Network system and network management method
First Claim
1. A network management method for a system having a host computer and a plurality of terminal computers connected to the host computer through a communication path, wherein:
- software programs operated by the terminal computers are each associated with a software code in advance, and the host computer creates a network of at least some of the terminal computers operating the software programs that have the same software code;
wherein each user has a user identification code and the host computer determines the authenticity of user identification codes sent from the terminal computers, permits access to the host computer only when the user identification codes are authentic, and creates a network, and wherein the terminal computers have display devices displaying only networks that are accessible based on the user identification code.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention aims at providing a network system having high flexibility and easy changeability. When software programs α, β, and γ are run in terminal computers 141 to 146, a host computer (10) builds software networks α, β, γ (FIG. A). When the software is changed from the program α to β at the terminal computer 143, the terminal, computer 143 is switched and connected to the network β. Similarly, the terminal computer 144, is switched and connected to the network β. In other words, a flexible network can be formed in accordance with the software used by the terminal computer. Further, management of an accessing party becomes easier by using a personal ID.
8 Citations
18 Claims
-
1. A network management method for a system having a host computer and a plurality of terminal computers connected to the host computer through a communication path, wherein:
-
software programs operated by the terminal computers are each associated with a software code in advance, and the host computer creates a network of at least some of the terminal computers operating the software programs that have the same software code;
wherein each user has a user identification code and the host computer determines the authenticity of user identification codes sent from the terminal computers, permits access to the host computer only when the user identification codes are authentic, and creates a network, and wherein the terminal computers have display devices displaying only networks that are accessible based on the user identification code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
programs or data corresponding to respective networks are stored in the host computer, and the host computer combines the programs or data when creating the network by interconnecting the ten computers that are operating software programs having the same software code.
-
-
3. The network management method of claim 1 wherein;
-
when a software program running on a terminal computer requests data and the data are stored in the terminal computer, the data are obtained from the terminal computer, and when a software program running on a terminal computer requests data and the data are stored in a host computer, the terminal computer is connected to the host computer through a communication path and the data are obtained from the host computer.
-
-
4. The network management method of claim 3, wherein,
when the data to be obtained are stored in the host computer, the terminal computer is connected to the host computer through the communication path, the data are obtained from the host computer and the communication path between the terminal computer and the host computer is broken thereafter. -
5. The network management method of claim 3, wherein,
when data to be obtained are stored in both the host computer and the terminal computer, the terminal computer is connected to the host computer through the communication path, the data in the host computer are compared with the data in the terminal computer and, if the data in the host computer have been updated, the communication path is broken after at least the updated portion of the data are copied and stored from the host computer to the terminal computer, and if both data are identical to each other, the communication path is broken. -
6. The network management method of claim 3, wherein,
when data to be obtained are stored in the host computer, the terminal computer is connected to the host computer trough the communication path, the data in the host computer are copied and stored in the terminal computer, then the communication path between the host computer and the terminal computer is broken, and thereafter the data are obtained from the terminal computer. -
7. The network management method of claim 6, wherein,
when data to be obtained are stored in the host computer but cannot be copied, the terminal computer is connected to the host computer through the communication path, the data in the host computer are obtained while both of the host computer add the terminal computer are connected by the communication path and then the communication path is broken. -
8. The network management method of claim 3, wherein,
the host computer determines authenticity of a user identification sent from each of the terminal computers and permits connection to the host computer only when the user identification is authentic.
-
9. A network system having a host computer and a plurality of terminal computers connected to the host computer, wherein:
-
each of the terminal computers comprises;
reading means for reading a software code contained in a software program started in the terminal computer, transmitting means for transmitting, through a communication path, the software code read by the reading means, and display means for displaying only networks that are accessible as a selectable state on the display means based on the user identification code;
the host computer comprises;
receiving means for receiving the software codes transmitted from the terminal computers, and network forming means for creating a network by interconnecting the terminal computers that are operating software programs having the same software code among the software codes received by the receiving means, wherein the network forming means determines the authenticity of a user identification transmitted from each of the terminal computers and permits access to the host computer only when the user identification is authentic. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
the host computer further comprises memory means for storing programs or data corresponding to respective networks, and the network forming means combines the programs or data from among those stored in the memory means and corresponding to the network when creating the network by interconnecting terminal computers that are operating software programs having the same software code. -
11. The network system of claim 9, wherein:
-
each of the terminal computers comprises;
data presence determination means which, upon receiving a data request instruction, determines whether the data are stored in its own terminal computer, and data obtaining means which, when the data are determined to have been stored in its own terminal computer, obtains the data from its own terminal computer, and when the data are determined not to have been stored in its own terminal computer, obtains the data from the host computer by connecting a communication path and then breaks the communication path, and that;
the host computer comprises;
data transmission means for transmitting the data through the communication path in response to a data request from any of the terminal computers.
-
-
12. The network system of claim 11, wherein when the data to be obtained are stored in the host computer, the data obtaining means connects the host computer to the terminal computer through the communication path, obtains data from the host computer while both the host computer and the terminal computer are connected by the communication path, and the communication path is broken thereafter.
-
13. The network management system of claim 11, wherein,
when data to be obtained are stored in both the host computer and the terminal computer, the data obtaining means connects the terminal computer to the host computer through the communication path, compares the data in the host computer with the data in the terminal computer and, if the data in the host computer have been updated, the data obtaining means breaks the communication path between the host computer and the terminal computer after at least the updated portion of the data are copied and stored from the host computer to the terminal computer, and if both data are identical to each other, the data obtaining means breaks the communication path in that state. -
14. The network system of claim 11, wherein,
when data to be obtained are stored in the host computer, the data obtaining means connects the terminal computer to the host computer through the communication path, copies and stores the data from the host computer to the terminal computer, then breaks the communication path, and thereafter the data are obtained from the terminal computer. -
15. The network systems of claim 14, wherein,
when data to be obtained are stored in the host computer but cannot be copied, the data obtaining means connects the terminal computer to the host computer through the communication path, obtains the data in the host computer while both of the host computer and the terminal computer are connected by the communication path, and then the communication path is broken. -
16. A network management method of claim 11, wherein,
the host computer determine the authenticity of a user identification transmitted from each of the terminal computers and permits connection to the host computer only when the user identification is authentic.
-
-
17. A host computer for creating a network between plural terminal computers connected to the host computer through a communication path, wherein;
-
the terminal computers have at least one software program having software code, and the host computer creates the network of at least some of the terminal computers operating the software program that has the same software code;
wherein each user has a user identification code and the host computer determines the authenticity of user identification codes sent from the terminal computers, permits access to the host computer only when the user identification codes are authentic, and creates a network, and wherein the terminal computers have display devices displaying only networks that are accessible as a selectable state based on the user identification code.
-
-
18. A program storage medium readable by a computer, storing a plurality of instructions to be executed by a host computer for managing a plurality of By terminal computers connected to the host computer through a communication path the plurality of instructions comprising:
-
receiving software codes that are associated with software programs operated by the terminal computers, determining authenticity of user identification codes sent from the terminal computers, permitting access to the host computer only when the user identification codes are authentic, and creating a network of at least some of the terminal computers operating the software programs that have the same software code, wherein the host computer sends information of which networks are accessible based on the user identification code for the user to the terminal computer of the user so that the terminal computer of the user has a display device which displays only networks tat are accessible as a selectable state on the display device.
-
Specification