Browse Prior Art Database

Security Interchange Structure

IP.com Disclosure Number: IPCOM000040930D
Original Publication Date: 1987-Mar-01
Included in the Prior Art Database: 2005-Feb-02
Document File: 1 page(s) / 12K

Publishing Venue

IBM

Related People

Scully, KJ: AUTHOR [+2]

Abstract

A method is described for automatically notifying a user of any type of inquiry made against any entry on his/her calendar. Capability is also provided to allow calendar entry security information to be exchanged between systems either locally or remotely. Security is provided for giving or denying access to calendar entries. Securing information in an electronic calendaring system is an important requirement in any system with confidential information. Salary, sales and accounting information may be intended for only a subset of a company's entire contingent to view. Other information such as staff meetings or lunch appointments, might be general enough to be of importance to a broader group of people. A method is necessary to manage and track access to the calendar information.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 69% of the total text.

Page 1 of 1

Security Interchange Structure

A method is described for automatically notifying a user of any type of inquiry made against any entry on his/her calendar. Capability is also provided to allow calendar entry security information to be exchanged between systems either locally or remotely. Security is provided for giving or denying access to calendar entries. Securing information in an electronic calendaring system is an important requirement in any system with confidential information. Salary, sales and accounting information may be intended for only a subset of a company's entire contingent to view. Other information such as staff meetings or lunch appointments, might be general enough to be of importance to a broader group of people. A method is necessary to manage and track access to the calendar information.

The method establishes a personal status list to determine who should have access to different classes of entries. A list of names and their associated security levels is used. The list is compared with the particular calendar entry to determine if an individual is to be denied or granted access. Information could also be exchanged between other systems with the classification interchange structure. The interchange structure provides a consistent way for applications to interchange information, create or update an user classification code remotely, detect the arrival of an unsolicited message and search, sort and list specific entries. Capability would also...