WO2002010983A1 - Systeme et procede destine a une selection de variables multiples de fichiers aux fins d'effacement - Google Patents

Systeme et procede destine a une selection de variables multiples de fichiers aux fins d'effacement Download PDF

Info

Publication number
WO2002010983A1
WO2002010983A1 PCT/US2001/023032 US0123032W WO0210983A1 WO 2002010983 A1 WO2002010983 A1 WO 2002010983A1 US 0123032 W US0123032 W US 0123032W WO 0210983 A1 WO0210983 A1 WO 0210983A1
Authority
WO
WIPO (PCT)
Prior art keywords
indicia
files
user
file
variables
Prior art date
Application number
PCT/US2001/023032
Other languages
English (en)
Inventor
Tony Hashem
Billy England
Original Assignee
Ge Financial Assurance Holdings, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ge Financial Assurance Holdings, Inc. filed Critical Ge Financial Assurance Holdings, Inc.
Priority to AU2001280689A priority Critical patent/AU2001280689A1/en
Publication of WO2002010983A1 publication Critical patent/WO2002010983A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations

Definitions

  • the present invention relates to a system and process for deleting various stored digital files based on a plurality of user selected-variables and, more particularly, to sorting and deleting stored digital files based on a plurality of user-selected variables from a group comprising attributes, dates, time stamps or other identification indicia.
  • Each stored digital file may be a separate entry of information, such as an image, a document, a spreadsheet, or the like. Businesses may store files in electronic form for ease of access and to reduce storage space. Stored files may also be temporary files, such as incomplete forms, sample calculations, or other files that that are stored on a temporary basis.
  • this information must be stored for various reasons.
  • a business such as a financial institution or an insurance company may need to store files for a certain period of time to ensure that such files are accurately entered into its computer system and so that any appropriate adjustments are made to the accounts and records relating to the stored digital files.
  • many federal, state and/or local statutes and regulations may require that the information be stored for a predetermined period of time. Storing this information, whether required for internal or external reasons, may be costly to a business or organization, as storage resources for large amounts of files may be limited, costly to maintain and require large amounts of hardware.
  • One manner of reducing the costs associated with storing this information is to purge (e.g., delete) such stored information on a periodic basis. Deleting stored digital files may occur based on the type of information stored and the rules and laws, both internal and external, governing the storage of the particular information. There are automated processes pursuant to which stored information may be deleted.
  • a deletion process may only allow stored files to be sorted by a particular date or by a particular type of file.
  • a business wants to delete all files of a particular type which are older than seven (7) days, a business must either sort stored files by the type of file, and then manually select and delete each file which meets the date criteria or must separate the stored files by date and then select and delete each file by type criteria.
  • This manner of sorting and deletion may be time-intensive, inefficient and costly.
  • Manual identification of the appropriate stored files to delete may take a long time. Additionally, the monotony associated with such a sorting process may lead to errors, where some stored files are accidentally deleted which were not intended for deletion, while some stored files are not deleted which were intended to be deleted. Other drawbacks may also exist.
  • a process for sorting and selecting stored digital files based on multiple variables comprises the steps of identifying each of a plurality of stored digital files, where the identifying step uses a plurality of identification indicia, receiving at least three selection variables, wherein the selection variables are from a group including the plurality of identification indicia, and selecting at least one of the plurality of stored digital files based on the at least three selection variables.
  • a system for sorting and selecting stored digital files based on a plurality of variables comprises an identification module for identifying each of a plurality of stored digital files, wherein identification occurs using a plurality of identification indicia, a receiver module for receiving at least three selection variables, wherein the at least three selection variables are from a group including the plurality of identification indicia, and a selection module for selecting at least one of the plurality of stored digital files based on the plurality of selection indicia.
  • Figure 1 is a flowchart illustrating steps in a process for selecting and deleting files according to an embodiment of the invention.
  • Figures 2a and 2b are a flowchart illustrating the selection of files for deletion according to an embodiment of the invention.
  • Figures 3 and 4 are examples of graphic user interfaces for selecting files for deletion according to an embodiment of the invention.
  • Figure 5 is a schematic representation of a system for deleting files according to an embodiment of the invention.
  • FIG. 1 is a flowchart illustrating steps in a process for selecting and deleting stored digital files.
  • various digital files are received at System 300 which will be described below in greater detail with respect to Fig. 5.
  • the digital files may be comprised of any sort of files such as documents, images, data files, text files, spreadsheets or other sort of files having information and data.
  • the digital files are assigned identification indicia.
  • the identification indicia may include a name of the file, a "file type" extension for the file (e.g., ".doc,” “.jpeg,” “.xml,”, “.dat,” etc.), a time the file was received by System 300 and a date the file was received by System 300.
  • System 300 stores the received digital files and, at step 16, receives a plurality of selection variables for selecting one or more of the stored digital files. The steps involved in designating such plurality of selection variables for selecting one or more of the stored digital files will be described below in greater detail.
  • a user decides whether to first sort files based on selected variables, and then delete the files, or to examine the identification indicia of a file and either delete the file or leave it based on the selected variables. If the decision is made to the sort the files, the process moves on to step 20, where the stored digital files are sorted based on the assigned identification indicia and the appropriate sorted files are selected at step 22. At step 24, the selected files are deleted. The process ends at step 26.
  • step 28 the process moves to step 28, where the stored digital files are examined. Examined files meeting the selected variables are deleted at step 30.
  • step 32 a determination is made whether other files are to be examined. If more files are to be examined, the process returns to step 28 to examine additional stored digital files. If no more files are to be examined, the process ends at step 26.
  • Figures 2a and 2b illustrate a more detailed process for selecting and deleting stored digital files according to an embodiment of the invention. In connection with this description, reference will be made to Figs. 3 and 4, which illustrate examples of graphic user interfaces for designating selection variables and deleting selected ones of the stored digital files.
  • a user initiates the process for selecting and deleting the stored digital files in any manner which is conventionally used, such as activating an icon on a computer (e.g., double-clicking on an icon using a mouse).
  • a graphic user interface 200 may comprise a toolbar 201 which enables the user to manipulate data involved in designating the ones of the stored digital files for deletion such as that illustrated in Figs. 3 and 4.
  • Toolbar 201 may be a conventional toolbar including a file, an edit and a help pulldown menu. Other options may also be included in toolbar 201.
  • the user selects a directory location of each of the stored digital files to be reviewed.
  • the user may select the directory named "C: ⁇ Program Files/Microsoft Visual Studio/VB98" as the directory location to be reviewed.
  • C: ⁇ Program Files/Microsoft Visual Studio/VB98 an initial letter designates a particular computer drive and a designation of "C: ⁇ *.*” means a drive letter root directory for the computer drive.
  • the term “Program Files” means all files stored in such computer drive.
  • the term “Microsoft Visual Studio” modifies and limits the term “Program File” so that only those Program Files stored in Microsoft Visual Studio format are selected.
  • VB98 means a Visual Basic programming language version for 1998.
  • Window 220 within graphic user interface 200 may display a directory having a plurality of directory locations therein to enable the user to select the directory location for stored digital files to be reviewed.
  • System 300 reviews each stored digital file located in this directory to determine if the selected identification indicia are met with respect to each such stored digital file.
  • System 300 confirms the intention of the user before a full deletion of any computer drive letter root directory is permitted.
  • the user selects to delete files from the drive letter root directory named "D: ⁇ *.*,” the user would be first queried as to whether the user intends to delete the entire D drive root directory before being allowed to continue.
  • System 300 may also step through each subdirectory for a particular drive letter root directory in order to select and delete stored files within each subdirectory based on the predefined criteria. Other manners of selecting a file location or locations may also be used.
  • Attribute variables may include files set for archive, read-only files, hidden files, or system files. There may be a user-changeable option to prompt the user before deletion of a Read Only or a System file.
  • the user may be presented the options of flagged, not flagged, and ignore for the Read Only attribute. By selecting the flagged option, the system will only select and delete those files flagged as Read Only. If the not flagged option is selected, the system will only select and delete those files which are not flagged Read Only. If the ignore option is selected, the system will complete ignore the Read Only attribute when selecting and deleting files.
  • the user may select attribute variables, as illustrated in an area 208 of graphic user interface 200, by selecting attributes from a plurality of pull-down menus. Other attribute variables may also be used.
  • the user determines whether to create a log file.
  • a log file allows the user to track the attribute variables used for selecting and deleting stored files, as well as track the stored files that are deleted.
  • Such log file may have a plurality of parameters such as a size of the log file, a list feature for listing the files deleted and a plurality of criteria used for determining the stored files for deletion. If the user decides to create the log file, the log file designation, Log File icon 212, is activated at step 112.
  • a recycle bin may be located within System 300 (e.g., a recycle bin in a Microsoft WindowsTM platform).
  • use of the recycle bin may be meant for use for deletions of a small number of stored files as such a use may slow the deletion process. Often, deletion to the recycle bin does not actually result in deletion, but rather merely copies the file to the recycle bin or a temporary directory. The files are not permanently deleted until a user accesses the selected files in the recycle bin or temporary directory and designates them for permanent deletion. If the user decides to use the recycle bin, a Use Recycle Bin icon 216 in graphic user interface 200 is activated at step 120. If the user decides not to use. the recycle bin, the user moves on to step 122.
  • step 122 the user determines whether to use advanced selection and deletion techniques. If the user decides not to use advanced selection and deletion techniques, the user may begin deletion of the selected files at step 124.
  • graphic user interface 200 may have a general tab 202 for basic variable selection and deletion and an advanced tab 203 for advanced variable selection and deletion.
  • the user activates advanced tab 203.
  • advanced tab 203 By selecting advanced tab 203, the user is presented with advanced variable selection and deletion techniques as further illustrated in Figure 4.
  • the user determines at step 126 whether to select one or more of a plurality of time variables. If the user decides to select one or more of the plurality of time variables, the user may either designate a time range at step 128 or designate a time age at step 130.
  • a time range allows the user to designate a range of times for a particular selected file. By way of example, the user may determine that all stored files saved between 9:00 a.m. and 10:00 a.m. of a particular day should be deleted.
  • the user may activate a time range function 224 of time variable area 222 and enter one or more time ranges in the appropriate area. Other manners of designating a time range may also be used.
  • the user may determine that all files stored for longer than a certain amount of time should be selected and deleted.
  • the user may designate that all stored files which have been stored for more than twelve (12) hours should be selected and deleted.
  • the user designates time age 226 and enters/selects twelve (12) hours as the age of stored files to be selected and deleted.
  • designating the time age of a stored file may be exclusive of other date and time designations (e.g., the user cannot designate a time or date range, or a date age if the time age variable has been designated).
  • the user may determine whether to select date variables for a file at step 132. If the user decides to select date variables, the user may designate a date range at step 134 or designate a date age at step 136. Designating a date range for a stored file allows the user to select and delete one or more stored files within a range of dates.
  • the user may activate the date range function 228 in date area 226 and insert one or more dates in the appropriate area. The user may determine that files stored between the dates of December 1, 1998 and December 15, 1998 should be deleted. By entering those dates into data range area 212, the user may instruct System 300 to select and delete the stored files meeting the date range criteria.
  • the user could specify several different date ranges for selecting and deleting one or more stored files.
  • the user may instruct System 300 to select and delete files which are a certain age or which were stored within one or more certain date ranges.
  • the user may decide to select and delete stored files which were stored before a certain date.
  • the user may activate the date age function 230 in date area 226 and enter the date age of a file in the appropriate area.
  • the user may decide that all files older than thirty (30) days old should be selected and deleted by System 300.
  • the user may select to have stored files selected and deleted based on a particular day of the week on which such files were stored (e.g., select and delete files received on Saturdays). It is understood that other manners for determining date ranges or date ages of files may also be used.
  • a scheduler function may allow the user to schedule selection and deletion of stored files for a particular time of day, and/or a particular day(s) of the week (e.g., start the selection and deletion process at 7:00 PM every Friday evening).
  • This function enables the user to schedule regular, periodic deletions of stored files without reentering the selection and deletion variables.
  • the user may save the selected variables for a particular delete job into a batch command. This will allow the user to delete stored files from several directory locations without having to wait for each deletion job to finish. This feature may be used with the scheduler to provide a completely automated file deletion process.
  • the user may enter an e-mail address for the System 300 to send a notification when a deletion job is finished.
  • this notification function may be used when the scheduler function is used, thereby informing the user when the scheduled deletion has been performed and that the scheduled deletion was successful. .
  • the user decides whether to activate the Cache To File function at step 138.
  • the Cache To File function By selecting the Cache To File function by activating the Cache to File icon 230, the user can specify the directory location on any available drive letter root directory to store the stored file listings for the files for deletion, thereby eliminating the need for memory to be used to store such information. This may be a powerful option for certain operating systems and/or platforms where a listing of deleted files is cached to memory. Caching to memory, however, may be limited due to limited amounts of random access memory (RAM) or virtual memory for a particular system.
  • RAM random access memory
  • deletion processes involving tens of thousands or hundreds of thousands of stored files may result in a system running out of memory and crashing.
  • Selection of the Cache To File function helps to eliminate this problem.
  • the user may be prompted with a recommendation whether to use a disk drive or a hard drive memory for storing the file listing of the files for deletion. If the user decides to cache to memory the listing of the files, the user may designate the cache to memory function at step 140. If the user decides not to cache to memory, the user proceeds to step 142 to determine whether to ignore certain variables at step 144.
  • the process may involve examining each file individually. A particular file is examined based on selected variables. If the identification indicia of the particular file meets the criteria for the selected variables, the file is deleted. The identification indicia of the next file is then examined based on the selected variables. The process continues through each file in sequence. This process may enable the system to delete files without first having to create a list. Memory use is conserved, thereby allowing the system to perform other functions while examining and deleting the files.
  • An "ignore variables function" allows the user to ignore or disregard certain selection variables, such as time or date variables, or a size of the file variable.
  • the user may designate one ore more variables to be ignored in area 234 of graphic user interface 200 in Fig. 4.
  • the user may decide to ignore the time range variable without having to go back and delete the time range variable information.
  • the user designates the particular variables to ignore at step 144. If the user decides not to ignore file one or more variables, the user then decides when to designate the size of a stored file at step 146.
  • the user may decide to conserve space in System 300 by deleting all stored files above a certain size, i.e., above 5 megabytes ("MB"). Alternatively, the user may decide that all stored files smaller than 100 kilobytes ("KB") should be deleted.
  • the size of a stored file to be selected and/or deleted may be designated by the user by indicating the file size in File Size Area 236 in graphic user interface 200. The user may activate the designated file size at step 148 by providing the appropriate information. Once the user has designated the file size, or if the user decides not to designate the file size, the user starts the file deletion process at step 124.
  • Starting the file deletion process may involve a number of decisions and/or inputs from the user.
  • the user is prompted to input a confirmation of the intended files for deletion.
  • the user may acknowledge the intended files for deletion, or the user may be prompted to enter a password.
  • System 300 if there is not enough memory in the user's input device or if available disk space on any associated drives, System 300 notifies the user, and may confirm with the user to perform a staged deletion.
  • the user input device will take a group of files and use its memory to delete the group of files, and then reassess if it can complete the rest of the job. If not, the process is repeated until the deletion can be completed.
  • the user may designate that System 300 run in the background on the appropriate device, thereby having the deletion process performed when the device (e.g., the personal computer) is idle. Additionally, a user may designate that he/she wishes to have System 300 conduct a secure deletion process for the selected files.
  • the secure deletion process may not only delete the selected files but also wipes the disk space of System 300 clean, thereby preventing anyone from restoring the selected deleted files using an undelete process.
  • System 300 may simply skip the file(s) in question and make note that it skipped such selected files on a completion summary for the deletion process. Alternatively, the selected files may be flagged and the deletion process may return to such selected files for deletion once the file, are no longer in use or locked. Other manners for dealing with files which are locked or in use may also be used.
  • System 300 may display a summary of how many files were deleted and information about the files, such as the amount of disk space freed, and other information.
  • the user may be able to "undo" a deletion process by restoring the selected deleted files to their file directory.
  • the undo function may be limited based on the number of files previously deleted and/or the capacity of the equipment performing the delete function.
  • the process and system of the present invention may be used for selecting and deleting any type of file.
  • the process and system of the present invention would work with files associated with e-mail applications, such as Microsoft Exchange® mailboxes.
  • the process and system of the present invention may be used to select and move files to an alternate location specified by the user.
  • an example of selecting and deleting files according to an embodiment of the invention will now be briefly described.
  • the user activates the process and selects the appropriate identification indicia for System 300 to use to select the stored files for deletion. For example, after selecting the drive to search for the files, the user indicates that all files that end in ".dat," and which are read-only, hidden, and not archived will be selected for deletion.
  • the user Using the advanced tab (such as advanced tab 203 in graphic user interface 200), the user indicates that stored files created between 10:00 a.m. and 2:00 p.m. on any day in the time period January 5 through February 7, and which are less than 200 KB but greater than 49 KB, will be selected for deletion.
  • the user also selects view a sample of files selected for deletion. After all selection variables have been selected, the user activates the select and delete function.
  • the user is then presented with a list of at least some of the stored files selected for deletion. By way of example, a sample of fifty (50) stored files may be presented to enable the user to verify what files will be deleted. Once the user has verified that the appropriate files have been selected for deletion, the user may confirm the deletion, such as by entering a deletion confirmation word.
  • this example is illustrative, it is understood that other manners for selecting files for deletion may also be used.
  • FIG. 5 illustrates a System 300 according to an embodiment of the present invention.
  • System 300 comprises multiple requester devices 305 (or "computers") used by requesters to connect to Network 302 through multiple Connector Providers (CPs) 210.
  • Network 302 may be any network that permits multiple requesters or computers to connect and interact.
  • Network 302 may be comprised of a dedicated line to connect a plurality of the requesters, such as the Internet, an intranet, a local area network (LAN), a wide area network (WAN), a wireless network, or other type of network.
  • CP 310 may be a provider that connects the requesters to the network 302.
  • CP 310 may be an internet service provider (ISP), a dial-up access means, such as a modem, or other manner of connecting to network 302.
  • ISP internet service provider
  • a dial-up access means such as a modem
  • network 302. there may be significantly more users connected to System 300 than shown in Fig. 5. This would mean that there would be additional requesters which are connected through the same CPs shown or through other CPs. Nevertheless, for purposes of illustration, the discussion will presume four requester devices 305 are connected to Network 302 through two CPs 310.
  • requester devices 305a-305d may each make use of any device (e.g., computer, wireless telephone, personal digital assistant, etc.) capable of accessing Network 302 through CP 310. Alternatively, some or all of requester devices 305a-305d may access Network 302 through a direct connection, such as a Tl line, or similar connection.
  • Fig. 5 shows four requester devices 305a - 305d, each having a connection to Network 302 through a CP 310a and 310b.
  • Requester devices 305a-305d may each make use of a personal computer such as a computer located in the requester's home, or may use other devices which allow the requester to access and interact with others on Network 302.
  • Central controller module 312 may also have a connection to Network 302 as described above. Central controller module 312 may communicate with one or more data storage modules 314, the latter being discussed in more detail below.
  • Each requester device 305a-305d used may contain a processor module 304, a display module 308, and a user interface module 306.
  • Each requestor device 305a-305d may have at least one user interface module 306 for interacting and controlling the computer.
  • the user interface module 306 may be comprised of one or more of a keyboard, a joystick, a touchpad, a mouse, a scanner or any similar device or combination of devices.
  • Each of the computers 305a-305d used by requester devices 305a-305d may also include a display module 308, such as a CRT display or other device.
  • System 300 further includes a central controller module 312. Central controller module 312 may maintain a connection to Network 302 such as through transmitter module 318 and receiver module 320.
  • Transmitter module 318 and receiver module 320 may be comprised of conventional devices which enable central controller module 312 to interact with Network 302.
  • transmitter module 318 and receiver module 320 may be integral with central controller module 312.
  • the connection to Network 302 by central controller module 312 and computers 305 may be a high speed, large bandwidth connection, such as though a Tl or a T3 line, a cable connection, a telephone line connection, a DSL connection, or other type of connection.
  • Central controller module 312 functions to permit requester devices 305a-305d to interact with each other in connection with various applications, messaging services and other services which may be provided through System 300.
  • Central controller module 312 preferably comprises either a single server computer or a plurality of multiple server computers configured to appear to requester devices 305a-305d as a single resource.
  • Central controller module 312 communicates with a number of data storage modules 314.
  • Each data storage module 314 stores digital files. According to an embodiment of the invention, any data storage module 314 may be located on one or more data storage devices, where the data storage devices are combined or separate from central controller module 312.
  • Processor module 316 performs the various processing functions required in the practice of the process taught by the present invention, such as performing the selection and deletion of files based on selected variables and identification of files using the identification indicia.
  • Processor module 316 may be comprised of a standard processor, such as a central processing unit (CPU), which is capable of processing the information in the necessary manner.
  • CPU central processing unit
  • System 300 of Fig. 5 discloses a requester device 305 connected to Network 302, it is understood that a personal digital assistant ("PDA"), a mobile telephone, a television, or another device that permits access to Network 302 may be used to arrive at the system of the present invention.
  • PDA personal digital assistant
  • a computer-usable and writeable medium having a plurality of computer readable program code stored therein may be provided for practicing the method of the present invention.
  • the process and system of the present invention may be implemented within a variety of operating systems, such as Windows®, various versions of a Unix based operating system (e.g., Hewlett Packard, Red Hat, or Linux version of a Unix-based operating system); or various versions of an AS/400-based operating system.
  • the computer-usable medium may be comprised of a CD ROM, a floppy disk, a hard disk, or any other computer-usable medium.
  • One or more of the components of the System 300 may comprise computer readable program code in the form of functional instructions stored in the computer-usable medium such that when the computer-usable medium is installed on the System 300, those components cause the System 300 to perform the functions described.
  • the software for the present invention may also be bundled with other software. For example, if another software company has a product that generates a lot of files that needs to be deleted periodically, they could add the code for implementing the present invention directly into their program.
  • central controller module 312, data storage 314, processor module 316, receiver module 318, and transmitter module 320 may comprise computer-readable code that, when installed on a computer, perform the functions described above. Also, only some of the components may be provided in computer- readable code.
  • the computer may be a standard computer comprising an input device, an output device, a processor device, and data storage device.
  • various components may be different department computers within the same corporation or entity. Other computer configurations may also be used.
  • various components may be separate entities such as corporations or limited liability companies. Other embodiments, in compliance with applicable laws and- regulations, may also be used.
  • a system may comprise components of a software system.
  • the system may operate on a network and may be connected to other systems sharing a common database.
  • Other hardware arrangements may also be provided.
  • Other embodiments, uses and advantages of the present invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The specification and examples should be considered exemplary only. The intended scope of the invention is only limited by the claims appended hereto.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

L'invention concerne un procédé de stockage et de sélection de fichiers numériques stockés en fonction de variables multiples. Le procédé comprend les étapes consistant à identifier une pluralité de fichiers numériques stockés au moyen d'une pluralité d'indices d'identification (12); à recevoir au moins trois variables de sélection provenant des indices d'identification (16) et à sélectionner les fichiers numériques stockés en fonction des ces trois variables de sélection (22). Les fichiers sélectionnés sont ensuite effacés (24).
PCT/US2001/023032 2000-07-27 2001-07-23 Systeme et procede destine a une selection de variables multiples de fichiers aux fins d'effacement WO2002010983A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001280689A AU2001280689A1 (en) 2000-07-27 2001-07-23 System and process for multiple variable election of files for deletion

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US62723000A 2000-07-27 2000-07-27
US09/627,230 2000-07-27

Publications (1)

Publication Number Publication Date
WO2002010983A1 true WO2002010983A1 (fr) 2002-02-07

Family

ID=24513782

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/023032 WO2002010983A1 (fr) 2000-07-27 2001-07-23 Systeme et procede destine a une selection de variables multiples de fichiers aux fins d'effacement

Country Status (2)

Country Link
AU (1) AU2001280689A1 (fr)
WO (1) WO2002010983A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880714A (zh) * 2012-09-29 2013-01-16 北京奇虎科技有限公司 文件清理方法及装置
EP2320633A3 (fr) * 2009-11-06 2014-02-26 Samsung Electronics Co., Ltd. Procédé de gestion de fichier dans un appareil de formation d'images et appareil de formation d'images l'effectuant

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5878410A (en) * 1996-09-13 1999-03-02 Microsoft Corporation File system sort order indexes

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5878410A (en) * 1996-09-13 1999-03-02 Microsoft Corporation File system sort order indexes

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2320633A3 (fr) * 2009-11-06 2014-02-26 Samsung Electronics Co., Ltd. Procédé de gestion de fichier dans un appareil de formation d'images et appareil de formation d'images l'effectuant
CN102880714A (zh) * 2012-09-29 2013-01-16 北京奇虎科技有限公司 文件清理方法及装置
CN102880714B (zh) * 2012-09-29 2016-08-24 北京奇虎科技有限公司 文件清理方法及装置

Also Published As

Publication number Publication date
AU2001280689A1 (en) 2002-02-13

Similar Documents

Publication Publication Date Title
US5317683A (en) Method and apparatus for automated meeting agenda generation in a data processing system
US4899299A (en) Method for managing the retention of electronic documents in an interactive information handling system
US8028231B2 (en) Document management system for searching scanned documents
US5276869A (en) System for selecting document recipients as determined by technical content of document and for electronically corroborating receipt of document
EP0322125B1 (fr) Méthode d'utilisation d'un système électronique de traitement d'informations pour transférer des documents entre des utilisateurs finals
US5107419A (en) Method of assigning retention and deletion criteria to electronic documents stored in an interactive information handling system
US6377949B1 (en) Method and apparatus for assigning a confidence level to a term within a user knowledge profile
US6205472B1 (en) Method and apparatus for querying a user knowledge profile
US6964044B1 (en) System and process for management of changes and modifications in a process
US6405197B2 (en) Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner
US5247661A (en) Method and apparatus for automated document distribution in a data processing system
US6341290B1 (en) Method and system for automating the communication of business information
EP1121650B1 (fr) Procede et appareil permettant de construire et de mettre a jour un profil de connaissances d'utilisateurs
US6810404B1 (en) Computer-based document management system
US10114821B2 (en) Method and system to access to electronic business documents
US9116927B2 (en) Methods and apparatuses for publication of unconsciously captured documents
US6408323B1 (en) Job execution managing apparatus and computer-readable recording medium with program recorded therein for making a computer function as a job execution managing apparatus
US20040107190A1 (en) Automatic management of terms in a user profile in a knowledge management system
US7203725B1 (en) Withdrawal of requests of target number of requests responses received
US20050165740A1 (en) System and method for scrolling within a list of documents
US5237679A (en) Method and system for automatic deletion of a folder having temporary document relationships within a data processing system
WO2002010983A1 (fr) Systeme et procede destine a une selection de variables multiples de fichiers aux fins d'effacement
US8380875B1 (en) Method and system for addressing a communication document for transmission over a network based on the content thereof
WO2002029523A2 (fr) Systeme et procede de gestion de changements et modifications introduits dans un procede

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP