US20030204485A1 - Gathering change data from information provider network indicative of event changes at information provider node relative to pre-stored information in the database by information collection agents - Google Patents
Gathering change data from information provider network indicative of event changes at information provider node relative to pre-stored information in the database by information collection agents Download PDFInfo
- Publication number
- US20030204485A1 US20030204485A1 US10/407,361 US40736103A US2003204485A1 US 20030204485 A1 US20030204485 A1 US 20030204485A1 US 40736103 A US40736103 A US 40736103A US 2003204485 A1 US2003204485 A1 US 2003204485A1
- Authority
- US
- United States
- Prior art keywords
- information
- server
- information provider
- recited
- provider node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9538—Presentation of query results
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
- Y10S707/99935—Query augmenting and refining, e.g. inexact access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
- Y10S707/99936—Pattern matching access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99943—Generating database or data structure, e.g. via user interface
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
- Y10S707/99945—Object-oriented database structure processing
Definitions
- This invention relates generally to a computer network information management system and method, and more particularly, a system and method for gathering, cataloging, storing, reporting and retrieving information from the Internet and intranets.
- a disadvantage of the Internet is that it can be difficult to locate the information that is being provided. It is well known to use search engines to find information, wherein the user can enter keywords relating to the information which is being sought.
- Traditional search engines gather information by submission from the Web site creator and/or by actively retrieving information from Web site on the Internet.
- the search engines utilize “spiders” or “crawlers” to visit a Web page, read it and record the words on each page. The spider then makes a list of which words appear on which pages and returns those pages whenever a user types in that keyword. Generally, the more times a keyword appears on a page, the higher it ranks on a list of results.
- search engines often produce skewed results. Many Web site providers “wallpaper” their pages, loading them up with keywords so the page will jump to the top of the search list results. Also, very different results can be obtained merely by changing the order and/or spelling of the keywords.
- search engines Another disadvantage of search engines is that the information that is available on the Internet is identified and referenced by search engines themselves, which means that new or updated information may not appear straightaway. Old references will remain on a search engine and will not be automatically removed. Thus, the user could be provided with a list of information which is either out of date or unavailable.
- Another disadvantage of search engines is that new providers of information can find it difficult to get their information registered.
- search engines and directories that are prevalent on the Internet have the same short comings when applied to intranets. Additionally, search engines and directories are not equipped to handle the wider range of information that resides in corporate intranets such as email, databases, and specially formatted documents (e.g., MS Word, Power Point, Word Perfect).
- corporate intranets such as email, databases, and specially formatted documents (e.g., MS Word, Power Point, Word Perfect).
- the present invention provides a system for managing information on a computer network having a server by gathering summary data from the information provider node indicative of event changes at the information provider node by information collection agents extracting information from the information provider node based on the summary data; transmitting the extracted information to the server; storing the transmitted information in an event database; cataloging the stored information into hierarchical categories; retrieving with a delivery agent based upon the hierarchical categories selected information from the stored information; and transmitting the selected information to the client node.
- FIG. 1 is a block diagram of a computer network incorporating the system of the present invention.
- FIG. 2 is a block diagram describing the action/reaction chain of events in the present invention.
- FIG. 3 is a block diagram describing the link chain of events in the present invention.
- FIG. 4 is a block diagram describing the topology of the present invention.
- the present invention provides a novel computer network information management system and method for gathering, cataloging, storing, reporting and retrieving information from information sources on the Internet and intranets.
- system 20 By deploying system 20 an organization can ensure that all the knowledge within it is available to all its members.
- System 20 's unique set of software components communicate and work with each other to produce a feature rich solution without making demands on either IT staff or any other departments.
- FIG. 1 depicts the general structure a computer network 10 where the present invention is employed.
- System 20 of the present invention includes a system server 30 which is a general purpose computer configured as an Internet server with a wide array of software modules 100 .
- System server 30 includes a commercially available operating system (preferably Microsoft Windows NT), commercially available Internet server software (preferably MS Internet Information server) and commercially available database software (preferably Microsoft SQL server).
- System server 30 works preferably with the Microsoft® Windows® NT operating system. However, using customized agents or extracting information from web links, information can be extracted from any type of remote system regardless of operating system. Because the interface to system 20 may be viewed using a standard web browser, system 20 may be accessed by any system capable of running a web enabled browser. System server 30 uses NT security for determining who can and who may not access system 20 . This information is extracted from the NT security system by the colony User Manager program.
- the core system is implemented as a number of standard Dynamic Link Libraries (DLLs) utilizing Microsoft's ISAPI standard with Internet Information Server.
- DLLs Dynamic Link Libraries
- the DLLs use information passed to them through IIS to interrogate central server database 40 and build web pages that are passed back through IIS. This information is then available through a client-side web browser.
- System server 30 uses Microsoft® SQL Server to provide the necessary database functionality.
- the ISAPI applications connect to SQL using ODBC.
- the standard SQL Server security model provides security.
- System server 30 utilizes Microsoft's® Internet Information Server and SQL Server to manage all the information submitted from the organization.
- System 20 has been designed to work with and get the most from the above commercially available products.
- scalable technology system enables organizations to get the most from their information and brings enterprise wide knowledge sharing within reach of all businesses while causing minimal impact on existing information systems, thereby protecting current investments.
- system 20 works with existing systems and provides a methodology for getting existing information into a central repository and delivering that content to those employees who need it.
- computer network 10 comprises a plurality of nodes which are client computers 50 (e.g., employees desktop computers in a corporate intranet or a home user's computer that is connected to the Internet) and information provider computers 60 (e.g., the customer service database in a corporate intranet or a Web site server on the Internet) connected to an interconnection network 70 (such as an ethernet or the Internet).
- client computers 50 e.g., employees desktop computers in a corporate intranet or a home user's computer that is connected to the Internet
- information provider computers 60 e.g., the customer service database in a corporate intranet or a Web site server on the Internet
- interconnection network 70 such as an ethernet or the Internet
- a broker computer or system server 30 is connected to compute network 10 and if connected to the Internet has its own URL.
- System server 30 has catalog database 45 in central server database 40 which is split into a plurality of subject matter and sub-headings. For example, there may be a heading for recreational activities, under this there may be a heading for sports having a sub-heading for motor sports. Thus, the headings are arranged in a hierarchical fashion.
- agents are autonomous portions of code (i.e., software modules) that do not require human interaction and can communicate and change state on its own based upon its goal.
- a) Directory Monitors 112 These agents monitor events throughout the enterprise and react when anything relevant occurs. They are the basic sensors of system 20 continuously watching over the activity within the organization.
- E-Mail Readers 114 These agents read e-mail messages from specified mailboxes and post the messages to system 20 server.
- SQL Extractors 116 These agents run SQL queries on existing databases. A results page is produced and sent to system 20 server. When the result set from a query changes, SQL extractor 116 will send the new results to system server.
- Event Coordinator Agents 120 These are fed event data by information collection agents 110 . They react to the event data given to them and take the appropriate action to extract and transmit the desired information identified by the event data back to system 30 .
- Link Agents 130 These follow web links and extract information and pass it back to system 20 server.
- Catalog agent 140 This agent uses fuzzy logic to determine the proper categories information obtained from information collection agents 110 .
- Web Builder 150 A simple client program which allows employees with no knowledge of HTML to build simple pages and upload information to the Intranet.
- Configuration utility 160 This utility allows configuration of the main system attributes.
- Implementation Manager 170 This module assists with the initial setting up of categories for use within system 20 .
- System 20 management suite allows system 20 to be set up so that it models both the organizational structure and the physical locations. This aids in the location and distribution information.
- User Manager 190 The User Manager controls access to all data within system 12 . This is completely integrated with Microsoft® Windows NT operating system.
- Delivery Agents 200 System 20 uses agent technology to deliver all information to those employees to whom it is relevant.
- Global Searching module 210 System 20 allows global searching on all content in central server database 40 .
- Category Searching module 220 System 20 allows searching by category.
- the first stage for system 20 is to gather the information content from existing information sources.
- the information gathering process is depicted in FIG. 1.
- System 20 carries out the following steps:
- Information collection agents 110 detect information (directory monitor 112 detects directory/file change events, email reader 124 detects new email and SQL extractor 116 queries databases for changes in the data)
- Information collection agents 110 communicate the change events to event coordinators 120
- Event coordinators 120 extract the information
- Event coordinators 120 transmit the extracted information to system server 30
- System server 30 distributes to all employee/users at clients 50 that request the information.
- Directory monitors 112 are autonomous agents that directly monitor changes such as additions, modifications, and deletions from a directory structure on a network. Unlike crawlers and spiders, this ensures that the content held by system database 14 is always current. Each directory monitor 112 knows about the current state of the directory (or directories) being monitored. Each time a change occurs an event is logged by directory monitor 112 that communicates this change to its event database.
- Directory monitor 112 can monitor any directory that is visible to it, these may be shared directories on any node on computer network 10 or any directory on the computer on which the agent is running. Also, directory monitor 112 can monitor documents of some or all file types, including HTML, Microsoft® Access, Microsoft® Powerpoint, Microsoft® Word, Microsoft® Excel or plain text documents.
- System 20 can process 270 different file types through the use of Outside In technology from Inso. All commonly used file types can be handled without the need to have the application which created the file available.
- Content monitored by directory monitors 112 is mapped directly to an appropriate category within central server database 40 . Therefore, information can be automatically classified by directory monitor 112 based on the location from which it originated.
- system 20 will automatically place the information in the category containing similar documents utilizing catalog agent 140 , which is discussed in detail below.
- event coordinator agent 120 When new events are detected and written to the event log, control of the process switches to event coordinator agent 120 .
- Email reader agents 114 can be used to implement automated customer support or any other system where rapid, intelligent responses are required to inbound messages. When new events are detected and written to the event log, control of the process switches to event coordinator agent 120 .
- Email reader 114 poles the POP account it has been pointed at on a particular server. If there are no messages it stops. If there are messages it reads the messages and posts them back to system server 30 either to a specific category (specified at the time the agent was set up) or uses the usual method to determine the “best fit” category for the incoming information
- These agents extract data from SQL databases using queries on a regular timed basis. These can be used to monitor trends or to notify users about particular trigger events that may occur. The end user does not require any knowledge of SQL queries and does not require access to the database from where the data is extracted. Only SQL extractor agent 116 needs access. Results from SQL extractors 116 are published as HTML documents in the categories specified by the administrator. When new events are detected and written to the event log, control of the process switches to event coordinator agent 120 .
- Event coordinator agent 120 is a background process that monitors the generation of events by information collection agents 110 . Event coordinator agents 120 are responsible for deciding what method to use for the extraction of data from the source information and transmitting that data back to central server database 40 .
- event coordinator agent 120 may deal with the extraction using internal filters, or may use Microsoft's Component Object Model (COM) automation to load the required application and extract data using the accessible objects within that application.
- COM Component Object Model
- event coordinator agent 120 communicates with system server 30 and transmits the extracted information to system server 30 for processing. As well as sending the raw data extract, event coordinator agent 120 also provides information for system server 30 enabling it to place the data sent into the appropriate category. In order to do this, event coordinator agent 120 has an HTTP link to system server 30 .
- Information collection agents 110 and event coordinators 120 work together at the production end of system 20 to extract and update information for central server database 40 without any intrusion on the actions of the producers of that information. They require no action by the producer of the information. Once set up by a system administrator they act without the user of MS Word, for example, being aware of their actions. The employees who produce this information are not required to perform any additional actions, do require any additional software, require no training and need not even be aware that this process is occurring.
- system 20 also provides a method for following web site links and placing the content of individual web pages into categories within central server database 40 , as depicted in FIG. 3.
- Link agents 130 follow web links as specified by system 20 administrator and update links as often as requested to do so.
- the activities of link agents 130 can be restricted to particular web sites by specifying that only links with a known base URL be followed. This prevents link agents 130 from following links to external sites.
- Each time link agent 130 loads a new page it extracts the text from the page and sends it back to system server 30 using HTTP.
- System server 30 matches the information transmitted against the properties stored for each category and places the content into the category that gives the best match using catalog agent 140 .
- System 20 utilizes link agents 130 to carry out the following steps as depicted in FIG. 3:
- Link agent 150 is timer drive to check the content of web site 60
- link agent 150 If link agent 150 detects changes, it collects the information
- System server 30 distributes the information to all employees/users at clients 50
- Link agents 130 have the inherent restrictions of all crawler based technology in that they cannot update information in real time, and the more often they are run the more bandwidth they consume. Their main use is where the underlying directory structure is either unavailable or meaningless. Bandwidth consumption is kept to a minimum by restricting the subsequent access to pages so that only those that have changed are reprocessed.
- This process uses a number of pattern matching and fuzzy logic algorithms to assign the information from event coordinators 120 and link agents 130 to the correct categories. Additionally, new categories are created dynamically when need. The logic is described below.
- TWL training word list
- Algorithm is defined as:
- RF is less than the relevance threshold (RT) (This value is set by an optimization process. Different values are tested until the best one is identified. The usual figure is around 25%.) then:
- the method applied by catalog agent 140 can be used to automatically categorize documents, email and database information but is also used to enable automated responses to inbound messages or emails. The same technique is also applied to matching any text based descriptive information. Essentially, the method here defined is generic to the type of information being categorized. One of ordinary skill in the art would be able to easily adapt the method described above for each particular type of information.
- the categorization process can be restricted by system 20 administrator. In essence this means that, where it is known that information from a particular site will all belong in some high level category, only sub categories of that high level category will be used to determine the end placing of the information from this site.
- System 20 includes web publishing tool. With no knowledge of HTML or web page building, web builder 150 allows employees to build web sites and publish them on the Intranet with ease. An example of a commercially available web page builder in Microsoft Frontpage. Such as commercially available software can be integrated into System 20 .
- Web builder 150 integrates completely with system 20 . Once a web site has been built the publisher decides which category she wishes to place the information in. With the press of a button, the information is uploaded to the holding server, transferred to the web server, placed in the correct system category, and all employees who are subscribed to that category will be notified of the existence of new content. In the event no category is specified, catalog agent 140 makes the determination.
- System 20 can be configured easily to work in any environment supporting HTTP. All the main attributes of system 20 can be altered easily using the system server configuration utility 160 . These include the location of the server side applications, the location of all the images and documents used by system 20 and the location of system 20 Homepage.
- System 20 provides implementation manager 170 to assist with the initial setting up of categories for use within system 20 .
- the program also has various validation procedures for checking dependencies and categories within system 20 .
- System 20 includes category manager 180 that allows structural changes to the system model. It also provides procedures for maintaining information details, chat information, messages, agents and all information associated with a particular category. This program provides the administrator with a tool for moving information from one category to another updating all dependencies automatically as this occurs.
- category manager 180 Another feature of category manager 180 is the association of particular phrases and keywords with a category. This information is used internally by system 20 to determine the location of information submitted to system 20 . These phrases and keywords can be assigned relevance according to boolean attributes given to them. By using this information to compute a ‘relevance factor’, system 20 is able to best guess the category in which a particular piece of information belongs using fuzzy logic. Also, the administrator utilizes category manager 180 to set the parameters associated with catalog agent 140 .
- system 20 automatically generates keywords and phrases from the full category name. So, if a category is created called Lawyers/Patent Attorney/California it would assign the phrase “Patent Attorney” to the “should contain phrase” list and it would assign the keywords “Lawyers”, “Patent”, “Attorney”, “California” to the “should contain keywords” list.
- the system 20 When the system 20 receives information from whatever source, it uses the algorithm for catalog agent 140 as defined for context extraction to establish its true home category.
- the keywords and phrases above provide the values for the Training Word List (TWL).
- TWL Training Word List
- System 20 contains a rich set of security and access control functions linked closely to those of Windows NT.
- User manager 190 provides a set of features which allows system 20 administrator to assign users and groups access to specific categories only. System 20 links the categories to NT users and groups and only those users with correct permissions will be able to see information in system 20 . Users who have been deleted from NT will automatically be removed from system 20 each time user manager 190 is run.
- Access to information is restricted by User Manager 220 so only information which should be available to particular employees is available. These access controls are handled dynamically so when an employee's access rights are altered, the information that is delivered to them is altered at the same time by system 20 . The delivery of content is depicted in FIG. 4.
- System 20 contains many features for the delivery of content to specific employees based on their individual requirements by personal delivery agents 200 . This feature is simple to use but extremely powerful. It requires no client side software with all functionality being provided through a standard web browser. Those who wish to monitor activity within a particular category or group of categories can do now do so with ease.
- Individual personal delivery agents 200 are provided for employees that allow each person to subscribe to individual system categories. This enables every person within an organization to be informed of all changes to information that is relevant to them. Every time an employee accesses their personal system page they are presented with all updates that have occurred in subscribed groups. Because this information is contained in a single web page they are not swamped with update notifications.
- system 20 is able to keep employees informed about updates that occur in their specific areas of interest without generating excessive notifications and additional workload.
- Personal delivery agents 200 handle all of this.
- the software is invisible to the individual employee and requires no maintenance on their part. All they have to do is select their interest areas the rest is handled automatically by personal delivery agent 200 .
- Each individual user can also make use of the Link agent robots for research.
- This research can assist with projects or competitor intelligence by keeping the individual informed of changes in the project or a competitor's web site as the changes occur.
- the robot can be instructed to search the web for any subject and return to the user any relevant information it finds. Again, the software rather than the user does the work.
- This feature aids employees by providing results in a context oriented fashion. Often keyword searches produce irrelevant results. Keywords can be present in documents that are not in the context required by the user. By presenting the results by context system 20 aids the location of documents which are truly relevant to the individual's requirements.
- System 20 supports a number of search types allowing for different combinations of keywords.
- category searching module 220 supports keyword searching at the category level with category searching module 220 . This allows narrow band searching for specific information within a category. This feature is functionally the same as global searching, except that in this instance the search only looks at information within the selected category. All search functions will only return information for which the particular employee has the required permissions. Information and categories that they should not see will not be presented to them.
Abstract
The present invention provides a system for managing information on a computer network having a server by gathering summary data from the information provider node indicative of event changes at the information provider node by information collection agents extracting information from the information provider node based on the summary data; transmitting the extracted information to the server; storing the transmitted information in an event database; cataloging the stored information into hierarchical categories; retrieving with a delivery agent based upon the hierarchical categories selected information from the stored information; and transmitting the selected information to the client node.
Description
- This invention relates generally to a computer network information management system and method, and more particularly, a system and method for gathering, cataloging, storing, reporting and retrieving information from the Internet and intranets.
- It is well known to network remote computers. The largest current computer network in the world is the Internet, in which users are able to access information created by Web site providers that are located all over the world.
- A disadvantage of the Internet is that it can be difficult to locate the information that is being provided. It is well known to use search engines to find information, wherein the user can enter keywords relating to the information which is being sought. Traditional search engines gather information by submission from the Web site creator and/or by actively retrieving information from Web site on the Internet. The search engines utilize “spiders” or “crawlers” to visit a Web page, read it and record the words on each page. The spider then makes a list of which words appear on which pages and returns those pages whenever a user types in that keyword. Generally, the more times a keyword appears on a page, the higher it ranks on a list of results.
- However, search engines often produce skewed results. Many Web site providers “wallpaper” their pages, loading them up with keywords so the page will jump to the top of the search list results. Also, very different results can be obtained merely by changing the order and/or spelling of the keywords. Another disadvantage of search engines is that the information that is available on the Internet is identified and referenced by search engines themselves, which means that new or updated information may not appear straightaway. Old references will remain on a search engine and will not be automatically removed. Thus, the user could be provided with a list of information which is either out of date or unavailable. Another disadvantage of search engines is that new providers of information can find it difficult to get their information registered.
- An alternative to pure search engine schemes, are directories which use pre-defined hierarchical categories. Information available on the Internet is catalogued and assigned to the pre-defined categories which may be accessed via either a search engine or by a user clicking through the hierarchy tree.
- The popularity of the Internet has given rise to intranets founded on the same technological principles underlying the Internet. The introduction of Internet technology to complex corporate intranets has brought a new dimension to the publishing and delivering of information throughout the business world. This new development has created a situation where it is much easier for employees to produce meaningful, well presented, understandable documents targeted at a company wide audience.
- With this ability comes a number of problems. The same problems encountered with the Intranet are found with intranets. Additionally, new problems include additional workload to publish information, IT resource to install client software, employee training, changing existing work practices, information overload, access controls, de-centralization of information, difficulty in locating information, delivering information to the right targets, removing obsolete information, document version control, and validity of information.
- The search engines and directories that are prevalent on the Internet have the same short comings when applied to intranets. Additionally, search engines and directories are not equipped to handle the wider range of information that resides in corporate intranets such as email, databases, and specially formatted documents (e.g., MS Word, Power Point, Word Perfect).
- What businesses require is a single solution that allows them to make the most of the benefits presented by Intranet technology without the long list of problems. The present invention solves these problems by:
- 1. Providing a method of allowing employees to continue to produce information as they already do.
- 2. Publishing that content without any additional workload to those employees.
- 3. Performing all tasks without special client software.
- 4. Gathering information together at a central location.
- 5. Delivering information in a timely and none intrusive fashion to its target audience.
- 6. Assisting in finding required information.
- 7. Preventing access to confidential information.
- 8. Maintaining all data automatically.
- The present invention provides a system for managing information on a computer network having a server by gathering summary data from the information provider node indicative of event changes at the information provider node by information collection agents extracting information from the information provider node based on the summary data; transmitting the extracted information to the server; storing the transmitted information in an event database; cataloging the stored information into hierarchical categories; retrieving with a delivery agent based upon the hierarchical categories selected information from the stored information; and transmitting the selected information to the client node.
- The present invention has other objects and advantages which are set forth in the description of the Best Mode of Carrying Out the Invention. The features and advantages described in the specification, however, are not all inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the art in view of the drawings, specification, and claims herein.
- FIG. 1 is a block diagram of a computer network incorporating the system of the present invention.
- FIG. 2 is a block diagram describing the action/reaction chain of events in the present invention.
- FIG. 3 is a block diagram describing the link chain of events in the present invention.
- FIG. 4 is a block diagram describing the topology of the present invention.
- The present invention provides a novel computer network information management system and method for gathering, cataloging, storing, reporting and retrieving information from information sources on the Internet and intranets. By deploying
system 20 an organization can ensure that all the knowledge within it is available to all its members.System 20's unique set of software components communicate and work with each other to produce a feature rich solution without making demands on either IT staff or any other departments. - FIG. 1 depicts the general structure a
computer network 10 where the present invention is employed.System 20 of the present invention includes asystem server 30 which is a general purpose computer configured as an Internet server with a wide array of software modules 100.System server 30 includes a commercially available operating system (preferably Microsoft Windows NT), commercially available Internet server software (preferably MS Internet Information server) and commercially available database software (preferably Microsoft SQL server). -
System server 30 works preferably with the Microsoft® Windows® NT operating system. However, using customized agents or extracting information from web links, information can be extracted from any type of remote system regardless of operating system. Because the interface tosystem 20 may be viewed using a standard web browser,system 20 may be accessed by any system capable of running a web enabled browser.System server 30 uses NT security for determining who can and who may not accesssystem 20. This information is extracted from the NT security system by the colony User Manager program. - The core system is implemented as a number of standard Dynamic Link Libraries (DLLs) utilizing Microsoft's ISAPI standard with Internet Information Server. The DLLs use information passed to them through IIS to interrogate
central server database 40 and build web pages that are passed back through IIS. This information is then available through a client-side web browser. -
System server 30 uses Microsoft® SQL Server to provide the necessary database functionality. The ISAPI applications connect to SQL using ODBC. The standard SQL Server security model provides security.System server 30 utilizes Microsoft's® Internet Information Server and SQL Server to manage all the information submitted from the organization. -
System 20 has been designed to work with and get the most from the above commercially available products. By using industry standard, scalable technology system enables organizations to get the most from their information and brings enterprise wide knowledge sharing within reach of all businesses while causing minimal impact on existing information systems, thereby protecting current investments. - Instead of redirecting the current information systems strategy and forcing new working practices to be implemented,
system 20 works with existing systems and provides a methodology for getting existing information into a central repository and delivering that content to those employees who need it. - As depicted in FIG. 1,
computer network 10 comprises a plurality of nodes which are client computers 50 (e.g., employees desktop computers in a corporate intranet or a home user's computer that is connected to the Internet) and information provider computers 60 (e.g., the customer service database in a corporate intranet or a Web site server on the Internet) connected to an interconnection network 70 (such as an ethernet or the Internet). - In accordance with the present invention a broker computer or
system server 30 is connected to computenetwork 10 and if connected to the Internet has its own URL.System server 30 hascatalog database 45 incentral server database 40 which is split into a plurality of subject matter and sub-headings. For example, there may be a heading for recreational activities, under this there may be a heading for sports having a sub-heading for motor sports. Thus, the headings are arranged in a hierarchical fashion. - The objectives of the present invention are carried out by software components100 identified and are described in detail below. Some of software components are agents, which are autonomous portions of code (i.e., software modules) that do not require human interaction and can communicate and change state on its own based upon its goal.
- 1.
Information Collection Agents 110 - a) Directory Monitors112: These agents monitor events throughout the enterprise and react when anything relevant occurs. They are the basic sensors of
system 20 continuously watching over the activity within the organization. - b) E-Mail Readers114: These agents read e-mail messages from specified mailboxes and post the messages to
system 20 server. - c) SQL Extractors116: These agents run SQL queries on existing databases. A results page is produced and sent to
system 20 server. When the result set from a query changes,SQL extractor 116 will send the new results to system server. - 2. Event Coordinator Agents120: These are fed event data by
information collection agents 110. They react to the event data given to them and take the appropriate action to extract and transmit the desired information identified by the event data back tosystem 30. - 3. Link Agents130: These follow web links and extract information and pass it back to
system 20 server. - 4. Catalog agent140: This agent uses fuzzy logic to determine the proper categories information obtained from
information collection agents 110. - 5. Web Builder150: A simple client program which allows employees with no knowledge of HTML to build simple pages and upload information to the Intranet.
- 6. Configuration utility160: This utility allows configuration of the main system attributes.
- 7. Implementation Manager170: This module assists with the initial setting up of categories for use within
system 20. - 8. Category Management180:
System 20 management suite allowssystem 20 to be set up so that it models both the organizational structure and the physical locations. This aids in the location and distribution information. - 9. User Manager190: The User Manager controls access to all data within system 12. This is completely integrated with Microsoft® Windows NT operating system.
- 10. Delivery Agents200:
System 20 uses agent technology to deliver all information to those employees to whom it is relevant. - 11. Global Searching module210:
System 20 allows global searching on all content incentral server database 40. - 12. Category Searching module220:
System 20 allows searching by category. - The first stage for
system 20 is to gather the information content from existing information sources. The information gathering process is depicted in FIG. 1. -
System 20 carries out the following steps: -
Information collection agents 110 detect information (directory monitor 112 detects directory/file change events, email reader 124 detects new email andSQL extractor 116 queries databases for changes in the data) -
Information collection agents 110 communicate the change events toevent coordinators 120 -
Event coordinators 120 extract the information -
Event coordinators 120 transmit the extracted information tosystem server 30 -
System server 30 distributes to all employee/users atclients 50 that request the information. - The details of those agents are discussed below.
-
Directory Monitors 112 - Directory monitors112 are autonomous agents that directly monitor changes such as additions, modifications, and deletions from a directory structure on a network. Unlike crawlers and spiders, this ensures that the content held by system database 14 is always current. Each directory monitor 112 knows about the current state of the directory (or directories) being monitored. Each time a change occurs an event is logged by
directory monitor 112 that communicates this change to its event database. - Directory monitor112 can monitor any directory that is visible to it, these may be shared directories on any node on
computer network 10 or any directory on the computer on which the agent is running. Also, directory monitor 112 can monitor documents of some or all file types, including HTML, Microsoft® Access, Microsoft® Powerpoint, Microsoft® Word, Microsoft® Excel or plain text documents.System 20 can process 270 different file types through the use of Outside In technology from Inso. All commonly used file types can be handled without the need to have the application which created the file available. - Content monitored by directory monitors112 is mapped directly to an appropriate category within
central server database 40. Therefore, information can be automatically classified bydirectory monitor 112 based on the location from which it originated. - If no category is specified
system 20 will automatically place the information in the category containing similar documents utilizing catalog agent 140, which is discussed in detail below. When new events are detected and written to the event log, control of the process switches toevent coordinator agent 120. - The details of these agents are discussed below.
-
E-Mail Readers 114 - These agents monitor selected POP3 email accounts and publish the messages received in either a category designated by the author of the email or automatically categorizes the received email utilizing catalog agent140.
Email reader agents 114 can be used to implement automated customer support or any other system where rapid, intelligent responses are required to inbound messages. When new events are detected and written to the event log, control of the process switches toevent coordinator agent 120. -
Email reader 114 poles the POP account it has been pointed at on a particular server. If there are no messages it stops. If there are messages it reads the messages and posts them back tosystem server 30 either to a specific category (specified at the time the agent was set up) or uses the usual method to determine the “best fit” category for the incoming information -
SQL Extractors 116 - These agents extract data from SQL databases using queries on a regular timed basis. These can be used to monitor trends or to notify users about particular trigger events that may occur. The end user does not require any knowledge of SQL queries and does not require access to the database from where the data is extracted. Only
SQL extractor agent 116 needs access. Results fromSQL extractors 116 are published as HTML documents in the categories specified by the administrator. When new events are detected and written to the event log, control of the process switches toevent coordinator agent 120. -
Event Coordinators 120 -
Event coordinator agent 120 is a background process that monitors the generation of events byinformation collection agents 110.Event coordinator agents 120 are responsible for deciding what method to use for the extraction of data from the source information and transmitting that data back tocentral server database 40. - Depending on the type of information,
event coordinator agent 120 may deal with the extraction using internal filters, or may use Microsoft's Component Object Model (COM) automation to load the required application and extract data using the accessible objects within that application. - Once the extraction has been successfully completed,
event coordinator agent 120 communicates withsystem server 30 and transmits the extracted information tosystem server 30 for processing. As well as sending the raw data extract,event coordinator agent 120 also provides information forsystem server 30 enabling it to place the data sent into the appropriate category. In order to do this,event coordinator agent 120 has an HTTP link tosystem server 30. -
Information collection agents 110 andevent coordinators 120 work together at the production end ofsystem 20 to extract and update information forcentral server database 40 without any intrusion on the actions of the producers of that information. They require no action by the producer of the information. Once set up by a system administrator they act without the user of MS Word, for example, being aware of their actions. The employees who produce this information are not required to perform any additional actions, do require any additional software, require no training and need not even be aware that this process is occurring. - This represents a very powerful low impact and low cost method of getting information into a central resource so that it is easily accessible to those within an organization whom will most benefit from its content.
-
Link Agents 130 - As well as providing
information collection agents 110 andevent coordinator agents 120 for near real time data collection and distribution,system 20 also provides a method for following web site links and placing the content of individual web pages into categories withincentral server database 40, as depicted in FIG. 3. -
Link agents 130 follow web links as specified bysystem 20 administrator and update links as often as requested to do so. The activities oflink agents 130 can be restricted to particular web sites by specifying that only links with a known base URL be followed. This preventslink agents 130 from following links to external sites. - Each
time link agent 130 loads a new page it extracts the text from the page and sends it back tosystem server 30 using HTTP.System server 30 then matches the information transmitted against the properties stored for each category and places the content into the category that gives the best match using catalog agent 140. -
System 20 utilizeslink agents 130 to carry out the following steps as depicted in FIG. 3: -
Link agent 150 is timer drive to check the content ofweb site 60 -
link agent 150 detects changes, it collects the information -
link agent 130 analyses the information by: - Creating a list of words within the text
- Remove all common words as defined in step 1 for catalog agent140
- Proceed as defined in step 2 for catalog agent140 to find the most common word
- Proceed as defined in step 2 for catalog agent140 to extract the relevant sentences
-
system server 30 bylink agent 130 -
System server 30 catalogs the information to put it in the right category -
System server 30 distributes the information to all employees/users atclients 50 -
Link agents 130 have the inherent restrictions of all crawler based technology in that they cannot update information in real time, and the more often they are run the more bandwidth they consume. Their main use is where the underlying directory structure is either unavailable or meaningless. Bandwidth consumption is kept to a minimum by restricting the subsequent access to pages so that only those that have changed are reprocessed. - Catalog Agent140
- This process uses a number of pattern matching and fuzzy logic algorithms to assign the information from
event coordinators 120 andlink agents 130 to the correct categories. Additionally, new categories are created dynamically when need. The logic is described below. - 1. Learning Phase (generating a common world list)
- a. Read a sample set of documents and break them down into words
- b. Find out which words occur in most documents (The value for the percentage of documents in which a word must appear is pre-defined by an optimization process. Different values are tested until the best one is identified. The usual figure is around 85% of documents.)
- c. Store these words within a common word list (CWL)
-
- a. Remove from the document all common words defined by the CWL generated in step 1 above to leave a relevant word list (RWL)
- b. Do you have any words in the current training word list (TWL)? This query is carried in the context of automatically categorizing a list of documents with no prior knowledge of those documents and no initial categories. In normal operation in relation to directory/file, e-mails, database and other incoming information the TWL varies. Typically, the TWL is formed by the words in the category which first comes into existence when, by whatever means, a category is created.
- c. If not, add the RWL to the training word list and set the “new category” event. In the case where there are no categories, there are no training words to compare anything with, so it just uses those from the first document it reads. The new category event just indicates that this category didn't exist before so it has to make up a name for it before it moves on.
- d. Compare the RWL to the TWL and calculate the “relevance factor” (RF)
- Algorithm is defined as:
- X=Number of words present in the RWL that are not in the TWL
- Y=Number of words in the RWL
- RF=(100*X)/Y
- e. If the value of RF is less than the relevance threshold (RT) (This value is set by an optimization process. Different values are tested until the best one is identified. The usual figure is around 25%.) then:
- i. Add this document to the current category
- ii. Create ranked by order of occurrence the most frequent word list (MFWL) from the words in the RWL
- iii. Find sentences in the document containing the top3 words in the MFWL
- iv. Store these sentences as a summary
- v. Store the top 10 words as the document keywords from the words in the RWL
- vi. Add words in the RWL that are not in the TWL to the TWL
- vii. If the “new category” event is true, give this category a name by:
- 1. Find a sentence containing the top word from the MFWL
- 2. Extract the noun phrase from the sentence and use this as the name
- 3. Send a coded instruction to
system server 30 requesting “set up a new category called <Whatever>” - f. If the value of RF is greater than the relevance threshold (RT) then:
- i. Repeat for the next TWL from the next category
- ii. If there are no more categories, set the new category flag and repeat
- The method applied by catalog agent140 can be used to automatically categorize documents, email and database information but is also used to enable automated responses to inbound messages or emails. The same technique is also applied to matching any text based descriptive information. Essentially, the method here defined is generic to the type of information being categorized. One of ordinary skill in the art would be able to easily adapt the method described above for each particular type of information.
- The categorization process can be restricted by
system 20 administrator. In essence this means that, where it is known that information from a particular site will all belong in some high level category, only sub categories of that high level category will be used to determine the end placing of the information from this site. -
Web Builder 150 - Sometimes employees may wish to publish information as a web site in a format that requires their own input and customization.
System 20 includes web publishing tool. With no knowledge of HTML or web page building,web builder 150 allows employees to build web sites and publish them on the Intranet with ease. An example of a commercially available web page builder in Microsoft Frontpage. Such as commercially available software can be integrated intoSystem 20. -
Web builder 150 integrates completely withsystem 20. Once a web site has been built the publisher decides which category she wishes to place the information in. With the press of a button, the information is uploaded to the holding server, transferred to the web server, placed in the correct system category, and all employees who are subscribed to that category will be notified of the existence of new content. In the event no category is specified, catalog agent 140 makes the determination. - Once the content required has been collected and received by
system 20 server, the management of that content is taken over by the database management system as depicted in FIG. 4. This contains a rich set of features for the management of that data. - Configuration Utility160
-
System 20 can be configured easily to work in any environment supporting HTTP. All the main attributes ofsystem 20 can be altered easily using the system server configuration utility 160. These include the location of the server side applications, the location of all the images and documents used bysystem 20 and the location ofsystem 20 Homepage. - Other configurable options are the address of the SMTP mail server and all additional POP3 information such as the email address for system support. The configuration utility also deals with the access information required by the SQL Server database.
-
Implementation Manager 170 - The structure of any implementation of
system 20 should mirror the structure of the organization where it is used.System 20 providesimplementation manager 170 to assist with the initial setting up of categories for use withinsystem 20. As well as providing these features, the program also has various validation procedures for checking dependencies and categories withinsystem 20. -
Category Manager 180 - Any business will change over time.
System 20 includescategory manager 180 that allows structural changes to the system model. It also provides procedures for maintaining information details, chat information, messages, agents and all information associated with a particular category. This program provides the administrator with a tool for moving information from one category to another updating all dependencies automatically as this occurs. - Another feature of
category manager 180 is the association of particular phrases and keywords with a category. This information is used internally bysystem 20 to determine the location of information submitted tosystem 20. These phrases and keywords can be assigned relevance according to boolean attributes given to them. By using this information to compute a ‘relevance factor’,system 20 is able to best guess the category in which a particular piece of information belongs using fuzzy logic. Also, the administrator utilizescategory manager 180 to set the parameters associated with catalog agent 140. - When a category is added to
system 20,system 20 automatically generates keywords and phrases from the full category name. So, if a category is created called Lawyers/Patent Attorney/California it would assign the phrase “Patent Attorney” to the “should contain phrase” list and it would assign the keywords “Lawyers”, “Patent”, “Attorney”, “California” to the “should contain keywords” list. - When the
system 20 receives information from whatever source, it uses the algorithm for catalog agent 140 as defined for context extraction to establish its true home category. The keywords and phrases above provide the values for the Training Word List (TWL). By comparing the incoming information to the auto-created TWL the relevance factor is calculated. The information will go into the category with the best relevance factor. - User Manager190
-
System 20 contains a rich set of security and access control functions linked closely to those of Windows NT. User manager 190 provides a set of features which allowssystem 20 administrator to assign users and groups access to specific categories only.System 20 links the categories to NT users and groups and only those users with correct permissions will be able to see information insystem 20. Users who have been deleted from NT will automatically be removed fromsystem 20 each time user manager 190 is run. - Access to information is restricted by
User Manager 220 so only information which should be available to particular employees is available. These access controls are handled dynamically so when an employee's access rights are altered, the information that is delivered to them is altered at the same time bysystem 20. The delivery of content is depicted in FIG. 4. -
Personal Delivery Agents 200 -
System 20 contains many features for the delivery of content to specific employees based on their individual requirements bypersonal delivery agents 200. This feature is simple to use but extremely powerful. It requires no client side software with all functionality being provided through a standard web browser. Those who wish to monitor activity within a particular category or group of categories can do now do so with ease. - Individual
personal delivery agents 200 are provided for employees that allow each person to subscribe to individual system categories. This enables every person within an organization to be informed of all changes to information that is relevant to them. Every time an employee accesses their personal system page they are presented with all updates that have occurred in subscribed groups. Because this information is contained in a single web page they are not swamped with update notifications. - They can elect to be notified of changes by email but even here there is strict control over the number of messages sent by
system 20. Each user will only receive one notification by email that contains a web link back to their personal page so that they may observe all changes that have occurred. Only one email message will be sent until they next visit their individual web page. - In this manner,
system 20 is able to keep employees informed about updates that occur in their specific areas of interest without generating excessive notifications and additional workload.Personal delivery agents 200 handle all of this. The software is invisible to the individual employee and requires no maintenance on their part. All they have to do is select their interest areas the rest is handled automatically bypersonal delivery agent 200. - Each individual user can also make use of the Link agent robots for research. This research can assist with projects or competitor intelligence by keeping the individual informed of changes in the project or a competitor's web site as the changes occur. The robot can be instructed to search the web for any subject and return to the user any relevant information it finds. Again, the software rather than the user does the work.
-
Global Searching 210 - As well as utilizing agents for finding
information system 20 provides search facilities for finding information within the database. Global searching allows employees to find information located in any category heading or within the information held under any category. Rather than returning results as documents which containkeywords system 20 returns results by placing the category which contains the keyword most often at the top of the result list. - This feature aids employees by providing results in a context oriented fashion. Often keyword searches produce irrelevant results. Keywords can be present in documents that are not in the context required by the user. By presenting the results by
context system 20 aids the location of documents which are truly relevant to the individual's requirements. - By selecting the category, which is most relevant to the context of their
requirements system 20 then displays individual documents within that category which contain the keywords, requested.System 20 supports a number of search types allowing for different combinations of keywords. - Category Searching220
- As well as
global searching system 20 supports keyword searching at the category level withcategory searching module 220. This allows narrow band searching for specific information within a category. This feature is functionally the same as global searching, except that in this instance the search only looks at information within the selected category. All search functions will only return information for which the particular employee has the required permissions. Information and categories that they should not see will not be presented to them. - From the above description, it will be apparent that the invention disclosed herein provides a novel and advantageous computer network information management system. The foregoing discussion discloses and describes merely exemplary methods and embodiments of the present invention. One skilled in the art will readily recognize from such discussion that various changes, modifications and variations may be made therein without departing from the spirit and scope of the invention. Accordingly, disclosure of the present invention is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
Claims (23)
1. A method for managing information on a computer network having a server, at least one client node and at least one information provider node, comprising the steps of:
gathering summary data from the information provider node indicative of event changes at the information provider node by information collection agents extracting information from the information provider node based on the summary data;
transmitting the extracted information to the server;
storing the transmitted information in an event database;
cataloging the stored information into hierarchical categories;
retrieving with a delivery agent based upon the hierarchical categories selected information from the stored information; and
transmitting the selected information to the client node.
2. The method recited in claim 1 wherein the cataloging step is based upon a relevance factor.
3. The method recited in claim 1 wherein the relevance factor is determined by pattern matching and fuzzy logic.
4. The method recited in claim 1 wherein the cataloging step assigns the transmitted information to the hierarchical categories by generating a common word list from a sample document.
5. The method recited in claim 4 wherein the generating a common word list includes the following steps:
identifying the words contained in a sample set of documents;
determining the most frequently occurring words; and
storing the most frequent occurring words in a list.
6. The method recited in claim 1 wherein the information collection agents are comprised of directory monitor agents; email reader agents and database extraction agents.
7. The method recited in claim 1 wherein the information collection agents extract event data from document directories, email servers and databases.
8. The method recited in claim 1 wherein the delivery agent retrieves the selected information from the hierarchical categories corresponding to pre-defined criteria.
9. The method recited in claim 2 further comprising the steps of:
calculating the relevance factor of the transmitted information for a particular category based upon a common word list, words in the transmitted information and keywords associated with a particular category;
comparing the relevance factor to a pre-determined relevance threshold; and
assigning the transmitted information to the particular category based upon the comparing of the relevance factor to the relevance threshold.
10. The method recited in claim 1 further comprising the step of:
generating a summary of the stored information based upon portions of the information containing the most frequently occurring relevant words.
11. The system recited in claim 1 further comprising the steps of:
checking the content of the web sites on a timed basis;
detecting changes in the content of the web site;
collecting information identifying the changes;
extracting relevant information from the collected information;
transmitting the relevant information to the server.
12. A system for managing information in a computer network comprising:
an interconnection network;
a plurality of client nodes coupled to the interconnection network;
a plurality of information provider nodes coupled to the interconnection network;
a system server coupled to the interconnection network;
means for autonomously collecting information from the information provider nodes;
means for autonomously coordinating the collecting of information by the collecting means and for autonomously transmitting the collected information to the system server via the interconnection network;
means located at the system server for cataloging the information transmitted from the coordinating means.
13. The system recited in claim 12 wherein the interconnection network is the Internet.
14. The system recited in claim 13 further comprising means for autonomously gathering information from web sites on the Internet.
15. The system recited in claim 12 wherein the information provider node is a data server with a plurality of files arranged in a directory structure.
16. The system recited in claim 12 wherein the information provider node is an e-mail server.
17. The system recited in claim 12 wherein the information provider node is a data server with a database.
18. A system for managing information in a computer network gathered from a plurality of information provider nodes for transmission to a plurality of client nodes via an interconnection network comprising:
a system server coupled to the interconnection network;
means for autonomously collecting information from the information provider nodes;
means for autonomously coordinating the collecting of information by the collecting means and for autonomously transmitting the collected information to the system server via the interconnection network;
means located at the system server for cataloging the information transmitted from the coordinating means.
19. The system recited in claim 18 wherein the interconnection network is the Internet.
20. The system recited in claim 19 further comprising means for autonomously gathering information from web sites on the Internet.
21. The system recited in claim 18 wherein the information collected from the information provider node is from a plurality of files arranged in a directory structure.
22. The system recited in claim 18 wherein the information collected from the information provider node is from an e-mail server.
23. The system recited in claim 18 wherein the information collected from the information provider node is from a database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/407,361 US20030204485A1 (en) | 1999-11-15 | 2003-04-04 | Gathering change data from information provider network indicative of event changes at information provider node relative to pre-stored information in the database by information collection agents |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/440,365 US6546387B1 (en) | 1999-11-15 | 1999-11-15 | Computer network information management system and method using intelligent software agents |
US10/407,361 US20030204485A1 (en) | 1999-11-15 | 2003-04-04 | Gathering change data from information provider network indicative of event changes at information provider node relative to pre-stored information in the database by information collection agents |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/440,365 Continuation US6546387B1 (en) | 1999-11-15 | 1999-11-15 | Computer network information management system and method using intelligent software agents |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030204485A1 true US20030204485A1 (en) | 2003-10-30 |
Family
ID=23748469
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/440,365 Expired - Fee Related US6546387B1 (en) | 1999-11-15 | 1999-11-15 | Computer network information management system and method using intelligent software agents |
US10/407,361 Abandoned US20030204485A1 (en) | 1999-11-15 | 2003-04-04 | Gathering change data from information provider network indicative of event changes at information provider node relative to pre-stored information in the database by information collection agents |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/440,365 Expired - Fee Related US6546387B1 (en) | 1999-11-15 | 1999-11-15 | Computer network information management system and method using intelligent software agents |
Country Status (3)
Country | Link |
---|---|
US (2) | US6546387B1 (en) |
AU (1) | AU4504401A (en) |
WO (1) | WO2001042988A2 (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010037347A1 (en) * | 2000-03-10 | 2001-11-01 | Kelliher Margaret Therese | Method for automated web site maintenance via searching |
US20060101323A1 (en) * | 1999-06-01 | 2006-05-11 | Ramakrishna Satyavolu | Categorization of summarized information |
US20060149652A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Receiving bid requests and pricing bid responses for potential grid job submissions within a grid environment |
US20060150158A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Facilitating overall grid environment management by monitoring and distributing grid activity |
US20060150190A1 (en) * | 2005-01-06 | 2006-07-06 | Gusler Carl P | Setting operation based resource utilization thresholds for resource use by a process |
US20060150157A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Verifying resource functionality before use by a grid job submitted to a grid environment |
US20060150159A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Coordinating the monitoring, management, and prediction of unintended changes within a grid environment |
US20060149714A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Automated management of software images for efficient resource node building within a grid environment |
US20060149842A1 (en) * | 2005-01-06 | 2006-07-06 | Dawson Christopher J | Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment |
US20060155633A1 (en) * | 2005-01-12 | 2006-07-13 | International Business Machines Corporation | Automatically distributing a bid request for a grid job to multiple grid providers and analyzing responses to select a winning grid provider |
US20060152756A1 (en) * | 2005-01-12 | 2006-07-13 | International Business Machines Corporation | Automating responses by grid providers to bid requests indicating criteria for a grid job |
US20060167828A1 (en) * | 2005-01-12 | 2006-07-27 | International Business Machines Corporation | Managing network errors communicated in a message transaction with error information using a troubleshooting agent |
US20060167984A1 (en) * | 2005-01-12 | 2006-07-27 | International Business Machines Corporation | Estimating future grid job costs by classifying grid jobs and storing results of processing grid job microcosms |
US20070005692A1 (en) * | 2005-06-18 | 2007-01-04 | Rodney Gist | System for instant collaboration |
US20070271136A1 (en) * | 2006-05-19 | 2007-11-22 | Dw Data Inc. | Method for pricing advertising on the internet |
US20090216883A1 (en) * | 2004-01-13 | 2009-08-27 | International Business Machines Corporation | Managing escalating resource needs within a grid environment |
US20090228892A1 (en) * | 2004-01-14 | 2009-09-10 | International Business Machines Corporation | Maintaining application operations within a suboptimal grid environment |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US7856386B2 (en) | 2006-09-07 | 2010-12-21 | Yodlee, Inc. | Host exchange in bill paying services |
US7921133B2 (en) | 2004-06-10 | 2011-04-05 | International Business Machines Corporation | Query meaning determination through a grid service |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US8190629B2 (en) | 1998-12-08 | 2012-05-29 | Yodlee.Com, Inc. | Network-based bookmark management and web-summary system |
US8261334B2 (en) | 2008-04-25 | 2012-09-04 | Yodlee Inc. | System for performing web authentication of a user by proxy |
US8387058B2 (en) | 2004-01-13 | 2013-02-26 | International Business Machines Corporation | Minimizing complex decisions to allocate additional resources to a job submitted to a grid environment |
US8555359B2 (en) | 2009-02-26 | 2013-10-08 | Yodlee, Inc. | System and methods for automatically accessing a web site on behalf of a client |
US9720996B1 (en) * | 2012-04-20 | 2017-08-01 | Open Invention Network Llc | System dependencies tracking application |
Families Citing this family (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1219510C (en) * | 1998-05-22 | 2005-09-21 | 阿文尼尔药品公司 | Benzimidazole derivatives as modulators of IgE |
US7949722B1 (en) * | 1999-09-29 | 2011-05-24 | Actv Inc. | Enhanced video programming system and method utilizing user-profile information |
US6546387B1 (en) * | 1999-11-15 | 2003-04-08 | Transcom Software Inc. | Computer network information management system and method using intelligent software agents |
AUPQ475799A0 (en) * | 1999-12-20 | 2000-01-20 | Youramigo Pty Ltd | An internet indexing system and method |
US6718365B1 (en) * | 2000-04-13 | 2004-04-06 | International Business Machines Corporation | Method, system, and program for ordering search results using an importance weighting |
US6968363B1 (en) * | 2000-05-09 | 2005-11-22 | Microsoft Corporation | File propagation tool |
US6879998B1 (en) * | 2000-06-01 | 2005-04-12 | Aerocast.Com, Inc. | Viewer object proxy |
US6904460B1 (en) * | 2000-06-01 | 2005-06-07 | Aerocast.Com, Inc. | Reverse content harvester |
US7213062B1 (en) | 2000-06-01 | 2007-05-01 | General Instrument Corporation | Self-publishing network directory |
US6959295B1 (en) * | 2000-06-30 | 2005-10-25 | Puscar Michael A | System and method for providing news updates |
US7610588B1 (en) | 2000-10-27 | 2009-10-27 | Global 360, Inc. | Distributed application management software |
US10915296B2 (en) | 2000-11-01 | 2021-02-09 | Flexiworld Technologies, Inc. | Information apparatus that includes a touch sensitive screen interface for managing or replying to e-mails |
US11204729B2 (en) | 2000-11-01 | 2021-12-21 | Flexiworld Technologies, Inc. | Internet based digital content services for pervasively providing protected digital content to smart devices based on having subscribed to the digital content service |
US11467856B2 (en) | 2002-12-12 | 2022-10-11 | Flexiworld Technologies, Inc. | Portable USB device for internet access service |
WO2002046867A2 (en) | 2000-11-01 | 2002-06-13 | Flexiworld Technologies, Inc. | Controller and manager for device-to-device pervasive digital output |
US10860290B2 (en) | 2000-11-01 | 2020-12-08 | Flexiworld Technologies, Inc. | Mobile information apparatuses that include a digital camera, a touch sensitive screen interface, support for voice activated commands, and a wireless communication chip or chipset supporting IEEE 802.11 |
US7318086B2 (en) | 2000-11-20 | 2008-01-08 | Flexiworld Technologies, Inc. | System for mobile and pervasive output |
US7660734B1 (en) | 2000-12-20 | 2010-02-09 | Demandtec, Inc. | System for creating optimized promotion event calendar |
US10204349B2 (en) | 2000-12-20 | 2019-02-12 | International Business Machines Corporation | Analyzing customer segments |
US7657470B1 (en) | 2000-12-20 | 2010-02-02 | Demandtec, Inc. | Financial model engine |
US9165270B2 (en) * | 2000-12-20 | 2015-10-20 | International Business Machines Corporation | Predicting likelihood of customer attrition and retention measures |
US7302410B1 (en) | 2000-12-22 | 2007-11-27 | Demandtec, Inc. | Econometric optimization engine |
US7899691B1 (en) | 2000-12-20 | 2011-03-01 | Demandtec, Inc. | Econometric engine |
US7877286B1 (en) | 2000-12-20 | 2011-01-25 | Demandtec, Inc. | Subset optimization system |
US9785953B2 (en) * | 2000-12-20 | 2017-10-10 | International Business Machines Corporation | System and method for generating demand groups |
US7617119B1 (en) | 2000-12-20 | 2009-11-10 | Demandtec, Inc. | Price optimization with rule relaxation |
US20100010870A1 (en) * | 2000-12-20 | 2010-01-14 | Karl Millar | System and Method for Tuning Demand Coefficients |
US9773250B2 (en) * | 2000-12-20 | 2017-09-26 | International Business Machines Corporation | Product role analysis |
US10496938B2 (en) | 2000-12-20 | 2019-12-03 | Acoustic, L.P. | Generating product decisions |
US7523047B1 (en) | 2000-12-20 | 2009-04-21 | Demandtec, Inc. | Price optimization system |
US7062447B1 (en) | 2000-12-20 | 2006-06-13 | Demandtec, Inc. | Imputed variable generator |
US8010404B1 (en) | 2000-12-22 | 2011-08-30 | Demandtec, Inc. | Systems and methods for price and promotion response analysis |
US20020097408A1 (en) | 2001-01-19 | 2002-07-25 | Chang William Ho | Output device for universal data output |
US7739590B2 (en) * | 2001-03-01 | 2010-06-15 | Accenture Llp | Automatic generation of personal homepages for a sales force |
US7861155B2 (en) * | 2001-03-05 | 2010-12-28 | International Business Machines Corporation | Method and system for providing message publishing on a dynamic page builder on the internet |
US7092896B2 (en) * | 2001-05-04 | 2006-08-15 | Demandtec, Inc. | Interface for merchandise promotion optimization |
US6553352B2 (en) * | 2001-05-04 | 2003-04-22 | Demand Tec Inc. | Interface for merchandise price optimization |
US20040210541A1 (en) * | 2001-05-04 | 2004-10-21 | Jeremy Epstien | User interface for a rules engine and methods therefor |
US7130811B1 (en) | 2001-05-05 | 2006-10-31 | Demandtec, Inc. | Apparatus for merchandise promotion optimization |
US7181465B2 (en) * | 2001-10-29 | 2007-02-20 | Gary Robin Maze | System and method for the management of distributed personalized information |
US7386519B1 (en) | 2001-11-30 | 2008-06-10 | Demandtec, Inc. | Intelligent clustering system |
US7809581B1 (en) | 2001-11-30 | 2010-10-05 | Demandtec, Inc. | Rule relaxation and subset optimization system |
US7249033B1 (en) | 2001-11-30 | 2007-07-24 | Demandtec Inc. | Apparatus and method for selective merchandise price optimization |
US7249032B1 (en) | 2001-11-30 | 2007-07-24 | Demandtec Inc. | Selective merchandise price optimization mechanism |
CN100410954C (en) * | 2002-06-10 | 2008-08-13 | 联想(北京)有限公司 | Method and system for collecting sofeware and hardware information in cluster node |
US7370072B2 (en) * | 2002-07-08 | 2008-05-06 | Electronic Evidence Discovery, Inc. | System and method for collecting electronic evidence data |
US7133882B1 (en) * | 2002-08-05 | 2006-11-07 | Demandtec, Inc. | Method and apparatus for creating and using a master catalog |
US7908401B2 (en) | 2002-12-12 | 2011-03-15 | Flexiworld Technology, Inc. | Method and device for wireless communication between computing devices |
US8510179B2 (en) * | 2003-03-24 | 2013-08-13 | Siebel Systems, Inc. | Inventory transaction common object |
US20070208577A1 (en) * | 2003-03-24 | 2007-09-06 | Leon Maria T B | Position common object |
CN107885679B (en) | 2003-04-11 | 2021-10-08 | 富意科技公司 | Integrated circuit storage device or method capable of realizing automatic operation |
US7526540B2 (en) | 2003-04-22 | 2009-04-28 | International Business Machines Corporation | System and method for assigning data collection agents to storage area network nodes in a storage area network resource management system |
US7546608B2 (en) * | 2004-01-14 | 2009-06-09 | International Business Machines Corporation | Enhanced search expressions for information kit integration architecture |
JP2006053745A (en) * | 2004-08-11 | 2006-02-23 | Saora Inc | Data processing method, device and program |
WO2006026579A2 (en) * | 2004-08-27 | 2006-03-09 | Peng Tao | A personal online information management system |
US8171474B2 (en) * | 2004-10-01 | 2012-05-01 | Serguei Mankovski | System and method for managing, scheduling, controlling and monitoring execution of jobs by a job scheduler utilizing a publish/subscription interface |
US7644161B1 (en) * | 2005-01-28 | 2010-01-05 | Hewlett-Packard Development Company, L.P. | Topology for a hierarchy of control plug-ins used in a control system |
US7747556B2 (en) | 2005-02-28 | 2010-06-29 | Microsoft Corporation | Query-based notification architecture |
US7637382B2 (en) * | 2005-03-28 | 2009-12-29 | Disney Enterprises, Inc. | Irregular shaped baby bottle |
US9858579B1 (en) | 2006-02-28 | 2018-01-02 | International Business Machines Corporation | Plan tuning engine |
US9785951B1 (en) | 2006-02-28 | 2017-10-10 | International Business Machines Corporation | Scalable tuning engine |
US7974998B1 (en) * | 2007-05-11 | 2011-07-05 | Trend Micro Incorporated | Trackback spam filtering system and method |
US8489668B2 (en) * | 2007-11-13 | 2013-07-16 | Intuit Inc. | Open platform for managing an agent network |
US8266477B2 (en) * | 2009-01-09 | 2012-09-11 | Ca, Inc. | System and method for modifying execution of scripts for a job scheduler using deontic logic |
CN101719914B (en) * | 2009-11-10 | 2012-09-05 | 中国科学院计算技术研究所 | Security event source integrated system and implementing method thereof |
US9154384B2 (en) * | 2012-01-20 | 2015-10-06 | Cisco Technology, Inc. | Sentiment based dynamic network management services |
US10694367B1 (en) * | 2018-01-12 | 2020-06-23 | Sprint Communications Company L.P. | Subscriber data management logs parsing and conversion to analytics use cases |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5418948A (en) * | 1991-10-08 | 1995-05-23 | West Publishing Company | Concept matching of natural language queries with a database of document concepts |
US5774848A (en) * | 1995-03-09 | 1998-06-30 | Nec Corporationi | Reference pattern training system and speech recognition system using the same |
US5799276A (en) * | 1995-11-07 | 1998-08-25 | Accent Incorporated | Knowledge-based speech recognition system and methods having frame length computed based upon estimated pitch period of vocalic intervals |
US5819258A (en) * | 1997-03-07 | 1998-10-06 | Digital Equipment Corporation | Method and apparatus for automatically generating hierarchical categories from large document collections |
US5963903A (en) * | 1996-06-28 | 1999-10-05 | Microsoft Corporation | Method and system for dynamically adjusted training for speech recognition |
US5963965A (en) * | 1997-02-18 | 1999-10-05 | Semio Corporation | Text processing and retrieval system and method |
US6032145A (en) * | 1998-04-10 | 2000-02-29 | Requisite Technology, Inc. | Method and system for database manipulation |
US6078924A (en) * | 1998-01-30 | 2000-06-20 | Aeneid Corporation | Method and apparatus for performing data collection, interpretation and analysis, in an information platform |
US6088692A (en) * | 1994-12-06 | 2000-07-11 | University Of Central Florida | Natural language method and system for searching for and ranking relevant documents from a computer database |
US6134532A (en) * | 1997-11-14 | 2000-10-17 | Aptex Software, Inc. | System and method for optimal adaptive matching of users to most relevant entity and information in real-time |
US6137911A (en) * | 1997-06-16 | 2000-10-24 | The Dialog Corporation Plc | Test classification system and method |
US6256664B1 (en) * | 1998-09-01 | 2001-07-03 | Bigfix, Inc. | Method and apparatus for computed relevance messaging |
US6269364B1 (en) * | 1998-09-25 | 2001-07-31 | Intel Corporation | Method and apparatus to automatically test and modify a searchable knowledge base |
US6519586B2 (en) * | 1999-08-06 | 2003-02-11 | Compaq Computer Corporation | Method and apparatus for automatic construction of faceted terminological feedback for document retrieval |
US6546387B1 (en) * | 1999-11-15 | 2003-04-08 | Transcom Software Inc. | Computer network information management system and method using intelligent software agents |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5133075A (en) * | 1988-12-19 | 1992-07-21 | Hewlett-Packard Company | Method of monitoring changes in attribute values of object in an object-oriented database |
JP2804403B2 (en) * | 1991-05-16 | 1998-09-24 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Question answering system |
US5577241A (en) | 1994-12-07 | 1996-11-19 | Excite, Inc. | Information retrieval system and method with implementation extensible query architecture |
US6115458A (en) * | 1995-07-14 | 2000-09-05 | American Express Travel Related Services Company, Inc. | Method and apparatus for summaries of prepaid instrument transaction activity |
US5963940A (en) * | 1995-08-16 | 1999-10-05 | Syracuse University | Natural language information retrieval system and method |
US5764906A (en) * | 1995-11-07 | 1998-06-09 | Netword Llc | Universal electronic resource denotation, request and delivery system |
JP3612125B2 (en) * | 1995-12-14 | 2005-01-19 | 株式会社東芝 | Information filtering method and information filtering apparatus |
JP2000506650A (en) | 1996-03-15 | 2000-05-30 | エイ・ティ・アンド・ティ・コーポレーション | Network resource detection method and method using resource evaluation information extracted from electronic message |
US5915249A (en) | 1996-06-14 | 1999-06-22 | Excite, Inc. | System and method for accelerated query evaluation of very large full-text databases |
US6304874B1 (en) | 1996-07-09 | 2001-10-16 | British Telecommunications Public Limited Company | Access system for distributed storage |
EP0822502A1 (en) | 1996-07-31 | 1998-02-04 | BRITISH TELECOMMUNICATIONS public limited company | Data access system |
US5920854A (en) * | 1996-08-14 | 1999-07-06 | Infoseek Corporation | Real-time document collection search engine with phrase indexing |
US5898836A (en) * | 1997-01-14 | 1999-04-27 | Netmind Services, Inc. | Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures |
US5978828A (en) * | 1997-06-13 | 1999-11-02 | Intel Corporation | URL bookmark update notification of page content or location changes |
BR9810938A (en) * | 1997-06-25 | 2000-09-26 | Inforonics Inc | Device and method for identifying customers accessing network sites. |
US5951642A (en) * | 1997-08-06 | 1999-09-14 | Hypertak, Inc. | System for collecting detailed internet information on the basis of the condition of activities of information viewers viewing information of service providers |
GB2329488A (en) | 1997-09-17 | 1999-03-24 | Transcom Software Inc | Accessing information according to subject heading |
US6065012A (en) * | 1998-02-27 | 2000-05-16 | Microsoft Corporation | System and method for displaying and manipulating user-relevant data |
US6216123B1 (en) * | 1998-06-24 | 2001-04-10 | Novell, Inc. | Method and system for rapid retrieval in a full text indexing system |
US6199077B1 (en) * | 1998-12-08 | 2001-03-06 | Yodlee.Com, Inc. | Server-side web summary generation and presentation |
-
1999
- 1999-11-15 US US09/440,365 patent/US6546387B1/en not_active Expired - Fee Related
-
2000
- 2000-11-07 AU AU45044/01A patent/AU4504401A/en not_active Abandoned
- 2000-11-07 WO PCT/US2000/041984 patent/WO2001042988A2/en active Application Filing
-
2003
- 2003-04-04 US US10/407,361 patent/US20030204485A1/en not_active Abandoned
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5418948A (en) * | 1991-10-08 | 1995-05-23 | West Publishing Company | Concept matching of natural language queries with a database of document concepts |
US6088692A (en) * | 1994-12-06 | 2000-07-11 | University Of Central Florida | Natural language method and system for searching for and ranking relevant documents from a computer database |
US5774848A (en) * | 1995-03-09 | 1998-06-30 | Nec Corporationi | Reference pattern training system and speech recognition system using the same |
US5799276A (en) * | 1995-11-07 | 1998-08-25 | Accent Incorporated | Knowledge-based speech recognition system and methods having frame length computed based upon estimated pitch period of vocalic intervals |
US5963903A (en) * | 1996-06-28 | 1999-10-05 | Microsoft Corporation | Method and system for dynamically adjusted training for speech recognition |
US5963965A (en) * | 1997-02-18 | 1999-10-05 | Semio Corporation | Text processing and retrieval system and method |
US5819258A (en) * | 1997-03-07 | 1998-10-06 | Digital Equipment Corporation | Method and apparatus for automatically generating hierarchical categories from large document collections |
US6137911A (en) * | 1997-06-16 | 2000-10-24 | The Dialog Corporation Plc | Test classification system and method |
US6134532A (en) * | 1997-11-14 | 2000-10-17 | Aptex Software, Inc. | System and method for optimal adaptive matching of users to most relevant entity and information in real-time |
US6078924A (en) * | 1998-01-30 | 2000-06-20 | Aeneid Corporation | Method and apparatus for performing data collection, interpretation and analysis, in an information platform |
US6032145A (en) * | 1998-04-10 | 2000-02-29 | Requisite Technology, Inc. | Method and system for database manipulation |
US6256664B1 (en) * | 1998-09-01 | 2001-07-03 | Bigfix, Inc. | Method and apparatus for computed relevance messaging |
US6269364B1 (en) * | 1998-09-25 | 2001-07-31 | Intel Corporation | Method and apparatus to automatically test and modify a searchable knowledge base |
US6519586B2 (en) * | 1999-08-06 | 2003-02-11 | Compaq Computer Corporation | Method and apparatus for automatic construction of faceted terminological feedback for document retrieval |
US6546387B1 (en) * | 1999-11-15 | 2003-04-08 | Transcom Software Inc. | Computer network information management system and method using intelligent software agents |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8190629B2 (en) | 1998-12-08 | 2012-05-29 | Yodlee.Com, Inc. | Network-based bookmark management and web-summary system |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US20060101323A1 (en) * | 1999-06-01 | 2006-05-11 | Ramakrishna Satyavolu | Categorization of summarized information |
US7752535B2 (en) * | 1999-06-01 | 2010-07-06 | Yodlec.com, Inc. | Categorization of summarized information |
US7340464B2 (en) * | 2000-03-10 | 2008-03-04 | General Electric Company | Method for automated web site maintenance via searching |
US20010037347A1 (en) * | 2000-03-10 | 2001-11-01 | Kelliher Margaret Therese | Method for automated web site maintenance via searching |
US8387058B2 (en) | 2004-01-13 | 2013-02-26 | International Business Machines Corporation | Minimizing complex decisions to allocate additional resources to a job submitted to a grid environment |
US8275881B2 (en) | 2004-01-13 | 2012-09-25 | International Business Machines Corporation | Managing escalating resource needs within a grid environment |
US20090216883A1 (en) * | 2004-01-13 | 2009-08-27 | International Business Machines Corporation | Managing escalating resource needs within a grid environment |
US8136118B2 (en) | 2004-01-14 | 2012-03-13 | International Business Machines Corporation | Maintaining application operations within a suboptimal grid environment |
US20090228892A1 (en) * | 2004-01-14 | 2009-09-10 | International Business Machines Corporation | Maintaining application operations within a suboptimal grid environment |
US7921133B2 (en) | 2004-06-10 | 2011-04-05 | International Business Machines Corporation | Query meaning determination through a grid service |
US7707288B2 (en) | 2005-01-06 | 2010-04-27 | International Business Machines Corporation | Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment |
US8583650B2 (en) | 2005-01-06 | 2013-11-12 | International Business Machines Corporation | Automated management of software images for efficient resource node building within a grid environment |
US20060149652A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Receiving bid requests and pricing bid responses for potential grid job submissions within a grid environment |
US20060150158A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Facilitating overall grid environment management by monitoring and distributing grid activity |
US20060150190A1 (en) * | 2005-01-06 | 2006-07-06 | Gusler Carl P | Setting operation based resource utilization thresholds for resource use by a process |
US7502850B2 (en) | 2005-01-06 | 2009-03-10 | International Business Machines Corporation | Verifying resource functionality before use by a grid job submitted to a grid environment |
US7533170B2 (en) | 2005-01-06 | 2009-05-12 | International Business Machines Corporation | Coordinating the monitoring, management, and prediction of unintended changes within a grid environment |
US20060150157A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Verifying resource functionality before use by a grid job submitted to a grid environment |
US20060150159A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Coordinating the monitoring, management, and prediction of unintended changes within a grid environment |
US20060149714A1 (en) * | 2005-01-06 | 2006-07-06 | Fellenstein Craig W | Automated management of software images for efficient resource node building within a grid environment |
US7793308B2 (en) | 2005-01-06 | 2010-09-07 | International Business Machines Corporation | Setting operation based resource utilization thresholds for resource use by a process |
US7590623B2 (en) | 2005-01-06 | 2009-09-15 | International Business Machines Corporation | Automated management of software images for efficient resource node building within a grid environment |
US7761557B2 (en) | 2005-01-06 | 2010-07-20 | International Business Machines Corporation | Facilitating overall grid environment management by monitoring and distributing grid activity |
US20090313229A1 (en) * | 2005-01-06 | 2009-12-17 | International Business Machines Corporation | Automated management of software images for efficient resource node building within a grid environment |
US20060149842A1 (en) * | 2005-01-06 | 2006-07-06 | Dawson Christopher J | Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment |
US7571120B2 (en) | 2005-01-12 | 2009-08-04 | International Business Machines Corporation | Computer implemented method for estimating future grid job costs by classifying grid jobs and storing results of processing grid job microcosms |
US8396757B2 (en) | 2005-01-12 | 2013-03-12 | International Business Machines Corporation | Estimating future grid job costs by classifying grid jobs and storing results of processing grid job microcosms |
US20060155633A1 (en) * | 2005-01-12 | 2006-07-13 | International Business Machines Corporation | Automatically distributing a bid request for a grid job to multiple grid providers and analyzing responses to select a winning grid provider |
US20060152756A1 (en) * | 2005-01-12 | 2006-07-13 | International Business Machines Corporation | Automating responses by grid providers to bid requests indicating criteria for a grid job |
US20060167984A1 (en) * | 2005-01-12 | 2006-07-27 | International Business Machines Corporation | Estimating future grid job costs by classifying grid jobs and storing results of processing grid job microcosms |
US20060167828A1 (en) * | 2005-01-12 | 2006-07-27 | International Business Machines Corporation | Managing network errors communicated in a message transaction with error information using a troubleshooting agent |
US8346591B2 (en) | 2005-01-12 | 2013-01-01 | International Business Machines Corporation | Automating responses by grid providers to bid requests indicating criteria for a grid job |
US7562035B2 (en) | 2005-01-12 | 2009-07-14 | International Business Machines Corporation | Automating responses by grid providers to bid requests indicating criteria for a grid job |
US7472079B2 (en) | 2005-01-12 | 2008-12-30 | International Business Machines Corporation | Computer implemented method for automatically controlling selection of a grid provider for a grid job |
US7467196B2 (en) | 2005-01-12 | 2008-12-16 | International Business Machines Corporation | Managing network errors communicated in a message transaction with error information using a troubleshooting agent |
US20070005692A1 (en) * | 2005-06-18 | 2007-01-04 | Rodney Gist | System for instant collaboration |
US20090234920A1 (en) * | 2005-06-18 | 2009-09-17 | Xdimensional Technologies, Inc. | System for instant collaboration |
US20070271136A1 (en) * | 2006-05-19 | 2007-11-22 | Dw Data Inc. | Method for pricing advertising on the internet |
US7856386B2 (en) | 2006-09-07 | 2010-12-21 | Yodlee, Inc. | Host exchange in bill paying services |
US8261334B2 (en) | 2008-04-25 | 2012-09-04 | Yodlee Inc. | System for performing web authentication of a user by proxy |
US8555359B2 (en) | 2009-02-26 | 2013-10-08 | Yodlee, Inc. | System and methods for automatically accessing a web site on behalf of a client |
US9720996B1 (en) * | 2012-04-20 | 2017-08-01 | Open Invention Network Llc | System dependencies tracking application |
Also Published As
Publication number | Publication date |
---|---|
WO2001042988A2 (en) | 2001-06-14 |
US6546387B1 (en) | 2003-04-08 |
AU4504401A (en) | 2001-06-18 |
WO2001042988A3 (en) | 2003-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6546387B1 (en) | Computer network information management system and method using intelligent software agents | |
AU746138B2 (en) | Information management system | |
US6332141B2 (en) | Apparatus and method of implementing fast internet real-time search technology (FIRST) | |
US7698255B2 (en) | System for organizing knowledge data and communication with users having affinity to knowledge data | |
US7809716B2 (en) | Method and apparatus for establishing relationship between documents | |
US9053458B2 (en) | System and method for profiling clients within a system for harvesting community knowledge | |
US9319479B2 (en) | Suggesting a discussion group based on indexing of the posts within that discussion group | |
US20040034639A1 (en) | Flexible rule-based communication system and method for controlling the flow of and access to information between computer users | |
US20060112081A1 (en) | Storing searches in an e-mail folder | |
US20040230566A1 (en) | Web-based customized information retrieval and delivery method and system | |
WO1998020435A1 (en) | A knowledge-based moderator for electronic mail help lists | |
US20080281807A1 (en) | Search engine | |
US7246121B2 (en) | System and method for modifying new message retransmission within a system for harvesting community knowledge | |
WO2002010982A2 (en) | Computer system for collecting information from web sites | |
CA2352174A1 (en) | Method and system for summarizing topics of documents browsed by a user | |
US20040024719A1 (en) | System and method for scoring messages within a system for harvesting community kowledge | |
US20030018779A1 (en) | Method, system and computer program for controlling access in a distributed data processing system | |
US7389290B2 (en) | System and method for scoring new messages based on previous responses within a system for harvesting community knowledge | |
US20030158747A1 (en) | Knowledge management system | |
Ericsson et al. | Knowledge management systems acceptance | |
Ji et al. | A metadata filter for intranet portal organizational memory information systems | |
Arnoux et al. | Automatic clustering for the web usage mining | |
EP1363203A1 (en) | System and method for searching information automatically according to analysed results | |
KR20040080137A (en) | Outside information system and outside information processing method | |
Kebreau et al. | An intelligent information-filtering assistant integrated into a multi-agent architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TRANSCOM SOFTWARE INC., VIRGIN ISLANDS, BRITISH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TRIGGS, HOWARD WILLIAM;REEL/FRAME:014000/0907 Effective date: 19991222 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |