above, the way drives are
attached and
hetween customer computer 50B and on-line
seamless interface
computer 160A
the information
to
file
in
tcrms, thc difsystcm 100 associatcd with
in FIG. 61), an olT-line
can he
off-line
putcr
host computcr 104 in thc
may
mcnt. Thc rcsults of such off-linc scrvicc
the
160B
161 B
host computer request;
off-line request for Ha'''H'''b
computcr 160; and/or
pn,pcot,nn of
Also, systcm 100 may havc
messages or
from other users
electronic
that
needs to deliver to a customer computer 50.
Instead of
until the user of customer computer 50
dccidcs to initiatc an on-linc
with
100, in thc
emhodiment system 100 is ahle to
a contact
with a customer comp~ter it needs to contact. In the preferred emhodiment, system 100 initiates such a communication
the
customer computer 50.
This
for thc customcr
50 to
system 100, or
itself can
system 100 can
transfer o(information that is needed
a customcr computcr 50 with a
mcsUH.w... aUH" that a
A'S shown in FIG. 6B, such
can
occur
a
connection hetween customer
computer 50A and host computer 104, or it can occur via a
conncction bctwccn a customcr computcr SOB
and
computer 160. In the
embodiment,
connections are not true "on-line" connections hecause there is no
for the user
customer
interact with system 100. Rather, for
or;-linc conncction
to the '''I',HuuU''b
30
40
50
on-linc conncctions to
customcr computcr 50 in thc
increases
and
make the customer feel
hetter ahout
a great deal of very
sensitive data may he stored on the customer
shows, in
terms, the difFIG. 6C
fcrcnt functions
systcm 100 associatcd with
on-linc scrvicc rcqucsts. As shown in FIG. 6C, an on-linc
service request can he
customer computer 50,
on-line
computer 160, or host computer 104. The
results of such on-line service
may
any
onc of thc
of a host computer request;
an off-line request for n:;nnll"P
computer 160; and/or
60
65
off-line
off-line
each of the main components
customcr computcr
50, host computcr 100, and
computcr
Each of
nprm,rrrIP.rJ under software control, and certain
may communicate with other
other computers. The customer
nr."TPrrr'cl cmbodimcnt supports thc
of communications,
program
execution, local disk access, and remote disk access. The
on-line service host computer 104
ports
communications,
command control, program cxccution, host
acccss
virtual disk acccss. Thc
on-linc and off-linc
computcrs 160 in thc
emhodiment each support communications,
program execution, local
access, and
Each of thc computcrs 50, 104 and 160
with local
mass storagc disk. Thus,
50 has its local hard disk 64, host
customcr
computer
has its local hard disk 116, and
computer 160 has
local hard disk 164.
FIG. 7, Customcr On-linc Scrvicc Control Proccss, providcs an ovcrvicw of on-linc scrvicc control softwarc
cxccutcd within thc customcr computcr 50. Thc customcr
computer 50 is shown in the center, surrounded
hoxes
various control processes. Clockwise from
dcscribcs
Control proThc customcr computcr 50 tracks a
sent
the on-line service system. If
pattern match occurs, the cU:'itomer computer 50 connects to
the on-line service
user I () and
to
rcccivc
acccss codc. This acccss codc is
to dctcrminc
thc rcason for acccss and dcfault rcsponsc
on-line
A
on-line service 100 to send
customers location. The customer computer
receIves
thcsc
from thc modcm 80. Thc
arc trackcd and whcn a corrcct
is rcccivcd,
customer computer 50 sends a
command to
switch to answer mode. The customer com puter 50 then
connects to the on-line service and receives an access
bcforc
Session and Virtual
Block 302
Disk
software.
software used to
maintain an on-line session.
of the type of link,
communications software is needed to connect to the on-line
to thc on-linc scrvicc host
scrvicc. Whcn
computer 104, device
and virtual device
scrvicc with thc
scrvcr computcr
are needed to
server remote disk support.
Block 304 rcfercnccs thc rcdircctcd
timcr, and
communication
are redirected for a number
or to initiate
session support is
in the
buffer
tion of
to cause the customer
computer 50 and
server computer 160 to appear as
one computer. The
redirected to allow
on-line service
when
serial port
date/time condition is mel.
redirected to support the
control process.
Server On-line Session ConBlock 306 describes
These services are available to customers that
connect to the on-line service with an intermediate
computer interfaced. The
are faster data transfer
rates for some functions because
customer computer 50
and
computer 160
of the same type; the
to access a more
processor of the same
access np;cmhp;",
the customer; the
the
server that would otherwise he unavailahle.
of the
Server On-line Session Control
process
refers to the relation between the
command prompt current drive and the processor for suhsequent execution. When the customer computer 50 command prompt is set to a local customer disk drive 64, the
next command is executed
When the customer
computer 50 command prompt is set
within the
remote disk 164, the next command is
160 with
and video redirected
executed. This
The second feature in hlock 306 refers to
information sent between the customer computer 50 and
server computer 160. Both the customer computer
access to drives of the other
computer 160
computer
remote virtual disks.
time
drive is
mounted on one system
virtual disks mounted on
the
the drive needs to be ~UUH;"'Ul"U
a remote disk on the other computer. The
On-line Session Control process sends and
receives
requests to cause drive mounts and
dismounts on hoth computers.
The third feature of block 306 refers to the management
of lIO requests for remote drive data. Since the remote
drives can reside on either system, the router not
read/write requests on local disks for the
processor, but also issues
requests for
data for the customer processor.
The last feature of block 306 refers
board and mouse
and video and
Block 308 descrihes Session
ence is to service control programs chained into redirected
An on-line session can be
an access code
or date/interval time, or
received from the on-line service. The on-line service delivto the
ers this access code
customer computer 50
If the
pattern matches, the customer computer 50
connects the on-line service
is issued switch
modem 80 to answer
received and the customer computer 50 disconnects.
The block 310, On-line Session Control, describes the
of
an on-line service with
control of the on-line
service, the customer computer 50 needs to
to
such as user ID,
and request
on-line service allocates resources and maintains
information based on customer interaction.
Block 312 describes the Automated Session Control
cess. Control programs are used to manage an
session without user interaction. Data is stored in the
board buffer when
based
a function based on
function hased on
]()
'-''''''''H''·'' the Customer
lbis
program is used to validate requests
access and
of data stored in the customer
disable unauthorized
computer RAM. The
prevent customers
from
data and programs accessed on mounted
virtual
execute
software and rental
information.
VI. I lost Processor Tasks
FIG. 8A offers an overview of on-line servIce control
executed within the on-line service host processor.
Block 400 shows the On-line Service Customer
Process.
and the
is issued
30
40
50
60
user
lS
software and control information is downloaded
,'orm,,",," 50, and customer control information is
system 100
control
'Ibis
Block 402 descrihes the Ilost
program is used validate access requests for virtual disks.
Host system
access to control
unauthorized virtual disk mounts. Host system
also
controls virtual disks access as
or read/write
program is used
control
devices. The I lost
customer
server computer execution and copy
access to
disk
All requests for virtual disk
and
are validated
402A,
It should
be
that a similar validation program resides
and
computer 104, the
server computer 160
the customer computer 50. The customer computer
and
server computer 160
modified version of this
function with code to prevent unauthorized access virtual
disk data and programs
in RAM.
Block 404 is the main control process for customer
access. The Interactive Customer Session Control Process
used to manage the on-line session. Activities are initiated
Session information is tracked
under control of this
Customer and host requests are
and
Data entry is
this process. If a IIost
found for the customer, and the date/time condition is met
and the
not for off-line
the customer
65
Process
Block 406 describes the Off-line
Control
This process is somewhat
Session Control Process except that no user
are read from the
If the date/time condition is
met, then Customer
and
are redireeted to
availahle from the
]()
104 to
virtu al disks.
Block 408 describes the Host
Task Control
Process. The
requests for
customer
Data is read
met, the Customer Control Data is read
the
customer computer is connected to the on-line
request is
The Host
Method field
hefore the
determines if the customer should he
If
Customer
request is
Data is written for the customer. If the request is for off-line
is written for the customer
Customer Task Control
Block 410 descrihes the
Process. This process can execute in the host computer 104
the off-line
computer 160.
Customer Data
When the date/time condition is met,
Customer Control Data for the customer is read
on, a host request is
I l' the customer is
Customer Data Access Code is used to
Otherwise, the
on the Customer Control Data.
of
is then sent
to the
If the customer
correct time, the access code is
computer answers at
transmitted to the customer computer. If the access code is
an on-line session, then the
allowed
used to
on
Customer Control Data lS
without dialback.
FIG. 8B shows the
routine shown
view
type of service.
in FIG. 8A with an
A'S shown in FIG. 8A, blocks 404D and 406D each obtain
request to he
and pass that request to the
The request is procomputer 160,
computer 104
160 each execute different
software,
in the
emhodiment each can
all of the functions shown in FIG. 813
of the functions
uvfjVlIUJlH,., on whether
III
random access memory.
computer 160
The customer computer 50 and/or
executes the rental program accesses the data
track
Meanwhile, host computer 104
times of access to ensure that the customer can be
on the amount of time he has used the contents
of the virtual disk
A customer can also be billed
on per use hasis or a
hasis.
In the
emhodiment, the user may request to
program
For
the
own copy of the program or data
wish to
it such that it is not feasible
to
If the
30
associated license fee to the customer's credit
Software demonstrations of the
not
to all
secured customer data can he made
shared,
access to
secured customer data can he
programs or information stored on a
secured virtual disk to a temporary virtual disk with cusaccess.
is not received within
the virtual disk can be deleted.
the
50
access to the
to later
revoke access if payment is not received.
I l' the request is for release
the request is
as before
104 also determines whether the customer
and also whether this
65
IS
customer computer 50
When necessary, a program can
executed to perto
form
services such as
customer computer 50.
Blocks 456-462
additional user request llaJ"U1HlIS' l!ieg,lllJJllllg
embodiment in order to interact with on-line service system
100. The steps shown in FIG. 10 can be
~
50 with the
and/or
handle
FIG. 9,
overview of service control
on-line and ofT-line
160 is shown
center, SUfblocks
various control processes.
describes the Customer
Process. This
process can also be executed
the host
patterns are sent to
monitor control nrnOrOlTI
to answer mode
answers, an access
50. This access code is used to
an on-line
send a message to the customer computer 50.
Block 474 refers to host session and virtual disk
software needed to maintain an on-line session with
devices. This software consists of device drivers and workstation emulation software.
Block 476 describes the Customer Session Control process. This communications software is used to connect the
customer computer 50 to the
160.
The
server modem 162
customer connection is awaited.
connection,
is redirected
the customer ,'nm,,,,jpr
redirected to
the host computer
]()
30
Server Router Control Process is described in
Since drives
both
each other, the Router Control process
I/O data
drive
requests,
requests,
mouse, video and
redirection
requests.
Block 490 describes ()IT-line Session Control nrrwp·"""n
'+nll~+ni~.
40
Cusredirected to the
are received
workstation emulation software
to the host computer
'Ioe host
and
computer issues requests to execute software within the
server processor
an on-line session.
Block 498 describes Automated Session ControL This
process is used
to manage a
me
request without user intervention. Parameters and
data are moved
the
bulIer
program is used
validate requests for
access and
disable unauthorized
of data stored in the
RAM.
to prevent
programs accessed on
execute
software
its memory
format for this on-line service control
shown in FIG. 16A. This data table 501 m
embodiment contains the
information:
On-line Service Control Data Table SOl:
Hardware
Data 600
Basic information on the type
computer used
customer.
Customer Prome Data 602
Standard Customer Information used
on and
the customer.
lIost
Parameters 604
Table Occurs, 1I0st Access Code, I lost Phone No., Host
Default For each host
associated on-line
number, reason for
and default
response for the customer. lIost reasons include: Dialback request, route request,
defaults include: Immediate
set interval time,
message. Other host
reasons and
defaults can be created.
Session Active
Indicates an on-line session is active.
""'""-'OU11'-" Session 607
customer is connected
to
608
on-line session with automated
Service Control
I
610
and
On-line Service Session Initiation Hot
Can be used to start an on-line Session
be started
command prompt
50
routines that have
been redirected for on-line service functions.
Automated Session Table Occurs 616
Four variable
For
60
VIII. Detailed
65
FIG. 10 is a flowchart of
program control steps
customer computer 50 in the
are
66 to support the virtu al
computer 104 or to support
computer 160.
I1rst turned on or
automatic pf()cesslng
Pattern Stores Table Occurs 624
patterns the on-line service can send to the
customer
When a pattern match occurs, the
customers modem switches to answer mode and
receives an access code from the host to determine
the on-line service sent a
Wait time is used to
calculate the time till the next
Tolerance allows for
+ or -2
on
between
calls
+ or -15 '''"'.uuu" I
identified and mav include software
formed on the cu~tomer and/or on-line
percom-
used to
or
on
target location information.
