WO2006100499A1 - Automatic intranet service publishing and service access - Google Patents

Automatic intranet service publishing and service access Download PDF

Info

Publication number
WO2006100499A1
WO2006100499A1 PCT/GB2006/001080 GB2006001080W WO2006100499A1 WO 2006100499 A1 WO2006100499 A1 WO 2006100499A1 GB 2006001080 W GB2006001080 W GB 2006001080W WO 2006100499 A1 WO2006100499 A1 WO 2006100499A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
uid
network
data item
user
Prior art date
Application number
PCT/GB2006/001080
Other languages
French (fr)
Inventor
Cefn Richard Hoile
Erwin Rein Bonsma
Original Assignee
British Telecommunications Public Limited Company
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications Public Limited Company filed Critical British Telecommunications Public Limited Company
Priority to CN200680015903.0A priority Critical patent/CN101171583B/en
Priority to JP2008502481A priority patent/JP4847517B2/en
Priority to US11/886,845 priority patent/US8131690B2/en
Priority to EP06710142.8A priority patent/EP1861798B1/en
Publication of WO2006100499A1 publication Critical patent/WO2006100499A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web

Definitions

  • the present invention lies in the field of data handling, and relates particularly but not exclusively to the publishing and retrieval of data items amongst a networked community of computer users.
  • an Internet service daemon In the field of data handling, an Internet service daemon, known as an inetd daemon or the super daemon (subsystem), is the server process for Internet standard services.
  • the inetd daemon operates in conjunction with a configuration-file, referred to as the inetd. conf file, which lists the services that inetd daemon is to provide and describes to the inetd daemon how Internet service requests on Internet sockets should be handled.
  • the inetd daemon reads the configuration-file and default settings once when it starts up and rereads them again whenever it receives a hangup signal, SIGHUP. New services can be activated and existing services can be deleted or modified by editing the configuration-file and then sending inetd a SIGHUP signal. After it receives the SIGHUP signal, inetd reads the configuration-file and, for each service listed, binds to that service's respective Internet socket (TCP or UDP) to listen for connections. The inetd daemon might have to wait to bind if another standalone server or "wait" wait-status server started by inetd is already listening on the same socket.
  • TCP Internet socket
  • the inetd daemon When the inetd daemon receives a request on one of these sockets, it knows from the identity of the socket which service corresponds to that socket and then either handles the service request itself (for internal simple Internet, services, including echo, discard, chargen (character generator), daytime (human-readable time), and time (machine- readable time)), or invokes and schedules the appropriate daemon (subserver), for example, ftpd, rlogind, rexecd, rshd, talkd, telnetd, and uucpd.
  • the inetd daemon is merely a reactive subsystem which waits until its computer receives a request on a service socket, uses its translation facility to translate the identity of that socket to a service name, and then invokes the daemon for that service.
  • the present invention seeks to provide a method of enabling a computer user readily and, preferably, automatically to provide access for other computer users, connected to the same common network, to certain data items in his computing environment, selected under the control of that user.
  • the user can in advance define which of the data items in his computing environment (including "permanent" stored items such as document, email messages, diary entries, and “temporary” stored items such as web browsing data) he is willing to make public (give permission for access and retrieval) and those which he wishes to keep private (not give such permission).
  • the present invention seeks to provide a method of enabling a computer user readily and, preferably, automatically to find and, preferably, retrieve data items in the computing environment of other computer users, which data items have been published to the network by those users.
  • the user is informed of new publications by other users (alerted), and can tailor the alert to specific interests.
  • the user can also "force" information to other users, for example the user can set up an automatic search of the network to find if another user has published a data record relating to a URL of a viewed web page relating to a particular hobby, and can automatically retrieve user contact details associated with that published data record and can automatically send directly to that other user to announce his common interest in that hobby.
  • Figure 1 shows a general purpose computer.system which provides the operating environment of embodiments of the present invention
  • Figure 2 shows a system block diagram of the system components of the computer system of Figure 1 ;
  • FIG. 3 shows a schematic view of a Small World Adaptive Network (SWAN) type of network for operating the method of the present invention
  • Figure 4 is a map representing the location of nodes in ID space in the SWAN network of Figure 3;
  • Figure 5 shows link lists of three of the nodes shown in Figure 3;
  • Figure 6 shows common ID lists of some of the nodes of the present invention.
  • Figure 7 shows a schematic diagram of component functions of the Networker program of a preferred embodiment of the present invention.
  • Figure 1 shows a general purpose computer system forming part of a distributed computing environment which provides the operating environment of embodiments of the present invention. Later, the operation of the embodiments of the present invention will be described in the general context of computer executable instructions, such as program modules, being executed by a computer.
  • program modules may include processes, programs, objects, components, data structures, data variables, or the like that perform tasks or implement particular abstract data types.
  • the invention may be embodied within distributed computing environments comprising computer systems other than that shown in Figure 1 , and in particular hand held devices, notebook computers, main frame computers, mini computers, multi processor systems, etc.
  • multiple computer systems are connected to a communications network and individual program modules of the invention may be distributed amongst the computer systems.
  • a general purpose computer system 1 hereinafter referred to as a computer, forming part of the operating environment of an embodiment of an invention, and which is generally known in the art comprises a desk-top chassis base unit 100 within which is contained the computer power unit, mother board, hard disk drive or drives, system memory, graphics and sound cards, as well as various input and output interfaces. Furthermore, the chassis also provides a housing for an optical disk drive 110 which is capable of reading from and/or writing to a removable optical disk such as a CD, CDR, CDRW, DVD, or the like. Furthermore, the chassis unit 100 also houses a magnetic floppy disk drive 112 capable of accepting and reading from and/or writing to magnetic floppy disks.
  • the base chassis unit 100 also has provided on the back thereof numerous input and output ports for peripherals such as a monitor 102 used to provide a visual display to the user, a printer 108 which may be used to provide paper copies of computer output, and speakers 114 for producing an audio output.
  • a user may input data and commands to the computer system via a keyboard 104, or a pointing device such as the mouse 106.
  • Figure 1 illustrates an exemplary embodiment only, and that other configurations of computers are possible which can be used with the present invention.
  • the base chassis unit 100 may be in a tower configuration, or alternatively the computer 1 may be portable in that it is embodied in a laptop or notebook configuration. Other configurations such as personal digital assistants or even mobile phones may also be possible.
  • Figure 2 shows a system block diagram of the system components of the computer 1. Those system components located within the dotted lines are those which would normally be found within the chassis unit 100.
  • the internal components of the computer 1 include a mother board upon which is mounted system memory 118 which itself comprises random access memory 120, and read only memory 130.
  • a system bus 140 is provided which couples various system components including the system memory 118 with a processing unit 152.
  • a graphics card 150 for providing a video output to the monitor 102; a parallel port interface 154 which provides an input and output interface to the system and in this embodiment provides a control output to the printer 108; and a floppy disk drive interface 156 which controls the floppy disk drive 112 so as to read data from any floppy disk inserted therein, or to write data thereto.
  • a sound card 158 which provides an audio output signal to the speakers 114; an optical drive interface 160 which controls the optical disk drive 110 so as to read data from and write data to a removable optical disk inserted therein; and a serial port interface 164, which, similar to the parallel port interface 154, provides an input and output interface to and from the system.
  • the serial port interface provides an input port for the keyboard 104, and the pointing device 106, which may be a track ball, mouse, or the like.
  • a network interface 162 in the form of a network card or the like arranged to allow the computer 1 to communicate with other computers over a network 190.
  • the network 190 may be a local area network, wide area network, local wireless network, the public switched telephone network (PSTN) or the like.
  • PSTN public switched telephone network
  • IEEE 802.11 wireless LAN networks may be of particular use to allow for mobility of the computer.
  • the network interface 162 allows the computer 1 to form logical connections over the network 190 with other computers such as servers, routers, or peer- level computers, for the exchange of programs or data.
  • a hard disk drive interface 166 which is coupled to the system bus 140, and which controls the reading from and writing to of data or programs from or to a hard disk drive 168. All of the hard disk drive 168, optical disks used with the optical drive 110, or floppy disks used with the floppy disk 112 provide non-volatile storage of computer readable instructions, data structures, program modules, and other data for the computer system 1. Although these three specific types of computer readable storage media have been described here, it will be understood by the intended reader that other types of computer readable media which can store data may be used, and in particular magnetic cassettes, flash memory cards, tape storage drives, digital versatile disks, or the like.
  • Each of the computer readable storage media such as the hard disk drive 168, or any floppy disks or optical disks, may store a variety of programs, program modules, or data.
  • the hard disk drive 168 in the embodiment particularly stores a number of application programs 175, application program data 174, other programs 173 required by the computer system 1 or the user, a computer system operating system 172 such as Microsoft® Windows®, LinuxTM, UnixTM, or the like, as well as user data in the form of files, data structures, or other data 171.
  • the hard disk drive 168 provides non-volatile storage of the aforementioned programs and data such that the programs and data can be permanently stored without power.
  • the other programs 173 include a program for implementing methods of the present invention, referred to as the Networker program by the inventor, and described later, and the user data 171 includes a Personal Details document, as described later.
  • the applications programs 175 contain program or programs for implementing methods of the present invention.
  • the Networker program is given the reference numeral 173A, and its component parts are given reference numerals 173B, 173C etc. as described below.
  • the system memory 1 18 provides the random access memory 120, which provides memory storage for the application programs, program data, other programs, operating systems, and user data, when required by the computer 1.
  • the random access memory 120 provides memory storage for the application programs, program data, other programs, operating systems, and user data, when required by the computer 1.
  • a specific portion of the memory 125 will hold the application programs, another portion 124 may hold the program data, a third portion 123 the other programs, a fourth portion 122 the operating system, and a fifth portion 121 may hold the user data.
  • the various programs and data may be moved in and out of the random access memory 120 by the computer as required. More particularly, where a program or data is not being used by the computer, then it is likely that it will not be stored in the random access memory 120, but instead will be returned to non-volatile storage on the hard disk 168.
  • the system memory 118 also provides read only memory 130, which provides memory storage for the basic input and output system (BIOS) containing the basic information and commands to transfer information between the system elements within the computer 1.
  • BIOS basic input and output system
  • the BIOS is essential at system start-up, in order to provide basic information as to how the various system elements communicate with each other and allow the system to boot- up.
  • Figure 2 illustrates one embodiment of a computer of a distributed computing environment of the invention
  • other peripheral devices may be attached to the computer, such as, for example, microphones, joysticks, game pads, scanners, or the like.
  • the network interface 162 we have previously described how this is preferably a wireless LAN network card, although equally it should also be understood that the computer 1 may be provided with a modem attached to either of the serial port interface 164 or the parallel port interface 154, and which is arranged to form logical connections from the computer system 1 to other computers via the public switched telephone network (PSTN).
  • PSTN public switched telephone network
  • the preferred embodiment is performed in a network of interconnected computers 1 of the Small World Adaptive Network (SWAN) type of network, as described in detail in European Patent Application No. 02801398.5 (Publication No. 1436957) and modified as described below.
  • SWAN Small World Adaptive Network
  • a SWAN network comprises a set of nodes 200 connected by a communication infrastructure 215 (e.g. the network 190) comprising computers 1 , on which the nodes 200 reside, together with local access networks and the Internet.
  • a communication infrastructure 215 e.g. the network 190
  • the computers 1 constitute computing nodes that have processing, storage and communication capabilities, and also constitute nodes within the communications infrastructure 215 via which messages can be sent between the computers 1.
  • nodes 200 constitute virtual nodes which belong to a virtual network.
  • the distinction is important because a computing node is able to have two or more virtual nodes (possibly belonging to different virtual networks) associated with it.
  • a virtual node does not exist in any physical sense: rather, as will become clear presently, its existence is established by stored data which define links between virtual nodes and, hence, also define the virtual network to which it belongs.
  • a virtual node must be associated with, referred to as being resident on, a computing node, which provides it with processing, storage and communication capabilities: references to the sending, receiving and processing of messages by a virtual node refer to such sending, receiving or processing by the computing node on behalf of the virtual node.
  • Each node 200 can be thought of as comprising a two-part data record 202 in which one part 202a constitutes its identity (ID) 210 and the other part 202b constitutes an address 205 in the infrastructure in the form of an Internet Protocol (IP) address including a port number and a service ID.
  • IP Internet Protocol
  • the data record 202 of a node 200 constitutes a published UIDp:UIDa pair of the present invention, the identity (ID) 210 constituting a publication unique ID (UIDp, or publication UID), and the address 205 constituting an associated unique ID (UIDa, or in this case, location UID).
  • the UIDa is commonly in the form of the network address of a retrievable data item on a computer 1 , but is not restricted to this and can be in any of a number of other forms.
  • Each node 200 by virtue of the association with its host computer 1 , has access to processing, storage and communication capabilities and is configured to send and receive a set of message types via the infrastructure 215 to any other such node 200 by specifying an address 205 in the infrastructure 215 for the target node.
  • Each computer 1 can have many thousand resident nodes 200.
  • the node identities 210 are fixed length bitstrings (160 bits) produced by applying a hashing algorithm (in this example, the hashing algorithm known as SHA-1 , a known standard) to practical UIDs, for example URLs and postcodes, and are associated with, inter alia, data items hosted by the computers on which those nodes reside and are available for retrieval by other computers of the network.
  • SHA-1 the hashing algorithm known as SHA-1 , a known standard
  • the term data item is used herein in a broad sense rather than a limited sense, and includes software capable of providing a service, and the term retrieval in this case means that the hosted service is made available to users at remote computers of the network.
  • Other associations will be described later.
  • Figure 4 shows co-ordinate space 250, referred to hereafter as ID space 250, and a plurality of nodes 200 represented by their IDs 210 at locations in ID space 250.
  • ID space 250 co-ordinate space 250
  • nodes 200 represented by their IDs 210 at locations in ID space 250.
  • a node 200 knows the network address 205 of another node 200, this is shown as a link 225, 220a, 220b on Figure 4, where the two nodes can send messages to each other using the infrastructure 215.
  • the link is one-way only, in that a first node has the address for a second node but the second node does not have the address for the first, this is shown as a link, which is partly dotted.
  • An example is the link between nodes 29 and 39.
  • the ID space 250 is Euclidean in terms of the distance measure used to calculate the distance between any two co-ordinates in the ID space 250 and its edges "wrap" in ID space 250. This can be seen in that the link 220a, 220b from node 43 to node 38 is "continuous" across the disjunction of the bottom and top of the ID space 250.
  • each node identity 210 represented by co-ordinates (location) in co-ordinate space 250, is independent of network address and physical location.
  • Nodes represented in ID space 250 have two characteristics. Firstly, each node 200 maintains a link list containing a few short-range links and a few long-range links, where a link is an alternative term for the network address of another node 200, conveniently but not necessarily in the form of the record 202 of that other node 200. Secondly, there is a predictable relationship (the hashing algorithm) between every node's ID 210 and its coordinates in ID space 250.
  • Figure 5 shows the respective link lists of the nodes having the IDs 24, 26 and 43.
  • the node ID 24 link list contains the network addresses of nodes having IDs 25, 26 and 27; the node ID 26 link list contains the network addresses of nodes having IDs 24 and 29; and the node ID 43 link list contains the network addresses of nodes having IDs 35 and 38.
  • a node (the enquiring node) needs to communicate with a node (the target node) for which it has an identity (e.g. supplied by a user in raw UID form, i.e. not hashed) but no address, it uses the hashing algorithm to translate that target node's ID 210 into coordinates in ID space 250 and then performs calculations to find which of the nodes in its list (referred to as the "nearest node") is located in ID space nearest to the target node. These calculations comprise first determining its own distance from the target node in ID space, and then the respective distances for each of the nodes in its list.
  • the enquiring node Assuming that the enquiring node now determines that one of its list of nodes is the nearest node, it initiates the transmission, through the infrastructure to that nearest node, of a "FIND" request which contains the target node's ID 210 (now in its fixed length bitstream hashed form), and the ID and network address of the enquiring node.
  • the receiving node When a node (in this case, the "nearest node” of the enquiring node's list and now referred to as the receiving node) receives a FIND request, it retrieves the target node's ID 210 from the FIND request and first checks whether there is a match between its own ID and the target node's ID. If there is no match, it then proceeds to find its respective "nearest node", performing calculations as described above for the enquiring node. Thus, the FIND message is passed onwards in the same manner, always to a receiving node whose ID co-ordinates represent a location in ID space which is nearer to the location of the target node's ID in ID space than that of the forwarding receiving node.
  • the propagation of the FIND request will finish at a node (referred to as the final node) which either (1) has an ID matching the target node's ID, or (2) is not able to find in its list a "nearest node". Since the FIND request contains the ID and network address of the enquiring node, that final node can now return to the enquiring node over the infrastructure 215 a "FOUND" message containing its own ID and network address, i.e. its data record part 202b, and the target node's ID. The enquiring node can now determine whether that final node is the desired target node, and if so direct communication can subsequently take place using the routing mechanisms of the infrastructure 215.
  • nodes 24, 26 and 43 shown in Figure 5 As a more detailed example of the mechanism by which nodes retrieve network addresses of nodes with which they wish to communicate, reference is now made to nodes 24, 26 and 43 shown in Figure 5.
  • node 43 requires the network address for node 24, which is a node for which it does not hold any information. Accordingly, node 43 converts "24" to co-ordinates in ID space 250, and identifies which node, of those for which it has information, is closer to the target node 24 in ID space 250.
  • node 35 is closer to node 24, so node 43 sends a "FIND" message to node 35.
  • Node 35 repeats the process, forwarding the "FIND" message to node 27, which in turn forwards it to node 24.
  • Node 24 recognises itself to be the target node and uses details of the initiating node (node 43) to return a "FOUND" message to node 43.
  • Node 43 can now communicate directly with node 24.
  • the set of message types includes PUSH and PULL updating messages which are initiated by nodes periodically to improve the identity network.
  • the updating of the SWAN network is not relevant to the present invention and the updating messages will not be described further.
  • the basic structure of the SWAN network as described so far enables a user (the enquiring user) at a computer 1 to find out whether the network includes a node (the target node) having an ID of interest to that user, and, if so, to obtain a network address relating to that ID and which the user can employ as a destination address for messages.
  • the user might submit that ID, via a search interface, to a SWAN network node resident on his computer 1 , and that node will then perform as the enquiring node described above.
  • the user's computer 1 is arranged to generate a hashed ID and send a FIND message via the infrastructure 215.
  • the "From" field of the FIND message contains a network address of the computer, instead of containing a node ID.
  • the SWAN network requires modification to enable the operation of the present invention.
  • a first modification relates to the existence in the network of a plurality of the nodes 200 having the same common ID, and each of these nodes maintains, actually or effectively, a respective list (referred to as a common ID list and as shown in Figure 6) of the data record parts 202b, usually network addresses, of the nodes of that plurality.
  • Figure 6 shows three nodes having the same common ID, 24 (1 ), 24 (2) and 24 (3); and two of five nodes having the same common ID, 26 (1) and 26 (2). For simplicity, nodes ID 26 (3) to 26 (5) are not shown in Figure 6.
  • Node ID 24 (1) has a common ID list containing its own network address and the network address of nodes ID 24 (2) and 24 (3);
  • node ID 24 (2) has a common ID list containing its own network address and the network address of nodes ID 24 (1 ) and 24 (3);
  • node ID 24 (3) has a common ID list containing its own network address and the network address of nodes ID 24 (1 ) and 24 (2).
  • node ID 26 (1 ) has a common ID list containing its own network address and the network address of nodes ID 26 (2) to 26 (5);
  • node ID 26 (2) has a common ID list containing its own network address and the network address of nodes ID 26 (1 ) and 26 (3) to 26 (5), and correspondingly for the three nodes ID 26 (3) to 26 (5) not shown.
  • a final node whose ID matches the FIND ID can return a FOUND message containing the addresses in its common ID list, and the enquiring node can then send messages to that plurality of nodes. It will be understood that in practice these messages will be sent and received by the computers 1 on which the enquiring node and this plurality of nodes are resident.
  • the final node does not include these addresses in the FOUND message and the enquiring node can retrieve them by a subsequent request.
  • the common ID list of a node does not contain that node's own network address. Thus, to obtain the network addresses of all that plurality of nodes, the enquiring node will need to add the address contained in the From field in the header of the FOUND message to the contents of the received common ID list.
  • the common ID of a plurality of the nodes 200 is the hash of a URL of a web page
  • the common ID list contains the network addresses of corresponding data items containing respective comments (also known as Annotations) relating to that page and being stored on users' computers 1.
  • the common ID lists are updated by a common ID list updating process 173N.
  • the entries in the common ID lists of those nodes are network addresses which the enquiring node can use to send individual Retrieve messages and obtain the respective comments.
  • a UID i.e. either a UIDp or a UIDa
  • Joe Public might wish other users to find and retrieve his Personal Details document stored on his computer 1. He publishes a data record of which the first part 202a, the UIDp, contains his name "Joe Public" and the second part 202b, the UIDa, contains the network address of that Personal Details document.
  • a club having a web site might offer free membership.
  • the web site will have a membership page, and while the user is viewing that page he can invoke the Assert function.
  • An Assert window is now displayed having two boxes, one for the UIDp and the other for the UIDa.
  • the URL of that page is automatically entered in the UIDa box, and the cursor is positioned at the start of the UIDp box waiting for data entry by the user.
  • a user installs a program 173A, given the name Networker by the inventors, on his computer 1 by downloading it from a website, either by directing his browser to the relevant URL, or by clicking on a hyperlink in an email message from someone who already has installed the Networker program on his computer and wishes to encourage the use of the program by others.
  • he receives it as an attachment of an email message or on a carrier medium, e.g. a floppy disk or a CDROM.
  • the Networker program can be thought of as comprising a number of functions. A low level description of these functions will not be described as the skilled person in the art does not need to start from the inventor's software code in order to be able to generate his own embodiment of the invention. Indeed, it is common place that the skilled person has his own stock-in-trade of software modules for performing various software procedures, etc. and will prefer his own software to that of others. So the functions of the Networker program will be described only in a high level description.
  • the functions of the Networker program are Establish Profile (173B)
  • Set permissions for disclosure acts i.e. set of access controls applied to published records and defining the identities of other users who are permitted to access the user's records
  • Set parameters for search i.e. set of access controls applied to published records and defining the identities of other users who are permitted to access the user's records
  • Search 173G Set parameters for search
  • the Networker program comprises a set of data processing computer processes, including, inter alia, a publishing process 173D', a common ID list updating process 173N, a searching process 173G', a retrieval process 173E', a page retrieval process 1730, a call maker process 173P.
  • the Networker program Upon installation, the Networker program installs a set of pre-defined software probes 173C on the user's computer 1.
  • Each pre-defined software probe operates in accordance with a respective predefined detection criterion (also referred to as a template 173C-T), e.g. proper names (both people and places), email addresses, postcodes (i.e. particular formats of alphanumeric characters, explained in detail later), Zip codes, telephone numbers, timestamps, GPS coordinates, calendar schemes and uniform resource locators (URLs).
  • a predefined detection criterion also referred to as a template 173C-T
  • proper names both people and places
  • email addresses e.g. proper names (both people and places)
  • postcodes i.e. particular formats of alphanumeric characters, explained in detail later
  • Zip codes i.e. particular formats of alphanumeric characters, explained in detail later
  • Zip codes i.e. particular formats of alphanumeric characters, explained in detail later
  • each such template 173C-T effectively constitutes a respective set of UIDs that the probe searches for amongst events and documents (collectively referred to as data items) within the computing environment.
  • any character sequence which matches a template is deemed to be a UID.
  • a sequence of numbers which is consistent with the UK National Telephone Numbering Plan constitutes a UK telephone UID
  • a character sequence which comprises a protocol known by its initial letters, e.g. http, https, ftp, followed by "://" followed by a host name (e.g. www.apa.org, or expressed in "dotted-decimal” form) constitutes a URL UID.
  • the Establish Profile function of the Networker program generates a graphical user interface (GUI). This has a Profile tab and a Search tab.
  • GUI graphical user interface
  • the Profile tab enables the user to establish the configuration of his profile. Clicking on the Profile tab opens a ProfilePanel, which provides for the user to select a default configuration from a number of preset configurations which are compatible with common desktop environments and employ categories of information including documents and those managed by a personal information manager such as Outlook, e.g. email messages, calendar entries, contact records, bookmarks; and also provides for the user to input his name, description and email address to be held in a root record of a hierarchical record tree to be constructed by the Networker program, as will be described later.
  • a personal information manager such as Outlook, e.g. email messages, calendar entries, contact records, bookmarks
  • the ProfilePanel displays a plurality of ProfileGroup Panels with titles including People, Place, Event, Journey, On Offer, File, Search, Note, Bookmarks and Trail. Initially, the ProfileGroup Panels are in closed state, but clicking on an OpenCloseBox of a ProfileGroup panel opens that ProfileGroup to display one or more ProfileGroup Rows.
  • Each ProfileGroup Row contains a PermissionPanel having a Share check box defining whether or not the data items relating to that ProfileGroup Row are to be shared with anyone else, and other check boxes for selecting the extent of sharing from everyone, Work, Home, and Work Team.
  • the Search tab enables the user to set criteria for the search area and the user-defined software probes, e.g. the extent of the search area, the data items to be regarded as private, the selection of the pre-defined software probes 173C, and to request the generation of a general-purpose software probe 173C tailored in accordance with user- specified search parameters.
  • One preset configuration defines: a search ruleset including the pre-defined software probes to be used, the extent of the search area within the computer environment - all stored data (documents, email messages, calendar entries, contact records, bookmarks) and all transient features of the computing environment (web browsing - web page viewing records), and the search type (automatic and continuous monitoring of the computer environment); a publish ruleset 173D establishing a public section and a private section, including bookmarks, browsing and documents (in a variant, there is only a public section and anything not specified by the public section is deemed to be private); a disclosure ruleset 173F specifying the identities of other users who are permitted to access the user's published data items, whether those other users are to be authenticated by a password, and whether an alert is displayed for the user when a data item is accessed by such a permitted user; and a retrieval ruleset 173E for finding published data items on other computers of the network which contain the same UID as a data item found by the search ruleset.
  • the Networker program first constructs the basic form of the hierarchical record tree in which the nodes of the tree are formed by data records, as described later.
  • the records forming nodes other than leaf nodes are referred to as container records.
  • the root node of the tree is constituted by a container record entitled Profile and containing the name, description and email address of the user, which were provided by the user in setting up the profile.
  • This Profile record has three children container records (nodes) at the next level in the tree, namely Documents, Bookmarks and Browsing.
  • the Bookmarks container record contains a Work Bookmarks container record and a Private Bookmarks container record at the next level.
  • the individual records within these lowest level container records are leaf records of the tree.
  • the Create Tree function associates a respective ruleset with each container record.
  • a ruleset comprises the Publish permissions, Retrieve permissions, and Disclose permissions which have been set by the user under the Establish Profile function.
  • each container record except for leaf records, is associated with a respective ruleset which defines permissions for publishing acts, retrieval, disclosure acts, and alert.
  • rulesets are defined by the user via another window of the interface.
  • the user can make such acts dependent upon the context in which the record was created, e.g. the user can permit bookmarks to be published, but not browsing behaviour, and dependent upon the form of the UID, e.g. the user can permit postcodes to be searched but not URLs.
  • leaf records can be assigned a respective ruleset.
  • the Create Tree function responds to each UID that the Autoscan function 173H finds and generates a respective record containing that UID and information derived from the context in which it was encountered, e.g. file-name and line for data, and time, date and program for behaviour.
  • the hierarchical record tree is then built using the generated records.
  • This tree mirrors the profile, in other words, its root record is entitled Profile and contains the name, description and email address of the user, which are provided by the user in setting up the profile.
  • This root record is a container record having three children container records at the next level in the tree, namely Documents, Bookmarks and Browsing.
  • the bookmark records at the next level under Bookmarks are divided into work bookmarks and private bookmarks, and they are leaf records (they may be alternatively considered as container records without children records).
  • a new record will be created and added to the tree as soon as a probe finds a UID in accordance with its search criterion.
  • records are not added to the tree one at a time, but in groups or even in a single tree construction operation after all the probes have finished searching.
  • the user defines public and private sections of each of the categories of data items in his computing environment, and the automatic search area includes all such private sections.
  • the corresponding tree contains both public and private containers as children of a parent container, e.g. a documents container will have children containers - public documents and private documents, and each child container will have its own associated ruleset.
  • the Assert function 173M of the Networker program is also capable of generating, upon command by the user, an interface, referred to as the Assert window, to enable such records to be created manually.
  • an interface referred to as the Assert window
  • the user might wish to create a record associating a file representing a digital photograph with a postcode or latitude/longitude representing a descriptor of the location where the photograph was taken.
  • the Networker program recognises that action is requested in respect of a particular record, e.g. for a newly added bookmark record or for a received retrieval request for a data item, the corresponding leaf record is located in the tree, the associated ruleset is inspected and the Networker program then performs the necessary actions, as required, through invocation of an appropriate one of a set of data processing computer processes.
  • the user will set the root ruleset to top level permissions, i.e. search for all UIDs, publish for all UIDs, and provide a prompt, referred to as Alert, to the user for any request to access data.
  • a ruleset at a lower level provides a more restrictive behaviour
  • the root ruleset will enable all possible links to be found (both to and from remote users), but all data disclosures are controlled by a prompt which tells the user who is trying to read the data, and gives the user an option to deny the request.
  • the user is likely to select "prevent publishing" and "prevent access” for the ruleset associated with the Browsing record, but to allow the default behaviour to cascade down to the Bookmarks record, i.e. select a null ruleset for the Bookmarks record.
  • a respective web page viewing record constituting a data item of the present invention, is stored on his computer 1.
  • This web page viewing record contains in known manner, inter alia, the user's ID, the URL of the page and the start and stop times of viewing.
  • the user has, via the ProfilePanel, assigned "Public" status to his web page viewing records.
  • a "URL" software probe 173C is operative to scan all the data items stored on a user's computer 1 , when the probe scans a web page viewing record it finds the URL, captures both the URL and the address of that web page viewing record on the user's computer 1.
  • This data is passed to the Networker program Create Tree 173K which then constructs a tree record comprising the URL, now constituting a publication UID (UIDp) of the present invention, in association with the address, now constituting an association UID (UIDa) of the present invention, and adds that newly created tree record to the Browsing container of the hierarchical tree.
  • UIDp publication UID
  • UIDa association UID
  • the Browsing container is associated with a ruleset which includes permission for the record to be published to the network. So, the Networker program will then invoke a publishing process 173D' which will create in the modified SWAN network by the SWAN updating process a new node having the URL (and the network address of that web page viewing record), and the common ID lists will be updated for any existing nodes having that URL as their ID.
  • a group of the users are model railway enthusiasts, each of which has assigned "Public" status for his web page viewing records.
  • each of the group has visited a home page relating to model railways and having the URL "ptth: ⁇ www.hornbyrailways.com/pages/home.aspx" (referred to as the Model URL) and has a respective web page viewing record stored on his computer 1.
  • the Model URL a home page relating to model railways and having the URL "ptth: ⁇ www.hornbyrailways.com/pages/home.aspx”
  • the Model URL the URL
  • at least some of the group have invoked the Annotation function 173L, which caused a text box to appear on their respective monitors 102, and that the users have entered respective annotations, e.g.
  • each respective web page viewing record is created and stored, the respective URL software probes on those users' computers 1 are operative, as described above, resulting in the creation of respective new tree records.
  • the publishing process is invoked and a corresponding node is added to the network.
  • the update mechanism of the network finds all existing nodes having that URL as node ID 210 and adds the respective associated network address to the respective common ID lists.
  • each member of the group has resident on his computer 1 a respective node having the Model URL as its ID and whose common ID list contains the network addresses of the web page viewing records of the other members of the group.
  • Each member can invoke the Retrieve function 173E' to send respective Retrieve messages to the other members, i.e. using the common ID list of the respective node stored on his computer 1 , and retrieve data from their web page viewing records. This data includes the identity of the user, and any respective annotation(s) that he has entered in the corresponding web page viewing record.
  • a user who is not yet a member of the group can join the group by visiting the web page, and the publishing process (also called a Publish Node function) 173D 1 in combination with the network update mechanism 173N will add his newly created node in respect of the new web page viewing record (i.e. Associated Pair in the form "Model URL:NA”) to the network, and update accordingly the common ID lists of any existing nodes having the same ID. It will be appreciated that the common ID list of the newly created node will now contain the network addresses of all other existing nodes having that ID.
  • the network update mechanism 173N is either the SWAN network normal automatic update or is a forced update invoked by the publishing process. It will be appreciated that the present invention is not reliant on any particular network update mechanism and that such network update mechanisms are known to the skilled person. Accordingly, no further details of this will be given.
  • That user can enter the Model URL in the Search function 173G' to find such an existing node.
  • the Search function will cause a FIND request for the Model URL to be sent into the network.
  • the Publish Node function Upon receipt of a FOUND message, the Publish Node function will create a new node in respect of that user-supplied Model URL in association with the network address of a Public status Contact document, constituting a data item of the present invention, previously created by that user and containing, e.g. his name, address, email address, telephone numbers, and any other information that the user is willing for others to know.
  • This Contact document is also referred to as a Personal Details document.
  • the Alert function 173J is responsive to network updates, and upon the occurrence of a common ID list update of a node resident on his computer, generates the display of an icon on the monitor 102.
  • the Alert function includes the capability for the user to associate a selected icon with a particular node ID.
  • an existing member of the group can provide the Model URL to the Alert function and select, or design, an icon in the shape of, say, a railway engine.
  • the existing member can click on the icon, which triggers the Alert function to retrieve the newly added network address from the corresponding common ID list and provide it to the retrieve function (also known as a retrieve process) 173E', which sends a message to the newly added member's computer 1 to retrieve data from the data item corresponding to the network address, either the web page viewing record if he visited the web page, or a Contact document as mentioned above.
  • the retrieve function also known as a retrieve process
  • the modified SWAN network is a company intranet and that users at computers 1 of the network are Contract Managers who have stored respective documents, constituting data items of the present invention, relating to contracts with suppliers A and B for supply of a product X.
  • the Contract Managers will have created for each document a respective Comments Annex including information relating to the supplier or the product, which might be of value to other Contract Managers.
  • the reader will appreciate that the following example can be extrapolated with respect to the number of suppliers and the number of products.
  • each of these Contract Managers has downloaded or otherwise obtained a Networker program, as mentioned above, and that each has created respective user-defined software probes for the suppliers' names "A" and "B" on his respective computer 1.
  • the software probes are triggered and the document is examined for the presence of any such unique identifier.
  • a Contract Manager has created and stored on his computer 1 documents D1 to D4 and that, of these, documents D1 and D2 are found to contain A, and documents D3 and D4 are found to contain B.
  • the Publish Node function will now be triggered to update automatically the modified SWAN network by adding nodes corresponding to the Published Associations - A:NA(D1 ); A:NA(D2); B:NA(D3) and B:NA(D4).
  • the node having the ID "A” on that computer will recognise that it is a target node and respond with its common ID list. If that Contract Manager had been searching for documents containing A, but had not yet created any such document on his own computer, then a FIND request for the unique ID "A” would be sent into the network, as described above, resulting in the discovery of a node having the ID "A", and subsequent receipt of its common ID list.
  • a probe 173C for X would be provided for the Autoscan function, and corresponding nodes would be created for each document containing the unique identifier "X". If the supplier A is associated with other products Y, Z, and/or other suppliers are associated with the product X, then the results of searching for A and searching for X can be combined with a simple comparison program to determine those network addresses which occur in both results and these would be in respect of documents in which both A and X occur.
  • Model URL which is common to that group.
  • this Model URL is one example of a unique identifier.
  • another example of a unique identifier is a postcode, and this can be used in a number of ways in accordance with the present invention.
  • the "postcode" predefined software probe is arranged to recognise postcodes in accordance with any one of the following four character sequence templates: alpha, numeric, space, numeric, alpha, alpha; alpha, numeric, numeric, space, numeric, alpha, alpha; alpha, alpha, numeric, space, numeric, alpha, alpha; alpha, alpha, numeric, alpha, space, numeric, alpha, alpha.
  • the alpha characters must be upper case.
  • a first user wishes to publish information about a forthcoming jumble sale at a venue having the postcode GH7 8IJ, and creates a document containing the necessary details for the jumble sale and having "Public" status.
  • the Autoscan function 173H recognises the postcode GH7 8IJ, and invokes the Publish Node function in respect of the Published Associations - GH7 8IJ:NA, GH7 8:NA; GH7:NA and GH:NA, where NA is the network address of the document.
  • these represent the postcode, sector, district and area related to that postcode.
  • a second user can perform a Search to find out what published information there is in respect of a given postcode, i.e.
  • the first user wishes to disseminate a postcode for, say, a facility that has a related web page.
  • the first user has used that facility and wishes to draw the attention of other people in his sector to that facility. He visits that web page, thus creating a web page viewing record, and while the page is displayed invokes the Assert function.
  • An Assert window is now displayed having two boxes, one for the UIDp and the other for the UIDa.
  • the URL of that page is automatically entered in the UIDa box, and the cursor is positioned at the start of the UIDp box waiting for data entry by the user.
  • the Assert function calls the Publish Node function and a node 200 is created for the Published Association "GH7 8:URL". If one or more existing nodes 200 have this identity, "GH7 8", then their common ID lists are updated as described above, else a new node 200 is created.
  • GH7 8 Other users can search using "GH7 8" to find out what nodes have been created by users for information relating to that sector. Such a search will find a node having the identity "GH7 8" and retrieve its common ID list.
  • This list can contain, for example, network addresses of data items that are retrievable from other computers 1 , URLs that can be used directly by a browser, email addresses that can be used directly by an email handler, telephone numbers that can be used directly by a telephone dialler application, place names and GPS (global positioning system) coordinates that can be used directly by a map application, and calendar entries that can be used directly by a calendar application.
  • the Networker program when the Networker program receives a FOUND message (constituting a return message of the present invention) containing a common ID list, i.e. one or more data record second parts 202b, it immediately sends Retrieval messages to the network addresses in the list, but for each entry in the list which it recognises as not being a network address, it sends a respective FIND message.
  • a FOUND message consisting a return message of the present invention
  • a common ID list i.e. one or more data record second parts 202b
  • Networker program displays a request window to the user asking if the retrieved UIDa is to be applied to an appropriate application on the computer, e.g. a URL applied to the browser. If the user selects No, then the Networker program proceeds to send a FIND message for that UIDa.
  • a retrieved UIDa can be the network address of a networked service, for example a chat room service, hosted on a remote computer of the network.
  • a networked service for example a chat room service
  • this will invoke a data processing computer process 173Q for controlling the launch of that service, subject to any proviso in the corresponding set of rules relating to that service.
  • Another of the data processing computer processes 173R controls the launch configuration of such a networked service, subject to any proviso in the corresponding set of rules relating to that service.
  • a user specifies which of a set of possible networked services are to be hosted on his computer, and which of the hosted services are to be made available to users at other computers, i.e. assigned "Public" status, by means of the set of rules.
  • a rule can specify one or more particular services, or specify a group of services by a generic definition.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Automatic publishing and retrieval in a networked community of computers based on a Small World Adaptive Network (SWAN) type of network. Each computer installs a program which automatically scans data items in its computer's environment to find unique IDs in accordance with UID templates. For each data item found containing a UID, a data record is created comprising the UID associated with the network address of the data item. If permitted by a ruleset, that data record is published to the network by creating a node having the (hashed) UID as its identity or by adding the network address of that data item to common ID lists of existing nodes having that same UID identity. A search request in respect of a UID will find a node and obtain all the network addresses in its list, enabling the requester to send retrieval requests for each corresponding data item.

Description

AUTOMATIC INTRANET SERVICE PUBLISHING AND SERVICE ACCESS
The present invention lies in the field of data handling, and relates particularly but not exclusively to the publishing and retrieval of data items amongst a networked community of computer users.
In the field of data handling, an Internet service daemon, known as an inetd daemon or the super daemon (subsystem), is the server process for Internet standard services. The inetd daemon operates in conjunction with a configuration-file, referred to as the inetd. conf file, which lists the services that inetd daemon is to provide and describes to the inetd daemon how Internet service requests on Internet sockets should be handled.
The inetd daemon reads the configuration-file and default settings once when it starts up and rereads them again whenever it receives a hangup signal, SIGHUP. New services can be activated and existing services can be deleted or modified by editing the configuration-file and then sending inetd a SIGHUP signal. After it receives the SIGHUP signal, inetd reads the configuration-file and, for each service listed, binds to that service's respective Internet socket (TCP or UDP) to listen for connections. The inetd daemon might have to wait to bind if another standalone server or "wait" wait-status server started by inetd is already listening on the same socket.
When the inetd daemon receives a request on one of these sockets, it knows from the identity of the socket which service corresponds to that socket and then either handles the service request itself (for internal simple Internet, services, including echo, discard, chargen (character generator), daytime (human-readable time), and time (machine- readable time)), or invokes and schedules the appropriate daemon (subserver), for example, ftpd, rlogind, rexecd, rshd, talkd, telnetd, and uucpd. It will be appreciated that the inetd daemon is merely a reactive subsystem which waits until its computer receives a request on a service socket, uses its translation facility to translate the identity of that socket to a service name, and then invokes the daemon for that service.
Details of the inetd daemon have been published on the Internet at http://bama.ua.edu/cgi-bin/man-cgi?inetd+1 M, and details of the configuration-file have been published on the Internet at http://bama.ua.edu/cgi-bin/man-cgi?inetd.conf+4. In one aspect, the present invention seeks to provide a method of enabling a computer user readily and, preferably, automatically to provide access for other computer users, connected to the same common network, to certain data items in his computing environment, selected under the control of that user. Thus, the user can in advance define which of the data items in his computing environment (including "permanent" stored items such as document, email messages, diary entries, and "temporary" stored items such as web browsing data) he is willing to make public (give permission for access and retrieval) and those which he wishes to keep private (not give such permission). In another aspect, the present invention seeks to provide a method of enabling a computer user readily and, preferably, automatically to find and, preferably, retrieve data items in the computing environment of other computer users, which data items have been published to the network by those users.
In preferred embodiments, the user is informed of new publications by other users (alerted), and can tailor the alert to specific interests. The user can also "force" information to other users, for example the user can set up an automatic search of the network to find if another user has published a data record relating to a URL of a viewed web page relating to a particular hobby, and can automatically retrieve user contact details associated with that published data record and can automatically send directly to that other user to announce his common interest in that hobby.
According to the present invention, there is provided a method or computer as set out in the accompanying claims. Further inventive aspects of the invention are described below and set out in the drawings.
Preferred embodiments of methods in accordance with the present invention will now be described by way of example with reference to the drawings in which:
Figure 1 shows a general purpose computer.system which provides the operating environment of embodiments of the present invention; Figure 2 shows a system block diagram of the system components of the computer system of Figure 1 ;
Figure 3 shows a schematic view of a Small World Adaptive Network (SWAN) type of network for operating the method of the present invention;
Figure 4 is a map representing the location of nodes in ID space in the SWAN network of Figure 3; Figure 5 shows link lists of three of the nodes shown in Figure 3; Figure 6 shows common ID lists of some of the nodes of the present invention; and
Figure 7 shows a schematic diagram of component functions of the Networker program of a preferred embodiment of the present invention.
Figure 1 shows a general purpose computer system forming part of a distributed computing environment which provides the operating environment of embodiments of the present invention. Later, the operation of the embodiments of the present invention will be described in the general context of computer executable instructions, such as program modules, being executed by a computer. Such program modules may include processes, programs, objects, components, data structures, data variables, or the like that perform tasks or implement particular abstract data types. Moreover, it should be understood by the intended reader that the invention may be embodied within distributed computing environments comprising computer systems other than that shown in Figure 1 , and in particular hand held devices, notebook computers, main frame computers, mini computers, multi processor systems, etc. Within a distributed computing environment, multiple computer systems are connected to a communications network and individual program modules of the invention may be distributed amongst the computer systems.
With specific reference to Figure 1 , a general purpose computer system 1 , hereinafter referred to as a computer, forming part of the operating environment of an embodiment of an invention, and which is generally known in the art comprises a desk-top chassis base unit 100 within which is contained the computer power unit, mother board, hard disk drive or drives, system memory, graphics and sound cards, as well as various input and output interfaces. Furthermore, the chassis also provides a housing for an optical disk drive 110 which is capable of reading from and/or writing to a removable optical disk such as a CD, CDR, CDRW, DVD, or the like. Furthermore, the chassis unit 100 also houses a magnetic floppy disk drive 112 capable of accepting and reading from and/or writing to magnetic floppy disks. The base chassis unit 100 also has provided on the back thereof numerous input and output ports for peripherals such as a monitor 102 used to provide a visual display to the user, a printer 108 which may be used to provide paper copies of computer output, and speakers 114 for producing an audio output. A user may input data and commands to the computer system via a keyboard 104, or a pointing device such as the mouse 106. It will be appreciated that Figure 1 illustrates an exemplary embodiment only, and that other configurations of computers are possible which can be used with the present invention. In particular, the base chassis unit 100 may be in a tower configuration, or alternatively the computer 1 may be portable in that it is embodied in a laptop or notebook configuration. Other configurations such as personal digital assistants or even mobile phones may also be possible.
Figure 2 shows a system block diagram of the system components of the computer 1. Those system components located within the dotted lines are those which would normally be found within the chassis unit 100.
With reference to Figure 2, the internal components of the computer 1 include a mother board upon which is mounted system memory 118 which itself comprises random access memory 120, and read only memory 130. In addition, a system bus 140 is provided which couples various system components including the system memory 118 with a processing unit 152. Also coupled to the system bus 140 are a graphics card 150 for providing a video output to the monitor 102; a parallel port interface 154 which provides an input and output interface to the system and in this embodiment provides a control output to the printer 108; and a floppy disk drive interface 156 which controls the floppy disk drive 112 so as to read data from any floppy disk inserted therein, or to write data thereto. In addition, also coupled to the system bus 140 are a sound card 158 which provides an audio output signal to the speakers 114; an optical drive interface 160 which controls the optical disk drive 110 so as to read data from and write data to a removable optical disk inserted therein; and a serial port interface 164, which, similar to the parallel port interface 154, provides an input and output interface to and from the system. In this case, the serial port interface provides an input port for the keyboard 104, and the pointing device 106, which may be a track ball, mouse, or the like.
Additionally coupled to the system bus 140 is a network interface 162 in the form of a network card or the like arranged to allow the computer 1 to communicate with other computers over a network 190. The network 190 may be a local area network, wide area network, local wireless network, the public switched telephone network (PSTN) or the like. In particular, IEEE 802.11 wireless LAN networks may be of particular use to allow for mobility of the computer. The network interface 162 allows the computer 1 to form logical connections over the network 190 with other computers such as servers, routers, or peer- level computers, for the exchange of programs or data.
In addition, there is also provided a hard disk drive interface 166 which is coupled to the system bus 140, and which controls the reading from and writing to of data or programs from or to a hard disk drive 168. All of the hard disk drive 168, optical disks used with the optical drive 110, or floppy disks used with the floppy disk 112 provide non-volatile storage of computer readable instructions, data structures, program modules, and other data for the computer system 1. Although these three specific types of computer readable storage media have been described here, it will be understood by the intended reader that other types of computer readable media which can store data may be used, and in particular magnetic cassettes, flash memory cards, tape storage drives, digital versatile disks, or the like.
Each of the computer readable storage media such as the hard disk drive 168, or any floppy disks or optical disks, may store a variety of programs, program modules, or data. In particular, the hard disk drive 168 in the embodiment particularly stores a number of application programs 175, application program data 174, other programs 173 required by the computer system 1 or the user, a computer system operating system 172 such as Microsoft® Windows®, Linux™, Unix™, or the like, as well as user data in the form of files, data structures, or other data 171. The hard disk drive 168 provides non-volatile storage of the aforementioned programs and data such that the programs and data can be permanently stored without power. The other programs 173 include a program for implementing methods of the present invention, referred to as the Networker program by the inventor, and described later, and the user data 171 includes a Personal Details document, as described later. In a variant, the applications programs 175 contain program or programs for implementing methods of the present invention. The Networker program is given the reference numeral 173A, and its component parts are given reference numerals 173B, 173C etc. as described below.
In order for the computer 1 to make use of the application programs or data stored on the hard disk drive 168, or other computer readable storage media, the system memory 1 18 provides the random access memory 120, which provides memory storage for the application programs, program data, other programs, operating systems, and user data, when required by the computer 1. When these programs and data are loaded in the random access memory 120, a specific portion of the memory 125 will hold the application programs, another portion 124 may hold the program data, a third portion 123 the other programs, a fourth portion 122 the operating system, and a fifth portion 121 may hold the user data. It will be understood by the intended reader that the various programs and data may be moved in and out of the random access memory 120 by the computer as required. More particularly, where a program or data is not being used by the computer, then it is likely that it will not be stored in the random access memory 120, but instead will be returned to non-volatile storage on the hard disk 168.
The system memory 118 also provides read only memory 130, which provides memory storage for the basic input and output system (BIOS) containing the basic information and commands to transfer information between the system elements within the computer 1. The BIOS is essential at system start-up, in order to provide basic information as to how the various system elements communicate with each other and allow the system to boot- up.
Whilst Figure 2 illustrates one embodiment of a computer of a distributed computing environment of the invention, it will be understood by the skilled person that other peripheral devices may be attached to the computer, such as, for example, microphones, joysticks, game pads, scanners, or the like. In addition, with respect to the network interface 162, we have previously described how this is preferably a wireless LAN network card, although equally it should also be understood that the computer 1 may be provided with a modem attached to either of the serial port interface 164 or the parallel port interface 154, and which is arranged to form logical connections from the computer system 1 to other computers via the public switched telephone network (PSTN).
The preferred embodiment is performed in a network of interconnected computers 1 of the Small World Adaptive Network (SWAN) type of network, as described in detail in European Patent Application No. 02801398.5 (Publication No. 1436957) and modified as described below.
Referring to Figure 3, a SWAN network comprises a set of nodes 200 connected by a communication infrastructure 215 (e.g. the network 190) comprising computers 1 , on which the nodes 200 reside, together with local access networks and the Internet. The skilled person will understand that the computers 1 constitute computing nodes that have processing, storage and communication capabilities, and also constitute nodes within the communications infrastructure 215 via which messages can be sent between the computers 1.
The skilled person will also understand the nodes 200 constitute virtual nodes which belong to a virtual network. The distinction is important because a computing node is able to have two or more virtual nodes (possibly belonging to different virtual networks) associated with it. As its name implies, a virtual node does not exist in any physical sense: rather, as will become clear presently, its existence is established by stored data which define links between virtual nodes and, hence, also define the virtual network to which it belongs.
Thus, a virtual node must be associated with, referred to as being resident on, a computing node, which provides it with processing, storage and communication capabilities: references to the sending, receiving and processing of messages by a virtual node refer to such sending, receiving or processing by the computing node on behalf of the virtual node.
Each node 200 can be thought of as comprising a two-part data record 202 in which one part 202a constitutes its identity (ID) 210 and the other part 202b constitutes an address 205 in the infrastructure in the form of an Internet Protocol (IP) address including a port number and a service ID. The data record 202 of a node 200 constitutes a published UIDp:UIDa pair of the present invention, the identity (ID) 210 constituting a publication unique ID (UIDp, or publication UID), and the address 205 constituting an associated unique ID (UIDa, or in this case, location UID). As will be understood from the examples to be described later, the UIDa is commonly in the form of the network address of a retrievable data item on a computer 1 , but is not restricted to this and can be in any of a number of other forms.
Each node 200, by virtue of the association with its host computer 1 , has access to processing, storage and communication capabilities and is configured to send and receive a set of message types via the infrastructure 215 to any other such node 200 by specifying an address 205 in the infrastructure 215 for the target node. Each computer 1 can have many thousand resident nodes 200. In the context of the present invention, as will be described in detail later, the node identities 210 are fixed length bitstrings (160 bits) produced by applying a hashing algorithm (in this example, the hashing algorithm known as SHA-1 , a known standard) to practical UIDs, for example URLs and postcodes, and are associated with, inter alia, data items hosted by the computers on which those nodes reside and are available for retrieval by other computers of the network. The term data item is used herein in a broad sense rather than a limited sense, and includes software capable of providing a service, and the term retrieval in this case means that the hosted service is made available to users at remote computers of the network. Other associations will be described later.
Figure 4 shows co-ordinate space 250, referred to hereafter as ID space 250, and a plurality of nodes 200 represented by their IDs 210 at locations in ID space 250. Where a node 200 knows the network address 205 of another node 200, this is shown as a link 225, 220a, 220b on Figure 4, where the two nodes can send messages to each other using the infrastructure 215. If the link is one-way only, in that a first node has the address for a second node but the second node does not have the address for the first, this is shown as a link, which is partly dotted. An example is the link between nodes 29 and 39. The ID space 250 is Euclidean in terms of the distance measure used to calculate the distance between any two co-ordinates in the ID space 250 and its edges "wrap" in ID space 250. This can be seen in that the link 220a, 220b from node 43 to node 38 is "continuous" across the disjunction of the bottom and top of the ID space 250.
Thus, each node identity 210, represented by co-ordinates (location) in co-ordinate space 250, is independent of network address and physical location.
Nodes represented in ID space 250 have two characteristics. Firstly, each node 200 maintains a link list containing a few short-range links and a few long-range links, where a link is an alternative term for the network address of another node 200, conveniently but not necessarily in the form of the record 202 of that other node 200. Secondly, there is a predictable relationship (the hashing algorithm) between every node's ID 210 and its coordinates in ID space 250. Figure 5 shows the respective link lists of the nodes having the IDs 24, 26 and 43. The node ID 24 link list contains the network addresses of nodes having IDs 25, 26 and 27; the node ID 26 link list contains the network addresses of nodes having IDs 24 and 29; and the node ID 43 link list contains the network addresses of nodes having IDs 35 and 38.
If a node (the enquiring node) needs to communicate with a node (the target node) for which it has an identity (e.g. supplied by a user in raw UID form, i.e. not hashed) but no address, it uses the hashing algorithm to translate that target node's ID 210 into coordinates in ID space 250 and then performs calculations to find which of the nodes in its list (referred to as the "nearest node") is located in ID space nearest to the target node. These calculations comprise first determining its own distance from the target node in ID space, and then the respective distances for each of the nodes in its list. Assuming that the enquiring node now determines that one of its list of nodes is the nearest node, it initiates the transmission, through the infrastructure to that nearest node, of a "FIND" request which contains the target node's ID 210 (now in its fixed length bitstream hashed form), and the ID and network address of the enquiring node.
When a node (in this case, the "nearest node" of the enquiring node's list and now referred to as the receiving node) receives a FIND request, it retrieves the target node's ID 210 from the FIND request and first checks whether there is a match between its own ID and the target node's ID. If there is no match, it then proceeds to find its respective "nearest node", performing calculations as described above for the enquiring node. Thus, the FIND message is passed onwards in the same manner, always to a receiving node whose ID co-ordinates represent a location in ID space which is nearer to the location of the target node's ID in ID space than that of the forwarding receiving node.
At some point, the propagation of the FIND request will finish at a node (referred to as the final node) which either (1) has an ID matching the target node's ID, or (2) is not able to find in its list a "nearest node". Since the FIND request contains the ID and network address of the enquiring node, that final node can now return to the enquiring node over the infrastructure 215 a "FOUND" message containing its own ID and network address, i.e. its data record part 202b, and the target node's ID. The enquiring node can now determine whether that final node is the desired target node, and if so direct communication can subsequently take place using the routing mechanisms of the infrastructure 215. As a more detailed example of the mechanism by which nodes retrieve network addresses of nodes with which they wish to communicate, reference is now made to nodes 24, 26 and 43 shown in Figure 5. We assume that node 43 requires the network address for node 24, which is a node for which it does not hold any information. Accordingly, node 43 converts "24" to co-ordinates in ID space 250, and identifies which node, of those for which it has information, is closer to the target node 24 in ID space 250. In this example, node 35 is closer to node 24, so node 43 sends a "FIND" message to node 35. Node 35 repeats the process, forwarding the "FIND" message to node 27, which in turn forwards it to node 24. Node 24 recognises itself to be the target node and uses details of the initiating node (node 43) to return a "FOUND" message to node 43. Node 43 can now communicate directly with node 24.
The set of message types includes PUSH and PULL updating messages which are initiated by nodes periodically to improve the identity network. The updating of the SWAN network is not relevant to the present invention and the updating messages will not be described further.
The basic structure of the SWAN network as described so far enables a user (the enquiring user) at a computer 1 to find out whether the network includes a node (the target node) having an ID of interest to that user, and, if so, to obtain a network address relating to that ID and which the user can employ as a destination address for messages. The user might submit that ID, via a search interface, to a SWAN network node resident on his computer 1 , and that node will then perform as the enquiring node described above. In a variant embodiment, the user's computer 1 is arranged to generate a hashed ID and send a FIND message via the infrastructure 215. In this case, the "From" field of the FIND message contains a network address of the computer, instead of containing a node ID.
The SWAN network requires modification to enable the operation of the present invention.
A first modification relates to the existence in the network of a plurality of the nodes 200 having the same common ID, and each of these nodes maintains, actually or effectively, a respective list (referred to as a common ID list and as shown in Figure 6) of the data record parts 202b, usually network addresses, of the nodes of that plurality. Figure 6 shows three nodes having the same common ID, 24 (1 ), 24 (2) and 24 (3); and two of five nodes having the same common ID, 26 (1) and 26 (2). For simplicity, nodes ID 26 (3) to 26 (5) are not shown in Figure 6.
Node ID 24 (1) has a common ID list containing its own network address and the network address of nodes ID 24 (2) and 24 (3); node ID 24 (2) has a common ID list containing its own network address and the network address of nodes ID 24 (1 ) and 24 (3); and node ID 24 (3) has a common ID list containing its own network address and the network address of nodes ID 24 (1 ) and 24 (2). Similarly, node ID 26 (1 ) has a common ID list containing its own network address and the network address of nodes ID 26 (2) to 26 (5); node ID 26 (2) has a common ID list containing its own network address and the network address of nodes ID 26 (1 ) and 26 (3) to 26 (5), and correspondingly for the three nodes ID 26 (3) to 26 (5) not shown.
Thus, in the modified SWAN network a final node whose ID matches the FIND ID can return a FOUND message containing the addresses in its common ID list, and the enquiring node can then send messages to that plurality of nodes. It will be understood that in practice these messages will be sent and received by the computers 1 on which the enquiring node and this plurality of nodes are resident. In one variant embodiment, the final node does not include these addresses in the FOUND message and the enquiring node can retrieve them by a subsequent request. In another variant embodiment, the common ID list of a node does not contain that node's own network address. Thus, to obtain the network addresses of all that plurality of nodes, the enquiring node will need to add the address contained in the From field in the header of the FOUND message to the contents of the received common ID list.
An example of the use of such a modified SWAN network would be where the common ID of a plurality of the nodes 200 is the hash of a URL of a web page, and the common ID list contains the network addresses of corresponding data items containing respective comments (also known as Annotations) relating to that page and being stored on users' computers 1.
Within the modified SWAN network, as nodes are created and deleted the common ID lists are updated by a common ID list updating process 173N. In the example just described, the entries in the common ID lists of those nodes are network addresses which the enquiring node can use to send individual Retrieve messages and obtain the respective comments.
As mentioned, a UID, i.e. either a UIDp or a UIDa, can have any of the forms of the non- exhaustive list given, depending upon the particular situation. In one example, a user called Joe Public might wish other users to find and retrieve his Personal Details document stored on his computer 1. He publishes a data record of which the first part 202a, the UIDp, contains his name "Joe Public" and the second part 202b, the UIDa, contains the network address of that Personal Details document.
In another example, a club having a web site might offer free membership. The web site will have a membership page, and while the user is viewing that page he can invoke the Assert function. An Assert window is now displayed having two boxes, one for the UIDp and the other for the UIDa. In this particular case, because the user invoked the Assert function while the page was being displayed, the URL of that page is automatically entered in the UIDa box, and the cursor is positioned at the start of the UIDp box waiting for data entry by the user.
The user now clicks on a "Change" button in the Assert window to interchange the positions of the URL and cursor, and enters his name "Joe Public" in the UIDa box. Once entry is complete, the Assert function calls the Publish Node function and a node 200 is created for the Published Association "URL:Joe Public". Assuming that there is a plurality of existing nodes 200 having this identity, "URL", then their common ID lists are updated to include this new data record part 202b containing "Joe Public". Other users, wishing to see a list of current members of that club, can perform a Search using that URL for the membership page and retrieve a common ID list containing all the names of the current membership.
Further examples of the use of the present invention, and a description of an example embodiment of a program for performing methods of the present invention will now be given.
In order to participate in the operation of the present invention, a user installs a program 173A, given the name Networker by the inventors, on his computer 1 by downloading it from a website, either by directing his browser to the relevant URL, or by clicking on a hyperlink in an email message from someone who already has installed the Networker program on his computer and wishes to encourage the use of the program by others. In variants, he receives it as an attachment of an email message or on a carrier medium, e.g. a floppy disk or a CDROM.
The Networker program can be thought of as comprising a number of functions. A low level description of these functions will not be described as the skilled person in the art does not need to start from the inventor's software code in order to be able to generate his own embodiment of the invention. Indeed, it is common place that the skilled person has his own stock-in-trade of software modules for performing various software procedures, etc. and will prefer his own software to that of others. So the functions of the Networker program will be described only in a high level description.
The functions of the Networker program are Establish Profile (173B)
Select pre-defined software probe(s) 173C
Set permissions for publishing acts, i.e. allowing other users to access the user's data (Publish 173D) Set permissions for retrieval acts, i.e. allowing other users to retrieve the user's data (Retrieve 173E)
Set permissions for disclosure acts, i.e. set of access controls applied to published records and defining the identities of other users who are permitted to access the user's records (Disclose 173F) Set parameters for search (Search 173G)
Set parameters for automatic scan (Autoscan 173H)
Set parameters for alert, i.e. whether an alert is displayed on the user's computer when a record is accessed by a permitted user (Alert 173J)
Create user-defined general-purpose software probe(s) 173C Create Tree 173K Annotation 173L Assert (manually create and publish data record) 173M
The Networker program comprises a set of data processing computer processes, including, inter alia, a publishing process 173D', a common ID list updating process 173N, a searching process 173G', a retrieval process 173E', a page retrieval process 1730, a call maker process 173P.
Upon installation, the Networker program installs a set of pre-defined software probes 173C on the user's computer 1. Each pre-defined software probe operates in accordance with a respective predefined detection criterion (also referred to as a template 173C-T), e.g. proper names (both people and places), email addresses, postcodes (i.e. particular formats of alphanumeric characters, explained in detail later), Zip codes, telephone numbers, timestamps, GPS coordinates, calendar schemes and uniform resource locators (URLs).
In accordance with the present invention, each such template 173C-T effectively constitutes a respective set of UIDs that the probe searches for amongst events and documents (collectively referred to as data items) within the computing environment. In other words, any character sequence which matches a template is deemed to be a UID. For example a sequence of numbers which is consistent with the UK National Telephone Numbering Plan constitutes a UK telephone UID, and a character sequence which comprises a protocol known by its initial letters, e.g. http, https, ftp, followed by "://" followed by a host name (e.g. www.apa.org, or expressed in "dotted-decimal" form) constitutes a URL UID.
The Establish Profile function of the Networker program generates a graphical user interface (GUI). This has a Profile tab and a Search tab.
The Profile tab enables the user to establish the configuration of his profile. Clicking on the Profile tab opens a ProfilePanel, which provides for the user to select a default configuration from a number of preset configurations which are compatible with common desktop environments and employ categories of information including documents and those managed by a personal information manager such as Outlook, e.g. email messages, calendar entries, contact records, bookmarks; and also provides for the user to input his name, description and email address to be held in a root record of a hierarchical record tree to be constructed by the Networker program, as will be described later.
The ProfilePanel displays a plurality of ProfileGroup Panels with titles including People, Place, Event, Journey, On Offer, File, Search, Note, Bookmarks and Trail. Initially, the ProfileGroup Panels are in closed state, but clicking on an OpenCloseBox of a ProfileGroup panel opens that ProfileGroup to display one or more ProfileGroup Rows. Each ProfileGroup Row contains a PermissionPanel having a Share check box defining whether or not the data items relating to that ProfileGroup Row are to be shared with anyone else, and other check boxes for selecting the extent of sharing from Everyone, Work, Home, and Work Team.
The Search tab enables the user to set criteria for the search area and the user-defined software probes, e.g. the extent of the search area, the data items to be regarded as private, the selection of the pre-defined software probes 173C, and to request the generation of a general-purpose software probe 173C tailored in accordance with user- specified search parameters.
One preset configuration defines: a search ruleset including the pre-defined software probes to be used, the extent of the search area within the computer environment - all stored data (documents, email messages, calendar entries, contact records, bookmarks) and all transient features of the computing environment (web browsing - web page viewing records), and the search type (automatic and continuous monitoring of the computer environment); a publish ruleset 173D establishing a public section and a private section, including bookmarks, browsing and documents (in a variant, there is only a public section and anything not specified by the public section is deemed to be private); a disclosure ruleset 173F specifying the identities of other users who are permitted to access the user's published data items, whether those other users are to be authenticated by a password, and whether an alert is displayed for the user when a data item is accessed by such a permitted user; and a retrieval ruleset 173E for finding published data items on other computers of the network which contain the same UID as a data item found by the search ruleset.
In accordance with its Create Tree function 173K, the Networker program first constructs the basic form of the hierarchical record tree in which the nodes of the tree are formed by data records, as described later. The records forming nodes other than leaf nodes are referred to as container records. Thus, the root node of the tree is constituted by a container record entitled Profile and containing the name, description and email address of the user, which were provided by the user in setting up the profile. This Profile record has three children container records (nodes) at the next level in the tree, namely Documents, Bookmarks and Browsing. The Bookmarks container record contains a Work Bookmarks container record and a Private Bookmarks container record at the next level. The individual records within these lowest level container records are leaf records of the tree.
The Create Tree function associates a respective ruleset with each container record. A ruleset comprises the Publish permissions, Retrieve permissions, and Disclose permissions which have been set by the user under the Establish Profile function.
In the tree, each container record, except for leaf records, is associated with a respective ruleset which defines permissions for publishing acts, retrieval, disclosure acts, and alert.
These rulesets (permissions) are defined by the user via another window of the interface. The user can make such acts dependent upon the context in which the record was created, e.g. the user can permit bookmarks to be published, but not browsing behaviour, and dependent upon the form of the UID, e.g. the user can permit postcodes to be searched but not URLs. In a variant embodiment, leaf records can be assigned a respective ruleset.
The Create Tree function responds to each UID that the Autoscan function 173H finds and generates a respective record containing that UID and information derived from the context in which it was encountered, e.g. file-name and line for data, and time, date and program for behaviour. The hierarchical record tree is then built using the generated records. This tree mirrors the profile, in other words, its root record is entitled Profile and contains the name, description and email address of the user, which are provided by the user in setting up the profile. This root record is a container record having three children container records at the next level in the tree, namely Documents, Bookmarks and Browsing. The bookmark records at the next level under Bookmarks are divided into work bookmarks and private bookmarks, and they are leaf records (they may be alternatively considered as container records without children records).
In this embodiment, a new record will be created and added to the tree as soon as a probe finds a UID in accordance with its search criterion. In variant embodiments, records are not added to the tree one at a time, but in groups or even in a single tree construction operation after all the probes have finished searching. In an alternative embodiment, the user defines public and private sections of each of the categories of data items in his computing environment, and the automatic search area includes all such private sections. The corresponding tree contains both public and private containers as children of a parent container, e.g. a documents container will have children containers - public documents and private documents, and each child container will have its own associated ruleset.
The Assert function 173M of the Networker program is also capable of generating, upon command by the user, an interface, referred to as the Assert window, to enable such records to be created manually. For example, the user might wish to create a record associating a file representing a digital photograph with a postcode or latitude/longitude representing a descriptor of the location where the photograph was taken.
When the Networker program recognises that action is requested in respect of a particular record, e.g. for a newly added bookmark record or for a received retrieval request for a data item, the corresponding leaf record is located in the tree, the associated ruleset is inspected and the Networker program then performs the necessary actions, as required, through invocation of an appropriate one of a set of data processing computer processes.
If that record does not have any associated rule, or an associated ruleset is set to null, then the containing record at the next level is inspected. If that has an associated rule for the requested action (publishing, retrieval, disclosure), then that is the governing rule for the requested action. If there is no ruleset at that level, then the ruleset at the next level is inspected, and so on, depending upon the number of levels in the tree, until the root level is reached. If there is no appropriate rule, then the request is ignored and no action is taken.
Typically, the user will set the root ruleset to top level permissions, i.e. search for all UIDs, publish for all UIDs, and provide a prompt, referred to as Alert, to the user for any request to access data. Unless a ruleset at a lower level provides a more restrictive behaviour, the root ruleset will enable all possible links to be found (both to and from remote users), but all data disclosures are controlled by a prompt which tells the user who is trying to read the data, and gives the user an option to deny the request. In practice, the user is likely to select "prevent publishing" and "prevent access" for the ruleset associated with the Browsing record, but to allow the default behaviour to cascade down to the Bookmarks record, i.e. select a null ruleset for the Bookmarks record.
EXAMPLE SCENARIOS
In an example scenario, suppose that users at computers 1 of the network use a browser to download pages over the Internet. In known manner, for each web page that is viewed by a user, a respective web page viewing record, constituting a data item of the present invention, is stored on his computer 1. This web page viewing record contains in known manner, inter alia, the user's ID, the URL of the page and the start and stop times of viewing. Suppose that the user has, via the ProfilePanel, assigned "Public" status to his web page viewing records.
A "URL" software probe 173C is operative to scan all the data items stored on a user's computer 1 , when the probe scans a web page viewing record it finds the URL, captures both the URL and the address of that web page viewing record on the user's computer 1. This data is passed to the Networker program Create Tree 173K which then constructs a tree record comprising the URL, now constituting a publication UID (UIDp) of the present invention, in association with the address, now constituting an association UID (UIDa) of the present invention, and adds that newly created tree record to the Browsing container of the hierarchical tree.
The Browsing container is associated with a ruleset which includes permission for the record to be published to the network. So, the Networker program will then invoke a publishing process 173D' which will create in the modified SWAN network by the SWAN updating process a new node having the URL (and the network address of that web page viewing record), and the common ID lists will be updated for any existing nodes having that URL as their ID.
Suppose that a group of the users are model railway enthusiasts, each of which has assigned "Public" status for his web page viewing records. Suppose that each of the group has visited a home page relating to model railways and having the URL "ptth:\\www.hornbyrailways.com/pages/home.aspx" (referred to as the Model URL) and has a respective web page viewing record stored on his computer 1. Suppose also that at least some of the group have invoked the Annotation function 173L, which caused a text box to appear on their respective monitors 102, and that the users have entered respective annotations, e.g. "I have for sale a Duchess of Atholl loco in original box" and "You are welcome to come and see the railway layout in my loft", which were then stored in corresponding web page viewing records. Note that, in the examples given, URLs are, for typographical reasons, shown with the "//" replaced by "\\", and http is replaced with ptth.
As each respective web page viewing record is created and stored, the respective URL software probes on those users' computers 1 are operative, as described above, resulting in the creation of respective new tree records. In accordance with the Networker program, as each new tree record is processed, the publishing process is invoked and a corresponding node is added to the network. The update mechanism of the network finds all existing nodes having that URL as node ID 210 and adds the respective associated network address to the respective common ID lists. Thus, each member of the group has resident on his computer 1 a respective node having the Model URL as its ID and whose common ID list contains the network addresses of the web page viewing records of the other members of the group. Each member can invoke the Retrieve function 173E' to send respective Retrieve messages to the other members, i.e. using the common ID list of the respective node stored on his computer 1 , and retrieve data from their web page viewing records. This data includes the identity of the user, and any respective annotation(s) that he has entered in the corresponding web page viewing record.
In the simplest form of this embodiment of the invention, a user who is not yet a member of the group can join the group by visiting the web page, and the publishing process (also called a Publish Node function) 173D1 in combination with the network update mechanism 173N will add his newly created node in respect of the new web page viewing record (i.e. Associated Pair in the form "Model URL:NA") to the network, and update accordingly the common ID lists of any existing nodes having the same ID. It will be appreciated that the common ID list of the newly created node will now contain the network addresses of all other existing nodes having that ID. The network update mechanism 173N is either the SWAN network normal automatic update or is a forced update invoked by the publishing process. It will be appreciated that the present invention is not reliant on any particular network update mechanism and that such network update mechanisms are known to the skilled person. Accordingly, no further details of this will be given.
Alternatively, that user can enter the Model URL in the Search function 173G' to find such an existing node. The Search function will cause a FIND request for the Model URL to be sent into the network. Upon receipt of a FOUND message, the Publish Node function will create a new node in respect of that user-supplied Model URL in association with the network address of a Public status Contact document, constituting a data item of the present invention, previously created by that user and containing, e.g. his name, address, email address, telephone numbers, and any other information that the user is willing for others to know. This Contact document is also referred to as a Personal Details document.
The Alert function 173J is responsive to network updates, and upon the occurrence of a common ID list update of a node resident on his computer, generates the display of an icon on the monitor 102. The Alert function includes the capability for the user to associate a selected icon with a particular node ID. In the case of the group of model railway enthusiasts, an existing member of the group can provide the Model URL to the Alert function and select, or design, an icon in the shape of, say, a railway engine. Thus, when another user becomes a new member of the group either by visiting that web page or by using the Search function as described in the preceding paragraph, the ensuing automatic creation of a new node on that user's computer 1 and the update of the common ID lists (which add that user as a new member of the group) will result in the display of the engine icon on that existing member's monitor 102. The existing member can click on the icon, which triggers the Alert function to retrieve the newly added network address from the corresponding common ID list and provide it to the Retrieve function (also known as a retrieve process) 173E', which sends a message to the newly added member's computer 1 to retrieve data from the data item corresponding to the network address, either the web page viewing record if he visited the web page, or a Contact document as mentioned above.
In another example scenario, suppose that the modified SWAN network is a company intranet and that users at computers 1 of the network are Contract Managers who have stored respective documents, constituting data items of the present invention, relating to contracts with suppliers A and B for supply of a product X. The Contract Managers will have created for each document a respective Comments Annex including information relating to the supplier or the product, which might be of value to other Contract Managers. The reader will appreciate that the following example can be extrapolated with respect to the number of suppliers and the number of products.
Suppose also that each of these Contract Managers has downloaded or otherwise obtained a Networker program, as mentioned above, and that each has created respective user-defined software probes for the suppliers' names "A" and "B" on his respective computer 1. Upon closing such a document, the software probes are triggered and the document is examined for the presence of any such unique identifier. Suppose that a Contract Manager has created and stored on his computer 1 documents D1 to D4 and that, of these, documents D1 and D2 are found to contain A, and documents D3 and D4 are found to contain B. The Publish Node function will now be triggered to update automatically the modified SWAN network by adding nodes corresponding to the Published Associations - A:NA(D1 ); A:NA(D2); B:NA(D3) and B:NA(D4).
The existence of the contracts and the knowledge from the Comments Annexes would be valuable information for the Contract Managers. Thus, once a Contract Manager has created such a document containing A, the Publish Node function in combination with the network update mechanism will ensure that the corresponding node on his computer 1 has an up-to-date common ID list. The Contract Manager can retrieve all such published documents using the network addresses of the common ID list of a published node on his computer 1. The Contract Manager uses the Search function 173G' to find these documents by entering the unique ID "A" in the Search function to find any existing nodes having a corresponding node ID. The Search function starts by checking nodes on the Contract Manager's own computer 1. This avoids unnecessary transmission of messages into the network. The node having the ID "A" on that computer will recognise that it is a target node and respond with its common ID list. If that Contract Manager had been searching for documents containing A, but had not yet created any such document on his own computer, then a FIND request for the unique ID "A" would be sent into the network, as described above, resulting in the discovery of a node having the ID "A", and subsequent receipt of its common ID list.
If it was desired to retrieve documents on the basis of the product X, then a probe 173C for X would be provided for the Autoscan function, and corresponding nodes would be created for each document containing the unique identifier "X". If the supplier A is associated with other products Y, Z, and/or other suppliers are associated with the product X, then the results of searching for A and searching for X can be combined with a simple comparison program to determine those network addresses which occur in both results and these would be in respect of documents in which both A and X occur.
The concept of a group of interest has been described in terms of the Model URL which is common to that group. In the present invention, this Model URL is one example of a unique identifier. As mentioned, another example of a unique identifier is a postcode, and this can be used in a number of ways in accordance with the present invention.
In one embodiment, the "postcode" predefined software probe is arranged to recognise postcodes in accordance with any one of the following four character sequence templates: alpha, numeric, space, numeric, alpha, alpha; alpha, numeric, numeric, space, numeric, alpha, alpha; alpha, alpha, numeric, space, numeric, alpha, alpha; alpha, alpha, numeric, alpha, space, numeric, alpha, alpha. In each of these templates, the alpha characters must be upper case.
Suppose that a first user wishes to publish information about a forthcoming jumble sale at a venue having the postcode GH7 8IJ, and creates a document containing the necessary details for the jumble sale and having "Public" status. The Autoscan function 173H recognises the postcode GH7 8IJ, and invokes the Publish Node function in respect of the Published Associations - GH7 8IJ:NA, GH7 8:NA; GH7:NA and GH:NA, where NA is the network address of the document. In postcode terminology, these represent the postcode, sector, district and area related to that postcode. A second user can perform a Search to find out what published information there is in respect of a given postcode, i.e. provide "GH7 8IJ" to his Search function. This will retrieve the published node "GH7 8IJ:NA", and, via its common ID list, all other published documents for that postcode. The second user can similarly perform sector, district and area searches using GH7 8, GH7 and GH, respectively.
In another example of the use of postcodes as unique identifiers, the first user wishes to disseminate a postcode for, say, a facility that has a related web page. The first user has used that facility and wishes to draw the attention of other people in his sector to that facility. He visits that web page, thus creating a web page viewing record, and while the page is displayed invokes the Assert function. An Assert window is now displayed having two boxes, one for the UIDp and the other for the UIDa. In this particular case, because the user invoked the Assert function while the page was being displayed, the URL of that page is automatically entered in the UIDa box, and the cursor is positioned at the start of the UIDp box waiting for data entry by the user.
Suppose that the user wants to associate that web page with the postcode sector "GH7 8". He types this postcode sector into the UIDp box. Once entry is complete, the Assert function calls the Publish Node function and a node 200 is created for the Published Association "GH7 8:URL". If one or more existing nodes 200 have this identity, "GH7 8", then their common ID lists are updated as described above, else a new node 200 is created.
Other users can search using "GH7 8" to find out what nodes have been created by users for information relating to that sector. Such a search will find a node having the identity "GH7 8" and retrieve its common ID list. This list can contain, for example, network addresses of data items that are retrievable from other computers 1 , URLs that can be used directly by a browser, email addresses that can be used directly by an email handler, telephone numbers that can be used directly by a telephone dialler application, place names and GPS (global positioning system) coordinates that can be used directly by a map application, and calendar entries that can be used directly by a calendar application.
In a variant embodiment, when the Networker program receives a FOUND message (constituting a return message of the present invention) containing a common ID list, i.e. one or more data record second parts 202b, it immediately sends Retrieval messages to the network addresses in the list, but for each entry in the list which it recognises as not being a network address, it sends a respective FIND message. In one alternative, the
Networker program displays a request window to the user asking if the retrieved UIDa is to be applied to an appropriate application on the computer, e.g. a URL applied to the browser. If the user selects No, then the Networker program proceeds to send a FIND message for that UIDa.
A retrieved UIDa can be the network address of a networked service, for example a chat room service, hosted on a remote computer of the network. In such a case, if the user sends a Retrieve message to that network address, this will invoke a data processing computer process 173Q for controlling the launch of that service, subject to any proviso in the corresponding set of rules relating to that service. Another of the data processing computer processes 173R controls the launch configuration of such a networked service, subject to any proviso in the corresponding set of rules relating to that service.
A user specifies which of a set of possible networked services are to be hosted on his computer, and which of the hosted services are to be made available to users at other computers, i.e. assigned "Public" status, by means of the set of rules. A rule can specify one or more particular services, or specify a group of services by a generic definition.
As described, some of the data processing computer processes are invoked automatically dependent upon the appropriate rulesets, and in this respect the term "user" and. equivalent concepts, embrace both a computer per se (i.e. a non-human user) and a human user operating his computer and manually invoking data processing computer processes.

Claims

CLAIMS CLAIMS
1. In a network of interconnected computers, a method of data handling, the method comprising, at a first computer of the network, creating a plurality of data processing computer processes, and being characterised by: registering a plurality of computer-readable templates, each template defining a respective format of character sequences matching that template, each different matching character sequence constituting a respective unique identifier, UID; defining a set of computer-readable rules for determining, in respect of any particular category of data item, whether or not any of the computer processes is to be executed and, for any such computer process so determined to be executed, specifying any conditions for that execution; and for each template so registered at the first computer, automatically searching the content of computer-readable data items held within the computing environment of the first computer to find matching character sequences therein; and for each data item found to contain a matching character sequence, applying the rules to the data item, and executing, in accordance with any specified conditions, any computer process so determined by the rules to be executed.
2. A method as claimed in claim 1 , wherein the rules determine whether a data item so found is permitted to be addressed by another computer of the network using the unique network address for that data item, referred to as a location UID, and, if so, that a publishing process is to be executed for each different matching character sequence contained within that data item, each such different matching character sequence now being referred to as a publication UID; the publishing process comprising the steps: for each such publication UID, forming a respective UID pair by associating that publication UID with an associated UID, in this case the location UID for that data item; and publishing to the network that respective UID pair, publication UID:associated UID, so formed.
3. A method as claimed in claim 2, wherein a data item so permitted to be addressed is a networked service hosted by the first computer; wherein a computer process to be executed is a launch process for that networked service; and wherein the rules determine whether the .launch process is to be executed upon receipt from another computer of the network of a message containing the location UID of that networked service.
4. A method as claimed in claim 2, wherein a data item so permitted to be addressed is a networked service hosted by the first computer; wherein a computer process to be executed is a launch configuration control process for that networked service; and wherein the rules determine whether the launch configuration control process is to be executed upon receipt from another computer of the network of a message containing the location UID of that networked service.
5. A method as claimed in claim 2, wherein a computer process to be executed is an updating process, and for each of a plurality of publication UIDs the first computer stores a respective list of associated UIDs, and including the step of responding to receipt from another computer of the network of a publication message in respect of a UID pair by adding the associated UID of that UID pair to the respective list of, associated UIDs of the publication UID which matches the publication UID of that UID pair.
6. A method as claimed in any one of claims 2 to 5, wherein the rules determine whether an alert signal is to be provided to a user of the first computer in response to receipt of a message containing a location UID and requesting execution of a said computer process.
7. . A method as claimed in claim 6, wherein the rules also determine, in the event that an alert signal is to be provided to the user, whether user permission is required before executing any computer process so requested to be executed.
8. A method as claimed in either claim 6 or 7, when claim 6 is dependent upon claim 5, wherein the rules require that the alert signal shall be provided to the user upon receipt of a publication message.
9. A method as claimed in claim 8, wherein a computer process to be executed is a retrieval process comprising the step of sending from the first computer to the network a retrieval request in respect of an applied location UID, and including the step of responding to receipt from the user of a retrieve signal in response to the alert signal by applying the added associated UID to the retrieval process.
10. A method as claimed in claim 1 , wherein a computer process to be executed is a searching process comprising the steps: receiving an applied unique identifier, referred to as an applied UID; sending from the first computer to the network a search request in respect of the applied UID to find any published pairs of the form publication U I Dissociated UID, whose publication UID matches the UID of the search request; and obtaining the associated UID of any published pair so found: and wherein the method further comprises, for a matching character sequence found in a data item, applying that matching character sequence to the searching process.
11. A method as claimed in claim 10, wherein a computer process to be executed is a retrieval process comprising the step of sending from the first computer to the network a retrieval request in respect of an applied location UID; and wherein the rules determine whether the obtained associated UID is indicative of the location of a data item, and, if so, require the obtained associated UID to be applied to the retrieval process.
12. A method as claimed in claim 11 , wherein, if the result of the determining step is negative, the rules require the searching process to be executed in respect of the obtained associated UID.
13. A method as claimed in claim 11 , wherein the retrieval process is a page retrieval process for applying a uniform resource locator, URL, to a browser of the first computer for obtaining a web page corresponding to that URL; and wherein the rules determine whether the obtained associated UID is a URL, and, if so, require that URL to be applied to the page retrieval process.
14. A method as claimed in any one of claims 10 to 13, wherein one of the plurality of data processing computer processes is a publishing process and comprises the steps: receiving from a user of the first computer a first input character sequence; creating an associated pair of the form A:B, where the first input character sequence is one of A and B, the other of A and B being a UID; and publishing to the network that associated pair, so created.
15. A method as claimed in claim 14, including receiving from the user a second input character sequence; and wherein the second input character sequence constitutes the other of A and B.
16. A computer for use in a network of interconnected computers, the computer comprising means adapted to define a plurality of data processing computer processes
(173D1, 173G1, 173E, 173P, 173M), and being characterised by: means adapted to register a plurality of computer-readable templates (173C, 173C), each template defining a respective format of character sequences matching that template, each different matching character sequence constituting a respective unique identifier, UID; means adapted to define a set of computer-readable rules (173D, 173E, 173F) for determining, in respect of any particular category of data item, whether or not any of the computer processes is to be executed and, for any such computer process so determined to be executed, specifying any conditions for that execution; means adapted to search automatically (173H), for each template so registered at the computer, the content of computer-readable data items held within the computing environment of the computer to find matching character sequences therein; means (173A) adapted to apply the rules to a data item found to contain a matching character sequence, and means (173A) adapted to execute, in accordance with any specified conditions, any computer process so determined by the rules to be executed.
17. A computer as claimed in claim 16, wherein one of the plurality of data processing computer processes so defined is a publishing process constituted by means
(173D') adapted to form a respective UID pair by associating a matching character sequence, referred to as a publication UID, with an associated UID, in this case the unique network address for that data item, referred to as its location UID, and to publish to the network that respective UID pair, publication U I Dissociated UID, so formed.
18. A computer as claimed in claim 17, wherein a said data item is a networked service hosted by the computer, one of the plurality of data processing computer processes is a launch process for that networked service, and the computer further comprises means (173Q) adapted to respond to receipt, in use, from another computer of the network of a request containing a location UID of the said data item to execute the launch process for that networked service.
19. A computer as claimed in claim 17, wherein a said data item is a networked service hosted by the computer, one of the plurality of data processing computer processes is a launch configuration control process for that networked service, and the computer further comprises means (173R) adapted to respond to receipt, in use, from another computer of the network of a request containing a location UID of the said data item to execute that launch configuration control process for that networked service.
20. A computer as claimed in claim 16, wherein one of the plurality of data processing computer processes so defined is an updating process, and the computer further comprises: means (173N) adapted to store for each of a plurality of publication UIDs a respective list of associated UIDs; and means (173N) adapted to respond to receipt, in use, from another computer of the network of a publication message in respect of a UID pair by adding the associated UID of that UID pair to the respective list of associated UIDs of the publication UID which matches the publication UlD of that UID pair.
21. A computer as claimed in claims 17 to 20, and further comprising means (173M) adapted to respond to receipt, in use, from another computer of the network of a message containing a location UID and requesting execution of a said computer process to provide an alert signal to a user of the computer.
22. A computer as claimed in claim 21 , wherein the means (173M) adapted to provide an alert signal is also adapted to respond to receipt from the user of a permission signal in response to the alert signal to enable the means (173A) adapted to execute to execute the requested computer process.
23. A computer as claimed in either claim 21 or 22, when claim 21 is dependent upon claim 20, wherein the means (173M) adapted to provide an alert signal is responsive to receipt of a publication message to provide the alert signal.
24. A computer as claimed in claim 23, wherein one of the plurality of data processing computer processes so defined is a retrieval process constituted by means (173E') adapted to send, in use, from the computer to the network a retrieval request in respect of an applied location UID, and wherein the means (173M) adapted to provide an alert signal is responsive to receipt from the user of a retrieve signal in response to the alert signal by applying the added associated UID to the retrieval process.
25. A computer as claimed in claim 16, wherein one of the plurality of data processing computer processes so defined is a searching process constituted by means (173G') adapted to receive an applied unique identifier, referred to as an applied UID, and to send, in use, from the computer to the network a search request in respect of the applied; and means (173G') adapted to receive, in use, from another computer of the network such a search request, to find within its computing environment any published pairs of the form publication UIDiassociated UID, whose publication UID matches the UID of the search request, and to send a return message containing the associated UID of any published pair so found; and wherein the means (173H) adapted to search is arranged to apply to the searching process a matching character sequence found in a data item.
26. A computer as claimed in claim 25, wherein one of the plurality of data processing computer processes so defined is a retrieval process constituted by means (173E1) adapted to send, in use, from the computer to the network a retrieval request in respect of an applied location UID, and also adapted to determine whether an associated UID contained in a received return message is indicative of the location of a data item, and, if so, to apply such a received associated UID to the retrieval process.
27. A computer as claimed in claim 26, wherein the means (173E1) adapted to send is also adapted to apply such a received associated UID to the retrieval process in the event that the associated UID is determined not to be indicative of the location of a data item.
28. A computer as claimed in claim 27, wherein the retrieval process is a page retrieval process for applying a uniform resource locator, URL, to a browser of the computer, for obtaining a web page corresponding to that URL; and wherein the means (173E') adapted to send is also adapted to determine whether the received associated UID is a URL, and, if so, to apply such a received associated UID to the page retrieval process.
29. A computer as claimed in any one of claims 25 to 28, wherein one of the plurality of data processing computer processes so defined is a publishing process constituted by means (173M) adapted to receive from a user of the computer a first input character sequence, to create an associated pair of the form A:B, where the first input character sequence is one of A and B, the other of A and B being a UID, and to publish to the network that associated pair, so created.
30. A computer as claimed in claim 29, wherein the means (173M) of the publishing process is further adapted to received from the user a second input character sequence and to create the associated pair such that the second input character sequence constitutes the other of A and B.
PCT/GB2006/001080 2005-03-23 2006-03-23 Automatic intranet service publishing and service access WO2006100499A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN200680015903.0A CN101171583B (en) 2005-03-23 2006-03-23 Automatic intranet service publishes and service access
JP2008502481A JP4847517B2 (en) 2005-03-23 2006-03-23 Automatic intranet service disclosure and service access
US11/886,845 US8131690B2 (en) 2005-03-23 2006-03-23 Publishing and retrieval of data items amongst a networked community of computer users
EP06710142.8A EP1861798B1 (en) 2005-03-23 2006-03-23 Automatic intranet service publishing and service access

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP05251790.1 2005-03-23
EP05251790 2005-03-23

Publications (1)

Publication Number Publication Date
WO2006100499A1 true WO2006100499A1 (en) 2006-09-28

Family

ID=35149570

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2006/001080 WO2006100499A1 (en) 2005-03-23 2006-03-23 Automatic intranet service publishing and service access

Country Status (5)

Country Link
US (1) US8131690B2 (en)
EP (1) EP1861798B1 (en)
JP (1) JP4847517B2 (en)
CN (1) CN101171583B (en)
WO (1) WO2006100499A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4636058B2 (en) * 2007-08-08 2011-02-23 コニカミノルタビジネステクノロジーズ株式会社 CONFERENCE SYSTEM, DATA PROCESSING DEVICE, DATA OUTPUT METHOD, AND DATA OUTPUT PROGRAM
US8219540B2 (en) * 2009-02-26 2012-07-10 Raytheon Company Information viewing stem
US9077623B2 (en) * 2010-12-13 2015-07-07 Microsoft Technology Licensing, Llc Network management system supporting customizable groups
KR20140098606A (en) * 2013-01-31 2014-08-08 한국전자통신연구원 Node discovery system and method using publish-subscribe communication middleware
US11205147B1 (en) * 2018-03-01 2021-12-21 Wells Fargo Bank, N.A. Systems and methods for vendor intelligence
US10827009B2 (en) * 2018-10-30 2020-11-03 Mastercard International Incorporated Systems and methods for use in geolocation resolution of computer network nodes

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003034669A1 (en) * 2001-10-17 2003-04-24 British Telecommunications Public Limited Company Network location management system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796951A (en) * 1995-12-22 1998-08-18 Intel Corporation System for displaying information relating to a computer network including association devices with tasks performable on those devices
US6721795B1 (en) * 1999-04-26 2004-04-13 America Online, Inc. Data transfer server
US7143076B2 (en) * 2000-12-12 2006-11-28 Sap Aktiengesellschaft Method and apparatus for transforming data
US7624422B2 (en) * 2003-02-14 2009-11-24 Preventsys, Inc. System and method for security information normalization

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003034669A1 (en) * 2001-10-17 2003-04-24 British Telecommunications Public Limited Company Network location management system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
KINDBERG T ET AL: "Sharing objects over the Internet: the Mushroom approach", GLOBAL TELECOMMUNICATIONS CONFERENCE, 1996. GLOBECOM '96. 'COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY LONDON, UK 18-22 NOV. 1996, NEW YORK, NY, USA,IEEE, US, 18 November 1996 (1996-11-18), pages 67 - 71, XP010220175, ISBN: 0-7803-3336-5 *
N.A.: "inetd - Internet service daemon", 13 September 2000, SOLARIS MAN PAGES, XP002353275 *
N.A.: "inetd.conf - Internet servers database", 13 September 2000, SOLARIS MAN PAGES, XP002353274 *
NAZARIO J: "Using xinetd Linux", N.A., 1 March 2001 (2001-03-01), XP002206777 *
YONEKI E ET AL: "Distributed multicast grouping for publish/subscribe over mobile ad hoc networks", WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2005 IEEE NEW ORLEANS, LA, USA 13-17 MARCH 2005, PISCATAWAY, NJ, USA,IEEE, 13 March 2005 (2005-03-13), pages 2293 - 2299, XP010791535, ISBN: 0-7803-8966-2 *

Also Published As

Publication number Publication date
EP1861798B1 (en) 2017-08-16
EP1861798A1 (en) 2007-12-05
US20090030881A1 (en) 2009-01-29
US8131690B2 (en) 2012-03-06
CN101171583B (en) 2016-08-03
JP2008537214A (en) 2008-09-11
JP4847517B2 (en) 2011-12-28
CN101171583A (en) 2008-04-30

Similar Documents

Publication Publication Date Title
US7548922B2 (en) Customized and consolidated bookmarks
RU2367997C2 (en) Improved systems and methods of document ranging based on structurally interrelated information
US8700573B2 (en) File storage service system, file management device, file management method, ID denotative NAS server and file reading method
US6944651B2 (en) Single click synchronization of data from a public information store to a private information store
JP4902671B2 (en) Strategies for sending content to target devices
US7779073B2 (en) Computer network
CA2457511C (en) Method, apparatus, and user interface for managing electronic mail and alert messages
JP5121194B2 (en) Organization information retrieval system and organization information retrieval program
KR20040081058A (en) System and method for social interaction
CN101568919A (en) Single view of data in a networked computer system with distributed storage
EP1861798B1 (en) Automatic intranet service publishing and service access
JP2008158695A (en) Information processing system and program for providing online service
JP4603140B2 (en) A WWW server having a personal bookmark automatic creation function, and a method of creating a personal bookmark by the WWW server and sending it to a user's computer
JP2006313484A (en) Document management system, document management method, information processor, program and storage medium
JP2006236165A (en) Word-of-mouth information sharing device
JP2010224700A (en) System and method for managing web site
US20050203893A1 (en) Program for accessing information records
JP2005122606A (en) Information-reading device, information-reading system and information reading program
JP3935388B2 (en) Related information providing method, related information providing apparatus, program, and recording medium
JPH11112552A (en) Method and system for assisting generation and activity of electronic community supporting and storage medium storing assisting program for generation and activity of electronic community
JP2001188760A (en) Device and method for processing information and recording medium
JP2003333067A (en) Information processing system, information processing device and processing method, program and storage medium
JP2008129872A (en) Conference system server and conference method
JP2003030028A (en) File management program, storage medium in which file management program is stored and file managing method
JP6732506B2 (en) System, client device, server device, information processing method and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 11886845

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2006710142

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2006710142

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008502481

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Ref document number: RU

WWE Wipo information: entry into national phase

Ref document number: 200680015903.0

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2006710142

Country of ref document: EP