AU2013219146A1 - The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling - Google Patents

The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling Download PDF

Info

Publication number
AU2013219146A1
AU2013219146A1 AU2013219146A AU2013219146A AU2013219146A1 AU 2013219146 A1 AU2013219146 A1 AU 2013219146A1 AU 2013219146 A AU2013219146 A AU 2013219146A AU 2013219146 A AU2013219146 A AU 2013219146A AU 2013219146 A1 AU2013219146 A1 AU 2013219146A1
Authority
AU
Australia
Prior art keywords
software
provider
user device
provider software
vpn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2013219146A
Inventor
Wayne Cantrell
Roger Hill
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Industry Inc
Original Assignee
Siemens Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2009274149A external-priority patent/AU2009274149A1/en
Application filed by Siemens Industry Inc filed Critical Siemens Industry Inc
Priority to AU2013219146A priority Critical patent/AU2013219146A1/en
Publication of AU2013219146A1 publication Critical patent/AU2013219146A1/en
Priority to AU2016201600A priority patent/AU2016201600B2/en
Abandoned legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The present invention relates generally to an Internet based management of software and/or hardware. More particularly, the invention encompasses the development, test, and demonstration of automation solutions using web-based virtual computers and VPN (Virtual Private Network) tunneling. The present invention is also directed to a novel concept of storing various versions of a software and/or demo programs at a virtual data base which is accessible via a VPN (Virtual Private Network) tunnel. F-t CM L"H ccZF C= C _

Description

- 1 AUSTRALIA PATENTS ACT 1990 COMPLETE SPECIFICATION FOR A STANDARD PATENT ORIGINAL Name of Applicant/s: Siemens Industry, Inc. Actual Inventor/s: Roger Hill and Wayne Cantrell Address for Service is: SHELSTON IP 60 Margaret Street Telephone No: (02) 9777 1111 SYDNEY NSW 2000 Facsimile No. (02) 9241 4666 CCN: 3710000352 Attorney Code: SW Invention Title: The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling Details of Original Application No. 2009274149 dated 21 July 2009 The following statement is a full description of this invention, including the best method of performing it known to me/us: File: 68850AUP01 -2 THE DEVELOPMENT, TEST, AND DEMONSTRATION OF AUTOMATION SOLUTIONS USING WEB-BASED VIRTUAL COMPUTERS AND VPN TUNNELING CROSS-REFERENCE TO RELATED APPLICATIONS [0001] The instant patent application claims priority to and the benefit of U.S. Provisional Patent Application Serial Number 61/082,578, filed on July 22, 2008, titled "The Development, Test, and Demonstration of Automation Solutions Using Web-based Virtual Computers And VPN Tunneling," and is a divisional of Australian Patent Application No. 2009274149, the entire disclosure of which applications is incorporated herein by reference. FIELD OF THE INVENTION [0002] The present invention relates generally to an Internet based management of software and/or hardware. More particularly, embodiments of the invention encompass the development, test, and demonstration of automation solutions using web based virtual computers and VPN (Virtual Private Network) tunneling. The present invention is also directed to a novel concept of storing various versions of a software and/or demo programs at a virtual data base which is accessible via a VPN (Virtual Private Network) tunnel. BACKGROUND INFORMATION [0003] Any discussion of the prior art throughout the specification should in no way be considered as an admission that such prior art is widely known or forms part of common general knowledge in the field. [0004] The number of subscribers and application of communications services has been growing explosively in the past several decades. As the popularity of world wide web and the Internet based devices has expanded, the underlying technology and applications that enable communications has also been evolving. This evolution has been captured by many new technologies and applications of such technologies.
-3 [0005] U.S. Patent No. 6,445,920 (Matthias Pfundstein), the entire disclosure of which is incorporated herein by reference, discloses to install a virtual private network (VPN) within a given mobile-radio network (MRN), a facility is proposed which is connected to the base stations (BS) and controls the establishment and release of calls between mobile subscribers (MS1. . . MSX) assigned to the coverage area of the base stations, and a data base (HLR) connected to the facility, which contains a subscriber data set (DS) for each of said mobile subscribers with a first logic data set (LDS) for registering them as subscribers of the mobile-radio network. Each of some of these mobile subscribers (MS1, MS2, MS3) has a second logic data set (LDS-VN) for registering them as subscribers of a virtual private network. In this way, in addition to the data set (LDS) allowing access to the mobile-radio network (MRN) as such, the invention adds to the subscriber data set in the existing data base (HLR) a further data set (LDS- VN), which enables a mobile subscriber to access a virtual private network (VPN). Essentially this only requires taking steps in the mobile-radio software area, whereby the installation of one or several virtual private networks can be very easily accomplished. The implementation of an intelligent network which is superimposed on the mobile-radio network can be omitted. [0006] U.S. Patent No. 6,675,067 (Steven J. Blad), the entire disclosure of which is incorporated herein by reference, discloses a system for remotely monitoring coin operated machines. Data from the machines is collected and transmitted by the machine to a remote server. In alternate embodiments, several machines may be interconnected via a LAN to a local CPU which transmits data to the remote server, typically using the internet. The combination of one or more remote machines and the central monitoring site form a Virtual Private Network (VPN). An optional feature allows for e-mail or other type of alert messages to be sent from the remote server in response to the identification of one or more predetermined events for which a customer should immediately be notified. Browse and query tools working against a database of machine information are provided so that authorized customers or other interested parties may -4 view data for individual or groups of coin-operated machines by means of a web page accessed via the internet. [0007] U.S. Patent No. 6,680,922 (Jacob W. Jorgensen), the entire disclosure of which is incorporated herein by reference, discloses a packet-centric wireless point to multi-point telecommunications system includes a wireless base station coupled to a first data network; one or more host workstations coupled to the first data network; one or more subscriber customer premise equipment (CPE) stations in wireless communication with the wireless base station over a shared wireless bandwidth using a packet-centric protocol; and one or more subscriber workstations coupled to each of the subscriber CPE stations over a second network; resource allocator optimizing end-user quality of service (QoS) and allocating shared bandwidth among the subscriber CPE stations; a scheduler to schedule an internet protocol (IP) flow over the shared wireless bandwidth. The scheduler includes a prioritizer for prioritizing the IP flow based on priorities of a virtual private network (VPN). The system can include an analyzer for analyzing the virtual private network (VPN) priorities for the IP flow, or for prioritizing all VPN IP flows. The system can include a prioritizer to prioritize the IP flow based on one or more subscriber-defined parameters. In the system, the VPN can include a directory enabled networking (DEN) table management scheme. The VPN can be implemented using a point-to-point tunneling protocol (PPTP). Also included is a method for accomplishing the above. [0008] U.S. Patent No. 7,409,201 (Arturo Maria, et al), the entire disclosure of which is incorporated herein by reference, discloses a system, method, and a computer readable media which are provided for automating the process of provisioning and maintaining Access Point Names ("APNs") for use in digital networks, such as GPRS networks. A plurality of network elements including but not limited to GGSN tables, router tables, firewall systems, VPN tunnels, and Home Location Registry ("HLR") tables can be provisioned and maintained via a centralized system. The invention integrates centralized logging of provisioning, maintenance, and access events, as well as acknowledgement from provisioned network elements, for enhanced security, -5 reporting, and troubleshooting. The invention thus ensures accuracy and reduces operational costs of integrating mobile communications systems with digital networks. [0009] Therefore, there is a need for improvement in a VPN (Virtual Private Network) tunneling, and in particular in the development, test, and demonstration of automation solutions using web-based virtual computers and VPN (Virtual Private Network) tunneling. [0010] This invention seeks to improve on the deficiencies of the prior art and provides an inventive development, test, and demonstration of automation solutions using web-based virtual computers and VPN (Virtual Private Network) tunneling. PURPOSES AND SUMMARY OF THE INVENTION [0011] An embodiment of the invention is a novel development, test, and demonstration of automation solutions using web-based virtual computers and VPN (Virtual Private Network) tunneling. [0012] Therefore, one purpose of this embodiment of the invention is to provide the development, test, and demonstration of automation solutions using web-based virtual computers and VPN (Virtual Private Network) tunneling. [0013] Another purpose of this embodiment of the invention is to provide a reliable solution for a customer to use a provider's software and/or hardware. [0014] Yet another purpose of this embodiment of the invention is to provide a robust virtual data center that has a virtual library of various versions of a provider's software. [0015] Still yet another purpose of this embodiment of the invention is to provide a robust virtual data center that has a virtual library of various versions of a provider's software that can be easily accessed via the Internet or the world wide web.
-6 [0016] Therefore, in one aspect this invention comprises a method for remotely accessing provider software, comprising the steps of: (a) using at least one user device to electronically access the provider software via the Internet; (b) using said at least one user device to electronically access at least one customer hardware; (c) establishing at least one virtual private network (VPN) tunnel between said provider software and said at least one customer hardware via said at least one user device and said Internet; and (d) allowing said user device to perform software function on said customer hardware via said user device using said provider software. [0017] In another aspect this invention comprises a method for remotely accessing provider software, said method comprising the steps of: (a) electronically accessing said provider software via the Internet using at least one user device; (b) electronically accessing at least one customer hardware using said at least one user device; (c) establishing at least one virtual private network (VPN) tunnel between said provider software and said at least one customer hardware via said at least one user device and said Internet; and (d) performing software function on said customer hardware via said at least one user device using said provider software. [0018] In yet another aspect this invention comprises a program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform a method for remotely accessing provider software, wherein said method comprises the steps of: (a) electronically accessing said provider software via the Internet using at least one user device; -7 (b) electronically accessing at least one customer hardware using said at least one user device; (c) establishing at least one virtual private network (VPN) tunnel between said provider software and said at least one customer hardware via said at least one user device and said Internet; and (d) performing software function on said customer hardware via said user device using said provider software. [0019] Unless the context clearly requires otherwise, throughout the description and the claims, the words "comprise", "comprising", and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in the sense of "including, but not limited to". BRIEF DESCRIPTION OF THE DRAWINGS [0020] Although the scope of the present invention is much broader than any particular embodiment, a detailed description of the preferred embodiment follows together with drawings. These drawings are for illustration purposes only and are not drawn to scale. Like numbers represent like features and components in the drawings. The invention may best be understood by reference to the ensuing detailed description in conjunction with the drawings in which: [0021] Figure 1 illustrates an architectural overview of an embodiment of this invention. [0022] Figure 2 is a detailed flowchart describing some of the salient steps to implement an embodiment of this invention. DETAILED DESCRIPTION -8 [0023] This invention is basically directed to the development, test, and demonstration of automation solutions using web-based virtual computers and VPN (Virtual Private Network) tunneling. [0024] With the development of a provider's automation solutions to customers also now involves the providing of software to customers or for providing provider's sales and applications personnel to support the customer. This basically means that the provider's software has to be loaded and ran on a local PC to see and use the provider's technology. [0025] The method of providing a software solution on every specific software and/or hardware application is very time consuming and at time requires provider's support personnel to help get software operational. Time and money may also spent shipping hardware and/or software to customer sites. Also, many times customers balk at loading large software packages onto their computer resources, especially for trial usage. Additionally, provider's sales and application resources have difficulty keeping their software current with the latest version. On the other hand, customer support sometimes needs old versions of software products which cause them to constantly load various versions of software. [0026] With this invention virtual PCs can be preloaded with demonstration applications and various versions of software can be deployed on a centralized computer system (server). The virtual PCs can be accessed via the Internet or the world-wide web, using only a web-browser (no provider's software and/or hardware is required for the PC), making them available to anyone that is approved by the provider. Additionally, a VPN (Virtual Private Network) tunnel can be configured between the virtual PC and any other PC that is connected to the Internet or the world-wide web. This PC can be connected to local provider's automation hardware, such as, for example, a programmable logic controller, allowing the hardware to be programmed and monitored via the provider's software on the virtual PC. Essentially this invention allows programming, monitoring, or any software support of a provider's automation system -9 from anywhere to anywhere in the world, as long as, a connection to the Internet or the world-wide web can be obtained. [0027] Figure 1 illustrates an architectural overview 23, of an embodiment of this invention. As shown in Figure 1, a user PC 20, is used to use its web browser to connect to a virtual PC at a Virtual Demo Data Center or a repository 32, via Internet 22, or World Wide Web (WWW) 22. The user PC 20 is also connected to the customer's hardware 10, 12, 14. For some applications one or more of the customer's hardware 10, 12, 14, may have been provided by the provider. The Virtual Demo Data Center 32 is preferably supported by the provider using at least one server 24, and a Demo Virtual Machine 34. It is preferred that the virtual PC has been pre-configured with a correct version of the provider's software and/or demonstration applications. A VPN (Virtual Private Network) tunnel 30, is then created using software on the virtual PC and the local user PC 20. The local user PC 20, routes the virtual PC network traffic to a local network that contains the provider's hardware, 12, 14, such as, for example, a provider's PLC (Programmable Logic Controllers) 12, 14. This allows the software running on the virtual PC to communicate with the local provider's hardware 12, 14. This invention allows a user with only a web browser to use a provider's hardware and/or software. A customer who wants to use or access the virtual PC for their specific application would either have a fixed price contract or they could be charged for usage based on the time or some other mutually agreeable arrangement between the customer and the provider. For some applications the user PC 20, would be connected to the customer's hardware 10, via at least one local network second NIC (Network Interface Controller). For other applications the user PC 20 would connect to the Internet 22, via at least one internal access NIC (Network Interface Controller). Once a VPN (Virtual Private Network) tunnel 30, has been established, the communication from the user PC 20, to the Virtual Demo Data Center 32, and/or the Demo Virtual Machine 34, would be routed via VPN onto local VLAN (virtual local area network). [0028] Figure 2 is a detailed flowchart 40, describing some of the salient steps to implement an embodiment of this invention. A user would start a user PC 20. at start 41.
-10 A user will connect the local PC 20, to the Internet 22, or the Worldwide Web 22, and to the local hardware 10, 12, 14, at step 42. A provider's personnel at some remote location would allocate a virtual PC to the user 20, at step 43. At step 44, the user 20, would log into the virtual data center 32, and start the virtual PC. The user 20 would then start the VPN tunnel 30, on the virtual PC, at step 45. At step 46, the user 20 starts the VPN tunnel 30, on the local PC 20. Then, at step 47, the user 20 would configure the network traffic routing information. At step 48, the user 20 can now use the provider's hardware 12, 14, and/or software. Once the user 20 has completed the needed tasks, the user 20 would end the program or task at step 49. [0029] The user device 20, could be selected from a group consisting of a personal computer (PC) 20, a personal digital assistant (PDA) 20, an electronic device 20, and a mobile device 20. For most applications it is preferred that the user device 20, has at least one display means, such as, for example, a screen, a web page, a data entry buttons or fields, to name a few. In most cases at least one of the customer hardware 10, 12, 14, is provided by the provider. [0030] The provider software is preferably located at a provider's virtual data center, however, for some applications the provider software could be located at a virtual data center of a third party. For most applications the provider software is located on at least one server 24, managed by the provider, however, for some applications the server 24 could be managed by a third party provider. [0031] The provider software that is located at the virtual demo data center 32, or the server 24, could be selected from a group consisting of an original version software, an intermediate version software, an updated version software, a current version software, or any other version of the software, to name a few. For most applications the provider software is selected from a group consisting of programming software, diagnostic software, monitoring software, demonstration software, security software, or any other software, to name a few.
- 11 [0032] As a person skilled in the art can appreciate that with this invention the provider just needs to place at least one version of a software at a virtual data center 32, or a server 24, and anyone authorized to access it can access it at anytime from anywhere in the world. Therefore, any updates or versions or patches of that software can now be placed at the virtual data center 32, or a server 24, without replacing any of the prior versions, and now anyone authorized to access the various versions can access it at anytime from anywhere in the world. Because the software is now residing at a secure and reliable provider's location, the user or the customer does not need to have it on their user device 20, or on the customer hardware 10, 12, 14, or keep a copy of the software at their location or the supporting updates and/or patches. This can be very important when, for example, a provider has installed a hardware 10, 12, or 14, and, let's say, after 14 years there is a breakdown or maintenance of that hardware is now required. The customer may or may not have the original software or the version that was installed on that particular hardware 10, 12, or 14. Therefore, now with this invention the customer can just contact the provider and the provider can authorize a user to use a user device 20, to set-up a VPN tunnel 30, and make the necessary repairs or provide the needed maintenance. This way neither the customer nor the user has to worry about if the particular software for a particular hardware is still available or are the software updates or patches still available. This is also true for any demo programs that the provider may be interested in providing to the user and/or customer. [0033] In order to provide a secure connection between the user device 20, and the provider's software, it is preferred that the user device 20, is authenticated by the provider prior to establishing the at least one virtual private network (VPN) tunnel 30. Similarly, in order to provide a secure connection it is preferred that at least one security software monitors the electronic connection between the provider software and the at least one customer hardware. It is preferred that the provider software has at least one means for associating, by an authorized operator, at least one parameter with the at least one virtual private network (VPN) tunnel.
-12 [0034] While the present invention has been particularly described in conjunction with a specific preferred embodiment, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. It is therefore contemplated that the appended claims will embrace any such alternatives, modifications and variations as falling within the true scope and spirit of the present invention.

Claims (13)

1. A method for remotely accessing provider software, comprising the steps of: (a) using at least one user device to electronically access the provider software via the Internet; (b) using said at least one user device to electronically access at least one customer hardware; (c) establishing at least one virtual private network (VPN) tunnel between said provider software and said at least one customer hardware via said at least one user device and said Internet; and (d) allowing said user device to perform software function on said customer hardware via said user device using said provider software.
2. The method for remotely accessing provider software of Claim 1, wherein said at least one user device is selected from a group consisting of a personal computer (PC), a personal digital assistant (PDA), an electronic device, and a mobile device.
3. The method for remotely accessing provider software of Claim 1 or Claim 2, wherein said provider software is located at a provider's virtual data center.
4. The method for remotely accessing provider software of Claim 1 or Claim 2, wherein said provider software is located on at least one server managed by said provider.
5. The method for remotely accessing provider software of any one of the preceding claims, wherein at least one said customer hardware is provided by said provider.
6. The method for remotely accessing provider software of any one of the preceding claims, wherein said provider software is selected from a group consisting of original version software, intermediate version software, updated version software, and current version software. -14
7. The method for remotely accessing provider software of any one of the preceding claims, wherein said user device is authenticated by said provider prior to establishing said at least one virtual private network (VPN) tunnel.
8. The method for remotely accessing provider software of any one of the preceding claims, wherein at least one security software monitors said electronic connection between said provider software and said at least one customer hardware.
9. The method for remotely accessing provider software of any one of the preceding claims, wherein said user device has at least one display means.
10. The method for remotely accessing provider software of any one of the preceding claims, further comprising at least one means for associating, by an authorized operator, at least one parameter with said at least one virtual private network (VPN) tunnel.
11. The method for remotely accessing provider software of any one of the preceding claims, wherein said provider software is selected from a group consisting of programming software, diagnostic software, monitoring software, demonstration software, and security software.
12. A method for remotely accessing provider software, said method comprising the steps of: (a) electronically accessing said provider software via the Internet using at least one user device; (b) electronically accessing at least one customer hardware using said at least one user device; (c) establishing at least one virtual private network (VPN) tunnel between said provider software and said at least one customer hardware via said at least one user device and said Internet; and (d) performing software function on said customer hardware via said at least one user device using said provider software. -15
13. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform a method for remotely accessing provider software, wherein said method comprises the steps of: (a) electronically accessing said provider software via the Internet using at least one user device; (b) electronically accessing at least one customer hardware using said at least one user device; (c) establishing at least one virtual private network (VPN) tunnel between said provider software and said at least one customer hardware via said at least one user device and said Internet; and (d) performing software function on said customer hardware via said user device using said provider software.
AU2013219146A 2008-07-22 2013-08-19 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling Abandoned AU2013219146A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2013219146A AU2013219146A1 (en) 2008-07-22 2013-08-19 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling
AU2016201600A AU2016201600B2 (en) 2008-07-22 2016-03-11 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US61/082,578 2008-07-22
US12/505,987 2009-07-20
AU2009274149A AU2009274149A1 (en) 2008-07-22 2009-07-21 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling
AU2013219146A AU2013219146A1 (en) 2008-07-22 2013-08-19 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2009274149A Division AU2009274149A1 (en) 2008-07-22 2009-07-21 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU2016201600A Division AU2016201600B2 (en) 2008-07-22 2016-03-11 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling

Publications (1)

Publication Number Publication Date
AU2013219146A1 true AU2013219146A1 (en) 2013-09-05

Family

ID=49080577

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2013219146A Abandoned AU2013219146A1 (en) 2008-07-22 2013-08-19 The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling

Country Status (1)

Country Link
AU (1) AU2013219146A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113641444A (en) * 2020-04-27 2021-11-12 南通华信中央空调有限公司 Virtual test method, virtual test device and related equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113641444A (en) * 2020-04-27 2021-11-12 南通华信中央空调有限公司 Virtual test method, virtual test device and related equipment
CN113641444B (en) * 2020-04-27 2024-06-07 南通华信中央空调有限公司 Virtual testing method, virtual testing device and related equipment

Similar Documents

Publication Publication Date Title
US9237070B2 (en) Development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling
CA2347304C (en) Broadband network service delivery method and device
CN102293047B (en) System and method for providing wireless local area networks as a service
US20180359543A1 (en) Communications process and system associated with monitoring and controlling resource consumption
US8428036B2 (en) System and method for providing wireless local area networks as a service
US7392050B2 (en) Systems and methods for automated network operating center system for broadband wireless network
CN108234261A (en) For the service bus dispatching method of electric control system network supervision
CN107911243B (en) Network optimization method, device and computer readable storage medium
Badmus et al. Network slicing management technique for local 5G micro-operator deployments
AU2016201600B2 (en) The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling
AU2013219146A1 (en) The development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling
EP3704894B1 (en) A method and arrangement for allocating communication resources in a communication network
CN106533716A (en) Method and system for managing northbound interface
CN106686694A (en) Equipment networking method and equipment networking device
CN104427556A (en) Method and device for controlling quality-of-service level of wireless local area network
Greene Check Point strives to automate VPN expansions
AU2013203303A1 (en) A communications process and system

Legal Events

Date Code Title Description
MK5 Application lapsed section 142(2)(e) - patent request and compl. specification not accepted