US20170212920A1 - Keyword-based content management - Google Patents
Keyword-based content management Download PDFInfo
- Publication number
- US20170212920A1 US20170212920A1 US15/251,245 US201615251245A US2017212920A1 US 20170212920 A1 US20170212920 A1 US 20170212920A1 US 201615251245 A US201615251245 A US 201615251245A US 2017212920 A1 US2017212920 A1 US 2017212920A1
- Authority
- US
- United States
- Prior art keywords
- data
- information
- user
- network
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G06F17/30342—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2291—User-Defined Types; Storage management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/907—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
-
- G06F17/30997—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/065—Replication mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
Definitions
- This invention relates generally to computer-implemented processes and, more specifically, to content management in electronic devices.
- traditional backup programs treat all of these files in the same manner, regardless of sensitivity and/or value to the user.
- Existing backup software typically requires the user's periodic interaction, usually to insert a new disc or tape or to initiate a network connection. Because this interaction is not initiated by the user and offers no immediate perceived value, it is often an unwanted chore. As such, existing data backup systems do not adequately help users protect themselves from data loss because they treat all data the same, thereby preventing the user from being able to treat data with different levels of care. Additionally, locating and assessing a desired storage destination for varying file types can likewise be a tedious and unwanted chore.
- a method, implementable in a system coupled to a network includes accessing a first portion of a memory device coupled to the network.
- the first portion has stored thereon information characterizing an entity.
- An information set of a predetermined information type is gathered from the first portion.
- First and second information subsets of the information set are organized into first and second keywords.
- a second portion of a memory device coupled to the network is accessed.
- the second portion has stored thereon a plurality of data sets.
- First and second subsets of the data sets are identified.
- Each data set of the first data-set subset includes the first keyword
- each data set of the second data-set subset includes the second keyword.
- the first data-set subset is stored in a third portion of a memory device coupled to the network
- the second data-set subset is stored in a fourth portion of a memory device coupled to the network.
- FIG. 1 is a schematic view of an exemplary operating environment in which an embodiment of the invention can be implemented
- FIG. 2 is a functional block diagram of an exemplary operating environment in which an embodiment of the invention can be implemented
- FIG. 3 is a block diagram illustrating an information-gathering process according to an embodiment of the invention.
- FIGS. 4 and 5 are diagrams illustrating storage formats of gathered information according to an embodiment of the invention.
- FIG. 6 is an illustration of a process according to an embodiment of the invention.
- FIG. 1 illustrates an example of a suitable computing system environment 100 on which an embodiment of the invention may be implemented.
- the computing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing environment 100 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment 100 .
- Embodiments of the invention are operational with numerous other general purpose or special purpose computing system environments or configurations.
- Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
- Embodiments of the invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer and/or by computer-readable media on which such instructions or modules can be stored.
- program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
- program modules may be located in both local and remote computer storage media including memory storage devices.
- an exemplary system for implementing the invention includes a general purpose computing device in the form of a computer 110 .
- Components of computer 110 may include, but are not limited to, a processing unit 120 , a system memory 130 , and a system bus 121 that couples various system components including the system memory to the processing unit 120 .
- the system bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
- such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
- ISA Industry Standard Architecture
- MCA Micro Channel Architecture
- EISA Enhanced ISA
- VESA Video Electronics Standards Association
- PCI Peripheral Component Interconnect
- Computer 110 typically includes a variety of computer readable media.
- Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media.
- Computer readable media may comprise computer storage media and communication media.
- Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 110 .
- Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
- the system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132 .
- ROM read only memory
- RAM random access memory
- BIOS basic input/output system
- RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120 .
- FIG. 1 illustrates operating system 134 , application programs 135 , other program modules 136 , and program data 137 .
- the computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media.
- FIG. 1 illustrates a hard disk drive 140 that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive 151 that reads from or writes to a removable, nonvolatile magnetic disk 152 , and an optical disk drive 155 that reads from or writes to a removable, nonvolatile optical disk 156 such as a CD ROM or other optical media.
- removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like.
- the hard disk drive 141 is typically connected to the system bus 121 through a non-removable memory interface such as interface 140
- magnetic disk drive 151 and optical disk drive 155 are typically connected to the system bus 121 by a removable memory interface, such as interface 150 .
- hard disk drive 141 is illustrated as storing operating system 144 , application programs 145 , other program modules 146 , and program data 147 . Note that these components can either be the same as or different from operating system 134 , application programs 135 , other program modules 136 , and program data 137 . Operating system 144 , application programs 145 , other program modules 146 , and program data 147 are given different numbers here to illustrate that, at a minimum, they are different copies.
- a user may enter commands and information into the computer 20 through input devices such as a keyboard 162 and pointing device 161 , commonly referred to as a mouse, trackball or touch pad.
- Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
- These and other input devices are often connected to the processing unit 120 through a user input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB).
- a monitor 191 or other type of display device is also connected to the system bus 121 via an interface, such as a video interface 190 .
- computers may also include other peripheral output devices such as speakers 197 and printer 196 , which may be connected through an output peripheral interface 190 .
- the computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180 .
- the remote computer 180 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110 , although only a memory storage device 181 has been illustrated in FIG. 1 .
- the logical connections depicted in FIG. 1 include a local area network (LAN) 171 and a wide area network (WAN) 173 , but may also include other networks.
- LAN local area network
- WAN wide area network
- Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
- the computer 110 When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170 .
- the computer 110 When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173 , such as the Internet.
- the modem 172 which may be internal or external, may be connected to the system bus 121 via the user input interface 160 , or other appropriate mechanism.
- program modules depicted relative to the computer 110 may be stored in the remote memory storage device.
- FIG. 1 illustrates remote application programs 185 as residing on memory device 181 . It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
- System 200 includes electronic user devices 210 , 280 , such as personal computers, workstations or other processing devices (e.g., personal digital assistants), that are linked via a communication medium, such as a network 220 (e.g., the Internet), to an electronic device or system, such as a server 230 .
- the server 230 may further be coupled, or otherwise have access, to a database 240 , electronic storage 270 and a computer system 260 .
- FIG. 2 includes one server 230 coupled to two user devices 210 , 280 via the network 220 , it should be recognized that embodiments of the invention may be implemented using two or more such user devices coupled to one or more such servers.
- each of the user devices 210 , 280 and server 230 may include all or fewer than all of the features associated with the computer 110 illustrated in and discussed with reference to FIG. 1 .
- User devices 210 , 280 may include or may be otherwise coupled to a computer screen or display 250 , 290 , respectively.
- User devices 210 , 280 can be used for various purposes including both network- and local-computing processes.
- the user devices 210 , 280 are linked via the network 220 to server 230 so that computer programs, such as, for example, a browser or other applications, running on the user devices 210 , 280 can cooperate in two-way communication with server 230 .
- Server 230 may be coupled to database 240 and/or electronic storage 270 to retrieve information therefrom and to store information thereto. Additionally, the server 230 may be coupled to the computer system 260 in a manner allowing the server to delegate certain processing functions to the computer system.
- Embodiments of the invention gather all or some information related to a particular person/entity and store it in a central location.
- Embodiments of the invention may include software applications, executable by one or more of the user devices 210 , 280 and server 230 , that utilize gathered personal information to perform backup, synching, sharing, and/or management of data that contain one or more keyword(s) that pertain(s) to a person or an entity.
- Embodiments of the invention manage and/or organize all or some digital content stored at different locations by using keywords associated with a person/entity's personal information.
- Embodiments of the invention automatically gather all or some information related to a person/entity (by accessing other databases or applications such as email applications, web browsers, etc.).
- a process that is performed “automatically” may mean that the process is performed as a result of machine-executed instructions and does not, other than the establishment of user preferences, require manual effort.
- Examples of personal information include contact information (name, nicknames, email/web addresses, home/business addresses, phone numbers, etc.), important dates (birthday, anniversary, events, etc.), and other information that may be used in particular contexts (social security number, credit card numbers, login username, etc.).
- Customized personal information can also be created through a GUI application. All or some of this information may be then stored in a central location and/or serves as keywords that relate to this particular person/entity.
- Embodiments of the invention manage data by searching for contents with any of the keywords related to a person and/or organizing/saving the matching data for that person/entity
- Embodiments of the invention do not require the managed data (folders, files, images, etc.) to be at a certain location or in a certain format.
- Embodiments of the invention allow all or some personal information to be stored in one place for a person/entity.
- the gathered information can be used as keywords by other different applications to perform operations such as backup, synching, sharing, and/or management of all or some digital contents stored at different locations
- a user of the user device 210 may instruct an application 215 executed by the user device 210 to access a memory portion of the user device 280 and, as discussed in greater detail below, gather therefrom personal information associated with, or other information pertaining to activities of, the user.
- the user of the user device 210 may instruct an application 215 executed by the user device 210 to access a memory portion of the user device 210 and gather therefrom personal information associated with, or other information pertaining to activities of, the user.
- the user may instruct a web-based application 235 executed by the server 230 to perform one or more of the information-accessing and -gathering functions described above.
- the user may specify the types of information that should be sought and gathered. For example, as illustrated in FIG. 3 , and by way of non-limiting example, the user may specify that a contacts database be accessed for retrieval of contact information, web browser files be accessed for retrieval of “autofill” information (e.g., name/address information, credit card information, passwords, etc.) used for web-based transactions and/or other information stored in a location that can be designated by a path and/or file name.
- autofill e.g., name/address information, credit card information, passwords, etc.
- An embodiment includes a graphical user interface that allows the user to pre-define and store in a location of the user's choosing a set of personal information that the user may desire to be accessed in the future. As such, the user may specify that such pre-defined information set be accessed for information retrieval.
- the desired information may be stored in a location (e.g., server 230 , one or more of user devices 210 , 280 , or other location) of the user's choosing.
- the information can be converted to, for example, a .CSV format or accessed through a GUI application.
- the application 215 and/or 235 can automatically search for digital data sets, such as folders, images, documents or other file types (“files”), in memory locations (e.g., memory devices associated with or otherwise coupled to server 230 , one or more of user devices 210 , 280 , or other location) designated by the user.
- memory locations e.g., memory devices associated with or otherwise coupled to server 230 , one or more of user devices 210 , 280 , or other location
- terms e.g., business/personal names, passwords, email addresses, phone numbers, important dates, etc. discussed and illustrated with reference to FIGS. 4 and 5
- the application 215 and/or 235 can automatically identify files stored in the memory locations that contain one or more of the keywords.
- the application 215 and/or 235 can automatically act on each respective file based on a predetermined set of user preferences. For example, a user may have previously specified that all files that contain a certain term (be it in a body of text, associated metadata, file name, or the like) be moved or copied to a corresponding folder at a designated memory location associated with the network system 200 . Additionally, a user may have previously specified that only files that contain a certain combination of terms be moved or copied to a corresponding folder at a designated memory location associated with the network system 200 .
- a user may have previously specified that all files that contain a certain date be moved or copied to a calendar application associated with the network system 200 so as to set up an event viewable in the calendar and associated with that date. Additionally, a user may have previously specified that all files that contain a certain term be emailed or otherwise forwarded to a designated recipient. In each such case, or combination thereof, the application 215 and/or 235 can automatically perform the desired predetermined act.
- keyword-search and action functionality described above can be implemented as an ongoing process applied to newly created, modified and/or received files. For example, if a file is created that includes, or an existing file is modified to include, a particular keyword, then an embodiment, which can be configured to periodically poll stored files for keywords contained therein, can automatically subsequently perform an appropriate predetermined action on such file. Additionally, for example, if an email or other message is received that has associated therewith an attached file, an embodiment can automatically perform an appropriate predetermined action on such email attachment, such as moving the attachment to a particular folder based on automatic keyword search of the attachment.
- an embodiment can be configured to store copies of the file to all destinations associated with applicable actions.
- an embodiment can be configured to perform a single action with respect to the file based on a predetermined priority hierarchy, which may be established by the user. For example, the user may express, and an embodiment may give effect to, a desire that files containing a certain keyword be stored in a single location, regardless of any other keyword(s) that the file may contain.
- Personal information can be organized by different keys, such as name, birthday, email address, etc.
- keys can be names, email addresses, postal addresses, phone numbers that can be extracted from, for example, MS Outlook Contacts. Keywords, tags, author names can be extracted from the Properties info of a file such as Word document, JPEG image. These values are stored in a database organized with each field assigned to each extracted value.
- the database as described above can be queried to return a set of values matching the specified search pattern. For example, from FIG. 5 , a command to the database to return all names with a business state/location, the value of which is “CA” would return the names “Bob Johnson” and “Memeo.”
- FIG. 6 illustrates a process 600 according to an embodiment of the invention.
- the process 600 is implementable in an electronic system coupled to or including a storage device and/or a network.
- the process 600 is illustrated as a set of operations shown as discrete blocks.
- the process 600 may be implemented in any suitable hardware, software, firmware, or combination thereof.
- the process 600 may be implemented in computer-readable instructions that can be sent from one electronic device to another over a network.
- the order in which the operations are described is not to be necessarily construed as a limitation.
- a first portion of a memory device coupled to the network is accessed.
- the first portion has stored thereon information characterizing an entity.
- a user of the user device 210 may instruct an application 215 executed by the user device 210 to access a memory portion of the user device 280 and, as discussed in greater detail below, gather therefrom personal information associated with, or other information pertaining to activities of, the user.
- the user of the user device 210 may instruct an application 215 executed by the user device 210 to access a memory portion of the user device 210 and gather therefrom personal information associated with, or other information pertaining to activities of, the user.
- the user may instruct a web-based application 235 executed by the server 230 to perform one or more of the information-accessing and -gathering functions described above.
- an information set of a predetermined information type is gathered from the first portion.
- the user may specify that a contacts database be accessed for retrieval of contact information, web browser files be accessed for retrieval of “autofill” information (e.g., name/address information, credit card information, passwords, etc.) used for web-based transactions and/or other information stored in a location that can be designated by a path and/or file name.
- autofill information
- first and second information subsets of the information set are organized into first and second keywords.
- a second portion of a memory device coupled to the network is accessed.
- the second portion has stored thereon a plurality of data sets.
- the application 215 and/or 235 can automatically search for digital data sets, such as folders, images, documents or other file types (“files”), in memory locations (e.g., memory devices associated with or otherwise coupled to server 230 , one or more of user devices 210 , 280 , or other location) designated by the user.
- a first subset of the data sets and a second subset of the data sets are identified.
- Each data set of the first data-set subset includes the first keyword
- each data set of the second data-set subset includes the second keyword.
- searchable keywords e.g., first and second keywords
- the first data-set subset is stored in a third portion of a memory device coupled to the network
- the second data-set subset is stored in a fourth portion of a memory device coupled to the network.
- the application 215 and/or 235 can automatically act on each respective file based on a predetermined set of user preferences. For example, a user may have previously specified that all files that contain a certain term (be it in a body of text, associated metadata, file name, or the like) be moved or copied to a corresponding folder at a designated memory location associated with the network system 200 .
- a user may have previously specified that only files that contain a certain combination of terms be moved or copied to a corresponding folder at a designated memory location associated with the network system 200 . Additionally, a user may have previously specified that all files that contain a certain date be moved or copied to a calendar application associated with the network system 200 so as to set up an event viewable in the calendar and associated with that date. Additionally, a user may have previously specified that all files that contain a certain term be emailed or otherwise forwarded to a designated recipient. In each such case, or combination thereof, the application 215 and/or 235 can automatically perform the desired predetermined act.
Abstract
A method, implementable in a system coupled to a network, includes accessing a first portion of a memory device coupled to the network. The first portion has stored thereon information characterizing an entity. An information set of a predetermined information type is gathered from the first portion. First and second information subsets of the information set are organized into first and second keywords. A second portion of a memory device coupled to the network is accessed. The second portion has stored thereon a plurality of data sets. First and second subsets of the data sets are identified. Each data set of the first data-set subset includes the first keyword, and each data set of the second data-set subset includes the second keyword. The first data-set subset is stored in a third portion of a memory device coupled to the network.
Description
- This application claims priority to U.S. Provisional Appl. No. 60/911,454 entitled “USING KEYWORDS TO MANAGE CONTENTS” and filed Apr. 12, 2007, which is hereby incorporated by reference in its entirety.
- This invention relates generally to computer-implemented processes and, more specifically, to content management in electronic devices.
- As computers become an increasingly ubiquitous tool, people are creating and storing more and more different kinds of data on their hard disks. Tax returns, financial records, letters, address books, photos, and digital music all have varying levels of sentimental, financial, and utilitarian value. However, traditional backup programs treat all of these files in the same manner, regardless of sensitivity and/or value to the user.
- Existing backup software typically requires the user's periodic interaction, usually to insert a new disc or tape or to initiate a network connection. Because this interaction is not initiated by the user and offers no immediate perceived value, it is often an unwanted chore. As such, existing data backup systems do not adequately help users protect themselves from data loss because they treat all data the same, thereby preventing the user from being able to treat data with different levels of care. Additionally, locating and assessing a desired storage destination for varying file types can likewise be a tedious and unwanted chore.
- Other problems with the prior art not described above can also be overcome using the teachings of embodiments of the present invention, as would be readily apparent to one of ordinary skill in the art after reading this disclosure.
- In an embodiment, a method, implementable in a system coupled to a network, includes accessing a first portion of a memory device coupled to the network. The first portion has stored thereon information characterizing an entity. An information set of a predetermined information type is gathered from the first portion. First and second information subsets of the information set are organized into first and second keywords. A second portion of a memory device coupled to the network is accessed. The second portion has stored thereon a plurality of data sets. First and second subsets of the data sets are identified. Each data set of the first data-set subset includes the first keyword, and each data set of the second data-set subset includes the second keyword. The first data-set subset is stored in a third portion of a memory device coupled to the network, and the second data-set subset is stored in a fourth portion of a memory device coupled to the network.
- Preferred and alternative embodiments of the present invention are described in detail below with reference to the following drawings.
-
FIG. 1 is a schematic view of an exemplary operating environment in which an embodiment of the invention can be implemented; -
FIG. 2 is a functional block diagram of an exemplary operating environment in which an embodiment of the invention can be implemented; -
FIG. 3 is a block diagram illustrating an information-gathering process according to an embodiment of the invention; -
FIGS. 4 and 5 are diagrams illustrating storage formats of gathered information according to an embodiment of the invention; and -
FIG. 6 is an illustration of a process according to an embodiment of the invention. -
FIG. 1 illustrates an example of a suitablecomputing system environment 100 on which an embodiment of the invention may be implemented. Thecomputing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should thecomputing environment 100 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in theexemplary operating environment 100. - Embodiments of the invention are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
- Embodiments of the invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer and/or by computer-readable media on which such instructions or modules can be stored. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
- With reference to
FIG. 1 , an exemplary system for implementing the invention includes a general purpose computing device in the form of acomputer 110. Components ofcomputer 110 may include, but are not limited to, aprocessing unit 120, asystem memory 130, and asystem bus 121 that couples various system components including the system memory to theprocessing unit 120. Thesystem bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus. -
Computer 110 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed bycomputer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed bycomputer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media. - The
system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information between elements withincomputer 110, such as during start-up, is typically stored inROM 131.RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on byprocessing unit 120. By way of example, and not limitation,FIG. 1 illustratesoperating system 134,application programs 135,other program modules 136, andprogram data 137. - The
computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,FIG. 1 illustrates ahard disk drive 140 that reads from or writes to non-removable, nonvolatile magnetic media, amagnetic disk drive 151 that reads from or writes to a removable, nonvolatilemagnetic disk 152, and anoptical disk drive 155 that reads from or writes to a removable, nonvolatileoptical disk 156 such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive 141 is typically connected to thesystem bus 121 through a non-removable memory interface such asinterface 140, andmagnetic disk drive 151 andoptical disk drive 155 are typically connected to thesystem bus 121 by a removable memory interface, such asinterface 150. - The drives and their associated computer storage media discussed above and illustrated in
FIG. 1 , provide storage of computer readable instructions, data structures, program modules and other data for thecomputer 110. InFIG. 1 , for example, hard disk drive 141 is illustrated as storingoperating system 144,application programs 145,other program modules 146, andprogram data 147. Note that these components can either be the same as or different fromoperating system 134,application programs 135,other program modules 136, andprogram data 137.Operating system 144,application programs 145,other program modules 146, andprogram data 147 are given different numbers here to illustrate that, at a minimum, they are different copies. A user may enter commands and information into the computer 20 through input devices such as akeyboard 162 andpointing device 161, commonly referred to as a mouse, trackball or touch pad. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to theprocessing unit 120 through auser input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). Amonitor 191 or other type of display device is also connected to thesystem bus 121 via an interface, such as avideo interface 190. In addition to the monitor, computers may also include other peripheral output devices such asspeakers 197 andprinter 196, which may be connected through an outputperipheral interface 190. - The
computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as aremote computer 180. Theremote computer 180 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to thecomputer 110, although only a memory storage device 181 has been illustrated inFIG. 1 . The logical connections depicted inFIG. 1 include a local area network (LAN) 171 and a wide area network (WAN) 173, but may also include other networks. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet. - When used in a LAN networking environment, the
computer 110 is connected to theLAN 171 through a network interface oradapter 170. When used in a WAN networking environment, thecomputer 110 typically includes amodem 172 or other means for establishing communications over theWAN 173, such as the Internet. Themodem 172, which may be internal or external, may be connected to thesystem bus 121 via theuser input interface 160, or other appropriate mechanism. In a networked environment, program modules depicted relative to thecomputer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,FIG. 1 illustratesremote application programs 185 as residing on memory device 181. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used. - Referring now to
FIG. 2 , an embodiment of the present invention can be described in the context of an exemplarycomputer network system 200 as illustrated.System 200 includeselectronic user devices server 230. Theserver 230 may further be coupled, or otherwise have access, to adatabase 240,electronic storage 270 and acomputer system 260. Although the embodiment illustrated inFIG. 2 includes oneserver 230 coupled to twouser devices network 220, it should be recognized that embodiments of the invention may be implemented using two or more such user devices coupled to one or more such servers. - In an embodiment, each of the
user devices server 230 may include all or fewer than all of the features associated with thecomputer 110 illustrated in and discussed with reference toFIG. 1 .User devices display User devices - The
user devices network 220 toserver 230 so that computer programs, such as, for example, a browser or other applications, running on theuser devices server 230.Server 230 may be coupled todatabase 240 and/orelectronic storage 270 to retrieve information therefrom and to store information thereto. Additionally, theserver 230 may be coupled to thecomputer system 260 in a manner allowing the server to delegate certain processing functions to the computer system. - Embodiments of the invention gather all or some information related to a particular person/entity and store it in a central location.
- Embodiments of the invention may include software applications, executable by one or more of the
user devices server 230, that utilize gathered personal information to perform backup, synching, sharing, and/or management of data that contain one or more keyword(s) that pertain(s) to a person or an entity. Embodiments of the invention manage and/or organize all or some digital content stored at different locations by using keywords associated with a person/entity's personal information. - Embodiments of the invention automatically gather all or some information related to a person/entity (by accessing other databases or applications such as email applications, web browsers, etc.). As used herein, a process that is performed “automatically” may mean that the process is performed as a result of machine-executed instructions and does not, other than the establishment of user preferences, require manual effort. Examples of personal information include contact information (name, nicknames, email/web addresses, home/business addresses, phone numbers, etc.), important dates (birthday, anniversary, events, etc.), and other information that may be used in particular contexts (social security number, credit card numbers, login username, etc.). Customized personal information can also be created through a GUI application. All or some of this information may be then stored in a central location and/or serves as keywords that relate to this particular person/entity.
- Embodiments of the invention manage data by searching for contents with any of the keywords related to a person and/or organizing/saving the matching data for that person/entity
- Embodiments of the invention do not require the managed data (folders, files, images, etc.) to be at a certain location or in a certain format.
- Currently, different personal information gets stored in different places by different applications (Contact info in Outlook Contacts, important dates in Calendar, login, credit card info in web browsers, etc.). Embodiments of the invention allow all or some personal information to be stored in one place for a person/entity.
- The gathered information can be used as keywords by other different applications to perform operations such as backup, synching, sharing, and/or management of all or some digital contents stored at different locations
- For example, a user of the
user device 210 may instruct anapplication 215 executed by theuser device 210 to access a memory portion of theuser device 280 and, as discussed in greater detail below, gather therefrom personal information associated with, or other information pertaining to activities of, the user. Alternatively, the user of theuser device 210 may instruct anapplication 215 executed by theuser device 210 to access a memory portion of theuser device 210 and gather therefrom personal information associated with, or other information pertaining to activities of, the user. Still alternatively, the user may instruct a web-basedapplication 235 executed by theserver 230 to perform one or more of the information-accessing and -gathering functions described above. - Through the use of, for example, a graphical user interface (not shown) displayed on the
display 250, the user may specify the types of information that should be sought and gathered. For example, as illustrated inFIG. 3 , and by way of non-limiting example, the user may specify that a contacts database be accessed for retrieval of contact information, web browser files be accessed for retrieval of “autofill” information (e.g., name/address information, credit card information, passwords, etc.) used for web-based transactions and/or other information stored in a location that can be designated by a path and/or file name. An embodiment includes a graphical user interface that allows the user to pre-define and store in a location of the user's choosing a set of personal information that the user may desire to be accessed in the future. As such, the user may specify that such pre-defined information set be accessed for information retrieval. - Referring to
FIGS. 4 and 5 , once the desired information is retrieved, it may be stored in a location (e.g.,server 230, one or more ofuser devices - Once the desired personal information has been gathered, the
application 215 and/or 235 can automatically search for digital data sets, such as folders, images, documents or other file types (“files”), in memory locations (e.g., memory devices associated with or otherwise coupled toserver 230, one or more ofuser devices FIGS. 4 and 5 ) associated with the gathered personal information as searchable keywords, theapplication 215 and/or 235 can automatically identify files stored in the memory locations that contain one or more of the keywords. - After identifying files with keywords, the
application 215 and/or 235 can automatically act on each respective file based on a predetermined set of user preferences. For example, a user may have previously specified that all files that contain a certain term (be it in a body of text, associated metadata, file name, or the like) be moved or copied to a corresponding folder at a designated memory location associated with thenetwork system 200. Additionally, a user may have previously specified that only files that contain a certain combination of terms be moved or copied to a corresponding folder at a designated memory location associated with thenetwork system 200. Additionally, a user may have previously specified that all files that contain a certain date be moved or copied to a calendar application associated with thenetwork system 200 so as to set up an event viewable in the calendar and associated with that date. Additionally, a user may have previously specified that all files that contain a certain term be emailed or otherwise forwarded to a designated recipient. In each such case, or combination thereof, theapplication 215 and/or 235 can automatically perform the desired predetermined act. - Additionally, the keyword-search and action functionality described above can be implemented as an ongoing process applied to newly created, modified and/or received files. For example, if a file is created that includes, or an existing file is modified to include, a particular keyword, then an embodiment, which can be configured to periodically poll stored files for keywords contained therein, can automatically subsequently perform an appropriate predetermined action on such file. Additionally, for example, if an email or other message is received that has associated therewith an attached file, an embodiment can automatically perform an appropriate predetermined action on such email attachment, such as moving the attachment to a particular folder based on automatic keyword search of the attachment.
- In case of a potential or actual conflict between or among predetermined user-prescribed actions with respect to a file (e.g., the file contains multiple keywords that would precipitate two or more conflicting dispositions of the file), an embodiment can be configured to store copies of the file to all destinations associated with applicable actions. Alternatively, an embodiment can be configured to perform a single action with respect to the file based on a predetermined priority hierarchy, which may be established by the user. For example, the user may express, and an embodiment may give effect to, a desire that files containing a certain keyword be stored in a single location, regardless of any other keyword(s) that the file may contain.
- Personal information can be organized by different keys, such as name, birthday, email address, etc.
- As an illustration, keys can be names, email addresses, postal addresses, phone numbers that can be extracted from, for example, MS Outlook Contacts. Keywords, tags, author names can be extracted from the Properties info of a file such as Word document, JPEG image. These values are stored in a database organized with each field assigned to each extracted value.
- The database as described above can be queried to return a set of values matching the specified search pattern. For example, from
FIG. 5 , a command to the database to return all names with a business state/location, the value of which is “CA” would return the names “Bob Johnson” and “Memeo.” -
FIG. 6 illustrates aprocess 600 according to an embodiment of the invention. Theprocess 600 is implementable in an electronic system coupled to or including a storage device and/or a network. Theprocess 600 is illustrated as a set of operations shown as discrete blocks. Theprocess 600 may be implemented in any suitable hardware, software, firmware, or combination thereof. Theprocess 600 may be implemented in computer-readable instructions that can be sent from one electronic device to another over a network. The order in which the operations are described is not to be necessarily construed as a limitation. - At a
block 610, a first portion of a memory device coupled to the network is accessed. The first portion has stored thereon information characterizing an entity. For example, a user of theuser device 210 may instruct anapplication 215 executed by theuser device 210 to access a memory portion of theuser device 280 and, as discussed in greater detail below, gather therefrom personal information associated with, or other information pertaining to activities of, the user. Alternatively, the user of theuser device 210 may instruct anapplication 215 executed by theuser device 210 to access a memory portion of theuser device 210 and gather therefrom personal information associated with, or other information pertaining to activities of, the user. Still alternatively, the user may instruct a web-basedapplication 235 executed by theserver 230 to perform one or more of the information-accessing and -gathering functions described above. - At a
block 620, an information set of a predetermined information type is gathered from the first portion. For example, and by way of non-limiting example, the user may specify that a contacts database be accessed for retrieval of contact information, web browser files be accessed for retrieval of “autofill” information (e.g., name/address information, credit card information, passwords, etc.) used for web-based transactions and/or other information stored in a location that can be designated by a path and/or file name. - At a
block 630, first and second information subsets of the information set are organized into first and second keywords. - At a
block 640, a second portion of a memory device coupled to the network is accessed. The second portion has stored thereon a plurality of data sets. For example, once the desired personal information has been gathered, theapplication 215 and/or 235 can automatically search for digital data sets, such as folders, images, documents or other file types (“files”), in memory locations (e.g., memory devices associated with or otherwise coupled toserver 230, one or more ofuser devices - At a
block 650, a first subset of the data sets and a second subset of the data sets are identified. Each data set of the first data-set subset includes the first keyword, and each data set of the second data-set subset includes the second keyword. For example, using terms (e.g., business/personal names, passwords, email addresses, phone numbers, important dates, etc. discussed and illustrated with reference toFIGS. 4 and 5 ) associated with the gathered personal information as searchable keywords (e.g., first and second keywords), theapplication 215 and/or 235 can automatically identify files stored in the memory locations that contain one or more of the keywords. - At a
block 660, the first data-set subset is stored in a third portion of a memory device coupled to the network, and the second data-set subset is stored in a fourth portion of a memory device coupled to the network. For example, after identifying files with keywords, theapplication 215 and/or 235 can automatically act on each respective file based on a predetermined set of user preferences. For example, a user may have previously specified that all files that contain a certain term (be it in a body of text, associated metadata, file name, or the like) be moved or copied to a corresponding folder at a designated memory location associated with thenetwork system 200. Additionally, a user may have previously specified that only files that contain a certain combination of terms be moved or copied to a corresponding folder at a designated memory location associated with thenetwork system 200. Additionally, a user may have previously specified that all files that contain a certain date be moved or copied to a calendar application associated with thenetwork system 200 so as to set up an event viewable in the calendar and associated with that date. Additionally, a user may have previously specified that all files that contain a certain term be emailed or otherwise forwarded to a designated recipient. In each such case, or combination thereof, theapplication 215 and/or 235 can automatically perform the desired predetermined act. - While a preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Instead, the invention should be determined entirely by reference to the claims that follow.
Claims (3)
1. A computer-readable medium having computer-executable instructions that, when executed in a system coupled to a network, enable the system to perform a method comprising at least the steps of:
accessing a first portion of a memory device coupled to the network, the first portion having stored thereon information characterizing an entity;
gathering from the first portion an information set of a predetermined information type;
organizing first and second information subsets of the information set into first and second keywords;
accessing a second portion of a memory device coupled to the network, the second portion having stored thereon a plurality of data sets;
identifying a first subset of the data sets, each data set of the first data-set subset including the first keyword, and a second subset of the data sets, each data set of the second data-set subset including the second keyword; and
storing the first data-set subset in a third portion of a memory device coupled to the network and the second data-set subset in a fourth portion of a memory device coupled to the network.
2. The medium of claim 1 wherein the predetermined information type is selected by a user of the system.
3. The medium of claim 1 wherein the third and fourth memory-device portions are selected for storage of the first data-set subset and the second data-set subset by a user of the system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/251,245 US20170212920A1 (en) | 2007-04-12 | 2016-08-30 | Keyword-based content management |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US91145407P | 2007-04-12 | 2007-04-12 | |
US12/102,630 US9430527B2 (en) | 2007-04-12 | 2008-04-14 | Keyword-based content management |
US15/251,245 US20170212920A1 (en) | 2007-04-12 | 2016-08-30 | Keyword-based content management |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/102,630 Continuation US9430527B2 (en) | 2007-04-12 | 2008-04-14 | Keyword-based content management |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170212920A1 true US20170212920A1 (en) | 2017-07-27 |
Family
ID=39854699
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/102,630 Active 2028-08-03 US9430527B2 (en) | 2007-04-12 | 2008-04-14 | Keyword-based content management |
US15/251,245 Abandoned US20170212920A1 (en) | 2007-04-12 | 2016-08-30 | Keyword-based content management |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/102,630 Active 2028-08-03 US9430527B2 (en) | 2007-04-12 | 2008-04-14 | Keyword-based content management |
Country Status (2)
Country | Link |
---|---|
US (2) | US9430527B2 (en) |
WO (1) | WO2008128185A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10917766B1 (en) * | 2020-03-10 | 2021-02-09 | Sprint Communications Company L.P. | System and methods for bring your own device eligibility platform |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8903929B2 (en) | 2012-07-05 | 2014-12-02 | Microsoft Corporation | Forgotten attachment detection |
US9965648B1 (en) * | 2017-04-06 | 2018-05-08 | International Business Machines Corporation | Automatic masking of sensitive data |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010029183A1 (en) * | 2000-04-06 | 2001-10-11 | Nec Corporation | Data providing system and method |
US20010050690A1 (en) * | 1999-09-30 | 2001-12-13 | Giles Conley Wilson | Image transfer matrix |
US6339795B1 (en) * | 1998-09-24 | 2002-01-15 | Egrabber, Inc. | Automatic transfer of address/schedule/program data between disparate data hosts |
US20020062360A1 (en) * | 2000-11-17 | 2002-05-23 | Nec Corporation | Information delivering server and clients and method thereof and storing medium stored programs to execute information delivery |
US20030093428A1 (en) * | 2001-11-12 | 2003-05-15 | Shingo Suzumori | Interactive browsing system |
US20030225696A1 (en) * | 2000-04-07 | 2003-12-04 | Paul Niwa | Customized multimedia content method, apparatus, media and signals |
US20040111289A1 (en) * | 2002-10-30 | 2004-06-10 | Ikuo Koumaru | Organization information management system |
US20060048190A1 (en) * | 2004-09-02 | 2006-03-02 | Brother Kogyo Kabushiki Kaisha | Device, system and computer program product for retrieving information |
US20070051793A1 (en) * | 2005-09-06 | 2007-03-08 | Masayoshi Katoh | Information processing apparatus, information recording system, information recording method, and computer-readable medium storing program |
US20070208699A1 (en) * | 2004-09-07 | 2007-09-06 | Shigeki Uetabira | Information search provision apparatus and information search provision system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002088943A1 (en) * | 2001-04-27 | 2002-11-07 | W. Quinn, Inc. | Filter driver for identifying disk files by analysis of content |
-
2008
- 2008-04-14 WO PCT/US2008/060239 patent/WO2008128185A1/en active Search and Examination
- 2008-04-14 US US12/102,630 patent/US9430527B2/en active Active
-
2016
- 2016-08-30 US US15/251,245 patent/US20170212920A1/en not_active Abandoned
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6339795B1 (en) * | 1998-09-24 | 2002-01-15 | Egrabber, Inc. | Automatic transfer of address/schedule/program data between disparate data hosts |
US20010050690A1 (en) * | 1999-09-30 | 2001-12-13 | Giles Conley Wilson | Image transfer matrix |
US20010029183A1 (en) * | 2000-04-06 | 2001-10-11 | Nec Corporation | Data providing system and method |
US20030225696A1 (en) * | 2000-04-07 | 2003-12-04 | Paul Niwa | Customized multimedia content method, apparatus, media and signals |
US20020062360A1 (en) * | 2000-11-17 | 2002-05-23 | Nec Corporation | Information delivering server and clients and method thereof and storing medium stored programs to execute information delivery |
US20030093428A1 (en) * | 2001-11-12 | 2003-05-15 | Shingo Suzumori | Interactive browsing system |
US20040111289A1 (en) * | 2002-10-30 | 2004-06-10 | Ikuo Koumaru | Organization information management system |
US20060048190A1 (en) * | 2004-09-02 | 2006-03-02 | Brother Kogyo Kabushiki Kaisha | Device, system and computer program product for retrieving information |
US20070208699A1 (en) * | 2004-09-07 | 2007-09-06 | Shigeki Uetabira | Information search provision apparatus and information search provision system |
US20070051793A1 (en) * | 2005-09-06 | 2007-03-08 | Masayoshi Katoh | Information processing apparatus, information recording system, information recording method, and computer-readable medium storing program |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10917766B1 (en) * | 2020-03-10 | 2021-02-09 | Sprint Communications Company L.P. | System and methods for bring your own device eligibility platform |
Also Published As
Publication number | Publication date |
---|---|
WO2008128185A1 (en) | 2008-10-23 |
US20080256101A1 (en) | 2008-10-16 |
US9430527B2 (en) | 2016-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10942982B2 (en) | Employing organizational context within a collaborative tagging system | |
Cutrell et al. | Searching to eliminate personal information management | |
US9229945B2 (en) | Computer system for automatic organization, indexing and viewing of information from multiple sources | |
US7797337B2 (en) | Methods, systems, and computer program products for automatically associating data with a resource as metadata based on a characteristic of the resource | |
US8832162B2 (en) | Method and system for storing, categorizing and distributing information concerning relationships between data | |
US9229992B2 (en) | Automatic identification of digital content related to a block of text, such as a blog entry | |
KR101344101B1 (en) | Redirection to local copies of server based files | |
US7711754B2 (en) | System and method for managing data using static lists | |
US8700581B2 (en) | Systems and methods for providing a map of an enterprise system | |
US8949241B2 (en) | Systems and methods for interactive disambiguation of data | |
US20070061296A1 (en) | Annotating documents in a collaborative application with data in disparate information systems | |
US20080235289A1 (en) | Method and device for managing unstructured data | |
US8108359B1 (en) | Methods and systems for tag-based object management | |
JP2008541261A (en) | Query composition using autolist | |
US20170212920A1 (en) | Keyword-based content management | |
Vinh-Doyle | Appraising email (using digital forensics): techniques and challenges | |
US20080256460A1 (en) | Computer-based electronic information organizer | |
US20080270453A1 (en) | Keyword-based content management | |
US20100241991A1 (en) | Computer-based electronic information organizer | |
CN110489377B (en) | Information management system and method based on label, memory and electronic equipment | |
Tungare et al. | Defragmenting information using the syncables framework | |
US20230028302A1 (en) | Systems and methods for document hierarchy permissioning | |
Cutrell et al. | Searching to Eliminate Personal Information Management Search systems can alleviate the need to organize personal information by helping us find it no matter where we encountered it, what we remember about it, and even if we forget it exists. | |
Szymaoski et al. | Unified approach to management of distributed personal information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |