US20040267746A1 - User interface for controlling access to computer objects - Google Patents

User interface for controlling access to computer objects Download PDF

Info

Publication number
US20040267746A1
US20040267746A1 US10/609,104 US60910403A US2004267746A1 US 20040267746 A1 US20040267746 A1 US 20040267746A1 US 60910403 A US60910403 A US 60910403A US 2004267746 A1 US2004267746 A1 US 2004267746A1
Authority
US
United States
Prior art keywords
computer
access
user interface
access control
objects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/609,104
Inventor
Cezary Marcjan
Andrzej Turski
Lili Cheng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/609,104 priority Critical patent/US20040267746A1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHENG, LILI, MARCJAN, CEZARY, TURSKI, ANDRZEJ
Priority to TW093117345A priority patent/TWI352904B/en
Priority to JP2006517541A priority patent/JP4795945B2/en
Priority to PCT/US2004/019987 priority patent/WO2005003895A2/en
Priority to KR1020057024962A priority patent/KR101137179B1/en
Priority to CN200480017799XA priority patent/CN1813233B/en
Priority to EP04755860A priority patent/EP1636686A4/en
Publication of US20040267746A1 publication Critical patent/US20040267746A1/en
Priority to US11/188,555 priority patent/US7636890B2/en
Priority to JP2011085836A priority patent/JP2011150725A/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units

Definitions

  • the present invention relates to user interfaces for accessing and controlling access to computer objects and, in particular, to a user interface for accessing or controlling access to computer objects in computer spaces relating to computer locations and computer users.
  • Computer objects e.g., files
  • Computer messages are sent between computers.
  • Computer users give each other access to or “share” different sets of computer files or different computer file directories.
  • the sharing of computer objects between users as a “share” is distinct from the saving of computer objects to computer (e.g. network) locations.
  • This distinction relates to the traditional view that computer storage occurs at locations (e.g., drives, folders, etc.), while the sharing of computer objects relates to the security or accessibility of the object at that location.
  • the user interfaces for saving computer objects to computer locations are distinct from the user interfaces for setting the sharing of the objects.
  • An aspect of the present invention is an appreciation that access to a computer object according to its computer location is analogous to who is accessing the object.
  • the common aspect is accessibility to the object.
  • the present invention provides a computer object access control graphical user interface for setting computer locations where a computer object may be accessed and users who may access the computer object.
  • the computer object may be a computer file, a computer message, person contact information, etc.
  • the access control user interface may operate, for example, to save a computer object to one or more computer locations, and also to specify sharing of the computer object with one or more other users so that they can access the object. Saving a computer object and setting the sharing of it are together referred to as controlling access to the object, the former referring to where the object may be accessed from and the latter referring to who may access the object.
  • the user interface includes a name field indicating a name for the computer object and multiple access control fields that are rendered together and indicate multiple selectable computer spaces for the computer object. At least one of the computer spaces corresponds to a computer location, and at least one of the computer spaces corresponds to access to the computer object for one or more computer users.
  • the present invention provides, therefore, a unified interface for selecting and displaying destinations that can be either a file store or a person, thereby unifying the control of access to a computer object.
  • the multiple computer spaces are listed in a ranked sequence, which can be based upon recency of user interaction with the computer spaces (i.e., locations or users) or according to associations to the computer object determined automatically from user computer interactions.
  • Users can be represented by an email address, an instant messaging name, a full name, or any other person identifiers, and specific transports to the users can also be identified or specified.
  • FIG. 1 is a an illustration of a computer object access control graphical user interface for setting computer locations where a computer object may be accessed and users who may access the computer object.
  • FIG. 2 is a an illustration of another computer object access control graphical user interface for setting computer locations where a computer object may be accessed and users who may access the computer object.
  • FIG. 3 is a an illustration of a computer object access control graphical user interface for accessing a computer object computer from a location on a computer or received via computer communication.
  • FIG. 4 is a flow diagram of a computer-implemented computer object access control graphical user interface method.
  • FIG. 5 is a functional block diagram of an automatic context association system that automatically determines context associations between user computer activities, computer objects (e.g., files, contacts, etc.), and other events.
  • computer objects e.g., files, contacts, etc.
  • FIG. 6 is a detailed block diagram of one implementation of data collection system.
  • FIG. 1 is a an illustration of a computer object access control graphical user interface 100 for setting computer locations where a computer object may be accessed and users who may access the computer object.
  • the computer object may be a computer file, a computer message, person contact information, etc.
  • Access control user interface 100 may operate, for example, to save a computer object to one or more computer locations, and also to specify sharing of the computer object with one or more other users so that they can access the object. Saving a computer object and setting the sharing of it are together referred to as controlling access to the object, the former referring to where the object may be accessed from and the latter referring to who may access the object. Access control user interface 100 may be generated from within any application or by a computer operating system whenever the access controlling user wishes to save the object to a specified location of share access with a specified other person.
  • Access control user interface 100 includes a name field 102 in which a name for the computer object can be entered, either automatically by a computer or manually by the user.
  • An author field 104 specifies who created the computer object (e.g., a computer file, a computer message, person contact information, etc.) for which access is being set with user interface 100 .
  • An optional comment field 106 allows the user who is controlling access to the object (referred to as the access-controlling user) to enter and store a comment about the object, and an optional “more” link 108 gives the user access to optional additional fields for entering other properties relating to the object.
  • the additional fields at “more” link 108 may include any or all of a creation date field indicating when the object was created, a modified field indicating when the object was last modified, any keywords, category names, etc.
  • An access control field 110 includes a listing or display of multiple computer spaces 112 A- 112 F (referred to generally as computer spaces 112 ) that have or can be selected to have access to the computer object.
  • Computer spaces 112 may refer to different portions of a computer network (e.g., public and private portions or “folders”), different computers, different computer access rights of different computer users, different computer users, etc.
  • User interface 100 provides, therefore, a unified control over access to the computer object at computer spaces corresponding to computer users and computer locations.
  • Computer spaces 112 A, 112 B, and 112 F reference computers or other locations on a computer network where access to the object may be provided.
  • Computer space 112 A indicates the controlling user's local or desktop computer
  • computer space 112 B indicates the controlling user's portable or laptop computer
  • computer space 112 F indicates a location on a local or global computer network. It will be appreciated that these particular computer spaces 112 A, 112 B, and 112 F are merely examples.
  • Computer spaces 112 C- 112 E reference computer users to whom access to the object may be granted.
  • Computer space 112 C indicates an individual (e.g., Coworker 1 ) to whom the object is provided by email.
  • Computer space 112 D indicates a group of users (e.g., “Work Group”) to whom the object may be provided, either by computer communication such as email or at a shared computer location.
  • Computer space 112 D indicates a group of instant messaging users or “buddies” who could be given access.
  • the users of computer spaces 112 C- 112 E can each be represented by an email address, an instant messaging name, a full name, or any other person identifiers, and specific transports to the users can also be identified or specified.
  • a scroll bar 113 allows the access controlling user to scroll to other selectable computer spaces.
  • Access control indicators 114 A- 114 F indicate whether each corresponding computer space 112 A- 112 F has been selected to have access to the computer object. For example, access control indicators 114 A- 114 C indicate that respective computer spaces 112 A- 112 C have access to the computer object, and access control indicators 114 D- 114 F indicate that respective computer spaces 112 D- 112 F do not have access to the computer object.
  • the access-controlling user provides access to any of computer spaces by graphical activation of the corresponding one of access control indicators 114 A- 114 F. It will be appreciated that access control indicators 114 A- 114 F may be implemented in any of a wide variety of graphical control formats.
  • User interface also includes controls 116 A and 116 B with which the access controlling user can accept or cancel access control changes, and optionally may include a summary region 118 listing a summary of information from various fields in the user interface.
  • the listing of computer spaces 112 in access control field 110 is ordered as a ranked listing of possible destinations for the computer object.
  • the ranked listing may be based upon the computer spaces that the access-controlling user has most recently accessed or interacted with.
  • the ranked listing may be based on the extent or strengths of associations to the object, such as associations to computer locations commonly used by the user, or people the user commonly works or communicates with, or user computer interactions that are identified automatically. Such associations and their relative strengths could be determined automatically, as described below in greater detail.
  • FIG. 2 is a an illustration of another computer object access control graphical user interface 130 for setting computer locations where a computer object may be accessed and users who may access the computer object.
  • Access control user interface 130 includes a name field 132 in which a name for the computer object can be entered, either automatically by a computer or manually by the user.
  • An author field 134 specifies who created the computer object (e.g., a computer file, a computer message, person contact information, etc.) for which access is being set with user interface 130 .
  • An optional comment field 136 allows the access-controlling user to enter and store a comment about the object, and an optional “more” link 308 gives the access-controlling user optional additional fields for entering other properties relating to the object.
  • An object type field 139 provides a type indication (e.g., graphical) for the computer object, specifying for example that the object is a word processor document, a picture, a spreadsheet, an audio or video file, etc.
  • An access control field 140 includes a listing of multiple computer spaces 142 A, 142 B (referred to generally as computer spaces 142 ) that have or can be selected to have access to the computer object.
  • Computer spaces 142 are like computer spaces 112 (FIG. 1) and may refer to different portions of a computer network (e.g., public and private portions or “folders”), different computers, different computer access rights of different computer users, different computer users, etc.
  • Access control indicators 144 A, 144 B are analogous to access control indicators 114 and indicate whether each corresponding computer space 142 A, 142 B has been selected to have access to the computer object.
  • Access control graphical user interface 130 further includes a category field 146 that includes a flat listing of categories 148 A- 148 C in which the computer object is or may be selected to be included according to category control indicators 149 A- 149 C.
  • categories 148 A- 148 C of category field 146 correspond to directories or folders of a hierarchical file structure of the type commonly used in the art.
  • the hierarchical file structure is commonly rendered as successively indented file structure levels for successively nested levels of folders or directories.
  • folders and directories are listed by their names as categories in a single level (i.e., flat) arrangement. This flat arrangement allows multiple folder or directories to be listed efficiently without requiring the display area to render the hierarchical file structure.
  • categories 148 may also or alternatively correspond to keywords for organizing objects. Categories 148 may be ranked or ordered according to the recency with which they have been used or accessed by the user.
  • FIG. 3 is a an illustration of a computer object access control graphical user interface 150 for accessing a computer object computer from a location on a computer or received via computer communication.
  • Access control user interface 150 includes a query field 152 in which a query can be entered to retrieve one or more computer objects.
  • Query field 152 may be configured to receive a general database-type query (as illustrated) or may be a graphical user interface to a hierarchical tree structure as is known in the art.
  • query field may receive or accommodate a chunk expression language format, for example.
  • a chunk expression language format is a pseudo-natural language (e.g., English-like) that can be easily parsed by a computer into a formal query specification language, such as SQL.
  • a sample chunk expression might be:
  • a recent object field 154 lists in reverse chronological order computer objects 156 that have been accessed by the user.
  • Recent object field 154 includes both objects obtained from computer locations, such a computer files, pictures, audio files, etc., and computer communication objects such as emails or other computer messages, which the user can select to access at access indicators 158 .
  • a drop-down control 160 allows a user to access recent past queries.
  • FIG. 4 is a flow diagram of a computer object access control user interface method 180 .
  • User interface method 180 is performed in response to computer software for that is stored in a computer readable medium for performing the steps of method 180 .
  • step 182 a user initiates an access control method for a computer object.
  • step 184 any computer spaces that have already been given access to the computer object are identified.
  • access control indicators 114 A- 114 C may indicate that computer spaces 112 A- 112 C had already been given access to the computer object.
  • a ranked listing of plural other spaces that could be given access to the computer object is determined.
  • the ranked listing may be based upon which computer spaces were most recently used or interacted with, or may be based upon associations determined between the computer object and the various computer spaces.
  • step 188 a computer object access control graphical user interface is rendered on a computer display screen.
  • step 190 access control entries from an access-controlling user are received into the user interface and accepted by the user.
  • step 192 access to the computer object is provided to the computer spaces indicated by the user.
  • method 180 and user interface 100 could also be used to remove access from one or more computer spaces, such as by the user de-selecting the computer space from the access field of user interface 100 .
  • de-selecting of access rights might not be feasible because the object has already been transmitted. In this situation, de-selection of the computer space may be indicated as unavailable in the computer space.
  • FIG. 5 is a functional block diagram of an automatic context association system 200 that automatically determines context associations between user computer activities, computer objects (e.g., files, contacts, etc.), and other events.
  • the context associations allow context association system 200 to provide users with automatic access to related computer files, contacts, and information (referred to generally as objects).
  • context associations between the objects may include similarities between them and their importance.
  • the importance of and similarities between objects may be determined from user computer interactions with the objects.
  • the user computer interactions may occur on a conventional desktop or laptop computer, or any other user-operated computing device such as a handheld computer, a digital cellular telephone, etc.
  • Context association system 200 may be implemented as software that is stored on and executed by one or more such computers.
  • Context association system 200 includes a data collection system 202 that collects data relating to user computer activities, computer actions, interactions between the user and various computer objects (e.g., applications, files, communications, etc.), and other events.
  • data collection system 202 may collect data relating to computer system events (e.g., the operation of applications or other software elements, various operations on computer files, sharing of computer data or other objects, etc.) computer communications (e.g., email communications, instant messaging communications, etc.), and external data (e.g., news, events, etc.)
  • data collection system 202 may include a system activity monitor 204 , for example, that monitors user activity on a user-operated computer (not shown).
  • System activity monitor 204 may be implemented as a computer program to which other applications, or the operating system, provide information of user computer activities, such as search queries, the opening or modification of a document or other file, etc. For example, while objects may exhibit many properties, searches performed by a user and the search results can indicate which properties are most important for the user. For each such activity, system activity monitor 204 creates or adds to a record of information (sometimes called “metadata”) that is stored in a computer system database 206 .
  • metadata sometimes called “metadata”
  • system activity monitor 204 may include a universal input activity monitor that provides a single entry point for all user interactions with the computer, or at least specified user interactions with the computer.
  • system activity monitor 204 may determine and store as metadata in computer system database 206 any or all of the following: input method data (e.g., text, speech, mouse, etc.), input language data (English, Chinese, etc.), input mode data (e.g., dictation or typed command), input assistance data (e.g., typed word completion, command guessing, etc.), input feedback data (e.g., whether the computer needs additional information, corrections of wrong guesses by the computer, etc.), etc.
  • input method data e.g., text, speech, mouse, etc.
  • input language data English, Chinese, etc.
  • input mode data e.g., dictation or typed command
  • input assistance data e.g., typed word completion, command guessing, etc.
  • input feedback data e.g., whether the computer needs additional information, corrections of
  • system activity monitor 204 could store the network address (e.g., Uniform Resource Locator, URL) of the source page, as well as the URL of the image itself, as metadata in computer system database 206 .
  • network address e.g., Uniform Resource Locator, URL
  • Computer system database 206 stores information (e.g., “metadata”) about computer files stored on and activities carried out on a computer.
  • the metadata may include conventional information, such as is conventional for computer-generated documents, including when the file was created, who created it, and a modification history.
  • some types of computer file types may have specific metadata fields that are not applicable to other file types.
  • the metadata fields for a photo file type may include the size of the image, where the picture was taken, who took it, who is in it, etc.
  • new metadata fields can be added to database system 206 to accommodate new file types or to store new information about an existing file type.
  • Table 1A lists exemplary information that may obtained by system activity monitor 204 and stored in computer system database 206 .
  • system activity monitor 204 may collect data relating to any or all of the creator/author of the object, the type of the object, any pointer to the object (if available), activation events, object size, etc.
  • system activity monitor 204 may obtain the information about the objects with which a computer user interacts, determine whether the objects are new or unique relative to other objects listed in computer system database 206 (e.g., based upon a unique object identifier), and aggregate or store the activities in computer system database 206 in association with the unique object identifier of the object.
  • System activity monitor 204 can obtain and store in computer system database 206 for each of the listed types of exemplary information.
  • Context association system 200 includes a relationship processing system 208 that determine one or more relationships between objects or metadata obtained by data collection system 202 or stored in computer system database 206 .
  • relationship processing system 208 includes a similarity or association system 210 that determines a degree of similarity or association between at least a pair of computer files or objects. Similarity or the degree of association may be represented, for example, as a numeric value between 0 and 1, where 1 would be identity between objects and 0 would indicate they are completely unrelated.
  • Association system 210 may be implemented as one or more programs that, for a given target file and a collection of other files, return a similarity ranking between them.
  • association system 210 may identify and store in computer system database 206 .
  • the associations or similarities may relate to objects or files having shared content, occurring at similar times or similar computer locations (e.g., computer, directory, etc.), being sent to or received from a common person, are be linked together.
  • association system 210 could be instructed to ignore certain types of similarity, or to weight one type of similarity more heavily than another. Moreover, the associations or similarities tracked and identified by association system 210 could be extensible.
  • objects with which a user interacts can be of a different importance or significance to the user. For instance, a document that a user keeps open and edits of an extended period could be deemed to be of greater importance than a document that is opened for only a brief period of time. Likewise, a photo that is accessed and opened repeatedly could be deemed to be of greater importance that a photo that is only opened once.
  • Table 1C lists exemplary factors by which association system 210 , for example, could determine and store in computer system database 206 the relative importance of objects.
  • the importance factors may relate to the duration of user interactions, the frequency of interactions, the recency of interactions, as well as the immediacy of user responses, the amount of copying, duplication, and backups, and the extent objects are shared.
  • TABLE 1C Data Collection and Analysis Operationalization Constructs Data Collecting Data Processing Importance of Objects Duration of open and close activation session times calculated interaction events, object by min max time/date, then summed by object keyboard events, mouse summed by object events, object Frequency of activation events, count of unique interaction date/times activations/sessions Recency of activation events, get maximum date interaction date/times Immediacy of difference in time response to Copying, print, save as, multiple duplication, versions backups Sharing show during meeting, share via email, etc.
  • Relationship processing system 208 may further include a chunking system 212 that uses the degrees of similarity or association determined by similarity or association system 210 for an arbitrarily large set of objects or files and groups or “chunks” them into a specified number of sub-groups. For instance, given 200 photos, chunking system 212 could separate them into any number of sub-groups or chunks based on one or more criteria such as the dates they were taken, or who is in the photos, for example. The criteria to be used by chunking system 212 may be pre-defined or specified by a user, for example, and in one implementation can place the same item into several chunks (e.g., a picture of Bob and Sue would go into a Bob chunk as well as a Sue chunk). Chunking system 212 may be implemented as one or more programs stored on the computer.
  • a context association user interface system 216 utilizes information stored in computer system database 206 by system activity monitor 204 , as well as information determined by similarity or association system 210 and chunking system 212 to display visualizations 218 illustrating context associations between computer system files, computer information, and other information. Visualizations 218 may be based upon the results of database queries 220 to which, in some instances, data filters 222 are applied.
  • user interface system 216 can provide application and system notifications 124 , as described below in greater detail.
  • context association system 200 accommodates innate human memory, which works by association so that events are often remembered as happening in relationship to other events.
  • conventional computer file systems force users to use and remember arbitrary, out-of-context filing structures.
  • Context association system 200 allows a user to view and assign searchable metadata and to retrieve documents, objects or files that match selected metadata.
  • FIG. 6 is a detailed block diagram of one implementation of data collection system 202 .
  • data collection system 202 can also include any or all of the following, including an event handler 232 through which one or more applications 234 (including other software services) send metadata information about application events to data collection system 202 and receive metadata information about application events from data collection system 202 .
  • Applications 234 may be separate from an underlying operating system for the computer, or may be services or features provided by the operating system.
  • a data collection container 236 operates to control system activity monitor 204 , event handler 232 , and any other data collection modules, and particularly controls data collection relating to system activity, copy and paste between documents, incoming and outgoing messages, opening shared files, etc.
  • data collection container 236 can operate to obtain or receive common data (like weather, news), other than data relating specifically to operation or use of the computer, from one or more separate computer information sources 238 (e.g., public servers).
  • Applications 234 running on a computer with automatic context association system 200 could register with event handler 232 to receive enhanced document management functionality.
  • data collection container 236 supports cross-application integration that allows collection of data or information about cross-application events, such as copy and paste between documents, attaching a document to an email message, etc., thereby allowing relationships between objects to be determined or derived by relationship processing system 208 .
  • applications 234 can interact directly with data collection system 202 to provide contextual information not readily available to system activity monitor 204 . For example, if an email attachment is saved to disk as a separate file, the email application 234 may create a link between this file and the original email message (and, by extension, with the message sender).
  • Control system activity monitor 204 and event handler 232 allow data to be collected at high efficiency and at a high granularity level, and with the minimal amount of processing required.
  • data collection system 202 in one implementation may be extensible to allow for the installation of additional data collectors that may be developed in the future.
  • users are notified that the data is collected and what it is used for. Users are provided one or more controls to selectively enable or disable the data collection, or explicitly adjust the importance of objects and their association weights, as described below.
  • the ways in which the data is collected may be modified automatically based on how the data is used. While data is typically collected at the level of an individual user and computer, it will be appreciated that the data from multiple users and their computers could be combined. For such a shared data implementation, system 200 will provide unique identifiers for the data, objects and sessions, consistent handling of to- and from-fields for communications, replication of event identifiers across computers in shared sessions, privacy, and so forth.

Abstract

A computer object access control graphical user interface allows a user to set computer locations where a computer object may be accessed and other users who may access the computer object. The computer object may be a computer file, a computer message, person contact information, etc. The access control user interface may operate, for example, to save a computer object to one or more computer locations, and also to specify sharing of the computer object with one or more other users so that they can access the object. Saving a computer object and setting the sharing of it are together referred to as controlling access to the object, the former referring to where the object may be accessed from and the latter referring to who may access the object. This provides, therefore, a unified interface for selecting and displaying destinations that can be either a file store or a person, thereby unifying the control of access to a computer object.

Description

    TECHNICAL FIELD
  • The present invention relates to user interfaces for accessing and controlling access to computer objects and, in particular, to a user interface for accessing or controlling access to computer objects in computer spaces relating to computer locations and computer users. [0001]
  • BACKGROUND AND SUMMARY
  • Computer objects (e.g., files) are commonly copied or saved from one computer to another. Computer messages are sent between computers. Computer users give each other access to or “share” different sets of computer files or different computer file directories. [0002]
  • Typically, the sharing of computer objects between users as a “share” is distinct from the saving of computer objects to computer (e.g. network) locations. This distinction relates to the traditional view that computer storage occurs at locations (e.g., drives, folders, etc.), while the sharing of computer objects relates to the security or accessibility of the object at that location. As a result, the user interfaces for saving computer objects to computer locations are distinct from the user interfaces for setting the sharing of the objects. [0003]
  • An aspect of the present invention is an appreciation that access to a computer object according to its computer location is analogous to who is accessing the object. The common aspect is accessibility to the object. Accordingly, the present invention provides a computer object access control graphical user interface for setting computer locations where a computer object may be accessed and users who may access the computer object. The computer object may be a computer file, a computer message, person contact information, etc. [0004]
  • The access control user interface may operate, for example, to save a computer object to one or more computer locations, and also to specify sharing of the computer object with one or more other users so that they can access the object. Saving a computer object and setting the sharing of it are together referred to as controlling access to the object, the former referring to where the object may be accessed from and the latter referring to who may access the object. [0005]
  • In one implementation, the user interface includes a name field indicating a name for the computer object and multiple access control fields that are rendered together and indicate multiple selectable computer spaces for the computer object. At least one of the computer spaces corresponds to a computer location, and at least one of the computer spaces corresponds to access to the computer object for one or more computer users. The present invention provides, therefore, a unified interface for selecting and displaying destinations that can be either a file store or a person, thereby unifying the control of access to a computer object. [0006]
  • In one implementation, the multiple computer spaces are listed in a ranked sequence, which can be based upon recency of user interaction with the computer spaces (i.e., locations or users) or according to associations to the computer object determined automatically from user computer interactions. Users can be represented by an email address, an instant messaging name, a full name, or any other person identifiers, and specific transports to the users can also be identified or specified. [0007]
  • Additional objects and advantages of the present invention will be apparent from the detailed description of the preferred embodiment thereof, which proceeds with reference to the accompanying drawings.[0008]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a an illustration of a computer object access control graphical user interface for setting computer locations where a computer object may be accessed and users who may access the computer object. [0009]
  • FIG. 2 is a an illustration of another computer object access control graphical user interface for setting computer locations where a computer object may be accessed and users who may access the computer object. [0010]
  • FIG. 3 is a an illustration of a computer object access control graphical user interface for accessing a computer object computer from a location on a computer or received via computer communication. [0011]
  • FIG. 4 is a flow diagram of a computer-implemented computer object access control graphical user interface method. [0012]
  • FIG. 5 is a functional block diagram of an automatic context association system that automatically determines context associations between user computer activities, computer objects (e.g., files, contacts, etc.), and other events. [0013]
  • FIG. 6 is a detailed block diagram of one implementation of data collection system.[0014]
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • FIG. 1 is a an illustration of a computer object access control [0015] graphical user interface 100 for setting computer locations where a computer object may be accessed and users who may access the computer object. The computer object may be a computer file, a computer message, person contact information, etc.
  • Access [0016] control user interface 100 may operate, for example, to save a computer object to one or more computer locations, and also to specify sharing of the computer object with one or more other users so that they can access the object. Saving a computer object and setting the sharing of it are together referred to as controlling access to the object, the former referring to where the object may be accessed from and the latter referring to who may access the object. Access control user interface 100 may be generated from within any application or by a computer operating system whenever the access controlling user wishes to save the object to a specified location of share access with a specified other person.
  • Access [0017] control user interface 100 includes a name field 102 in which a name for the computer object can be entered, either automatically by a computer or manually by the user. An author field 104 specifies who created the computer object (e.g., a computer file, a computer message, person contact information, etc.) for which access is being set with user interface 100. An optional comment field 106 allows the user who is controlling access to the object (referred to as the access-controlling user) to enter and store a comment about the object, and an optional “more” link 108 gives the user access to optional additional fields for entering other properties relating to the object. The additional fields at “more” link 108 may include any or all of a creation date field indicating when the object was created, a modified field indicating when the object was last modified, any keywords, category names, etc.
  • An [0018] access control field 110 includes a listing or display of multiple computer spaces 112A-112F (referred to generally as computer spaces 112) that have or can be selected to have access to the computer object. Computer spaces 112 may refer to different portions of a computer network (e.g., public and private portions or “folders”), different computers, different computer access rights of different computer users, different computer users, etc. User interface 100 provides, therefore, a unified control over access to the computer object at computer spaces corresponding to computer users and computer locations.
  • For example, computer spaces [0019] 112A, 112B, and 112F reference computers or other locations on a computer network where access to the object may be provided. Computer space 112A indicates the controlling user's local or desktop computer, computer space 112B indicates the controlling user's portable or laptop computer, and computer space 112F indicates a location on a local or global computer network. It will be appreciated that these particular computer spaces 112A, 112B, and 112F are merely examples.
  • As additional examples, [0020] computer spaces 112C-112E reference computer users to whom access to the object may be granted. Computer space 112C indicates an individual (e.g., Coworker1) to whom the object is provided by email. Computer space 112D indicates a group of users (e.g., “Work Group”) to whom the object may be provided, either by computer communication such as email or at a shared computer location. Computer space 112D indicates a group of instant messaging users or “buddies” who could be given access. The users of computer spaces 112C-112E can each be represented by an email address, an instant messaging name, a full name, or any other person identifiers, and specific transports to the users can also be identified or specified. A scroll bar 113 allows the access controlling user to scroll to other selectable computer spaces.
  • [0021] Access control indicators 114A-114F indicate whether each corresponding computer space 112A-112F has been selected to have access to the computer object. For example, access control indicators 114A-114C indicate that respective computer spaces 112A-112C have access to the computer object, and access control indicators 114D-114F indicate that respective computer spaces 112D-112F do not have access to the computer object. The access-controlling user provides access to any of computer spaces by graphical activation of the corresponding one of access control indicators 114A-114F. It will be appreciated that access control indicators 114A-114F may be implemented in any of a wide variety of graphical control formats.
  • User interface also includes controls [0022] 116A and 116B with which the access controlling user can accept or cancel access control changes, and optionally may include a summary region 118 listing a summary of information from various fields in the user interface.
  • In one implementation, the listing of computer spaces [0023] 112 in access control field 110 is ordered as a ranked listing of possible destinations for the computer object. The ranked listing may be based upon the computer spaces that the access-controlling user has most recently accessed or interacted with. In another implementation, the ranked listing may be based on the extent or strengths of associations to the object, such as associations to computer locations commonly used by the user, or people the user commonly works or communicates with, or user computer interactions that are identified automatically. Such associations and their relative strengths could be determined automatically, as described below in greater detail.
  • FIG. 2 is a an illustration of another computer object access control [0024] graphical user interface 130 for setting computer locations where a computer object may be accessed and users who may access the computer object. Access control user interface 130 includes a name field 132 in which a name for the computer object can be entered, either automatically by a computer or manually by the user. An author field 134 specifies who created the computer object (e.g., a computer file, a computer message, person contact information, etc.) for which access is being set with user interface 130.
  • An [0025] optional comment field 136 allows the access-controlling user to enter and store a comment about the object, and an optional “more” link 308 gives the access-controlling user optional additional fields for entering other properties relating to the object. An object type field 139 provides a type indication (e.g., graphical) for the computer object, specifying for example that the object is a word processor document, a picture, a spreadsheet, an audio or video file, etc.
  • An [0026] access control field 140 includes a listing of multiple computer spaces 142A, 142B (referred to generally as computer spaces 142) that have or can be selected to have access to the computer object. Computer spaces 142 are like computer spaces 112 (FIG. 1) and may refer to different portions of a computer network (e.g., public and private portions or “folders”), different computers, different computer access rights of different computer users, different computer users, etc. Access control indicators 144A, 144B are analogous to access control indicators 114 and indicate whether each corresponding computer space 142A, 142B has been selected to have access to the computer object.
  • Access control [0027] graphical user interface 130 further includes a category field 146 that includes a flat listing of categories 148A-148C in which the computer object is or may be selected to be included according to category control indicators 149A-149C. In one implementation, categories 148A-148C of category field 146 correspond to directories or folders of a hierarchical file structure of the type commonly used in the art.
  • The hierarchical file structure, or tree structure, is commonly rendered as successively indented file structure levels for successively nested levels of folders or directories. In the flat representation of [0028] category field 146, folders and directories are listed by their names as categories in a single level (i.e., flat) arrangement. This flat arrangement allows multiple folder or directories to be listed efficiently without requiring the display area to render the hierarchical file structure. In another implementation, categories 148 may also or alternatively correspond to keywords for organizing objects. Categories 148 may be ranked or ordered according to the recency with which they have been used or accessed by the user.
  • FIG. 3 is a an illustration of a computer object access control graphical user interface [0029] 150 for accessing a computer object computer from a location on a computer or received via computer communication.
  • Access control user interface [0030] 150 includes a query field 152 in which a query can be entered to retrieve one or more computer objects. Query field 152 may be configured to receive a general database-type query (as illustrated) or may be a graphical user interface to a hierarchical tree structure as is known in the art. As a database-type query, query field may receive or accommodate a chunk expression language format, for example.
  • As is known in the art, a chunk expression language format is a pseudo-natural language (e.g., English-like) that can be easily parsed by a computer into a formal query specification language, such as SQL. A sample chunk expression might be: [0031]
  • Show every email whose sender is ‘John Smith’ and whose subject contains “patent”, [0032]
  • which would be parsed by a computer into a formal query specification language, such as SQL as: [0033]
  • SELECT*FROM EMAIL WHERE SENDER=‘JOHN SMITH’ AND SUBJECT LIKE ‘% patent %’[0034]
  • In general, a chunk expression might take the form of: [0035]
  • Show <selector> <object-type> whose <property> <comparator> <value>*[<conjunction> <property> <comparator> <value>][0036]
  • A [0037] recent object field 154 lists in reverse chronological order computer objects 156 that have been accessed by the user. Recent object field 154 includes both objects obtained from computer locations, such a computer files, pictures, audio files, etc., and computer communication objects such as emails or other computer messages, which the user can select to access at access indicators 158. A drop-down control 160 allows a user to access recent past queries.
  • FIG. 4 is a flow diagram of a computer object access control [0038] user interface method 180. User interface method 180 is performed in response to computer software for that is stored in a computer readable medium for performing the steps of method 180.
  • In [0039] step 182, a user initiates an access control method for a computer object.
  • In [0040] step 184, any computer spaces that have already been given access to the computer object are identified. In FIG. 1, for example, access control indicators 114A-114C may indicate that computer spaces 112A-112C had already been given access to the computer object.
  • In [0041] step 186, a ranked listing of plural other spaces that could be given access to the computer object is determined. The ranked listing may be based upon which computer spaces were most recently used or interacted with, or may be based upon associations determined between the computer object and the various computer spaces.
  • In [0042] step 188, a computer object access control graphical user interface is rendered on a computer display screen.
  • In [0043] step 190, access control entries from an access-controlling user are received into the user interface and accepted by the user.
  • In [0044] step 192, access to the computer object is provided to the computer spaces indicated by the user.
  • It will be appreciated that [0045] method 180 and user interface 100 could also be used to remove access from one or more computer spaces, such as by the user de-selecting the computer space from the access field of user interface 100. For some computer spaces, such as a computer space corresponding to an email address of another user, de-selecting of access rights might not be feasible because the object has already been transmitted. In this situation, de-selection of the computer space may be indicated as unavailable in the computer space.
  • FIG. 5 is a functional block diagram of an automatic [0046] context association system 200 that automatically determines context associations between user computer activities, computer objects (e.g., files, contacts, etc.), and other events. The context associations allow context association system 200 to provide users with automatic access to related computer files, contacts, and information (referred to generally as objects).
  • As described below, context associations between the objects may include similarities between them and their importance. The importance of and similarities between objects may be determined from user computer interactions with the objects. The user computer interactions may occur on a conventional desktop or laptop computer, or any other user-operated computing device such as a handheld computer, a digital cellular telephone, etc. For purposes of simplicity, these types of devices are referred to herein generally as computers. [0047] Context association system 200 may be implemented as software that is stored on and executed by one or more such computers.
  • [0048] Context association system 200 includes a data collection system 202 that collects data relating to user computer activities, computer actions, interactions between the user and various computer objects (e.g., applications, files, communications, etc.), and other events. For example, data collection system 202 may collect data relating to computer system events (e.g., the operation of applications or other software elements, various operations on computer files, sharing of computer data or other objects, etc.) computer communications (e.g., email communications, instant messaging communications, etc.), and external data (e.g., news, events, etc.)
  • In one implementation, [0049] data collection system 202 may include a system activity monitor 204, for example, that monitors user activity on a user-operated computer (not shown). System activity monitor 204 may be implemented as a computer program to which other applications, or the operating system, provide information of user computer activities, such as search queries, the opening or modification of a document or other file, etc. For example, while objects may exhibit many properties, searches performed by a user and the search results can indicate which properties are most important for the user. For each such activity, system activity monitor 204 creates or adds to a record of information (sometimes called “metadata”) that is stored in a computer system database 206.
  • For example, system activity monitor [0050] 204 may include a universal input activity monitor that provides a single entry point for all user interactions with the computer, or at least specified user interactions with the computer. In this universal input implementation, system activity monitor 204 may determine and store as metadata in computer system database 206 any or all of the following: input method data (e.g., text, speech, mouse, etc.), input language data (English, Chinese, etc.), input mode data (e.g., dictation or typed command), input assistance data (e.g., typed word completion, command guessing, etc.), input feedback data (e.g., whether the computer needs additional information, corrections of wrong guesses by the computer, etc.), etc. For instance, if a user copies or stores a picture in a web browser, system activity monitor 204 could store the network address (e.g., Uniform Resource Locator, URL) of the source page, as well as the URL of the image itself, as metadata in computer system database 206.
  • [0051] Computer system database 206 stores information (e.g., “metadata”) about computer files stored on and activities carried out on a computer. The metadata may include conventional information, such as is conventional for computer-generated documents, including when the file was created, who created it, and a modification history. Also, some types of computer file types may have specific metadata fields that are not applicable to other file types. For instance, the metadata fields for a photo file type may include the size of the image, where the picture was taken, who took it, who is in it, etc. In one implementation, new metadata fields can be added to database system 206 to accommodate new file types or to store new information about an existing file type.
  • Table 1A lists exemplary information that may obtained by system activity monitor [0052] 204 and stored in computer system database 206. With regard to the various computer files and computer information (referred to collectively as objects) a computer user might interact with, system activity monitor 204 may collect data relating to any or all of the creator/author of the object, the type of the object, any pointer to the object (if available), activation events, object size, etc. For example, system activity monitor 204 may obtain the information about the objects with which a computer user interacts, determine whether the objects are new or unique relative to other objects listed in computer system database 206 (e.g., based upon a unique object identifier), and aggregate or store the activities in computer system database 206 in association with the unique object identifier of the object.
    TABLE 1A
    Data Collection and Analysis
    Operationalization
    Constructs Data Collecting Data Processing
    Objects Users Interact With
    General creator/author of object, get information about
    type of object, pointer to objects, determine if
    object if it still exists, new/unique & aggregate
    activation events, object events at level of unique
    size object ID
    People
    people in user's email client aliases
    email
    people in user's contact list files
    contact list
    people users IM, buddy list email aliases
    Chat with
    Communications
    Emails email events (open, close),
    email addresses
    phone messages phone message events
    (open, close), email alias
    instant messages instant message (IM)
    session events (open,
    close), people
    chat messages chat session events
    Files
    any file created, file names, place in
    opened, saved, directory
    played, sent, etc.
    Web items
    web pages URLs
    streaming items URLs
    played
    Notifications type of notification,
    response notification
    Applications pointer to application
  • The objects with which the computer user interacts may be associated with other people, communications with other people, computer files, network or Web items, computer system notifications, and applications run on or accessible by the computer. System activity monitor [0053] 204 can obtain and store in computer system database 206 for each of the listed types of exemplary information.
  • [0054] Context association system 200 includes a relationship processing system 208 that determine one or more relationships between objects or metadata obtained by data collection system 202 or stored in computer system database 206. In one exemplary implementation, relationship processing system 208 includes a similarity or association system 210 that determines a degree of similarity or association between at least a pair of computer files or objects. Similarity or the degree of association may be represented, for example, as a numeric value between 0 and 1, where 1 would be identity between objects and 0 would indicate they are completely unrelated. Association system 210 may be implemented as one or more programs that, for a given target file and a collection of other files, return a similarity ranking between them.
  • It will be appreciated that different types of documents, files, or objects can have different types of similarity. For instance, two photos can look similar, could be taken at similar times, could be of a similar person, place, or event, could be the same color, could have been sent to the same people or printed together, could be parts of the same photo (e.g., one could have been cut from the other), etc. Table 1B lists exemplary associations or similarities that association system [0055] 210 may identify and store in computer system database 206. As indicated, the associations or similarities may relate to objects or files having shared content, occurring at similar times or similar computer locations (e.g., computer, directory, etc.), being sent to or received from a common person, are be linked together.
    TABLE 1B
    Data Collection and Analysis
    Operationalization
    Constructs Data Collecting Data Processing
    Context: Associations between Objects
    Having shared content cut/paste event, insert
    event, objects
    saved as event, objects
    Occurring near in time
    open on same machine at open/close activation distance across
    same time events, objects, date times, overlapping
    time of events sessions
    Occurring near in “place”
    on same machine machine name
    near each other in directory place in directory min number of
    structure jumps through
    tree from one
    to the other
    near each other in web link event, links from, store metadata in
    links to computer system
    database
    on the same email attachment events, aggregate at
    objects level of
    communication
    Being sent/received to one
    another
    item sent to another person sent event, objects
    pointer of item sent to insert event, objects
    another person
    opened by a person open event, objects
    saved by a person save event, objects
    Activating one from within
    the other
    items downloaded from a download event,
    web page objects
    linked via a URL link event, objects,
    link from, link to
  • In one implementation, association system [0056] 210 could be instructed to ignore certain types of similarity, or to weight one type of similarity more heavily than another. Moreover, the associations or similarities tracked and identified by association system 210 could be extensible.
  • In addition, objects with which a user interacts can be of a different importance or significance to the user. For instance, a document that a user keeps open and edits of an extended period could be deemed to be of greater importance than a document that is opened for only a brief period of time. Likewise, a photo that is accessed and opened repeatedly could be deemed to be of greater importance that a photo that is only opened once. Table 1C lists exemplary factors by which association system [0057] 210, for example, could determine and store in computer system database 206 the relative importance of objects. As indicated, the importance factors may relate to the duration of user interactions, the frequency of interactions, the recency of interactions, as well as the immediacy of user responses, the amount of copying, duplication, and backups, and the extent objects are shared.
    TABLE 1C
    Data Collection and Analysis
    Operationalization
    Constructs Data Collecting Data Processing
    Importance of Objects
    Duration of open and close activation session times calculated
    interaction events, object by min max time/date,
    then summed by object
    keyboard events, mouse summed by object
    events, object
    Frequency of activation events, count of unique
    interaction date/times activations/sessions
    Recency of activation events, get maximum date
    interaction date/times
    Immediacy of difference in time
    response to
    Copying, print, save as, multiple
    duplication, versions
    backups
    Sharing show during meeting, share
    via email, etc.
  • [0058] Relationship processing system 208 may further include a chunking system 212 that uses the degrees of similarity or association determined by similarity or association system 210 for an arbitrarily large set of objects or files and groups or “chunks” them into a specified number of sub-groups. For instance, given 200 photos, chunking system 212 could separate them into any number of sub-groups or chunks based on one or more criteria such as the dates they were taken, or who is in the photos, for example. The criteria to be used by chunking system 212 may be pre-defined or specified by a user, for example, and in one implementation can place the same item into several chunks (e.g., a picture of Bob and Sue would go into a Bob chunk as well as a Sue chunk). Chunking system 212 may be implemented as one or more programs stored on the computer.
  • A context association [0059] user interface system 216 utilizes information stored in computer system database 206 by system activity monitor 204, as well as information determined by similarity or association system 210 and chunking system 212 to display visualizations 218 illustrating context associations between computer system files, computer information, and other information. Visualizations 218 may be based upon the results of database queries 220 to which, in some instances, data filters 222 are applied. In addition, user interface system 216 can provide application and system notifications 124, as described below in greater detail.
  • Accordingly, [0060] context association system 200 accommodates innate human memory, which works by association so that events are often remembered as happening in relationship to other events. In contrast, conventional computer file systems force users to use and remember arbitrary, out-of-context filing structures. With the significant numbers of computer files and objects that many users interact with, conventional out-of-context filing structures can make it difficult, or impossible, for users to find and access computer information that was worked on or viewed in the past. Context association system 200 allows a user to view and assign searchable metadata and to retrieve documents, objects or files that match selected metadata.
  • FIG. 6 is a detailed block diagram of one implementation of [0061] data collection system 202. In addition to system activity monitor 204 for monitoring user computer activity, for example, data collection system 202 can also include any or all of the following, including an event handler 232 through which one or more applications 234 (including other software services) send metadata information about application events to data collection system 202 and receive metadata information about application events from data collection system 202. Applications 234 may be separate from an underlying operating system for the computer, or may be services or features provided by the operating system.
  • A [0062] data collection container 236 operates to control system activity monitor 204, event handler 232, and any other data collection modules, and particularly controls data collection relating to system activity, copy and paste between documents, incoming and outgoing messages, opening shared files, etc. In addition, data collection container 236 can operate to obtain or receive common data (like weather, news), other than data relating specifically to operation or use of the computer, from one or more separate computer information sources 238 (e.g., public servers).
  • [0063] Applications 234 running on a computer with automatic context association system 200 could register with event handler 232 to receive enhanced document management functionality. In particular, data collection container 236 supports cross-application integration that allows collection of data or information about cross-application events, such as copy and paste between documents, attaching a document to an email message, etc., thereby allowing relationships between objects to be determined or derived by relationship processing system 208. Moreover, applications 234 can interact directly with data collection system 202 to provide contextual information not readily available to system activity monitor 204. For example, if an email attachment is saved to disk as a separate file, the email application 234 may create a link between this file and the original email message (and, by extension, with the message sender). Control system activity monitor 204 and event handler 232 allow data to be collected at high efficiency and at a high granularity level, and with the minimal amount of processing required. In addition, data collection system 202 in one implementation may be extensible to allow for the installation of additional data collectors that may be developed in the future.
  • In one implementation users are notified that the data is collected and what it is used for. Users are provided one or more controls to selectively enable or disable the data collection, or explicitly adjust the importance of objects and their association weights, as described below. In other implementations, the ways in which the data is collected may be modified automatically based on how the data is used. While data is typically collected at the level of an individual user and computer, it will be appreciated that the data from multiple users and their computers could be combined. For such a shared data implementation, [0064] system 200 will provide unique identifiers for the data, objects and sessions, consistent handling of to- and from-fields for communications, replication of event identifiers across computers in shared sessions, privacy, and so forth.
  • In accordance with the practices of persons skilled in the art of computer programming, the present invention is described above with reference to acts and symbolic representations of operations that are performed by various computer systems and devices. Such acts and operations are sometimes referred to as being computer-executed and may be associated with the operating system or the application program as appropriate. It will be appreciated that the acts and symbolically represented operations include the manipulation by a CPU of electrical signals representing data bits, which causes a resulting transformation or reduction of the electrical signal representation, and the maintenance of data bits at memory locations in a memory system to thereby reconfigure or otherwise alter the computer system operation, as well as other processing of signals. The memory locations where data bits are maintained are physical locations that have particular electrical, magnetic, or optical properties corresponding to the data bits. [0065]
  • Having described and illustrated the principles of our invention with reference to an illustrated embodiment, it will be recognized that the illustrated embodiment can be modified in arrangement and detail without departing from such principles. In view of the many possible embodiments to which the principles of our invention may be applied, it should be recognized that the detailed embodiments are illustrative only and should not be taken as limiting the scope of our invention. Rather, I claim as my invention all such embodiments as may come within the scope and spirit of the following claims and equivalents thereto. [0066]

Claims (22)

1. A computer object access control graphical user interface rendered on a computer display screen for controlling access to a computer object, comprising:
a name field indicating a name for the computer object; and
one or more access control fields rendered together and indicating plural selectable computer spaces for the computer object, at least one of the computer spaces corresponding to a computer location and at least one of the computer spaces corresponding to access to the computer object for one or more computer users.
2. The user interface of claim 1 in which the at least one of the computer spaces corresponding to access to the object for one or more computer users is provided by one of plural computer communication formats.
3. The user interface of claim 1 in which the plural computer communication formats include email.
4. The user interface of claim 1 in which the plural computer communication formats include instant messaging.
5. The user interface of claim 1 in which the plural selectable computer spaces for the computer object are listed in a ranked sequence.
6. The user interface of claim 5 in which the sequence is ranked according to associations to the computer object determined automatically from user computer interactions.
7. The user interface of claim 1 in which computer spaces corresponding to a computer location and computer spaces corresponding to access for computer users are listed together in a single access control field.
8. The user interface of claim 1 in which computer spaces corresponding to a computer location and computer spaces corresponding to access for computer users are listed in separate respective access control fields.
9. The user interface of claim 1 in which access control field includes a flat representation without hierarchy of plural selectable computer spaces corresponding to computer locations of a hierarchical file structure.
10. In a computer readable medium, software for a computer object access control graphical user interface, comprising
software to render a computer object access control graphical user interface on a computer display screen for controlling access to a computer object, the user interface including a name field indicating a name for the computer object and an access control field indicating plural selectable computer spaces for the computer object, at least one of the computer spaces corresponding to a computer location and at least one of the computer spaces corresponding to access to the computer object for one or more computer users.
11. The software of claim 10 in which the at least one of the computer spaces corresponding to access to the object for one or more computer users is provided by a computer communication format.
12. The software of claim 10 in which the computer communication format includes email.
13. The software of claim 10 in which the computer communication format includes instant messaging.
14. The software of claim 10 in which the plural selectable computer spaces for the computer object are listed in a ranked sequence.
15. The software of claim 14 in which the sequence is ranked according to associations to the computer object determined automatically from user computer interactions.
16. The software of claim 10 in which computer spaces corresponding to a computer location and computer spaces corresponding to access for computer users are listed together in a single access control field.
17. The software of claim 10 in which computer spaces corresponding to a computer location and computer spaces corresponding to access for computer users are listed in separate respective access control fields.
18. The software of claim 10 in which access control field includes a flat representation without hierarchy of plural selectable computer spaces corresponding to computer locations of a hierarchical file structure.
19. A computer object access control graphical user interface rendered on a computer display screen for controlling access to a computer object, comprising:
a query field for indicating a query to access the computer object; and
a recent object field rendered with the query field and listing plural computer objects that have been accessed by the user, the plural computer objects including objects obtained from computer locations and computer communication objects.
20. The user interface of claim 19 in which the plural computer objects are listed in reverse chronological order in the recent object field.
21. The user interface of claim 19 in which the query field receives a query a chunk expression language format.
22. In a computer readable medium, software for a computer object access control graphical user interface, comprising
software to render a computer object access control graphical user interface rendered on a computer display screen for controlling access to a computer object, the user interface including a query field for indicating a query to access the computer object, and a recent object field rendered with the query field and listing plural computer objects that have been accessed by the user, the plural computer objects including objects obtained from computer locations and computer communication objects.
US10/609,104 2003-06-26 2003-06-26 User interface for controlling access to computer objects Abandoned US20040267746A1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
US10/609,104 US20040267746A1 (en) 2003-06-26 2003-06-26 User interface for controlling access to computer objects
TW093117345A TWI352904B (en) 2003-06-26 2004-06-16 Method and computer readable medium for controllin
EP04755860A EP1636686A4 (en) 2003-06-26 2004-06-22 Interface for controlling access to computer objects
KR1020057024962A KR101137179B1 (en) 2003-06-26 2004-06-22 User interface for controlling access to computer objects
PCT/US2004/019987 WO2005003895A2 (en) 2003-06-26 2004-06-22 Interface for controlling access to computer objects
JP2006517541A JP4795945B2 (en) 2003-06-26 2004-06-22 User interface for access control to computer objects
CN200480017799XA CN1813233B (en) 2003-06-26 2004-06-22 User interface for controlling access to computer objects
US11/188,555 US7636890B2 (en) 2003-06-26 2005-07-25 User interface for controlling access to computer objects
JP2011085836A JP2011150725A (en) 2003-06-26 2011-04-07 User interface for controlling access to computer object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/609,104 US20040267746A1 (en) 2003-06-26 2003-06-26 User interface for controlling access to computer objects

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/188,555 Division US7636890B2 (en) 2003-06-26 2005-07-25 User interface for controlling access to computer objects

Publications (1)

Publication Number Publication Date
US20040267746A1 true US20040267746A1 (en) 2004-12-30

Family

ID=33540761

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/609,104 Abandoned US20040267746A1 (en) 2003-06-26 2003-06-26 User interface for controlling access to computer objects
US11/188,555 Active 2025-06-05 US7636890B2 (en) 2003-06-26 2005-07-25 User interface for controlling access to computer objects

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/188,555 Active 2025-06-05 US7636890B2 (en) 2003-06-26 2005-07-25 User interface for controlling access to computer objects

Country Status (7)

Country Link
US (2) US20040267746A1 (en)
EP (1) EP1636686A4 (en)
JP (2) JP4795945B2 (en)
KR (1) KR101137179B1 (en)
CN (1) CN1813233B (en)
TW (1) TWI352904B (en)
WO (1) WO2005003895A2 (en)

Cited By (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040239700A1 (en) * 2003-03-17 2004-12-02 Baschy Leo Martin User interface driven access control system and method
US20040268146A1 (en) * 2003-06-25 2004-12-30 Microsoft Corporation Distributed expression-based access control
US20050086244A1 (en) * 2000-02-01 2005-04-21 Paul Morinville Matrixed organization apparatus
US20050132288A1 (en) * 2003-12-12 2005-06-16 Kirn Kevin N. System and method for realtime messaging having image sharing feature
US20050262054A1 (en) * 2004-05-18 2005-11-24 Nokia Corporation Item type specific structured search
US20060048068A1 (en) * 2004-08-31 2006-03-02 Michael Danninger Method and system to facilitate access to a user interface element on a user interface
US20060074904A1 (en) * 2004-09-30 2006-04-06 Mungara Ajay M Content delivery rendering engine
US20060080278A1 (en) * 2004-10-08 2006-04-13 Neiditsch Gerard D Automated paperless file management
US20060129746A1 (en) * 2004-12-14 2006-06-15 Ithink, Inc. Method and graphic interface for storing, moving, sending or printing electronic data to two or more locations, in two or more formats with a single save function
US20060253771A1 (en) * 2005-05-06 2006-11-09 Niresip Llc User Interface For Nonuniform Access Control System And Methods
US20070234218A1 (en) * 2006-03-29 2007-10-04 Niresip Llc User Interface For Variable Access Control System
US20100070897A1 (en) * 2008-09-15 2010-03-18 Andrew Aymeloglu Modal-less interface enhancements
US20100114959A1 (en) * 2007-03-19 2010-05-06 Takahisa Shirakawa File access destination control device, its method, and its computer program products
US20100275218A1 (en) * 2009-04-22 2010-10-28 Microsoft Corporation Controlling access of application programs to an adaptive input device
US20110307831A1 (en) * 2010-06-10 2011-12-15 Microsoft Corporation User-Controlled Application Access to Resources
US20120322041A1 (en) * 2011-01-05 2012-12-20 Weisman Jordan K Method and apparatus for producing and delivering customized education and entertainment
US20130080966A1 (en) * 2011-09-22 2013-03-28 Microsoft Corporation User experience for notebook creation and interaction
US20140164940A1 (en) * 2012-12-07 2014-06-12 Displaylink (Uk) Limited Application windows and display devices
US20140173463A1 (en) * 2011-07-29 2014-06-19 April Slayden Mitchell system and method for providing a user interface element presence indication during a video conferencing session
US20150066960A1 (en) * 2013-09-04 2015-03-05 International Business Machines Corporation Autonomically defining hot storage and heavy workloads
US9129088B1 (en) 2005-06-04 2015-09-08 Leo Martin Baschy User interface driven access control system and methods for multiple users as one audience
US9256664B2 (en) 2014-07-03 2016-02-09 Palantir Technologies Inc. System and method for news events detection and visualization
US20160065633A1 (en) * 2014-08-26 2016-03-03 Ricoh Company, Ltd. Terminal apparatus, screen sharing method, program, and screen sharing system
US9335911B1 (en) 2014-12-29 2016-05-10 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US9367872B1 (en) 2014-12-22 2016-06-14 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9380431B1 (en) 2013-01-31 2016-06-28 Palantir Technologies, Inc. Use of teams in a mobile application
US9454785B1 (en) 2015-07-30 2016-09-27 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US9454281B2 (en) 2014-09-03 2016-09-27 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US9471250B2 (en) 2013-09-04 2016-10-18 International Business Machines Corporation Intermittent sampling of storage access frequency
US9501851B2 (en) 2014-10-03 2016-11-22 Palantir Technologies Inc. Time-series analysis system
US9514200B2 (en) 2013-10-18 2016-12-06 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US20170012984A1 (en) * 2013-11-11 2017-01-12 Amazon Technologies, Inc. Access control for a document management and collaboration system
US9558352B1 (en) 2014-11-06 2017-01-31 Palantir Technologies Inc. Malicious software detection in a computing system
US9619557B2 (en) 2014-06-30 2017-04-11 Palantir Technologies, Inc. Systems and methods for key phrase characterization of documents
US9646396B2 (en) 2013-03-15 2017-05-09 Palantir Technologies Inc. Generating object time series and data objects
US9727560B2 (en) 2015-02-25 2017-08-08 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US9734217B2 (en) 2013-12-16 2017-08-15 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US9767172B2 (en) 2014-10-03 2017-09-19 Palantir Technologies Inc. Data aggregation and analysis system
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9823818B1 (en) 2015-12-29 2017-11-21 Palantir Technologies Inc. Systems and interactive user interfaces for automatic generation of temporal representation of data objects
US9852195B2 (en) 2013-03-15 2017-12-26 Palantir Technologies Inc. System and method for generating event visualizations
US9852205B2 (en) 2013-03-15 2017-12-26 Palantir Technologies Inc. Time-sensitive cube
US9857958B2 (en) 2014-04-28 2018-01-02 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive access of, investigation of, and analysis of data objects stored in one or more databases
US9870205B1 (en) 2014-12-29 2018-01-16 Palantir Technologies Inc. Storing logical units of program code generated using a dynamic programming notebook user interface
US9880987B2 (en) 2011-08-25 2018-01-30 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US9886467B2 (en) 2015-03-19 2018-02-06 Plantir Technologies Inc. System and method for comparing and visualizing data entities and data entity series
US9891808B2 (en) 2015-03-16 2018-02-13 Palantir Technologies Inc. Interactive user interfaces for location-based data analysis
US9898335B1 (en) 2012-10-22 2018-02-20 Palantir Technologies Inc. System and method for batch evaluation programs
US9898528B2 (en) 2014-12-22 2018-02-20 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US9946738B2 (en) 2014-11-05 2018-04-17 Palantir Technologies, Inc. Universal data pipeline
US9953445B2 (en) 2013-05-07 2018-04-24 Palantir Technologies Inc. Interactive data object map
US9965937B2 (en) 2013-03-15 2018-05-08 Palantir Technologies Inc. External malware data item clustering and analysis
US9965534B2 (en) 2015-09-09 2018-05-08 Palantir Technologies, Inc. Domain-specific language for dataset transformations
US9984133B2 (en) 2014-10-16 2018-05-29 Palantir Technologies Inc. Schematic and database linking system
US9996229B2 (en) 2013-10-03 2018-06-12 Palantir Technologies Inc. Systems and methods for analyzing performance of an entity
US9996595B2 (en) 2015-08-03 2018-06-12 Palantir Technologies, Inc. Providing full data provenance visualization for versioned datasets
US9998485B2 (en) 2014-07-03 2018-06-12 Palantir Technologies, Inc. Network intrusion data item clustering and analysis
US10037314B2 (en) 2013-03-14 2018-07-31 Palantir Technologies, Inc. Mobile reports
US10037383B2 (en) 2013-11-11 2018-07-31 Palantir Technologies, Inc. Simple web search
US10042524B2 (en) 2013-10-18 2018-08-07 Palantir Technologies Inc. Overview user interface of emergency call data of a law enforcement agency
US10180977B2 (en) 2014-03-18 2019-01-15 Palantir Technologies Inc. Determining and extracting changed data from a data source
US10180929B1 (en) 2014-06-30 2019-01-15 Palantir Technologies, Inc. Systems and methods for identifying key phrase clusters within documents
US10198515B1 (en) 2013-12-10 2019-02-05 Palantir Technologies Inc. System and method for aggregating data from a plurality of data sources
US10216801B2 (en) 2013-03-15 2019-02-26 Palantir Technologies Inc. Generating data clusters
US10229284B2 (en) 2007-02-21 2019-03-12 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US10230746B2 (en) 2014-01-03 2019-03-12 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10262047B1 (en) 2013-11-04 2019-04-16 Palantir Technologies Inc. Interactive vehicle information map
US10296617B1 (en) 2015-10-05 2019-05-21 Palantir Technologies Inc. Searches of highly structured data
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US10324609B2 (en) 2016-07-21 2019-06-18 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10402054B2 (en) 2014-02-20 2019-09-03 Palantir Technologies Inc. Relationship visualizations
US10403011B1 (en) 2017-07-18 2019-09-03 Palantir Technologies Inc. Passing system with an interactive user interface
US10423582B2 (en) 2011-06-23 2019-09-24 Palantir Technologies, Inc. System and method for investigating large amounts of data
US10432603B2 (en) 2014-09-29 2019-10-01 Amazon Technologies, Inc. Access to documents in a document management and collaboration system
US10437840B1 (en) 2016-08-19 2019-10-08 Palantir Technologies Inc. Focused probabilistic entity resolution from multiple data sources
US10437612B1 (en) 2015-12-30 2019-10-08 Palantir Technologies Inc. Composite graphical interface with shareable data-objects
US10444941B2 (en) 2015-08-17 2019-10-15 Palantir Technologies Inc. Interactive geospatial map
US10452678B2 (en) 2013-03-15 2019-10-22 Palantir Technologies Inc. Filter chains for exploring large data sets
US10460602B1 (en) 2016-12-28 2019-10-29 Palantir Technologies Inc. Interactive vehicle information mapping system
US10484407B2 (en) 2015-08-06 2019-11-19 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US10489391B1 (en) 2015-08-17 2019-11-26 Palantir Technologies Inc. Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface
US10540404B1 (en) 2014-02-07 2020-01-21 Amazon Technologies, Inc. Forming a document collection in a document management and collaboration system
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US10599753B1 (en) 2013-11-11 2020-03-24 Amazon Technologies, Inc. Document version control in collaborative environment
US10678860B1 (en) 2015-12-17 2020-06-09 Palantir Technologies, Inc. Automatic generation of composite datasets based on hierarchical fields
US10691877B1 (en) 2014-02-07 2020-06-23 Amazon Technologies, Inc. Homogenous insertion of interactions into documents
US10698938B2 (en) 2016-03-18 2020-06-30 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US10706434B1 (en) 2015-09-01 2020-07-07 Palantir Technologies Inc. Methods and systems for determining location information
US10719188B2 (en) 2016-07-21 2020-07-21 Palantir Technologies Inc. Cached database and synchronization system for providing dynamic linked panels in user interface
US10754822B1 (en) 2018-04-18 2020-08-25 Palantir Technologies Inc. Systems and methods for ontology migration
US10795723B2 (en) 2014-03-04 2020-10-06 Palantir Technologies Inc. Mobile tasks
US10817513B2 (en) 2013-03-14 2020-10-27 Palantir Technologies Inc. Fair scheduling for mixed-query loads
US10853378B1 (en) 2015-08-25 2020-12-01 Palantir Technologies Inc. Electronic note management via a connected entity graph
US10877953B2 (en) 2013-11-11 2020-12-29 Amazon Technologies, Inc. Processing service requests for non-transactional databases
US10885021B1 (en) 2018-05-02 2021-01-05 Palantir Technologies Inc. Interactive interpreter and graphical user interface
US10956406B2 (en) 2017-06-12 2021-03-23 Palantir Technologies Inc. Propagated deletion of database records and derived data
US11138180B2 (en) 2011-09-02 2021-10-05 Palantir Technologies Inc. Transaction protocol for reading database values
US11150917B2 (en) 2015-08-26 2021-10-19 Palantir Technologies Inc. System for data aggregation and analysis of data from a plurality of data sources
US11599369B1 (en) 2018-03-08 2023-03-07 Palantir Technologies Inc. Graphical user interface configuration system

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050028168A1 (en) * 2003-06-26 2005-02-03 Cezary Marcjan Sharing computer objects with associations
US7899170B2 (en) 2005-04-28 2011-03-01 Apple Inc. Multi-participant conference setup
CN100568235C (en) * 2005-09-09 2009-12-09 国际商业机器公司 Be used to carry out instant messaging client computer and the method that project is shared
US7693948B2 (en) * 2006-05-15 2010-04-06 Sap Ag Email traffic integration into a knowledge management system
EP2065816A1 (en) 2007-11-28 2009-06-03 British Telecommunications public limited company Computer file storage
US8312013B1 (en) * 2008-05-08 2012-11-13 Salesforce.Com, Inc. On-demand service system, method and computer program product for linking a custom share row cause to a sharing record associated with a custom object
US9367512B2 (en) * 2009-04-22 2016-06-14 Aventura Hq, Inc. Systems and methods for dynamically updating virtual desktops or virtual applications in a standard computing environment
US8234332B2 (en) * 2009-04-22 2012-07-31 Aventura Hq, Inc. Systems and methods for updating computer memory and file locations within virtual computing environments
US20110082938A1 (en) * 2009-10-07 2011-04-07 Joe Jaudon Systems and methods for dynamically updating a user interface within a virtual computing environment
US20110083081A1 (en) * 2009-10-07 2011-04-07 Joe Jaudon Systems and methods for allowing a user to control their computing environment within a virtual computing environment
US8566348B2 (en) * 2010-05-24 2013-10-22 Intersect Ptp, Inc. Systems and methods for collaborative storytelling in a virtual space
US8869052B2 (en) * 2010-11-30 2014-10-21 Sap Se Context-dependent object types in an integrated development environment
CN102486756A (en) * 2010-12-06 2012-06-06 泰金宝电通股份有限公司 Computer peripheral unit and interactive type system thereof
CN108280240A (en) * 2012-03-27 2018-07-13 瓦欧尼斯系统有限公司 Method and apparatus for enterprise-level filtered search
US9916289B2 (en) * 2013-09-10 2018-03-13 Embarcadero Technologies, Inc. Syndication of associations relating data and metadata
CN104504344B (en) * 2014-12-09 2018-01-16 北京奇虎科技有限公司 Access control method and browser clients end device based on browser

Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5423034A (en) * 1992-06-10 1995-06-06 Cohen-Levy; Leon Network file management with user determined hierarchical file structures and means for intercepting application program open and save commands for inputting and displaying user inputted descriptions of the location and content of files
US5493692A (en) * 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
US5544321A (en) * 1993-12-03 1996-08-06 Xerox Corporation System for granting ownership of device by user based on requested level of ownership, present state of the device, and the context of the device
US5760770A (en) * 1996-05-15 1998-06-02 Microsoft Corporation System and method for defining a view to display data
US5812865A (en) * 1993-12-03 1998-09-22 Xerox Corporation Specifying and establishing communication data paths between particular media devices in multiple media device computing systems based on context of a user or users
US6006225A (en) * 1998-06-15 1999-12-21 Amazon.Com Refining search queries by the suggestion of correlated terms from prior searches
US6098072A (en) * 1997-03-27 2000-08-01 International Business Machines Corporation Source code files in a file directory system having multiple hierarchies representing contextual views
US20010040590A1 (en) * 1998-12-18 2001-11-15 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US20010040591A1 (en) * 1998-12-18 2001-11-15 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US20010043232A1 (en) * 1998-12-18 2001-11-22 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US20020032689A1 (en) * 1999-12-15 2002-03-14 Abbott Kenneth H. Storing and recalling information to augment human memories
US20020044152A1 (en) * 2000-10-16 2002-04-18 Abbott Kenneth H. Dynamic integration of computer generated and real world images
US20020052930A1 (en) * 1998-12-18 2002-05-02 Abbott Kenneth H. Managing interactions between computer users' context models
US20020054174A1 (en) * 1998-12-18 2002-05-09 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US20020054130A1 (en) * 2000-10-16 2002-05-09 Abbott Kenneth H. Dynamically displaying current status of tasks
US6401097B1 (en) * 1998-01-23 2002-06-04 Mccotter Thomas M. System and method for integrated document management and related transmission and access
US20020078204A1 (en) * 1998-12-18 2002-06-20 Dan Newell Method and system for controlling presentation of information to a user based on the user's condition
US20020080155A1 (en) * 1998-12-18 2002-06-27 Abbott Kenneth H. Supplying notifications related to supply and consumption of user context data
US20020083025A1 (en) * 1998-12-18 2002-06-27 Robarts James O. Contextual responses based on automated learning techniques
US20020087525A1 (en) * 2000-04-02 2002-07-04 Abbott Kenneth H. Soliciting information based on a computer user's context
US6434550B1 (en) * 2000-04-14 2002-08-13 Rightnow Technologies, Inc. Temporal updates of relevancy rating of retrieved information in an information search system
US20020194164A1 (en) * 2001-06-13 2002-12-19 Microsoft Corporation Answer wizard drop-down control
US6501491B1 (en) * 1998-09-21 2002-12-31 Microsoft Corporation Extensible user interface for viewing objects over a network
US6507845B1 (en) * 1998-09-14 2003-01-14 International Business Machines Corporation Method and software for supporting improved awareness of and collaboration among users involved in a task
US20030046401A1 (en) * 2000-10-16 2003-03-06 Abbott Kenneth H. Dynamically determing appropriate computer user interfaces
US20030065724A1 (en) * 2001-09-28 2003-04-03 Openwave Systems Inc. Managing messages in unified messaging systems
US6553367B2 (en) * 1997-06-27 2003-04-22 Mercado Software, Ltd. Method for obtaining a unified information graph from multiple information resources
US6618722B1 (en) * 2000-07-24 2003-09-09 International Business Machines Corporation Session-history-based recency-biased natural language document search
US6747675B1 (en) * 1998-12-18 2004-06-08 Tangis Corporation Mediating conflicts in computer user's context data
US20040122849A1 (en) * 2002-12-24 2004-06-24 International Business Machines Corporation Assignment of documents to a user domain
US6772150B1 (en) * 1999-12-10 2004-08-03 Amazon.Com, Inc. Search query refinement using related search phrases
US6812937B1 (en) * 1998-12-18 2004-11-02 Tangis Corporation Supplying enhanced computer user's context data
US6901559B1 (en) * 2000-01-06 2005-05-31 Microsoft Corporation Method and apparatus for providing recent categories on a hand-held device
US6990482B1 (en) * 1999-11-01 2006-01-24 Lockheed Martin Corporation System and method for the storage and access of electronic data in a web-based computer system
US7058890B2 (en) * 2002-02-13 2006-06-06 Siebel Systems, Inc. Method and system for enabling connectivity to a data system

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07295941A (en) * 1994-04-22 1995-11-10 Hitachi Ltd Access right referring system and setting system
JP3324681B2 (en) * 1996-10-18 2002-09-17 富士ゼロックス株式会社 Document management apparatus and method
US5901067A (en) * 1996-11-15 1999-05-04 Kim Y. Kao System for interactively selecting and activating groups of electrically powered devices
JPH10326213A (en) * 1997-05-26 1998-12-08 Casio Comput Co Ltd Data access controller and program record medium for the same
US6449643B1 (en) * 1998-05-14 2002-09-10 Nortel Networks Limited Access control with just-in-time resource discovery
US6533367B1 (en) * 1998-06-05 2003-03-18 Continental Teves Ag & Co. Ohg System for controlling the traction slip of a vehicle
US6553358B1 (en) 1999-04-20 2003-04-22 Microsoft Corporation Decision-theoretic approach to harnessing text classification for guiding automated action
US6385604B1 (en) * 1999-08-04 2002-05-07 Hyperroll, Israel Limited Relational database management system having integrated non-relational multi-dimensional data store of aggregated data elements
JP2001060199A (en) * 1999-08-20 2001-03-06 Toshiba Corp Device and method for classifying document and computer readable recording medium storing document classfication program
JP2005515521A (en) * 2000-09-20 2005-05-26 ボディーワン インコーポレイテッド Intelligent online community automated growth method, system and software
JP2002099565A (en) * 2000-09-26 2002-04-05 Fujitsu Ltd Information retrieval apparatus
US6917937B1 (en) * 2000-11-01 2005-07-12 Sas Institute Inc. Server-side object filtering
JP4215386B2 (en) * 2000-12-15 2009-01-28 三菱電機株式会社 Similar object search method and similar object search device
JP4634600B2 (en) * 2000-12-18 2011-02-16 株式会社東芝 Proxy server
JP2002236591A (en) * 2001-02-08 2002-08-23 Sharp Corp Communication association system and recording medium with program actualizing the communication association system recorded thereon
JP2002269093A (en) * 2001-03-13 2002-09-20 Minolta Co Ltd System, device, and method for image processing, image processing program, and computer-readable recording medium recorded with the same
JP3665873B2 (en) * 2001-03-30 2005-06-29 コニカミノルタビジネステクノロジーズ株式会社 Network broadcast transmission apparatus, network broadcast reply method, network broadcast transmission program, and recording medium
GB2375277B (en) * 2001-05-03 2005-04-06 Ibm A method and apparatus for display of access control in a graphical user interface
JP2003067397A (en) * 2001-06-11 2003-03-07 Matsushita Electric Ind Co Ltd Content control system
JP4014390B2 (en) * 2001-10-29 2007-11-28 オリンパス株式会社 Multimedia object search system
US7610352B2 (en) * 2002-09-09 2009-10-27 Meca Communications, Inc. Sharing skins

Patent Citations (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5423034A (en) * 1992-06-10 1995-06-06 Cohen-Levy; Leon Network file management with user determined hierarchical file structures and means for intercepting application program open and save commands for inputting and displaying user inputted descriptions of the location and content of files
US5812865A (en) * 1993-12-03 1998-09-22 Xerox Corporation Specifying and establishing communication data paths between particular media devices in multiple media device computing systems based on context of a user or users
US5493692A (en) * 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
US5544321A (en) * 1993-12-03 1996-08-06 Xerox Corporation System for granting ownership of device by user based on requested level of ownership, present state of the device, and the context of the device
US5555376A (en) * 1993-12-03 1996-09-10 Xerox Corporation Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request
US5603054A (en) * 1993-12-03 1997-02-11 Xerox Corporation Method for triggering selected machine event when the triggering properties of the system are met and the triggering conditions of an identified user are perceived
US5611050A (en) * 1993-12-03 1997-03-11 Xerox Corporation Method for selectively performing event on computer controlled device whose location and allowable operation is consistent with the contextual and locational attributes of the event
US5760770A (en) * 1996-05-15 1998-06-02 Microsoft Corporation System and method for defining a view to display data
US6098072A (en) * 1997-03-27 2000-08-01 International Business Machines Corporation Source code files in a file directory system having multiple hierarchies representing contextual views
US6553367B2 (en) * 1997-06-27 2003-04-22 Mercado Software, Ltd. Method for obtaining a unified information graph from multiple information resources
US6401097B1 (en) * 1998-01-23 2002-06-04 Mccotter Thomas M. System and method for integrated document management and related transmission and access
US6006225A (en) * 1998-06-15 1999-12-21 Amazon.Com Refining search queries by the suggestion of correlated terms from prior searches
US6507845B1 (en) * 1998-09-14 2003-01-14 International Business Machines Corporation Method and software for supporting improved awareness of and collaboration among users involved in a task
US6501491B1 (en) * 1998-09-21 2002-12-31 Microsoft Corporation Extensible user interface for viewing objects over a network
US20020083025A1 (en) * 1998-12-18 2002-06-27 Robarts James O. Contextual responses based on automated learning techniques
US20020080156A1 (en) * 1998-12-18 2002-06-27 Abbott Kenneth H. Supplying notifications related to supply and consumption of user context data
US20020052930A1 (en) * 1998-12-18 2002-05-02 Abbott Kenneth H. Managing interactions between computer users' context models
US20020052963A1 (en) * 1998-12-18 2002-05-02 Abbott Kenneth H. Managing interactions between computer users' context models
US20020054174A1 (en) * 1998-12-18 2002-05-09 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US6747675B1 (en) * 1998-12-18 2004-06-08 Tangis Corporation Mediating conflicts in computer user's context data
US20050034078A1 (en) * 1998-12-18 2005-02-10 Abbott Kenneth H. Mediating conflicts in computer user's context data
US20020078204A1 (en) * 1998-12-18 2002-06-20 Dan Newell Method and system for controlling presentation of information to a user based on the user's condition
US20020080155A1 (en) * 1998-12-18 2002-06-27 Abbott Kenneth H. Supplying notifications related to supply and consumption of user context data
US20020083158A1 (en) * 1998-12-18 2002-06-27 Abbott Kenneth H. Managing interactions between computer users' context models
US20010043231A1 (en) * 1998-12-18 2001-11-22 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US20010040590A1 (en) * 1998-12-18 2001-11-15 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US6842877B2 (en) * 1998-12-18 2005-01-11 Tangis Corporation Contextual responses based on automated learning techniques
US20020099817A1 (en) * 1998-12-18 2002-07-25 Abbott Kenneth H. Managing interactions between computer users' context models
US6812937B1 (en) * 1998-12-18 2004-11-02 Tangis Corporation Supplying enhanced computer user's context data
US6466232B1 (en) * 1998-12-18 2002-10-15 Tangis Corporation Method and system for controlling presentation of information to a user based on the user's condition
US6801223B1 (en) * 1998-12-18 2004-10-05 Tangis Corporation Managing interactions between computer users' context models
US20010043232A1 (en) * 1998-12-18 2001-11-22 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US20010040591A1 (en) * 1998-12-18 2001-11-15 Abbott Kenneth H. Thematic response to a computer user's context, such as by a wearable personal computer
US6791580B1 (en) * 1998-12-18 2004-09-14 Tangis Corporation Supplying notifications related to supply and consumption of user context data
US6990482B1 (en) * 1999-11-01 2006-01-24 Lockheed Martin Corporation System and method for the storage and access of electronic data in a web-based computer system
US6772150B1 (en) * 1999-12-10 2004-08-03 Amazon.Com, Inc. Search query refinement using related search phrases
US6513046B1 (en) * 1999-12-15 2003-01-28 Tangis Corporation Storing and recalling information to augment human memories
US20030154476A1 (en) * 1999-12-15 2003-08-14 Abbott Kenneth H. Storing and recalling information to augment human memories
US6549915B2 (en) * 1999-12-15 2003-04-15 Tangis Corporation Storing and recalling information to augment human memories
US20020032689A1 (en) * 1999-12-15 2002-03-14 Abbott Kenneth H. Storing and recalling information to augment human memories
US6901559B1 (en) * 2000-01-06 2005-05-31 Microsoft Corporation Method and apparatus for providing recent categories on a hand-held device
US20020087525A1 (en) * 2000-04-02 2002-07-04 Abbott Kenneth H. Soliciting information based on a computer user's context
US6434550B1 (en) * 2000-04-14 2002-08-13 Rightnow Technologies, Inc. Temporal updates of relevancy rating of retrieved information in an information search system
US6618722B1 (en) * 2000-07-24 2003-09-09 International Business Machines Corporation Session-history-based recency-biased natural language document search
US20020044152A1 (en) * 2000-10-16 2002-04-18 Abbott Kenneth H. Dynamic integration of computer generated and real world images
US20030046401A1 (en) * 2000-10-16 2003-03-06 Abbott Kenneth H. Dynamically determing appropriate computer user interfaces
US20020054130A1 (en) * 2000-10-16 2002-05-09 Abbott Kenneth H. Dynamically displaying current status of tasks
US20020194164A1 (en) * 2001-06-13 2002-12-19 Microsoft Corporation Answer wizard drop-down control
US20030065724A1 (en) * 2001-09-28 2003-04-03 Openwave Systems Inc. Managing messages in unified messaging systems
US7058890B2 (en) * 2002-02-13 2006-06-06 Siebel Systems, Inc. Method and system for enabling connectivity to a data system
US20040122849A1 (en) * 2002-12-24 2004-06-24 International Business Machines Corporation Assignment of documents to a user domain

Cited By (168)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050086244A1 (en) * 2000-02-01 2005-04-21 Paul Morinville Matrixed organization apparatus
US20040239700A1 (en) * 2003-03-17 2004-12-02 Baschy Leo Martin User interface driven access control system and method
US9003295B2 (en) 2003-03-17 2015-04-07 Leo Martin Baschy User interface driven access control system and method
US7653936B2 (en) * 2003-06-25 2010-01-26 Microsoft Corporation Distributed expression-based access control
US20040268146A1 (en) * 2003-06-25 2004-12-30 Microsoft Corporation Distributed expression-based access control
US20050132288A1 (en) * 2003-12-12 2005-06-16 Kirn Kevin N. System and method for realtime messaging having image sharing feature
US7458030B2 (en) * 2003-12-12 2008-11-25 Microsoft Corporation System and method for realtime messaging having image sharing feature
US20050262054A1 (en) * 2004-05-18 2005-11-24 Nokia Corporation Item type specific structured search
US20060048068A1 (en) * 2004-08-31 2006-03-02 Michael Danninger Method and system to facilitate access to a user interface element on a user interface
US20060074904A1 (en) * 2004-09-30 2006-04-06 Mungara Ajay M Content delivery rendering engine
US20060080278A1 (en) * 2004-10-08 2006-04-13 Neiditsch Gerard D Automated paperless file management
US20060129746A1 (en) * 2004-12-14 2006-06-15 Ithink, Inc. Method and graphic interface for storing, moving, sending or printing electronic data to two or more locations, in two or more formats with a single save function
US9805005B1 (en) 2005-05-06 2017-10-31 Niresip Llc Access-control-discontinuous hyperlink handling system and methods
US20060253771A1 (en) * 2005-05-06 2006-11-09 Niresip Llc User Interface For Nonuniform Access Control System And Methods
US9176934B2 (en) 2005-05-06 2015-11-03 Leo Baschy User interface for nonuniform access control system and methods
US9129088B1 (en) 2005-06-04 2015-09-08 Leo Martin Baschy User interface driven access control system and methods for multiple users as one audience
US20070234218A1 (en) * 2006-03-29 2007-10-04 Niresip Llc User Interface For Variable Access Control System
US9202068B2 (en) * 2006-03-29 2015-12-01 Leo M. Baschy User interface for variable access control system
US10719621B2 (en) 2007-02-21 2020-07-21 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US10229284B2 (en) 2007-02-21 2019-03-12 Palantir Technologies Inc. Providing unique views of data based on changes or rules
US20100114959A1 (en) * 2007-03-19 2010-05-06 Takahisa Shirakawa File access destination control device, its method, and its computer program products
US8489634B2 (en) * 2007-03-19 2013-07-16 Nec Personal Computers, Ltd File access destination control device and method
US20100070897A1 (en) * 2008-09-15 2010-03-18 Andrew Aymeloglu Modal-less interface enhancements
US10248294B2 (en) 2008-09-15 2019-04-02 Palantir Technologies, Inc. Modal-less interface enhancements
US9383911B2 (en) * 2008-09-15 2016-07-05 Palantir Technologies, Inc. Modal-less interface enhancements
US10747952B2 (en) 2008-09-15 2020-08-18 Palantir Technologies, Inc. Automatic creation and server push of multiple distinct drafts
US20100275218A1 (en) * 2009-04-22 2010-10-28 Microsoft Corporation Controlling access of application programs to an adaptive input device
US8201213B2 (en) * 2009-04-22 2012-06-12 Microsoft Corporation Controlling access of application programs to an adaptive input device
US20110307831A1 (en) * 2010-06-10 2011-12-15 Microsoft Corporation User-Controlled Application Access to Resources
US20120322041A1 (en) * 2011-01-05 2012-12-20 Weisman Jordan K Method and apparatus for producing and delivering customized education and entertainment
US11392550B2 (en) 2011-06-23 2022-07-19 Palantir Technologies Inc. System and method for investigating large amounts of data
US10423582B2 (en) 2011-06-23 2019-09-24 Palantir Technologies, Inc. System and method for investigating large amounts of data
US20140173463A1 (en) * 2011-07-29 2014-06-19 April Slayden Mitchell system and method for providing a user interface element presence indication during a video conferencing session
US10706220B2 (en) 2011-08-25 2020-07-07 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US9880987B2 (en) 2011-08-25 2018-01-30 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US11138180B2 (en) 2011-09-02 2021-10-05 Palantir Technologies Inc. Transaction protocol for reading database values
US20130080966A1 (en) * 2011-09-22 2013-03-28 Microsoft Corporation User experience for notebook creation and interaction
US11182204B2 (en) 2012-10-22 2021-11-23 Palantir Technologies Inc. System and method for batch evaluation programs
US9898335B1 (en) 2012-10-22 2018-02-20 Palantir Technologies Inc. System and method for batch evaluation programs
US20140164940A1 (en) * 2012-12-07 2014-06-12 Displaylink (Uk) Limited Application windows and display devices
US9380431B1 (en) 2013-01-31 2016-06-28 Palantir Technologies, Inc. Use of teams in a mobile application
US10313833B2 (en) 2013-01-31 2019-06-04 Palantir Technologies Inc. Populating property values of event objects of an object-centric data model using image metadata
US10743133B2 (en) 2013-01-31 2020-08-11 Palantir Technologies Inc. Populating property values of event objects of an object-centric data model using image metadata
US10997363B2 (en) 2013-03-14 2021-05-04 Palantir Technologies Inc. Method of generating objects and links from mobile reports
US10037314B2 (en) 2013-03-14 2018-07-31 Palantir Technologies, Inc. Mobile reports
US10817513B2 (en) 2013-03-14 2020-10-27 Palantir Technologies Inc. Fair scheduling for mixed-query loads
US9965937B2 (en) 2013-03-15 2018-05-08 Palantir Technologies Inc. External malware data item clustering and analysis
US9646396B2 (en) 2013-03-15 2017-05-09 Palantir Technologies Inc. Generating object time series and data objects
US9779525B2 (en) 2013-03-15 2017-10-03 Palantir Technologies Inc. Generating object time series from data objects
US10216801B2 (en) 2013-03-15 2019-02-26 Palantir Technologies Inc. Generating data clusters
US10482097B2 (en) 2013-03-15 2019-11-19 Palantir Technologies Inc. System and method for generating event visualizations
US10977279B2 (en) 2013-03-15 2021-04-13 Palantir Technologies Inc. Time-sensitive cube
US9852195B2 (en) 2013-03-15 2017-12-26 Palantir Technologies Inc. System and method for generating event visualizations
US9852205B2 (en) 2013-03-15 2017-12-26 Palantir Technologies Inc. Time-sensitive cube
US10452678B2 (en) 2013-03-15 2019-10-22 Palantir Technologies Inc. Filter chains for exploring large data sets
US10453229B2 (en) 2013-03-15 2019-10-22 Palantir Technologies Inc. Generating object time series from data objects
US10264014B2 (en) 2013-03-15 2019-04-16 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic clustering of related data in various data structures
US10360705B2 (en) 2013-05-07 2019-07-23 Palantir Technologies Inc. Interactive data object map
US9953445B2 (en) 2013-05-07 2018-04-24 Palantir Technologies Inc. Interactive data object map
US9471249B2 (en) 2013-09-04 2016-10-18 International Business Machines Corporation Intermittent sampling of storage access frequency
US20150066960A1 (en) * 2013-09-04 2015-03-05 International Business Machines Corporation Autonomically defining hot storage and heavy workloads
US9336294B2 (en) * 2013-09-04 2016-05-10 International Business Machines Corporation Autonomically defining hot storage and heavy workloads
US9355164B2 (en) 2013-09-04 2016-05-31 International Business Machines Corporation Autonomically defining hot storage and heavy workloads
US9471250B2 (en) 2013-09-04 2016-10-18 International Business Machines Corporation Intermittent sampling of storage access frequency
US9996229B2 (en) 2013-10-03 2018-06-12 Palantir Technologies Inc. Systems and methods for analyzing performance of an entity
US10719527B2 (en) 2013-10-18 2020-07-21 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US10042524B2 (en) 2013-10-18 2018-08-07 Palantir Technologies Inc. Overview user interface of emergency call data of a law enforcement agency
US10877638B2 (en) 2013-10-18 2020-12-29 Palantir Technologies Inc. Overview user interface of emergency call data of a law enforcement agency
US9514200B2 (en) 2013-10-18 2016-12-06 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US10262047B1 (en) 2013-11-04 2019-04-16 Palantir Technologies Inc. Interactive vehicle information map
US10877953B2 (en) 2013-11-11 2020-12-29 Amazon Technologies, Inc. Processing service requests for non-transactional databases
US11100174B2 (en) 2013-11-11 2021-08-24 Palantir Technologies Inc. Simple web search
US10257196B2 (en) * 2013-11-11 2019-04-09 Amazon Technologies, Inc. Access control for a document management and collaboration system
US20170012984A1 (en) * 2013-11-11 2017-01-12 Amazon Technologies, Inc. Access control for a document management and collaboration system
US10037383B2 (en) 2013-11-11 2018-07-31 Palantir Technologies, Inc. Simple web search
US10567382B2 (en) * 2013-11-11 2020-02-18 Amazon Technologies, Inc. Access control for a document management and collaboration system
US10686788B2 (en) 2013-11-11 2020-06-16 Amazon Technologies, Inc. Developer based document collaboration
US11336648B2 (en) 2013-11-11 2022-05-17 Amazon Technologies, Inc. Document management and collaboration system
US10599753B1 (en) 2013-11-11 2020-03-24 Amazon Technologies, Inc. Document version control in collaborative environment
US10198515B1 (en) 2013-12-10 2019-02-05 Palantir Technologies Inc. System and method for aggregating data from a plurality of data sources
US11138279B1 (en) 2013-12-10 2021-10-05 Palantir Technologies Inc. System and method for aggregating data from a plurality of data sources
US9734217B2 (en) 2013-12-16 2017-08-15 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10805321B2 (en) 2014-01-03 2020-10-13 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10230746B2 (en) 2014-01-03 2019-03-12 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10540404B1 (en) 2014-02-07 2020-01-21 Amazon Technologies, Inc. Forming a document collection in a document management and collaboration system
US10691877B1 (en) 2014-02-07 2020-06-23 Amazon Technologies, Inc. Homogenous insertion of interactions into documents
US10402054B2 (en) 2014-02-20 2019-09-03 Palantir Technologies Inc. Relationship visualizations
US10795723B2 (en) 2014-03-04 2020-10-06 Palantir Technologies Inc. Mobile tasks
US10180977B2 (en) 2014-03-18 2019-01-15 Palantir Technologies Inc. Determining and extracting changed data from a data source
US10871887B2 (en) 2014-04-28 2020-12-22 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive access of, investigation of, and analysis of data objects stored in one or more databases
US9857958B2 (en) 2014-04-28 2018-01-02 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive access of, investigation of, and analysis of data objects stored in one or more databases
US11341178B2 (en) 2014-06-30 2022-05-24 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US10162887B2 (en) 2014-06-30 2018-12-25 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US10180929B1 (en) 2014-06-30 2019-01-15 Palantir Technologies, Inc. Systems and methods for identifying key phrase clusters within documents
US9619557B2 (en) 2014-06-30 2017-04-11 Palantir Technologies, Inc. Systems and methods for key phrase characterization of documents
US10798116B2 (en) 2014-07-03 2020-10-06 Palantir Technologies Inc. External malware data item clustering and analysis
US9256664B2 (en) 2014-07-03 2016-02-09 Palantir Technologies Inc. System and method for news events detection and visualization
US10929436B2 (en) 2014-07-03 2021-02-23 Palantir Technologies Inc. System and method for news events detection and visualization
US9998485B2 (en) 2014-07-03 2018-06-12 Palantir Technologies, Inc. Network intrusion data item clustering and analysis
US10075492B2 (en) * 2014-08-26 2018-09-11 Ricoh Company Terminal apparatus, screen sharing method, program, and screen sharing system
US20160065633A1 (en) * 2014-08-26 2016-03-03 Ricoh Company, Ltd. Terminal apparatus, screen sharing method, program, and screen sharing system
US10866685B2 (en) 2014-09-03 2020-12-15 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US9880696B2 (en) 2014-09-03 2018-01-30 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US9454281B2 (en) 2014-09-03 2016-09-27 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10432603B2 (en) 2014-09-29 2019-10-01 Amazon Technologies, Inc. Access to documents in a document management and collaboration system
US10360702B2 (en) 2014-10-03 2019-07-23 Palantir Technologies Inc. Time-series analysis system
US10664490B2 (en) 2014-10-03 2020-05-26 Palantir Technologies Inc. Data aggregation and analysis system
US9501851B2 (en) 2014-10-03 2016-11-22 Palantir Technologies Inc. Time-series analysis system
US11004244B2 (en) 2014-10-03 2021-05-11 Palantir Technologies Inc. Time-series analysis system
US9767172B2 (en) 2014-10-03 2017-09-19 Palantir Technologies Inc. Data aggregation and analysis system
US9984133B2 (en) 2014-10-16 2018-05-29 Palantir Technologies Inc. Schematic and database linking system
US11275753B2 (en) 2014-10-16 2022-03-15 Palantir Technologies Inc. Schematic and database linking system
US10853338B2 (en) 2014-11-05 2020-12-01 Palantir Technologies Inc. Universal data pipeline
US9946738B2 (en) 2014-11-05 2018-04-17 Palantir Technologies, Inc. Universal data pipeline
US10191926B2 (en) 2014-11-05 2019-01-29 Palantir Technologies, Inc. Universal data pipeline
US9558352B1 (en) 2014-11-06 2017-01-31 Palantir Technologies Inc. Malicious software detection in a computing system
US10728277B2 (en) 2014-11-06 2020-07-28 Palantir Technologies Inc. Malicious software detection in a computing system
US10135863B2 (en) 2014-11-06 2018-11-20 Palantir Technologies Inc. Malicious software detection in a computing system
US9898528B2 (en) 2014-12-22 2018-02-20 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US9367872B1 (en) 2014-12-22 2016-06-14 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US10447712B2 (en) 2014-12-22 2019-10-15 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9589299B2 (en) 2014-12-22 2017-03-07 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US10157200B2 (en) 2014-12-29 2018-12-18 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9870389B2 (en) 2014-12-29 2018-01-16 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US10127021B1 (en) 2014-12-29 2018-11-13 Palantir Technologies Inc. Storing logical units of program code generated using a dynamic programming notebook user interface
US10838697B2 (en) 2014-12-29 2020-11-17 Palantir Technologies Inc. Storing logical units of program code generated using a dynamic programming notebook user interface
US9335911B1 (en) 2014-12-29 2016-05-10 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US10552998B2 (en) 2014-12-29 2020-02-04 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9870205B1 (en) 2014-12-29 2018-01-16 Palantir Technologies Inc. Storing logical units of program code generated using a dynamic programming notebook user interface
US9727560B2 (en) 2015-02-25 2017-08-08 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US10474326B2 (en) 2015-02-25 2019-11-12 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US10459619B2 (en) 2015-03-16 2019-10-29 Palantir Technologies Inc. Interactive user interfaces for location-based data analysis
US9891808B2 (en) 2015-03-16 2018-02-13 Palantir Technologies Inc. Interactive user interfaces for location-based data analysis
US9886467B2 (en) 2015-03-19 2018-02-06 Plantir Technologies Inc. System and method for comparing and visualizing data entities and data entity series
US9454785B1 (en) 2015-07-30 2016-09-27 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US11501369B2 (en) 2015-07-30 2022-11-15 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US10223748B2 (en) 2015-07-30 2019-03-05 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US9996595B2 (en) 2015-08-03 2018-06-12 Palantir Technologies, Inc. Providing full data provenance visualization for versioned datasets
US10484407B2 (en) 2015-08-06 2019-11-19 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US10444941B2 (en) 2015-08-17 2019-10-15 Palantir Technologies Inc. Interactive geospatial map
US10489391B1 (en) 2015-08-17 2019-11-26 Palantir Technologies Inc. Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface
US10444940B2 (en) 2015-08-17 2019-10-15 Palantir Technologies Inc. Interactive geospatial map
US10853378B1 (en) 2015-08-25 2020-12-01 Palantir Technologies Inc. Electronic note management via a connected entity graph
US11150917B2 (en) 2015-08-26 2021-10-19 Palantir Technologies Inc. System for data aggregation and analysis of data from a plurality of data sources
US10706434B1 (en) 2015-09-01 2020-07-07 Palantir Technologies Inc. Methods and systems for determining location information
US9965534B2 (en) 2015-09-09 2018-05-08 Palantir Technologies, Inc. Domain-specific language for dataset transformations
US11080296B2 (en) 2015-09-09 2021-08-03 Palantir Technologies Inc. Domain-specific language for dataset transformations
US10296617B1 (en) 2015-10-05 2019-05-21 Palantir Technologies Inc. Searches of highly structured data
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US10678860B1 (en) 2015-12-17 2020-06-09 Palantir Technologies, Inc. Automatic generation of composite datasets based on hierarchical fields
US10540061B2 (en) 2015-12-29 2020-01-21 Palantir Technologies Inc. Systems and interactive user interfaces for automatic generation of temporal representation of data objects
US9823818B1 (en) 2015-12-29 2017-11-21 Palantir Technologies Inc. Systems and interactive user interfaces for automatic generation of temporal representation of data objects
US10437612B1 (en) 2015-12-30 2019-10-08 Palantir Technologies Inc. Composite graphical interface with shareable data-objects
US10698938B2 (en) 2016-03-18 2020-06-30 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
US10698594B2 (en) 2016-07-21 2020-06-30 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10324609B2 (en) 2016-07-21 2019-06-18 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10719188B2 (en) 2016-07-21 2020-07-21 Palantir Technologies Inc. Cached database and synchronization system for providing dynamic linked panels in user interface
US10437840B1 (en) 2016-08-19 2019-10-08 Palantir Technologies Inc. Focused probabilistic entity resolution from multiple data sources
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US10460602B1 (en) 2016-12-28 2019-10-29 Palantir Technologies Inc. Interactive vehicle information mapping system
US10956406B2 (en) 2017-06-12 2021-03-23 Palantir Technologies Inc. Propagated deletion of database records and derived data
US10403011B1 (en) 2017-07-18 2019-09-03 Palantir Technologies Inc. Passing system with an interactive user interface
US11599369B1 (en) 2018-03-08 2023-03-07 Palantir Technologies Inc. Graphical user interface configuration system
US10754822B1 (en) 2018-04-18 2020-08-25 Palantir Technologies Inc. Systems and methods for ontology migration
US10885021B1 (en) 2018-05-02 2021-01-05 Palantir Technologies Inc. Interactive interpreter and graphical user interface

Also Published As

Publication number Publication date
WO2005003895A3 (en) 2005-08-25
KR20060023578A (en) 2006-03-14
JP2007524909A (en) 2007-08-30
EP1636686A2 (en) 2006-03-22
KR101137179B1 (en) 2012-04-19
TW200513861A (en) 2005-04-16
JP2011150725A (en) 2011-08-04
WO2005003895A8 (en) 2005-12-29
US20050256842A1 (en) 2005-11-17
WO2005003895A2 (en) 2005-01-13
US7636890B2 (en) 2009-12-22
CN1813233B (en) 2010-05-05
JP4795945B2 (en) 2011-10-19
EP1636686A4 (en) 2009-09-16
CN1813233A (en) 2006-08-02
TWI352904B (en) 2011-11-21

Similar Documents

Publication Publication Date Title
US7636890B2 (en) User interface for controlling access to computer objects
US7930301B2 (en) System and method for searching computer files and returning identified files and associated files
US20040255301A1 (en) Context association schema for computer system architecture
US20050028168A1 (en) Sharing computer objects with associations
US10182025B2 (en) Systems and methods for a search-based email client
US7441194B2 (en) Calendar-based user interface system
AU2005231112B2 (en) Methods and systems for structuring event data in a database for location and retrieval
US7333976B1 (en) Methods and systems for processing contact information
US8965873B2 (en) Methods and systems for eliminating duplicate events
US20120303716A1 (en) Collaboration Software With Real-Time Synchronization
US20060112081A1 (en) Storing searches in an e-mail folder
JP2009211403A (en) File search program
US20200065401A1 (en) User-specific dynamic context folders

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MARCJAN, CEZARY;CHENG, LILI;TURSKI, ANDRZEJ;REEL/FRAME:014257/0257

Effective date: 20030626

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date: 20141014