Browse Prior Art Database

Conveying Hazardous Cargo within a Data Processing System

IP.com Disclosure Number: IPCOM000107612D
Original Publication Date: 1992-Mar-01
Included in the Prior Art Database: 2005-Mar-22
Document File: 1 page(s) / 60K

Publishing Venue

IBM

Related People

Johnson, WJ: AUTHOR [+3]

Abstract

Often within a distribution network, documents and objects are introduced into the network that are not compatible with the existing systems. Often these objects are introduced unintentionally as may be the case of a "virus" that is introduced into a network. A particular object may be introduced intentionally, but may be in a format that can cause a system to "crash" when the object is to be printed. Such characteristics of objects that are not understood by the user or are known to be dangerous can be classified as a "hazardous" object. Sometimes, it may be necessary to immediately distribute this hazardous cargo to a destination of containment for further analysis. This distribution could be for the purpose of sending a document to a recipient, who the user believes, has the ability to print the document.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 54% of the total text.

Conveying Hazardous Cargo within a Data Processing System

       Often within a distribution network, documents and
objects are introduced into the network that are not compatible with
the existing systems.  Often these objects are introduced
unintentionally as may be the case of a "virus" that is introduced
into a network. A particular object may be introduced intentionally,
but may be in a format that can cause a system to "crash" when the
object is to be printed. Such characteristics of objects that are not
understood by the user or are known to be dangerous can be classified
as a "hazardous" object.  Sometimes, it may be necessary to
immediately distribute this hazardous cargo to a destination of
containment for further analysis.  This distribution could be for the
purpose of sending a document to a recipient, who the user believes,
has the ability to print the document.

      This article describes a method by which a user can designate
that an object should be treated with caution. This method allows a
transport service to reroute an object from sensitive areas of a
network.  The creation of an icon within an electronic desktop
environment can be dragged and dropped on objects for which the user
wishes to designate as "hazardous".  This allows the user an
expedient fashion for designating objects as hazardous.  This icon
could be opened or expanded to allow the user to specify why the
object should be considered hazardous.

      A set of predefine...