WO2007064992A1 - Secured and filtered personal information publishing - Google Patents
Secured and filtered personal information publishing Download PDFInfo
- Publication number
- WO2007064992A1 WO2007064992A1 PCT/US2006/046224 US2006046224W WO2007064992A1 WO 2007064992 A1 WO2007064992 A1 WO 2007064992A1 US 2006046224 W US2006046224 W US 2006046224W WO 2007064992 A1 WO2007064992 A1 WO 2007064992A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- calendar
- personal information
- computer
- implemented method
- publishable
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04847—Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/109—Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Mathematical Physics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Selectively shared and filtered personal information collections are provided. Personal information collections include calendars, task lists, address books, and other collections of information that may be provided by personal information manager (PIM) software. Personal information collections published on a server may be limited on a user-by-user basis as to who may access the collections. Furthermore, collections may be automatically filtered based on a rolling window of dates, reducing file size and maintaining privacy of items outside the rolling window.
Description
SECURED AND FILTERED PERSONAL INFORMATION PUBLISHING
BACKGROUND '"
[001] The secure sharing of personal information among groups of individuals has long been a problem confronted by software developers. The challenge has been to enable an individual to publish information such that only specific individuals can access specific parts of the information. To some extent client-server software has enabled limited solutions to this challenge. One example is Microsoft's OUTLOOK personal information manager (PIM) client software combined with Microsoft's EXCHANGE SERVER software. This combination has enabled millions of individuals to share their information within workgroups, most commonly in a corporate or workplace environment.
[002] The needs of users, however, are not limited to the workgroup or company setting. Frequently, users wish to share collections of personal information with a broader audience outside their workplace or organization. Examples include the sharing of a task list, a calendar of events, or a group of contacts (i.e. an address book). If a user wishes to share a calendar (e.g., upcoming football practices) with an audience outside his or her organization, the user must rely on technologies other than classic client-server software, technologies such as the Internet to allow access by other users.
[003] Some solutions have been created which partially solve this problem. For example, calendar programs exist which can upload (publish) and download (subscribe to) calendars from servers attached to a network such as the Internet. These programs may use an Internet publishing standard such as Web-based Distributed Authoring and Versioning (WebDAV) to control publishing a calendar. Such programs, however, may not provide the ability to secure and filter the information available to others via the Internet.
[004] Existing calendar solutions publish calendars without desirable restrictions. An entire calendar must typically be published, and calendars are frequently protected using a simple password protection scheme. Although somewhat secure, having a single password for a calendar makes it difficult to select who can and can't view the calendar on a person-by-person basis. For example, if three users are provided access to a published calendar by sharing the password with each of them, and one of the three subsequently has his access revoked, the publisher of the calendar must change the password and alert only
the two remaining users of the change. Also, the password could be passed to others allowing them access to the information. Having a single password also makes it difficult to track who is accessing a calendar, and which person may have leaked the password to others. The single password may also be sent via insecure email and be subject to the prying eyes of others.
[005] Furthermore, when publishing events or task items, the entire collection is published. This can be cumbersome for both the publisher and the users of the collection. Even though a few months or weeks of information may be relevant, the entire collection must be published each time there is a change. As an example, for a particularly large calendar stretching over a period of years, this may unnecessarily lengthen the amount of time to upload or download the calendar. In addition, the large calendar may take up too much memory and/or disk space on a server. Moreover, publishers may wish to limit the time period of calendar events published so that tentative future events remain unpublished.
[006] There is a need in the art for the ability to publish a calendar to a server, such that the information published can be filtered, the access granted can be restricted on a user-by-user basis, and the granularity of data viewable by a user can be controlled. For example, a user may want to only give free/busy information to one person, while allowing another person to see the text of each appointment.
SUMMARY
[007] One or more embodiments provide a method for securely sharing a personal information collection (e.g., a calendar, a task list, or an address book) via a server. A publisher can specify individuals who will have access to the calendar (or other collection) and may also limit the period of time which can be viewed on a calendar by invited users.
[008] Additional embodiments provide a method for receiving and sharing a personal information collection (e.g., a calendar or task list) on a server. The server receives the personal information collection, along with an indication of an audience authorized to view the collection. The server then requires that users requesting to view the collection be authenticated prior to allowing access.
BRIEF DESCRIPTION OF THE DRAWINGS
[009] The foregoing brief summary of the invention, as well as the following detailed description, is better understood when read in conjunction with the accompanying drawings, which are included by way of example, and not by way of limitation with regard to the claimed invention. In the accompanying drawings, the same or similar elements are labeled with the same reference numbers.
[0010] FIG. 1 depicts an exemplary operating environment in which one or more embodiments may be implemented.
[0011] FIG. 2 is a system diagram depicting the process of publishing a personal information collection on a server for secure access according to one or more embodiments of the invention.
[0012] FIG. 3 is a flowchart depicting a process for registering for a service for sharing personal information collections according to one or more embodiments of the invention.
[0013] FIG. 4 depicts a dialog 401 for configuring the sharing of a calendar according to one or more embodiments of the invention.
[0014] FIGS. 5A-5C depict the selective publication and non-publication of a personal information collection according to one or more embodiments of the invention.
[0015] FIG. 6 is a flowchart showing a method for determining whether to republish a personal information collection according to one or more embodiments of the invention.
DETAILED DESCRIPTION
[0016] Information contained in PIM software 120 may be published using a "rolling window" of time in which information is published or withdrawn from view, ensuring that subscribers to the information do not view irrelevant or tentative information. Furthermore, the information can be secured on a user-by-user basis over a network such as the Internet in order to ensure that unauthorized viewers cannot access the information.
[0017] FIG. 1 depicts an exemplary operating environment in which one or more embodiments may be implemented. The operating environment may comprise computing
device 100 which may work alone or with other computing devices 118. Computing device 100 may comprise memory storage 104 coupled to processing unit 102. Any suitable combination of hardware, software, and/or firmware may be used to implement memory 104, processing unit 102 and other components. By way of example, memory
104, processing unit 102, and/or other components maybe implemented within computing device 100 as shown, or may be implemented in combination with other computing devices 118. The systems, devices, and processors shown are used merely as examples.
[0018] Generally, program modules may include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types. Moreover, embodiments may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, set-top boxes, and so forth. Embodiments may also be practiced in distributed computing environments where tasks are performed by other computing devices 118 that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
[0019] Embodiments, for example, may be implemented as a computer process or method (e.g., in hardware or in software), a computing system, or as an article of manufacture, such as a computer program product or computer readable media. The computer program product may be a computer storage media readable by a computer system and encoded with a computer program of instructions for executing a process on computing device 100. The computer program product may also be a propagated signal on a carrier readable by a computing system and subsequently stored on a computer readable medium on computing device 100.
[0020] With reference to FIG. 1, the embodiment shown may include a computing device, such as computing device 100. In a basic configuration, computer device 100 may include at least one processing unit 102, and memory 104. Depending on the configuration of the computer device, memory 104 may be volatile (e.g., Random Access Memory (RAM)), non-volatile (e.g., Read-Only Memory (ROM), Flash, etc.), or some combination thereof. Memory 104 may serve as a storage location for operating system
105, one or more applications 106, and may include program data 107, as well as other
programs. Examples of operating system 105 are found in the family of WINDOWS operating systems from MICROSOFT CORPORATION of Redmond, Washington. In one embodiment, applications 106 may include personal information manager (PIM) software 120, such as MICROSOFT OUTLOOK.
[0021] Although the basic computing device configuration is contained within dashed- line box 108, computing device 100 may include additional features and functionality. For example, computing device 100 may include additional data storage components, including both removable storage 109 (e.g., floppy disks, memory cards, compact disc (CD) ROMs, digital video discs (DVDs), external hard drives, universal serial bus (USB) keys, etc.) and non-removable storage 110 (e.g., magnetic hard drives).
[0022] Computer storage media may include media implemented in any method or technology for storage of information, including computer readable instructions, data structures, program modules, or other data. Memory 104, removable storage 109, and non-removable storage 110 are all examples of computer storage media. Further examples of such media include RAM, ROM, electrically-erasable programmable ROM (EEPROM), flash memory, CD-ROM, DVD, cassettes, magnetic tape, magnetic disks, and so forth. Any such computer storage media may be accessed by components which are a part of computing device 100, or which are external to computing device 100 and connected via a communications link (e.g., Bluetooth, USB, parallel, serial, infrared, etc.). Computing device 100 may also include input devices 112, such as keyboards, mice, pens, microphone, touchpad, touch-display, etc. Output devices 114 may include displays, speakers, printers, and so forth. Additional forms of storage, input, and output devices may be utilized.
[0023] Computing device 100 may also include one or more communication connections 116 which allow the computing device to communicate with other computing devices 118, such as over a network (e.g., a local area network (LAN), the Internet, etc.). Communication media, in the form of computer readable instructions, data structures, program modules, or other data in a modulated data signal, may be shared with and by device 100 via communication connection 116. Modulated data signal may mean a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal, and may include a modulated carrier wave or other transport
mechanism. Communication connection 116 may be comprised of hardware and/or software enabling either a wired (e.g., Ethernet, USB, Token Ring, modem, etc.) or wireless (e.g., WiFi, WiMax, cellular, acoustic, infrared, radio frequency (RF), etc.) communication conduit with other devices 118.
[0024] FIG. 2 is a system diagram depicting the process of publishing a personal information collection (i.e. a calendar) 210 on a server 203 for secure access according to one or more embodiments of the invention. Computer 201 is an example of computing device 100 set forth in FIG. 1. Computer 201 runs some type of personal information manager software 120, which includes calendar 210. When publishing user 202 opts to publish calendar 210, a publishable form of the calendar is sent to server 203 via network 204. Server 203 may comprise a server on a local area network, or a remote server contacted via the Internet. Server 203 may store calendar 210 as published calendar 211 in storage 205 (e.g., a hard drive associated with server 203).
[0025] Calendar 210 may be sent in a standard format such as the Internet Engineering Task Force's iCalendar standard. Software on computer 201 may store information utilizing the same standard format as used for publication, or store the information in a different standard or proprietary format that is converted to a standard for publication, hi addition to sending calendar event information, software on computer 201 may also send access and control information, describing who can and cannot access published calendar 211. Such information may be sent in a standard format (e.g., access & control (ACL)), or in a proprietary format. The access information sent may include a collection of email addresses and/or user names of individuals who are permitted to access published calendar 211.
[0026] Users 206a, 206b, and 206c each wish to access published calendar 211. Each attempts to access the calendar via a network-connected computer. Since publisher 202 opted to limit access to specific individuals, each user will have to establish his or her identity before the information can be accessed, hi establishing each user's identity, server 203 and/or clients 206 may take advantage of authentication service 207, which may work locally on server 203, or remotely over a network 204 such as the Internet. An authentication service 207, such as MICROSOFT'S PASSPORT NETWORK, can authenticate and establish an identity for each user 206.
[0027] When user 206 attempts to access calendar 211 on server 203, he or she may be challenged to authenticate his or her identity, and subsequently be provided credentials establishing identity and allowing access to the information. Alternative authentication schemes need not require the services of remote authentication service 207. Including a simple login and password setup for each user on server 203 can accomplish the same goal. Here, users 206a and 206b have successfully been authenticated, and subsequently have accessed calendar 211. User 206c has not been authenticated and cannot access the information. Alternatively, user 206c may be authenticated (have his identity established) but not be authorized to access calendar 211. Should publisher 202 ever decide to exclude user 206b, she need only modify access restrictions for that particular user rather than change a single password for all users, and informing the remaining users of the new password.
[0028] Server 203 may be set up as a server uniquely providing secured sharing services for the PIM software 120 running on computer 201. Alternatively, server 203 may be a generic web server programmed to share information and provide secured access to the information. In utilizing the services of server 203, a publisher of information 202 may first need to register, pay for the services, and/or pay to upgrade a service level.
[0029] FIG. 3 is a flowchart depicting a process for registering for a service for sharing personal information collections according to one or more embodiments of the invention. Steps portrayed in the flowchart may be reordered, skipped, combined with other steps, or otherwise modified, and yet the general process will remain constant. Here, at step 301, publisher 202 indicates to PIM software 120 that she wants to share a calendar selectively. This may be accomplished by clicking a Publish button on an interface, selecting a menu item, or otherwise providing input indicating a desire to share a personal information collection such as a calendar or task list.
[0030] For computer 201, once sharing is triggered, network connectivity is checked at step 302. If at decision 303, there is no network connection to enable publishing, then at step 304, an appropriate error message is displayed. If a network connection is present, then at step 305, PIM software 120 is checked to see if it is configured for publishing (e.g., with the server information, etc.). If the software is so configured, then at step 306, an authentication dialog is optionally displayed for the publisher to verify his or her identity.
Once authenticated, at decision 307, the steps can proceed, otherwise the publisher will have to re-authenticate, or cancel the operation. If the PIM software 120 is not configured to utilize publishing, then the publisher is provided an opportunity to register and/or pay to utilize a publishing service at step 308. At step 309, the new user receives their sign in information, and control proceeds.
[0031] Once authenticated, the publisher's registration is checked at decision 310 to see if she has already signed up for the specific sharing service required (e.g. calendar sharing, if it is provisioned separately from the publishing service generally). If not at step 311, the user can register for sharing, and at step 312, a sharing dialog can be displayed where a user can configure options for sharing the particular collection selected.
[0032] FIG. 4 depicts a dialog 401 for configuring the sharing of a calendar according to one or more embodiments of the invention. Similar dialogs may be used for other types of personal information collections, including task lists, address books, note collections, and so forth. It should be noted that this dialog is merely an example. Other dialogs may solicit the same information using different input types, and the dialog may be part of a larger form or input area.
[0033] Dialog 401 provides publisher 202 with the ability to configure publication options for a calendar named Football Practices 402. The published version of the calendar will not include all events, but instead will include a limited time range of events, one that varies based on the current date. Input 403 permits the selection of an amount of time prior and following the current date to be displayed on the published calendar. In the case of a task list, publication of the collection item (a task versus an event) may be similarly filtered using the item's due date. Here, events falling within the range of 2 weeks prior to the current date and 3 weeks after the current date will be published.
[0034] Input 404 allows publisher 202 to select how much information about each event will be included on the published calendar. At a minimum, availability information is provided (e.g., whether a particular time period has an event), while the other end of the spectrum provides all details about events. As an example, "Full Details" may include all information about an event including whatever description has been entered. "Partial Details" may only include date, time, title, and location, without any additional information. Publisher 202 may also filter for showing only those events that occur during
previously determined work hours. Calendar permissions can be controlled using input 405, to permit only certain users, or to allow all users. And uploading can be selected for automatic or manual using input 406. Input 409 can allow the details of events marked "private" to be published for others to access. Input 410 may allow the PM software to honor upload limits of server 203 in order to prevent excessive use of bandwidth and/or memory. Once the appropriate options are configured, a user may publish the calendar immediately by clicking Publish button 407, or exit without publishing by clicking Cancel button 408.
[0035] Once options for calendar publication have been set, and a publisher has selected to restrict access to individual users, publisher 202 may be presented with a dialog (not shown) for inviting users to access his calendar. Such a dialog may also allow for each invited user to be restricted as to a level of access to the calendar. Some users may be able to access the full details of events, whereas others may simply be able to access whether or not an event occurs at a particular time (e.g., free/busy information). A publisher may be provided a template email into which she can insert contacts from her address book, or simply email addresses of those to be authorized to view the calendar. These individuals may then be sent an email with a link to the calendar. When clicking the link, these invited users may need to first be authenticated by server 203, or authentication service 207. Subsequent to the initial set of invitations, publisher 202 may modify the access settings for the calendar, inviting additional users, and revoking access for others.
[0036] FIGS. 5A-5C depict the selective publication and non-publication which occurs each time a publication request (e.g., a send/receive cycle) is made. Here, publisher 202 has selected that a calendar (or for example, a task list) will only publish for a certain "rolling window" date range (2 weeks prior and 3 weeks after the current date), and the user has selected automatic updates. As such, the calendar will be republished only on an as needed basis, and only when publication is triggered (e.g., after a certain period of time, upon manual publication, etc.).
[0037] FIG. 5 A depicts calendar 501a having events A-G scheduled on various dates. The current day is highlighted with a box (i.e. "B" day). The unshaded portion of the calendar represents the "rolling window" or two weeks prior to the current date and three
weeks following the current date. When publishing this calendar, only events A-E will be published from computer 201 to server 203, as these are the only events which fall during the window.
[0038] FIG. 5B depicts the calendar 501b, the same as before, except that now the current date has advanced by a week. Although automatic publication is more likely to update the calendar on a more frequent basis, for purposes of this example, the calendar has not been published over the current week. The rolling window (i.e. the unshaded region) has advanced appropriately, and now computer 201 determines whether or not the calendar needs to be republished. Since event A has fallen outside the window, and event F now falls within the window, the calendar will be re-published, this time with only events B-F listed.
[0039] FIG. 5C depicts calendar 501c, with the current date advanced by yet another week. The rolling window has again advanced, and computer 201 must again determine whether to republish the calendar. Although there has been a shift of a week in the window, the events appearing within the window have not changed. Events B-F should still be listed on the calendar. Assuming that no other changes have been made to the content of the calendar, the calendar will not be re-published this time. Because the events are the same, then the calendar is the same, and republishing would be a waste of resources and time, especially for server 203 which may potentially be shared by multiple publishers.
[0040] FIG. 6 is a flowchart showing a method for determining whether to republish a personal information collection (e.g., a task list, or a calendar) according to one or more embodiments of the invention. At initial step 601, a send/receive cycle is triggered. This may be triggered automatically based on configuration settings (e.g., a certain period of time passes, or a certain percentage of information has changed) or triggered manually by a user. As a part of a send/receive cycle, published information collections may be checked to see if they require republication. The first check, at decision 602, is to see if the publisher changed the personal information collection since the most recent publication. The second check, at decision 603, is to see if a calendar day has passed since the previous publication.
[0041] If either of these checks is true, then at step 604, a publishable version of the collection will be created. The publishable version may conform to a particular standard (e.g., a calendar to the iCalendar specification), and also may honor any filters put in place by the user (e.g., a rolling time window, or business hour events only). At step 605, the just-generated publishable version is compared to the publishable version previously published. This comparison may involve an event by event analysis and/or may involve the comparison of hash values (e.g. CRC or MD5) to determine if the two files are the same. If, at decision 606, the two publishable versions are the same (e.g., no events within the rolling window have been changed, added, or removed, and therefore the files are identical), then at step 607, the publishable version of the collection will not be uploaded to server 203. If the publishable versions are different (e.g., events within the rolling window have changed), then at step 608, the newly generated publishable version of the personal information collection will be uploaded. At this point, users who subscribe to the calendar may receive notification of the change, or automatically receive the updated information.
[0042] While methods and systems embodying the present invention are shown by way of example, it will be understood that the invention is not limited to these embodiments. The methods and systems described are merely examples of the invention, the limits of which are set forth in the claims which follow. Those skilled in the art may make modifications, particularly in light of the foregoing teachings.
Claims
1. A computer-implemented method for publishing a personal information collection or the benefit of an audience, the method comprising: receiving a request to publish the personal information collection, wherein the personal information collection comprises a plurality of collection items; determining whether any changes have been made to the personal information collection since a previous publishing; responsive to there being changes, comparing a publishable version of the personal information collection to a publishable version of the previous publishing; and responsive to the two publishable versions being different: putting the publishable version on a server accessible by the audience; and providing to the server an indication of the audience authorized to view the publishable version.
2. The computer-implemented method of claim 1, wherein the personal information collection comprises a task list having a plurality of tasks.
3. The computer-implemented method of claim 1, wherein the personal information collection comprises a calendar having a plurality of events.
4. The computer-implemented method of claim 3, wherein the publishable version of the calendar comprises and file formatted using the iCalendar standard.
5. The computer-implemented method of claim 1 , further comprising: determining whether a pre-set period of time has passed since the previous publishing; responsive to the pre-set period of time having passed, comparing the publishable version of the personal information collection to the publishable version of the previous publishing; and responsive to the two publishable versions being different: putting the publishable version on a server accessible by the audience; and providing to the server an indication of the audience authorized to view the publishable version.
6. The computer-implemented method of claim 5, further comprising: determining a subset of the plurality of collection items fewer in count than the plurality of collection items in the personal information collection; and creating the publishable version of the personal information collection from the subset of the plurality of collection items.
7. The computer-implemented method of claim 6, further comprising: determining the subset of the plurality of collection items based on a range of dates which vary relative to the current date.
8. The computer-implemented method of claim 1, further comprising: receiving a selection of users to be allowed access to the publishable version.
9. The computer-implemented method of claim 8, further comprising: receiving an indication of a level of access for each user, wherein each level of access comprises different amounts of detail about collection items.
10. The computer-implemented method of claim 8, further comprising: sending an email invitation to each of the selected users providing a link to the publishable version.
11. The computer-implemented method of claim 1, wherein comparing a publishable version of the personal information collection to a publishable version of the previous publishing comprises comparing hash values associated with each of the versions.
12. A computer-implemented method for providing a published personal information collection to a remote user, the method comprising: receiving a publishable version of the personal information collection from a remote publisher; receiving an indication of an audience authorized to view the publishable version; receiving a request to access the publishable version from a remote user; authenticating an identity of the remote user; determining whether the remote user is a member of the audience authorized to view the publishable version; and responsive to the remote user being a member of the authorized audience, allowing the remote user to access the publishable version.
13. The computer-implemented method of claim 12, wherein authenticating the identity of the remote user comprises receiving a confirmation of authentication as established by a remote authentication server.
14. The computer-implemented method of claim 12, wherein the indication of an audience authorized to view the publishable version comprises a plurality of email addresses.
15. The computer-implemented method of claim 12, wherein the personal information collection comprises a calendar having a plurality of events.
16. The computer-implemented method of claim 15, wherein the publishable version of the calendar comprises a file formatted using the iCalendar standard.
17. The computer-implemented method of claim 12, wherein the personal information collection comprises a task list having a plurality of tasks.
18. A system for securely publishing a calendar, the system comprising: a processor; and a memory, storing instructions for execution by the processor, the instructions including steps of: receiving a request to publish the calendar; receiving a range of relative dates with which to filter events in a published calendar, the date range being relative to a current date; receiving a plurality of authorized email addresses; filtering events in the published calendar based on the range of dates relative to the current date; uploading the published calendar to a remote server; and providing the remote server a listing of the plurality of authorized email addresses.
19. The system of claim 17, wherein the instructions further comprise: receiving a request to republish the calendar; determining whether a change has been made to the calendar by a publisher; determining whether a day has passed since the calendar was previously published; responsive to either a change having been made or a day having passed, comparing a to-be-published calendar to a previously published calendar; and responsive to the to-be-published calendar and the previously published calendar being different, uploading the to-be-published calendar to the remote server.
20. The system of claim 18, wherein comparing a to-be-published calendar to a previously published calendar comprises comparing hash values associated with each calendar.
21. The system of claim 17, wherein the instructions further comprise: receiving a request to filter events in the calendar to display only events occurring during a set of business hours; and filtering the published calendar to include only those events occurring during the set of business hours.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006800453062A CN101322118B (en) | 2005-12-01 | 2006-11-30 | Secured and filtered personal information publishing |
KR1020087012902A KR101246947B1 (en) | 2005-12-01 | 2006-11-30 | Secured and filtered personal information publishing |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/291,448 US8200699B2 (en) | 2005-12-01 | 2005-12-01 | Secured and filtered personal information publishing |
US11/291,448 | 2005-12-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007064992A1 true WO2007064992A1 (en) | 2007-06-07 |
Family
ID=38092593
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/046224 WO2007064992A1 (en) | 2005-12-01 | 2006-11-30 | Secured and filtered personal information publishing |
Country Status (4)
Country | Link |
---|---|
US (3) | US8200699B2 (en) |
KR (1) | KR101246947B1 (en) |
CN (1) | CN101322118B (en) |
WO (1) | WO2007064992A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102750605A (en) * | 2007-09-27 | 2012-10-24 | 腾讯科技(深圳)有限公司 | Device, system and method for calendar management |
US9628551B2 (en) | 2014-06-18 | 2017-04-18 | International Business Machines Corporation | Enabling digital asset reuse through dynamically curated shared personal collections with eminence propagation |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8200699B2 (en) | 2005-12-01 | 2012-06-12 | Microsoft Corporation | Secured and filtered personal information publishing |
US8301636B2 (en) * | 2005-12-15 | 2012-10-30 | Microsoft Corporation | Providing schedulable calendars electronically |
US8572495B2 (en) * | 2005-12-15 | 2013-10-29 | Microsoft Corporation | Providing electronic distribution of filtered calendars |
US20070239838A1 (en) * | 2006-04-10 | 2007-10-11 | Laurel James P | Methods and systems for digital content sharing |
KR20120092675A (en) * | 2006-05-05 | 2012-08-21 | 인터디지탈 테크날러지 코포레이션 | Digital rights management using trusted processing techniques |
US7870194B2 (en) * | 2006-11-14 | 2011-01-11 | Microsoft Corporation | Sharing calendar information |
US9990674B1 (en) | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
EP2232898A4 (en) * | 2007-12-17 | 2012-08-08 | Smooth Productions Inc | Communications network system |
US8161419B2 (en) * | 2007-12-17 | 2012-04-17 | Smooth Productions Inc. | Integrated graphical user interface and system with focusing |
US8341184B2 (en) | 2008-05-07 | 2012-12-25 | Smooth Productions Inc. | Communications network system and service provider |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US8504587B2 (en) * | 2008-09-30 | 2013-08-06 | Yahoo! Inc. | Content access and annotation system and method |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
US8676626B1 (en) | 2009-03-27 | 2014-03-18 | T-Mobile Usa, Inc. | Event notification and organization utilizing a communication network |
US8428561B1 (en) | 2009-03-27 | 2013-04-23 | T-Mobile Usa, Inc. | Event notification and organization utilizing a communication network |
US8140621B2 (en) * | 2009-03-27 | 2012-03-20 | T-Mobile, Usa, Inc. | Providing event data to a group of contacts |
US8631070B2 (en) | 2009-03-27 | 2014-01-14 | T-Mobile Usa, Inc. | Providing event data to a group of contacts |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US9210164B2 (en) | 2012-01-08 | 2015-12-08 | International Business Machines Corporation | Confidential information access via social networking web site |
CN102572832B (en) * | 2012-02-08 | 2015-02-04 | 华为终端有限公司 | Secure sharing method and mobile terminal |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
MX368841B (en) | 2012-10-01 | 2019-10-18 | Gary David Mcknight | Improved liquid formulations of urease inhibitors for fertilizers. |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US9015604B2 (en) * | 2012-11-26 | 2015-04-21 | Microsoft Technology Licensing, Llc | Calendaring between user profiles |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9275245B2 (en) * | 2013-03-15 | 2016-03-01 | Airwatch Llc | Data access sharing |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US9531722B1 (en) * | 2013-10-31 | 2016-12-27 | Google Inc. | Methods for generating an activity stream |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
CN106455576B (en) | 2013-11-26 | 2020-01-14 | 加里·戴维·麦克奈特 | Nitrification inhibitors designed for urea-based and manure-based fertilizers |
US10382542B2 (en) * | 2015-01-20 | 2019-08-13 | Michael J. Picciallo | Electronic device with calendaring capabilities |
US20170124519A1 (en) * | 2015-10-29 | 2017-05-04 | Aerohive Networks, Inc. | Meeting based credential provisioning |
US10915881B2 (en) | 2017-01-27 | 2021-02-09 | American Express Travel Related Services Company, Inc. | Transaction account charge splitting |
US11386171B1 (en) | 2017-10-30 | 2022-07-12 | Wells Fargo Bank, N.A. | Data collection and filtering for virtual assistants |
US11866383B1 (en) | 2018-04-04 | 2024-01-09 | Synsus Private Label Partners, Llc | Nitrification inhibiting compositions and their use in agricultural applications |
US20200074541A1 (en) | 2018-09-05 | 2020-03-05 | Consumerinfo.Com, Inc. | Generation of data structures based on categories of matched data items |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
CN112783389B (en) * | 2021-01-21 | 2023-08-22 | 维沃移动通信有限公司 | Information release method, device, equipment and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6105132A (en) * | 1997-02-20 | 2000-08-15 | Novell, Inc. | Computer network graded authentication system and method |
US6202066B1 (en) * | 1997-11-19 | 2001-03-13 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role/group permission association using object access type |
US6357010B1 (en) * | 1998-02-17 | 2002-03-12 | Secure Computing Corporation | System and method for controlling access to documents stored on an internal network |
Family Cites Families (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US635701A (en) * | 1899-01-23 | 1899-10-24 | La Fayette Rollins | Flue-cleaner. |
US5519606A (en) * | 1992-01-21 | 1996-05-21 | Starfish Software, Inc. | System and methods for appointment reconciliation |
US5796842A (en) * | 1996-06-07 | 1998-08-18 | That Corporation | BTSC encoder |
US6018343A (en) | 1996-09-27 | 2000-01-25 | Timecruiser Computing Corp. | Web calendar architecture and uses thereof |
US6216110B1 (en) * | 1998-02-27 | 2001-04-10 | Microsoft Corporation | System and method for publishing calendar information to a publicly accessible location |
US6463463B1 (en) * | 1998-05-29 | 2002-10-08 | Research In Motion Limited | System and method for pushing calendar event messages from a host system to a mobile data communication device |
US6369840B1 (en) | 1999-03-10 | 2002-04-09 | America Online, Inc. | Multi-layered online calendaring and purchasing |
US6457062B1 (en) | 1999-04-08 | 2002-09-24 | Palm, Inc. | System and method for synchronizing multiple calendars over wide area network |
US20030069874A1 (en) | 1999-05-05 | 2003-04-10 | Eyal Hertzog | Method and system to automate the updating of personal information within a personal information management application and to synchronize such updated personal information management applications |
US7420588B2 (en) | 1999-06-09 | 2008-09-02 | Mitutoyo Corporation | Measuring method, measuring system and storage medium |
US6735586B2 (en) * | 2000-02-08 | 2004-05-11 | Sybase, Inc. | System and method for dynamic content retrieval |
US6603489B1 (en) * | 2000-02-09 | 2003-08-05 | International Business Machines Corporation | Electronic calendaring system that automatically predicts calendar entries based upon previous activities |
AU2001238691A1 (en) | 2000-02-24 | 2001-09-03 | Tvgrid, Inc. | Web-driven calendar updating system |
US20020023132A1 (en) | 2000-03-17 | 2002-02-21 | Catherine Tornabene | Shared groups rostering system |
US6604079B1 (en) | 2000-03-20 | 2003-08-05 | International Business Machines Corporation | System and method for feeding e-mail with calendar data |
US6785868B1 (en) | 2000-05-31 | 2004-08-31 | Palm Source, Inc. | Method and apparatus for managing calendar information from a shared database and managing calendar information from multiple users |
US6823357B1 (en) | 2000-06-27 | 2004-11-23 | Intel Corporation | System for automating event scheduling and subscription using an HTTP based event publish server |
US20050278641A1 (en) * | 2000-11-30 | 2005-12-15 | Steve Mansour | Javascript Calendar Application Delivered to a Web Browser |
US20020078070A1 (en) | 2000-12-18 | 2002-06-20 | Philips Electronics North America Corp. | Calendar software application with personal and historical data |
US20020087628A1 (en) * | 2000-12-29 | 2002-07-04 | Andrew Rouse | System and method for providing wireless device access to e-mail applications |
US6941326B2 (en) | 2001-01-24 | 2005-09-06 | Microsoft Corporation | Accounting for update notifications in synchronizing data that may be represented by different data structures |
JP2004533034A (en) | 2001-02-22 | 2004-10-28 | コーヨームセン アメリカ,インコーポレイテッド | Apparatus, method and system for capturing, analyzing, integrating, distributing and utilizing data on current events |
US20030041076A1 (en) * | 2001-03-14 | 2003-02-27 | Lucovsky Mark H. | Schema-based services for identity-based access to calendar data |
US20020165907A1 (en) | 2001-04-13 | 2002-11-07 | Matthew Dornquast | System and method for real time interactive network communications |
US20020174372A1 (en) | 2001-05-18 | 2002-11-21 | Buvana Venkataraman | Method and apparatus for providing synchronized data |
US7035913B2 (en) | 2001-09-28 | 2006-04-25 | Hewlett-Packard Development Company, L.P. | System for collection and distribution of calendar information |
US20040122915A1 (en) * | 2001-11-28 | 2004-06-24 | John Saare | Method and system for an extensible client specific calendar application in a portal server |
US20030154116A1 (en) | 2002-01-04 | 2003-08-14 | Lofton Jeffrey C. | System and method for scheduling events on an internet based calendar |
US20030229624A1 (en) * | 2002-06-05 | 2003-12-11 | Petrisor Greg C. | Search system |
US7814055B2 (en) * | 2002-08-28 | 2010-10-12 | Apple Inc. | Method of managing a calendar and a computer system for implementing that method |
EP1546972A1 (en) | 2002-09-09 | 2005-06-29 | Apple Computer, Inc. | A computer program comprising a plurality of calendars |
US8468126B2 (en) * | 2005-08-01 | 2013-06-18 | Seven Networks, Inc. | Publishing data in an information community |
US7853563B2 (en) * | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
US7739602B2 (en) * | 2003-06-24 | 2010-06-15 | Aol Inc. | System and method for community centric resource sharing based on a publishing subscription model |
US20050027805A1 (en) | 2003-07-15 | 2005-02-03 | Aoki Norihiro Edwin | Instant messaging and enhanced scheduling |
US7552393B2 (en) * | 2003-08-14 | 2009-06-23 | The Hayes-Roth Family Trust | Hook-up assistant |
US20050044061A1 (en) * | 2003-08-22 | 2005-02-24 | Klemow Jason L. | Method and system for providing interactive business directory services |
US20050091120A1 (en) | 2003-10-23 | 2005-04-28 | Auletta Rod R. | Online gift registry service |
US20050114756A1 (en) * | 2003-11-26 | 2005-05-26 | Nokia Corporation | Dynamic Internet linking system and method |
JP4177280B2 (en) * | 2004-03-25 | 2008-11-05 | 東芝ソリューション株式会社 | Planning work management support system and planning work management support program |
US7383291B2 (en) * | 2004-05-24 | 2008-06-03 | Apple Inc. | Method for sharing groups of objects |
GB0413848D0 (en) * | 2004-06-21 | 2004-07-21 | British Broadcasting Corp | Accessing broadcast media |
US20070294370A1 (en) | 2004-06-29 | 2007-12-20 | Fay William F | Scheduling and information sharing and distribution system and method |
US7876714B2 (en) | 2004-09-01 | 2011-01-25 | Cisco Technology, Inc. | Techniques for managing conference schedules using groups |
US20060200374A1 (en) | 2005-03-01 | 2006-09-07 | Yoram Nelken | Automatic scheduling method and apparatus |
US20060271381A1 (en) | 2005-05-27 | 2006-11-30 | Angel Pui | Internet-based wedding planning device with multiple-interactive capabilities and method of use |
US20060282272A1 (en) | 2005-06-14 | 2006-12-14 | Microsoft Corporation | Persistent public calendar searching |
US7672932B2 (en) * | 2005-08-24 | 2010-03-02 | Yahoo! Inc. | Speculative search result based on a not-yet-submitted search query |
WO2007033495A1 (en) | 2005-09-26 | 2007-03-29 | Research In Motion Limited | Communications event scheduler |
US8650336B2 (en) | 2005-10-28 | 2014-02-11 | Alcatel Lucent | Direct memory access (DMA) device with event mover that moves event from event calendar to expired event queue without management of central processing unit |
US8200699B2 (en) | 2005-12-01 | 2012-06-12 | Microsoft Corporation | Secured and filtered personal information publishing |
US20070239869A1 (en) * | 2006-03-28 | 2007-10-11 | Microsoft Corporation | User interface for user presence aggregated across multiple endpoints |
US20080091499A1 (en) | 2006-10-02 | 2008-04-17 | International Business Machines Corporation | System and method to control caching for offline scheduling |
US7870194B2 (en) | 2006-11-14 | 2011-01-11 | Microsoft Corporation | Sharing calendar information |
US20140108558A1 (en) * | 2012-10-12 | 2014-04-17 | Citrix Systems, Inc. | Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices |
-
2005
- 2005-12-01 US US11/291,448 patent/US8200699B2/en not_active Expired - Fee Related
-
2006
- 2006-11-30 CN CN2006800453062A patent/CN101322118B/en active Active
- 2006-11-30 KR KR1020087012902A patent/KR101246947B1/en active IP Right Grant
- 2006-11-30 WO PCT/US2006/046224 patent/WO2007064992A1/en active Application Filing
-
2011
- 2011-08-31 US US13/222,431 patent/US9165161B2/en not_active Expired - Fee Related
-
2015
- 2015-09-22 US US14/861,445 patent/US10216394B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6105132A (en) * | 1997-02-20 | 2000-08-15 | Novell, Inc. | Computer network graded authentication system and method |
US6202066B1 (en) * | 1997-11-19 | 2001-03-13 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role/group permission association using object access type |
US6357010B1 (en) * | 1998-02-17 | 2002-03-12 | Secure Computing Corporation | System and method for controlling access to documents stored on an internal network |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102750605A (en) * | 2007-09-27 | 2012-10-24 | 腾讯科技(深圳)有限公司 | Device, system and method for calendar management |
US9628551B2 (en) | 2014-06-18 | 2017-04-18 | International Business Machines Corporation | Enabling digital asset reuse through dynamically curated shared personal collections with eminence propagation |
US10298676B2 (en) | 2014-06-18 | 2019-05-21 | International Business Machines Corporation | Cost-effective reuse of digital assets |
Also Published As
Publication number | Publication date |
---|---|
US10216394B2 (en) | 2019-02-26 |
US20070130221A1 (en) | 2007-06-07 |
KR20080072015A (en) | 2008-08-05 |
US8200699B2 (en) | 2012-06-12 |
CN101322118B (en) | 2011-10-05 |
KR101246947B1 (en) | 2013-03-25 |
CN101322118A (en) | 2008-12-10 |
US20160011765A1 (en) | 2016-01-14 |
US9165161B2 (en) | 2015-10-20 |
US20110314383A1 (en) | 2011-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10216394B2 (en) | Secured and filtered personal information publishing | |
US9195843B2 (en) | Systems and methods for permissioning remote file access via permissioned links | |
US10013566B2 (en) | System and method for managing collaboration in a networked secure exchange environment | |
US20210217106A1 (en) | Customizable Communications Platform | |
US9720915B2 (en) | Presenting metadata from multiple perimeters | |
US9026590B2 (en) | Sharing calendar information | |
US9553758B2 (en) | Sandboxing individual applications to specific user folders in a cloud-based service | |
TWI439870B (en) | Removable roaming cache device, and method for operating such device | |
US20190012748A1 (en) | Integrating An Application Into Operating System Components Of A Mobile Computing Platform | |
EP2909770B1 (en) | Computerized method and system for managing networked secure collaborative exchange environment | |
US20070162322A1 (en) | Social calendar | |
US20070289024A1 (en) | Controlling access to computer resources using conditions specified for user accounts | |
US20170034182A1 (en) | System and protocol for programmatic inheritance of digital assets | |
US20130305385A1 (en) | Streaming audio playback service and methodology | |
WO2016149478A1 (en) | Method and apparatus for transmission and reception of secure ephemeral media | |
EP2582118B1 (en) | Method, server and system for sharing information | |
US11804954B2 (en) | Encryption key management for an automated workflow | |
WO2018190912A1 (en) | Systems and methods for content management | |
JP2011502304A (en) | Shared personalizable card via electronic card service | |
US20210303711A1 (en) | System and methods for securely storing and sharing digital artifacts | |
EP3026617A1 (en) | Method and apparatus for controlling access to user profiles | |
JP2007094522A (en) | Integrated user management system | |
EP3026618A1 (en) | Method and apparatus for controlling access to user profiles | |
Nicolaisen | A Beginner’s Guide to Cloud Lifestyles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680045306.2 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1020087012902 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06844777 Country of ref document: EP Kind code of ref document: A1 |