Exclusive use of peripheral devices
First Claim
1. A method of limiting concurrent access by multiple programs to a device linked to a terminal in a computer network comprising:
- accessing a first program on a server from a first terminal, wherein said server and said first terminal are connected to said computer network and wherein said first program is accessed by said first terminal through said server;
sending a request to use said device from said first terminal via said first program;
allocating a lock on said device by said first program if it is not in use by another program;
denying access by a second program to said device while said device is locked by said lock allocated by said first program; and
maintaining said lock for denying access, if said first terminal via said first program periodically submits further requests to use said device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for controlling the number of users that attempt to concurrently utilize a peripheral device in a network. In a network many users share various peripheral devices such as microphones, cameras, speakers, etc. In one or more embodiments of the invention, to prohibit the concurrent use of a peripheral device by multiple users, a locking mechanism is utilized. The locking mechanism allows a first user that requests access to a peripheral device to maintain an exclusive lock on that device. Once the first user has concluded using the peripheral device, the lock is released to permit another user to access the device. The locking mechanism is controlled by two protocols: the request and the grant protocols. These protocols establish the rules for exclusive access to network peripheral devices using a locking mechanism. A request includes parameters associated with the particular device, and a return address for the requesting terminal or program. The request is processed to verify the availability of the requested device and whether that device is capable to support the request based on the parameters specified. If these conditions are satisfied the request is granted. The grant protocol allows the requesting user to maintain a lock on the device for exclusive use, and monitors the locking mechanism in case of any failures. For example, if the lock on a device is not released after a user concludes the utilization of the device, the lock is released after a default period expires.
96 Citations
31 Claims
-
1. A method of limiting concurrent access by multiple programs to a device linked to a terminal in a computer network comprising:
-
accessing a first program on a server from a first terminal, wherein said server and said first terminal are connected to said computer network and wherein said first program is accessed by said first terminal through said server;
sending a request to use said device from said first terminal via said first program;
allocating a lock on said device by said first program if it is not in use by another program;
denying access by a second program to said device while said device is locked by said lock allocated by said first program; and
maintaining said lock for denying access, if said first terminal via said first program periodically submits further requests to use said device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing system architecture comprising:
-
a server;
first and second terminals, having one or more devices, said first and second terminals interconnected through an interconnect fabric with one another and said server;
first and second programs located on said server, wherein said first terminal assessing said first program through said server and wherein said first terminal via said first program requesting access to said one or more devices;
said first program allocating a lock for denying access by said second program to at least one of said devices on said second terminal if it is not in use by said second program;
said first program maintaining said lock for denying access on said device, if said first terminal via said first program periodically submits further requests to use said device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 25, 26, 27)
-
-
21. A computer program product comprising:
-
a computer usable medium having computer readable program code embodied therein configured to limit concurrent access by multiple programs to a device linked to a terminal in a computer network;
said computer program product comprising;
computer readable code within a first terminal configured to cause said first terminal to access a first program on a server and to cause said first program to send a request to use said device, wherein said server and said first terminal are connected to said computer network and wherein said first program is accessed by said first terminal through said server;
computer readable code within said first program configured to cause a computer to allocate a lock on said device if it is not in use by another program;
computer readable code configured to cause a computer to deny access by a second program to said device while said device is locked by said lock allocated by said first program; and
computer readable code configured to cause a computer to maintain said lock for denying access, if said first terminal via said first program periodically sends further requests to use said device. - View Dependent Claims (22, 23, 24, 28, 29, 30, 31)
-
Specification