WO2001024059A2 - Method and apparatus for an active file system - Google Patents
Method and apparatus for an active file system Download PDFInfo
- Publication number
- WO2001024059A2 WO2001024059A2 PCT/US2000/026913 US0026913W WO0124059A2 WO 2001024059 A2 WO2001024059 A2 WO 2001024059A2 US 0026913 W US0026913 W US 0026913W WO 0124059 A2 WO0124059 A2 WO 0124059A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- user
- file system
- recited
- users
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/148—File search processing
Definitions
- the present invention relates generally to computerized file servers/systems and is particularly directed to a file server/system ofthe type that automatically sends a notification message upon the occurrence of a predetermined triggering event.
- One embodiment ofthe invention is specifically disclosed as a web-based active virtual file system that controls the access rights of users to files stored on the file server ofthe active virtual file system, while providing an automatic notification E-mail message to predetermined users when a triggering event occurs, such as the uploading of a file onto the file server.
- FIG. 1 shows a conventional filing system generally designated by the reference numeral 10 that is accessible by users over a network.
- a first user at 20 is connected to an Internet Service Provider (ISP) at 30, in which this first user has a browser software package on his or her computing platform, as well as a graphical user interface operating system, such as WINDOWS or MACINTOSH.
- ISP Internet Service Provider
- a second user at 22 has a similar computing platform containing a browser and a graphical user interface operating system, and this user is connected to a second Internet Service Provider (ISP) at 32. Both of these ISP's 30 and 32 are connected to the Internet, which is generally designated by the reference numeral 35.
- ISP Internet Service Provider
- a central file system is generally designated by the reference numeral 50, which contains a conventional file server operating system and at least one hard disk drive at 52.
- the file system 50 represents the main core of an Internet web site, which is connected to the Internet 35 via a web server 40 and a user interface software package 42.
- both users 20 and 22 can simultaneously be connected through web server 40, user interface module 42, and to the file system 50, and can simultaneously access various web pages of this web site.
- a third user at 24 is connected to a local area network (LAN) using a LAN input-output module, and where the LAN itself is generally designated by the reference numeral 45.
- a fourth user 26 also is connected to the LAN via a separate LAN input-output module.
- the LAN 45 is directly connected into the file system 50, and users 24 and 26 will have access to files stored on the hard disk drive, via the server operating system at 52. Some of these files may contain displays that are either similar or identical to those displays made available through the Internet 35 to users 20 and 22.
- a user Authentication module 60 is provided, which typically is in the form of a user login name and a user-specific password.
- the file system 50 will determine what access rights this particular user will have to any ofthe files or displays residing on the hard disk drive at 52.
- This user's access rights are determined by use of an "Access Rights" module at 62.
- Such rights typically include the right to "read” a file stored within the file system 50, and to potentially “write” to a file also stored on file system 50. In most circumstances, if a user has the right to write to a particular file, that user will also have the right to read that same file, although these particular rights can be different and separate for any given file.
- a User Management module 64 is also provided for file system 50, in which new users can be created, existing users can be deleted or otherwise edited, wherein these functions can be performed by the systems administrator. In addition, the user himself or herself can typically perform certain functions, such as changing a password or potentially even deleting oneself from the system as a user altogether.
- the User Management module 64 could also be fully automatic, such as in the circumstance of certain Internet web sites that allow users to essentially create themselves as being associated with that web site, under the control of software (such as the "User Management module" at the web site.
- NFS Network file system
- IP Internet Protocol
- TCP Transmission Control Protocol
- NFS Open Network Computing
- CIFS is a proposed protocol that defines a standard remote file system access protocol for use over the Internet, which enables groups of users to work together and share documents across the Internet or within their own corporate intranets. While not yet finalized, CIFS is designed as an open cross-platform technology based on the native file-sharing protocols built into Microsoft WINDOWS and other popular personal computer operating systems, and probably will be supported on dozens of other platforms, including UNIX. CIFS is proposed to be an enhanced version of Microsoft's open, cross-platform Server Message Block (SMB) protocol, the native file-sharing protocol in the Microsoft WINDOWS 95, WINDOWS NT, and OS-2 operating systems, and may become the standard way that millions of personal computer users share files across corporate intranets.
- SMB Server Message Block
- an improved computerized file system is provided that is accessible by users on a stand-alone computer, over the Internet, or via a local area network (LAN) or wide area network (WAN).
- the Internet users typically operate personal computer platforms having a web browser software program that communicates with an Internet Service Provider (ISP), which launches the users onto the Internet itself.
- ISP Internet Service Provider
- a web server located near the computerized file system ofthe present invention receives messages from the users, and transmits messages back to those users as they "logon" to the file system.
- the LAN users typically operate personal computer or workstation platforms that are directly connected to a local area network (LAN), which in turn is connected into the web server at the computerized file system's site.
- LAN local area network
- These LAN users will also preferably have a web browser-type software program that is in communication over the LAN with the web server near the computerized file system ofthe present invention.
- the web server is connected to a user interface that presents a "folder" window to the user, in the form of a Java tree structure or any hierarchical structure defined by the file system .
- the user interface also is in communication with a active file system (which is also referred to as a "AFS"), a web-based version of which comprises a network server operating system, which includes at least one hard disk drive and a database.
- AFS active file system
- the AFS operating system may operate as a standalone system (with no network connection), or may be resident on top of a different architecture, or on top of other applications running on the same computing platform.
- Authorized users optionally can seamlessly encrypt their data when uploading files uploading files to the AFS.
- Other functions that are available to the active virtual file system 150 include a "User Management” function and a "Group Management” function, which allow the AFS systems administrator to add, delete, or edit users and their attributes (at the User Management function), and to also group various users in predetermined ways (using the Group Management function).
- the User Management and Group Management functions also allow importing users/groups from other systems, such as UNIX password/group files, or from other systems such as NIS, NT or Novell operating systems.
- the main kernel logic ofthe preferred AFS operates at a level only as low as “folders” (i.e., "directories"), however, it maybe configured to control individual files and application programs as well.
- a "Modules" function contains logic that controls the appearance ofthe screens at the user's monitor, and command choices at the user's monitor screen are provided at appropriate times.
- the Modules function manages the files of a folder — and therefore, can control individual files — and also contain applications (such as word processors and spreadsheet computer programs).
- the Modules function also controls "objects.” With reference to the present invention, a file is an example of an object, and an event is another example of an object. An application program can also be an object.
- the Automatic Notification function provides the capability of making the AFS an “active” file system.
- the Automatic Notification function checks to see if any "triggering" events have occurred when a user performs a particular task. Such a triggering event could be merely the opening or downloading of a file on the hard disk drive, or more importantly, the saving (or uploading) of a file on the hard disk drive ofthe AFS.
- the Automatic Notification function defines what exact type of event will become a triggering event.
- the Automatic Notification function also defines what will be the triggering action, once the triggering event occurs. All of this information preferably is stored in the database, in which all of the defining triggering events and triggering actions are preferably held in a single large table ofthe database.
