Sign In to Follow Application
View All Documents & Correspondence

Db Roomier

Abstract: 1. A method for sharing the different types of vendor 2 databases through the single server [IP & Port]. Using 3 the ODBC drivers, server objects are shared.  Whenever the 4 client requests the server for the database, then the server 5 searches for the ODBC and creates the connection with the 6 ODBC.  Then the client could access the database using the 7 connected object in the server.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 September 2008
Publication Number
12/2010
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

RANGASAMY
29/10, TSP RC Old Quarters, Avadi, Chennai - 54

Inventors

1. RANGASAMY
29/10, TSP RC Old Quarters, Avadi, Chennai - 54

Specification

Background of the invention
i To provide the new server that can provide the following
2 features.
3 • Capable to interact with different type of clients from
4 internet and intranet as follows:
5 ■ Mobile Phone clients.
6 ■ Devices which can access internet.
7 ■ Computers.
8 ■ All other wired or wireless digital systems
9 which can communicate with internet.
10 • To eliminate the session requirement.
11 • To eliminate the requirement of different server side and
12 client script languages.
13 • Make the web sites more interactive and easy to
14 understand.
15 • Provide the information accessible from all type of
16 bandwidth and clients.
17 • Sharing the database among the different type of
18 platforms and databases.
19 • Provide the application feeling to the web users.
20 • Increase the complexity and security for the internet for
21 hackers.
22 • Reduce the server load by distributing the load with the
23 client machines respect to there requirements.
24 • Eliminate the Internet Search Engine requirements.

Prior art
1 Now a day' s web servers are the main resources to communicate
2 with the difference types of clients, bank and other important
3 transactions. But it was' not more secured one and has more
4 technologies to implement the single feature.
5 In the present database storage systems cannot be shared
6 across the globe without installing the required client components
7 as the user can control it. If the user wants to execute a single
8 query and he need to see the result in the same screen without much
9 complex and reduced time delay, it is not possible.
10 All the database servers are designed to their own database
11 system. And all the client systems must be installed with proper
12 configuration. Without these specifications the client cannot
13 access the database.
14 When the next or following generation students or people need
15 to design a new database with new features and advantages means
16 they need to create there own database server. This will increase
17 the time to implement, and we also need to wait to complete it. If
18 they designed the database architecture with JDBC/ODBC
19 compatibility means, they need not to develop the server for their
20 database. Using this database server they can make it accessible.
21 This will eliminate the server development requirement.
22 WEB SERVERS are designed to execute and perform the server
23 side action with their special language. They are not directly
24 interacts with the database.
25 Present Web server must be capable to hold the large amount of
26 information in the primary memory to satisfy the client
27 requirement. Clients must interact with the server as whole
28 information sent and received. If feels some distance presence.
29 This won't provide the satisfaction as the local application. With

30 low capability the website can interact with the client as an
31 application by eliminating the navigation and database interaction.
32 No one client can find that the session duration before it
33 expires. They will feel the session expiration after it happened.
34 And the client cannot create a new session for the current
35 application/web site state.
36 For security purpose the user want to communicate with
37 different types of sessions and databases which will more
38 complicate for the hackers attempt to trace the network and
39 database information.
40 If all the information at client and server side is completely
41 compiled format, then no one can view the validation and execution
42 logic of the application system and webpage. When the client
43 requests an object from the server to perform a task then the
44 server will send the object to perform the task at client site,
45 then the user can use the object to complete his task.
46 Current web sites are encrypted with the existing key and
47 encryption technology which are present with the client browser.
48 This could be easily predictable.
49 Current transaction of the web information is done using HTML
50 & HTTP. So the hacker can find the exact detail available in the
51 network path. If it is marshaled and serialized with dynamic key
52 encryption means no one can find it exactly.
53 Current web sites need the search engines that are collecting
54 the web contents from the sites users, and giving it to the
55 searching users. Without it, the new users cannot find the
56 required content from the internet. And the web sites must be
57 indexed with some other database to reduce the search time.
58 For these reasons, we designed the method to provide the
59 system to make it possible with existing environment with cost
60 effective and expendability.

Summary of the Method
1 The method for share the different types of databases through
2 the single server. The server uses only one port and address to
3 all the clients for different types of devices and clients.
4 Replicate the database across different vendors and platforms
5 using the client system itself.
6 Eliminate the session requirement that could be uses to
7 increase the availability and performance of the server.
8 Multiple connections from single web page that to increases
9 the client performance and security.
10 Reduce the server load and responsibility by sharing the load
11 with the clients.
12 Start to access the server using HTTP and perform the task
13 using the RMI.
14 Create the web page that not needs to navigate another site.
15 Set your database share as visible or invisible to different
16 types of clients.
17 Share your database with the clients without its information.
18 Single accessing method all clients.
19 No need of server side script and client side script in
20 different languages.
21 Eliminate the database's platform dependency.
22 Encrypt and decrypt the data using the dynamic key.
23 Store and show the web content using database instead of file.
24 No need to wait for the internet search engines.

Brief description
1 The server is mainly targeted to share the database for the
2 different types of vendors and platforms. Currently all the
3 databases are accessible through the ODBC. So the server is ready
4 to connect with the database and provide the feature to interact
5 with the database. Using multi threading concept server will
6 receive the request from the different types of clients [mobile,
7 browser, computer, etc.]. If the request is to create a new object
8 for the client use means the server will create the new database
9 connection object with a fixed life time and sends its reference to

10 client. Using that referred object the client can perform its/his
11 operation and get the result. After the completion of client
12 process, the client can remove the object by sending the logoff
13 message. If the client connection with the server was lost due to
14 any unexpected event the server object will dead after its life
15 time. But the clients connections exist and interacting with the
16 server means the server life time refreshes each and every
17 interaction (resets its life time again to its full time).
18 The server is RMI (Remote Method Invocation) server. So it
19 could be accessed from any client. The requirement is to establish
20 connection with the server, client needs the feature to access the
21 Server object's skeleton. All the information is marshaled and
22 serialized. So if any one tries to hack the information means it
23 is more complicated than the existing one. If it is encrypted
24 means it will become more secured for all the bank and military
25 transaction. Server object is pluggable with new Java classes. So
26 the new environment needs new features or the web application needs
27 any special feature means it can be created with Java and used with
28 the server. It won't affect the existing server object and not
29 need to rewrite the server for the new features .
30 Database must be configured with the server. And the database
31 can be any type and any vendor. If the simple configuration of
32 server object is done means we can get the information from the

33 server using any browser with applet or mobile device with Java.
34 Using that information we can' show the content as HTML too. This
. 35 is the downward compatibility of DB Roomier. So there no is change
36 in the environment and the feeling. The existing is reused with
37 all as whole without change.
38 For the security purpose the database contents are replicated
39 at more than one location. But it was achieved with similar
40 databases only with complex ODBC configuration. When it comes to
41 DB Roomier it will do it with simple command by making the server
42 running at both the servers or the two databases are configured
43 with the same server. At the same time both database could be from
44 different vendors and platforms.
45 To maintain the server and client connection confirmation,
46 session was introduced. That means when the link between the
47 client and server was lost unexpectedly means, the server side
48 information was available for the specified time duration only. It
49 is known as the session. But DB Roomier uses a concept of fair
50 server object. When the client request reaches the server, it will
51 create duplication of the server itself and holds inside itself.
52 Each and every object has its own life time as specified in the
53 first concept. When the client request a new object server will
54 search for a new room to place the object. If the room is
55 available means, it will put the new object at there and let it to
56 perform it operations. Other wise it will build new room and puts
57 the object and let it to perform its tasks. Initially the server
58 can create the object in infinite count. But the computer admin
59 can configure it to maximum count. After the reach of the maximum
60 count, new requests are eliminated with proper indication. Using
61 this method the client information won't be kept in the server. So
62 it went to the clients bare. At the same time the server was
63 capable to do any task easily.
64 Single client can hold more than one object at the server.
65 That means server will allocate more than one room with client
66 requested object and the client can communicate with the objects

67 concurrently. Using this feature the web developers can increase
68 the complexity to the hackers.
69 When the client information stored in the client side itself
70 then the server's capability requirement and responsibility become
71 reduced. When client's requirement rises to access the server then
72 the server will connected and accessed and cleared from the server.
73 Currently all the operations are done using the HTTP. But the
74 web browsers can make to access the DB Roomier server using the
75 RMI. Then the HTTP .becomes unnecessary. At the same time the
76 browsers are reused to show the web content using HTML and Applet.
77 Then the URL become rmi://. instead of
78 http://www..
79 Currently web operations are done by executing the server side
80 scripting from different files. When the different scripts are
81 executed by loading the classes from file to server and can be
82 displayed to the client using single page means there is no need to
83 the page navigation. At the same time client and server side
84 scripts are available only in the form of compiled version. So no
85 one can see our validation and security concepts.
86 Share the databases in different methods. That means the
87 server share can be made as it was accessible by the public user or
88 not. If it was accessible means the user can see the name of the
89 share at the server other wise the user cannot see or predict it.
90 That means the server won't hold the information at the memory.
91 When the client requests server with new name means, server will
92 look up for the share and loads for the client. Here the share
93 name was encrypted at both the sides. So no one can see it.
94 When the database share name was available at the client side
95 it was a blind method to access and use the database. The user
96 doesn't know exactly which vendor database it and other
97 information.

98 DB Roomier is a RMI server. The client can implement the
99 Skeleton access the sever means, any client like Mobile, Palm Top,
100 Browser and other internet accessible devices can easily access it.
101 The requirement is RMI protocol and internet accessing feature,
102 that's it.
103 Current software developers are going to the server side
104 scripting mostly for database access and file storage feature. If
105 the database was connected means, there is no need to make and
106 write the script to database access. And the client information
107 can be stored inside the database as it stored in file means it
108 become simple too. So the server side scripting was unwanted one.
109 And there is no need of the different languages at client script
110 too. Just Applet is enough.
111 When the database can be accessed from the browser itself
112 means, there is no need to install the client side requirements.
113 So, any client who has the Skeleton to access the DB Roomier can
114 access the database. There is no restriction due to platform.
115 Each and every server holds a search supporting object. When
116 a client searching the keyword or other information reaches server,
117 it will query the words with the visible shared databases. If it
118 has any result means it will return the information to the client
119 request. Other wise it won't return any thing. At the same time
120 the developer' s complexity to assigning the Key word to the web
121 sites become reduced.
122 In each and every server there will be a common object which
123 has the capability to search the content of the web site from its
124 server. If the searching word or related information found means,
125 it will send it to requested users. Instead of the robots.txt we
126 can use the common object which could be available with all the
127 servers which is named as "SearchPot".
128 Consider the user purchased an electronic or electrical device
129 with internet access facility. When the system is malfunctioning
130 or failed to perform its task means, he/she not needs to contact

131 the base company of the product. But the build in circuit will
132 update the host company database with the malfunction description.
- 133 Then the company customer care executive or service person can go
134 and fix it. In addition the user can order the product to the
135 nearest shop using there home appliances. That means when the user
136 need to order the milk from his refrigerator means it become single
137 touch.

Claims
1 1. A method for sharing the different types of vendor
2 databases through the single server [IP & Port]. Using
3 the ODBC drivers, server objects are shared. Whenever the
4 client requests the server for the database, then the server
5 searches for the ODBC and creates the connection with the
6 ODBC. Then the client could access the database using the
7 connected object in the server.
8 2. Database Replication across Different Vendors and
9 Platforms. When the user need to replicate the database for
10 the security/emergency or other purpose, then the user not
11 need to purchase/wait for the database software from the same
12 vendor. He can replicate the database with any free version
13 database using browser alone. From the browser select two
14 pages from the DB Roomier servers. From that servers open
15 the databases to replicate.
16 Now both the applets can communicate with each other. So the
17 database data contents will be easily transferred from on
18 server to one other server without any complexity and
19 dependency at the replicated computer.
20 Through this the replication system becomes separate one. It
21 not needs to be a part of the database server. So the third
22 party system too used to replicate the database.
23 3. Eliminating the session for Web sites. When the client
24 side applications are made, then the developer can put the
25 client side information at client side it self instead of
26 server session. Client applications are capable to run under
27 the browser means, the server side session become unwanted.
28 When the client interacts with the RMI server then the web,
29 mobile or application can hold client information itself.
30 Because, all the server side scripting and server side

31 session information are mainly targeted to hold the client
32 information at the server like how long the client was idle,
33 what could bo the information that are related to next pages
34 etc. But when DH Roomier C1 ients are made to provide the
35 browser contents dynamically without navigate it. So the
36 session was really unwanteci one.
37 4. Multi connection from the single site. When the security
38 becomes important then the web application developer can use
39 more than one connection with the server. When hackers
40 trying to access the information they want to analyze both
41 the connection tor valid one. This will increase the
42 complexity of the hackers. The important advantage is we can
43 achieve it within the same page of the web site.
44 If the liackers trying to view the packets from the browser
45 means, they will have the two different objects packets. Now
46 they must analyze the packets to find the real exact packet
47 for real transactional one. then they must found the
48 encryption key from that and move to next steps. Other wise
49 it becomes impossibie to find the information.
50 5. Eliminating HTTP for Web applications. This server is RMI
51 server. Using this any client, can communicate with the
52 server. Because the request and responses are in the form of
53 function calls and returns.
54 6. Global and Private Database sharing. For the security
55 purpose admin can share the database in two different types.
56 a. Private (or) Invisible Share
57 • This share won't available at. the client for reference.
58 It can he accessible only by the known users. Client
59 must know the database share name and its related
60 authencication information .otherwise the cilent cannot
61 use i t .
62 b. Global (or) Visible Share

63 • This is thee public share. The user can access the
64 daLabase by queryinq the list of databases available.
65 When the client requests tor the available shared in the
66 server, server will send all the Global/Visible shares
67 information which is accessible. From that the client
68 can choose one share for the further use.
69 • Figure 3 describes the method to access the visible
70 share. In the invisible share the user can't seiect it,
71 he needs to key the information. And then only he can
72 interact with the database.
73 7. Blind database access. When client requests a database
74 share, then the client can get only the name of the share.
75 Not the database name or other details like database server
76 name, IP address and the related driver to access it. So
77 client can access the database blindly without knowing it.
78 8. Eliminating different server and client side scripting
79 language to provide the dynamic Web content. Server is
80 capable to extend the new features by including the new Java
81 classes. So the user never needs to learn new language for
82 web and mobile applications. Just create the new feature to
83 interact with Java application and make it to integrate with
84 DB Roomier alone.
85 9. Eliminating the Internet Web Search Engine. If the
86 current internet user needs to search the content from the
87 any server means, he wants to open the site and read it
88 manually or proqrammatically. But, if it was searchable in
89 side the server" itself means it become very easy. When the
90 client needs to search the information from the server, he
91 can send the key word t;o I,the search object present in the
92 server. That, object will search the contents available
93 inside the server. if the content or key word is available
94 means it wi 11 cf i ve part of content as sample. Then the user
95 can select as the current available search engine results.

96 If the searching feature was made with multithreading means,
97 it will support the user mere realible ,to continue and view
98 the search resu 1 t.s with lli ■ ,;; n/c i r i od requirements. So the
99 web contents are already indexed inside the server . The user

100 request is enough for that .no third party needed . When the
101 web site content is modified of updated it will be reflected
102 instantly without any declay . So the server search objects
103 will response for the curent avaliable database content and
104 web content from the database.
105 10. Inform to Base Company about system failure or
106 malfunction/Ordering products using home appliances
107 without HTTP. If the device is malfunctioning or unit
108 of the device is failed means the customer not needs to
109 inform to the company. The machine it self informs to
110 the company. At the same limc if the customer wants to
111 order the product like milk from his Refrigerator means
112 he can order it. No need oi H'I"['P, just using RMI alone
113 the user can order it. like this the user can order
114 other things too.

Documents

Application Documents

# Name Date
1 2210-che-2008 claims.pdf 2011-09-04
1 2210-che-2008 form-1.pdf 2011-09-04
2 2210-che-2008 description (complete).pdf 2011-09-04
2 2210-che-2008 drawings.pdf 2011-09-04
3 2210-che-2008 description (complete).pdf 2011-09-04
3 2210-che-2008 drawings.pdf 2011-09-04
4 2210-che-2008 claims.pdf 2011-09-04
4 2210-che-2008 form-1.pdf 2011-09-04