TW487843B - Internet-based shared file service with native PC client access and semantics and distributed access control - Google Patents

Internet-based shared file service with native PC client access and semantics and distributed access control Download PDF

Info

Publication number
TW487843B
TW487843B TW089123020A TW89123020A TW487843B TW 487843 B TW487843 B TW 487843B TW 089123020 A TW089123020 A TW 089123020A TW 89123020 A TW89123020 A TW 89123020A TW 487843 B TW487843 B TW 487843B
Authority
TW
Taiwan
Prior art keywords
file
endpoint
specific
client
remote
Prior art date
Application number
TW089123020A
Other languages
Chinese (zh)
Inventor
Robert S Phillips
Scott H Davis
Daniel J Dietterich
Scott E Nyman
David Porter
Original Assignee
Mangosoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mangosoft Corp filed Critical Mangosoft Corp
Application granted granted Critical
Publication of TW487843B publication Critical patent/TW487843B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A multi-user file storage service and system enable each user of a pre-subscribed user group to operate an arbitrary client node at an arbitrary geographic location, to communicate with a remote file server node via a wide area network and to access the files of the file group via the respective client node in communication with the remote file server node via the wide area network. More than one user of the pre-subscribed user group is permitted to access the file group at the remote file server node simultaneously. Illustratively, the integrity of the files at the remote file server node are maintained by controlling each access to each file at the remote file server node so that each access to files at the remote file server is performed, if at all, on a respective portion of each file as most recently updated at the remote file server node. Thus, all native operation system application programming interfaces operate as if all multi-user applications accessing the files function as if the remote server and client nodes were on the same local area network. Illustratively, and interface is provided for adapting file access one of the client nodes. The interface designates at the client node each accessible file of the group as stored on a virtual storage device. The interface enables access to the designated files in a fashion which is indistinguishable, by users of, and applications executing at, the client node, with access to one or more files stored on a physical storage device that is locally present at the client nodes. Illustratively, an encrypted key is transferred from the remote fileserver node to one of the client nodes via a secure channel. The key is encrypted using an encryption function not known locally at the remote file sever node. The transferred key is decrypted at the client node. The key is used at the client node to decrypt information of the files downloaded from the remote file server node or to encrypt information of the files prior to uploading for storage at the remote file server node. Access control to a particular one of the files of the group can be delegated to an access control node.

Description

4丨87843 五、發明說明(l) 相關申請案 本申請案是美國專利申請案序號〇8 /754,481,其 名稱為「分享記憶體電腦網路」(Shared Memory4 丨 87843 V. Description of the invention (l) Related application

Computer Networks),在 1996 年11 月22 日由John Β· Carter ’ Scott H. Davis , William Abraham , Steven J· Frank ’ Thomas G· Hansen , Daniel J. Dietterich , 以及David Porter等人所提出申請的。 本申請案是以臨時申請案序號6 0/163,008為基礎, 其名稱為「具有本地個人電腦客戶存取及警示的一種以網 際網路為基礎的分享式檔案服務」(Internet — Based Shared File Service with Native PC Client Accesses and Semantics ),在 1999 年11 月1 曰由Robert S. Phillips , Scott Η· Davis , Daniel J·Computer Networks), filed on November 22, 1996 by John B. Carter ’Scott H. Davis, William Abraham, Steven J. Frank’ Thomas G. Hansen, Daniel J. Dietterich, and David Porter et al. This application is based on the provisional application serial number 60 / 163,008, and its name is "Internet — Based Shared File Service with Local Personal Computer Client Access and Alert" File Service with Native PC Client Accesses and Semantics), on November 1, 1999 by Robert S. Phillips, Scott J. Davis, Daniel J.

Dietterich ’Scott E. Nyman 以及 David Porter 等人所 提出申請的。這份臨時申請案的内容將完全納入且合併畲 作是本案的參考資料。 本申請案是關於下列專利申請案,一般都歸屬於相同 申請人: 美國專利申請案序號,其名稱為「具有本地個人電腦 客戶存取及警示的一種以網際網路為基礎的分享式檔案服 務」(Internet-Based Shared File Service with Native PC Client Accesses and Semantics and Distribute Version Control ),由Robert S· Phil lips ,Scott H· Davis , Daniel J· Dietterich , Scott E·By Dietterich ’Scott E. Nyman and David Porter. The contents of this provisional application will be fully incorporated and combined as a reference for this case. This application is for the following patent applications, which are generally attributed to the same applicant: US patent application serial number, whose name is "An Internet-based Shared File Service with Local PC Access and Alert "(Internet-Based Shared File Service with Native PC Client Accesses and Semantics and Distribute Version Control), by Robert S. Phil lips, Scott H. Davis, Daniel J. Dietterich, Scott E.

第5頁 487843 五、發明說明(2)Page 5 487843 V. Description of the invention (2)

Nyman以及David Porter 等人在同一天所提出的。 美國專利申請序號,其名稱為「具有本地個人電腦客戶 存取及警示及分散式版本控制的一種以網際網路為基礎的 分享式檔案服務」(Internet-Based Shared File Service with Native PC Client Accesses andProposed by Nyman and David Porter on the same day. US patent application serial number, whose name is "Internet-Based Shared File Service with Native PC Client Accesses and

Semantics and Distribute Version Control ),由 Robert S. Phillips ^ Scott H. Davis 5 Daniel J.Semantics and Distribute Version Control) by Robert S. Phillips ^ Scott H. Davis 5 Daniel J.

Dietterich,Scott E· Nyman 以及 David Porter 等人在 同一天所提出的。 上述所列的文件將完全和本案的參考資料相結合。 發明領域 口 本發明係關於透過就像是網際網路的一廣域網路所提 供的一種多用戶分享式檔案存取服務。 發明背景Proposed by Dietterich, Scott E. Nyman, and David Porter on the same day. The documents listed above will be fully combined with the references in this case. FIELD OF THE INVENTION The present invention relates to a multi-user shared file access service provided through a wide area network like the Internet. Background of the invention

一個剛萌芽的需要已經發 這種現象的興起一部份歸因於 尤其是,電腦終端機。結果, 得=大量生產,其中包括桌上 、、周際網路接收器」。此外 ,’像網際網路存取,是普遍 传。例如,很多家庭和旅館可 網路存取。 展用來改進遠端計算存取。 電腦科技成本的持續減少, 各式各樣型式的電腦終端機 型、筆記型、電玩控制台以 ’廣域網路存取,最明顯 可以在各種地理位置上來取 谷、,内電知終端機並提供網際 際網路的廣大可存取性, 需求。例如,現在有很多A nascent need has already arisen due in part to the rise of this phenomenon, in particular, to computer terminals. As a result, we have = mass production, including desktop, Internet receivers. " In addition, ‘like Internet access, is widespread. For example, many homes and hotels have internet access. Development is used to improve remote computing access. The cost of computer technology has continued to decrease. Various types of computer terminal models, notebooks, and video game consoles are accessed using 'wide area network. It is most obvious that they can take advantage of the geographical location, and know the terminal and provide it. Broad Internet accessibility requirements. For example, there are many now

_大量可利用的電腦裝置及網 已經提高使用者存取遠端資料的 487843 五、發明說明(3) 工作者被鼓勵來”電信通勤n (te 1 ecommute),也就是,在 家工作而不在企業校園内上班。通常,電信通勤使用者必 須在家中使用電腦終端機來遠端地存取家中以外的,例如 企業校園的計算資源(就像資料、程式及應用、處理容 量’儲存容量等)。此外,剛開始先進行發展所謂的”網 路電腦架構"(network computer architectures),而它 =是由有限的高容量處理器所組成。而它們是可以廣泛而 遠端的存取到許多擁有更多有限的計算資源的電腦終端 機。再者,經由廣域網路鼓勵在各種任意及遙遠地理位置 工=者都,藉著彼此交換電腦資料、程式、及應用來做 φ 距專案合作。 傻作ΐ:相同的潛在能力'給遠端使用者存取電腦資源,就 二使=可利用給連結一個本地的區域網路的使用者一 準來:m。特別是,一區域網路提供-些安全標 網路的安全標準才能顯示傳送: 同時或-齊存取相同的檔案 ,使用者可以 同步的檔案存取的應用提供,,鍵值,,二夕使用者中同時及 整性的控制。例如,根據可相容=就是,維持資料完 :去存取檔案或檔案的一部份。因:取t式允許眾多使用 有。然而’經常可能允許超過二位使用者所專 使用者同時同步去讀取_A large number of available computer devices and networks have improved users' access to remote data 487843 V. Description of the invention (3) Workers are encouraged to "te 1 ecommute", that is, work from home instead of business Work on campus. Generally, telecommunication commuters must use computer terminals at home to remotely access computing resources outside the home, such as corporate campus computing resources (such as data, programs and applications, processing capacity, storage capacity, etc.). In addition, the development of so-called "network computer architectures" was first started, and it was composed of a limited number of high-capacity processors. And they are widely and remotely accessible to many computer terminals with more limited computing resources. Furthermore, through wide area networks, workers in various arbitrary and remote geographical locations are encouraged to cooperate with each other by exchanging computer data, programs, and applications. Stupid work: the same potential ability 'for remote users to access computer resources, only two uses = available to users connected to a local area network: m. In particular, a local area network provides some security standard network security standards to display transmission: simultaneous or simultaneous access to the same file, users can synchronize file access provided by the application, Simultaneous and integrated control among users. For example, according to compatibility = that is, to maintain the end of the data: to access the file or part of the file. Because: the t-type allows many uses. However, ‘often may allow more than two users to read simultaneously.

第7頁 或—槽t的一肖定部份是寫入存取到—個檔 487843 五、發明說明(4) 一個檔案,或一個檔案的一部份。此外,傳統上存取權利 權限(privilege access right)是為目錄或檔案指明 的。特別是,讀取(r e a d )、寫入(w r i t e )及刪除權限 能夠對特定的使用者及群體加以限制。例如,可能對一位 使用者提供讀、寫及刪除一個完整目錄的權利,然而一個 完整的用戶群體很可能只有讀、寫在目錄内所有檔案的權 限’但是那個群,體中的某些使用者很可能只有讀在那個目 錄内的某一個檔案的權限。一第三用戶群體很可能只能在 一個目錄内讀取所有檔案的權限。 ,在某些特定產品及服務可利用來幫助使用者取得檔 案之遠端檔案存取。很多單一使用者網際網路服務也可 =來儲存資訊,其中包含那些被銷售通稱為"Driveway ’"idriveT"、"FreeDisk SpaceTM”,"FreeBackTM",Page 7 OR-A fixed part of slot t is write access to a file 487843 V. Description of the invention (4) A file, or a part of a file. In addition, traditional access rights are specified for directories or archives. In particular, read (r e a d), write (w r i t e), and delete permissions can restrict specific users and groups. For example, a user may be provided with the right to read, write, and delete a complete directory. However, a complete user group may only have permissions to read and write all files in the directory. It is very likely that the user has only the right to read a certain file in that directory. A third user group is likely to have access to all files in one directory. , In some specific products and services can be used to help users get remote file access to files. Many single-user Internet services can also store information, including those commonly referred to by sales as " Driveway '" idriveT ", " FreeDisk SpaceTM ", " FreeBackTM ",

Swap Drive t«"及"Vist〇 TM"。這些服務提供一遠 裝置來儲存資料做為以後的檢索,而利用該裝置存 多:在:使用者的電腦終端機上執行一個網站瀏覽:程J : /;Ϊ。二份操作這些服務是根據-個所謂的"3 / 同思(publish/subscribep^ir u 、 天仃 ,,發行/同意"綱要,該使用者十拈^ (SCheme )。根據一 ,用者的電腦終端機傳送檔案到遠器程式以從 2:儲存裝置檔案到使用者的電腦用:方便從 檢索檔案可採取謹慎的行動。、時使用者儲存或 時,該使用者利用指向裝置以二;,,劉覽器程式 圖像")指示選擇的可選取之領^二(如按鈕"或” 〈颂不特徵,以便上傳檔 487843 五、發明說明(5) 然後該使用者將選取一個局部性儲存的檔案以便上傳(透 過找出播案位置並選擇它的方式)。於是,然後該播孝的 一複製備份將透過該網際網路傳送到它所儲存的遠端儲存 裝置。一個類似的步驟順序能夠用來在該遠端儲存裝置去 檢索檔案。 這些系統有二個主要的用途,首先,一位擁有有限儲 存空間的使用者'能夠使用這些系統來取得剩餘儲存空間或 不需要使用者的終端機儲存空間。第二,許多使用者能^ 獲得一組檔案的存取,尤其是標明為群體存取。注意,這 並不是完全相同於,,檔案共享”,因此許多使用者能夠同時 存取該相同的檔案。相反的,所有這些系統所提供的是一 個能夠由許多使用者存取,雖然一次一個的一個健存空 間。照樣地,這些系統具有下列缺點: 二 (< a)檔案共享,即,同時/ 一齊存取檔案並不受到支 (b )許多使用者不能 使他們希望在那個空間 (c)該發行/同意綱 使用者的本地終端機及 況有數個影響,首先, 傳送在該遠端儲存裝置 的一個檔案,比使用者 的電腦終端機上得到所 須利用額外的技巧來存 同時存取相同共有的儲存空間,許 内同時存取不同的檔案。 要请求審慎的使用者介入來傳送名 遠端儲存空間之間的檔案,這種僧 該使用者必須採取不同套的措施來 及該使用者的本地電腦終端機之指 正常在存取一局部性居留在使用_ 使用的一檔案。結果,該使用者少 取在遠端儲存空間上的檔案。Swap Drive t «" and " Vist〇 TM ". These services provide a remote device to store data for later retrieval, and use the device to store multiple: on: a user's computer terminal to perform a website browsing: Cheng J: /; Ϊ. The two operations of these services are based on a so-called " 3 / Tong Si (publish / subscribep ^ ir u, Teana, release / agree " outline, the user ten 拈 ^ (SCheme). According to one, use The user's computer terminal sends the file to the remote program to store the device file to the user's computer. It is convenient to take careful action from retrieving the file. When the user saves or when the user uses the pointing device to Second ,,, Liu Lanqier program image ") indicates the selectable options ^ 2 (such as the button " or " so that the features are not uploaded in order to upload the file 487843 V. Description of the invention (5) Then the user will Select a locally stored file for uploading (by finding out the location of the broadcast and choosing it). Then, a duplicate backup of the broadcast will be sent over the Internet to the remote storage device where it is stored. A similar sequence of steps can be used to retrieve files on the remote storage device. These systems have two main uses. First, a user with limited storage space can use these systems. Get the remaining storage space or do not need the user's terminal storage space. Second, many users can get access to a group of files, especially marked as group access. Note that this is not exactly the same as, files Share, ”so many users can access the same file at the same time. Instead, all these systems provide one that can be accessed by many users, albeit one storage space at a time. As such, these systems have The following disadvantages: < a) File sharing, that is, simultaneous / uniform access to files is not supported (b) Many users cannot make them wish to be in that space (c) the local terminal of the user of the distribution / consent program The status of the device has several effects. First, a file transmitted on the remote storage device is used to obtain the same shared storage space while accessing the same shared storage space at the same time by using the extra skills required to obtain the user's computer terminal. To request a discreet user to intervene to send files between remote storage spaces, the user must take And to measure the same sets of the local computer terminal of the user refers to the normal use in accessing a local file using a file _ As a result, the user takes less storage space at the distal end of the stay.

五、發明說明(6) (d )更重要的是, 前’採取行動從遠端 端機。因此,在使用 能自動存取位於遠端 些播案局部性儲存在 式或程式很可能只能 過程中的檔案。以另 地電腦終端機上的應 存在本地電腦終端機 如’在執行一應用的 為使用者所熟知的儲 果這些資料或設定檔 定放置於遠端儲存裝 端檔案。相反地,使 來存取,且使用者必 取謹慎的初步行動來 (e )提供限制的安 竊聽。有些服務只有 提供安全性。這在私 域網路或一私人的廣 資料是透過任意一個 (典型是未知的)控制 果。有些服務是透過 layer : (SSL)來提供 該使用者必須在檔案得以全部存取之 儲存裝置傳送檔案到使用者的電腦終 者的本地電腦終端機上的應用執行不 儲存裝置上的檔案。相比之下,當這 使用者的電腦終端機上時,一應用^ 存取這些沒有使用者介入在正常執行 外一種方式來說,某些在使用者的本 用程式執行可以自由而自動地存取保 上的槽案,而不需要人為的介入。例 過程中,該應用很可能局部性存取不 存的資料和設定擋案。另一方面,如 案中的其中一個,在應用執行時被指 置上’該應用就不能自動存取該一遠 用者必須知道那些遠端檔案將需要用 須在經由局部性執行應用存取之前採 下載這些檔案到本地的電腦終端機。 全性是避免在檔案上出現未經認證的 一個帳號密碼登錄(login)的方式來 人網路内是典型足夠的,例如:一區 域網路連結。然而,在網際網路中, 路徑來傳送,而且,超過在其他人 之下的私人網路的一個不可辨別的結 文全防護層(secured socket 安全性。在其中,SSL提供一個方V. Description of the invention (6) (d) More importantly, the former 'takes action from the remote terminal. Therefore, in use can automatically access some remotely located files or programs that are likely to be stored only in the process. For example, a local computer terminal should be stored on another computer terminal. For example, when storing an application, the data or configuration file is stored in a remote storage terminal file. Conversely, access must be accessible and the user must take careful initial action to (e) provide restricted security eavesdropping. Some services only provide security. This is controlled by any one (typically unknown) on a private network or a private wideband data. Some services are provided through layer: (SSL). The user must execute the application on the local computer terminal of the storage device where the file has full access to the storage device to execute the file without storing the file on the device. In contrast, when this user's computer terminal is used, an application ^ accesses these methods without user intervention in normal execution. In some ways, the user's own program execution can run freely and automatically. Access to the case on the warranty without human intervention. In the example process, the application is likely to locally access unsaved data and set files. On the other hand, in one of the cases, when the application is executed, it is indicated that the application cannot automatically access the remote user. The remote user must know which remote files will be used to access the application through local execution. Before downloading these files to a local computer terminal. Completeness is to avoid unauthenticated login with an account and password. It is typically sufficient to log in to a person's network, such as a local area network connection. However, in the Internet, paths are transmitted, and there is an indistinguishable layer of secure (secured socket security) over private networks under others. Among them, SSL provides a way to

第10頁 五、發明說明(7) Ϊ 5 t兹t經由網際網路傳送到客戶端點(等等)之 網路上傳送檔案時,=^刻加密資訊。該傾向於在網際 該技術的問題是:者:稽案未經認證的存取。 播案儲存服務的伺常以未加密的型式儲存在 又μ〜^ w I 因此,該檔案可能容易受到由 付儲存服務的伺服器的未經認證的存取所支 配。 1人 t L '彳曰案版本控制及非自動地保持完整性。有4b單一使 m;約使得許多使用者存取-標案,一次二:。 ;:ΐ:ίΑ可,能存取並且修改一特定的遠端儲存的標 遠端儲存的權取並且修改-相同的Page 10 V. Description of the invention (7) Ϊ 5 t When the file is transmitted on the Internet to the client point (and so on) via the Internet, encrypted information is encrypted. The Tendency in the Internet The problem with this technology is: by: auditing unauthenticated access. The archive storage service is usually stored in an unencrypted form at μ ~ ^ w I. Therefore, the file may be susceptible to unauthenticated access by the server paying the storage service. 1 person t L '彳 version control and non-automatic integrity. There is 4b single use m; about make many users access-bid, two at a time:. ;: ΐ: ίΑ Yes, can access and modify a specific remote storage target Remote storage access and modification-same

份檔荦包含由#存取修改的檔案時,那 = Ϊ 所做的最近的更新,而不是使用者A 更多的i六去^需要在共享檔案存取的使用者該部分,做 遺失。' 合他們的檔案存取,以避免錯誤及資料的 方取Ϊ2整合性也可以在許多使用者同時存取槽案的地 用來ιΐ ^ —特別疋,一機器裝置(mechanism )應提供 使用者根據一不相容的檔案共享存取模式存 取檔案的,同部份。以下將詳細敘述細部情形。 τ«"及H的單—使用者服務是由通稱為"StGrage P〇int 及 X-Drlve tm"來銷售 cSt〇rage p〇int tm 提供一 關於使用者檔案存取的觀點是和遠端儲存的檔案和本地^When the file 荦 contains a file modified by #Access, that = Ϊ made the most recent update instead of User A. I need to go to the part of the user who accesses the shared file, and is missing. '' Combine their file access to avoid errors and data access. 2 Integration can also be used in the place where many users access the slot at the same time ^ 疋 疋 In particular, a mechanism should provide users Access to files according to an incompatible file sharing access mode, same part. Details will be described in detail below. τ «" and H's single-user service is sold by commonly known as " StGrage P〇int and X-Drlve tm " cSt〇rage p〇int tm provides a perspective on user file access is He Yuan Files stored locally and locally ^

hndows τμ Expl〇rer ΤΜ名稱空間擴充物件。結果,某些 487843 五、發明說明(8) --—__ 存的檔案相類似。例如,一使用者執行…“⑽S I 統能夠使用Explorer τμ程式來展”系 的檔案清單,用同樣方法,使用者也= = 上 使用者的電腦終端機上的權案清單。此外,該二 在遠端儲存裝置及使用者的電腦終端機之間傳送 採取類似的行動就如同使用來移動使用者的 二端沾 各種本地裝置的檔案,即,透過『 恥、,,;缟機的 像來結合這些檔案。然而,在該使用者二電腦 二Ϊ行不能無缺點地且自動地存取置放於遠端 ^ σ j樣方式,該應用程式及程式氺脾六 使:者的的電腦終端機的檔案。該理由: if不疋由這些服務所提供。相反地,該遠端儲 程;須先傳送到使用者的電腦終端機,所以庫用 私式及程式才得以在正常執行期間存取檔案。 〜 ";-DriveTM"提供一比較廣泛的服務給單一 。 ίί "X-Drive 取相同間傳送檀案,並採 ^ ί§ ^ 來傳迗使用者的電細終端機的局部性實質 χ 的㈣(即,圖像拖μ釋放)。然而 居留在遠端儲存裝置上的標案就Λ 存^荦ϊ將存取在使用者電腦終端機上局部性館 田案。特別是,在這些程式或應用程式的正常執行過hndows τμ Explrr TM namespace extension object. As a result, some 487843 V. Invention Description (8) --- The files saved are similar. For example, a user runs ... "⑽SI system can use Explorer τμ program to display" file list, in the same way, the user also = = on the user's computer terminal list of rights. In addition, the two transfer similar actions between the remote storage device and the user's computer terminal as if they were used to move the user's second end to various local device files, that is, through "shame,"; 缟Machine image to combine these files. However, in the second computer of the user, the application and the program placed on the remote end cannot be accessed without any defect and automatically. The application program and the program are the files of the computer terminal of the user. The reason: if is not provided by these services. Conversely, the remote stored procedure must be transmitted to the user's computer terminal first, so the library private program and program can access the file during normal execution. ~ &Quot; -DriveTM " provides a wide range of services to a single. ίί " X-Drive takes the same transmission case and uses ^ ί§ ^ to transmit the local essence of the user's electronic terminal (i.e., the image drag is released). However, the project that resides on the remote storage device will be stored in the local computer case on the user's computer terminal. In particular, in the normal execution of these programs or applications

五、發明說明(9) 程中,這些檔案將透過由X-Drive tm所提供的其他軟體, 缺點地並且自動地從运端檔案儲存裝置傳送到使用者的 終端機,當這些應用或程式嘗試來存取遠端儲存的檔 mi而言的,當使用x—Drive tm時,使用者,應用及 式字對待遠端儲存的檔案相同於對待本地儲存的檔案一 樣的方式。 ’、 ,而,既不是st〇rageP〇int TM也不是x_Drive ΤΜ能夠 二使用者同時或一齊的存取檔案或檔案群體。而這些 ?持這些檔案的完整性"提一 ^吏用6入欲功能,但X_DriVe ΤΜ卻沒有;S Wepoint #總Μ 王防5蒦層(SSL)來傳送在使用者的電腦終端機及 η::案裝置的加密資訊…旦在遠 ^偏λ資訊之前將再度加密以防止^柳。= 产又加證的存取。然而,資料立刻在預先儲存再 =前,二1 t别及立刻在事先傳送安全防護層(SSL)加密 著。鬥單::儲^置的基地上以-種未加密的方式存在 置上^ 為解密資料的方法可利用在遠端儲存裝 斤以,使用者不能確定安全性是從不妥協。 、 的裝Ϊ上使用者服務外,也是可利用-些多用戶 、 、匕括那些通稱為"Punch Network τ«"及 戶二Γ:/:來銷售。不像單一使用者系統,該多用 其ΐ = 使用者同時來存取相同分享式儲存空間》 用去必須::使用發行/預約綱要來傳送檔案。因此,使 '、/、"取為已經出現在使用者的電腦終端機上的檔案V. Description of the invention (9) During the process, these files will be transferred from the terminal file storage device to the user's terminal through other software provided by X-Drive tm. To access the remotely stored file mi, when using x-Drive tm, users, applications, and characters treat remotely stored files in the same way as locally stored files. ’, And neither stOragePint ™ nor x_Drive TM is able to access files or file groups simultaneously or simultaneously by two users. And these support the integrity of these files: “One uses the function of accessing 6 functions, but X_DriVe TM does not; S Wepoint # 总 M 王 防 5 蒦 层 (SSL) is transmitted to the user's computer terminal and η :: The encrypted information of the case device ... Once it is far away from the lambda information, it will be encrypted again to prevent it. = Certificate of Access. However, the data is stored immediately before re-encryption, and is not encrypted immediately before transmission. Doubt: The storage base is stored in an unencrypted manner. The method of placing ^ for decrypting data can be stored in the remote storage device. The user cannot be sure that the security is never compromised. In addition to the user service, you can also use some multi-users, such as those commonly known as " Punch Network τ «" and Toji Γ: /: to sell. Unlike a single-user system, it should be used multiple times. Ϊ́ = Users access the same shared storage space at the same time. Use: Must use :: Use the release / reservation profile to send files. Therefore, make ', /, " as a file that already appears on the user's computer terminal

第13頁 五、發明說明(10) _ un的附加步驟,以便存取居留在遠端儲 程式及應用也*能在這些㈣居留在遠i 數使:去,::缺點地且自動地存取這些樓案。而且,多 相同的槽案或一槽案的部分並沒 夕 ::檔案儲存裝置的基地上執行。同肖,再度 = 生 2能:在遠端檔案儲存裝置的基地上受到未經認;G 取而妥協。 J仔Page 13 V. Description of the invention (10) _un Additional steps to access and store programs and applications stored in remote locations * Can stay in these locations in remote locations Take these cases. Moreover, the same slot case or part of a slot case is not implemented at the base of the file storage device. Same as Xiao, once again = Health 2 Energy: Unrecognized at the base of the remote file storage device; G compromised. J Zi

Punch Network τ«提供一版本控制系統’因此,— 案的每個版本,(也就是,每一更新的修改尤其是π出版曰 ,也就是,審慎地由每位使用者上傳),將得以維持。 這樣使得在一群體内的每位使用者能夠存取一份檔案的任 何特定版本並且能約確定任何受贈上傳的版本已經由那個 特定的使用者在存取的間保持完整。然而,該系統並不能 確疋k供一檔案的一個單一版本,而它對以交互影響方式 修改檔案的每位使用者而言是最新的。舉例而言,假設使 用者A及B得到一份檔案得一受贈版本的相同複製備份;使 用者A及B兩者不同地修改他們的個別的複製備份並且希望 上傳他們的修改的複製備份以便儲存,這種結果將是,檔 案的兩種版本都將儲存起來,一種給使用者A,一種給使 用者B ’每一種個都是不同的版本,而第三位使用者c,現 在也將需要在這兩種版本中挑選一種。 其他的網際網路服務,包括” Er〇〇mTM,”Punch Network τ «provides a version control system '. Therefore, every version of the project, (that is, each updated modification, especially π published, that is, carefully uploaded by each user) will be maintained . This allows each user in a group to access any particular version of a file and to make sure that any donated version has been kept intact by that particular user between accesses. However, the system does not ensure a single version of a file, and it is up-to-date for every user who modifies the file in an interactive way. For example, suppose users A and B get a copy of the same copy of a donated version of the file; both users A and B modify their individual copy backup differently and want to upload their modified copy backup for storage This result will be that two versions of the file will be stored, one for user A and one for user B 'Each one is a different version, and the third user c will now also need Pick one of these two versions. Other Internet services, including "Ermom,"

M ChangePoint™,π π X-Co11aborate™,Μ "eGroups™,MM ChangePoint ™, π π X-Co11aborate ™, Μ " eGroups ™, M

第14頁 487843 五、發明說明(11) and >ΤΜ eCircles™, M H v Jung 1 e™, M ,f HotOf f ice1 "HotBix'”提供個人的遠端儲存空間。一些這種服 出版/預約綱要下,提供檔案共享。此外,一些這=Page 14 487843 V. Description of the invention (11) and > TM eCircles ™, MH v Jung 1 e ™, M, f HotOf f ice1 " HotBix '"provide personal remote storage space. Some of these services publish / File sharing is provided under the appointment outline. In addition, some of this =

也將提供基本的文件控制。$ 一個這種系統 J 相同問題。 另上述的 簡單地說,沒有一個廣域網路務 ㈣存取,而它藉著確定在遠端權案饲服器上 整性。,這些服務也不能讓眾多使用者同時並且元 杬案。再者,這些服務也沒有目 在遠端儲存裝置上知道來提供足夠的加密。 法不付 發明2本發明的一個目標用來克服之前技術的缺點。 遠成? ΐ本ΐ明提供—個多用戶檔案儲存服務及系统,將 戶的群,ίι; > 一位或一位以上的使用者中的一用 , 、母一位使用者能夠在任意的地理位置握## 一個的完芦被赴,从> v U 土 m罝雜作任 通訊;同時,用戶群網路和遠端檀案伺服器端點 客戶端點存取播4:中中都能透過特定的 鈿檔案伺服器端點通訊。 贋埤凋路和退 允許同時存取在遠端_ 11過一位使用者能被 根據-實端點的檔案群體。 份檔案的每份存取來;c遠端檔案伺服器端點上每 完整性,如此一來:ίί运端檔案伺服器端點上檔案的 可執仃在遠端檔案伺服器端點上每Basic document control will also be provided. $ One such system J Same problem. In other words, simply, there is no WAN service access, and it is determined by the integrity of the remote server. These services also do n’t allow many users to do so at the same time. Moreover, these services are not known to provide sufficient encryption on remote storage devices. The law does not pay Invention 2 An object of the present invention is to overcome the disadvantages of the prior art. Yuancheng? ΐ 本 ΐ 明 provides a multi-user file storage service and system that will group users, one of more than one user, and one user can be in any geographic location Hold ## One Wanlu was sent, and communication was performed from> v U to m; at the same time, the user group network and the remote server server endpoint client on-demand access 4: Zhongzhong Communicates through specific 钿 file server endpoints. Withdrawal and Retreat Allows simultaneous access to a remote group of files that can be accessed by one user at the remote end. Each access to each file; c completeness on the remote file server endpoint, so that: the file on the remote file server endpoint can be executed on each remote file server endpoint

487843 五、發明說明(12) 個檔案的每份存取。所以在特 上,將如同在遠端栌幸朽服哭“檔案案的特疋的部份 、&由这方法,將使所有的本地 叙 操作,如此一來,所古μ > π菜系、、先應用程式介面得以 像在遠端檔案應用存取標案功能就好 多使用者應用同時客戶端‘點,在這樣 奸撼S 一執上也將疋在相同的區域網路上。 盘-個或-;:!施例,透過標示在特定的客戶端點上, ζ χ個Μ上的檔案群體中的可存取俨牵,n门 存在-實質的儲存裝置上m取檔案,就如同儲 的客戶為點上的檔案存取,同時,那個入^处% 特 不易分辨出的方式存取所# 一二安那個,1面能夠以-種 執行,第-客戶端點尸以h 透過使用者及應用 質儲存裝置上的伊幸,而^广5,個以上的儲存在實 端點。 田案而該存取只局部性出現在第一客戶 根據另一個實施例,透擴一安全 服器端點傳送-加密鍵值給一特 ==案, 鍵值將使用一在遠端栲牵們服哭#啡 知·、占上而加岔 二ίΐ定的客戶端點上加密傳送的鍵值,二 、疋、 端點上使用那一個鍵值來解密從該遠端; 号端點a在絲” 是在該遠端檔案伺服 器鈿點為在儲存裝置上傳之前,加密一檔案資吒。 根據另一個較佳實施例,一個選擇那::位使用 加入群體的管理端點將傳送資訊到一 b Φ . ^ . iL 牌旰疋貝矾引位使用者的網際網路 電子郵件地址’並邀請使用者加入用戶群體中;使用在資487843 V. Description of invention (12) Each access of files. So in the special, it will be as if the special part of the archival case was crying at the remote end, "by this method, all local narrative operations will be performed. In this way, the ancient μ > π cuisine First, the application program interface can be used as a remote file application to access the project function. Many users can use the same client at the same time. In this way, the S-Stop will also be stuck on the same local network. Or-;:! Example, by marking the accessibility in the file group on ζ × M on a specific client point, n gates exist-the actual storage device fetches the file, just like storing The client is accessing the file on the point, meanwhile, the entry is accessed in a way that is not easy to distinguish. # 一二 安 那 , 1 side can be executed in one kind, and the client-side point is used by h. The user and the application-quality storage device are fortunate, and more than 5, more than 5 are stored in the real endpoint. Tian case and the access only locally appeared in the first client according to another embodiment, transparently expand a security service The endpoint sends-encrypts the key value to a special case. The key value will be used at the remote end.着 们 服 哭 # brown know, take the top and add two, the key value encrypted and transmitted on the fixed client point, the key value used on the second, second, and endpoint to decrypt the remote end; the endpoint "a in wire" is to encrypt a file resource at the remote file server before uploading to the storage device. According to another preferred embodiment, one chooses that: the management endpoint using the joining group will send the information to a b Φ. ^. IL brand 旰 疋 Beijing to refer the user's Internet email address and invite Users join user groups;

第16頁 487843 五 發明說明(13) 訊内的資訊,一個由使用者所 來加入用戶群體,而該資訊σ 曰苳戶端點將發出資訊 用。 ° 一加入用戶群體才會有 當一通訊替度在一特定客戶 點之間建立時,在特定客戶端點及遠J =案飼服器端 者間的連接將受到認證。特別β , =案伺服态端點兩 遠端檔案伺服器端點的身分,=^ 土疋客戶端點將證明 也將證明特定客戶端•點使用者的身2遂端槽案飼服器端點 另外,該特定客戶端點使用一 i 遠端稽案伺月良器端點所知的 j 2 =所^而不為 料。於是,客戶端點將上二加:=來標案資 端點,該遠端檔宰冇# 55 m 、、貝料到运端檔案伺服器 同樣的,該遠端檔案伺 貝枓。 端點所知丄方Ϊ 2點所知而不為遠端檔案伺服器 二:加益方去’客戶端點將加密資料。 S該运端檔案伺服器端點收到來自一 去存取一份特定的檔案的請求栲.的客戶端點 決定特定客戶端點所請求 ^^棺案伺服器端點將 限結合那個特定的標荦所合疋子取是否爻到存取權利權 案之存取權利權以相f。如果結合那個特定的檔 特定的交6山 兄4 該遂端播案飼服器端點口 符疋的客戶端點存取特定的檔案。 Μ點,、有允許 根據本發明一個較伟音a Μ 定的檔案存取控制將切说仏也例’對於檔案群體中的-特 ^將涊證給一存取控制端點。Page 16 487843 V. Description of the invention (13) The information in the message is a user to join the user group, and the information σ means that the user endpoint will issue information. ° Only after joining the user group When a communication is established between a specific client site, the connection between the specific client site and the remote server server will be authenticated. In particular β, = the identity of the two remote file server endpoints of the case server endpoint, = ^ the client point will prove and will also prove the identity of the specific client • point user 2 the case server endpoint In addition, the specific client point uses an i remote audit service endpoint known by j 2 = not expected. Therefore, the client will add two additional points: = to mark the case data endpoint, and the remote file will be # 55 m, and the remote file server will be the same. The remote file will be the remote server. The endpoint knows, the party knows 2 points, but it is not known to the remote file server. 2: The benefit party goes to the client and the data will be encrypted. The transport file server endpoint receives a request from a client to access a specific file. The client point determines the request from a particular client point. The server endpoint will be bound to that particular target. The right to access is based on whether the right of access to the right of access is obtained. If you combine that specific file, the specific communication, the communication, the communication between the client and the server, and the endpoint of the server. Point M, there is no need to allow a file access control according to the present invention to be determined. Also, for example, for the file group,-it will be authenticated to an access control endpoint.

第17頁 487843 五、發明說明(14) — 再根據本發明一個較佳實施例,一特定的檔案版本控 制將認證給版本控制端點。 較佳實施例的發明詳述 廣域網路架構 第1圖是說明一廣域網路1 0 0,就像網際網路。這個網 =疋由區域網路11-16,存取網路a-d及骨幹網路A —C形成 骨幹1。裝置]:l-rl8標示交換器或路由器,裝置hl—Μ(/標 =電腦終端機(computer terminal),以及裝置as^as4 ^不存取,服器。傳統上電腦終端機是發送及接收通訊和 ,訊而父換器、路由器及存取伺服器典型上只是發送資 汛和通訊給另一個傳送這些資訊或通訊到他們所希望的目 的地的裝置。存取伺服器也控制從網路11-16 網路100的資訊及通訊的存取。 廣战 r M AD、般來說,網際網路100是由一網路存取提供者 s 士 ::網路服務提供者(isp)所維持的許多個人 該存取網路〇η),運作存取網路a_d。 τ 互連結很可能由各種高容量(即,Τ1、 r 、 —3、oc—48,等等)私有電話專線網路所袓志 (如骨幹網路Α—η 兮深旧路所組成 内將完成通訊包=V吏用一階層式協定在網際網路 (TCP),檔宰傳穿说際網路協定(ΙΡ),傳送控制協定 安全防護層上的超;^ttp),ί文件傳送協定(㈣)及在 網路100能夠攜帶i 送協= (https)。在其中,網際 訊能夠從一個罢之請求資訊,而且該請求的資 個原始裝置到-合適的目的地裝置。由於網際 五、發明說明(15)Page 17 487843 V. Description of the invention (14)-According to a preferred embodiment of the present invention, a specific file version control will be authenticated to the version control endpoint. Detailed Description of the Invention of the Preferred Embodiment Wide Area Network Architecture Figure 1 illustrates a wide area network 100, just like the Internet. This network = Backbone 1 is formed by local network 11-16, access network a-d and backbone network A-C. Device]: l-rl8 indicates the switch or router, device hl-M (/ label = computer terminal), and device as ^ as4 ^ do not access, server. Traditionally, computer terminals are sending and receiving Communication and communication, and the parent switch, router, and access server typically only send data and communication to another device that transmits this information or communication to their desired destination. The access server also controls the slave network 11-16 Access to information and communication on the network 100. In general, M AD, in general, the Internet 100 is provided by a network access provider s :: network service provider (isp) Many individuals who maintain the access network η) operate the access network a_d. The τ interconnect is likely to be composed of various high-capacity (ie, T1, r, —3, oc-48, etc.) private telephone networks (such as the backbone network A—η Xishen Road). Completion of communication packet = V uses a one-level protocol in the Internet (TCP), file transmission protocol (IP), transmission control protocol security protection layer; ^ ttp), ί file transfer protocol (㈣) And can carry i to send the agreement on the network 100 = (https). Among them, Internet News can request information from a single source, and the requested original device to the appropriate destination device. Due to the Internet V. Description of Invention (15)

網路的建構和操作 敛述D 都是習知的 因此詳細情形便不在此 端點架構 第2圖以電腦終端熄 統上,電腦終端機10包、型式描繪一典型的端點。傳 個或-個以上的輸出;: = = ;;纏’記憶體12, - 定式磁碟片、可移動磁碟片據機光等)’磁片1 5 (固 顯示螢幕16、鍵盤及滑鼠】 碟片專)’圖像加速器及 或-個卩上的匯流排14…母:個$些裝置是經由-個 子就是-部”PC"可相容= 終端機10的-說明例The construction and operation of the network are all familiar with D. Therefore, the detailed situation is not here. Endpoint architecture Figure 2 shows a computer terminal system. The computer terminal 10 packs and types depict a typical endpoint. Pass one or more outputs: = = ;; wrap 'memory 12,-fixed disk, removable disk according to machine light, etc.' 'magnetic disk 1 5 (fixed display screen 16, keyboard and slide (Mice) disc-specific) 'Image Accelerator and / or Bus 14 on a tablet ... Mother: Some devices are via-All is-Ministry "PC " Compatible = Terminal 10-Description Example

Redmond微軟公司匕-f執行由位於華盛頓 只I读钒娃也1 , 巧用在路由器和存取伺服器, 13 Ν 片15 ’記憶體12,輸出/輸入裂置13]到 外叮,適虽大小及數量及/或容量/或處理器11。此 而;=略鍵盤、滑鼠及/或影像加速器及監視器16, 離;:=忐夠包含一個大而主要的記憶體,*:應用動 ‘4?迎機存取記憶體(讥以们電路以及—較小儲藏記憶體, 如·靜態隨機存取記憶體(SRAM)電路。 下文中,是使用個人電腦,就像筆記塑、桌上型及檔 案伺服器像端點來說明本發明。然而,本發明也可以應用 在编點的其他型式,就像電玩控制台及網際網路接收器。 這些裝置讓使用者利用不同的機械裝置來輸入。例如,推 測那些端點包含應用”指標裝置"一輸入裝置,比如像滑 487843 五、發明說明(16) 鼠、磁執墊 '搖桿、執跡球、光筆等,以及回應手製的輸 入裝置的合適軟體。此發明是以使用一個設計來和 Windows NT μ作業系統共同合作的指標裝置來說明。談指 示裝置將接受關於方向及選擇的使用者輸入,並且支持,, 選擇π,拖曳2、”點選”,"點選二次”等,以及檔案裝置等 圖=表現的著名的使用者操作來啟動存取或用不同方法使 用它們,此外,本發明在這裡說明網際網路就像是該廣域 網路,但是,當然它也可以應用在其他的廣域網路。、 下^中,將會使用到以下專有名詞。"客戶端點"描述 一 ^置就像電腦終端機hl到…,根據本發明能夠修改存取 如运裡所描述的客戶端點或遠端的局部性儲 a或磁片15的檔案的目的。"遠端檔案伺服器端點"是己^ 個儀裔,就像一檔案伺服器電腦h9到111〇,包含一儲存 裝置,就像一個或一個以上磁片驅動i 5,記 =據本發明之修改能夠讓許多的客戶端點同=標 一般架構及原則想法 根據本發明的一個實施例作為一般原則,一 以上遠端檔案伺服器端點,如:端點⑽到^❹,能夠 位於德州休斯頓的康佰(Compaq TM )公司所發表 Proliant 6400 tm伺服器,有一個大的磁片儲存量, 運用使用公司由位於麻省Hopkins〇n的EMc公司 脈Symetric SANsTM。該磁片儲存容量是配置表儲的 -個或-個以上㈣群體,就好像在單_實質的儲存裝存置The Redmond Microsoft Corporation D-F is implemented by the I-Vanadium 1 also located in Washington, which is used in routers and access servers, 13 N pieces of 15 'memory 12, output / input split 13] to the external bite, suitable Size and quantity and / or capacity / or processors 11. Therefore, == the keyboard, mouse, and / or image accelerator and monitor 16 are off;: = 忐 is enough to contain a large and main memory, *: application'4? Welcome to access the memory (讥These circuits and—smaller storage memories, such as static random access memory (SRAM) circuits. In the following, a personal computer, such as a notebook, desktop, and file server, is used to illustrate the invention. However, the present invention can also be applied to other types of programming, such as video game consoles and Internet receivers. These devices allow users to use different mechanical devices for input. For example, speculate which endpoints contain applications "indicators Device " An input device, such as slide 487843 V. Description of the invention (16) Mouse, magnetic pad 'joystick, trackball, light pen, etc., and appropriate software that responds to a hand-made input device. This invention is based on the use of a An indicator device designed to work with Windows NT μ operating system to explain. The instruction device will accept user input about directions and choices, and supports, select π, drag 2, "click", " click twice ", etc., as well as file devices and other well-known user operations to initiate access or use them in different ways. In addition, the present invention here illustrates that the Internet is like the wide area network, However, of course, it can also be applied to other wide area networks. In the following, the following proper nouns will be used. &Quot; Client Point " Description is like a computer terminal hl to ... according to the present invention Ability to modify the purpose of accessing a client point or remote local storage a or disk 15 as described in this document. &Quot; Remote File Server Endpoint " A file server computer h9 to 111〇, including a storage device, like one or more magnetic disks to drive i5. Note: According to the modification of the present invention, many clients can agree with the standard architecture and principles. According to an embodiment of the present invention, as a general principle, one or more remote file server endpoints, such as: endpoints ⑽ to ❹, can be located in a Proliant 6400 tm server published by Compaq TM Company in Houston, Texas. The large magnetic disk storage capacity uses the company's Symetric SANsTM from EMC Corporation located in Hopkins ON, Mass. The magnetic disk storage capacity is configured by a table storage of one or more groups, as if in a single physical Storage