- the active aspects ofthe AFS ofthe present invention work completely outside any database program and instead concentrate on the file system itself to both monitor and control certain actions by users, and then provide for the Automatic Notification function to perfo ⁇ n a predetermined task upon the occurrence of such predetermined actions by these users.
- the Automatic Notification function has the capability to send messages automatically to other users that have an interest in a particular file that undergoes certain activities, which are predetermined by the systems administrator. There is complete flexibility as to just what events can be specified as becoming a "triggering event," and there is complete flexibility as to "who" receives an Automatic Notification message.
- the Automatic Notification messages would normally be sent to users who are grouped in some logical (or at least predetermined) manner, according to the Group Management function.
- Triggering events could be more complex than simple file operations, and for example, such "complex events” could comprise a sequence of "simple events.” These complex events (as triggering events) are completely programmable, and their resulting actions can be similarly “complex” from the standpoint that they are also completely programmable, and further are able to launch completely separate application programs. Moreover, the "complex actions" that can be programmed using the AFS may launch application programs to both LAN users (without use of the Internet) and to WAN users (including those connected via the Internet).
- these Automatic Notification messages are transmitted via E-mail technology.
- Automatic Notification messages are completely configurable and may encompass both asynchronous and synchronous messaging as well as the launching of other programs or combinations thereof.
- E-mail-type messages By use of E-mail-type messages, the notification process can be initiated simultaneously for all users who are to receive any such notification message.
- the use of E-mail technology provides certain advantages, such as balancing the loading ofthe network traffic. This allows users to come to the file, rather than sending the file to all ofthe users.
- a "Files" module is provided to combine World Wide Web technology and E-mail technology to allow users to seamlessly upload and download files to and from AFS folders over the Internet.
- the AFS When a new file becomes available for a user to either download or view, the AFS provides an Automatic Notification message to the appropriate users via E-mail technology. Furthermore, an Auto-notification message is sent to predetermined users and/or the systems administrator when a user has uploaded a file onto the AFS.
- the Automatic Notification function ofthe present invention could be implemented by a rules-based system that could, for example, automatically execute other computer programs upon the occurrence ofthe triggering event, or implemented by use ofthe triggering features of an active database computer program, such as ORACLE or DB2.
- Auto-notification function can comprise other programs that are launched to perform certain tasks.
- the precise type of auto- notification is fully configurable for each component in the preferred AFS. All Auto-notification messages contain links to the AFS, and the link will open the user's web browser and take the user directly to the folder or object that was just triggered.
- One other unique aspect ofthe preferred AFS ofthe present invention is the fact that more than one single file can be stored having the same virtual filename, at least the same filename as far as the individual users are concerned.
- the actual filename on the AFS is stored in a "Files Table," and a link to that file is stored in the AFS.
- the file is physically stored on the hard disk drive ofthe server. The location or directory is based upon a setting in the database and also the username ofthe virtual folder where the file is being uploaded to. If a file already exists having the same filename, a unique filename is generated for that file, at least with respect to the AFS server operating system. The user does not see this unique filename, but instead is only shown the "Display Name" ofthe file that is stored in the database. This "Display Name" is the filename that was selected for uploading.
- Figure 1 is a block diagram of a conventional file system that can be accessed by users over a LAN or via the Internet, as known in the prior art.
- Figure 2 is a block diagram depicting a web-based active virtual file system that can be accessed by users over a LAN or via the Internet, as constructed according to the principles ofthe present invention.
- Figure 3 is a flow chart showing the logical operations for authentication and controlling user's access rights ofthe web-based active virtual file system of Figure 2.
- Figure 4 illustrates a display screen depicting some ofthe options available to a systems administrator ofthe web-based active virtual file system of Figure 2.
- Figure 5 illustrates a computer display screen depicting the User
- Figure 6 illustrates a computer display screen depicting some ofthe functions for Group Management available to a systems administrator using the web-based active virtual file system of Figure 2.
- Figure 7 illustrates a computer display screen depicting some ofthe options available to a user, as opposed to a systems administrator, using the web-based active virtual file system of Figure 2.
- Figure 8 is a flow chart depicting some ofthe choices presented to a user or systems administrator in managing folders, using the web-based active virtual file system of Figure 2.
- Figure 9 is a flow chart showing some ofthe choices presented to a systems administrator performing User Management functions ofthe web-based active virtual file system of Figure 2.
- Figure 10 is a flow chart depicting some ofthe important choices made available to a systems administrator performing Group Management functions, using the web-based active virtual file system of Figure 2.
- Figure 11 is a flow chart depicting some ofthe logical operations and choices presented to a systems administrator performing Access Rights management functions with respect to users and groups, using the web-based active virtual file system of Figure 2.
- Figure 12 is a flow chart depicting some ofthe important choices made available to a systems administrator when selecting the type of Automatic Notification functions for various user operations, using the web-based active virtual file system of Figure 2.
- Figure 13 is a flow chart showing some ofthe logical operations involved with the management of modules, using the web-based active virtual file system of Figure 2.
- Figure 14 is a flow chart illustrating some ofthe choices made available when performing Object Management functions, using the web-based active virtual file system of Figure 2.
- Figure 15 is a flow chart showing some ofthe important logical operations for an example in which a "files module" is utilized, using the web-based active virtual file system of Figure 2.
- Figure 16 is a flow chart showing some ofthe important choices made available in an example of using options relating to objects, using the web-based active virtual file system of Figure 2.
- Database a large collection of data organized in a manner to facilitate quick retrieval.
- Active Database a database that includes a management system that can automatically react to events, such as database transactions, time events, and external signals that trigger the evaluation of a condition; and if the condition evaluates to be true, a specific action is carried out.
- Traditional Database a database system that is passive in behavior, which either periodically polls the database, or embeds or encodes event detection and execution of related action in the application code.
- Field an area of a database record into which a particular item of data is stored.
- File a block of information that is stored on a computerized electronic storage device; in typical installations, a file has an associated "filename.”
- File System in a computer, a way in which files are named and where they are placed logically for storage and retrieval.
- DOS DOS, Windows, OS/2,
- Macintosh, and UNIX-based operating systems all have file systems in which files are placed somewhere in a hierarchical (tree) structure.
- a file is placed in a directory (folder in Windows) or subdirectory at the desired placed in the tree structure.
- the term also encompasses the part of an operating system or program that supports a file system.
- Folder an organizational unit that houses objects (including files) and other folders; sometimes also referred to as a directory in a disk operating system.
- a folder is a named collection of related files that can be retrieved, moved, and otherwise manipulated as one entity.
- the folder has a data structure that represents the storage location it comprises in the file system.
- Internet a set of networks interconnected with routers.
- Module a segment of code written to certain specifications to perform a specific function, which allows for the creation, modification, or deletion of a specific object that the module was created for.
- Network an interconnected group of computers that connect to and cooperate with each other.
- Object a single entity of a specific type of information.
- a file is an object
- an event is an object.
- Operating System software that controls the operation of a computer, including the organization of its memory components, such as a hard disk drive.
- Packet a unit of data sent across a network.
- Physical Storage a medium onto which data can be entered, in which it can be contained (i.e., stored) and from which it can be retrieved at a later time; examples include a hard disk, semiconductor memory (e.g., RAM, ROM, EPROM, EEPROM, NVRAM), compact disc, etc.
- semiconductor memory e.g., RAM, ROM, EPROM, EEPROM, NVRAM
- compact disc etc.
- Record an ordered set of fields; a row in a database table.
- Router a device that forwards packets between networks.
- Table a collection of records in a database.
- Web Browser a program that allows a person to read hypertext.
- Figure 2 illustrates the major building blocks of a computerized file system that is accessible by users over the Internet or via a local area network (LAN), in which this system is generally designated by the reference numeral 100.
- a first user at 120 operates a personal computer platform having a web browser software program, and this browser is in communication with an Internet Service Provider (ISP) 130.
- the computer platform of the first user 120 additionally contains a graphical user interface operating system, such as WINDOWS or MACINTOSH.
- a second user at 122 similarly has a computer platform with a web browser software program which is in communication with another ISP 132, and a graphical user interface operating system.
- This second user 122 could have an entirely different type of platform, as compared to the first user 120, such as a MACINTOSH or a UNIX-based workstation, or even a hand-held computer.
- Both ISP's 130 and 132 are connected to the Internet, which is generally designated by the reference numeral 135.
- the Internet is also used for communications to a web server 140, which is located near the computerized file system ofthe present invention.
- a third user at 124 also uses a personal computer or a workstation platform, and is connected to a local area network (LAN) 145 via a LAN input/output module.
- a fourth user at 126 is similarly connected to LAN 145 by use of a LAN input/output module.
- the LAN 145 is connected to the web server module at 140, rather than being directly connected into the network file system (as was the case in Figure 1 , where LAN 45 was directly connected to the file system 50).
- the third and fourth users at 124 and 126 additionally have a web browser-type software program that is in communication with web server 140 over the LAN, and further utilize a graphical user interface operating system, such as WINDOWS or MACINTOSH, or a UNIX-based graphical user interface, for example.
- a graphical user interface operating system such as WINDOWS or MACINTOSH
- a UNIX-based graphical user interface for example.
- the web browser functionality of these user platforms at 124 and 126 provide certain advantages when used with the active virtual file system 150 ofthe present invention, as discussed below in greater detail.
- Web server 140 is connected to a user interface 142.
- User interface 142 is used to present a "folder" window to the user, which in the present form is a Java tree-type structure, as seen on Figure 4 by the folder window 260.
- User interface 142 is in communication with a web-based active virtual file system generally designated by the reference numeral 150, and also referred to as a "AFS.”
- This active virtual file system 150 contains a network server operating system, which includes a powerful microprocessor circuit and physical storage devices at 152, including random access memory and at least one hard disk drive.
- the preferred active virtual file system 150 also contains a database at 154, which will be discussed in greater detail hereinbelow.
- the preferred server operating system at this time is WINDOWS NT, and the preferred database system at this time is ORACLE, however, it will be understood that virtually any type of computer operating system or database program could be used with the active virtual file system ofthe present invention.
- web-based in reference to the file system ofthe present invention means that each user will preferably have a web browser on his or her computer platform, although each such user may or may not be communicating to the AFS platform over the Internet.
- users talking to the AFS platform 150 over a LAN e.g., users 124 and 126 on Figure 2 are not using the Internet, but they nevertheless are using a web browser to better utilize the features ofthe AFS.
- the active virtual file system 150 utilizes an "Authentication" function 160 to determine if this particular user now communicating to the AFS 150 should gain access at all to the system. More detailed information concerning this function will be presented below.
- the user's access rights are represented by information that has been stored in the AFS 150 pertaining to this particular user. This information essentially determines whether or not a user has the right to either read or write, or both read and write, a particular file that already resides on the active virtual file system's hard disk drive at 152. These access rights also determine whether or not a user will be able to upload a new file onto the hard disk drive at 152. More detailed information concerning this function will be presented below.
- a "User Management” function at 164 and a "Group Management” function at 166.
- these functions allow the systems administrator to add, delete, or edit users and their attributes (at the User Management function 164), and to also group various users in predetermined ways using the Group Management function 166. Further information concerning these functions will be presented below.
- These User Management and Group Management functions of the present invention also allow importing users/groups from other systems, such as UNIX password/group files, or from other systems such as NIS, NT or Novell operating systems.
- This functionality is extremely useful to users that already own a database of information (e.g., a listing of employees with standard personnel information), since this database can be imported into the AFS 150 to automatically create new users and groups in one major step.
- the customer i.e., the systems administrator
- the customer will not need to enter by hand all of these employee records into the FileDeliveryTM system when creating entries for these new users and groups.
- the main kernel logic operates at a level only as low as "folders," or directories in the vernacular of a disk operating system. Individual files and application programs are controlled at a different level by a different functional application.
- a "Modules" function at 170 contains logic that controls the appearance ofthe screens at the user's monitor. Furthermore, command choices at the user's monitor screen are provided at the appropriate times.
- This Modules function 170 manages the files of a folder — and therefore, can control individual files — and also contain applications (such as word processors and spreadsheet computer programs).
- Another example of an application controlled by the Modules function 170 is a personal address book application, or a calendar application.
- the Modules function block 170 also controls "objects," which are depicted as a separate function block at 172.
- a file is an example of an object, and an event is another example of an object.
- An application program can also be an object. More detailed information concerning the Modules function 170 and Objects function 172 will be discussed in greater detail below.
- Another unique function associated with the active virtual file system 150 is an "Automatic Notification” function block at 180.
- This Auto-notification function 180 is what makes the present invention an “active” file system.
- Automatic Notification function 180 checks to see if any "triggering" events have occurred when a user performs a particular task. Such a triggering event could be merely the opening of a file on the hard disk drive 152.
- a more useful Automatic Notification function perhaps is when a user modifies a file and saves it on the hard disk drive 152. This is referred to as “uploading" a file from a user into the AFS 150. When a user "opens" a file from the hard disk drive 152, this is referred to as “downloading" a file from the AFS 150.
- the Automatic Notification function 180 defines what exact type of event will become a triggering event. Furthermore, the Automatic Notification function 180 also defines what will be the triggering action, once the triggering event occurs. All of this information preferably is stored in the database 154. In the preferred embodiment, the database software (which preferably is ORACLE) will hold all ofthe defining triggering events and triggering actions in a single large table ofthe database. Of course, it will be understood that other brands of database management software could be used instead of ORACLE for this task, or a special file structure could be created that uses no commercially-available database software.
- the file system 150 ofthe present invention is an active file system is a significant distinction as compared to conventional file systems known in the prior art. While there have been active databases known in the prior art, the predefined events and actions of such active databases are merely contained within the database itself, and none ofthe active functionality is at all related to the computer's central file system.
