Information access method and network system
First Claim
Patent Images
1. An information access method comprising the steps of:
- placing a first server within a network protected by a firewall;
connecting said first server with a second server located outside said network by a private line or a virtual private line;
taking at least some of files possessed by said first server and said second server as common files whose contents are maintained in common with each other; and
permitting information access to the common files in said first server, whereby an originator terminal that implements said access can gain information in the common files of said second server.
1 Assignment
0 Petitions
Accused Products
Abstract
A secured network system capable of easily constructing a groupware environment is offered. Host servers are placed within an intranet protected by a firewall. The host servers are connected with local servers located outside the intranet via a private network. At least some of files possessed by the host servers and the local servers are taken as common files whose contents are maintained in common with each other. Access to the common files in the host servers is allowed. The contents of the common files in the local servers can be gained from a cellular phone.
-
Citations
16 Claims
-
1. An information access method comprising the steps of:
-
placing a first server within a network protected by a firewall;
connecting said first server with a second server located outside said network by a private line or a virtual private line;
taking at least some of files possessed by said first server and said second server as common files whose contents are maintained in common with each other; and
permitting information access to the common files in said first server, whereby an originator terminal that implements said access can gain information in the common files of said second server. - View Dependent Claims (2, 4, 5)
-
-
3. An information access method comprising the steps of:
-
placing a first server capable of responding to access from a wireless mobile terminal within a network protected by a firewall;
connecting said first server with a second server located outside said network by a private line or a virtual private line;
loading a given application program into said second server;
causing said second server to activate and operate said application program according to commands which are generated by said wireless mobile terminal and which are included in access passed through said firewall; and
sending information about results of operation of said program to said wireless mobile terminal via said first server.
-
-
6. A network system having a network protected by a firewall, comprising:
-
segments forming said network and including a first segment;
a first server placed in said first segment and capable of responding to access passed through said firewall;
said first segment having a connection port for connecting said first server with a second server located outside said network by a private line or a virtual private line;
files held in said first and second servers, at least some of said files being common files whose contents are maintained in common with each other; and
said first server acting to search the common files held in this first server for corresponding information in response to said access and to send the fetched information to an originator terminal implemented said access. - View Dependent Claims (8, 10)
-
-
7. A network system having a network protected by a firewall, comprising:
-
plural segments that are independent of each other within said network;
a communication control means mounted within said network to assign access passed through said firewall to any one of said segments;
a first server which is placed in each of said segments and is capable of responding to said access;
each of said segments having a connection port for connecting said first server with a second server located outside said network by a private line or a virtual private line;
files held in said first and second servers in each segment, at least some of said files being common files whose contents are maintained in common with each other; and
one of said first servers receiving said access and acting to search the common files held in this first server for corresponding information and to send the fetched information to an originator terminal implemented said access.
-
-
9. A network system having a network protected by a firewall, comprising:
-
segments forming said network and including a first segment;
a first server placed in said first segment and capable of responding to access passed through said firewall;
said first segment having a connection port for connecting said first server with a second server located outside said network by a private line or a virtual private line;
said second server being loaded with a given application program;
said first server acting to cause said second server to activate and operate said application program according to commands included in said access, to gain information about results of operation of said program, and to send the gained information to an originator terminal implemented said access.
-
-
11. A network system comprising:
-
a network protected by a firewall;
a first server of a user enterprise placed within said network;
a second server of said user enterprise placed outside said network, said first and second servers being interconnected by a private line or a virtual private line;
files held in said first and second servers, at least some of said files being in-house information files of said user enterprise whose contents are maintained in common with each other;
said network acting to authenticate access from a wireless mobile terminal controlled by an authenticated person;
said first server having a means for executing a copying task for maintaining said in-house information files of its own in common with the contents of said second server; and
said first server further including means for executing at least one of reception processing for receiving information into said in-house information files of its own according to contents of said authenticated access, transmission processing for transmitting information contained in said in-house information files of its own, information search processing, and schedule processing for reading or entering an in-house schedule contained in said in-house information file of its own, whereby permitting communication with said wireless mobile terminal implementing said access. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification