Browse Prior Art Database

Method of Rule-Based File, Window, and Message Processing

IP.com Disclosure Number: IPCOM000115869D
Original Publication Date: 1995-Jul-01
Included in the Prior Art Database: 2005-Mar-30
Document File: 2 page(s) / 71K

Publishing Venue

IBM

Related People

Johnson, WJ: AUTHOR [+2]

Abstract

Disclosed is a system which enables the user to easily implement file security, window criteria, and message processing in a rule-based, personal assistant environment. The disclosed enablement is accomplished by adding intelligent event, condition, and action nodes to the personal assistant program on the desktop.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Method of Rule-Based File, Window, and Message Processing

      Disclosed is a system which enables the user to easily
implement file security, window criteria, and message processing in a
rule-based, personal assistant environment.  The disclosed enablement
is accomplished by adding intelligent event, condition, and action
nodes to the personal assistant program on the desktop.

      An intelligent agent is a specialized program which
communicates and exchanges data with other intelligent agents, and
the human interface to these agents is called a personal assistant.
Personal assistant programs, which use rule-based algorithms, are
quickly
becoming the state-of-the-art method for automatically performing
tasks
on the workstation, particularly in an office environment.

      These personal assistants offer the user a fixed set of events,
conditions, and actions.  The events specify occurrences of events in
an office environment designated by the user, such as the point in
time when the user receives an electronic mail item.  The conditions
are related criteria at the time the event occurs, such as a certain
time of day.  The actions are the functions designated by the user to
occur automatically when the event occurs under the stated
conditions.

      The disclosed system introduces an event called "Watch
Directory," which monitors a user-specified directory for any access
to any file in in that directory, whether the access is via an
application program or human interface (either graphical or command
line interface).  When the user programs the Watch Directory node,
the specific attributes of the Watch function are specified, such as
read, move, delete, copy, change, modify attribute, etc.  With this
rule activated, any time one of the specified files is accessed as
defined in the Watch Directory node, the specified ac...