- the active aspects ofthe present invention work completely outside any database program and instead concentrate on the file system itself to both control certain actions by users, and then provide an Automatic Notification function upon the occurrence of other predetermined actions by these users. For example, if a user is logged into the AFS 150 and downloads a particular file, edits that file, and then saves that file into the hard disk drive 152 by uploading the file into the AFS 150, then the present invention's
- Automatic Notification function has the capability to send messages automatically to other users that have an interest in this particular file. This notification would normally be sent to users who are grouped, according to the Group Management function 166. In the preferred embodiment, these Automatic Notification messages are transmitted via E-mail technology. A more complete description of the Automatic Notification functions for the active virtual file system 150 is provided hereinbelow.
- complex triggering events certainly may be more complex than simple file operations, and such complex triggering events are completely programmable. Moreover, their resulting actions also are completely programmable, and these actions may be similarly “complex,” having the capability to launch completely separate application programs.
- the "complex actions” that can be programmed using the AFS 150 may launch application programs to both LAN users, such as users 124 and 126 (without use of the Internet) and to WAN users (including those connected via the Internet, such as users 120 and 122).
- a graphic user interface, or a scripting language optionally can be provided for use by the systems administrator.
- the AFS operating system may operate as a stand- alone system, or may be resident (e.g., as a library) on top of other architectures, or applications running on the same computing platform.
- the FileDeliveryTM system ofthe present invention is a "technology" rather than a single product.
- FileDelivery's API Abstract Program Interface
- the front end API acts as the user interface and makes the system extensible such that other applications may be integrated with the FileDeliveryTM technology.
- the back end API enables the FileDeliveryTM technology to be implemented on top of different architectures. For example, to implement the FileDeliveryTM technology ofthe present invention on top of an ORACLE database program, the bottom layer only need by implemented using ORACLE.
- the Authentication function provides a mechanism that allows a user to access a FileDeliveryTM server, which is another name for the preferred server 152 ofthe web-based active virtual file system 150.
- the default authentication method uses an internal user database that is based on user components, such as the "usemame" and "password.” This is the information that is presented to the step 200 on Figure 3, in which the user enters his or her authentication information.
- a decision step 202 determines whether or not the authentication information is correct, and if not, an error message is displayed at a step 204.
- Additional security preferably is provided using an SSL (Secure Sockets Layer) on the FileDeliveryTM server.
- SSL Secure Sockets Layer
- the Authentication procedure provides a single access point to all objects and folders residing on the active virtual file system 150, and the "Access Rights" function. Users can optionally encrypt their data by use of, for example, PGP encryption software.
- the operation of uploading files to the FileDeliveryTM server 152 ofthe present invention can be enhanced by, first, seamlessly encrypting the contents ofthe user's file (or other type of data structure), such that the encryption operation is transparent to the user, and second, automatically uploading the (encrypted) file into the server 152.
- a step 210 determines the access level for this user based upon the authentication information. At this point, it is determined if the user-entered authentication information reveals that a regular user has logged into the system, or if the systems administrator has logged into the system. This information will be used later.
- a step 212 now presents user interface information based upon his or her access level.
- a display screen is sent to the monitor ofthe user at his or her remote location, and this display screen will present a folder tree (e.g., a Java folder tree) and a set of options.
- a folder tree e.g., a Java folder tree
- An example of such a display screen for a systems administrator is provided on Figure 4.
- the function step 212 will simultaneously display a folder tree at a step 220 and a list of options at a step 224.
- the folder tree choice will include accessible folders and objects at a step 222.
- the options choice at 224 first looks to see if the person logged into the system is the administrator or not, at a decision step 230. If the answer is YES, a step 232 will show user and Group Management information on the administrator's display screen. If the answer was NO at decision step 230, then a step 234 will show standard options, such as changing a password. The systems administrator also has access to these standard options at step 234.
- a display screen 250 shows both a folder window at 260, and a list of options at 262.
- the user who has been logged into the FileDeliveryTM server is the systems administrator, as can be seen by the notation at 264.
- Display screen 250 includes the standard Internet header information at 252, and also displays a top menu bar at 254.
- the folder window 260 presents a tree structure of folders, which is the function at step 220 on the flow chart of Figure 3.
- the information in the folder window can go all the way down to the file level, such as the file named "Autoexec.bat.”
- Folder window 260 can also display application programs, such as a calendar program, or a newsletter program. These files and applications are also referred to herein as "objects.”
- the options that are listed at 262 include the standard options for performing various administrator functions on a FileDeliveryTM server constructed according to the present invention. This includes user maintenance, group maintenance, customizing the screen resolution, changing passwords, providing feedback on the FileDeliveryTM system, setting the user's startup screen to the "Getting Started Guide,” and adding a site to the "Favorites.”
- the "User Maintenance" option is selected at 262
- a display screen such as that depicted in Figure 5 comes up on the systems administrator's monitor.
- the left-hand column at 270 lists the names ofthe users in a particular format, typically referred to as the "username,” and the next column to the right at 272 displays a particular symbol or flag if any particular user is authorized to view particular files.
- the next column to the right at 274 shows a particular symbol or flag if a particular user can be edited by the systems administrator, and the far right-hand column at 276 displays a particular flag or symbol if a particular user can be deleted, or has been deleted from the system in this session.
- the systems administrator also has two “buttons” that can be selected, including a "Create New User” button at 277, and a "Back to Startup Screen” button at 278.
- the logic describing these steps to create a new user is depicted in Figure 9, which is described in greater detail, hereinbelow. If the choice is made to go back to the startup screen, then the logic flow is directed back to step 212 on Figure 3.
- the attributes of a user in the preferred FileDeliveryTM system will be discussed hereinbelow.
- the center column of Figure 6 at 282 provides a symbol or flag that illustrates what groups can be edited, or are currently undergoing an edit procedure.
- the far right-hand column at 284 provides a symbol or flag that determines whether or not the systems administrator can delete a group, or already has deleted a group in this session.
- the soft button at 286 titled "Create New Group” will be selected. If that occurs, then the logic flow is directed to that described on Figure 10, which is described in greater detail, hereinbelow. On the other hand, the soft button at 288 will take the systems administrator "Back to Startup Screen,” which will cause the logic to be directed back to step 212 on Figure 3.
- Figure 7 illustrates the options that are typically made available to a user who is not a systems administrator.
- the options listed at 290 on Figure 7 would replace the options depicted on Figure 4 at 262, which are available only to a systems administrator.
- some of these options relate to customizing the user's screen resolution, changing the user's password, providing feedback on the FileDeliveryTM system, setting the startup screen to the "Options Screen,” taking the user back to the "Getting Started Guide,” or adding a site to the user's "Favorites.” If the user is a systems administrator, then both sets of options 262 and 290 would be listed on the display.
- a virtual folder system be used to provide the core functionality on the preferred FileDeliveryTM server at 150.