Restore Parameters 628
Full Restore,
except files
arc restored frorn the on-line service. Data
be on ]()
Virtual Device or Archived
tape or other
Anti-viral Parameters 630
Build
request for Antioccur if the customer
Viral Services. The device
list identifies
tahle on the on-line service which the
drives, subdirectories,
should be
identil1es the
and
customer cannot
scanned for viruses
information for
the customer is allowed to
anti-viral environment used to
up and maintain a
receIve
current anti-viral environment on the customer's sesProcessor
sion that will run at all times
on-line session is
Indicates which processor
computer 50,
computer 160 or
is to execute the next
649B
no,ce;;slIlg Control Table Default
Provides default
for the data structure shown in
Indicates request to
FIG.16B.
where the data is
Customer Processor Command
Drive
customer fax unit,
649C
on-line service virtual device,
and identifies the
the current command prompt drive
he routed.
type of media
Media
Parameters 634
the customer computer.
30
processor Command
Drive
the current command prompt drive
Device, Read
means to use
to
for the
computer.
649E
device type,
addressahle location, whether allocaDrive Control Table Default
Disk
tion is
and whether the device should be
default
for each type of disk.
accessed is
The on-line service control data table 501 is stored
Media Destination Parameters 636
on customer computer hard disk 64, and is loaded into
customer computer memory 66 each time the customer
Media Destination Tahle, Device, I,ocation, Allocate
Device, Write to Device
This tahle similar the
is hooted. The on-line service control data tahle
media
tahle except
is used to manage 40
used to control interaction with on-line service system
receive media. For instance,
data
100, and to maintain default and other parameters relative to
that interaction.
on a fax unit if desired.
Parameters 638
Once the on-line service control data tahle 501 has heen
Media Conversion
processor 68 redirects its
timer
and communications interTahle Occurs, From Media, To Media This
when media is to be converted before
As is well known,
such
as
embodiment customer computer
received from a
request. The on-line service can
cate with various devices attached to its pf()CeSS(lr
convert the media to the customer's
media
arrangement called
" If a
hefore the
data is received.
50 to processor 68 and/or get access to
shared resource such
From and TiJ Media can include: Fax, WP, Voice,
as the
bus or hard disk 64, the device sends an
Multi-media, Other.
to processor 68. In response to
of this
~"ab"VC"'~ Parameters 640
what
pf()cess()r 68 stops
60
commethod is identified and may include
on the customer and/or on-line
service computer.
Parameters 644
Disk
Method Used to
and executes a
routine that determines the source of the
takes
action in response to the
nrf,tprrp,rj embodiment, software executed
puter 50 overrides the default
them. This allows the nn'tf'rrc,rj
all
65
program control steps
block 506 shown in
routine 506, the routine in the
may first prompt the user to determine whether the user wishes to review and/or
the
If the user
default
block
customer computer 50
information within the on-line
blocks 610-624 and
table 501
,Jl'~'vll~U
vJlHU'VUHHvlll
]()
Once the user is
indicate and routine 506 will
tahle 501 with the service
'Ioen, hased upon the
current
within
on-line service control
data table 501, routine 506 redirects the proccssor
handlers into the processor
routines will receive and proto the
and
steps included within a
554 in the
embodiment. This routine is executed in
gen-
those parameters with
on-line service control data
block 624. The
IS an vA'HH~av
pattern that could be used:
host
modem 80 with six
43 seconds after
modem 80 with three
up;
then
up;
536
combination of
an on-line
then a routine 540 is called to
hot
she desires to prevent interference with other
'Ioe use of a "hot
sequence has
used the past to allow users to invoke
or
functions while at the same time
other software. In the ,>r,'lpru,d
user to initiate
session with on-line service system 100 without
the
software.
FIG.
program control
handler routine 542 in
response to
timer
within customer computer 50. Customer computer 50 in the
emhodiment, like most
computers, has a
conventional hardware
that
processor 68 to allow
40
50
60
,Jl'~'vll ~u embodiment, the timer
542 makes use of these
handler routine
65
computer
up
pattern allows the customer comauthenticate that
call
Other callers
pattern that customer comreceive, and thus could not induce the
handler 554 to answer the incomhe used
for voice communications without concern that customer
computer modem 80 will answer. For added
for on-line service
100 to alter the PY"PI'ipci
call pattern parameters
on-line service system estahlishes contact with customer
computer 50. The
of one
While any
For this reason,
that each
pattern
difIerent calls from on-line service
customer computer 50 to detect:
in the first call; and
call and the
call.
mentioned ahove, decision hlock 560 compares the
pattern received on modem 80 with the
parameters within data block 624. If there is
device drivers for virtual disk access in to its
to attach to on-line service
communications
handler routine 554
memory 66 that arc
system 100 with virtual device access
A comthe error and resets the pattern
established
If there is a match, on the other hand
block 558
exit of decision block
554 sets the modem 80 "auto answer" mode
access is controlled
an
and then returns
Modem 80 will then automatiU".W'JHlh requests for the
and this will
answer the line the next time it
The customer
554. On this
invoke the to communications
invocation of communications handler 554, the testj()
decision block 556 will fail because the communications
computer determines whether a
received on the
If
block
have answered the
puter
a
routine 518 in order to
decision block
communications handler 554 then
establish connection
the customer
service coman access
"access code" may
puter 160
data link 150 and modem 162
combination
Otherwise, connection is established via data
on-line service host computer 104 via modem
has called customer computer
customer enters user I)) and
in block 520. The
If no access code has been received,
customer computer 50
communications
handler 554 assumes that the
to
and request
from the on-line service
reason on-line service system 100 was
ule a
on-line connection to
This continues until a
request is issued
customer computer 50
exit to
the customer or on-line service system 100
this circumstance, communications
decision block
When
sets data block 616 to within on-line
table 501 to
up the
arrangement in the
are
customer computer 50
embodiment of
back" the on-line service system 100 in response to a contact 30 program control steps pvllLVIUllv"
at FIG. 13, block 518 to establish
initiated
the on-line service system
an added
of
The on-line service system 100 can time
when customer
computer 160. This routine 518 is
the interval
passes between when it called customer
computer 50 determines that is to establish a connection
160 via modem 162 and
150,
with
call in order to authencomputer 50 and when
ticate that the callis
customer
and executes for
duration of such a connection. ''''.LvlH.llh
to FIG. 14A, customer computer 50 first loads an
ate device driver, calls an "initialization"
and then loads the router user exit
the on-line session
valid
validate access
then retrieves the on-line serVIce
range of access
may
computer 50 to
information
message
mall
to alert the customer that he should initiate manucall to on-line service system 100 in order to retrieve
nrc,,'p<'cin and an
exists to cause the
request to wait
requests are
Access Code Tahle 1002M
Access Code Table,
Reason, Access Code lbis
table identifies each access code the on-line service can
FIG. 22C
",,-UvW,'''vUHl
accessed
On-line Session Task
inforThe host request file 1004 contains the
mation in the
embodiment:
User II)
User ID of the customer associated with the task.
Occurs, Error
Status,!O Start
Time Field 1004B
n~"F'UH"v This table stores the error
and time after which this task can
started.
customer or on hehalf of the
Field 1004C
New tasks can he
customer
on-line
sent to
,'('rmnrl('(1
"archive, etc. as shown in
include
FIG.22e.
Parameters 1004D
These are the parameters to pass in response
prompts
and names of
and output used
and the
the
1004E
indicates that the request is to
an On-line Service Customer
line
response issued
indicates
result of any actions
Field 1002Q
Method Table Occurs, H""~,'U"-'", n.V01~u""v
Method This table
with error messages. For a
the message is stored and
allow customer contact in the
SPC'cltled request.
Dialbaek Field 1002R
Dialhack
indicate that the customer cannot
customer's computer has received
When a customer
30
recelVes a
pattern
is set to
allow the user to access the on-line service.
Field l002S
Memher Since Date, Reinstatement Date Indicates how
the customer has heen
the service and when
reinstated if sm;pC,ndeCI.
Last Access Field 1002T
Service Cancel Date, Reason
1002V
Processor
This field holds the processor
based commands
Telco
on
each session initiation
whether the customer is
the on-line service
with a
pay teleo number such as 900
code access.
records include this
to
hillahle via Telco.
1002 X
,u,-,,,,,,pd of the numher of times an invalid
issued with this customer's user ID.
Once the customer control data block 1002 for the customer to he
has heen ohtained from mass storage,
host computer 104 determines whether the customer is
on-line session
hlock
50
computer
and/or after
request.
I I' the customer session not active
exit to decision
block
then host computer 104 determines whether the
await
1000G within the
customer data block is on. This
that there are no other olT-line
requests
whether other
If the
customer
If such other requests
customer data block 1000 is
a
pattern
computer
the
call, and wait intervals
within the customer control
I
computer 104 next
whether the customer computer answered
If
host computer
error and
up
If the host computer 104 detects that the customer
computer 50 did answer, the host computer tests whether the
customer
answered on the
the
final call
block
If the host computer 104
vA,)""""" the customer computer 50 to answer on the fifth
for
and it instead answered on the second
host computer 104 will
up
Errors within ahout one
60
the request that this
is associated with,
active,
is no need to
If the customer session is
customer
added aUlllVUW",ll.IUll
host computer
writes the
host
entry within the
computer 104 to have some assurance that it has contacted
request file 10004 and clears the
customer
block 1000. The host request will be 65 the
50.
Customer Session
to the customer session via
If
1000
an access
916 block 1144 shown on FIG. 21e.
code in Held
decision block
'p
access code
if no access
up the modem
allowed"
dialhack
nrfolprrprj emhodiment, when
sent, the customer computer 50 can
When the dialback
IS
the
a
request 1006 entry so as to schedule the
request
FIG.
996,
In
the host computer 104 at this
writes a
data block 1006 of the form shown in FIG.
the
information:
User II) Field 1006A
User II) of the customer associated with the task.
Date/Time Submitted Field 1006B
When the
request was issued.
]() Date/Time to Start Field l006C
Date or
and time after which the
task can
start.
Time Field 1006D
Estimated
purIlow much time the task should take to
1000
1006E
New task.,
Identifies the task
host computer 104 as
purpose of the "host
to see whether there are any host
nrt'TPrrc,n embodiment, these host requests
host computer 104, but either
customer computer 50. In
emhodiment,
computer 104
track ofthe
1006F
host requests, and allocates them to either the customer
Identifies the type processor needed for the request.
computer 50
the
customer data
Device/File List 1006C,
the customer
block 1000 in order to schedule a
Identifies the
this task.
request hlock 1006
Device/File List
computer 160
Identifies the output
this task.
30
Method Ficld 10061
Used to
the "start
and/or after
the host request file 1004
met
then host computer 104
request and end time for
and clears the host request block 1004
reads the customer control
block 1002 associated with
the
customer computer to whom the
lIost computer 104 then
104 in
customer computer 50 is
block
In the
40
customer's on-line session task
reads host request data.
Thus, if the customer is in an on-line session, the request will
"","l'.'''-'-UU customer comhe
the on-line session rather than
the host
information
purposes
Host computer
request task 912.
that the host request task 912 is
to
basic information associated with the
the request, host computer 104 determines whether
50 from the customer control data block
an on-line session is necessary to
the request
hlock
Some
for pure
""',,,r',",'!".!! customer
the customer
on. Most other requests, however, 50
from or output to the customer computer
requests
on-line session. If an on-line session
computer
record 1002R to determine
a host
set
block
to allow the customer computer 50 to call
not set, then the host computer 104 treats the
call-in from the customer computer 50 as a request for the
host
and writes a
customer data
the customer
block
Host computer 104
and
then will be 60
an on-line service
of the
session and control thus returns back to the
host request task
exit
decision block
On the
in connection
19A-19B, the host computer will contact the customer
other hand, if the request can be pertc1rrrlecl
decision block
65 computer 50 in a lIlore secure way. At this
the host
computer 160 is availahle to
computer 104 refuses the customer computer contact
because user ID and
is deemed insuHitasks, the host computer 104 moves the host request file
nnrn"rl"
on the other hand
host
cuscomputer 104 prompts for parameters and
tomer based information to a virtual device for attachment to
the
1184,
the
jl)
160 to execute anti-viral software
Host computer 104 next
controller 112 to determine whether the customer computer is
numher
900
customer computer 50
and disconnects
the customer does accept, then host computer 104
Telco
1002W within the customer
IS
the host
host computer 104 attaches
anti-viral
customer computer 50, a virtual disk
software and forces the customer computer to execute the
anti-viral code
1140,
Host computer 104 then
reads the host request me 1004 to see if there are any host
for the
requests until the requests are
104 then determines whether
30
steps peltOlIIlc;d
of FIG. 21D in order to process an on-line
1488
FIG. 21F in order to process an
lIost computer 104 first determines the
command to access restricted system
In the
embodiment, customers are restricted from
most system areas. The command
to
tomer's request
access to
host computer 104. The host
access customer
determines the source and destination of the customer and
Host
virtual devices
and software
are needed for
rprlllP<:tpri task in the customer computer
",,,m,,.,,tc'r 160 or host processor 106. Where the
n,m",,,t,," also mainTahle 10lO shown in FIG.
that stores the
Idcntifics thc rcqucst.
]()
for
m
sessIOn with a
customer's computer;
the customer to
up for
servlces
over the first online Internet session,
the step
of
a customcr idcntificr and associatcd
n"~''',\lm'n for the customer;
a second online Internet session with the
30
the customer identil1er and
stcp
conditioncd at least in part on
stcp
aH
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?