Language selection

Search

Patent 2386293 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2386293
(54) English Title: METHOD AND APPARATUS FOR AN ACTIVE FILE SYSTEM
(54) French Title: PROCEDE ET APPAREIL POUR SYSTEME DE FICHIERS ACTIFS
Status: Dead
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06F 17/30 (2006.01)
(72) Inventors :
  • TADAYON, VALI (United States of America)
  • ZWICK, CHARLES M. (United States of America)
  • OSTERDAY, PATRICK B. (United States of America)
  • SADRI, MOHAMMAD REZA (United States of America)
(73) Owners :
  • CYBERSET TECHNOLOGIES, INC. (United States of America)
(71) Applicants :
  • CYBERSET TECHNOLOGIES, INC. (United States of America)
(74) Agent: FURMAN & KALLIO
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2000-09-29
(87) Open to Public Inspection: 2001-04-05
Examination requested: 2002-03-28
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2000/026913
(87) International Publication Number: WO2001/024059
(85) National Entry: 2002-03-28

(30) Application Priority Data:
Application No. Country/Territory Date
60/156,676 United States of America 1999-09-29
09/421,808 United States of America 1999-10-20

Abstracts

English Abstract




A computerized file system is provided that is accessible by users over the
Internet or other type of network, in which certain "triggering events"
pertaining to the operation of the file system automatically generate a
notification message to certain of the users. Once a user has been properly
authenticated, this user's access rights are determined to see whether the
user can read, write, or read/write files on the file server of the file
system, and these rights also determine if the user may download files from or
upload files to the file server. An Automatic Notification function checks to
see if any "triggering" events have occurred when a user performs a particular
task. The Automatic Notification function defines what exact type of event
will become a triggering event, and also defines what will be the triggering
action, once the triggering event occurs, and stores this information in a
database. In the preferred embodiment, these Automatic Notification messages
are transmitted via E-mail technology. By use of E-mail-type messages, the
notification process can be initiated simultaneously for all users who are to
receive any such notification message. The Auto-notification function can also
comprise other programs that are launched to perform certain tasks. The
precise type of auto-notification message is fully configurable for each
component in the file system. More than one single file can be stored having
the same virtual filename, at least as far as the individual users can
determine. The actual filename on the file server is always unique for each
individual file, and the actual filenames are stored in a "Files Table", and
links to the files are stored in the database.


French Abstract

L'invention se rapporte à un système informatisé de fichiers qui est accessible aux utilisateurs sur l'Internet ou sur un autre type de réseau, dans lequel certains "événements déclenchants" relatifs à l'exploitation du système de fichiers génèrent automatiquement un message de notification à destination de certains des utilisateurs. Une fois qu'un utilisateur a été correctement authentifié, les droits d'accès de cet utilisateur sont évalués de manière à déterminer si l'utilisateur peut accéder aux fichiers en lecture, écriture ou lecture/écriture sur le serveur de fichiers du système de fichiers, ces droits déterminant également si l'utilisateur peut télécharger des fichiers depuis le serveur de fichiers ou à destination de celui-ci. Une fonction de notification automatique vérifie si un événement "déclenchant" est intervenu alors que l'utilisateur exécutait une tâche particulière. Cette fonction de notification automatique définit quel type exact d'événement peut devenir un événement déclenchant et définit également quelle sera l'action déclenchante, une fois que l'événement déclenchant a lieu, et elle enregistre cette information dans une base de données. Dans la réalisation préférée, ces messages de notification automatique sont transmis par courrier électronique. Grâce à l'utilisation de ces messages de type courrier électronique, le processus de notification peut être initialisé simultanément pour tous les utilisateurs qui doivent recevoir tout message de notification de ce type. La fonction d'auto-notification peut également comporter d'autres programmes qui sont lancés pour exécuter certaines tâches. Le type précis de message d'auto-notification est entièrement configurable pour chaque composant du système de fichiers. Il est possible de stocker plusieurs fichiers sous un même nom de fichier virtuel, dans la mesure où les utilisateurs individuels peuvent les déterminer. Le nom de fichier réel sur le serveur de fichiers est toujours unique pour chaque fichier individuel, et les noms de fichiers réels sont stockés dans une "table des fichiers" et les liens avec les fichiers le sont dans une base de données.

Claims

Note: Claims are shown in the official language in which they were submitted.





-38-

CLAIMS

1. A computerized active file system, comprising:
a memory circuit for storing data;
a communications port that is in communication with a network, said
communications port being configured to transmit and receive data over said
network; and
a processing circuit that is configured to control the flow of data between
said memory circuit and said communications port; said processing circuit also
being configured to control said memory circuit so as to operate as a file
server;
said processing circuit being further configured to automatically cause a
notification message to be sent to said network upon the occurrence of at
least one
predetermined triggering event pertaining to the operation of said file
server,
wherein said at least one predetermined triggering event and its associated
type and
content of automatic notification message are configurable under the control
of an
auto-notification computer program routine residing on said computerized
active
file system.

2. The computerized active file system as recited in claim 1, wherein said at
least one predetermined triggering event and said associated automatic
notification
messages are configurable by a systems administrator.

3. The computerized active file system as recited in claim 1, wherein said
associated automatic notification messages are transmitted over said network
by
use of one of: (a) E-mail message technology, and (b) a predetermined rules-
based
function.

4. The computerized active file system as recited in claim 1, wherein said
memory circuit comprises random access memory (RAM) and a hard disk drive.




-39-

5. The computerized active file system as recited in claim 4, wherein said
file server comprises: (1) said hard disk drive, (2) said RAM, and (3) control
software that stores and retrieves groupings of data organized as individual
files
onto and from said hard disk drive, while utilizing said RAM for temporary
storage
of data that make up portions of said files or entire said files.

6. The computerized active file system as recited in claim 1, further
comprising: a database that contains information relating to said at least one
predetermined triggering event and its associated type of automatic
notification
message.

7. The computerized active file system as recited in claim 1, further
comprising: a web server that is in communication with one of a Local Area
Network, a Wide Area Network, and a global set of networks interconnected with
routers.

8. The computerized active file system as recited in claim 7, further
comprising: at least one user that is in communication with said one of a
Local
Area Network, a Wide Area Network, and a global set of networks interconnected
with routers; said at least one user having a computer platform that contains
browser software and graphical user interface software.

9. The computerized active file system as recited in claim 8, wherein said
associated automatic notification messages are transmitted over said network
to
predetermined of said at least one user by use of one of: (a) E-mail message
technology, and (b) a predetermined rules-based function.

10. The computerized active file system as recited in claim 1, further
comprising: (1) an authentication function, (2) an access rights function, (3)
a user
management function, (4) a group management function, (5) a modules
management function, and (6) an objects management function.

11. The computerized active file system as recited in claim 10, further
comprising: a function that imports users and groups from other computer
systems.




-40-

12. The computerized active file system as recited in claim 1, wherein said
triggering event comprises one of said file server granting access to: (1)
read a file,
(2) write a file, (3) read/write a file, (4) download a file, and (5) upload a
file.

13. A method for operating a computerized active file system, comprising:
providing a file server having a memory circuit for storing data, a
communications port for transmitting and receiving data over a network, and a
processing circuit that controls the flow of data between said memory circuit
and
said communications port, said file server treating predetermined data groups
as
single file entities; and
automatically causing a notification message to be sent to said network
upon the occurrence of at least one predetermined triggering event pertaining
to the
operation of said file server, wherein said at least one predetermined
triggering
event and its associated type and content of automatic notification message
are
configurable under the control of an auto-notification computer program
routine
residing on said computerized active file system.

14. The method as recited in claim 13, further comprising: configuring, by
a systems administrator, said at least one predetermined triggering event and
said
associated automatic notification messages.

15. The method as recited in claim 13, wherein said at least one
predetermined triggering event comprises a complex event.

16. The method as recited in claim 13, further comprising: storing in a
database information relating to said at least one predetermined triggering
event
and its associated type of automatic notification message.

17. The method as recited in claim 13, further comprising: transmitting
over said network said associated automatic notification messages by use of
one
of: (a) E-mail message technology, and (b) a predetermined rules-based
function.

18. The method as recited in claim 13, wherein said automatic notification
message comprises a complex action.



-41-


19. The method as recited in claim 18, wherein said complex action
comprises launching an application program.

20. The method as recited in claim 19, wherein said application program is
launched for a user that is in communication with said file server over a
Local Area
Network, said user having a computer platform that contains browser software
and
graphical user interface software.

21. The method as recited in claim 17, further comprising: providing a web
server that is in communication with said file server and one of a Local Area
Network, a Wide Area Network, and a global set of networks interconnected with
routers; providing at least one user that is in communication with said one of
a
Local Area Network, a Wide Area Network, and a global set of networks
interconnected with routers; said at least one user having a computer platform
that
contains browser software and graphical user interface software; and upon the
occurrence of one of said automatic notification messages, a link contained
within
said automatic notification message opens said at least one user's browser
software
and takes the user to a folder or object that was just triggered.

22. The method as recited in claim 21, wherein a distribution of said
automatic notification messages is determined by: (1) a type of said at least
one
predetermined triggering event, and (2) a predetermined set of said at least
one
user, as per a group definition.

23. The method as recited in claim 13, further comprising: (1) providing at
least two users that are in communication with said file server over said
network;
and (2) storing more than one single file under an identical virtual filename
as
presented to said at least two users as a Display Name, while storing said
more
than one single file under unique actual filenames in a Files Table contained
within
said memory circuit along with a link to a location of said more than one
single file
in a virtual folder, wherein said location is based upon: (a) a setting in a
database
and (b) a username of the virtual folder where the file is being uploaded to
with
said file server.



-42-


24. The method as recited in claim 13, further comprising: (1) an
authentication function, (2) an access rights function, (3) a user management
function, (4) a group management function, (5) a modules management function,
and (6) an objects management function.

25. The method as recited in claim 24, further comprising: importing users
and groups from other computer systems.

26. The method as recited in claim 24, further comprising: controlling a
plurality of objects by use of said modules management function and said
objects
management function, wherein said plurality of objects each comprises one of a
file, calendar, contact, report, and E-mail message.

27. The method as recited in claim 24, further comprising: controlling, by
use of said access rights function, a user's rights to read, write, or
read/write a file
being downloaded from or uploaded to said file server.

28. The method as recited in claim 13, wherein said triggering event
comprises one of said file server granting access to: (1) read a file, (2)
write a file,
(3) read/write a file, (4) download a file, and (5) upload a file.

29. The method as recited in claim 13, further comprising: seamlessly
encrypting data while uploading a file to said file server.

30. The method as recited in claim 13, wherein said file server operations
run on top of another architecture that also runs on said processing circuit.

31. The method as recited in claim 13, wherein a system for tracking bugs
and fixes runs on top of said file server operations, also on said processing
circuit.

32. A computerized active virtual file system, comprising:
a memory circuit for storing data;
a communications port that is in communication with a network, said
communications port being configured to transmit and receive data over said
network; and



-43-

a processing circuit that is configured to control the flow of data between
said memory circuit and said communications port; said processing circuit also
being configured to control said memory circuit so as to operate as a file
server;
said processing circuit being further configured to control the access rights
over
said network of a plurality of users to files stored on, or uploaded to, said
file
server, while providing an automatic notification message to predetermined of
said
plurality of users over said network when a triggering event occurs pertaining
to
the operation of said file server.

33. The computerized active virtual file system as recited in claim 32,
wherein said triggering event comprises one of said file server granting
access to:
(1) read a file, (2) write a file, (3) read/write a file, (4) download a file,
and (5)
upload a file.

34. The computerized active virtual file system as recited in claim 32,
wherein said at least one triggering event and its associated type and content
of
automatic notification message are configurable under the control of an auto-
notification computer program routine residing on said computerized active
virtual
file system.

35. The computerized active virtual file system as recited in claim 32,
wherein said at least one triggering event and its associated type and content
of
automatic notification message are sent via an E-mail message to virtually
immediately notify said predetermined users who are currently logged-on of
appropriate site activity at said file server, wherein others of said
predetermined
users are notified upon their next login session.

36. A computerized active file system comprising a computer readable
Garner including a computer program operative on an operating system
programmed to perform the steps of:


-44-


a. accessing a data structure representing a storage location in a file
system;
b. defining rules comprising at least one triggering event and at least
one triggering action;
c. associating said rules with said storage location data structures;
d. monitoring said storage location data structures;
e. implementing said triggering actions upon the occurrence of said
triggering events in said storage location data structure.

37. A computerized active file system as claimed in claim 36 wherein
said step of defining rules further comprises the steps of:

a. presenting an interface to a user wherein said interface allows
said user to configure at least one triggering event and at least
one triggering action;

b. receiving input from said user.

38. A computerized active file system as claimed in claim 37 wherein
said at least one triggering event and at least one triggering action
comprise a sequence of triggering events and actions.

39. A computerized active file system as claimed in claim 36 wherein
said storage location data structures comprise folders or directories.

40. A computerized active file system as claimed in claim 39 wherein
said triggering events comprise manipulating an object in said
folder.




-45-



41. A computerized active file system as claimed in claim 40 wherein
said manipulation comprises uploading said object into said folder,
deleting said object in said folder, moving said object from said
folder, renaming said object in said folder; viewing said object in
said folder; accessing said object in said folder; or a combination
thereof.

42. A computerized active file system as claimed in claim 39 wherein
said triggering event comprises manipulating said folder.

43. A computerized active file system as claimed in claim 42 wherein
said manipulating step comprises changing access rights on said
folder; creating a folder; deleting a folder; renaming a folder; or a
combination thereof.

44. A computerized active file system as claimed in claim 37 wherein
said triggering action comprises sending an e-mail to a pre-defined
user or group of users; archiving objects; running a script; launching
a program; or a combination thereof.

45. A method of managing workflow utilizing a computerized active
file system comprising the steps of:

a. accessing a data structure representing a storage location in a file
system;

b. defining rules comprising triggering events and triggering actions;

c. associating said rules with said storage location data structures;

d. monitoring said storage location data structures;

e. implementing said triggering actions upon the occurrence of said
triggering event in said storage location data structure.

46. A computerized active file system as claimed in claim 36 wherein
said file system is implemented over a network.


Description

Note: Descriptions are shown in the official language in which they were submitted.



WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
-1-
METHOD AND APPARATUS FOR AN
ACTIVE FILE SYSTEM
TECHNICAL FIELD
The present invention relates generally to computerized file servers/systems
and is particularly directed to a file server/system of the type that
automatically
sends a notification message upon the occurrence of a predetermined triggering
event. One embodiment of the invention is specifically disclosed as a web-
based
active virtual file system that controls the access rights of users to files
stored on
the file server of the active virtual file system, while providing an
automatic
notification E-mail message to predetermined users when a triggering event
occurs,
such as the uploading of a file onto the file server.
BACKGROUND OF THE INVENTION
Figure 1 shows a conventional filing system generally designated by the
reference numeral 10 that is accessible by users over a network. A first user
at 20
is connected to an Internet Service Provider (ISP) at 30, in which this first
user has
a browser software package on his or her computing platform, as well as a
graphical user interface operating system, such as WINDOWS or MACINTOSH.
A second user at 22 has a similar computing platform containing a browser and
a
graphical user interface operating system, and this user is connected to a
second
Internet Service Provider (ISP) at 32. Both of these ISP's 30 and 32 are
connected
to the Internet, which is generally designated by the reference numeral 35.
A central file system is generally designated by the reference numeral 50,
which contains a conventional file server operating system and at least one
hard
disk drive at 52. The file system 50 represents the main core of an Internet
web
site, which is connected to the Internet 35 via a web server 40 and a user
interface
software package 42. In typical Internet web site systems, both users 20 and
22
can simultaneously be connected through web server 40, user interface module
42,


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-2-
and to the file system 50, and can simultaneously access various web pages of
this
web site.
A third user at 24 is connected to a local area network (LAN) using a LAN
input-output module, and where the LAN itself is generally designated by the
reference numeral 45. A fourth user 26 also is connected to the LAN via a
separate
LAN input-output module. The LAN 45 is directly connected into the file system
S0, and users 24 and 26 will have access to files stored on the hard disk
drive, via
the server operating system at 52. Some of these files may contain displays
that
are either similar or identical to those displays made available through the
Internet
35 to users 20 and 22.
When a user attempts to log into file system 50, that user must provide
sufficient authentication information before the file server 50 will allow
that user
write or read/write access to any of the files stored on the hard disk drive
at 52. A
user Authentication module 60 is provided, which typically is in the form of a
user
login name and a user-specific password.
Once the user has been authenticated, the file system 50 will determine
what access rights this particular user will have to any of the files or
displays
residing on the hard disk drive at 52. This user's access rights are
determined by
use of an "Access Rights" module at 62. Such rights typically include the
right to
"read" a file stored within the file system 50, and to potentially "write" to
a file
also stored on file system S0. In most circumstances, if a user has the right
to write
to a particular file, that user will also have the right to read that same
file, although
these particular rights can be different and separate for any given file.
A User Management module 64 is also provided for file system 50, in
which new users can be created, existing users can be deleted or otherwise
edited,
wherein these functions can be performed by the systems administrator. In
addition, the user himself or herself can typically perform certain functions,
such
as changing a password or potentially even deleting oneself from the system as
a
user altogether. The User Management module 64 could also be fully automatic,


CA 02386293 2002-03-28
WO 01/24059 PCT/US00/26913
-3-
such as in the circumstance of certain Internet web sites that allow users to
essentially create themselves as being associated with that web site, under
the
control of software (such as the "User Management module") at the web site.
A network file system known as "NFS," similar to the filing system SO on
Figure 1, can mount remote file systems across homogenous and heterogeneous
systems. The NFS consists of a client and server systems. An NFS server can
export local directories for remote NFS clients to use. NFS runs over IP
(Internet
Protocol) using universal datagram protocol. There are NFS implementations
that
will work using TCP (Transmission Control Protocol) as the network transport
service. NFS was originally developed by Sun Microsystems Computer
Corporation, and is now part of their Open Network Computing (ONC) initiative.
NFS has been accepted by the IETF (Internet Engineering Task Force) in certain
RFC's (Requests for Comment) as a standard for file services on TCP/IP
networks
on the Internet.
CIFS is a proposed protocol that defines a standard remote file system
access protocol for use over the Internet, which enables groups of users to
work
together and share documents across the Internet or within their own corporate
intranets. While not yet finalized, CIFS is designed as an open cross-platform
technology based on the native file-sharing protocols built into Microsoft
WINDOWS and other popular personal computer operating systems, and probably
will be supported on dozens of other platforms, including UNIX. CIFS is
proposed
to be an enhanced version of Microsoft's open, cross-platform Server Message
Block (SMB) protocol, the native file-sharing protocol in the Microsoft
WINDOWS 95, WINDOWS NT, and OS-2 operating systems, and may become
the standard way that millions of personal computer users share files across
corporate intranets.
Another existing protocol is WEBNFS, which is implemented by Sun
Microsystems and which allows accessing NFS shares using Web browsers. The
shortcoming of this protocol is that it needs support in the browser, but is
not
supported in the most of today's existing browsers.


CA 02386293 2002-03-28
WO 01/24059 PCT/US00/26913
-4-
While the above-described NFS and CIFS systems have done much to help
standardize the sharing of files in distributed file systems, they do not
provide any
type of notification functions to users or groups of users when certain
accessing
events occur. In these conventional systems, if the first user modifies a
particular
file, only that first user is aware of this modification. A second user who
may also
have access to that same file would not be made aware of any such
modifications,
at least not without knowing the time and date stamps of previous saves of
that
same file.
SUMMARY OF THE INVENTION
Accordingly, it is a primary advantage of the present invention to provide a
method of configuring a file system to have customizable rules associated with
organizational units (i.e., folders, directories, categories) defined within
the file
system. It is another advantage of the present invention to provide a
distributed
file system that allows access to files by remote authorized users, and upon
such
access provides an Automatic Notification message to predetermined users
having
an appropriate interest in that particular file. It is another advantage of
the present
invention to provide a distributed filed system that is web-based so as to
allow
remote users to use standard web browser software to access files in a central
active virtual file system, and upon such accessing, the active virtual file
system
provides an Automatic Notification message to predetermined users having an
appropriate interest in that file. It is a yet further advantage of the
present
invention to provide a web-based active virtual file system that allows remote
users
to access certain files, and upon such access triggers an Automatic
Notification
message to other predetermined users having an appropriate interest in that
file. It
is still another advantage of the present invention to provide a web-based
active
virtual file system that can be configured to run programs, enforce
constraints,
send notifications, and perform other functions using predetermined rules that
enable the active virtual file system to be used in workflow automation. It is
yet a
further advantage of the present invention to provide a web-based active
virtual file
system that can be programmed by the systems administrator to accomplish tasks


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-5-
needed for E-commerce and in setting up sophisticated intranet and Internet
solutions, in which the active virtual file system provides triggers that
automatically notify predetermined users having an interest in files that are
being
uploaded to or downloaded from the active virtual file system.
Additional advantages and other novel features of the invention will be set
forth in part in the description that follows and in part will become apparent
to
those skilled in the art upon examination of the following or may be learned
with
the practice of the invention.
To achieve the foregoing and other advantages, and in accordance with one
aspect of the present invention, an improved computerized file system is
provided
that is accessible by users on a stand-alone computer, over the Internet, or
via a
local area network (LAl~ or wide area network (WAN). The Internet users
typically operate personal computer platforms having a web browser software
program that communicates with an Internet Service Provider (ISP), which
launches the users onto the Internet itself. On the other end of the Internet,
a web
server located near the computerized file system of the present invention
receives
messages from the users, and transmits messages back to those users as they
"logon" to the file system. The LAN users typically operate personal computer
or
workstation platforms that are directly connected to a local area network
(LAN),
which in turn is connected into the web server at the computerized file
system's
site. These LAN users will also preferably have a web browser-type software
program that is in communication over the LAN with the web server near the
computerized file system of the present invention.
The web server is connected to a user interface that presents a "folder"
window to the user, in the form of a Java tree structure or any hierarchical
structure
defined by the file system . The user interface also is in communication with
a
active file system (which is also referred to as a "AFS"), a web-based version
of
which comprises a network server operating system, which includes at least one
hard disk drive and a database. It is preferred that all users, regardless of
their
particular physical communications link to the AFS platform, be able to access
the


WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
-6-
active file system of the present invention by use of a web browser resident
on the
users' own computer platform. The AFS operating system may operate as a stand-
alone system (with no network connection), or may be resident on top of a
different architecture, or on top of other applications running on the same
computing platform.
When a user initially communicates to the AFS distributed file system, it
must be determined whether or not that user has any right to be logged into
the file
system. An "Authentication" function makes this determination. Once the user
has been properly authenticated, this user's access rights must now be
determined,
and the AFS uses an "Access Rights" function for this purpose, which inspects
information previously stored in the AFS pertaining to this particular user.
This
information essentially determines whether or not a user has the right to
either read
or write, or both read and write, a particular file that already resides on
the active
virtual file system's hard disk drive. These access rights also determine
whether or
not a user will be able to upload a new file onto the hard disk drive of the
AFS.
Authorized users optionally can seamlessly encrypt their data when uploading
files
uploading files to the AFS.
Other functions that are available to the active virtual file system 150
include a "User Management" function and a "Group Management" function,
which allow the AFS systems administrator to add, delete, or edit users and
their
attributes (at the User Management function), and to also group various users
in
predetermined ways (using the Group Management function). The User
Management and Group Management functions also allow importing users/groups
from other systems, such as UNIX password/group files, or from other systems
such as NIS, NT or Novell operating systems.
The main kernel logic of the preferred AFS operates at a level only as low
as "folders" (i.e., "directories"), however, it may be configured to control
individual files and application programs as well. A "Modules" function
contains
logic that controls the appearance of the screens at the user's monitor, and
command choices at the user's monitor screen are provided at appropriate
times.


WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
The Modules function manages the files of a folder-and therefore, can control
individual files-and also contain applications (such as word processors and
spreadsheet computer programs). The Modules function also controls "objects."
With reference to the present invention, a file is an example of an object,
and an
event is another example of an object. An application program can also be an
obj ect.
One important function associated with the active virtual file system is its
"Automatic Notification" function, which provides the capability of making the
AFS an "active" file system. The Automatic Notification function checks to see
if
any "triggering" events have occurred when a user performs a particular task.
Such
a triggering event could be 'merely the opening or downloading of a file on
the hard
disk drive, or more importantly, the saving (or uploading) of a file on the
hard disk
drive of the AFS. The Automatic Notification function defines what exact type
of
event will become a triggering event. Furthermore, the Automatic Notification
function also defines what will be the triggering action, once the triggering
event
occurs. All of this information preferably is stored in the database, in which
all of
the defining triggering events and triggering actions are preferably held in a
single
large table of the database.
The active aspects of the AFS of the present invention work completely
outside any database program and instead concentrate on the file system itself
to
both monitor and control certain actions by users, and then provide for the
Automatic Notification function to perform a predetermined task upon the
occurrence of such predetermined actions by these users. The Automatic
Notification function has the capability to send messages automatically to
other
users that have an interest in a particular file that undergoes certain
activities,
which are predetermined by the systems administrator. There is complete
flexibility as to just what events can be specified as becoming a "triggering
event,"
and there is complete flexibility as to "who" receives an Automatic
Notification
message. The Automatic Notification messages would normally be sent to users


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
_g_
who are grouped in some logical (or at least predetermined) manner, according
to
the Group Management function.
Triggering events could be more complex than simple file operations, and
for example, such "complex events" could comprise a sequence of "simple
events."
These complex events (as triggering events) are completely programmable, and
their resulting actions can be similarly "complex" from the standpoint that
they are
also completely programmable, and further are able to launch completely
separate
application programs. Moreover, the "complex actions" that can be programmed
using the AFS may launch application programs to both LAN users (without use
of
the Internet) and to WAN users (including those connected via the Internet).
In the preferred embodiment, these Automatic Notification messages are
transmitted via E-mail technology. Automatic Notification messages, however,
are
completely configurable and may encompass both asynchronous and synchronous
messaging as well as the launching of other programs or combinations thereof.
By
use of E-mail-type messages, the notification process can be initiated
simultaneously for all users who are to receive any such notification message.
The
use of E-mail technology provides certain advantages, such as balancing the
loading of the network traffic. This allows users to come to the file, rather
than
sending the file to all of the users. In the preferred mode of operation of
the AFS,
a "Files" module is provided to combine World Wide Web technology and E-mail
technology to allow users to seamlessly upload and download files to and from
AFS folders over the Internet. When a new file becomes available for a user to
either download or view, the AFS provides an Automatic Notification message to
the appropriate users via E-mail technology. Furthermore, an Auto-notification
message is sent to predetermined users andlor the systems administrator when a
user has uploaded a file onto the AFS.
As an alternative to E-mail technology, the Automatic Notification function
of the present invention could be implemented by a rules-based system that
could,
for example, automatically execute other computer programs upon the occurrence


WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
-9-
of the triggering event, or implemented by use of the triggering features of
an
active database computer program, such as ORACLE or DB2.
As noted above, the Auto-notification function can comprise other
programs that are launched to perform certain tasks. The precise type of auto-
notification is fully configurable for each component in the preferred AFS.
All
Auto-notification messages contain links to the AFS, and the link will open
the
user's web browser and take the user directly to the folder or object that was
just
triggered.
One other unique aspect of the preferred AFS of the present invention is the
fact that more than one single file can be stored having the same virtual
filename,
at least the same filename as far as the individual users are concerned. The
actual
filename on the AFS is stored in a "Files Table," and a link to that file is
stored in
the AFS. When a user uploads a file to the AFS, the file is physically stored
on the
hard disk drive of the server. The location or directory is based upon a
setting in
the database and also the username of the virtual folder where the file is
being
uploaded to. If a file already exists having the same filename, a unique
filename is
generated for that file, at least with respect to the AFS server operating
system.
The user does not see this unique filename, but instead is only shown the
"Display
Name" of the file that is stored in the database. This "Display Name" is the
filename that was selected for uploading.
Still other advantages of the present invention will become apparent to
those skilled in this art from the following description and drawings wherein
there
is described and shown a preferred embodiment of this invention in one of the
best
modes contemplated for carrying out the invention. As will be realized, the
invention is capable of other different embodiments, and its several details
are
capable of modification in various, obvious aspects all without departing from
the
invention. Accordingly, the drawings and descriptions will be regarded as
illustrative in nature and not as restrictive.
BRIEF DESCRIPTION OF THE DRAWINGS


