throbber
(12) United States Patent (cid:9)
`Nanja (cid:9)
`
`11111111111111101111111111!MIIIIIIIIIM 1111111111111110111111
`
`(10) Patent No.: (cid:9)
`(45) Date of Patent: (cid:9)
`
`US 7,065,637 B1
`Jun. 20, 2006
`
`(54) SYSTEM FOR CONFIGURATION OF
`DYNAMIC COMPUTING ENVIRONMENTS
`USING A VISUAL INTERFACE
`
`(75) Inventor: Sekaran Nanja, San Jose, CA (US)
`(73) Assignee: VERITAS Operating Corporating, (cid:9)
`Mountain View, CA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 838 days.
`
`(21) Appl. No.: 09/662,990
`
`(22) Filed: (cid:9)
`
`Sep. 15, 2000
`
`Related U.S. Application Data
`(60) Provisional application No. 60/228,105, filed on Aug. 24,
`2000.
`
`(51)
`
`Int. Cl.
`GO6F 15/177
`
`(2006.01)
`
` 713/1; 713/2; 718/104
`(52) U.S. Cl. (cid:9)
`(58) Field of Classification Search (cid:9)
` 713/1,
`713/2, 100; 717/168-178; 705/26, 27; 709/200,
`709/203, 204, 226, 201, 202; 345/733, 735,
`345/738; 718/100, 104, 105, 106; 715/700,
`715/810, 845
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,925,311 A (cid:9) * 5/1990 Neches et al. (cid:9)
`5,394,522 A (cid:9) * 2/1995 Sanchez-Frank et al. (cid:9)
`5,515,524 A (cid:9) * 5/1996 Lynch et al. (cid:9)
`5,555,370 A (cid:9) * 9/1996 Li et al. (cid:9)
`5,668,995 A (cid:9) * 9/1997 Bhat (cid:9)
`5,894,571 A (cid:9) * 4/1999 O'Connor (cid:9)
`6,009,507 A (cid:9) * 12/1999 Brooks et al. (cid:9)
`6,081,846 A (cid:9) * 6/2000 Hyder et al. (cid:9)
`6,182,123 B1 * 1/2001 Filepp et al. (cid:9)
`6,230,200 B1 * 5/2001 Forecast et al. (cid:9)
`6,259,448 B1 * 7/2001 McNally et al. (cid:9)
`6,393,557 B1 * 5/2002 Guthridge et al. (cid:9)
`
` 709/100
`... 345/735
`
`703/13
` 345/763
` 709/104
`
`713/2
`
`712/28
` 709/250
` 709/217
` 709/226
` 345/733
`
`713/1
`
`6,543,047 B1 * 4/2003 Vrhel et al. (cid:9)
`6,560,606 B1 * 5/2003 Young (cid:9)
`6,564,112 B1 * 5/2003 Factor (cid:9)
`6,578,141 B1 * 6/2003 Kelley et al. (cid:9)
`
`
`
`
`
`
`717/121
`707/100
`700/97
`713/1
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`
`745929 Al * 12/1996
`841616 A2 * 5/1998
`
`OTHER PUBLICATIONS
`
`"Computer System Built to Order" (cid:9) Nov. 25,
`Simon (cid:9)
`1996 (cid:9) Newsgroups: demon.adverts, midlands.adverts, san-
`et.adverts, solent.forsale, uk.adverts.computer, unet.adverts,
`uk.adverts.other, dungeon.forsale.*
`Application Developer's Training Course, SNAP 8.0 Train-
`ing Participant Guide, Module 7, Copyright © 1997, Tem-
`plate Software, Inc., pp. 7-1 through 7-34.
`Workflow Template, Developing A WFT Workflow System,
`Copyright © 1998, Template Software, Inc.
`Workflow Template, Using the WFT Development Environ-
`ment, Copyright © 1998, Template Software, Inc.
`Web Component, Using the Web Component, Copyright ©
`1997, Template Software, Inc.
`
`* cited by examiner
`
`Primary Examiner—Thuan Du
`(74) Attorney, Agent, or Firm Campbell Stephenson
`Ascolese LLP
`
`(57) (cid:9)
`
`ABSTRACT
`
`The present invention discloses a user interface for creating
`a dynamic computing environment using allocateable
`resources. The interface enables the fast, efficient selection
`and configuration of resources for the computing environ-
`ment. The resources are fully selectable and allocable by a
`system architect. In a first embodiment, the ability is pro-
`vided that allows a customer or system architect to design
`for a system by allocating resources and specifying how the
`resources are to be used. The system architect may create a
`computing environment from a remotely accessible user
`interface such as a web page on the Internet. Thus, the
`system architect can create, modify and operate the envi-
`ronment from anywhere in the world.
`
`9 Claims, 10 Drawing Sheets
`
`101
`Customer/
`Architect
`
`Internet
`108
`
`Web-based Visual
`Interface
`
`Ow.
`
`Configuration/Access
`Server
`
`Access Level
`Security
`106
`
`Isolation Level Security
`107
`
`Infrastructure
`Server
`
`104
`
`Inventory
`
`Oracle Exhibit 1001, Page 1
`
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 1 of 10 (cid:9)
`
`US 7,065,637 B1
`
`101
`Customer/
`Architect
`
`Internet
`108
`
`Web—based Visual
`Interface
`
`102
`
`Configuration/Access
`Server
`
`103
`
`Access Level
`Security
`106
`
`Isolation Level Security
`107
`
`Infrastructure
`Server
`
`104
`
`Inventory
`
`105
`
`FIG. 1
`
`Connect
`
`202
`
`Login
`
`204
`
`Select a Configuration
`208
`
`Open a terminal
`210
`
`FIG. 2
`
`Oracle Exhibit 1001, Page 2
`
`(cid:9)
`

`

`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 2 of 10 (cid:9)
`
`US 7,065,637 B1
`
`» 1
`
`E1 (cid:9)
`
`Go (cid:9)
`
`
`
`11
`
` Elk Eli
`
`ill .1
`
`45
`
`ri7. 4
`
`D i
`NC
`
`
`(51 Oi
`
`ht .:/ 192.168.1.129 d2d ewAccount..... (cid:9)
`Forward Stop Refresh Home
`
`g>,®
`
`Address (cid:9)
`Dock (cid:9)
`
`[ Fie edit View Favorites Tools Lelp
`In New Account — Microsoft Internet Explorer
`
`E:
`
`I Internet
`
`I (cid:9)
`
`
`
`Password (s): (cid:9)
`
`Done (cid:9)
`
`X
`
`^
`
`'...z.
`L2 di
`
`. (cid:9)
`• (cid:9)
`. (cid:9)
`• (cid:9)
`•
`- (cid:9)
`. (cid:9)
`.•
`c.,
`' (cid:9) " 3
`5 (cid:9)
`O 1 4 . ', (cid:9)— g (cid:9)
`
`R —
`5g—A
`_g (cid:9) t (cid:9)
`.1a='"`Si g —ei--
`,_
`=di•Deo.:_,==c= (cid:9)
`rDOCIOCI'JTY3PT3
`
`Oracle Exhibit 1001, Page 3
`
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`01:10.0000000 8:57 PM I
`(cid:9)I I I Internet
`
`11
`
`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 3 of 10 (cid:9)
`
`US 7,065,637 B1
`
`I (cid:9)
`
`10 Start I 0D 0 0 10 Inbox Microsoft Outlook Welcome to Design2....I U&b (cid:9)
`10 Done
`
`07 Q. O
`
`Password
`
`I (cid:9)
`
`a (cid:9)
`
`I I P Go I licks »
`
`InkEll
`
`21
`CD § v =
`a
`111 (cid:9) g
`Es
`, ,...,
`
`t1,11::
`
`c ; 1. (cid:9) 4
`
`ni . et
`
`c5:N
`
`Forward Stop Refresh Home
`
`Address JO http://192.168.1.129/d2dAogin.jsp (cid:9)
`Back (cid:9)
`
`Fie edit View Favorites Tools Help
`
`I q Welcome to Design2Deploy — Microsoft Internet Explorer
`
`Oracle Exhibit 1001, Page 4
`
`(cid:9)
`(cid:9)
`

`

`I0 Start 10 ODD Ill Inbox Micra....IDU&b IEI D2d In Screen shots Iq Update Ma...1 (cid:9)
`I Jilierarchicol Menu Trees Created (cid:9)1 I I Internet
`
` 9:17 PM I
`
`qqq
`
`11:1000q0q
`
`kJ-
`
`E E
`..1-: o= . . . , .
`
`L.) (cid:9) a;
`c., ,,
`
`
`C7,
`CI*
`
`O
`C1- 0- 0
`Cr)
`
`cn C 0
`
`0
`1.-
`0
`CT 4=
`C
`0
`r--,
`
`VI
`
`(cid:9)3
`
`1-...
`
` = -a c
`. t5 cr,
`4/7 3
`co a
`al -`=' c
`
`
`Col
`CD
`-__G
`..r.._
`t_,
`=
`
`C0
`3
`L.r) (cid:9) a
`cr, -= =
`---
`
`12_
`
`..=
`VI wa.., (cid:9)
`ct
`
`Configuration 1/
`Choose a N
`
`›...
`c.
`t-
`
`I
`
` V)
`13.)
`C=1
`
`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 4 of 10 (cid:9)
`
`US 7,065,637 B1
`
`4cOr in
`
`Microsystems
`
`Solaris 7
`
`Sun
`
`UNUX
`red hat
`
`6.2
`
`C/7
`C=7 (cid:9)
`3C
`C=3 -g
`C=. (cid:9) —
`C.`4 ug
`5
`
`0. (cid:9)
`
`...
`_Q
`
`:.5
`
`8
`0,..
`—
`o
`
`rmAIII
`
`lE
`
`01 la'
`Z
`
`ill (cid:9) g
`O
`045
`
`VI
`
`ISIL' 4
`ic-1 g"
`N...., • S2 =
`
`_i
`r
`g
`OL.1
`(cid:9)La-
`ice} -5
`
`Address la http://192168.1.129/d2d/Loginisp
`Forward Stop Refresh Home
`Back (cid:9)
`a . •P o® ID 8
`Ili Update Machines — Microsoft Internet Explorer (cid:9)
`
`.=,. -43 =I
`.
`-4g
`
`1 (cid:9) I --
`
`0
`LEI
`
`3
`.:1_..' I
`
`e-•
`
`WI
`
`th,
`
`L
`
`Cl) a)
`= La
`c....,
`co
`M
`C13
` CT3
`CL
`
`Oracle Exhibit 1001, Page 5
`
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`II I I Internet
`
`I Rd 9C:6 00q 00q 00001 (cid:9)
`
`US 7,065,637 B1
`
`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 5 of 10 (cid:9)
`
`[ Support [ Log out I
`
`
`
`g E c..1
`-,:-: (cid:9) i ; c _
`0
`Ca
`f-a (cid:9)
`C.)
`
`cr,
`
`4
`
`lEI El'
`
`aloprin q 1 slogs uaalos Di pzo 01 qiin 01--olom xoqui DI (cid:9)
`
`DI pals r
`
`LI /Server/comidesign2deploy/matches/system39 (cid:9)
`
`T O
`
`atiD, tri
`I
`
`Microsystems
`
`Solaris 7
`
`Sun
`
`-a-,
`Ca ›"C
`CV (cid:9) 0
`-0
`C.0 -0
`ali 1.-
`
`I—
`
`v,
`W
`0
`0
`
`Workstation
`
`.4-
`I—
`Z
`0,
`0
`C
`
`C-,J
`
`-=
`cr, co (cid:9)
`Ca-
`aa
`s= (cid:9)
`a, (cid:9) =
`CC
`
`,..._ (cid:9) 0
`Z -1=' =
`
`3
`c>
`cc) (cid:9)
`C72 -‘=' C
`
`Col
`SS
`up c)
`cr, -c,
`
`Configuration V
`Choose a N
`
`I Configurations (cid:9)
`
`achines I Users (cid:9)
`
`(n
`CD
`=
`-E
`C.-,
`CU
`M
`CD
`......
`C13
`'CI
`CI_ M
`
`>-.
`0
`Ca-
`C=14)
`c
`
`CU
`
`011> I (cid:9)
`
`Mail
`
`1-1
`
`0

`
`ls
`W
`..1
`
`-cm
`La-al
`
`I q Update Machines — Microsoft Internet Explorer (cid:9)
`
`Oracle Exhibit 1001, Page 6
`
`(cid:9)
`

`

`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 6 of 10 (cid:9)
`
`US 7,065,637 B1
`
`100000q0q00 9:58 PM I
`I
`
`1 I Internet (cid:9)
`
`II (cid:9)
`
`I0 Start 10 0 00 10 lnbox Micro....10 U&b 10 Ind I 0 Screen shots tO Update Ma..1 (cid:9)
`I ii Hierarchical Menu Trees Created (cid:9)
`
`D
`
`Designipploy
`
`►A'
`
`1
`
`I Support Log out i (cid:9)
`
`g
`4... (cid:9) a;
`= _
`7 t
`CI
`C..) (cid:9) N
`C.)
`..:r
`
`4 (cid:9)
`
`-V
`
`4
`
`cr, (cid:9)
`1.. (cid:9) C3 (cid:9)
`= ••t=1 (cid:9)
`= (cid:9)
`
`1.1-3
`CO
`..--
`wZi- r--
`I
`--,
`=
`• 3
`
`r --1
`
`Microsystems
`
`Solaris 7
`
`Sun
`
`C,..I (cid:9) = ,..,
`0
`-0
`6.0 •••0 5
`cp
`
`Cf 3
`8.1)W
`{=7) "C"
`,-.4
`
`07
`0
`1....- (cid:9)
`
`C'- = C
`
`Configurations (cid:9)
`
`Cr!
`3
`CO 0
`cra (cid:9) c "•='
`
`Users (cid:9)
`
`C/3
`CD
`=
`LE
`C-,
`CV
`
`VI
`at
`Lc> (cid:9) c)
`-,=, c
`.75., (cid:9)
`
`< (cid:9)
`
`achines (cid:9)
`
`clu
`C13
`1:=1
`CM- M
`
`History .
`0
`
`_=
`tr)
`(1.), (cid:9)
`i=in
`'"
`CO
`a, =
`=
`
`Configuration V
`Choose a N
`
`›... c•
`cu
`a)
`,--.1
`C
`
`. Cr,
`N O.,
`=I
`
`(3:1r> I
`
`IMEs111
`
`Fie Edit Vied Favorites Tools Help
`
`I q Update Machines — Microsoft Internet Explorer
`
`Oracle Exhibit 1001, Page 7
`
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 7 of 10 (cid:9)
`
`US 7,065,637 B1
`
`q0q00000 9:39 PM
`1
`
`II I IInternet (cid:9)
`
`1q
`
`D
`
`Li Start 1000q 10 Inbox Micro....10 USth 1q D2d ID Screen shots 10 Update Ma...1 (cid:9)
`1v (cid:9)
`
`o
`g
`e.., =
`c) 1—
`4),
` 0
`'
`5
`_5
`crn
`c..) ..,
`C a
`M
`cl.,
`I-- . v
`el) =
`......
`c0
`
`
`v
`a.)
`c:,_
`=
`ci)
`C.>
`CI
`CZ;)
`CD
`~ -CP
`C
`
`CP
`C
`
`C....,
`
`,f-
`
`I
`-.-.
`
`
`I-' -I
`
`..= (cid:9)
`C17
`CS. (cid:9)
`::-1-> (cid:9)
`CLP (cid:9)
`07 (cid:9)
`CC 2 (cid:9)
`
`C...I-
`0 i-- =
`0 00
`t:7 = 0
`0 (cid:9)
`L0
`,- (cid:9)
`CPI
`C1,7 (cid:9)
`1 (cid:9)
`7 (cid:9)
`...
`C •,- (cid:9)
`iii (cid:9)
`-4—,
`,n... (cid:9) .a... (cid:9)
`
`,......-- - C, (cid:9) V)
`L= -•—n (cid:9) = (cid:9) = (cid:9)
`C...) (cid:9) = (cid:9)
`C -F.., LY
`0
`(cid:9) 0 0 (cid:9)
`m w d, ca c_., * 3
`CP
`
`Configuration V
`hoose a N
`
`D....
`0
`v_
`.3.,
`0 C...J
`0
`
`. —
`
`(4> I (cid:9)
`
`0 C
`
`I Support I Log out
`
`g g
`-;-: (cid:9) i j
`0
`V
`Coq
`(..) (cid:9)
`,e 2
`
`.1..
`
`8
`4.
`
`411:1/V
`
`r-- 1
`. en (cid:9) , v...•
`r--- 0 c.r, n
`,2 (cid:9)
`.t =
`i, (cid:9) ,..,
`c.,, ..= =
`ed, -0,
`ca, I._
`
`cc,
`CZ) M
`c=,C)
`0'.c) N c
`
`CCP
`3
`z =1
`
`I Configurations (cid:9)
`
`
`
`3
`00 a
`Cm a
`
`CPI 3e
`Lt-1 (cid:9) CP
`cr, -0 c
`
`0
`
`I>
`
`achines I Users (cid:9)
`
`in
`
`a-
`C-)
`CU
`
`CD
`CU
`'CS
`CX. M
`
`History
`0
`
`Fie Edit View Favorites Tools Help
`
`I q Update Machines — Microsoft Internet Explorer
`
`Oracle Exhibit 1001, Page 8
`
`(cid:9)
`(cid:9)
`q
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 8 of 10 (cid:9)
`
`US 7,065,637 B1
`
`r.
`
`•
`
`1
`
`X 4 (cid:9)
`
`DM
`
`(cid:9)I II
`
`1 O Start II=111:1111IO lnbox Micro....Iq U&b q Ind ID Screen shots ID Update Ma...Iq Terminal 1...-1 lOGIC
`I 0 Done
`
`(refresh) (cid:9)
`
`I ri Terminal login winnt4-185 — Microsoft Internet Explorer (cid:9)
`
`Oracle Exhibit 1001, Page 9
`
`(cid:9)
`

`

`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 9 of 10 (cid:9)
`
`US 7,065,637 B1
`
`...... 0
`4 .1.
`Q
`a
`.= .
`, . „
`g
`
`r-- (cid:9)
`-
`
`C cS
`
`UNUX
`red hat
`
`6.2
`
`
`. .=.. 3.
`.=,
`.=> - ..,„
`
`CV
`
`I Support I Log out
`
`E g
`
`. =i - • (cid:9) c
`_
`..- . . (cid:9)
`v.,
`,.., ,, =
`
`Configurations (cid:9)
`
`
`
`C (cid:9)
`
`_14
`
`: o
`
`
`
`—
`
`___
`
`li;11111
`
`lE
`
`cit
`=
`N
`AI a ..c i,
`
`• EZ3
`
`(191. 4-
`
`N....,".,
`Kt
`
`0 1
`
`0 1 ....
`
`0, 3
`...n (cid:9) 0
` = =
`
`10000001:000 9:47 PM
`I
`
`11 Internet (cid:9)
`
`I:,
`
`11:1D2d 10 Screen shots 10 Update Ma.-1 (cid:9)
`
`Hierarchical Menu Trees Created (cid:9)
`
`10 Start 10000 q Inbox (cid:9)
`I (cid:9)
`
`O
`
`I Address la http://192.168.1.129/d2dAoginisP
`Forward Stop Refresh Home
`
`1--- (cid:9)
`
`,,,, (cid:9)
`3
`CD (cid:9)
`
`ix)
`00
`_..... --...:..;
`Z c_ 2 • - 3C
`
`H
`3
`co c,
`cy) -1=, . *- 0 (cid:9)
`
`VI
`3 O
`cra -1:D c
`
`
`
`Machines I Users (cid:9)
`
`= C.I.
`t- —
`..... (cid:9)
`CD
`CU S
`C:
`
`Configuration V
`Choose a N
`
`....„ 0
`0- ci,
`CV
`10,
`- iii G7
`CI
`
`cu =
`1E .) Cri
`
`M
`
`CD
`
`tti
`"CI
`
`CL =
`
`_
`
`
`
`Back (cid:9)
`
`v (cid:9)
`
`v (cid:9)
`
`D
`
`fa
`1[1 Update Machines — Microsoft Internet Explorer (cid:9)
`
`=1
`
`-g
`I-1
`
`o --d
`
`W
`LEI
`
`. .,, ....
`
`-...
`La
`
`Lt,
`
`Oracle Exhibit 1001, Page 10
`
`(cid:9)
`

`

`U.S. Patent (cid:9)
`
`Jun. 20, 2006
`
`Sheet 10 of 10 (cid:9)
`
`US 7,065,637 B1
`
`10000E100000 9:49 PM
`
`al
`
`_
`
`1 (cid:9)I (cid:9)I Internet (cid:9)
`
`.0 Start 10 0 00 10 Max Micro....10 Uttb 10 D2d 10 Screen shots 10 Update Ma...I (cid:9)
`I (cid:9)
`
`a
`3D" .
`'a =
`
`I Support Log out
`
`E E
`(...) (cid:9)
`c_.
`.4.: Q
`c>
`c.,
`
`4 (cid:9)
`
`InICe.11
`
`II
`
`Microsystems
`
`Solaris 7
`
`Sun
`
`c, >,(
`CV -=
`0 -0 _
`(cid:9)g pe,
`CL1 = n_ 0 (cid:9) r.".
`cn (cid:9)
`r, (cid:9)
`.....
`. (cid:9)
`1
`-""
`ca cd-) s (cid:9)
`r....
`N i
`
`,, (cid:9) 0 (cid:9)
`b (cid:9)
`.=.
`D.,
`,,,,
`
`ff3
`
`c 8 -0
`N
`
`„--
`0 >c •—
`C...$ = =
` =
`
`-I
`
`.=
`
`0 (cid:9)
`
`I> (cid:9)
`
`cr, (cid:9)
`w
`I--
`–,.. --c, (cid:9)
`..r- (cid:9) = (cid:9)
`
`0 (cid:9)
`
`<I
`
`oo
`
`1
`...4- i-
`-6-.,
`•E
`3
`
`r- --1
`
`... (cid:9)
`c,-, Cl.> (cid:9)
`.,_ (cid:9)
`.. (cid:9)
`CL> (cid:9)
`Cl.> (cid:9)
`CC S (cid:9)
`
`g
`f ..1
`C_,
`:.= (cid:9)
`r.'") (cid:9)
`0 (cid:9)
`.-- (cid:9) r....
`,_ (cid:9) c.
`ci, Cr> (cid:9)
`0-
`= 7
`-, (cid:9)
`c, 3 (cid:9) 0 0 0
`0 .-6 (cid:9)
`,-.•
`(cid:9) 0 7 .0
`M (cid:9) Cn (cid:9) c.r) 1=3 (cid:9) c..." c.r) cr,
`
`Col 3C
`= ''Z'
`
`C32
`CC) a
`c
`
`el,
`3
`(=> r0
`cp, C
`
`Configuration V
`Choose a N
`
`Configurations (cid:9)
`
`Ma0
`
`achines 1 Users (cid:9)
`
`C...,
`CU
`M
`(1,
`CO
`-C)
`CI. M
`
`Cr)
`CD
`
`..., O c,
`0::).., 1 (cid:9) A
`
`cu
`=I
`
`Update Machines — Microsoft Internet Explorer
`
`[ Fie Edit View Favorites Tools Help (cid:9)
`I (cid:9)
`
`Oracle Exhibit 1001, Page 11
`
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`(cid:9)
`

`

`US 7,065,637 B1
`
`1
`SYSTEM FOR CONFIGURATION OF
`DYNAMIC COMPUTING ENVIRONMENTS
`USING A VISUAL INTERFACE
`
`CROSS-REFERENCES TO RELATED
`APPLICATIONS
`
`This application claims priority from Provisional
`Application, entitled "Dynamic Computing Environment
`Using Allocateable Resources" Ser. No. 60/228,105 and
`filed on Aug. 24, 2000. This application is also related patent
`application Ser. No. 09/663,252, still pending, entitled User
`Interface for Dynamic Computing Environment Using Allo-
`cateable Resources, filed Sep. 15, 2000. Both applications
`and their disclosures are incorporated herein by reference for
`all purposes.
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates in general to digital
`processing, and more specifically to an interactive system
`for allowing allocation of resources such as digital
`processors, networks and software to create a software
`configured, networked arrangement of processors and pro-
`cesses.
`Today, computers are increasingly being used in almost
`every area of commerce, education, entertainment and pro-
`ductivity. With the growing popularity of the Internet, cor-
`porate and campus intranets, home networking and other
`networks, the trend is to use multiple computers, or pro-
`cessing platforms, to perform tasks and provide services.
`The networked processors approach is in contrast to tradi-
`tional approaches of running a single application as a
`stand-alone application on a single computer.
`One approach to networked processing is a "client-server"
`model whereby a server computer on the Internet is used to
`transfer information to a client computer. Typically, the
`client computer is located at an end user's location, such as
`a personal computer in a user's home. This allows large
`amounts of information to be stored in, and accessed from,
`the server computer by many client computers. The client
`computers can access the server computer simultaneously.
`Another approach allows a user to obtain portions of execut-
`able programs from the server to operate an application
`program in functional "pieces" or components, on the client
`computer. For example, a user can run a word-processing
`program in a client-server mode where the server provides
`only those portions of the word-processing software to the
`user's computer on an as-needed basis.
`Yet another model is the application service provider
`(ASP) model. This removes the application still further from
`the end-user and can involve more processors, such as
`servers. The ASP model allows a primary set to host a
`client-server application, or to host any type of data-
`processing resource such as a database, user interface,
`program component, data object, etc. The application can
`appear to the client as being hosted by the primary server
`when it is actually being provided by one or more other
`servers. The other servers can provide the application, or
`components, by having the client directly access the other
`server, or having the client access the other server through
`the primary server.
`Still other models are possible. Any arbitrary arrangement
`of processors can be used to provide a service or function to
`an end user, or to another device such as another processor,
`consumer electronic device, etc. Examples of such systems 65
`are groups of computers used to perform a large mathemati-
`cal task, such as rendering frames of a video sequence or
`
`30 (cid:9)
`
`2
`performing a simulation. Systems that use many processors
`to exchange information, such as email systems, multicast-
`ing programs, voice-over-IP communications, etc., can
`potentially require hundreds, or even thousands or more,
`5 networked processors.
`Software is necessary to operate each of these models.
`Each of the systems described above will likely use multiple
`software processes on each processing platform. Most likely,
`the software processes are designed by different software
`10 manufacturers. Although there are standard specifications to
`design compatible software, such software is still designed
`largely independently of other manufacturers' software. For
`example, a user may be running an operating system and
`web browser designed by different companies. Additional
`15 processes may be concurrently executing on the user's
`computer.
`Thus, many independently designed hardware devices
`and software processes must be coordinated in order for the
`overall networked system to operate correctly and effi-
`20 ciently. This complexity is multiplied by the number of users
`that the system is designed to support. For example, where
`the system is an Internet system it is common for the user
`base to be in the hundreds of thousands, or millions. There
`may be hundreds or thousands (or more) simultaneous users
`25 operating client systems that require tens, or even hundreds,
`of servers for adequate bandwidth. Different servers in the
`networked system may perform different functions such as
`web page serving, database maintenance, caching, etc.
`This complexity further manifests itself in another aspect.
`In the past, software applications used to be monolithic. That
`is, the application was self-contained within a box with no
`interaction with other applications. However, this paradigm
`is no longer true. With Internet and e-commerce
`35 applications, for example, a client application is configured
`to talk to a remotely located server application such as
`eBay.com®, or Amazon com®, for example. Typically,
`e-commerce applications define a three-tier architecture
`which includes: (1) client; (2) server; and (3) database.
`40 Within this architecture, the client may be running an Intel®
`x86 box with a Microsoft Windows NTIm environment, the
`server may be running a Sun Microsystems® box running a
`an iPlanetTM application, the database may be Sun Micro-
`systems® box running Oracle®, for example. Therefore,
`this three-tiered architecture increases the complexity and
`cost of many software applications.
`In one aspect, the complexity of today's computing envi-
`ronments increases computing costs, and extends the time
`for a new product to reach the market. This also increases the
`50 cost of the logistics of running the computing infrastructure
`for today's organizations: the cost and time involved in
`procuring, installing, provisioning and maintaining the
`infrastructure increases non-linearly with the increase in
`complexity of the infrastructure. Furthermore, the complex-
`55 ity also increases the need for continual evaluation of
`competing technologies from different vendors to optimize
`the running expenditure for the infrastructure. On the other
`hand, there is no easy access in today's market for compre-
`hensive evaluation of an integrated infrastructure without
`60 actually building the infrastructure.
`Thus, it is desirable to provide a highly available and
`easily usable system for overcoming the aforementioned
`problems and which provides advantages over the prior art.
`
`45
`
`SUMMARY OF THE INVENTION
`The present invention discloses a user interface for cre-
`ating a dynamic computing environment using allocable
`
`Oracle Exhibit 1001, Page 12
`
`

`

`US 7,065,637 B1
`
`3
`resources. The interface enables the fast, efficient selection
`and configuration of processing resources for the computing
`environment. In a first embodiment, a primary company,
`Design2Deploy, Inc.® provides the ability for a customer or
`system architect to design a system by allocating resources 5
`and specifying how the resources are to be used. The system
`architect may create a computing environment from a
`remotely accessible user interface such as a web page on the
`Internet. Thus, the system architect can create, modify and
`operate the environment from anywhere in the world. (cid:9)
`One embodiment of the present invention provides a
`method for allocating computing resources, the method
`using a computer coupled to a display device and to a user
`input device. The method includes, displaying a list of
`computing resources on the display device; accepting sig-
`nals from the user input device to indicate the configuration
`of at least a portion of the processing resources; and con-
`figuring the selected computing resource.
`A further embodiment of the present invention discloses
`a system for providing configurable resources to achieve a
`computing environment. The system includes a configurable
`communication link; a plurality of computing devices
`coupled to a the communication link; and a plurality of
`software programs coupled to the computing devices.
`A further embodiment of the present invention discloses
`a method for creating a computing environment by using a
`computer user interface, the he computer user interface
`coupled to a display screen and to an input device for
`generating signals in response to interactions of a user. The
`method includes, accepting a first signal from the input
`device which enables the user to select a configuration of a
`single computing device for use in the computing environ-
`ment; accepting a second signal from the input device which
`enables the user to activate a selected device to run in the
`computing environment; accepting further signals for
`restarting the device or for shutting the device down.
`Advantageously, the present invention facilitates the cre-
`ation of a computing environment on-demand by the
`customer, and since the computing environment, in turn, can
`be coupled over networks, including the Internet, this
`approach eliminates the logistics cost involved in the cre-
`ation and use of a computing environment.
`
`30
`
`35
`
`40
`
`10
`
`15
`
`20
`
`25
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`45
`
`FIG. 1 is a block diagram of a system for configuration of
`a computing environment and allocation of resources
`according to the present invention.
`FIG. 2 is a flow chart for describing the basic steps
`performed by a server system to allocate resources in so
`response to user interaction according to the present inven-
`tion.
`FIG. 3 is an example of a web page according to the
`present invention.
`FIG. 4 is an example of a web page according to the
`present invention.
`FIG. 5 is an example of a web page according to the
`present invention.
`FIG. 6 is an example of a web page according to the
`present invention.
`FIG. 7 is an example of a web page according to the
`present invention.
`FIG. 8 is an example of a web page according to the
`present invention.
`FIG. 9 is an example of a web page according to the
`present invention.
`
`55
`
`60
`
`65
`
`4
`FIG. 10 is an example of a web page according to the
`present invention.
`FIG. 11 is an example of a web page according to the
`present invention.
`DETAILED DESCRIPTION OF THE DRAWINGS
`Detailed descriptions of the embodiments are provided
`herein. It is to be understood, however, that the present
`invention may be embodied in various forms. Therefore,
`specific details disclosed herein are not to be interpreted as
`limiting, but rather as a basis for the claims and as a
`representative basis for teaching one skilled in the art to
`employ the present invention in virtually any appropriately
`detailed system, structure or manner.
`The present invention allows fast, efficient selection and
`configuration of processing networks. The processing net-
`work is referred to as a system including "resources." A
`system resource is any hardware, software or communica-
`tion components in the system. For example, discrete hard-
`ware devices include processing platforms such as comput-
`ers or processors, mobile/laptop computers, embedded
`computing devices, hand-held computers, personal digital
`assistants, point-of-sale terminals, smart-card devices, stor-
`age devices, data transmission and routing hardware etc.,
`without limitation. Software, or any other form of
`instruction, is executed by processors in the system and is a
`type of resource. Finally, communication resources are also
`part of the system such as a digital network's hardware, the
`network configuration and topology, and network control as
`provided by software or hardware.
`The resources are fully selectable and allocable by a
`system architect. In a preferred embodiment, a primary
`company, Design2Deploy, Inc.® provides the ability for a
`system architect to design a system by allocating resources
`and specifying how the resources are to be used. The system
`architect can be an individual, corporate entity, etc. The
`system is referred to as an "environment" and the primary
`company is referred to as an Environment Service Provider
`(ESP), while the system architect is referred to as the
`"customer." The primary company obtains revenue for pro-
`viding the resources and the tools to easily select, allocate,
`configure and run the environment.
`Note that the preferred embodiment allows such fast
`allocation and configuration of resources that environments
`can be created from a pool of resources within minutes, or
`even seconds, (virtually) destroyed, and reallocated for
`creating different environments from the same pool of
`resources This allows "time sharing" of overall resources so
`that a first environment can be "alive" for a daily two-hour
`slot, followed by second, third and fourth environments
`being instantly created for the next four hours for three
`different customers, and so on. This also provides an effi-
`cient system for provisioning "crash-and-burn" systems
`which can be used in different software development life-
`cycle scenarios including testing, rapid beta deployment,
`etc. This also provides a cost-effective way for comparative
`evaluation of technologies.
`A preferred embodiment allows customers to create a
`computing environment from a remotely accessible user
`interface such as a web page on the Internet. Thus, the
`customer can create, modify and operate the environment
`from anywhere in the world. Since the resources, in turn, can
`be coupled over networks, including the Internet, this
`approach eliminates the cost of shipping hardware and
`software. Designers, programmers, testers or other person-
`nel using an environment can, similarly, be located any-
`where in the world so that labor costs can be optimized
`
`Oracle Exhibit 1001, Page 13
`
`

`

`US 7,065,637 B1
`
`5
`The configuration of environments is automatic. For
`example, a customer can request a web-site simulator using
`12 web-page servers on a Microsoft® NT platform, 2 disk
`arrays at a specific bandwidth and storage capacity, 2
`caching servers and 200 clients running Netscape Naviga-
`torTM under Microsoft Windows® 2000 using Pentium IIITM
`processors at under 800 MHz. Such an environment is
`created automatically and made accessible to the architect in
`real-time over the web. A further understanding of embodi-
`ments of the present invention will be gained with reference
`to the diagrams and descriptions which follow.
`System Overview
`FIG. 1 is a block diagram of system 100 for allocating
`processing resources according to the present invention. In
`FIG. 1, system 100 comprises, among other components
`customer/architect 101, a web-based interface 102, a com-
`puter network such as the Internet 108, configuration/access
`server system 103, the inventory of resources 105, the
`infrastructure server 104 for the maintenance of the
`inventory, and different levels of security 106 and 107. In a
`first embodiment, customer 101 uses the web-based inter-
`face 102 and the Internet 108 to interact with server system
`103 for the purpose of allocating resources, as described
`below. The server 103 on receiving the information from the
`customer 101 allocates resources based on the customer's
`requirements and the availability of resources in the inven-
`tory 105. The access level security layer 106 ensures that
`customer 101 can access the server without any other
`customer being aware of the information passed between the
`interface 102 and the server 103. The isolation level security
`layer 107 ensures that the resources being used by the
`customer 101 are available "in isolation" i.e., no other
`customer or outsider knows about the configuration or the
`specifics of the computing environment used by customer
`101.
`Although not shown, one of ordinary skill in the art will
`realize that the "inventory" may include various machine
`and device types. For example, such devices may include
`mobile/laptop computers, embedded computing devices,
`hand-held computers, personal digital assistants, point-of-
`sale terminals and smart-card devices without limitation
`It is possible to use widely varying components, or
`resources, than those shown in FIG. 1 to adequately imple-
`ment the invention. The specific hardware and interconnec-
`tions of FIG. 1 are but one example of an architecture for
`providing allocable resources. Although not shown, system
`100 need not include Internet 108. In an exemplary
`embodiment, system 100 comprises a collection of one or
`more wired or wireless networks, which are not connected
`to the Internet. In a first embodiment, the present invention
`permits "virtual" hosting of computing environments. As
`used herein, the term "virtual" specifies that neither the
`requisite devices nor the network is physically accessible to
`users. Further, in accordance with this embodiment, the
`hosting process may be initiated or terminated by users at
`will.
`FIG. 2 shows a flowchart of the process by which cus-
`tomer 101 allocates resources in a preferred embodiment of
`the present invention.
`In FIG. 2, the flowchart is entered at step 202, when the
`user desires to allocate resources.
`At step 204, the user selects a "login option". It is
`assumed that a valid account has previously been opened for
`the USER1, under an account named ACCOUNT1, for
`example. Next, the user provides the user's information,
`namely, USER1, ACCOUNT1, and a password. Configura-
`tion server 103 locates the user named USER1 under
`
`0
`
`3
`
`6
`ACCOUNT1 and authenticates the user identification,
`account and password.
`Next, if USER1 has previously configured a laboratory
`for ACCOUNT1, it is retrieved. Otherwise, USER1 is pre-
`5 sented with a "laboratory configuration" page. An example
`of the "laboratory configuration" page is shown in the screen
`shots furnished below.
`At step 208, the computing resources are alloy. On
`clicking "selec

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket