`
`{Ma:<irm~i·Stibexpression 1
`
`(quote (Folder,Contalning
`
`(AppHcatlon ;'Adobe Photoshop 2.5'')
`
`5
`
`10
`
`Suppose this cla1.is0 is evaluatfid after the prevkius clausi~, Thew is no
`
`eva}uation of the maxirna! Sl1b0xpression because Hw wm.pp~~1'· finds that the
`
`subexpressions va!ue is already recorijed in stora9e.
`
`l i;;
`
`It remalns to discuss how one can identify n-iaxlrnal stJbexpressicns in a forest of
`expwssbn tmes. This is obtalned by a tree/km?.l':J prurilng algorithm. DefinE! as a.
`
`tenrdna! form any m~~t!1oa rrrvoctitlon which does not deperni on any other
`
`method evaluations for its valuEi, Formally, it is E>ither a named property of V\ior!d
`
`(App!icatkwi ".t\dobe Photoshop 2-5''), an unn~mad property of World (Systsm-
`
`20
`
`Folder), or a constant (st!ing ');xxx"), (lnteger 1234).
`
`The algorithm begins by scanning a pool of re!evanca clauses for aH unique
`terminal forrns. it associates to each unique termlna! iorm a fost of polritors to a!l
`locations in the pool where that kmn occurs.
`
`The algorithm initiaJizes a database of 1,vorking subexpression fotrns as the
`
`collection of aH terminal forms, i.e. to begin with, the working subexpre::.>sion
`
`forrns. are the terminal sube>;pmssion forms, These am marked fer evaluation at
`
`25
`
`30
`
`l83
`
`MSLV_lN\/ OOHVi5
`
`Unified Patents
`Exhibit 1002
`Page 1301 of 2584
`
`
`
`The algorlthrn proceeds in stages, each stagc-i tn:rnstorming the ¥Vorking
`
`subexpr€.!SSion
`
`forrns to a coi!ection of parent forms, The algmithrn stops when
`
`the working database is empty, At a g!v€.wi
`.stage, it iterates through the cdlecticn
`of all wcrh:ing forms, For eat:h frmn in the worklng cci.lection marked tor study at
`
`5
`
`this slags, it com>iders th€.~ collection ot ail parent axprnsslons of that €Xpresskm,
`
`Thls is available because associated with a lorrn is a !!st of pr)!ntsrs tc1 Hs
`occurrences ln the pooL
`
`Amr.mg those p>::trent mi~thoci invoca:fo:.ms, it ident!fles the unique forms, I.e. the
`
`10
`
`unique combinations of rn1;;thod name and rnethod arguments whkl1 have the
`
`given subexpression as a first lev.el suba:q::iression, These unique invocation
`patterns are referred to as parent forms, H !here are no parent forms, the
`subexpression i$ deleted frorn th~~ "vorklng databasG.
`lf tra~re is exactly orH?
`parent form, the sube:q:irt;1ss1on \S replaced in the working i::iatabase by lts parent
`
`15
`
`form, the parent form being marked for processing on!y at the next stage, and the
`
`pointers 10 the cc::.:urrences of th<.:< parent form being pn:'.:<petly t::ak:u!ate<j, using
`
`tf1e prevknssly ~~.vaHable pointers to the children occurrences,
`
`If there ls more
`
`than c:m;;.: parent fr:1rrn, than a new rna:<ima! form is recognized, lt ls assi~v1ed a
`
`20
`
`maxlmaHorm ID number, and a wrapper transformation is m>.ade on each
`expression th;;~t refaitences the form. That is, in an ti1ose e;.;pressions where the
`form occurs, a wrapper is lnsened around trie form accordlng to the recipe:
`
`(Maxima:~Sube;q:m~ss!on $10# {quote $$ ))
`
`25
`
`where lD# Is repraced by ti~ie !D number ot Rw identified n-iaximaHonn, SS refers
`to ths, occuffancE:! of the maximaHmrn it~~eif, and the (quote) ftxrn is the means of
`
`preventing irnmec.liate ~;valuation, as described atKWliot
`
`The working lcrrns database i.s then expanded to incil1de each uniqlie parent
`form of the recognized maximai..form, 'With th3 newly added ltems marked for
`
`30
`
`184
`
`MSLV_lN\/ OOHVi6
`
`Unified Patents
`Exhibit 1002
`Page 1302 of 2584
`
`
`
`.At the conclusion of lhis <:dgorlthrn, there is a collection of transformed
`
`5
`
`expressions in which maximal common subexpressions have been identifo~d and
`
`'·Nhern on!y nonredurn::lar:t evaluation is petforrned
`
`The reader inay wisr~ to veri~i' that the algorithrn pr:oduc .. ss ex;::wt!y the oesite<:.i
`
`result on thf:l pooi of five relevance ck1uses !ndleated earlier.
`
`10
`
`15
`
`The invention contmnplates a situation where rnessages arrive .and computati1:.1ns
`are perlorrned to e:rvaluate certain assertions with the general g(ial ot natij\<'!ng the
`user about certai!1 a~'>sociated m~%sages, wrH:~re the timing, format, am:! cth€.ff
`
`attrfoutes of the notification. including th;:; decision to notify or not, are infkienced
`
`by the results of the spec!fo.?d c:ompuiatlons. The tw:iader notion of influencing
`relevance appra1sai may be implemented by a slight variation on the system
`described above.
`
`norH:iinary criteria.. A well formed phrase in the re!evf.i.nce language resu!ts in
`
`25
`
`nunierical values rather than Boolean v.a!!.ies, 8oolBan Trne ls vie\ived Jis
`equivalent to the rn.Jmerical va!ue1 .0, and the Boolean False as equivalent to the
`numerical value 0,C.( Suppose ~hat certain clauses in a body of .sdvice yield
`Bodean vah..ies«, but other clauses yleid numbers taking va!ues betvmen 0 and 1.
`f:, va!ue between O 0J1d i is !nterpr€!ted as ind!oating a degree of re!ev;"'nca th~t
`
`Hes lntermei:tlate between certaln relev;:i:nce and ceitain Irrelevance ..
`
`ln one
`
`3 0
`
`to degree ct relevance, with those having value 1 .0 at the top of the Hst and those
`
`185
`
`MSLV_lN\/ 00'19·17
`
`Unified Patents
`Exhibit 1002
`Page 1303 of 2584
`
`
`
`user interfo.ce is \<:eyed to display messages lai:n~:led Tnrn. However, there $rn
`
`labels, such <:is Attractive Offer or Chmnic Household Situation Needing Eventual
`
`,;\ttentlon, Such labels result from evaluation ot relevf.mce clauses and,
`depend!nn upon the user inteiiace attached to the invention, suc!1 !abets lead to
`d:'fferent mt:thods of notification or dffetent rnethods of presentatitxi than other
`
`l 0
`
`kinds cf b:tbels. Ths !mp!ernentaticn of a centralized coordinafo:in authority such
`
`\abels. Th~' implementation rn' user side flitering a!lovvs the user to associate
`rneans of notification to vadcius l~~bek", which rnsans include the possibihty of no
`
`l 5
`
`not!-ficat~on.
`
`!.n ont0' erntiodirnent of the invention, a layer C·f extr•~ ana!ysls ls inserted behveen
`
`computation may· be Wtered based OT1 usm preforemces and on observation of
`
`20
`
`the ussr .. Thus, the relevance computation, rather than detE:rmining uniquely the
`
`a user side Wtering method (sE:e above) whereby a user suppre$Sf}S the display
`
`embodiment such censorinq mechanisms are applied automatlcal!y, .An advlce
`
`25
`
`reader or ctn.er application etmtalins a rnodule to observe user behavior and
`
`appiiecl autornatk:ai!y. An <~dvice reader or other application Gontains a module ti:>
`
`186
`
`MSLV_lN\/ 0019H~
`
`Unified Patents
`Exhibit 1002
`Page 1304 of 2584
`
`
`
`5
`
`20
`
`interpretation i(~ the XML lan9uage, This languag& aiso rmJ.kes possible
`hlernn.:hica\ n1essa9in9, and is able to accmmru.:idah:;; mess.age- components: of
`
`There are many imp!ernentatic;ns ot the bask~ arrangement d:sclosed hereirt
`
`\iVitether uslng <Nell kr:ov.:T1 protocols such E-tS MIME Hnd XML or pn.)\Xbtary
`
`protocols, they constitute lrnp!ernemations of the invention.
`
`The Invention is discussed in terrns of a three~part message», containing hwrnan\y
`
`;nterpretab!e infonnation, a relevance \:lat.me, and cornputer lnterpn~tab!e
`
`il1f.-:se parts, For example, the ASUP pmtoco! ssnds abstracts cont<:.iin!ng only
`
`message idenHfiers and the reievanct~ cl.mise sepamtely from the m:;'!ssa£~B body,
`com>isting of ei,-:piarmtory content, software:, and referenGes. Under ASUP,
`
`R '1
`'·I
`
`MSLV_lN\/ 00'19H3
`
`Unified Patents
`Exhibit 1002
`Page 1305 of 2584
`
`
`
`The relevance language is <~ convenient means ot describing t!:e state ct a
`
`consumer computer Bnd its snvirorirnent. Hmvevm. oth;~f bnguages can be
`
`moi:Hfled into foirns \Nhich enable ccrnputed .. relovanc!"' messaging.
`
`!n one erntiodlrnent of the invention, the rol~~ of the relevance ianguag~~ is played
`
`using software tools lrnp\emented in the JAVA programming iangu;3.ge, Owing to
`
`the popuiarity ot JAVA this rnight find 1.vide acceptance among srJttv~'are
`
`15
`
`20
`
`specia.i variant of JAVA, RELEVANCE-JAVA
`
`1s developed, with its own
`
`machine, The intent of this speda! version ls to provlda sorne of the sarne privacy
`
`RELEVANCE>JAVA supplies three specific features which make lt vary useful:
`
`to f:nabk the determinatkin of properties of the consumer cornputer. These
`
`188
`
`MSLV_lN\/ 00'1920
`
`Unified Patents
`Exhibit 1002
`Page 1306 of 2584
`
`
`
`and its envin:mment. This is <::dfoctEid by tumir.9 on certain
`
`featun.::s in tile
`
`JAVA. v!rtua! machine \'Vhlch enable <"J.G~':.ess of machine characteristics,
`
`VVhile RELEVA.NCE>J;.\ VA IS abk! to !Barn a great
`deal about the user rnachin.e~ it rioes not ha\le !he abHit~{ to tr~~r1srrdt any
`
`5
`
`1nstai!ed obiects and dasses <:Ind tmning off certain fe.:ltures in the J/:~ VA
`
`virtual machine.i,
`
`10
`
`The three part rnessaging rnodel r:h:o:c~cribed abo~1e is conducted <.~s fo!lovvs: One
`part consists of hurnan!y interpn:;tab!e explanatory content; on€.' part consists of
`
`1 5
`
`interpretable code, perfo:.\pS in a diffon~nt db!ect of JAVA, <:1:ble to cause effoch:;
`
`on the consurner rnachir.e after consumer approval.
`
`20
`
`30
`
`189
`
`MSLV_lN\/ 00'1921
`
`Unified Patents
`Exhibit 1002
`Page 1307 of 2584
`
`
`
`ln the currently understOG(~ best rnethod d developing this implementation, a
`
`special variant of \.fisua! Basic, HEL£\lANT-8AS!C ls (fove!opE:d \:Vhh its OWTi
`
`hterpreler. The inlent of this spedal wm~kH1 is to provide some of foe sarne
`
`pivaGy and :%x;uri1y characteristics as the relevance languane describE.!ci eadiE:t(cid:173)
`
`RELE\/ANT·BAS!C supplies three specific faatures which mske it very useful:
`
`*· SpeciaHzed inspector Hbraries ..
`types are dev:eioped to enable thE: determination of properties of the
`
`.l 0
`
`cGnsumer computer. ThEise have the ablilty to inspect Hie system, systen1
`
`settings, and m!<:Hed properfa~s of the computer and lts environrnent.
`
`VVhllE~ RELEVANT-·8AS!(; ls HblB to learn a great
`
`deal about the user machine, lt doi%. not havfl tt1~3 at::i!Hty to transmit any
`
`l 5
`
`gathered infonnation back to thi:: author. Thls is effected by l!mi\ing the
`
`insta!!ed ob_iect~~ and cl.assi;:s and t:..Jrn\ng oft certain fon:itures in thfl 8A8lC
`
`2.0
`
`deal <'lbout the user rnachlne, it does not have the ability to rnodlfy the
`
`The three pa.rt rm~issaging model ls conducted <:ts fallows: One part consists of
`humanlv interpretable explanatory conter1t; one part consists of RELEVANT,
`BASIC code spedfyln9 conditions under whioh a rnessage bt~eomes relevant on
`
`25
`
`c:ertaln c0nst.iff1er machines; and one p<.H1 of computer interpretable code,
`perhaps in ;::i_ diffon~nt dialect d Visual Bask, able to cause eHects tin the
`
`190
`
`MSLV_lN\/ 00'1922
`
`Unified Patents
`Exhibit 1002
`Page 1308 of 2584
`
`
`
`!angua£Jf:\ a well known and widely avaHable tooi for examining pr~-;perties of a
`5 me system and sp1~dfying computations.
`
`ln one embodn1t:ff'.tt of the invention, the rola <WSiQt'lE:d to the relevance ianguagB
`is instead played by sz;ftv,«ar~~ took; implemented in the UN!X sheH ;~nzj associated
`
`UNLX ·rools. O\·ving to tht: popularity of UNlX in lts variant forms, this might find
`
`l ()
`
`wide acceptance among scrftvvare developers and othe:r cornputer prokiss!ona!s,
`
`ln ihe curn:mtly understood t«?i:;t method of d~$Veloping this lrnp!ernentation, ts
`
`spi~cia! variant ot frie UN!X Shell, RELEVANT--Sheli
`
`is developed with its own
`
`specialized resources and evalua.ted by a spedaliz~$d <,,taria:tnt of the Shel!
`
`l 5
`
`intE:n-pre.;h~L The intent of this special version ls to provide some of the same
`
`privacy and sBcunty d1mact!?ristics as the relevancca languag~:> desi::dbed earlier.
`HELEV14J,rf ·Shel! suppi!es thre1;.: specific features whkh rnake it useftd:
`
`• Speda!lzed inspector Applications.
`
`Special appHcaHons are developed to
`
`25
`
`Prtvacy Rostdctions.
`machine, it does not have the ablHty to transrnlt any gat!1>::::red information
`back to the .:.u.ithor. This is: ,;;ftectcad by diSflbhng <:tcces:s t1..J cenam
`cornrru .. mh.::ations and netwz)rking features in the shell interprBteL
`
`tc Security Restrktions, V,h1i!e thf:> app!k:ations reachable frrrcn.igh RELE\l,A,NT-
`
`3 0
`
`Sheil <.:tre ab!e to learn about the user machine. they do not have H'ie. ability to
`
`l 9 1
`
`MSLV_lN\/ 00'1923
`
`Unified Patents
`Exhibit 1002
`Page 1309 of 2584
`
`
`
`except through standard mec:hanisrns, such as cn,;:atlng
`
`temporary files in
`
`standard locations such as trnp and subject to resoun::s metmin~l
`
`5
`
`The three part mi:;ssa9h:g triode! is conducted as follows: One paii consists oi
`
`humard~l interpretable explanatory conh::mt; onn ixut consists of RELEVANT-Shell
`
`code specil~1in9 GondiHons '1nder which a rnes.saqe bec;oirii,;:s relevant on certain
`
`consumer rmlchines; and cn-1~: part cif cornputer-lnterpretab!e r.:ode, pmhaps in a
`
`diffi.?mnt dbiect of Shell or othr::~r UNIX-interpn-::tab!e code, able to cause effects
`
`t 0
`
`on th;::: consu:nEir machine atter consumer approvaL
`
`Tht: possibl!Hy of alt6,rnate methods of describing trH:l sb:tte cf frie consumer
`
`l 5
`
`computer is described abov€l.
`
`!tis: pi::iss:\b!e to describe the state without using an
`
`overan relevance language lf one has ava\iab!e a community of v·iatchers, each
`
`wlth tht~ir own peculiar interfaces. The re!E::vance ianguage ls then replaci,;:d by
`w·hatever means of Bxpe~~sk<t'l by which the said applieaticn rnodules. are
`invoked and controHecL
`
`20
`
`The descrlpt!on of the invention has taken 1he ::;tance that the pmpGse of
`
`rn!mmnce evaluation \s to mediate the decislon to notify a eot!sumer about the
`exist<:.mc:e of a mes$age. "ft) that end, the advlce rE1ttdEff app!lcatlon funchons as
`
`25
`
`a messaging centt~r, and advisories p!ay a role analogous to messages in ehmaiL
`
`USENET n<:PNS, and other rr1essa9ing rnoda.!ities, in tr1at they are rc:iad by thG
`
`user as pf.Ht cf a user defined scl1et:iule. ln ti1is viev,ipoint, the user is a manager
`of his cornputer, his property, <-sJH1 his •~ffHiations, and he reaijs Hdvke \Nhieh
`helps hhn \«.>!th !1is concems in u·1at managetfal role,
`
`30
`
`192
`
`MSLV_lN\/ 00'1924
`
`Unified Patents
`Exhibit 1002
`Page 1310 of 2584
`
`
`
`PCTll.lM'Nl975l
`
`Hc:wever, them are c>ther non~rnana\;ieriai settin9s in which r€~leva.nce can drive
`
`the pr•?sE:ritafa:m of lnfonmition to a consumEff as an inti?grai part of \~ertain other
`
`processes in 1ivhlch the cor'lsurner is engaged.
`
`G\.ildancs. The consumer is the us;<;r of a cornpute.r applications prograrn, and
`
`relevance based messaging provides g1.ddance to thE~ consurner at trH?:
`rrwment before performing a certain action or at the moment after performing
`
`a D~O'!ttain <~cfa:m.
`
`1'- Composition, The consunwr is reading a document usinfJ a dispiav
`
`appHc"1Uon on the computer, and reiev'-moe based content cldaptatlon shapes
`
`the ;jocurnent so that the hurnanly interpretable rnessage targets dlrncHy the
`
`chamcteristics of the reader.
`
`In foct an such appHcations ar€ embodiments of lhe irivenUori- Computed
`relevance messagin~1 is of value much more broadly than ln t!1e trictriageda!
`
`5
`
`lQ
`
`L5
`
`The foHo\lvh1g is an E:>:amp!e s:hovvlng hovv an advisor/ is used to guide a ~Jser in
`
`the opernfa)n of a piece of software.
`
`2 5
`
`Consider the foUowing problem: ,A. certain dangerous e·-mall ;r11~ssage has been
`obtaining "NidE~ dlstributiori, When receivr.H.~ by a user with the e-rnai! program
`
`Eudora 4.0, the user sees an innocent !ooklng rnali rnessa~1e inclu:din~1 an
`
`attaci1ment \NHh i~n invitation to the user to open the attachrnent. The <~tt~chmenl
`
`is a.dually' a rna!idous!y prE,pared document whkh, lf opened, can cause darnage
`
`3 0
`
`to the user's computer.
`
`193
`
`MSLV_lN\/ 00·1925
`
`Unified Patents
`Exhibit 1002
`Page 1311 of 2584
`
`
`
`messaging which helps to tk:iai effectively \Nith this situatlon. Under that
`
`implementation,. an aufr!t:ir writes an advisory which is evaiuated for reievance
`
`5
`
`before a user oi Eudora opens an attachment The relevance clause inspects
`
`open an tJt£(chm0nt with certain attrlbutes, The advisory thf:in returns text to the
`
`rnail a.ppik:ation w!1li::h the rnall applk--:ation tfa~p.!ays to the user.
`
`• The mail readt:r application has a speciai coilection of re!evancf:l e-1m!uatkiri
`events, i.o. pwcfoflned events ~·vhlch are '<Ne!! known to authors d advisories.
`
`15
`
`reader of the event via a standard event no@catlon pmtocoL
`
`20
`
`evaluation upon receiving notice of certain events.
`
`~ The advice n::iader eva!1.i>::Hes the advisct\es ln an event pool upon re~~eivlng
`
`notice ot the corresponding GVE:nt
`
`"' The advice reader notifies the user of a reievant messa~w try either;
`
`194
`
`MSLV_lN\/ 00'1926
`
`Unified Patents
`Exhibit 1002
`Page 1312 of 2584
`
`
`
`Sending the re!evant messages t\; the maii reader. The tnail reader then
`
`standards of that app!lcation,
`
`5
`
`The c.:hoics betwi?.en th~~se methods of rH.3\itlcation is made under the control of
`
`10
`
`The appk::alion sending a.n event signal includes dest:riptive information
`
`;~bout the Ei\"E:•nL in th;; rnail n%l:<::1er context. the Eivent Eudora About to Opsn
`AHaonment is accompanle\i by infonnahon about the sender ol the rnwl,
`!nforms.th:.;n atiout th(~ narrn:; oi trie attachn1ent rne, inforrnmlon about th(i
`s;;.mder of the rnni!, and information about attributes of the attachment rne,
`
`L5
`
`lit The advice reader contains ·~n inspector !ibrary which refers to properties
`
`fuffilshed by th;;.\ appiication. f:1.g. mail sender and tlie narne.
`
`in this context, lt somf.lor:e wants to \Nam every user receivinfJ mail frorn
`
`20
`
`king@athi::ns.gr vv!th an attachment named trojanJxt that he should not open the
`
`attachrnent, !t is possible to <H.Jthcr a relevance clause targeting tho advisoiy to
`those people about to open such an attachment The routinq of a.dvisodes to
`
`>~dvke E:fvent poois is hand!od throu9h the header line n-1i2c!1~m!srn of !\MME and
`
`the rnessage- Hm.i variations discussed above. A simpl!S hGader lins of the kirrn
`advlce"event·poo!:, foHowt:.~d by Hw narne of a predefined advicEi event, indicates
`
`2 5
`
`the desired rovtlng
`
`195
`
`MSLV_lN\/ 00'1927
`
`Unified Patents
`Exhibit 1002
`Page 1313 of 2584
`
`
`
`WOll(llDHl
`
`Rolev~mce~Adapted Cornmunicatlon
`
`Tho k:!loi;-..dng is <:m example showing how wh:Nanco :s used tc.> customizf:' the
`c1!stt'ibutiGn cir a lJ(idy of information (see Fig, mt
`
`5
`
`Consider the foHov1ing prob!f:m; ;)., ceri~lin publisher vvants to create an <~\edrcmic
`
`document whose content k~ iaikm~d to the reader, for example because it
`
`consists of m:lverUs!ng which ls rnoro suitable for some readers than otlwrs, or
`
`because it consists of technical inforn1ation which is more suit.able for soma
`
`l 0
`
`read~:H"s. than others, However, an idea! custornizatlon requires intimate
`
`kno1,vledga of the configuration and d~)tails of tt:e consumer's preferences,
`
`tly consumers.
`
`15
`
`Thf.l di~>cussbn beiow describi?s an irnpternentaHon of a syst~~m using the
`
`n;ilevanc€> evaluation components ot invention. Thls irnplEm1N1t;:1tion ~tHovvs the
`
`publis!·:er to create r1ifevance ad:~pted ijocurrn:w1ts, alio1,:vin~1 solution of the
`
`problern. The publication is t.fa>fribu1ed as a dig\t<:·d docurnent containing
`
`embedded wlthln H references to many po.ssib\e variations in content- The
`
`20
`
`s~:Hect!on arnon~1 p~J.ssibfe v~uiants ls l'..iriven by relevancto: dauses, The
`
`cornponents of the document ti1at actuaHy appear on the ~is;:,m:; t1lsplay me those
`
`which are seieded tiasad on intimate knciwii?dge of !hB characteristics of the
`user.
`
`25
`
`The following i~> one lrnp!ementation of such .a systern: /\ cert<:iin base docurr1ent
`
`processing t,~rget formal is chos(in, Suppose for ct.mcreteness this :s HTML A
`
`special source forrnat is then d8fawd, consisting of docurnents,
`
`!n 1he present
`
`context, this is referred to as PRE"HTrv1L, This source forrr1at 194 offers the
`posslbiMy of arranging tnany hh?$rarcnlc;.al!y nested fragments ot modified HTML
`in a linear or(ler. Each component of such an arrangement is protected by one
`
`3 Cl
`
`196
`
`MSLV_lN\/ 00'1928
`
`Unified Patents
`Exhibit 1002
`Page 1314 of 2584
`
`
`
`or rncre relevance clauses, The components (lf the- source forrnat differ from
`
`HTiv1L in that they a!so o!for mnbedded jnq)_lJ_Q_§. expressions from th€!
`
`relevance
`
`language.
`
`clauses 191. To cre:atE! a custc.ir:n document for a spaciiic user, the sourci~ forrrK~t
`docwment ~s trnrispot\ed to the 1Jser cornputor i 92. nnc !hi.'.~ document in source
`
`forn1at is complied into <'l custom targm fr.irrl:l<~t document ·195_ The target format
`
`doourm.o=nt is. then prncessed by the intended target docurnent prnce~:sing system.
`
`i 0
`
`pr·oduchg a display of a custorrnzed doc~iment 193.
`
`ThEl compilation step is the step vvriem the custorn1zaHon occurs and bears
`
`ckJs.er exarn~rh~tton. l~~s th~;} s·our<:e docun1ent is proee~~se.d( vadous corr:ponents
`
`arE! l.'.H·1colin1f:ri:.:d. Those which me protected by ri?levance c!awses w'hici·i
`evaluate to False or at any ratB not to True are d:scarded Ti1ey do r;ot appear in
`
`l .5
`
`the final tMget format fife, Those ·which ar0 prot<?cted by rekv<>nce ciauses which
`
`~~valuate to True are retalnEH:L Th~y do appear in the fins.! target format file,
`Each reta!ri~{j COrt1fX'.H'\8!'1t is processed before placement in nw tar£wt document
`lf any include e~;pressions are identifa~ij in the rne, then those expressions
`fi!EL
`are evaiuated, and the results aw !nti?rpc,h3.tG:d into the tar~F~t document me,
`
`20
`
`This solves !he problem of customized docurnent prn:paratlc:in because the
`
`relev~nce !angua~ie enables thE: pmvid:(::if" to prepare documents \Nhich are
`custornized ~s H the aufr10r rwd access to detailed intimate iu:o\tvle1jge of
`properthzs .of the consurner's computer and envlmnrnent, but it does so wlthout
`
`25
`
`the need for the consumer to reveal that htimatt~ inforrnation to thB provkim·,
`
`Thl.s embodirnenl cf the irwentlon posits a provk1er \.·vith inforrnation v./hk~h i:~
`
`pres(3nttid to various eonsumers in prndsely defoed clrcurnstar:ces, snd it uses
`
`197
`
`MSLV_lN\/ 00·1929
`
`Unified Patents
`Exhibit 1002
`Page 1315 of 2584
`
`
`
`the wc:,tcher, ani:l th:: notifier have different ~~twcture than they do in the inv\:.::ntion
`
`as descr!bf.xi above, but at an abs.tract levei their functions are simii<'JJ. For
`
`example, the too! which complies a source format docuinent into a target forrn<.~<t
`
`5
`
`docwnent plays H1f: role ot bz)th '#atcher and notWer in the five·part rnodel
`discussed atiove. while thi? taq;;i?t document pmc~'ssir:g system p!ays ti'H:'! role of
`u::<er int13rface for tne notifier. The roie of gafr'H?:rt:H· is p!<:ty;;:d ny 'whatever systern
`
`ot· systems bring the soun:::i;: tonr:at doeument into the consi_imer environment.
`
`15
`
`compiled once and for aH into >:l target document !n <:1 well hno'(vn forrnat but,
`
`rather the source tloci.m1E~nt is structured for interactive intt:irpretatfon. The
`
`foH01,ving is an example:
`
`.A source document consists of rnany pages of PRE(cid:173)
`
`HT~4L Embt:~dded in U1e sourcl?. document are conditional cornpHation blocks
`
`document frnrn page to page, each page is cornpl!ed from PRE-HTML lC HHAL
`
`and displayed as needed. Under friis mode!, the Liser's path through t!·ie
`
`document is tietermir.ed oniy at run 1imE:, For m:tHnp!e. certain links in tt1e
`
`doi:::urnent are reievance protech;id. The relev~-lnce e,iq:m.:::sslons refer to attrlbut8S
`cif the onvin:mment that a.re changing as the rt~atfor progrns~~es throu9h the
`document, l.e, they am: cr1i'J.n9ing because the reader is progressing t!1mugh the
`document For E<>;'$,mpie, a reader is prornpted for inforrnafa.in as part cf his
`reading of th\.~ document and, as a result of the prompt a site profHe variabki
`chan9es. causing pagt::is v\sltecl bt<::r ln the re<:tding to Ghange as a result
`
`25
`
`30
`
`MSLV_lN\/ 00'1930
`
`Unified Patents
`Exhibit 1002
`Page 1316 of 2584
`
`
`
`The invention tYiak;;os it possibie for an advisory <.:i1..1thor to target 3itu;:~tions besBd
`
`c:-i: an arbitw.ry co~r:bination of cornputat!onally vi.arifiah!e conditions of the
`
`w·hlch rn.ay l:lo of a pEffSOnai nature. To the ~:xtent that certV:in i~lnds of per~•ona!
`data 1-n.ny be '.Nidely assurm.~d to exist in a standard format on a :;;ubstantia!
`populatioH ol personal coinputers
`this cn~ates me pos~~ibility of H1fc~ invention
`being used to advise a substantial pcipulatlon of lndlvldua!s on issues of a
`personal mi.ture. N.:~tura! ;:~pplicatlons t·ffeas inc!tKie:
`
`l 0
`
`~ Persona! Fimmce: H inforrnatiGr1 <'lbout individual financial assets 1~; <~ssurned
`
`to exist on tho consurnet· cornputer or in its E>iWironrnent in a standard f onnat
`
`on a large coHaction of consumer wmputers., then advk~e authors can prcvkle
`
`l 5
`
`a large br.:dy of individuals fa'nely an<.i reievant GH.lvice about their bank
`
`account management or about thelr invastrn;.:int portfolii:-i_
`
`2 n
`
`11> Personal Health !;"sues; ff infonnatitx: about lndrvidua! m.zdical records b
`assumed to exist on the const.wMJr cornputer iJr in its eiwironment ln a
`
`standa.rd format on a !arge coilectlon oi consumer computers, then advic>:.':
`
`authors can provide a iarge body d lnd!vlduals timely and relevant advkt~
`about drug intemctons, or ~\bout interactions bet1iveen twnetic or bkiod type
`intonnaHon and drugs.
`
`25
`
`This creates an unprecedented opporh.inity, 1:e: .. the ability tc.i offor hlghly target(~d
`advice without ,::omprornlsing individual privacy. Although the advice author is
`
`aithough it requ!rn:s inthnr.tr:: kno-.,v!odg~: of sensitivt.$ pEm'>onal lnforrnafam ic
`
`ev;:iluale those asserHt!ns, the system :tseif !s not revealing Hiis infonTiaHon bacl~
`
`199
`
`MSLV_lN\/ 00'1931
`
`Unified Patents
`Exhibit 1002
`Page 1317 of 2584
`
`
`
`to frn~ author. The consumer may, in somci cirt:urnst<.snces, choose to reV<SBi
`
`such inforrnafo:in after reading fl relevant adv1sory,
`
`Such ar;,plk?JJkms are lirnited by the need for const.1rriers to capture F1nd rnaintain
`
`5
`
`accurate tfata !n a standard format about items which concern the consumers
`
`hif,ihty dos1ratJ!e to rnniove the data rnanagE:trient and dda .input burden under
`
`this arran9ems.;;nt, so that consun1ers a.rf:.: not requlred to beccH1W data mfmagers.
`ln partici.~!ar, it wou!d be hlghly desdat)le for the professional organt:Z:•:'ltions
`
`1 n
`
`rnsponslblo for rnaint<~inlng accurate data <:tbc,ut thr;!r custornars to be the locus.
`
`of responsH;:dHty for data integrity, ~:or exmnple:
`
`These ;~ctors are paid, tr1 part for i~eeping accurate and fonely recr:1rds about
`
`2 O
`
`tt1elr pat!Gnls, cust~xners, c:r clients.
`
`H wou!d be l1lghly dE~sirable fer consumers to have access to some key
`!nforrn;'3.t1on fr)at is maintained tor them by thl?.i professional organizations with
`
`'Nhlc!: they are affiliated. For- example:
`
`25
`
`~ Instead of a consumer i.:::nter!n9 into his computer \:lata about h!z; drug
`
`prescriptions, it would be desirable -fc1r th.to: needed data to be obt~linable from
`
`the pharmacy automatically on demand by th~J consurner con-iputer.
`
`200
`
`MSLV_lN\/ 00'1932
`
`Unified Patents
`Exhibit 1002
`Page 1318 of 2584
`
`
`
`!nstead of ~~ consumer entenng into his compute:r data about his stock
`
`pc·rtfr::1lio and rnanipulatin9 it daily, it wouk.i be desirable for any needed data
`
`to be obtained frorn the Hnarn:.:iai institution .1utornafo:ally on d~~rnand by the
`
`consumer cornputer,
`
`s
`
`~ Advice authors write advic~: conc:erning vatlous issw::s associated with such
`
`personal information,
`
`20
`
`... Certain r.ioctors, financial ins1itutlons, and pharmacit~s instal! server side
`
`cornponenh'> a1 cornpukirs in thelr ottices. They advertise to tne pubilc the
`avaHatJHlty of rcn-iote information armess ..
`
`is interested !n benefiting from advice wrilten using
`
`remote inforrnat:on acet~ss <lpproaches the financial institution, doctr::r, or
`
`software.
`
`20l
`
`MSLV_lN\/ 00·1933
`
`Unified Patents
`Exhibit 1002
`Page 1319 of 2584
`
`
`
`advice making use of nie remote inspectors. The subscnptkm i$o> initiaHzed
`
`appropriately so that the ccn:surner computers advic1;: r<Jadi3f rnake use of the
`
`inkxrnalion.
`
`5
`
`Such adv\Ct'>' ls pedodicaliy evalwated ac1::ord!ng to thie w:lvirn poo! in 'Nhicr1
`
`U-1e advice is placed, Evaluation c<:u ... mes the consumer computer to <:.:str:b!ish
`
`connecticms to remote GNnputers to obtain nt::edE:ti infr:irrnation. For ex<~mpla,
`
`the remote drug prescription inspector l.ibrary on the i::onst.1rner rnachine
`
`1 O
`
`estab!ish.E!S a connechon witr1 the pharrn.acy information .sf:irver and performs
`cart~'in q1.1sries to d1eck if the t:onsumHr has certain probh::rnatic pn;;scription
`
`comblnations.
`
`1 5
`
`Th~~ foi!o'vvln9 is an exampie of ctn advisory tr1at is written using this system;
`Suppose that <'l certain pr1arm3.ceutical rnanl!factumr provide;.> f.l.n antidepressant
`drng to its p1;l.tients, and that il is discovered ii'w.t patif:.mts ;,,vho also use a cc.!rtain
`
`anti·!rrlbmmatory may expt.~rienrn difficulties, In practice, one prescription rnight
`
`be due to n psyct-1iatrist and the other by an orthopedist -.vho r-niqht not be ~lW&re
`ot the patient's other mBdlcal prnscriptions. The rnanufa.cturer authors an
`
`25
`
`The rnani.itacturer ini:::!ud:::s a descripUcwi of the potentially dangNous
`combination for a mest~atJe bt>ciy, Wh::ln ttm advice reader on the consmner
`computer i:~ncounters this relevance da1,ise, it contacts the pharmacy server v,'ith
`It
`
`queries k)r pharrnai;:;y prescription Xanax and pharmacy prescrlption But€>rin,
`
`detm-rnhe& fr1e reit~v,~nce of ths ad\t\soiy based on tt1is. It notifies the consumer
`
`of the situation if it tu ms out K1 be relevant
`
`202
`
`MSLV_lN\/ 00'1934
`
`Unified Patents
`Exhibit 1002
`Page 1320 of 2584
`
`
`
`ability of the system to protect consun1er privacy. T~'J this end, tiie intEffacHon
`
`betvJeen client and server is carefully protected:
`
`5
`
`~ The connect!on between consumer client and pharmacy server is secured by
`
`l {)
`
`15
`
`*
`
`Tht~ identity of the client requesting the information is euthenHcate.>::l by the
`
`pham1acv server by standard crypto9raphic means.
`
`person exc:Eipt to the advice reader on that person's computer. The advke
`
`teast under ordinary opemti~'Jns.
`
`The foHovvln9 !s a convenient interaction protocol for St.JCh rnrno1e inspectors. tn
`
`this protocoL it is slfnp!a to make the dlent skfo sofhvare. Thi? client transmits,
`over a secure Hnk, ASCH strings describin9 the qwerie~: exactly c<S they are
`dEiscrlbed ln trH:~ surface ian9uage.
`In the above exnrnp!e. the dient transmits
`pharrtHlC/ prescription Xanax." The servei- parses this uslng a rniniature version
`
`authentication work .and, usinq standard d;;:i.tabasa lnquhy methods, searches t!1e
`phanmtey database for an entry indicating Hnt Mr, Patient had a pharrnacy
`prescription to Xanax. Tht~ server then returns True or Fal$e as an ASCH string,
`
`25
`
`string and returns th0 corresponding Boolean to the
`
`MSLV_lN\/ 00'1935
`
`Unified Patents
`Exhibit 1002
`Page 1321 of 2584
`
`
`
`An intent of the inventk)n is to alkw-.' only one \vay cormrmriication, tar<:mg
`information from aavk:e provider to advice consumEff, but not aHuwing information
`
`5
`
`to leak back from eon sumer to provldeL The phn~~se one way nK~ffibmne •?vokes
`
`th.is,
`
`Hi:iwever, there are rn .. irnerous situ<'ltions "!Vhero this rnodel i~> rnstridive, For
`
`example, in certain ~>huations consumers am 1:viHln9 to cooperate with providers,
`
`l O
`
`par1iC\Jlarly wh~~n they receive a benem !rorn cooperatin9, An example 1.s w!ien
`consurners \Nant to get techn:fcal support to sohtt~ a specific prob~en1 '..tvhich
`\'::xistin9 advisories do nnt address, For !l-10 s;.~k:e of ~~o!ving their problern, tht:iy
`are '>'VilHng to d!sciosEi various pieces ot inforrnatlc:in about their confi9urnt.:on w
`!i1e soluticin provkier, !n other situations, advice consumers $Ubscribing to a
`
`15
`
`ci:.trtain dt0 an3 actually emp!oyees of the otganizatk:in vvhich operates tne <'ldvice
`
`site, and so they are 'will!nq to sr:are information >.vit!1 that partic:ular advice
`
`provider,
`
`20
`
`The phrase opE~n t,ldirect!onai cornmunk:atkxis
`
`reders to a setting wi·10re me
`!nventbn is mn and the commlmkations are typicHHy one way, but occaslona:Hy
`
`there are processes vvhich feed back !nformation tt:! the advice provh;ler, and tt1e
`
`process takes place in H'1e ckKi.r with the consum€H' computer ldenfay e.xp.llciHy
`e-:val!atdi? to tl"ie provider.
`
`2 5
`
`ln one impiementation (see Fig. 20), a particular docurnont type is di::faii~Ki,
`
`30
`
`referred to as a questionnaire 200, containing text together 'Nith comments,
`
`204
`
`MSLV_lN\/ 00'1936
`
`Unified Pat