/OHO 五、發明說明(17) 或實質的驅動裝置上。一 $被祕 服器端點h9到h10和地緣上由:田體土能夠透過在,端標案伺 服器端點hi到h8之間在本地决者所刼作的遠端檔案伺 料,夾在敌/兮在本地快取和交互作用内的存取資 料 术存取在該一貫皙健左 案伺服器端點將很有;置^的樓案群體。該遠端槽 以持續地保持群體應"而且持續的”家'可 Θ茔B" I 檔案的主要複製備份。該遠端 ΪΓ由!::到h10能夠以-種共享的方式存取槽 存在實質儲存步夕客戶端點也能夠同步存取儲 點卜於茔沾$:上的檔案群體。在該遠端檔案伺服器端 ;二二複製備份能夠充當-主要或實質的原始複製備 檔案的複製備份’而這種方式將保持在遠端檔案: 服h點上的檔案的主要複製備份的完整性。 ’、 此外,在每個客戶端點上提供一介面,而其從 點:使用者及在客戶端點上的: ^性疏遠。該檔案^現",即,完整地表現,宰而來二 夠使用預先存在的程式和應用,就好像局部性出現在匕 =點上來存取。使用者將清楚地執行任何 傳j及完整性維持,同時,用不同功能的應用,最二二訊 地存取擋案,就好像他們是局部性出現一樣。、 再者,以各種形式提供安全性。首先,考慮客 及遠端槽案飼服器端點在地理上的遠離,同時可能由= ^織所#作、,提供給每個客戶端點及遠端檔案伺服器端二 提供個方法在通訊敏感資訊之前,先認證彼此。其次”,/ OHO 5. Description of the invention (17) or the essential driving device. One dollar is served by the endpoints h9 to h10 of the secret server and the geography: the field can be served through the remote file created by the local decider between the endpoints of the end server and the endpoints hi to h8. Access to data within enemy / local caches and interactions will be very useful at the endpoints of this consistent server. The remote slot maintains the group response continuously, and the continuous "home" can be the main copy backup of the file. The remote slot can be accessed in a shared way from h: to h10. If there is a physical storage client, the client can also synchronously access the file group stored on the tomb. The remote file server can be used as a primary or substantial original copy of the file. 'Copy backup' and this way will maintain the integrity of the primary copy backup of the archive on the remote file: ', In addition, an interface is provided on each client point, and its slave point: use And on the client's point of view: ^ Sexual alienation. The file ^ present ", that is, a complete performance, comes from the use of pre-existing programs and applications, as if the locality appears on the d == The user will clearly perform any communication and integrity maintenance, and at the same time, use the different functions of the application to access the files as if they are local. Also, in various forms Provide security. First Considering the geographical distance between the end of the feeder and the remote server case, it may be made by ^ 织 所 #, and it is provided to each client point and the remote file server to provide a method for communication sensitivity. Before authenticating each other. Second, ",

第21頁Page 21

'το / OH-J -—--___ 五、發明說明(18) 而它 存取 相同 像桌 ”:個安全管道用來在 一 疋天生的不安全。 上得送檔案資料, 使用者能夠在—個區 槽案,就像在該區域網路12上的客戶n戶端點時, 的使用者能夠使用可攜帶式的客戶端_。又如’ 亡,。例⑹,客戶端點h8代表一個可移“:案’就 匕,透過任何一個可利用到網際網路的戶一端點,而 一個遠端檔案伺服器端點h9或hio,如,1 f道連結 撥接管道或無線管道。 個接地線電話 如說明地,該遠端檔案伺服器點处 的儲存裝置。例如,一個或一 會應用數個實質 -個以:之的一個單-群體。-個或 體G2G1的使用者的一個完整可容納夠=給那個群 一個以上之附加實質儲在奘 集“、、、而,一個或 ^ Am 、置的另一個群體F3能夠完整提 供、、、口使用者G3 —個不同群體,G3nG1 = u。 =扠 二者G1而言’成為兩個不同的群體的一部份也可=、使 的,就是說G1和G4,_,G4在那裡呢? = 取檔案群體F1 ;而G4使用者炉豹在抱Λ 土 者此夠存 點所楛供的其Z f 存取由遠端播案伺服器端 j所=供的另-個實質儲存裝置的檔案群體以。如說明 地’使用者gl能夠以任意的一種方式自由 存取群體G1及G4的檔案。 门v 一個遠端檔案伺服器端點可能包含一個特定群體以的 所有檔案,並且提供給那個群體如下所述的全部檔案存取'το / OH-J -----___ V. Description of the invention (18) And it accesses the same like table ": A secure channel is used to create a file that is inherently insecure. Users can send files and documents at — This case is similar to the case where the user of the client n households on the local network 12 can use the portable client_. Another example is 'dead.' For example, the client point h8 represents a Removable ": case" can be used to pass through any endpoint that can be used to the Internet, and a remote file server endpoint h9 or hio, such as 1 f channel connection dial-up channel or wireless channel. A ground wire telephone As explained, this remote file server points to a storage device. For example, one or a few apply a number of substance-a:-a single-group. -One or more users of G2G1 can hold a complete set = Give the group more than one additional substance stored in the set ",", and one or ^ Am, another group F3 can provide complete ,,,, User G3 — a different group, G3nG1 = u. = For both G1, 'being part of two different groups can also be =, so, that is, where are G1 and G4, _, G4? ? = Take the file group F1; and G4 user Lao Bao is holding another storage device for the Z f provided by the local storage site. The access is provided by the remote broadcast server end j = another physical storage device. The file groups are as follows. User g can freely access the files of groups G1 and G4 in any way. A remote file server endpoint may contain all files of a specific group and provide Give that group full file access as described below

487843 五、發明說明(19) 功能。在另一個實施例中,一個檔案群體的儲存可能被分 開在彼此地緣接近或彼此地緣相隔甚遠的許多遠端槽案飼 服器端點的間。根據另一個實施例,該客戶端點能夠透過 許多的遠端檔案伺服器端點的每一個存取一個或一個以上 的檔案。如說明地,特定的遠端檔案伺服器端 效執行-個檔案存取就是由一個特定的客戶 ^檔案存取操作。例如,根據一個負荷平衡綱要,許多的 遠端檔案伺服器端點是以銀行身分而提供的。而那個最不 =碌服務其他檔案存取的遠端檔案伺服器端點將分配給下 個到來的客戶端點槽案存取。根據另一個綱要,將以對 客戶端點有最高連接兩端點產量的角度,選擇最接近的 端檔案伺服器端點。 s 客戶端點及遠端軟體架構 m 第3圖表示本發明的一個典型實施架構。”容量管理 n20(Volume management)及”檔案系統n3〇(FUe 的功能區能夠由客戶端點處理器丨丨上之合 ,。"本地磁片儲存"(—"““一4。= = 3 4點的處理器U所執行的一個軟體子系統, :點在本地磁片上資訊的儲存… 明客戶端點軟體的區分。 沉疋以圖解說 每一個"容量(volume )丨丨42及44都象徵性 t 點的一個不同的實質儲存裝置。•然正確Ϊ字: ϊΐΐ實:是將以兩種不同的實質儲存裝置來 W不 事實上’在特定客 鈿點上可存取的精確數字將決 487843487843 V. Description of the invention (19) Function. In another embodiment, the storage of an archival population may be separated between a number of distal trough feeder end points that are close to each other or far apart from each other. According to another embodiment, the client point can access one or more files through each of a number of remote file server endpoints. As explained, a specific remote file server terminal performs a file access by a specific client ^ file access operation. For example, according to a load balancing outline, many remote file server endpoints are provided as bank. And the remote file server endpoint that is least likely to serve other file access will be assigned to the next client to access the slot. According to another outline, the closest file server endpoint will be selected from the perspective of having the highest output at both ends of the client. s client point and remote software architecture m Figure 3 shows a typical implementation architecture of the present invention. "Volume management n20 (Volume management) and" file system n3〇 (FUe's functional area can be combined by the client point processor 丨 丨 the above. "&Quot; Local magnetic disk storage " (— "" "4. = = 3 A software subsystem executed by the processor U at 4 o'clock, which stores the information on the local magnetic disk ... clarifies the distinction between the client's software and the software. Shen Yun graphically describes each " volume (volume) 丨 丨Both 42 and 44 are symbolic of a different physical storage device. • Of course, the correct wording is: True: The two different physical storage devices will not be 'accessible' on a particular customer point. The exact number will determine 487843

五、發明說明(20) =^當時正在使用客戶端點的特定使_。這㈣ ^疋貫質的"’當他們透過操作系統呈現給使㈣及應用 好像他們是真實而物質的裝置n事實上,如 ::述,他們是由客戶端點一個實質的儲存裝置上(如磁 二1 一5)之所選擇的檔案資料及目錄資訊的本地"快取"儲 精心系統所構成;同時確保客戶端 以入裝置U — D及遠端檔案伺服器端點之間連結通: 以便得到失去的擋案資料及目錄資訊,並且, <1 遢端檔案伺服器端點這種資訊中的主要複製備份 正性。一個容量索引45將幫助確認凡 Ο,45上的檔案資料及目錄資訊。存在實質儲存裝置 際上ΐϊ在Γ所表示的配置’該遠端播案飼服器端點實 伺服^ Γ肉 同組織在一個”公用伺服器',50及"檔案 :二以V交雖然,種組織只是圖解說明的。該公用飼 而檔宰5服芎61戶3 Ϊ的首次接觸的一個點而提供的,然 的,3用ΪΓ 服器50起初是由客戶端點所接觸 又,用者希望加入一個特定的實質儲存裝置時。此 有效二二度引導每個客戶端點到正確或是 及完整性維持的i 以便提供如下所述的檔案存取 -個稱為容Λ特點。❿公用飼服器5〇正如所表示的包含 器”56的'元辛里I理網頁"54的元素及一個稱為"約定伺服 個遠端矜亲/用伺服器5〇及播案飼服器61,62將在每 田案旬服器端點的在處理器U上由合適的軟體執行V. Description of the invention (20) = ^ Special agent of client point is being used at the time. This 质 疋 疋 疋 qualitative " 'When they are presented to the operating system and applications as if they are real and physical devices through the operating system n in fact, such as :, they are ordered by the client to a substantial storage device (Such as magnetic 2 1 5) selected file data and directory information of the local " cache " storage system carefully; at the same time ensure that the client access device U-D and remote file server endpoints Interlinkage: In order to get the lost file data and directory information, and the primary copy server backup information of < 1 remote file server endpoint is positive. A capacity index 45 will help identify the file data and directory information on 0,45. There is a physical storage device, and the configuration indicated by Γ is the actual server of the remote broadcast feeder end point ^ The meat is organized in a "common server", 50 and "Files: Two to V. Although This kind of organization is only illustrated. The public feeding stall was provided at one point of the first contact with 5 servings, 61 households, and 3 feedings. However, the 3 using ΪΓ server 50 was initially contacted by the client point. When the user wants to add a specific physical storage device, this effectively guides each client to the correct or complete i to provide file access as described below-a feature called capacity. ❿Public feeding device 50. As indicated by the container, the element of the "Yuanxinli Iri webpage" of "56" and an element called " Agreement to serve a remote parent / server 50 and broadcast The feeders 61, 62 will be executed by the appropriate software on the processor U at the end of each server.

487843 五、發明說明(21) 所應用。一個遠端檔案伺服器端點功能 任意的,以下,遠端槽案伺服器端點的條::區分方式是 的緣故而使用,而與每個功能已被指 也將為一般性 特定元素無關。 在一個特定配置的 該客戶端點軟體很可能在一區域網路 部或一些電腦終端機,就像在圖一的 1署一個,全 機終端機h4,h5及h6。同時,該客戶软二^12上的電腦主 移動的電腦終端機上(就像桌上型)及 ,了以部署在可 腦ΐ端機,如:電腦主機終端機h8 ,ί 以者而a,客戶端點軟體,客戶端點能夠執行下述2使 ⑷J廣域網路上安置遠端檔案飼服器端點: 是以特定=存:::一個以上的實質的儲存裝置42,44 在哪裡或者很精確地指出一個或一個:上 個群體應用這些實質儲存裝置。 (事實上:ί惜的是一個檔案伺服器可以提供檔案存取給 質儲存穿罟子、復原或修改資料的)一個完整的單-的實 iiiii許多實質儲存裝置,這些質儲存裝置的-部 的緣故Y备再者,有時因為加強維修讓舒服性或交通控制 θ、、, ,希望保存資料的鏡存(mirror) /複製備份(也就 = >安^個檔案伺服器有缺陷的情況下,有一個支撐的遠 =”司服器端點)。無論如何,客戶端點軟體將清楚地 子局部性儲存的資訊,就像一致資源定址器(URLs),以 487843 —-——_ 五、發明說明(22) 便決定如何發出指令、 伺服器端點,並提供一實=枝貝訊到適當的遠端檔案 性。 “個實質儲存裝置得以存取的功能 C b )啟動每位使用者的首次褚幼 裝置,包括為存取隨後 盡1 一個特定的虛擬儲存 更詳細的描述,並= : = 的加密鍵值,如下面 置的用戶群體中開除那位使用$ Γ —個特定實質儲存裝 (C )根據本發明提供一個請求 存裝置的其他使用者的資訊。 務疋關於任何虛擬儲 (d )在上傳到遠端檔案伺服器 密,並且在使用之前,解密遠 2前很清楚地加 的資訊,如下面有更詳細的描檔案伺服器端點所下載 (e )很聰明而清楚地快取存取已經對 者開啟檔案資料。 、’ ^ “客戶端點的使用 (f )保持在該客戶端點上檔幸眘户% 含,如杲可能,扃卢而 拉案貝枓存取的完整性:這包 查,並且在存取之:行該”資料的版本檢 備份。該版本檢查很可能二資料的最新的複製 特定的部分上執行。=在-個特定檔案的 918,229及美國專利申請宰序 、國專利編號5, 丄1, 系斤就08/754481,該兩去初η487843 V. Application of invention (21). The function of a remote file server endpoint is arbitrary, the following, the remote slot server endpoint :: The distinction is used for the sake of reason, and has nothing to do with each feature has been pointed out and will be a general specific element . In a specific configuration, the client software is likely to be in a local network or some computer terminals, just like the one in Figure 1, with all the terminals h4, h5, and h6. At the same time, the client software on the client software 12 mobile computer terminal (like a desktop) and, in order to be deployed in a brain-capable terminal, such as: computer host terminal h8 Client point software, the client point can execute the following 2 to enable remote file feeder endpoints to be placed on the WAN: Yes Specific = Storage: :: Where is more than one physical storage device 42, 44 or very Identify exactly one or one: the previous group applied these physical storage devices. (In fact: it is a pity that a file server can provide file access to the mass storage, restore or modify data) a complete single-physical iiiii many physical storage devices, these- For the sake of further preparation, sometimes because of enhanced maintenance to improve comfort or traffic control θ ,,,, I hope to save the mirror / copy backup of the data (that is, > An archive server is defective. In the case, there is a support far = "server endpoint". In any case, the client point software will clearly sub-locally store the information, just like uniform resource locators (URLs), with 487843 ------- _ V. Description of the invention (22) It decides how to issue instructions, server endpoints, and provide a real = Zhibeixun to the appropriate remote fileability. "A function of the physical storage device can be accessed. Users ’first device, including a more detailed description of a specific virtual storage for access and subsequent use, and the encryption key value of =: =, as expelled from the user group below using $ Γ — Specific physical reserve Storage (C) according to the present invention provides information of other users requesting a storage device. Make sure that any virtual storage (d) is uploaded to the remote file server secret, and before use, decrypt the information clearly added before 2nd, as described in the following detailed file server endpoint download ( e) Very clever and clear cache access to the file data of the open person. , '^ "The use of the client point (f) keeps the client at the client's level. Fortunately, including, if possible, the integrity of the access: This package is checked and stored Take it: Perform a version check backup of the data. This version check is likely to be performed on the most specific copy of the second material. = In a specific file of 918,229 and the U.S. patent application sequence, national patent number 5, 丄 1, the weight is 08/754481.

由M:oSoft公司所申請’並且和在這裡的參 J :、·。合。此外,該客戶端點軟體 王 料内的衝突;該客戶端點嗒6卜i 1 肝伏牡检案貝 時將會有所修改,至於播;c飼服器連結 今田系貝枓,當該客戶端點無法從遠Apply by M: oSoft Company ’and refer here to J:, ·. Together. In addition, the client points to conflicts in the software king's materials; the client clicks 6 1 i 1 when the liver is tested, and it will be modified when it is broadcast; c. The feeder is connected to the Imada system. Client point cannot be far away

第26頁 487843 五、發明說明(23) 端檔案伺服器連結時, 點修改(由另一個客戶^案負料也將在遠端檔案伺服器端 的的儲存空間給檔案次^點)。客戶端點軟體也保存特定 播案伺服器端點和其二二:目錄資訊,當他們無法和遠端 以下有更詳細的描述·二6警不資訊對應時,這種情形在 、 J畑述,同時, g ) 為便利或效率之故 案資料。例如,客戶姓,在檔案中從任意一端點下載檔 中的一個小的資料部广”。使用者很可能只需要整個檔案 能在客戶端點及伺服器端:個受到干擾的下載也可 始。 & ^接收通訊所在的端點上重新開 此外,至少提供—個客 體,使該端點作用像是堂ό Μ糕2八有客戶翊點管理軟 點的目的是提供給使用4 &理者端點。該客戶管理者端 的每-個虛擬儲存裝置來管理和處理那位消費者 或一個以上的客戶端點,、後-。於疋,該顧客指示一個 提供槽案服務的系統廣大^ = f戶管理者端點有能力來 也擁有在遠端檔案伺服理。而客戶管理者端點 存裝置的能力。此外,;戶& ^及刪除完整的虛擬儲 者端點所诸办的立 者端點也擁有由客戶管理 有知點所建立的母一個虛擬尸&理 的完整存取權立權限。因此,有槽案及目錄 一個虛擬儲存裝置上讀取、寫 此在匕所建立的任何 目錄。再者,客戶管理者端點、t >改或刪除任何檔案或 號,並且提供足夠的資訊來讓:巧指不新的使用者帳 管理者端點所管理的一個< 編點使用者加入由客戶 的個或一個以上的虛擬儲存裝置。Page 26 487843 V. Description of the invention (23) When the file server at the end of the connection is connected, click Modify (the load of the file from another client will also give the storage space on the remote file server end to the point of the file). The client-side software also stores specific broadcast server endpoints and the other two: directory information. When they ca n’t be described in more detail with the remote end, two or six polices do not correspond to the information, this situation is described in J. And, at the same time, g) case information for convenience or efficiency. For example, the client ’s last name, download a small data department in the file from any endpoint in the file. ”The user is likely to only need the entire file to be on the client and server: a disturbed download can also be started &Amp; ^ Re-open on the endpoint where the communication is received. In addition, provide at least one object, so that the endpoint functions like a client. The purpose of the customer point management softpoint is to provide 4 & Manager endpoint. Each virtual storage device on the client manager's side manages and processes that consumer or more than one client point, and later-Yu. The client instructs a large number of systems to provide slot service. ^ = The user manager endpoint has the ability to also have remote file server management. The client manager endpoint has the ability to store devices. In addition, the user & ^ and delete the complete virtual store endpoint The founder endpoint also has full access rights to the parent and a virtual corpse created by the customer management know-how. Therefore, there is a case and directory to read and write this on a virtual storage device. Any established Directory. Furthermore, the client manager endpoint, t > alters or deletes any files or numbers, and provides sufficient information to allow: a < edit point managed by a new user account manager endpoint The user joins one or more virtual storage devices by the customer.

第27頁 487843 五、發明說明(24) 該公用飼服器和檔幸句 器端點上部署,如:電^ 二人:在這遠端檔案伺服 ^ 電月1^終端機h9及hlO 〇八田仞怒』 檔案伺服器軟體也將執行下列的功能: a用伺服器和 (a) 建立並刪除虛擬儲存裝詈句衽 A/的實質儲存裝置間的空間,以便符合客在遠端槽案伺 需要及/或購買的空間請求。 /肩費者所 (b) 接受來自客戶管理者端點捸立蚀田土 包括產生一-欠密满;*邊分 < ” 用者帳號的請求’ 的私疋用戶群體,1請求從客 f擬儲存裝置 點使用者帳戶。 者&點去刪除客戶端 jc)在所有的客戶端點間任意存取檔案 存取權限和檔案共享模式; 韦貝枓包括執灯 U)保持存取檔案資料的完整性,包括執行 並且提供所存取的檔案資料的最新 ^ 們的客戶端點; 闲仍,口布望存取他Page 27 487843 V. Description of the invention (24) The public feeding device and file-sentence device are deployed on the endpoints, such as: Electric ^ Two people: Serve at this remote file ^ Electric month 1 ^ Terminal h9 and hlO 〇 The "Hada Rage" file server software will also perform the following functions: a. Use the server and (a) create and delete the space between the physical storage devices of the virtual storage device 衽 A / in order to match the guest's remote slot Requests for space needed and / or purchased. / Shoulder fee holder (b) Accept the private user group from the client manager's endpoint to establish eclipse soil including generating a-under-density; * side points < "request for user account", 1 request from customer f The user account is intended to be stored on the device. The user & delete client jc) arbitrary access to file access permissions and file sharing mode among all client points; Webbe (including the holder) U) keep access to file data Completeness, including the client points that run and provide the latest access to the file information;

Hi供一個,,,約定服務"’也就是提供調查客戶端點 、-、址或接觸資訊(如丨p位址和Tcp連接‘、, 以便和儲存檔案群體對應於一質二:, 端稽案伺服器通訊。 質储存的合適的遠 介面/環境描述 幸b i表女全及認證執行的技術之前’得以保持一個檔 供:個辻。Ϊ據本發明,由檔案服務所執行的效果下將提 素也就疋各量管理,檔案系統及磁片子系統,這些軟體 487843 五、發明說明(25) 凡*素疋纟又5十用來— /田 ψ ^ i^4S ^ - π- I ^貫书使用的作業系統/本地的檔 未示、,兄4δ 而匕可能會和客戶她[说蠢山、头 點軟體作章条於/ 士 L &戶、點一併賣出。透過客戶端 祚豐糸 ^ 士、、’’ 土檔案系統4 8整合的方式,對每一個 統…很可能極為特殊,:且: : = 本地槽案系統建立者的設計書及應用 s"ρη θ a例如,微軟公司詳細說明一應用程式介 用及程式和nnd〇ws Nr«作ϊΠ:!:案疋文到其他應 s ινι作業糸統結合執行所認同和檢索 .^ b,客戶端點軟體的整合的特殊細節以下將省 ,。相反地,以下的討論是根據本發明來描述,一般而 吕,由客戶端點軟體執行操作以便達成某些目標。那些孰 悉本次技術人士將珍惜如何為每一個作業系統/本地檔案' 系統修改客戶端點軟體。用此方法,客戶端點軟體能夠根 據以下描述一一去完成什麼和其他關於API,s的作業系統 /本地標案系統的可利用資訊,來發揮作用。 圖4解釋當使用本發明時,在一客戶端點的顯示器上 所描述的一說明影像,如用Microsoft tm Wind〇ws Ντ TM作 業系統。如圖所示,表現出來的影像是一個視窗(wind〇w) 1 〇 0 0的熟悉影像,包含”按鈕” i 〇 〇 2用來重新排列並且關 閉視窗1 0 00,功能棒(menu bar ) 1010具有可選擇下拉式 選單按鈕(drop-down menu bar ) 1012,π標準按紐棒 (standard button bar ) " 1 020具有可選擇”領航按鈕 (navigation button )’’ 1 022,π 位址棒” 1 025,資料失、 子視窗1030及子視窗1040。如圖所示,’’位址棒"1 〇 2 $包 五、發明說明(26) 二-圖表=像,代表一網路 了 !m子視窗1030顯示為館存λ及-ΛΛ 1 032,1 034的辨識器的—巧储存裝置及資料夾 的!體1 034給網路連結的儲;;二;該清單包含-個對應 識資訊給該裝置” L t, F ,並且提供更多辨 1 040將顯示另—個二Γ 〇n @ V — drive” ,而子視窗 的另一個階層清單而且資、圖像代錄$檔案1 042的圖表圖像 圖像1 034的連結儲存裝置上。1 044包含在表示圖表的 眾所熟知的,該階層清單的實 示在子視窗1〇4〇内的子、、主 032,1〇34,以及顯 及為這此檔荦目/月疋希望用來表示特定的檔案 知道的;置的—個階層組織。如大家所 裝置及實質的儲存裝置,业型字端連結的儲存 端的實質儲存裝置的 2旦八^备作貫際本地的和遠Hi for one ,, and agreed service " 'that is, to provide survey client points,-, address or contact information (such as p address and Tcp connection'), so as to correspond to the storage file group of a quality two :, Audit server communication. Appropriate remote interface / environmental description of quality storage. Fortunately, before the implementation of the technology and certification implementation, 'a file can be maintained: a 辻 .Ϊ According to the present invention, the effect of the file service The software is also used to manage the quantity, file system and magnetic disk subsystem. These softwares 487843 V. Description of the invention (25) Where * 素 疋 纟 and 50 are used— / 田 ψ ^ i ^ 4S ^-π- I ^ The operating system used by Guan Shu is not shown in the local file. Brother 4δ and the dagger may be sold with the customer [said stupid mountain, the first point of the software as a chapter in / L & households, points. Sold together. The client's integration is very important for each system ... and it is likely to be very special: and:: = = Design and application of the creator of the local case file system " ρη θ a For example, Microsoft Corporation details an application program interface and program and nn d〇ws Nr «Work ϊΠ:!: Cases to other applications should be recognized and retrieved in combination. ^ b, the special details of the integration of client software will be omitted below. Conversely, the following The discussion is described in accordance with the present invention. Generally, the client point software performs operations to achieve certain goals. Those who know this time will cherish how to modify the client point software for each operating system / local file 'system. Using this method, the client-side software can perform what one by one and other available information about the operating system / local project system of the API, s according to the following description to play a role. Figure 4 explains when using the present invention, A description image described on the display of a client point, such as using Microsoft tm Wind ows NT ™ operating system. As shown in the figure, the displayed image is a familiar window (window) 1 00 0 Image, including "button" i 〇〇2 to rearrange and close the window 1 00, function bar (menu bar) 1010 has a selectable drop-down menu bar (drop-down menu bar) 1012 π standard button bar (standard button bar) " 1 020 has selectable "navigation button" 1 022, π address bar "1 025, data loss, sub-window 1030 and sub-window 1040. As shown in the figure As shown in the figure, “Address bar” 1 〇 2 $ Package 5. Description of the invention (26) Two-chart = image, which represents a network! The sub-window 1030 is displayed as a library λ and -ΛΛ 1 032, 1 Identifier of 034-clever storage device and folder! Body 1 034 to the storage of the network link; two; the list contains a corresponding identification information for the device "L t, F, and providing more identification 1 040 will show another two Γ 〇n @ V — drive ", And another hierarchy list of the sub-window and the asset and image record $ file 1 042 chart image image 1 034 linked storage device. 1 044 is included in the well-known representation of the chart, and the list of the hierarchy is displayed in the sub-window 1040, the main, the main 032, 1034, and the display and the hope for this file. Used to indicate that a particular file is known; set-a hierarchical organization. As you have installed and the physical storage device, the physical storage device connected to the industry-type word end is used for local and remote use.

Windows ΝΤτ«作f 分隔物來應用;而, 1尸呆系統並沒有在這此儲在駐 像顯示的透視給使用者。⑭存裝置之間分辨圖 如說明的,該辨識器"F”以 V-drive丨丨談到一個妒媸士欲α W〇rk °n @ 完整的儲存裝置。:系統及服務所提供的-個 系統應用程式介面提f戶細點軟體也將根據作業 儲存裝置的= = = 訊,以便提供-個實質的 T兄 1乍業糸統也將列出在得 =份(也就是,顯示在客戶端點的顯視器1:;:; 的辨識器去回應給客戶踹勒祛 的衫像) 各戶知點使用者,就如同其具有合適的Windows NTT «is used as the f-separator; however, the cadaver system does not store the perspective displayed by the user here. The resolution diagram between the storage devices is as explained. The identifier "F" uses V-drive 丨 丨 to talk about a jealous person wanting a W〇rk ° n @ complete storage device .: System and service provided -A system application program interface to provide detailed software will also be provided according to the === message of the operating storage device in order to provide-a substantial T brother 1 industry industry will also be listed in the copies (that is, displayed in Client's point of view monitor 1 :::; recognizer responds to the customer to remove the shirt image) Each user knows the user as if he has a suitable

第30頁 Η 五、發明說明(27) ----一·— ----- :m任何其他裝置。再者,該作業系統能夠讓使用者 一辨識器給實質的儲存裝置,用完全一樣的方法, 5辨4器給其他儲存裝用者因此可以,,點選 (click),,、,》 上。、言此 、點選二次’’、,,拖夷"及"釋放"在這些辨識器 f功能是眾所皆知,用指標裝置所完成的選擇,啟 ^、主咅 f再組織操作’因此,不在此作深入的描述;值 二忍的疋’客戶使用者很可能用DOSTM指令列解譯器來存 及寐,=ί的是’該客戶端點軟體也提供某些功能來認證 資料’以便當作其中一個上面的指示裝 個行動的目標。例如’如果-位客戶端 裝置丨丨F”的下階声十、主时士丨,u 貝丁寸火隹1買儲存 裝置"F”,/ : 選二次"以選取該實質儲存 ^ f ^ A # ^ ^ t t j 7 J門谷或目錄/資料夾。這需要人褕从咖《 以便操作系統的復原及條例顯示:如說: 作紫= 端點軟體將提供該一的資訊給執行其餘任疏 作業系統。同樣地,如果使用者本雜=任務的 點選二次",产上时丄 怕杀不身的辨識器上” 也將當作一個使用者指令來執扞;t 樓案上執行一個可利用的應用 ^ ’或者 檔案包含資料)。再度地,為作業;:如果 :證合適的檔案資訊,並且提供這種檔宰軟體將 執行的作業系統。 徑码茉貝枓給產生適當Page 30 Η V. Description of the invention (27) ---- 一 ·------: m Any other device. In addition, the operating system can allow the user to give the identifier to the actual storage device in exactly the same way, and the 5 identifier can be given to other storage users. Therefore, click, ,,, . "Say this, click twice", and drag " and " release " In these recognizers, the function of f is well known. The selection made by the indexing device is used to start and stop Organizational operations 'Therefore, it is not described in depth here; the value of the two customers is likely to be stored and saved by the DOSTM command line interpreter, =' The client point software also provides some functions To verify the information 'in order to act as a target for one of the above instructions. For example, "If-bit client device 丨 丨 F", the lower order sounds, master clocks, u, bedding inch fire, buy storage device " F ", /: select secondary " to select the actual storage ^ f ^ A # ^ ^ ttj 7 J Gate Valley or directory / folder. This requires people to learn from the operating system so that the operating system can be restored and the regulations show that if it is said that: Purple = the endpoint software will provide this information to the rest of the operating system. Similarly, if the user selects the task twice for the task, "I'm afraid I can't kill the discriminator on delivery" will also be used as a user command to defend it. Use the application ^ 'or the file contains data). Once again, for the operation; if: prove the appropriate file information, and provide the operating system that this file software will run.

第31頁 五、發明說明(28) 下所=此、:Ϊ客戶端點軟體將提供足夠的功能性整合,如 =的:獲得合適的播案,同時提供這些資訊 使用者開妒埶二* g故正確的執行。除了執行如上所述對 者::選擇的這一種任務外(如:使用該使用 -個應用ίΞ:;;原的;動應用的任務。也就是,假設 -個檔案的存·(如了設,應用將產生另 靡用式<、土— /執^丁 匕3在另一份檔案的一 :等;:這樣一份資料檔案内的資料讀、寫或修 行適當# I ϋ將產生適當的請求給作業系統來執 内,;作。如果播案包含在實質儲存裝置 適的檔案,其間並且幫助作業系統認證合 動地迻栉傲寫 刪除等)客戶端點軟體清楚而自 用者和在客戶:::;::者的:入。這個從客戶端點使 ;/資料夹等儲存在實質=;=;=槽案,困 戶端點使用者和在客戶端點上的應用^局^生呈現給客 :使=者及在客戶端點上的應督:客戶端 置,及它的内容,用相同的于仔取實質儲存裝 的儲存裝置一樣,這些將永久=斷I個局部性實質表現 實上,既不是客戶端點使用者也不是在;=些内容。事 執行知道權案的實際位置或家,因:應用 疋元美清晰而 4δ/〇^ 五、發明說明(29) 沒有缺點的。 因此,資料的實 目錄/資料夾的安排 軟體只是適合來安置 和稽案資料的有效複 客戶端點軟體所做的 戶端點軟體很可能決 的一個複製備份是局 要記憶體,或在客戶 軟體很可能證實目錄 取的複製備份仍然有 夾資訊或檔案資料的 端點軟體报可能上傳 久儲存修改。 ,有用的 系統執行 存的目錄 以下所詳 行經常要 資料夾資 :一個快 實質表現 或檔案資 很可能下 製備份。 資訊或檔 際提供 等,將 並取得 製備份 這些任 定是否 部性快 端點上 /資料 效。客 一個有 目錄/ 給應用 由作業 遠端儲 。正如 務的執 目錄/ 取(如 的磁片 夾資訊 戶端點 效的複 資料夾 顯示或 。該客 /資料 細描述 數個步 訊或播 取記憶 )。客 料的局 載目錄 定期地 案資料 檔案及 戶端點 夾資訊 的,由 騾。客 案資料 體,主 戶端點 部性快 /資料 ,客戶 以便永 > 此外’很多的作業系統及可執行的應用都支持檔案共 享種’’顆粒性’’(granularities)以一個最基本的檔 案共享模式’從一群有足夠的存取權利權限的許多客戶端 點模式中’只有一客戶端點能夠同時實際存取一個檔案。 該作業系統或本地的檔案應用程式介面完全不允許大規模 的樓案共享。根據槽案共享的另一種方式,許多的客戶端 點將被允許同時從一個檔案中讀取資訊,但是只允許一個 · 客戶=點去寫入這樣的一個檔案。根據另一個範例,每個 客戶端點有能力同時來寫一個檔案或一個檔案的部份。為 達成吳個目標,每個客戶端點很可能實際而間接執行它的Page 31 V. Description of the invention (28) == This:: The client software will provide sufficient functional integration, such as =: Obtain a suitable broadcast, and provide these users with envy. 2 * g. Correct implementation. In addition to performing the task of the opposite party :: selection as described above (such as: using this use-a application: Ξ ;; the original; mobile application task. That is, suppose-the storage of a file , The application will produce the other form <, soil-/ executive ^ Ding 3 in another file: etc. :: read, write or practice the information in such a data file properly # I 产生 will produce appropriate The request is given to the operating system. If the broadcast includes the appropriate files in the physical storage device, it will also help the operating system to verify the transfer, write, delete, etc.) The client software is clear and user-friendly. Client :::; :: of: Enter. This is used from the client point; / folder and so on are stored in substance =; =; = slot case, end user and application on the client point. Presented to the customer: the client and the client at the client point: the client side and its contents, using the same storage device as the actual storage device, these will be permanently broken. Sexuality means that in reality, it is neither the client nor the user; The actual location or home of the case is known to the executive, because: the application of Yuan Yuanmei is clear and 4δ / 〇 ^ V. Description of the invention (29) There is no disadvantage. Therefore, the arrangement of the actual directory / folder of the software is only suitable for placement A valid copy of the audit data and the client software made by the client software is likely to be a copy of the backup, or the client software is likely to confirm that the copy of the directory backup still contains folder information or file data The endpoint software report may be uploaded and stored for a long time. The useful system executes the saved directory. The following details are often required for folder funding: a fast actual performance or file data is likely to be backed up. And obtain a backup of these tasks to determine whether they are fast on the endpoint / data effect. The client has a directory / for the application to be stored remotely by the operation. As the service's implementation directory / retrieval (such as the folder information of the user's endpoint) The duplicate folder shows or. The customer / data details describe several steps or broadcast memory.) The on-board catalogue of customer data regularly records case files and clients. Folder information, from the client case data body, the main client end point is fast / data, the customer so as to be permanent> In addition, 'Many operating systems and executable applications support the file sharing type "granularity" ( granularities) in a basic file sharing mode 'from a group of many client point models with sufficient access rights' only one client point can actually access a file at the same time. The operating system or a local file application The interface does not allow large-scale building case sharing at all. According to another way of slot case sharing, many client sites will be allowed to read information from a file at the same time, but only one client will be allowed to write such a site. file. According to another example, each client has the ability to write a file or part of a file at the same time. In order to achieve Wu's goals, each client point is likely to actually and indirectly execute its

第33頁 487843 五、發明說明(30)Page 33 487843 V. Description of the Invention (30)

特定的寫作,例如,读 客戶端點的一個單〜嫌^個實際執行每份 含為安置及存取-個端點。例如,-個 料的檔案。每次一個新拗=目錄的所有檔案 個現存檔案或子目錄從^〔子目錄加到特定 構必須修改來反映這個+目錄中冊彳除時 執行這些改變。為使谅@ & 夕客戶鳊點 直接由每個客戶端發生,目錄槽 -個單-端點執行,例如::二固巧模 代替每個客戶端點,如此一 退端檔 目錄時,遠端槽案饲服器端·:將 (最明顯地,就疋一個修改或寫作操作) 點,的一個媒體端點角色設發揮功能。冬一 一個目錄内建立新的檔案或子目錄時,^ 並沒有實際存取目錄檔案;相反地’目 端檔案伺服器端點以一個媒體身份執行的 該客戶端點軟體將以一種有條理的方 檔案存取。最明顯土也,就是客戶端點軟體能 檔案伺服器指令以便"上鎖”檔案或檔案部分 容的模式阻止存取這些檔案或檔案部分。那 阻止希望存取權案的另外一個客戶端點別這 地’客戶端點軟體也能夠傳送問號指令給和 有關的运端槽案伺服器’而且,能夠收到並 令的回應給作業系統,以便阻止該客戶端點 存取代 目錄檔 和子目 的目錄 ,個別 必須能 案並不 式的存 案伺服 端點嘗 必要的 每個客 個客戶 上,客 案存取 替每個 案是包 錄的資 ,或一 的目錄 夠同時 是實際 取是由 器端點 試修改 存取 戶端 端點在 戶端點 是由遠Specific writing, for example, reads a single point from the client's point to the actual execution of each copy containing placement and access-an endpoint. For example, an individual file. Each time a new file is created, all existing files or subdirectories from ^ [subdirectories added to a particular structure must be modified to reflect the deletion of this + directory. These changes are performed. In order to forgive @ & xi customers, points are directly generated by each client, the directory slot-a single-endpoint is executed, for example: Erguqiao instead of each client point, so when a file is backed up, Distal trough feeder end: A media endpoint role that will (most obviously, just a modification or writing operation) point function. When creating a new file or sub-directory in a directory, ^ does not actually access the directory file; on the contrary, the client software running on the end of the file server endpoint as a media will be organized File access. The most obvious is that the client point software can file server commands to " lock " a file or file part mode to prevent access to those files or file parts. That prevents another client point that wants access Don't here, the client software can also send question mark instructions to the relevant shipping server. And, it can receive and send a response to the operating system, so as to prevent the client from saving and replacing the directory file and sub-purpose. Directory, the individual must be able to record a different type of record server endpoints necessary for each customer, customer record access for each case is to record the information, or a directory is enough to be actually taken from the server side Click to modify the access client endpoint.

