TW515953B - Method and apparatus for proprietary data collection and distribution - Google Patents

Method and apparatus for proprietary data collection and distribution Download PDF

Info

Publication number
TW515953B
TW515953B TW89123073A TW89123073A TW515953B TW 515953 B TW515953 B TW 515953B TW 89123073 A TW89123073 A TW 89123073A TW 89123073 A TW89123073 A TW 89123073A TW 515953 B TW515953 B TW 515953B
Authority
TW
Taiwan
Prior art keywords
real
database
time data
data
patent application
Prior art date
Application number
TW89123073A
Other languages
Chinese (zh)
Inventor
Subhash Patankar
Original Assignee
Avantcom Network Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avantcom Network Inc filed Critical Avantcom Network Inc
Application granted granted Critical
Publication of TW515953B publication Critical patent/TW515953B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An industry wide system for collecting and distributing real-time data that includes a central network having a database for receiving real-time data and one or more local networks connected to the central network via an internet network. Each local network collects real-time data and transmits the real-time data to the central network database via a secure transmission mode. Access to the central and local network databases is controlled according to prearranged rules that are implemented by an access control program. A user can access the central network database and the real-time data remotely via the internet network. The data stored at any of the network locations may be proprietary. An owner of such proprietary data can share some or all of such proprietary data with the owner's of the other local networks according to rules specified by the owner of the proprietary data.

Description

515953 A7 B7 經濟部智慧財產局員工消費合作社印制衣 五、發明說明( 相關申請中之申請案之交互參考 本申請案主張1999年11月3日提申且係名稱爲”專有 資料收集與傳佈之方法與裝置”之美國臨時申請案序號 60/163,231之利益,其內容在此被明確整合參考之。 發明領域 本發明有關於一種提供專有資料收集與傳佈之方法與 裝置,且更特別地,有關於一允許收集專有資訊及安全、 即時、事件導向的傳佈該專有資訊至網路用戶。 發明背景 在一高科技製造環境中,許多型態的製造操作通常係 繫在一起以便控制工作進程及監視品質、生產量、維護事 宜及該操作的其它型態。爲了完成此資料收集及監視,某 些製造商連接所有相關的機器至一共用信號載子或匯流排 ,其以一特別格式自每個機器中收集即時資料。一這類系 統例係一具有經一區域網路(LAN)連接至一伺服器之處理 設備之半導體製造操作。該資料收集係經一例如由加州 Palo Alto 城的 TIBCO Software 公司所提供之 Information Bus或TIB之傳訊軟體系統來完成。 典型地,一製造商選擇收集之資料型式及儲存格式。 與該製造處理參數相關資料、品質控制及生產量通常係視 爲專有資訊並儲存於一位在該製造商所在處之伺服器中。 對該伺服器及該特定專有資訊的存取常受限於該製造商操 4 私氏張尺度適用中國國家標準(CNS)A4規格(21G X 297公爱)"" — *t--------tT---------線 (請先閱讀背面之注意事項再填寫本頁) 515953 A7 B7 五、發明說明(/) 作上的某些數字。然而,通常,這些資料須被分析,以決 定在該製造處理中引起的缺陷或問題,以發展改進該處理 流程。專業性科學家及來自第三者組織的專家常承辦主導 此分析並推薦解決方案。在一件設備或用於該製造處理之 消耗性材料的執行效率係一議題的例子中,須牽涉到該件 特定設備或材料的供應商。因此,對這些外部承辦專家及 供應商有一對與該製造處理相關的專有資料取得控制存取 的需求,用以與該製造商的人事分工合作來解決問題。 一牽涉到分享製造商的第三者專家及供應商間專有資 料的分工合作環境相關的問題包含不同資料格式及複雜的 管理協調與存取控制機制間的不相容。再者,透過該分享 性資料的安全性考量,尤其是傳出該製造商的設備,使得 製造商勉強分享電子性詳細即時資料。所以,有一用於一 允許以相容格式收集專有資訊及安全、即時及事件導向傳 佈該專有資訊至網路用戶之工業級網路之需求。 發明槪要 通常,在一型態中,本發明提供一用以收集及傳佈即 時資料之工業級系統。該工業級系統包含一具有一用以接 收即時資料之資料庫之集中式網路及一用以根據一第一格 式收集之第一組即時資料並經由一安全傳輸模式傳送該第 一組即時資料至該集中式網路資料庫之第一區域網路。對 該資料庫及即時資料之存取係受控制的。 本發明之實現可包含一或更多下列特徵。根據預先安 5 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂---------線 __ 經濟部智慧財產局員工消費合作社印制衣 經濟部智慧財產局員工消費合作社印製 515953 A7 ______B7 五、發明說明(彳) 排之規則控制對該資料庫的存取且該規則可由一存取控制 程式來架構。一操作者可經由一網際網路遠端存取該資料 庫及該即時資料。該即時資料可以是專有的。該安全傳輸 模式可包含加密該即時資料及經由一網際網路傳送該加密 資料。 該系統也可包含一第二區域網路,其根據第二格式收 集一第二組資料,並經由一安全傳輸模式傳送該第二組資 料至該集中式網路資料庫之。分別連接至該第一及第二區 域網路之第一及第二操作者可對該集中式網路資料庫及該 第一及第二組資料作存取。第一區域網路可被座落在一製 造公司而第一組即時資料可以是即時製造處理參數。第一 區域網路可被座落在一設備供應公司,而第二組資料可以 是設備相關資料。 該系統也可包含一用以接收及傳送即時資料之傳訊軟 體、一用以分別加密及解密該傳送及接收之即時資料之加 密軟體、一修復報告管理軟體、一商業規則管理軟體、一 人員特徵管理軟體、一靜態資料輸入管理軟體、一即時監 視軟體、一設備登錄管理軟體、一事件管理軟體、用以分 析該即時資料之分析軟體、〜用以在該資料庫中聆聽、佇 候及更新該即時資料之訂購軟體及一用以提供安全性、冗 餘性、可調性(scalability)、備份、復原、複製及同步資料 之資料複製軟體。 通常,在另一型態中,本發明之特色爲一用以收集及 傳佈即時資料之工業級系統,其包含一具有一用以接收即 6 本紙張尺度適用中國國家標準(CNS)A4規格(210^7^7 . ^裝--------tr---------線9 (請先閱讀背面之注意事項再填寫本頁) 515953 經濟部智慧財產局員工消費合作社印制衣 A7 B7 五、發明說明(w) 時資料之資料庫之集中式網路及經由一安全傳輸模式收集 及傳送複數個即時資料至該集中式網路資料庫之複數個區 域網路。一連接至該區域網路中至少其中之一之操作者可 對該集中式網路資料庫及該複數資料作存取。根據預先安 排之規則來控制存取而該規則可由一存取控制程式來實施 〇 通常,在另一型態中,本發明之特色爲一用以收集及 傳佈即時資料之方法,其包含提供一具有一用以接收即時 資料之資料庫之集中式網路、提供一用以根據一第一格式 收集之第一組即時資料並經由一安全傳輸模式傳送該第一 組即時資料至該集中式網路資料庫之第一區域網路。根據 預先安排之規則控制對該資料庫之存取,且該規則可由一 存取,控制程式來實施。 本發明之優點可以是後文之一或多個。該系統提供經 由一網際網路之無法侵入之商業對商業通訊及分工合作。 其提供標準或自製方面之分享式即時資料並報告給訂購之 公司。該系統也提供分析工具並根據預先安排之規則而允 許互換專有資料之其它分享式軟體。 本發明之一或更多實施例細節係提出於附圖中並說明 於下。本發明之其它特徵、目的及優點自下列說明之該較 佳實施例、該圖式及該申請專利範圍中將變得顯而易見。 圖式簡單說明 第1圖係一包含一製造商的區域集線器、一供應商的 7 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) " - --------訂---------線· (請先閱讀背面之注意事項再填寫本頁) 515953 A7515953 A7 B7 Printed clothing by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Description of the Invention (Cross Reference of Applications in Related Applications) This application claims to be filed on November 3, 1999 and is entitled "Proprietary Information Collection and The method and device of dissemination "has the benefit of US Provisional Application Serial No. 60 / 163,231, the contents of which are expressly incorporated herein by reference. FIELD OF THE INVENTION The present invention relates to a method and device for providing exclusive data collection and dissemination, and more particularly In particular, there is a concern for allowing the collection of proprietary information and the secure, real-time, event-oriented dissemination of this proprietary information to network users. BACKGROUND OF THE INVENTION In a high-tech manufacturing environment, many types of manufacturing operations are often tied together so Control work progress and monitor quality, production volume, maintenance issues and other types of operations. To complete this data collection and monitoring, some manufacturers connect all relevant machines to a common signal carrier or bus, which uses a A special format collects real-time data from each machine. An example of such a system is a system with a connection to a network via a LAN. The semiconductor manufacturing operations of the server processing equipment. The data collection is performed by, for example, an Information Bus or TIB messaging software system provided by TIBCO Software, Inc. of Palo Alto, California. Typically, a manufacturer chooses to collect the data Type and storage format. The data related to the manufacturing process parameters, quality control and production volume are usually considered as proprietary information and stored in a server where the manufacturer is located. The server and the specific proprietary Access to information is often restricted by the manufacturer ’s operations. The private scale is applicable to China National Standard (CNS) A4 (21G X 297 public love) " " — * t -------- tT- -------- Line (Please read the notes on the back before filling this page) 515953 A7 B7 V. Description of the invention (/) Some figures are made. However, usually, these materials must be analyzed to Decide on defects or problems caused in the manufacturing process to develop and improve the process. Professional scientists and experts from third party organizations often undertake this analysis and recommend solutions. In a piece of equipment or for the manufacturing process The implementation efficiency of consumable materials is an example of an issue that must involve the supplier of the specific equipment or material. Therefore, these external contracting experts and suppliers have a pair of proprietary data related to the manufacturing process to obtain control The access requirements are used to work with the manufacturer's personnel division to solve the problem. A division of labor and cooperation environment involving the sharing of proprietary information between third-party experts and suppliers of the manufacturer includes issues related to different data formats and complexity Incompatibility between management coordination and access control mechanisms. Furthermore, through the security considerations of the shared data, especially the equipment of the manufacturer, the manufacturer was forced to share electronic detailed real-time data. Therefore, there is a need for an industrial-grade network that allows the collection of proprietary information in a compatible format and the secure, real-time, and event-oriented dissemination of that proprietary information to network users. SUMMARY OF THE INVENTION Generally, in one form, the present invention provides an industrial-grade system for collecting and disseminating instant data. The industrial system includes a centralized network having a database for receiving real-time data and a first set of real-time data collected according to a first format and transmitting the first set of real-time data through a secure transmission mode To the first local area network of the centralized network database. Access to the database and real-time data is controlled. Implementations of the invention may include one or more of the following features. According to the pre-installed 5 paper standards, the Chinese National Standard (CNS) A4 specification (210 X 297 mm) is applied (please read the precautions on the back before filling this page) Order --------- line __ Economy Printed by the Consumers ’Cooperative of the Ministry of Intellectual Property Bureau. Printed by the Consumers’ Cooperative of the Ministry of Economics and Intellectual Property Bureau of the Ministry of Economic Affairs. Printed 515953 A7 ______B7 V. Invention Description (彳) The rules of the row control access to the database and the rules can be controlled by an access control program To architecture. An operator can remotely access the database and the real-time data via an Internet. The real-time data may be proprietary. The secure transmission mode may include encrypting the real-time data and transmitting the encrypted data via an Internet. The system may also include a second local area network that collects a second set of data according to the second format and transmits the second set of data to the centralized network database via a secure transmission mode. First and second operators connected to the first and second local area networks, respectively, can access the centralized network database and the first and second sets of data. The first local area network can be located in a manufacturing company and the first set of real-time data can be real-time manufacturing process parameters. The first LAN can be located at a device supply company, and the second set of data can be device-related data. The system may also include a messaging software for receiving and transmitting real-time data, an encryption software for respectively encrypting and decrypting the transmitted and received real-time data, a repair report management software, a business rules management software, a personnel feature Management software, a static data input management software, a real-time monitoring software, a device registration management software, an event management software, analysis software for analyzing the real-time data, ~ for listening, waiting and updating in the database The real-time data ordering software and a data copying software for providing security, redundancy, scalability, backup, recovery, replication and synchronization of data. Generally, in another type, the present invention is characterized by an industrial-grade system for collecting and disseminating real-time data, which includes a device for receiving 6 papers, which is applicable to China National Standard (CNS) A4 specifications ( 210 ^ 7 ^ 7. ^ Equipment -------- tr --------- line 9 (Please read the precautions on the back before filling out this page) 515953 Employee Consumer Cooperatives, Bureau of Intellectual Property, Ministry of Economic Affairs Printed clothes A7 B7 V. The centralized network of the database of the data at the time of the description of the invention (w) and the collection and transmission of multiple real-time data to the centralized network database through a secure transmission mode. An operator connected to at least one of the local networks can access the centralized network database and the plurality of data. The access is controlled according to a pre-arranged rule which can be controlled by an access control program Generally, in another type, the present invention is characterized by a method for collecting and distributing real-time data, which includes providing a centralized network with a database for receiving real-time data, providing a For collecting according to a first format The first set of real-time data is transmitted to the first local area network of the centralized network database through a secure transmission mode. Access to the database is controlled according to a pre-arranged rule, and the rule It can be implemented by an access and control program. The advantages of the present invention can be one or more of the following. The system provides non-intrusive business-to-business communication and division of labor via an Internet. It provides standard or self-made aspects Share real-time data and report to the ordering company. The system also provides analysis tools and other shared software that allows the exchange of proprietary data according to pre-arranged rules. Details of one or more embodiments of the invention are set forth in the appendix The figure is illustrated below. Other features, objects, and advantages of the present invention will become apparent from the preferred embodiment, the figure, and the scope of the patent application described below. Brief Description of the Figures Figure 1 contains A manufacturer's regional hub, a supplier's 7 paper sizes are applicable to China National Standard (CNS) A4 (210 X 297 mm) "---- ----- Order --------- Line · (Please read the notes on the back before filling this page) 515953 A7

濟 部 智 慧 財 產 局 員 工 消 費 合 社 印 製 五、發明說明(< ) 區域集線器及一集中式集線器之示意槪圖; > 第2圖係一包含一製造商的區域集線器、一供應簡的 區域集線器、一集中式集線器及一第三者組織集線器之示 意槪圖; 第3圖係一具有一遠端撥號存取之網路系統之示意圖 第4圖係一包含多製造商的區域集線器、多供應商的 區域集線器及一集中式集線器之不意圖; 第5圖係一說明描述一機器,,UP”狀態之不同格式之圖 形; 第6圖係該軟體模組及與該區域集線器及集中式集線 器相關之資料庫之示意槪圖; 第7圖係與該集中式集線器相關之分享式軟體程式之 示意槪圖。 [元件符號說明] 100 :網路;110、120 :區域集線器;150 :集中集線 器;162、164、166 :防火牆;200 :製造商位置;210 :製 造線;212 :化學氣相沉積室;213、217、219 :控制單元 ;214 :光刻台;415、315、215 :資料複製伺服器;216 : 化學機械拋光裝置;218 :品質控制及包裝台;3〇〇 :設備 供應商;410、310 :訊息伺服器;420、320、220 :應用伺 服器;221 :資料庫;222 :資源計畫系統·, 411 :訊息中間 層應用;415、315 :資料複製伺服器;430 :集中式資料 ^------ (請先閱讀背面之注意事項再填寫本頁)Printed by the Consumers ’Cooperative of the Ministry of Intellectual Property of the Ministry of Economic Affairs of Japan 5. Schematic diagram of the invention's regional hub and a centralized hub; > Figure 2 is a regional hub with a manufacturer, a simple supply Schematic diagram of a regional hub, a centralized hub, and a third party organization hub; Figure 3 is a schematic diagram of a network system with remote dial-up access; Figure 4 is a regional hub containing multiple manufacturers, The intention of a multi-vendor regional hub and a centralized hub; Figure 5 is a graphic illustrating the different formats of a machine, UP "state; Figure 6 is the software module and the regional hub and centralized The schematic diagram of the database related to the centralized hub; Figure 7 is the schematic diagram of the shared software program related to the centralized hub. [Description of component symbols] 100: network; 110, 120: regional hub; 150: Centralized hub; 162, 164, 166: firewall; 200: manufacturer location; 210: manufacturing line; 212: chemical vapor deposition chamber; 213, 217, 219: control unit; 214: lithography 415, 315, 215: data copy server; 216: chemical mechanical polishing device; 218: quality control and packaging table; 300: equipment supplier; 410, 310: message server; 420, 320, 220: Application server; 221: database; 222: resource planning system, 411: messaging middle-tier application; 415, 315: data replication server; 430: centralized data ^ ------ (Please read the back first (Notes for filling in this page)

515953 A7 _ B7 五、發明說明(v ) 庫;440、540 :區域網路;520 :個人電腦;605 :區域人 輪廓資料庫;606 :區域輪廓管理器;628 :集中輪廓管理 器程式;700 :安全系統;750 :介面。 發明詳細描述 參考第1圖,網路1〇〇連接區域集線器110及120至 一集中集線器150。該網路100包含允許集線器110及120 透過該集中集線器150彼此互相通訊之軟硬體元件。 區域集線器110係安裝在一製造商位置200,並用來 集中所有該區域資料、資訊及通訊協調。某例中,區域集 線器110支援與一半導體製造操作200相關之資料與資訊 。該半導體製造操作200包含一產生積體電路裝置("晶片") 、一計畫及協調該製造操作之資源計畫系統222、一用於 儲存所有與該半導體製造操作200相關資料之資料庫221 及一在該製造線210、該資源計畫系統222及該資料庫221 間提供連接性之區域網路(LAN) 240。該製造線210包含一 用以沉積薄膜在半導體晶圓上之化學氣相沉積(CVD)室212 、一光刻台214、一化學機械拋光(CMP)裝置216及一品質 控制及包裝台218。用於該CVD室212之控制單元213、 215、217及219、該光刻台214、該CMP裝置216及該品 質控制及包裝線218分別被連接至該LAN網路240。LAN 網路240藉連接至區域集線器網路251來連接至區域集線 器110。類似地,該資源計畫系統222及該資料庫221透 過該LAN網路240及該區域集線器網路251來連接至該區 9 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ' (請先閱讀背面之注意事項再填寫本頁) --------^--------- 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 515953 五、發明說明( 域集線器110。設備212 ' 2M、216及218也直接連接223 至該區域集線器網路251所交流之控制單元213、215、 217及219是不能或不會處理。其它管理及控制系統及它 們的資料庫也直接或透過該LAN網路24〇連接至該區域集 線器網路251。作業員、製造經理、工程師、業務及與該 半導體製造操作200相關之業務經理也連接至該區域集線 器110它們的個人電腦245經LAN網路MO及該區域集線 器網路251來存取該製造操作。在其它具體實施例個人電 腦245係直接連接至該區域集線器網路251。 區域集線器110包含一資料庫230、一應用伺服器 220、一訊息伺服器210及一資料複製伺服器215。區域集 線器網路251連接資料庫23〇、應用伺服器22〇、訊息伺服 器210及資料複製伺服器215。應用伺服器220包含一電 腦词服益及相關设備、運轉一'可由與該製造操作2 0 0相關 之作業員存取之操作系統及應用。在一範例中,該操作系 統係一 Microsoft TMWindowsTM NTtm系統。在該應用伺服 器220上運轉之應用包含存取控制軟體、資料截取軟體、 分析軟體、處理控制軟體、設備診斷軟體、處理診斷軟體 、良率診斷軟體、知識資料庫、常式及通知指令、設備維 修管理軟體、指令及手冊、供應鏈計畫、協調及採購軟體 、電話中心應用及問題管理應用。資料庫230儲存即時資 料及與該製造操作200及用於該製造線設備相關之歷史資 料。資料庫230係由例如Microsoft TM SQL ServerTM資料 庫軟體來管理。 10515953 A7 _ B7 V. Invention description (v) library; 440, 540: local area network; 520: personal computer; 605: regional profile database; 606: regional profile manager; 628: centralized profile manager program; 700 : Security System; 750: Interface. Detailed description of the invention With reference to FIG. 1, a network 100 connects the regional hubs 110 and 120 to a central hub 150. The network 100 includes hardware and software components that allow the hubs 110 and 120 to communicate with each other through the hub 150. The area hub 110 is installed at a manufacturer location 200 and is used to centralize all area data, information, and communications coordination. In one example, the area hub 110 supports data and information related to a semiconductor manufacturing operation 200. The semiconductor manufacturing operation 200 includes an integrated circuit device (" wafer "), a resource planning system 222 that plans and coordinates the manufacturing operation, and a data for storing all the data related to the semiconductor manufacturing operation 200. A library 221 and a local area network (LAN) 240 that provides connectivity between the manufacturing line 210, the resource planning system 222, and the database 221. The manufacturing line 210 includes a chemical vapor deposition (CVD) chamber 212 for depositing a thin film on a semiconductor wafer, a lithography table 214, a chemical mechanical polishing (CMP) device 216, and a quality control and packaging table 218. Control units 213, 215, 217, and 219 for the CVD chamber 212, the lithography table 214, the CMP device 216, and the quality control and packaging line 218 are connected to the LAN network 240, respectively. The LAN network 240 is connected to the local hub 110 by being connected to the local hub network 251. Similarly, the resource planning system 222 and the database 221 are connected to the area through the LAN network 240 and the regional hub network 251. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm). Li) '(Please read the notes on the back before filling out this page) -------- ^ --------- Employee Cooperative of Intellectual Property Bureau, Ministry of Economic Affairs, printed by the Intellectual Property Bureau employees of Ministry of Economic Affairs Printed by the Consumer Cooperative 515953 V. Description of the invention (Domain Hub 110. Devices 212 '2M, 216, and 218 are also directly connected 223 to the control units 213, 215, 217, and 219 communicated by the regional hub network 251. Other management and control systems and their databases are also connected directly or through the LAN network 24 to the regional hub network 251. Operators, manufacturing managers, engineers, businesses, and businesses related to the semiconductor manufacturing operation 200 Managers are also connected to the area hub 110. Their personal computers 245 access the manufacturing operations via the LAN network MO and the area hub network 251. In other embodiments, the personal computer 245 is directly connected to the area hub. Server network 251. The regional hub 110 includes a database 230, an application server 220, a message server 210, and a data copy server 215. The regional hub network 251 is connected to the database 23, the application server 22, The message server 210 and the data copy server 215. The application server 220 includes a computer server and related equipment, and an operating system and applications that can be accessed by operators associated with the manufacturing operation 200. In In one example, the operating system is a Microsoft TM Windows TM NTtm system. Applications running on the application server 220 include access control software, data capture software, analysis software, process control software, equipment diagnostic software, process diagnostic software, and software. Rate diagnostic software, knowledge database, routine and notification instructions, equipment maintenance management software, instructions and manuals, supply chain planning, coordination and procurement software, call center applications and problem management applications. Database 230 stores real-time data and communicates with the Manufacturing operations 200 and historical data related to the equipment used in the manufacturing line. The database 230 is composed of, for example, Microsoft TM SQL S erverTM database software. 10

^--------訂---------^ C請先閱讀背面之注意事項再填寫本IC 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 515953 A7 B7 五、發明說明(彡) 對該製造操作之存取包含聽、取出與修改資料及簽發 與執行控制命令。據此’一些存取位準係由分段及歸類不 同存取功能所定義。作業員、製造經理、工程師/業務及 業務經理被視爲一群及一群中個別的會員而指定一適當存 取位準。在半導體製造操作2⑼內之各群及一群中各會員 之這些指定存取功能係由一區域輪廓管理程式606所管理 並儲存於第6圖所示之一區域人輪廓資料庫605。區域人 輪廓資料庫605持有一定義及映射作業員輪廓至存取位準 之表格。該區域輪廓管理器606與一集中輪廓管理器程式 628共同作用來保持人們及輪廓資料庫也於第6圖所示之 區域及集中式集線器間之同步化。 存取控制705係一整個安全系統700之一部份,其也 包含第7圖所示之安全性710及認證715。有關該半導體 製造操作200之各會員,也就是作業員、製造經理、工程 師、業務及業務經理係被指定一使用者辨識身份及一用以 允許對該系統任何進一步存取前認證該作業員之密碼。各 經授權之使用者也被連接至一會更多輪廓或存取權之典型 族群。每個這類輪廓經由在特定應用中具體施行之特定功 能來給予有關特定設備或設備類型之特定類型資料之存取 權。每次一些半導體製造操作透過逼個人電腦245登錄至 該區域集線器110,他需要提供他所指定使用者辨識名字 及密碼。在此認證處理後,他被允許執行一包含聽、取、 改變資料或簽發一命令之操作。根據該認證資訊結合指定 給要求中之操作之特定號碼之正確取出存取權來允許執行 11 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 一 (請先閱讀背面之注意事項再填寫本頁) --------訂---------線 Φ! 515953 A7 B7 五、發明說明(j ) 該要求操作。每次存取要求喚起該處理。這整個安全系統 之目的係維持控制該製造處理,以阻止未授權存取並保護 該’’關鍵技術(know how)”及有關該半導體製造操作200之 智慧財產權。 區域集線器120係安裝在一供應商地點300並用以集 中所有區域資料、資訊及通訊協調爲目的。在一例子中’ 區域集線器120係安裝在一供應上述CVD室212之設備供 應商公司300。供應商地點300包含R&D及用於該CVD 室、一計畫及協調該CVD室製造之資源計畫系統及一用以 儲存有關該CVD室製造之所有資料之資料庫330之製造設 備309。一供應商區域網路305提供該CVD室製造線309 及該資源計畫系統319間之連接性。區域網路305連接至 區域集線器網路340,如此連接該CVD室製造設備309及 該資源計畫系統319至該區域集線器120。資料庫330直 接連接至該區域集線器網路340並因此至區域集線器120 。有關該CVD室供應商公司300之作業員、製造經理、工 程師、業務及業務經理係透過他們經由該區域集線器網路 340及供應商區域網路305也連接至該區域集線器120之 個人電腦345存取該製造操作。 區域集線器120包含一資料庫330、一應用伺服器 320、訊息伺服器310及一資料複製伺服器315。區域集線 器網路340連接資料庫330、應用伺服器320、訊息伺服器 310及資料複製伺服器315。應用伺服器320包含一電腦伺 服器及相關設備、運轉一可由與該製造操作3〇〇相關之供 12 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) . --- (請先閱讀背面之注意事項再填寫本頁) •irt/. 經濟部智慧財產局員工消費合作社印制衣 515953 A7 B7 五、發明說明(p) 應商公司300作業貝存取之操作系統及應用。在一範例中 ,該操作系統係一 Microsoft TMWind〇wSTM NTtm系統。在 該應用伺服器320上運轉之應用包含存取控制軟體、資料 截取軟體、分析軟體、處理控制軟體、設備診斷軟體、處 理診斷軟體、產能診斷軟體、知識資料庫、常式及通知指 令、設備維修管理軟體、指令及手冊、供應鏈計畫、協調 及採購軟體、電話中心應用及問題管理應用。 該半導體製造操作200之區域集線器110及該CVD 室供應商之區域集線器120經一網際網路16,0連接至一 集中式集線器150。安全防火牆162、164及166係分別安 裝在該區域集線器110及該網際網路160間、在該區域集 線器120及該網際網路160間及在該集中式集線器150及 該網際網路160間。在一範例中,網際網路160係爲該”網 際網路'’而防火牆162、164及166係跑安全性及加密軟體 程式之電腦或其它數位家電用品。防火牆162、164及166 之目的係控制及阻止對該區域集線器110、120及未授權之 外部使用者之集中式集線器150之存取。資料傳送至該防 火牆162、164及166係基於安全性理由而被加密。在一範 例中,該防火牆安全及加密程式係由加州Redwood城之 Checkpoint 公司提供之 Firewall-1。 集中式集線器150係位在該網路供應商地點,也就是 AvantNet,並包含一集中式資料庫430、一訊息伺服器410 、一應用伺服器420、一資料複製伺服器415及一連接該 集中式資料庫430及伺服器410、415及42〇之LAN網路 13 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) .^^^衣--- (請先閱讀背面之注意事項再填寫本頁) 訂· -線. 經濟部智慧財產局員工消費合作社印製 515953 A7 _________ B7 五、發明說明() 440。一防火牆166係安裝在該集中式集線器150及該網際 網路160間。應用伺服器420包含一電腦伺服器及相關設 備,跑一操作系統及可在該區域集線器110及120間作存 取及分享且其它授權及認證使用者125經由網際網路存取 該集中集線器。在某一例中,該操作系統係一 Microsoft TMWind〇wsTM NTtm系統。在該應用伺服器420上運轉之應 用包含存取控制軟體、資料截取軟體、分析軟體' 處理控 制軟體、設備診斷軟體、處理診斷軟體、良率診斷軟體、 知識資料庫、常式及通知指令、設備維修管理軟體、指令 及手冊、供應鏈計畫、協調及採購軟體、電話中心應用及 問題管理應用。在該應用伺服器420上運轉之應用也在該 區域集線器應用伺服器220及320上運轉。在此方式中, 二層應用提供者係有可能的,也就是,一應用係在該區域 集線器及該集中集線器伺服器之主機。存在該區域集線器 伺服器之應用提供給擁有該區域集線器之製造商一專有的 優勢,然而存在該集中集線器之應用在每個使用者之輸出 入資料在該對應之區域集線器下保有安全時具有允許由複 數個使用者分享之優勢。在其它實施例中,上述應用係僅 存在該集中集線器應用伺服器42〇並由該簽約之區域集線 器110、120來存取及分享。 該集中資料庫430安置來自該區域集線器110及120 可由該半導體製造操作200及該設備供應商公司300兩者 根據一合約安排作存取之資料。在某些例子中,一第三者 125也被允許再依據該第三者、該半導體製造操作200及 14 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) · -線 經濟部智慧財產局員工消費合作社印製 515953 A7 _ B7 五、發明說明(γ) --------------- (請先閱讀背面之注意事項再填寫本頁) 該設備供應公司300間之合約安排來對該集中式資料庫 430中所儲存之資料作存取。該資料庫430係由Microsoft TM SQL Sewer™資料庫軟體來管理。第三者資料也在該集 中式資料庫中儲存且可由該半導體製造操作200及該設備 供應公司300兩者依據一合約安排作存取。即時設備狀態 資料自該製造地點200經箭頭90示意之集中集線器150流 向該供應商地點300。設備處理及維護提示、手冊及訓練 教材自該供應商地點300經箭頭90示意之集中集線器150 流向該製造地點200。 經濟部智慧財產局員工消費合作社印製 資料沿著路徑170及172自該區域集線器110至該集 中集線器150行進並分別回頭,以及沿著路徑174及176 自該區域集線器120至該集中集線器150行進並分別回頭 。該資料流動包含資料被動聽取及取得與資料主動改變及 命令簽發。資料主動及被動流動兩者係由一在第7圖所示 之訊息中間層應用411來管理,其係安裝在需要互相溝通 所運轉應用之不同伺服器上。在一例子中,訊息中間層應 用411係由加州Palo Alto之TIBCO Software公司所提供 之資訊匯流排(TIB)。在某些實施例中,該資料傳送處理係 自動的。在某一^例中’該資料係一件設備之使用者手冊’ 其係儲存於該集中式資料庫430且可由在他們操作中使用 該特定設備並具有一連接至該集中集線器或具有遙控撥號 存取該集中集線器中任一者之所有製造商作存取。手冊升 級更新係自動由該設備供應商300灌入該集中式資料庫 430並可立即由所有製造商存取。 15 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 515953 A7 ------- B7 五、發明說明(0) —資料複製軟體416管理在該區域集線器11〇、12〇 及該集中集線器150間之資料複製及同步化。該資料複製 軟體416係分別安裝在該集中集線器MO之資料複製伺服 器415、215及315及該區域集線器110及12〇中。該整個 網路及集線器操作之連接性及管理係由一網際網路服務提 供者來提供。在某一實施例中,該網際網路服務提供者係 位在加州Santa Clara之EXODUS公司。 參考至第2圖,一第三區域集線器130係安裝在一群 專業科學家及專家工作處之諮詢業務500。在該群專業科 學家及專家中係CVD專家及半導體製造專家。這些CVD 專家具有可讓他們自該半導體製造操作2〇〇及該設備製造 3〇〇兩者中分析資料之專門知識。在某一實施例中,來自 該半導體製造操作200之資料係用於該製造積體電路裝置 之品質控制資料及來自該設備製造300之資料係該CVD反 應室212之說明書。依據該處理參數分析、品質控制資料 及該CVD反應室212說明書資料,該CVD專家可在半導 體處理參數及積體電路裝置特性間發展出關連性並作出有 關適當調整設備設計或處理方法之建議書。該第三區域集 線器130包含一用於該資料分析之主機應用伺服器550、 一儲存先前分析結果之資料庫510及一連接該伺服器550 及該資料庫510之LAN網路540。在一範例中,該資料分 析軟體係專有於該咨詢業務500之多變化良率管理應用。 該專業科學家及專家會經由也連接至該區域LAN網路540 之個人電腦520來存取該LAN網路540。一防火牆係安裝 16 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂:^ -------- Order --------- ^ CPlease read the notes on the back before filling in this IC. The paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) ) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A7 B7 V. Description of Invention (彡) Access to this manufacturing operation includes listening, taking out and modifying data, and issuing and executing control orders. Accordingly, some access levels are defined by segmentation and categorization of different access functions. Operators, manufacturing managers, engineers / business and business managers are treated as a group and individual members of a group and assigned an appropriate access level. These designated access functions of the groups in the semiconductor manufacturing operation 2 and each member in the group are managed by an area outline management program 606 and stored in an area person outline database 605 shown in FIG. The regional profile database 605 holds a table that defines and maps operator profiles to access levels. The area outline manager 606 works in conjunction with a centralized outline manager program 628 to keep people and outline databases synchronized between the area and the centralized hub shown in FIG. Access control 705 is part of an entire security system 700, which also includes security 710 and authentication 715 as shown in FIG. Each member of the semiconductor manufacturing operation 200, i.e., operator, manufacturing manager, engineer, business, and business manager, is assigned a user identification and a user who authenticates the operator before allowing any further access to the system. password. Each authorized user is also connected to a typical group with more profiles or access rights. Each such profile grants access to a specific type of data about a specific device or device type via a specific function performed in a specific application. Every time some semiconductor manufacturing operations log on to the area hub 110 via a personal computer 245, he needs to provide his designated user identification name and password. After this authentication process, he is allowed to perform an operation that involves listening, fetching, changing information, or issuing an order. According to the certification information combined with the correct withdrawal access rights of the specific number assigned to the operation in the request to allow 11 paper sizes to apply Chinese National Standard (CNS) A4 specifications (210 X 297 mm) 1 (Please read the back Please fill in this page for attention) -------- Order --------- line Φ! 515953 A7 B7 V. Description of the invention (j) This operation is required. Each access request evokes this process. The purpose of this entire security system is to maintain control of the manufacturing process to prevent unauthorized access and protect the "know how" and intellectual property rights related to the semiconductor manufacturing operation 200. The regional hub 120 is installed in a supply The commercial site 300 is used for the purpose of centralizing all regional data, information, and communication coordination. In one example, the 'region hub 120' is installed at an equipment supplier company 300 that supplies the CVD chamber 212. The supplier site 300 includes R & D and Manufacturing equipment 309 for the CVD room, a resource planning system for planning and coordinating the manufacturing of the CVD room, and a database 330 for storing all information related to the manufacturing of the CVD room. Provided by a supplier area network 305 Connectivity between the CVD chamber manufacturing line 309 and the resource planning system 319. The local area network 305 is connected to the regional hub network 340, thus connecting the CVD room manufacturing equipment 309 and the resource planning system 319 to the regional hub 120 The database 330 is directly connected to the regional hub network 340 and thus to the regional hub 120. The operator, manufacturer, and supplier of the CVD room supplier company 300 The manager, engineer, business, and business manager access the manufacturing operation through their personal computer 345, which is also connected to the regional hub 120 via the regional hub network 340 and the supplier regional network 305. The regional hub 120 includes a database 330 , An application server 320, a message server 310, and a data copy server 315. The regional hub network 340 is connected to the database 330, the application server 320, the message server 310, and the data copy server 315. The application server 320 includes A computer server, related equipment, and operation can be supplied by the manufacturer in connection with the manufacturing operation. 12 This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 mm). --- (Please read the back first Note: Please fill in this page again.) • irt /. Printing of clothing by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives. 515953 A7 B7 V. Description of the invention (p) Operating system and application for access to the company's 300 jobs. An example The operating system is a Microsoft TM Wind OWSTM NTtm system. Applications running on the application server 320 include access control software and data capture Software, analysis software, process control software, equipment diagnostic software, process diagnostic software, capacity diagnostic software, knowledge database, routines and notification instructions, equipment maintenance management software, instructions and manuals, supply chain planning, coordination and procurement software, Call center application and problem management application. The regional hub 110 of the semiconductor manufacturing operation 200 and the regional hub 120 of the CVD room supplier are connected to a centralized hub 150 via an Internet 16, 0. Security firewalls 162, 164, and 166 It is installed between the regional hub 110 and the Internet 160, between the regional hub 120 and the Internet 160, and between the centralized hub 150 and the Internet 160, respectively. In an example, the Internet 160 is the "Internet" and the firewalls 162, 164, and 166 are computers or other digital appliances running security and encryption software programs. The purpose of the firewalls 162, 164, and 166 is Controls and blocks access to the regional hubs 110, 120 and the centralized hub 150 of unauthorized external users. Data transmitted to the firewalls 162, 164, and 166 are encrypted for security reasons. In one example, The firewall security and encryption program is Firewall-1 provided by Checkpoint Company of Redwood City, California. The centralized hub 150 is located at the network provider's site, which is AvantNet, and includes a centralized database 430, a message server Server 410, an application server 420, a data replication server 415, and a LAN network connected to the centralized database 430 and servers 410, 415, and 42. 13 This paper standard applies to China National Standard (CNS) A4 specifications. (210 X 297 mm). ^^^ 衣 --- (Please read the precautions on the back before filling out this page) Order · -line. Printed by the Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs 515953 A7 _ ________ B7 V. Description of the invention () 440. A firewall 166 is installed between the centralized hub 150 and the Internet 160. The application server 420 includes a computer server and related equipment. The regional hubs 110 and 120 are used for access and sharing and other authorized and authenticated users 125 access the centralized hub via the Internet. In one example, the operating system is a Microsoft TM WindowsTM NTtm system. In this application server Applications running on the device 420 include access control software, data capture software, analysis software 'process control software, equipment diagnostic software, process diagnostic software, yield diagnostic software, knowledge database, routine and notification instructions, and equipment maintenance management software , Instructions and manuals, supply chain planning, coordination and procurement software, call center applications and problem management applications. Applications running on the application server 420 also run on the regional hub application servers 220 and 320. In this way It is possible that a two-tier application provider is, that is, an application is in the regional hub and the centralized The host of the hub server. The application of the presence of the regional hub server provides a proprietary advantage to the manufacturer who owns the regional hub. However, the application of the centralized hub has the input and output data of each user in the corresponding Having security under a regional hub has the advantage of allowing multiple users to share it. In other embodiments, the above applications only exist in the centralized hub application server 42 and are accessed and accessed by the contracted regional hubs 110 and 120. share it. The centralized database 430 houses data from the regional hubs 110 and 120 that can be accessed by both the semiconductor manufacturing operation 200 and the equipment supplier company 300 according to a contractual arrangement. In some examples, a third party 125 is also allowed to use the third party, the semiconductor manufacturing operation 200 and 14 paper standards to apply Chinese National Standard (CNS) A4 (210 X 297 mm) (please first Read the notes on the back and fill in this page)--Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A7 _ B7 V. Description of Invention (γ) --------------- ( (Please read the precautions on the back before filling this page) The contract arrangement between the equipment supply company 300 to access the data stored in the centralized database 430. The database 430 is managed by Microsoft ™ SQL Sewer ™ database software. Third party data is also stored in the centralized database and can be accessed by both the semiconductor manufacturing operation 200 and the equipment supply company 300 in accordance with a contractual arrangement. Real-time device status data flows from the manufacturing site 200 to the supplier site 300 via the centralized hub 150 indicated by arrow 90. Equipment handling and maintenance tips, manuals, and training materials flow from the supplier site 300 to the manufacturing site 200 via the centralized hub 150 indicated by arrow 90. The printed information from the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs traveled along the paths 170 and 172 from the regional hub 110 to the centralized hub 150 and turned back, and along paths 174 and 176 from the regional hub 120 to the centralized hub 150 And turn around separately. The data flow includes passive listening and acquisition of data and active change of data and order issuance. Both active and passive data flow are managed by a message middle-tier application 411 shown in Figure 7, which is installed on different servers that need to communicate with each other and run applications. In one example, the message middle layer application 411 is an information bus (TIB) provided by TIBCO Software of Palo Alto, California. In some embodiments, the data transfer processing is automatic. In one example, 'the data is a user manual of a device' which is stored in the centralized database 430 and can be used by the particular device in their operation and has a connection to the centralized hub or has remote dialing Access to all manufacturers of any of the centralized hubs. Manual upgrades are automatically populated by the equipment supplier 300 into the centralized database 430 and are immediately accessible to all manufacturers. 15 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 515953 A7 ------- B7 V. Description of the invention (0)-Data copy software 416 manages the hub in the area 11〇, Data replication and synchronization between 120 and the centralized hub 150. The data copying software 416 is installed in the data copying servers 415, 215, and 315 of the centralized hub MO and the area hubs 110 and 120, respectively. The connectivity and management of the entire network and hub operations is provided by an Internet service provider. In one embodiment, the Internet service provider is EXODUS, Inc. of Santa Clara, California. Referring to FIG. 2, a third area hub 130 is a consulting service 500 installed in a group of professional scientists and experts. Among this group of professional scientists and experts are CVD experts and semiconductor manufacturing experts. These CVD experts have the expertise to allow them to analyze data from both the semiconductor manufacturing operation 2000 and the equipment manufacturing 300. In one embodiment, the data from the semiconductor manufacturing operation 200 is quality control data for the fabrication of integrated circuit devices and the data from the equipment manufacturing 300 is the specification of the CVD reaction chamber 212. Based on the processing parameter analysis, quality control data, and the CVD reaction chamber 212 instruction manual data, the CVD expert can develop correlations between semiconductor processing parameters and integrated circuit device characteristics and make recommendations for appropriate adjustments to equipment design or processing methods . The third area hub 130 includes a host application server 550 for the data analysis, a database 510 storing the previous analysis results, and a LAN network 540 connected to the server 550 and the database 510. In one example, the data analysis software system is proprietary to the multivariate yield management application of the consulting business 500. The professional scientist and expert will access the LAN network 540 via a personal computer 520 also connected to the local area network LAN 540. A firewall is installed. 16 This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling this page). Order:

經濟部智慧財產局員工消費合作社印製 515953 A7 B7 五、發明說明(\iV) 在該第三區域集線器130及該網際網路160之間。 參考至第3圖,授權第三者140經由對該網際網路 160之遙控撥號來存取存於該集中集線器150之資料。第 三者140包含業務代表、經銷商、該積體電路裝置或該 CVD設備中任一者之供應商及該咨詢服務業務。15〇應用 服務420中之存取控制軟體7〇〇來提供安全性、存取控制 及認證。作業員、製造經理、工程師、業務及與每個區域 集線器110、120及130相關之業務經理也具有對該集中集 線器150及經由該網際網路160之區域集線器兩者之遙控 撥號存取。從該集中集線器150經由該網際網路160至一 使用者所傳送之資料係爲了安全目的而加密。一這類加密 例子係使用一由加州Redwo〇d城市之Checkpoint公司所供 應之 Virtual Private Network (VPN-1)。該 VPN-1 係安裝在 該第三者電腦140上。 參考至第4圖,網路100包含與製造商1-製造商4相 關之區域集線器ll〇a-ll〇l及與供應商Μ共應商50相關之 區域集線器120a-120g。區域集線器ll〇a-ll〇l及區域集線 器120a-120g係連接至一集中集線器150。供應商1分別 具有與三製造設備Fabl、Fab2及Fab3相關之三區域集線 器110a、ll〇b及110c。Fabl、Fab2及Fab3可以是座位在 遍佈整個世界之相同位置或不同位置之設備。在此後者例 子中,集中集線器150提供一給製造商1來了解所有它自 己的設備層面之方法。每個設備供應商供應商1-供應商50 能對多製造商中存取資料而每個製造商製造商1-製造商4 17 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 x 297公釐) ------------^--- (請先閱讀背面之注意事項再填寫本頁) 訂: -線- 經濟部智慧財產局員工消費合作社印製 515953 A7 ___ B7 五、發明說明(〆) 能自多供應商中存取資料。在此方式中’一單一分佈網路 當作一用於多製造商及供應商之集散工具之用’而加入考 慮安全性相關事宜。使用者存取輪廓係針對各製造商及各 供應商與各製造商及各供應商之每個授權雇主來發展並將 之存於該集中集線器資料庫。該網路提供連接性、分享式 資料結構及即時資料與歷史資料集散。該網路100也提供 分析工具及可由例如供應商、製造商及第三者會員之所有 用戶存取之第三者應用。經授權之專業科學家、專家及其 它經授權之第三者也可對儲存於該集中資料庫之資料作存 取並對與該製造操作及該設備相關問題提供分析及解決方 案。 經濟部智慧財產局員工消費合作社印制衣 ------------裝--- (請先閱讀背面之注意事項再填寫本頁) i線. 參考至第5圖,感測器211監視一 CVD室212操作 。CVD室212係座落在一與一區域集線器ll〇a相關之製 造商地點Fabl,其係屬於一第4圖所示之工業級網路1〇〇 。網路100包含如第4圖所述之多製造商及供應商。當該 CVD室212係處於一正常操作模式時,感測器211送出一 指示該反應器係”動作”之信號。本資訊係由該製造商區域 集線器ll〇a及該集中集線器150兩者來收集並具有一格式 560。具有類似CVD室或反應室212之其它製造商及供應 商也在他們相對應之區域集線器及該集中集線器150中收; 集相同資訊。然而,用於指示正常操作信號之格式不是全 球性且可能選擇該格式562、564及566。在另一例中,該 CVD室212之正常操作係由該名詞”製造”、”正常"及"aal" 來指示並分別選擇格式570-574、580及582。區域集線器 18 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印製 515953 A7 ______ B7 五、發明說明(J) 110、120、130之系統與集中集線器150及這些集線器上 運轉之應用一起作爲映射在製造商、供應商及所有其它網 路用戶間之資料及格式以使具有一對一之關聯性之目的來 使用。界面程式750提供如第7圖所示之映射在區域集線 器110、120 ' 130及集中集線器150間之資料及格式。例 如,設備及模組辨識、特定設備及/或模組特定狀態係映射 在製造商標準、供應商標準及工業特定標準之間。人、製 造商組群、供應商組群及第三者組群之類似辨識被映射及 分享以消除進入該系統之冗餘資料。 參考至第6圖,區域集線器110備有一些軟體程式, 包含一修復報告管理器602、一商業規則管理器604、一區 域輪廓管理器606、一靜態資料輸入及維護管理器608、一 分析工具610、一設備登錄管理器612、一即時監視器614 及一 Fab用戶616。區域集線器110也包含資料庫或一包 含上述軟體程式相關資料之資料庫230片段。這些資料庫 或資料庫230片段包含由該修復報告管理器602產生之其 它區域修復報告、由該商業規則管理器604產生之區域安 全性規則603、由該區域輪廓管理器606產生之人輪廓605 、由該靜態資料輸入及維護管理器608產生之區域商業規 則607、由該分析工具610產生之特定機器明細609、由該 設備登錄管理器612產生之歷史資料611、由該即時監視 器614產生之即時狀態613及由該Fab用戶616產生之區 域設備登錄615。 集中集線器150備有一些軟體程式770,其由包含製 19 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 裝 .. 515953 A7 _ B7 五、發明說明) 造商、供應商及該網路100之其它第三者會員之每個訂購 公司來存取及分享。這些軟體程式770包含一事件回饋管 理器622、一修復報告管理器624、一商業規則管理器626 、一集中輪廓管理器628、一靜態輸入資料及維護630、分 析工具632、一設備登錄管理器634、一即時監視器636及 一集中用戶638。集中資料庫430分別包含用於各訂購區 域集線器110、12〇、130之分開資料片段780a、780b、 780c。在其它實施例中,資料庫片段780a、780b、780c係 分開之資料庫。資料庫片段780a、780b、780c包含與各訂 購公司之上述軟體族群相關之資料。這些資料包含由該回 饋管理器622產生之診斷及修復回饋621、由該修復報告 管理器624產生之集中修復報告623、由該商業規則管理 器626產生之訂購公司安全規則625、由該集中輪廓管理 器628產生之人輪廓6W、由該靜態輸入資料及維護630 產生之訂購公司商業規則629、由該分析工具632產生之 一般機器模組明細631、由該設備登錄管理器634產生之 歷史資料633、由該即時監視器636產生之即時狀態635 及由該集中用戶638產生之集中設備登錄637。 修復報告管理器6〇2及624管理用以輸入排程或未排 程設備修復明細之機制。經由該區域集線器及該集中集線 器兩者係有效用的以使輸入項可由只會對該區域集線器 110存取之fab技師及作業員來產生且也由只會對該集中集 線器150存取之設備供應商技師及作業員來產生。集中集 線器及區域集線器修復報告管理器分享一共用資料庫623 20 (請先閱讀背面之注意事項再填寫本頁) · 丨線 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 經濟部智慧財產局員工消費合作社印制衣 515953 A7 B7 五、發明說明(p) 。區域修復報告資料庫601僅具有關於與該區域集線器 110相關設備之這些輸入項。集中修復報告資料庫623係 由設備供應商來隔離且包含用於與一特定設備供應商相關 之所有設備之輸入項。修復報告管理器602及624提供一 具有對於補獲徵兆、診斷及可能理由、修復及結果之提示 之結構格式。修復報告管理器602及624也產生包含設備 辨識、在失敗及修復完成時之作業員辨識、標記反應時間 之時間戳記、對於修復及可報帳時間並輸入有關該徵兆、 診斷、修復動作、結果、取代零件及實施進級之時間。修 復報告管理器602及624也維持消費品、處理程序、度量 衡、良率分析、失敗報告分析及校正動作系統(FRACAS)及 修復回饋基底。 事件回饋管理器622係一設計來改進該診斷處理之回 饋引擎。它幫助修復技師決定可能之理由並根據歷史資料 所觀察之徵兆來建議調整或修復。 區域輪廓管理器606產生及更新儲存於該區域人輪廓 資料庫605中之資料。區域人輪廓資料庫605持有有關誰 被授權使用那類應用內之那種功能用以看及操作有關那類 設備的那種資料、誰可區域存取以及存取什麼、誰需要內 外警覺一問題例及誰需要注意漸漸擴大之位準。 集中輪廓管理器628產生及更新儲存於該集中人輪廓 資料庫627中之資料。集中人輪廓資料庫627持有有關個 人建立.、個人對設備供應商關係、個人對設備關係、誰可 集中存取以及存取什麼、公司特定待命通知及漸漸擴大之 21 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ' -- ------------_裝—— (請先閱讀背面之注意事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A7 B7 5. The invention description (\ iV) is between the third regional hub 130 and the Internet 160. Referring to FIG. 3, the third party 140 is authorized to access the data stored in the centralized hub 150 via remote dialing to the Internet 160. The third party 140 includes a sales representative, a distributor, a supplier of the integrated circuit device or the CVD equipment, and the consulting service business. The access control software 700 in the 150 application service 420 provides security, access control, and authentication. Operators, manufacturing managers, engineers, operations, and business managers associated with each regional hub 110, 120, and 130 also have remote dial-up access to both the centralized hub 150 and the regional hub via the Internet 160. Data transmitted from the centralized hub 150 via the Internet 160 to a user is encrypted for security purposes. An example of this type of encryption is the use of a Virtual Private Network (VPN-1) supplied by Checkpoint Corporation of Redwod, California. The VPN-1 is installed on the third-party computer 140. Referring to FIG. 4, the network 100 includes area hubs 110a-101 related to the manufacturer 1-manufacturer 4 and area hubs 120a-120g related to the supplier M-compliance 50. The regional hubs 110a-101 and the regional hubs 120a-120g are connected to a centralized hub 150. Supplier 1 has three area hubs 110a, 110b, and 110c related to the three manufacturing equipments Fabl, Fab2, and Fab3, respectively. Fabl, Fab2, and Fab3 can be devices that are seated in the same or different locations throughout the world. In this latter example, the centralized hub 150 provides a method for the manufacturer 1 to learn all of its own device level. Each equipment supplier supplier 1-supplier 50 can access data from multiple manufacturers and each manufacturer manufacturer 1-manufacturer 4 17 This paper size applies to China National Standard (CNS) A4 specification (21〇x 297 mm) ------------ ^ --- (Please read the notes on the back before filling out this page) Order: -Line-Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs's Consumer Cooperatives 515953 A7 ___ B7 V. Description of Invention (〆) Ability to access data from multiple suppliers. In this approach, 'a single distribution network is used as a distribution tool for multiple manufacturers and suppliers', and security related issues are considered. The user access profile is developed for each manufacturer and each supplier and each authorized employer of each manufacturer and each supplier and stored in the centralized hub database. The network provides connectivity, shared data structures, and real-time and historical data collection and distribution. The network 100 also provides analytical tools and third party applications that can be accessed by all users, such as suppliers, manufacturers and third party members. Authorized professional scientists, experts, and other authorized third parties can also access the data stored in the centralized database and provide analysis and solutions to problems related to the manufacturing operation and the equipment. Printed clothing for the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs ------------ Outfit --- (Please read the precautions on the back before filling out this page) i-line. Refer to Figure 5 The detector 211 monitors a CVD chamber 212 operation. The CVD chamber 212 is located at a manufacturer site Fabl associated with a regional hub 110a, which belongs to an industrial-grade network 100 shown in Figure 4. The network 100 includes a number of manufacturers and suppliers as described in FIG. When the CVD chamber 212 is in a normal operation mode, the sensor 211 sends a signal indicating that the reactor system is "operating". This information is collected by both the manufacturer's regional hub 110a and the centralized hub 150 and has a format 560. Other manufacturers and suppliers with similar CVD chambers or reaction chambers 212 also collect in their corresponding regional hubs and the centralized hub 150; they collect the same information. However, the format used to indicate normal operation signals is not global and the formats 562, 564, and 566 may be selected. In another example, the normal operation of the CVD chamber 212 is instructed by the terms "manufactured", "normal", and "aal", and the formats 570-574, 580, and 582 are selected respectively. Area Hub 18 This paper size applies China National Standard (CNS) A4 Specification (210 X 297 mm) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A7 ______ B7 V. Description of the Invention (J) 110, 120, 130 systems and centralized hubs 150 and these hubs The applications running on it are used as the data and format mapping between manufacturers, suppliers and all other network users for the purpose of one-to-one correlation. The interface program 750 provides the mapping shown in Figure 7 Data and formats between regional hubs 110, 120 '130, and central hub 150. For example, device and module identification, specific device and / or module specific states are mapped to manufacturer standards, supplier standards, and industry specific standards Similar identifications of people, manufacturer groups, supplier groups, and third party groups are mapped and shared to eliminate redundant data entering the system. 6, the area hub 110 is provided with some software programs, including a repair report manager 602, a business rules manager 604, an area outline manager 606, a static data input and maintenance manager 608, an analysis tool 610, an Device registration manager 612, a real-time monitor 614, and a Fab user 616. The regional hub 110 also contains a database or a database 230 segment containing data related to the software program described above. These databases or database 230 segments include the repaired by the repair Other area repair reports generated by the report manager 602, area security rules 603 generated by the business rule manager 604, person silhouettes 605 generated by the area profile manager 606, and static data input and maintenance managers 608 Regional business rules 607, specific machine details 609 generated by the analysis tool 610, historical data 611 generated by the device login manager 612, instant status 613 generated by the real-time monitor 614, and generated by the Fab user 616 Regional device registration 615. The central hub 150 is provided with software programs 770, which are composed of 19 papers. Applicable to China National Standard (CNS) A4 specifications (210 X 297 mm) (Please read the precautions on the back before filling out this page) Packing: 515953 A7 _ B7 V. Description of the invention) Manufacturers, suppliers and the network Each third-party member of the Road 100 is accessed and shared by each of the ordering companies. These software programs 770 include an event feedback manager 622, a repair report manager 624, a business rules manager 626, and a centralized profile manager 628, a static input data and maintenance 630, an analysis tool 632, a device login manager 634, an instant monitor 636, and a centralized user 638. The centralized database 430 contains separate data segments 780a, 780b, 780c for the respective order area hubs 110, 120, 130. In other embodiments, the database fragments 780a, 780b, 780c are separate databases. The database fragments 780a, 780b, and 780c contain data related to the aforementioned software groups of the respective subscription companies. These data include the diagnostic and repair feedback 621 generated by the feedback manager 622, the centralized repair report 623 generated by the repair report manager 624, the order company security rule 625 generated by the business rules manager 626, and the centralized profile Human profile 6W generated by the manager 628, order company business rules 629 generated by the static input data and maintenance 630, general machine module details 631 generated by the analysis tool 632, historical data generated by the device registration manager 634 633. The real-time status 635 generated by the real-time monitor 636 and the centralized device login 637 generated by the centralized user 638. Repair Report Managers 602 and 624 manage the mechanism used to enter scheduled or unscheduled device repair details. Via both the regional hub and the centralized hub are effective so that entries can be generated by fab technicians and operators who can only access the regional hub 110 and also by devices that can only access the central hub 150 Supplier technicians and operators to produce. The centralized hub and regional hub repair report manager share a shared database 623 20 (Please read the precautions on the back before filling out this page) · 丨 printed by the Intellectual Property Bureau Staff Consumer Cooperative of the Ministry of Economic Affairs This paper applies Chinese national standards ( CNS) A4 specification (210 X 297 mm) Printed clothing by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A7 B7 5. Description of the invention (p). The area repair report database 601 has only these entries regarding the devices related to the area hub 110. The centralized repair report database 623 is isolated by the equipment supplier and contains entries for all equipment related to a particular equipment supplier. The repair report managers 602 and 624 provide a structured format with prompts for recovery signs, diagnosis and possible reasons, repairs and results. The repair report managers 602 and 624 also generate equipment identification, operator identification at the time of failure and repair completion, time stamping of response times, repair and billable time and input of the symptoms, diagnosis, repair actions, results Time to replace parts and implement upgrades. The repair report managers 602 and 624 also maintain consumer products, processes, metrics, yield analysis, failure report analysis and corrective action system (FRACAS), and repair the feedback base. The event feedback manager 622 is a feedback engine designed to improve the diagnostic process. It helps repair technicians determine possible reasons and suggests adjustments or repairs based on signs observed in historical sources. The area outline manager 606 generates and updates data stored in the area person outline database 605. The regional person profile database 605 holds information about who is authorized to use the type of functions in that type of application to see and operate the type of equipment, who has regional access and what to access, and who needs internal and external vigilance. Examples of problems and who needs to pay attention to the gradually expanding level. The centralized silhouette manager 628 generates and updates the data stored in the centralized person silhouette database 627. Concentrated person profile database 627 holds relevant personal establishments, personal-to-equipment supplier relationships, personal-to-equipment relationships, who can centrally access and what to access, company-specific standby notifications and gradually expanding 21 This paper standard applies to China Standard (CNS) A4 specification (210 X 297 mm) '-------------_ equipment—— (Please read the precautions on the back before filling this page)

515953 A7 ---___________ B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(4) 輪廓及個人對輪廓指定。該集中輪廓管理器628及該集中 輪廓資料庫627具有如同該區域輪廓管理器6〇6及區域輪 廓資料庫605之類似功能性及資料。該集中輪廓管理器 628具有額外功能來協調該區域輪廓管理器606以對任何 區域資料庫605在任何區域集線器所作之散播、複製及同 步化輪廓改變。在某一例中,在存取權及由在設備供應商 地點之員工周轉率所引起之輪廓中之改變對於即時之製造 商地點110係有效的。若該相關的員工因他或她受雇於該 供應商300而取得對區域集線器11〇之存取權則這個是特 別有用的。 區域商業規則管理器604創造及更新存於該區域商業 規則資料庫607及區域安全規則資料庫603中之資料。區 域商業規則資料庫607。持有有關警訊規則、逐漸擴大規則 、輪班及接班程序、對那個區域集線器係唯一之仲裁規則 。區域安全資料庫603持有有關該區域集線器安全規則之 資訊。在某一例中,區域安全資料庫持有有關在那個區域 集線器及所有其它區域及集中集線器間之內外訊息之區域 安全規則。在此例中,這類規則包含有關誰被允許以什麼 方向對跨過該區域集線器防火牆之發出訊息、以什麼方向 、包含什麼資料、定址於那一接收器、在那一網路位址之 規則。該區域商業規則管理器604也管理並強迫那個區域 集線器之安全及商業規則。在某一例中,該商業規則管理 器應用一附屬應用或模組或子模組之服務以管理該地點之 特定規則藉以利用這類附屬應用之特定能力。在此例中’ 22 本&張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱3 (請先閱讀背面之注意事項再填寫本頁) 一裝 ·515953 A7 ---___________ B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (4) Outline and personal designation of outline. The centralized contour manager 628 and the centralized contour database 627 have similar functions and data as the regional contour manager 606 and the regional contour database 605. The centralized contour manager 628 has additional functions to coordinate the regional contour manager 606 to disseminate, replicate, and synchronize contour changes made by any regional database 605 at any regional hub. In one example, changes in access rights and profiles caused by employee turnover at the equipment supplier's location are valid for the immediate manufacturer's location 110. This is particularly useful if the relevant employee has gained access to the regional hub 11 as a result of his or her employment with the supplier 300. The regional business rules manager 604 creates and updates the data stored in the regional business rules database 607 and the regional security rules database 603. Regional Business Rules Database 607. Holds relevant warning rules, gradually expanding rules, shift and succession procedures, and is the only arbitration rule for that regional hub. The regional security database 603 holds information about the security rules of the regional hub. In one example, the regional security database holds regional security rules for information inside and outside that regional hub and all other regions and between centralized hubs. In this example, this type of rule contains information about who is allowed to send a message across a zone's hub firewall in what direction, in which direction, what data is included, which receiver is addressed, and which network address rule. The regional business rules manager 604 also manages and enforces security and business rules for that regional hub. In one example, the business rules manager applies the services of an ancillary application or module or sub-module to manage specific rules at that location to take advantage of the specific capabilities of such ancillary applications. In this example, ‘22 books & scales are applicable to China National Standard (CNS) A4 specifications (210 X 297 Public Love 3 (please read the precautions on the back before filling this page).

515953 A7 B7 五、發明說明(/°) 一存取控制應用或模組在另一附屬應用管理該仲裁規則時 期管理該存取控制規則。在此例中,特定附屬應用或模組 或子模組之使用延伸至特定之複數層。在此例中’使用數 位辨識或數位鑰匙於作業員認證之特定子功能係委派一專 長於此能力之模組。在另一例中,主宰先前記錄之設備歷 史之校正及改版之仲裁規則維護與管理係委派給一特定模 組而遙控診斷規則之維護及管理係由另一組附屬應用或模 組或子模組來管理。在此例中,主宰該供應鍊或採購處理 程序之規則係又由另一組附屬應用或模組或子模組來管理 。在此例中,一單一商業處理程序造成使用來自許多不同 主要應用之特定子模組。 集中商業規則管理器626、該集中商業規則資料庫 629及集中安全規則資料庫625具有如同該區域商業規則 管理器604、該區域商業規則資料庫607及區域安全規則 資料庫603之類似功能及義務。該集中商業規則管理器 6%、該集中商業規則資料庫629及集中安全規則資料庫 625具有與該區域商業規則管理器6〇4協調以散佈、複製 及同步在任何區域集線器之商業規則改變及使用之額外功 能與義務。參考至第1及6圖,在一範例中,一連接至區 域集線器120之作業員要求修正一連接至區域集線器110 之CVD室中所儲存之歷史資料。該要求係透過由區域集線 器120之區域商業規則管理器604、集中集線器150之集 中商業規則管理器626及區域集線器110之區域商業規則 管理器604之合作及釋放適當義務來傳送給一製造商200 23 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) ~ (請先閱讀背面之注意事項再填寫本頁) ·裝 -丨線. 經濟部智慧財產局員工消費合作社印製 515953 A7 ______B7 經濟部智慧財產局員工消費合作社印制衣 五、發明說明(ή ) 之適當專家。在另一例中,在經供應商公司300受權之專 家改變區域集線器120之區域商業規則資料庫607之遙控 診斷程序。在該遙控診斷程序之改變接著由該集中商業規 則資料庫628之集中商業規則管理器626透過一在該區域 集線器120之區域商業規則管理器603及該集中商業規則 管理器626間之合作來複製。又,該集中商業規則管理器 626與該區域集線器11〇之區域商業規則管理器603合作 以複製在該遙控診斷程序中從該集中商業規則資料庫628 至該區域集線器110之區域商業規則資料庫607之改變。 另一例中,一經製造商200授權之專家簽發一提案要求 (RFP-Request For Proposal)。該要求透過合作自製造商區 域集線器110之區域商業規則資料庫607中複製至該集中 商業規則資料庫628。再者,該集中商業規則管理器626 與位在連接至該集中集線器150之區域集線器之區域商業 規則管理器603合作以根據存於該區域商業規則資料庫 6〇7中之品質規則而從該集中商業規則資料庫6M自動複 製該區域商業規則資料庫607之任何改變。 區域靜態資料項及維護608創造及更新於該特定設備 明細資料庫609中之資訊。特定設備明細資料庫609持有 有關用於該設備之特定製造商設計、用於該設備之設備供 應商設計、設備序號、模組、設備製造公司、設備輪廓參 數、設備狀態模組、作業員及技師輪廓、保證、接觸資訊 及服務合約碼及封面之資訊。設備資料庫609也持有1亥設 備狀態格式轉換表。 24 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) _裝 ·. -線 515953 A7 B7 五、發明說明(分) (請先閱讀背面之注意事項再填寫本頁) 集中靜態資料項及維護630創造及更新於該一般模組 明細資料庫631中之資訊。一般模組明細資料庫631持有 有關用於該供應商設備模組之設備供應商設計'可能之模 組架構及它們相關之規格、子系統及子組件明細、圖式、 訓練及手冊。 在各製造輪替結束時’區域設備登錄管理器612總結 該區域設被使用並產生每件設備之輪替總數’係包含用於 計算有效性及可靠性報告及度量例如在失敗間之平均時間 (MTBF)及修復平均時間(MTTR)所需之資料。同時寫下這 些輪替總數至一總結報告以張貼新的有效性、可靠性及整 體設備效率報告、打開軌道及未完成修復報告並產生用於 修復延誤報告之警示及擴大。此資訊係存於例如該區域設 備登錄資料庫615之適當區域資料庫中。 經濟部智慧財產局員工消費合作社印製 集中設備登錄管理器634接收來自所有區域設備登錄 管理器之更新資訊並更新在該集中設備登錄資料庫637中 之資訊。該集中設備登錄資料庫637持有之資料係類似該 區域設備登錄資料庫615持有之資料。然而,該區域設備 登錄資料庫615持有有關連接至那個區域集線器之所有設 備之資料,其與該設備供應商無關,然而該集中集線器具 有一用於供應連接至任何區域集線器設備之每個設備供應 商之分開之設備登錄資料庫637。這類供應商特定資料庫 也被複製並存於該供應商區域集中器。類似地,該集中集 線器150具有一用於連接至該集中集線器之每個製造商之 分開之設備登錄資料庫637。該集中設備登錄管理器634 25 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ~ 515953 A7 B7 五、發明說明(Μ) 之一鑰匙責任係用以自所有區域集線器中接收更新並張貼 該新資料至每個正確的用戶設備登錄資料庫。 ------------ΦΜ—— (請先閱讀背面之注意事項再填寫本頁)515953 A7 B7 V. Description of the Invention (/ °) An access control application or module manages the access control rule while another subsidiary application manages the arbitration rule. In this example, the use of a specific accessory application or module or sub-module extends to a specific plurality of layers. In this example, a specific sub-function that uses digital identification or digital keys for operator certification is to assign a module that specializes in this capability. In another example, the maintenance and management of the arbitration rules that dominate the correction and revision of previously recorded equipment history is assigned to a specific module and the maintenance and management of remote diagnosis rules is by another set of subsidiary applications or modules or submodules To manage. In this example, the rules that dominate the supply chain or procurement process are managed by another set of subsidiary applications or modules or submodules. In this example, a single commercial process results in the use of specific sub-modules from many different major applications. The centralized business rules manager 626, the centralized business rules database 629, and the centralized security rules database 625 have similar functions and obligations as the regional business rules manager 604, the regional business rules database 607, and the regional security rules database 603. . The centralized business rules manager 6%, the centralized business rules database 629, and the centralized security rules database 625 have coordination with the regional business rules manager 604 to disseminate, replicate, and synchronize business rule changes in any regional hub and Additional Features and Obligations Used. Referring to FIGS. 1 and 6, in one example, an operator connected to the area hub 120 requests correction of historical data stored in a CVD room connected to the area hub 110. The request is transmitted to a manufacturer 200 through cooperation and release of appropriate obligations by the regional business rule manager 604 of the regional hub 120, the centralized business rule manager 626 of the centralized hub 150, and the regional business rule manager 604 of the regional hub 110. 23 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 public love) ~ (Please read the precautions on the back before filling out this page) · Packing-line. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A7 ______B7 Appropriate expert for invention description (price) of clothes printed by employees' cooperatives in the Intellectual Property Bureau of the Ministry of Economic Affairs. In another example, an expert authorized by the supplier company 300 changes the remote diagnostic procedure of the regional business rule database 607 of the regional hub 120. The changes in the remote diagnostic program are then replicated by the centralized business rules manager 626 of the centralized business rules database 628 through a collaboration between the regional business rules manager 603 in the regional hub 120 and the centralized business rules manager 626. . Also, the centralized business rules manager 626 cooperates with the regional business rules manager 603 of the regional hub 110 to copy the regional business rules database from the centralized business rules database 628 to the regional hub 110 in the remote diagnostic program. Change of 607. In another example, an RFP-Request For Proposal is issued by an expert authorized by the manufacturer 200. The request is copied from the regional business rules database 607 of the manufacturer's regional hub 110 to the centralized business rules database 628 through cooperation. Furthermore, the centralized business rule manager 626 cooperates with the regional business rule manager 603 located at the regional hub connected to the centralized hub 150 to retrieve the data from the regional business rule database 607 according to the quality rules stored in the regional business rule database 607. The centralized business rules database 6M automatically replicates any changes in the regional business rules database 607. The regional static data items and maintenance 608 create and update the information in the specific equipment detail database 609. The specific equipment detail database 609 holds information about the specific manufacturer design for the equipment, the equipment supplier design for the equipment, the equipment serial number, the module, the equipment manufacturing company, the equipment profile parameters, the equipment status module, and the operator. And technician outline, warranty, contact information and service contract code and cover information. The equipment database 609 also holds a device status format conversion table. 24 This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the precautions on the back before filling out this page) _Installation ·. -Line 515953 A7 B7 V. Description of the Invention (Minutes) ( Please read the notes on the back before filling this page.) Centralize static data items and maintain 630 information created and updated in the general module detail database 631. The general module details database 631 holds equipment supplier designs for the supplier's equipment modules. The possible module architecture and their related specifications, subsystem and sub-component details, drawings, training and manuals. At the end of each manufacturing rotation, the 'Regional Device Registration Manager 612 summarizes the total number of rotations for each device that is used in the area'. This includes the calculation of validity and reliability reports and metrics such as the average time between failures. (MTBF) and MTTR. At the same time, write down the total number of these rotations to a summary report to post new validity, reliability, and overall equipment efficiency reports, open tracks and unfinished repair reports, and generate warnings and extensions for repair delay reports. This information is stored in an appropriate area database such as the area device registration database 615. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs The centralized device registration manager 634 receives the updated information from all regional device registration managers and updates the information in the centralized device registration database 637. The data held by the centralized device registration database 637 is similar to the data held by the regional device registration database 615. However, the regional device registration database 615 holds information about all devices connected to that regional hub, which is not related to the device vendor. However, the centralized hub has a device for supplying each device connected to any regional hub device. Vendor's separate device registration database 637. Such vendor-specific databases are also copied and stored in the vendor regional concentrator. Similarly, the central hub 150 has a separate device registration database 637 for each manufacturer connected to the central hub. The centralized device registration manager 634 25 This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) ~ 515953 A7 B7 V. Description of the invention (M) One of the key responsibilities is used from all regional hubs Receive updates and post the new information to each correct user device login database. ------------ ΦΜ—— (Please read the notes on the back before filling this page)

Fab用戶616管理即時資料截取並在該區域集線器內 110主動傳送。用戶616聆聽該區域LAN 240上之訊息。 在某一例中,該用戶616使用TIB來聆聽該正確的授權訊 息,將訊息排成佇列致使沒有任何一個被遺失,直到所有 正確資料庫被更新爲止,當一機器從任何”動作”狀態跳至 未排程之任何”關閉’’狀態時送出一訊息給一"警示"引擎並 更新該區域資料庫。 集中用戶638聆聽來自該集中TIB之資料複製引擎之 訊息將訊息排成佇列致使沒有任何一個被遺失,直到所有 正確資料庫被更新爲止,以及更新該區域資料庫。 -線· 區域即時監視器614諮詢該區域即時狀態表613及其 它相關資料庫並展示一特定設備目前狀態給所有經授權之 作業員。該資料係存於該製造商即時狀態資料庫613。集 中集時監視器636根據即時狀態資料庫635顯示一特定機 器之目前狀態給所有經授權個人。 經濟部智慧財產局員工消費合作社印製 .分別存於區域集線器110及集中集線器15〇之分析工 具610包含用於分析生產資料之套裝軟體’例如統計分析 程式。 參考第7圖,集中集線器150包含大致上已說明於商 業規則管理器604、626說明書中之下列軟體模組。安全及 存取控制700、介面750、仲裁720及訊息中間層應用411 。這些軟體模組也提供於區域集線器110及120 (未顯示) 26 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 515953 A7 _ B7 五、發明說明(do 。安全及存取控制700包含存取控制705、認證715及安 全性710。安全性710提供加密及防火牆管理。在某一例 中,該防火牆安全性及加密程式係由加州Redwood城之 Checkpoint公司所提供之Firewall-1,而該認證程式715係 由密州Waltham城之Netegrity公司所提供之SiteMinder。 仲裁720包含可用於每個集中集線器150及區域集線器 110及120以管理該商業規則之一群軟體程式。應用770 包含示於第6圖之軟體程式。介面750包含一組軟體程式 ,其提供對應用程式或機器之應用、對機器間應用之連接 性及由製造商、供應商及所有其它網路用戶使用之應用, 而讓每個機器或應用需對任何其它應用作溝通者只有一種 方式。被動及主動資料流係由一安裝在該訊息伺服器410 中之訊息中間層應用411來管理。在一範例中,該訊息中 間層應用411係由加州Palo Alto城之TIBCO軟體公司來 提供該資訊匯流排(TIB)。 本發明之許多特徵及優點可自該詳細之說明書中顯而 易見,因而後附申請專利範圍係意欲涵蓋遵循本發明之精 神及範圍所述裝置之所有這類特徵及優點。此外,因對那 些熟知此項技藝之人士將可輕易地作些修正或改變,故此 並非來限制本發明至在此所述之正確架構及操作。因此, 其它實施例係於下列申請專利範圍之範圍內。 27 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)Fab user 616 manages real-time data capture and active transmission 110 within the regional hub. User 616 listens to messages on LAN 240 in the area. In one example, the user 616 uses TIB to listen to the correct authorization message, and queues the messages so that none of them is lost until all the correct databases are updated. When a machine jumps from any "action" state Send a message to an " alert " engine when any unscheduled "closed" status is reached and update the regional database. Concentrated user 638 listens to messages from the data replication engine of the centralized TIB and queues the messages No one is lost until all the correct databases are updated, and the regional database is updated.-Line · Regional real-time monitor 614 consults the regional real-time status table 613 and other related databases and displays the current status of a particular device For all authorized operators. The data is stored in the manufacturer's real-time status database 613. The centralized time monitor 636 displays the current status of a specific machine to all authorized individuals according to the real-time status database 635. Ministry of Economy Wisdom Printed by the Consumer Cooperative of the Property Bureau. Stored in the regional hub 110 and the centralized hub 15 The tool 610 includes a set of software for analyzing production data, such as a statistical analysis program. Referring to FIG. 7, the centralized hub 150 includes the following software modules, which are generally described in the business rule manager 604, 626 specifications. Security and access Control 700, interface 750, arbitration 720, and message middle layer application 411. These software modules are also provided in the regional hubs 110 and 120 (not shown) 26 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) ) 515953 A7 _ B7 V. Description of the invention (do. Security and access control 700 includes access control 705, authentication 715, and security 710. Security 710 provides encryption and firewall management. In one example, the firewall security and The encryption program is Firewall-1 provided by Checkpoint Company of Redwood City, California, and the authentication program 715 is SiteMinder provided by Netegrity Company of Waltham, Mich. The arbitration 720 includes the available for each centralized hub 150 and regional hub 110 And 120 to manage the group of software programs of the business rules. Application 770 contains the software program shown in Figure 6. Interface 750 packs A set of software programs that provide applications to an application or machine, connectivity to applications between machines, and applications used by manufacturers, suppliers, and all other network users, so that each machine or application requires access to any other There is only one way to be used as a communicator. Passive and active data streams are managed by a message middle-tier application 411 installed in the message server 410. In one example, the message middle-tier application 411 is from Palo Alto, California. TIBCO software company to provide the information bus (TIB). Many of the features and advantages of the present invention will be apparent from the detailed description, and the appended patent application is intended to cover all such features and advantages of the device in accordance with the spirit and scope of the present invention. In addition, since those skilled in the art will be able to easily make corrections or changes, it is not intended to limit the present invention to the correct structure and operation described herein. Therefore, other embodiments are within the scope of the following patent applications. 27 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

經濟部智慧財產局員工消費合作社印製 言 (請先閱讀背面之注意事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs (Please read the precautions on the back before filling this page)

Claims (1)

515953 經濟部智慧財產局員工消費合作社印製 A8 B8 C8 D8 六、申請專利範圍 1. 一種用以收集及傳佈即時資料之工業級系統,其係 以一安全且不同之方式收集及傳佈’其包括: a) 一具有一接收即時資料之資料庫之集中網路;及 b) —根據一第一格式收集一第一組即時資料並經由一 安全傳送模式傳送該第一組即時資料至該集中網路資料庫 之第一區域網路;且 其中,對該資料庫及即時資料之存取係受控制。 2. 如申請專利範圍第1項之系統,其中對該資料庫之 存取係由一存取控制程式來控制。 3. 如申請專利範圍第1項之系統,其中對該資料庫之 存取係根據預先安排之規則來控制’其中該規則係由一存 取控制程式來實施。 4. 如申請專利範圍第1項之系統,其中一作業員遙控 存取該資料庫及該即時資料。 5. 如申請專利範圍第1項之系統,其中一作業員經由 一網際網路來遙控存取該資料庫及該即時資料。 6. 如申請專利範圍第1項之系統’其中該即時資料係 專有的。 7. 如申請專利範圍第1項之系統,其中該安全傳送模 式包括: a) 加密該即時資料;及 b) 經由一網際網路傳送該經加密之資料。 8. 如申請專利範圍第1項之系統,進一步包括: a)—根據一第二格式收集一第二組即時資料並經由一 1 本紙張尺度適用中國國家榇準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁)515953 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A8 B8 C8 D8 VI. Patent Application Scope 1. An industrial-grade system for collecting and disseminating real-time data, which is collected and disseminated in a secure and different way. 'It includes : A) a centralized network with a database for receiving real-time data; and b)-collecting a first set of real-time data according to a first format and transmitting the first set of real-time data to the centralized network via a secure transmission mode The first local area network of the database; and wherein access to the database and real-time data is controlled. 2. The system of item 1 in the scope of patent application, in which access to the database is controlled by an access control program. 3. If the system of the first scope of patent application, the access to the database is controlled according to a pre-arranged rule ', wherein the rule is implemented by an access control program. 4. If the system of item 1 of the patent application is applied, one of the operators remotely accesses the database and the real-time data. 5. If the system of the first scope of the patent application, an operator remotely accesses the database and the real-time data via an Internet. 6. If the system of the scope of patent application 1 'is used, the real-time information is proprietary. 7. The system of claim 1 wherein the secure transmission mode includes: a) encrypting the real-time data; and b) transmitting the encrypted data via an Internet. 8. If the system for applying for item 1 of the patent scope, further includes: a)-Collecting a second set of real-time data according to a second format and applying a Chinese paper standard (CNS) A4 specification (210X297) Li) (Please read the notes on the back before filling in this page) 515953 ABCD 六、申請專利範圍 安全傳送模式傳送該資料至該集中網路資料庫之第二區域 網路。 9.如申請專利範圍第8項之系統,其中分別連接至該 第一及第二區域網路之一第一及第二作業員可存取該集中 網路資料庫及該第一及第二組資料。 ι〇·如申請專利範圍第1項之系統,其中該第一區域網 路係座落在一製造公司。 π·如申請專利範圍第10項之系統,其中該即時資料 包括即時製造處理參數。 I2·如申請專利範圍第8項之系統,其中該第二區域網 路係座落在一設備供應公司中。 I3·如申請專利範圍第12項之系統,其中該第二組資 料包括設備相關資料。 I4·一種用以收集及傳佈即時資料之工業級系統,包括 a) —具有一資料庫以接收即時資料之集中網路,其中 對該資料庫及即時資料之存取係受控制; b) —經由一安全傳送模式收集並傳送一第一組即時資 料至該集中網路資料庫之第一區域網路; 0—經由該安全傳送模式收集並傳送一第二組即時資 料至該集中網路資料庫之第二區域網路;且 其中,一分別連接至該第一及第二區域網路之第一及 第二作業員可存取該集中網路資料庫及該第一及第二組資 料,且其中,對該資料庫之存取係根據預先安排之規則來 2 本紙張尺度適用中國國家標準(CNs ) a4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本貢) 訂 經濟部智慧財產局員工消費合作社印製 515953 A8 B8 C8 D8 六、申請專利範圍 控制,而該規則係由一存取控制程式來實施。 15. —種用以收集及傳佈即時資料之工業級系統,包括 a) —具有一資料庫以接收即時資料之集中網路,其中 ,對該資料庫及即時資料之存取係受控制; b) 經由一安全傳送模式收集並傳送複數個即時資料至 該集中網路資料庫之複數個第一區域網路;且 其中,一連接至該至少其中之一之區域網路之作業員 可存取該集中網路資料庫及該複數個資料,且其中,對該 資料庫之存取係根據預先安排之規則來控制,而該規則係 由一存取控制程式來實施。 16. 如申請專利範圍第1項之系統,進一步包括一用以 接收及傳送即時資料之訊息軟體。 17. 如申請專利範圍第1項之系統,進一步包括一用以 分別加密及解密該傳送及接收即時資料之加密軟體。 18. 如申請專利範圍第1項之系統’進一步包括一修復 報告管理軟體。 19. 如申請專利範圍第1項之系統’進一步包括一商業 規則管理軟體,該商業規則管理軟體包括用於安全性、存 取控制及仲裁之特殊化附屬應用° 20. 如申請專利範圍第1項之系統’進一步包括一人輪 廓管理軟體。 21. 如申請專利範圍第1項之系統’進一步包括一靜態 資料項管理軟體。 3 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂 線 經濟部智慧財產局員工消費合作社印製 515953 A8 B8 C8 D8 六、申請專利範圍 22·如申請專利範圍第1項之系統,進一步包括一即時 監視軟體。 23. 如申請專利範圍第1項之系統,進一步包括一設備 登錄管理軟體。 、 24. 如申請專利範圍第1項之系統,進一步包括一事件 管理軟體。 25. 如申請專利範圍第1項之系統,進一步包括用以分 析該即時資料之分析軟體。 26. 如申請專利範圍第1項之系統,進一步包括用以聆 聽、佇列及更新在該資料庫中之即時資料之訂購軟體。 27. 如申請專利範圍第1項之系統,進一步包括一網路 及一用以提供安全性、冗餘性、可調性、備份、復原、複 製及資料同步化之資料複製軟體° 28. —種用以收集及傳佈即時資料之方法’包括: a) 提供一具有一用以接收即時資料之資料庫及一對該 資料庫及該即時資料之控制存取之集中網路; b) 提供一根據一第一格式收集一第一組即時資料之第 一區域網路;及 c) 經由一安全傳送模式傳送該第一組即時資料至該集 中網路資料庫。 29. 如申請專利範圍第28項之方法,其中對該資料庫 之存取係由一存取控制程式來控制。 30. 如申請專利範圍第28項之方法,其中對該資料庫 之存取係根據預先安排之規則來控制,其中該規則係由一 4 (請先閱讀背面之注意事項再填寫本頁) 訂 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 經濟部智慧財產局員工消費合作社印製 515953 A8 B8 C8 D8 六、申請專利範圍 存取控制程式來實施。 31. 如申請專利範圍第28項之方法,進一步包括遙控 存取該資料庫及該即時資料。 32. 如申請專利範圍第28項之方法,進一步包括經由 一網際網路來遙控存取該資料庫及該即時資料。 33. 如申請專利範圍第28項之方法,其中該即時資料 係專有的。 34. 如申請專利範圍第28項之方法,其中該安全傳送 模式包括: a) 加密該即時資料;及 b) 經由一網際網路傳送該經加密之資料。 35. 如申請專利範圍第28項之方法,進一步包括: a) 根據一第二格式提供一用以收集一第二組資料之第 二區域網路;及 b) 經由一安全傳送模式傳送該第二組資料至該集中網 路資料庫。 36. 如申請專利範圍第35項之方法,進一步包括分別 由連接至該第一及第二區域網路之第一及第二作業員來存 取該集中網路資料庫及該第一及第二組資料。 37. 如申請專利範圍第28項之方法,其中該第一區域 網路係座落在一製造公司中。 38. 如申請專利範圍第37項之方法,其中該即時資料 包括即時製造處理參數。 39. 如申請專利範圍第35項之方法,其中該第二區域 5 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁)515953 ABCD VI. Patent Application Scope The secure transmission mode transmits the data to the second local area network of the centralized network database. 9. The system according to item 8 of the scope of patent application, wherein the first and second operators connected to one of the first and second local network respectively can access the centralized network database and the first and second networks Group profile. ι〇. The system according to item 1 of the patent application scope, wherein the first regional network is located in a manufacturing company. π. The system according to item 10 of the patent application scope, wherein the real-time data includes real-time manufacturing process parameters. I2. The system according to item 8 of the patent application scope, wherein the second regional network is located in an equipment supply company. I3. The system according to item 12 of the patent application scope, in which the second set of materials includes equipment related materials. I4. An industrial-grade system for collecting and disseminating real-time data, including a) —a centralized network with a database to receive real-time data, where access to the database and real-time data is controlled; b) — Collect and send a first set of real-time data to the first local area network of the centralized network database via a secure transmission mode; 0—Collect and send a second set of real-time data to the centralized network data via the secure transmission mode The second local area network of the database; and wherein a first and a second operator connected to the first and second local network respectively can access the centralized network database and the first and second sets of data And, the access to the database is based on pre-arranged rules. 2 This paper size applies the Chinese National Standards (CNs) a4 specifications (210X297 mm) (please read the precautions on the back before filling out this tribute). Order Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A8 B8 C8 D8 6. The scope of patent application is controlled, and the rule is implemented by an access control program. 15. — an industrial-grade system for collecting and disseminating real-time data, including a) — a centralized network with a database to receive real-time data, wherein access to the database and real-time data is controlled; b ) Collecting and transmitting a plurality of real-time data to a plurality of first local area networks of the centralized network database through a secure transmission mode; and wherein an operator connected to the at least one of the local area networks can access The centralized network database and the plurality of data, and wherein access to the database is controlled according to a pre-arranged rule, and the rule is implemented by an access control program. 16. The system of item 1 of the patent application scope further includes a message software for receiving and transmitting real-time data. 17. The system of claim 1 further includes an encryption software for encrypting and decrypting the transmitted and received real-time data, respectively. 18. The system of claim 1 further includes a repair report management software. 19. If the system of the scope of patent application 1 'further includes a business rules management software, the business rules management software includes special auxiliary applications for security, access control and arbitration. 20. If the scope of patent application 1 The item system 'further includes one-person contour management software. 21. The system according to item 1 of the patent application scope further includes a static data item management software. 3 This paper size is in accordance with Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the notes on the back before filling out this page) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs Consumer Cooperatives 515953 A8 B8 C8 D8 Patent application scope 22. The system of item 1 of the patent application scope further includes a real-time monitoring software. 23. The system according to item 1 of the patent application scope further includes a device registration management software. 24. If the system of item 1 of the patent application scope further includes an event management software. 25. The system of item 1 of the patent application scope further includes analysis software for analyzing the real-time data. 26. The system under item 1 of the patent application scope further includes ordering software for listening, enqueuing and updating real-time data in the database. 27. If the system of item 1 of the scope of patent application, further includes a network and a data replication software to provide security, redundancy, adjustability, backup, recovery, replication and data synchronization ° 28. — A method for collecting and disseminating real-time data 'includes: a) providing a centralized network having a database for receiving real-time data and a pair of the database and controlled access to the real-time data; b) providing a A first local area network that collects a first set of real-time data according to a first format; and c) transmitting the first set of real-time data to the centralized network database via a secure transmission mode. 29. The method of claim 28, wherein access to the database is controlled by an access control program. 30. For the method of applying for the scope of patent No. 28, the access to the database is controlled according to pre-arranged rules, where the rule is ordered by 4 (please read the precautions on the back before filling this page) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs, printed on the paper by the Chinese Consumer Standards Co., Ltd. Applicable to China National Standard (CNS) A4 (210X297 mm). Program to implement. 31. The method of claim 28, further comprising remotely accessing the database and the real-time data. 32. The method of claim 28 further includes remotely accessing the database and the real-time data via an Internet. 33. The method of claim 28 in which the real-time information is proprietary. 34. The method of claim 28, wherein the secure transmission mode includes: a) encrypting the real-time data; and b) transmitting the encrypted data via an Internet. 35. The method of claim 28, further comprising: a) providing a second local area network for collecting a second set of data according to a second format; and b) transmitting the second area via a secure transmission mode Two sets of data to the centralized network database. 36. The method of claim 35, further comprising accessing the centralized network database and the first and second operators by first and second operators connected to the first and second local area networks, respectively. Two sets of information. 37. The method of claim 28, wherein the first local area network is located in a manufacturing company. 38. The method of claim 37, wherein the real-time information includes real-time manufacturing process parameters. 39. If you apply for the method of item 35 of the patent scope, in which the second area 5 paper sizes are applicable to Chinese National Standard (CNS) A4 specifications (210X297 mm) (Please read the precautions on the back before filling this page) 經濟部智慧財產局員工消費合作社印製 515953 A8 B8 C8 D8 六、申請專利範圍 網路係座落在一設備供應公司中。 40·如申請專利範圍第35項之方法,其中該第二組資 料包括設備相關資料。 41. 一種用以收集及傳佈即時資料之方法’包括: a) 提供一具有一資料庫以接收即時資料之集中網路, 其中,對該資料庫及即時資料之存取係受控制; b) 提供一用以收集一第一組即時資料之第一區域網路 C)經由一安全傳送模式傳送該第一組即時資料至該集 中網路資料庫; d)提供一用以收集一第二組即時資料之第二區域網路 j 幻經由該安全傳送模式傳送該第二組即時資料至該集 中網路資料庫;及 其中,一分別連接至該第一及第二區域網路之第一及 第二作業員可存取該集中網路資料庫及該第一及第二組資 料,且其中,該存取係根據預先安排之規則來控制,而該 規則係由一存取控制程式來實施。 42. —種用以收集及傳佈即時資料之方法,包括: a) 提供一具有一資料庫以接收即時資料之集中網路, 其中對該資料庫及即時資料之存取係受控制; b) 提供經由一安全傳送模式收集並傳送複數個即時資 料至該集中網路資料庫之複數個第一區域網路;且 其中,連接至該至少其中之一之區域網路之作業員可 6 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁)Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 515953 A8 B8 C8 D8 VI. Scope of patent application The network system is located in a device supply company. 40. The method of claim 35, wherein the second set of materials includes equipment-related materials. 41. A method for collecting and disseminating real-time data 'includes: a) providing a centralized network having a database to receive real-time data, wherein access to the database and real-time data is controlled; b) Provide a first local area network for collecting a first group of real-time data C) Send the first group of real-time data to the centralized network database via a secure transmission mode; d) Provide a second group for collecting a second group of real-time data The second local network j of real-time data transmits the second set of real-time data to the centralized network database via the secure transmission mode; and one of them is connected to the first and second of the first and second local network respectively. A second operator can access the centralized network database and the first and second sets of data, and wherein the access is controlled according to a pre-arranged rule, and the rule is implemented by an access control program . 42. A method for collecting and disseminating real-time data, including: a) providing a centralized network with a database to receive real-time data, wherein access to the database and real-time data is controlled; b) Provides a plurality of first local area networks that collect and transmit a plurality of real-time data to the centralized network database through a secure transmission mode; and wherein an operator connected to the at least one of the local area networks can provide 6 pieces of paper Standards are applicable to China National Standard (CNS) A4 specifications (210X297 mm) (Please read the precautions on the back before filling this page) 515953 經濟部智慧財產局員工消費合作社印製 A8 B8 C8 _ D8 __ 六、申請專利範圍 存取該集中網路資料庫及該複數個資料,其中,對該資料 庫之存取係根據預先安排之規則來控制,而該規則係由一 存取控制程式來實施。 43·如申請專利範圍第28項之方法,進一步包括一用 以接收及傳送即時資料之訊息軟體。 44·如申請專利範圍第28項之方法,進一步包括一用 以分別加密及解密該傳送及接收即時資料之加密軟體。 45·如申請專利範圍第28項之方法,進一步包括一修 復報告管理軟體。 46·如申請專利範圍第28項之方法,進一步包括一商 業規則管理軟體。 47·如申請專利範圍第28項之方法,進一步包括一人 輪廓管理軟體。 48·如申請專利範圍第28項之方法,進一步包括一靜 態資料項管理軟體。 49.如申請專利範圍第28項之方法,進一步包括一即 時監視軟體。 50·如申請專利範圍第28項之方法,進一步包括一設 備登錄管理軟體。 51·如申請專利範圍第28項之方法,進一步包括一事 件管理軟體。 52.如申請專利範圍第28項之方法,進一步包括用以 分析該即時資料之分析軟體。 53·如申請專利範圍第28項之方法,進一步包括用以 7 本紙張尺度適用中國國家標準(CNS ) A4^ ( 210X297公釐) (請先閱讀背面之注意事項再填寫本頁)515953 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A8 B8 C8 _ D8 __ VI. Patent application scope access to the centralized network database and the plurality of data, of which access to the database is based on prearranged Rules, and the rules are enforced by an access control program. 43. The method of claim 28, further comprising a message software for receiving and transmitting real-time data. 44. The method of claim 28, further comprising an encryption software for encrypting and decrypting the transmission and reception of real-time data, respectively. 45. The method according to item 28 of the patent application scope further includes a repair report management software. 46. The method of claim 28, further comprising a business rules management software. 47. The method of claim 28 in the scope of patent application, further including one-person contour management software. 48. The method of claim 28, further comprising a static data item management software. 49. The method of claim 28, further comprising instant monitoring software. 50. The method of claim 28, further comprising a device registration management software. 51. The method of claim 28, further comprising an event management software. 52. The method of claim 28, further comprising analysis software for analyzing the real-time data. 53. If the method of applying for item 28 of the scope of patent application, further includes using 7 paper sizes to apply Chinese National Standard (CNS) A4 ^ (210X297 mm) (Please read the precautions on the back before filling this page) 、1T 線 515953 A8 B8 C8 D8 六、申請專利範圍 聆聽、佇列及更新在該資料庫中之即時資料之訂購軟體。 (請先閱讀背面之注意事項再填寫本頁) 54.如申請專利範圍第28項之方法,進一步包括一用 以提供安全性、冗餘性、可調性、備份、復原、複製及資 料同步化之資料複製軟體。 經濟部智慧財產局員工消費合作社印製 I 8 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐)1T line 515953 A8 B8 C8 D8 6. Scope of patent application Ordering software for listening, queuing and updating real-time data in the database. (Please read the notes on the back before filling out this page) 54. If the method of patent application No. 28, further includes a method to provide security, redundancy, adjustability, backup, restore, copy and data synchronization Data replication software. Printed by the Intellectual Property Bureau's Consumer Cooperatives, Ministry of Economic Affairs, I 8 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)
TW89123073A 1999-11-03 2000-11-02 Method and apparatus for proprietary data collection and distribution TW515953B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US16323199P 1999-11-03 1999-11-03

Publications (1)

Publication Number Publication Date
TW515953B true TW515953B (en) 2003-01-01

Family

ID=22589052

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89123073A TW515953B (en) 1999-11-03 2000-11-02 Method and apparatus for proprietary data collection and distribution

Country Status (3)

Country Link
AU (2) AU3968201A (en)
TW (1) TW515953B (en)
WO (2) WO2001033759A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE273538T1 (en) 1998-10-28 2004-08-15 Verticalone Corp APPARATUS AND METHOD FOR AUTOMATIC AGGREGATION AND SUPPLY OF ELECTRONIC PERSONAL INFORMATION OR DATA
AU2002248682A1 (en) * 2001-03-23 2002-10-08 Yodlee.Com, Inc. Turnkey system providing centralized data aggregation
US20030208448A1 (en) 2002-03-12 2003-11-06 Stuart Perry Data brokering system for integrated remote tool access, data collection, and control
US7464067B2 (en) * 2002-04-10 2008-12-09 Hotbutton Solutions Inc. Object monitoring and management system
US8910241B2 (en) 2002-04-25 2014-12-09 Citrix Systems, Inc. Computer security system
CN1316325C (en) * 2003-06-23 2007-05-16 株式会社日立制作所 Control method for managing permission setting of personal information disclosure, information managing device and service utilizing same
US7904181B2 (en) 2004-06-01 2011-03-08 Ils Technology Llc Model for communication between manufacturing and enterprise levels
US7596803B1 (en) 2004-07-12 2009-09-29 Advanced Micro Devices, Inc. Method and system for generating access policies
US8990910B2 (en) 2007-11-13 2015-03-24 Citrix Systems, Inc. System and method using globally unique identities
US9240945B2 (en) 2008-03-19 2016-01-19 Citrix Systems, Inc. Access, priority and bandwidth management based on application identity
US8943575B2 (en) 2008-04-30 2015-01-27 Citrix Systems, Inc. Method and system for policy simulation
US8990573B2 (en) 2008-11-10 2015-03-24 Citrix Systems, Inc. System and method for using variable security tag location in network communications
DE102014113336A1 (en) * 2014-09-16 2016-03-17 Ice Gateway Gmbh Device and method for managing a network
EP3474101A1 (en) * 2017-10-18 2019-04-24 IBN Systems GmbH Device and method for actuating and managing components in an industrial plant
US10789383B1 (en) * 2020-01-09 2020-09-29 Capital One Services, Llc Systems and methods for data protection

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU675816B2 (en) * 1992-12-14 1997-02-20 Commonwealth Of Australia, The Message document security
JPH07175868A (en) * 1993-10-15 1995-07-14 Internatl Business Mach Corp <Ibm> Method and system for output of digital information to medium
US5835726A (en) * 1993-12-15 1998-11-10 Check Point Software Technologies Ltd. System for securing the flow of and selectively modifying packets in a computer network
US5606668A (en) * 1993-12-15 1997-02-25 Checkpoint Software Technologies Ltd. System for securing inbound and outbound data packet flow in a computer network
US5742762A (en) * 1995-05-19 1998-04-21 Telogy Networks, Inc. Network management gateway
US5933503A (en) * 1996-03-15 1999-08-03 Novell, Inc Controlled modular cryptography apparatus and method
US5778368A (en) * 1996-05-03 1998-07-07 Telogy Networks, Inc. Real-time embedded software respository with attribute searching apparatus and method
US5864871A (en) * 1996-06-04 1999-01-26 Multex Systems Information delivery system and method including on-line entitlements
US5819271A (en) * 1996-06-04 1998-10-06 Multex Systems, Inc. Corporate information communication and delivery system and method including entitlable hypertext links
US5710814A (en) * 1996-07-23 1998-01-20 Cheyenne Property Trust Cryptographic unit touch point logic
US5864666A (en) * 1996-12-23 1999-01-26 International Business Machines Corporation Web-based administration of IP tunneling on internet firewalls
US5899990A (en) * 1997-03-31 1999-05-04 Sun Microsystems, Inc. Java-to-Database Connectivity Server
US6240441B1 (en) * 1997-03-31 2001-05-29 Sun Microsystems, Inc. Secure event-driven EDI transaction processing using the internet

Also Published As

Publication number Publication date
AU3437601A (en) 2001-05-14
AU3968201A (en) 2001-06-04
WO2001038995A1 (en) 2001-05-31
WO2001033759A1 (en) 2001-05-10

Similar Documents

Publication Publication Date Title
TW515953B (en) Method and apparatus for proprietary data collection and distribution
CN110832808B (en) Method, storage medium, and computing system for messaging service
EP2710506B1 (en) Method for handling privacy data
US6854010B1 (en) Multi-location management system
CN109495592A (en) Data collaborative method and electronic equipment
AU2007351355B2 (en) Methods and apparatus providing an e-Enabled ground architecture
CN101432767A (en) Method for a server-less office architecture
CN101286954A (en) Remote diagnostic system for robots
CN105210327A (en) Providing devices as a service
CN104636678B (en) The method and system of management and control is carried out under a kind of cloud computing environment to terminal device
JP2008262564A (en) Computer workstation, digital certificate management method, and remote device
CN101310544A (en) A device and method for tracking usage of content distributed to media devices of a local area network
US20130227077A1 (en) Identity data management system for high volume production of product-specific identity data
TWI829219B (en) De-centralized data authorization control system capable of transferring read token from block chain subsystem to data requester device
US8638938B2 (en) Symmetric key subscription
US20240031370A1 (en) Authentication/authorization framework for a process control or automation system
CN117527568A (en) Data access method and system of data integration platform
JP2010244272A (en) Method, system and program for managing individual attribute information
WO2024020015A1 (en) Securing access of a process control or automation system
JP2019139538A (en) Order system and order method
US9577986B1 (en) Secure data verification technique
CN103069410A (en) System and method for service recommendation service
Montagut et al. Bridging security and fault management within distributed workflow management systems
RU2828165C1 (en) Method of exchanging data between sender and receiver, implemented by means of integration bus
TW200534146A (en) System and method for sharing confidential semiconductor manufacturing information using transitory links