- the user interface depicted on Figure 4 at 260 preferably is based on a hierarchical "tree" structure that organizes sub- folders and objects. This structure preferably is not physical in nature, such as what a conventional file operating system would provide, and further the structure does not exist on a physical storage device, such as a hard disk drive. Instead, the preferred structure exists purely in a single table in a FileDeliveryTM database (i.e., database 154 on Figure 2). The methodology ofthe user interface ofthe present invention recursively accesses the database 154 to populate the tree that is displayed in the folder window at 260. In this manner, the preferred
- FileDeliveryTM user interface provides a familiar way to visualize the virtual structure so as to access sub-folders and objects.
- the user interface is fully customizable.
- Figure 8 illustrates a flow chart ofthe choices that can be made by a user to manage the folder of that particular user as the "owner" of that folder, or these choices are made available and can be managed by the systems administrator.
- the user interface allows the owner or administrator access to his or her folders from the "Folder Window” 260 on Figure 4.
- the user can "click" on one ofthe folders within the folder window 260, and a set of options will be displayed on the user's monitor, as depicted at a step 302 on Figure 8.
- the logic flow at certain nodes has the meaning of providing to the user more than one choice that is simultaneously displayed on the user's monitor screen.
- a step 310 when leaving the decision step 302, a step 310 provides folder options to the systems administrator or to the owner of this folder, while at the same time a step 330 provides "Folder Rights Management" to the administrator or owner if the rights management function has been enabled. Moreover, a step 334 also will simultaneously present "Object Options" to the administrator or owner if the rights management function has been enabled.
- a step 323 will delete that folder from the active virtual file system 150.
- a step 324 will rename that folder in the active virtual file system 150, wherein the user selects the new name.
- a step 325 will move a pre-selected folder within the active virtual file system 150 to a location that is named by the user.
- step 332 will be executed that directs the logic flow to the flow chart depicted on Figure 11. This will be discussed in greater detail hereinbelow.
- step 334 if the administrator or owner selects the "Object Options" function at step 334, then a step 336 will direct the logic flow to the Module Management process, which is depicted on Figure 13. This function will also be discussed in greater detail hereinbelow.
- Figure 9 illustrates a flow chart depicting the types of choices that are made available to the systems administrator who enters this User Management routine, starting at a decision step 350. Once into the User Management routine, several choices will simultaneously be presented to the systems administrator on his or her monitor screen.
- a "Create New User” function at a step 352 a "Delete User” function at a step 370, an "Edit User” function at a step 380, a function that allows the systems administrator to view the user's folder tree and the user's objects that a user has access to, based on the user's rights management, at a step 390, and finally a function at a step 392 that allows the systems administrator to import user data from a third party address book or database.
- An example of the source for this information could be an entry in a Microsoft Outlook module.
- a user is a person who can be authenticated to the preferred FileDeliveryTM server 152 of the active virtual file system 150. Users are provided with certain rights by the systems administrator ofthe FileDeliveryTM site, as controlled by the Access Rights component or function. The properties of a user include his or her E-mail address, password, and demographics and other specific information.
- the Admin User also referred to herein as the "systems administrator” is empowered to configure and maintain the FileDeliveryTM site, and is empowered to administer users, groups, rights, and modules.
- a Regular User is empowered to manage his or her own personal folders and objects, and also any shared folders and objects that he or she may have rights to.
- a step 354 requests certain information that is to be entered by the systems administrator about this particular user.
- the user's E-mail address is one critical piece of information that must be included at this point.
- other choices are presented to the systems administrator, including a step 356 which provides that the systems administrator can allow certain rights management for this particular user.
- a step 358 allows further options based upon modules that have been installed in the active virtual file system 150.
- a step 360 provides a notification to predetermined users ofthe active virtual file system 150, preferably by use of an E-mail message sent to those other users.
- This notification process is automatic, as per the Auto-notification function 180 ofthe active virtual file system 150.
- This is a primary example ofthe "active" file system ofthe present invention, versus a passive file system known in the prior art.
- Not every user in the active virtual file system 150 will necessarily receive a notification of an E-mail message, but instead only predetermined users will receive this message, as selected in advance by the systems administrator.
- One common method of selecting the particular users who will receive this notification message will be to form "groups" and to provide each user in a particular group with this notification message, but not provide any other users in the active virtual file system 150 with this particular message.
- the notification process can be initiated simultaneously for all users who are to receive any such notification message.
- the actual delivery of these messages can be performed more or less at the discretion ofthe file system itself, such that these messages will not interfere with other important active processing. Instead, these messages will be delivered in due course to the individual users, and if a user happens to be logged into the active virtual file system 150 in real time as the notification message is initiated, then that particular user will soon receive a message on his or her monitor screen that a new E-mail message has been received. The user can then review that message at his or her leisure.
- a confirmation message is generated back to the systems administrator at a step 372, essentially requiring the administrator to verify that this is the correct user that is to be deleted. Assuming the confirmation is correctly acknowledged, then a step 374 will notify predetermined users ofthe deletion of this particular user. Again, this notification message preferably will be delivered using E-mail messages, and the recipients of such message will be predetermined based upon either groups of users, or other criteria selected by the systems administrator in advance.
- the Automatic Notification function 180 can be implemented by a rules-based system that could, for example, automatically execute other computer programs upon the occurrence ofthe triggering event, or implemented by use ofthe triggering features of an active database computer program, such as ORACLE or DB2.
- further operations can be programmed to automatically perform tasks other than simple E-mail messages. For example, if a particular user is an employee who has resigned from a company, then his or her files could automatically be archived by a FileDeliveryTM command (launched by an Automatic Notification function) at the same time that his or her user status is been deleted by the administrator.
- a student who is graduating from a university should be deleted from many records (such as E-mail access rights).
- the FileDeliveryTM system ofthe present invention could automatically delete certain files or records as the student's status is changed by the administrator to "graduated.”
- step 380 will be followed by a step 382 where the user's information can be edited, including the user's E-mail address.
- step 382 Once this step 382 has been executed, then other choices are made available to the administrator, including editing the Rights Management for this user at a step 384, and editing other options on modules that have been installed in the active virtual file system 150, at a step 386.
- a notification process is initiated at a step 388, in which preferably an E-mail message is sent to the appropriate users, who are pre-selected by the systems administrator, and would likely be members ofthe same group as the user who is being edited.
- a group is defined as a collection of users, and groups are created and maintained by the systems administrator. Rights are assigned to groups by the administrator, and such rights are governed by the Access Rights component or function at step 162 on Figure 2.
- the essential properties of a group are (1) a description or name of that group, and (2) group members, which means particular users that are authorized to be using the active virtual file system 150.
- the systems administrator When a group is first created at step 402, the systems administrator merely lists the particular set of users that are members of this group. No notification procedure is necessary at this time, although one could potentially decide to notify the first member of a group that has been newly created that a second member has been added to that group.
- the final step after listing all ofthe new members of a group newly being created at step 402 could be to send a notification message to each of those members that the group has indeed been created.
- a confirmation message is sent by a function at a step 412 to confirm the validity of the administrator's initial command to delete a particular group. Assuming this confirmation is properly validated, then a notification process is initiated at a step 414 to send messages to all ofthe users ofthe group that is being deleted that the group has indeed been deleted.
- a step 422 allows the systems administrator to add or delete members from a particular group. Once this has been accomplished, a notification process is initiated at a step 424 which sends a message to all existing members ofthe group that one or more particular new members have been added, or that particular previous members have been deleted.
- FIG 11 is a flow chart showing some ofthe important logic concerning the rights of users in the active virtual file system 150 ofthe present invention.
- This flow chart relates to the Access Rights function 162 on Figure 2, and begins with a decision step 450 that is entered to allow "Rights Management.”
- This step 450 can only be passed through by either the systems administrator or the owner of a selected object or folder if Rights Management was previously enabled.
- This Access Rights function 162 provides a level of security for folders and objects. If a user is not the owner of an object, based upon that user's particular rights, he or she is only presented with objects that he or she is allowed to have access to. These access rights are administered to selected users by the systems administrator. Furthermore, users may also administer Access Rights if the "Rights Management" attribute is enabled for that particular user.
- the "read" access right provides the ability for a user or a group to view particular folders and objects. If a user or group has this right only, that user or group would not be able to create new folders and objects.
- the "write” access right provides the ability for a user or group to create new folders or objects. With exclusively this right, the user or group would not be able to view folders and objects.
- the "read write” access right provides the ability for a user or group to create folders or objects and then to view those folders and objects. This provides the user or group with full control over a folder or object.
- the teacher wants the students to turn in their homework assignments electronically, the teacher can assign a write-only right to that folder for all ofthe students.
- the teacher would not be able to view the file because he or she does not have the "read" right.
- the teacher would be the only user that would be able to view, edit, or delete this file. Any other student who has "write-only" access to the folder will also not be able to see any files in this folder.
- the teacher creates a folder and grants "read/write" rights to four students, for example. These four students can now upload files to the folder, download files from that folder, view files, and delete files. This allows for a shared resource that all members ofthe team may have access to for a collaboration on the project.
- a step 452 where the object or folder of interest can be viewed on the user interface (i.e., monitor screen), such as the Folder Window 260 on Figure 4.
- the user interface i.e., monitor screen
- a step 454 enables the owner or administrator to select a particular user or group to receive rights for accessing the selected object or folder. At this point, several options simultaneously appear on the screen ofthe owner or administrator.
- One ofthe above-noted options is to grant "write” rights at a step 460. Another option is to grant "read” rights at a step 470. A third option is to grant "read/write” rights at a step 480. Once the particular rights have been granted at any of these steps 460, 470, or 480, an Automatic Notification procedure occurs, at a corresponding step 462, 472, or 482, respectively.
- This notification process preferably is sent by E-mail technology, as related hereinabove. It is preferred that this notification process be utilized to inform the particular user or group that was selected at step 454 ofthe new rights that have just now been granted.
- NT ACL's, POSIX ACL's, or Novell access control mechanisms have powerful functionality that could be utilized in conjunction with the active virtual file system 150 ofthe present invention.
- Figure 12 is a flow chart illustrating some ofthe functions ofthe Auto- notification component or function 180 on Figure 2.
- a step 500 information is passed from a calling process, in which the process requests a notification message to be sent.
- a decision step 502 now determines what type of E-mail notification that should be sent.
- a list of these options includes a "Rights" option 510, a "User” option 520, a “Group” option 530, and a "Module” option at 540.
- the choices are "Read” at 512, “Write” at 514, or “Read/Write” at 516. If the "User” choice at 520 was selected, then the further choices are “Create” at 522, “Edit” at 524, or “Delete” at 526. If the "Group” choice at 530 was selected, then the further choices are to add a member at 532, or to delete a member at 534. If the "Module” choice at 540 was selected, then the further action is based upon the individual type of module as it resides in the preferred FileDeliveryTM system, as indicated at a step 542.
- the Auto-notification messages can be E-mails that are triggered automatically by events that take place in the components ofthe active virtual file system 150. Instead of E-mails, however, the Auto-notification function can also comprise other programs that are launched to perform certain tasks. The precise type of auto-notification is fully configurable for each component in the preferred active virtual file system 150.
- Certain functions preferably will occur when using the principles ofthe present invention concerning the active virtual file system 150. For example, users can automatically receive an E-mail message when specific events occur that pertain only to that user. On the other hand, group members (which include individual users) can automatically receive an E-mail message notifying those group members when specific events occur that pertain to their particular group.
- All Auto-notification messages contain links to the preferred FileDeliveryTM server 152, and the link will open the user's web browser (e.g., the browser at the first user 120 or the second user 122) and take the user directly to the folder or object that was just triggered.
- the users 124 and 126 connected to the LAN 145 would also have web browser software resident on their PC's/workstations, and the browser would be similarly opened by the link.
- an Auto-notification E-mail message is generated to that particular user informing the user ofthe existence ofthe FileDeliveryTM server 152, and describing some of its functionality and further how to "Login" to the FileDeliveryTM server 152.
- all group members and users who have access to that folder preferably will receive an Auto-notification E-mail message informing them of how to gain access to that file.
- E-mail technology provides certain advantages, such as balancing the loading ofthe network traffic. This allows users to come to the file, rather than sending the file to all ofthe users.
- a "Files" module is provided to combine World Wide Web technology and E-mail technology to allow users to seamlessly upload and download files to and from FileDeliveryTM folders over the Internet.
- the FileDeliveryTM system provides an Automatic Notification message to the appropriate users via E-mail technology.
- an Auto-notification message is sent to predetermined users and/or the systems administrator when a user has uploaded a file onto the FileDeliveryTM server 152.
- the administrator users ofthe FileDeliveryTM site can generate reports that track the activity involving files, specifically including information as to which users edited, uploaded, or downloaded files.
- One unique aspect ofthe preferred FileDeliveryTM system ofthe present invention is the fact that more than one single file can be stored having the same virtual filename, at least the same filename as far as the individual users are concerned.
- the actual filename on the preferred FileDeliveryTM server 152 is stored in a "Files Table," and a link to that file is stored in the active virtual file system 150.
- a "version control" function can be added to the FileDeliveryTM system to make it possible to maintain different versions ofthe same file.
- One further module that can be implemented on top ofthe FileDeliveryTM system is a BugDeliveryTM module (not shown).
- BugDeliveryTM is a system for tracking bugs and fixes in the software running on the server site (including third party application software, for example). BugDeliveryTM will automatically notify responsible engineers (and/or the systems administrator) when a bug is reported, and will notify the customer support (likely including the systems administrator) and customers when a patch exists for a known bug.
- the file When a user uploads a file to the FileDeliveryTM server 152, the file is physically stored on the hard disk drive ofthe server 152.
- the location or directory is based upon a setting in the database 154 and also the usemame ofthe virtual folder where the file is being uploaded to. If a file already exists having the same filename, a unique filename is generated for that file, at least with respect to the FileDeliveryTM server operating system 152. The user does not see this unique filename, but instead is only shown the "Display Name" ofthe file that is stored in the database 154. This "Display Name" is the filename that was selected for uploading. As noted above, the actual filename on the hard disk drive ofthe FileDeliveryTM server 152 is stored in a "Files Table,” and a link to that file is stored in the active virtual file system 150.
- a flow chart is depicted showing the "Module Management" function of the Modules component 170.
- the Module Management function is entered, after which a decision step 552 determines if the current user is the administrator. If the answer is NO, then access is denied to the Module Management function at a step 554.
- a step 556 allows the installation of new modules by the administrator.
- Each module has its own object or set of objects.
- the "Files” module has a "Files” object.
- a module exists to facilitate the creation and management of a specific object.
- the preferred FileDeliveryTM system "Modules" functionality can be turned on or off for each user, or for the entire site, which is configurable by the administrator. It is preferred that all modules in the FileDeliveryTM system follow a standard framework.
- Figure 14 is a flow chart showing the choices made available to a user or the systems administrator upon entering the "Object Management" function ofthe Objects component 172.
- Objects are the core entities in a "Folder Window," and objects are a clickable combination of icons and text.
- objects are displayed in the window on the right.
- the Folder Window is illustrated at 260, and the window on the right is generally designated by the reference numeral 262.
- Objects have their own set of properties that are fully configurable by the user.
- a step 600 is the initial step of "Object Management.” After arriving at step 600, several options are made available to the user via the user interface on the monitor screen. One option is the "Object
- a step 612 allows a new object to be created.
- a step 614 now creates the object in the active virtual file system 150.
- a step 616 performs an Automatic Notification process, similar to the E-mail messages as discussed hereinabove. In this situation, the fact that a new object has been created is the triggering event that causes the Auto-notification to occur.
- a step 622 selects an object via the user interface that is displayed on the monitor screen, such as the Folder Window 260 on Figure 4.
- an object such as the Folder Window 260 on Figure 4.
- two choices become available, including a "Core Options" function at a step 630, and an "Object Options" function at a step 650.
- a step 652 is executed, however, this is based upon the type of module. Depending on the module, this next step in the logic could be virtually anything.
- step 638 If the further Object Options at step 638 is chosen, then further choices are presented to the user or administrator. These choices are for "Reports" at a step 640, or for "Rights” at a step 642. The Reports are configurable by the owner or the systems administrator. If the Rights function at step 642 was chosen, then a step 644 is executed to take the logic flow to the "Rights Management" procedures.
- Figure 15 is a flow chart illustrating the important logical operations that occur when the "Files Module" options are selected.
- the initial step is designated by the reference numeral 700, after which a decision step 702 determines whether or not the user has Write or Read/Write rights. If not, then a step 704 refuses to show any options to this particular user.
- a step 706 uploads the file from the user's computer to the active virtual file system 150 ofthe present invention. After that occurs, a decision step 710 determines whether or not the user has enough disk storage space allocated within the hard disk drive of the FileDeliveryTM server 152. If the answer is NO, then a step 712 refuses to allow the file to be uploaded.
- a step 714 creates file information in the active virtual file system 150.
- a step 720 now physically stores the file on the FileDeliveryTM server's hard disk drive at 152.
- the final step in this sequence is 722 where an Automatic Notification process is initiated, which sends an E-mail message to predetermined users regarding the fact that a new file has been uploaded onto the hard disk drive ofthe FileDeliveryTM server 152.
- Figure 16 is a flow chart showing some ofthe choices that are presented to the user or systems administrator when the "Object Options" choice at step 650 on Figure 14 is selected.
- a step 750 is the initial step in which the Object Options are selected for the "Files” module.
- a few choices are now presented to the systems administrator or user, including a "Download” function at a step 752, or a choice where the description of a file can be edited at a step 760, or a "View" function at a step 770.
- a step 754 updates the logs ofthe active virtual file system 150. In some situations, this may initiate an Automatic Notification message, although that is not necessarily required. Similarly, if the View step 770 was selected, then the logs are updated on the active virtual file system 150 at a step 772. Again, it is possible to initiate an Automatic Notification message based upon this event, if desirable.
- the preferred FileDeliveryTM server 152 is a web-based active virtual file system (AFS) that allows for sharing of critical information such as files, calendars, contacts, reports, E-mail, etc. over the Internet.
- the AFS 150 acts as a centralized server and uses secure Internet protocols. Customized modules can easily be added to solve business needs for E-commerce back-end solutions, web site maintenance intranets, legacy database query tools, for example, as well as other applications.
- the present invention can be used over a Wide Area Network (WAN) just as easily as it can be used over a LAN.
- WAN Wide Area Network
- the Auto-notification feature ofthe preferred FileDeliveryTM server insures that users are virtually immediately notified of appropriate site activity at a FileDeliveryTM site.
- the preferred active virtual file system ofthe present invention is based upon open standards and protocols, such as TCP/IP, HTTP, and SSL, without the use of proprietary protocols.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Library & Information Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU76241/00A AU7624100A (en) | 1999-09-29 | 2000-09-29 | Method and apparatus for an active file system |
EP00965539A EP1232450A2 (en) | 1999-09-29 | 2000-09-29 | Method and apparatus for an active file system |
MXPA02003236A MXPA02003236A (en) | 1999-09-29 | 2000-09-29 | Method and apparatus for an active file system. |
JP2001526757A JP2003515199A (en) | 1999-09-29 | 2000-09-29 | Method and apparatus for an active file system |
CA002386293A CA2386293A1 (en) | 1999-09-29 | 2000-09-29 | Method and apparatus for an active file system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15667699P | 1999-09-29 | 1999-09-29 | |
US60/156,676 | 1999-09-29 | ||
US42180899A | 1999-10-20 | 1999-10-20 | |
US09/421,808 | 1999-10-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001024059A2 true WO2001024059A2 (en) | 2001-04-05 |
WO2001024059A3 WO2001024059A3 (en) | 2002-06-06 |
Family
ID=26853409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/026913 WO2001024059A2 (en) | 1999-09-29 | 2000-09-29 | Method and apparatus for an active file system |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1232450A2 (en) |
JP (1) | JP2003515199A (en) |
AU (1) | AU7624100A (en) |
CA (1) | CA2386293A1 (en) |
MX (1) | MXPA02003236A (en) |
WO (1) | WO2001024059A2 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001093472A2 (en) * | 2000-05-30 | 2001-12-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for event sequence reconstruction and statistics computation |
JP2004005587A (en) * | 2002-04-17 | 2004-01-08 | Sony Corp | Editing control device, edition control method, editing control program, and computer-readable program storage medium having the editing control program recorded therein |
JP2004164638A (en) * | 2002-11-06 | 2004-06-10 | Xerox Corp | Safe resource management method and system |
US7224957B2 (en) | 2003-03-17 | 2007-05-29 | Spector Shelley J | Apparatus and method for broadcasting messages to selected group(s) of users |
GB2481807A (en) * | 2010-07-06 | 2012-01-11 | Hewlett Packard Development Co | Protecting file entities in a network file system |
US8271792B2 (en) | 2008-02-20 | 2012-09-18 | Ricoh Company, Ltd. | Image processing apparatus, authentication package installation method, and computer-readable recording medium |
US9733922B2 (en) | 2015-07-06 | 2017-08-15 | International Business Machines Corporation | Smarter operating systems: file system events |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7698361B2 (en) * | 2003-12-31 | 2010-04-13 | Microsoft Corporation | Lightweight input/output protocol |
JP4744985B2 (en) * | 2005-08-30 | 2011-08-10 | 株式会社リコー | Document management server, document management method and program |
US8335797B2 (en) | 2005-08-30 | 2012-12-18 | Ricoh Company, Ltd. | Document management server, document managing method, and program |
JP4938554B2 (en) * | 2007-05-31 | 2012-05-23 | Sky株式会社 | Network management system and network management program |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0944003A1 (en) * | 1998-03-18 | 1999-09-22 | SONY EUROPE GmbH | Notification subsystem |
-
2000
- 2000-09-29 CA CA002386293A patent/CA2386293A1/en not_active Abandoned
- 2000-09-29 MX MXPA02003236A patent/MXPA02003236A/en unknown
- 2000-09-29 AU AU76241/00A patent/AU7624100A/en not_active Abandoned
- 2000-09-29 WO PCT/US2000/026913 patent/WO2001024059A2/en not_active Application Discontinuation
- 2000-09-29 JP JP2001526757A patent/JP2003515199A/en not_active Withdrawn
- 2000-09-29 EP EP00965539A patent/EP1232450A2/en not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0944003A1 (en) * | 1998-03-18 | 1999-09-22 | SONY EUROPE GmbH | Notification subsystem |
Non-Patent Citations (3)
Title |
---|
BENTLEY R ET AL: "SUPPORTING COLLABORATIVE INFORMATION SHARING WITH THE WORLD WIDE WEB. THE BSCW SHARED WORKSPACE SYSTEM" WORLD WIDE WEB JOURNAL, SEBASTOPOL, CA, US, US, 11 December 1995 (1995-12-11), pages 63-73, XP000646994 ISSN: 1085-2301 * |
DAY M ET AL: "The Notification Service Transfer Protocol (NSTP): infrastructure for synchronous groupware" COMPUTER NETWORKS AND ISDN SYSTEMS, NORTH HOLLAND PUBLISHING. AMSTERDAM, NL, vol. 29, no. 8-13, 1 September 1997 (1997-09-01), pages 905-915, XP004095290 ISSN: 0169-7552 * |
KOCH T ET AL: "Beyond Web technology-lessons learnt from BSCW" PROCEEDINGS SEVENTH IEEE INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98) (CAT. NO.98TB100253), PROCEEDINGS OF WET ICE'98 - IEEE SEVENTH INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRAS, pages 176-181, XP002193485 1998, Los Alamitos, CA, USA, IEEE Comput. Soc, USA ISBN: 0-8186-8751-7 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001093472A3 (en) * | 2000-05-30 | 2002-03-28 | Ericsson Telefon Ab L M | Method and system for event sequence reconstruction and statistics computation |
WO2001093472A2 (en) * | 2000-05-30 | 2001-12-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for event sequence reconstruction and statistics computation |
JP2004005587A (en) * | 2002-04-17 | 2004-01-08 | Sony Corp | Editing control device, edition control method, editing control program, and computer-readable program storage medium having the editing control program recorded therein |
US7904720B2 (en) | 2002-11-06 | 2011-03-08 | Palo Alto Research Center Incorporated | System and method for providing secure resource management |
JP2004164638A (en) * | 2002-11-06 | 2004-06-10 | Xerox Corp | Safe resource management method and system |
US7965995B2 (en) | 2003-03-17 | 2011-06-21 | Spector Shelley J | Apparatus and method for broadcasting messages to selected group(s) of users |
US7224957B2 (en) | 2003-03-17 | 2007-05-29 | Spector Shelley J | Apparatus and method for broadcasting messages to selected group(s) of users |
US8532609B2 (en) | 2003-03-17 | 2013-09-10 | One-12 Group L.L.C. | Apparatus and method for broadcasting messages to selected group(s) of users |
US8271792B2 (en) | 2008-02-20 | 2012-09-18 | Ricoh Company, Ltd. | Image processing apparatus, authentication package installation method, and computer-readable recording medium |
GB2481807A (en) * | 2010-07-06 | 2012-01-11 | Hewlett Packard Development Co | Protecting file entities in a network file system |
US8769609B2 (en) | 2010-07-06 | 2014-07-01 | Hewlett-Packard Development Company, L.P. | Protecting file entities |
GB2481807B (en) * | 2010-07-06 | 2015-03-25 | Hewlett Packard Development Co | Protecting file entities in a networked system |
US9733922B2 (en) | 2015-07-06 | 2017-08-15 | International Business Machines Corporation | Smarter operating systems: file system events |
Also Published As
Publication number | Publication date |
---|---|
JP2003515199A (en) | 2003-04-22 |
MXPA02003236A (en) | 2003-09-22 |
WO2001024059A3 (en) | 2002-06-06 |
AU7624100A (en) | 2001-04-30 |
EP1232450A2 (en) | 2002-08-21 |
CA2386293A1 (en) | 2001-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9336213B2 (en) | Active file system | |
US10986161B2 (en) | Mechanism for effective sharing of application content | |
US20040141005A1 (en) | System and method for integrating online meeting materials in a place | |
US8195714B2 (en) | Context instantiated application protocol | |
EP1173977B1 (en) | Video conferencing system | |
Boyce | Microsoft Outlook 2010 Inside Out | |
US8850385B2 (en) | System for supporting collaborative activity | |
US8561153B2 (en) | Web-based collaborative framework | |
US7139761B2 (en) | Dynamic association of electronically stored information with iterative workflow changes | |
US8805879B2 (en) | Techniques for integrating parameterized information request into a system for collaborative work | |
US20030022657A1 (en) | Application provisioning over a wireless network | |
US20050202390A1 (en) | Course evaluation survey management and reporting system and method | |
US20020103737A1 (en) | Marketing collateral repository and supporting data management and communication environment | |
WO2001024059A2 (en) | Method and apparatus for an active file system | |
Bouras et al. | A co-operative environment for local government: an Internet–Intranet approach | |
US20030182286A1 (en) | System and method to save, secure and access records of discussion | |
Guilmette et al. | Microsoft 365 Administration Inside Out | |
US20070033193A1 (en) | Method for remote controlling of www-browser | |
Van Vugt | Using Virtual Office | |
Rossetti | A Mail File Administration Tool for a Multilevel High Assurance LAN | |
McAmis et al. | Microsoft Exchange Server 2003 Delta Guide | |
Kratzer | Novell GroupWise 7 Administrator Solutions Guide | |
Jones | Building and integrating a small office intranet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2002/003236 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000965539 Country of ref document: EP Ref document number: 2386293 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2001 526757 Country of ref document: JP Kind code of ref document: A |
|
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWP | Wipo information: published in national office |
Ref document number: 2000965539 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000965539 Country of ref document: EP |