Browse Prior Art Database

Methodology for Profile Replication

IP.com Disclosure Number: IPCOM000110405D
Original Publication Date: 1992-Nov-01
Included in the Prior Art Database: 2005-Mar-25
Document File: 3 page(s) / 123K

Publishing Venue

IBM

Related People

Dugan, PA: AUTHOR [+4]

Abstract

With the advent of electronic distribution, users can assign a multitude of attributes to a distribution. Users can identify Action Due Date, Importance, Grade of Delivery, Copy Recipients, etc. Additional attributes are created by enterprises as objects become more complicated. Typically, the user must specify the attributes for each distribution that the user wishes to send. Often, the attributes that a user wishes to assign are identical with that of a previous distribution. This article describes a method that allows a user to replicate the attributes of previous distributions to subsequent distributions.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Methodology for Profile Replication

       With the advent of electronic distribution, users can
assign a multitude of attributes to a distribution.  Users can
identify Action Due Date, Importance, Grade of Delivery, Copy
Recipients, etc.  Additional attributes are created by enterprises as
objects become more complicated.  Typically, the user must specify
the attributes for each distribution that the user wishes to send.
Often, the attributes that a user wishes to assign are identical with
that of a previous distribution.  This article describes a method
that allows a user to replicate the attributes of previous
distributions to subsequent distributions.

      The figure illustrates an example of this invention. Created
within the desktop are two profile icons.  Creation may have occurred
by previous distributions or by the user creating a profile icon
directly.  The user identifies the icons as Class A and Class B.  For
example, Class A may have been a predefined profile for high security
and urgent distributions.  The user can drop and drag these icons to
other objects.  These objects can then inherit these attributes.
This method encompasses several integrated components to perform the
desired effect.  The following components are described:
o    Iconic Profiler - The user designating the attributes of a given
distribution invokes this service.  This mechanism takes the
attributes and creates an associated icon that can be used to
represent the attributes.  Optionally, this mechanism may be directly
invoked by the user, i.e., if the user wishes to set up pre-defined
attributes without distributing a document.
o    Object Correlator - This service correlates the object types to
the methodology for transposition.  This mechanism determines which
objects need a copy of the attributes and for which objects the
attributes should be instantiated into the content of the object.
For example, transposing electronic attributes for mail distribution
to that of another mail distribution may only require that the
attributes be copied into the attribute fields of the new
distribution.  Transposing attributes into an audio object can invoke
the Text To Speech process for transposing the attributes into the
audio object itself.
o    Locati...