Method, system and apparatus for authorizing access by a...

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C705S037000, C713S152000

Reexamination Certificate

active

06253202

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates generally to the field of knowledge management and, more specifically, to a method and apparatus for accessing a user knowledge profile within a database.
BACKGROUND OF THE INVENTION
The new field of “knowledge management” (KM) is receiving increasing recognition as the gains to be realized from the systematic effort to store and export vast knowledge resources held by employees of an organization are being recognized. The sharing of knowledge broadly within an organization offers numerous potential benefits to an organization through the awareness and reuse of existing knowledge, and the avoidance of duplicate efforts.
In order to maximize the exploitation of knowledge resources within an organization, a knowledge management system may be presented with two primary challenges, namely (1) the identification of knowledge resources within the organization and (2) the distribution and accessing of information regarding such knowledge resources within the organization.
The identification, capture, organization and storage of knowledge resources is a particularly taxing problem. Prior art knowledge management systems have typically implemented knowledge repositories that require users manually to input information frequently into pre-defined fields, and in this way manually and in a prompted manner to reveal their personal knowledge base. However, this approach suffers from a number of drawbacks in that the manual entering of such information is time consuming and often incomplete, and therefore places a burden on users who then experience the inconvenience and cost of a corporate knowledge management initiative long before any direct benefit is experienced. Furthermore, users may not be motivated to describe their own knowledge and to contribute documents on an ongoing basis that would subsequently be re-used by others without their awareness or consent. The manual input of such information places a burden on users who then experience the inconvenience and cost of a corporate knowledge management initiative long before any direct benefit is experienced.
It has been the experience of many corporations that knowledge management systems, after some initial success, may fail because either compliance (i.e., the thoroughness and continuity with which each user contributes knowledge) or participation (i.e., the percentage of users actively contributing to the knowledge management system) falls to inadequate levels. Without high compliance and participation, it becomes a practical impossibility to maintain a sufficiently current and complete inventory of the knowledge of all users. Under these circumstances, the knowledge management effort may never offer an attractive relationship of benefits to costs for the organization as a whole, reach a critical mass, and the original benefit of knowledge management falls apart or is marginalized to a small group.
In order to address the problems associated with the manual input of knowledge information, more sophisticated prior art knowledge management initiatives may presume the existence of a centralized staff to work with users to capture knowledge bases. This may however increase the ongoing cost of knowledge management and requires a larger up-front investment before any visible payoff, thus deterring the initial funding of many an otherwise promising knowledge management initiatives. Even if an initial decision is made to proceed with such a sophisticated knowledge management initiative, the cash expenses associated with a large centralized knowledge capture staff may be liable to come under attack, given the difficulty of quantifying knowledge management benefits in dollar terms.
As alluded to above, even once a satisfactory knowledge management information base has been established, the practical utilization thereof to achieve maximum potential benefit may be challenging. Specifically, ensuring that the captured information is readily organized, available, and accessible as appropriate throughout the organization may be problematic.
SUMMARY OF THE INVENTION
According to a first aspect of the invention, there is provided a method of authorizing a user profile access request. An access request, from a first user, to access a user profile of a second user is detected. Responsive to the access request, an authorization request is automatically generated to the second user. The authorization request requests authorization for access to the user profile by the first user.
According to a second aspect of the invention, there is provided apparatus for authorizing a user profile request. A detector detects an access request from a first user to access a user profile of a second user. An organizer, responsive to the access request, automatically generates an authorization request to the second user requesting authorization for access to the user profile by the first user.
Other features of the present invention will be apparent from the accompanying drawings and from the detailed description that follows.


REFERENCES:
patent: 4970681 (1990-11-01), Bennett
patent: 5051891 (1991-09-01), MacPhail
patent: 5488725 (1996-01-01), Turtle et al.
patent: 5555426 (1996-09-01), Johnson et al.
patent: 5659731 (1997-08-01), Gustafson
patent: 5659732 (1997-08-01), Kirsch
patent: 5724567 (1998-03-01), Rose et al.
patent: 5754938 (1998-05-01), Herz et al.
patent: 5794210 (1998-08-01), Goldhaber et al.
patent: 5802518 (1998-09-01), Karaev et al.
patent: 5835087 (1998-11-01), Herz et al.
patent: 5855008 (1998-12-01), Goldhaber et al.
patent: 5867799 (1999-02-01), Lang et al.
patent: 5892909 (1999-04-01), Grasso et al.
patent: 5913212 (1999-06-01), Sutcliffe et al.
patent: 5931907 (1999-08-01), Davis et al.
patent: 5950200 (1999-09-01), Sudai et al.
patent: 5974412 (1999-10-01), Hazelhurst et al.
patent: 5995597 (1999-11-01), Woltz et al.
patent: 5999975 (1999-12-01), Kittaka et al.
patent: 6014644 (2000-01-01), Erickson
patent: 6021439 (2000-02-01), Turek et al.
patent: 6026374 (2000-02-01), Chess
patent: 6038560 (2000-03-01), Wical
patent: 6052122 (2000-04-01), Sutcliffe et al.
patent: 6052709 (2000-04-01), Paul
patent: 6052714 (2000-04-01), Miike et al.
patent: WO 99/39279 (1999-08-01), None
“Taking the Byte Out of Cookies: Privacy, Consnet,a nd the Web” Lin et al, Proceedings of the ehics and ssocial impact compenent on Shaping policy in the infomration age, May 10-12, 1998, Washinton, DC, pp. 39-51.*
“A Security Policy Model for Clinical Information Systems,” Anderson, R., Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 30-43,, May 1998.*
Enonymous Web Page, “How enonymous advisor beta works . . . ”, http://www.enonymous.com/howitworks.asp.
Enonymous Web Page, “The enonymous zone . . . ”, http://www. enonymous.com/zone.asp.
Enonymous Web Page, “the enonymous profile . . ”, http//www.enonymous.com/profile.asp.
“Applying Evolutionary Algorithms to the Problem of Information Filtering”, A Min Tjoa, Max Höfferer, Günter Ehrentraut and Peter Untersmeyer, Database and Expert Systems Applications, 1997 Proceedings, Eighth International Workshop, Sep. 1-2, 1997, pp 450-458.
“Integrators Choice Awards”, Dave Brambert and Susan Biangi, Network VAR's top picks in network hardware and software for 1997, Buyers Guide, (cover story), Network VAR, v.5, Oct. 1997, P28.
“VERITY: Verity introduces new Profiler Kit and enhanced Developer's Kit”,M2 Presswire, Aug. 5, 1998.
“A Security Policy Model for Clinical Information Systems”, Ross J. Anderson, Security and Privacy, 1996, Proceedings, 1996 Symposium on, May 6-8, 1996, pp 30-43.
“Taking the Byte out of Cookies”, Daniel Lin and Michael C. Loui, Proceedings of the Ethics and Social Impact Component on Shaping Policy in the Information Age, May 10-12, 1998, Washington, D.C. pp 39-51.
Enonymous Web Page, “Frequently Asked Questions”, http://www.enonymous.com/faq.asp.
“Yenta: A Multi-Agent, Referral-Based Matchmaking System”, Leonard N. Foner, The First International Conference on Autonomous Agents (Agents '97), Marina del Rey, CA, 1997.
“A Multi

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system and apparatus for authorizing access by a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system and apparatus for authorizing access by a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and apparatus for authorizing access by a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2538348

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.