MXPA01002036A - Method and apparatus for computed relevance messaging - Google Patents

Method and apparatus for computed relevance messaging

Info

Publication number
MXPA01002036A
MXPA01002036A MXPA/A/2001/002036A MXPA01002036A MXPA01002036A MX PA01002036 A MXPA01002036 A MX PA01002036A MX PA01002036 A MXPA01002036 A MX PA01002036A MX PA01002036 A MXPA01002036 A MX PA01002036A
Authority
MX
Mexico
Prior art keywords
information
consumer
inspector
relevance
computer
Prior art date
Application number
MXPA/A/2001/002036A
Other languages
Spanish (es)
Inventor
David Leigh Donoho
David Salim Hindawi
Lisa Ellen Lippincott
Original Assignee
Bigfix Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bigfix Inc filed Critical Bigfix Inc
Publication of MXPA01002036A publication Critical patent/MXPA01002036A/en

Links

Abstract

The invention disclosed herein enables a collection of computers and associated communications infrastructure to offer a new communications process which allows information providers to broadcast information to a population of information consumers. The information may be targeted to those consumers who have a precisely formulated need for the information. This targeting may be based on information which is inaccessible to other communications protocols. The targeting also includes a time element. Information can be brought to the attention of the consumer precisely when it has become applicable, which may occur immediately upon receipt of the message, but may also occur long after the message arrives. The communications process may operate without intruding on consumers who do not exhibit the precisely-specified need for the information, and it may operate without compromising the security or privacy of the consumers who participate.

Description

METHOD AND APPARATUS FOR SENDING COMPUTERIZED RELEVANCE MESSAGES BACKGROUND OF THE INVENTION. TECHNICAL FIELD The invention refers to a new process for communication using computers and associated communications infrastructure. More particularly, the invention relates to a method and apparatus for sending messages of computerized relevance. DESCRIPTION OF THE PREVIOUS TECHNIQUE The objective of a communication process is the transmission of information among pairs of actors who, for the purposes of the present description, consist of an information provider and an information consumer. The interests of each party are briefly described below. Information Provider Interests The information provider knows pieces of information and corresponding situations in which certain consumers would find those pieces of information interesting, useful or valuable. For example, these pieces of information can refer to problems in which consumers who have particular attributes, may be interested in resolving or who refer to opportunities of interest to consumers who have those particular attributes. The provider wants to distribute the information to those consumers in those specific situations. In principle, an information provider may know thousands or millions of conditions about which it can offer information. The hearing for those conditions may include thousands or millions of consumers. A particularly interesting situation is when a piece of typical information should be directed only to consumers who have a very special combination of circumstances. A typical piece of information, in principle would be of interest only to a small fraction of the consumer base, but nevertheless, this small fraction represents a large number of consumers. A challenging but very important case is presented when verifying when the conditions for the application of a certain piece of information- require knowing a large amount of detailed information about the consumer, their interests and affiliations or their properties. This information can be considered very sensitive by consumers who do not want to participate in a process that requires the presentation of the information to the provider. Therefore, it may seem impossible to direct information to consumers, because only consumers have access to the information required to make the determination of what information applies to them and have no desire to make the effort to make a determination on their own or give others access to the sensitive information required to make a determination on their behalf. Interest of the Consumer of Information The consumer is an individual or an organization that knows information providers that have information of potential benefit for him. The consumer can in fact know tens or hundreds of those suppliers. Typically at any given time, only a small fraction of the information that is being offered by the information provider is of potential interest to the consumer. The consumer does not want to review all the information available from the information provider. He would prefer a subset that consists of information that is relevant to the consumer. Typically the information that the provider offers changes over time and the conditions experienced by the consumer are changing over time. The consumer would prefer not to have to keep track of the changes continuously in their own state and in the state offered by the information provider. I would also prefer not to have to remember that previously published pieces of information could suddenly turn applicable. The consumer would prefer that a procedure be available to automatically detect the existence of an applicable information as it becomes applicable. Either because the consumer situation has changed, or because the offer of the information provider has changed or because the conditions for applying the information included time considerations that now became applicable. The consumer would prefer not to disclose to the provider, information about their identity or details about their interests, preferences and possessions. Rather the consumer would prefer to receive information in a form in which he could study it carefully before using it. The consumer would also prefer to have a method to inform himself about known problems with an information provider or with a certain piece of information before using the information. Typically, the consumer would prefer that if the decision is made to use a piece of information the application of the information is direct and essentially automatic. The consumer would prefer to be isolated from the prospect of damages caused by incorrect information. It would therefore be advantageous to provide a communication technique that addresses each of the ^ Previous interests with respect to both the information provider and the information consumer. SUMMARY OF THE INVENTION The invention described herein, allows a group of computers and associated communications infrastructure to offer a new communication process. This process allows information providers to broadcast information to a population of information consumers. The information can be directed to those consumers who have a precisely formulated need for the information. This addressing can be based on information that is inaccessible to other communication protocols, for example, because under other protocols the addressing requires that each potential receiver disclose private information, or because under other protocols the addressing requires that each potential receiver reveal information obtainable only after extensive calculations using data available only after intimate knowledge of the consumer's computer, its content and the local environment. Addressing also includes a time element. The information can be brought to the attention of the consumer precisely when it has become applicable. What can happen immediately after receiving the message but can also occur long after the message arrives. Again, this is an inaccessible characteristic under other communication protocols in which the time of distribution of the information and the time for the notification of the consumer are closely linked. The communications process can operate without interfering with consumers who do not present a precisely specified need for the information and can operate without compromising the safety or privacy of the consumers who participate. For example, in an implementation the information provider does not discover the identity or attributes of the individuals who receive this information. This process allows for efficient solutions to a variety of problems in modern life, including automatic technical support for modern computers. In the technical support application the present invention allows a provider to reach precisely those -computer-specific computers in a large consumer population that present a specific combination of hardware, software, system settings, data and local environment, and offer users of those computers the appropriate remedies to correct problems that are known to affect to computers in those situations. The currently preferred mode of invention, is especially focused on addressing the interests of consumers and suppliers in a technical support application. Many other interesting application areas and embodiments of the invention are also described herein. This particular embodiment of the invention is described as follows: Actors called here as information providers, author informants, which are specially structured digital documents that may contain: 1) a humanly interpretable content such as texts and multimedia; 2) computer interpretable content, such as executable programs and data; And 3) expressions in a special computer language, called the relevance language. Relevant language describes precise conditions under which given information may be relevant to a consumer, by referring to the properties of the consumer's computer environment that interprets the message, such as system configuration, content of the user's files, system, connected peripherals or remote accessible data. The humanly interpretable content in an information, can describe the condition that triggered the determination of relevance and propose an action in response to that condition, which can range from installing a software to change the values adjusted in the system to buy information or software. Computer interpretable content may include software that performs a certain calculation or makes a certain change in the system's environment. The information is communicated through a publication / subscription process through a network in a wide area such as, the Internet. The information is placed by its authors in well-known places called here as information sites. The applications referred to as information readers that run on the computers of information consumers periodically obtain information from the information servers that operate in information sites. The information readers process the message obtained thus and automatically interpret the clauses of relevance. They determine whether a given message is relevant in the environment defined by the consumer's computer and associated devices. The user is then notified of those messages that are relevant and the user can read the relevant information and promote the recommended actions.
The evaluation of relevance is conducted by analyzing the clauses of the relevance language, converting them into constituent method shipments. These clauses call on specific inspectors who can return specific properties of the computer, its configuration, its filing system or other components of interest. In fact, the list of environmental properties that can be referenced in the relevance language and verified by the information reader is determined by the contents of the inspection library installed during startup. The existence of standard inspection libraries provides the information provider with a rich vocabulary to describe the state of the consumer's computer and its environment. In an implementation, the group of inspection libraries can be expanded dynamically by means of information providers. Readers of information operate continuously automatically collecting information from many information providers distributed through public networks such as the Internet, and diagnosing their relevance as it is presented. Readers of information following an information collection protocol called here as an Anonymous Exhaustion Update Protocol, can operate in a way that fully respects the privacy of the computer owner. The information resulting from the determination of relevance, this is the information obtained from the consumer's computer, does not leak to the server. The information on the consumer's computer remains on the consumer's computer, unless the consumer approves their distribution. Many variations in this specific modality are described in detail, including variations that have very different applications, very different message formats, very different collection protocols, very different security and privacy attributes, very different methods to describe consumers for whom they can A very different message and relationship of trust between the consumer and the provider (for example, master-slave relationships) is relevant. The invention described has been shown to be layers of effectively forming all of these set values. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a block diagram showing - the process of associating information to consumers according to the invention; Figure 2 is a block diagram showing a viewpoint of the reporter according to the invention; Figure 3 is a block diagram showing the consumer view site according to the invention; Figure 4 is a flow diagram showing a technical support application according to the invention; Figure 5 is a block diagram showing an information site according to the invention; Figure 6 is a block diagram showing an information reader according to the invention; Figure 7 is a block diagram showing the response of the consumer to the relevance notification according to the invention. Figure 8 is a data structure showing information according to the invention. Figure 9 is a block diagram showing the process of evaluation of relevance according to the invention. Fig. 10 is a flow chart showing the generation of an expression tree according to the invention; Figure 11 is a block diagram showing a shipment of property method named according to the invention.
Figure 12 is a flow chart showing an object evaluation model according to the invention. Figure 13 is a flow diagram showing an object hierarchically according to the invention. Figure 14 is a flow diagram showing a new component of an object hierarchy according to the invention. Figure 15, is a data structure that shows the contents of an inspection library according to the invention. Figure 16 is a block diagram showing a situation information according to the invention. Figure 17 is a flow chart showing simulated conditions according to the invention. ^ Figure 18 is a block diagram showing a convenience market according to the invention. Figure 19 is a flow diagram showing a document adapted in relevance according to the invention. Figure 20 is a flow diagram showing the processing of questionnaires according to the invention.
Figure 21 is a flow diagram showing a mandatory feedback variant according to the invention. Fig. 22 is a flow chart showing a variant of consumer feedback according to the invention. Figure 23 is a flow chart showing bidirectional communication masked by an anonymous server according to the invention. Figure 24 is a flow diagram showing another variant of mandatory information according to the invention; and Figure 25 is a block diagram showing a recall relevance call according to the invention.- DETAILED DESCRIPTION OF THE INVENTION The invention implements a communication process that systematically solves the problem of linking an information provider to a consumer of information. The invention provides a system that depends on the use of computing devices connected by means of communication networks. In actual practice, such devices can range from traditional large-scale computers to personal computers to manual personal information managers to computing devices. embedded in the environment including consumer appliances such as remote controls and smart televisions or other common computationally dense media such as transportation vehicles. The communication mechanism may include a modem or other connected media or wireless communications using the internet or other protocols and may include the physical distribution of media. Whatever the specific case, for the purposes of the present description, the computational device will be referred to as a computer and the communications infrastructure will be referred to as a network. Typical examples of this infrastructure include intranets (private computer networks) and the Internet, the large public computer network that hosts the World Wide Web and related services. The architecture of the invention is better understood if a specific terminology is adopted, which focuses on a special case of the communication problems described above. The specific units of information that will be shared are called pieces of information (see figure 1). The special digital documents that carry the information are called informants. An information provider 10 is an organization or individual that offers information in the form of informants 12a-12b. He provider is represented by a server computer in a communicated network of computers. An information consumer 14a-14c is an organization or individual that receives information in the form of informants. The consumer is represented by means of a computer referred to as the consuming computer in a communicated network of computers. It is useful to think in concrete terms and assume that the information provider is in fact a large organization that manages a large-scale server computer; that the information consumer is in fact an individual represented by a single personal computer, intelligent television, personal information manager or other personal computing devices; and assume that the computer network can communicate according to a protocol similar to the TCP / IP protocol now in use over the internet. In actual practice many variations can be expected. For example, an information provider may constitute an individual represented by a personal computer, a consumer of information may be a corporation represented by a large-scale computational engine, and the communications process on which the invention is based may be performed by others. protocols that operate through other physical means of communication.
Using this terminology, it is now possible to describe a key purpose of the invention. The invention allows to send information from information providers to information consumers. The communications protocol allows a direct approach through automatically matching information with consumers for whom this information is relevant. The determination of relevance (see figure 2), it is done by means of an application program called as the information reader 20 that runs on the consumer's computer and can automatically evaluate the relevance based on a potentially complex combination of conditions that include: • hardware attributes. These are, for example, the type of computer in which the evaluation is performed, the type of hardware configuration 21, the capacity and uses of the hardware, the type of peripherals and the attributes of the peripherals. • Attributes of the configuration. These are, for example, the values determined for the variables defined in the system configuration 22, the types of software applications installed, the version numbers and other attributes of the software and other details of the software installation 27.
• Attributes of the database. These are, for example, the attributes of the files 23 and the databases of the computer where the evaluation is performed, which may include existence, name, size, date of creation and modification, version and content. • Attributes of the environment. These are for example the attributes that can be determined after examining the peripheral peripherals to know the state of the environment in which the computer is located. Attributes may include results of thermal, acoustic, optical and geographic positioning and other measurement devices. • Computational attributes. These are, for example, the attributes that can be determined after the appropriate computations based on the knowledge of the hardware, configuration, database and environmental attributes when applying specific mathematical-logical formulas or specific computational algorithms. • Remote Attributes 24. These are, for example, the hardware, configuration, database, environmental and computational attributes that are available when communicating with other computers that have an affinity with the consumer or their computer. • Opportunity 25. These are, for example, attributes based on the current time or a time that has elapsed from a key event such as a relevance assessment or the receipt of information. • Personal attributes. These are, for example, attributes to the human users of the computer, which can be inferred through hardware analysis, system configuration, database attributes, environmental attributes, remote attributes or can be obtained by requesting information directly from the user or his agents. • Randomization 26. These are, for example, attributes that result from the application of random or semi-random number generators. • Attributes of information 27. These are, for example, attributes that describe the configuration of the invention and the existence of certain information or type of information in the source of information. In this way, any information that is actually on the consumer's computer or that can be obtained from the consumer's computer can in principle be used to determine relevance. The information accessible in this way can be very general, filling from the personal data to the professional work product to the state of specific hardware devices. As a result, an extremely broad range of assertions can be the subject of the determination of the relevance. The information reader 30 (see figure 3) can operate automatically to determine relevance. It can present to the consumer a showcase of relevant information 32 only from several information sites 33a -33c, in such a way that the consumer does not have to perform the task of reading irrelevant information. In this way, informants can provide an automatic diagnosis 34 to any problem that can be described by a relevance clause. The information is digital documents that can have an explanatory component that describes in terms that the consumer can easily understand, the reason why the information is relevant and the purposes and effects of the action that is being recommended to the consumer. These digital documents may also contain, as another component, executable computer programs or links to executable computer programs. In this way, the information can provide an automatic solution to any problem that the message of relevance has diagnosed and that can be activated at the discretion of the consumer. Briefly, the invention presents a situation where proactive information providers identify situations of interest to consumers and They provide the information to deal with those situations. Application of Computational Technical Support To make the previous generalities more concrete, a particular application area is described where the communication process can be of considerable utility (see Figure 4). • In the technical support application, the information provider offers a product or service related to the computer, such as hardware, software, internet service or data processing service. The information provider has a consumer base 40 potentially large and potentially widely distributed. In part by the input of the user 42, the information provider knows the problematic situations 41 that may affect certain computers belonging to the client. The information provider identifies such problematic situations 43 which may include the use of antiquated versions of software, inadequate system-tuned values, conflicting combinations of software applications, inadequate physical resources, corrupted files or other similar phenomena. The information provider can know for each problematic situation, a precise combination of hardware, the configuration of the system, the configuration of the database, the opportunity and other attributes that can indicate the situation. The information provider can know an accurate solution 44 for each problematic situation, which may include: • A suggestion to the user to modify their usage models; • -a suggestion to the user to read a document; • a proposal to update to a new software version. • a proposal for modifying the values determined in the system; • a proposal to run a certain program to make a solution or • a proposal to download or execute special applications to correct the situation. The information provider is the author of an information 45 which is then preferably studied 46, and is made available to the relevant users on the information site 47. In this way, the information provider can use the invention to reach the consumer population efficiently. The provider prepares information packages about the specific situation in the form of formal information concerning the situation. This digital document can include: • A precise specification in formal language of the conditions under which the situation arises. • Special explanatory information for consumers who are in a given situation describing to these consumers the situation in which they are, the implications of the situation and the actions proposed by the suppliers to correct the situation.- or digital content that provides the solution or automatic response. The information provider publishes the information 40 through the internet or. an intranet, a - through an information server that runs on the provider's information site. For example, (see figure 5) the information site may consist of a directory of information files 51a-51b and inspection files 52a-52b (described below). Such information may be communicated to the outside world 54, by means such as a directory message server 55, an HTTP 56 server, and an FTP server 57 or a file server 58. The information consumer is a user of the products. and services of the information provider that knows the service provider's site and generally relies on the provider's organization and the information it provides. The consumer of information The information reading application is available on your computer. The information consumer instructs his reader to subscribe to the site or place of information offered by the information provider. The information reader 20 (see Figure 6) at fixed intervals or under the manual control of the user by means of a user interface 65, collects information to which the user subscribes. The subscription to information is entered with a subscription manager 67 based at least partially on the information in various user site definition files 68. The information is collected from the information sites of the information provider 33a-33b using an accumulator 60 The reader then displays the information using a decompressor 61 and adds to that information the existing body of information. The information can be provided to the reader through any of several sources, including alternating input currents 62. The information reader determines the relevance of any of the existing or new information with a relevance evaluation module 63. This determination is made either continuously, with fixed intervals or under the manual control of the user . The information reader includes a user interface 65 that receives relevant information and a presentation and administration system 66 that presents the relevant information to be inspected by the consumer of the relevant information. In some embodiments of the invention an information may also be subject to digital verification using a verification module 64 (described in greater detail below). A typical relevant information is reported to a consumer as follows: Your computer has a certain combination of hardware and software and adjusted values. Computers with this combination have often reported a particular problem. Our company has a solution. It will change the adjusted values on your computer. If you accept this solution, your problem will disappear. This solution has been rigorously tested before its departure and represents the best way known to us to solve this problem. The consumer of information reviews these relevant information 100 (see figure 7) and acts on the information 110 for example by ignoring the information 111. Otherwise, the user potentially deliberates that deliberation may include informing himself more about the information or its author 112, inform others of the information 113 or take other external action 114 and then depending on the outcome of the deliberation, approves or denies approval. If the consumer gives approval, an automatic solution can be had which can include a variety of activities, including software download 72, installation and execution 71 of an automatic electronic response 73 or the purchase or request of a digital object 70. This Particular application area, shows how the invention can be used to diagnose and solve problems in a computer automatically. There are many other areas of application of the invention that may include conducting business transactions and not solving computer problems or offering new forms of private communications. Response to Interests The invention fully responds to the interests discussed above. Supplier Interests Large-scale communications. In common with other communication systems, by computer, such as the global network, the invention can reach a large number of consumers and transfer a large quantity of informative messages with low cost. Automatic operation The association of information to consumers, is done without the need of the intervention case by case, of expert human operatives. Exclusive addressing The invention allows information to flow accurately to the appropriate consumers. The provider can guarantee this by carefully specifying the conditions under which a piece of information is relevant. Addressing with intimate knowledge. The addressing of the information in the invention focuses precisely on the attributes of the consumer because it has access to intimate knowledge of the internal details of the state of the consumer's computers without necessarily revealing this knowledge to the supplier. This degree of addressing is not possible under other protocols because other protocols require the presentation of this information to the provider to determine if a piece of information is relevant. Consumer Interests The invention satisfies the main consumer interests mentioned above. Automatic operation without attention. The invention is an automatic message system that operates successfully without the consumer being involved frequently. The information reader can periodically gather new site information from information to which you are subscribed. This process can be completely automatic (manual intervention is also available). The databases of information resident in the consumer's computer can be continuously evaluated in their relevance by means of an automatic operation without attention by the information reader. Provision of information narrowly directed. In a typical form of operation, the consumer only sees information relevant to their precise attributes, including attributes derived from the content of their computer, associated peripherals and affiliated computers. Timely provision of information. In a typical mode of operation a piece of information can enter the consumer's computer and remain resident for an extended period of time before becoming important. The information is. shows when it becomes applicable and not before. Opportunity for deliberation. Typically the information reader does not apply a recommended solution operator. Rather, the information reader gives the consumer the opportunity to study the diagnosis and recommendation and to assess the credibility of the provider before moving on. There are three special aspects for the deliberation process available in the invention: • Presentation of the potential risks. By making use of known user interface methods, such as HTML and hypertext links, the invention allows information providers to inform consumers completely about the potential risks associated with following a certain recommended course of action. • Discovery of consumer complaints. Through devices that will be discussed later, (such as the Better Advice Bureau) consumers can use the information mechanism to inform themselves about the existence of known or predictable privacy and the risks of security associated by specific information and / or information providers before accepting the proposed solutions.
• Correction of known defects. The invention allows information providers to retract their own erroneous information. A case of these is the urgent notice network mechanism (UrgentAdviceNet) "(described below), to quickly distribute information to the population according to the invention Automatic solution Typically the information provider is the author of information from a way that the information reader is offered to the user to Apply a recommended solution operator automatically after the user has given approval. Thus, the invention offers an automatic solution to the condition of the user under the guidance of the user. Briefly, the invention provides a mechanism to bind consumers efficiently in the highly specific relevant information in a communications structure that responds to the interests of the consumer. Security and Privacy Technique: One-way membrane The described invention offers a simple process for sending computational relevance messages. This is a broad idea with many possible applications, in certain determined values this type of message sending must be implemented in a way that pays special attention to security and privacy interests. This is a one-way membrane 35 (figure 3). For a specific case consider the request for technical support (described above), where: • The communication must take place through public networks such as the internet. • The information provider is a large company or similar; and • The information consumer forms a widely distributed group of users.
In this adjustment of values the consumer has a special interest about any process that works as if he had an intimate knowledge of the consumer's computer and its content. These interests are legitimate because the Internet is widely known as an insecure means of communication. Therefore, systems that interact with the internet and that seem to function as if they had an intimate knowledge of the user, may seem to allow interference with privacy. The invention addresses this problem by proposing a method of interaction between the computer the consumer and the internet that protects the privacy of the consumer. This mechanism does not need to be used in another determined value, for example in certain private computer networks, commonly called intranets, the invention has a variety of applications, in these values security and privacy are considered to be guaranteed through physical control of the computer and the communications infrastructure in question, and possibly through contracts that create obligations for the participants in the process. The invention employs a special protocol for the subscription and meeting in the security and privacy critical value setting. For the purposes of the discussion Currently, this setting of values is called the anonymous comprehensive update protocol (AEUP). The intention of this interaction protocol is to create a one-way membrane where information can enter the consumer's computer in the form of information, but information about the consumer does not leave the consumer's computer unless it is the consumer who initiates the transfer. The AEUP protocol is described as the default protocol of the invention. The reason why this protocol offers consumers privacy is described below. This document also describes many applications where security and privacy are not critical for consumer acceptance. Thus it is possible to provide a certain degree of security and protection of privacy without using this protocol. See below a discussion of alternative protocols such as, the anonymous selective update protocol (ASUP). A comprehensive discussion of the interests of privacy and security is given below. The invention is directed to: • Interest of consumer privacy. The invention fully respects the interests of consumer privacy, in an implementation that offers AEUP the Consumers can benefit from narrowly targeted information without ever having to reveal their identity or any of their attributes that were verified at the end of relevance, nor the act of relevance itself. • Consumer initiative. In a typical mode of operation, information is not received by the information reader unless the consumer has initiated the subscription. This protects the consumer from unwanted communications. • Privacy of automatic operations. According to AEUP, the operation of gathering site information, the operation of evaluating the relevance and operation of presenting information relevant to the consumer, does not need to result in the disclosure of the consumer's data to the information provider. • Frustration of intrusions. Certain embodiments of the invention contain mechanisms described below, to prevent damage to privacy even in the cases of certain illegal activities. • Consumer safety interests. The invention fully respects the consumer's security interests. In an implementation that offers AEUP, consumers can benefit from narrowly targeted information, without exposing themselves to threats to the security from evil sources. • Subscriptions initiated by the consumer. In a typical mode of operation, information is not received by the information reader unless the consumer has initiated the subscription. The process of subscribing to an information site indicates limited confidence on the part of the consumer towards the provider. Thus, in a typical operation, the information is only received from reliable sites. • Safety of automatic operations. Typically the process of accumulating and evaluating information has no noticeable effects on the computer system. Any recommended solution is applied only after the user's prior notification and subsequent approval. Consumers who use the invention only to examine the relevant messages but do not follow the recommended actions, do not face any significant risk. • Description of the potential risks. By using known user interface methods, such as HTML with links to hypertexts, the invention allows information providers to inform consumers completely about the potential risks associated with following a certain recommended course of action.
• Discovery of consumer complaints. By means of devices described below, (such as the Better Advice Bureau, consumers can use the information mechanism described here to inform themselves about the existence of known and predictable risks in privacy and security, associated with informants and / or specific information providers before accepting the proposed solutions • Correction of known defects The invention allows information providers to retract their own erroneous information Allows others to criticize erroneous information from an information provider • Automatic solution Information providers are typically the authors of information in such a way that the information reader offers to apply an operator of the recommended solution automatically to the user's system after the user has given their approval. mechanism to associate efi effectively the consumer with relevant highly specific information in a communications structure that responds to the interests of the consumer. Strata of the Invention This document describes the sending of computational relevance messages from many places Of course, this is from one end of a general communications process to another end of a group of specific protocols that have been implemented by Universe Communications Inc. of Berkreley California. It is worthwhile to classify the different strata of the invention as described here: Send messages guided by relevance. The general communications process used by the invention has five elements (see figure 8): • A relevance clause 80. A determination about the state of a consumer's computer, its content or environment that can be automatically evaluated when comparing the determination with the real state of the consumer's computer. Typically the relevance clause is preceded by an object line 82 that gives a general description of the subject of the information. • An associated message 81 .. A message or messages associated with the clause whose suitability for the consumer is at least partially determined when evaluating the clause.
• An accumulator 60 (see figure 6). An application that observes that relevance clauses flow to the consumer's computer from several places, perhaps through regular synchronization. • An assistant 63 (see figure 6). An application that has the ability to evaluate the clauses of relevance, this is the determinations about the own environment of the consumer's computer, when comparing them with the real state of the environment and when inspecting the properties of the consumer's computer and its environment and verifying if it points towards or from the relevance. • A notifier 65, 66 (see figure 6). An application that has the ability to show messages to a user under at least partial guidance of a evaluated relevance clause. A key difference from the invention of the other providers of targeted information is that the invention provides a detailed tool for joining highly defined objectives that other protocols for directing information can not compare because they do not routinely have access to the state of the environment of the consumer. The details of sending messages protected by relevance are less important than this five-part model. For example, in one implementation, the five-part model is run on a computer network, on a secure network, such as a corporate intranet. In another implementation the five-part model is run on a public computer network, such as the internet. Certain interests that affect public certain values (for example, security and privacy) can be completely irrelevant in private value adjustments, where those interests can be addressed through physical control of the network. In another value setting, the five-part basic model of message delivery protected in relevance makes a valuable contribution in connecting suppliers with consumers. It is important to note that this five-part model can have modalities in which those five parts are not immediately evident. Potential implementations that make it clear that there may be many superficially different ways of achieving this basic structure are described below. For example, the relevance clause and the associated message may be packaged together in the same file and communicate simultaneously. In a different modality, the message protected by relevance can be communicated in two stages, where the first stage sends a clause of relevance and the second part is sent only if the first part leads to a relevant result and if the consumer's computer requests to the supplier the second part. Conceptually, the same useful effect can be obtained using either of these two message sending protocols. Both methods are encompassed by the same invention.
Relevant protections with security and privacy. Due to the tremendous importance of public networks, such as the internet, an implementation of the five-part model that also addresses the fundamental interests of privacy and security, is of great importance. The mechanism by which the five-part basic model is extended (for example by means of AEUP, ASUP or substantially equivalent protocols) to become a secure and private system in public networks is an important feature of the present invention. . It is potentially auxiliary for the acceptance of the broad consumer, of the sending of messages of computational relevance. Preferred mode of the invention. The currently preferred embodiment of the invention consists of a long collection of different inter-acting components carefully designated to meet the objectives that are the basis of the system. The multiple subsystems illustrate the potential of the invention in the application of technical support. Those skilled in the art will appreciate that there are many other applications to which the invention can be applied. Deployments of variants. The specific implementation has been obtained after a long series of different areas was carefully examined and studied. of application. This document describes in considerable detail a large number of implementations of variants that modify the basic operation of the central implementation for other market areas or other demands. For example, in certain value adjustments, the use of low communications bandwidth is important, and privacy is not. A variation for that value adjustment is described below. Components of the Invention The following discussion describes the key components of what is currently considered the best way to implement the invention described. In this implementation, it is assumed that communications are made through standard internet techniques and that the information provider and the information consumer are both based on computers connected to standard networks. Components of the Information Provider The following is a list of the names of the components followed in several sub-sections by means of a brief description of each component: • Site or information site. • Information • Site signature • Site description file • Inspection library files • Supplementary files Although these general components can be implemented in many ways, it is easiest to describe their form and operation in the best way currently understood based on the use of internet communication protocols. Those skilled in the art will appreciate that this is not the only possible implementation. Information Site This is a standard place on the internet (see figure 5) for example, a dirigible URL directory on a server computer combined with server software that responds to certain TCP / IP requests for information. The directory of the site can contain a plurality of files, including information, information selections and inspection libraries. The software associated with the server can perform the functions of an HTTP server, an FTP server, or a file server thus providing access to the files stored in the directory using well-known communication protocols. The software associated with the server, can also perform. the functions of a specialized server implementing communication protocols • specific to communication. Those protocols may include: • The ability to provide a directory message which describes the contents of the site directory including file names, sizes and dates. • The ability to provide an abstract message that abbreviates the contents of the files in the directories; • The ability to make security agreements; • The ability to make challenges to the readers of information so that they validate their authenticity; and • The ability to measure traffic through the site and calculate summaries of traffic levels. The function of the server software of the information site is to process certain requests made by an information reader that runs on a consumer's computer. The information reader can request information about the directory of the site, can request summaries of the information and can request the content of individual information. The transaction between the information server and the information reader is described below. Informants The informants in an information site are digital files. Informants typically have some of the following components: • A precondition of relevance written in a language of formal relevance, which is used to describe attributes of a computer and / or its contents and / or its environment. For more information about the relevance language, see below. • A component intelligible by humans that can summarize the purpose of the message, can describe the author, can explain the precondition in human language, and can explain the solution in human language.
• A component intelligible by the computer that potentially offers either software tools to solve the problem or Internet access to software tools that solve the problem. In the best currently understood method for this implementation, an information is a specially formatted ASCII file constructed using the standard MIME Internet track specification documented in RFC 151 et sec. (see N. Borenstein, N. Freed, MIME (Multiple Purpose Internet Mail Extensions) Part One, Mechanisms for Specifying and Describing the Form of Internet Message Bodies, Internet Standars Track RFC 1521 (1993)). This format is currently used to transport Internet mail; It contains headers that document the sender of the message and its subject, and mechanisms to include digital signatures. A MIME file is easily transported through the Internet and easily divided in its constituent components using well-known analysis algorithms in the Internet community. The format of the informational files is described below (see also A Guide to Writings, ñdvisories for AdviceNet, Universe Communications, Inc., Berkreley, CA (1998)). Authorship of the information Signature of the Site Associated with an information site may be a certain digital signature mechanism, for example a standard signature mechanism that uses public key / private key pairs. The signature mechanism can be used to sign information in a way that allows the readers of the information to verify that the factual information is the work of the information provider. Site description files The site description file (SDF) is a specially structured ASCII text file created by the information provider. It describes the provider's information site and serves as the basis for a consumer to initiate a subscription. This file specifies the location of the site (URL), the name of the site, and the security features of the site, such as whether the site contains only information that has been digitally signed. It also provides several parameters of the subscription process that is intended to be used by the information reader (eg the recommended frequency of synchronization, and the type of subscription relationship (free / cost)). It may contain humanly interpretable text that indicates the purpose of the site. The SDF may also contain the Public Key associated with the information made by the site. The public key is needed to verify the warning signs of the site. The SDF can also be signed by a trusted authority to establish the authenticity of this site description file. For example, it can be signed by advidores.com or by the Bureau of the Best Information: see below. The SDF may also contain an estimation block, provided by a reliable estimation service, to establish trust with respect to the privacy and security and usefulness of the information on this site. See for example forward. Inspecting libraries Inspecting libraries are libraries of an executable code with a special purpose, which can be accessed by means of information readers for the purpose of extending the language capabilities of relevance. In effect, the inspection libraries provide a mechanism for the specific extensions of the information site to the relevance language. Supplementary files The content of the information site described so far has important roles in the ordinary conduct of the invention. In a typical implementation, additional files may be present in the directory of the information site. In such an implementation the data and application files that do not have a role in driving the invention can be included in the directory of the information site. Those files are distributed as are other files on the information site. This implementation allows the distribution of installers, uninstallers, protected registrations, JAVA, and basic visual programs, this is in general, data packages, applications and other resources that may have a supporting role in the evaluation and monitoring of the information issued on the site. For example, these additional files may have a role as databases searched by the information provider's own libraries or as applications used for the implementation of the solutions recommended by the information providers. Consumer Information Components The following is a list of component names from the perspective of the information consumer, followed in several subsections by a brief description of each component: • Information reader • Subscription database • Information database • Profile of user • Inspectors • Solution utilities (Wizards) • Information reader The information reader is an application that runs on the consumer's computer. It is responsible for the link with the information site and for managing the interactions with the user. The information reader maintains a directory of files on the consumer's computer. Within that directory are contained several files described below that are used / administered in the course of the operation of the information reader. The information reader has a certain number of tasks, which are listed below without elaboration: • Manage subscriptions • Synchronize with the information site • Collect information files • Unzip information messages • Manage information databases • Manage relevance evaluation • Evaluate the relevance of individual information • Summon, to inspectors • Present relevant information to the user This process is described in detail below. Subscription database The information reader maintains a database of subscription information that allows the planning and realization of site synchronization through the accumulator component. The subscription database contains information about the address of the information site; information the recommendations provided by the information site description file, such as the recommended synchronization frequency; the information needed to verify the digital signatures associated with the information site; and information associated with the user's experience with the information site. Information database The information reader maintains a database of information that has been received from several information sites. These can be indexed according to the site from which they were received according to the systems to which the information refers, or according to other principles that would be useful for the consumer or the author. The information reader can organize the information in sources of information that share a common base of treatment. Examples of this principle include a source of information especially addressed to the interests of a user of a multi-user consumer computer, a source of information planned only for the evaluation of manual relevance and a source of information planned for the nocturnal evaluation in a certain moment User profile The information reader maintains a file or several special files that contain data that has been obtained from interviews with the user, deducted from their actions or deducted from the properties of the computer or its environment. This data may describe the computer or its environment, and may also describe preferences, requirements, capabilities, and possessions and user plans, including things unrelated to computer operations. The file (s) can be encrypted. The o the files can be organized by the information site in such a way that it describes interests, preferences, etc. that must be accessed by relevance searches associated with a specific site only. Inspectors Inspector libraries contain executable code that can be invoked by the information reader as part of the relevance evaluation process. Inspectors can examine the properties of the consumer's computer, storage devices, peripherals, environment, and remote affiliated computers. These are described later. Solution Utilities Solution utilities support the automatic solution process. They are applications that can perform stereotyped functions that are frequently used to solve computer problems. These are described later. General view of the transaction The following description describes the basic model for a transaction based on the Internet using the invention. Subscription model In the invention, the initiative to start an interaction typically comes from the consumer. The consumer is aware of the existence of an information provider and the associated information site (s), for example as part of the installation of a new hardware or software product on your computer, or as a result of advertising, or of sharing experiences with other consumers. The consumer after potentially learning about the type of information that is being offered on that site and its reliability, makes the decision to subscribe. The consumer who interacts with a piece of the information reader called the subscription manager 67 (see figure 6), configures the information reader to subscribe to the given information site, by supplying it with either the description file of site 68, or with a pointer to that file, or with a pointer to the site itself that contains a part of that file. The consumer, after studying the interaction terms recommended in the SDF, configures the parameters associated with the subscription, which controls how frequently the site information will be received. Information gathering using AEUP Periodically, under the terms of the subscription, or manually under the control of the user, the information reader initiates a synchronization of the site. A component of the information reader called the collector, It has the duty to synchronize the image of the consumer's site with the current image of the information site. These states may be different if the information site has retracted the information or produced new information since the most recent synchronization. The collector ensures that there is a one-to-one correspondence between the information on the information site or the informants on the consumer's machine. The collector opens a connection to the directory message server at the information point. After an optional security greeting to verify the authenticity of the reader and information server, the collector asks the server for a directory message. The collector inspects the response and verifies if the site's directory has changed since the previous synchronization, if there is no need to obtain files from the information site, and the session may end. If the directory has changed, or if it is the first synchronization. The collector initiates an FTP and / or HTTP access and / or file server to the new files. The collector also deletes any information on the consumer's computer that no longer corresponds to the information on the server, and this terminates the synchronization of the image of the consumer's site with the image of the real site. The protocol just described is the AEUP protocol that is described before. The collector is authorized, by the information server, to gather all the files of the information site anonymously, at any speed, that have not been previously collected. The intention is that the information stored in the consumer's machine consists at any given moment of all the information offered on the information site at the time of the last synchronization, different from those that the user has specifically deleted. So there is no selective meeting. Rather the meeting is exhaustive, this is every piece of information is gathered. The implications of this protocol and the alternative protocols are described below. Decompression of information As described below, an information is a complex hierarchical structure, which may contain one or more than one message. The information reader decompresses all the components of this structure. The components of the structure can be signed using a digital signature method, that is, at the time of decompression those signatures are verified. After unzipping, the information is entered into a source of all the new and old information to be evaluated. In a typical implementation, the invention can suppress entry into the system of unsigned information or information whose signatures can not be verified. Relevance evaluation As a separate topic from the meeting, the source of all information to be evaluated can be processed either continuously, or according to a plan defined by the consumer, or an immediate user request, or a specified trigger event (see figure 9). The information reader analyzes the individual message and identifies the clauses that determine relevance. These clauses are expressions in the language of formal relevance that is described below. The information reader analyzes the clauses that determine relevance. Those clauses are expressions in the language of relevance form that is described below. The information reader analyzes the clauses using an expression tree generator 91 in a tree of elementary subexpressions (see Figure 10) and then evaluates each subexpression of the tree using an expression tree evaluator. If the evaluation process proceeds successfully and results in a value of True, the message is considered relevant 93. A shipping method 94 is then used to consume the information that can be included by a file system inspector that identifies the directory and appropriate file name references 96 in various user volumes 97,98; a record inspector 99 that inspects an operating system register 120; an operating system inspector 121 that inspects various elements of the system 122; or a hardware device inspector 123 that inspects various system devices. 124. Inspectors The evaluation of subsections is done by methods called inspectors (see figure 11) that can perform logical-mathematical calculations, execute computational algorithms, return the results of system calls, access to the contents of storage devices, and search devices or remote computers. These methods are called inspectors because a frequent purpose is to inspect the properties of the consumer's computer, its configuration, or contents of its storage devices. The inspectors can be included in the reader and can also be connected by means of DLL or a similar mechanism. Thus, an object 130, property name 131, and / or a row selector 132 is sent to a reader using a method submission module 134 in accordance with the shipping information contained within a method shipping table 133. Several inspectors 135,136 are provided at a user site, each of which includes an inspection library 137, 139, and associated methods 138, 140. The inspectors are described in more detail ahead. User interface After the relevance for an article has been decided on the source of information, a relevant article can be entered into a list of articles to be displayed. This list can be displayed to the consumer in accordance with typical user interface models. The user interface can inform the user about the author of the information, about the date on which the information was acquired, about the date on which the information became relevant, about the subject of the information, and about Other attributes of the information message. The user interface can offer the user to display the explanatory content of the individual information. Depending on the information, the explanatory content may contain simple text explanations, or may contain more elaborate multimedia explanations. Depending on the information, the explanation can identify the situation that caused the information to be relevant, the relevance implications, the action or the recommended actions to be taken at this point, the anticipated effects of taking those actions or not doing so, or the experiences of other users or another organization with the proposed actions. The user studies this content explanatory, perhaps by conducting additional research (for example by studying the reliability of the provider, or the opinions of other users). Recommended response As part of the presentation of relevant information, the user typically receives offers of the possibility of an action in response to the situation. Possible outputs include: • The consumer ignores the information / proposal: The consumer reviews the information and decides that he does not want to follow it, ignores the content and deletes the information.
• The consumer is notified. The consumer reviews the information or some other document to which it refers and learns important or interesting lake. • The consumer is entertained. The consumer reviews the information, or some other document that refers, or some multimedia content that it contains, or some multimedia content to which it refers, and is exposed to a stimulating presentation. • One consumer sends information to another. This can include friends, family, colleagues or associates. Forwarding may include off-line transportation or electronic transport, such as email (email). • The consumer initiates correspondence with suppliers or others. This can include contact by mail, telephone, fax or email. This may include participation in an exchange of information, including technical support, training or market research purposes, as well as participation in a sale or other business interaction.
• The consumer initiates participation online in a timely event. • The consumer buys objects through electronic commerce. This can include a purchase made by clicking on a button in the information reader window that enters the e-commerce mode. • The consumer fills out a form. This may include a form given by a web browser, or a form of text file that is intended to be returned by email or a form that is intended to be filled out and sent back by fax or traditional mail. • The consumer initiates an action offline in the real world. This can include any offline action from the actions associated with the computer by modifying the state of the hardware devices, accumulating information in the environment surrounding the computer, or reading some instruction in a manual before starting an online process. This action can Also include only personal items. • The consumer modifies the adjusted values in the systems or the data stored in the computer. This may include that the consumer executes a series of manual operations on the computer to change the values of some component of the system or software application or to modify an entry in a database. • The consumer initiates an Install / Uninstall / Execute solution. This may include the consumer pressing a button on the information reader, followed by the automatic execution of a sequence of download / installation / uninstallation / execution stages, or may require the consumer to have access to physical media such as floppy disks or CD-ROM to perform an installation under direct supervision. It can include automatic execution or under the control of the user, following instructions indicated to the user by the informant. • The consumer invokes a writing file (Script) for the solution. The informant can offer a series of instructions in a high-level language that affects the system, such as AppleScript, DOS Shell, UNIX Shell, Visual Basic, which the consumer is expected to file store in file form and then move to a standard interpreter (for example, AppleScript Editor, DOS Command Interpreter, UNIX Shell Interpreter Shell, or Visual Basic Interpreter). This action can alternatively include the one that the consumer executes a series of manual operations on the computer that include typing the commands one by one in a certain window of a certain application. Many concrete results can be grouped between the outputs in this list. Informant file format The format of the informant file provides a mechanism for coding a single information or various information to be transported through computer networks and other digital means of transport and to offer one or several variants of the same basic explanatory topic. The following description describes the components of an access in general terms and describes the best currently understood method for implementing information using MIME. Components of a basic informant The most basic informant can have these logical components (see figure 8): • Wrapper. Components designed to compress information for transport and subsequent decoding • Line of. Component that identifies the author of an information. • Theme line. Component that briefly identifies the subject of the information. • Relevance clause. Component in the formal relevance language that specifies precisely the conditions under which the information could be relevant. • Message body. Component that provides explanatory material that potentially explains to the user what condition has been found relevant, for which the user is interested and what action is recommended. • Action button. Component that provides the user the ability to invoke an automatic execution of the recommended action. Variation of the clauses Elaboration in the basic scheme can also be valuable. • The information may contain a clause of when to expire. This is an expression in the formal relevance language that causes the message to expire if it evaluates to being True. • The information may contain a clause of when to evaluate. This is an expression in the language of relevance that causes the message to be evaluated by relevance if it is evaluated as true. • The information may contain a clause requiring an inspection library. This can give the name of an inspector library and a URL where it can be found. This indicates that a certain library must be installed by relevance for it to be evaluated correctly. • The information may contain a clause referring to, giving key labels of systems referenced by the condition associated with the information: -. • This information may contain a clause the affected solution, giving key labels of the possible effects of the recommended response. Other variations may be recognized as useful in the future. These variations are not excluded from the scope of the invention. Presentation of variations The body of the message can occur in at least three ways: Text. The explanatory material can be an ASCII text document without restrictions. This does not have variations included in the presentation style (for example without changes in the type of letter and / or hypertext references to external documents).
HTML The explanatory material that forms the body of the message can be an HTML document. This is familiar from the browsers of the network. HTML documents may contain variations in the presentation of the text, may contain tables and visual formatting features, may contain references to external documents and may contain references to external graphic files. Text / HTML The explanatory material that forms the body of the message can be given in both text and HTML forms. The information reader has the option to use any form that is most appropriate for the user. t, _ Other variations in the content of the message, including audio and video content, are not excluded from the scope of the invention. Integrity and Digital Authenticity The body of the message may have digital authentication features attached to the message to ensure its integrity and authenticity. A digital compilation can be attached to the message to ensure the integrity of the message. At the moment in which the message is compiled by the author, a specialized function of the body of the message can be computed and attached to the message. The recipient of the message can verify the integrity of the message by computing the same function and verify that it produces the same result that is attached to the message Known examples of digital selections include CRC, MD5, and SHA. Digital compilations are familiar in the computer programming community under the name of hashing (shredded) The idea is that certain mathematical operations based on modular arithmetic are applied to a numerical representation of a body of text, producing a numerical output that is found in the range of magnitude from a small number to a number that required a few dozens of digits to be represented, depending on the details of the compilation mechanism. These arithmetic operations typically produce an output that depends on the original text body in a discontinuous way that is not easily invertible. This is slightly different messages tend to have different compilations. It can also be difficult to find any two messages with the same compilation, and if one of the two messages is previously specified, it is particularly difficult to find another message that has the same compilation. The practical implication is that the transmission or error log that causes the reporting document to be modified in some way by the original intent of the authors, typically does not result in a modified document that generates the digital compilation appropriate In this way, modified documents can be identified and eliminated from consideration. A digital signature can be attached to the message to ensure the authenticity of the message (see C. Pfleeger, Security in Computing, second edition, Prentice-Hall (1996), and PGP 4.0 Users Manual, PGP Pretty Good Privacy, Inc. (1997) ). This is a refinement of the idea of digital compilation, returning to secure compaction against malevolent intromissions. Digital signatures generally work in the following way: At the moment in which the message is compiled by the author, a digital compilation of the message is calculated. The compilation is then taped using a capping scheme that is well known and widely associated with the information site. The taped compilation is considered the signature of the information site in the message, and is attached to the message itself, labeled as a signature. The information reader looking to verify the signature of the site tends to decipher the signature using the well-known decryption algorithm associated with the information site. Successful decryption produces a digital compilation that matches the value that the reader of information calculated directly from the message. An unsuccessful decryption produces a result that does not match with the digital compilation of the received message. It is commonly accepted (see C. Pfleeger, Security in Computing, second edition, Prentice-Hall (1996), and PGP 4.0 Users Manual, PGP Pretty Good Privacy, Inc. (1997)) that this method when used in conjunction with certain systems of well-known encryption, produces a secure digital document. This is accepted that a malicious agent can not easily modify a given valid information to produce an impostor information that produces a successful decryption. In fact, in order to discern this system successfully, it is necessary for the impostor to generate the digital compilation of the modified document correctly and then apply the encryption algorithm associated with the information site. While the imposter may assume that he has learned the work of the digital compilation mechanism, it is assumed that he has not been able to encrypt the documents as if he were the information site. The fundamental assumption of modern cryptography systems applied to public communications is that certain encryption / decryption algorithms can have widely known decryption algorithms and keep the encryption algorithms a secret. Until this fundamental assumption is disproved, the Digital signature mechanism will be widely considered as an effective certification mechanism. MIME In the best currently recognized method for structuring information for transport on the Internet, a reporter document is packaged as a single ASCII text file that is a valid instance of a MIME file (See N. Borenstein, N. Freed, MIME (Multi-Purpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies, Internet Standars Track; RFC 1521 (1993)). Currently only a special subset of the entire MIME format is used. Special extensions to MIME are added to suit the invention. MIME is a format for tracking status Internet that extends the classic email Internet standard commonly referred to as RFC 822. The MIME format is widely used for e-mail Internet transport. It has four characteristics of particular utility in connection with information: Header Lines: MIME specifies that a message body can be preceded by an extensive message header consisting of a variety of header lines, where the individual lines begin with a well-known phrase and contain address, date, and related comments. Some of those lines can easily be adapted to serve the purposes of the invention. For example, the line components of, and of a subject's line of information can be implemented by the De and Tema header lines that are already part of the MIME standard. Extension capacity. MIME provides a method for creating new message lines in messages, fl 10 This includes a method to include new message lines in messages and a method to register the new line with MIME authorities. Key constructions of the invention relevant if and expire in can therefore be easily added to the MIME language in that form. Alternation. MIME provides a method, this is an alternate of multiple parts, to offer two different versions of the same message, selecting the destination the appropriate presentation method. Therefore, the construction of the invention of transmitting one or more ways of presenting the same information can easily be implemented using the MIME standard and its multi-part alternating characteristic. Compilation mechanism. MIME provides a well understood mechanism, this is multipart / mixed, for Pack several complete MIME messages in a single file for transport over the Internet. MIME presents a recursive compilation structure in which a message can have several related components, and each component can be by itself, inserted in a MIME file. Using this feature, a MIME file can be used to compile information from many components, organized in a tree structure that looks like the ramifications structure of a modern personal computer file system. So MIME becomes a tool not only to compress electronic mail, but to compress a new type of document, this is information. To avoid confusion it must be appreciated that an information is not like an email because the notice or information does not have a special recipient or recipient list. Rather, it is a widespread message. Information typically has relevance and related clauses, and information typically has active content. Electronic mails have no relevance and related clauses and typically do not have active content. The information is part of a new form of communications that can be implemented within the MIME standard. The MIME reporting application addresses a different problem than an email by omitting certain MIME clauses that they were used for the electronic mail and when adding new specialized clauses that are used in the determination of relevance and information management processes. In a sense, the relationship of the informants to the emails is comparable to the relationship between USENET and email. Both the information and the USENET news systems use MIME as a packaging mechanism. However, both offer communications that are different from emails. Although MIME is a convenient method for determining the form of an information, there is no necessary connection of the invention to MIME. There are many other common formats in the Internet world, such as XML, that can be used to represent information. In this description only the best currently understood method to implement the information file is described. Example The following is an example of an information file: Date: Saturday Mar 21 199817: 06; 12 + 0800 From: Jeremiah Adviser < jeremiah@advisories.com > MIME-Version 1.0 Organization: Universe Communications Inc. Topic: An enhanced version of the information reader is available Relevant yes: application version "advice. exe" < version "5.0" Content type: text / html; charset = us-ascii < HTML > < BODY > A better version of the information reader is available. Press in > A HREF = "htpp: // www. Advisories.com/win98/advice50.exe" > Download < / A > the latest version of the information reader. < HTML > < BODY > Here the reader can observe the different components of an information combined as MIME components: • Wrapper. MIME version and content type header lines. • Line: From: Jeremiah Adviser ... • Subject line: Theme: A better version of. . • Message body . An HTML fragment, which starts with < HTML > and ends with < / HTML > . • Action button. Not present in this notice. The active component of the message (download) is managed by the HTML HREF link. The user sees the word Download and typically understands that giving a mouse squeeze on that word causes the action indicated. Valuation blocks In a further variation, it is possible that an information contains blocks of estimates that contain information on the valuation of the information according to the criteria such as privacy, security and usefulness. There are standard formats for those valuation blocks (see Khare, Rohit, Digi tal Signa tre Label Archi tecture, The World Wide Web Journal, vol. 2, number 3, pages. 49-64 Oreilly (summer 1997), http://www.w3.org/DSIG) and these are easily appended to messages with MIME structure. See also ahead. Relevance language The information has a format that resembles the format of the email messages, with many of the same components in the message / compilation headers. A key extension offered by the information of the institution of a new clause in the message, this is the relevance clause. The relevance clause is preceded by the relevant key phrase if:. A form of expression of the language of relevance follows, to the keyword. The following description describes the best currently understood method for describing the status of a consumer's computer. Descriptive language The purpose of the relevance clause is to examine the status of an individual computer and determine if it meets several conditions that combine to imply the relevance of certain information. In the method currently best understood to implement the invention, the language itself, this is the allowed phrases of the language and the base semantics of the sentences, provides an intellectual model of the components of the consumer's computer, its peripherals, storage devices, files , and related concepts. This is different from the usual model of computer languages in which the language itself provides a brief picture of the problem that is usually solved. In common with traditional languages, the relevance language contains some elementary data types, such as Booleans, integers, strings. Also in common with the traditional languages, it is allowed to write logical-arithmetic expressions such as: (2346 + (-1234) / (l + 2)) > 0 The meaning of a typical sub-expression, for example 1 + 2, is to apply the + method to the pair of objects that result from evaluating the two subexpressions 1 and 2. The pair of objects in question are objects of the integer type that have values of 1 and 2, respectively. In the best currently understood method, the relevance language has a full range of arithmetic, chain and logical operations available, which are expressed as included methods that serve to operate on specific types of data included (see figure 12). Contrary to traditional languages, the relevance language contains a type of abstract data, World-World, which can be considered as the general medium of the personal computer in which the relevance clause is evaluated. - This object has properties. These properties give objects of various types, plasters objects can have other properties (see figure 13). World-World is a type of data, which depending on the specific implementation and the specific configuration of the system, can have many properties. In the technical support application described above, those properties can include the system folder property, the CPU property, and the monitor property. The properties of an object are obtained by applying valuation methods to the object. The valuation method for the system folder of the World-World data type returns an object of the system type folder. The reporting method for the CPU property of World-World data type returns an object of the CPU type. These derived objects in turn have their own properties. For example, an object of the CPU type can have a collection of properties such as speed, manufacturer, model, MMX, and cache. A method corresponds to each of those properties that when applied to the object of the CPU type, return a result. For this discussion, it can be assumed that the speed results in an integer, the manufacturer results in a string naming the manufacturer, the model also in a string that names the model type and MMZ and cache return specialized object types -MMX and cache. The relevance language implicitly postulates that the group of inspectable properties of the consumer's computer is identical to the group of data properties of the World-World type and the group of properties derivable from World-World through the repeated applications of requesting properties. of an object derived from Mundo-World (see figure 14). ObjectWorld gives an idea of the richness of the world of objects derivable in this way in the technical support application. Examples of relevance clauses The following are examples of relevance clauses that are used in a technical support application: Existence of a certain application in the consumer's computer Relevant if: the "Photoshop" application exists The intent of this fragment is that this application is a property of Mundo-World that takes an extra chain parameter and returns an object of this type of application. Exist is an application of any object, which returns a True-true Boolean if the object exists. If the application called Photoshop can not be found by the implementation method of the application property, then the result is a non-existent object, for which a false False-Boolean exists. Comparison of version numbers Relevant if: version of control panel "MacTCP" is version "2.02" The intention of this fragment is that the Panel Control is a property of the World that takes an extra chain parameter and returns an object of the Control Panel type. If the control panel called MacTCP can not be found by the method that implements the control panel property, then the result is a non-existent object, for which version it is not a permitted property, and the evaluation fails. If the control panel called MacTCP is found, then the version being a permitted property of the control panels, leads to the invocation of a method that returns an object of type version that contains the version number of that control panel, registered in a particular format. This result is compared with the result of the subexpression version "2.02". This date version refers to a World-World property, which takes an extra string parameter and returns an object of the version type. If the evaluation is successful, the result of this comparison in Boolean: either True or False. Compare modification dates Relevant if: Photoshop modification date Plugin "Picture Enhancer" is larger than date "10 January 1997 12: 34: 56 + 0800" The intent of this fragment is that Photoshop Plugln is a World property that takes an extra string parameter and return an object of type Photoshop Plugln. If the Picture Enhancer mentioned in Photoshop Plugin can not be found by the method that implements the Photoshop Plugln property. Then the result is a nonexistent object, for which modification date is not a permitted property, and the evaluation fails. If the PictureEnhancer named in Photoshop Plugin is found then the modification date, being a permitted property of the Phtoship Plugln, leads to the invocation of a method that returns an object of the date type. This result is compared with the result of the subexpression dated "January 10, 1997". Here the date refers to a World property that takes an extra string parameter and returns an object of the time type. If the evaluation is successful, the result of this expression is Boolean: either True or False. Automatic Analysis and Evaluation A key purpose of the relevance language is to allow an information provider to publish information that can be accessed by the reader of information that runs on a consumer's computer, and can be read automatically to determine, without consumer intervention if the information is relevant to the consumer. In the currently best-understood method, the relevance language is implemented as a context-free grammar that can be analyzed automatically in a tree of subexpressions. The tree of subexpressions can be understood as an abstract structure whose nodes are methods and whose branches are sub-expressions. This tree is represented using a standard notation in computer science. (node (expr-1Hexpr-2) .... Cexpr-n)) where the node gives the name of the method to be applied, and (expr -k) means the subexpression number k that will be presented to the method. For example the expression: (2346 + (-12341 / (1 +2))> O can be analyzed in the following expression tree: (> (+ (integer 2346) (/ (integer -1234) (+ (integer 1) (integer 2))) (integer 0)) The expression: There is the application "Photoshop" It can be analyzed in: (exists (application "Photoshop")) The expression version of Control Panel "MacTCP" is the version "2.02" can be analyzed in : (yes (version (Control Panel "MacTCP")) (version (string "2.02"))) Finally the expression Date of modification of Photoshop Plugin "Picture Ehancer" is greater than the date "January 10, 1997" It is analyzed in (is greater than (modification date (Photoshop-Pligln "Picture Enhancer")) (fecfa (string "January 10, 1997"))) In summary, the goal 'of grammatical analysis is to identify a sequence of method invocations that will be applied. The procedures for context-free grammars analysis in expression trees are well understood (see A: Aho)., J. Ullman, Principies of Compiler Design, Addison-Wesley (1997)). A lexer divides the entry into a series of symbols. In the currently best known method these symbols can take the following forms: [string] A string of printable ASCII characters enclosed in quotation marks (") [integer] A string_of decimal digits [minus] the character -. [SumOp] characters + - [ProdOp] the characters * and the string mod. [RelOp] the character sequences = »= <; =! = and the related phrases and or is not. [Phrase] A sequence of one or more unmarked words, a word being an alphanumeric string that starts alphabetically and does not contain spaces included. The sentences are interrupted in reserved phrases. The analysis advances mechanically according to a precedence table giving the productions of a grammar. In the currently best understood method, the productions in the grammar are the following: < Objective > : = < Expr > > Expr > : = > Expr > or < AndClause > | < AndClause > < AndClause > : = < AndClause > and < Relation > | < Relation > < Relation > : = < SumClause > tRelOpl < SumClause > | < SumClause > < SumClause > : = < SumClause > [SumOp] < Products > I < SumClause > [inus) < Products > I < Product > < Produc > : = < Product > (PrdOp) < Unary > | < Unary > < Unary > : = [Minus] < Unary > | (UnyOp] <Unary> i <Cast> <Cast>: = <cast> like (Phrase) | <Reference> <Reference>: = EPhrase) of </ i> Reference > | [Phrase] [string] < Restrict > of < Reference > | [Phrasel (integer) < Restrict > of < Reference > | [Phrase] (string] of <Reference> | [Phrase] (integer) of <Reference> | (Phrase) <Restp'ct> of> Reference> | [PhraseKstring] | [Phrase] [integer] | [Phrase] < Restrict > | [Phrasel I exists < Reference > number of < Reference > I Cstring] I [integer] l it | (< Expr >) < Restrict > : = whose (< Expr >) In this presentation, word is a reserved word in the language, [Phrase] is a phrase defined in the discussion of the lexical analysis on the previous page. A grammar can be used to generate an analyzer by any of several methods (see A. Aho, J. Ullman, Principies of Compiler Design, Addison-Wesley (1977)). This can include automatic analysis generator, such as YACC, which creates a finite state automation that works with a table that recognizes the grammar. The table is created directly from the previous production forms, and also by the manual generation of recursive descendant analysis based on the mimic of the productions of the grammar in modules whose name and internal structure resemble the structure of the productions of the grammar. All these methods have the same basic result. New symbols are introduced, one by one and compared with the current state and also with a table that gives a permitted type and an ordered action upon receiving the symbol, if necessary. The ordered action can be interpreted as the specification of the individual stages in the systematic formation of an expression tree. A typical action that is associated with production: < Relation > : = < SumClause > . { RelOp] < SumClause > you can write, in a standard notation, like: $$ = ($ 2 $ 1 $ 2) This is interpreted as follows: $$ refers to the result of production, $ 1, $ 2, $ 3 refer to the subexpression trees of the component, and parentheses are notational devices that are used to delimit expression trees. This action calls for the association of the < Relationship > recognized with an expression tree. This results from the union of expression trees that are associated with the left sub-expression and the right sub-expression with a root method that compares the two expressions. Consider the expression version of the Control Panel "MacTCP" is version "2.02". Consider the status of the analyzer at the time you try to apply the production of < Relationship > with [RelOp]. The expression tree already associated with the right subexpression, $ 1, has representation (Control Panel "MacTCP") and the one associated with the right subexpression, $ 3, has representation (version (string "2.02")). The expression tree associated with the general expression < Relation > it is the fusion of those two according to the model (it's $ 1 $ 3). Thus the resulting expression tree is representable as (is (Control Panel "MacTCP") (version (string "2.02"))). Associated with each production is an appropriately shaped action that describes how the tree is formed. In certain implementations, the tree can only be built implicitly. The analysis can continue normally, if in each stage of the analysis the following available symbol coincides with a permitted type; or • may fail, if an unexpected combination occurs. As soon as the analysis fails, the piece of information can be declared non-relevant. In the currently best understood method for implementing the invention, each valid method is better known to the analyzer at the time of analysis. Contrary to some other languages, the analysis may fail if a clause is synthetically correct but uses phrases that name currently unknown methods. In the best method understood at present to implement the invention, each sub-expression takes values that are strongly typified and for which the type is known in advance. Example data types include embedded, successions and Boolean. Each method is known at the time of analysis to work with certain combinations of input data types and to give certain types of data defined as outputs. Attempts to apply methods to prohibited data types are diagnosed as failure of the analysis. If so, the piece of advice may be declared not relevant. In the successful completion of the analysis, an expression tree is formed consisting essentially of a collection of method invocations and associated arguments and associated data types of these arguments. The evaluation of the expression is the process of pre-performing the sending of the appropriate method in the appropriate order. The evaluation can succeed or fail, for example, due to the excessive use of system resources, non-availability of a resource, excessive delay in obtaining a resource or for another reason, the evaluation can successfully yield a Boolean value of Truth or False or some other value. The interpretation of a piece of advice as relevant, is equivalent to saying that the evaluation is successful, the value was Boolean and true. Particularly if a certain sub-expression can not be interpreted as a valid expression in the language, if sub-expression attempts to apply methods to prohibited data types or if the sub-expression can not be currently valued, the entire expression may fail, and the advice or information is automatically declared non-relevant object. Extensible Language The purpose of the relevant language is to accurately describe the state of a computer, its contents, links and relationships. This state may change when the consumer buys new software and hardware, or when new software or hardware objects are invented this state may change as the consumer's computers are used to represent consumers in new problem areas, for example, in personal finance , management of communication device in the house, or other areas. Consequently, it is not possible to limit in advance the state components that may be of interest to which the invention provides access. It is desirable for the language of relevance, to give future authors the ability to extend the language of relevance to express concepts, about a state of a system that has not been conceived.
In another implementation of the invention, the language vocabulary of relevance may be extended by the authorities and authors in places of information or individual advice. In that implementation, the relevance language is extensible when developing dynamically loaded libraries, which add new vocabulary and semantics to the language and / or modify existing vocabulary and methods. This is mentioned here as an inspector's library and can be downloaded from a place of advice and installed on a given consumer computer, thus changing the meaning of relevance language on that computer, and allowing new bodies of advice to be interpreted at that computer. computer . These dynamically loaded libraries contain declarations of the new data types that must be added to the language of the new properties associated with the data types, of the resulting data type when a specific property is obtained for a specific type and specific methods, that is, the executable code that implements the access to the properties. Non-procedural language. difference of many languages used in connection with the operation and / or maintenance of computers, the relevant language does not need to be of the procedural type. That is, you do not need to specify how to manipulate the contents of several memory fragments. This is the opposite of being descriptive. It is not necessary to allow traditional processing services such as loops, assignments and conditionals. On the contrary, making these services available expansively, several threats of security and privacy may arise, by making it easy for written information without malicious written care, to consume excessive resources at the time of evaluation. In the method best understood at present to implement the invention, procedural services are not made available in the relevance language. Since the inspection of the previous grammar description shows that the language has: no named variable • no assignment statement, no function call or at least no explicit function call with variable arguments • no loop or conditional execution These differences in appearance enter into the language of relevance and other common languages are based on the following consideration: due to what is referred to the unexpected evaluation, the language must not have side effects on the computer or in the environment; • to inspire confidence in the consumer, consumers must be able to see for themselves that the language has no effect on the computer and environment; • A descriptive language, unlike a procedural one, has the appearance of having no side effects. In summary, the structure of the language and visible limitations must communicate a message of safety to the consumer. The following discussion addresses two key differences of language versus procedural languages: Function calls. The relevant language has method expeditions that correspond to function calls in some other languages but they are no longer in a tightly constricted way. First, there are the unit methods and the binary methods that are presented in arithmetic and logical operations: +, -, *, /, and, or, =, and similar operations. These can be thought of as unitary or binary function calls, but they are in a very restricted way implementing well-understood methods that typically establish little danger or upset of resources. Second, there are unnamed properties such as modification time. Third, there are named properties such as, Photoshop Unnamed properties can be thought of as functionless calls applied to an object, but very mixed because no parameters are included. Typically, a property is computed by extracting a certain value from a certain channel of a data structure. Typically, they establish little danger or obstruction of the resource. The named properties can be thought of as two-function function calls. The first variable is the object and the second object is the specifier of the name of the strip or sequence. However, these also do not they are general operations, because the strip name specifier in an implementation, may not itself be a computed result. On the contrary, it must be a strip or successive constant. The types of calculations that can be specified in this way are tightly constrained. Again, typically a named property is computed by extracting a certain value from a certain channel of data structure, as well. that this establishes little danger and obstruction of the resource. Loops and Conditional Execution The relevant language has no affirmations during or if, but has a limited capacity to perform the iteration. It does this using a construction referred to as properties. In the relevant language there may be both singular and plural properties, for example, both input and input properties, the former referring to a result that must be individual and the latter referring to a result that may be a plurality. Typically, pluralities are further qualified by the use of the whose () - whose clause to restrict sub-collections. By the plural-singular dichotomy, certain fine distinctions of meaning can be maintained. By example: there is the application "Photoshop" has the meaning that there exists exactly such an application; and exists: there is the application "Photoshop" whose (version of it is the "4.0" version) has the meaning that there is one or more than one application called pohotoshop, and among these there is one with version 4.0. In the second example, the iteration is implicitly performed on the collection of all the applications called photoshop in the system in question, so that the effect of a loop is obtained without using traditional procedural programming. Restrictions on the expressiveness of language help to be the safest language from the point of view of the guarantees of privacy and security (see below). However, language is designed to be powerful, since it is intended to be highly expressive. A few words in this language, provide access to answers about the state of system that would be impossible to obtain in traditional procedural languages, of a young age of hundreds of written lines of code and invoking Many specialized functions in the system libraries. If an apparent need arises for the class of services traditionally handled by procedural languages, this can typically be satisfied by extending the relevant language using the library inspector mechanism mentioned at the beginning and described in more detail below. This has two advantages: (Efficiency) Including new inspectors by this extension mechanism, rather than offering procedural services in the relevant language, which leads to a more efficient execution. Inspectors typically make efficient compiled compliant methods available, minimizing the burden on system resources at the time of relevance evaluation, whereas the relevance language is interpreted, which is typically slower. (Security) Including new inspectors by this extension mechanism, which allows problematic situations to be corrected. If a certain complex expression is used in many places and has bad side effects, this can be very difficult to correct. If an equivalent piece of code is included as a library of inspector, then one can identify the problematic code using the relevant language to identify if that inspector is installed on the user's computer. This makes it possible to write contrary information against information that depends on the inspector's libraries. Consumer Accessibility Relevant or relevant language controls the execution of a system over a potentially large number of computers. It is highly desirable, although not strictly necessary for a relevance clause to be something that, in principle, a consumer could read and obtain an approximate understanding although few users would choose to do this in most cases. In the method best understood at present to implement the invention, the syntax of the relevant language resembles the syntax of common English, with key roles in the language represented by clauses, formed from articles such as of, as, whose, (of, as, meanwhile, whose), and verbs such as exists (exists). The highly constrained nature of language. Encourages understanding by the consumer. The language avoids constructions that suppose a base of computer programming by suppressing concepts such as groups, loops and conditional evaluation. Inspector Libraries Components of the Inspector Libraries. The analysis of a clause in the relevant language results conceptually in the generation of a list of method submissions (see Fig. 11), in which certain methods are called in a certain order with certain argument lists. This evaluation is a process of systematically sequencing method shipments in the proper order; method shipments are an important aspect of the relevant process. An inspector library is a collection of methods (see Fig. 15), and associated interfaces that allow the installation of methods within the information reader or advisor. Due to the structure of the analysis and the evaluation process, an inspector library may contain some of the following components: • statement of a (phrase) to be used in the relevant language; association of that (phrase) to a specific method; declaration of a new type of data to be used in the evaluation process; • declaration of the call prototype of the method. This includes the number and types of data required of the arguments to be supplied to the method; • declaration of the type of data resulting from the method; • implementation of that method in executable form; • declaration of a code associated with special hooks to be called in certain cases, such as beginning of the information reader, completion of the information reader, beginning of a main evaluation loop of the information reader, and ending of a loop of information. Main evaluation of the information reader; • declaration of special hooks associated with the creation and maintenance of special captures associated with the method; • implementation of special case methods and capture methods in executable form. Conceptually, an inspector's library can be articulated within the information reader with all the evaluated statements resulting in changes to the internal data reader information structures. So new method invocations become available.
These statements affect two fundamental data structures of the system. The first is a syntax table that gives all the allowed phrases and the associated data types on which they can operate and the associated data types that result. This is used in a lexical analysis time. The second is a method of dispatch or dispatch table that gives a systematic way to determine the associated executable method for a given sentence and given data types. This is used in the evaluation time. Structure Oriented to the Object. A convenient way to implement the previous inspector library structure is to rely on the features of a modern object-oriented programming language, such as C ++. In effect, the future characteristics of such a language, that is, object declarations, polymorphism and overload of operator are ways of declaring that certain phrases have a certain meaning when applied to certain types of data and systematically organize that information. Other features, such as constructors, copy constructors, and destructors are ways of defining certain bodies of time and initiation time code. termination. In the best understood method at present, such features of modern object-oriented languages are used to provide the various characteristics of the inspector libraries. Extension. In an implementation as described above, it is possible to install several inspector libraries in a case of information reader, the inspector libraries that are thus installed define the set of (phrases) recognized in the relevant language, the set of the types of data allowed in the evaluation time, and the set of methods associated with these types of data. In summary, the relevant language can be dynamically constituted, in one implementation the libraries can be created by information or advice providers and downloaded to the consumer's computer as part of the synchronization in place. Such libraries may be warned, for example by storing in a well-known place, such as a sub-directory of the general directory handled by the information reader. The inspector libraries in this directory can be linked to the information reader at the moment the reader of information starts. When this articulation happens, declaration routines are invoked, installing new (phrases) in the lexical analysis table of the relevant language, and associating these (phrases) with certain method invocations.
The language expands in this way to include new descriptive possibilities, definition of language in layers. The relevant language can therefore be finished open, built in layers on layers of extensions. Therefore, to understand a fully installed system, one must understand the layers that have been installed and understand the method provided by each layer. In a typical installation, these layers are as follows: • Base layer. It contains the basic mechanisms of clause evaluation: a number of basic phrases constructed and associated methods. The base layer is expected to be the same in each consumer computer that carries the information reader. Specific layer of the system. This consists of a layer associated with a certain operating system, which gives information about the characteristics of a certain family of computers and their devices, attachments and environment. For example, such a layer in an implementation, provides methods to obtain the data and system times, the sizes of several files, the contents of the PRAM, or the names of the attached peripheral devices. Specific layers of the seller. This collection of potentially a large number of extension layers, is typically produced by third parties, giving special access to the internal of certain hardware devices and software products., one can think of potential authors in a range of products "from hardware producers (for example from cable modems) to software producers (for example from Photoshop and plug-Ins) to service providers (for example America On-Line). Version Inspector The following is an example of an inspector for the version property of the data type application under the Macintosh OS This inspector declares the following: • A new (phrase) to be added to the relevant language : version; • a new type of data: version; which has already been referred to in several previous examples; • several properties of this type of data that are available under the Macintosh OS: major revision. The leading numerical field of the revision number. minor revision: the secondary number field of the revision number. Stage. A strip such as alpha, beta. Country. A strip such as USA or France. Throw one. One strip Pull two. A strip • methods, in the form of executable code, which implements the previous properties when opening the application resource fork extracting the desired information and converting in the required data types, • a newly named property of the World version, that establishes a strip or succession property specifier such as 1.1 in version 1.1 in a version data type. When installed this inspector makes available to the system a series of data types and properties that may be as shown in Fig. 14. As an example to verify if the beta version of an application with the version number 0.99 is used, one you can write the clause relevant: application stage: Application stage (Netscape Navigator "is" Beta "and minor revision of" Netscape Navigator "application is 99 and the major application review "Netscape Navigator" is 0 Special Inspectors. The language extension mechanism described above has powerful consequences, for example, as described below: OS Inspectors. A system-specific inspector can access the operating system properties and allow information to be written to verify the existence and configuration of the attached devices and other subsystems. The following is an example of a valid fragment written for use with the inspector's library Macintosh OS: There is a serial device "Modem Port" The intent of this fragment is to verify if this is the type of Macintosh that has a dedicated modem port to be distinguished from a Modem / printer port. The World property mentioned as a serial device potentially couples with several different devices. The qualifier selects from among them, that which has the name "Modem port", if there is any such device, the phrase is evaluated as true, otherwise the phrase is assessed as false: Name of the serial device entry "Modem Port" en "Aln The intent of this fragment is to verify if the moodem port or modem port is using the standard serial driver for that port The specific property of the world referred to as a serial device" Modem Port "is an object with a name For input of property, the fragment checks to see if this is equal to Aln. Its usual value in the Mac OS Examples of other properties and data types available in the Macintosh OS Inspector library include: • Physical RAM. Integral evaluation: number of bytes of installed RAM • Logical RAM World property, integral value: number of bytes of installed RAM and virtual memory • Virtual memory World property. ano: true if the virtual memory option is allowed or established, PC Power. World property. Valued Boolean: true if the CPU is a PC power. World System Property Version. Type of data: version. System version that is installed at the present. • ROM version. World property. Type of data: version. ROM version that is installed at the present. These examples make it clear that one can write relevance clauses with pointing machines that have for example a small amount of ROM memory, discontinued or old system versions. Registry Inspector. Modern personal computer operation systems, such as Windows 95 and Macintosh OS 8, have special databases referred to as registers, which record a considerable amount of information about the configuration of the system and the installation of certain pieces of software. A registry inspector is an inspector's library which, when installed in the information reader, allows the relevance language to refer to and evaluate properties of the database. registry. The following is an example of the platform Macintosh: 22 = integer valué of entry "APPL. Interrupt" of entry "bandit" of entry "device Tree" of entry "devices" of Registry. The intent of the fragment is to enter the Macintosh name registry, find input "devices", look for the Device Tree entry, inside that and descend to the "bandit" sub-entry and then ..., to the sub-entry " APPL. Interrupt ", the resulting entry is then converted to an integer or integral value and compared to the code 22, the record can contain a large amount of information about the computer on which it works, the registration inspector does all that information accessible to the relevant language. Preferences Inspector. Typical application programs in modern computers, such as Netscape and Microsoft World, have special databases referred to as preferred files, which record a considerable amount of information about the configuration of a certain Program. An inspector of preference is an inspector's library, which, when installed in the information reader, allows the relevant language to refer to and evaluate the properties of the file of preference of a specific application. The following is an example: Suppose that the Netscape Navigator Network browser application has a preference file that is associated with several types of content. An auxiliary application knows how to process this type of content. For example, an auxiliary application associated with a graphic file of the JPEG type can be remote JPEG, and an auxiliary application associated with the type x-pn-realaudio can be RealAudio Player (real audio player). Suppose that a Real information provider Audio wants to make information with objective users whose web browser are misconfigured, and provide them with automatic correction for configuration. Suppose that a Netscape Navigator preference inspector is available, and that after the installation of that inspector in the information reader, the Netscape Navigator Preferences becomes a property of World.
This provider can then target consumers with RealAudio products, but network browsers improperly configured to authorize and warn with relevant clause: There is application "RealAudio Player 4.0" There is application "Netscape Navigator" and (auxiliary name of entry "x-pn- "Input" table - auxiliary "from Netscape Navigator Preferences¡ is not" RealAudio Player ro) The fragment's attempt is to access the Netscape Navigator Preferences file, find the input "Auxiliary table", find the entry "x-pn-realaudio" inside that and extract the associated auxiliary name. The resulting entry is a strip that is compared to "RealAudio Player 4. 0"The preferences file of a software application file contains a quantity of information about the way of working of the application and a preferences inspector makes all this information accessible to the relevant language. consumer contain explicitly or implicitly a commercial database that stores information about the consumer. Examples include: • database associated with personal finance programs. Consumers who use free verification, speed and similar programs that implicitly have databases on their machine. • Database associated with small office departments. Consumers who run small businesses that have consumer databases, provider databases and account databases on their machines. A database inspector is an extension to the base relational language whose purpose is to allow the relevant language to have access fields in a database. An example of syntax is as follows: numeric field "CURRENT BALANCE" of the FoxBase database "Personal DBF" < 0 The intent of that fragment is as follows: the information provider is trying to reach consumers who use free verification. Free verification users have a baseFox database created on their machine that is identified as a DBF personal. The fragment attempts to reach such consumers whose current account balance as indicated by the database is negative. The semantics of the evaluation depends on the implementation of the BaseFox database inspector. It can be assumed that this works as follows; a database named personal DBF is located on the mass storage of consumers of the computer, it is interpreted as if in a baseFox format, and the numeric field with the field name CURRENT BALANCE is summarized. The fragment then compares the summarized value to the value 0. Note that if the consumer does not have a database of the indicated type, the previous clause fails to analyze or fails to evaluate, any path is not declared relevant. This reduces the need to worry about qualifying clauses of this type by long preambles that verify whether software of a certain type is available. Failure of analysis time may occur because the consumer's computer does not have the database inspector, baseFox installed. The failure of the evaluation time may occur because the DBF personal file can not be located. An application of this technology is in the arena of technical support. Suppose that a provider of information publishes software which, as with free verification, creates and manages a database and the provider would help consumers to conserve the base of data per day. The information provider could create information that had as common problems objects in the consumer's database, for example, consumers who forget to start the database with the correct balance. Such information would call the attention of consumers, these problems when they had them as well as specifying solutions to the problems. USER PROFILE INSPECTOR The invention maintains a file or files offering a user profile, consisting of certain identification phrases and associated values. A user profile inspector is an inspector library that can be installed in the information sector and that allows the relevance language to refer to the data stored in the user profile. At a high level of abstraction, it is the same type of function that is allowed by database inspectors or registry inspectors, only with an inspection to a different database. As an example of how an inspector could be used, suppose you want to reach users with zip codes of the form 947XX. Suppose that the user profile has a variable referred to as a postal code, the relevance clause: 947 = (variable value "zip code" of user profile as integer) / 100 Will provide the functionality needed. The intent of this clause is as follows: the user profile is inspected, the variable named postcode is extracted, it is converted from string to integer and the resulting integer is divided by a hundred. The last two digits are lost in the process, leaving an integer with three digits that can be compared to 947. In an implementation, the user's profile is a dynamically expanded database with new aggregate variables as the information providers need it. A mechanism is provided in such a way that an information provider can create a template file that describes a collection of variables to which the information provider plans to refer in its information and would like the consumer to specify. The template file is placed in the information location and is automatically collected in the synchronization time. This template file is used to drive an edit module on the consumer's computer that presents the user with a list of the template variable names and a list of their current or blank values if they have not been previously defined. The user can then fill in the blank fields and edit other fields. In this way, the variables that the provider wants defined can be brought to the attention of the user and be edited. The user profile portion associated with the specific information site, in this way it is called site profile. The information with the relevance clause: there is no site profile data file, it verifies if the site profile has been initialized for this site. But, the information must have as a humanly interpretable content, a message indicating that the information provider would want the user to fill in the profile variables needed for the correct functioning of the information associated with that site. It must have as computer interpretable content an invocation of an edit module that uses the new template to present the user with selections to edit a new user profile. The information with the relevance clause: Modification Time of the Site Profile Data File <; Modification time of the template file of the site profile, check if the site profile has been updated since the last template file. If not, the information would have or must have as humanly interpretable content a message indicating that the information provider would like the user to add some new user profile variables needed for the future correct functioning of information associated with that site. It should have as content interpretable by the computer, an invocation of an edit module that uses the new template and the old profile to present user selections for editing. REMOTE INSPECTOR In principle, the inspector libraries can also give the relevant language the ability to inspect properties of other communicating devices, this includes: • Remote physical measurements. Ask other devices for information that those devices can measure, possibly including the information, position, temperature, voltage or status of a process. • Searches of remote devices. Ask other devices for information about yourself or your state. • Remote computing. Ask other computers the result of a calculation, for example a calculation specified by a formula, program, or written statement provided by the inspector.
• Remote database searches. Ask other computers with databases to respond to searches concerning the contents of those databases.
• Invocation of remote relevance. Pass a relevance clause to another computer and obtain the result as evaluated by the other computer in the computer environment. The following is an example of remote physical measurement. Suppose there is an inspector library that defines a property of the world called the atomic clock of the internet _and that .. has the ability to search for an authoritative time keeper by internet protocols that can return the result as a data type of relevance language time. Suppose that it also defines a property of the world referred to as the Greenwich Mean Time system that gives the average Greenwich Mean Time of the system clock. The following relevance clause points to consumers whose system time is incorrectly set: abs ((Greenwich Time of atomic clock internt) -Greenwich time of the system) > "10 seconds" time The following is an example of a remote device search. Suppose there is an inspector library that defines a property of the world called Postcript network printer, and that has the ability to search the currently selected printer to determine if it is configured properly. A valid relevance clause is: Printer model Network Postcript is "LaserJet5" and printer version Network Postscript ROM <version "2.0" that targets those consumers with LaserJet 5 printers that have old ROM. The following is an example of a remote database inspector. Suppose that the information provider is a large organization that serves a population of information consumers who are employees who have portable computing devices and who retain important data on a remote computer who have a trusting relationship through a security greeting with these small devices. Assume that employees use organizational data that is accessible through a lightweight directory access protocol (LDAP) database server accessible through the internet (see W. Yeong T. Howes, S. Kille LADAP (Lightweight Directory Access Protocol), Internet Standards Track RFC 1777 (1995)). The information provider, would like to provide information that establishes conditions about the project that employees have that is not available on the manual machine, but that on the contrary it is available by LDAP searches to the LDAP server. In addition, it establishes conditions regarding the status of employees that are only available on the manual machine. The provider develops, an inspector library that can have access data in the LDAP server and an inspector library that can have access data about the manual device. Suppose Aa installation of inspectors includes steps to configure LDAP searches with appropriate passwords and - appropriate user names. A valid statement in the relevant language is: assigned project sponsor of the LDAP employee record is "U.S. Govermment" and (per diem charges of current daily expenditure of the manual record of employees >; 35) the intent of this fragment is for a certain entry to be extracted from the LDAP database associated with this employee and the name of the sponsor compared to the "U.S. Govermment". If that condition is maintained, the current travel expense record is searched for a per diem claim. This method provides a path to point employees anonymously and proactively listed in the organizational database as subject to a lower per diem rate than the expenses that are being generated. Thus, the invention provides a method of verifying the expense claims during the trip well before shipment. Important points are presented in the specification of the interfaces with remote systems. One aspect is that there must be a relationship of trust between the consumer's computer that requests the remote service and the other device or computer that fulfills the request to allow the automatic evaluation of relevance. Communications must be coded in some cases. The degree of resource used must be controlled. Digital authentication must be available in some cases. These are all details that can be handled by well-known mechanisms. The provision of a process by which an information provider can become the author of information that refers not only to properties of the consumer's computer and its environment, but also to properties accessible by search from the consumer's computer, creates a new communications protocol, described later, this is the protocol for accessing personal information. LOG FILES OF INSPECTION PROGRAM Many computer software applications and processes maintain a log file or log files that contain a record of the execution history of the application or process. Standard examples of this include transaction logs maintained by deamons login mail servers, previous logs maintained by backup software, and error logs maintained by user programs. An inspector program log is an inspector's library. that can be installed in the information reader and that allows the relevance language to refer to the data stored in a certain file or log files. At a high level of abstraction it is the same type of function that is allowed by database inspectors, registry inspectors or user profile inspectors, only by inspecting a different database. Such an inspector library defines access methods to allow one to obtain key data items from log files. As an example of how such an inspector is used, suppose it was desired to reach users who handled the GraphMaker application, where the log file is generated by GraphMaker containing an error entry with an error code of 93456.
Suppose that this error code indicates that a certain PostScript printer was unable to process the output of the file by GraphMaker. It is desirable to communicate to consumers in this situation, the fact that there is a return of work for this problem. Suppose the GraphMaker has an inspector library available in its information site that implements a set of methods associated with the central data type referred to as the GraphMaker error log. Suppose that when the inspector library is installed in the information reader, the GrapghMaker error log is a world property. Suppose that GraphMaker error log has a property referred to as input and as a result of such property is an object of type input GraphMaker error log, with property error code and error message producing integer and string data types, respectively. Then, there: there are error GraphMaker error entries whose log (error code of that = 93456) provides the functionality needed. The intent of this clause is as follows: the file associated with the GraphMaker error log, is located and open, and a search or investigation is made through this file for type error entries as opposed to the warning. These entries are examined to determine if any of they are associated with an error code of the indicated type. This allows a technical support organization to develop a process to maintain complex products in the field, where: • The product is developed so that exceptional conditions are identified and stored. • Inspectors for that storage are developed and published in an information site; and • The information is made which, inspect the log storage to identify and correct problematic situations. In this way a technical support organization can target or reach consumers who are experiencing certain program failures. Inspecting the Information System The information reader maintains subscription information, information funds and in one implementation, stores that indicate the history of the relevance evaluation and the automatic solution operation. An information system inspector is an inspector's library that can be installed in the information reader and that allows the relevant language to refer to the data stored and managed by one's own information reader. At a high level of abstraction, this is the same type of function that is allowed by database-based inspectors, registry inspectors or user profile inspectors, only one database being inspected -different. Such an inspector library defines access methods that allow one to obtain key data items from important components of the system: • Subscription database; existence or non-existence of certain subscriptions, address of information sites associated with certain subscriptions, scheduling of synchronization associated with certain subscriptions, digital authentication information associated with certain subscriptions. Other interesting attributes • Information database: existence or non-existence of certain information in the information database.
Relevance or irrelevance of certain information in the information database. Existence or non-existence of a certain author in the information database. Stocks or non-existence of a certain subject in the information database. • The log storage files of information readers: existence of a subscription to a certain site sometime in the past. Existence or non-existence of certain diagnostic conditions, for example aborted evaluation of certain information due to excessive time to evaluate information. Relevance of certain information at some time in the past. Acceptance by the user of an automatic solution operator associated with certain information at some time in the past.
• The configuration of information readers. Installation of certain inspectors. Parameters of information reader operation. User preferences. As an example of how such an inspector is used, suppose that in January 1998 a special piece of patch code was issued that modified the GraphMaker application, suppose that most of the consumers who installed this patch knew about it by the process of information described here. You want to reach users that handle the GraphMaker application that is somewhere in the past, but driven by the information they have installed the patch to the GraphMaker application. Let's suppose that this is because an improved version of the patch has become available. A comprehensive strategy for this situation, formulates several information. The strategy formulates an information for users who have a subscription to the present type of information. This is prosaic in construction and uses mechanisms described above. However, a comprehensive strategy also formulates three Other information finally intended for other users: First, the strategy formulates information for users who no longer subscribe to the information site but may have done so at some point in the step. The information is distributed by several means outside the normal subscription mechanism of the invention, for example through a service, for example UrgentAdviceNet. The information tries to see if the GraphMaker is installed, see if there is no active subscription to the GraphMaker information site and then in the log file generated by the information reader see if the GraphMaker information "89/1 / 80-1" was relevant once in the past and if the user had accepted the proposed solution. Any consumer for whom this is relevant is notified, must first re-subscribe to the site if possible, and secondly, that when they do get updated instructions patched code. Second, the strategy formulates information for users who have never subscribed to the information site and have never received the primitive information. This information verifies if the affected version of the GraphMaker is installed, and then sees if the current subscription database does not show active subscription and as well, if the log does not show active subscription in the past. Any consumer for whom this is relevant is notified, first they must subscribe to the site if possible, and secondly when they have done so, they will obtain instructions about updating the patched code. Third, the strategy formulates a counter-information for users in some way obtained a copy of previous information by means other than the subscription, and that is something still active in the information database. Such information is not automatically deleted by on-site synchronization because it is not associated with the originating information site. The information identifies the existence in the information database of the old information. Any consumer for whom this is relevant, is notified, firstly that this active information is no longer recommended by its author, second, that the consumer must subscribe to the site if possible, third party that when it has done receives instructions about updating the code patched. Suppose, that the information reader has an installed inspector library which implements a set of methods associated with three central data types, referring to a subscription inspector AdviceNet, Information Inspector AdviceNet and History Inspector AdviceNet. With such inspectors one can target or reach consumers who may have adopted the proposed solution of information in the past but who are not currently subscribed: There is a GraphMaker application "(whose version of that is version" 1.01") and there is no entry" GraphMaker "from the Understanding of the Understanding of the AdviceNet and there is a" relevant "entry for the history inspector AdviceNet (author of that is" GraphMaker "and the identification of this is" 98/01 / 08-1"and the adoption status of this is" Accepted ") with such inspectors one can also reach consumers who have never subscribed: there is application" GraphMaker "(whose version of that is version" 1-01") and there is no entry to" Subscription "of history inspector AdviceNet whose ( name of this is "GraphMaker".) With such inspectors one can reach consumers who received information through other means than the subscription, there is "GraphMaker" application (whose version of that is version "1.01") and there is an entry "Information" from the Information Database whose information (author of that is "GraphMaker" and identifier is "98/01 / 08-1") These inspectors allow a technical support organization to develop a process for the maintenance of bodies of information and to adapt to the consequences of adoption / non-adoption of previous information. A second type of example is provided in the case where a RealAudio information provider wishes to become the author of an information verification if, a certain inspector is installed and if it is the correct version, for example, because the information depends on this. Suppose there is an inspector library, which when installed adds the AdviceNet setting, as a world property. RealAudio could set the information in place with the relevance clause: there is no "Netscape Preferences" library for the AdviceNet configuration. allowing one to verify that the inspector's library was not installed. The humanly interpretable content of the associated message is an explanation that in order for the RealAudio information to work properly, the user must obtain the appropriate inspector from the Netscape site, and it can also serve classified information by: Inspector library version "Nestcape "Configuration Preferences" is not version "1.0" to reach the user with the wrong version of an inspector library.This inspector allows a technical support organization to be sure that the information reader is correctly configured to use the information provided by Variations Alternative Transport Mechanisms Until now the discussion has centered around a single mechanism for the transport of information.
In fact, there are many situations where other means of transport are useful or desirable. Some of such means of transportation include: • Information by physical transportation. An information can reach the consumer's computer by a file copy from a floppy disk, CD-ROM, or a physically similar transportable medium. • Information by email. An information can arrive as part of an email message, sent from another consumer or from an information provider. • Information by USENet. An information can arrive as part of the news message distributed according to the USENet protocol, sent by another consumer or by an information provider. • Information by an owner protocol. An information can arrive as part of a message distributed according to an owner's protocol. • Information by file transfer. An information can be obtained by transferring the file from another machine where the transfer uses a different application than the information reader. For example, a user could direct a web browser to download an information file that is pointed to by a link or hypertext link. OR, an application could be directed to the download or sending forward of an information without the control of the user, using FTP or some protocol of distribution of file. There are three different procedures to deal with information that has arrived by one of these routes: • Add to the information database. The information is added to the existing database of information that is continually being tested for relevance. • Situation evaluation. The information is evaluated for relevance when opened, but it is not entered in any permanently maintained fund. When the information is closed, it has no interaction with the system. This type of information It is part of a manual verification, for example in a once unique situation. • Stacking This information is stored in the storage device of the consumer's computer for future use, this means that at some future time it is added to the information database or at some future time it suffers from the evaluation once. The possibility of situation evaluation, this is the situation information, deserves special attention (see figure 16). This can be used to create quite complex summaries of information that are opened by the consumer, only when special needs or situations arise. The following are examples of alternative transport mechanisms applied in the technical support application area. • Information before purchase. A summary of information reaches the consumer's computer as part of the sales process for a new piece of software or hardware on the consumer's computer. This collection can arrive by physical transport of the means or electronic transfer, for example the consumer can obtain the summary from a site of the network dedicated to the sale. The summary when processed by the information reader evaluates the hardware situation of the consumer and informs the consumer about the convenience for several possible purchases. The process typically only runs once. • Information with installation. A summary of information 160 may arrive at the consumer's computer as part of the installation process for a new piece of software or hardware on the consumer's computer. This piece of software may have arrived by physical transport of the means 161 or by electronic transfer 162. The new information may be added as part of an automatic initiation process whereby a subscription is automatically initiated and the information is placed in the information fund as a way to start the local site image. An optional synchronization of the user's place with the information site can give 163. The user's reader opens the information summary 164 and evaluates the relevance of information 165. The information is presented with optional solutions 166 and the user reacts to the information 167. The system can perform a standard software installation 168 and introduce a subscription to the postal facility information site 169 to receive postal installation advisors 170. • Problem diagnosis. A summary of information can reach the consumer's computer as part of the installation process for a new piece of software or hardware on the consumer's computer. However, no use is made of the summary at the time of installation. Instead, the summary is copied to the computer's storage device. The user is then informed to open the summary by any of several means for the use of the situation when a certain problem arises. By doing this, the user is notified of various information which applies to this specific situation, and the configuration of hardware / software establishments. After the episode has passed, the information is closed perhaps to reopen some time later to possibly be reused. Alternating notification mechanisms Information can be presented to the user in other ways, than by the usual information reader interface, for example: • Through a notification box in other applications. The user can be notified of the existence of relevant information when using another application. The notification uses a mechanism appropriate to that application. For example, the consumer is engaged in another activity, for example, seeing a video and is notified in a non-disruptive way, for example in this case, from film to film. • Via screensaver / personal computer. The user can be notified of the existence of relevant information, when you are not using an application. The notification uses a suitable mechanism for presentation without failure. For example, the upper part of the personal computer has an appropriate icon that presents the existence of relevant information. Another example, a screensaver presents an animated presentation whose status indicates the state of the machine, for example, subsystems affected by information. • Via email. The user can be notified of the existence of relevant information by an electronic message using email. This includes textual summaries that indicate the number and type of relevant information and the number and type of affected system components. • Via message. The user can be notified of the existence of relevant information, by electronic message, moving other modes of information transmission. This can include standard means of communication, such as radio, people, telephone or fax transmission. For example, in an environment where consumer devices are connected to a computer In the home, the invention inspects the properties of the devices and looks for the consumer's person with urgent messages. An information is described in reference to the temperature in the home. With the effect that the temperature is excessively high or low, information is relevant. Assuming that the relevance notification is set to use an alpha numeric paging, the consumer is analyzed to indicate that the temperature in the home was outside normal limits. Frequency of Evaluation and Relevance. As has been described so far, relevance evaluation is a process by the information reader, a typical implementation evaluates all information in the information database for relevance, measuring the total use of CPU resources, and maintaining resource consumption. measured in the intervals, for example a second below a fraction of available CPU time. A typical implementation allows the inclusion of the user in three ways: Firstly, by allowing the user to establish parameters controlling the fraction of CPU resources used during continuous evaluation. Second, allowing the user to group information in special funds that are evaluated from according to different sequels. For example, a manual background is evaluated only under manual evaluation, while a night background is evaluated only at a certain time specified by the user in the evening. Third, by allowing the user to establish sequential relevance assessment for an individual piece of manual information, by controlling all the background membership parameters. There are a variety of important variations in this way: • skipping the evaluation. .. In certain establishments it may be desirable not to evaluate each piece of information in a fund with each step through the fund, for example, those pieces of information that take a very long time to evaluate are periodically skipped, or skipped based on the use CPU of other applications running on the consumer computer. A piece of information that is not valued retains the status or rating of relevance of the previous evaluation. • The sequel based on the author's comments. In one implementation, the author of the information can specify the sequel to the relevant evaluation. EL includes in the information file a line When To Evaluate, which specifies sequel details of evaluation. Options may include either a periodic sequel to the relevance assessment, a condition for relevance evaluation or a membership in a well-known information fund, with a standard evaluation sequel. • Sequel based on analysis of the information reader. The evaluation relevance process can be seen as analogous to the process of running several processes in a computer operating system. Using sequential ideas from traditional operating systems, it is possible to set priorities for information and assign lower priorities to certain processes. A special case of this is the evaluation of the jump procedure discussed above. Variations in Relevance Assessments. Simulated conditions, In certain situations see (Fig. 17), it is useful for the consumer to simulate evaluation of information in an environment different from the one that currently obtains it. In an information reader implementation, a method is provided to simulate conditions that are not obtained in fact. Such an information reader has a modification to the sender of the information reader method invocation. In this modification, the name of the method and the types of data included are compared with a simulation table 172, in a nearby layer 173, before the delivery of a method occurs. The contents of the simulation table are editable by the user 171, if there is no such agreement the sending is done as usual, this is, an information received from an evaluated expression tree 174, is sent by the method 175 sender. If that agreement exists, the sending is suspended and instead, the value of the method is obtained by observing the associated cell of the table of simulation. the result in any case is passed through the layer next to the system, for example, the file inspector 176, or the registration inspector 177. Such an implementation allows the consumer to simulate conditions. The consumer controls the usual relevancy evaluation procedure when editing the simulation table and when installing method names, '- and types of arguments to be skipped and the associated values have to be returned. In this way it is possible to provide a tool to: • Pretend the existence of devices that are typically connected but are currently unreachable. • Determine if a certain information or families of information moves away (this becomes irrelevant), if certain modifications to the consumer's computer are made without actually making the modification.
• Determine if the installation of a product causes certain information to become relevant. There are many other applications of this system or path. • Use filtering. It has been tacitly assumed that a user typically wants to see all relevant information from all sites. In practice, a user may be interested in filtering the presentation of information, focusing on articles of a certain site, of a certain background, focusing on information that presents certain titles- of password in references-a, or affects-solution . Promotion of Trust. The invention provides a powerful tool for connecting information consumers with information provided by information authors. In certain establishments, the invention must be an article of security and privacy, for an extensive discussion of considerations of security and privacy see below. A typical case of such an establishment is where the invention is: • Connecting an information provider and a provider consumer via a public network, such as the Internet. • The typical information consumer is a private person, and • The information provider is a large business or other arrangement that needs to protect and increase its reputation. In this case, it is important to take into account the widely perceived insecurity of public networks and offer tools to consumers and suppliers who behave discreetly. The communication process presented here is designed to support the development of discrete habits in the parties, both of the consumers of information and of the information providers. A basic stone of the process is that users should only interact with reliable suppliers, and for this purpose the invention provide technology that supports the assessment of the value of trust by consumers and maintenance of a reliable state by suppliers. . Importance of Trust In general, a trusted information site has several attributes that qualify it. • Quality The information is perceived by consumers as being well intentioned, well conceived and well executed. • Security. Information is perceived by consumers as being safe not having intent to harm and being both an attempt to help and being carefully tested and maintained responsibly.
• Deprivation The information is perceived by consumers as being private having no attempt to investigate inquisitively or obtain particular information, and that both have an attempt to maintain privacy and are carefully designed and maintained with responsibility to maintain that intent. • Relevance. The device is perceived by consumers as being tightly aimed at an objective having no attempt to go to large user populations, as would be a radio message (this is in practice, a-1guita, once called "spamming" in others). message modalities such as email), and both have an attempt to reach small groups of consumers with a focused need to know and be carefully designed and maintained in a responsible manner to achieve that intent. The invention offers a number of technological tools that facilitate open communication between the consumer and supplier, which leads to convenient attributions of trust. The invention, in an implementation can offer mechanisms that allow interested suppliers, promote consumer confidence and consumers to learn how to discriminate between trustworthy and untrustworthy suppliers. • Presentation. Information providers may have the ability to present the potential effects of information to describe experiences during the test or in the field. • Discovery. Consumers of information may have the ability to apprehend about the potential effects of information, and about the experiences of others with certain information providers or with certain information sites. • Feedback. Consumers of information may have the ability to comment on their experiences with certain pieces of information. • Correction. Information providers may have the ability to retract erroneous information. • Certification. Information providers may have the ability to seek certification of your information as safe and effective by an external rate service. The information reader may have the ability to block information that is not priced according to the consumer's specifications. The following is a more detailed discussion of these mechanisms.
Description Mechanisms The invention offers information that provides the ability to advertise, in the humanly interpretable component of the message, the potential effects of information to approximately the experience of the information provided is to prove or from the user's feedback. Using different methods of the description, a given information can gain confidence and visibility of the consumer. In one implementation, one of more formal methods of documenting and monitoring the effects of information is offered, allowing information to provide the described names of potential effects through stereotyped keywords. A central authority such as Better Advice Bureau, publishes a registered list of keywords which is used to announce the subsystems of the user's computer or its environment that may be affected by the proposed solution, or the effects of the proposed solution on personal privacy. An information provides, in authorized information, to use these mechanisms to announce potential effects of a recommended solution operator through stereotyped keywords in a Solution-Line Affects of header. In an information reader implementation, these keywords are searched, and they are capable of searching and the relevant evaluation is subsidiary to it. The consumer's ease of use can be reinforced, in one implementation, by allowing several classes of filtered user equipment to be based on these keywords. For example, a user plagued by huge numbers of information any time he disconnects from the CD-ROM can temporarily use this product advantage to make his life easier. All information referring to the CD-ROM drive in its keyword fields may be declared irrelevant, and then later disconnect the CD-ROM drive. In this way, even if they are information ordinarily activated by the non-existence of a unified CD-ROM, the user may not have to see them. For an alternating mechanism, see the discussion of the conditions simulated in the above. The consumer's confidence can also be reinforced by allowing such kinds of user equipment to filter based on these keywords. For example, assuming that some available keywords reveal the consumer's identity to a provider. Using this when it is the case, a provider has described the effects of a message. A consumer who, as a policy subject does not participate in examining or gathering similar information in the information may specify that all information contained in these keywords should be declared irrelevant. In this way, the provider has done his duty to announce whether the consumer who trusts the provider is rewarded with the ability to see only important messages. Finding Mechanisms In a typical implementation, the information consumer can inform himself of the potential impacts of a piece of information before deciding to apply the recommended solution operator. Some of these forms can already be done using existing Internet technology. The consumer can search other websites and search engines to see if there are any news about certain information. The invention expands this mechanism through a special Internet server, referred to the Better Advice Bureau. The Better Advice Bureau serves as a central settlement bank for information about the effects and side effects of an information. The user can at any time search the Better Advice Bureau, asking for any comments recorded about a specific information or a specific site.
Feedback Mechanisms In a typical implementation, the information consumer can provide feedback to the information provider and to other consumers describing the user's experiences with a piece of information. Some of these can already be done using, the technology of the existing Internet. The consumer can use email and a USENet newsgroup to notify others about the common experience. Some information, some information. In one implementation, the invention expands this mechanism through a special Internet server referred to as the Better Advice Bureau. The Better Advice Bureau serves as a central settlement bank for information about the effects and side effects of information. The user can at any time send to the Better Advice Bureau site (described in the following), record comments about specific information or specific site. The Better Advice Bureau can transmit those comments to an information provider, who can answer it. In one implementation, the Better Advice Bureau projects the identity of the consumer by stripping identities before sending or designating. The Better Advice Bureau collects all the information sent by the consumers and provides answers, in a searchable database on the network. In an implementation, the information reader offers direct access to this feature including an easy way to automatically create a message about certain information in the display of standard information, and to direct it to the authorities in Better Advice Bureau. For example, a lower part is placed as part of the information browser window. By clicking on that button, a mail program window opens with the address * of sending and receiving, and with the information number and the object already provided. The user who is at any time pressing the mouse button may be able to record a comment about certain information.
Correction Mechanisms In a typical implementation, the information provider may expropriate information that has been mailed to the error. This is done by removing the information from the provider's information site. Over time, as subscribed information readers synchronize with the provider's site, the information automatically disappears from those consumer computers. In certain initial configurations, this is not a sufficiently proactive solution. For example, certain information can be distributed by means of some different from the usual information reader / information site model. For the extension that certain consumers may have such information in their grouping of information, but without associating them with a subscription they need to be negotiated with counter information. This is information that acts as information against another piece of information. Using an information inspector library, as described above, 'i- is -? -? It is possible to write information that is relevant when the consumer's computer has certain information in its main information grouping. Such information is typically as follows: The information 40139 that was released on 5/31/98 has been pre-dialed, and it is recommended that you remove it from your information system immediately. If you agree with this, click on the < Dolt > following. (signed) < Authors Name > . Such counter information is distributed by sending it to UrgentAdviceNet, a special information site to which all information readers subscribe. The piece of information is quickly disseminated to users. In summary, the invention offers the following process to negotiate with the defective information: Remove the bad information from the information site provided. Write an accounting information and send it to UrgentAdviceNet. Write better information Place the best information in principle of information provided. Certification Mechanism, A technique in the acceptance of the additional consumer of the use of information and associated solutions is the elimination and some of the burdens to determine the responsibility of the message of the individual consumer. One method to do this is by a service evaluation at a central site to offer a service to information providers that certify the information as being in accordance with certain publicly known publicity and safety standards. Under existing network protocols (see Khare, Rohit, Digi tal Signa ture Label Archi tecture, The World Wide Web Journal, Vol. 2, Number 3, pp. 49-64, Orelly (Summer 1997) http: // www. w3. org / DSIG) there is a method for the establishment of URL evaluation services, through a block of messages that can be confidently certified to that of a certain evaluation agency that ensures that certain information resources have certain properties.
The credibility of certain statements, ie that the information is currently being certified by the service and not by an imposter, is based on the deployment of standard authentication and encryption devices. Applying this technology, an evaluation service can be established at a central site, for example Better Advice Bureau.org as described below, to certify that certain information operates in a generally correct manner when appropriate of the task announced, is used in a way to protect the individual's identity or, and generally have to be, effected. The authors of the information seek certification of the responsibility of their information sent to those information in the certification authority, which studies the message and, in their opinion, agrees to certify some of those messages. Here the certification means that, according to the good standard understanding, a special evaluation block is attached to the message indicating that the message is accepted by the authority to have certain attributes. In one embodiment of the invention, the consumer is proposed to the opinion of making integral use of one or more evaluation services.
These functions are as follows: An evaluation service uses a well-known format, such as PICS (see Khare, Rohit, Digi tal Signa ture Label Archi tecture, The World Wide Web Journal, Vol. 2 ,. Number 3, pp. 49-64, Orelly (Summer 1997) http: //www.w3. org / DSIG), to describe your evaluation of sources such as information sites and individual information. The evaluation service publishes a list of descriptive keywords used in the evaluation system, such as BAB-Privacy-Standards-Compliant or does not affect the filing system. The evaluation service labels individual information using its defined property of the labeled system, inserting these labels, the information as the blocks evaluated according to a standard labeling format, such as PICS. The evaluation service labels individual information sites by attaching labels to the site description files using their defined property of the labeling system, inserting these labels into the site description files as evaluation blocks according to a standard labeling format such as PICS. The evaluation blocks are interpreted and authenticate by an established cryptographic signature mechanism associated with the service, and part of the standard evaluation labeling. The interference of the user of the information reader is extended to contain a new component, that is, the handling of certification. This component allows the user to allow the information to be evaluated by relevance only when they have been credited by a trustworthy privacy evaluation service as having properties with which the user is comfortable. For example, the user blocks the information to which they are not certified by Better Advice Bureau as BAB-Privacy-Standards-Compliant, so they get a measure of confidence that the advisors used in their systems do not violate their privacy to reveal information in the exterior world. The certification handler has two defined roles: User wishes to evoke. The certification administrator plays a role in initiating the certification process. This makes available to the user a list of potential evaluation services among which the user can select. When a service is selected, the certification administrator obtains a list of keywords from the evaluation URL service. defined evaluation, and allows the user to design a filter based on the specificity that certain keywords or combinations of keywords may be present or absent) by a message to be trusted. • Policy implemented. The certification administrator also has the responsibility to grammatically analyze and confirm the evaluations associated with the individual messages and block the evaluation of non-certified messages, or certified messages without displaying the desired attributes of the users.
Privileged sites In an implementation, the information reader is pre-configured with structured subscriptions of three privileged information sites. This constitutes sets of descriptions of a central role in ensuring the security of the invention; together they form an immune system. advisories com advisories.com is a web site and FTP operated by producer of the information reader software, this allows to use from everything about the words obtained information and update about the system, about the information reader, and any update the software or communication protocols of the invention. It is also a trusted site for the distribution of subscription information. Subscription files of digitally authorized sites can be found here by many of the most information sites in the Internet. These description files are signed with a digital signature mechanism that is automatically intelligible in each copy of the positive reader. This serves as an important safety function. As determined, in the next section or security, it is very important that there is a well known and trusted location that is the source of the exact information about the start of a new subscription. To obtain the site description files from advisories.com a user has a degree of confidence that is the exact subscription information obtained and is not vulnerable to various security problems. It is also a site for the distribution of authorization information, in particular, the coordination of certain authorization conventions. Two specific conventions that have been mentioned: Keyword Coordination. This concerns the way in which the information is used by the information authors to announce descriptions of potential information effects on the computer of the consumers or possessions or in the environment. An exact list of adopted keywords can be made available on the site advisories.com. Coordination of User Profile Variables. This concerns a mechanism by which new variables can be added to the user's profile by different information providers. An exact listing of these formats and appropriate variable promulgations can be made available on the site advisories.com.
BetterAdviceBureau. org Better Advice Bureau.org is a website and an information site on the Internet. It is a site dedicated to the maintenance of communications protocol as a civilized means of communication. The Better Advice Bureau.org website describes the principles of system operation, describes why the system is useful, and why it projects individual security and privacy. This describes risks and recommended procedures, known for interaction with the system. This serves as a clear location for user complaints about the operation of an information, and as a place those consumers can turn for near-experience searches associated with the information that those that are contemplated to apply. The Better Advice Bureau.org information site in which all the information reads the subscribed. This publishes that it is referred to as meta-information or counter-information, in the form of information against bad information, or against bad sites. For this information, consumers are aware of situations within the information process that are dangerous from the point of view of security or privacy, and can then take corrective action. This is also a site for the distribution of valuation information, in particular publication or conventions of certain valuation, as described in the above, there are commonly acceptable methods for sources of evaluation in the network according to a criterion provided by a service of valuation (see Khare, Rohit, Digi tal Signa ture Label Archdtecture, The World Wide Web Journal, Vol. 2, Number 3, pp. 49-64, Orelly (Summer 1997) http://www.w3.org/DSIG) . The Better Advice Bureau, in one implementation, the function is like a certificate of privacy and security and utility of individual information. In this role, the Better Advice Bureau evaluates individual information including special assessment blocks, according to a good assessment format. known, such as PICS. The Better Advice Bureau also publishes on its website the information necessary to interpret such assessment blocks including: A list of descriptive keywords used in the rating system, such as BAB- Privacy-Standards-Compliant or Does Not Affect files System. Public key information associated with the certification process.
UrgentAdvice. net UrgentAdvice.net serves to distribute information quickly to all consumer advisors. It is used sparingly, to deal with extremely urgent situations that affect a significant number of users. In one implementation, this has a high priority in synchronization, being synchronized every moment in any synchronization takes place.
Other Areas of Application In this document, until now, the invention has been described in connection with the technical support application. The following is a partial list of other applications to which the invention can be applied.
Consolidator.com In an Air Ticket airplane ticket broker buys a block of 50 seats on a New York flight to London for August 20. The grouper wants to reserve those seats to travel. The grouper maintains a relationship with a variety of traveling agents. The grouper uses the invention to make its product more efficiently. The grouper works as an information provider, and the authors of an adviser are those of a relevant line that maintains the existence of a consumer in a customer database of travel agencies, which has reserved a ticket to go from New York to London on that date or close to the date. The information provider places the advisor on his or her information site. Consumers of information, in this case, several travel agencies work with the grouper of the tickets, they have their representative computer to subscribe in the groupers information site. They also install a special inspector on their computer which searches the travel agency client database for clients with certain travel plans. The advisors download into their computers and are automatically inspected for relevance. Relevance here means a potential trip which has plans to travel. The traveler agent offers the traveler a ticket in a Reduced price provided by the grouper. The grouper then makes a sale and the traveling agent makes a commission. All participants win.
CheapFlights. A broad airline often has last-minute opportunities to travel at cheap rates. The airline wants to examine the identity of the tickets for consumers with a continuous interest in the last minute of the trip to certain cities. This airline can-t-use the invention to make its product more efficiently. The airline functions as an information provider, maintaining the existence, in the user profile, of a expressed desire to travel to a certain city. The information provider places the advisor on his or her information site. Consumers of information, in this case potential travelers, have their representative computer established to subscribe to the airline information site. Add expressions of interest associated with their user profiles indicate cities they wish to fly in a short notice. The advisors run computers and are automatically inspected for relevance. Here, relevance means a potential opportunity for a flight in a short notice.
Commodity com The previous system describes work in many other commercial areas, for example one can build as ... a result, such sites as CheapConcerts.com and CheapHotelSuites.com that work on similar principles. Extending this point, it is possible to start a new type of active market using the invention. In one model, (see Figure 18), there is a central site referred to Commodity.com that functions as the market marker. This is attractive in a configuration of -initials currently managed by classified ads, where there are many individual offers seeking central market. The process is as follows: • The provider submits to Commodity.com an adviser that offers object for sale 180. The personnel of the information site Commodity.com edits and mails 181, 182 advisers. The users subscribe to Commodity.com 184. • Subscribers enter information about the interest to use the profile 189. 190. The relevant advisors contain objects that meet their interest, the process is continued as described above, where the information reader collects advisors from Commodity.com 183. The evaluation of relevance is performed 185 according to a user profile 190, as inspected by a user profile inspector 186. The user sees the relevant 187 assets and acts on the information contained therein 188.
BalanceTransfer. com In the world of financial services, there are many companies that try to market specific services to clients directly. These credit cards are included with specially low rates in cash advances, particularly- the credit balance transfers from competent financial instruments, and credit that refinances offers. The attempt to reach consumers is expensive and sometimes difficult. Certain consumers, who may otherwise be interested in financial benefits of the service, do not allow telephone or mail contact. Other consumers do not describe sensitive information about the phone, which is typically required to participate. The following is an example of financial services offered through the use of invention. This embodiment of the invention is described as a centralized system, although this can easily be a decentralized system.
The bidder sends the advisor to BalanceTransfer.com that offers balance transfer to those with sufficient balance and income. The staff of the information site BalanceTransfer.com avoids advisors and deliveries. The user subscribes to BalanceTransfer.com. The user fills in information about the credit card balance and there is interest in the rate and the balance and enters for the user profile. • The information reader uses remote connections to verify the balance, preserve, did it deprive her? The relevant offers are those that benefit the user. The advisor, if he writes well, uses the input data to test if the applicant is approved. Therefore, the relevant advisors have approved credit. There are many variations in this kind of information. Local refinancing operates in substantially the same way. The advisor is writing mentioned variables associated with the main, current interest and the term of an existing loan. There is no reason why this service should be globally centralized. In a typical variation, individual mortgage brokers offer their own information sites.
BadPills.com The invention can be used for a variety of consumer products that guarantee remembrances and safety advisors. The following are examples. BadPills.com is a site where information is available about products and drugs and their interactions. The following describes.- how is the operation of sites to notify drugs about potentially harmful drug interactions in their client base. The FDA and other organizations, for example, pharmaceutical manufacturers and consumer organizations, send information about interactions and side effects of medications. Each advisor has the following form: The cause of relevance maintains the existence in the consumer's pharmacy database with active prescriptions for drugs with a potentially harmful interaction known. The human readable content announces approximately the interaction, announces to the pharmacy that it has such interaction in its customer base, and encourages pharmacies to correct the situation. The warning site collects submissions, avoids and sends mail.
The pharmacy subscribes to the site. As part of the subscription initiation, the pharmacy must install a standard pharmacy customer database reader on your computer. This inspector can check to see if Any patient in the database has a certain prescription. The pharmacy computer gathers consultants routinely. The relevance evaluation generates searching for - ^ - 10 pharmacy customer database database inspector. ,. , - • The database inspector processes: base ~ pharmacy data. The relevant messages are provided for dangerous drug combinations. There are many variations in this embodiment of the invention, a similar service for physicians is made available through a medical patient database inspector for those doctors who are aware of patient subscriptions on their computer. office. A similar service for patients is made available through an individual health record database inspector for those individuals who enter their own subscriptions in the user's profile. One way to simplify this is to have a program information exchange, which allows a user Remotely search the pharmacy database for information about it.
Anonymous Message from Group 5 Assume that there is a group G of individuals who wish to have an anonymous communication with a provider Q Individuals G are widely distributed and do not know each other There is a way to use the invention to establish a site by two anonymous forms of communication of this kind.? arr.etre Such communications are widely available and used by many people.To the anonymity of the participants, it is important that the system be used by many different people. of 15 many different groups.The site is a warning information site Anonymous B where any email sends a certain address has its identity stripped and is sent to the site by mail. Such information site operates in full form automatically. This site can be referred to as SecretFriends.org. This site can be used in conjunction with cryptosystems of private public key. Offline security refers to a system where an agent of arrangements G with P for a conversation. The agent sends P a public key which is created by G for the purpose of conducting this discussion. This key is not currently public. It is a secret only known by G and P. This is only referred to as a public key because it is the key which is commonly made to the public in standard applications of public private key systems. The password is only sent to P. In a similar way, the agent returns to a specially created public key from P to G. G and P exchange messages for the following processes: -, 3 ~, Subscribe to SecretFriends.org Authorize messages which they want relevant only for those who possess the description key that they have published. Use anonymous mail reflectors from other means to mail secret messages to SecretFriends.org. This method provides anonymous communications as follows: A participant reader synchronizes with SecretFriends.org. Potentially, a large number of advisors, currently encrypt messages, are obtained. The only messages that are displayed by the information reader are those that are currently decipherable using the indicated key. The others are all discarded. The relevant advisor is then described and read. The method provides anonymity under the AEUP protocol because, it assumes many different people who are using SecretFriends.com, there is a large number of messages that are being placed there, and only a small fraction ends up being of interest to a reader. Because the structure of AEUP, one that observes the process in the information site can tell which messages return to be relevant in whose user ..
Distribution of Sensitive Product Information A variant in the form of anonymous group messages, in a specific initial configuration, is provided as an information service for product customers who do not want to know what the indicated product uses. For example, users of antipsychotic medication or those who undergo cancer treatment. Users of the sensitive product are given a numerical code with the purchase of the product that serves as the public key (secret). Users then subscribe to a certain information site, arranged in progress, which is, for example, SecretFriends.org, or a industrially broad corporation site, for example, DrugInfo.org. The users indicate in their subscription the public key (secret). The information reader periodically synchronizes with the site, and gives in information, some in which the product may concern1. The others do not correspond to the product. Only the advisors associated with the specific medication pass the "digital signature" test and it becomes relevant.
Security Publication When the invention announced herein is implemented as described above and deployed in the technical support application, this can be operated in initial critical security and privacy settings. The implemented system is then typically automatically interacted with the Internet and obtains and uses remote computer sources and direct human error. These sources remain resident on the consumer's computer. Typically over an extended period of time, which is evaluated periodically for relevance. When the relevant advisors are identified, the information reader displays the explanatory content of the relevant advisor in the human consumer. This explanatory content can be proposed in consumer actions that may have an effect on the computers, some devices attached, somewhere. If the consumer gives approval, those actions are then typically carried out automatically. In short, the reader of information enters into the consumer's computer documents that are processed automatically and that after processing can propose to the user potentially permanent modifications to the computer or its environment. The unanimous opinion of network professionals (see Anonymous (1997) Maximum Security, Sams.net Publishing, Indianapolis, Oaks, S. (1998), Java Securit.y., - Oxei-lly.,; Sebastopol, CA; and Baker, RH (1995) Network Security, McGraw-Hill, New York) is that the already supervised interaction with the Internet poses serious risks. In fact, the invention, in its standard mode of operation, does not expose the information consumer or information provider for risks greater than the risks the principle line involved in typical use of e-mail, browsers, and related Internet tools. Those modes of Internet interaction are currently considered acceptable risks. The invention, in a typical mode of operation, offers lower risks.
Preliminary Comments Two fundamental points are of interest. • Trusted sites. The concept of trust is discussed in the above. Users can not only write to information sites that are known to them to provide reliable information. In fact, consumers typically configure their reader. 5 information to subscribe mainly to information of great concerns that produce articles and services of interest to the consumer such as, for For example, a computer manufacturer, a software publisher, or the Internet service provider. The subscription in substantial organizations of this type Cc j.cc-i is a reasonably safe practice. Such organizations have an interest in providing reliable information to those who maintain understanding with their consumers. It is anticipated that very few of those who take risks are submitted to information consumers who write to the information authorized for such concerns. Better Advice Bureau. The Better Advice Bureau.org, which is described in the above, is a fundamental tool to ensure the safety of users of the invention. All users of the invention registered to this site. This site collects counter information, user information about dangerous sites and about bad information which is circulating. The Better Advice Bureau functions in Some respects with an immune system for the invention allows the correction of dangerous situations.
UrgentAdviceNet is another site to which all users have subscribed. This provides a special mechanism to send very urgent counter information in the consumer population.
Absence of High Profile Risk The following security discussion is considered something of the following security discussion that considers the best-known risks of Internet interaction and then explains why these well-known currently -._ ries-S5 does not arise under the invention when a typical implementation is used.
Inventory of High Profile Risks Internet operations have a past suffered from a number of active warnings that can be symbolized by three figures which have captured popular immigration. • Break-ins: Kevin Mitnick. Over a period of years Mitnick systematically used the Internet to divide it into global computers, and the administrator deliberately caused some shock or loss of data permanently. While it is assumed that Mitnick was some kind of prosecutor of the truth in those places in the that the Internet gives instructions on how to split into Pentagon computers. A Pentagon directs the experiment in 1997 showing that he used available advertising information in one could, in fact access classified DOD computers and cause permanent damage to the files. Attacks The Internet currently makes tools and software available for free, which allow its use to attack other computers of people over the Internet, causing those computers to break down. The basic strategy is to connect to several servers of TCP / IP ports in the., Compaatadora of the desired victim and feed them with requests for services (Anonymous, Máximum Security, Sams.Net 1997) Worms: Robert Morris, Jr. In an episode 1998 well-known, Morris publishes a worm which is spread rapidly through the Internet, installing itself on many machines, and while running those machines it spreads itself to other machines. In fact, Morris was invented no more than for a prank. The rapid and penetrating spreading of the worm surprised him, as the enormous amount of time required to eradicate the worm and completely recover the capabilities of the affected computers. The energetically destructive nature of the worm was caused by its ability to spread automatically, and start automatically on any machine reached. This case dramatized the risks that could arise through the automatic spreading of executable code through the Internet (Pfleeger, Security in computing, Prentice Hall 1996). Absence of Consumer Exposure to High Profile Risks The information reader does not expose the consumer to additional risks from those high profile sources beyond the principle line risk that it suffers now. The reader of information anuario, - is vulnerable to break because it does not offer any kind of interactive environment that offers log-in access, as the term breach (breack-in) requires. The information reader does not expose the consumer's computer at any extra risk of attack beyond the consumer's risk already confronted due to Internet connectivity. The information reader does not add risk because it does not make available any continuously open TPC / IP port that can be bombarded with requests. There is nothing in the outside world that can try to talk or initiate an interaction with the information reader. The information reader does not expose the network of any risk of worm. In a typical configuration, the system does not offer any mechanism for which anything can be spread from the information reader to the information reader. Server Exposure Consider the vulnerability of the invention for active threats. A server uses the invention, with any Internet-based server, that exists for the purpose of offering services in the outside world. It is visible on the Internet and open for business, typically around the clock. ,? There is no risk of breaking, because there is no interactive environment that offers download access, as the term break implies. However, the server can be bombarded with requests with any Internet server. Well-known existing techniques combat such request bombings, and operate well-known professional network sites about them. The secondary users of the server of the invention are professionals who are well equipped to evaluate and react in this type of standard threats. The server of the invention does not expose the server in any worm risks. In a typical configuration the system does not offer any mechanism for which anything can be scattered from the reader of information to the information reader, or by which anything other than an extremely narrow range of functions can be performed by the server.
Protective Influence There is a certain sense in which the invention can currently help protect against worms, break, and. attack. The information provision mechanism allows network security personnel to create advisors that diagnose whether a user is currently being attacked, or has recently been attacked. In this way, the invention functions as an immune system, allowing the rapid spreading of corrective information.
Deception Risks Indeed, the interaction of the invention is never completely uncontrolled. The information reader only interacts with information sites that have been subscribed by the user. The user is therefore in his subscription connection exercising a kind of permanent high level supervision. If the user subscribes only the sites offered by the organizations with a strong incentive to provide reliable information, it is protected. An individual who makes harmful information legally has no way to reinforce the introduction of that information in any given information reader. There is a very important category of active threat which is not widely known, that is, attacks by impersonation. In this category, the impersonation of Internet locations fails. That is, the user thinks that he is getting complicated with certain trusted sites but is currently in communication with a. "imposter site.
Another kind of impersonation is the use of dock programs that appear to be standard applications but which are currently not, and may violate and security in other ways (Anonymous, Máximum Security, Sams.Net 1997). DNS spoofing In this scenario, an imposter creates a close clone of a popular and reliable site, such as the MicroComp site. However, the imposter site also contains harmful information. DNS spoofing provides a way for the sham site to look like certain users on the network as if it were currently the popular and trusted site of MicroComp. The only way this can happen under the protocols of the current network is because the imposter interferes with the DNS search processes of certain consumers, and mishandles certain requests from consumer information aided by MicroComp. DNS spoofing operates as follows: the impostor must have access to the system level to a machine on the Internet which is physically located in X a position to intercept part of the requested domain name resolution requests with a certain Domain Name Server (DNS). The imposter program .the IP routing logic of inspecting intercepted requests looking for those to which it refers MicroComp and, when a request is found, it is returned , .. ? ~ -, s ^ a »incorrect TCP / IP address, the returned address refers to your fake information site. All the information readers located downstream from the impostor are in this way misdirected to the site of false information whenever they try to go to the MicroComp information site. The fake site looks like a real site, but distributes harmful information under the pretense of being a reliable provider. In summary, when perpetrating a DNS fraud, there is a way for an aggressor to introduce harmful information directly on one or more computers. This type of activity constitutes criminal fraud under the current federal rules. This type of fraud is rarely reported (see Anónimos (1997) Máximum Security, Sams.net Publishing, Indianapolis. In addition, a perpetrator able to take out this type of fraud can find systems using the invention that is less attractive than other internal links. For example, DNS spoofing of large e-commerce sites such as libraries and computer software stores is more appealing to the perpetrator, in the sense of providing a more rewarding end result if the spoofing is successful. In addition, the intruder can offer a site in the network pretending to be the site in the network of a certain merchant, offering pages on the network with the same general appearance as the pages in the network of the sites. Correct. The fake network site contains forms that the user fills to execute the transaction. Actually, those forms are used to capture information about credit card numbers or other sensitive financial data. This seems like a more direct way for an intruder to benefit from a DNS spoofing scheme. This type of activity affects only a certain point of the users of a large public network such as the Internet. For example, assuming that an individual consumer enjoys a secure connection to a DNS server, and also assume that the information in the DNS is kept securely, DNS spoofing is not a material threat to the particular consumer. In most moderately large corporate environments, DNS services are provided within the corporate Internet, Assuming that the imposter is outside the corporation, then for information consumers within the corporation, this threat of impersonation is hampered by the standard security devices for Intranets, ie, firewall. Certain consumers of non-corporate information enjoy access to the Internet through Internet service providers that offer DNS servers located on the Internet in physical proximity to their modem modules. Assuming that the imposter is not within the physical domain of the Internet service provider's offices, customers who use the DNS services can also be secured against DNS spoofing. In effect, spoofing is only a threat to information readers who rely on insecure connections to their DNS. In the protocols of the future network, DNS connections can be authenticated digitally, and the threat of spoofing is hampered in the initial configurations as well. Up to that point, the invention has a way of blocking this threat under the current regime by using digital authentication of the information itself. The digital authentication of the information is also of interest to those consumers who secure the DNS connections since the information can be distributed, in certain implementations, by insecure means such as an email or a sneaky network. This gives the user additional confidence in the information he receives. In a typical implementation of the invention, the term a-digital authentication refers to the use of digital subject mechanisms based on the so-called public key / private key pairs (see PGP 4.0 Users Manual, PGP Pretty Good Privacy, Inc. (1997).
This mechanism is being developed in a good understanding, mature and reliable standard. Other forms of digital authentication can be used with equal validity. The following describes how the public-private key pair mechanism for authenticating information. Information provider, for example MicroComp, acquires a pair of public key / private key, of which the private key is only a known secret for the provider. The provider takes steps, described in the above, to publicize the correct public key. The provider, knowing both keys of the pair, gives each advisor a block of subject which is interpreted successfully by an information reader who knows the correct public key. The ability to interpret the block is considered by the reader of information that proves that the author knew both keys, which is considered proof that the author is in fact in MicroComp. In a typical implementation, a user interface component informs the user that a given piece of information is assigned by MicroComp. The precise meaning of this is that the subject block is interpreted successfully using the known public key. The mechanism of the invention for protection against the threat of DNS spoofing -involves actions for both the consumer and the provider. The provider is the author of a site description file, which contains a list of the information related to the subscription, including the site location and the digital subject public key of the site. The provider publishes the site description file, for example on a physical medium or a CD-ROM disc, as part of the distribution of a software product offered by MicroComp. In this way, many consumers obtain copies of the site description file by secure means. A consumer who initiates a subscription to MicroComp submits the site description file for MicroComp to the information reader's subscription manager. The provider, provided that he is the author of an advisor, links a block of digital subject. The reader of information, whenever he obtains a piece of information, verifies that the digital subject is interpreted successfully using the public key known to the reader that corresponds to MicroComp. Unless the assessor passes this test, the information reader refuses to evaluate the information by relevance. The reader too may notify the user that there is an unassigned information that comes from a site whose site description file claims that the site provides only assigned information. The reader also offers to inform the Better Advice Bureau of this fact. 10 To see why this approach protects against t.ii-ra-sfr-i-ca DNS spoofing, it is important to understand a basic characteristic of the public key / private key system. It is commonly accepted that an imposter confronts a very difficult moment in trying to falsify the digital subject of MicroComp. This conclusion lies in the assumption that the imposter must take a successful fake subject using only the publicly available information associated with the encryption scheme; that is, the impostor does not have direct access to the private key of MicroComp, Com's. It is computationally a difficult task in extreme form for an impostor to falsify a digital subject correctly from publicly available data (see C. Pfleeger, Security in Computing, Second Edition, Prentice-Hall (1996), and PGP 4.0 25 Users Manual, PGP Pretty Good Privacy, Inc. (1997)). Is a equivalent computational task for the 'task of factoring a whole number of hundreds or thousands of digits in their main factors. Using these networks of many thousands of computer workstations over periods of many months, it has been possible to factor individual numbers with approximately 150-200 digits.
However, this has only been achieved by a kind of vast scientific collaborative enterprise. It is unlikely that an impostor will have access to the sources required to mount an effort that would succeed in the lengths commonly used in allocation algorithms-.cxggr elsewhere, there is an easy remedy, that is to double the number of digits of the keys, placing the factoring task beyond the scope of any currently conceivable collaborative effort based on currently concessible computational sources. In summary, an impostor is highly unlikely to be able to be the author of information with a digital subject which is understandable using the correct MicroComp public key. Unless the impostor can do this, the information reader refuses to evaluate the information by relevance, and thus the information of the impostors does not have a substantial threat. Key Impersonation An apparent vacuum in the system Digital authentication is the possibility of key spoofing. In this scenario, the consumer information reader has somehow accepted an incorrect public key for MicroComp, that is, a key that is not the correct key for MicroCsmp, but instead is the public key of a public key pair. / private key that the imposter owns. If this happens, then the information reader can be misled as it recognizes that the impostor's information is valid. However, the invention is designed to prevent this event from occurring. ... - or z For key spoofing to occur, the consumer subscription must be initiated using a site description file that is not obtained through secure channels, such as the installation of the original physical media software. The impostor must be the author of the false site description files and distribute them on the Internet. A typical implementation of the invention can not be spoiled by key spoofing. There are three mechanisms for this, any combination of which may be effective: • Certification of site description files. In an implementation, the site description files may include a digital subject through a central authority, the Better Advice Bureau, which testifies that the site description file that MicroComp intends to create is actually created. The digital subject of Better Advice Bureau is a physical wiring in the information reader, avoiding; with this the possibility of supplanting the Better Advice Bureau certification.
• Building of Key against Impersonation. A typical implementation of the subscription manager performs verification of the key before registering a subscription. This contains cabling information iP a, ec physical that allows you to make a TCR - /, IR connection? direct to an IP address of physical cabling of a key authentication server. Such a server verifies that a public key of organizations given is as it is said what is it? Since the server's contact address is physical wiring in the program, access to the cable server can not impersonate DNS.
• Counter information. If a certain site is successfully supplanted, you can submit to Better Advice Bureau.org an advisor who leaves all the readers of information since Better Advice Bureau.org is a built-in subscription. The advisor affirms the value of the correct public key associated with the site. These users with incorrect public keys are notified with the relevant advisor, who explains the risks involved If the matter is particularly urgent, the UrgentAdviceNet site is used. In summary, if the information reader and its subscriptions are properly configured, the consumer of the information is protected against impersonation when the provider digitally assigns their advisors. Reduction of Impersonation Threats Iia_ DNS spoofing, while significant threats to the security of the Internet, is nothing more than a threat to the invention than to other components of the Intérnete,., - especially e-commerce. The Better Advice Bureau.org and UrgentAdviceNet are important devices to help suppress the spoofing of information. The Better Advice Bureau.org and UrgentAdviceNet are important devices to help suppress the spoofing of all Internet activities. By using this combination, the Internets susceptible to impersonation can be reduced, and the attractions of the impersonation are reduced in other initial configurations outside the invention. Information Reader Limits Another potential void in the security system of the invention is the possibility that a copy of the executable binary of a legitimate information reader is acquired by an aggressor, and systematically altered then to introduce several new behaviors. The resulting illegitimate reader is then redistributed in the Internet, where it passes itself off as an illegitimate copy of the information reader, and is downloaded and used by the ? . 5, unsuspecting consumers. Nothing can stop the creation of such illegitimate readers. Nothing can stop the illegitimate versions of a software tool that displays very harmful behavior. This is best understood by the community of Internet users worldwide. i 10 Anyone who downloads software over the Internet from . ,,,. "-, sites that are not authentic software vendors * - Reliable exposes yourself to the same risk, whether the software is a word processor, a spreadsheet, a web browser or the information reader. 15 However, the important issue is the possibility of illegitimate dock readers whose goal is not to e harm but to compromise the user's security and privacy. Such dock readers contain delicate features that escape detection by casual observation but allow the delicate effects in the user's environment or by the meeting and forward direction of important information about the user. Again, the invention is not more vulnerable to this type of modification than any other piece of software. Without However, the typical implementation of the invention contains Two mechanisms that can identify dock software existence and help correct the situation. • Challenge-Server. This is implemented as part of the invention of the reader-server interaction protocol. A "" typical implementation of the < server begins its transaction with an information reader through an assignment of communication establishment, which the server challenges the reader to prove that it is a valid version of an information reader. In a typical implementation, the information reader will Xer describes to create certain blocks, deafid-tros-i ^ -with properties known dynamically in the location displacement memory known from the beginning of the program. The method by which the data were created and the purpose of creation are kept secrets. The server selects random blocks of this data and asks the reader the correct digital summary associated with that block. If the program is altered it is difficult for the code to be can execute respond correctly to the challenge. If the server receives an unsatisfactory response, the server then transmits the information to the reader that is automatically relevant, establishing that the user's information reader seems illegitimate. He information reader can also refuse to interact with servers that do not pass a digital authentication. • Challenge-Information. The invention, in Better Advice Bureau.org offers information whose. -. - 5 tried ^ esAverif ca ^^ that -one- - valid configuration of the invention is installed. The information, which can change daily, sJ3ar states that certain blocks of the "datós'lrén CPU memory are run by the reader "of information has certain digital data summaries. The blocks are ^ 5 ^ sfelee ^^ randomly by the authority of Better Advice Bureau.org or according to the design, when a certain well-known dock is for be diagnosed from a specific reason in the binary data in a specific location.; In summary, the invention diagnoses the limits and notifies users about them. "'" 20 Boundary Threat Reduction Boundaries, while a potential threat to Internet security and privacy, are no more a threat to invention than to other components of the Internet, especially e-commerce. The Better Advice Bureau.org and UrgentAdviceNet are important devices to help suppress the impersonation. The same comment applies to the limits. The Advice Bureau.org and UrgentAdviceNet are important devices to help suppress limit applications evenly. Through, the use of these devices, the susceptibility of the Internet to the activities of the limits can be reduced and the attractions of the activities of limits in other initial configurations, outside the invention is reduced. Risks of Irreducible Nuclei A threat is provoked by the defective information offered in good faith by normally reliable authors. The authors of the information have reputational incentives that tend to make them want to provide good information. The information providers in a core application, for example technical support, are part of sophisticated organizations that have the ability to do things in a disciplined way. They understand that the information must be proven for safety and effectiveness and must be released in a deliberate, phased manner. Because of this, it is likely that some pieces of information in the area of technical support applications are defective. However, there are occasional problems with information created by typically reliable providers.
The risks posed by the information are two types: First, there are the risks posed by the gathering and evaluation of the information. Second, there are risks posed by the solution processes, that is, by the users who respond to a relevant advisor who offers the user a solution to a problem. This isejgyndo type of risk is by far the most serious. When the user agrees to a solution, they are allowed effective actions with powerful consequences for the users. The information reader is not able to provide the type of protection against the effects of applying defective or malicious solutions. Instead, the security burden should fall on the user, who should always limit subscriptions to well-known trusted sites and should always carefully verify the explanation and authenticity of the author's relationship before accepting a proposed solution. an advisor In its typical configuration, the invention does not automatically apply the solution to operators, precisely because of the need for user supervision. Regarding the first type of risk, that of the meeting and the evaluation, the invention is specially designed to limit the risk.
It is true that the invention is typically used in automatically unintended mode of operation. In this way, the advisors meet from the external information sites without the intervention of the user and are automatically evaluated by relevance - if the user intervention. As mentioned previously, the consensus of the experts on the Internet is that the automatic operation not intended on the Internet posesenosos risks. However, the invention does not download, or evaluate the code "that can execute arbitrary arbitrary sources Its design imposes;. ~ S1 &? G ^ © TNEs ~ 'n so information can flow into the computer automatically, and in what the effects of automatic evaluation may have. These restrictions are specifically imposed to avoid the known risks of the unintended operation. In its typical configuration, the invention does not automatically apply the solution to the operators, even when the unintended automatic operation is performed. In this typical configuration, the effects of the automatic operation not intended in the system are effects without direction, that is, the information reader is not able to modify access to a specific piece of the system's environment. The effects are instead indirect, that is to say side effects of consuming too many sources during the download and evaluation of the information. The Side effects that have to do are of three types: (a) The gathering of information should monopolize the entire bandwidth of the network. (b) The collection of information can fill the storage device.
-HL > JX .. < (C) The relevance evaluation can consume all CPU cycles. Problems (a) and (b) --- ^ sesdt solve by reasoning of resources. The information that can flow inside the computer consists of text files. By imposing quotations of resources on The system protects against the possibility that too many sources in the network are used and protect against the possibility of too many files being downloaded to the machine, exhausting the capacity of the processor or storage device. The problem (c) is also solved in part by the reasoning of appeal. By measuring CPU usage and imgonating resource citations, invention can direct the problem. ^ Security Support of the Invention The invention is designed to support security habits in various ways. Language structure The relevant language is an example of the mobile code. Such a code is written by an author in a computer for interpretation in other computers.
Recently, there has been considerable interest in the development of secure languages for mobile decoding (see S. Oaks, Java Security, Oreilly (1998), and N. Borenstein, mi-hd of its own: The Safe-TLC Language for Enabled mail, http: //minsky.med.Virginia. edu: 80 / sdm7g / Projects / Python / saf e-tcl). Java and Safe-TCL are examples of so-called secure languages, that is, they are considered to provide a degree of security that traditional languages such as C and C ++ can not offer. sgs ?? 2EatESBsasEí &4, - > The relevance language is a language for mobile encryption. The language offers a level of security protection in excess of the current standard of the Internet business community. The interpretation of the relevance language is inherently safe than the secure languages for the mobile code, such as Java and TCL. Java, TCL, and the related languages are procedural languages. They contain control features such as loop declarations, repetition, and branch that, if abused, can consume large fractions of CPU system resources. They offer author storage location facilities which, if abused, can potentially consume large fractions of system memory resources. The remote unintentional operation of the code of these languages obtained from the Internet can in fact be dangerous, despite the label as safe. In fact, these mobile code languages typically only use in operation: aten.rrf For example, mobile Java code is typically used in network browsers, with a person looking at the screen as the code works. It is implicitly understood that the person-is & Bffi overseeing the execution of the process. 10 The language of relevance is a descriptive language instead of a language e¿_ procedure. Describes a state of the computer and its environment. The relevance evaluation is a process to determine if this status is maintained or not. This description of the state uses a language that does not show traditional control structures, such as loops, nor does it have traditional storage location facilities. In fact, the language of relevance is so restricted that it is not a complete turing. This does not suffer from famous turing detection problem which is a typical property of the procedural languages. The problem of turing detection is deciding whether a given computer program is still required or not. Most of the procedural languages are unspeakable. These contain programs, maybe even simpler, for which never it can be known beforehand it must always stop. The Java and TCL programs can be untold. You found extreme, the statements expressible in the language of relevance are decible, that is, they stop. This is a additional level of security that - ° -vara ra > s beyond the security guarantees of mobile code languages, such as Java and TCL. jLc Human Intelligibility ^ - An additional security feature of the ^ 10 invention is the human intelligence capacity of the nmi -, relevance language. The language of reievapr © iaatipene. an appearance reminiscent of ordinary English. A consumer who reads English can form a rough sense of what a given piece of information that is while inspecting the non-encrypted text of the advisor. In this way, consumers are taken to the process of ^,) understand the advisors sent to them. While it is true that unreliable information providers when writing relevance clauses or bales, they can still be able to violate their intentions, the most important point is that reliable information providers are able to make their intentions clear to consumers, and with this gain and cultivate confidence. Description and Labeling 25 The invention offers, in one implementation, a mechanism to cause information providers to label their advisors clearly for intended purposes and thereby provide the public with an accurate understanding of the risks associated with the operators, of a given solution. In this implementation, the Better Advice Bureau defines and maintains a list of special labels that * indicate the effects of a certain solution operator, for example, the subsystems affected, to the extent to which the effects are reversible, and the availability of the document. ^ ac ^ ó -, additional explains the proposed change. The information provider uses this labeling system to describe the effects of the advisors published by the provider. The information reader uses this labeling mechanism as part of its user interface during the solution proposal process. When a consumer is contemplating applying a solution operator, part of the visual interface indicates to the consumer the types of side effects that may result, according to the labeling that the provider has registered. Both consumers and suppliers under the guidance of a central classification come to have a common way of understanding and discussing the potential effects of a system modification. The Better Advice Bureau provides Counter-advisors against advisors who erroneously label the effects of their advisors. The information reader uses distinctive visual identifiers to draw attention to information with extreme effects and to draw attention to the information with unlabeled effects. The consumer may refuse to test the proposed solution operators that are not labeled, or to subscribe to sites that create unlabeled operators.
Safety Summary There are several illegal activities that threaten consumer safety. However, "for example, the system has been designated with an effective means of defense." The invention does not expose the user to risk labels in excess of those risks already experienced through the use of email and the web browser. In fact, the risks of the invention are much lower than the risks of those standard activities.There is also the possibility that otherwise the reliable authors of the information release the damage information.The system is designed to contain and correct such situations to the degree of damage due to honest errors are contained due to information that has access to only a limited complement of system resources, for example disk storage and CPU time and the use of these resources is measured and rationed in a typical implementation. The structure of the information files and the associated relevance language is relatively transparent to consumers, which helps to play a role in promoting their own safety. Finally, through the information processes, through Better Advice Bureau and Urgent AdviceNet, the invention contains mechanisms to correct security problems automatically as they arise. Privacy Matters Legfceiqμ ,, eteeia. O-rmation has access to a large amount of information about the consumer's computer, about the contents of the files on the consumer's computer, and about the interactions of that computer with devices on the consumer's computer. immediate environment. To the extent that the consumer stores information about financial, personal or medical issues on the computer, typical implementations of the information reader are able to access that information, for example, account statements and drug prescription information, to the extent that the consumer's computer has access to the network devices that are part of the consumer's work or home environment, the information reader is able to access information about that environment, for example if Certain devices are present in the environment, if they can be altered, and what are their operating conditions.
Allowing the invention to have access to this information is beneficial to the consumer, allowing the useful information to be writtenAa - > can- identify problematic situations and call them to the attention of the consumer. Much of the information, which the invention has access to, is potentially sensitive, and most of Consumers would not knowingly allow data that is disclosed to strangers. Anybody who can access sensitive information should also protect the information. As explained below, the information reader acts to preserve the privacy of the consumer. Existing Internet Privacy Standards The invention is designed to protect the privacy of the user, to offer a level of protection far in excess to the current standard of the Internet community.
Internet businesses. Internet-mediated activities, such as web browsing and online commerce, may result in the description on Network servers of information on the identity of consumers of the Internet. browser, computer configuration and also certain articles about consumer purchases or browser interests. There is no accepted individual standard of privacy, and industry groups have been formed for the purpose of gathering information about the 5 consumers of their business. and ilasar d * "and they share consumer information among themselves, consumer oriented groups such as EPIC (Electronic Privacy Information Center) will be formed in response, and there are currently political battles over consumer rights to electronic privacy .
The invention offers a status that exceeds the level of information privacy information desired by consumer groups, while providing the fine-grained internal link of messages to recipients. desired by industry groups. The standard that the invention offers is understood when considering a classification of respect behaviors / privacy threats. The ethical standards of information providers are classified into four categories, definitions of which are provided below. (Ea) Completely Ethical (Eb) Merely Ethical (Ec) Merely Legal 25 (Ed) Criminal information; • Do not make efforts to use the information gathered from a questionnaire to correlate with the future server or the network activity. Fully ethical behavior is a much higher standard than that obeyed by many actors in the current Internet business community. The Internet business community at the moment contains a wide range of attitudes and behaviors in the face of consumer privacy. There are many cases of behavior that can be classified as purely ethical, or merely legal.
The merely ethical means that the conduct of offering identity or attributes to the user of the activity on the Internet, while providing certain type of news that compromises privacy are taking place with respect to the consumer-provider relationship but not using the information to initiate contacts not required with consumers and not sharing information with other merchants. In fact, the merely ethical conduit reduces the use of information that gathers the purposes of search and internal planning, in many of them the same way that ethical companies currently use the information gathered from product registration cards. The merely legal means that the conduct of differing in user identity or Internet activity taxes only provides the minimum information that certain type of privacy commitment is taking place, and subsequently makes the maximum exploitation of information gathered under current laws, including systematic sharing information with other businesses and initiating contacts not required with consumers. - The standard of many Internet-based meeting efforts is precisely at the level of merely legal. ' Companies that collect information about the consumer rely on the web browser to notify the user that an unsafe process is taking place. They do not make any separate observation of their own explanation of what information is being gathered or how it is used. Privacy Protection The invention does not allow unsolicited interactions with the outside world. In routine operation, the invention has interactions only with the information servers subscribed to the user. Assuming that security issues, such as impersonation and limits are not an issue, the risk of compromising privacy therefore focuses on the interaction between the consumer and the reliable information provider. As described below, the The communication protocol of the invention divides the consultant communications process in the following stages: (ACP-a) Subscription. The consumer anonymously initiates a subscription. (ACP-b) Meeting. The consumer information reader anonymously gathers information from the site. ^ (ACP-c) Evaluation. The consumer information reader evaluates the information for relevance. '(ACP-d) Explanation. The consumer information reader displays a document created by the information provider, explaining why a certain advisor is relevant, and proposing a solution / response. (ACP-e) Solution / response. The consumer evaluates the; document and potentially accepts the proposed solution / response, potentially interacts with the world as a result. The invention, operates with the communications protocol of AEUP follows the steps of (ACP-a) (ACP-d) completely private and locates the information that shares the potential with the stage (ACP-e). Operationally, a completely ethical information provider never seeks to violate the privacy protection of the stages (ACP-a) - (ACP-d) protocol. In particular, a completely ethical provider never seeks perform identification of coverage or supervision of a consumer community using the invention. There is no effort to interfere with the server activity, identity or tribute of any user. There are no efforts to develop tools to interfere with the network, activity, the attributes of any user. There are no efforts to use the invention as a pure climate advertising medium, creating consultants that make unsolicited contact with all or a large number of consumers. Any effort to use the invention to gather consumer training is based on the questionnaire process at the time of resolution (ACP-e) and comes with the previous full description to the consumer at the time of explanation (ACP-d), in easily understandable terms, the types of information that are gathered, the purposes for which they are being gathered. There are no efforts to use the information received in ways not related to the described purpose of the information gathering effort. There are no efforts to use the information gathered from such a questionnaire to correlate with future server activity. In a typical implementation, the invention causes suppliers to behave in a completely ethical manner. The invention can provide mechanisms to elicit consumer awareness of standards of completely ethical conduct and knowledge of standards maintained by individual providers. The invention contains mechanisms to nullify and discourage criminal attacks on privacy and to deter dissatisfied unethical behavior. In a typical implementation, the invention has various mechanisms to promote and increase the behavior completely, ethically. "First, by provoking a reliable information site subscription, the system causes users to take care of the quality of a site. An important component of quality is ethical quality. Second, the Better Advice Bureau provides a mechanism to impart hazard counselors against unethical sites. The Better Advice Bureau maintains an open accessible list of objective causes for counter-advisors. This list makes clear to consumers and provides the types of behavior that result in counter-advisors. In this way, providers receive guidance on what constitutes unethical behavior. These providers want to preserve the trust of the ethically acting public. Third, the invention can thwart attempts to violate the privacy intent of the protocol. As described below, all legal threats to the The protocol has effective responses to the invention, and a provider must engage in criminal activity to violate the communications protocol. Privacy and AEUP iai. Y. c -. 5 ± .r_ The invention uses a protocol '(AEUP) for the: -'-'- - L O * -. exchange of information about open networks i "to the public that impose a much higher standard of information ethics than the current industry standard." Furthermore, the protocol protects against certain conduct completely .10 criminal. _ The goal of AEUP is that: - - - «- ~ 'a - The information in the machine remains in the machine, that is, information about the consumer's computer or its environment that has been accessed by the invention is not is distributed to outside teams without explicit consent In physical terms, the AEUP provides a form of membrane between the "consumer" computer and the outside world During the intended operation: Information flows inward, but no information It flows out from the consumer's computer.This restricted design is expressed in four 25 principles: (PRIV-a) The subscription act does not disclose the user's identity or attributes. (PRIV-b) The act of information of creunión does not disclose the identity or attributes of the user. (PRIV-c) The evaluation relevance issue does not disclose the identity or attributes of the user. (PRIV-d) The act of passively viewing relevant information does not disclose the user's identity or attributes. When operating under AEUP, all unintended automatic operation preserves the privacy of the user's identity and attributes. The following description describes the ways in which AEUP and the entire process of the invention allow (PRIV-a) - (PRIV-d). (PRIV-a) Privacy in the act of subscription Under AEUP, the information that a certain one is subscribing to an information site is known only by the user and by his reader of information.
This requires clarification. In common usage, subscription of words implies a type of registration process by which a user identifies a provider as a subscriber. Under AEUP, there is no such registration process.
There is no need for it. The information is made freely and anonymously available in the same way that the websites on the network make the web pages freely available and anonymously. The subscription process is an interaction between the user and the reader of information owned by the user, not between the user and a certain external information provider. The reader of information operates on the computer -de-i -trs-uario obtains from the user the selection of information sites of interest and stores them on the user's computer only as part of a database maintained locally by the administrator's subscription component. reader of information. The database controls the evaluation of the information, causing the accumulator of information to periodically gather the information of certain types and not of others. The subscription is a private matter. PRIV-a) Deprivation in the act of gathering 15 Under AEUP, the act of gathering information does not reveal information that a certain consumer is interested in certain things, or that he has a certain computer configuration. It may be objected that an information site may learn about a subscriber's identity from the fact that the subscriber's information reader frequently collects site information. However, in typical implementations, the only thing that can be learned from the act of gathering is that a connection to a information site has been made from a certain IP address. Under current network protocols most consumers have dynamic IP addresses, and thus the correlation between IP addresses and identity is weak, during typically therefore, the information in an IP address is generally of little value. On the other hand, consumers with addresses Static IPs that do not wish to disclose their actual IP address can use a Representative server. The representative servers are a well-known tool by which certain transactions of xge vd © i; s: (IP client are replaced by a three-party client-client interaction server, with the server representative request data and encircling it in anonymous form to the client For the server, it seems that the representative is the client For the client it seems that the representative is the server There is no address contact between the server and the client The server never gets the identity of the client tell your IP number The invention, in one implementation, is configured to offer a universal representative service to all users, and the information reader offers the user as an optional means of connection, the use of such a server, in such an implementation , the Better Advice Bureau.org or another central authority offers a meeting server Anonymous information that accepts requests for information gathering of users, separates them from return addresses, routes them to information sites and directs them to information returned to the user. That mechanism cancels the user's IP address, f'- C-JÜr < -_-_- The act of gathering can be through 'disclosing the information because the accumulator selects only certain documents among these available -in the information site. This objection is based on a misunderstanding of AEUP. In a typical implementation, the information accumulator always has access to A * or "dtfs" The available documents in a certain site, which is no longer present in the consumer's machine No selection of any kind is made in the meeting time. Relevance is determined only after all the information has been gathered and stored on the consumer's computer The only correct interference that can be made from the behavior of the information accumulator is that the consumer has a subscription currently running on that site This approach is very different from current popular approaches to obtain relevant information using the Internet.In the current popular approach, the user fills out a form that expresses, for example, preferences, characteristics and configurations of the system. This form is sent to the server the server then it responds to the consumer in a focused way, roasted in the information that was contained in the form. This standard process reveals information about the consumer to the server. • - .surfanrí. In the approach of the invention, the preferences of the consumer and configurations are maintained confidential in the consumer's machine. All the information offered by the site is taken to the machine of the consumer and then it is evaluated by relevance in uQOS private. Acc -.uos A Privacy in the action of the evaluation of relevance (PRIV-c) The relevance or irrelevance of a given piece of an information can point to an important agreement of information about a computer information for the consumer and its development. A focused condition very small, specifying the contents of the profile of the user, and the contents of specific files, can communicate if there is an important agreement of information about the user.
If the reader's report allows the fact of relevance or the irrelevance of an informant for get out of the reader to the outside world, if it compromises the user privacy. If this happens during a unattended operation, the result can be very serious because many hundreds of informants are being evaluated for their relevance. If there is a mechanism to systematically discover the relevance of an arbitrary collection of ^ the most-of-the-pieces of warnings, a complete profile about the consumer and its development comes out. In a typical implementation, the procedure for evaluating the relevance of the reader's warning has as its effect only externally observable a result of the user's interface status, the user is notified when a certain part of a notice has become Relevant and this is all in a typical implementation, the simple fact that sometimes it is evaluated for relevant causes without outside activity of the user's computer that can be observed by others There is a possible exception to this when remote inspectors are usable. See below The action of passively viewing a relevant information does not disclose the user's identity or attributes. (PRIV-d) Reading a text file in the privacy of an own interaction with a computer does not offer any breach of privacy. There is a known need in the outside world for the file to read, however, read a web page is a different matter. A void in the way of privacy maintained by the invention is opened by the carelessness that HTML or other hyper-linked media offers us as a valid type of a report content in the qualifying component Q? Rlelel-Informant. The discussion below describes the "1 emptiness and its consequences and describes why the invention, in a typical implementation does not leave this vacuum open usone Obligations in Solution Operations - * The final stage in the chain of is the application of a recommended solution operation. Due to this operation which can be an essentially arbitrary operation, it is not possible for the invention to control the effects of this operation. In particular, the recommended operation includes electronic correspondence with the author of the information, the identity of the disclosure and the attributes. For this reason, there is a designated obligation. (PRIV-e) In typical executions, the information reader does not apply the operators of the recommended solution automatically. They can only be applied after user approval. Due to the open-ended nature of the operators' solutions, the consumer plays an important role in protecting their own Privacy. The action of the application of a recommended solution operation may disclose the identity or attributes of the consumer, with which the consumer knows this or not. An author of unethical information can create operators that are • bad, while claiming to make an adaptation of operation, being able in fact to conduct electronic correspondence in secret, without the information to the consumer. The consumer will only agree to apply the solution operations which come from the authors to proceed in an ethical manner. Remote inspectors: Output of Plugging Leaks Lock. In one implementation, there is a potential violation of the privacy of the relevance assessment procedure, based on the approval, such that the reader of the information that allows the conditional evaluation of the modalities, and the approval that the modalities of relevance they can refer to the conditions which are verified by the queries that are made to other computers and / or to other remote devices from the computer in which the reader of the information is running. A careless execution of a remote inspector creates the activity of the network such that it is observable to the outside world, and from which the value of the activity of certain modalities of relevance is concluded. The inspectors, which originate the activity of the network are not central means of the invention, and this particular privacy therefore ii. Threatens to affect certain executions of the invention. (Comparative discussion of the Channels covered in Pfleeger, Security in Computing). Considering who listens illegally and who does it about the value of the modality of the relevance R when it is evaluated for the relevance of a certain machine of the It is assumed that the illegal listener operates an information site which is trusted by the consumer and is subscribed by the reader of the information, so that the illegal listener can enter the information in the machine. It is assumed that the illegal listener knows that the reader of the information contains an inspector which, when calling through mode I, generates the activity of a network through a piece of the Internet under the control of the illegal listener. For example, the illegal listener is supposed to have a level access to the system to an Internet node on a direct path between the consumer machine and a destination machine such that it is consulted as a result of some inspector call. The one that listens illegally, then is in a position the logical IP transport program to the node under its control to make a note of the existence of IP traffic between the consumer and the recipient. In this hypothetical situation, who listens to m &&33L PFs? • You are illegally in a position to the author of R and I correcting and to publish the information to your information site. After this information is ,, _., _ Captured by the consumer's machine, 3 ~ - is automatically evaluated for relevance. 10 In an execution of the information reader, -mts.f?,., - t -., ny-r- '?., the, evaluation of a modality A and B "stops ^ - ^ immediately as soon as A is determined to be false, because it is not necessary to know the value of B to finish the evaluation of the sentence As soon as A 15 is determined to be false, the sentence A and B is known to have the false value This scheme is referred to as? ^ a conditional evaluation There are executions of the information reader that do not perform the conditional evaluation.20 These schemes allow the evaluation of all the subexpressions of an expression before concluding the value of the expression The decision to use the conditional evaluation in an execution is based on the considerations of the realization.The readers of the information use 25 conditional evaluation that runs typically faster.
Assuming that the reader of the information executes the conditional evaluation as described above, then the activity of the network indicated by the modality I, only occurs if the R mode evaluates the exact i-fe- ^ -The one that listens illegally it is in a position to observe this activity of the network, and therefore to conclude that the R mode evaluates the exact. Information . about the consumer has left the consumer's computer due to the evaluation of the relevance. In the discussion of this hypothetical situation, it will be noted that the activity of the illegal listener of what corresponds to the described, constitutes a form of electronic invasion and may be illegal. Such situation requires either that the author of the reliable information is by himself someone who hears illegally, being in conspiracy with the one who hears illegally or does not act to prevent the unauthorized information since his name is introduced, for example by signing from his information. The consumer of information can protect himself from this threat by subscribing to the sites of reliability only, for example sites that meet the standard of completely ethical behavior. The consumer of information can also be protect itself from this threat by the configuration of the information reader to restrict the domain allowing verification of relevance to a domain where he has physical control. In extreme cases, this means limiting the relevance to verify the verifiable conditions only 'in the machine' where the reader of the information is running in. There are four mechanisms in the present, with which the reader of the information can allow the activity of the network and still protect against this type of illegal listening • The Conditional Evaluation does not pertain to the modalities.This reader of the information is configured to avoid the conditional evaluation. there is no information about the evaluation of the relevance that is revealed by the existence of the activity of the observable network between the consumer and the recipient.
• Reorder randomly the sub-expressions for the conditional evaluation. In the evaluation of a modality A and B, the random analyzer reduces the modality to the equivalent of (& A B) with the probability of 1/2, and to relize (& B A) with the probability of * í. When this is done, the fact that the activity of the remote network occurs in the evaluation of the R and i modality implies that either a good currency has been launched or that the R mode is accurate. This does what impossible in a particular example to determine when R is acting accurate for the user in question. • Allow forced evaluation of sub-expressions network activity. The reader of the information is configured so that each of the inspectors have an assigned remote activity which is adjusted by the inspector causing the activity of the machine, which runs the inspector. The reader of the information, in the analysis of the modality of the identifies those sub-expressions which have been attributed to the Remote activity and the forced evaluation of those sub-expressions. • Undocking the network activity from the relevance evaluation. Inspectors with the attribute of the Remote-Activity are required to work only on the associated memory data, using queries of call rows, to a pre-specified location or collection of locations. This means that an inspector, when it receives a search for a determinable attribute only remotely, can verify a local associated memory. If the answer is in the associated memory, respond with the answer. If the answer is in the associated memory, it responds with the answer. If the answer is not found in the associated memory the search is placed in the row of calls for a future evaluation. Independently, a process runs according to a fixed scheme, for example once a day, which communicates with a fixed list of machines time process all searches are in the associated memory on the last day. In this way, the evaluation of the relevance per se does not cause the activity of the network outside the regular activity of the scheme. An appropriate combination of these machines can safeguard the evacuation of relevance, even in the context indicated of who listens illegally in a criminal manner. HTML: Plugging output. The final appearance of the typical modern HTML document is the product of several files better than just one. The HTML document itself provides a class of the logical skeleton of the display unit, and an inventory of the textual component, and a collection of links of various graphics and multimedia files, which provides the visual components. In the browser Traditional network practice, the Web browser builds the image obtained in a series of stages. First the HTML file is captured and the skeleton of the document is obtained. If the HTML document refers to the files of multimedia located remotely, then the Web browser starts to capture these files. After the files arrive, they are used to format and obtain the final display unit. 5 Assuming that an information provider has authorized an informant to have an HTML file, making reference to the files located on the server of the provider of the information in his declaratory host. It is also assumed that the reader of the information comes as a traditional web browser aejon to have HTML. As soon as the information is stored, the guaranteed graphic files are captured from the information server. In other words, there is reportable activity on the server of the information originated by the fact of the reading of the informant. If the informant is irrelevant, the HTML is not obtained and therefore the non-obtained HTML never leads to a capture of the multimedia file, the server can conclude from this activity such that an information evaluates to relevant. This constitutes an output of information through a track membrane, returning from the consumer to the supplier. A provider of ethical information completely, you should not take any news of this activity. Without However, a provider of purely ethical information, You can in principle exploit this fact to sometimes hear about the consumer population. Unnecessarily, such information provider may authorize an informant referred to a file of,. 5. special multimedia, designated- for, only ~ by this A and informant. Counting the reference number of the multimedia file, and dividing by the number of captures of the information by itself, it is possible to obtain an estimate of the percentage of the population of consumers which exhibit a certain combination of circumstances. mz sszszzs:. "a However, the invention, in a typical execution¡s * -s5SBn_2r- takes the steps to thwart this adaptation of activity- Inducing the outputs of this class, it is considered less than ethical completely, because it is combined with another unethical conduct, which may compromise individual privacy. What is true, that such an exit has an innocent and useful application. As long as no correlation is made between the previous information that comes out and the individual identity, it can be argued that the output is can do to serve a constructive purpose of information provider information about the general user population. However, the existence of such an exit creates a temptation to make such a correlation, which leads to serious abuses of privacy. 25 There is another mechanism that can be used which, the invention offers similar feedback to information providers while protecting individual privacy, for example, random response.
The discovered attempts to exploit the output originated by HTML, a typical execution of the invention can employ one or all of the three mechanisms: • The Representative server HTML-A. By working exclusively through the representative server, the reader of the information can destroy all the correlation which can otherwise be visible to the information site between the identification of the 'collector and the fact of the capture. In effect, the reader of the information is the search of the multimedia file from the representative server better than from the original site. In one execution, the representative server with its memory associates the multimedia file locally and thus serves for most of the searches for the multimedia file while only asking for the file only once from the information site. Information sites can find this arrangement advantageously because of minimizing the load on their own server. In return, they may lose the ability to make the population attributed to prevalence studies, or to make the correlation between identity and attributes.
• HTML-B immediately captures all the multimedia. In an execution of the invention, the capture method includes the automatic transfer of all the multimedia files referred to in the HTML of a . > you < ± r- 5 informant. This works as follows: A preliminary analyzer of the information leads to a list of all multimedia files referred to the source ? ? 3 ^ i of HTML of the declaratory component of the information. The information of the collector groups these files immediately, ensuring that if the information is J2CG &.ß2.'iaii 'becomes relevant, the file ^ s ^ LXfe? ZPz-á &ie locally. For this structuring of the invention, there is no connection between the fact that a file is captured and the possibility that a certain informant may be relevant. The mechanisms (HTML-A) and (HTML-B) can be used simultaneously. This is, a representative server can capture the information to a client's favor, and also all the multimedia files contained in any source of HTML contained within the information. The reader of the consumer information initially belongs only to the informant's files, and not to all the multimedia files. At an appropriate time, the multimedia files are captured from the representative server.
In this way, there is again no connection between the fact that a file is captured and the possibility that a certain informant may be relevant. • The HTLM-C transfers media randomly. In an execution of the invention, the averaging processor includes the random transfer of some of the multimedia files referred to in the HTML of some of the informants. This works as follows: Unite preliminary analysis of the informant leads to a list of all the multimedia files referred to in the HTML source of the declarative component. del35-: Í! irpfejrmap.tB, La-aaté. The captured information periodically captures a few randomly selected files from such a list. This ensures that: for any informant, that an author of public information, a large fraction of the multimedia files are accessed, for no relevant reason, but they must result in experiments of pure change. • Partially, this ensures that between these clients in 20 where the informant becomes relevant, for most of the files that are already locally usable. • Under this execution of the invention, there is no logical connection between the fact that a file is captured and the possibility that a certain informant is relevant.
Whereupon the connection can be in a probable manner and can be made weak by appropriate selection of the frequency of the random transfer. Support for the Ethics of Privacy. c? or e 5 There are three meta-principles: - the -invention which help to force the information of ethics.
• Ethical sites. Consumers will only be subscribed to known information sites in order to behave in an ethical manner. Most of the consumers configure the information reader for Subscribe mainly to the information of large companies which manufacture good articles and services of interest to the consumer. For example, a computer manufacturer, a program publisher, or the Internet service provider. Subscribing to substantial organizations of this type is a reasonably safe practice. Such organizations have an interest in providing reliable information so that they remain informed with its consumers. Few are the risks that information consumers have who subscribe to the information authorized by such companies.
• Clear definition of ethics. The Better Advice Bureau is a fundamental tool to cover behavior ethics of the authors. All users subscribe in this site. This site compiles the information counted, the users give notice about the unethical places and about the unethical information which is circulating. The Better Advise Bureau defines a solution operator as unethical if it develops the disclosure of the information to the author, without first informing the user that such information is to be disclosed or without informing the user about the security about the nature of the information. which is to be disclosed. If the pieces of misinformation are circulating, which behave nots-ethically "and then have the attention of the Better Advise Bureau.org, you can release the informant from the counter of information against them. Some aspects, such as a system for protecting the privacy of the invention, allow the correction of unethical situations • Clear identification of side effects To make the definition of clear ethical behavior and the deviation of clear ethical behavior, the Better Advise Bureau describes a set of identifications to be linked to the informants, indicating the potential side effects of the solution of the operators, these identifications indicate: The critical subsystems which can be affected by the solution proposed by the informant. When the solution can be revealed by using the solution proposed by the informant. What types of information can be revealed. 5 If the information is to be re-issued ,. when it can be used for the market / send by mail. If the information can be disclosed, when it can be negotiated with other companies. . .;, - ca .1 Complete ethical behavior, demands that the 10 authors of the information identify their information conformity to its effects of its consumption < Ad.Stg.potentials and The Better Advice Bureau considers the basics for an accountant's informant if an informant is not identified. Persistent efforts concerning the bad 15 information are considered by Better Advise Bureau supporting for an informant of the site counter subscription. Interactions alternated by the Client-Server. A key component of the invention is the synchronization between the consumer and the provider of image sites This occurs in accordance with AEUP However, there are other embodiments of the basic invention in which synchronization is effected by different means. These are described below: 25 Anonymous Selective updated protocol.
Under this protocol, the act of subscribing and the act of synchronization are both anonymous as in the AEUP. However, the updating process is selective rather than exhaustive. Definition of ASUP. Under ASUP, each of the messages of the information is extracted in a short form consisting of at least one identifier of the message referred to the original information, the relevance mode of the original information and, potentially, the other information such as a title line. Under this protocol, the information server, in addition to the directory messages and the complete message files, also serve the reader of the information of the extracts of one or most of the informants. . Under ASUP, changes in recruitment processes. The reader of the information, instead of ensuring that he has the complete body of each of the informants of the information sites, ensures that he has at least the extract for each of the messages. Do this by finding the subjects for all the excerpts of all the informants that are few due to the previous synchronization. Under ASUP, the information database changes. The database contains two kinds of entries: Total informants, and extracts of the information. Ba or ASUP, the reader of the information program evaluates the relevance of all the modalities of relevance that have been obtained, both of these modalities contained in all the informants, and those modalities contained in the extracts. Under ASUP, a relevant information can activate a new contact route between the reader of the information and the information site. Depending on the configuration, the reader of the information, either in anticipation of what the user wants, the full reporter or after a direct user search, establishes a connection to the information site, and the search of the bodies of certain informants. The result of this protocol is that, when the reader - of the consumer's information, accesses and evaluates all published relevance modalities, it does not transfer all the published informants. Analysis of ASUP. This protocol can be advantageous if the published informant consumes considerably more memory than the extracted informants. If the consumer saves time in accessing a large body of informants and saves the provider's time, in the service searches. A potential failure of this protocol is the possibility of compromising the privacy of the consumer. Under the ASUP protocol, it is conceivable that an information provider tries to make deductions about the consumer based on the observation of the informant files sought and not searched by the reader of the information. If the protocol is implemented exactly as described above, the consumer never looks for the full informant when the modality is not relevant and always looks for the full informant when the modality is relevant. An information provider that tries to listen to information about a specific consumer, in principle, correlates the search of the server, for the complete information with the IP address from which they come, concluding the searches meaning the relevance of the corresponding informant of the corresponding computer . If the IP address is permanently assigned to a certain consumer's computer, the provider in principle correlates that search with the consumer's identity. In this way, information about the consumer can be returned to the server again. Protection of Privacy under ASUP. • Random capturing. The potential for the release of information is reduced by having the informant bodies that look for the reader of the information for some informants whose modalities of relevance are not Relevant This is done by a random mechanism. Each of the bodies of the complete informant is searched with the probability p, where p is a specific number. • Representative server. The potential for information output is reduced by having the bodies of the information complete the reader's search for the information through a representative server, which anonymously follows the body's search of the informant to all the information sites, and so both masks the site of the identity information of the search engine. A centralized representative server, for example located in Better Advise Bureau or at www.advisories.com is made usable for this purpose. • Owner Server. The potential for information output is reduced by restricting the . supply of server programs. If the single server program which works with the protocol of the invention does not make the correlation between the consumers and the informants that they search, and also does not file the searches, and if the users of the server program do not try, they frustrate the attempt of the owner's protocol by illegally listening to the server, the reader's transaction, then there is no exposing personal information to the server as a result of ASUP. The provision of the server program can be restricted by modifying the reader / server interaction so that a certain security of the signal sequence between a computer and a peripheral is mandatory. By using a digital encryption technology as part of the security of the signal sequence between the computer and a peripheral and by accessing the restriction to the keys of the signal sequence between the computer and a peripheral appropriately, an access restricted to the ability to build the server program. Prohibitions against illegal listening in client-server interactions can be forced contractually. The valid server program can make usable only in the condition that the receivers do not listen illegally. Since there are several avenues of security safeguarded under ASUP Protocol updated exhaustive not anonymous. In certain regulations, the concept of anonymous subscription is not not practicable, for example, due to the informants that are made available only on a per-payment basis and reader / server interaction. it includes a segment of the sequence of signals between the computer and a peripheral in which the reader can qualify for himself as a paying customer. A variant of this scenario is to provide the information to the members of a club, where the members are not in any reduced sense payment for the subscription by themselves, but they need to be members for the quality of the information. The non-anonymous exhaustive update protocol (NEUP) is applied in a non-anonymous configuration where a subscriber exhaustively updates the transfer of all the new information to each of the synchronizations. Under NEUP, consumer privacy is protected in the following sense: While the fact that the consumer's subscription is known to the provider, the routine act of capturing information and evaluating relevance does not reveal information about the consumer to the provider . Updated Non-anonymous Selective Protocol. In certain configurations the concept of the subscription is not practical and the use of the exhaustive update is not feasible either because there is a very large body of potentially relevant informants to consider that each of the informants is larger in size, and very little of the informants are !3. 4 similar to be relevant, so that consumers and suppliers are not willing to devote resources to the exhaustive update. The non-anonymous selection update protocol (NSUP) provides these non-anonymous configurations, where the reader of the information is selectively updated, first obtaining extracted information, evaluating the relevance, and finally transferring the relevant information. The NSUP itself provides the consumer with no guarantee of the provider's privacy. The fact of the consumer's subscription is known to the supplier and the act of the routine of the information captured and the evaluation of the relevance reveals to the provider which modality of relevance is true. Under NSUP, there are several mechanisms to help protect consumer privacy, for example, the random, the representative server, and the owner server. Alternate Information Distribution. Centralized Information Server. In one modality, a single centralized site stores the information offered to most of the different information providers, with the different information sites currently serving as different subdirectories of a single file system.
All information readers operate on consumer computers by synchronizing their site images by contacting this centralized site and search resources, such as informants, from this site. In practice, the only site currently consists of a collection of computers that view each of the other functions and contents. This provision has an impact on two areas: • Privacy. This provision prevents providers from illegally listening about the identity or about the relevance attributes of any of the consumers by isolating the consumers from the providers. In particular, the ASUP protocol is secure in such a configuration, providing the central information site and not archiving or analyzing reader-server transactions. • Security. This provision limits the sites of the information to those certain standards of satisfaction imposed by the management of the central server by restricting the supply of the information sites, and thereby ensuring that the information sites are being run by the responsible organizations. . The centralized site allows information providers to update the contents of their sites of the centralized server by using standard methods, such as FTP or related transfer file methods. Centralized Representative Server. In one modality, a single centralized site is usable to act as a representative server for all information readers. There is a widely distributed base of the information sites. However, most users do not go to those sites individually. Instead, from this they configure their information reader to provide all the information through the centralized representative server. This is particularly true for users with regard to privacy violations. The centralized representative server memorizes the information that is offered by the majority of the providers of the different information. Readers of information on consumer computers look for the proxy server to make usable resources, such as informants from certain information sites. If those resources are usable in the representative site, they are immediately served to the user. If they are not usable, the original site is required for the resources, which are 2M both followed anonymously for the user. And also placed in the associated memory of the representative site. The information site includes a method to point to the centralized representative site when the original site is changed, indicating that it is the time to equalize the associated memory (see Hallam-Baker, Phillip M. (1996) Notification for Associated Merchants Representative, World-Wide-Red Consortium Technical Report, http: / www. w3. org / TR / WD-representative). This provision is addressed to consumer privacy companies. By isolating consumers from suppliers, this provision prevents providers from hearing about the identity or about any relevant attribute of any consumer. In particular, even the ASUP protocol is secure in such a configuration, providing the central information site without the file manager, or analyzing reader-server transactions. Re-sending of Centralized Anonymous Information. In one modality, the distribution of information operates through the use of Internet email, routing through a centralized re-shipment through the use of anonymous mailing lists. The site architecture of the information discussed above is maintained. However, there is a basis Distributed ampli mence of sit inf of information. Most readers do not make contact with those sites directly. Instead, they provide the information by anonymous mail. In this structuring, the information email sites their new informants to the central re-shipment site, which in turn the email sends the list which is kept confidential, consisting of individuals who have contact to the central site and establish a related subscription. In this structuring, there is a small form of the informant specially designated for backsliding.
The information sites handle the backward movement of the information by means of the return of the informants' email to the central re-shipment site, which in turn sends the email list. Under this provision, the reader of the information cooperates with the reader of the electronic mail on the consumer's computer and with the consumer's email reader configured to automatically filter the information in a designated mailbox for the reader's access to the information. . The reader of the information performs the synchronization of the site, without any contact to the site of the original information, but instead, by interpreting the contents of the mail that are arrived due to the previous synchronization. This approach is particularly suitable for working with Internet mail servers P0P3. this provision is essentially an implementation of the AEUP protocol using e-mail. None of the facts that a certain consumer has a subscription, no fact of a certain information is relevant is generally usable to the information provider. Under this arrangement, a via membrane that the AEUP provides it becomes particularly clear to consumers. Consumers will understand that the information site needs to know that they subscribe to the site and that they are never in direct IP traffic between the consumer's machine and the information site. They can see, by inspection, the plain text of the mail, so that the informants do not come directly from the information site, but instead they are anonymously transferred to them from the re-epigra of the centralized information. A potential weak brief announcement in this provision is the existence of a secret mailing list whose secret is compromised. To inspire consumer confidence, it is better that centralized re-shipping is operated by the reliable consumer finding authority. By isolating consumers from suppliers, this provision prevents providers from hearing about the identity or about any relevant attribute of any consumer who participates in this provision and who does not select to develop anything at the provider's will. . Diffuser of the Information of the USENET. In one modality, the distribution of information operates through the transport of news from USENET. The site architecture of the information described above is maintained. There is a widely distributed base of the information sites. However, most readers are not in contact with those sites directly. Instead, they provide the information by USENET. In this structuring, a complete collection of USENET newsgroups is created, for example one per information site. The information site, from time to time, places new information to USENET, which in turn originates the new placements to be distributed to the entire world to all the machines that operate as the servers ij qtupos of news. Under this provision the reader of the information then performs the synchronization of the site, without contacting the original information site, but instead uses the USENET protocols., to contact the server of the newsgroup and access new placements in certain newsgroups. This arrangement is essentially a structuring of the AEUP protocol using USENET. No fact is such that a certain consumer has a subscription or the fact that certain information is relevant is generally usable to the information provider. Under this arrangement, a membrane pathway that provides AEUP becomes particularly clear to consumers. Consumers understand that the information site needs to know that they subscribe to the site and that there is no direct IP traffic between the consumer's machine and the information site. In fact, due to the action of receiving the news via USENET it is anonymous, there is not yet any mailing list and thus the centralized information base does not exist linking it to the information site. Program Channels. In a possible modality, the distribution of information operates by the use of which they are commonly referred to as channels through the ies ion of the suppliers, such as Backred, Marimba, and Pointcast (see Ellerman, Castedo (1997), Channel Definition Format, World-Wide-Red Consortium Technica L Report, http: // www. w3. org. / TR / NOTE-CDFsubmit.html). In another modality, the distribution of information operates through the use of electronic mail lists. In any case, the distribution method is referred to as a channel. The logical relations are the same. Note the changes of importance below if each occurrence of the word channel is changed to the mailing list. The site architecture of the information discussed above is maintained. There is a widely distributed base of the information sites. However, some readers do not contact those sites directly. Instead, they receive the informants through the channels. In this structuring, a complete collection of channels is created, perhaps one per site. The information site from time to time pushes new information to its channel, which in turn, originates the new offers to be distributed to the entire world to all the machines that subscribe to such channel. Under this provision, the reader of the information performs the synchronization of the site through the listing of the data entry in the channel and processing the input of the informants as they are arriving. This arrangement is essentially a structuring of the NEUP protocol. Under some implementations of the channels, the fact that a user has a subscription is known for the content of the provider. Typically, the fact that some information is relevant is generally usable to the information provider. Under this provision, a membrane pathway that AEUP provides it becomes particularly clear to the consumers, if the channel providers correctly offer the channels in one way and explain this to the consumers. For example, mailing lists will be well understood by consumers, to offer that it is typically a one-way communication. Consumers understand that communication only becomes two-way when the consumer wants to start the contact in the other direction. Alternating mechanisms to promote consumer confidence. So it has been assumed that the main companies that have a consumer power have that privacy must be solved technologically. This point of view has been seen that it is only possible to protect the Optimization of the consumer through the development of a system, which is literally impossible for information providers to make valid conclusions about the relevance of certain informants to specific consumers. It is an important achievement capable of isolating consumers in this way. However, this isolation leads to the cost of certain obligations. In addition, some consumers may not be able to accept that there is a purely technological solution to the problem of privacy, and those consumers may suspect that any technological solution inevitably has faults, for example the exit from time to time. Such consumers care about what happens if an exit occurs, and they are not persuaded by the safety of the technology that the exit can not occur. Such consumers may be more reinsured through explicit bonds in the part by the suppliers of information that leaves not being exploited by the suppliers. 'One way to direct the consumer in relation to the intentions of the information provider is to restrict the information provider's population fair to those providers who have signaled and who are occupying a contract to behave in the ways in which offer to consumers guarantees. This has three components: • Ethical standards. A fundamental document is made usable by providing a well-known definition of ethical behavior. Certain information providers have this document signed and deposited with a central authority, such as Better Advise Bureaur, which publishes the identity of the signatories.
• User interface. Users give an option to restrict interactions just for providers who are known to follow ethical standards.
• The restriction of Server privileges. The reader / server interaction is protected by the mechanism of the signal sequence between the computer and an owner's peripheral, and access to the secret codes of the signal sequence between the computer and an appropriate reader / server peripheral that has license only for those who have signed the ethics agreement. There are two natural ways to do this: Through a centralized server strategy, in which the readers of the information have their operation restricted by the signal sequence mechanism between a computer and a peripheral in such a way that it can only interact with a server of the centralized information, serving the LO information? of those sites known to be required to follow ethical and known standards to be in compliance. Following a proprietary server strategy, in which the information readers can only interact with the information servers that have the sequence of signals between the one computer and the appropriate peripheral, and the sequence of signals between a computer and the peripheral is known only to servers in information sites that are linked ethically. In sum, there are some providers who have signed an agreement that makes a contractual guarantee of the privacy of the clients. There are some consumers who want to agree only with such providers, and there is a technology mechanism to restrict the reader's access to the information that they access for those providers. Models of Evaluation of Alternate Relevance. The General Image: Comparison State. In effect a modality of relevance is an affirmation about the state of a computer or its development or the state and the development of computer devices that can be reached by the computer. The language of ReLevancia provides a way for an author to describe the components of a computer's state. However, there are other ways that components of the state can be described. The reader of the information and the associated inspector's libraries give a way to compare a description of the state with the current state. However, there are no other ways than state components that can be compared with a description. Vigilante community. An alternative method of state description can rely on a community of watchdogs for example, specialized applications, each potentially with its own unique companies and architecture, which can analyze specific assertions about the computer or its development. Such an application is referred to as a vigilante. Consider a file watcher application that you observe to see if certain files have appropriate attributes. This application maintains an affirmation database. Each of the entries names a file or directory, a list of specific attributes of the object, a frequency of the specific observation and an indicator for a message and an appropriate action with the failure of the statement. The examples of the specifiable attributes .48 include the existence, the name, the version, the size, and the checksum. The monitor of the file system runs continuously at programming times, or under the control of the user, who comes through its database of the affirmations, and verifies that each of the entries has the states affirmed, for example, each file has the specific attributes. If an entry is found that does not have the required statuses, then passes the affirmation about the failure of the affirmation, along with the message and the actions associated with the affirmation, to a user interface module. The user interface module, a part of the watchman's application, and a commonly used application crosses the entire system, presents the user's statement about the failure of the condition of the claim and trusts the associated messages and the recommended response An application from the watchdog file also interprets messages that make new statements about the state, or revokes old claims. The reception of such a message causes the watchdog file to update its database to include the entries that make the new statements or to delete the entries that make the statements revoked. The vigilant file itself receives these messages from a message module, which is part of the vigilante application, or an application used in commonly crossing the entire system. A remote author who wants to affirm the conditions about the messages of the authors of the computer consumers referred for the application of the file of vigilant of conformity to a specifier of the affirmation of the posted file of vigilante. This is an entry of the homologated database to the entries in the database maintained by the watchdog file, or a textual description of an entry, using a keyword language or another device of the humanly interpreted description. Such a specifier is packaged to transport it through networks or through other digital transfer mechanisms. Such a package is distributed to the consumer's machines by any of the methods listed as follows, for example: AEUP, ASUP, NEUP, NSUP, email or channels. Some potential advantages of this research include: • The performance efficiency of the specialization. A vigilante, because it is specialized, is written to optimize speed in complementing a specialized set of tasks. For example, if a system of The VLqLLante file has several vigilant files in the same directory, doing so, while obtaining a directory structure that accesses better than several, thereby saving disk operations. If possible, avoid certain operations that are known such that they are consequently based on certain previous operations. If several different statements must be tested, about the same file, it is possible to make a single file that you access to give information about everything simultaneously. In addition, if the guard accepts the instructions in a predefined format that avoids the need for analysis, the statements can be evaluated more quickly. The energy of specialization performance. A vigilante, because it is specialized, is written to be used in a convenient way to describe a specialized set of tasks. For example, if a guardian file system accepts expressions in a language, such a language is designed to incorporate useful languages well-supplied with other systems. Thus, in soft UNIX cards, [a-z] and related constructions are useful in the efficiently described properties of file systems, for example, in the reference to a large ooleccLon of files with similar but not identical names. A vigilant file system makes use of such specialized language without impacting the design of the other guardian's interfaces in the vigilante community. • Specialized programming algorithms. A caretaker, because he is specialized, is written into a program execution of the specialized task set that is appropriately addressed. For example, a guard file system operates in a continuous observation mode that follows a specialized programming algorithm, which is different from the algorithm used for a guardian configuration system. In certain operating systems, for example, a file system itself maintains information about any of the changed files or directories, which is used to delay the evaluation of statements because such statements are known. that have no change due to the previous evaluation. • Specialization performance of security and privacy. A vigilante, because it is specialized, is written in a block of certain damages or revelation claims. For example, a guard file system has several privacy scopes and configurable security to the user, facilitating the user the control of access to certain files or elements within the files. The collection of the archives is great. In addition, vigilant file systems and guardians configuration systems, files such as guarding devices, print watchers, and vigilante networks are provided. Community of vigilantes is the same invention. The investigated community of vigilantes is a variation of the invention. There are two ways to understand this point.
• As a structuring of the layer. It is mentioned that in the invention. The inspectors' libraries have their current implementations that are carried out by variations of such specific watchers. For example, a guard file system is to build to observe several characteristics of several files. This is then explored by the reader of the information, as follows: Methods related to the files that are issued in the reader of the information are implemented as queries to the file system watchdog. Questions to the file system watchdog each query and register the query in the database of The affirmations. The same expedition occurs the next time. The file system watchdog is a specialized associated memory program, and the optimization to have the cheapest response is where it is feasible. In this way, the vigilante community is a structuring layer for the inspectors and the interface / messages program of the vigilante community in the information reader program. As a variant of the structuring. Another way to see the vigilante community is related to the invention that is to notify that the modalities which we see most attractive about vigilante research, such as specialized languages suitable for specialized tasks, are provided under both investigations . The UNIX pattern languages are implemented by creating an appropriate name of the referred World for the localized files which accept the UNIX style patterns as the sequence of the specific name. The fragment: localized files not existing "* .mat" whose (creator is "MATLAB") Which asks for a file in the UNIX notation that is provided by cor. the language of the invention through an inspector for the employer of UNIX from the appropriately Plurally located files. Set of companies as an optimization strategy. The vigilante community investigates the state of the description, which articulates the concept of set of companies. Each of the interested authors formulates a company about the state of the computer consumer, these companies are switched to the computer and the state of the computer is continuously reviewed and compared with those of the companies. From a programming and efficiency point of view, it is good to organize the process of the state of the description about the concept of a set of elementary companies better than close to the concept of relevance modalities. Most pieces of information can be taken as sub-modalities of the exact same phrase, and it is inefficient to evaluate those sub-modalities independently. For example, consider a source of five pieces of information with relevant modalities, making statements about the Adobe Photoshop directory. The first thing is: There is a folder "Brushes and patterns" of the folder that contains the application "Adobe Photoshop 2.5" The second thing is: There is the folder "Calibration of" The folder that contains the application "Adobe Photoshop 2.5" The third is: There is a folder "Color palette" of The folder that contains the application of "Adobe Photoshop 2.5" The fourth en: There is the "Plug-ins" folder The folder that contains the "Adobe Photoshop 2.5" application The fifth is: The "Third-Party Filters" folder exists The folder that contains the "Adobe Photoshop 2.5" application In each of the cases, the evaluation of the modality of the relevance requires the evaluation of the folder of the phrase that contains the application "Adobe Photoshop 2.5" These five modalities do the same work of the five times. It is possible to organize different things, with the expressions of the surfaces that are being analyzed in a minimal collection of sub-expressions. The collection of these sub-modalities are then observed in a non- redundant. More specifically, a source of programs of relevance modalities for joint evaluation are analyzed in their set of coders in the form of associated expression tree. This collection of tree-shaped encoders are analyzed in their maximum tree-shaped sub-encoders. Two sub-encoders in the form of a tree are equivalent if they are literally the same, for example the same issued method that apply to the same arguments, or that are arranged under valid applications of commutability and associability to be the same. A sub-encoder in the form of an expression tree is the "child" of another subcoder in the form of a tree if the associated expression occurs as a sub-expression of the first level of other associated expressions. A sub-decoder in the form of a tree is maximum, if either: • it does not have "parents", or • if it has at least two "parents" and "parents" are non-equivalent expressions. The following illustrates the concept with a source of five modalities of relevance illustrated above. The first recognition in: There is the folder "Brushes and Patterns" (Folder that contains (application "Adobe Photoshop 2.5") ) in: (exists (The folder "Calibration" (folder that contains (Application '? dobe Photoshop 2.5")))) The third one in: (exists (the folder" Palettes of colors' (Folder that contains (Application'? dobe Photoshop 2.5)))) The room in: (exists (the folder "Plug-Ins" (The folder it contains (The application "Adobe Photoshop 2.5")) The fifth in: (exists (The folder "Third-Party Filters" (The folder that contains (The application "Adobe Photoshop 2.5")))) Here, the five modalities of the different relevances are not equivalent because they name different properties . The collection of maximum expressions consist of these five expressions, plus one of the appropriate sub-expressions: (The folder that contains (The application '? Dobe Photoshop 2.5')) A watchdog organized near the maximum expressions operates in a non-modality redundant as follows: • The recognition of all expressions in a collection of relevance modalities in decoders in the form of an expression tree. • Identity with unique identification whose maximum subexpressions have "parents". • Transforming each of the decoders in the form of an expression tree into a new decoder in the form of a tree is constructed from the references to its sub- maximum expressions identified. When the evaluation of relevance maintains extra storage, it is referred to as its storage of maximum sub-expression value, which registers the value of the maximum sub-expressions for the last use. When a reference to a maximum identified sub-expression is understood, this first storage is checked first to see if a value is already recorded. If so, use the stored value. If not, evaluate the sub-expression by recording the resulting value in the storage. In more detail, this works as follows: for the set of the five previous modes of relevance, the maximum sub-expression: (The folder it contains (The application "Adobe Photoshop 2.5")) is associated with a position in sub storage. -Maximum expression. Transform a typical relevance modality by making the appropriate references in this storage. In the case of the first modalities of relevance this works as follows: (exists ("Brushes and Patterns" folder (Sub-expression-maximum 1 (repeat (folder -containing (The application "Adobe-Photoshop 2.5") )) In short, a package is referred to as a Maximum UnderExpression that is inserted around the maximum subexpression identified. This method of packaging has a first argument, which associates the sub-expression for a storage index, and a second argument is a repeated expression. This repeated expression is not evaluated prior to the call of the packaging method. Instead, it is recognized in an appropriate representation as a structure of non-evaluated data that represents an expression for the conditional evaluation which is to be passed to the method of packaging as data. The packaging method looks at a location to see if a value is stored. If so, the method of packaging returns to that value. If not,, the method of packaging question to evaluate the sub-expression which has been passed. After completing the evaluation, the value is stored in a maximum sub-expression storage location. It is assumed that this evaluation modality is the first sub-expression evaluated in a given set of information, the evaluation of which results in the evaluation of the sub-expression and the recording of the value of the sub-expression in a storage position of the maximum subexpression. Now it is considered, the second article in the set, in its transformed form: (exists (The folder "Calibration" (Maximum sub-expression 1 (repeat (Folder-containing (The application 'dobe Photoshop 2.5'))) ) It is assumed that this modality is evaluated after the previous modality. There is no evaluation of the maximum sub-expression because the package finds that the value of the sub-expressions are already registered in storage. What remains is to discuss how one can identify the maximum sub-expressions in a set of the decoder in the form of an expression tree. This is obtained by means of a prur.ing algorithm of the decoder in the form of a tree / set. It is defined as a terminal form any method that you have which does not depend of any evaluation method for its value. Formally, it is either a property named World (Application "Adobe Photoshop 2.5") an unnamed property of the world (System Folder) or a constant (sequence "xxxx") (1234). The algorithm begins by scanning a set of relevance modalities for all unique terminal formats. A list of signs for all the locations in the set where such form occurs is associated to each of the unique terminal forms. The algorithm initiates a database of forms of sub-expression of work as the collection of all terminal forms, for example to begin with, the forms of sub-expression of work which are the forms of terminal subexpression. These are marked for evaluation for the next stage. The algorithm proceeds in stages, each of the stages transforms the sub-expression forms of work into a collection of "parents" forms. The algorithm stops when the job database is empty. At a given stage, it is repeated through the collection of all forms of work. For each of the forms in the work collection marked for the study at this stage, the collection of all the expressions "parent" is considered. > of such expression. This is usable because they are associated with a form that is a list of signs for its occurrence in the set. Among these methods, what identifies the unique forms, for example, the unique combinations and the name of the method, and the arguments of the method which have the sub-expression given as a first level of subexpression. These unique call patterns refer to the "parent" forms. If there are no "parent" forms, the subexpression is removed from the work database. If this is exactly a form of "parent", the sub-expression is replaced in the working database by its "parent" form, the "parent" form, is marked by the only procedure in the next stage, and the signs to the occurrence of the "parent" form that is appropriately calculated, using the indications previously usable to the occurrences "children". If there is more than one "parent" form, then a new maximum form is recognized. An ID number of the maximum form is assigned and a transformation of the packet is made in each of the expressions that refer to the form. That is, in all expressions where the form occurs, a package is inserted around the form according to the reception: (Maximum sub-expression $ ID # (repeat $$) where I Dtf is replaced by the ID number of the maximum form of identification, $$ refers to the occurrence of the maximum form by itself, and the form (repeat) is the means of preventing immediate evaluation, such as It has been described before. The work database is then expanded to include each of the unique parent forms of the maximum recognized form, with the newly added items marked by the evaluation in the next stage, and with a list of signs for the occurrence of each of the "parent" forms in the information source. At the conclusion of this algorithm, there is a collection of transformed expressions, in which the maximum common sub-expressions have been identified and where only a non-redundant evaluation is carried out. The reader may want to verify that the algorithm produces exactly the desired result at the source of the five relevance modalities indicated above. Alternative determination to the Binary Relevance. The invention contemplates a situation where the messages arrive and the computations are made to evaluate certain statements with a general purpose of notifying the user about certain associated messages, wherein the time, the format and other attributes of the notification, including the decision to notify or not, are influenced by the results of the specific computations. The broader news of the appreciation of the influenced relevance can be implemented by a single slight variation of the system described above. The invention, in one modality, obtains valuations of the relevance in accordance with the non-binary criterion. A well-formed phrase in the language of relevance results in numerical values better than Boolean values. The True Boolean value is seen as the equivalent of the numerical value 1.0 and the Boolean value False as the equivalent of the numerical value 0.0. It is assumed that certain modalities in a body of information give the Boolean values, although other modalities give numbers that hold the values between 0 and 1. A value between 0 and 1 is interpreted as the indication of a degree of relevance such that inactivates the intermediate value between certain relevances and certain irrelevance. In one modality, the user interface presents the user's informants with the conformity assessment to the degree of relevance, with those that have values 1.0 at the top of the list and those that have values at 0.0 downwards. This type of variation extends a Boolean value to a real one that is well known under the name of fuzzy logic. In a different modality, the result of the determination of relevance is a categorical identification. In this mode, True and False are two identifications, and the user interface is typed to display the messages identified as True. However, there are identifications such as Attractive Offer or Chronic Household Situation Needing Eventual attention, Such identifications result from the evaluation of the modality of relevance and, depending on the user interface of the invention, such identifications lead to different methods of notifications or different methods of presentation than another class of identifications. The structuring of a centralized coordination authority such as the advisories.com offer a mechanism for the publication and coordination of such identifications. The structuring of the filtering user's site allows the user to associate means of notification with several identifications, means that include the possibility that there is no notification. In one embodiment of the invention, an extra analysis layer is inserted between the relevance assessment and the user interface. Therefore, the result of the relevancy computation can be filtered based on user preferences and user observation. Therefore, the computation of the relevance, rather than the determination of only the status of the notification of the messages, influence the notification processes. For example, a method of user side filtering (see above) with which a user suppresses the display of certain messages, which are nominally relevant to be implemented. In one modality, such censored mechanisms are automatically applied. A reader of the information or other application contains a module to observe the user's behavior and to make the interference about the user's preferences, which can drive such censored mechanisms. Similarly in a modality, the prioritization mechanisms are applied automatically. A reader of the information or other application contains a module to observe the user's behavior and make conclusions about the user's priorities, so that among the relevant messages those which are more similar to be of interest to the user are displayed before or more prominently. Alternate Message Formats. Alternate MIME packages. The exposure of the preferred modality uses MIME, a well-known standard Internet, as a means of pack the informants for transport through the Internet and other digital means of transport. Another well-known medium for the packaging of textual information for remote interpretation is the XML language. This language also makes the hierarchical message possible and is apt to accommodate the message components of the types listed above. There are many structures of the basic arrangement developed in the present. Whereby well-known protocols such as MIME and XML are used, or owner protocols that constitute the structuring of the invention. Substitutes of Three-Party Messages. The invention is discussed in terms of three-part messages, which contains humanly interpretable information, a modality of relevance, and interpretable information of computation. These three logically connected components do not need to be packaged in the same physical message. There are needs to be only an association between these parties. For example, the ASUP protocol sends extracts containing only message identifiers and relevance mode separately from the body of the message consisting of declarative content, programs and references. Under ASUP, relevance evaluation drives a second interaction of the reader-server, where the body of the associated messages is obtained. In other structures, a still free association between the modality of relevance and the content is maintained, where a relevant result starts the exploration of a complete sequence of messages. Substitutes for the relevance language. Relevance language is a convenient means of describing the state of a consumer's computer and its development. However other languages can be modified in ways which enable a message of relevance of computation. JAVA model. The JAVA programming language is well known and is a widely usable tool for computer specifications. In one embodiment of the invention the role of relevance language is used using structured program tools in the JAVA programming language. Appropriately its popularity of JAVA can find wide acceptance among program developers and other computer professionals. In the best commonly understood method of the development of this structuring a special variant of JAVA RELEVANCE-JAVA is developed, with its own specialized resources and evaluated by a specialized variant of the JAVA machine. The intent of this special version is to provide part of the same characteristics of, - privacy and security as the relevant language described above. RELEVANCE-JAVA provides three specific modalities which makes it very useful. • Specialized inspector libraries. JAVA objects and special classes easily develop the determination of consumer computing properties. These systems file inspection, configuration systems, and related properties of the computer and its development. This is done by changing certain modalities in the JAVA virtual machine, which facilitates access to the machine's features. • Privacy Restrictions. Meanwhile in RELEVANCE-JAVA is easy to hear an important agreement about the user's machine, which does not have the ability to transmit any feedback information captured for the author. This is done by limiting the objects and classes installed and changing certain modalities in the JAVA virtual machine. • Security Restrictions. While RELEVANCE-JAVA allows to hear an important agreement about the user machine, does not have the ability to modify the machine for example to modify files and to affect the system settings. The three-part message model described above is conducted as follows: A part consists of a declaratory content that is humanly interpretable; a part consists of the code RELEVANCE-JAVA that specifies the conditions under which a message changes of relevant in certain machines of the consumer; and a part of the computer interpretable code, perhaps in a dialect different from JAVA, capable of originating the effects in the consumer's machine after consumer approval. Visual Basic model. The programming language of Visual Basic is well known and a widely usable tool for doing specific computer operations. In one embodiment of the invention, the role of relevance language is made using structured program tools in the Visual Basic programming language. Appropriate to the popularity of Visual Basic, it finds wide acceptance among program developers and other computer professionals. The best commonly understood method of developing this structuring is a special variant of the VisuaL Basic, RELEVANT-BASIC is developed with its own specialized resources and is evaluated by a specialized variant of the BASIC interpreter. The intent of this special version is to provide part of the same privacy and security features as the relevance language described above. The RELEVANT-BASIC provides three specific modalities which makes it very useful: • Specialized inspector libraries. Visual Basic's special functions and data types are developed to facilitate the determination of computing consumer properties. These have the ability to inspect the filing systems, configuration of the systems and related properties of the computer and its development. • Privacy Restrictions. While RELEVANT-BASIC is able to listen to an important agreement about the user's machine, it does not have the facility to transmit any backward information captured for the author. This is done by limiting the objects and classes installed and changing certain modalities in the BASIC interpreter. • Security restrictions. While at RELEVANT- BASIC you are able to hear an important agreement about The user's machine does not have the facility to modify the machine, for example to modify the files and to affect the system configurations. The three-part message model is conducted as follows: A part consists of a declaratory content that is humanly interpretable. A part consists of the specific conditions of the RELEVANT-BASIC code under which a message becomes relevant in certain consumer machines; a part of the computer interpretable code perhaps in a dialect different from VISUAL BASIC capable of causing effects on the consumer's machine after consumer approval. UNIX model. The UNIX environment in its variant structures that can see a registration language a well-known and widely usable tool to examine the properties of a file system and the specifications of computer operations. In one embodiment of the invention, the role assigned to the relevance language is in place of what is done by the computational tools structured in the UNIX environment and associated UNIX tools. Appropriate to the popularity of UNIX and its variant forms, this can find wide acceptance among program developers and other computer professionals.
In the commonly understood method of the development of this implementation, a variant of the UNIX Environment, the RELEVANT Environment is developed with its own specialized resources and is evaluated by means of a specialized variant of the Environment interpreter. The intent of this special version is to provide part of the same privacy and security features as the relevance language described above. The RELEVANT Environment provides three specific modalities which makes it useful: • Applications of the Specialized Inspector. Special applications are developed to facilitate the determination of the properties of the consumer. These have the facility to inspect the archiving systems, configuration systems and related properties of the computer and its development. These are well known for Entorno-RELEVANT. • Restrictions on privacy. While the Environment- RELEVANT is able to hear about the user's machine, it does not have the facility to transmit any backward information captured to the author. This is done through access not allowed for certain communications and network modes in the environment interpreter. • Security Restrictions. While the applications achievable through fn F.nf orno-RELEVANT that are able to hear about the user's machine do not have the facility to modify the machine, for example modify the files and to affect the configuration of the system, except through the mechanisms standard, such as creating temporary files in standard locations such as tmp and submitting to the resource measurement. The three-part message model is conducted as follows: A part consists of a declaratory content that is humanly interpretable; a part that consists of the specific conditions of the ENVIRONMENT-RELEVANT code under which a message becomes relevant in certain consumer machines; a part of the interpretable code of the computation, perhaps in a different dialect of Entorno or of another interpretable UNIX code, capable of originating effects in the consumer's machine after consumer approval. Description of the status Alternate. The possibility of alternating methods of describing the state of the consumer's computation is described above. It is possible to describe the state without using a language of complete relevance if one has usable a community of vigilantes, each with its own peculiar interfaces. The relevance language is then placed through either the expression by which the application modules are called and controlled. Relevance-regulated procedures. The description of the invention has taken the scope of the purpose of evaluating the relevance that is regulated to the decision to notify a consumer about the existence of the message. For that end, the application of the information reader, functions as a message center, and the informants have an analogous role for the messages in electronic mail, USENET news, and other modalities of the message, in which they are read by the user as part of a programming that defines the user. In this point of view, the user is a director of his computer, his property, and his affiliations, and he reads the information what helps with his companies in such a management role. However / there are other configurations without direction, in which relevance can promote the presentation of information to a consumer as an integral part of certain other processes in which the consumer is captured. • Guide. The consumer is the user of a program of 'application of computations, and the message based on relevance provides guidance to the consumer at the time before performing a certain action or in the moment after the completion of a certain action. • Composition. The consumer is reading a document that uses an application displayed on the computer, and a relevance based on the ways of adapting the content, the document so that the humanly interpreted message directly addresses the characteristics of the reader. In fact, all applications are embodiments of the invention. The computational relevancy messages are of a much wider value than the address mode described above. Guided relevance computation interaction. The following is an example that shows how an informant is used to guide a user in the operation of a piece of the program. Considering the following problem: A certain damaged email message has been obtained in a wide distribution. When a user has received it with an Eudora 4.0 e-mail program, the user sees an e-mail message that he sees innocent, including an attachment with an invitation to the user to open the attachment. The attachment is currently a maliciously prepared document which, if opened, can cause damage to computer users. The above discussion describes a structuring of relevance based on messages which help the effective agreement with this situation. Under such structuring, an author writes an informant which is - evaluated for relevance before using an Eudora that opens an annex. The modality of relevance inspects several attributes of the contemplated action and precisely directs a help to open an annex with certain attributes. The informant then returns to the text to the mail application which, the mail application is displayed to the user. In one modality, the desired effect can be produced using an inter-application communication structure: • The mail reader application has a special collection of relevant evaluation events, for example predefined events which are well known by the authors of the informations. • Whenever one of these events occurs, the reader of the mail notifies the reader of the event information through a standard event notification protocol. • The reader of the information maintains sources of events, for example, the informants relate to the evaluation after receiving the news of certain events.
• The Information Reader evaluates the informants in an event source after receiving the news of the corresponding event. • The reader of the information notifies the user of a relevant message by either: The user's notification to the application directly, using the standard user interface of the information reader, or by sending the relevant message to the mail reader.
The mail reader then displays those messages for the user, in accordance with the standards of the user interface of such application. The selection of these notification methods are made under the control of the user's preferences, the author's preferences, or the application's flaws. This structure that drives the event is particularly powerful when: • The application that sends an event signal that includes descriptive information about the event. In the context of the email reader, the Eudora About to Open Attachment event is accompanied by the information about the sender of the email information about the name of the attachment file, the information about the sender of the email, and the information about the sender. the attributes of the annex file. • F, L Information reader contains an inspector library which refers to the final properties by the application, for example, the one that sends the mail, • and the name of the file. In this context, if anyone wants to warn that each user receives the email of king@athens.gr with an annex named trojan.txt such that it will not open the annex, which is possible to the author of the modality of relevance addressed to the informant for those people nearby to open such an annex. The route of the informants to the sources of the information event is handled through the mechanism of the MIME base line and the variations of the message line discussed above. A simple baseline of the source-event-information form, followed by the name of a predefined information event, indicates the desired route. Relevance-Adapted Communication. The following is an example that shows how relevance is used to customize the distribution of an information body (see Fig.19): Consider the following problem. A certain publicist wants to create an electronic document whose content is adapted to the reader, for example because it consists of the warning which is most suitable for Some readers who ask others, or because they consist of technical information which is more appropriate for some readers than others. However, an ideal personalization requires intimate knowledge of the configuration and details of the consumer's preference, possessions, and affiliations, information which are not similar to those that can be used by consumers. The discussion below describes an implementation of a system that uses the evaluation components of the relevance of the invention. This implementation allows the advertiser to create the documents adapted from the relevance, allowing the solution of the problem. The publication is distributed as a digital document that contains embedded references for most possible variations in content. The selection between the possible variants is driven by the modality of relevance. The components of the document that currently appear in the user's display unit are those which are selected in intimate knowledge of the user's characteristics. The following is an execution of such a system: A certain base document produces the targeted format that is selected. It is assumed for the concreteness that is HTLM. A special font format is then defined, consisting of of the documents. In the present context, this is referred to as PRE-HTLM. This source of format 194 offers the possibility of arranging most of the fragments hierarchically comprised of the modified HTLM in a linear order. Each of the components of such an arrangement is protected by one or more modalities of relevance. The components of the format source differ from the HTLM in that they also offer embedded expressions of the relevance language. The author of the information writes the document with the mode of relevance and mode 191 of the inspector. To create a personalized document for a specific user, the source document of the format is transported to the user's computer 192, and the document in the source of the format is compiled into a customized formatted document 195. The formatted document of the format then it is processed by the procedure system of the indicated directed document, producing an exhibition of a personalized document 193. The compilation stage is the stage where the customization occurs and it supports closing the exam. As the source of the document is processed, several components are found. These are protected by the relevance mode which evaluates to false or any range that is not true is discarded. These do not appear in the final directed format file. These are protected by the modalities of relevance which are evaluated to True and are retained. These appear in the file of the final directed format. Each of the retained components are processed before placement in the file of the targeted document. If any of the included expressions are identified in the file, then these expressions are evaluated, and the results are interpolated in the white file document. This solves the problem of the preparation of the personalized document due to the relevance language that facilitates the supplier to prepare the documents which are personalized as if the author had access to detail the intimate information of the properties of the consumer's computer and its development, although not without the need for the consumer to reveal such intimate information to the provider. This embodiment of the invention provides a provider with the information which is presented to several consumers in precisely defining the circumstances, and their use of the relevance of the message model described above. Therefore, the catchment, the watchman, and the notifier have a different structure that are in the invention as described before, but at an extract level of its functions that are similar. For example, the tool compiles a document source of the format into a document of the target format, which has both the role of watchdog and notifier in the five-part model as discussed above, while the document processing system of white has the role of the user interface for the notifier. The role of the collector has systems or systems that have the source of the format document in the consumer's development. There are considerations of privacy in this adaptation of the personalized documentation. The use of HTML as a target language, for example, means that they exist in an exit possibility. Other implementations of the relevance that drive the personalization of the document are possible. For example, one can develop a system in which the document source does not compile once and for all in the target document in a well-known format, although it is better that the source of the document is structure for interactive interpretation. The following is an example: A document source consists of many PRE-HTML pages. Embedded in the source of the document are conditional compilation blocks protected by the modality of the reLevance, and include substitution of expression using the modalities of relevance, as described above. As the observer is through the document from page to page, each of the pages are compiled from PRE-HTLM to HTML and are displayed as needed. Under this model, the user's path through the document is determined only in a running time. For example, certain links in the document are of protected relevance. The expression of relevance refers to the attributes of development that are the changes as the reader progresses through the document, for example are the changes because the reader is progressing through the document. For example, a reader suggested for the information as part of his reading of the document, and as a result of the suggested, the variable site profile changes, originating pages visited later in the reading for the change as a result. Remote Access for Personal Information. The invention makes it possible for an author of an informant to target situations based on an arbitrary combination of the verifiable conditions of computation of the consumer's computer and its development. This development may include data which may be of a personal nature. To this degree certain kinds of personal data can be widely assumed, to exist in a standard format over a substantial population of personal computers, creating this the possibility of the invention being used to notify a substantial population of individuals or matters of a personal nature. Areas of natural applications include: • Personal finance: if individual information about financial statements is assumed to exist on the consumer's computer or in its development in a standard format or on a large collection of consumer computers, then the authors The information can provide a large body of relevant individual information on time, about your bank account management or about your investment portfolio. • Personal Health Issues. If information about personal medical records is held on the consumer's computer or in its development in a standard format, on a large collection of consumer computers, then the authors of the information can provide a large body of relevant individual information already time about drug interactions, or about the Interactions between information of blood or genetic type and drugs. This forms an unprecedented opportunity, for example the ability to offer important target notifications without compromising individual privacy. Although the author of the information is making detailed statements about the finances or health of the consumer, and although it requires intimate information of sensitive personal information to evaluate these claims, the system itself does not reveal this information back to the author. The consumer may, in some circumstances, select to reveal such information, after reading the relevant information. Such applications are limited but the consumer's need to capture and maintain secure data in a substantial format about articles which concern the consumer and which are accessible in a well-known medium to the information providers. It will be highly desirable to remove the handling of the data and the input of the data required under this provision, so that consumers do not need to convert the data directors, in particular, it will be highly desirable for the responsible professional organizations to safely keep the data about of its clients to be in the place of responsibility for the 8 integrity of the data. For example: • Pharmacies maintain their records about their clients. • Doctors keep records about their patients. o Financial institutions keep their records about their customers. These actors pay, in part, for the maintenance of safe and timely records about your patients, clients or consumers. It will be highly desirable for consumers to have access to some key information that is maintained for them by the professional organizations with which they are affiliated. For example: • Instead of a consumer entering your computer data, about prescription drugs, it will be desirable to obtain the need for pharmacy data automatically on demand by the consumer's computer. • Instead of the consumer entering their computer data about their stock portfolio and daily handling, it will be desirable to obtain any necessary data from the financial institution automatically or in demand by the consumer's computer.
• Instead of the consumer entering the data on his computer about his health records, and the manipulation of the data as they change them, it will be desirable for any data necessary to obtain it from the medical institution automatically on demand by the consumer's computer The following is a solution to this problem using the invention: • A standard collection is developed, from remote medical records inspectors, remote financial records inspectors, and remote drug prescription inspectors and their syntax and their use is published. These inspectors have both side server components and client side components, to describe later. • The authors of the information write information regarding various issues associated with such personal information. • Certain doctors, financial institutions, and pharmacies install side server components on the computers in their offices. They warn the public of the availability of access to remote information.
• The consumer who is interested in benefiting from the written information using the access research of the institution's remote information of the doctor, or pharmacy, and of the authorized participation of their own information in the program of the service. • The consumer subscribes to certain information sites which include information that makes use of remote inspectors. The subscription is initiated appropriately so that the reader of the information on the consumer's computer makes use of the information. • Such information is periodically evaluated in accordance with the source of information in which it is placed. The evaluation causes the consumer's computer to establish connections to remote computers to obtain the necessary information. For example, the remote inspector's library of the prescription of the drug in the consumer's machine establishes a connection with the pharmacy's information server and makes certain inquiries to verify if the consumer has certain combinations of problematic prescription. The following is an example of information that is written using this system: It is assumed that certain pharmaceutical manufacturers provide an antidepressant drug to their patients, and that it is discovered that patients also use a certain anti-depressant drug. infl matorio may experience dificult des. In practice, a prescription may be due to a psychiatrist and another by an orthopedist who may not know about the other medical prescriptions of the patient. The authors of the manufacture can make reference of the information to the combination of drugs as follows: There is prescription of "Xanax" pharmacy and there is prescription of pharmacy "Buterin" The manufacturer includes a description of the potential dangerous combination for a message of the body . When the reader of the information on the consumer's computer supports this modality of relevance, contact the pharmacy server with the consultations for the prescription of the Xanax pharmacy and the prescription of the Buterin pharmacy. The relevance of the information based on this is determined. It notifies the consumer of the situation if it returns to be relevant. An important issue in determining consumer acceptance of this system is the ability of the system to protect consumer privacy.
For this purpose, the interaction between the client and the server can be carefully protected: • The connection between the consumer's client and the pharmacy server that is secured by standard cryptographic means (for example, SSL protocol).
• The identity of the client looking for information that is authenticated by the pharmacy server by standard cryptographic means. Through these devices, the pharmacy server avoids the disclosure of information about a person except for the reader of the information on the personal computer. The reader of the information on the personal computer does not reveal information thus received, at least under ordinary operations. The following is a convenient interaction protocol for such remote inspectors. In this protocol, it is simple to do the client side program. The client transmits, over a secure link, ASCII sequences describe the exact queries as they are described in the language of the surface. In the previous example, the client transmits the prescription of the Xanax pharmacy. The server analyzes this, using a miniature version of the evaluator of the relevance mode analysis. The server knows that this modality refers to the prescription records of Joseph A. Patient, due to the initial authentication work and, using the database demand methods, the search of the pharmacy database, for an entry that indicates that Mr. Patient has a pharmacy prescription for Xanax. The server can return to True or False according to an ASCII sequence, and the client analyzes this sequence and returns to the Boolean corresponding to the reader of the information. 'Bi-Directional Communications. An attempt of the invention is to allow a single communication path, taking the information from the information provider to the consumer of the information, but not following the information to exit from the consumer to the provider. The phrase a pass membrane calls this. However, there are numerous situations where this model is restrictive. For example, in certain situations, consumers are waiting to cooperate with suppliers, particularly when they receive a cooperative benefit. An example is when consumers want to receive technical support to solve a specific problem which informants have no address. For the security of solving your problem, they are hoping to develop several pieces of information about your configuration for the solution of the provider. In other situations, the consumers of the information subscribe to a certain site that are currently employed by the organization which operates the information site, so that they are waiting for the exact information with the information provider. pa rt i cu The r. Bi-di rectional open communications. The phrase open bi-directional communications refers to a configuration in which the invention is made and communications are typically one way, but occasionally they are processes which feed the retro information to the information provider, and the process is performed in the space with the identity of the consumer's computer explicitly usable to the provider. Questionnaires In one implementation (see figure 29), a particular document type is defined, referring to a questionnaire 200, which contains the text together with comments with distinguished included Expressions. It is assumed that the included expressions are delimited by the double dollar sign as $$. The included expressions are written in the relevant language, and do not need to be evaluated for False or True. For example, there are values in sequence- or integers-. It is also assumed that such comments are preceded by the signs%. An example of a questionnaire is:% data needed by the corporation ABC% Diagnose problem XYZ Inventory of the computer configuration Us Lo: Computer Manufacturer: $$ Computer Manufacturer $$ Model: $$ Computer Model $$ OS Version: $$ Operating System Version $$ RAM: $$ Ram System $$ Disk: $$ boot volume size $$ This questionnaire contains text, such as a computer manufacturer, as well as the Expressions-Included, such as the computer manufacturer. The intent of the questionnaire is that information about the type of the computer and about certain modalities are collected by the reader of the information used by his rich library of inspectors. The following is an example that shows how questionnaires are used: A questionnaire such as the above is authorized by a provider of information 200 and inserted into the component of an informant's solution as a MIME component with the different content type 201. The consumer sees relevant information 202, accompanied by an interpretable human content. The interpretably human content says: You have the situation XYZ. In order to help you.
We, an ABC corporation, need some information about this situation, information about your system configuration. This information can be automatically. captured by you if you press the button on the left below. You will be giving a change to review the information and then to approve its transmission to the ABC Corporation. Below the information are two buttons: One says Information captured and another says Review Search. The first button means to approve the capture of information; the second button means a search to check the file of the source of the questionnaire and with which you hear more about the search of the provider to capture the data. If the user approves 203, the modalities of relevance in the questionnaire are evaluated 204, for example using several inspectors 205,206 and the corresponding results are included in the result where the modalities of relevance have been. In the case of the previous example, this procedure produces:% data needed by the ABC Corporation% Diagnose problem XYZ Inventory of the with L Lqu tac LÓ? of 1 ,? User's computer: Computer manufacturer: Toshiba Model: T1200 OS type: Windows 98 OS Version: 1.0 RAM: 64M Disk: 2G The user can show the results of the included procedure and gives an opportunity to inspect the results and switch the results to the provider of the information. In a structuring, the results are presented to the user as part of a Window mail, showing the indicated recipient of this information 207, and with a button on the button marked Send It 208. Through this information, the relevance language simplifies the communications between the information provider and the consumer of the information, allowing the inspectors to capture the information needed by the information provider, which is difficult for consumers to capture for themselves. The provider is helped because he quickly and securely obtains information that may be essential in the technical support process, and the client is helped due to the procedure that removes an obligation which he has had to find the correct data and to report it with security. For this method, the work must have consumer acceptance. Consumers are sensitive to the possibility of simulating the questionnaire, where a questionnaire implies for the information captured from a class, for example, of the CPU type, while the information currently collected about another class, for example the card number. VISA or keywords. A technique for additional consumer acceptance is for the services of the privacy ranges in a central site to certify the questionnaire that is in accordance with privacy standards when there are appropriate implementations of the random response protocol. Under the existence of the Red protocols (see Khare, Rohit (1997) Digital Signature Label Architecture, The World Wibe Journal, Summer 997, Vol 2, Number 3, pp. 49-64, Oreilly, Sebastopol CA, http: // www. w3.org/ DSIG) there is a method to establish variation services which can adequately certify that certain messages have certain properties. The credibility of such claims, for example that are currently made by the service and not by an impostor, is based on the development of the standard authentication and encryption devices. The application of this technology, a service of variation of privacy is established in a central site, for example Better Advise Bureau.org. to certify that certain questionnaires capture the information in a generally accepted manner as appropriate for the tasks of the information, and the information is requested by an applicant in a manner to protect the individual's identity. The authors of the information record the certification of the respective nature of the privacy of their questionnaire submitted to those messages for the certification of the authority, which studies the messages and, at their option, agrees to certify part of those messages according to the respective privacy. In one embodiment of the invention, the user's reader interface or similar component is configured to allow questionnaires to be displayed to users only when they have certified credibility by a service of reliable privacy variation. Mandatory feedback In one embodiment of the invention (see figure 21) the two-way communication is opened if possible for the purpose of maintaining the relationship with a certain trusted provider This assumes a different consumer situation The configuration of the usual invention. In this variant of the configuration, certain classes of information providers employ a special status, for example as employers or contractors, which allow them certain coercive privileges not ordinarily employed by information providers in other configurations. These overloaded information sites 210 publish the informants that are captured by a reader 211, which then performs a relevant evaluation on the informant 212. The relevant messages are displayed 213 to the user and the user can take advantage of or reject such action 214, as recommended by the informant. A feedback path 216 facilitates the actions of the user 215, to the site of the overloaded information. In this modality, any of the following options may be exercised: • Certain subscriptions of the information site are mandatory; • Certain information can not be deleted by the user, information by certain providers is not subject to programming, priority or user request; • Certain information generates automatic feedback from the user to the supplier, in relation to a part or all of: • the identity of the consumer's computer; * The status of the relevance of certain information on the computer, and o The fact that a user has not taken a certain recommended solution on some information. The retro-action is transmitted by email or by other conventional electronic means. In this configuration, a director of most computers can: (1) write the informants intended for most of the machines he is handling; (2) expect all machines to receive the information; and (3) wait to receive, in return, the information about the relevance and / or the state of the information solution in all these machines. This set of functions can be implemented by modifying the reader architecture of the basic information discussed earlier (see Figure 22). • Information sites 220 can give a special overload status (as discussed above in relation to Figure 21) by configuring the director of the reader's subscription information to facilitate such special states.
• A new type of message line, Mandated-Action, is instituted and used by information sites with overload states to identify a message component with a special keyword phrase such as calling a certain coercive privilege: No user removable identifies a message as not deletable by the user through the user interface of the information reader 221; In relevance 222, the questionnaire of the evaluated 223 and the overdue mail 224, identifies a message as a necessary immediate notification 225 of the author through a retro-action trajectory 226, in the relevance, the notification comprises the first process of a filling of the questionnaire in the various fields included and second, transmit the information to the author; The mail delayed in the acceptance of the user identifies a message as necessary notification of the author in acceptance the user an action proposed by the selection of the action button in an associated information; Mail delayed in the user's refusal identifies a message as the immediate notification required of the author in the acceptance of the user of a proposed action by selecting the action of the associated information button. The reader of the notification modifies in the proper way Performing the indicated function when a message with the overload status is received and processed. Bi-directional communications masked. It is possible to facilitate bidirectional communications while reserving part of the degree of protection of privacy by masking the identity of the respondent. Mask through anonymous communications and Privacy ranges. In one implementation (see Figure 23) an information provider 231 obtains detailed information from the consumer's computers while communicating with anonymous consumers, thereby facilitating consumers to protect their own privacy. This embodiment of the invention limits the scope of communications so that when the messages return to the information provider: • Message Supports that do not contain information identifying only the respondent. • Message bodies that by themselves do not contain information identifying only the respondent, and • The procedure of these components: An information provider 231 authorizes a document such as a questionnaire as described before, for the information captured automatically or a form of HTML for the information captured by the consumer interview. The user information reader 232 captures this information. In the determination of relevance 233: If the document is a questionnaire, the reader of the information is filled in the appropriate included fields. If the document is an HTLM form, the consumer fills in the appropriate research questions. The document is sent by email to the provider via an anonymous route along the backtracking paths 235, 236 through a certain centralized site, for example, the Better Advice Bureau, advisories.com. , or another site 230 that offer identity protection by re-sending by anonymous mail or functionally equivalent services. The final stage of this procedure eliminates the information about the identity of the consumer, by separating said identity from the supported messages.
Consumers are waiting to have confidence in the fundamental validity of their research because they are understands that the centralized site has an incentive to protect the integrity of the procedure. The consumer himself is responsible for ensuring that the body of the message is free of identification information. For example, if the consumer responds to a form of HTLM by asking for his name, and address, then he does not protect his own identity. If the consumer follows a questionnaire that contains the identification information, such as the IP address, then he is not protecting his own identity. In one implementation, the consumer protects their privacy with the help of a privacy ranking service at a central site. Under the existence of internet protocols (see Khare, Rohit, Digi ta l signa ture Label Architecture, The World Wide Red Journal, Vol.2, number 3, pp. 49-64, Oreilly (1997) http: // www .w3.org / DSIG) there is a method for the establishment of range services which certifies reliably that certain messages have certain properties. The credibility of such claims, for example that are currently made by the service and not by an impostor, is based on the development of standard authentication and encryption devices. The application of this Technology, a service of privacy ranges is established at a central site, for example Better Advice Bureau.org, to certify that certain questionnaires do not contain devices that request sensitive information. The authors of information select the certification of the respective character of the privacy of their messages submitted to those messages to the certification authority that studies the messages, and to their option, according to certify some of these messages as privacy respectively. In one embodiment of the invention, the user interface of the information reader or similar component is configured to allow questionnaires and forms to be displayed to users only when they are certified as credit worthy by the service of the privacy ranges. - Protection by random response. In one implementation, an information provider obtains detailed information from the consumer's computers while making it easier for consumers to protect their own privacy. This embodiment of the invention limits the scope of communications such that when the message returns to the information provider: • Message bodies that by themselves do not contain information that can be concluded reliable for reflect the true state of the consumer's computer and its development. In certain modalities, the technique is complemented by the use of centralized anonymous communications and centralized privacy certifications. The procedure has these components: ß An information provider authorizes a document similar to a questionnaire as described above, for the information captured automatically, however, obey additional obligations. • The reader of the information is filled in the included files appropriately, changing the answers randomly, and changing the correct answers for the incorrect answers, depending on a random mechanism. • The resulting document is returned to the author. In an execution, the procedure by which the information is returned becomes anonymous. The document is directed to a certain centralized site, for example the Better Advice Bureau, or advisories.com, or another site that offers identity protection by re-sending by anonymous mail or functionally equivalent services. This final stage of this procedure removes information about identity of the consumer by removing such identity from the messages supported. The following discussion describes the concept of the random change of answers in greater detail: it is assumed that only questionnaires with boléanos values are allowed, although more general questionnaires. They are allowed with extra work. The component of the evaluation of the relevance of the information reader evaluates the Boolean expressions indicated in the included fields. However, the result is not always inserted into the output message. Referencing R as the value obtained by the evaluation of relevance. Instead of allowing substitution, a representation of R instead of the included field, the information reader leads to a two-step stochastic experiment. In the first stage, a random Boolean X of a random number generator is obtained, the random Boolean value is equally similar to be False or True. The value of X remains private, and drives a decision to the first stage. In this decision, if X is true, the decision is made to insert a representation of R in the included field. If X is false, the decision is made to obtain a second Y value Boolean again equiprobable, and to insert a representation of Y in the included field. As a result, in any message specific, it is impossible to say the answer obtained in the evaluation stage of the relevance (R) that is False or True in the base of such message only due to the value reported that is similarly equal to be R or Y, and the variable X boosts the selection between R and Y is not disclosed. This provides a degree of privacy protection for the consumer. At the same time, this random response communication protocol makes it possible for the author of the questionnaire to obtain information near the user population while not disclosing information near specific users. If p denotes the fraction of the users in the sample with certain characteristics, and p denotes the fraction of the True answers received, then: E (p) = 1/4 + p / 2 Where E (.) Denotes the mathematical expectation.
From p = E (p) (the law of large numbers) p can be estimated by: p = 2 (p-l / 4) For example, if 61% of the answers are true, an estimate such that 72% = 2 (61% -25o) of the samples that have the mentioned characteristics. There are extensions of the method of non-Boolean variables and the responses of multiple articles. For this method of work must have consumer acceptance. A technique for further consumer acceptance is for a privacy ranking service at a central site to certify messages as they are in compliance with privacy standards when appropriate implementations of the random response protocol are in place. Under the existence of internet protocols (see khare, rohit, Digi tal Signa ture Label archi tecture, The World Wide Red Journal, vol 2, number 3 pp. 49-64, Oreilly 1997) http: //www.w3. org / DSGI there is a method for the establishment of range services, which reliably certifies that certain messages have certain properties. The credibility of such claims, for example, that are currently made by the service and not by an imposter, is based on the development of standard authenticity and encryption devices. Applying this technology, a service of privacy ranges is established in a central site, for example Better Advice Bureau.org, to certify that certain questionnaires use random response techniques appropriately to protect individual identity. The authors of the information select the certification of privacy regarding the character of their messages, submitting these messages to the certification authority which studies the messages, and their option, in agreement to certify part of these messages as respective privacy. In one embodiment of the invention, the user interface of the information reader or similar component is configured to allow questionnaires and forms to be displayed to the users only when they have credibility certified by the service of the privacy ranges. Address of the Network. The following discussion describes two important variations of the basic invention which are useful in the problems of the network address, for example the address of a major network of the computing devices. Compulsory Information In the basic description of the invention, it is assumed that the information is offered as a convenience to the human consumer who acts in a leadership role to read and act appropriately at his option (see Figure 24). There are configurations where the basic communication model described above can be customarily modified, so that there is no user review of certain information. As an example of such configuration, a network administrator 240 monitors an important network of communication computing devices, each in a state of change dynamically and potentially different. The network administrator wants certain devices to perform certain operations, but they do not know what devices they are. In this configuration, it is valuable to have an information reader program 241, which obtains a 242 review of informants, but which automatically applies the operator of the indicated solution 244 when the relevance 243 is determined. This facilitates the network administrator to write a general informant pointing to most machines but not knowing in advance what machines change to be, and to obtain the desired functionality in these machines. A solution or the archiving of communications 245 can optionally send delayed mail to the network administrator through a backward action path 246. Examples of scenarios where this functionality is usefully included: • The goal of all machines whose configurations of Security does not compare a certain standard defined administrator. The imposition of configurations required in all the machines. • The goal of all machines with a copy of a certain file. In such machines, the file is replaced with an updated version. • The goal of all machines that have less than a certain amount of free space on the local disk. In such machines the volume tmp is purged. Other examples can be provided, including examples outside of the technical support application. For example, in a configuration where the applications to the offices are the computing devices, the direction of the network develops tasks related to the maintenance and monitoring of the affirmations and their use. In the most commonly understood execution of this variation there are several changes to the invention: • The information reader is executed as a faceless application with no user interface component. • The information reader typically receives informants through alternative messaging mechanisms, for the usual subscription model, for example by email or other dissemination mechanism. • The format of the message omits the humanly interpretable content.
• The format of the message includes the message component that contains a program tool, such as a binary executable or escrip, or a reference for a program tool such as URL, or a path of the file system name, providing the functionality for it is automatically called in the case of certain conditions converted to relevant. Certain modalities can be included in this variant: • Security Modality. The reader of the information includes an authentication modality to verify the identity of the information site to exercise the coercive privilege. • Bi-directional communication mode. The reader of the information includes the ability to communicate back to the author of the information when the author of the information requires this, as indicated by a Mandated-Action: online message. Master-Slave Configuration In the description of the invention, it is assumed that the advice is offered as a convenience to a human consumer, who acts in an administrative role to read and act appropriately at his option. In the description, it is implicitly assumed that the consumer is the administrator of a personal computer and its amb lens. There are adjusted values in which the communications model. The above described basic can be modified in a useful way to reflect the needs of administrators of large collections of computing devices. As an example of such a value (see Figure 25) a network administrator 250 monitors a large network of communicating devices 251-253 each in a potentially different and dynamically changing state. The network administrator wants to have an advisory reader that functions as a master reader 254, in which each entry he sees in the master user interface summarizes the status of advisory relevance in many machines 255,256 simultaneously. This allows the administrator to review 257 and 258 and make decisions about accepting or rejecting advice on many machines at the same time. In this setting, the workstation of the network administrator is a master or ama machine and the computing devices it manages are the slave machines. It is very desirable to have a master advisory reader program running on the master machine and get advice, and then communicate with the slave machines, each running a slave relevance evaluation and a slave action implementer, and that summarizes the results of the actions. Those slave revalue evaluators accept the messages from the master advisory reader. The messages consist of compression information and individual relevance clauses. The slaves evaluate the relevance clauses in the environment defined by their machines and transmit the resulting values to the master. The master reader then studies the results thus obtained and according to a master user interface, presents the network administrator with a summary of relevant master messages. A message is considered to be a relevant master if the associated relevance clause is true in any slave machine. The network administrator studies the relevant master messages and can accept the proposed actions associated with some of them. When it does, the master reader communicates with the slave action evaluator in the slave machines in which the relevant result was obtained, based on the recommended action part of the advice and indicating that the action must be taken. Each slave action evaluator connected in this way then applies the indicated solution within the environment provided by that machine. In this setting, a network administrator subscribes to the advice and takes the role of administering the advisory process in place of all users of the machines slaves. If a piece of advice, when relevant under the invention, suggests to the user that certain software must be updated on that user's machine, then the same notice is presented to the network administrator when any network machine must have an update, and if it actually proposes that the corresponding software is each machine be updated. In the currently best understood implementation method of this variation, there are several changes to the usual model of the invention: • Evade relevance evaluator and slave action implementer are implemented as faceless applications without a user interface component. • The slave relevance appraiser and the slave action implementer typically receive advice through alternative message delivery mechanisms to the usual subscription model, for example, by email or other dissemination mechanism. • The format of the message for communications between the master reader and the evaluated slave relevance omit in humanly interpretable content. • The format message for communications between the master reader and the slave action implementer include a message component that contains a tai software tool such as an executable binary or inscription or a reference to a software tool such as URL, or the name a file system path, providing the functionality is invoked automatically . In addition, certain variations can also be made. The evaluated slave consultant and the slave action implementer include cryptographic authentication features to verify the identity of the teacher attempting to exercise a coercive privilege. Due to the difference in the search engine that a network administrator has, the master user interface has non-proprietary features. ordinarily available in the invention. These include: • Presentation of the list of machines. To show a list of all the machines in which a given advice is relevant. To decorate this list by including other features of the machines. • Filtering of machine lists. To apply selection mechanisms to the list of relevant machines, allowing to apply the recommended action only to a selected sub-group of machines within the relevant group. Particularly useful is the ability to Enter a list of machines with a predetermined list, for example a list of machines in a certain operational division, a list of machines in a certain location. 0 a list of machines that appear as relevant in some other advice. It is also important to allow the list of machines to expand beyond the relevant machines, allowing either manual editing or concatenation with some other list of machines, for example a predefined list, or a list of relevant machines for some other advice. The logical structure described is that a single body of assessments assessed as relevant in a series of different contexts, where the results in all those different contexts are gathered in a single master user interface. This logical structure makes sense in bull value settings. For example, in the example of the drug interactions discussed above, the pharmacist is an administrator, the body of advice that he has received from the pharmaceutical manufacturers, is a body that will be applied in many different contexts, and each of the Clients' database records provide a unique context for interpreting advice. Here, the context is not individual machines but individual records in a database. The master user interface is the basis of another variation of The invention, this is the operation with a specialized database inspector, the teacher consulting reader obtains a list of all the patients of each counseling from whom a given advice is relevant. The user interface shows only relevant information to the pharmacist, this is relevant advice for some patients in the database. The pharmacist then reviews the advice or notices and inspects an associated patient list. Although the invention has been described herein with reference to the preferred embodiment, one skilled in the art will appreciate that other applications may be substituted for those described herein without departing from the spirit and scope of the present invention. Accordingly, the invention should only be limited by the claims included below.

Claims (44)

  1. NOVELTY OF THE INVENTION Having described the invention as above, property is claimed as contained in the following: CLAIMS. 1. A communication system consisting of: an information provider that broadcasts information through a communications medium. a consumer of information to accumulate that information sent from that means of communications; and a reader associated with the consumer of information to determine the relevance of the information sent. characterized in that the information consumer receives notice of that information only if that information meets certain predetermined relevance criteria. The system according to claim 1, characterized in that the reader further consists of: means for providing the relevant information to the information consumer, without disclosing any aspect of the identity of the information consumer to the information provider. 3. The system according to claim 1, characterized in that the relevance of the information to the consumer of information is based on any of the properties of a consumer's computer information, the content or state of the computer, or the properties of a local medium associated with the computer. The system according to claim 1, characterized in that the information provider specifies an audience for which the information is potentially relevant when referring to the properties of a consumer of information that are used to determine the relevance of that information for the consumer of information. 5. A communication method comprising the steps of: preparing a message at the location of the information provider; / emit that message anonymously to potential information consumers using a network; process that message in the location of a consumer of information; determine if the message is relevant to the information consumer; characterized in that the message is issued to advise consumers for whom it is relevant without requiring consumers of information to disclose their identity or its attributes to the information provider. 6. In a system that includes computational devices connected through a communications network, a communication device to link an information provider with a consumer of information consisting of: specific units of information that must be shared; digital documents that carry such information; an information provider to transmit that information in the form of advisors; a consumer of information to receive the advisors; characterized in that, the advisors are transmitted through the communications network from the information provider to the information consumer; and a communications protocol to direct with a narrow focus the information to a consumer of information by automatically linking the information with a consumer of information for whom that information is relevant. 7. The apparatus according to claim 6, characterized in that it further comprises: an information reader associated with the information consumer's computer to perform the determination of relevance. 8. The apparatus according to claim 7, characterized in that the determination of relevance is performed automatically based on a combination of conditions including, any of the attributes of hardware, configuration attributes, database attributes, environmental attributes, computational attributes, remote attributes, opportunity, personal attributes, randomization, and information attributes. 9. The apparatus according to claim 6, characterized in that the information consists of: digital documents that contain an explanatory component that describes in terms that the information consumer can easily understand, the reason why the information is relevant and the purposes and effects of the action that is recommended to the information consumer. 10. The apparatus according to claim 7 characterized in that, the information reader comprises: an accumulator to accumulate the information to which the consumer subscribes; a subscription administrator to make subscriptions to information based on information in at least one definition file of the consumer's information site; a decompressor to analyze the information; a module to determine the relevance of the information, the determination being made either continuously with scheduled intervals or under the manual control of the user; a user interface that receives the Relevant tormations; and a presentation and administration system that presents the relevant information to be inspected by the information consumer. 11. A communication apparatus characterized in that it comprises: an information consisting of: a relevance clause that comprises a determination about a computer consuming information, its content or environment that can be automatically evaluated when comparing that determination with the actual state of the information consumer's computer; a message associated with that relevance clause whose convenience for the consumer is at least partially determined when evaluating the relevance clause; an accumulator to ensure that relevance clauses flow to the information consuming computer from different locations; a vigilante to evaluate the clauses of relevance when comparing them with the real state of the information consumer's environment and when inspecting the properties of the information consumer's computer and its environment and verify if these point to or from relevance; and a notifier to display the messages to a consumer of information at least the partial guidance of a evaluated relevance clause. 12. The apparatus of claim 11, the information further comprises any of the following: a compressor for packing the information in the information for transport and subsequent decoding; a line of, that identifies the author of an information; a subject line that summarizes the subject of the information; a relevance clause component to specify the conditions under which the information is relevant; a message body component to provide explanatory material that explains to the user what condition is relevant, for which the user is interested and what action is recommended; and an action button component to provide the user with the ability to invoke an automatic execution of the recommended action. 13. A mechanism for coding one or more digital documents that convey information through of computer networks and other digital means of transport comprising: a compressor to pack the digital document (s) for transport and subsequent decoding; a line of, that identifies the author of an information; a subject line that summarizes the subject of the information; a relevance clause component to specify the conditions under which the information is relevant; a message body component to provide explanatory material that explains to the user what condition is relevant, for which the user is interested and what action is recommended; and an action button component to provide the user with the ability to invoke an automatic execution of the recommended action. characterized in that, one or more digital documents comprise sent messages that do not have a particular recipient or list of recipients. 14. The mechanism according to claim 13, characterized in that the digital document or documents also comprise any of the following: a clause to expire if, to make a document expire if it is evaluated that clause is true; a clause to evaluate if, to make the document be evaluated in its relevance if the value of the evaluation is true; a required inspector library clause, to give the name of a specific inspector library and a URL where it can be found, having to install that specific inspector library so that the relevance is evaluated correctly; a clause to refer to: to give keyboard labels of systems referenced by a condition associated with a document; and a solution clause affects, to give a keyboard labeling of the effects of a recommended response. 15. The mechanism according to claim 13, characterized in that the message body further comprises: digital authentication features appended to the message to ensure its integrity and authenticity. 16. The mechanism according to claim 13, characterized in that one or more digital documents they are packaged in the form of text files that are a valid instance of a MIME file. The mechanism according to claim 16, characterized in that the MIME file further comprises any of the following: header lines to specify that a message body may be preceded by an extensive message header consisting of a variety of lines of heading where the individual lines begin with a well-known phrase and contain address, date and related comments; means to create new message lines in messages including any means to introduce new message lines in messages and means to register those new lines before the MIME authorities; means to offer different versions of the same message by selecting the destination an appropriate presentation method; and a compilation mechanism to pack several complete MIME messages into a single file for online transport. 18. The mechanism according to claim 13, further comprising: one or more evaluation blocks for containing information that evaluates the digital documents or agreement with criteria that include any of the following: privacy, security and usefulness. 19. A method for coding one or more digital documents that carry information through computer networks and other digital means of transport, the process comprises the steps of: packing one or more digital documents for transportation and subsequent decoding; identify the author of an information; briefly identify the subject of the information; specify the conditions under which that information is relevant; provide explanatory material that explains to a user what condition is relevant, why the user is interested and what action is recommended; and provide the user with the ability to invoke an automatic execution of the recommended action; characterized in that, the one or more digital documents contain emitted messages that do not have a particular recipient or list of recipients. The method according to claim 19, characterized in that the digital document (s) further comprises: one of the following: a clause to expire if, to make a document expire if it is evaluated that clause is true; a clause to evaluate if, to make the document be evaluated in its relevance if the value of the evaluation is true; a required inspector library clause, to give the name of a specific inspector library and a URL where it can be found, having to install that specific inspector library so that the relevance is evaluated correctly; a clause to refer to: to give keyboard labels of systems referenced by a condition associated with a document; and a solution clause affects, to give a keyboard labeling of the effects of a recommended response. 21. The mechanism according to claim 19, characterized in that the message body further comprises: digital authentication features appended to the message to ensure its integrity and authenticity. 22. The mechanism according to claim 19, characterized in that one or more digital documents they are packaged in the form of text files that are a valid instance of a MIME file. 23. The mechanism according to claim 22, characterized in that the MIME file further comprises any of the following: header lines to specify that a message body may be preceded by an extended message header consisting of a variety of lines of heading where the individual lines begin with a well-known phrase and contain address, date and related comments; means to create new lines of message in messages including any means to introduce new message lines in messages and means to register those new lines before the MIME authorities; means to offer different versions of the same message by selecting the destination an appropriate presentation method; and a compilation mechanism to pack several complete MIME messages into a single file for transport over the Internet. 24. The method according to claim 19, characterized in that it also comprises: one or more evaluation blocks for containing information that evaluates the digital document (s) of according to criteria that include any of privacy, security and utility. 25. A method for inspecting any of the properties of a computer, the configuration of the computer, the contents of the storage devices of the computer, the peripherals of the computer, the computer environment or remote affiliated computers, characterized in that it comprises the stages of: inspector dispatcher; provide at least one inspector that includes an inspection library and associated methods; and evaluate subexpressions with at least one inspector; inspector dispatcher where the inspector performs any logical-mathematical calculation, executes computational algorithms, returns the results of system calls, has access to the contents of storage devices and searches remote devices or computers. 26. The method according to claim 25, further comprising the steps of: providing an inspector dispatcher associated with an information consuming computer to continuously perform the determination of the re 1 evanc la; characterized in that the determination of relevance is made by a database of relevance clauses that can be continuously evaluated; and because the inspection library contains an executable code that is invoked by the inspector dispatcher as part of the relevance determination process. 27. The method according to claim 25, characterized in that it also comprises the steps of: sending certain clauses of relevance to a remote location; evaluate the clauses; and return those clauses after the user is aware of what is being transferred, thereby recognizing the properties of that remote location. 28. The method according to the claim 25, characterized in that the evaluation of relevance is carried out in a master-slave relationship, by means of a master machine that instructs the slave machine to perform the evaluation of a relevance clause. 29. The method according to the claim 26, characterized in that the dispatcher module of the method performs the steps of: analyzing a clause in a language of relevance; generate a Ship List of the method in response to the analysis stage, calling specific methods in a specific order with lists of specific arguments; and systematically perform a sequence of method shipments in an appropriate order. 30. An inspector to inspect any of the properties of a computer, the configuration of the computer, the contents of the storage devices of the computer, the peripherals of the computer, the environment of the computer or the remote affiliated computers, characterized in that the inspector comprises: an inspector library containing an executable code that is invoked as part of a continuous process of relevance evaluation; and one or more methods inspectors to perform any of logical-mathematical calculations, execute computational algorithms, return the results of system calls, access the contents of storage devices and search devices or remote computers. 31. The apparatus according to claim 30, further comprising: an inspector dispatcher associated with a computer consuming information to continually make determinations of relevance, characterized in that the determination of relevance is made by a database of relevance clauses that can be evaluated continuously; and because, the inspection library contains an executable code that is invoked by the inspector dispatcher as part of the relevance determination process. 32. The apparatus according to claim 30, characterized in that certain clauses of relevance are sent to a remote location., evaluated and returned, after the user has been informed of what is being transferred, with which the properties of the remote location can be recognized. 33. The apparatus of claim 30, characterized in that the relevance evaluation is performed in a master-slave relationship, by means of a master machine that instructs a slave machine to evaluate a relevance clause. 34. The inspector of claim 30 wherein the inspector library further comprises any of the following: a statement of a [phrase] to be used . in a language of relevance; an association of that [phrase] to a specific method; a statement of a new type of data to be used in an evaluation process; a statement of a call prototype of a specific method including a number and types of data arguments required to be supplied to the specific method; a statement of a type of result data of the specific method; an implementation of the specific method in executable form; a statement of a special hook association code to be called in events, those events include any initialization of the inspector dispatcher, the inspector dispatcher's term, the start of the inspector dispatcher's main evaluation circuit and the end of the main evaluation circuit of the inspector dispatcher; a declaration of special hooks associated with the creation and maintenance of special cache, associated with the specific method; and an implementation of special event methods and cache methods in executable form. 35. The inspector according to claim 30, characterized in that it also comprises a module for linking the inspector library in the inspector dispatcher with all the evaluated statements that result in changes for the internal data structures of the inspector dispatcher, making available a new method of invocation for the sending of inspector. 36. The inspector of claim 35, characterized in that it further comprises: a syntax table to provide the resulting changes to all allowed phrases and associated data types in which they operate; and a dispatcher table to systematically determine an associated executable method for given types of phrases and data. 37. The inspector of claim 30, characterized in that a plurality of inspector libraries are installed in an instance of the inspector dispatcher to define a group of [phrases] recognized in a relevance language, a group of data types allowed in the moment of the evaluation and a group of methods associated with these types of data. 38 The inspector of claim 30, characterized in that the inspection libraries are linked to the dispatch of the inspector at the moment in which inspector dispatcher is initialized; and because declaration routines are invoked, new [phrases] are installed in the lexical analysis table of a relevance language, these new [phrases] are associated with a certain invocation method when the link is made. 39. The inspector according to claim 30, characterized in that it also comprises some of: a base layer comprising a mechanism for elementary operations, including arithmetic and logic, that are independent of the system; a specific layer of the system associated with a specific operating system; one or more specific sales layers to provide access to specific hardware devices and software products; and additional layers that are appropriate based on other information providers. 40. The inspector of claim 30, characterized in that the inspector comprises, any of the following: a system-specific inspector to access the properties of an operating system and allow the information to be written to verify the existence and configuration of the the attached devices and others subsystems; a registry inspector to allow a relevant language to refer to and evaluate properties of a registry database; a preference inspector to allow the reference language to refer to and evaluate the properties of a file of preference for a specific application; a database inspector to allow the relevance language to access fields in a database; and a profile inspector to allow a relevant language to refer to data stored in a user profile. 41. The inspector according to the claim 30 which also comprises: a template file to describe a grouping of variables to which an information provider plans to refer in the information; characterized in that that template file is placed in an information site and is automatically gathered at the time of synchronization; because the template file is used to drive an editor module on a consumer computer that presents the user with a list of variable names of template and a list of its current values or blanks if they have not been previously defined; and because the user can fill in those blank areas and edit other fields. 42. The inspector of claim 30, characterized in that the inspector comprises: a remote inspector to inspect the properties of other communicating devices; the remote inspector inspects any of the following: remote physical measurements; searches on remote devices; remote computations; searches in remote databases; and invocation of remote relevance. 43. The inspector according to claim 30, characterized in that the inspector consists of: a program download inspector to allow a relevant language to refer to data stored in a file or specific download files with any specific application, in where the specific download file may consist of any one of a network explorer download, a telecom download, a fax download, or a download of drive streams (click). 44. In a system that includes computing devices connected by means of a communications network, the system comprises, a communication apparatus for linking an information provider with a consumer of information, the communication apparatus consists of specific units of information that have to shared, digital documents that carry such information, a provider of information to issue that information in the form of information, a consumer of information to receive such information, characterized in that the communications are sent through a communications network from the information provider to the consumer of information, a communications protocol to direct with a narrow focus the information to the consumer of information by means of the automatic association of communications with a consumer of information for which that information is relevant and an inspector dispatcher associated with a computer information consumer to continuously perform the relevance determination where, the determination of relevance is made through a database of relevance clauses that can be evaluated continuously, at least one inspector that includes: an inspector's library and methods associated to evaluate the sub-expressions with at least one inspector; because the inspector library contains an executable code that is invoked by the inspector dispatcher as part of the relevance determination process; and because the inspector performs any mathematical logical calculation, executes computational algorithms, returns the results of the system calls, has access to the contents of the storage devices and looks for devices or remote computers.
MXPA/A/2001/002036A 1998-09-01 2001-02-26 Method and apparatus for computed relevance messaging MXPA01002036A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US60/098,798 1998-09-01
US09272937 1999-03-19
US09315732 1999-05-20
US09351416 1999-07-09

Publications (1)

Publication Number Publication Date
MXPA01002036A true MXPA01002036A (en) 2003-11-07

Family

ID=

Similar Documents

Publication Publication Date Title
US7346655B2 (en) Method and apparatus for computed relevance messaging
US6263362B1 (en) Inspector for computed relevance messaging
US8219677B2 (en) Method and apparatus for inspecting the properties of a computer
US7246150B1 (en) Advice provided for offering highly targeted advice without compromising individual privacy
US8914507B2 (en) Advice provided for offering highly targeted advice without compromising individual privacy
US7277919B1 (en) Relevance clause for computed relevance messaging
JP2002523841A5 (en)
Perks et al. Guide to enterprise IT architecture
US6697824B1 (en) Relationship management in an E-commerce application framework
US7765481B2 (en) Indicating website reputations during an electronic commerce transaction
US8321791B2 (en) Indicating website reputations during website manipulation of user information
US20060253580A1 (en) Website reputation product architecture
US20060253458A1 (en) Determining website reputations using automatic testing
US20060173985A1 (en) Enhanced syndication
WO2006119481A9 (en) Indicating website reputations within search results
TW491972B (en) System, method, and article of manufacture for electronic merchandising in an e-commerce application framework
WO2000057327A1 (en) Method and apparatus for computed relevance messaging
MXPA01002036A (en) Method and apparatus for computed relevance messaging
Dutton Trust–Issues in the design and development of electronic commerce systems
User file l
Hussin PTA: Personal Trust Agent for e-Commerce