WO2004077795A1 - Method for automatic terminal connection to a closed user group - Google Patents
Method for automatic terminal connection to a closed user group Download PDFInfo
- Publication number
- WO2004077795A1 WO2004077795A1 PCT/DK2004/000133 DK2004000133W WO2004077795A1 WO 2004077795 A1 WO2004077795 A1 WO 2004077795A1 DK 2004000133 W DK2004000133 W DK 2004000133W WO 2004077795 A1 WO2004077795 A1 WO 2004077795A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic units
- hooked
- data store
- information
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Definitions
- the present invention concerns a method for exchanging information between electronic units by means of a public network where the electronic units can be computers, where the electronic units can include means for receiving information, where the electronic units also contain means for delivering information, where the electronic units are connected to a shared data store by means of the public network.
- a method as describe above is known from US 5,926,179. Here is described a chat forum using the internet for communicating between hooked-up units. By communicating, transmission of 3D files to the hooked-up units occurs.
- US 6,119,147 concerns a system and a method for holding a meeting in a virtual room where the participants are not present physically, but the participants are represented by moving figures in a virtual meeting room, where the virtual meeting can occur synchronously or asynchronously.
- the participants are found in the virtual room as mov- ing 3D figures.
- the participants communicate on a display with bubbles as in comic strips.
- electronic minutes are recorded.
- the graphic presentation of the participants in the virtual meeting and the graphic presentation for the virtual meeting room are found in a centrally located computer.
- Very large amounts of data are thereby to be transmitted between hooked-up units and the centrally located computer. This can be performed over a LAN network without any problems. If the same amount of data is to be transmitted over the public network, delays may occur since the public network is often overloaded.
- WO 0217607 concerns a network for communicating between terminals in the form of mobile phones, fixed hook-up telephones and computers hooked-up to the internet. These terminals are. connected to a database which i.a. contains means for identifying the hooked-up terminals. Terminals within a group include identical means for identification for achieving a private communication network. A user has the possibility of changing the means for communication and thereby gets access to another private network. Connection to the public network from the private network over another database may be provided from the hooked-up database.
- WO 0163423 also concerns a private network established over the public network.
- the private network is used for achieving access to shared activities, including games.
- the private network utilises the public network for inviting new members to participate in the private network.
- Another purpose of the invention is to create a forum for electronic information exchange without risk of virus attack.
- a third purpose may be to create a forum of information exchange protected against unauthorised access to private information.
- hook-up occurs fully automatically
- a first hook-up may be effected by inserting a disk in a disk drive on the computer. Since the hook-up occurs entirely automatically, this way of communication is particularly suited for persons that either have a very busy workday, where every delay in hook-up is critical, or for persons with disability which makes it difficult for them, e.g. to operate a mouse or a keyboard. Since the hook-up is effected directly to a shared data store, no intermedi- ate storage of data occurs on a public network. This means that a data communication can occur where there is great security against tapping or intrusion from a third party.
- the shared data store may advantageously include a defined, delimited data store that may be common to a defined group of hooked-up electronic units.
- Application of a defined, but also delimited data store ensures that only users within a defined group are having access to the data store. A user has no possibility of accessing a neighbouring data store, unless the correct program is installed on his computer.
- the electronic units can be hooked-up to a group including at least one identical program which is required for establishing communication with the delimited data store.
- the necessity of identical programs for communicating means that one may safeguarded in a very simple way against intruding users that should have no access.
- the possibility arises that a group may immediately be extended to more persons if the program is copied to more computers, and as far as it goes there is no limit to the size of the group.
- associations or organisations may obtain a shared forum for discussion, which is very easy to use, where discussions can occur without any risk of interference from outsiders, and where the possibilities of tapping are largely non-existing.
- the electronic units may be hooked-up to several groups where the electronic units can include programs for the defined groups. There is no limitation in that a copy of several not identical programs cannot be found in the individual, hooked-up computer, where by the individual computer has possibility of communicating with more groups.
- the means of the electronic data units for introducing data may include a keyboard where keys for special characters and function keys of the keyboard are used when communicating with another electronic unit.
- a keyboard By enabling total control on all functions by means of a keyboard, a mouse is made superfluous in principle. This means that a user is to learn to know a number of function keys, but this number can be very limited. A very rapid communication with the program is thereby ensured, and the opera- tion becomes particularly suited for disabled groups that possibly use special keyboards, where the use of a mouse will be even impossible.
- the function and command keys of the keyboard may automatically remain activated for a pre-determined period of time after a first activation.
- a keyboard becomes particularly suited for the disabled.
- Single-hand operation also becomes possible for other users.
- the time for locking a key as if remaining pressed down may be variable, and the time lapse may be adapted to the actual user.
- the electronic means for sending data may include a display, where the display con- tains a 2D user interface containing at least one writing area, where the writing area communicates with the keyboard, where the writing area contains not sent messages, where the reading area contains sent messages.
- the display may include a 3D user interface, where the 3D user interface includes at least one writing area, where the display also includes at least one reading area. With a 3D user interface it becomes possible to move directly into e.g. a display and maybe even participate in a virtual trip in connection with delivering a message.
- Transfer of information between the electronic units and the shared database can be reduced to transfer of writing characters.
- graphic elements By not transmitting graphic elements, a very quick communication is achieved without overloading the used public network. Even if 2D or 3D user interfaces are used at the same time, this may easily take place, as the entire graphic environment and all graphic functions are included in the programs installed on the hooked-up computers. Program files and picture elements may thereby be called out from the data sent back and forth between electronic units and the shared database.
- the graphic user interfaces can apply and convert data in connection with receiving and transmitting information. Received data may then be decoded at reception, and the correct graphic character may be produced so that reception of data occurs by graphic presentation on a display. Also, during transmission the sent message may be decoded of all graphic characters and may only transfer pure text data in the form of numbers and letters.
- the closed network may be blocked for intruding data from the public network by all used communication addresses only being known by the programs found in electronic unit within a single group.
- the achieved blocking is produced in principle by a very simplified hooking-up being used. I.e. no user in the individual groups knows the communication addresses by which communication takes place. Thereby, by and large secret communication occurs without using any kind of encryption. Messages transmitted in this way are in principle not kept secret, but in practice messages will be difficult to tap since the communication addresses are unknown.
- the electronic units may contain graphic elements for establishing 3D user interfaces where transfer of characters of writing, special characters or functional commands may check and control the used 3D user interfaces, both in connection with sending and receiving information.
- graphic elements for establishing 3D user interfaces where transfer of characters of writing, special characters or functional commands may check and control the used 3D user interfaces, both in connection with sending and receiving information.
- all heavy elements that are to form a 3D user interface are included in the computers in advance, and only the char- acters needed for sending commands or for direct transfer of messages are transferred between individual units.
- the shared data store on a central computer does not need a particularly great size in order to be extremely functional during use.
- Fig. 1 shows a number of electronic units that are all connected to a public network
- Fig. 2 shows a number of interconnected computers with connection to a shared database
- Fig. 3 shows one of the computers on Fig. 2
- Fig. 3 shows a number of independent networks.
- Fig. 1 shows a number of electronic units 12, 14, 16, 22, 24 and 26 which are all con- nected to a public network 30. From this public network there is connection to a number of centrally located computers 32, 34, 36 and 38. These computers may contain a number of well-defined, delimited data stores 40.
- the hooked-up electronic units 12, 14 and 16 form a group 42, while the electronic groups 22, 24 and 26 form another group 44.
- the limited data store 40 may form a shared communi- cation forum, where information entered on the electronic unit 12 is shown immediately after on the electronic unit 14 and 16. Information may similarly be supplied from the electronic units 14 and 16, and these may be read instantly by the electronic unit 12.
- the method has been built up in a way where communication from a group 42 to a group 44 is not possible.
- the members of the individual group have no possibility of immediate access to a neighbouring group.
- the individual user may very well be member of a plurality of groups, since in that case several almost identical program packs are found in the hooked-up computer. If one has several program packs running, one may of course communicate with several groups.
- the closed groups 42 in principle forming a closed network between the hooked-up units 12, 14 and 16, where the communication is effected to unknown addresses over the public network 30, a nearly secret communication is achieved, since it is very cumbersome for hackers from outside or persons wanting to tap to get any connection into the hooked-up computers or into the delimited data store 40.
- Fig. 2 shows a computer network 100 consisting of computers 102, 104, 106, 108, 110, 112, 114 and 116. These computers are all interconnected in shared communication forum 118 containing a shared reading area 120 which simultaneously may be viewed by all hooked-up computers, where each of the individual computers 102, 104, 106, 108, 110, 112, 114 and 116 have access to each their writing area 122. A text entered in writing are 122 is only accessible in reading area 120 of the hooked-up computers after performing a sending function.
- the sending function may consist of a single keystroke on the keyboard.
- Fig. 3 shows an enlarged view of the one of the hooked-up computers 102, showing a shared reading area 120 and a writing area 122.
- a field can be found, showing hooked-up groups. Switching between groups occurs by means of mouse or keyboard.
- a field may be found, showing attached files. Files can be moved in a known way from the computer and into and out of this field, where files contained in the field are sent attached when a message is sent.
- Fig. 4 shows a number of groups 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211 and 212 of interconnected computers.
- Each of these computer networks have their own independent database consisting of at least one shared reading area.
- the individual computer e.g. 102 from Fig. 3, can be connected to a large number of different computer networks, where each network will be hooked up by operating a function key.
- Computer networks as described here may be very suited for closed communication within closed groups. This may e.g. be private groups, e.g. within a family, or it may be associations or, for that sake, companies wanting a closed discussion forum delimited to a limited number of persons.
- the individual computer may be coupled to a number of closed networks, where the individual networks are accessible on a section of the graphic user interface, where choosing between different closed networks is done by e.g. clicking with a mouse.
- files may be attached and sent as enclosures with usual messages.
- Files may be transferred to a particular area of a display by known copy functions, and the files may be automatically attached.
- An attached file may be transferred to the desktop of the computer by the receiver of a message just by pointing at the file and clicking.
- the method becomes suited for transferring files desired to be kept secret.
- the system is made in a client/server structure.
- a Projector made with Macromedia Director can be contained on the client side, and on the server side, the software can consist of a php-script and a relational database.
- Other program languages may also be used, e.g. Java, Pasqual or C++.
- Each client contains information about password and address for the server, name on forum and a unique password to this forum. At fixed intervals, the client asks for updating of its list of messages. The access-providing information is sent together with information about id-number and timestamp for the message received at last. When the client receives an answer from the server, it shows possible new messages, and if the forum has been zero-set since last time, the client zero-sets its display.
- a php-script receives inquiries from the clients. Firstly, password to the server is checked. Then the server checks in a table if the forum name has the correct password. If a message is wanted to be attached from the side of the client, it is first checked if the number of bytes exceed 2560 bytes (about one A4 page) * 100. If that is the case, the message is not entered. Otherwise, the size and number of messages are updated [can maybe be used at another time for also checking an upper limit to how many messages people are allowed to enter] and the new size. The message with timestamp and an id are registered.
- the messages having an id larger than the latest message from the client are selected. Timestamp for the message with this id are checked against the attached from the client - if the timestamp of the server is subsequent to (is different from) the client, a zero-setting of the forum has occurred, and the server makes an extraction of all messages. Otherwise, only messages subsequent to the last are returned.
- Plural programs installed on the same computer may co-operate.
- a user puts the programs he buys in the same folder and renames a program to 1 l.exe, for example. Then the programs can call each other - e.g. F3 may call F12, and F12 may call F5. In other words, the programs begin to co-operate since one program can be called from the other.
- the Enter-key down in the right corner on a standard keyboard copies the contents of the reading area to the clipboard. From here it is commonly known that there may be continued to other programs. This may have vital significance for a program reading aloud for the deaf, since this program may fetch text from the clipboard by itself and read it aloud.
- the copy function may, of course, also be used for copying the contents of the database to Word, Photoshop, 3D Studio Max and, for that sake, Director which in graphic contexts are some of the very heavy programs.
- the Menu key may correspond to the Ctrl function, though as time delay, so that the keyboard can be operated single-handedly. Doing it in this way provides the advantages that the Ctrl has the same function as normally and that the time button is situated close to the Delete button so that severely disabled do not have to move very much in connection with deleting the contents of the writing area.
- the keyboard may be designed with the following functions that may deviate from the normal functions of a keyboard.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention concerns a method for exchange of information between electronic units by means of a public network, where the electronic units can be connected to a shared data store by means of the public network. The object of the invention is to achieve a rapid and simple exchange of information within a closed user group. This may be achieved if hook-up between the electronic units and the shared data store occurs automatically, where a closed communication network between the data store and the hooked-up electronic units can be formed. Hereby may be achieved a very fast and very simple communication between the hooked-up units where the hook-up can occur by inserting a disk in a disk drive on the computer. This form of communication is suited for persons with a handicap making it difficult for them to operate e.g. mouse or keyboard.
Description
METHOD FOR AUTOMATIC TERMINAL CONNECTION TO A CLOSED USER GROUP
The present invention concerns a method for exchanging information between electronic units by means of a public network where the electronic units can be computers, where the electronic units can include means for receiving information, where the electronic units also contain means for delivering information, where the electronic units are connected to a shared data store by means of the public network.
A method as describe above is known from US 5,926,179. Here is described a chat forum using the internet for communicating between hooked-up units. By communicating, transmission of 3D files to the hooked-up units occurs.
Thereby, large amounts of data are to be transmitted over the internet when communicating. This is retarding both the internet and the hooked-up units.
US 6,119,147 concerns a system and a method for holding a meeting in a virtual room where the participants are not present physically, but the participants are represented by moving figures in a virtual meeting room, where the virtual meeting can occur synchronously or asynchronously. The participants are found in the virtual room as mov- ing 3D figures. The participants communicate on a display with bubbles as in comic strips. In parallel with the occurrence of the virtual meeting, electronic minutes are recorded. The graphic presentation of the participants in the virtual meeting and the graphic presentation for the virtual meeting room are found in a centrally located computer.
Very large amounts of data are thereby to be transmitted between hooked-up units and the centrally located computer. This can be performed over a LAN network without any problems. If the same amount of data is to be transmitted over the public network, delays may occur since the public network is often overloaded.
WO 0217607 concerns a network for communicating between terminals in the form of mobile phones, fixed hook-up telephones and computers hooked-up to the internet.
These terminals are. connected to a database which i.a. contains means for identifying the hooked-up terminals. Terminals within a group include identical means for identification for achieving a private communication network. A user has the possibility of changing the means for communication and thereby gets access to another private network. Connection to the public network from the private network over another database may be provided from the hooked-up database.
WO 0163423 also concerns a private network established over the public network. The private network is used for achieving access to shared activities, including games. The private network utilises the public network for inviting new members to participate in the private network.
None of the networks described in WO 0217607 or WO 0163423 concern closed networks, since through these networks there is access to the public network. Hook-up to the private networks is effected by means of the public network. A transmission of unnecessary large amounts of data with the risk of virus infection unfavourable for users may thereby occur. A hook-up is thus dependent on establishing network hookup on the hook-up computer initially. For many users without routine or disabled persons, establishing of network hook-up may be an insurmountable obstacle for utilising electronic communication.
It is the purpose of the invention to achieve a rapid and simple information exchange within a closed group of users, where communication weak users are provided access for communicating within a closed group. By communication weak users is under- stood blind or other strongly disabled. Another purpose of the invention is to create a forum for electronic information exchange without risk of virus attack. A third purpose may be to create a forum of information exchange protected against unauthorised access to private information.
This may be achieved with a method as specified in the introduction, if hook-up between the electronic units and the shared data store is effected by means of automatic exchange and acceptance of data, whereby a closed communication network is formed
between the data store and the hooked-up electronic units by using the public network.
Hereby may be achieved a very fast and very simple communication between the hooked-up units, where hook-up occurs fully automatically, and a first hook-up may be effected by inserting a disk in a disk drive on the computer. Since the hook-up occurs entirely automatically, this way of communication is particularly suited for persons that either have a very busy workday, where every delay in hook-up is critical, or for persons with disability which makes it difficult for them, e.g. to operate a mouse or a keyboard. Since the hook-up is effected directly to a shared data store, no intermedi- ate storage of data occurs on a public network. This means that a data communication can occur where there is great security against tapping or intrusion from a third party. Information that one is unwilling to exchange by means of e-mail may be exchanged to a certain extent over the closed network. Particularly for groups of disabled, this form of communication may be very suited. By means of the hooked-up programs, e.g. blind people may easily communicate by means of this method since the system can be coupled to a keyboard for the blind, and a program for reading aloud may be provided in connection with the written, transmitted or received data.
The shared data store may advantageously include a defined, delimited data store that may be common to a defined group of hooked-up electronic units. Application of a defined, but also delimited data store ensures that only users within a defined group are having access to the data store. A user has no possibility of accessing a neighbouring data store, unless the correct program is installed on his computer.
The electronic units can be hooked-up to a group including at least one identical program which is required for establishing communication with the delimited data store. The necessity of identical programs for communicating means that one may safeguarded in a very simple way against intruding users that should have no access. At the same time, the possibility arises that a group may immediately be extended to more persons if the program is copied to more computers, and as far as it goes there is no limit to the size of the group. E.g. associations or organisations may obtain a shared forum for discussion, which is very easy to use, where discussions can occur without
any risk of interference from outsiders, and where the possibilities of tapping are largely non-existing.
The electronic units may be hooked-up to several groups where the electronic units can include programs for the defined groups. There is no limitation in that a copy of several not identical programs cannot be found in the individual, hooked-up computer, where by the individual computer has possibility of communicating with more groups.
The means of the electronic data units for introducing data may include a keyboard where keys for special characters and function keys of the keyboard are used when communicating with another electronic unit. By enabling total control on all functions by means of a keyboard, a mouse is made superfluous in principle. This means that a user is to learn to know a number of function keys, but this number can be very limited. A very rapid communication with the program is thereby ensured, and the opera- tion becomes particularly suited for disabled groups that possibly use special keyboards, where the use of a mouse will be even impossible.
The function and command keys of the keyboard may automatically remain activated for a pre-determined period of time after a first activation. Hereby may be achieved that a keyboard becomes particularly suited for the disabled. Single-hand operation also becomes possible for other users. The time for locking a key as if remaining pressed down may be variable, and the time lapse may be adapted to the actual user.
The electronic means for sending data may include a display, where the display con- tains a 2D user interface containing at least one writing area, where the writing area communicates with the keyboard, where the writing area contains not sent messages, where the reading area contains sent messages. Hereby may be achieved that the form of communication becomes more exciting, since on the 2D user interface visible transmission of messages may occur in principle, maybe in the shape of figures talcing a letter and carrying it from the writing area over to the reading area, each time a message is transmitted. The possibilities of the graphic presentation in connection with utilisation of this program are on the whole unlimited.
The display may include a 3D user interface, where the 3D user interface includes at least one writing area, where the display also includes at least one reading area. With a 3D user interface it becomes possible to move directly into e.g. a display and maybe even participate in a virtual trip in connection with delivering a message.
Transfer of information between the electronic units and the shared database can be reduced to transfer of writing characters. By not transmitting graphic elements, a very quick communication is achieved without overloading the used public network. Even if 2D or 3D user interfaces are used at the same time, this may easily take place, as the entire graphic environment and all graphic functions are included in the programs installed on the hooked-up computers. Program files and picture elements may thereby be called out from the data sent back and forth between electronic units and the shared database.
The graphic user interfaces can apply and convert data in connection with receiving and transmitting information. Received data may then be decoded at reception, and the correct graphic character may be produced so that reception of data occurs by graphic presentation on a display. Also, during transmission the sent message may be decoded of all graphic characters and may only transfer pure text data in the form of numbers and letters.
The closed network may be blocked for intruding data from the public network by all used communication addresses only being known by the programs found in electronic unit within a single group. The achieved blocking is produced in principle by a very simplified hooking-up being used. I.e. no user in the individual groups knows the communication addresses by which communication takes place. Thereby, by and large secret communication occurs without using any kind of encryption. Messages transmitted in this way are in principle not kept secret, but in practice messages will be difficult to tap since the communication addresses are unknown.
The electronic units may contain graphic elements for establishing 3D user interfaces
where transfer of characters of writing, special characters or functional commands may check and control the used 3D user interfaces, both in connection with sending and receiving information. Hereby may be achieved that all heavy elements that are to form a 3D user interface are included in the computers in advance, and only the char- acters needed for sending commands or for direct transfer of messages are transferred between individual units. By reducing the amount of data to be transported, the data transmission becomes substantially quicker, and simultaneously it is achieved that the shared data store on a central computer does not need a particularly great size in order to be extremely functional during use.
In the following, the invention is explained from the figures, where
Fig. 1 shows a number of electronic units that are all connected to a public network,
Fig. 2 shows a number of interconnected computers with connection to a shared database,
Fig. 3 shows one of the computers on Fig. 2, and
Fig. 3 shows a number of independent networks.
Fig. 1 shows a number of electronic units 12, 14, 16, 22, 24 and 26 which are all con- nected to a public network 30. From this public network there is connection to a number of centrally located computers 32, 34, 36 and 38. These computers may contain a number of well-defined, delimited data stores 40. The hooked-up electronic units 12, 14 and 16 form a group 42, while the electronic groups 22, 24 and 26 form another group 44. E.g. for the group 42, the limited data store 40 may form a shared communi- cation forum, where information entered on the electronic unit 12 is shown immediately after on the electronic unit 14 and 16. Information may similarly be supplied from the electronic units 14 and 16, and these may be read instantly by the electronic unit 12.
In this way, a shared discussion forum appears where the number of participants in a group 42 is not in any way limited to three, but descending in numbers two are to be expected in order to speak of a group, while ascending in numbers there is no defined
limit. In connection with associations or organisations, there may be hundreds of participants in a group. For participants in a group, it is very simple to hook up, as one just opens the program in question on a computer, then one is automatically connected to the shared, delimited data store 40, and one may immediately read what other group members have entered since last time.
The method has been built up in a way where communication from a group 42 to a group 44 is not possible. The members of the individual group have no possibility of immediate access to a neighbouring group. However, the individual user may very well be member of a plurality of groups, since in that case several almost identical program packs are found in the hooked-up computer. If one has several program packs running, one may of course communicate with several groups. By the closed groups 42 in principle forming a closed network between the hooked-up units 12, 14 and 16, where the communication is effected to unknown addresses over the public network 30, a nearly secret communication is achieved, since it is very cumbersome for hackers from outside or persons wanting to tap to get any connection into the hooked-up computers or into the delimited data store 40.
Fig. 2 shows a computer network 100 consisting of computers 102, 104, 106, 108, 110, 112, 114 and 116. These computers are all interconnected in shared communication forum 118 containing a shared reading area 120 which simultaneously may be viewed by all hooked-up computers, where each of the individual computers 102, 104, 106, 108, 110, 112, 114 and 116 have access to each their writing area 122. A text entered in writing are 122 is only accessible in reading area 120 of the hooked-up computers after performing a sending function. The sending function may consist of a single keystroke on the keyboard. Hereby is achieved that the hooked-up computers 102, 104, 106, 108, 110, 112, 114 and 116 have a shared communication forum where all are having access to all sent messages. By a suitable structuring of the communication system, a closed network is attained where unauthorised access is almost impos- sible, without performing any kind of encryption of data sent back and forth between computers.
Fig. 3 shows an enlarged view of the one of the hooked-up computers 102, showing a shared reading area 120 and a writing area 122. By an alternative embodiment, on the left side of a reading and writing area a field can be found, showing hooked-up groups. Switching between groups occurs by means of mouse or keyboard. Also, to the right of the reading and writing area a field may be found, showing attached files. Files can be moved in a known way from the computer and into and out of this field, where files contained in the field are sent attached when a message is sent.
Fig. 4 shows a number of groups 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211 and 212 of interconnected computers. Each of these computer networks have their own independent database consisting of at least one shared reading area. The individual computer, e.g. 102 from Fig. 3, can be connected to a large number of different computer networks, where each network will be hooked up by operating a function key. In a first configuration, it will be possible to communicate with up to twelve by means of the 12 function keys of the computer. This number may, however, be increased many times by using Ctrl, Alt and Alt Gr keys in combination with function keys. Other key combinations can also be used.
Computer networks as described here may be very suited for closed communication within closed groups. This may e.g. be private groups, e.g. within a family, or it may be associations or, for that sake, companies wanting a closed discussion forum delimited to a limited number of persons. The individual computer may be coupled to a number of closed networks, where the individual networks are accessible on a section of the graphic user interface, where choosing between different closed networks is done by e.g. clicking with a mouse.
By a possible, alternative embodiment of the invention, files may be attached and sent as enclosures with usual messages. Files may be transferred to a particular area of a display by known copy functions, and the files may be automatically attached. An attached file may be transferred to the desktop of the computer by the receiver of a message just by pointing at the file and clicking. Hereby, the method becomes suited for transferring files desired to be kept secret.
In the following, a possible embodiment of the invention is described.
The system is made in a client/server structure. A Projector made with Macromedia Director can be contained on the client side, and on the server side, the software can consist of a php-script and a relational database. Other program languages may also be used, e.g. Java, Pasqual or C++.
Each client contains information about password and address for the server, name on forum and a unique password to this forum. At fixed intervals, the client asks for updating of its list of messages. The access-providing information is sent together with information about id-number and timestamp for the message received at last. When the client receives an answer from the server, it shows possible new messages, and if the forum has been zero-set since last time, the client zero-sets its display.
On the server side, a php-script receives inquiries from the clients. Firstly, password to the server is checked. Then the server checks in a table if the forum name has the correct password. If a message is wanted to be attached from the side of the client, it is first checked if the number of bytes exceed 2560 bytes (about one A4 page) * 100. If that is the case, the message is not entered. Otherwise, the size and number of messages are updated [can maybe be used at another time for also checking an upper limit to how many messages people are allowed to enter] and the new size. The message with timestamp and an id are registered.
If the client asks for reading, the messages having an id larger than the latest message from the client are selected. Timestamp for the message with this id are checked against the attached from the client - if the timestamp of the server is subsequent to (is different from) the client, a zero-setting of the forum has occurred, and the server makes an extraction of all messages. Otherwise, only messages subsequent to the last are returned.
In the following, special functions are described which may assist a user to a more
simple operation of a computer using the method for exchange of information.
Plural programs installed on the same computer may co-operate. A user puts the programs he buys in the same folder and renames a program to 1 l.exe, for example. Then the programs can call each other - e.g. F3 may call F12, and F12 may call F5. In other words, the programs begin to co-operate since one program can be called from the other.
Special functions:
The Enter-key down in the right corner on a standard keyboard copies the contents of the reading area to the clipboard. From here it is commonly known that there may be continued to other programs. This may have vital significance for a program reading aloud for the deaf, since this program may fetch text from the clipboard by itself and read it aloud. The copy function may, of course, also be used for copying the contents of the database to Word, Photoshop, 3D Studio Max and, for that sake, Director which in graphic contexts are some of the very heavy programs.
The Menu key may correspond to the Ctrl function, though as time delay, so that the keyboard can be operated single-handedly. Doing it in this way provides the advantages that the Ctrl has the same function as normally and that the time button is situated close to the Delete button so that severely disabled do not have to move very much in connection with deleting the contents of the writing area.
The keyboard may be designed with the following functions that may deviate from the normal functions of a keyboard.
Insert = Send message
Esc = Finish program Ctrl+End = Finish and cancel communication
Ctrl+N = Insert text from another program
Ctrl+S = Save copy on desktop
Ctrl+Delete Delete contents of reading area
Ctrl+arrow up/down Change size of letter
Home key, copies first message to clipboard
End key, copies last message to clipboard
Ctrl & arrow to the left copies next message to clipboard
Ctrl & arrow to the right copies former message to clipboard
With program for reading aloud for the blind and visually impaired, these programs will automatically read the copied inputs aloud.
Claims
1. Method for exchanging information between electronic units (12, 14, 16, 22, 24, 26) by means of a public network (30) where the electronic units (12, 14, 16, 22, 24, 26) include means for receiving information, where the electronic units (12, 14, 16,
22, 24, 26) also contain means for delivering information, where the electronic units (12, 14, 16, 22, 24, 26) are connected to a shared data store (32, 34, 36, 38) by means of the public network (30), characterized in that hook-up between the electronic units (12, 14, 16, 22, 24, 26) and the shared data store (32, 34, 36, 38) is effected by means of automatic exchange and acceptance of data, whereby a closed communication network is formed between the data store (32, 34, 36, 38) and the hooked-up electronic units (12, 14, 16, 22, 24, 26) by using the public network (30).
2. Method according to claim 1, characterized in that the shared data store (32, 34, 36, 38) contains a defined, delimited data store (40) which is common to a defined group (42, 44) of hooked-up electronic units (12, 14, 16, 22, 24, 26).
3. Method according to claim 1 or 2, characterized in that electronic units (12, 14, 16, 22, 24, 26) hooked-up to a group (42, 44) include at least one identical program, the program being necessary for establishing communication with the delimited data store (40).
4. Method according to one of claims 1 - 3, characterized in that electronic units (12, 14, 16, 22, 24, 26) are hooked-up to a plurality of groups, where the electronic units (12, 14, 16, 22, 24, 26) include programs for the defined groups (42, 44).
5. Method according to one of claims 1 - 4, characterized in that the means of the electronic units (12, 14, 16, 22, 24, 26) for receiving data include a keyboard, where the keys for special characters and function keys of the keyboard are used when com- municating with another electronic unit (12, 14, 16, 22, 24, 26).
6. Method according to claim 5, characterized in that the function and command keys of the keyboard automatically remain active for a determined period of time after a first activation.
7. Method according to one of claims 1 - 6, characterized in that the electronic means for data delivery include a display, where the display contains a 2D user interface containing at least one writing area, where the writing area communicates with the keyboard, where the writing area contains not sent messages, where the reading area contains sent messages.
8. Method according to one of claims 1 - 7, characterized in that the display includes a 3D user interface, where the 3D user interface includes at least one writing area, where the display also includes at least one reading area.
9. Method according to one of claims 1 - 8, characterized in that the transmission of information between the electronic units (12, 14, 16, 22, 24, 26) and the shared database (32, 34, 36, 38) is reduced to transmission of characters of writing.
10. Method according to one of claims 1 - 9, characterized in that the graphic user interfaces use and convert data in connection with receiving and sending information.
11. Method according to one of claims 1 - 10, characterized in that the closed network blocks for incoming data from the public network (30) by all used communication addresses only being known by the programs provided in electronic units (12, 14, 16, 22, 24, 26) within a single group.
12. Method according to one of claims 1 - 11, characterized in that the electronic units (12, 14, 16, 22, 24, 26) contain graphic elements for establishing 3D user interfaces, where transmission of characters of writing, special characters or functional commands controls and checks the used 3D user interfaces in connection with both transmitting and receiving information.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DKPA200300320 | 2003-02-28 | ||
| DKPA200300320 | 2003-02-28 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2004077795A1 true WO2004077795A1 (en) | 2004-09-10 |
Family
ID=32921536
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/DK2004/000133 Ceased WO2004077795A1 (en) | 2003-02-28 | 2004-02-27 | Method for automatic terminal connection to a closed user group |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2004077795A1 (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001063423A1 (en) * | 2000-02-25 | 2001-08-30 | Ikimbo, Inc. | System and method for information and application distribution |
| WO2002017607A1 (en) * | 2000-08-23 | 2002-02-28 | Koninklijke Kpn N.V. | Group communication system |
| US20030041136A1 (en) * | 2001-08-23 | 2003-02-27 | Hughes Electronics Corporation | Automated configuration of a virtual private network |
-
2004
- 2004-02-27 WO PCT/DK2004/000133 patent/WO2004077795A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001063423A1 (en) * | 2000-02-25 | 2001-08-30 | Ikimbo, Inc. | System and method for information and application distribution |
| WO2002017607A1 (en) * | 2000-08-23 | 2002-02-28 | Koninklijke Kpn N.V. | Group communication system |
| US20030041136A1 (en) * | 2001-08-23 | 2003-02-27 | Hughes Electronics Corporation | Automated configuration of a virtual private network |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101247393B (en) | System and method for preventing IP spoofing and facilitating parsing of private data areas in system area network connection requests | |
| EP1934820B1 (en) | Distributed clipboard | |
| KR101298879B1 (en) | Reduced traceability electronic message system and method | |
| US10326807B2 (en) | Method and software for enabling n-way collaborative work over a network of computers | |
| US6778642B1 (en) | Unified messaging system | |
| US6145084A (en) | Adaptive communication system enabling dissimilar devices to exchange information over a network | |
| US7328247B2 (en) | Self-contained instant messaging appliance | |
| MXPA04010402A (en) | Systems and methods for projecting content from computing devices. | |
| CN115398433A (en) | Method, apparatus and computer program product for managing organizational connections in a group-based communication system | |
| CN110290060B (en) | Cross-network communication method, device and storage medium | |
| CN1649309A (en) | Network managing method and system and computer | |
| CN117957827A (en) | Establishing new connections in the communication platform | |
| CN111049728A (en) | Mobile comprehensive office system based on enterprise WeChat | |
| JP2022530850A (en) | Improved messaging system | |
| CN112819480B (en) | Data processing method, device and storage medium | |
| AU2017300086B2 (en) | Messaging application | |
| WO2004077795A1 (en) | Method for automatic terminal connection to a closed user group | |
| KR102051078B1 (en) | Messenger program having private information protect function and messenger service system including the same | |
| Berg | Cracking a social engineer | |
| US20220383267A1 (en) | Method of creating virtual office for remote work | |
| CN116069443A (en) | Working method of virtual terminal | |
| CA2316558C (en) | Apparatus and method for locating a station initiating transmission of an emergency message in a network having multiple transmission sources | |
| Morgan | Implementing TCP/IP communications with HyperCard | |
| Almasi et al. | Functional specifications for collaboration services | |
| JP2949672B2 (en) | Group connection control method for group communication system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| 122 | Ep: pct application non-entry in european phase |