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
- 10-
The accompanying drawings incorporated in and forming a part of the
specification illustrate several aspects of the present invention, and
together with
the description and claims serve to explain the principles of the invention.
In the
drawings:
Figure 1 is a block diagram of a conventional file system that can be
accessed by users over a LAN or via the Internet, as known in the prior art.
Figure 2 is a block diagram depicting a web-based active virtual file system
that can be accessed by users over a LAN or via the Internet, as constructed
according to the principles of the present invention.
Figure 3 is a flow chart showing the logical operations for authentication
and controlling user's access rights of the web-based active virtual file
system of
Figure 2.
Figure 4 illustrates a display screen depicting some of the options available
to a systems administrator of the web-based active virtual file system of
Figure 2.
Figure S illustrates a computer display screen depicting the User
Management functions available to a systems administrator, as according to the
web-based active virtual file system of Figure 2.
Figure 6 illustrates a computer display screen depicting some of the
functions for Group Management available to a systems administrator using the
web-based active virtual file system of Figure 2.
Figure 7 illustrates a computer display screen depicting some of the options
available to a user, as opposed to a systems administrator, using the web-
based
active virtual file system of Figure 2.
Figure 8 is a flow chart depicting some of the choices presented to a user or
systems administrator in managing folders, using the web-based active virtual
file
system of Figure 2.


WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
-11-
Figure 9 is a flow chart showing some of the choices presented to a systems
administrator performing User Management functions of the web-based active
virtual file system of Figure 2.
Figure 10 is a flow chart depicting some of the important choices made
available to a systems administrator performing Group Management functions,
using the web-based active virtual file system of Figure 2.
Figure 11 is a flow chart depicting some of the logical operations and
choices presented to a systems administrator performing Access Rights
management functions with respect to users and groups, using the web-based
active virtual file system of Figure 2.
Figure 12 is a flow chart depicting some of the important choices made
available to a systems administrator when selecting the type of Automatic
Notification functions for various user operations, using the web-based active
virtual file system of Figure 2.
Figure 13 is a flow chart showing some of the logical operations involved
with the management of modules, using the web-based active virtual file system
of
Figure 2.
Figure 14 is a flow chart illustrating some of the choices made available
when performing Object Management functions, using the web-based active
virtual file system of Figure 2.
Figure 15 is a flow chart showing some of the important logical operations
for an example in which a "files module" is utilized, using the web-based
active
virtual file system of Figure 2.
Figure 16 is a flow chart showing some of the important choices made
available in an example of using options relating to objects, using the web-
based
active virtual file system of Figure 2.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT


WO ~l/24~59 CA 02386293 2002-03-28 pCT/US00/26913
-12-
Reference will now be made in detail to the present preferred embodiment
of the invention, an example of which is illustrated in the accompanying
drawings,
wherein like numerals indicate the same elements throughout the views.
In order to better describe the present invention, a definition of certain
terms is provided immediately below:
Database-a large collection of data organized in a manner to facilitate
quick retrieval.
Active Database-a database that includes a management system that can
automatically react to events, such as database transactions, time events, and
external signals that trigger the evaluation of a condition; and if the
condition
evaluates to be true, a specific action is carried out.
Traditional Database-a database system that is passive in behavior, which
either periodically polls the database, or embeds or encodes event detection
and
execution of related action in the application code.
Field-an area of a database record into which a particular item of data is
stored.
File-a block of information that is stored on a computerized electronic
storage device; in typical installations, a file has an associated "filename."
File System-in a computer, a way in which files are named and where
they are placed logically for storage and retrieval. The DOS, Windows, OS/2,
Macintosh, and UNIX-based operating systems all have file systems in which
files
are placed somewhere in a hierarchical (tree) structure. A file is placed in a
directory (folder in Windows) or subdirectory at the desired placed in the
tree
structure. The term also encompasses the part of an operating system or
program
that supports a file system.
Folder-an organizational unit that houses objects (including files) and other
folders; sometimes also referred to as a directory in a disk operating system.
In the
Windows, Macintosh, and some other operating systems, a folder is a named
collection of related files that can be retrieved, moved, and otherwise
manipulated


WO 01/24059 CA 02386293 2002-03-28 PCT/US00/26913
-13-
as one entity. The folder has a data structure that represents the storage
location it
comprises in the file system.
Internet-a set of networks interconnected with routers.
Module-a segment of code written to certain specifications to perform a
specific function, which allows for the creation, modification, or deletion of
a
specific object that the module was created for.
Network-an interconnected group of computers that connect to and
cooperate with each other.
Object-a single entity of a specific type of information. As an example, a
file is an object, and an event is an object.
Operating System-software that controls the operation of a computer,
including the organization of its memory components, such as a hard disk
drive.
Packet-a unit of data sent across a network.
1 S Physical Storage-a medium onto which data can be entered, in which it
can be contained (i.e., stored) and from which it can be retrieved at a later
time;
examples include a hard disk, semiconductor memory (e.g., RAM, ROM, EPROM,
EEPROM, NVRAM), compact disc, etc.
Record-an ordered set of fields; a row in a database table.
Router-a device that forwards packets between networks.
Table-a collection of records in a database.
Web Browser-a program that allows a person to read hypertext.
Referring now to the drawings, Figure 2 illustrates the major building
blocks of a computerized file system that is accessible by users over the
Internet or
via a local area network (LAN), in which this system is generally designated
by the
reference numeral 100. A first user at 120 operates a personal computer
platform
having a web browser software program, and this browser is in communication


WO 01/24059 CA 02386293 2002-03-28 PCT/US00/26913
-14-
with an Internet Service Provider (ISP) 130. Preferably, the computer platform
of
the first user 120 additionally contains a graphical user interface operating
system,
such as WINDOWS or MACINTOSH. A second user at 122 similarly has a
computer platform with a web browser software program which is in
communication with another ISP 132, and a graphical user interface operating
system. This second user 122 could have an entirely different type of
platform, as
compared to the first user 120, such as a MACINTOSH or a UNIX-based
workstation, or even a hand-held computer.
Both ISP's 130 and 132 are connected to the Internet, which is generally
designated by the reference numeral 135. The Internet is also used for
communications to a web server 140, which is located near the computerized
file
system of the present invention.
A third user at 124 also uses a personal computer or a workstation platform,
and is connected to a local area network (LAN) 145 via a LAN input/output
module. A fourth user at 126 is similarly connected to LAN 145 by use of a LAN
input/output module. As opposed to conventional systems, the LAN 145 is
connected to the web server module at 140, rather than being directly
connected
into the network file system (as was the case in Figure 1, where LAN 45 was
directly connected to the file system 50).
It is preferred that the third and fourth users at 124 and 126 additionally
have a web browser-type software program that is in communication with web
server 140 over the LAN, and further utilize a graphical user interface
operating
system, such as WINDOWS or MACINTOSH, or a UNIX-based graphical user
interface, for example. The web browser functionality of these user platforms
at
124 and 126 provide certain advantages when used with the active virtual file
system 150 of the present invention, as discussed below in greater detail.
Web server 140 is connected to a user interface 142. User interface 142 is
used to present a "folder" window to the user, which in the present form is a
Java
tree-type structure, as seen on Figure 4 by the folder window 260.


WO 01/24059 CA 02386293 2002-03-28 PCT/US00/26913
-15-
User interface 142 is in communication with a web-based active virtual file
system generally designated by the reference numeral 150, and also referred to
as a
"AFS." This active virtual file system 150 contains a network server operating
system, which includes a powerful microprocessor circuit and physical storage
devices at 152, including random access memory and at least one hard disk
drive.
The preferred active virtual file system 150 also contains a database at 154,
which
will be discussed in greater detail hereinbelow.
The preferred server operating system at this time is WINDOWS NT, and
the preferred database system at this time is ORACLE, however, it will be
understood that virtually any type of computer operating system or database
program could be used with the active virtual file system of the present
invention.
It will be further understood that the terminology "web-based" in reference to
the
file system of the present invention means that each user will preferably have
a
web browser on his or her computer platform, although each such user may or
may
not be communicating to the AFS platform over the Internet. In other words,
users
talking to the AFS platform 150 over a LAN (e.g., users 124 and 126 on Figure
2)
are not using the Internet, but they nevertheless are using a web browser to
better
utilize the features of the AFS.
As in conventional network servers, virtually the first thing that must occur
when a user initially communicates to a distributed f 1e system is to
determine
whether or not that user has any right to be logged into the file system. In
the
present invention, the active virtual file system 150 utilizes an
"Authentication"
function 160 to determine if this particular user now communicating to the AFS
150 should gain access at all to the system. More detailed information
concerning
this function will be presented below.
Once the user has been properly authenticated, this user's access rights must
now be determined, and the AFS 150 uses an "Access Rights" function 162 for
this
purpose. The user's access rights are represented by information that has been
stored in the AFS 150 pertaining to this particular user. This information
essentially determines whether or not a user has the right to either read or
write, or


CA 02386293 2002-03-28
WO 01/24059 PCT/US00/26913
-16-
both read and write, a particular file that already resides on the active
virtual file
system's hard disk drive at 152. These access rights also determine whether or
not
a user will be able to upload a new file onto the hard disk drive at 152. More
detailed information concerning this function will be presented below.
S Other functions that are available to the active virtual file system 150
include a "User Management" function at 164, and a "Group Management"
function at 166. In short, these functions allow the systems administrator to
add,
delete, or edit users and their attributes (at the User Management function
164),
and to also group various users in predetermined ways using the Group
Management function 166. Further information concerning these functions will
be
presented below. These User Management and Group Management functions of
the present invention also allow importing users/groups from other systems,
such
as UNIX password/group files, or from other systems such as NIS, NT or Novell
operating systems. This functionality is extremely useful to users that
already own
a database of information (e.g., a listing of employees with standard
personnel
information), since this database can be imported into the AFS 150 to
automatically create new users and groups in one major step. By use of this
importation capability, the customer (i.e., the systems administrator) will
not need
to enter by hand all of these employee records into the FileDeliveryTM system
when
creating entries for these new users and groups.
In the preferred active virtual file system 150, the main kernel logic
operates at a level only as low as "folders," or directories in the vernacular
of a
disk operating system. Individual files and application programs are
controlled at a
different level by a different functional application. In the preferred file
system, a
"Modules" function at 170 contains logic that controls the appearance of the
screens at the user's monitor. Furthermore, command choices at the user's
monitor
screen are provided at the appropriate times. This Modules function 170
manages
the files of a folder-and therefore, can control individual files-and also
contain
applications (such as word processors and spreadsheet computer programs).


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-17-
Another example of an application controlled by the Modules function 170 is a
personal address book application, or a calendar application.
The Modules function block 170 also controls "objects," which are depicted
as a separate function block at 172. A file is an example of an object, and an
event
is another example of an object. An application program can also be an object.
More detailed information concerning the Modules function 170 and Objects
function 172 will be discussed in greater detail below.
Another unique function associated with the active virtual file system 150
is an "Automatic Notification" function block at 180. This Auto-notification
function 180 is what makes the present invention an "active" file system. The
Automatic Notification function 180 checks to see if any "triggering" events
have
occurred when a user performs a particular task. Such a triggering event could
be
merely the opening of a file on the hard disk drive 152. A more useful
Automatic
Notification function perhaps is when a user modifies a file and saves it on
the hard
1 S disk drive 152. This is referred to as "uploading" a file from a user into
the AFS
150. When a user "opens" a file from the hard disk drive 152, this is referred
to as
"downloading" a file from the AFS 150.
The Automatic Notification function 180 defines what exact type of event
will become a triggering event. Furthermore, the Automatic Notification
function
180 also defines what will be the triggering action, once the triggering event
occurs. All of this information preferably is stored in the database 154. In
the
preferred embodiment, the database software (which preferably is ORACLE) will
hold all of the defining triggering events and triggering actions in a single
large
table of the database. Of course, it will be understood that other brands of
database
management software could be used instead of ORACLE for this task, or a
special
file structure could be created that uses no commercially-available database
software.
The fact that the file system 150 of the present invention is an active file
system is a significant distinction as compared to conventional file systems
known


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
_18_
in the prior art. While there have been active databases known in the prior
art, the
predefined events and actions of such active databases are merely contained
within
the database itself, and none of the active functionality is at all related to
the
computer's central file system. The active aspects of the present invention,
to the
contrary, work completely outside any database program and instead concentrate
on the file system itself to both control certain actions by users, and then
provide
an Automatic Notification function upon the occurrence of other predetermined
actions by these users. For example, if a user is logged into the AFS 150 and
downloads a particular file, edits that file, and then saves that file into
the hard disk
drive 152 by uploading the file into the AFS 150, then the present invention's
Automatic Notification function has the capability to send messages
automatically
to other users that have an interest in this particular file. This
notification would
normally be sent to users who are grouped, according to the Group Management
function 166. In the preferred embodiment, these Automatic Notification
messages are transmitted via E-mail technology. A more complete description of
the Automatic Notification functions for the active virtual file system 150 is
provided hereinbelow.
As noted hereinabove, "complex" triggering events certainly may be more
complex than simple file operations, and such complex triggering events are
completely programmable. Moreover, their resulting actions also are completely
programmable, and these actions may be similarly "complex," having the
capability to launch completely separate application programs. As stated
above,
the "complex actions" that can be programmed using the AFS 1 SO may launch
application programs to both LAN users, such as users 124 and 126 (without use
of
the Internet) and to WAN users (including those connected via the Internet,
such as
users 120 and 122). To implement these programmable actions, a graphic user
interface, or a scripting language (or both) optionally can be provided for
use by
the systems administrator.
It will be understood that the AFS operating system may operate as a stand-
alone system, or may be resident (e.g., as a library) on top of other
architectures, or


WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
- 19-
applications running on the same computing platform. In this sense, the
FileDeliveryTM system of the present invention is a "technology" rather than a
single product. For example, FileDelivery's API (Abstract Program Interface)
functions at both the "front end" and at the "back end." The front end API
acts as
the user interface and makes the system extensible such that other
applications may
be integrated with the FileDeliveryTM technology. The back end API enables the
FileDeliveryTM technology to be implemented on top of different architectures.
For
example, to implement the FileDeliveryTM technology of the present invention
on
top of an ORACLE database program, the bottom layer only need by implemented
using ORACLE.
On Figure 3, the logical functions and certain choices presented to the user
are depicted in a flow chart format for the Authentication function 160 and
Access
Rights function 162. The Authentication function provides a mechanism that
allows a user to access a FileDeliveryTM server, which is another name for the
preferred server 152 of the web-based active virtual file system 150. The
default
authentication method uses an internal user database that is based on user
components, such as the "username" and "password." This is the information
that
is presented to the step 200 on Figure 3, in which the user enters his or her
authentication information. A decision step 202 determines whether or not the
authentication information is correct, and if not, an error message is
displayed at a
step 204.
Additional security preferably is provided using an SSL (Secure Sockets
Layer) on the FileDeliveryTM server. The Authentication procedure provides a
single access point to all objects and folders residing on the active virtual
file
system 150, and the "Access Rights" function. Users can optionally encrypt
their
data by use of, for example, PGP encryption software. The operation of
uploading
files to the FileDeliveryTM server 152 of the present invention can be
enhanced by,
first, seamlessly encrypting the contents of the user's file (or other type of
data
structure), such that the encryption operation is transparent to the user, and
second,
automatically uploading the (encrypted) file into the server 152.


WO 01/24059 CA 02386293 2002-03-28 pCT/pS00/26913
-20-
If the authentication information was correct at decision step 202, then a
step 210 determines the access level for this user based upon the
authentication
information. At this point, it is determined if the user-entered
authentication
information reveals that a regular user has logged into the system, or if the
systems
administrator has logged into the system. This information will be used later.
A step 212 now presents user interface information based upon his or her
access level. A display screen is sent to the monitor of the user at his or
her remote
location, and this display screen will present a folder tree (e.g., a Java
folder tree)
and a set of options. An example of such a display screen for a systems
administrator is provided on Figure 4.
Referring back to Figure 3, the function step 212 will simultaneously
display a folder tree at a step 220 and a list of options at a step 224. The
folder tree
choice will include accessible folders and objects at a step 222. The options
choice
at 224 first looks to see if the person logged into the system is the
administrator or
not, at a decision step 230. If the answer is YES, a step 232 will show user
and
Group Management information on the administrator's display screen. If the
answer was NO at decision step 230, then a step 234 will show standard
options,
such as changing a password. The systems administrator also has access to
these
standard options at step 234.
Referring now to Figure 4, a display screen 250 shows both a folder
window at 260, and a list of options at 262. In this example screen 250, the
user
who has been logged into the FileDeliveryTM server is the systems
administrator, as
can be seen by the notation at 264.
Display screen 250 includes the standard Internet header information at
252, and also displays a top menu bar at 254. The folder window 260 presents a
tree structure of folders, which is the function at step 220 on the flow chart
of
Figure 3. The information in the folder window can go all the way down to the
file
level, such as the file named "Autoexec.bat." Folder window 260 can also
display


CA 02386293 2002-03-28
WO 01/24059 PCT/US00/26913
-21 -
application programs, such as a calendar program, or a newsletter program.
These
files and applications are also referred to herein as "objects."
The options that are listed at 262 include the standard options for
performing various administrator functions on a FileDelivery~ server
constructed
according to the present invention. This includes user maintenance, group
maintenance, customizing the screen resolution, changing passwords, providing
feedback on the FileDeliveryTM system, setting the user's startup screen to
the
"Getting Started Guide," and adding a site to the "Favorites."
If, for example, the "User Maintenance" option is selected at 262, then a
display screen such as that depicted in Figure 5 comes up on the systems
administrator's monitor. On Figure S, the left-hand column at 270 lists the
names
of the users in a particular format, typically referred to as the "username,"
and the
next column to the right at 272 displays a particular symbol or flag if any
particular
user is authorized to view particular files. The next column to the right at
274
shows a particular symbol or flag if a particular user can be edited by the
systems
administrator, and the far right-hand column at 276 displays a particular flag
or
symbol if a particular user can be deleted, or has been deleted from the
system in
this session.
In addition to the main rows and columns of the screen depicted on Figure
S, the systems administrator also has two "buttons" that can be selected,
including
a "Create New User" button at 277, and a "Back to Startup Screen" button at
278.
The logic describing these steps to create a new user is depicted in Figure 9,
which
is described in greater detail, hereinbelow. If the choice is made to go back
to the
startup screen, then the logic flow is directed back to step 212 on Figure 3.
The
attributes of a user in the preferred FileDeliveryTM system will be discussed
hereinbelow.
If the option called "Group Maintenance" is selected at column 262 on
Figure 4, then the next display that will be presented on the systems
administrator's
monitor will have the appearance of that depicted on Figure 6. On Figure 6,
the


WO 01/24059 CA 02386293 2002-03-28 PCT/US00/26913
-22-
left-hand column at 280 lists the names of various "groups" that reside within
the
FileDeliveryTM system. The attributes of a "group" will be described in more
detail
hereinbelow.
The center column of Figure 6 at 282 provides a symbol or flag that
illustrates what groups can be edited, or are currently undergoing an edit
procedure. The far right-hand column at 284 provides a symbol or flag that
determines whether or not the systems administrator can delete a group, or
already
has deleted a group in this session.
If the systems administrator desires to create a new group, then the soft
button at 286 titled "Create New Group" will be selected. If that occurs, then
the
logic flow is directed to that described on Figure 10, which is described in
greater
detail, hereinbelow. On the other hand, the soft button at 288 will take the
systems
administrator "Back to Startup Screen," which will cause the logic to be
directed
back to step 212 on Figure 3.
Figure 7 illustrates the options that are typically made available to a user
who is not a systems administrator. The options listed at 290 on Figure 7
would
replace the options depicted on Figure 4 at 262, which are available only to a
systems administrator. As can be seen on Figure 7, some of these options
relate to
customizing the user's screen resolution, changing the user's password,
providing
feedback on the FileDeliveryTM system, setting the startup screen to the
"Options
Screen," taking the user back to the "Getting Started Guide," or adding a site
to the
user's "Favorites." If the user is a systems administrator, then both sets of
options
262 and 290 would be listed on the display.
When using the active virtual file system of the present invention, it is
preferred that a virtual folder system be used to provide the core
functionality on
the preferred FileDeliveryTM server at 1 S0. The user interface depicted on
Figure 4
at 260 preferably is based on a hierarchical "tree" structure that organizes
sub-
folders and objects. This structure preferably is not physical in nature, such
as
what a conventional file operating system would provide, and further the
structure


CA 02386293 2002-03-28
WO 01/24059 PCT/US00/26913
-23-
does not exist on a physical storage device, such as a hard disk drive.
Instead, the
preferred structure exists purely in a single table in a FileDelivery~
database (i.e.,
database 154 on Figure 2). The methodology of the user interface of the
present
invention recursively accesses the database 154 to populate the tree that is
displayed in the folder window at 260. In this manner, the preferred
FileDelivery~ user interface provides a familiar way to visualize the virtual
structure so as to access sub-folders and objects. In a preferred embodiment,
the
user interface is fully customizable.
Figure 8 illustrates a flow chart of the choices that can be made by a user to
manage the folder of that particular user as the "owner" of that folder, or
these
choices are made available and can be managed by the systems administrator.
Starting at a step 300, the user interface allows the owner or administrator
access to
his or her folders from the "Folder Window" 260 on Figure 4. The user can
"click"
on one of the folders within the folder window 260, and a set of options will
be
1 S displayed on the user's monitor, as depicted at a step 302 on Figure 8. On
Figure 8,
the logic flow at certain nodes has the meaning of providing to the user more
than
one choice that is simultaneously displayed on the user's monitor screen. For
example, when leaving the decision step 302, a step 310 provides folder
options to
the systems administrator or to the owner of this folder, while at the same
time a
step 330 provides "Folder Rights Management" to the administrator or owner if
the
rights management function has been enabled. Moreover, a step 334 also will
simultaneously present "Object Options" to the administrator or owner if the
rights
management function has been enabled.
Assuming the administrator or owner has selected the "Folder Options" at
310, then four new choices are simultaneously presented on the monitor screen,
including a "Create New Folder" function at a step 312, a "Delete Folder"
function
at a step 313, a "Rename Folder" at a step 314, and a "Move Folder" at a step
31 S.
If the administrator or owner selects any one of these four options (which
would
typically be made available on a pull-down menu), then that task will be
executed
by the preferred FileDeliveryTM system. For example, if the Create New Folder


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-24-
function is selected at 312, then at a step 322 a new folder will be created
in the
active virtual file system 150, wherein the user can select the name of this
new
folder. If a pre-selected folder is to be deleted, as per step 313, then a
step 323 will
delete that folder from the active virtual file system 150. Similarly, if a
pre-
y selected folder is to be renamed as per step 314, then a step 324 will
rename that
folder in the active virtual file system 150, wherein the user selects the new
name.
Finally, if the Move Folder function is selected at 31 S, then a step 325 will
move a
pre-selected folder within the active virtual file system 150 to a location
that is
named by the user.
If the administrator or owner instead selects the "Folder Rights
Management" function at 330, then a step 332 will be executed that directs the
logic flow to the flow chart depicted on Figure 11. This will be discussed in
greater detail hereinbelow.
Finally, if the administrator or owner selects the "Object Options" function
at step 334, then a step 336 will direct the logic flow to the Module
Management
process, which is depicted on Figure 13. This function will also be discussed
in
greater detail hereinbelow.
The User Management function 164 on Figure 2 can only be utilized by the
systems administrator. Figure 9 illustrates a flow chart depicting the types
of
choices that are made available to the systems administrator who enters this
User
Management routine, starting at a decision step 350. Once into the User
Management routine, several choices will simultaneously be presented to the
systems administrator on his or her monitor screen. These choices include a
"Create New User" function at a step 352, a "Delete User" function at a step
370,
an "Edit User" function at a step 380, a function that allows the systems
administrator to view the user's folder tree and the user's objects that a
user has
access to, based on the user's rights management, at a step 390, and finally a
function at a step 392 that allows the systems administrator to import user
data
from a third party address book or database. An example of the source for this
information could be an entry in a Microsoft Outlook module.


WO 01/24059 CA 02386293 2002-03-28 PCT/US00/26913
- 25 -
A user is a person who can be authenticated to the preferred FileDeliveryTM
server 152 of the active virtual file system 150. Users are provided with
certain
rights by the systems administrator of the FileDeliveryTM site, as controlled
by the
Access Rights component or function. The properties of a user include his or
her
E-mail address, password, and demographics and other specific information.
There are two main types of users: the first type is the "Admin User" and
the second type is the "Regular User." The Admin User (also referred to herein
as
the "systems administrator") is empowered to configure and maintain the
FileDeliveryTM site, and is empowered to administer users, groups, rights, and
modules. A Regular User is empowered to manage his or her own personal folders
and objects, and also any shared folders and objects that he or she may have
rights
to.
Refernng back to Figure 9, if a new user is being created at step 352, then a
step 354 requests certain information that is to be entered by the systems
administrator about this particular user. The user's E-mail address is one
critical
piece of information that must be included at this point. At this time, other
choices
are presented to the systems administrator, including a step 356 which
provides
that the systems administrator can allow certain rights management for this
particular user. In addition, a step 358 allows further options based upon
modules
that have been installed in the active virtual file system 150.
Once the user information has been entirely entered by the systems
administrator, a step 360 provides a notification to predetermined users of
the
active virtual file system 150, preferably by use of an E-mail message sent to
those
other users. This notification process is automatic, as per the Auto-
notification
function 180 of the active virtual file system 150. This is a primary example
of the
"active" file system of the present invention, versus a passive file system
known in
the prior art. Not every user in the active virtual file system 150 will
necessarily
receive a notification of an E-mail message, but instead only predetermined
users
will receive this message, as selected in advance by the systems
administrator.
One common method of selecting the particular users who will receive this


w0 ~l/24~59 CA 02386293 2002-03-28 PCT/US00/26913
-26-
notification message will be to form "groups" and to provide each user in a
particular group with this notification message, but not provide any other
users in
the active virtual file system 150 with this particular message.
By use of E-mail-type messages, the notification process can be initiated
simultaneously for all users who are to receive any such notification message.
At
the same time, the actual delivery of these messages can be performed more or
less
at the discretion of the file system itself, such that these messages will not
interfere
with other important active processing. Instead, these messages will be
delivered
in due course to the individual users, and if a user happens to be logged into
the
active virtual file system 150 in real time as the notification message is
initiated,
then that particular user will soon receive a message on his or her monitor
screen
that a new E-mail message has been received. The user can then review that
message at his or her leisure.
If the administrator had chosen to delete a user at step 370, then a
confirmation message is generated back to the systems administrator at a step
372,
essentially requiring the administrator to verify that this is the correct
user that is to
be deleted. Assuming the confirmation is correctly acknowledged, then a step
374
will notify predetermined users of the deletion of this particular user.
Again, this
notification message preferably will be delivered using E-mail messages, and
the
recipients of such message will be predetermined based upon either groups of
users, or other criteria selected by the systems administrator in advance.
As an alternative to E-mail technology, the Automatic Notification function
180 can be implemented by a rules-based system that could, for example,
automatically execute other computer programs upon the occurrence of the
triggering event, or implemented by use of the triggering features of an
active
database computer program, such as ORACLE or DB2. Using these rules-based
features of the present invention, further operations can be programmed to
automatically perform tasks other than simple E-mail messages. For example, if
a
particular user is an employee who has resigned from a company, then his or
her
files could automatically be archived by a FileDeliveryTM command (launched by


WD ~l/24059 CA 02386293 2002-03-28 PCT/US00/26913
-27-
an Automatic Notification function) at the same time that his or her user
status is
been deleted by the administrator. In another example, a student who is
graduating
from a university should be deleted from many records (such as E-mail access
rights). The FileDeliveryTM system of the present invention could
automatically
S delete certain files or records as the student's status is changed by the
administrator
to "graduated."
If the administrator wants to edit a user's attributes or other information,
then step 380 will be followed by a step 382 where the user's information can
be
edited, including the user's E-mail address. Once this step 382 has been
executed,
then other choices are made available to the administrator, including editing
the
Rights Management for this user at a step 384, and editing other options on
modules that have been installed in the active virtual file system 150, at a
step 386.
Finally, once this editing procedure has been finished, a notification process
is
initiated at a step 388, in which preferably an E-mail message is sent to the
appropriate users, who are pre-selected by the systems administrator, and
would
likely be members of the same group as the user who is being edited.
When the systems administrator utilizes the Group Management Function
166, certain choices will be presented to the administrator, as illustrated in
the flow
chart on Figure 10. Beginning at a step 400, several choices will
simultaneously
be presented to the administrator on the administrator's monitor screen. These
choices include creating a new group at a step 402, deleting a group at a step
410,
and editing a group at a step 420.
A group is defined as a collection of users, and groups are created and
maintained by the systems administrator. Rights are assigned to groups by the
administrator, and such rights are governed by the Access Rights component or
function at step 162 on Figure 2. The essential properties of a group are (1)
a
description or name of that group, and (2) group members, which means
particular
users that are authorized to be using the active virtual file system 150.


W~ 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-28-
When a group is first created at step 402, the systems administrator merely
lists the particular set of users that are members of this group. No
notification
procedure is necessary at this time, although one could potentially decide to
notify
the first member of a group that has been newly created that a second member
has
been added to that group. However, it is preferred that, in this initial
creation of
the group, all user members be added in one logical operation and no
notification is
necessarily desirable at this point. Of course, the final step after listing
all of the
new members of a group newly being created at step 402 could be to send a
notification message to each of those members that the group has indeed been
created.
If the administrator desires to delete a group at step 410, then a
confirmation message is sent by a function at a step 412 to confirm the
validity of
the administrator's initial command to delete a particular group. Assuming
this
confirmation is properly validated, then a notification process is initiated
at a step
414 to send messages to all of the users of the group that is being deleted
that the
group has indeed been deleted.
If a group is to be edited in any way at step 420, then a step 422 allows the
systems administrator to add or delete members from a particular group. Once
this
has been accomplished, a notification process is initiated at a step 424 which
sends
a message to all existing members of the group that one or more particular new
members have been added, or that particular previous members have been
deleted.
Figure 11 is a flow chart showing some of the important logic concerning
the rights of users in the active virtual file system 1 SO of the present
invention.
This flow chart relates to the Access Rights function 162 on Figure 2, and
begins
with a decision step 450 that is entered to allow "Rights Management." This
step
450 can only be passed through by either the systems administrator or the
owner of
a selected object or folder if Rights Management was previously enabled. This
Access Rights function 162 provides a level of security for folders and
objects. If
a user is not the owner of an object, based upon that user's particular
rights, he or
she is only presented with objects that he or she is allowed to have access
to.


W~ 01/240$9 CA 02386293 2002-03-28 pCT/US00/26913
-29-
These access rights are administered to selected users by the systems
administrator.
Furthermore, users may also administer Access Rights if the "Rights
Management"
attribute is enabled for that particular user.
There are three different levels of access rights: (1) read, (2) write, and
(3)
read/write. The "read" access right provides the ability for a user or a group
to
view particular folders and objects. If a user or group has this right only,
that user
or group would not be able to create new folders and objects.
The "write" access right provides the ability for a user or group to create
new folders or objects. With exclusively this right, the user or group would
not be
able to view folders and objects. The "read/write" access right provides the
ability
for a user or group to create folders or objects and then to view those
folders and
objects. This provides the user or group with full control over a folder or
object.
An example of how these different access rights could be utilized in a
teaching situation is as follows: if a teacher in an English class wishes to
distribute
1 S a homework assignment to all of the students, the teacher creates a folder
and
assigns the "read-only" right to all of the students for that folder. The
teacher then
places the homework assignment in that folder, and all students now have "read-

only" access to this homework assignment. These students can download and view
this object, but they cannot modify or delete it.
If the teacher wants the students to turn in their homework assignments
electronically, the teacher can assign a write-only right to that folder for
all of the
students. When a student uploads the homework assignment to this write-only
folder, after the file has been uploaded the student would not be able to view
the
file because he or she does not have the "read" right. The teacher would be
the
only user that would be able to view, edit, or delete this file. Any other
student
who has "write-only" access to the folder will also not be able to see any
files in
this folder.
Continuing the example, if the English class teacher wishes to create a
shared resource so that students of the class can work on a group assignment,
the


WO 01/24059 CA 02386293 2002-03-28 PCT/US~O/26913
-30-
teacher creates a folder and grants "read/write" rights to four students, for
example.
These four students can now upload files to the folder, download files from
that
folder, view files, and delete files. This allows for a shared resource that
all
members of the team may have access to for a collaboration on the project.
Referring back to Figure 11, the logic flow is directed to a step 452 where
the object or folder of interest can be viewed on the user interface (i.e.,
monitor
screen), such as the Folder Window 260 on Figure 4. Once the particular object
or
folder has been selected at step 452, a step 454 enables the owner or
administrator
to select a particular user or group to receive rights for accessing the
selected
object or folder. At this point, several options simultaneously appear on the
screen
of the owner or administrator.
One of the above-noted options is to grant "write" rights at a step 460.
Another option is to grant "read" rights at a step 470. A third option is to
grant
"read/write" rights at a step 480. Once the particular rights have been
granted at
any of these steps 460, 470, or 480, an Automatic Notification procedure
occurs, at
a corresponding step 462, 472, or 482, respectively. This notification process
preferably is sent by E-mail technology, as related hereinabove. It is
preferred that
this notification process be utilized to inform the particular user or group
that was
selected at step 454 of the new rights that have just now been granted.
It will be understood that certain conventional access control technologies
are presently available that could also be used as an "access rights"
function. For
example, NT ACL's, POSIX ACL's, or Novell access control mechanisms have
powerful functionality that could be utilized in conjunction with the active
virtual
file system 150 of the present invention.
Figure 12 is a flow chart illustrating some of the functions of the Auto-
notification component or function 180 on Figure 2. Starting at a step 500,
information is passed from a calling process, in which the process requests a
notification message to be sent. A decision step 502 now determines what type
of
E-mail notification that should be sent. At this point, several options are
made


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-31-
available for the systems administrator to manage. A list of these options
includes
a "Rights" option 510, a "User" option 520, a "Group" option 530, and a
"Module"
option at 540.
If the Rights path at 510 is chosen, then the choices are "Read" at 512,
"Write" at 514, or "Read/Write" at 516. If the "User" choice at 520 was
selected,
then the further choices are "Create" at 522, "Edit" at 524, or "Delete" at
526. If
the "Group" choice at 530 was selected, then the further choices are to add a
member at 532, or to delete a member at 534. If the "Module" choice at 540 was
selected, then the further action is based upon the individual type of module
as it
resides in the preferred FileDeliveryTM system, as indicated at a step 542.
The Auto-notification messages can be E-mails that are triggered
automatically by events that take place in the components of the active
virtual file
system 150. Instead of E-mails, however, the Auto-notification function can
also
comprise other programs that are launched to perform certain tasks. The
precise
type of auto-notification is fully configurable for each component in the
preferred
active virtual file system 150.
Certain functions preferably will occur when using the principles of the
present invention concerning the active virtual file system 150. For example,
users
can automatically receive an E-mail message when specific events occur that
pertain only to that user. On the other hand, group members (which include
individual users) can automatically receive an E-mail message notifying those
group members when specific events occur that pertain to their particular
group.
All Auto-notification messages contain links to the preferred
FileDeliveryTM server 152, and the link will open the user's web browser
(e.g., the
browser at the first user 120 or the second user 122) and take the user
directly to
the folder or object that was just triggered. The users 124 and 126 connected
to the
LAN 145 would also have web browser software resident on their
PC's/workstations, and the browser would be similarly opened by the link. As
an
example, when the systems administrator creates a new user, an Auto-
notification


WO 01/24059 CA 02386293 2002-03-28 PCT/US00/26913
-32-
E-mail message is generated to that particular user informing the user of the
existence of the FileDeliveryTM server 152, and describing some of its
functionality
and further how to "Login" to the FileDeliveryTM server 152. As a second
example, when a user uploads a file to a folder, all group members and users
who
S have access to that folder preferably will receive an Auto-notification E-
mail
message informing them of how to gain access to that file.
As discussed above, the use of E-mail technology provides certain
advantages, such as balancing the loading of the network traffic. This allows
users
to come to the file, rather than sending the file to all of the users. In the
preferred
mode of operation of an active virtual file system 150, a "Files" module is
provided
to combine World Wide Web technology and E-mail technology to allow users to
seamlessly upload and download files to and from FileDeliveryTM folders over
the
Internet. When a new file becomes available for a user to either download or
view,
the FileDeliveryTM system provides an Automatic Notification message to the
appropriate users via E-mail technology. Furthermore, an Auto-notification
message is sent to predetermined users and/or the systems administrator when a
user has uploaded a file onto the FileDeliveryTM server 152. The administrator
users of the FileDeliveryTM site can generate reports that track the activity
involving files, specifically including information as to which users edited,
uploaded, or downloaded files.
One unique aspect of the preferred FileDeliveryTM system of the present
invention is the fact that more than one single file can be stored having the
same
virtual filename, at least the same filename as far as the individual users
are
concerned. The actual filename on the preferred FileDeliveryTM server 152 is
stored in a "Files Table," and a link to that file is stored in the active
virtual file
system 150. Moreover, a "version control" function can be added to the
FileDeliveryTM system to make it possible to maintain different versions of
the
same file.


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-33-
One further module that can be implemented on top of the FileDeliveryTM
system is a BugDeliveryTM module (not shown). BugDeliveryTM is a system for
tracking bugs and fixes in the software running on the server site (including
third
party application software, for example). BugDeliveryTM will automatically
notify
responsible engineers (and/or the systems administrator) when a bug is
reported,
and will notify the customer support (likely including the systems
administrator)
and customers when a patch exists for a known bug.
When a user uploads a file to the FileDeliveryTM server 152, the file is
physically stored on the hard disk drive of the server 152. The location or
directory is based upon a setting in the database 154 and also the username of
the
virtual folder where the file is being uploaded to. If a file already exists
having the
same filename, a unique filename is generated for that file, at least with
respect to
the FileDeliveryTM server operating system 152. The user does not see this
unique
filename, but instead is only shown the "Display Name" of the file that is
stored in
the database 154. This "Display Name" is the filename that was selected for
uploading. As noted above, the actual filename on the hard disk drive of the
FileDeliveryTM server 152 is stored in a "Files Table," and a link to that
file is
stored in the active virtual file system 150.
Refernng now to Figure 13, a flow chart is depicted showing the "Module
Management" function of the Modules component 170. Starting at a step 550, the
Module Management function is entered, after which a decision step 552
determines if the current user is the administrator. If the answer is NO, then
access
is denied to the Module Management function at a step 554.
If the result at step 552 was YES, then a step 556 allows the installation of
new modules by the administrator. Each module has its own object or set of
objects. For example, the "Files" module has a "Files" object. A module exists
to
facilitate the creation and management of a specific object. The preferred
FileDeliveryTM system "Modules" functionality can be turned on or off for each
user, or for the entire site, which is configurable by the administrator. It
is


CA 02386293 2002-03-28
WO 01/24059 PCT/US00/26913
-34-
preferred that all modules in the FileDeliveryTM system follow a standard
framework.
Figure 14 is a flow chart showing the choices made available to a user or
the systems administrator upon entering the "Object Management" function of
the
Objects component 172. Objects are the core entities in a "Folder Window," and
objects are a clickable combination of icons and text. When a user clicks an
object
in the Folder Window, its properties are displayed in the window on the right.
For
example, on Figure 4, the Folder Window is illustrated at 260, and the window
on
the right is generally designated by the reference numeral 262. Objects have
their
own set of properties that are fully configurable by the user. There is at
least one
object for each module that can be developed. Examples of objects are files,
events, calendars, tasks, and URL's.
Referring back to Figure 14, a step 600 is the initial step of "Object
Management." After arriving at step 600, several options are made available to
the
user via the user interface on the monitor screen. One option is the "Object
Options" at a step 610, and another option is the "Object Management" at a
step
620.
Assuming the Object Options step 610 was chosen by the user or systems
administrator, a step 612 allows a new object to be created. A step 614 now
creates the object in the active virtual file system 150. After that has been
accomplished, a step 616 performs an Automatic Notification process, similar
to
the E-mail messages as discussed hereinabove. In this situation, the fact that
a new
object has been created is the triggering event that causes the Auto-
notification to
occur.
If the "Object Management" option was selected at 620, a step 622 selects
an object via the user interface that is displayed on the monitor screen, such
as the
Folder Window 260 on Figure 4. Once a particular object has been selected by
the
user or systems administrator, two choices become available, including a "Core
Options" function at a step 630, and an "Object Options" function at a step
650. If


WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
-35-
the Object Options step 650 is selected by the user or administrator, a step
652 is
executed, however, this is based upon the type of module. Depending on the
module, this next step in the logic could be virtually anything.
If the "Core Options" choice was selected at step 630, then certain further
choices are made available to the user or systems administrator. These basic
choices include "Move" at a step 632, "Delete" at a step 634, "Rename" at a
step
636, or a further set of options relating to the objects can be selected at a
step 638.
If the Move, Delete, or Rename functions were chosen, then the selected
objects
will undergo one of those choices.
If the further Object Options at step 638 is chosen, then further choices are
presented to the user or administrator. These choices are for "Reports" at a
step
640, or for "Rights" at a step 642. The Reports are configurable by the owner
or
the systems administrator. If the Rights function at step 642 was chosen, then
a
step 644 is executed to take the logic flow to the "Rights Management"
procedures.
Figure 15 is a flow chart illustrating the important logical operations that
occur when the "Files Module" options are selected. The initial step is
designated
by the reference numeral 700, after which a decision step 702 determines
whether
or not the user has Write or Read/Write rights. If not, then a step 704
refuses to
show any options to this particular user.
If the result at decision step 702 was YES, then a step 706 uploads the file
from the user's computer to the active virtual file system 150 of the present
invention. After that occurs, a decision step 710 determines whether or not
the
user has enough disk storage space allocated within the hard disk drive of the
FileDeliveryTM server 152. If the answer is NO, then a step 712 refuses to
allow
the file to be uploaded.
If there is enough disk storage space available for this user, then a step 714
creates file information in the active virtual file system 150. A step 720 now
physically stores the file on the FileDeliveryTM server's hard disk drive at
152. The
final step in this sequence is 722 where an Automatic Notification process is


WO 01/24059 CA 02386293 2002-03-28 pCT~S00/26913
-36-
initiated, which sends an E-mail message to predetermined users regarding the
fact
that a new file has been uploaded onto the hard disk drive of the
FileDeliveryT"'
server 152.
Figure 16 is a flow chart showing some of the choices that are presented to
the user or systems administrator when the "Object Options" choice at step 650
on
Figure 14 is selected. A step 750 is the initial step in which the Object
Options are
selected for the "Files" module. A few choices are now presented to the
systems
administrator or user, including a "Download" function at a step 752, or a
choice
where the description of a file can be edited at a step 760, or a "View"
function at a
step 770.
If the Download function is selected at 752, then a step 754 updates the
logs of the active virtual file system 150. In some situations, this may
initiate an
Automatic Notification message, although that is not necessarily required.
Similarly, if the View step 770 was selected, then the logs are updated on the
active virtual file system 150 at a step 772. Again, it is possible to
initiate an
Automatic Notification message based upon this event, if desirable.
In conclusion, the preferred FileDeliveryTM server 152 is a web-based
active virtual file system (AFS) that allows for sharing of critical
information such
as files, calendars, contacts, reports, E-mail, etc. over the Internet. The
AFS 150
acts as a centralized server and uses secure Internet protocols. Customized
modules can easily be added to solve business needs for E-commerce back-end
solutions, web site maintenance intranets, legacy database query tools, for
example, as well as other applications. The present invention can be used over
a
Wide Area Network (WAN) just as easily as it can be used over a LAN. The
Auto-notification feature of the preferred FileDeliveryTM server insures that
users
are virtually immediately notified of appropriate site activity at a
FileDeliveryTM
site. The preferred active virtual file system of the present invention is
based upon
open standards and protocols, such as TCP/IP, HTTP, and SSL, without the use
of
proprietary protocols.


WO 01/24059 CA 02386293 2002-03-28 pCT/US00/26913
-37-
The foregoing description of a preferred embodiment of the invention has
been presented for purposes of illustration and description. It is not
intended to be
exhaustive or to limit the invention to the precise form disclosed. Obvious
modifications or variations are possible in light of the above teachings. The
embodiment was chosen and described in order to best illustrate the principles
of
the invention and its practical application to thereby enable one of ordinary
skill in
the art to best utilize the invention in various embodiments and with various
modifications as are suited to the particular use contemplated. It is intended
that
the scope of the invention be defined by the claims appended hereto.

Representative Drawing

Sorry, the representative drawing for patent document number 2386293 was not found.

Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date Unavailable
(86) PCT Filing Date 2000-09-29
(87) PCT Publication Date 2001-04-05
(85) National Entry 2002-03-28
Examination Requested 2002-03-28
Dead Application 2007-10-01

Abandonment History

Abandonment Date Reason Reinstatement Date
2004-09-29 FAILURE TO PAY APPLICATION MAINTENANCE FEE 2005-03-08
2006-09-29 FAILURE TO PAY APPLICATION MAINTENANCE FEE

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Request for Examination $200.00 2002-03-28
Application Fee $150.00 2002-03-28
Maintenance Fee - Application - New Act 2 2002-09-30 $50.00 2002-09-03
Registration of a document - section 124 $100.00 2002-12-23
Maintenance Fee - Application - New Act 3 2003-09-29 $50.00 2003-09-03
Reinstatement: Failure to Pay Application Maintenance Fees $200.00 2005-03-08
Maintenance Fee - Application - New Act 4 2004-09-29 $100.00 2005-03-08
Maintenance Fee - Application - New Act 5 2005-09-29 $200.00 2005-09-07
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
CYBERSET TECHNOLOGIES, INC.
Past Owners on Record
OSTERDAY, PATRICK B.
SADRI, MOHAMMAD REZA
TADAYON, VALI
ZWICK, CHARLES M.
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Description 2002-03-28 37 1,771
Claims 2002-03-29 10 708
Cover Page 2002-09-23 1 50
Abstract 2002-03-28 1 75
Claims 2002-03-28 8 322
Drawings 2002-03-28 16 275
Claims 2005-08-23 8 166
PCT 2002-03-28 1 37
Assignment 2002-03-28 4 131
PCT 2002-03-29 1 33
Correspondence 2002-09-19 1 25
Assignment 2002-12-23 9 335
PCT 2002-03-29 15 928
Fees 2003-09-03 1 40
Fees 2002-09-03 2 49
Prosecution-Amendment 2005-02-23 3 65
Fees 2004-09-21 3 70
Fees 2005-03-08 3 81
Prosecution-Amendment 2005-08-23 14 460
Fees 2005-09-07 4 74