幫助達成這些 夠傳送給遠端 ’並根據不相 個效果就是去 麼做。同樣 檔案鍵值身份 且轉送這些指 的一個存取,Help achieve this enough to send to the far end ’and do whatever it takes to get the effect. Same file key-value identity and forward one access of these fingers,

487843 五、發明說明(31) 而它和最近由另_ 再度地,槽案上鎖 取能夠因為考慮檔 作業系統或在客戶 端點軟體只是充當 器端點的間的這些 體執行所有的這些 上的應用執行都是 增加客戶端點使用 圖1 5表示建立 過程。假設該客戶 儲存裝置。在步驟 的控制之下,客戶 來邀請一位新的使 新的使用者一個使 別器(”驅動身份” 受到邀睛。例如, 送資訊給管理該特 步驟S102中,遠端 稱之為π驅動身份” 者的清單上。例如 質儲存裝置的所有 實質儲存裝置的用 使用的使用者名字 個客:端點所執行的存取並不相容 指令f生,並且決定何時某-個檔 案上T鍵值身份而執行,這‘栢』 = 應用執行才能達成。ΐί 指令及身份的-個代理人。客戶:: 功能,對客戶端點使用者及在客= 自動而清楚的。 鳊點 者 一個!質儲存裝置及增加使用者的一個 端點官理的使用者已經有疑問配置實質 S100中’在客戶管理者端點的使用者、 管理者端點將發出一個含有指令的資訊 用者,新的使用者的電子郵件地址,給 用者名字,以及實質儲存裝置的一個識 ),而在實質儲存裝置上新的使用者將 客戶管理者端點將完成經由網際網路傳 定實質驅動的遠端檔案伺服器端點。在 稽案彳司服器端點決定是否實質儲存裝置 存在著’但是使用者名字已經函在使用 ’遠端檔案伺服器端點保存曾經加入實 使用者名字的一份清單,包括允許存取 戶群體中活動中的使用者並且清除以不 。如果使用者名字不是新的或實質儲存487843 V. Description of the invention (31) And it and recently by another _ again, the lock case can be taken because of consideration of the file operating system or the client point software just acts as the endpoint of the server to perform all of these The application execution is to increase the client point using Figure 15 to represent the establishment process. Assume that the customer is storing the device. Under the control of the step, the customer invites a new user and a new user ("Driver Identity") to be invited. For example, to send information to the management in this special step S102, the remote terminal calls it π Drive the identity "list. For example, all the physical storage devices of the mass storage device use the user name of the guest: the access performed by the endpoint is not compatible with the command f, and determines when a file T key-value identity and execution, this 'Bo' = application execution can be achieved. Ϊ́ί Command and identity-an agent. Customer: Function, point to the client user and presence = automatic and clear. 鳊 点 者A! Quality storage device and an end user that adds users to the official management have doubts about the configuration of the actual S100 'user at the client manager endpoint, the manager endpoint will issue a message containing instructions to the user, new Email address of the user, the user ’s name, and an identification of the physical storage device), and the new user on the physical storage device will complete the client manager endpoint via the web The Internet defines a physically-driven remote file server endpoint. The server endpoint determines whether a physical storage device exists 'but the user name is already in use' A list of names that have been added, including allowing access to active users in the user group and clearing them out. If the username is not new or physically stored

第35頁 ___-^ 五、發明說明(32) _% 裝置並不存在,在S1 〇4步驟中,^ 絕請求,並經由網際網路傳# 檔案伺服器端點將担 絕資訊。例如,客戶管理= = 管理者端點-個拒 使用者。很有利的是,這將避# ,颂不一個失敗的訊息給 用在一個特定的實質儲存裝置。 史用f名子夕次使 如果該使用者名字尚未包含在與特定實 結合的清單上,在步驟s 1 〇 6中,沴^ φ β 子裝置相 新的使用者建立一個記錄。該遠端檔案飼 將j為 這個步驟的成功完成部份給客戶管理者端點。接下:傳: 少驟S1 08中’該客戶管理者端點將建立一個一次密碼 (one time password) (〇τρ)。最好,該〇τρ是一個 方向的加密/解密鍵值。此外,$戶管理者端點將傳送給 新的客戶端點使用|一份邀請來加入允許存取實質儲存; 置的=戶群體,而那個邀請包括使用者名字(使用者身^ )貫質儲存裝置的識別器(驅動身份),以及自由選擇 0ΤΡ。如說明的,該客戶管理者端點能夠經由網際網路傳 送電子郵件來邀請新的使用者,並傳送電子郵件資訊到客 戶端點使用者的一個網際網路地址。最好,該電子郵件資 訊是以一種安全的方式傳送,例如,以加密方式來避免 0ΤΡ未經認證的偵測到。為增加附加的安全性,〇τρ很可能 不包含在電子郵件邀請之列。例如,新的客戶使用者彳艮可 月b必須和一個媒體的網際網路地址通訊,以便收到新的客 戶知點使用者有效的0TP。一旦新的客戶端點使用者取得 0TP ’客戶管理者端點將用該0TP加密一資料鍵值(在下面 五、發明說明(33) 對這個目的有更詳纟 )。於是客戶管理者端:3 :來產生fTP (資料鍵值 檔案伺服器端點,在::傳送0τρ (資料鍵值)給遠端 用者相結合的記,=是儲存在和新的客戶端點使 圖6Α及心:位2_〇。 存取實質儲存袭置的端點使用者加入一個允許 -個流程圖。關iL 用群體說明二選一過程的 述的邀請,如:在一個转一认::各戶鈿點使用者收到上 郵件資訊。在步 郵件資訊啟動加入過程。例如, 談袞卢诚㈣遂端檔案伺服器端點中, 實質儲存裝置使用。替代地,該包 LL 個基地’該客戶端點預約請求能夠再i被引導 來和客戶端點使用者尤其感興趣的實質 端檔案伺服器端點相連接。加入過程的啟動ς致 2 端點傳送到適當的遠端檀㈣服器端點,如ί ”用•名字及為f質儲存裝置的識別器給遠端 3 器端點。例如,使用所謂的http協定將可6 ^ 受接觸的遠端檔案伺服器端點很可能用一個可A、 ^ 5 來登記。這種認證服務是由公司像—家位於二=第三方 ountain 公司所提供。在步驟^“ 土 端檔案伺服器端點將存取記錄清單來決定σ^ 客戶端點使用者具有對應的實體,如果=否;;該新的 衣/又有,在步驟S124Page 35 ___- ^ V. Description of the invention (32) _% The device does not exist. In step S104, the request is rejected and transmitted via the Internet. # The file server endpoint will be responsible for the information. For example, customer management = = manager endpoint-a rejected user. Advantageously, this will avoid the #, which will not give a failed message to a specific physical storage device. If the user name is not yet included in the list associated with the specific instance, in step s106, the new user of the 沴 ^ φβ sub-device creates a record. The remote profile feeds j to the client manager endpoint for the successfully completed part of this step. Next: Pass: In step S1 08, the client manager endpoint will establish a one time password (0τρ). Preferably, ττρ is a one-way encryption / decryption key. In addition, the $ user manager endpoint will be sent to the new client point using an invitation to join to allow access to the physical storage; the set = user group, and that invitation includes the username (user's body ^) consistent storage Device identifier (drive identity), and free choice of TP. As explained, the client manager endpoint can send an email via the Internet to invite new users, and send email information to an internet address of the client endpoint user. Preferably, the e-mail message is transmitted in a secure manner, for example, encrypted to prevent undetected 0TP detection. For added security, ττρ is likely not included in the email invitation. For example, a new customer user, B, must communicate with the Internet address of a media in order to receive a valid 0TP from the new customer user. Once the new client point user obtains 0TP, the client manager endpoint will use the 0TP to encrypt a data key value (in the following V. Invention Description (33) for more details on this purpose). So the client manager side: 3: to generate the fTP (data key value file server endpoint, in :: send 0τρ (data key value) to the remote user combined record, = is stored in the new client Click on Figure 6A and heart: Bit 2_〇. Endpoint users who access the physical storage device add a permission-flow chart. The iL invites the group to describe the alternative process, such as: Acknowledgement: Each user of the site receives the email information. In the step, the email information starts the joining process. For example, talking about Lu Cheng's end of the file server endpoint, the physical storage device is used. Alternatively, the package LL bases. The client point reservation request can then be directed to connect to the real file server endpoint that is of particular interest to the client point user. The initiation of the joining process causes the endpoint to send to the appropriate remote site. The endpoint of the server, such as "", uses the name and the identifier of the f-quality storage device to give the remote endpoint an endpoint. For example, using the so-called http protocol, the remote file server can be accessed The endpoint is likely to be registered with an A, ^ 5 . This kind of authentication service is provided by the company like — home located in the second = third-party mountain company. In step ^ "the local file server endpoint will access the record list to determine σ ^ client point user has a corresponding entity, If = No; the new clothes / have, in step S124

第37頁 487州 五、發明說明(34) :,遠:J案伺服器端點將視同那個訊息無 :資表遠力端樓r::器端點能夠修改傳^ 介厂嘀點表不加入請求無效。 能夠ί:ί:ΐ ϊ收f;::t表示遠端播案伺服器端點 r該軟體的-個下載型式傳 « 端點將應該連接執行=:二以此方式’未來該客戶 客戶端點將執行客戶π; j作二:論如何,該 需的資訊一、鱼拉個動 裝置來儲存用於認證資訊所 S i;允且快取包含槽案、資料央、使用者物 (public ke ^ 該客戶端點也將產生一對公用鍵值 缺後兮客戶上點=專用鍵值(private key)Pub/ Prc。 給遠端播案伺服器端 鍵值。ίΐ戶端運算法則隨意而產生這對 用鍵值Ρπ。 下®將描料隨後使用該專 人兮d 3步28:,該遠端檔案飼服器端點在結 :該二點的記錄中儲存該客戶 外,在步驟S1 30,該遠端檔案铜服吳从j A用埏值此Page 37, State 487 V. Description of the invention (34) :, far: the server endpoint of case J will treat that message as None: The remote end of the server can be modified. The remote endpoint can modify the transmission. Join request is invalid. Can til: ί: ΐ ϊ 收 f; :: t means the remote broadcast server endpoint r a download pattern of the software «endpoint will be connected to execute =: two in this way 'in the future the client client point will Perform customer pi; j work two: on how to, the required information a, fish pull a mobile device to store for authentication information S i; allow and cache including slot case, data center, user property (public ke ^ The client point will also generate a pair of public key values. The client point = private key Pub / Prc. To the remote broadcast server end key value. The client-side algorithm will generate this randomly. Use the key value Pπ. Next ® will describe the use of the person d 3 step 28 :, the remote file feeder end point is stored in the record of the two points outside the customer, in step S1 30, The remote file copper service Wu Cong j A used this value

Puc加密已經加密的訊息〇τρ,(、鍵T :使用公用鍵值 訊編(ΟΤΡ (資料鍵值)=來產生二次加密 後傳送二次加密訊息puc(GTP(f;;^^㈣服器端點然 貝料鍵值))到該客戶端點。Puc encrypts the encrypted message 〇τρ, (, key T: use the common key code (0TP (data key) =) to generate secondary encryption and send the secondary encrypted message puc (GTP (f ;; ^^ ㈣ 服) Device endpoints and key values) to the client point.

第38頁 487843 五、發明說明(35) 如說明地,該遠端樓案伺服5| # % + |Page 38 487843 V. Description of the invention (35) As explained, the remote building case servo 5 | #% + |

Pus到該客戶端點。該客戶己的公用鍵值 科从八μ & n *必 知點儲存該逖端檔案伺服器端 點的a用鍵值Pus ’其將於下面描述使用。 在步驟S1 32中,該客戶媳點此w 一 、丄 r ητρ r二欠w、 尸‘點收到二次加密的訊息Puc ^ ^ ffl^r 督使用該客戶端點的專用鍵值Prc及 -1用鍵值QTP,客户端點將解密該二次 鍵值。然後在步_中,該客戶端點將貝透過使 =它^身的公用鍵值Puc加密原始文件資料鍵值來產生加 始、ί i料鍵值Puc (資料鍵值)。然後該客戶端點傳送該 加密資料鍵值Puc (資料鍵值)到遠端檔案伺服器端點。 在步驟S136中,該遠端檔案伺服器端點將收到加密的資料 鍵值P u c (資料鍵值)並且利用新的客戶端點使用者的公用 鍵值Puc去儲存資訊。這樣完成加入過程。 在圖6B說明之另一過程,該使用者在收到一個電子郵 件遨請時,藉由去點選在電子郵件訊息上來啟動加入過程 在步驟S150中的加入過程。該電子郵件資訊包含使用 份,驅動身份及隨意的0TP雜湊(hash)。在步驟S152身 中,一個可罪的第三方,就像Verisign公司,將確認驅動 身份所認同的遠端檔案伺服器端點的”證書 (certi f icate ) π或"認證"。如果該〇τρ之雜湊包含在電 子郵件邀請内,該過程將繼續進行到步驟S154,而且遠端 檔案伺服器端點也將確認使用者身份,驅動身份及〇Tp雜 湊。如果有一個相符,也就是,遠端伺服器確認上述内、 容,該過程將繼續進行到步驟S1 64。Pus to the client point. The client's own public key value is stored from the eighth & n * must know that the key value Pus of the file server terminal is used as described below. In step S1 32, the client clicks on this w1, 丄 r ητρ r, two owes, and the corpse's point receives the secondary encrypted message Puc ^ ^ ffl ^ r. -1 With key value QTP, the client point will decrypt the secondary key value. Then, in step _, the client encrypts the original file data key value by using the public key value Puc of its own key to generate an initial data key value Puc (data key value). The client then sends the encrypted data key Puc (data key) to the remote file server endpoint. In step S136, the remote file server endpoint will receive the encrypted data key value Puc (data key value) and use the public key value Puc of the new client point user to store the information. This completes the joining process. In another process illustrated in FIG. 6B, when the user receives an e-mail solicitation, the user starts the joining process in step S150 by clicking on the email message. The email message contains usage, driver identity, and a random 0TP hash. In step S152, a guilty third party, like Verisign, will confirm the "certificate" or "certification" of the remote file server endpoint identified by the driver identity. If the The 〇τρ hash is included in the email invitation, and the process will continue to step S154, and the remote file server endpoint will also confirm the user identity, drive the identity, and 〇Tp hash. If there is a match, that is, The remote server confirms the above contents, and the process will continue to step S164.

第39頁 五、發明說明(36) OTP雜回/"1步巧=如果在電子料^ 二驅二Λ 服器端點將只能有確認使用者身 邀請電子郵件取得。如果有ΛΓ端點使用者將單獨從 檔案飼服器端,點將促使客戶端有點使H步驟S160中遠端 ^ . „〇TP 〇 ^ ^ " 符,在步驟S1 58該邀請將會盔兮 在162中/又有相 步驟S1 64。 會…效。否則過程將繼續進行到 在步驟S164中,該客戶端點捺 生-對公用鍵值/專用鍵立-個驅動容器並且產 送公用鍵值IX給在步驟S166中\prc °該客戶端點於是傳 隨著圖6A的過程,客戶 中檔案伺服器端點。 途而儲存專用鍵值Pr m為下面所描述的隨後用 意訂閱的使用者群體中的接—下個來不门在步驟S168中,預先同 使用者將下載新的客戶端點使用證的客戶端點 密資料鍵值(資料鍵信、,^者A用鍵值Puc,並且加 過認證的客戶端點使用去技在乂驟“70中,在伺服器中經 鍵值)更新該的=將以加密的資料鍵值Puc (資料 S1 72,現在該新的客=點使用者記錄。因此,在步驟 器驅動資料來和資料鍵值=用者可能解密遠端檔案伺服 值,:資料鍵值是一雙向加密,解密鍵 的前用來加標案到遠端播案词服器端點 下載的資料。用來解密從遠端檔案伺服器端點 該退化槽案伺服器端點從來沒有資料鍵值的 487843 五、發明說明(37) 一伤原始文件版本。相反地,該遠端槽案伺服器端點只有 資料鍵值的加密版本,即,不是〇Tp(資料鍵值)就是 Piic(資料鍵值)。事實上’該遠端檔案伺服器端點對每個 客戶端點有一個資料鍵值的加密版本,就如同用那個客戶 端點的公用鍵值加密。 對照於該OTP及資料鍵值,該公用的^/專用的鍵值 Puc,Pre是是一對單向鍵值。也就是,該公用鍵值puc可 加:資訊。然而,該資訊只能用對應的專用鍵值才 Si:二此,當遠端檔案飼服器端點保存公用鍵值Puc =由=的,鍵值Puc (資料鍵值)所加密的資料鍵 值時’該負訊對遠端檔案伺服减 並不足夠。 卡1』服益鳊點而&要解密資料鍵值 這個部分所描述的過程,σ古 -個實質儲存裝置的第一次時才、=入:個客戶端點到 客戶端點到已經加入實質儲存裝置:所有G者都 下面所描述的認證和安全檔案 有存取,都是使用 者,每一個OTP只能使用一次、。、^程而完成的。再 值得注意的是,在第5與6圖 口 為每一個客戶端點使用者而重複。說月的上述過程能夠 為一個特定客戶端點使用者而重同樣地,這些程序能夠 每一個許多不同實質儲存奘 複’能夠為客戶端點加入 如說明地,該客戶端複。 個具有足夠資訊來讓客戶端點 固身份輪廓,而它是一 部性儲存的資料檔案。至少I =取實質儲存裝置的一個局Page 39 V. Description of the invention (36) OTP miscellaneous return " 1 step Qiao = If the electronic material ^ two-drive two Λ server endpoints will only be confirmed by the user invitation email. If there is a ΛΓ endpoint, the user will be alone from the file feeder end, and the point will prompt the client to make the remote end of step S160 ^. „〇TP 〇 ^ ^ " character, the invitation will be helmeted at step S1 58 In 162 / there is a phase step S1 64 again. It will be effective. Otherwise, the process will continue to step S164, the client clicks to generate a public key value / private key-a drive container and produce a common key. The value IX is given to \ prc in step S166. The client then passes the file server endpoint in the client following the process of FIG. 6A. The private key Prm is stored for the user who intends to subscribe later as described below. Access in the group—The next step is to come. In step S168, the user will download the new client point-use certificate with the client's confidential data key value (data key letter, A, the key value Puc, And the authenticated client point is updated by using the trick in step "70, via the server in the key value) = the encrypted data key value Puc (data S1 72, now the new guest = point User records. Therefore, in the stepper driving data comes and data key value = user can Decrypt the remote file server value: The data key value is a two-way encryption. The front of the decryption key is used to add the bid to the data downloaded by the remote broadcast server endpoint. It is used to decrypt the remote file server endpoint. The degenerate slot server endpoint has never had a data key value of 487843. V. INTRODUCTION (37) A wounded original document version. Conversely, the remote slot server endpoint has only an encrypted version of the data key value, that is, Either 〇Tp (data key value) or Piic (data key value). In fact, 'the remote file server endpoint has an encrypted version of the data key value for each client point, just like using that client point. Public key value encryption. Compared to the OTP and data key value, the public ^ / private key value Puc, Pre is a pair of one-way key values. That is, the public key value puc can be added: information. However, The information can only use the corresponding private key value. Si: Second, when the remote file feeder endpoint saves the public key value Puc ==, the data key value encrypted by the key value Puc (data key value) 'The negative signal is not enough for remote file servo reduction. Card 1' The process described in this section & To decrypt the data key value, σ is the first time that a physical storage device is inserted: = from client point to client point to the physical storage device that has been added: All users have access to the authentication and security files described below. They are all users. Each OTP can only be used once, ..., and ^. It is worth noting that in Figures 5 and 6 Repeat for each client point user. The above-mentioned process can be repeated for a specific client point user. Similarly, these procedures can be stored in each of many different realities. 'Can be added for client points as explained Ground, the client resumes. There is enough information for the client to fix the identity profile, and it is a stored data file. At least I = Take a round of the physical storage device

第41頁 身伤輪庵包括專用鍵值1>1^, 487843 五、發明說明(38) =對每:個特定的使用者而言,要認證一個連接 如,身份輪廓的複製備份暑用:絕對必要的。例 端點上加密,這將避免客戶端點的-位 成ΐ入實質儲存裝置的指定用戶群體的 〇 (加密的)身份輪廓很可能複製在一個可蒋動Page 41 Personal injury injury includes special key value 1 > 1 ^, 487843 V. Description of the invention (38) = For each specific user, to authenticate a connection, such as copying the identity profile for backup purposes: Absolutely necessary. Example: Encryption on the endpoint, which will prevent the client-side in-bits from entering the specified user group of the physical storage device. The (encrypted) identity profile is likely to be copied in a

戶端點上。客戶端點使用者:是;= H 二:=:的每個客戶端點存取實質儲存裝置。此:: 個刀開儲存的身份輪廓的複製備份,如: 的儲存媒體上,能夠讓使用去力紅打枯—& 個了移動 帝喜^使用者在任何特疋的客戶端點上檢 為m 一旦客戶端點軟體遭受損害或錯誤百出。只 =户==熟知之專用鍵值Prc是非常重要的,而以此 ,l貝枓侍以儲存在該遠端檔案伺服器端點,而它是不 後:ΐ:ΐ:服器端點所知的。缺乏客戶端點身份輪廓的 ίϊί 一旦該客戶軟體遭受損害或錯誤百出,該 是不可能在特定的客戶端點使用者帳號下存取 延柒檔案伺服器端點。 權案資料的認證及安全傳送 間、鱼ϊ7說明認證'個客戶端點和遠端㈣飼服器端點之 一的過程圖。每次客戶端點和遠端檔案伺服器端點建 :個連接時將執行這個過程。假設該客戶端點已經加入 儲存裝置的&疋用戶群體,%它希望透過個別的連接 仔取。User endpoint. Client point users: Yes; = H 2: =: Each client point accesses the physical storage device. This: A copy of the identity profile stored on the knife, such as: On the storage medium, you can use the deli red to dry up— & a mobile Emperor ^ user check on any special client point For m once the client point software is damaged or full of errors. Only = household == the well-known private key Prc is very important, and in this way, it is stored in the remote file server endpoint, and it is not: 后: ΐ: server endpoint Know. Lack of client-side identity profile Once the client software is damaged or erroneous, it is impossible to access the extended file server endpoint under a specific client-side user account. The authentication and secure transmission of the case data, and the fish breech 7 illustrate the process of authenticating one of the client points and one of the remote bream feeder endpoints. This process is performed each time a client point establishes a connection with the remote file server endpoint. Assume that the client point has joined the & user group of the storage device, and it wants to fetch it through individual connections.

五、發明說明(39) 在步驟200中,贫穸 接請求給遠端檔宰伺服„„ 點經由網際網路發出一個連 立的URL:址播案飼服器端點的-個預先建 再如,該資訊包含;;==置給客戶端點存取。 鍺存裝置存取的識別=字,實質 用中者=端,服器端點收先;;= 用者名字及實質儲存裝置 百无决疋疋否使 主要是參考一連串儲存或種有效的結合,而這 有效、指定的使用者名i: 案飼服器端點的 證的個別的實質儲存裝£。如果遠栌:J置識?器所, 確認使用者名字是為實質儲存穿詈* ^ 5服器端點未能 者清單内,該遠端檔案飼服心口 =動中的使用 連接。因為否定那個連接,診、赍 b zub ψ 發出-個適當的拒絕資訊給案飼服器端點很可能 人案飼服器端點確認使用者名字是主動結 :在貝讯内?別器所顯示的實質儲存裝置清單上。在步驟 立:由ί:端檔案伺服器端點將用它的專用鍵值加密任 思的子串s來產生加密的任意字串Prs⑻。在步驟82〇8 中,該遠端槽案飼服器端點傳送該加密的任意字串Prs 及一個第二的任意字串κ給客戶端點。 在步驟S21 0中,該落戶端點使用遠端檔案伺服器端點 的公用鍵值Pus去解密加密的任意字串卜以幻,以便取尸 原始字串S的原始文件資訊。在步驟§212中,該客戶端^V. Description of the invention (39) In step 200, the remote server receives a request to the remote file server, and a point is issued via the Internet: a pre-built URL for the endpoint of the broadcast server. , The information contains;; == set to client point access. Identification of germanium storage device access = word, whichever is used = terminal, server end first;; user name and physical storage device are indeterminate; do not make reference mainly to a series of storage or an effective combination , And this valid, designated username is the individual physical storage of the certificate at the endpoint of the feeder. If Yuan Yuan: J is aware? Device, confirm that the user name is for physical storage. * ^ 5 The endpoint of the server is not in the list. The remote file feed server is in use. Because the connection is denied, the diagnosis, 赍 b zub ψ sends an appropriate rejection message to the case feeder endpoint. It is likely that the case feeder endpoint confirms that the user name is active. In the Bessin? On the list of physical storage devices displayed by the device. In step Li: The end of the file server endpoint will encrypt any substring s with its private key to generate an encrypted arbitrary string Prs⑻. In step 8208, the remote slot server endpoint sends the encrypted arbitrary string Prs and a second arbitrary string κ to the client point. In step S210, the home endpoint uses the public key value Pus of the remote file server endpoint to decrypt the encrypted arbitrary string to obtain the original document information of the original string S. In step §212, the client ^

I麵 第43頁Side I Page 43

487843 五、發明說明(40) 決,是否使用飼服器公用鍵值Pus(Prs(s))讓接收的加密 =的:密產生s。⑹果不&,該客戶端點決定它已經不 月t· i姐遠知槽案伺服器端點的身份並且打破在步驟^ 2 1 4的 ^接。另一方面,如果使用伺服器公用鍵值pus(prs(s)) 讓接收的加密訊息的解密產生3,該客戶 經成功認證出遠端檔案伺服器端點的身份。因此,、該客戶 „測只有遠端檔案伺服器端點有能力(最明顯地,副 解密S ’以此方式,它能夠使用飼服器的 么用鍵值完美解密來復原S。 假若該客戶端點已經成功認證出遠端檔案伺服器端點 的身份。接下來在步驟S216中,該客戶端點以該客戶端點 的專用鍵值prc去加密第二個任意字串£來產生加密的二 意=串Prc(K)。然後該客戶端點傳送加密的第二個二 意資料字串Prc(K)給遠端檔案伺服器端點。在步驟““ :,該遠端檔案伺服器端點嘗試使用該客戶端點以存取誃 實質儲存裝置儲存的公用鍵值Puc以去解密該接收的加密x 的第二個任意資料字串prc(K)。在步驟S22〇中,該遠 案伺服器端點決定是否使用該客戶端點的公用鍵值,虽 puc(prc(K))所嚐試的解密產生第二個任意資料字串κ · 果不是,在步驟S222中,該遠端檔案伺服器端點將決定 已經不能認證出客戶端點的身份並且否定或打破那個連 接。另一方面,如果利用該客戶端點的公用鍵值 puc(prc(K)所嘗試的解密而產生第二個任意的資料字 K,該遠端檔案伺服器端點決定已經成功地認證出客戶端 487843 五、發明說明(41) 點的身份,也就是,該遠端檔案伺服器端點決定只有客戶 端點有能力(最明顯地,那合適的專用鍵值prc )來加密 任意的字串K ’以此方式,用公用鍵值puc解密來產生第二 個任意的字串κ。在此情況下,遠端檔案伺服器端點允 在步驟S224中的連接。 ° 因此,簡言之,該客戶端點認該證遠端檔案伺服器端 點的身份而且該遠端檔案伺服器端點也認證該客戶端點的 ^份。=有在該客戶端點認證該遠端檔案伺服器端點的身 份及該遠端檔案伺服器端點認證該客戶端點的身份時,認 證該,接。在該連接受到認證後,該客戶端點能夠以一 ^ $持負料元整性的方式(如下所述)來存取在遠端檔案伺 器端點上的檔案資料。 接下來,描述一個過程,是透過在客戶端點及遠端栌 =伺服器端點之間有認證性的連接安全地上傳和下載檔^ 責料(可能是其他敏感的資訊,就像目錄資訊等)。如上戶斤 述j網際,路包含數個由未知群體所維持及操作的私人網 ,既不疋客戶端點也不是遠端檔案伺服器端點 二=_上傳—案的安全性。相反地’未經認證= j 反倒被視為曾經出現過。再者,該客戶端點也沒 端檔案飼服器端點是安全的並且採取行動來確定 ^退端檔案伺服器端點基地(s丨te)中可以產生任 !魂證的存取檔案資料。 遠端ΓΛ說明從該客戶端點執行安全上傳槽案資料該到 备案司服器端點的一種過程。假設該客戶端點有檔案 487843 五、發明說明(42) 資料上傳給遠端檔荦荷服哭 Λ山田,古> V 系何服器、點。在步驟S300中,該客戶 端點建立一個檔案標題, ;a苳戶 八机nb 0 3 ?日不權案大小、分段大小方 刀#又的數罝之>訊。實描视击上,-欠 « 如,如果分P f +際耠供較少資訊是有可能的。例 前知道,'就需要指定::變的,但是又沒有提 槽案大小/八π ΐ 小及分段大/j、(分段數量是 段數量及分::小?::數i:;代地’尸、需要指定該分 —個位移,而卜禮又還,時,私疋從一個檔案的開頭的 ,^ a , 的檔案資料部分將被寫是令人希望的。487843 V. Description of the invention (40) Decide whether to use the common key value Pus (Prs (s)) of the feeder to make the received encryption ==: secret s. If the result is not &, the client decides that it already knows the identity of the server endpoint and breaks the connection in step ^ 2 1 4. On the other hand, if the server's public key value pus (prs (s)) is used to decrypt the received encrypted message, the client successfully authenticates the identity of the remote file server endpoint. Therefore, the client is only able to detect that the remote file server endpoint has the ability (most obviously, the secondary decryption S 'in this way, it can use the perfect decryption of the feeder to recover S. If the client The endpoint has successfully authenticated the identity of the remote file server endpoint. Next, in step S216, the client encrypts the second arbitrary string with the private key prc of the client to generate an encrypted string. Eryi = string Prc (K). The client then sends the encrypted second Eryi data string Prc (K) to the remote file server endpoint. In step "":, the remote file server The endpoint attempts to use the client point to access the public key Puc stored in the physical storage device to decrypt the second arbitrary data string prc (K) of the received encryption x. In step S22, the remote The server endpoint determines whether to use the client's public key. Although the decryption attempted by puc (prc (K)) generates a second arbitrary data string κ · If not, in step S222, the remote end The file server endpoint will determine if the client Copy and deny or break that connection. On the other hand, if the public key puc (prc (K) of the client point is used to attempt the decryption to generate a second arbitrary data word K, the remote file server end The point decision has successfully authenticated the client 487843 V. Description of the invention (41) The identity of the point, that is, the remote file server endpoint determines that only the client point is capable (most obviously, the appropriate private key value prc) to encrypt an arbitrary string K 'in this way, decrypting with the public key value puc to generate a second arbitrary string κ. In this case, the remote file server endpoint allows the connection in step S224 ° Therefore, in short, the client recognizes the identity of the remote file server endpoint and the remote file server endpoint also authenticates the client. When the identity of the remote file server endpoint is authenticated, and when the remote file server endpoint authenticates the identity of the client point, the connection is authenticated. After the connection is authenticated, the client point can be authenticated with a ^ $ Ways to hold the integrity of negative material elements (such as (Described below) to access file data on the remote file server endpoint. Next, a process is described that is secured by an authenticated connection between the client point and the remote server endpoint. Uploading and downloading files ^ Responsibility (may be other sensitive information, such as directory information, etc.). As described by the above user, Internet, the road contains several private networks maintained and operated by unknown groups, neither client Point is not the security of the remote file server endpoint two = _ upload-case. On the contrary, 'unauthenticated' = j is considered to have occurred. Moreover, the client point does not end the file server. The endpoint is secure and action is taken to ensure that the access file data can be generated in the end file server endpoint base (s 丨 te). The remote end ΓΛ illustrates a process of performing secure upload of slot data from the client point to the server endpoint of the filing server. Assume that the client has a file 487843. V. Description of the invention (42) The data is uploaded to the remote file. 荦 山田 , 古 > V is the server and point. In step S300, the client endpoint establishes a file title; a user's eight-machine nb 0 3 day non-rights case size, segment size, and other information. The real description hits,-owed «For example, if it is divided into P f + +, less information is possible. Before the example, I knew that '' needs to be specified :: variable, but there is no mention of the case size / eight π ΐ small and segment large / j, (the number of segments is the number of segments and points :: small? :: number i: ; On behalf of the corpse, it is necessary to specify this point-a displacement, and Pu Li also, when the private information from the beginning of a file, ^ a, the file information part will be written is hopeful.

如4明地’位移可以由公ρB 定在寫上傳播案之‘由;;=空的槽所指$,而它指 料赵旦,卜l·々k L Μ 貝料槽案的開始向前跳著讀的資 料數里 此外如說明地,該;^宏姆日5 U A A i 傳檔案資料的一個物件識別3| 丁 匕3 :、、、用來加密上 )該特定的資料鍵r=::?vdentifier) (_ 用許多資料鍵值;:密料鍵值給0ID,使 能的。該⑽可以用來”那個貫存裝置上的資料是可 解密樓案資料。帛來“那個貝料鍵值必須用來加密或 將上=12中-:該客戶端點傳送檔案資料的下-個即 的主德^:區。如說明地’該緩衝區是足夠容納量 :料° ΐ! ΐ:間的一部份,主要是用來暫時保存分段 i二口上:驟讓中’該客戶端點壓縮在緩衝區内 3 f貝i:::這減少代表槽案資料分段的資訊數量 (P ’位兀之數量)。如說明地,使用一個幾乎沒有遺失 的相似程度U〇ssless entropy)之密碼壓縮技術,就像For example, “the displacement can be determined by the public ρB in the case of dissemination of the case”;; = the empty slot refers to $, and it refers to the beginning of Zhao Dan, Bu · 々k L Μ shell case Skip forward the number of data read in addition, as explained, ^ Hongmri 5 UAA i An object identification of the file data 3 | Ding Deng 3: ,, used to encrypt) the specific data key r = ::? vdentifier) (_ use many data key values ;: dense data key value to 0ID, enabled. This can be used to "the data on the persistent device can decrypt the case data. 帛 来" that shell The material key value must be used to encrypt or to change the previous = 12 medium-: the next point of the file data of the client ^: area. As explained, the buffer is enough to hold: material ° ΐ! ΐ: part of the time, is mainly used to temporarily save the segment i on the two mouths: 让 中 中 'The client point is compressed in the buffer 3 f i ::: This reduces the information representing the segment data of the slot case Number (the number of P 'bits). As explained, using a password compression technique with almost no loss of similarity U0ssless entropy, like

五、發明說明(43) ______V. Description of Invention (43) ______

Huffman密碼系統。在步驟33〇6中, 鍵值在緩衝區内加密壓縮的資料。该客戶端點使用資料 的加密技術將允許使用相同的資料=$明地,利用該特定 一個許多著名的加密技術,就像R鍵^來解密。使用任何 加密技術。在步驟3308中,該客 的128位元鍵值RC5 η 所建立的標題給加密的資料並且透=(點添'在步驟S30" 入裝置)及網際網路傳送資料到遠端:點的輸出/ 來傳送及通知收到沒有錯誤 』硌協疋(TCP /IP) 端檔案伺服器端點收到包括“的被y,31" ’該遠 案資料。使用標頭内的位移資訊,及壓縮的檑 座落在正確儲存空間的端斤=案伺服器端點 案的個㈣(主要)複製備份端點上槽 在個別的位移開始處中該遠端檔 服考?裡。然後 縮槽案資料分&(引起儲存裝置去寫入『、點寫入加密壓 送已i ί Γ。31 如2:還ΐ ϊ戶將ί定是否檔案部分的傳 解傳送下. < /有,以客戶端點將回到步驟S302並 中;;二;上傳的分段給緩衝區。注意,在步糊)8 頭,可能省略或適當地全部或部份修改檔案標 戶端點本t Ϊ後傳送的加密及壓縮的稽案資料分段。當客 S 31 2時疋後的加密和壓縮的檔案資料分段已經在步驟 呀,上傳過程於是停止。 要的的是,上面的描述是假設該客戶端點具有必 傜案共享權利和權限存取權利來執行前面所述的上傳Huffman password system. In step 3306, the key-value is encrypted in the buffer. The client's point-of-use encryption technology will allow the use of the same data = $ 明 地, using this particular one of many well-known encryption technologies, like R key ^ to decrypt. Use any encryption technology. In step 3308, the title of the guest's 128-bit key value RC5 η is given to the encrypted data and transmitted (click to add 'in step S30 " to the device) and the Internet to send data to the remote end: point output / To send and notify the receipt of no errors "(TCP / IP) The end of the file server endpoint received a message including" Y, 31 "" The remote case data. Use the displacement information in the header, and compression檑 is located in the right storage space of the server = the server end point of the file (mainly) duplicates the backup endpoint on the slot at the beginning of the individual displacement. The remote file is tested? Data points & (Cause the storage device to write, and write to the encrypted press has been sent. 31 If 2: return, the user will determine whether the transmission of the file part is transmitted. ≪ / 有 , 以The client point will return to step S302; 2. The uploaded segment is given to the buffer. Note that 8 headers may be omitted or appropriately modified in whole or in part and transferred to the file's endpoint. Encrypted and compressed audit data segment. Encrypted and compressed files after the guest S 31 2 Material has been die segment, then the upload process is stopped at step is wanted, the above description assumes that the customer endpoint will trip to a case having shared access rights and permissions to perform the foregoing claim upload

第47頁 五、發明說明 操作。它也推測該 一 本。至於如何達成 端點有資料上傳的最近或最新的版 是,如說明地,權即,下面描述。(然而,值得注意的 是作業系統的—個^ =取權利及檔案共享模式的執行主要 角色主要是表達下述犯3根據本發明的實施例,此系統的 作的結果。因此,^的f執行及某些其他檔案整合維護操 的討論將省略)。於槽案共享模式及堅守存取權利權限 第9圖說明從遠 到客戶端點的下一個田案伺服器端點安全傳送檔案資料 經認證的連接已經建I載過程。在圖9的過程推測一個已 遠端檔案伺服$踹t以及該客戶端點傳送一個請求給 注意,那:下?檔案的部分。 開始的一個請求或1個二2二個新的請求’即’不是事先 如果在完成下載锖托二 繼續一個部份完成的過程。 點之間的通訊管道1 5丨則在遠端檔案伺服器端點及客戶端 因此,在步驟S320 ; 1 或關閉,前者情況將會發生。 是否下載的請求是新的了,端檔案伺服器端點最初先決定 /完成檔案資料的傳译,者疋否所下載的請求是去繼續 如果這是-個新的請求:::個請求已經部份令人滿意。 器端點將放一個中μ ^ μ ν驟以20中,該遠端檔案伺服 下載的分段,心二异15 τ-個分段"來表示第-個所 案伺服器端點上的請求式去另—/一面,如果一收到在遠端標 後,在步驟S324中,該、土 ^#個局部完成的請求,然 器counted下檔案飼服器端點將放中間計算 J下—個分段"來指示下一個所Page 47 5. Description of the invention Operation. It also speculates on this one. As for how to achieve the latest or latest version of the endpoint uploading data, as explained, the right is described below. (However, it is worth noting that the main role of the execution system of the operating system is to express the rights and file sharing mode. It mainly expresses the following crimes. According to the embodiment of the present invention, the results of this system. Therefore, ^ f The discussion of implementation and some other file integration maintenance operations will be omitted). Sharing mode in the slot case and sticking to the access rights and permissions Figure 9 illustrates the secure transfer of file data from the remote field server endpoint to the client point. The authenticated connection has been established. In the process of Figure 9, it is inferred that a remote file server $ 踹 t and the client point sent a request to the attention, then: Next? Archive section. One request started or one two two two new requests', that is, not in advance. If downloading is completed, the second one continues with a partially completed process. The communication channel 1 5 丨 is at the remote file server endpoint and client. Therefore, at step S320; 1 or closed, the former situation will occur. The download request is new. The end of the file server endpoint first determines / completes the translation of the file data. Does the download request continue? If this is a new request: Partially satisfactory. The server endpoint will put a middle μ ^ μ ν step to 20, the remote file servo downloads the segment, the heart is different 15 τ-segments " to represent the request form on the server endpoint of the first case Go to the other side, if one of the remotely completed requests is received in step S324 after receiving the remote tag, the endpoint of the file feeder will be counted in the middle to calculate the next point. Paragraph " to indicate the next place

第48頁 487843 五、發明說明(45) 一個成功下載的分段,如:分段大小 已&成功下載为開相等的位元。 S32〇i論Π端ίίί步驟Sm就是在S324之後,在步驟 案標頭給客戶端點,客戶端點已该檔案所儲存的擋 該客戶端點收到檔荦;p頭並且那^卩裡請求檔案資料。 值的_。在步驟S3V中客戶?用=f標頭取得資料鍵 τ 各产使用〇ID來復;f適當的;^安 資料鍵值,包括,如果有必要,&七土水设原週田的松案 -f ^ rn^irn ^ ^ ^ ^ 果有义要哨求运端檔案伺服器端點 : = 料鍵值…情形下,該客戶端點為傳 琴遠端^ i朽貝;斗鍵值之請求給該遠端檔案伺服器端點。 該心檔案伺服器端點使用〇ID來確 :料鍵:並且傳送該適當的加密的資料鍵二的客力,: LG 2密的資料鍵值式從健存在客戶端點使用者紀 = 使用者最近操作客戶端點的加密的資料鍵 值的伤 >月早中所復原。許多資料鍵值是儲存在遠 的方式將在下面有更深入的描述。在步驟 , 戶端點取得適當的加密的資料鍵值並且使用 對客戶端點的專用鍵值來解密資料鍵值。 小及=;=:1332 ::該客戶端點將摘錄緩衝區大 菊明的!起初,這些資訊是由檔案標頭所 I接著,在步驟⑵34中,該客戶端點傳送一個請长 給,端槽案伺服器端點以去下載槽案資料的一部份1 ^貝=(如:等於一個緩衝區容量的許多位元留存在客戶、 端點的主記憶體内以便接收所下載的資料),該資料檔案Page 48 487843 V. Description of the invention (45) A successfully downloaded segment, such as: Segment size has been successfully downloaded as equal bits. S32〇i on the end of the step Sm is after S324, in the step case header to the client point, the client point has been stored in the file to block the client point to receive the file; p header and that Request Archives. worth it_. Customer in step S3V? Use the = f header to obtain the data key τ. Use the ID to reply. irn ^ ^ ^ ^ If there is a meaning, ask the file server endpoint of the transport side: = material key value ... In the case, the client point is the remote end of the piano ^ i decay shell; the request for the key value to the remote end File server endpoint. The heart file server endpoint uses 〇ID to confirm: material key: and send the appropriate encrypted data key to the second force: LG 2 dense data key value from the client to the client point = use The user recently manipulated the encrypted data key value of the client point > The way many data keys are stored remotely is described in more detail below. In step, the client endpoint obtains the appropriate encrypted data key value and uses the private key value to the client point to decrypt the data key value. Xiao and =; =: 1332 :: The client point will extract the buffer Dai Juming! At first, this information is contained in the file header. Next, in step ⑵34, the client point sends a long-to-end, end slot The file server endpoint downloads a part of the slot file data (eg, many bits equal to a buffer capacity are stored in the client and the endpoint's main memory to receive the downloaded data), The profile

第49頁Page 49

五、發明說明(46) 的標頭是從一個指定的位移開始 回應該請求’主要是透過從適案伺服器端點 的請求部分並且傳送檔案資料的部丄^ ^復原擋案資料 TCP /IP。在步驟S336中,該客。刀點σ端點,如經由 所取得的資料鍵值以解密在緩衝3 〇中 簡中,該客戶端點解壓 然 在步 壓縮’解密的資料給一個内部儲並且傳送該解 或磁片記憶體15)❸一個適當的儲存:(;?憶體12及/ 在分段中去下載該槽案資料H 歹1如’考慮是 將下載的解壓縮及解密的資料分段結人夾=適當的順序 資料的-個複製品複製備份。在步;: :請求?案 決定是否全部所請求的標宰 ” ,該客戶端點 有,在步·42中功下載。如果還沒 器來被下載並且重覆步驟S332 f,jsk4加下-個分段的計算 如上所述,有時來希望去產生新的資 用ίίίίϊ點使用者群體中除去某-特定的客戶端點使 用者以存取實質儲存裝置,希兑 •、便 =新槽案資料的方式。理由 客 途攔截解且;論上在傳送時可以使用他們來* 同的替代地’可能僅希望去定期使用不 存在實過一單一的資料鍵值的偵測,來阻礙儲 何,:ϊϊΐ 全部擋案群體的安全漏洞。無論如 同的一隹f编點能夠配置和客戶端點使用者群體一樣的相 、又新的資料鍵值。首先,該客戶端點產生新的資料V. The description of the invention (46) The header is to respond to the request starting from a specified displacement. It is mainly through the request part from the end point of the appropriate server and sending the file data. ^ ^ Restore the file data TCP / IP . In step S336, the guest. The knife point σ endpoint, such as the obtained data key value for decryption. In buffer 30, the client point decompresses and then compresses the decrypted data to an internal storage and transmits the solution or disk memory. 15) ❸ An appropriate storage: (;? Memory 12 and / in the segment to download the case data H 歹 1 if 'consideration is to download the decompressed and decrypted data segmentation folder = appropriate A duplicate copy of the sequence data. At step ::: request? The case decides whether or not all of the requested plots are available. ”The client has it and downloads it at step 42. If there is no device to download it and Repeat step S332 f, jsk4 and add the calculation of one segment as described above. Sometimes it is desirable to generate new resources. Remove a specific client point user from the user group to access the physical storage. Device, Hilde •, then = way of new case information. Reasons to intercept the solution by way of travel; in theory, you can use them when transmitting * the same alternative 'may just want to use regularly without a single reality Detection of data key-values to prevent storage, : 漏洞 The security flaws of all the file groups. No matter if the same edit point can be configured with the same data key value as the user group of the client point. First, the client point generates new data.

48/843 五、發明說明(47) 鍵值,該資料鍵值很可能用來解密傳送到遠端播案饲服器 :點的職資料。然後該客戶端點使用公賴值pu密 的新的資料鍵值puc(新的 =儲:子新的資料鍵值並指定一個,給新的資料鍵7 的#曰::傳达(如:經由網際網路)加 =!;鍵值)到遠端槽案飼服器端點。該遠端檔案飼 服ι§點透過儲存加齋的如μ 鍵值清單内結值Puc(資料鍵值)在 戶端點使用者紀錄中客:客戶端點回應’如:在客 球τ之該客戶端點使用者。 最好,在預先—同意的用戶 用者能夠保存預先-同立认m外菔τ二母各戶鳊點使 端點# ffl # μ ^ # 忍的用戶群體制的每一位其他客戶 =使,者的全部公用鍵值Puc 戶 滑早。即佶I^ ^ J 仿兀整 Η - . 9 新的客戶端點使用者那份完整、音罝頊 疋正確的,新的客戶 优用嘗万丨忉疋鳘/月早還 預先-同意的用戶群體用者的公用鍵值可以傳送给在 替代地,該客戶端母立戶端點使用者。 送請求指令給該遠端矜月求(如:經由網際網路傳 客戶端點使用者公用H 器端點)那個群體的每一位 點希望提供新的資料2值' iPUC&quot; ’…等,因為客戶端 要是經由網際網路檢$ :該通端構案祠服器端•點回應主 二端點使用者的公用鍵值PM;:,戶端點使用者’母^立客 鳊點使用者已經請长 、 ,P C ,…等其中該客戶 到的公用鍵值pu。' p°,後該客戶端點使用每一個這些收 uc” ’…等去加密新的資料鍵值以產 五、發明說明(48) 生加密的新的資料鍵值以 鍵值),…等。 〈新資料鍵值),pUC&quot;(新資料 然後該客戶端點經由網 新的資料鍵值PUC,(新資料周路傳送每-個這些加密的 給該遠端檔案伺服器端點,),Puc”(新資料鍵值)···等 内結合對應的客戶端點”。儲存在,㈣使用這紀錄 Puc,(新資料鍵值)是儲存^ ,該加密的新的資料鍵值 有公用鍵值Puc,的:::=:點使用者紀錄内結合含 值Puc&quot;(新資料鍵值)是儲存:而加密的新的資料鍵 有公用鍵值Puc&quot;等的客戶端點使用=使用者紀錄内結合 文件Lie:遠t端槽案飼服器端點從沒有-個清楚的的原始 Γ jXt ,即,任何資料鍵值的未加密型式。 ^所有退端檔案伺服器端點在它的領域内擁有的是 每-個資料鍵值的許多加密的版本,當每一資料 一個個別的客戶端點公用鍵值加密每個 ,專用鍵值的持有*,也就是個別的客戶端點 达、這些加密的資料鍵值的個別複製備份的個別方法(在此 ,指專用鍵值)。更重要的是,雖錢端標案飼服器端點 從沒有一個資料鍵值的原始文件複製備份,但是,它仍然 保存可以給每個客戶端點使用去加密該資料鍵值的公用= 值。 檔案存取與整合性維持 該遠端檔案伺服器端點及客戶端點保存在實質健存裝 置上檔案群體的完整性,並减定保存在實質儲存裝置上斤48/843 V. Description of the invention (47) key value, this data key value is likely to be used to decrypt the job information transmitted to the remote broadcast feeder: point. Then the client point uses the new data key value puc (new = store: child new data key value and assign a public key value puc) and assigns one to the new data key # 7 :: convey (for example: (Via the Internet) add = !; key-value) to the remote trough case feeder endpoint. The remote file feed service points are stored in the fasting such as μ key value list Puc (data key value) in the user endpoint user record in the user endpoint: the client point response 'such as: in the guest ball τ The client points to the user. Preferably, in the pre-consent user, the user can save the pre-identical identity of the two parent households and make the endpoint # ffl # μ ^ # tolerant user group system for each other customer = make All the public key values of the Puc account slipped early. That is, I ^ ^ J imi Wuzheng-. 9 The new client points the user intact and the sound is correct, the new client is better to use, and it is pre-agreeable The user group user's public key value can be passed to the client's parent account endpoint user in the alternative. Send a request instruction to the remote client (eg, via the Internet to send client points to users ’public server endpoints). Each point in that group wants to provide new data 2 values 'iPUC &quot;', etc., Because if the client checks through the Internet: the common server end point • The public key value PM of the primary and secondary endpoint users is used to respond to the public key value of the primary and secondary endpoint users; The author has requested long, PC, ... etc. among them the public key value pu to which the customer came. 'p °, then the client point uses each of these received uc "' ... etc. to encrypt the new data key value to produce five. Description of the invention (48) Generate encrypted new data key value to key value), etc ... <New data key value>, pUC &quot; (new data and then the client points the new data key value PUC via the network, (new data is transmitted every one of these encrypted to the remote file server endpoint,) , Puc "(new data key value) ......... and corresponding client points". Stored in, use this record Puc, (new data key value) is stored ^, the encrypted new data key value is The public key Puc ::: =: points in the user record are combined with the value Puc &quot; (new data key) is stored: while the encrypted new data key has the public key Puc &quot; etc. The combined file in the user record Lie: The far end of the feeder case has never had a clear original Γ jXt, that is, an unencrypted version of any data key value. ^ All backend file server endpoints are in What it has in its field is many encrypted versions of every data key, and every time An individual client point encrypts each public key value and holds a private key value *, that is, a separate method for individual client points to individually copy and back up these encrypted data key values (here, it means private Key value). More importantly, although the end point of the money end case feeder copy from the original file that does not have a data key value, but it is still saved and can be used by each client point to encrypt the data key value Public = value. File access and integration maintains the integrity of the file group stored on the physical storage device by the remote file server endpoints and client points, and reduces the storage on the physical storage device.

第52頁 487843 五、發明說明(49) 案(主要)複製備份的全部存取能夠發生在這些(主要) 檔案複製備份的最新版本上。詳細說明如下: (a )許多使用者能夠同時存取檔案群體; (b )憑著本地檔案應用程式介面為某些檔案所指定的外 顯及隱含檔案共享模式,某些檔案很可能同 端點所存取; &lt; β |π (C)基於通訊效率,存取檔案資料的一個 典型上是傳送及保存在客戶端點上,因此,槽案== 於在本地的複製備份上發生;以及 ^ β( d )本發明的實施例支持&quot;不預接模式&quot;檔案 疋根據一個客戶很可能繼續存取二 遠端檔案飼服器端點通訊。 、而’為槽案和目錄修改該檔荦整 非常可預測的結果一:“生維持提供-個 是完全不被允許。i &quot;b元全如期盼所達成、就 操作,因此,多使用去在&amp; #奋”系、、先應用^式;丨面能夠 端點及客戶端點ί:”取檔案功能就像遠端檔案飼服器 上。簡單地說,雖麸遠妓户安a 疋在相同的區域網路 -個或—個以 :^棺案飼服器端點經由廣域網路和 端點及任何特定客戶: =事,在遠端檔案飼服器 端點之間並不受伴蛾去 貫上,在任何兩個客戶 是,相同所期二需要)的通訊並非總是可能,但 參與支持多用戶及共享㈣存$。尤好像在一區域網路中 為達成這些目標,Page 52 487843 V. Description of Invention (49) Full access to the (primary) copy backup can occur on the latest version of these (main) file copy backups. The details are as follows: (a) Many users can access the file group at the same time; (b) Depending on the explicit and implicit file sharing mode specified for some files by the local file application interface, some files are likely to be at the same end Point access; &lt; β | π (C) Based on communication efficiency, a typical type of access to file data is transmitted and saved on the client point. Therefore, the slot case == occurs on a local copy backup; And ^ β (d) the embodiment of the present invention supports the "non-pre-connect mode" file. According to one client, it is likely that the client will continue to access two remote file feeder endpoint communications. , And the modification of the file for the slot case and the directory is very predictable. One result: "The provision of health maintenance-this is not allowed at all. I &quot; b Yuanquan as expected, operate, so more Use the &amp;#fen "system, and apply ^ first; you can use endpoints and clients to click:" The file retrieval function is like a remote file feeder. Simply put, although An a 疋 in the same local area network-or-with: ^ coffin feeder end point via WAN and endpoint and any specific customer: = thing, between remote file feeder end points and Not affected by companion moths, in any two customers, the same expectations are required.) Communication is not always possible, but participation in supporting multiple users and sharing of deposits is $. It ’s like trying to achieve these in a local network. aims,

第53頁 貝域;裝置上(也就是, ^δ/843 五、發明說明(50) ,者都有在遠端檔案伺服器端點上的有主要複製備份及在 母個客戶鳊點上的本地的複製備份)的每份檔案及每個 、亲2 k加個槽案版本控制。使用槽案版本控制來確認 =可能=況下,該客戶端點將只執行在檔案資料的最新版 f上的一個存取。而該檔案版本控制也用來確認檔案的衝 犬^改並且恢復通訊。值得注意的是,對此系統,當本發 明名生一個改變時,從遠端檔案按伺服器端點傳送每一開 Ϊ Ϊ Ϊ 2㊁Ϊ檔案資料及目錄資訊到每個特定的客戶端 政^ =費時而且沒有效率。相反地,執行下列的更新 t朿、。,母备一客戶端點嘗試開啟、建立或刪除一個檔牵 時’百先將執行一檢查,如下,以端 有=的資訊。每當客戶端點存取目錄資訊;否 =以確定那個目錄資訊是最新的如同 執: 外,檔宰據本發明’除了執行-個版本檢查 夕卜棕累共旱私式及權利權限也將同時執行。 如果另個客戶端點嚐試即時存取由一個特定的交6 檔宰是最近ώ ^ 0 案伺服器端點能夠決定那個 极茶疋敢近由特疋客戶端點 點然後也可以決定a丕胜^使用該退^稽案伺服器端 服器端點通訊或者它已端點仍然和該遠端播案伺 端點通訊,該達端浐2ϊ鳊點仍然和遠端檔案伺服器 〇括執灯任何檔案共享模式 戶知點 制。在接去沾达、 、鎖的檔案貝枓的所有權或柙 、、況下,遠端檔案伺服器端點將只允許資^Page 53; on the device (that is, ^ δ / 843 V. Invention Description (50)), all of them have primary copy backups on the remote file server endpoints and on the parent client site Local copy backup) each file and each 2K plus slot version control. Use slot version control to confirm = possible = In this case, the client will perform only one access on the latest version f of the file data. The file version control is also used to confirm the file modification and restore communication. It is worth noting that for this system, when the invention is changed, each open file is sent from the remote file according to the server endpoint Ϊ Ϊ 2㊁Ϊ file data and directory information to each specific client policy ^ = Time consuming and inefficient. Instead, the following updates t 朿, are performed. When the client and the client try to open, create, or delete a file, ‘100 first will perform a check, as follows, with the information of =. Whenever the client points to access the directory information; No = to make sure that the directory information is up-to-date: In addition, according to the present invention, the file 'in addition to the implementation of a version check, the user's private rights and rights will also be Performed simultaneously. If another client tries to access instantaneously a particular file 6 file is the most recent free ^ 0 case the server endpoint can decide which extreme tea dare to approach by the special client and then can also decide a win ^ Using the exit server endpoint server communication or its endpoint is still communicating with the remote broadcast server endpoint, the endpoint 2 is still communicating with the remote file server. Any file sharing mode knows the point system. The remote file server endpoint will only allow data in the case of the ownership of the file or the locked file.

第54頁 487843 五、發明說明(51) 存取完全依照那個特定 外顯或隱含擋案共享槿田=本應用程式介面所詳述的 和遠端檔案伺服器端點 土 寺疋客戶端點沒有 關閉檔案去代替那個特定客戶:m::器端點能夠 =的客戶端點對槽案的控制=允==個=那個 存取。如下有更深人的描述,這個後者個客戶端點 的客戶端點的能力來_錶^ n ,結合特定 遠端播案伺服修:播案的複製備份當它沒有和 通訊時需要每當恢:复與遠端檔案伺服器端點 可各戶鳊點執行一個恢復通訊 (reconciliation )操作。 如果一客戶端點寫或修改它的檔案資料次&gt; 本地複製備份,該客戶端點魷卜彳皇— / 錄貝訊的 服媸Et /.I κ ”, 傳匕的〇改給遠端檔案伺 服态‘點。例如,就檔案資料而言,被修改的檔宰 傳將會延遲直到客戶端點關閉那個標案m固客戶— ^維持與遠端檔案伺服器端點相連接,為上傳和儲存檔案 資料修改的版本檢查將不需要,就像沒有其他的客戶^點 將被允許來寫存取給相同的檔案,以此方式,它違反幸 Ϊ:Γ檔?共享模式原則。然而,如果在客戶端點及i端 I ==服15端點之間的通訊管道關閉,該遠端檔案伺服器 t =將已經關閉關於客戶端點的檔案。在此情況下,對該 退^檔案飼服器端點而言,有經過許可的寫作存取到另一 個客戶端點(如上所述),同時從其他的客戶端點收到並 且儲存修改這是有可能的。因此,當恢復通訊管道時,該 客戶端點及遠端檔案伺服器端點首先將執行一個恢復通訊Page 54 487843 V. Description of the invention (51) The access is completely based on that particular explicit or implicit case sharing. Hirota = The remote file server endpoint Tusiyu client point as detailed in this application interface. The file was not closed to replace that particular client: The client point that the m :: device endpoint can = control the slot case = allow == individual = that access. The following is a more in-depth description. The ability of this latter client point is ^ table ^ n, combined with a specific remote broadcast server repair: Copy backup of the broadcast needs to be restored whenever it is not in communication: The remote and remote file server endpoints can perform a reconciliation operation at each site. If a client writes or modifies its file information &gt; local copy backup, the client clicks on the 鱿 王-/ 贝 讯 的 服 媸 Et /.I κ ", and sends it to the remote end. File server status. For example, in the case of file data, the modified file will be delayed until the client closes the project. The client — ^ maintains a connection with the remote file server endpoint for uploading Checking the modified version of the stored file data will not be needed, just as no other client will be allowed to write access to the same file. In this way, it violates the principle of: Γ file? Sharing mode. The communication channel between the client point and the i-end I == server 15 endpoint is closed, and the remote file server t = will have closed the file on the client point. In this case, feed this file back. As far as the server endpoint is concerned, it is possible to have authorized writing access to another client point (as described above), while receiving and storing changes from other client points. Therefore, when the communication channel is restored The client point and remote file First endpoint server will perform a restore communications

第55頁 487843 五、發明說明(52) 過程’包括檢查被修改檔案的客戶端點局 備份的版本,並對照儲存在遠端檔案伺服器點二牵= (主要)複製備份的版本,以下將有更詳細的描:、 第1 0圖是說明由客戶端點及遠端檔辇 行的-個過帛。假言史客戶端點及遠端檔宰;“:點所執 認證那:固連接。在步糊。中,客戶 已經恢復。這是可以偵測到而且是該遠端摊 1、Λ 的一個損失,即使有一個存在的連接之後‘為22點 的建立或恢復和遠端檔案伺服器端點的通==連接 是,該客戶端點和該遠端檔案伺服器將 ς =果 S402 中的—個復交(reG_lHatiQn): 詳細描述。呆作將在下文中 接著在步驟S404中,客戶端點♦々3 在實質儲存裝置上的檔荦群體否需要存取儲存 的操作。如果沒有在客戶端點上偵測^建立及刪除” 戶端點將回到步驟S400。 、、 樣的存取,該客 步驟ί二在= = -標;或目錄存取。在 需要版本檢查的操作。例如,: = = = :是-個 一個版本檢查。例如,關=不“ 做修改給播案資料的操作就不需要= 五、發明說明(53) _ = 該客戶,點繼續前進到步驟,並且嘗: 是根據在客戶二細作。很多被嘗試請求的存取操作只 來執行,透過、*祥作業系統及/或應用執行的正常操作 客戶端點上的iU:請求得以產生、然而,修改在-將為上傳到“資料的作,上述的上傳過程也 經由在步驟S408中,該客戶端點 查最近保存在客戶==該;===來檢 訊的本:複=== 數訊的個別的本地複製備份的“ 當然,是由客戶端點所擁有。 複製備份,相反的.’,客戶端或檀案資料存取的任何 = = 。中的迴路=== ,,在步驟S409中到期或步驟以 】個 忍。在步驟S410中’客戶端點決 ::人滿 端檔案伺服器端點收到任何回應,點已經從遠 停計時器的時限内從遠端播案=未能在暫 該客戶端點將推測它沒有和遠$ _ '個回應, 果是,在步驟中,客戶通訊。如 訊的本地複製備份。在步驟以14中:?案貝科或目錄資 操作在檔案資料或目錄資訊上,% 試執行存取 系統或應用…情況下’如果客戶端點以Page 55 487843 V. Description of the invention (52) The process' includes checking the client's backup version of the modified file, and comparing the backup version stored on the remote file server = (mainly) copying the backup version, the following will be There is a more detailed description: Figure 10 illustrates the client-side and remote files. Hypothesis history client point and remote file; ": point certificate authentication: solid connection. In step paste. In, the customer has been restored. This is one that can be detected and is one of the remote booth 1, Λ Loss, even if there is an existing connection after the establishment or restoration of 22 points and the connection of the remote file server endpoint == the connection is yes, the client point and the remote file server will be 果 = S402 — A repetition (reG_lHatiQn): a detailed description. The action will be described later in step S404. The client points 々 々 3 whether the file group on the physical storage device needs to access the storage operation. If it is not on the client point The "end detection ^ create and delete" user endpoint will return to step S400. ,, kind of access, the guest step ί the second ==-standard; or directory access. The operation that requires a version check. For example: = = =: yes-a version check. For example, Off = No, you do n’t need to modify the information for the broadcast. = V. Invention Description (53) _ = The client, click to continue to the step, and try: It is based on the detailed work on the client. Many were tried to request The access operation is only performed, iU on the client point for normal operations performed by the operating system and / or application: the request is generated, however, the modification is-will be uploaded to the "data work, the above upload The process also checks in step S408 that the client clicks on the recently saved client == this; === to check the copy of the copy: duplicate === the individual local copy of the digital copy of the backup, "of course, by the client Point owned. Copy backup, contrary to. ', Client or server access to any data ==. In the loop ===, expires in step S409 or steps to endure. In step S410 'Client point decision :: The end of the full file server endpoint received any response, the point has been broadcast from the remote within the time limit of the remote stop timer = failure to temporarily hold the client point will speculate that it does not have and far $ _ 'Responses, if, in step, the customer communicates. Local copy backup of the news. In step 14:? Case or directory information operation on the file data or directory information,% try to execute access to the system or application ... In the case ‘if the client clicks

第57頁 487843 五、發明說明(54) 取,該客戶端點將嘗試執行所請求的存取在 錄資訊的本地複製備份上。注意,當客戶端點沒;= 樓案資料或目錄資訊時,嘗試的請求依照作業系统或^ 的正常操作而失敗。此外,如果那個操作是一個關閉檔案 或任何修改目錄資訊的操作,例如,客戶端點延:: 傳修改。如下所述,既然這樣,這些修改 恢復通訊過程S402中。 得肝赞生在 ^果在步_41Q中,客戶端點從遠端檔案伺服器端 站收到一個回應,該客戶端點將在步驟^16中,決定是否Page 57 487843 V. Description of the invention (54) The client will attempt to perform the requested access to a local copy backup of the recorded information. Note that when the client clicks; = building case data or directory information, the attempted request fails according to the normal operation of the operating system or ^. In addition, if that operation is a close file or any operation to modify the directory information, for example, the client delays :: upload the modification. As described below, in this case, these modifications are restored in the communication process S402. In the case of Step 41Q, the client receives a response from the remote file server terminal. The client will decide in Step 16

^存取。如下所述,冑兩種不允許請求存取的情況,也 就疋,客戶端點缺少足夠的存取權利權限來執行存取以及 &lt;或所請求的存取和㈣的本地應用H介面冑明的外顯 ,隱含的槽案的-種槽案共享模式衝突。例如,如果所請 求的存取已經被否定或失敗,該客戶端點提供一個適當的 失敗訊息給使用者表示為何否定存取,如:顯示器“上. 顯不訊息,然後,回到迴路S400到S404。另一方面,如 果所請求的存取已經獲得許可,在步獅14中,該客戶端 點將執行所請求的存取’也就是,開啟-個檔案,建立-個槽ί1刪除—個槽案,改變—個目錄屬性等。 遠端標案飼服器端點將執行步驟S420到S430以便來回 應收到:個版本/存取請求訊息或—個簡單的訊息來檢索 !案:貝料或,,:貝訊。在步驟S42〇中,該遠端檔案伺服器 端點檢^定是否客戶4點有足夠的存取權㈣限來執行 所咕求的操作。例如該客戶端點只有在一個目錄内讀取所^ Access. As described below, there are two cases where access is not allowed, that is, the client point lacks sufficient access rights to perform access and &lt; or requested access and the local application H interface. Explicit, implicit slot-to-slot case sharing mode conflicts. For example, if the requested access has been denied or failed, the client point provides an appropriate failure message to the user to indicate why the access is denied, such as: on the display ". Display the message, and then return to loop S400 to S404. On the other hand, if the requested access has been granted, in step lion 14, the client point will perform the requested access' that is, open a file, create a slot, delete a slot Case, change a directory attribute, etc. The remote target feeder endpoint will execute steps S420 to S430 in response to receiving a version / access request message or a simple message to retrieve! Case: Shell or In step S42, the remote file server endpoint checks whether the client 4 has sufficient access rights to perform the requested operation. For example, the client point only exists at Read in a directory

第58頁 纤δ/843Page 58 Fiber δ / 843

有槽案的存取權利權限,該客戶端點希望開啟一個標案以 2讀寫’該客戶端點將缺少足夠的存取權利權限來執行戶斤 清求的存取。例如,使用由遠端檔案伺服器端點所提供 的作業系統軟體將執行該檢查的細節。如果該客戶端點 沒有足夠的存取權利權限,該遠端檔案伺服器端點將使操 作失敗,並且經由網際網路傳送一個訊息給客戶端點表、 不客戶端點使用者缺少足夠的存取權利權限來執行在步驟 S4 24中所請求的存取。在步驟S41〇和5416中該客戶端點侦If there is an access right in the slot, the client wants to open a bid to read and write. The client will lack sufficient access rights to perform the requested access. For example, using operating system software provided by a remote file server endpoint will perform the details of the check. If the client point does not have sufficient access rights, the remote file server endpoint will fail the operation and send a message to the client point table via the Internet. No client point user lacks sufficient access Rights to perform the access requested in step S4 24. The client detects in steps S41〇 and 5416.

^ 假設該客戶端點使用者沒有足夠的存取權利權限去執 仃所請求的存取。在步驟S422中,該遠端檔案伺服器端點 接下來將檢查來決定是否所請求的存取堅守著管理標案資 料或目錄來被存取的本地檔案應用程式介面載明的隱含及 外顯的本地檔案共享模式。如上所述,使用由遠端^案伺 服器端點所提供的作業系統將做這樣一個決定。如果所浐 求^存取沒有堅持檔案的檔案分享程式,該遠端檔案伺: 器端點將使操作失敗並且經由網際網路傳送給客戶端點一 個訊息表不所請求得存取在這次並不能執行,因為它和 步驟S42 4中檔案或目錄的檔案分享程式有所衝突。該訊息 是由在步驟S410和S416中的客戶端點所偵測到的。 假設所請求的存取沒有堅守該檔案分享程式。在步驟 S426中,遠端播案伺服器端點檢查由客戶端點所提供在訊 息中的版本數量(如果有任何數量),來對照儲存在遠端檔 案伺服器端點上檔案或目錄訊息的(主要)複製備份之版^ Assume that the client user does not have sufficient access rights to perform the requested access. In step S422, the remote file server endpoint will then check to determine whether the requested access adheres to the implicit and external data specified by the local file application program interface that manages the project data or directory to be accessed. Local file sharing mode. As mentioned above, using an operating system provided by the remote server endpoint will make such a decision. If the requested file is accessed without a file-sharing program that persists the file, the remote file server endpoint will fail the operation and send it to the client via the Internet. Run because it conflicts with the file or directory file sharing program in step S42. This message is detected by the client point in steps S410 and S416. Suppose the requested access does not adhere to the file sharing program. In step S426, the remote broadcast server endpoint checks the number of versions (if any) in the message provided by the client point to compare the file or directory information stored on the remote file server endpoint. (Main) Copy Backup Version

第59頁 487843 五、發明說明(56) 本數量。如果版本數量相符,該客戶端點將有檔案資料及 /或目錄訊息的最新版本。該檔案伺服器只是經由網際網 路傳送'一個机息表不客戶端點有槽案資料及/或目錄訊息 的最新複製備份,並且因此同時存取步驟S430。該許可是 由在步驟S410和S416中的客戶端點所偵測到的。Page 59 487843 V. Description of the invention (56) The quantity. If the number of versions matches, the client site will have the latest version of the file data and / or directory information. The file server simply transmits' an information table via the Internet, the client points to the latest copy backup of the slotted data and / or directory information, and therefore accesses step S430 at the same time. The permission is detected by the client point in steps S410 and S416.

如果客戶端點沒有檔案資料或目錄訊息的任何複製備 份或如果由客戶端點所提供的版本數量並沒有符合儲存在 遠端檔案伺服器端點上的檔案資料或目錄資訊的複製備份 之最新版本數量,該遠端擋案伺服器端點將執行步驟 S428。在步驟S428中,該遠端檔案伺服器端點下載給客戶 端點所請求的檔案資料或目錄訊息就像圖8所描述的有 關。在其中,下載的檔案資料/或目錄訊息客戶端點將 在步驟S410和S416中偵測到。 ·、If the client site does not have any duplicate backups of file data or directory information or if the number of versions provided by the client site does not match the latest version of the duplicate backup of file data or directory information stored on the remote file server endpoint The number of the remote file server endpoint will execute step S428. In step S428, the file data or directory information requested by the remote file server endpoint to download to the client endpoint is as described in FIG. Among them, the downloaded file data or directory information client point will be detected in steps S410 and S416. ·,

值得注意的是,客戶端 息的最新版本,並且以一個 行存取。這樣提供兩個好處 一個”快取的複製備份”角色 比經由網際網路執行存取容 法和遠端檔案伺服器端點通 地複製備份上繼續執行存取 點能夠得到檔案資料或目錄訊 本地的複製備份儲存,以便執 。首先,本地的複製備份充當 ,因此,存取本地的複製備份 易得多。#次,當客戶端點無 訊,所以,客戶端點能夠在本 根據一個實施例 1固吝戶端點能夠表明 儲-個或-個以上的檔案及/或目錄。例如, 戶端f使用者能夠表明希望儲 4 這將導致客戶端點傳送一個訊息給遠端槽It is worth noting that the latest version of the client information is accessed in one line. This provides two benefits. A "cached copy backup" role can get file data or directory information locally by performing an access method over the Internet and remotely copying backups from a remote file server endpoint. Copy backups are stored for easy execution. First, the local replicated backup acts as, so accessing the local replicated backup is much easier. # Times, when the client point has no information, so the client point can indicate that the fixed user endpoint can store one or more files and / or directories. For example, the client f user can indicate that he wants to store 4 This will cause the client to send a message to the remote slot

第60頁 五、發明說明(57) 示該儲存的請求。相 ^ 示由每個客戶端點广!應下二遠端槽案伺服器端點將顯 地,遠端檔案伺服器:表示的每個檔案或目錄。於是定期 上執行一個通行。°如點字在表示儲存的所有檔案和目錄 被儲存的檔案資料或果遠端檔案伺服器端點偵測到這些 服器端點將下載適當含有最近的改變,該遠端檔案伺 別檔案和/或目錄的备二改檔案資料或目錄訊息給儲存個 上傳儲存檔案和目錄沾—個個別客戶端點。客戶端點於是 戶端點能夠確定對二也局部性快取的複製備份。結果,客 案伺服器端點將持2 : 2存的檔案或目錄的存#,遠端檔 該網路結果。i傳,案和目錄。 目錄的最新、t即j ::點:可能總是有儲存的檔案和 這些檔案或目錄時客 =,當客戶端點希望存取 即時的版本時,僻以在下載最新、最 的延誤。再者,存;這些儲存的檔案或目錄 案伺服器端點通訊昧在 ^ ^ ^ ^在無法與遠端檔 能是,合重新:個檔案的過期版本,有K 田重新建立和遠端檔案伺服 種叮 客戶端點使用者將必須人工化調解通:管道時, 要槽案和目錄’該客戶端點將降低致/1 法大斑、土透山過儲存主 服器端點通訊時,由殼戶端點存取_ 、式二广鸲檔案伺 版本的風險。 田案或目錄的一個過期 恢復通訊 如果因為是關閉通訊管道, 檔案祠服器端點通訊。如果一個^二鴿點不能和該遠端 客戶端點的通訊管道 487843 * 1 ——— 五、發明說明(58) 關閉,或者,替代地,該遠端 特定客戶端點的通訊管道。在二飼服器端點關閉和一個 個檔案或目錄關閉之前,遠端梓=客戶端點最後存取的一 特定客戶端點放棄控制那個檔^ =伺服器端點能夠由那些 戶端點能夠存取檔案或目錄Γ然=目錄,這使得另一個客 夠在無法與遠端標案伺服器通 那個特定客戶端點能 地&quot;外取&quot;複製備份。值得注音的曰f,存取檔案或目錄的本 對檔案資料或目錄訊息執行;、相]兩個客戶端點可能 的。根據本發明,一個精密的恢的修改’這是有可能 用來恢復通訊這些不相容的改變。复通矾機器裝置試題共 根據本發明,在恢復通訊 目錄訊息的(主要)複M \ 态裝置中,對檔案資料或 端點在無法與遠端飼服器端點通訊由-個客戶 有些情況,如客戶端點在無法與端 朽“文。然而, 時所做的修改將儲存在遠端槽案伺;端點通訊 如圖1 0所述,去一玄卢# 脱為細點上。 點通訊時,客戶端二脾-&gt; 點恢復和遠端檔案伺服器端 程中,該客恢復通訊操作。在該操作過 η ^ 先識別局部性保存在一個儲存穿置 (如.⑭片記憶體15)卻又實:儲存裝置 錄訊息的每一個本地的複製備份。::案 荦資料及日# Γ Ϊ心 檔案伺服器端點的方式檢查檔 ^。,目錄訊心的每一個局部性保存的複製備份的版 相對回應下,遠端擋案伺服器端點將檢查個別的檔案P.60 5. Invention description (57) shows the request for storage. The display is displayed by each client! The next two remote server endpoints will be displayed, the remote file server: each file or directory represented. A pass is then performed on a regular basis. ° If braille is used to indicate that all files and directories are stored, or if the remote file server endpoint detects that these server endpoints will download the appropriate files containing the most recent changes, the remote file will serve the file and / Or the backup of the directory to modify the file data or directory information to the storage uploading files and directories-an individual client point. The client point is then able to determine a duplicate cache of the local cache. As a result, the client server endpoint will hold 2: 2 files or directories stored #, and remotely archive the network results. i Biography, Case and Catalog. The directory is up-to-date, that is, j :: point: there may always be stored files and these files or directories. When the client wants to access the real-time version, it is too late to download the latest and most delay. Furthermore, save; the communication between these stored files or directory server endpoints is ^ ^ ^ ^ Failed to communicate with the remote file can be, re-created: an expired version of the file, there are K fields re-created and remote files The user of the server will need to manually adjust the client point: when the pipe is connected, the case and the directory will be reduced. This client point will be reduced to / 1 method, and the soil will pass through the storage server. Risks of Shell Endpoint Access _, and Type II Cantonese File Serve Versions. An outdated field or directory resumes communication. If the communication channel is closed, the file server endpoint communicates. If a two-pigeon point cannot communicate with the remote client point 487843 * 1 ——— V. Description of the invention (58) is closed, or, instead, the remote specific client point communication channel. Before the two server endpoints are closed and each file or directory is closed, the remote endpoint = a specific client point that the client point last accessed gave up control of that file ^ = server endpoints can be controlled by those client endpoints Accessing a file or directory 然 ran = directory, which allows another client to "copy out" a specific client site that is unable to communicate with the remote project server. It is worth noting that f, access to the file or directory is performed on the file data or directory information; phase, two client points are possible. According to the present invention, a sophisticated recovery modification 'is possible to restore these incompatible changes in communication. In accordance with the present invention, the test questions of Futong Alum machinery and equipment are based on the present invention. In the (main) complex M state device for recovering the communication directory information, the file data or endpoints cannot communicate with the remote feeder endpoint. For example, if the client is unable to communicate with the server, the modifications made by the server will be stored in the remote server; the endpoint communication is as shown in Figure 10. During communication, the client's spleen-> point recovery and remote file server end, the guest resumes the communication operation. After this operation, ^ ^ first identify the locality and save it in a storage device (such as cymbal memory 15) But it is true: each local copy of the message recorded on the storage device is saved. :: 案 荦 数据 和 日 # Γ Check the file server endpoints in a way that checks the file ^., Every locality of the directory information heart In response to the saved copy backup version, the remote archive server endpoint will check individual files

4^/843 五、發明說明(59) 息的版本來看看是否在實質儲存裝置中遠端 ^劁借p i▲點保存個別的檔案資料或目錄訊息的(主要) ^備&amp; t δ£(錄相同版本數量。如果是’冑客戶端點 與j端檔案词服器端點通訊時,纟 端點上 的:Γ料或目錄訊息的(主要)複製備份= 山 ^ 果做一修改,該版本數量將不相符。該客戶 =點及迫端檔案伺服器端點所採取的 遠端檔案伺服器踹赴卜仅六从#安斗、外丁切王〜疋否在 製備份及在坌e鳊保存的檔案或目錄訊息之(主要)複 I備伤及在客戶端點上的本地複製備份做 巧㈣摘錄這些行動。在圖U和圖12中,該客戶端】 =吊需要去執行-些恢復通訊行動。如說明地,該遠端標 案:服,端點傳送有關上述的有效檢查結果的適當足夠: 來讓該客戶端點能夠執行正確個別的恢復通 動0 第11圖包含一 恢復通訊行動因為 體的總結的圖表。 (cell)將用一列 數字ci,C2,α 細胞表不採取行動 (R1);修改檔案資 新命名或移動標案 的目錄(R5);那些 遠端檔案伺服器端 個該遠端 恢復通訊 為方便起 數字R1, ,C4, 當客戶端 料(R2); (R3);刪 列包含細 點上的檔 檔案伺服器端點及該客戶端點 改變而影響檔案資料或檔案群 見’在該圖表中的每一細胞 R2,R3,R4,及R5 和一行 及C5來標示。R1到R5排包含 點::不對檔案資料做改變 重新命名或移動檔案(R3);重 除檔案(R4);或刪除含有檔案 胞表示採取行動當:不改變在 案資料的複製備份(C1);修改4 ^ / 843 V. Description of the invention (59) Information version to see if it is remote in the physical storage device ^ pi borrow pi ▲ point to save individual file data or directory information (mainly) ^ &amp; t δ £ (Record the same number of versions. If the client communicates with the file server endpoint on the j-end, the endpoint on the endpoint: a (primary) copy backup of the material or directory information = mountain ^ If you make a modification, The number of this version will not match. The client = the remote file server taken by the endpoint and the end of the file server. Go to the only six from # 安 斗 、 外 丁切 王 ~ e 鳊 The (mainly) duplicate of the saved file or directory information, and the local copy backup on the client's point, do a good job of excerpting these actions. In Figure U and Figure 12, the client] = need to perform -Some recovery communication actions. As explained, the remote project: server, the endpoint is adequate to transmit the above-mentioned valid check results: to enable the client point to perform the correct individual recovery operation. Figure 11 contains A resumed communication action because of the body's summary chart. A list of numbers ci, C2, and alpha cells do not take action (R1); modify the file directory for new naming or moving the project (R5); those remote file servers end the remote communication to facilitate the number R1, , C4, when the client data (R2); (R3); delete the file contains the endpoints of the file server on the fine point and the change of the client point to affect the file data or file group see 'Each cell in the chart R2, R3, R4, and R5 are marked with one line and C5. The rows R1 to R5 include points: Rename or move the file without changing the file information (R3); delete the file (R4); or delete the cell containing the file. Take action when: Do not change the duplication of the materials on file (C1); modify

487843 五、發明說明(60) ~ (C2 )在該遠端檔案伺服器端點上的檔案資料的複製備份. 重新命名或移動(C3)在該遠端檔案伺服器端點上的#案、 複製備份;刪除(C4)在該遠端檔案伺服器端點上的^ _的 複製備份;或刪除(C5)在該遠端檔案伺服器端點上二的 it匕夕卜 一/ Μ母1固檔案採取 一些行動,就像一個客戶端點改變檔案資料·移動到另一 個目錄及刪除原始目錄。即使採取一此;^ —«4 W} y ^一身史規》則 應用的是在遠端檔案伺服器端點上像正確沾一说r' ’ tr、j 一橡雙到採 用。而在客戶端點上’只有推測標案是正確的,如 h 不和遠端檔案伺服器端點複製備份相衝突。‘旦士果匕 &gt;6* 一** 4因 無法修正的衝突’它將移動至客戶端點的衝突 考量的情況是’當客戶端點無法和遠端目服 點通訊時,將不在遠端檔案飼服器端點上改梓/ 複製備份(行C1);在最簡單的情況下,茶I主要) 檔案做改變(R1, C1);在此情形下, 、土端點也不對 器端點就是客戶端點將不採取行動. =退端檔案伺服 資料的内容做一個改變,也就是,’ ^ 端點對檔案 (R2,C1);使用上述的上傳過程將&gt; \寫到稽案 (或整個修改槽案)到遠端槽案二戶:點^傳修改 伺服器端點保存該修改的槽案資料 ° ” 。运端檔案 戶端點重將命名檔案或將它移動到二另一方面,如果客 C1),該遠端檔案伺服器端點將山固目錄(R3, 存的檔案(主要)複製備份上執行硬端檔案伺服器端點保 同的重新命名或移動行487843 V. Description of the invention (60) ~ (C2) Copy and backup of the file data on the remote file server endpoint. Rename or move (C3) the #case on the remote file server endpoint, Duplicate backup; delete (C4) duplicate backup of ^ _ on the remote file server endpoint; or delete (C5) it's two on the remote file server endpoint 1 / M 1 Take some action on the solid file, just like a client, change the file information, move to another directory and delete the original directory. Even if you take this one, ^-«4 W} y ^ A history rule is applied on the remote file server endpoint as if correctly said r '’ tr, j a pair of rubber to use. On the client side, only the speculative case is correct, for example, h does not conflict with the remote file server endpoint copy backup. 'Danshi Guo Dagger> 6 * 1 ** 4 because of conflicts that cannot be corrected' The situation in which it will be moved to the client point is' When the client point cannot communicate with the remote server point, it will not be far away. Change the file feeder endpoint on the end of the file / copy the backup (line C1); in the simplest case, tea I main) change the file (R1, C1); in this case, the endpoint is not correct The endpoint is the client point and will not take action. = Make a change to the content of the backed-up file server data, that is, '^ Endpoint-to-file (R2, C1); use the upload process described above to write &gt; \ to the audit file (Or modify the entire slot case) to the second remote slot case: Click ^ to transfer the modified server endpoint to save the modified slot case data °. ”The transport file user endpoint will rename the file or move it to two other locations. On the one hand, if the client C1), the remote file server endpoint will copy and save the Shangu directory (R3, the stored file (mainly)) on the hard copy file server endpoint to perform a rename or move

487843 五、發明說明(61) 動。同樣地,如果客戶端點刪除擋案(R4, C1)或含有 檔案的整個目錄(R5, C1),該遠端檔案伺服器端點將在 遠端槽案伺服器知點所儲的槽案的(主要)複製備份。 考量現在這種情況,當客戶端點無法與遠端檔案伺服 器端點通訊時’在运端稽案伺服器端點的檔案資料的複製 備份將會改變,也就是,如:另一個客戶端點修改或寫。 如果客戶端點在它無法與遠端檔案伺服器端點通訊時,不 改變槽案的本地的複製備份’該客戶端點將只是使檔案的 本地複製備份無效。同樣地,如果該客戶端點改變檔案資 料的本地複製備份(R2,C2),該檔案資料的本地複製備 份也將無效。此外’檔案資料的客戶端點的本地複製備 份也將移動到實質儲存在客戶端點上儲存的一個本地目錄 (如:在客戶端點的磁片記憶體15上)稱之為,,衝突箱π。 衝^箱是一個在客戶端點的目錄(磁片記憶體15的),在 ΐ ί粗客/端點將放置表示不可解決的衝突的資訊或檔 ^ ^ ;&quot;這使彳于客戶端點使用者能夠在它有空時檢查這些 .. 禾貝了叶亚儿解决其中的衝突。無論如何,在客 新命名或移動擋案的本地複製備份(R3, C2), 部目錄(R5, Γ9) ( )或刪除含有檔案的全 份將下載到客戶端飼服器上檔案的修改(主要)複製備 =幻客戶糕點並且放置到衝突箱。 器端點況’當客戶端點無法與遠端檔案伺服 製備份將重新4=案飼服器端點上檔案的(主要)複 〒名或移動(C3),如:由另一個客戶端487843 V. Description of Invention (61). Similarly, if the client deletes the archive (R4, C1) or the entire directory (R5, C1) containing the file, the remote file server endpoint will know the location of the stored archive at the remote archive server. (Primary) Copy backup. Considering the current situation, when the client cannot communicate with the remote file server endpoint, the copy and backup of the file data on the server end of the audit server will be changed, that is, another client Click modify or write. If the client point does not change the local copy backup of the slot when it cannot communicate with the remote file server endpoint, the client point will simply invalidate the local copy backup of the file. Similarly, if the client changes the local copy backup (R2, C2) of the archive data, the local copy of the archive data will also be invalid. In addition, the local copy backup of the client site of the archive data will also be moved to a local directory (such as: on the disk memory 15 of the client site) that is actually stored on the client site. π. The red box is a directory at the client site (on disk memory 15). At the client / endpoint, information or files indicating unresolvable conflicts will be placed. ^ ^ This makes the client site The user is able to check these when it is free .. He had Ye Yaer to resolve the conflict. In any case, the local copy of the backup (R3, C2), the directory (R5, Γ9) () in the newly named or mobile file, or delete the entire file containing the file will be downloaded to the client feeder to modify the file ( Main) Remake = magic client pastry and place in conflict box. Device endpoint status ’When the client site cannot communicate with the remote file server, the backup will be restarted. 4 = (Main) copy or move (C3) of the file on the server endpoint, such as by another client

第65頁 ^/843 五、發明說明(62) 點。如果客戶端點並沒有改變檔案資料(Ri, c3)的本地 制L客戶:點將在含有不改變的槽案資料之樓案 的本地複製備伤上執行對應的重新命名或移動行動。另一 :面,如果該客戶端點改變檔案資料,€就是,修改槽 11 案資料⑻’ C3) ’該 點的本地複製備份將移動到衝突箱。此外,對稽案資料 (或整個權案)的修改也將上傳到遠端標案飼服器。… 遠端植案伺月民器端·點將儲存修改在槽案的重新命名或 移動的位置下的檔案資料(或整個修改的槽案)。如果客戶 :點改變檔案名稱或移動它(R3,C3 !飼服器端點上播案的(主要)複製備份還要不同該客枯戶 ^點放置-個警不訊息到衝突箱’指示並沒有 1二端點在= 竹* g \在 '&quot;通鈿檔案伺服器端點並沒有執行刪除择、 作;相反地,該客戶端點在衝突箱中放置一警示、-呆 未執行刪除操作。如果客戶端點含有檔案不並 突7。該樓案資料(或整個槽案)到客戶端點並且放置 考里現在的情況,當客戶端點I、、表 土 端點诵1味 产外土山 ”遂&amp;槽期伺服 j點通戒時,在該达端檔案伺服器端點上之檔器 ,)複製備份將被刪除(C4),如:被另 點。(主 :這種情況,當該客戶端點無法與遠端槽案飼服再考 ΪΪ備ίίΞΓ案飼服器端點删除(C5)含有標案的(主要1 製備伤的整個目錄’如:被另-個客戶端點。這兩4) 五、發明說明(63) ”種;=案本身有相同的衝擊。尤其是,兩者都是 /服ϋ端點冊彳除槽案的(主要)複製備份的 復”目錄的衝擊上是不同的,,在下面敘 述)。因此一起描述這兩種情況。 :果客戶端點沒有改變,即 改改 地複製備份(R1,咖,⑸,該客户端 刪除或使樓案資料的本地複製備份無效。如果該客戶端點 (Π二:修改或改寫到檔案資料的本地複製備份 * , C5),該客戶端點將移動檔案資料(或整 !槽案)的本地複製備份到衝突箱。同樣地,如果該客戶 =點已經重新命名或移動檔案(R3, C4或R3, C5),然後 二^戶端點將移動標案資料的本地複製備份到該衝突箱。 ^ 外,在任何情況R2,C4; R2,C5; R3,C4 或 R3, 二該客戶端點上傳檔案到遠端檔案伺服器端點而它在 ::名稱或移動的目錄位置下儲存所上傳的複製備份。在任 °種情況下,其中當客戶端點刪除檔案(R4, C4或 C5) 動&lt; C5)或刪除含有檔案的整個目錄(R5, C4或R5, 因為沒有東西需要恢復通訊所以就不需要採取任何行 第12圖包含一個關於由遠端檔案伺服器端點及恢復 :仃動摘要的-個圖表。為方便起見,圖表的每個 ^一列數字R1,,R2,,R3,,R4,術以及一行數胞字將 人,C2 , C3 ,C4’ ,及C5’來標示。R1,到R5,排包 各細胞表示採取行動當客戶端點:不對目錄做改變(Ri,);P.65 ^ / 843 V. Description of the invention (62) point. If the client site does not change the local L client of the archive data (Ri, c3): the site will perform the corresponding rename or move operation on the local reproductive wound of the building case that contains the unchanged groove case data. On the other hand, if the client changes the archive data, that is, modify the data of the case 11 'C3)' The local copy backup of that point will be moved to the conflict box. In addition, changes to the audit data (or the entire case) will also be uploaded to the remote bid server. … The remote planting device and the civil device terminal will store the file data (or the entire modified slot file) under the renamed or moved location of the slot file. If the customer: click to change the name of the file or move it (R3, C3! (Main) copy of the backup broadcast on the feeder endpoint must also be different from the customer ^ point placed-a warning message to the conflict box 'instructions and No one or two endpoints are located at the end of the "&quot; pass through the file server endpoint and did not perform delete selection or operation; on the contrary, the client site placed a warning in the conflict box,-did not perform delete Operation. If the client point contains the file, do not start 7. The building case information (or the entire slot case) is placed on the client point and the current situation of the test is placed. When the client point I, the topsoil endpoint recited 1 When the "Tushan" Sui &amp; Slot Servo is connected, the backup file on the end of the file server end will be deleted (C4), such as: another point. (Main: this case When the client point cannot be tested again with the remote tank case, please refer to the case where the feeder end point of the case is deleted (C5). The entire directory that contains the standard case (mainly 1 prepares the injury), such as: another client point The two 4) five, invention description (63) "species; = case itself has the same impact. In particular, both are / service endpoints (The impact of the (mainly) duplicate backup directory of the backup case is different, as described below). Therefore, the two cases are described together.: If the client has not changed, that is, the backup copy is changed ( R1, coffee, alas, the client deletes or invalidates the local copy backup of the building case data. If the client point (II: Modify or rewrite to the local copy backup of the archive data *, C5), the client point will move Local copy of archived data (or entire! Slot case) backed up to the conflict box. Similarly, if the client = point has been renamed or moved the file (R3, C4 or R3, C5), then the two household endpoints will move the project A local copy of the data is backed up to the conflict box. ^ In addition, in any case R2, C4; R2, C5; R3, C4 or R3, the client uploads the file to the remote file server endpoint and it is located at :: The uploaded copy backup is stored under the name or the location of the moved directory. In any case, when the client deletes the file (R4, C4 or C5), &lt; C5) or deletes the entire directory containing the file (R5, C4 Or R5, because there is no East Communication needs to be restored so there is no need to take any line. Figure 12 contains a chart about the remote file server endpoints and recovery: automatic summary. For convenience, each column of the chart is a number R1, R2 ,, R3 ,, R4, and a row of numbers and cells will mark people, C2, C3, C4 ', and C5'. R1, to R5, packing each cell means taking action when the client point: do not do the directory Change (Ri,);

487843 五、發明說明(64) 所謂改變,也就是,修改一個目錄屬性(如:一位或一位以 上的使用者或用戶群體的權限)(R2’);增加一個檔案或子 /次目錄給一個目錄(R3,); 重新命名或移動一個目錄 (R4’); 或刪除一個目錄(R5,)。那些行包含細胞表示採取 行動當在遠端檔案伺服器端點上沒有對目錄做改變(c丨); 在遠端檔案伺服器端點上的目錄屬性的複製備份改變 (C 2 );在遠端檔案祠服器端點上增加一個檔案或子/次目 錄給目錄的複製備份(C3);在遠端檔案伺服器端點上重新 命名或移動(C4)目錄的複製備份;或是在遠端檔案伺服器 端點上删除目錄的複製備份(C5) 。 ° 考量這種情況, 點通訊時,在遠端檔 (主要)複製備份(C1, 也沒有改變/修改目 採取行動。如果客戶 上的屬性(R2,,C1,) 或子/次目錄給目錄 如:改變屬性,或將 傳到遠端檔案伺服器 對應的屬性修改或增 實體回應給健存在遠 製備份内的個別屬性 C1 ),然後該遠端檔 製備份。 s客戶端點無法與遠端檔案伺服器相 案祠服器端點上不改變/修改目錄含 )。在最簡單的情況下,該客戶端點 錄(R1 ,(:Γ),因此,並不需要 端點改變/修改目錄的一個或一個c 或增加一個或一個以上的新檔案及/ (R 3 ,C1 ),個別的修改該屬性, =的檔案Y或子/次目·實體;i ^ 2該遠端槽案伺服器端點將做tt 加對應的新的辦;查 端檔案伺服3 ,或子/次目到 。‘里分器柒點上目錄的(主要)潜 案# Μ = Ϊ戶端點刪除該g錄“5,, 一 w、點將刪除目錄的(主要)名487843 V. Description of the invention (64) The so-called change, that is, modify a directory attribute (such as the permissions of one or more users or user groups) (R2 '); add a file or sub / sub directory to A directory (R3,); rename or move a directory (R4 '); or delete a directory (R5,). Those lines containing cells indicate that action was taken when no changes were made to the directory on the remote file server endpoint (c 丨); replication of the directory attributes on the remote file server endpoint changed (C 2); in the remote Add a file or sub / subdirectory to the end of the file server endpoint to copy the directory (C3); Rename or move (C4) the directory to the remote file server endpoint; or Copy backups of deleted directories on the file server endpoint (C5). ° In consideration of this situation, when the point of communication, copy the backup (C1) in the remote file (primary), and do not change / modify the action. If the attribute (R2 ,, C1,) on the customer or the sub / sub directory is given to the directory For example, changing attributes, or modifying or adding attributes corresponding to the attributes sent to the remote file server to individual attributes C1 in the remote backup, and then the remote file backup. The client point cannot communicate with the remote file server. The endpoint of the server does not change / modify the directory. In the simplest case, the client records (R1, (: Γ), so there is no need for the endpoint to change / modify one or one c of directories or add one or more new files and / (R 3 , C1), modify this attribute individually, = file Y or sub / sub-item · entity; i ^ 2 the remote slot server server endpoint will do tt plus the corresponding new office; check the file server 3, or Sub / subhead to. '(Main) latent case of the directory on the point of the splitter # Μ = The end point of the user deletes the g record "5, and once, the point will delete the (main) name of the directory

487843 五、發明說明(65) 考量現在這種情況’ ▲該客戶端點無法與遠端檔案伺 服器端點通訊時,在該遠端播案伺服器端點上將改變/修 改目錄的(主要)複製備份的一個屬性(C2,),如··由另一 個客戶端點。在最簡單的情況下’該客戶端點沒有改變/ 修改目錄訊息的本地複製備份(R1 ’ ,C 2,);在此情況下, 在遠端檔案伺服器端點上對目錄訊息的(主要)複製備份的 修改將下載給客戶端點,及該客戶端點將儲存或做出對目 錄訊息的本地複製備份相同的修改。如果該客戶端點也改 變/修改目錄的本地複製備份(R2’ ,C2,),然後該客戶端 點放置一個警示在衝突箱中以勸告在遠端檔案伺服器端點 上的目錄將會遭受修改當遠端檔案伺服器端點無法與客戶 端點通訊時’它將與在相同時間下客戶端點所做的改變/ 修改並不相容。假設該客戶端點增加一個或一個以上的檔 案或子/次目錄給目錄(R3, ,C2,)。其很可能增加目錄&amp; 息的(_主要)複製備份所做的屬性改變/修改不是相容就是 不相今。一個不相容的例子就是目錄訊息的(主要)複製備 伤的f性改變來使得目錄至少只為客戶端點的使用者所讀 取。这將阻止客戶端點對目錄或它的内容做修改,包括移 士 =的檔案或子/次目#的增加。#{客戶#點增加是相 ί且Μ 將從該客戶㈣點上傳到遠端㉟案祠服器端點, 存取權^描目錄内。再者,如果他們和客戶端點使用者的 仔取權利權隈^ 4 屬性以下載到交^ :如現在修改屬性所表示的,修改該 新不相容的择加&amp; ΐ ί並且局部性儲存。否則,每一個最 们β加的標案及子/次目錄實體將移動至衝突487843 V. Description of the invention (65) Consider the current situation '▲ When the client cannot communicate with the remote file server endpoint, the directory on the remote broadcast server endpoint will be changed / modified (mainly ) Copy a property (C2,) of the backup, such as ... pointed by another client. In the simplest case 'the client point does not change / modify the local copy backup of the directory information (R1', C2,); in this case, the directory information on the remote file server endpoint (mainly ) The modifications of the copy backup will be downloaded to the client point, and the client point will store or make the same modifications to the local copy backup of the directory information. If the client site also changes / modifies the local copy backup of the directory (R2 ', C2,), then the client site places a warning in a conflict box to advise that the directory on the remote file server endpoint will suffer Modification When the remote file server endpoint cannot communicate with the client point 'it will not be compatible with changes / modifications made by the client point at the same time. Assume that the client adds one or more files or sub / sub directories to the directory (R3,, C2,). It is likely that the attribute changes / modifications made by the (_primary) copy backup of the directory &amp; information are either compatible or not. An example of incompatibility is the (mainly) reproducibility of directory information, which can cause the directory to be read at least by users at the client site. This will prevent clients from making changes to the directory or its contents, including the addition of files or sub / 次 目 #. # {Customer # point increase is related and Μ will upload from this customer point to the remote server case server endpoint, and access rights are described in the directory. Furthermore, if they and the client point out the user's rights 隈 ^ 4 attributes to download to the exchange ^: as indicated by the modified attributes now, modify the new incompatible opt-in &amp; ί ί and locality Save. Otherwise, each of the beta plus sub and sub directory entities will move to conflict

&quot;toJ 五、發明說明(66)&quot; toJ V. Description of Invention (66)

Ui:果該客戶端點重新命名或移動目錄⑻,, L2)或刪除目錄(R5,,r?,、 點執行對應的重新命名、蒋魚將在該遠端檔案伺服器端 〜π更新〒名、移動或刪除運作。 考量現在的情況,當該完 服器端點通訊時,在該遠 ^ ·,,…、法〃、該遠端檔案伺 份⑹,),如案由及/—或個子/戶次山目錄給目錄的(主要)複製備 目錄(Rl,,C3,)做改變/攸知點、。/如果該客戶端點不對 % 端點下載增加檔案及子、: ^端檔案飼服器 該客戶端點改變#改目貫體到該客戶端點。如果 (R2^ , Γ〇. Ν 1 /改目錄的一個或一個以上的屬性 案及子/次目錄實將體從:客遠戶端,案伺服器端點下載增加的槽 起來。如果客戶端點匕戶;&quot;點’而他們是被局部性儲存 C3,),首先要決增加檔案或子,次目錄⑻’ ’ 增加的樓案或子該遠端標案伺服器端點上所 案或子/次目錄有器端點兩者都嘗試增加-個播 和在遠端檔案伺服琴端點肖。如果客戶端點所做的增加 所做的權案及子广所做的增加相容,肖客戶端點 標案飼服器端點,;曰錄貫體將上傳到它們所儲存的遠端 案及子/次目錄實=i,該遠端檔案祠服器端點所做的檔 性儲存起來。另、t下載給客戶端點’而他們是被局部 的權案=/;:匕客戶端點將移動每-個客戶端點 飼服器端點所做的到衝突箱,而它們是和遠端槽案 田荼或子/次目錄不相容。如果客戶端Ui: If the client points to rename or move the directory (,, L2) or delete the directory (R5 ,, r? ,, click to perform the corresponding rename, Jiang Yu will update on the remote file server side ~ π) Considering the current situation, when the endpoint of the server communicates, the remote file server, the remote server, the remote server, etc.), such as the cause and / or The sub / hujishan directory makes changes / knowledge points to the (mainly) duplicated directory (Rl ,, C3,) of the directory. / If the client point is not correct, add files and sub-files to the endpoint download: ^ end file feeder The client point change # 改 目 通体 to the client point. If (R2 ^, Γ〇. Ν 1 / modify one or more attributes of the directory and sub / second directory of the directory from the client remote client, the server endpoint downloads the increased slot. If the client Click "Don't click" and they are stored locally C3,), first of all, you must add files or sub-directories ⑻ '' Added cases or sub-projects on the endpoint of the remote project server Or the sub / sub directory endpoints both try to add-solo and remote endpoints in the remote file server. If the additions made by the client point are compatible with the additions made by Ziguang, the client will mark the endpoint of the feeder; the record will be uploaded to the remote case where they are stored. And the sub / sub directory is set to i, and the file made by the remote file server endpoint is stored. In addition, t download to the client point 'and they are locally authorized = / ;: The client point will move every client point where the feeder endpoint is done to the conflict box, and they are with the remote end Slotted fields or sub / sub directories are not compatible. If the client

第70頁 487843 五、發明說明(67) — ~----一- ^ ^新命名或移動目錄(R4, ,C3,),該遠端檔案伺服器端 ”字,應地重新命名或移動檔案。此外,新檔案及子//次 二錄實體將從遠端檔案伺服器端點下載到客戶端點。如果 戶端點刪除目錄(R5 ’ ,C3,),從遠端檔案伺服器端點下 ,該新檔案及目錄將到客戶端點,客戶端點把他們放在衝 ,箱内。該遠端檔案伺服器端點於是刪除在遠端檔案伺服 器端點上目錄的(主要)複製備份。 考量現在這的情況,當客戶端點無法與遠端檔案伺服 器端點通訊時,將重新命名或移動(C4,)在遠端檔案伺服 器端點目錄之(主要)複製備份,例如··另一個客戶端點。 如果客戶端點不對目錄的本地複製備份做改變/修改 (R1 ,C 4 ),該客戶端點將對應地重新命名或移動目錄的 本地複製備份來和遠端檔案伺服器端點相確認。如果該客 戶端點改變目錄的一個或一個以上的屬性(R2,,C4,),於 是’該客戶端點也將對應地重新命名或移動目錄的本地複 製備份來和遠端檔案伺服器端點相確認。然而,客戶端點 也上傳屬性改變給儲存他們的遠端檔案伺服器端點。以類 似的方法,如果客戶端點增加一個或一個以上的新檀案咬 子/次目錄(R3’ ,C4’),然而,客戶端點也將對應地重新 命名或移動目錄的本地複製備份來和遠端檔案伺服器端點 相確認。然而,客戶端點也上傳新的標案或子/次目錄實 體給儲存他們的遠端檔案伺服器端點。如果客戶端點重新 命名或移動目錄(R4’ ,C4’),首先,要決定是否在該客戶 端點去執行一個完全一樣的重新命名及/或移動操作。如 487843 五、發明說明(68) ,是’就不需要採取行動。否則,各戶端 在衝突箱内表示在客戶I點上的移動或重 警不 能在遠端檔案伺服器端點上生效。如果 知作並不 (R5’ ,C4,),該客戶端點將在衝突箱内放置一個=除目錄 明並不能在遠端檔案伺服器端點上執行刪除胃不以說 該客戶端點也將從遠端檔案伺服器端點載目=二此外, 製備份並將它局部性儲存。 戰目錄的一個複 考量現在的情況’當客戶端點無法 端點通訊時,將刪除在遠端檔案伺服器端ί 伺服器 =复製備份⑽,),如:另—個客戶端;^上目錄的(主 &gt;又有對目錄做改變(R1,,C5,) 如果客戶端點 -個以上的屬性(R2,,C5,),):客、戶疋端改二目錄的-個或 如果該客戶端點增加-個或一個2:將只刪除目錄。 目錄給目錄(R3,, C5,),該宏肖Λ新的檔案或子/次 /次目錄實體到衝突箱。二戶:點將移動新檔案及子 性儲存的複製備份?:果二刪除目錄的局部 (R4,,cq,該客戶端:將移動或重新命名目錄 二事先在运端檔案伺服器端 ‘::以說明已 客戶端點上傳目錄至該遠端槽案二=°此外’也從該 該客戶端點也刪除目錄(R5,,C5M 知點。最後,如果 何行動。 然後就不需執行任 分散式存取控制 如上所述,在讓客戶媸駐六 (最明顯的是傳送給客戶端點目;案資料之前Page 70 487843 V. Description of the invention (67) — ~ ---- 一-^ ^ Newly named or moved directory (R4,, C3,), the word “remote file server side” should be renamed or moved as appropriate In addition, new files and sub // secondary record entities will be downloaded from the remote file server endpoint to the client point. If the user endpoint deletes the directory (R5 ', C3,), the remote file server end Click, the new files and directories will go to the client, and the client will put them in the box. The remote file server endpoint then deletes the (main) directory on the remote file server endpoint. Considering the current situation, when the client cannot communicate with the remote file server endpoint, it will rename or move (C4,) the (primary) copy backup in the remote file server endpoint directory, For example ... another client point. If the client point does not change / modify the local copy backup of the directory (R1, C4), the client point will rename or move the local copy backup of the directory to the remote file accordingly. Server endpoints are identified. If The client point changes one or more attributes of the directory (R2 ,, C4,), so 'the client point will also rename or move the local copy backup of the directory accordingly to match the remote file server endpoint Confirm. However, the client point also uploads the attribute changes to the remote file server endpoint where they are stored. In a similar way, if the client point adds one or more new files (R3 ', C4 '), however, the client point will also rename or move the local copy of the directory accordingly to confirm with the remote file server endpoint. However, the client point also uploads a new bid or sub / subdirectory Entities store their remote file server endpoints. If the client points to rename or move the directory (R4 ', C4'), first, it is necessary to decide whether to perform an exact rename at the client point and / Or mobile operation. For example, 487843 V. Invention Description (68), it is' no action is needed. Otherwise, each client indicates that the mobile or re-alarm on point I of the customer in the conflict box cannot Effective on the remote file server endpoint. If it is not known (R5 ', C4,), the client point will place a conflict box = Except for the directory, it cannot be deleted on the remote file server endpoint Not to mention that the client point will also be loaded from the remote file server endpoint == In addition, a backup will be made and stored locally. A review of the war directory is the current situation when the client point cannot communicate with the endpoint At the time, it will be deleted on the remote file server. Server = Copy backup,), such as: another client; the directory on the (master) has changed the directory (R1 ,, C5, ) If the client points more than one attribute (R2 ,, C5,),): The client and the customer end change one of the two directories or if the client points increase one or two 2: Only the directory will be deleted. The directory gives the directory (R3 ,, C5,), the macro file, or the new / sub / sub / sub directory entity to the conflict box. Second household: Click to move new files and copy backups of child storage? : If the second part of the directory is deleted (R4 ,, cq, the client: the directory will be moved or renamed in advance on the transport file server side ':: to indicate that the client has uploaded the directory to the remote slot. = ° In addition, the directory (R5, C5M knowledge point is also deleted from this client point. Finally, what to do. Then there is no need to perform any decentralized access control as described above. The most obvious is to send to the client point; before the case information

第72頁 负實體及檔案資料的複製 五、發明說明(69) 備份以便讀取、寫入或儲存從客 實體及檔案資料),該遠端檔 點所收到的修改目錄 及目錄實體執行兩道存取檢查、。1服益端點將對檔案資料 器端點將檢查確定請求存取^=是,該遠端檔案伺服 權利權限來執行所請求的標案資料ϊ 足=存取 模式。這些的檢查很可能會非=外=隱含標案共享 ‘檔案伺服器可利用提供存取 ::: 代替不同的端點,i拙―好认士 特疋的棺案或目錄以 個實施你丨,蓋I虛執仃該檢查很可能會很困難。根據這 ,義務應與存取控制相結合, 控制及檔幸丘韋掇彳六备^ ^ 卩權利權限存取 上M Ik H u式存取控制兩者是分散到一個或一個以 上的^點,稱為存取:firtr岳丨丨破赴 伺服器端點不同。 而和提供資料的遠端標案 声祕!W圖表示本發明的一個可以實施例之執行環境,-:〇〇,就像網際網路。在以前,h20到h32標示電 口、、端機’而r20到Γ23標示路由器或交換器。更特別的 疋電腦終鳊機h20到h25表示在一區域網路上的客戶端 點利用路由器r20將形成子網路丨2〇 ;電腦終端機h26表 =一個可動的客戶端點形成子網路hl21。電腦終端機h27 疋個存取控制端點,而它和路由器r21將形成子網路 122」電^腦終端機h28到h30是遠端檔案伺服器端點,而它 $父換器r22將形成子網路123;電腦終端機h31到h33是遠 端槽案飼服器端點,利用交換器r23形成子網路丨24。如說Page 72 Copying of negative entities and file data 5. Description of the invention (69) Backup for reading, writing or storing data from guest entities and file data), the modified directory and directory entity received by the remote archive perform two Road access check ,. 1 The service endpoint will check to determine if the file endpoint is requested to access ^ = Yes, the remote file server has the rights to execute the requested project data. = = Access mode. These checks are likely to be non-external = implicit project sharing 'file servers can be used to provide access :: instead of different endpoints, I would like to implement a coffin or directory of a good judge to implement you丨 It may be difficult to cover up the false inspection. According to this, obligations should be combined with access control. Control and file Xingqiu Wei 掇 彳 备 ^ ^ 卩 rights and permissions access M Ik H u-type access control are both scattered to one or more ^ points , Called access: firtr Yue 丨 丨 break to the server endpoint is different. And the remote bidding that provided the information Secret! The W diagram shows an execution environment of an embodiment of the present invention,-: 〇〇, just like the Internet. In the past, h20 to h32 indicate electrical ports, terminals, and r20 to Γ23 indicate routers or switches. More special computer terminal machines h20 to h25 indicate that client points on a local network will form a subnet using router r20 丨 20; computer terminal h26 table = a movable client point forms a subnet hl21 . Computer terminal h27 has an access control endpoint, and it and router r21 will form a subnet 122. Computer terminals h28 to h30 are remote file server endpoints, and its parent switch r22 will form Subnet 123; The computer terminals h31 to h33 are the endpoints of the remote tank feeder, and the switch r23 is used to form a subnet 丨 24. As said

第73頁 487843 五、發明說明(72) ^驟S408收到該客戶端點h26的請求。在步驟^ , 該运端標案飼服器端點h28起初先決定是否存取控制已經 為樓案或目錄的存取請求而指定給另一個端點。如果不 是,該遠端檔案伺服器端點h28將執行步驟S42〇, 2, 3广26二428應〇 ’並需要去檢查存取權利權限及 明求存取的檔案共旱模式以及由客戶端點h26所雍有的檔 :或目錄的複製備份版本 '然而,在此情況下,該遠端檔 案伺服器端點h28決定存取控制已經指定到另一個端點, ^就是端點h27。因此’在步驟5514中,該遠端檔案伺服 器端點h28經由網際網路推進客戶端點h26的請求給存取控 制端點h27,而版本控制為特定的檔案指定。 如果該运‘檔案伺服器端點h 2 8彳貞測到該存取控制端 點h27已經同意那個存取(訊息,,A”),然後該遠端檔案伺服 器端點h2 8將在所存取的檔案或目錄上執行一版本檢查, 正如同上述的步驟S426,S428,及以3〇。為執行在&amp;驟 S4 2^中的版本檢查,該遠端檔案伺服器端點h28很可能需 要貫際的印求汛息,而它很可能已經直接從客戶端點h 2 6 被,送到存取控制端點h27。例如,存取控制端點h27傳送 到遠端檔案伺服器端點h28的同意訊息,將提供足夠的訊 息來執行剩餘的步驟。 ,另一方面’該存取控制端點不同意被請求的存取(訊 息&quot;Βπ )运也是有可能的。在此情況下,遠端檔案伺服器端 點h28將使在步驟S424中的存取失敗。 現在考慮在存取控制端點h 2 7上執行那些步驟。在存Page 73 487843 V. Description of the Invention (72) ^ Step S408 receives the client's request for point h26. At step ^, the transport end server feeder endpoint h28 initially decides whether access control has been assigned to another endpoint for access requests to the building or directory. If not, the remote file server endpoint h28 will execute steps S42, 2, 3, 26, 428, and 0 ', and need to check the access rights and permissions, and the file sharing mode required for access and the client. Point h26 has a file: or a duplicate copy of the directory 'However, in this case, the remote file server endpoint h28 decides that access control has been assigned to another endpoint, which is endpoint h27. Therefore, in step 5514, the remote file server endpoint h28 advances the request from the client point h26 to the access control endpoint h27 via the Internet, and version control is specified for the specific file. If the file server endpoint h 2 8 detects that the access control endpoint h 27 has granted that access (message, A "), then the remote file server endpoint h 2 8 will A version check is performed on the accessed file or directory, as in steps S426, S428, and 30 as described above. To perform the version check in &amp; step S4 2 ^, the remote file server endpoint h28 is very It may require consistent information, and it is likely that it has been sent directly from the client point h 2 6 to the access control endpoint h27. For example, the access control endpoint h27 is transmitted to the remote file server Point h28's consent message will provide enough information to perform the remaining steps. On the other hand, it is also possible that the access control endpoint does not agree with the requested access (message &quot; Bπ). In this case Next, the remote file server endpoint h28 will fail the access in step S424. Now consider performing those steps on the access control endpoint h 2 7.

第76頁 487843 五、發明說明(73) 取控制端點h 2 7上將收到來自遠端檔案伺服器端點匕2 8或客 戶端點h26的請求。在步驟S522及S524中,該存取控制端 點h 2 7決定是否正在請求的客戶端點h 2 6有足夠的存取權利 權限來執行請求以及是否那個被請求的存取堅守為個別檔 案由本地的檔案應用程式介面所載明的外顯及隱含檔案共 享模式。如果這些檢查的其中一種失敗,該存取控制端點 h 2 7將經由網際網路傳送一個訊息給遠端檔案伺服器端點 h28及客戶端點h26,並通知他們不能執行該請求的存 取,該特定的檢查在步驟S528中失敗(訊息&quot;B”)。另一方 面,如果所請求的存取通過在步驟S522及§524中的兩道檢 查,該存取控制端點h28將經由網際網路傳送一個訊息給 f戶端點h26及遠端檔案伺服器端點_並同意在步驟^〇 中的存取(訊息,f A ”)。 分散式版本控制 :於存取控制,那些步驟結合版本控制能夠指定给另 二而它是不同於遠端檔案伺服器端㈣。該版本 ::“ :ϋ端點是以一個版本控制端點被提及到。再 i所是為減低在遠端槽案飼服器端點上的麼 : I本控制對保持檀案完整性的目標 個^荦的二柃,此可以確定在遠端檔案伺服器端點上的一 存,檀案資料的最新版本上執行。 是不同的端點。還有,π同的版::::是相同的端點或 不同的構案1同的實質儲定給 寺等。然而,在某些應 &lt;1 五、發明說明(74) 用中,對相同的槽幸右相回 制可能是有利的。 %點執行版本控制及存取控 考^這^種情況’當在—個版本控制端點上執行版本控 t 1 Λ ί有執行存取控制。例*,假設端點—是一 踹點二黑9兮„28是個別的遠端檔案伺服器端點,以及 =點h3i疋該版本控制端點。圖15說明是一個已在圖㈣ Μ =兰s &amp;過程°只有在圖1 G的過程及圖1 5的過程之 間的差異將被詳細描述。 假=客戶端點h26希望在一個版本檢查的情況下存 sVo =或:個目錄。照這種情況’該端點將執行步驟 =議’ S404以及_。起初,也假設事先是不知 ^ 戶端點h26指定該版本控制。在步驟S602中,該客 :=26首先決定是否該客戶端點知道指定給檔案或目 錄存取的一個版本控制端點。如 h26將經由網際網路傳逆一個咬书认:k /各戶如點. + I 個清求給遠端檔案伺服器端點 8來存取在步驟S4〇8中的特定的檔案,並且等待收到在 =驟S409到S410中的回應。假設㈣―回應。接著,在 :驟S608中’該客戶端點將決定是否將從一端點收到該回 ,,而它是不同於該遠端檔案伺服器端點_,因為它以 =本控制端點識別本身(也就是,版本控制端點h3i)〇有 =的是,該客戶端點h26將在通訊前先認證認證它和盆 洛端點的一連接。如果是,該客戶端點h26儲存(如.在呓 ,體12或磁片15中)一該版本控制端點h31之指示, 在步驟S61〇中去存取播案或目錄。於是,該客戶端點更Page 76 487843 V. Description of the invention (73) A request from the remote file server endpoint 28 or the client endpoint h26 will be received on the fetch control endpoint h 2 7. In steps S522 and S524, the access control endpoint h 2 7 determines whether the requesting client point h 2 6 has sufficient access rights to execute the request and whether the requested access is adhered to by individual files. Explicit and implicit file-sharing modes in the local file application interface. If one of these checks fails, the access control endpoint h 2 7 will send a message to the remote file server endpoint h28 and client point h26 via the Internet and notify them that the requested access cannot be performed , This particular check fails in step S528 (message &quot; B "). On the other hand, if the requested access passes both checks in steps S522 and §524, the access control endpoint h28 will pass The Internet sends a message to the user endpoint h26 and the remote file server endpoint _ and agrees to the access (message, f A) in step ^ 〇. Decentralized version control: For access control, those steps combined with version control can be assigned to another and it is different from the remote file server port. This version :: ": The endpoint is mentioned as a version control endpoint. Is this to reduce the endpoint on the feeder in the remote tank case: This control pair maintains integrity of the case It can be determined that the two files are stored on the remote file server endpoint and run on the latest version of the data. It is a different endpoint. Also, the same version of π ::: : It is the same end point or a different construction. 1 The same substantial reserve is given to the temple, etc. However, in some applications <1. V. Invention Description (74) In the application, it is possible to revert to the same slot. It is advantageous.% Points to perform version control and access control. ^ In this case, when version control is performed on a version control endpoint, t 1 Λ ί is performed to perform access control. One point, two black points, 9 and 28 are individual remote file server endpoints, and = point h3i is the version control endpoint. Fig. 15 illustrates a process that has been shown in Fig. 15M and the process. Only the difference between the process of Fig. 1G and the process of Fig. 15 will be described in detail. False = client point h26 hopes to store under a version check sVo = or: a directory. In this case, the endpoint will perform steps = negotiation 'S404 and _. At first, it was also assumed that the user endpoint h26 specified this version control in advance. In step S602, the guest: = 26 first decides whether the client point knows a version control endpoint assigned to the file or directory access. For example, h26 will transmit a bitcoin recognition via the Internet: k / households as points. + I request to the remote file server endpoint 8 to access the specific file in step S408, and Waiting to receive responses in steps S409 to S410. Assume ㈣—response. Then, in step S608, 'the client point will decide whether to receive the reply from an endpoint, and it is different from the remote file server endpoint_ because it identifies itself with the control endpoint ( That is, the version control endpoint h3i) has the value that the client point h26 will authenticate and authenticate a connection with the Penlo endpoint before communication. If so, the client points h26 to store (eg, in 呓, volume 12 or magnetic disk 15) an instruction of the version control endpoint h31, and accesses the broadcast or directory in step S61〇. Therefore, the client points more

五、發明說明(75) h26將執行剩餘:步驟s“6,“12,s4“,“η等。 錄以及命該客戶端點㈣希望存取相同的稽案或目 ^ ^ t 一個版本檢查。對檔案或目錄的下一個存取, 決定它知道為在步驟謂中的個別的播 ^目錄的版本控制端點。因此,在步職財,該客 戶‘點將經由網際網技吉姑屑、、,V. Description of the invention (75) h26 will perform the remaining: steps s "6," 12, s4 "," η and so on. Record and order the client to click and want to access the same audit or project ^ ^ t a version check. The next access to a file or directory determines the version control endpoint it knows for the individual broadcast directory in the step. Therefore, in the step job, the customer ’s ‘points’ will be

h31 〇 J 牡I I不傅送該絢求之前,該客戶端點h2ih31 〇 J II I do not send the request before the client points h2i

二=: !:版ΐ控制端點的一種連接。接著,步驟S60〖 : 戶端點h26等待直到客戶端點h26決定是否收 到-個回應。如果沒有,有可能是該版本控制端點⑽有 缺陷或那個版本控制已經再度被指定給另一個不同的端 點。在此情況下,該客戶端點h26送出它的存取請求給傳 上面步驟S408中的遠端檔案伺服器端點h28。如果收到一 個回應,該客戶端點h 2 6將執行該剩餘步驟^ 1 6, S412 , S424 , S418 等。Two =:!: Version: A connection to the control endpoint. Next, step S60: The user endpoint h26 waits until the client point h26 decides whether to receive a response. If not, it is possible that the version control endpoint is defective or that version control has been reassigned to a different endpoint. In this case, the client point h26 sends its access request to the remote file server endpoint h28 in step S408 above. If a response is received, the client point h 2 6 will perform the remaining steps ^ 16, S412, S424, S418 and so on.

考慮到對客戶端點h 2 6而言,存取一個檔案或目錄是 否需要一個版本檢查是有可能的。該存取很可能導致在遠 端檔案伺服器端點保存(即,透過一個上傳過程)槽案或目 錄的(主要)複製備份的永久性修改。如果其發生7該客戶 端點將通知版本控制端點h31檔案或目錄的版本已經^ 變,是令人希望的。因此,在執行步驟S414之後,該客戶 端點h26將決定是否需要對在步驟s 640中的一個被存取標 案或目錄作一個版本更新。如果不是(如:該存取方式是只 真對本地的一快取複製備份,該存取並沒有導致在遠端檔Considering that for client point h 2 6 it is possible to access a file or directory requiring a version check. This access is likely to result in the permanent modification of a (primary) copy backup of a saved case or directory at a remote file server endpoint (ie, through an upload process). If this happens, the client endpoint will notify the version control endpoint h31 that the version of the archive or directory has changed, which is desirable. Therefore, after performing step S414, the client endpoint h26 will decide whether a version update is required for an accessed project or directory in step s640. If not (eg: the access method is only a local cache copy backup, the access does not result in a remote file

487843 五、發明說明(76) 案伺服器端點上的檔案或目錄的複製備份的修改儲存, 或者沒有分開的版本控製端點已經被指定給更新的槽案或 目錄),該客戶端點h26將跳到步驟S400。另一方面,如果 客戶端點h26真的在遠端檔案伺服器端點上為儲存,而上 傳修改給一個檔案或目錄,因為一個版本控制端點已經 受到指定,該客戶端點h26將執行步驟S642。在步驟S642 中’該客戶端點h26傳送一個版本更新訊息給版本控製端 點 h 3 1 〇487843 V. Description of the invention (76) The file or directory on the server endpoint is copied, modified, or stored, or no separate version control endpoint has been assigned to the updated slot or directory. Go to step S400. On the other hand, if the client point h26 is really stored on the remote file server endpoint and uploads the modification to a file or directory, because a version control endpoint has been specified, the client point h26 will perform the steps S642. In step S642, the client point h26 sends a version update message to the version control point h 3 1 〇

現在考量在該遠端檔案伺服器端點上的過程,以回應 在步驟S408中從客戶端點h26收到一個請求。在步驟S6 = 中’該遠端檔案伺服器端點h28起初先決定是否存取控制 已經為檔案或目錄存取請求而指定給另一個端點。如果 不是,該遠端檔案伺服器端點h28將執行步驟S420,Now consider the process on the remote file server endpoint in response to receiving a request from the client point h26 in step S408. In step S6 = ', the remote file server endpoint h28 initially decides whether the access control has been assigned to another endpoint for a file or directory access request. If not, the remote file server endpoint h28 will execute step S420,

S422,及S424,並將檢查存取權利權限及請求存取的轉 案共享模式以及由客戶端點h26所擁有的檔案或目錄。然田 而,在此情況下,該遠端檔案伺服器端點h28將決定該、版 本控制已經指定給另一個端點,端點h27。因此,在步禪 s614中,該遠端檔案伺服器端點h28將經由該網際網路推 進客戶端點h26的請求給版本控制端點…},而版本控制 已經為特定的檔案而受到指定。 &quot; 如果該遠端擋案伺服器端點h2 8偵測到該版本控制端 點h 2 7已經元成檢查播案或目錄的版本(訊息&quot;[,,或&quot;d &quot;), 該遠端檔案伺服器端點h28將執行像上述的步驟S42〇,, S422及S424中的存取權利權限及檔案共享模式檢查。S422, and S424, and will check the access rights and permissions and the transfer sharing mode of the requested access, and the file or directory owned by the client point h26. However, in this case, the remote file server endpoint h28 will decide that the version control has been assigned to another endpoint, endpoint h27. Therefore, in Buchan s614, the remote file server endpoint h28 will push the request of the client point h26 via the Internet to the version control endpoint ...}, and version control has been specified for a specific file. &quot; If the remote archive server endpoint h2 8 detects that the version control endpoint h 2 7 has been checked to check the version of the broadcast or directory (message &quot; [,, or &quot; d &quot;), The remote file server endpoint h28 will perform access rights and file sharing mode checks in steps S42, S422, and S424 described above.

第80頁 487843Page 487 843

五、發明說明(77) 在執行步驟S422之後,如 為已經通過存取權利權限檢查 ^ $的檔案或目錄被視 端檔案伺服器端點h28將執行享模式檢查,該遠 該遠端檔案伺服器端點h28、+二^ 。在步驟S638中, 查。如果還沒有,該遠端否已經執行一版本檢 的步驟S426以決定是否兮客/飼服器端點h28將執行上述 綠的最新版本。疋如疋果否是该,客4^ 客戶端點h26有所存取的“ ::f案伺服器端點將通知 S428)。如果沒有:該的最新版本(步驟 ,資料或目錄訊息“戶;咖端點二^^ 下,該版本控制端點h31將執行版本檢杳。在^此3障況 客戶端點h26具有所存取的栲宏$ Β μ 一 決疋疋否該 &quot;C&quot;) Ht::: 案或目錄的最新版本(訊息 載所存取的擋案或目錄的最新版本(訊息 S428。。^端檔案伺服器端點將個別地執行步驟以30或V. Description of the invention (77) After executing step S422, if the file or directory that has passed the access right permission check ^ $ is viewed by the end of the file server endpoint h28, the shared mode check will be performed. Device endpoint h28, + 2 ^. In step S638, check. If not, whether the remote end has performed a version check step S426 to determine whether the guest / feeder endpoint h28 will execute the latest version of the above green. If this is not the case, the client 4 ^ client point h26 has access to the ":: f case server endpoint will notify S428). If not: the latest version of this (steps, data or directory information" households; Under endpoint 2 ^^, the version control endpoint h31 will perform a version check. In this case, the client point h26 has an access macro $ B μ. Never say "C". ) Ht ::: The latest version of the file or directory (message contains the latest version of the file or directory accessed (message S428 ...) The end of the file server endpoint will individually perform steps to 30 or

現在考慮在該版本控制端點h31上執行之步驟。在該 ^ f控制端點h31上將收到從該遠端檔案肩服器端點h28或 客戶端點h26的請求。在步驟別22中,該版本控制端點將 決定是否那個請求只是最近在該遠端檔案伺服器端點h28 f去修改一個檔案或目錄的版本數量更新的請求。如果 是,該版本控制端點h31將更新版本數量結合在步驟S624 中的檔案或目錄。替代地,如果該訊息是一個請求去檢查 在客戶端點h26上所存取的一個檔案或目錄的複製備份版 本,該版本控制端點h31將執行步驟S626。在步驟S626Now consider the steps performed on this version control endpoint h31. A request from the remote file server endpoint h28 or the client point h26 will be received on the control endpoint h31. In step 22, the version control endpoint will determine whether the request was a request to update the version number of a file or directory recently at the remote file server endpoint h28f. If so, the version control endpoint h31 combines the updated version number in the archive or directory in step S624. Alternatively, if the message is a request to check a duplicate backup version of a file or directory accessed on the client point h26, the version control endpoint h31 will perform step S626. At step S626

第81頁 五、發明說明(78) 中’該版本控制端點h31將決定是否正在請求的客戶 端點 h26有所存取的檔案或目錄的最新 柃π尸® β 斤版本。如上所述,這種 疋ΐ過決定是否客戶端點所提供的 控制端點上的版本數量相符,就 如同與所存取的檔案或目錄對應。如果版太相符Γ宏冷诚 點h26有最新的複製備份),兮版太 _ ^ 炎表爾伪这版本控制端點h31將經由網 送一個訊息” C”給客戶端點_及遠端稽案伺服器 = h28,並表示客戶端點有所存取的檔案或目錄的最新 ^ 如果該版本不符(客戶端點h26有一個過期的複製備 ,伤),該版本控制端點h31將經由網際網路傳送一個訊息 ” D”,並表示該客戶端點h26有所存取的檔案或目錄(或~者 可能沒有檔案或目錄)的一個過期或失效的複製備份。 在執行版本及存取控制二者的情況下,將可能整合這 ,個過程的步驟。例如,在第15圖中,步驟s 512及S 514. 月b夠在步驟S612之前插入。只有在步驟S51 2採取,,不,,分 支時,才能執行步驟S612。像這樣,一個結合的存取控 制及版本控制端點可以執行所有的步驟S522 , δ524 , S528, S530, S622, S624, S6 28 及 S630。該端點只需 傳送訊息’fB”,’’C’’,及” D,,,當訊息nCn及,,D',出現促使遠 端檔案伺服器端點執行步驟S6 3 8。還有,如果有一個存 在’將可以修改一客戶端點以去接近一存取控制端點,而 且如果有一個存在,將允許存取以去接近一版本控制端 點。 最後’本發明之其餘優點、目標與特徵將藉由結合下Page 81 5. In the description of the invention (78), the version control endpoint h31 will determine whether the client h26 is accessing the latest version of the file or directory that the endpoint h26 has access to. As mentioned above, this process of deciding whether or not the number of versions on the control endpoint provided by the client point matches the number of versions or directories accessed. If the version is too consistent, the macro is honest, h26 has the latest copy and backup), the version is too _ ^ yanpiao pseudo This version control endpoint h31 will send a message “C” to the client point and remote audit Case server = h28, and indicates that the client point has access to the latest file or directory A message "D" is sent over the network, and indicates that the client has an expired or invalid copy backup of the file or directory (or there may be no file or directory) accessed by h26. In the case of performing both version and access control, it will be possible to integrate this process step. For example, in FIG. 15, steps s 512 and S 514. Month b is enough to be inserted before step S612. Step S612 can be executed only when branching is taken in step S51 2. As such, a combined access control and version control endpoint can perform all steps S522, δ524, S528, S530, S622, S624, S6 28, and S630. The endpoint only needs to send the messages 'fB ",' 'C' ', and" D, ", and when the messages nCn and ,, D', appear, it prompts the remote file server endpoint to execute step S6 38. Also, if there is an existence, it will be possible to modify a client point to access an access control endpoint, and if there is one, it will allow access to access a version control endpoint. Finally, the remaining advantages, objectives, and features of the present invention will be combined

第82頁 487843 五、發明說明(79) 列說明與圖形之詳細描述,使熟悉本項技藝人士將了解本 發明可加以修改和改變,不違離本發明請求專利部份界 定之精神和範圍。 圖示簡單說明 第1圖是說明士 路; 發明所希望使用的實施例中的說明的網 第2圖是說明為筮 檔案伺服器·弟一圖的網路中解釋的電腦終端機或遠端 5: K:根據本發明的-個實施例的說明架構; 說明·螢幕δ ^根據本發明的一個實施例展示在客戶端點的 第5圖、第6α盘筮rr® η μ 描述-個力…位新圖二明根據本發明的另-實施例, 六酤淫从m 位新的客戶端點使用者到允許存取實質儲 :子裝置θ的用戶群體中-個過程流程圖。 认7*圖名疋固說明根冑本發明的一個實施例描述一個認證過程 的流程圖。 21圖;、η第9圖疋說明根據本發明的-個實施例描述個別地 一下載過程及上傳過程的流程圖。 第1 0,疋說明才艮據本發明的_個實施例描述一 程的流程圖。 ❿ 第11圖與第1 2圖是以列表方式說明根據本發明的 例以解釋一個恢復通訊(reconciliation)的過程。貫知 第13圖是解釋本發明的另一個實施例用$的說明環境。 第1 4圖疋說明根據本發日月的另_個實施例說明分 控制的流程圖。 狀%仔取 第15圖是說明根據本發明的另_個實施例說式 控制的流程圖。 狀Α版本 487843 圖式簡單說明 圖號說明 I 骨幹 11-16 區域網路 hl-hlO 電腦終端機 rl-rl8 交換器或路由器 100 廣域網路、網際網路 a-d 存取網路 A-C 骨幹網路 10 電腦終端機 II 處理器或中央處理器(CPU ) 12 記憶體 13-1 -13-N輸入/輸出(I /0 )裝置 14 匯流排 15磁片 1 6圖像加速器及顯示螢幕 1 7鍵盤及滑鼠 2 0 容量管理 3 0檔案系統 40 本地的磁片儲存(local disk store) 41容量(使用者、群體、存取控制清單、檔案存取物件) 44容量 45容量索引Page 82 487843 V. Detailed description of the description (79) and descriptions of the invention, so that those skilled in the art will understand that the invention can be modified and changed without departing from the spirit and scope of the invention's claimed part. Brief description of the diagram. Figure 1 is a description of the road; the net in the embodiment intended for use in the invention. Figure 2 is a computer terminal or remote computer explained in the network described as a file server. 5: K: Explanation structure of one embodiment according to the present invention; Description · Screen δ ^ According to an embodiment of the present invention, the fifth figure and the sixth alpha disc 筮 rr® η μ at the client point are described. ... a new picture Erming According to another embodiment of the present invention, a process flow from m new client users to a group of users who are allowed to access the physical storage: sub-device θ. Figure 7 * illustrates the flow chart of an authentication process based on one embodiment of the present invention. Figure 21; Figure 9 illustrates a flow chart describing an individual download process and upload process according to one embodiment of the present invention. At 10th, a flowchart is described to describe a process according to one embodiment of the present invention. ❿ Figures 11 and 12 illustrate the example of the present invention to explain a process of reconciliation in a list manner. Known Fig. 13 is an explanatory environment using $ to explain another embodiment of the present invention. Fig. 14 is a flowchart for explaining the sub-control according to another embodiment of the present day and month. Fig. 15 is a flowchart illustrating the control according to another embodiment of the present invention. Status A version 487843 Schematic description of the diagram Number description I Backbone 11-16 LAN hl-hlO Computer terminal rl-rl8 Switch or router 100 WAN, Internet ad access network AC Backbone network 10 Computer Terminal II processor or central processing unit (CPU) 12 memory 13-1 -13-N input / output (I / 0) device 14 bus 15 magnetic disk 1 6 image accelerator and display screen 1 7 keyboard and slider Mouse 2 0 Capacity management 3 0 File system 40 Local disk store 41 capacity (user, group, access control list, file access object) 44 capacity 45 capacity index

第85頁 487843 圖式簡單說明 48 快取檔案和資料夾 5 0 公用伺服器 5 4 容量管理網頁 5 6 約定伺服器Page 85 487843 Simple illustration of the diagram 48 Cache files and folders 5 0 Public server 5 4 Capacity management web page 5 6 Contract server

第86頁 61-62檔案 祠 服 器 100 網際 網 路 1000 視窗 1002 視窗 控 制 按 紐 1020 標準 按 钮 棒 1025 位址 棒 1022 領航按 紐 1032 1034 資 料 夾 1042 -1044 檔 案 h20 - h32 電 腦 終 端 機 r20- r23 交 換 器 或 路 由 器 200 廣 域 網 路 網 際網路 a-d 存 取 網 路 121 - 124 次 網 路Page 86 61-62 File Server 100 Internet 1000 Window 1002 Window Control Button 1020 Standard Button Bar 1025 Address Bar 1022 Pilot Button 1032 1034 Folder 1042 -1044 File h20-h32 Computer Terminal r20- r23 Switch or router 200 WAN Internet ad access network 121-124 times network

Claims (1)

487843 六、申請專利範圍 !驟:-種用於提供多用戶稽案儲存的方法,包括下列步 ;由一廣域網路,使得-個或-個以上的使用者之 預先同思訂閱的使用者群體之每一使用者在任音 置中去連接一任意的客戶端點到一遠端播月I端^ 之每一使用者去在叛兮从1先同意訂閱的使用者群體 端點連ί到兮達端心f案群體的檔案’經由各自的客戶 鈿點運接到該退鈿檔案伺服器端點夺尸 端點同時包含允許預先同音&amp;隹该通知檔案伺服器 個使用者去存取該檔閱的使用者群體中之超過一 (C)藉由在該遠端檔案伺服考姓赴士上 每,檔案以在該遠端檔案伺服器端點:J 2制每個去存取 在每個檔案的個別部份上作L ” 维持檔案整合, 中最近更新1以在該遠:槽案飼服器端點 執行以存取每個檔案,因此二^器為點中之每一個去 程式介面運作就如同所有多用:^有本地的作業系統應用 就如同在相同區域網路上 二f用程式存取該檔案功能 戶端點,以及 k檔案之該遠端伺服器與客 (d}對一特定之檔案群體中的播# 端點去作為存取控制。 、虽案指定一可存取控制的 2 如申請專利範圍第1 Ji沾士、 (e )在一特定之客戶端點中4法,更包括下列步驟: 中之一個去存取控制,以及中印求對該檔案群體中的檔案 (f) 如果該一擔崇&amp; 示 /、有疋在如果該可487843 VI. Scope of patent application! Step:-A method for providing multi-user auditing storage, including the following steps; a wide area network enables a user group of one or more users to subscribe in advance Each user connects to an arbitrary client point in a remote location to a remote broadcast terminal I. Each user goes to the network from the endpoint of the user group that first agreed to the subscription. The files of the Da Duanxin case group were shipped to the retired file server endpoint via their respective client sites. The corpse endpoint also contains the allowance of pre-homing &amp; the notification file server users are required to access the More than one (C) of the user's group of the archives will read the surname on the remote file server, and the file will be on the remote file server endpoint: J2 system. L ”is maintained on individual parts of each file to maintain file integration. The most recent update 1 is in the far: slot server feeder endpoints are executed to access each file, so the two programs go to each of the points. The interface works like all things: ^ A local operating system should The program uses the same function as the program to access the file endpoint on the same local area network, and the remote server and guest (d) of the k file use the broadcast endpoint in a specific file group as a storage Take control. Although the case specifies an access control 2 such as the scope of the patent application No. 1 Ji Zhanshi, (e) 4 methods in a specific client point, including the following steps: , And China and India are seeking for the files in the archives group (f) 第87頁 擋案疋該特定的檔案 487843 六、申請專利範圍 --——— 制的端點允許’在該特定的客戶端點中存 的福茶。 ,更包括下列步驟: 遠端檔案伺服器端點發 ;、如申請專利範圍第2項的方法 (g )從該特定之客戶端點中對該 出請求,以及 對該可存 (h)回應以決定出該一檔案是該特定的檔案 取控制的端點送出該請求。 〃 4、如申請專利範圍第3項的方法,更包括步驟:Page 87 Case filing: This particular file 487843 6. Scope of patent application-The endpoint of the system allows to ‘blessed tea stored in this particular client point. , Including the following steps: remote file server endpoints; such as the method (g) of the scope of the patent application (g) request from the specific client point, and the response (h) to the The endpoint that decides that a file is the particular file take control sends the request. 〃 4. If the method of item 3 of the patent application scope further includes the steps: Γ點)接在物該特定庙的客戶端點中去回應以從該可存取控制的 鈿點接收一回應,直接從該特定的客戶端點對該可存 制的端點發出關於去存取該特定檔案之進一步的訊拿。二 5 '如申請專利範圍第1項的方法,更包括步驟:°心。 (e) 對一版本控制端點指定該特定檔案的版本控制。 6、 如申請專利範圍第5項的方法,更包括下列步驟: (f) 在該特定的客戶端點中請求,為確定至少該特定檔 案之一特定的複製備份之一部份是該檔案之該特定的田 備份之個別的部份之最近更新之版本,以及(Γ point) is connected to the client point of the specific temple to respond to receive a response from the accessible control point, and directly sends the relevant storage point to the saveable endpoint from the specific client point. Take further information on that particular file. 2 5 'The method of claim 1 in the scope of patent application further includes the step of: ° heart. (e) Specify version control for a particular archive for a version control endpoint. 6. If the method of applying for item 5 of the patent scope further includes the following steps: (f) request at the specific client point to determine that at least one part of a specific copy backup of the specific file is the The most recent updated version of the individual parts of that particular Tian backup, and (g )_/、有在如果該版本控制端點許可下去存取該特定伊 案之該特定的複製備份之該部份。 虽 7、 胃如申請專利範圍第6項的方法,其中該特定的客戶端 點是在實質地區域的座落在該特定的客戶端點之儲存裝置 中去儲存該特定的複製備份之該部份。 8、 如申請專利範圍第6項的方法,更包括下列步驟: (h )從該特定的客戶端點到該遠端檔案伺服器端點,去(g) _ /, if the version control endpoint has permission to access the portion of the particular copy backup of the particular case. Although 7, the stomach is the method of applying for the scope of patent application No. 6, wherein the specific client point is a storage device located in the specific client point in a substantial area to store the specific copy and backup of the department. Serving. 8. If the method of claim 6 of the scope of patent application, further includes the following steps: (h) from the specific client point to the remote file server endpoint, go 第88頁 六、申請專利範圍 發出請求,以確定至少哕 — 版本,以及 少該特疋檔案之一部份是最近更新之 (i)回應去決定出該一於安日 ― 控制的端點送出該訊息案疋該特疋的槽案,對該版本 V、如户申請專一利範圍第8項的方法,更包括步驟·· 去接收回“;*# 戶端點中對應以從該版本控制的端點 玄接收回應,直接從該特定 的版本進一步的1自^” 發出關於特定播案 .Λ 的1^ Μ到該版本控制的端點。 10、如申請專利範圍第9項的方法,豆由上 定的檔案,從該特定的版:::去修改該特 1:::=更新的訊息以指示出在該特定的== ]2、Λ 檔案的該存取控制的端點。 (e) 當-特,乂 ϋ 法’更包括步驟: ^ , m , &amp; 的客戶鳊點疋在與該遠端檔案伺服n % 遠端標案伺服器到該 Φ 也是該特定的客戶端點所缺乏,要存取而且 近士:的部份之複製備份,,中在任何;特J檔案之最 ”業系統應用程式介面指定去依附明=。藉由該本地 刀旱模式,每-客戶端點在與該遠端槽案二,確的槽案 13、如中請專利範圍第12項的方法,&quot;更包5器通訊時。 (f) 當兮杜^ I包括步驟·· ”特疋的客户端點是經由廣域網路在與該遠端槽Page 88 VI. Request for Patent Scope to make at least 哕 —version, and a part of the special file is the most recently updated (i) response to decide which one is controlled by Anri-sent by the endpoint This message case is the case of this special case. For the version V, if the household applies for the exclusive scope of item 8, the method further includes the steps to receive back "; * # the user endpoint corresponding to control from this version. The endpoint Xuan receives the response, and sends 1 ^^ from the specific version further 1 ^^ about the specific broadcast case. Λ to the version-controlled endpoint. 10. If the method of applying for the item 9 of the patent scope, the file specified above, from this specific version ::: to modify the special 1 ::: = updated message to indicate that the specific ==] 2 , Λ The endpoint of this access control for the file. (e) When the special method, the method further includes the steps: ^, m, & the client clicks on the remote file server n% the remote project server to the Φ is also the specific client The point is lacking, to access and copy: Part of the backup copy, which is in any; Special file of the "J file" industry system application program interface is specified to be attached =. With this local knife and drought mode, every- The client points to the remote slot case two, the correct slot case 13, such as the method of the patent scope item 12, "more package 5 devices to communicate. (F) When the step ^ I includes steps ... The special client point is via the WAN to communicate with the remote slot 第89頁 487843 六、申請專利範圍 _ 案飼服器端點通訊時,如果該特定 的襠案,從該特定的客戶端點上 訊以=修改該特定 特定播案之修改效^該特定播案之複製備份,以達成該 14、 如申請專利範圍第13項的方法 步驟,在該遠端檔案飼服器端點上儲存對該特m果之 製備份遞增改變。 了飞特疋槽案之複 15、 如申請專利範圍第1 3項的方法,# a “ ★ 步驟,藉由在該遠端檔案飼匕〇改效果之 之-複製備份修改作為更新特定槽案 在複製備份。 重覆寫入該特定檔案之現 16、 如申請專利範圍第13項的方法,更 (g)如果一與該遠端檔案飼服器端點通訊之^存的 端點已經指示希望去儲存該特定的檔案,鈇德的客戶 遠^案飼服器端點下載用於更新該特檔= 之該-貝,’回應該特定的客戶端點 備份 祠服器端點中之用於更新該特定權案 檔案 訊,到該儲存的客戶端點。 &gt;、複1備伤之該資 丨、、ΐ!請專利範圍第12項的方法,更包括牛驟· (&quot;在關閉該特定的檔案之前如 t括步驟· 閉與該遠端檔案伺服器端點的通以、疋的客戶端點關 案伺服器端點中廢止該特定的檔幸、,然後在該遠端檔 點經由廣域網路與該遠端檔案^ ^使侍其他的客戶端 檔案。 通訊以存取該特定的Page 89 487843 VI. Application for patent scope _ When communicating with the endpoint of the server, if the specific crotch case is reported from the specific client point, the modification effect of the modification of the specific broadcast ^ the specific broadcast Copy the backup of the case to achieve the method steps of item 14, such as the scope of patent application item 13, and store the incremental backup of the special backup on the endpoint of the remote file feeder. Resolved the case of the Feite special case, such as the method of item 13 of the patent application, # a "★ steps, by modifying the effect in the remote file-copy the backup modification as an update of the specific case Copy and backup. Repeat the current writing of the specific file 16. For example, the method in the scope of patent application No. 13, more (g) if a stored endpoint communicating with the remote file feeder endpoint has been indicated I want to store this specific file, and the client of the German company downloads the server endpoint to update the special file = Zhi-bei, 'Respond to the specific client point to backup the server endpoint. To update the file of the specific rights file, go to the client's point of storage. &Gt; 、 Repair the asset 丨 、、 ΐ! Please use the method in the 12th item of the patent scope, and include the step (&quot; Steps are taken before closing the specific file. Close the communication with the remote file server endpoint, close the client's endpoint, close the server endpoint, and then delete the specific file. The file is connected to the remote file via the WAN ^ ^ to serve other client files To access the particular communication 487843 六、申請專利範圍 18、如申請專利範圍第1 2項的方法,更包括下列步驟: (f )在該特定的客戶端點與該遠端檔案伺服器端點之間 關閉該通訊通道;以及 (g )當與該遠端檔案伺服器端點無法通訊時,使得該特 定的客戶端點去存取該下傳之該特定的檔案之複製備份。 19、如申請專利範圍第1 8項的方法,更包括步驟:487843 6. The method of applying for the patent scope 18, such as the patent application scope item 12, further includes the following steps: (f) closing the communication channel between the specific client point and the remote file server endpoint; And (g) when unable to communicate with the remote file server endpoint, make the specific client point to access the copied backup of the specific file downloaded. 19. The method of claim 18 in the scope of patent application, further comprising the steps: (h)當無法與該返端樓案伺服器端點通訊時’如果該特 定的客戶端點去修改該下傳之該特定的檔案之複製備份, 依照在該遠端檔案伺服器端點中之該特定的檔案之該複製 備份之現在地修改狀態,當該特定的客戶端點經由廣域網 路再度建立與該遠端檔案伺服器端點之通訊時,根據清析 的修改資訊與從該特定的客戶端點自動地上傳,然後選擇 性的使得或避免更新在該遠端檔案伺服器端點_之該特定 的槽案之該複製備份。 2 0、如申請專利範圍第1 9項的方法,更包括下列步驟: (1 )選擇性地放置衝突箱,只是關連的而且是維持在該 特疋的客戶端點資訊,該資訊是依據下列中之一者:(h) When unable to communicate with the endpoint of the back-end case server, 'If the specific client points to modify the copy backup of the specific file downloaded, follow the instructions in the remote file server endpoint The current modification status of the copy backup of the specific file. When the specific client point re-establishes communication with the remote file server endpoint via the WAN, The client point uploads automatically, and then selectively enables or avoids updating the copy backup of the particular slot at the remote file server endpoint. 20. The method of item 19 in the scope of patent application, further includes the following steps: (1) Selectively placing a conflict box, which is only related and is maintained at the special client point information. One of them: (I) 當無法與該遠端檔案伺服器端點通訊時,由該客戶 端點去對該下載之該特定的檔案之該複製備份修改;或 (II) 當,客戶端點無法與該遠端檔案伺服器端點通訊 時,在該遠端檔案伺服器端點中去修改該 複製備份, 钿系之該 依照對該下載之複製備份的修 器端點中去修改該複製備份之(I) when unable to communicate with the remote file server endpoint, the client point to modify the copy backup of the downloaded specific file; or (II) when the client point cannot communicate with the remote file server When the remote file server endpoint communicates, modify the copy backup in the remote file server endpoint, that is, modify the copy backup in accordance with the repair endpoint of the downloaded copy backup. 改型式與在該遠端檔案伺服 該型式。Modification and servo on the remote file. 六、申請專利範圍 21、如申請專利範圍第12項的方法,更包括步 驟 y f)在該特定的客戶端點已經下栽該特定的檔案之該複 伤之後,回應去決定另一客戶端點已經在該遠端檔案 飼服器端點中去修改該特定的檔案,依照在該遠端檔案祠 服器端點中該特定的檔案之該複製備份的修改狀態,選擇 =地無效在該特定的客戶端點下載之該特定的檔案之該 製備份。 22、如申請專利範圍第21項的方法,更包括步驟:6. The scope of patent application 21. The method of item 12 of the patent scope further includes the step yf) after the specific client has downloaded the specific file and the injury, respond to determine another client The specific file has been modified in the remote file server endpoint. According to the modification status of the copy backup of the specific file in the remote file server endpoint, select = ground is invalid in the specific file. The client clicks the backup of the specific file downloaded. 22. The method for applying for item 21 of the patent scope, further comprising the steps: ^g)從該遠端檔案伺服器端點下載該檔案之該正確的複 製備份到該特^的客戶端點’作為以其他的客戶端點修改 而且使得以該特定的客戶端點以在該特定的擋案之該無效 的複製備份的場所中存取去下載該檔案之該正確的複製備 份0 23、如申請專利範圍第21項的方法,更包括下列步驟: (g) 在步驟(e)之前,在該特定的客戶端點與該遠端檔 案祠服器端點之間關閉該通訊通道;以及 田 (h) 在步驟(e)之前,在該特定的客戶端點與該 案伺服器端點之間重新建立通訊。 田^ g) download the correct copy of the file from the remote file server endpoint to the special client point 'as a modification with other client points and make the specific client point with the In the place where the invalid copy backup of the particular file is accessed, the correct copy backup of the file is downloaded. 23. If the method of the scope of patent application is No. 21, the method further includes the following steps: ) Before closing the communication channel between the specific client point and the remote file server endpoint; and Tian (h) before step (e), communicate with the case server at the specific client point Communication between the server endpoints. field 24、如申请專利範圍第1項的方法,更包括步驟: je )&gt;第一客戶端點之使用者中之一個,清析而且沒有特 定的^動’經由廣域網路與該遠端檔案伺服器端點通訊, 從該遠端檔案伺服器端點經由廣域網路下載在該遠端槽案 伺服器端點中維護之一特定的檔案之一複製備份之修^到 第一客戶端點,其中是由另一客戶端點去達成該修改。24. The method according to the first scope of the patent application, further comprising the steps of: je) &gt; one of the users of the first client point, which is analyzed and there is no specific action through the wide area network and the remote file server Server endpoint communication, downloading from the remote file server endpoint over a wide area network one of a specific file maintained in the remote server endpoint and copying the backup repair to the first client point, where This change was reached by another client. 第92頁 45/δΗΟ -—— --- — 六、申請專利範圍 一 ”:申請專利範圍第1項的方法’更包括步驟. (e)在一特定的客戶 # &quot; 指定儲存在虛擬儲存肤^;,中错由在^特定的客戶端點中 個以上之ΐί子上的權案群體中的每個-個或- 而且在無法識別的切彳由你ye如 此—莱存取的;丨面, .._ t式中使传對該指疋的檔荦去在&amp; 拉 由在第一客戶踹黜由―# 知杀舌存取,藉 ^ a ^ . ”中之使用者及執行的應用程式,复可六 ^ y 兄社弟客戶端點中之實質的儲存穿詈卜杜六 的一個或一個以上的槽案。 碎*裝置上儲存 2 6、如申請專利範圍第2 5 Jf的古、本,# a α (f )對哕拉〜^ #弟項的方法更包括下列步驟: 士儲/Λ田 戶端點實質地區域的出現之健存裝置 備份, 個以上之扣疋的可存取的檔案之複製 ^ g )二果A第一客戶端點中之使用者或執行的應用程 希望去存取一指定的可存取的檔案然後: 前Μ 4^存^取儲存在實質地區域的儲存裝置中的指定的可存 :的檔案之-正確的複製備份,如果該指定的可存取的* 2 -正碟的複製備份,希望去存取,是儲存在實質地g 域出現之儲存裝置;以及Page 92 45 / δΗΟ -—— --- — VI. Application for Patent Scope One ": The method of applying for the scope of patent application item 1 further includes steps. (E) A specific customer # &quot; designated storage in virtual storage The skin is incorrect; it is accessed by each of the groups of individuals on more than one of the specific client points, and the unrecognizable cut is accessed by you—they are;丨 face, .._ t in the formula to pass the file to the finger in the &amp; pull by the first customer 踹 黜 by ― # know kill tongue access, borrow ^ a ^. ”The user and The execution of the application can be performed in one or more slots of the physical storage in the client point of the Brother Brothers Club. Broken * 2 stored on the device, such as the second and fifth Jf of the patent application, the method of # a α (f) 哕 拉 ~ ^ # item is further including the following steps: Substantially the presence of a backup of the storage device, the copy of more than one of the accessible files ^ g) Second user A or the application in the first client point wants to access a specified The accessible files are then: Before M 4 ^ Save ^ Retrieve the specified saveable files stored in the storage device in the physical area-the correct copy of the backup, if the specified accessible * 2- A copy of the original disc, which is intended to be accessed, is a storage device that appears in the physical g domain; and II )從該遠端檔案伺服器端點經由該廣域網路到該特定 t客戶端點去下載,該指定的可存取的檔案之一複製備份 :、在該下載的複製備份上執行該存取,如果沒有該指定的 :存取的檔案之正確的複製備份,希望去存取,是儲存在 實質地區域出現之儲存裝置。 27 如申請專利範圍第12項的方法,更包括步驟··II) downloading from the remote file server endpoint to the specific client point via the wide area network, copying one of the designated accessible files: performing the access on the downloaded copy backup If there isn't the specified: the correct copy backup of the file that you want to access, it is the storage device that appears in the physical area. 27 If the method of the scope of application for patent No. 12 further includes steps ... 第93頁 六、申請專利範圍 (f)根據現在可利用的該特定的 案其對槽案分享存取模式不相戶容T一用來存取該特 複製備份。 該特疋的客戶端點的一 28、如申請專利範圍第丨項的方法 (e )依照對在二個或一更匕括〆驟: 行應用程式之檔荦分直&gt; #工# 尸知點的群體上執 冗Λ Λ 程式去同時存取該檔案中相同的-個 如申S月專利範圍第28項的方法’其中是無法 ,戶端點直接去存取特定的檔案,胃方法更包括步驟.一 、(f )使得每一客戶同時非直接地去存取此特定的檔 透過一中間端點其在每一該客戶端點直接執行。 30、 如申請專利範圍第1項的方法,更包括下列步驟: (e )傳送一訊息給予一使用者的網際網路電子郵件位址 以邀請該使用者加入該預先同意訂閱的使用者群體·,以及 (f )在該訊息中使用該資訊,由該使用者操作一客戶端 點發出請求去加入該預先同意訂閱的使用者群體。 31、 如申請專利範圍第30項的方法,其中在該訊息中使 用該資訊之步驟,只可使用該訊息一次去加入該預先同意 訂閱的使用者群體。 32、 如申請專利範圍第1項的方法,更包括步驟·· (e )在一特定的客戶端點與該遠端伺服器端點之間認證 一連接’所以該特定的客戶端點辨別該遠端伺服器端點之 識別,而且該遠端伺服器端點辨別該特定的客戶端點之使 487843 六、申請專利範圍 ' ^ 用者的識別。 33 '如申請專利範圍第32項的方法,更包括下列步驟: (f )在該特定的客戶端點中使用對客戶端點熟知但該_ 端權案飼服器端點卻不熟知的—加密的方法學 二' 銮的杳Μ, 么墙 C g )上傳該加密的資料到該遠端檔案伺服器端點,以及 (h )在該遠端檔案伺服器端點中儲存該加密的資料。 34、如申請專利範圍第33項的方法,更包括下列步驟. _( i )在該特定的客戶端點中使.用只為客戶端點熟知的一 資料鍵值去加密該檔案, (j )使用一公用鍵值去加密該資料鍵值, (k )傳送該加密的資料鍵值到該遠端檔案伺服器端點, (1 )在該遠端檔案伺服器端點中儲存該加密的資料鍵 值,其中該遠端檔案伺服器端點缺少能夠對該值觝 密之專用鍵值。 鮮 35、如申請專利範圍第34項的方法,更包括下列步驟: ^I蚀Ϊ Ϊ特定的客戶端點中使用—結合在該預先同意訂 用者群體之另一使用者的第二公用鍵值去加密該資 料鍵值, (,)傳送該第二加密的資料鍵值到該遠端檔 點,以及 (〇 )在該遠端檔案伺服器端點中儲存該第二加密的資料 鍵 其中該特定的客戶端點與該遠端檔案飼服器端點二Page 93 6. Scope of patent application (f) According to the specific case that is currently available, its access mode to slot sharing is incompatible, and it is used to access the special copy backup. One of the special client points 28, as described in the patent application method (e) method (e) according to the two or more steps: the application file is divided straight &gt;# 工 # dead A method of redundant Λ Λ program to simultaneously access the same file in the group of knowledge points to access the same-a method of the 28th patent scope of the application, which is not possible, the user endpoint directly access the specific file, the stomach method It further includes steps. (1) (f) enabling each client to indirectly access this specific file at the same time through an intermediate endpoint which is directly executed at each of the client points. 30. The method of applying for the first item of the patent scope further includes the following steps: (e) Sending a message to a user's Internet e-mail address to invite the user to join the user group that has previously agreed to subscribe · , And (f) the information is used in the message, and the user operates a client to issue a request to join the pre-subscribed user group. 31. For the method of applying for item 30 in the scope of patent application, in which the step of using the information in the message, the message can only be used once to join the user group of the pre-approved subscription. 32. If the method of the first scope of the patent application, the method further comprises the steps of (e) authenticating a connection between a specific client point and the remote server endpoint ', so the specific client point identifies the Identification of the remote server endpoint, and the remote server endpoint identifying the specific client point 487843 6. Application scope of patents ^ User identification. 33 'As the method of applying for the scope of patent application No. 32, the method further includes the following steps: (f) using a client point that is familiar to the client point but the endpoint of the server is unknown— Methodology of Encryption II 銮 杳 Μ, Mod Wall C g) upload the encrypted data to the remote file server endpoint, and (h) store the encrypted data in the remote file server endpoint . 34. If the method of claim 33 of the scope of patent application, it further includes the following steps. _ (I) Use in the specific client point. Encrypt the file with a data key value only known to the client point, (j ) Use a public key to encrypt the data key, (k) send the encrypted data key to the remote file server endpoint, (1) store the encrypted file in the remote file server endpoint A data key value in which the remote file server endpoint lacks a dedicated key value that is sensitive to the value. Xian 35. The method of claim 34 of the patent application scope further includes the following steps: ^ I Ϊ 使用 Use in a specific client point-a second public key combined with another user of the pre-approved subscriber group Value to encrypt the data key value, (,) send the second encrypted data key value to the remote file, and (0) store the second encrypted data key in the remote file server endpoint, where The specific client point and the remote file feeder endpoint two 第95頁 487843 六、申請專利範圍 $缺?夠對該資料鍵值解密之專用鍵值。 ^ 如申請專利範圍第33項的方法,更包括下列步驟: 遠端11端點中,㉟索從儲存在一特定 的检案之該加密資料, ^ )傳送該加密的資料到一特定的客戶端點, 使用對客戶端點熟知但該遠端檔案伺服器端點卻不 ^知的一解密的方法學去解密該資料。 、如申請專利範圍第32項的方法,更包括下列步驟: 在該遠端檔案伺服器端點接收,從一特定的客戶端 點之一請求以存取一特定的檔案, 二g)在該遠端標案祠服器端點決定是否藉由結合該特定 =之權限存取權利允許該特定的客戶端定 的存取,以及 么果上許結合該特定的檔案之權限存取權利,只允 ^由該特定的客戶端點對該特定的檔案去 專利範圍第1項的方法,更包括下列步驟: 端播案飼服器端點接收,從一特定的客戶端 ”之一清求以存取一特定的槽案, (ί)在該遠端檔案伺服器端點決定3 的權案之權限存取權利允許該特定Τ客否戶精^ 的存取,以及 各戶蝙點请未之特定 (g)如果允許結合該特定的檔案 許藉由該特定的客戶端點對該特定的艮存取權利,只允 39、如申請專利範圍第1項的方法=案去存取。 ’更包括下列步驟: 六、申請專利範圍 (ej從該运^檔案伺服器端點經由一安全的通道傳送一 =的鍵,到一特定的客戶端點,使用在該遠端檔案伺服 。&amp;點不疋局部性熟知之加密功能加密該鍵值, (f)在該特定的客戶端點解密該傳送的鍵值, jg )在該特定的客戶端點使用該鍵值去解密從該遠端檔 儲i Τ Ϊ端點下載檔案之資訊或在該遠端檔案伺服器端點 •子傳的樓案之前去加密一檔案之資訊。 士申明專利範圍第3 9項的方法,更包括步驟: 索; &amp;在上+傳檔案之前壓縮該檔案之該資訊或解壓縮該檔 茶順序之該資訊以下載該檔案。 $申明專利範圍第i項的方法,更包括下列步驟: 匕岸上傳:案之前壓縮該標案之該資訊或解壓縮 累順序之該-貝訊以下載該檔案。 ”ί I請專利範圍第1項的方法’更包括下列步驟: U)!由一個別的客戶端點與該遠端檔 訊’經由該廣域網路使得一個或—個以 之點通一 意:r使用者群體之每-使用者去存取 =者的:,體包含-不同 甘士分I 舨也具有至少—特定的使用者, 中該特定的使用者是能夠同時在每—群體中存 U請專利範圍第1項的方法,更包括下列步驟? ^山)使侍該使用者在一個或一個以上之額外的檔 器端點中去存取一個或一個以上之該俨案 ^ 44、如中請專利範圍第則的方法特定的㈣Page 95 487843 VI. Patent Application Scope A private key that is sufficient to decrypt the data key. ^ If the method of applying for the scope of patent application No. 33, the method further includes the following steps: At the remote end 11, search for the encrypted data stored in a specific case, ^) send the encrypted data to a specific client The endpoint uses a decryption method that is familiar to the client point but unknown to the remote file server endpoint to decrypt the data. For example, the method of claim 32 of patent application scope further includes the following steps: receiving at the remote file server endpoint, requesting from one of the specific client points to access a specific file, and g) in the The endpoint of the remote project server determines whether or not the specific client is allowed to access by combining the specific access rights, and whether the specific access permissions are combined with the specific file permissions. The method of allowing the specific client point to go to the first file of the specific file for the specific file includes the following steps: The end-to-end broadcast server endpoint is received from one of the specific clients. To access a specific slot case, (ί) determine the right of the 3rd case on the remote file server endpoint. The access right allows the specific T client to access the account, and each user must Specific (g) If the combination of the specific file is allowed to access the specific source through the specific client point, only 39, such as the method of the first scope of the patent application = case to access. It also includes the following steps: 6. Scope of patent application (e From the endpoint of the file server, a key is transmitted via a secure channel to a specific client point, which is used in the remote file server. &amp; The encryption function, which is well-known locally, encrypts the Key value, (f) decrypt the transmitted key value at the specific client point, jg) use the key value at the specific client point to decrypt the information of the file downloaded from the remote file storage endpoint Or encrypt the information of a file before the remote file server endpoint • sub-transmission of the case. The method of the patent claim No. 39, further includes the steps: search; &amp; compress before uploading and uploading the file The information of the file or the information of the tea order of the file is decompressed to download the file. The method of claiming item i of the patent scope further includes the following steps: Dagger upload: compress the information or solution of the subject matter before the case. Compress the sequence of this-Beixun to download the file. "I ask the method of patent scope No. 1 'further includes the following steps: U)! From another client point and the remote file information' via the WAN Way to make one or one point through Meaning: each user group of the r user group accesses: the body contains-different Gan Shifen I 舨 also has at least-specific users, in which the specific user can be in each-group at the same time The method of depositing patents in item 1 of the patent scope includes the following steps? ^ Mountain) to enable the user to access one or more of the cases in one or more additional file endpoints ^ 44, such as the method-specific method of patent scope 第97頁Chapter 97 S^s-- 、申請專利範圍 __ t π能夠經由一廣域網路與額外 通訊,該方法更包括步驟: 田案柯服器端點遠端地 )在δ亥运端伺服器端點之一個上或一 :词服器端點上,其是對該特定的客;2定?額外的檔 1,該特定的客戶端點存取一特定的檔沾點是最有效 、如申請專利範圍第43項的方法,田其、的-複製備份。 =是能夠至少㈣一區域網路與 、中一特定的使用 7點通訊,該方法更包括步驟: &lt;額外的檔案伺服器 f )在該特定的額外之檔案的伺服 網路,該特定的穸*山. 器、點中經由該區域 份。 竹疋的檔案的一複製備 驟:一種用於提供多用戶標案儲存的方法,包括下列步 預先同意訂閱廣::&amp;,使得一個或一個以上的使用者之 置中運二任竞工者:體之每使用者在任意的地理位 訊, 忍、客戶端點與一遠端檔案伺服器端點通 Λ由//域網路’使得預先同意訂閱的使用者群體 客戶端點與4端槽案群體的播案,經由該各自的 服器端點同時飼服器端點通m ’在該遠端標案飼 過-個使用者同意訂閱的使用者群體中之超 (〇在-特定的$ &quot;檔案群體, 介面,藉由在二客/端點中提供-用來適用標η的 μ特疋的客戶端點指定該檔案群體中之每一S ^ s--, the scope of patent application __ t π can communicate with additional via a wide area network, the method further includes the steps: Tian An Ke server endpoint remotely) at one of the delta server end Up or one: On the endpoint of the servlet, which is the specific guest; 2 fixed? Extra file 1. It is the most effective method for the specific client point to access a specific file attachment point. For example, method 43 of the scope of patent application, and its copy-backup. = Is capable of at least one local area network and one specific 7-point communication, the method further includes the steps: &lt; additional file server f) in the specific additional file server network, the specific穸 * 山. Devices, points through this area. Repeated preparation of Penny's file: a method for providing multi-user project storage, including the following steps to pre-approve subscriptions: & so that one or more users can place two players in China Games For each user of the system, at any geographic location, the client point communicates with a remote file server endpoint through the domain network, so that the client group of the user group that has previously agreed to subscribe and the client point The broadcast of the end-slot case group, through the respective server endpoints and the feeder end point through m 'in the remote project, has fed a super user group that the user agrees to subscribe (〇 在- A specific $ &quot; filegroup, interface that specifies each of the filegroups by providing in a client / endpoint-a client point for applying the special feature of η 第98頁 六、申請專利範圍 可存取的檔案,以存取一 :之實質的儲存裝置上所=土:=特定的客戶端點 §作儲存在一虛擬的儲存裝置中,以上的檔索, 戶端點中之使用者盥勃&gt; 、 且藉由在該特定的宏 該指定該槽;:;與應用程式在不明確的形心 ^去^為特存定取之控槽制案群體中的槽案指定一可存取控制的 4J 如申睛專利範圍第4 6項的方法,承七紅 (〇在-特定之客戶端點中請求去存==列步驟·· 檔案中之一個,以及 Τ月义去存取該檔案群體中的 jf)如果該一檔案是該特定的檔案,口 存取控制的端點允許,在該特定的、:、疋在如果該可 的檔案。 、的客戶端點中存取該特定 48、如申請專利範圍第47項的 (g )從該特定之客戶端點中對^,更包括下列步驟·· · 出請求,以及 ”、 士該退端檔案伺服器端點發 (h)回應去決定出該一擋案 — 取控制的端點送出該請求 ^特疋的檔案,對該可存 4(9&quot;:32 =第48項的方法,更包括步驟: 端點接收—特二的客二端點中去回應以從該可存取控制的 制的端點發出“ΐϊϊϊ特定的客戶端點對該可存取控 5〇、如+m子取該特定檔案之進—步的訊息。 (e)對-‘本:::方法,更包括步驟: 控制鳊點♦曰疋該特定檔案的版本控制。Page 98 VI. Patent-accessible files to access one: the actual storage device = soil: = specific client point § for storage in a virtual storage device, the above file request , The user's toilet in the user's endpoint &gt;, and the slot should be specified by the specific macro;:; and the application in the ambiguous centroid ^ go ^ for the special control slot control Slots in the group designate a 4J method that can be accessed and controlled as described in item 46 of the patent scope. Cheng Qihong (0 in-specific client points request to save == listed steps ... One, and the month to access the jf in the file group) If the file is the specific file, the endpoint of the port access control allows, in the specific,:, and if the file is available. , The client point accessing the specific 48, such as (g) of the 47th scope of the patent application, from the specific client point ^, and includes the following steps: · make a request, and ", should return The file server endpoint sends a (h) response to determine the case — the controlling endpoint sends the request ^ special file, the method that can store 4 (9 &quot;: 32 = item 48, more Including the steps: Endpoint receiving—the second client end responds to send out “the specific client point has access to the access control 50, such as + m, from the access control endpoint”. Take the step-by-step information for that particular file. (E) The -'this ::: method, which further includes steps: Control point ♦ The version control of this particular file. 487843 六、申請專利範圍 51、 如申請專利範圍第50項的方法,更包括下列步驟: (f)在該特定的客戶端點中請求,為確定至少該特定播 案之一特定的複製備份之一部份是該檔案之該特定的複製 備份之個別的部份之最近更,新之版本,以及 (g )只有在如果該版本控制端點許可下去存取該特定檔 案之該特定的複製備份之該部份。 52、 如申請專利範圍第51項的方法,其中該特定的客戶 端點是在實質地區域的座落在該特定的客之儲存裝 置中去儲存該特定的複製備份之該部2客〜487843 VI. Method of applying for patent scope 51, such as the method of applying for patent scope item 50, further includes the following steps: (f) request at the specific client point to determine at least one specific copy of the specific broadcast case. One part is the latest update of the individual part of the particular copy backup of the file, the new version, and (g) access to the particular copy backup of the particular file only if the version control endpoint permits Of that part. 52. For the method of applying for item 51 of the patent scope, wherein the specific customer endpoint is located in the physical area of the specific customer's storage device to store the specific copy of the department's 2 customers ~ 53、 如申請專利範圍第51項的方法,更包括下列步驟: (h )從該特疋的客戶端點到該遠端檔案伺服器端點,去 發出請求,以確定至少該特定檔案之一近更新之 版本,以及 丨疋取 ϋ回應去決定出該一播案是該特定的槽案,對該版本 控制的端點送出該訊息。 5〔4人ΐΐϊΐ利範圍第53項的方法,更包括步驟: ΛΎ/義中&quot;以從該版本控制的端點 牛i ΐ該特定的客戶端點發出關於特定槽 ,的版本進一步的訊息到該版本控制的端點。 55、 如申凊專利範圍第54項的方法,甘士 特定的檔案,該特定的客戶端點 ,、中回應去修改該 版本更新的訊息以對該槽= = 制的端點發出 已經發生更動。 “特疋的槽案上最近 56、 如申請專利範圍第50項的方沐 *丄 方去,其中該版本控制的53. If the method of applying for item 51 of the patent scope further includes the following steps: (h) from the special client point to the remote file server endpoint, send a request to determine at least one of the specific files The most recent version, and the response received to determine that the broadcast case is the specific slot case, send the message to the version-controlled endpoint. 5 [The method for the 4th person to benefit from the 53rd item, further including the steps: ΛΎ / 义 中 &quot; to send further information about the version of the specific slot, from the version control endpoint 牛, to the specific client point. To the endpoint of that version control. 55. For example, the method of claim 54 of the patent scope, Ganshi specific files, the specific client point, respond to modify the version update message to issue changes to the endpoint of the slot == system. . "In the case of the special case, the most recent 56, such as Fang Mu * 50 of the scope of patent application, go, where the version control 第100頁 六、申請專利範圍 一' -- 端點也是對該特定的檔案的存取控制的端點。 57、如申請專利範圍第46項的方法,更包括下列步驟: je)在一局部性出現在該特定的客戶端點中之實質的儲 ,裝置上儲存該指定檔案的一個或一個以上之複製:份, (^)、如果在該特定的客戶端點之一使用者或一執行 程式,希望去存取一指定的可存取檔案然後: 、w 上H存安取儲存在實質地區域的儲存裝置中的指定的可存 案之-正確的複製備份,其希望存取的播 區域出現之儲存裝置;以及 實質 、ϊ : ί廣域網路從該遠端檔案伺服器端點到該特定 可存取的權案之正確的複存如果沒有該指定的 在實質地區域出現之儲存裝置。、望去存取,是儲存 5(8g、) =57項的方法,更包括步驟: ^的Λ Λ Λ、Λ該特定的客戶端點用來存取該特 模式,避免從另一客戶端點同時 ^一 =案刀享存取 一複製備份。 、存取該特定的客戶端點的 59、如申請專利範圍第58項的 (h)依照對在二個或二個以上之“ $包括4 : 行應用程式之檔案分享之粒子 戶端點的一群體上執 一客戶端點的應用程式去同 ^附,允許該群體的每 、存取該檔案中相同的一個。Page 100 6. Scope of Patent Application A '-The endpoint is also the endpoint of access control for this particular file. 57. The method of claim 46 in the scope of patent application, further comprising the following steps: je) a substantial storage that locally appears in the specific client point, and one or more copies of the specified file are stored on the device : Copy, (^), if one of the users or a running program in this particular client site wants to access a specified accessible file, then: , H is stored in the physical area The specified recordable storage device in the storage device-the correct copy of the backup, the storage device that appears in the playback area it wants to access; and the actual, ϊ: WAN from the remote file server endpoint to the specific accessible The correct restoration of the right case if there is no designated storage device that appears in the physical area. Looking at the access, it is a method of storing 5 (8g,) = 57 items, and further includes the steps: ^ Λ Λ Λ, Λ This particular client point is used to access the special mode, avoiding from another client Point at the same time ^ 1 = Case knife to enjoy a copy backup. 59, access to the specific client point, such as 58 (h) of the scope of patent application in accordance with the two or more " An application that executes a client point on a group is attached, allowing each of the group to access the same one in the file. mm 第101頁 ^------ 六、申請專利範圍 戶端如:Λ專去V?第59項的方法’其中是無法由每-(i)#~&gt;存取特定的檔案,該方法更包括步驟: 诱過一士彳于母客戶同時非直接地去存取此特定的檔案, 61 點其在母一該客戶端點直接執行。 (h)傳=f專利範圍第58項的方法,更包括下列步驟: 以遨請該使&quot;Vt給予一使用者的網際網路電子郵件位址 / Μ 者加入該預先同意訂閱的使用者群體;以及 點以發出該=\中使用該資訊’由該使用者操作一客户端 天出明求去加入該預先同意訂閱的使用者群體。 用兮Λ申請專利範圍第61項的方法,其中在該訊息中使 訂5的二ί二驟,只可使用該訊息一次去加人該預先同意 4閲的使用者群體。 63、如申請專利範圍第46項的方法,更包括步驟·· je )在一特定的客戶端點與該遠端伺服器端點之間認證 :連接,所以該特定的客戶端點辨別該遠端伺服器端點也之 識別’而且該遠端伺服器端點辨別該特定的客戶端 用者的識別。 ” 64、如申請專利範圍第63項的方法,更包括下列步驟: )在該特定的客戶端點中使用對客戶端點熟知但該遠 端檔案伺服器端點卻不熟知的一加密的方法學去 Λ一 案的資料, 在一標 (g )上傳該加密的資料到該遠端檔案伺服器端點,以及 (h)在該运端檔案祠服器端點中儲存該加密的資料。 65、如申請專利範圍第64項的方法,更包括下列步驟:mm Page 101 ^ ------ VI. Patent application clients such as: Λ method to go to V? Item 59, which cannot access specific files by-(i) # ~ &gt; The method further includes the steps of: inducing a client to access the specific file indirectly at the same time as the parent client, which is executed directly at the parent client. (h) The method of item 58 of the patent scope, including the following steps: In order to ask the "Vt to give a user's Internet e-mail address / M to join the user who has previously agreed to subscribe Group; and click to issue the = \ Use this information 'by the user to operate a client Tian Mingming to join the user group of the pre-approved subscription. Using the method of applying patent No. 61 in the scope of patent application, in which the second order of 5 is used in the message, and the message can only be used once to add the user group that has been agreed in advance. 63. If the method of the 46th scope of the application for a patent, further includes the step of ... je) authentication between a specific client point and the remote server endpoint: connection, so the specific client point identifies the remote The end server endpoint is also identified 'and the remote server endpoint identifies the identity of the particular client user. 64. The method according to item 63 of the scope of patent application, further includes the following steps :) In the specific client point, an encryption method that is well-known to the client point but unknown to the remote file server endpoint is used. Learn the data in the case of Λ, upload the encrypted data to the remote file server endpoint at a standard (g), and (h) store the encrypted data in the transport server endpoint. 65. The method for applying for item 64 of the patent scope further includes the following steps: 第102頁 487843 六、申請專利範圍 (i )在該特定的客戶端點中使用只為客戶 資料鍵值去加密該檔案, ” (j)使用一公用鍵值去加密該資料鍵值, ^及)傳送該加密的資料鍵值到該遠端檔㈣服器端點, (&quot;在該遠端檔案伺服器端點中儲 值,其中該遠端檔案伺服器端點缺,丨、^在的貝枓鍵 密之專用鍵^ 服^點缺^夠對該資料鍵值解 66、 如申請專利範圍第65項的方法,更包括 (m) 在該.特定的客戶端點中#用一4\ 步 閱的使用者群體之另一使用者,二在該預先同意訂 資料鍵值, 冑用者的第-公用鍵值以去加密該 二傳及送該第二加密的資料鍵值到該遠端權案饲服器端 m對該資料鍵值词服器端點二 67、 如申§月專利範圍第63項的方法,更 (f )該退端檔案伺服器端點中,檢索儲 ^二驟: 案之該加密資料, ’、 子在 特定的槽 (g )傳送該加密的資料刭一牲—a ^ (h )使用對客戶端點熟4 、疋的客戶端點,以及 二知的-由解密的方法學去解密該資料_ 68、 如申請專利範圍第 項的方法,更包括下列步驟:Page 102 487843 6. The scope of patent application (i) in the specific client point is to use only the key value of the customer data to encrypt the file, "(j) to use a common key value to encrypt the data key value, ^ and ) Send the encrypted data key value to the remote file server endpoint, (&quot; store the value in the remote file server endpoint, where the remote file server endpoint is missing, 丨, ^ in The special key ^ service ^ point missing ^ is sufficient to solve the data key value 66, such as the method of patent application No. 65, and further includes (m) in the specific client point # 用 一4 \ Another user of the user group stepping through the second, agrees to order the data key value in advance, and the user's first-public key value is used to encrypt the second pass and send the second encrypted data key value to The method of the remote server server terminal m for the data key value server terminal two 67, such as the § month patent scope item 63, and (f) the back-end file server endpoint, retrieve The second step is to store the encrypted data in the case, ', and the encrypted data is transmitted in a specific slot (g) — a ^ (h ) Use a client point that is familiar to the client 4, and the client point that is known to the public-the method of decryption to decrypt the material_ 68. If the method of the scope of patent application, the method includes the following steps: 第103頁 六、申請專利範圍 (ί)在該遠端檔案伺服器端點接收,々 點之一請求以存取一特定的檔案, 從一特定的客戶端 (g )在該遠端檔案伺服器端點决定Β ^ 的檔案之權限存取權利允許該特定疋否藉由結合該特定 的存取,以及 、客戶端點請求之特定 (f) 如果允許結合該特定的檔案之 許藉由該特定的客戶端點對該特定的權限存取權利,只允 69、 如申請專利範圍第46項的方法、,檔案去存取。 (e )在該遠端檔案伺服器端點接收/更包括下列步驟: 點之一請求以存取一特定的檔案,,從一特定的客戶端 (f )在該遠端檔案伺服器端點決曰 的檔案之權限存取權利允許該特、疋否藉由結合該特定 的存取,以及 、客戶端點請求之特定 (§)如果允許結合該特定的槽 許藉由該特定的客戶端點.對該特權限存取權利,只允 70、 如申請專利範_6項的特^的權案去存取。 (e)從該遠端檔案伺服窸端點 更包括下列步驟: 加密的鍵值到一特定的客戶點由一安全的通道傳送一 器端點不是局部性熟知之加用在該遠端播案词服 ⑴在該特定的客戶端點力:去加密該鍵值, U)在該特定的客戶端點2該傳送的鍵值,以及 案伺服器端點下載檔案之次吏用該鍵值去解密從該遠端檔 儲存上傳的構案之:去加端檔案飼服器端點 月專利範圍第70項的方法,更包括步驟:Page 103 6. The scope of the patent application (ί) is received at the remote file server endpoint, and one of the peers requests to access a specific file, from a specific client (g) at the remote file server The endpoint of the server determines the access rights of the file of B ^ to allow the specific access by combining the specific access, and the specific request of the client point (f) A specific client point has access to the specific permission, and only 69, such as the method of the 46th scope of the patent application, file access. (e) receiving / including the following steps at the remote file server endpoint: clicking one of the requests to access a specific file from a specific client (f) at the remote file server endpoint The right to access the file allows the special access, whether to combine the specific access, and the client's specific request (§) if it is allowed to combine the specific slot to allow the specific client Point. The right to access the special authority is only allowed to access the special rights of 70, such as the patent application _6. (e) The remote file server / endpoint further includes the following steps: The encrypted key value is transmitted to a specific client point through a secure channel. An endpoint is not locally known and added to the remote broadcast case. Serving on the specific client: to encrypt the key, U) to transmit the key on the specific client 2 and use the key to download the file from the endpoint of the server The method of decrypting the uploaded file from the remote file storage: the method of adding to the file file server endpoint month patent scope item 70, further including the steps: 第104頁Chapter 104 ^〇/«43 六、申請專利範圍 (h)在上傳楷案之前壓縮該檔案之該資訊或解壓縮該檔 案順序之該資訊以下載該檔案。 72、 如申請專利範圍第46項的方法,更包括步驟·· (e)在上傳檔案之前壓縮該襠案之該資訊或解壓縮該檔 案順序之該資訊以下載該檔案。 73、 如申請專利範圍第46項的方法,更包括步驟·· (e )經由該廣域網路使得一個或一個以上之使用者之另 一預先同意訂閱的使用者群體之每一使用者去存取另一槽 =群ΐ Ϊ ί 一個別的客戶端點與該遠端檔案伺服器端點 ^ ° ,/、中母一預先同意訂閱的使用者群體包含一不同的 使用者子集合一般也具有至少一特定的使用者, 其中該特定的使用者是能夠同時在每一群體中存取檔案。 如申睛專利範圍第46項的方法,更包括下列步驟: y e )使得該使用者在一個或一個以上之額外的檔案伺 器端點中去存取一個或一個以上之該檔案。 75 : &lt;如申請專利範圍第74項的方法,其中一特定的使用 者是能夠經由一廣域網路與額外的檔案伺服器端點遠端地 通訊’該方法更包括步驟: (ί )在該遠端伺服器端點之一個上或一特定的額外的檔 案伺服器端點上,其是對該特定的客戶端點是最有效 率該特疋的客戶端點存取一特定的槽案的一複製備份。 76:如申請專利範圍第74項的方法,其中一特定的使用 =J =至少㉟由一 域網路與特定之額外的伺 端點通訊,該方法更包括步驟·· 卞ν服器 487843 六、申請專利範圍 (f )在該特定的額外之檔案的伺服器端點中經由該區域 網路,該特定的客戶端點存取一特定的檔案的〆複製備 份。 77、 一種用於提供多用戶檔案儲存的方法,包括下列步 驟: (a )經由一廣域網路,使得一個或一個以上的伏用者之 預先同意訂閱的使用者群體之每一使用者在任意的地理位 置中運作一任意的客戶端點與一遠端檔案伺服器端點通 訊 ,^ 〇 / «43 VI. Scope of patent application (h) Compress the information of the file or decompress the information of the file sequence to download the file before uploading the file. 72. If the method of applying for item 46 of the patent scope, further comprises the steps of (e) compressing the information of the crotch case or decompressing the information of the file sequence to download the file before uploading the file. 73. If the method in the 46th scope of the patent application is applied, it further includes the step of (e) enabling each user of one or more users to access the user group of another user group that has previously agreed to subscribe via the wide area network. Another slot = group ΐ ί ί One other client point and the remote file server endpoint ^ °, /, the user group that the mother and mother agreed to subscribe in advance contains a different user subset and generally also has at least A specific user, wherein the specific user is able to access files in each group at the same time. For example, the method of claim 46 of the patent scope further includes the following steps: y e) enabling the user to access one or more of the files in one or more additional file server endpoints. 75: &lt; If the method of the scope of patent application 74, a specific user is able to communicate remotely with an additional file server endpoint via a wide area network 'the method further includes the steps: (ί) in the One of the remote server endpoints or a specific additional file server endpoint, which is the most efficient for that particular client point, and that particular client point accesses a particular slot. A copy backup. 76: If the method of the scope of patent application 74, a specific use = J = at least, a domain network communicates with a specific additional server endpoint, the method further includes the steps ... 卞 ν server 487843 six 2. The scope of patent application (f): in the specific server end point of the additional file, via the local area network, the specific client point accesses the 〆 copy backup of a specific file. 77. A method for providing multi-user file storage, including the following steps: (a) Through a wide area network, each user of one or more subscribing groups of users who have previously agreed to subscribe is arbitrarily selected. An arbitrary client in a geographic location communicates with a remote file server endpoint, (b )經由該廣域網路,使得預先同意訂閱的使用者群體 之每一使用者去存取該檔案群體的槽案,經由該各自的客 戶端點與該遠端檔案伺服器端點通訊,在該遠端檔案伺服 器端點同時包含允許預先同意訂閱的使用者群體中之超過 一個使用者去存取該檔案群體, (c)從該运端檔案伺服器端點經由一安全的通道傳送 ; = 的客戶端點,使用在該遠端標案词 在:Λ 知之加密功能去加密該鍵值’ (e)在;转客戶端點去解密該傳送的鍵值,(b) Through the wide area network, each user of the user group that has previously agreed to subscribe to access the file group's slots, communicate with the remote file server endpoint via the respective client point, and The remote file server endpoint also includes access to the file group by allowing more than one user from a user group that has previously agreed to subscribe, (c) transmitted from the transport file server endpoint via a secure channel; = Client point, use the word in the remote tag at: Λ knows the encryption function to encrypt the key value ('e) in; turn the client point to decrypt the transmitted key value, 案伺服器端點下載之一檔案使之用^ 端點儲存上傳的 二之貝讯或在該运端檔案伺服 (&quot;對該標案之群體二去力? 一槽案之資訊;以及 取控制的端點、。 特疋的檔案指定存取控制一, 78、*申請專利範圍第Download a file from the endpoint of the project server and use it. ^ The endpoint stores the uploaded file or saves the file on the shipping server (&quot; Release the group of the bidder? Information of a case; and Endpoints of control, special file designation access control, 78, * patent application scope 唄的方法,更包括下列步驟 在^特定之客戶端點中 g 7案中之-個,以及’請求去存取該擋案群體中的 )如果該一檔案是訪 存取控制的端點允在、定的檔案,只有是在 的標案。 該特定的客戶端點中存取該特定 79. 、如申請專利範圍第 (i)從該特定之客戶端點:::3,更包括下列步驟: 出凊求,以及 ^ ^ ^端檔案伺服器端點發 (j )回應去決定出該一檔 取控制的端點送出該請求。&gt;、疋^特定的檔案,對該可存 80、 如申請專利範圍第79項的 (k)在該特定的客戶端 ’,更包括步驟: 端點接收1應,直接從該去回應以從該可存取控制的 制的端點發出關於去存取該特定標荦子取控 8(ν)π::_7項的方法= 8 Ι2ί制端點指定該特定槽案的版本控制。 二Ilf利範圍第81項的方法,更包括下列步驟: ι、定的客戶端點中請求,為確定至少該特定擋 案之一特定的複製備份之一部份是該檔案之該特定的複製 備份之個別的部份之最近更新之版本,以及 (1 )只有在如果該版本控制端點許可下去存取該特定檔 案之該特定的複製備份之該部份。 83、如申請專利範圍第82項的方法,其中該特定的客戶 端點是在實質地區域的座落在該特定的客戶端點之儲存裝The method further includes the following steps in one of the 7 cases in the specific client point, and 'request to access the case group') If the file is accessed by the endpoint of the access control The current and final files are only the current bids. The specific client point accesses the specific 79. For example, if the scope of patent application (i) is from the specific client point :: 3, it further includes the following steps: requesting, and ^ ^ ^ end file server The server endpoint sends a (j) response to decide the endpoint that is in control of a file and sends the request. &gt;, 疋 ^ a specific file, the storable 80, such as (k) in the scope of the patent application 79 (k) on the specific client ', further including the steps: the endpoint receives a response, directly respond to A method for accessing the specific target 8 (ν) π :: _ 7 is issued from the endpoint of the accessible control system = 8 Ι2 The version control of the specific slot is specified by the endpoint. The method of item 81 of the second Ilf range further includes the following steps: ι. A request from a predetermined client site to determine that at least one of the particular copy of the particular archive is part of the particular copy of the archive The most recently updated version of the individual part of the backup, and (1) only if that version control endpoint grants access to that part of the particular copy backup of that particular file. 83. The method according to item 82 of the scope of patent application, wherein the specific client endpoint is a storage device located in the physical area at the specific client point. 第107頁 、申請專利範圍 置中本 84 餘存該特定的複製備份之該部份。 (.^申请專利範圍第8 2項的方法,更包括下列步驟: 發]出^從、該特定的客戶端點到該遠端標案飼服器端點’去 叫求,以確定至少該特定檔案之一部份是 敗尽,以及 制)應去決定出該一播案是該特定的槽案,對該版本 控制的端點送出該訊息。 如申請專利範圍第84項的方法,更包括步驟: 去接收在一該特庙定的客戶端點中回應以從該版本控制的端點 宰的版本:心牛直接從該4寺定的客戶4點發出關於特定檔 ^的版本進一步的訊息到該版本控制的端點。 特定的如::專利範圍第85項的方法’其中回應去修改該 該特定的客戶端點到該版本控制的端點對 近已經發生更動。 竹疋的棕案上最 87、如申請專利範圍第81項的方法,直φ吁士 ^ 唑a: ▲县料分^士 — J乃决,其中該版本控制的 、“、疋的檔案的該存取控制的端點。 範圍第77項的方法,更包括步驟: 案順序之該資訊以下載該播案。(这m解壓縮該檔 89、 一種用於提供多用戶檔荦, 驟: 田茶儲存的系統,包括下列步 一遠端檔案伺服器端點經由一 以上的使用者之預先同音網路,使得—個或—個 U葸訂閱的使用者群體之每一使用者 ------ 六、申請專利範圍 在任意的地理位置中车、击^^ , 士 檔案伺服器端點通訊;-壬思的客戶端點以與該遠墙 ΪΊΙΞΓΚ器端點中之一儲存裝置經由該廣域網 該檔案;2 Γ吏用者群體之每-使用者去存取 案伺服器端點r ^兮士山各自的客戶端點連接到該遠端擋 先π立:ω ” “返端槽案飼服器端點同時包含允畔預 先冋思叮閱的使用者群體中 μ π β Γ 今預 案群體;以及 砰體中之超過-個使用者去存取該檔 其中該遠端檔案伺服器端點冰 點中去維持槽案整合端檔案伺服器端 控制每個去存取每個檔:由戶=;,飼服器端點中去 中之每一個I^ ” “逖柒檔案伺服器端點 份上:為= 個標案,在每個槽案的個別部 得所有本二:此使 = :ΐί =案功能就如同在相同 杀14延柒伺服器與客戶端點,以及 咁仔 的檔檔ΐ;服器端點也用來對-特定之檔案群體中 9。如二;/上取控制的端點去作為存取控制 :·:睛求對該檔案群體中的標案中'-之客戶 ::如果該—標案是該特定 ,里以及 的槽案點允终,在該特定的客戶端點中去存取該“ 91、如中請專利_第90項的系統,其中該特定之客戶 π/843 六、申請專利範圍 的 蠕點對該遠端檔案伺服器端點發出該請求,以及 ,中該遠端檔案伺服器端點送出該請來到該可存 、點,回應以決定出該一檔案是該特定的檔案。 二 =、如申請專利範圍第91項的系統,其中該特定的客戶 端點,回應以從該可存取控制的端點去接收一回鹿,直接 從該特定的客戶端點對該可存取控制的端點發出^於去 取該特定檔案之進一步的訊息。 93 ^如申請專利範圍第89項的系統,其中該遠端檔案伺On page 107, the scope of patent application is located in the 84 copies of this particular copy of the backup. (. ^ The method of applying for item 82 in the scope of patent application, further includes the following steps: Sending] ^ From, the specific client point to the remote bidding server endpoint 'to call to determine at least the Part of the specific file is exhausted, and the system should decide that the broadcast case is the specific slot case, and send the message to the version control endpoint. For example, if the method of applying for item 84 of the patent scope further includes the steps of: receiving a version that is responded to in a particular client point to be slaughtered from the version-controlled endpoint: Xin Niu directly from the 4 designated client At 4 o'clock, further information is sent about the version of a particular file to the endpoint of that version control. Specific examples are: Method 85 of the scope of the patent, where the response to modify the specific client point to the version control endpoint has changed. In the case of Penny's Brown, the most 87, such as the method of applying for the scope of the patent No. 81, straight φ ^ ^ ^ a: ▲ County material points ^ Shi-J Nai, where the version control, ", 疋 of the file The endpoint of the access control. The method of scope item 77 further includes the steps of: downloading the podcast by downloading the information in the case order. (This decompresses the file 89, a type for providing multi-user files, step: The Tiancha storage system includes the following steps. A remote file server endpoint passes through a pre-homing network of more than one user, so that each user of one or more U 葸 subscribed user groups --- --- VI. The scope of the patent application is to communicate with the endpoint of the file server in any geographic location;-The client point of Rensi is connected to one of the storage devices of the remote wall ΪΊΙΞΓΚ device via The wide area network and the file; each user of the user group accesses the server end point of the server, and each client point of the Shishan Mountain is connected to the remote block. Ω "" The end of the feeding device also contains the user group that allows the bank to think in advance Medium μ π β Γ this plan group; and more than one user in the ping body to access the file, where the remote file server endpoint freezes to maintain the slot file integration side file server side control each to save Take each file: from the household = ;, each I ^ in the feeder endpoint: "逖 柒 file server endpoint share: = = bids, obtained in a separate part of each slot case All this two: This makes =: ΐί = the case function is the same as killing the server and client points in the same time, and the files of Taipa; the server endpoint is also used to-specific file groups 9 . Such as two; / Take the endpoint of the control as access control: ·: Seeking '-customers in the bids in the file group :: If the — bid is the specific, internal case At the end, you can access the "91, such as the patent _ item 90 system in the specific client point, where the specific client π / 843 The file server endpoint sends the request, and the remote file server endpoint sends the request to the saveable, , Respond to decide that the file is the specific file. Two =, such as the system of patent application No. 91, where the specific client point responds to receive a response from the access control endpoint Deer, directly from the specific client point to the access-controllable endpoint to send further information to fetch the specific file. 93 ^ As for the system under the scope of patent application 89, where the remote file server 服器端點對一版本控制端點去指定該特定檔案的版本控 制。 1 ^ 如申請專利範圍第9 3項的系統,其中一特定的客戶 端點請求去確定其至少該特定檔案之一特定的複製備份之 —部份是該檔案之該特定的複製備份之個別的部份之最近 更新之版本,以及 其中只有在如果該版本控制端點許可下去存取該特定檔 案之該特定的複製備份之該部份。The server endpoint specifies a version control endpoint for a particular file. 1 ^ If the system of item 93 of the scope of patent application, a specific client point requests to determine at least one of the specific copy backups of the specific file-partly the individual copy of the specific copy backup of the file The most recently updated version of a section, and that section of that particular copy backup only if the version control endpoint has permission to access that particular file. 95、 如申請專利範圍第94項的系統,其中該特定的客戶 端點是在實質地區域的座落在該特定的客戶端點之儲存裝 置中去儲存該特定的複製備份之該部份。 96、 如申請專利範圍第94項的系統,其中該特定的客戶 端點發出請求到該遠端檔案伺服器端點,以確定至少該特 疋檔案之一部份是最近更新之版本,以及 其中該遠端檔案伺服器端點,回應去決定出該一檔案是該 特定的檔案,對該版本控制的端點送出該訊息。95. For example, the system of claim 94 of the patent application scope, wherein the specific client endpoint is a storage device located in the specific client site in a physical area to store the part of the specific copy backup. 96. If the system of claim 94 is applied for, the specific client point sends a request to the remote file server endpoint to determine that at least a part of the special file is the most recently updated version, and where The remote file server endpoint responds to determine that the file is the particular file, and sends the message to the version-controlled endpoint. 第110頁 487843 六、申請專利範圍 97、如申請專利範圍第96項的系統,其中該特定的 端,,回應以從該版本控制的端點去接收回應,直 特定的客戶端點發出關於特定播案的版本進 = 該版本控制的端點。 们Λ心到 98丄如申請專利範圍第97項的系統,其中回應去修改該 特=的稽案,該特定的客戶端點對該標案發出版本更新乂的 訊心到該版本控制的端點以指示出在該特定的 已經發生更動。 系上敢近 9 9如申印專利範圍第9 3項的系統,其中該版本控制的 端點也是對該特定的檔案的該存取控制的端點。 10 0/如申請專利範圍第89項的系統,其中該遠端檔案伺 服器也用來架設從該遠端檔案伺服器經由該廣域網路去 擇性地下載到該特定的客戶端點,當-特定的客戶端點盘 該遠端檔㈣服器通訊時,由該特定的客戶端點所將要&amp; 取而且也是該特定的客戶端點所缺乏,其至少是一特定檔 案之最近更新的部份之複製備份,其中在任何時間,藉由 該本地業系統應用程式介面指定去依附明確與不明確 的槽案分早模式,每一客戶端點在與該遠端檔案伺服器通 101 如申明專利範圍第1 0 0項的系統,其中該遠端檔案 伺服器t用,架設從該特定的檔案去上傳資訊,當該特定 的客戶端點是經由廣域網路在與該遠端檔案伺服器端點通 ^時如特疋的客戶端點修改該特定的檔案,從該特 疋的客戶端點上傳資訊以更新儲存在該遠端檔案伺服器端 六、申請專利範圍 效^之該特定檔案之複製備份,以達成該特定檔案之修改 如申請專利範圍第101項的系統,其中該遠端檔案 st μ = ί用來架設修改效果,藉由在該遠端檔案伺服器端 ”上儲存對該特定檔案之複製備份遞增改變。 1J3、时如申請專利範圍第1〇1項的系統,其中該遠端檔案 =^也用來架設修改效果,藉由在該遠端槽案祠服器端 爱中错由以該特定檔案之一複製備份修改作為更新,以重 覆寫入該特定檔案之現在複製備份。 104、如申請專利範圍第101項的系統,其中該遠端檔案 伺服益也用來架設自動地從該遠端檔案伺服器端點下 =新該特定檔案之複製備份之該資m,回應該特定 戶端點上傳儲存在該遠端檔案伺服器端點中之 特定檔案之複製備份之該資訊,到該儲存的客戶踹 該 果與該遠端檔案伺服器端點通訊之該儲存科如 指示希望去儲存該特定的標案。 的客〜已經 105 '如申請專利範圍第1〇〇項的系統,其中該遠 伺服器也用來架設在該遠端檔案伺服器端點中 *案 的檔案而且使得其他的客戶端點經由廣域網路斑,特定Page 110 487843 VI. Patent application scope 97, such as the system of patent application scope item 96, where the specific end responds to receive a response from the version-controlled endpoint until a specific client point issues a specific Pod version advance = Endpoint of this version control. We have reached 98. For example, if we applied for the system of item 97 of the patent scope, which responded to modify the special case, the specific client point issued a version update to the project to the version control. Endpoint to indicate that a change has occurred at that particular time. It is a system that is close to 99, such as the item 93 of the scope of patent application, in which the endpoint of the version control is also the endpoint of the access control for the specific file. 10 0 / If the system of the scope of patent application is 89, the remote file server is also used to selectively download from the remote file server to the specific client point via the wide area network, when- When a specific client orders the remote file server to communicate, it is &amp; fetched by the specific client and is also lacking by the specific client. It is at least a recently updated part of a specific file. Copies of backups, where at any time, through the local industry system application program interface designation to adhere to the explicit and ambiguous slot early mode, each client point communicates with the remote file server 101 as stated The system of item 100 of the patent, wherein the remote file server is used to upload information from the specific file, and when the specific client point is connected to the remote file server through a wide area network When you click on the special client, you can modify the specific file, and upload information from the special client to update the specific file stored on the remote file server. Copy and backup to achieve the modification of the specific file, such as the system of the scope of patent application No. 101, where the remote file st μ = ί is used to set up the modification effect, by storing the pair on the remote file server side The copy and backup of the specific file are changed incrementally. 1J3. The system of Shiruo Patent Application No. 101, where the remote file = ^ is also used to set up the modification effect by using the remote server Aizhongcuo updates by copying and modifying one of the specific files to copy the current copy and backup of the specific file. 104. If the system of patent application No. 101 is used, the remote file server also benefits To set up the data automatically from the remote file server endpoint = a new copy of the specific file, in response to the specific user endpoint uploading a copy of the specific file stored in the remote file server endpoint If you back up the information to the storage client, the storage section that communicates with the remote file server endpoint if the storage section instructs you to store the specific project. The customer has already 105 ' System 1〇〇 item range, wherein the server is also used to set up far in the remote file server endpoint * text files and other such customer endpoint via WAN spot, specific 案伺服器通訊以存取該特定的檔案,在關閉該&amp;二遢端檔 之前如果該特定的客戶端點關閉與該遠端^ 的檔案 的通訊通道。 巧案句服器端點 10 6、如申請專利範圍第丨〇 〇項系統,更包括: 在該特定的客戶端點與該遠端檔案伺服器 崎點之間一特定The file server communicates to access the specific file, and if the specific client closes the communication channel with the remote file before closing the &amp; secondary file. The smart server endpoint 10 6. If the system of the scope of patent application 丨 〇 〇, the system further includes: a specific between the specific client point and the remote file server point 第112頁Page 112 487^43 六、申請專利範圍 的客戶端點用來關閉該通訊通道, 其中f與該遠端檔案伺服器端點無法通訊時,該遠端檔案 伺服器端點使得該特定的客戶端點去存取該下傳之該特定 的檔案之複製備份。 10 7 α如申请專利範圍第1 〇 6項的系統,其中該遠端檔案 祠服器端點也用來架設以選擇性的使得或避免更新在該遠 端檔案=服器端點中之該特定的檔案之該複製備份,當無 一法與該遠端稽案伺服器端點通訊時,如果該特定的客戶端 點去修改該下傳之該特定的檔案之複製備份,依照在該遠 端檔案伺服器端點中之該特定的檔案之該複製備份之現在 地修態,當該特定的客戶端點經由廣域網路再度建立 與該m端檔案伺服器端點之通訊時,根據清析的修改資訊 與從該特定的客戶端點自動地上傳。 1 0 8/如申睛專利範圍第丨〇 7項的系統,其中該特定的客 點也用來架設以選擇性地放置衝突之檔案傳輸協定, 疋關連的而且是維持在該特定的客戶端點訊, 是依據下列中之一者: 貝冗 (I )當無法與該遠端檔案伺服器端點通訊時,由該客戶 端點去$該下載之該特定的檔案之該複製備份修改;或 (II)當,客戶端點無法與該遠端檔案伺服器端點通訊 時,在該遠端檔案伺服器端點中去修改 複製備份, 竹夂叼保茶之該 之複製備份的修改型式與在該遠端標案伺服 器知點中去修改該複製備份之該型式。 487843 六、申請專利範圍 一^^ 10 9、如申請專利範圍第丨〇 〇項的系統,其中該遠端檔案 伺服器端點也用來架設以選擇性地無效在該特定的客戶端 點下載之該特定的檔案之該複製備份,在該特定的客戶端 點已經下載該特定的檔案之該複製備份之後,回應去決定 另一客戶端點已經在該遠端檔案伺服器端點中去修改該特 定的檔案’依照在該遠端檔案伺服器端點中該特定的檔案 之該複製備份的修改狀態。 、 110、 如申請專利範圍第1 0 9項系統,其中該遠端檔案伺 服器端點也用來架設以從該遠端檔案伺服器端點下載該檔 -案之該正確的複製備份到該特定的客戶端點,作為以其他 的客戶端點修改而且使得以該特定的客戶端點以在該特定 的檔案之該無效的複製備份的場所中存取去下載該檔案之 該正確的複製備份。 111、 如申請專利範圍第1 〇 9項的系統,更包括: 在該特定的客戶端點與該遠端檔案伺服器端點之間一特定 的客戶端點關閉該通訊通道;以及在決定是否該檔案的下 載之複製備份是無效之前,在該特定的客戶端點與該遠端 權案伺服器端點之間重新建立通訊。 11 2、如申請專利範圍第8 9項的系統,其中該遠端檔案伺⑩ 服器端點也用來架設以清析而且沒有特定的行動,經由廣 、 域網路與該遠端檔案伺服器端點通訊,從該遠端檔案伺服 器端點經由廣域網路下載在該遠端檔案伺服器端點中維護 之一特定的檔案之一複製備份之修改到第一客戶端點,其 中是由另一客戶端點去達成該修改。487 ^ 43 6. The client point within the scope of the patent application is used to close the communication channel. When f cannot communicate with the remote file server endpoint, the remote file server endpoint makes the specific client point go. Access the copied backup of the particular file downloaded. 10 7 α The system according to item 106 of the patent application scope, wherein the remote file server endpoint is also used to set up to selectively enable or avoid updating the remote file = server endpoint. The copy backup of the specific file, when there is no way to communicate with the remote audit server endpoint, if the specific client points to modify the copy backup of the specific file downloaded, follow the instructions in the remote The copy backup of the specific file in the end of the file server endpoint is now modified. When the specific client point re-establishes communication with the m-end file server endpoint via the WAN, Modify information and upload automatically from that specific client point. 108 / The system of item No. 07 in the patent scope, where the specific client is also used to set up a conflicting file transfer protocol, which is related and maintained at the specific client The message is based on one of the following: When the communication with the remote file server endpoint is not possible, the client clicks on the copy backup modification of the downloaded specific file; Or (II) When the client cannot communicate with the remote file server endpoint, modify the copy backup in the remote file server endpoint. And modify the type of the copy backup in the knowledge of the remote project server. 487843 VI. Application scope of patent ^^ 10 9. For the system of the scope of patent application No. 丨 00, the remote file server endpoint is also used to set up to selectively invalidate download at the specific client point The copy backup of the specific file, after the specific client point has downloaded the copy backup of the specific file, respond to decide that another client point has been modified in the remote file server endpoint The specific file 'is in accordance with the modified status of the copy backup of the specific file in the remote file server endpoint. 110, such as the system of patent application No. 109, wherein the remote file server endpoint is also used to set up to download the file from the remote file server endpoint-the correct copy of the case back to the The specific client point is modified by other client points and the specific client point is used to access the location of the invalid copy backup of the specific file to download the correct copy backup of the file . 111. For example, the system for applying for patent scope item No. 109 further includes: closing the communication channel at a specific client point between the specific client point and the remote file server endpoint; and deciding whether to Before the downloaded copy backup of the file is invalid, communication is re-established between the specific client point and the remote rights server endpoint. 11 2. If the system of item 8 or 9 of the scope of patent application is applied, the endpoint of the remote file server is also used to set up for analysis and there is no specific action, and the remote file server is connected via a wide-area network. Server endpoint communication, downloading from the remote file server endpoint via a wide area network one of a specific file maintained in the remote file server endpoint to copy the backup modification to the first client point, where Another client clicks to reach the modification. 第114頁 487843Page 114 487843 六、申請專利範圍 113 … 如申5青專利範圍第8 9 π rv ,丁'桃,更包括: 在該特定的客戶端點中藉由在該特定的客戶端點 存在一虛擬儲存裝置上的檔案群體中的每一 曰n 之可存取的槽案提供一用來適用權案存取的:㊁了:以上 無法識別的型式中使得對該指定的檔案去存取, ^ ^ 一客戶端點中之使用者及執行的應用程式,其 立 性出現在第一客戶端點中之實質儲存裝置上儲 一個以上的檔案。 潤敦 114、如申請專利範圍第11 3項的系統,更包括:Sixth, the scope of patent application 113 ... If you apply for the 5th patent scope of the 9th π rv, Ding Tao, and more: In the specific client point by the existence of a virtual storage device on the specific client point Each of the n-accessible slots in the file group provides one that applies to the access of the right: Alas: the unrecognized type above makes the specified file to be accessed, ^ ^ a client The users and applications running in the site have more than one file stored on the physical storage device in the first client site. Rundun 114. If the system of the scope of patent application No. 113, it also includes: 一區域的儲存裝置,對該特定的客戶端點實質地區域的出 現之儲存裝置去儲存每一個或一個以上之指 檔案之複製備份, 刃』仔取的 其中’。如果在該特定的客戶端點中之一使用者或一執行的 應用程式,希望去存取一指定的可存取的檔案然後: (I )存取儲存在實質地區域的儲存裝置中的指定的可存 取的檔案之一正確的複製備份,如果該指定的可存取的檔 案之一正確的複製備份,希望去存取,是儲存在實質地區 域出現之儲存裝置;以及 41 π I )從該遠端檔案伺服器端點經由該廣域網路到該特定 :客戶端點去下載,該指定的可存取的檔案之一複製備份 f在該下載的複製備份上執行該存取,如果沒有該指定的 可存取的檔案之正確的複製備份,希望去存取,是儲存在 實質地一區域之健存裝置。 Π5、如申請專利範圍第丨〇〇項的系統,更包括:A storage device in a region stores a copy of each or more of the reference files to the storage device that appears in the physical area of the specific client point, and takes one of them. If a user or an executing application in that particular client site wishes to access a specified accessible file and then: (I) access the specified storage device stored in the physical area A correct copy backup of one of the accessible files, if one of the specified accessible files is a correct copy backup, the storage device appears to be stored in the physical area if it is desired to be accessed; and 41 π I) From the remote file server endpoint to the specific: client point via the wide area network to download, one of the specified accessible files is a copy backup f. Perform the access on the downloaded copy backup, if not The correct copy backup of the designated accessible file, which is hoped to be accessed, is a healthy storage device that is physically stored in an area. Π5. If the system of patent application No. 丨 00, further includes: 第115頁 487843 —-~~~~— 六、申請專利範圍 根據現在可 案其對檔案 避免另一客 份。 116、 如申 對在二個或 用程式,依 檔案中相同 117、 如申 客戶端點直 同時非直接 每一該客戶 118、 如申 一管理者端 子郵件位址 群體;以及 一客戶端點 來發出請求 利用的該 分享存取 戶端點同 請專利範 二個以上 照檔案分 的'一個。 請專利範 接去存取 地去存取 端點直接 請專利範 點用來傳 以邀請該 由該使用 去加入該 119、如申請專利範 加入該預 請專利範 特定的客戶端點, 者之間該 訊息一次去 120 如申 服器端點二 架設用來認 特定的客戶端點用來 模式不相容之一播宰定的播 時存取該特定的= 取棋式, 細點的一複製備 圍第8 9項的系統,更包括: 之客戶端點的一群體上複 皇夕抑工从 吸默之執订應 旱之粒子性’依附,允許同時存取該 圍第項系統,其中是無法 一 特定的標案’而且其中每一客戶能约 :特定的槽案’透過一中間端點= 執行。 圍第8 9項的系統,更包括: 送訊息給予一使用者的網際網路電 使用者加入該預先同意訂閱的使用者 者操作,在該訊息中使用該資訊,用 預先同意訂閱的使用者群體。 圍第1?項的系統’其中只可使用該 先同思訂閱的使用者群體。 圍第8 9項的系統,更包括: 其中在該特定的客戶端點與該遠端伺 特疋的客戶端點與該遠端伺服器端點 所以該特疋的客戶端點辨別該遠端 證一連接P.115 487843 —- ~~~~ — 6. Scope of patent application According to the current case, the file can be protected from another customer. 116. If the application is in two or programs, according to the same in the file 117, if the application client directly and indirectly each of the customers 118, if application manager terminal mail address group; and a client point to The endpoint of the shared access user who issued the request uses the same one of the two or more patents. Please ask the patentee to access the access point to directly access the patentee point to pass to invite the use to join the 119, such as applying for a patentee to join the specific client point of the advance patentee, This message goes to 120 at a time. If the endpoints of the server are set up to identify a specific client point, the mode is incompatible with one of the specified broadcasts, and the specific broadcast is accessed. Take a chess pattern, a copy of the fine point. The system for preparing item No. 8 and 9 also includes: a group of clients at the client's point of reinstatement, and the attachment to the particle of drought should be adhered to, allowing simultaneous access to the item system. It is not possible to have a specific bidding case, and each client can make a request: a specific slot case is executed through an intermediate endpoint =. The system surrounding item 8 and 9 further includes: Internet users who send a message to a user to join the user operation of the pre-approved subscription, use the information in the message, and use the pre-approved user to subscribe group. The system around item 1? Among them, only the user group of the first Tongsi subscription can be used. The system surrounding item 8 and 9 further includes: wherein the specific client point and the remote client point and the remote server endpoint are identified by the special client point. Card-connection 487843 六、申請專利範圍 伺服器端點之識別, 客戶端點之使用者的 121、 如申請專利範 更架設用來在該特定 使用對客戶端點熟知 一加密的方法學,而 服Λίό點’以及在該 資料。 12 2、如申請專利範 戶端點架設用來在該 熟知的一資料鍵值去 加雄、該資料鍵值,而 案伺服器端點,以及 該加密的資料鍵值, 對該資料鍵值解密之 12 3、如申請專利範 戶端點也架設用來在 預先同意訂閱的使用 去加密該資料鍵值, 到該遠端檔案伺服器 來在該遠端檔案伺服 值,其中該特定的客 缺少能夠對該資料鍵 124、 如申請專利範 而且該遠端伺服器端點辨別該特定的 識別。 圍第1 2 0項的系統,其中該客戶端點 的客戶端點中去加密一檔案的資料, 但該遠端檔案伺服器端點卻不熟知的 且上傳該加密的資料到該遠端檔案伺 遠端檔案伺服器端點中儲存該加密的 圍第1 2 1項的系統,其中該特定的客 特定的客戶端點中使用只為客戶端點 加密該檔案,而且使用一公用鍵值去 且傳送該加密的資料鍵值到該遠端檔 其中在該遠端檔案伺服器端點中儲存 其中該运端檑案祠服器端點缺少能夠 專用鍵值。 圍第122項的系統,其中該特定的客 該特定的客戶端點中使用一結合在該 者群體之另一使用者的第二公用鍵值 而且用來傳送該第二加密的資料鍵值 點’以及其中贫性六·壯w 丹r落儲存裝置也架設用 器端點中儲存該第二加密的資料鍵 * 點與該遠端權案伺服器端點二者 值解密之專用鍵值。 圍第120項的系統,装由吟_ &gt; 旲中該儲存裝置487843 VI. Identification of the server endpoint of the patent application scope, 121 of the user of the client point, such as the patent application, shall be set up to be familiar with the encryption methodologies of the client point in this particular use, and serve the point Well in that information. 12 2. If the endpoint of a patent application is set up to add data to the well-known data key, the data server key, and the server endpoint and the encrypted data key, Decryption 12 3. If the patent application user endpoint is also set up to encrypt the data key value in the use of pre-approved subscription, go to the remote file server to serve the value in the remote file, where the specific client There is a lack of the ability to identify the particular key 124, such as a patent application, and the remote server endpoint. The system around item 120, in which the data of a file is encrypted in the client point of the client point, but the remote file server endpoint is unknown and uploads the encrypted data to the remote file The remote file server endpoint stores the encrypted system around item 121, where the specific client-specific client point is used to encrypt the file only for the client point, and uses a public key to And send the encrypted data key value to the remote file where the remote file server endpoint is stored, where the transport server endpoint is missing a dedicated key value. The system according to item 122, wherein the specific client and the specific client point use a second public key value combined with another user of the group and used to transmit the second encrypted data key point 'And among them, the special storage key that stores the second encrypted data key in the end point of the user also stores the second encrypted data key * point and the remote key server end point to decrypt the private key value. System No. 120, installed by yin_ &gt; 旲 中 The storage device 第117頁 487843 六、申請專利範圍 是更架設用 該遠端檔案 —特定的客 端檔案伺服 料。 125 、如申 飼服器端點 以存取一特 之權限存取 取’以及如 允許藉由該 126 、 如申 服器端點也 存取一特定 之權限存取 取,以及如 允許藉由該 127 、 如申 一特定的客 其中該遠端 去傳送一加 檔案伺服器 其中該特定 解密該傳送 來去檢索 伺服器端 戶端點, 器端點卻 請專利範 也架設用 定的檔案 權利允許 果允許結 特定的客 請專利範 架設用來 的檔案, 權利允許 果允許結 特定的客 請專利範 戶端點, 檔案伺服 密的鍵值 端點不是 的客戶端 的鍵值, 的樓案之該加密資料,其中 來傳送該加密的資= 不熟知的一解密的古=點熟知但該退 解在的方法學去解密該資 圍第120項的系統, 來從-特定的客戶端、二該/端檔' 否糟由結合該特定的檔案 人4求之特定的存 :二寺疋的檔案之權限存取權利,只 碥點對該特定的檔案去存取。 圍第89項的车铋,甘i 外 、的糸、、先其中該遠端檔案伺 特定的客戶端點去接收一請求以 =來決定是否藉由結合該特定的檔案 =特疋的客戶端點請求之特定的存 3該特疋的檔案之權限存取權利,只 戶端點對該特定的檔案去存取。 圍第89項的系統,更包括: 器端點也架設用來經由一安全的通道 到一特定的客戶端點,使用在該遠端 局部性熟知之加密功能加密該鍵值, 點也架設用來在該特定的客戶端點中 以及在該特定的客戶端點使用該鍵值Page 117 487843 VI. The scope of patent application is more erected. The remote file-a specific client file server. 125, such as the application server endpoint with a special permission to access and if allowed by the 126, such as the server endpoint also access to a specific permission to access, and if allowed by The 127, if a specific client applies, the remote end sends a plus file server, where the specific decryption sends the end to retrieve the server end point of the server, but the end point of the server asks the patent to also set up a file with permission. If it is allowed to set up a file for a specific customer patent model, the right is allowed to set up a specific customer patent endpoint, the file server key is not the client ’s key value, Encrypted data, where the encrypted data is transmitted = Unfamiliar-Decrypted ancient = Point is well-known but the method of decommissioning is used to decrypt the 120th system of the resource, from-a specific client, two "/ End file" No, it is determined by the specific archiver 4 in combination with the specific storage: the right to access the file of the second temple, only the point to access the specific file. The bismuth around the 89th item, the external file, the external file, and the remote file are sent to a specific client to receive a request to determine whether to combine the specific file with the special client. Click on the specific access rights of the specific file, and only the endpoint accesses the specific file. The system around item 89 further includes: The device endpoint is also set up to reach a specific client point through a secure channel, and the key value is encrypted using an encryption function that is well-known locally at the remote end, and the point is also set up to use To use the key in this particular client point 第118頁 η -^------ 六、申請專利範圍 去解密從該遠端檔 端槽案伺服器端點 訊。 128、如申請專利 戶端點也架設用來 解壓縮該檔案順序 1 2 9、如申請專利 一特定的客戶端點 訊或解壓縮該檔案 13 0、如申請專利 路該遠端檀案伺服 之使用者之另一預 去存取另一檔案的 案伺服器端點通訊 包含一不同的使用 者, 其中該特定的使用 案0 3 =端點下載檔案之資訊或在該遠 儲存上傳的槽案之前去加密一樓案之資 範圍第127項的糸缔,甘&amp; 的糸、、充其中該特定的客 在上傳檔案之前壓縮該檔案之該資訊或 之該資訊以下載該檔案。 範圍第8 9項的系統,更包括: 用來在上傳檔案之前壓縮該檔案之該資 順序之該^訊以下載該槽案。 圍第8 9項的系統,其中經由該廣域網 器端點也用來架設使得一個或一個以上 先同意訂閱的使用者群體之每一使用者 群體經由一個別的客戶端點與該遠端檔 ’其中每一預先同意訂閱的使用者群體 者子集合一般也具有至少一特定的使用 者是能夠同時在每一群體中去存取檔 131、如申請專利範圍第89項的系統,更包括: 該使用者能夠在一個或一個以上之額外的檔案伺服器端 點中去存取一個或一個以上之該檔案。 132、如申請專利範圍第13ι項系統,更包括: 特疋的客戶端點能夠經由一廣域網路與額外的檔案伺服 器端點遠端地通訊,以及架設用來一特定的檔案的一複製Page 118 η-^ ------ VI. Patent Application Scope To decrypt the server's endpoint message from the remote server. 128. If the patent applicant's endpoint is also set up to decompress the file sequence 1 2 9. If a patent is requested by a specific client or the file is decompressed 13 0 If the patent application is filed by the remote server The other server ’s endpoint communication of the user's pre-access to another file includes a different user, where the specific use case 0 3 = the information of the endpoint downloading the file or the uploaded slot case in the remote storage Prior to the encryption of the first floor of the case, the scope of the 127 agreement, Gan &amp;, the specific customer before uploading the file to compress the information of the file or the information to download the file. The system of scope item 8 and 9 further includes: used to compress the information of the file in the file sequence before uploading the file to download the case. The system surrounding item 89, wherein the WAN endpoint is also used to set up each user group of one or more user groups that first agreed to subscribe to the remote file through another client point. Each of the sub-collections of user groups that have agreed to subscribe in advance generally also has at least one specific user who is able to access files 131 in each group at the same time. For example, the system of item 89 in the scope of patent application also includes: The user can access one or more of the files in one or more additional file server endpoints. 132. The 13th system under the scope of patent application further includes: a special client can communicate remotely with an additional file server endpoint through a wide area network, and set up a copy for a specific file 第119頁 六、申請專利範圍 備份在該遠端伺服器端點之一個上或一特定的額外的檔 伺服器端點上,其是對該特定的客戶端點是最有效率 133、如申請專利範圍第131項的系統,更包括. -特定的客戶端點是能夠至少經由一區域網路與特定 二卜的檔案伺服器端點通訊’以及經由該區域網路架設 ==的播案的一複製備份在該特定的額外之槽案的 134、 一種用於提供多用戶 在任意的地理位置中之一特 路,一預先同意訂閱的使用 端檀案4司服器端點通訊,經 服器點使得預先同意訂閱 存取該檔案群體的檔案,經 檔案飼服器端點通訊,同時 用者群體中之超過一個使用 在該特定的客戶端點中之一 取一局部性出現在該特定的 上所儲存之一個或一個以上 端點指定該檔案群體中之每 一虛擬的儲存裝置中,而且 使用者與執行的應用程式在 案存取;以及 其中該遠端檔案伺服器端點 的檔案指定一可存取控制的 槽案儲存的系統,包括: 定的客戶端點,經由一廣域網 者群體之一使用者用來與一遠 由該廣域網路,該遠端檔案伺 的使用者群體之每一使用者去 由該各自的客戶端點與該遠端 地包含允許預先同意訂閱的使 者去存取該檔案群體,以及 用來適用檔案存取的介面,存 客戶、點中之實質的儲存裝置 的檔案,藉由在該特定的客戶 =可存取的檔案,當作儲存在 藉由在該特定的客戶端點中之 不明確的形式中對該指定該檔 也用來對一特定之檔案群體中 端點去作為存取控制。 487843 ~~~~·——_ 六、申請專利範圍 13 5、 如申請專 戶端點請求去存 其中如果該一檔 取控制的端點允 檔案。 13 6、如申請專 戶端點對該遠端 其中該遠端檔案 特定的檔案,對 1 3 7、如申請專 戶端點,回應以 從該特定的客戶 取該特定檔案之 1 3 8、如申請專 飼服器端點 對一版本控制端 1 3 9、如申請專 戶、點請求為確 一部份是該檔案 更新之版本,以 其中只有在如果 去存取該特定檔 140 '如申請專 戶端點是在實質 利範圍 取該檔 案是該 許,在 利範圍 槽案飼 伺月艮器 該可存 利範圍 從該可 端點對 進一步 利範圍 點指定 利範圍 定至少 之該特 及 該版本 案之該 利範圍 地區域 第134項的系統’其中一特定之 案群體中的樓案中之一個,以及 特定的檔案,只有县A 1 、,疋在如果該可存 該特定的客戶 點甲存取該特定的 第135項的系統’其中該特定之客 服器端點發出請求,以及 端點以回應去決定出該一檔案是該 取控制的端點送出該請求。 第136項的系統,其中該特定的客 存取控制的端點接收一回應,直接 該可存取控制的端點發出關於去存 的訊息。 第134項的系…统’其中該遠端檔案 該特定檔案的版本控制。 第1 3 8項的系統,其中一特定的客 該特定檔案之一特定的複製備份之 定的複製備份之個別的部份之最近 控制端點許可下該特定的客戶端點 特定的複製備份之該部份。 第139項的系統,其中該特定的客 的座落在該特定的客戶端點之儲存Page 119 6. The scope of the patent application is backed up on one of the remote server endpoints or on a specific additional file server endpoint, which is the most efficient for the specific client point. 133 The system of item 131 of the patent scope even includes.-A specific client point can communicate with a specific file server endpoint via at least a local area network, and broadcast the case through the local area network == A copy of the backup in the specific additional slot case 134, a way to provide multi-users in any geographic location, a pre-approved subscription to the user end case 4 server endpoint communication, service The device allows the user to pre-approve subscription to access the files of the file group, communicate via the file server endpoint, and more than one of the user group is used in one of the specific client points to locally appear in the specific One or more of the endpoints stored on the specified each virtual storage device in the file group, and the user and the running application have file access; and the remote file therein The server endpoint file designates an access-controllable slot storage system, including: a fixed client point, which is used by a user of a WAN user group to communicate with a remote file by the WAN, Each user of the user group is served by the respective client point and the remote end includes an messenger that allows pre-subscribed subscriptions to access the file group, and an interface for applying file access, storing clients, The file of the actual storage device in the point, by storing the file at the specific client =, is treated as storing the file by specifying the file in an ambiguous form at the specific client point. Used as access control for endpoints in a particular file group. 487843 ~~~~ · ——_ VI. Scope of Patent Application 13 5. If you apply for a special endpoint, you need to save it. If the file is controlled by the endpoint, the file is allowed. 13 6. If you apply for a special account endpoint, you will respond to the specific file in the remote file. For 1 3 7, if you apply for a special account endpoint, respond to get the specific file from the specific client. For example, if you apply for a dedicated feeder endpoint to a version control terminal, if you apply for a special account, the request is a part of the updated version of the file, only if you want to access the specific file 140 'such as The application for the end point of the special account is to obtain the file in the real profit area, and in the case of the profit area, serve the monthly profit device. The profitable area is specified from the end point to the further profit area point. And the system of item 134 in the area of this version of the case, 'one of the building cases in a specific case group, and the specific file, only the county A 1, if the specific The client points A to access the particular item 135 of the system, wherein the particular client endpoint issues a request, and the endpoint responds to determine that the file is the control endpoint sending the request. The system of clause 136, wherein the specific guest access control endpoint receives a response, and the access control endpoint sends a message about de-registering directly. The system of item 134 is the version control of the remote file and the specific file. The system of item 138, in which a particular client is one of the particular files, a particular copy of the backup, a particular copy of the backup, an individual part of the nearest control endpoint, and the particular client points the specific copy of the backup That part. The system of clause 139, wherein the particular customer's location is stored in the particular client site 第121頁 ----— 六、申請專利範圍 装置中去儲存該特 141、如申請專利 戶端點發出一請求 特定檔案之一部份 其中該遠端檔案伺 特定的檔案,對該 14 2、 如申請專利 戶端點,回應以從 從該特定的客戶端 息到該版本控制的 14 3、 如申請專利 該特定的檔案,該 出版本更新的訊息 近已經發生更動。 定的複製備份之該部份。 範圍第1 3 9項的系統,其中該特定的客 到該遠端樓案伺服器端點以確定至少該 是最近更新之版本,以及 服器端點,回應去決定出該一檔案是該 版本控制的端點送出該訊息。 範圍第1 41項的系統,其中該特定的客 該版本控制的端點去接收一回應,直接Page 121 --- 6. The patent application scope stores the special 141. If the patent applicant endpoint sends a request for a part of a specific file, the remote file serves a specific file, and the 14 2 For example, if the endpoint of the patent applicant responds with the information from the specific client to the version control 14 3. If the patent is filed for the specific file, the version update message has recently changed. This part of the scheduled copy backup. The system of scope item 139, in which the particular client arrives at the remote building server endpoint to determine at least the most recently updated version, and the server endpoint responds to decide that the file is the version The controlling endpoint sends the message. The system of scope item 1 41, in which the specific client and the version control endpoint receive a response directly 點發出關於特定檔案的版本進一步的訊 端點。 範圍第1 4 2項的系統,其中回應去修改 特疋的客戶端點對該版本控制的端點發 以對該權案指示出在該特定的檔案上最 144、 如申請專利範圍第138項的系統,其中該版本控制. 的端點也是該特定的檔案的存取控制的端點。 145、 如申請專利範圍第134項的系統,更包括: 一區域的儲存裝置,實質的在一局部性出現在該特定的客Click to send further information about the version of a particular file to the endpoint. The system with the scope of item No. 142, in which the client point that responds to the modification of the special endpoint sends the version control endpoint to indicate the maximum number of 144 on the particular file, such as the scope of the patent application for item No. 138. The endpoint of the system where the version is controlled is also the endpoint of the access control for that particular file. 145. If the system of the scope of application for the patent is No. 134, it further includes: a storage device in a region, which actually appears locally on the specific customer 戶端點,用來儲存該指定可存取的檔案的一個或一個以上 之複製備份, 其中,如果在該特定的客戶端點之一使用者或一執行的應 用程式’希望去存取一指定的可存取檔案然後·· (I)該區域的儲存裝置存取儲存在實質地區域的儲存裝 置中的指定的可存取的擋案之該正確的複製備份,如果該User endpoint, used to store one or more duplicate backups of the specified accessible file, where if a user or an executing application at the particular client point 'want to access a specified The accessible file then ... (I) the storage device in the area accesses the correct copy backup of the specified accessible file stored in the storage device in the physical area, if the 第122頁 487843 六、申請專利範圍 ~~~~- 指定的可存取的檔案之一正確的複製備份,其希望去存 取’是儲存在實質地區域出現之儲存裝置;以及 (I)經由該廣域網路該特定的客戶端點從該遠端檔案伺 服器端點到該特定的客戶端點去下載,該指定的可存取的 檔案之一複製備份與在該下載的複製備份上執行該存取, 如果沒有該指定的可存取的檔案之正確的複製備份,其希 望去存取’疋儲存在實質地區域出現之儲存裝置。、 14 6、如申請專利範圍第1 34項的系統,更包括: 根據現在可利用的該特定的客戶端點用來存取該特 案其對檔案分享存取模式不相容之一檔案分享存取模式虽 避免從另一客戶端點同時存取該特定的客戶端點的一^ 備份。 吸表 1 4 7、如 依照對檔 戶端點的 的應用程 148 如 一客戶端 夠同時非 在每一該 149、如 一管理者 子郵件位 群體;以 申請專利範圍 案分享之粒子 一多數執行應 式去同時存取 申請專利範圍 點直接去存取 直接地去存取 客戶端點直接 申請專利範圍 知點用來傳送 址以邀請該使 及 第1 3 4項的系統,更包括: 性,依附,在二個或二個以上之客 用程式允許該群體的每一客戶 該檔案中相同的一個。 點 第147項的系統,其中是無法由 特定的檔案,以及其中每一客戶&amp; 此特定的檔案,透過一中間 : 執行。 點其 第1 3 4項的系統’更包括·· 一訊息給予一使用者的網際網路雷 用者加入該預先同意訂閱的使用者Page 122 487843 VI. Scope of patent application ~~~~-One of the specified accessible files is a correct copy and backup, and it wants to access' is a storage device stored in a physical area; and (I) via The specific client point of the wide area network downloads from the remote file server endpoint to the specific client point, and one of the designated accessible files is copied and backed up, and the downloaded copy backup is executed. Access, if there is no correct copy backup of the designated accessible file, it wants to access the storage device which appears in the physical area. 146. The system according to item No. 1 34 of the scope of patent application, further includes: According to the specific client point that is currently available for accessing the special case, which is incompatible with file sharing access mode, file sharing The access mode avoids simultaneous access to a backup of that particular client point from another client point. Suction table 1 4 7. According to the application program 148 of the file endpoint, such as a client is not enough in each of the 149, such as a group of administrator sub-mail bits; the majority of the particles shared in the scope of the patent application are implemented Application to simultaneously access the patent application scope point directly to access directly to the client point application directly to the patent scope knowledge point to send the address to invite the ambassador and item 134 system, including: sex, Dependently, two or more guest programs allow each client of the group to have the same one in the file. Click on the system of item 147, in which a specific file cannot be executed, and each customer &amp; this specific file is executed through an intermediate:. Click on the system of item 1 3 4 'to include ... a message to an Internet user of a user to join the user who agreed to subscribe in advance 第123頁 487843 六、申請專利範圍 ^^ -- ,,用者在該訊息中使用該資訊操作一客戶端點以發出請 來去加入該預先同意訂閱的使用者群體。 bo、如申請專利範圍第149項的系統,其中只可使用該 讯息一次去加入該預先同意訂閱的使用者群體。 、〜如申請專利範圍第145項的系統,更包括: ,疋的客戶端點,其中在該特定的客戶端點與該遠端伺 ^ ^端點之間該特定的客戶端點與該遠端伺服器端點二者 〜也、連接,所以該特定的客戶端點辨別該遠端伺服器端 點之識別,而且該遠端伺服器端點辨別該特定的端 之使用者的識別。 細, 152/如申請專利範圍第151項的系統,其中該特定的客 ^端點更架設用來在該特定的客戶端點中使用對客戶端點 二、头仁該达知槽案伺服器端點卻不熟知的一加密的方法與 去加密一檔案的資料,以及 /子 為上傳該加密的資料到該遠端檔案伺服器端點,以及其中 該儲存裝置更架設用來在該遠端檔案伺服器端點中 加密的資料。 ^ 153/如申請專利範圍第152項的系統,其中該特定的客 戶端點更架設用來在該特定的客戶端點中使用只為客戶端 點熟知的一資料鍵值去加密該檔案,使用一公用鍵值以 密該資料鍵值,以及用來 σ 傳送該加密的資料鍵值到該遠端檔案伺服器端點,以及其 中該儲存裝置更架設用來在該遠端檔案伺服器端點中儲^ 該加密的資料鍵值,其中該遠端檔案伺服器端點缺少能夠Page 123 487843 6. Scope of patent application ^^-, the user uses the information in this message to operate a client point to send out an invitation to join the user group that has agreed to subscribe in advance. bo. For the system under the scope of patent application No. 149, the information can only be used once to join the user group of the pre-approved subscription. The system, such as the 145th patent application scope, further includes: 疋, the client point, where the specific client point and the remote point are between the specific client point and the remote server endpoint. Both end server endpoints are also connected, so the specific client point identifies the identity of the remote server endpoint, and the remote server endpoint identifies the identity of the user of that particular end. Fine, 152 / If the system of the scope of patent application No. 151, the specific client endpoint is further set up to use the client server in the specific client site An encryption method and de-encrypting data of a file that the endpoint is not familiar with, and / or uploading the encrypted data to an endpoint of the remote file server, and wherein the storage device is further set up at the remote end Encrypted data in the file server endpoint. ^ 153 / If the system of the scope of patent application No. 152, the specific client point is further set up to use a data key value only known to the client point to encrypt the file in the specific client point, use A public key to encrypt the data key, and to send the encrypted data key to the remote file server endpoint, and wherein the storage device is further configured to be used at the remote file server endpoint ^ The encrypted data key value, where the remote file server endpoint is missing 第124頁 487843 六、申請專利範圍 對該資料鍵值解密之專用鍵值。 154、如申請專利範圍第153項的系統,其中該特定的客 戶端點更架設用來在該特定的客戶端點中使用一 έ士人 預先同意訂閱的使用者群體之另一使用者的第二鍵值/ 以去加密該資料鍵值,以及用來傳送該第二加密的資 值到該遠^檔案伺服器端點,以及其中該儲存裝置更架設 用來在該遠端檔案伺服器端點中儲存該第二加密的資料鍵 值,其中該特定的客戶端點與該遠端檔案伺服器端點二者 缺少能夠對該資料鍵值解密之該專用鍵值。° 155、 如申請專利範圍第151項的系統,其中該 更架設用來檢索一特定檔案之該加密資料,其中該 :飼服器端點更架設用來傳送該加密資料到二特定X的客; 兮,#安m… 使用對客戶端點熟知但 該資料。 |个…夫的解社、的方法學去解密 156、 如申請專利範圍第151項的系統, 伺服器端點更架設用來接收,從_ 甲該逖知檔案 求以存取一特定的播帛 來 ^尸端點之'•月 檔案之權限存取權利允許該特定由結合該特定的 存取,以及如果允許結合該;端點請求之特定的 只允由兮姓—&amp;穸&amp;特疋的檔案之權限存取權利, 兄斤精由該特疋的客戶端點對該 157、 如申請專利範圍第134項的系統,其田案存取荦 伺服器端點更架設用來接收從 、端點Τ播案 存取肖疋的棺案,用來決定是否藉由結合該特定的楼Page 124 487843 VI. Scope of patent application Dedicated key value for decrypting the data key value. 154. For example, the system of claim 153 of the scope of patent application, wherein the specific client point is further set up to use another user's first Two-key value / to encrypt the data key value, and used to send the second encrypted value to the remote file server endpoint, and wherein the storage device is further configured to be used on the remote file server end The second encrypted data key value is stored in the point, and both the specific client point and the remote file server endpoint lack the dedicated key value capable of decrypting the data key value. ° 155. If the system of the scope of patent application No. 151 is applied, the erection is used to retrieve the encrypted data of a specific file, wherein: the endpoint of the feeder is erected to transmit the encrypted data to the customers of two specific Xs. ; Xi, # 安 m ... Use the information that is familiar to client points. … The solution of the husband, the methodology of decryption 156, such as the system of patent application No. 151, the server endpoint is set up to receive, from _ A knowledge file to access a specific broadcast帛 来 ^ The end of the corpse's monthly file access right allows the specific access to the specific access, and if the connection is allowed; the specific request from the endpoint is only allowed by the surname— &amp; 穸 &amp; The special file access rights of the special file, the special client's client point to the 157, such as the patent application scope of the 134 system, its field access to the server endpoint is set up to receive from The endpoint TB broadcast access Xiao Xiao's coffin case, used to decide whether to combine the specific building surface 第125頁 六、申請專利範圍 案之權限存取權 取,以及如果允 允許藉由該特定 15 8、 如申請專 一特定的客戶端 其中該遠端檔案 利允許 許結合 的客戶 利範圍 點, 伺服器 傳送一加密的鍵值到一 案伺服器端點不 其中該特定的客 密該傳送的鍵值 解密從該遠端檔 檔案伺服器端點 訊〇 是局部 戶端點 ’以及 案伺服 儲存上 該特定的客戶端點請求之特定的存 該特定的檔案之權限存取權利,只 端點對該特定的檔案去存取。 第1 3 4項的系統,更包括: 端點更架設用來經由一安全的通道 特定的客戶端點,使用在該遠端檔 I4生热知之加遂、功能去加密該鍵值, 更架設用來在該特定的客戶端點解 在該特定的客戶端點使用該鍵值去 器端點下載檔案之資訊或在該遠端 傳的檔案之前去加密一檔案之資 t申?專利範圍第158項的系統,其中該特定的客 疋用來架設在上傳檔案之前壓縮該檔案之該資訊* 解壓縮該檔案順序之該資訊以下載該檔案。 160、士口申請專利範圍第134項的系 '统,更包括:Page 125 VI. Access to the scope of patent application, and if it is allowed to use the specific 15 The server sends an encrypted key value to a server end point of the case where the particular secret should be decrypted from the remote file server end point. The message is a local user's endpoint and it is stored on the server. The specific client point requests specific access rights to save the specific file, and only the endpoint accesses the specific file. The system of item 134 further includes: The endpoint is further set up to use a specific client point of a secure channel to encrypt the key value by using the knowledge and functions of the remote file I4, and to set up the key. It is used at the specific client point to decrypt the file information at the specific client point using the key value endpoint to download the file information or to encrypt a file before the remotely transmitted file? The system of item 158 of the patent, wherein the specific client is used to set up the information of the file to be compressed before uploading the file * to decompress the information of the file sequence to download the file. 160. The system of No. 134 of Shikou's patent application scope includes: 定的客戶端點用來在上傳構案之前壓縮該稽案之該^ 讯或解壓縮該檔案順序之該資訊以下載該檔案。 一預先同意訂閱的使用者群體之每一使用者去存取另一檔 案的群體經由一個別的客戶端點與該遠端檔案伺服器端點 通訊經由該廣域網路,其中每—預先同意訂閱的使用者群 1:1、#申請專利範圍第134項的系、统,其中該遠端檔案 词服器端點也架設用來使得一個或一個以上之使用者之;The specified client point is used to compress the information of the audit case or decompress the information of the file sequence to download the file before uploading the case. A group of users who have previously agreed to subscribe to each group of users to access another file communicates with the remote file server endpoint through another wide client point via the wide area network, where User group 1: 1, # system of patent application scope 134, where the remote file server endpoint is also set up to enable one or more users; 第 126 f 487843 六、申請專利範圍 體包含一不$的使用者子集合一般 用者, 、,主&gt; 一 其中該特定的使用者是能夠同時在每一 162、 如申請專利範圍第134項的系統,更子 ::能夠在一個或一個以上之額外的檔服 中去存取一個或一個以上之該檔案。 ’、艮 163、 如申請專利範圍第162項的系統,更包 ;:η: ΐ是能夠經由一廣域網路與額外的標 器鈿點返埏地通讯,而且架設用來存一 複製備份 特疋的檔 在該遠端伺服器端點之一個上或一特定的額外 器端點上,其對該特定的客戶端點是最有效率。 164、 如申請專利範圍第162項的系統,更包括: 一特定的使用者能夠至少經由一區域網路與特定之 槽案伺服為端點通訊,而且架設用來在該特定的額 案的伺服器端點中經由該區域網路去存取一〜 一複製備份。 165、 一種用於提供多用戶檔案儲存的系統,包括 經由一廣域網路,一遠端檔案伺服器端點用來使得 一個以上的使用者之預先同意訂閱的使用者群體之 用者在任意的地理位置中運作一任意的客戶端點與 檔案伺服器端點通訊, ” ~ 經由該廣域網路,在該遠端檔案伺服器端點中的一 置用來使得預先同意訂閱的使用者群體之每一使用 特 定的使 槽案。 器端點 案伺服 案的一 案伺服 額外的 外之檔 檔案的 一個或 每一使 一遠端 儲存裝 者去存Article 126f 487843 6. The scope of patent application includes a sub-set of users who are not common users, ,, and master>-where the specific user is able to simultaneously in every 162, such as the 134th scope of the patent application System, more sub :: Ability to access one or more of the files in one or more additional files. ', Gen163, such as the system for applying for patent No. 162, more packages;: η: ΐ is able to communicate with additional targets via a wide area network, and is set up to store a copy backup feature 疋The file on one of the remote server endpoints or on a particular extra endpoint is most efficient for that particular client endpoint. 164. If the system of patent application No. 162, further includes: a specific user can communicate with a specific slot server as an endpoint at least through a local area network, and set up a server for the specific amount The server endpoint accesses one to one copy backup via the local area network. 165. A system for providing multi-user file storage, including via a wide area network and a remote file server endpoint to enable more than one user's users in advance to subscribe to a user group of users in any geographic location An arbitrary client point operates in the location to communicate with the file server endpoint, "~ Through the wide area network, a set in the remote file server endpoint is used to enable each of the user groups that have previously agreed to subscribe Use a specific storage case. Server end case Servo case One or each of the extra files is saved by a remote storage installer 第127頁 487843 六、申請專利範圍 取該檔案群體 伺服器端點通 預先同意訂閱 檔案群體,以 一特定的客戶 其中該遠端檔 器端點經由一 戶端點 加密功 在該特 其中該 用該鍵 資訊或 密一檔 其中該 定的檔 166、 戶端點 其中如 取控制 檔案。 167 ^ 戶端點 其中該 ,使用 能去加 定的客 特定的 值去解 在該遠 案之資 遠端檔 案指定 如申請 請求去 果該一 的端點 如申請 對該遠 遠端檔 的 訊 的 及 端 案 安 在 密 戶 客 密 端 訊 案 存 專 存 檔 允 專 端 案 檔案經由該各自的客戶端點與該遠端檔案 ’在該遠端檔案伺服器端點同時包含^許 使用者群體中之超過一個使用者去存取今 點, 伺月艮器 全的通 該遠端 該鍵值 端點去 戶端點 從該遠 檔案伺 ;以及 伺月艮器 取控制 利範圍 取該檔 案是該 許,在 利範圍 檔案伺 伺服器 端點也架設用來從該遠端檔案祠服 道傳送一加密的鍵值到一特定的客 檔案伺服器端點不是局部性熟知之 j 解密該傳送的鍵值, 也架設用來在該特定的客 端標案伺服器端點下載之一$荦^ 服器端點儲存上傳的槽案“;加 端;也用來對該檔案之群體之一特 一存取控制的端點。 特 第1 6 5項的系、统 安我胁山 丹平一特定之客 體中的檔案中之一個,以及 該特定的客戶二有疋在如果該可存 戶鳊點中存取該特定的 第1 6 6項的系 服器端點發、出a其中該特定之客 端點回應以* 、疋出該一檔案是該特Page 127 487843 6. The scope of the patent application is to take the file group server endpoint in advance to subscribe to the file group in advance, to a specific customer where the remote file server endpoint is encrypted in a special client by the endpoint encryption function. The key information may be a secret file, the fixed file 166, and the user endpoint, such as a control file. 167 ^ User endpoints, which can be used to add specific customer-specific values to the remote file specified in the remote case. If the application request is to go to the one endpoint, such as to apply for information on the remote end file. The security and security of the case file is kept in the private account of the confidential client, allowing the case file to pass through the respective client point and the remote file at the same time as the remote file server endpoint contains the user group If more than one user accesses this point, the server will pass the remote end of the key-value endpoint to the user endpoint from the remote file; and the server will take control to obtain the file. In this case, the endpoint of the file server is also set up to transmit an encrypted key value from the remote file server to a specific guest file server. The endpoint of the server is not locally known. The key value is also set to download one of the $ 荦 ^ server endpoint storage upload slot files on the specific client's project server endpoint; add the end; it is also used to specialize one of the groups of the file An access control endpoint. The system of item 16.5 is one of the files in a specific object of the Wakayama Tanpei, and the specific customer has access to the specific item 1 6 6 The server endpoint of the item sends and outputs a, where the specific guest endpoint responds with *, and it is the special file 第128頁 六、申請專利範圍 定的檔案,對哕 168、如申姓〜存取控制的端點送出該請求。 戶端點,回^範圍第1 6 7項的系統,其中該特定的客 從該特定的^以從該可存取控制的端點接收一回應,直接 取該特定梓垒戶端點對該可存取控制的端點發出關於去存 1 6 9、如‘二之進一步的訊息。 伺服器端°點=^利範圍第165項的系統,其中該遠端檔案 制。 ·、一版本控制端點指定該特定檔案的版本控 17 0、 如申《X主宙 戶端點請求Ιί!?範圍第169項的系統,其中該特定的客 一部份是該梓宏疋至少該特定檔案之一特定的複製備份之 更新之版本f茶之該特定的複製備份之個別的部份之最近 點Ιϊίίΐ3版本控制端點許可下’該特定的客戶端 171 ^、疋檔案之該特定的複製備份之該部份。 戶端點利範圍第170項的系統,其中該特定的客 ^ 見貝地區域的座落在該特定的客戶端點之儲在 ,置中去儲存該特定的複製備份之該部份。戶知點之储存 戶2端點利範圍第170項的系統’其中該特定的客 定檔案之-部份是最近更新之版本,該特 伺服器端點回庫去氺定出嗲一栲莹3兮ί其中該退端標案 版本控制的端點送出該訊息。 疋的檔案’對該 173 '如申請專利範圍第1 72項的系統,其巾仏 戶端點, 兵中該特定的客Page 128 6. The file with the scope of the patent application shall send the request to the endpoint of 如 168, such as the last name of the application and the access control. User endpoint, the system of item 167 in the range, wherein the specific customer receives a response from the specific endpoint to the access-controllable endpoint, and directly fetches the specific endpoint from the specific endpoint. The access-controllable endpoint sends a further message about de-registering 169, such as' two's. The server-side ° point = system of item 165 in the profit range, where the remote file system. · A version control endpoint specifies the version control of that particular file. 17 0, such as the application of "X Master's Endpoint Request I !!? Scope 169, in which part of the specific customer is the Acer Acer At least one of the specific files of the updated version of the specific copy backup, the latest point of the individual part of the specific copy of the backup, Ιΐί 端点 3, under the license of the version control endpoint 'the specific client 171, the file of the This part of the specific replication backup. The system of item 170 of the user's profit range, in which the specific customer ^ see the storage of the specific client site in the Betti area, centered to store the part of the specific copy backup. The system of storing 170 points of the endpoint 2 of the user's knowledge point, where the-part of this specific customized file is the most recently updated version, and the special server endpoint is returned to the library to determine the final result. 3 The endpoint where the backend version version control sends the message.疋 's file' for this 173 'such as the system of patent application No. 1 72, its user end points, the specific customer in the army 第129頁 487843 六、申請專利範圍 回應以從該版本控制的端點去接收一回應 的客戶端點發出關於特定檔案的版本進一 本控制的端點。 174、 如申請專利範圍第1 73項的系統,: 該特定的檔案,該特定的客戶端點對該槽 的訊息到該版本控制的端點以指示出在 近已經發生更動。 175、 如申請專利範圍第169項的系統, 的端點也是該特定的檔案的該存取控制 176、 如申請專利範圍第165項的系統, 戶端點也用來架設作為在上傳檔案之前 σ孔或解壓縮該檔案順序之該資訊以下載 ,直接從該特定 步的訊息到該版 ^中回應去修改 案發出版本更新 特定的檔案上最 ^中該版本控制 端點。 (中該特定的客 縮該檔案之該資 槽案。P.129 487843 6. Scope of Patent Application Response The client point that receives a response from the endpoint of this version control sends out an endpoint that controls the version of a specific file. 174. If the system of the scope of patent application No. 1 73: The specific file, the specific client points the information of the slot to the endpoint of the version control to indicate that a change has occurred recently. 175. If the system of the scope of the patent application is 169, the endpoint is also the access control of the specific file. 176. If the system of the scope of the patent application 165, the endpoint is also used to set up as before uploading the file. Hole or decompress the information of the file sequence to download, and directly respond to the version ^ from the message of the specific step to issue a version update to update the version control endpoint on the specific file. (In the case of the particular client that contracted the file.
TW089123020A 1999-11-01 2000-11-23 Internet-based shared file service with native PC client access and semantics and distributed access control TW487843B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US16300899P 1999-11-01 1999-11-01

Publications (1)

Publication Number Publication Date
TW487843B true TW487843B (en) 2002-05-21

Family

ID=22588064

Family Applications (3)

Application Number Title Priority Date Filing Date
TW089123018A TW561735B (en) 1999-11-01 2000-11-23 Internet-based shared file service with native PC client access and semantics
TW089123020A TW487843B (en) 1999-11-01 2000-11-23 Internet-based shared file service with native PC client access and semantics and distributed access control
TW089123019A TW498217B (en) 1999-11-01 2000-11-23 Internet-based shared file service with native PC client access and semantics and distributed version control

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW089123018A TW561735B (en) 1999-11-01 2000-11-23 Internet-based shared file service with native PC client access and semantics

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW089123019A TW498217B (en) 1999-11-01 2000-11-23 Internet-based shared file service with native PC client access and semantics and distributed version control

Country Status (3)

Country Link
AU (3) AU1451001A (en)
TW (3) TW561735B (en)
WO (3) WO2001033361A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI459217B (en) * 2008-06-25 2014-11-01 Microsoft Corp Method, computer system, and computer storage medium for coauthoring
TWI488476B (en) * 2011-09-27 2015-06-11

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2299946A1 (en) 2000-03-03 2001-09-03 Destiny Software Productions Inc. Digital media distribution method and system
US6715050B2 (en) * 2001-05-31 2004-03-30 Oracle International Corporation Storage access keys
US7685126B2 (en) 2001-08-03 2010-03-23 Isilon Systems, Inc. System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
AU2002366270A1 (en) * 2001-12-10 2003-09-09 Incipient, Inc. Fast path for performing data operations
US6986015B2 (en) 2001-12-10 2006-01-10 Incipient, Inc. Fast path caching
US7013379B1 (en) 2001-12-10 2006-03-14 Incipient, Inc. I/O primitives
US6959373B2 (en) 2001-12-10 2005-10-25 Incipient, Inc. Dynamic and variable length extents
US7173929B1 (en) 2001-12-10 2007-02-06 Incipient, Inc. Fast path for performing data operations
CA2407774C (en) 2002-07-16 2005-01-04 Musicrypt Inc. Content distribution system and method
DE10257819B4 (en) * 2002-12-10 2005-10-13 Web.De Ag Network-based data access with separate data transfer and data transfer
US7953794B2 (en) 2005-01-14 2011-05-31 Microsoft Corporation Method and system for transitioning between synchronous and asynchronous communication modes
US7593943B2 (en) 2005-01-14 2009-09-22 Microsoft Corporation Method and system for synchronizing multiple user revisions to a shared object
US8966080B2 (en) 2007-04-13 2015-02-24 Emc Corporation Systems and methods of managing resource utilization on a threaded computer system
TWI447584B (en) 2010-11-01 2014-08-01 Inst Information Industry System for multi-user network storage service sharing and method thereof
DE102012202382A1 (en) * 2012-02-16 2013-08-22 Cortado Ag Method and arrangement for managing data and a corresponding computer program and a corresponding computer-readable storage medium
TWI571754B (en) * 2015-02-02 2017-02-21 群暉科技股份有限公司 Method for performing file synchronization control, and associated apparatus
CN106487761B (en) * 2015-08-28 2020-03-10 华为终端有限公司 Message transmission method and network equipment
CN106446142A (en) * 2016-09-21 2017-02-22 郑州云海信息技术有限公司 Design method of inter-regional file system
CN106933686A (en) * 2017-03-10 2017-07-07 广东欧珀移动通信有限公司 A kind of method for adjusting broadcast message queue, device and terminal

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1337132C (en) * 1988-07-15 1995-09-26 Robert Filepp Reception system for an interactive computer network and method of operation
US5864683A (en) * 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5966715A (en) * 1995-12-29 1999-10-12 Csg Systems, Inc. Application and database security and integrity system and method
US5838910A (en) * 1996-03-14 1998-11-17 Domenikos; Steven D. Systems and methods for executing application programs from a memory device linked to a server at an internet site
US5862346A (en) * 1996-06-28 1999-01-19 Metadigm Distributed group activity data network system and corresponding method
US5918019A (en) * 1996-07-29 1999-06-29 Cisco Technology, Inc. Virtual dial-up protocol for network communication
US5987506A (en) * 1996-11-22 1999-11-16 Mangosoft Corporation Remote access and geographically distributed computers in a globally addressable storage environment
US5889942A (en) * 1996-12-18 1999-03-30 Orenshteyn; Alexander S. Secured system for accessing application services from a remote station

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI459217B (en) * 2008-06-25 2014-11-01 Microsoft Corp Method, computer system, and computer storage medium for coauthoring
TWI488476B (en) * 2011-09-27 2015-06-11

Also Published As

Publication number Publication date
TW498217B (en) 2002-08-11
TW561735B (en) 2003-11-11
WO2001033383A9 (en) 2002-05-16
WO2001033361A1 (en) 2001-05-10
WO2001033829A3 (en) 2002-03-28
AU1451001A (en) 2001-05-14
WO2001033829A2 (en) 2001-05-10
WO2001033829A9 (en) 2002-07-04
AU2041301A (en) 2001-05-14
WO2001033383A1 (en) 2001-05-10
AU1450901A (en) 2001-05-14

Similar Documents

Publication Publication Date Title
TW487843B (en) Internet-based shared file service with native PC client access and semantics and distributed access control
US11863380B2 (en) Community internet drive
US11330055B2 (en) Data retrieval in a hybrid cloud
US7058696B1 (en) Internet-based shared file service with native PC client access and semantics
US20060129627A1 (en) Internet-based shared file service with native PC client access and semantics and distributed version control
JP5526137B2 (en) Selective data transfer storage
US9621405B2 (en) Constant access gateway and de-duplicated data cache server
TW200401201A (en) Secured and access controlled peer-to-peer resource sharing method and apparatus
US10860226B2 (en) Systems and methods of synchronizing configuration information in a clustered storage environment
US11689629B2 (en) Binding a public cloud user account and a personal cloud user account for a hybrid cloud environment
US11533377B2 (en) Hybrid cloud
Presley et al. Hydra--A Federated Data Repository over NDN
Zhang et al. A study of the use of idas in cloud storage
JP6435616B2 (en) Storage device, storage system, storage system control method and control program
US20220405415A1 (en) Hybrid cloud
Choudhari et al. Security and Privacy of AWS S3
Hakkala Consistency management in distributed storage systems

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees