throbber
(exlsts {Folder ''Ca!tbrat\on"
`
`{Ma:<irm~i·Stibexpression 1
`
`(quote (Folder,Contalning
`
`(AppHcatlon ;'Adobe Photoshop 2.5'')
`
`5
`
`10
`
`Suppose this cla1.is0 is evaluatfid after the prevkius clausi~, Thew is no
`
`eva}uation of the maxirna! Sl1b0xpression because Hw wm.pp~~1'· finds that the
`
`subexpressions va!ue is already recorijed in stora9e.
`
`l i;;
`
`It remalns to discuss how one can identify n-iaxlrnal stJbexpressicns in a forest of
`expwssbn tmes. This is obtalned by a tree/km?.l':J prurilng algorithm. DefinE! as a.
`
`tenrdna! form any m~~t!1oa rrrvoctitlon which does not deperni on any other
`
`method evaluations for its valuEi, Formally, it is E>ither a named property of V\ior!d
`
`(App!icatkwi ".t\dobe Photoshop 2-5''), an unn~mad property of World (Systsm-
`
`20
`
`Folder), or a constant (st!ing ');xxx"), (lnteger 1234).
`
`The algorithm begins by scanning a pool of re!evanca clauses for aH unique
`terminal forrns. it associates to each unique termlna! iorm a fost of polritors to a!l
`locations in the pool where that kmn occurs.
`
`The algorithm initiaJizes a database of 1,vorking subexpression fotrns as the
`
`collection of aH terminal forms, i.e. to begin with, the working subexpre::.>sion
`
`forrns. are the terminal sube>;pmssion forms, These am marked fer evaluation at
`
`25
`
`30
`
`l83
`
`MSLV_lN\/ OOHVi5
`
`Unified Patents
`Exhibit 1002
`Page 1301 of 2584
`
`

`

`The algorlthrn proceeds in stages, each stagc-i tn:rnstorming the ¥Vorking
`
`subexpr€.!SSion
`
`forrns to a coi!ection of parent forms, The algmithrn stops when
`
`the working database is empty, At a g!v€.wi
`.stage, it iterates through the cdlecticn
`of all wcrh:ing forms, For eat:h frmn in the worklng cci.lection marked tor study at
`
`5
`
`this slags, it com>iders th€.~ collection ot ail parent axprnsslons of that €Xpresskm,
`
`Thls is available because associated with a lorrn is a !!st of pr)!ntsrs tc1 Hs
`occurrences ln the pooL
`
`Amr.mg those p>::trent mi~thoci invoca:fo:.ms, it ident!fles the unique forms, I.e. the
`
`10
`
`unique combinations of rn1;;thod name and rnethod arguments whkl1 have the
`
`given subexpression as a first lev.el suba:q::iression, These unique invocation
`patterns are referred to as parent forms, H !here are no parent forms, the
`subexpression i$ deleted frorn th~~ "vorklng databasG.
`lf tra~re is exactly orH?
`parent form, the sube:q:irt;1ss1on \S replaced in the working i::iatabase by lts parent
`
`15
`
`form, the parent form being marked for processing on!y at the next stage, and the
`
`pointers 10 the cc::.:urrences of th<.:< parent form being pn:'.:<petly t::ak:u!ate<j, using
`
`tf1e prevknssly ~~.vaHable pointers to the children occurrences,
`
`If there ls more
`
`than c:m;;.: parent fr:1rrn, than a new rna:<ima! form is recognized, lt ls assi~v1ed a
`
`20
`
`maxlmaHorm ID number, and a wrapper transformation is m>.ade on each
`expression th;;~t refaitences the form. That is, in an ti1ose e;.;pressions where the
`form occurs, a wrapper is lnsened around trie form accordlng to the recipe:
`
`(Maxima:~Sube;q:m~ss!on $10# {quote $$ ))
`
`25
`
`where lD# Is repraced by ti~ie !D number ot Rw identified n-iaximaHonn, SS refers
`to ths, occuffancE:! of the maximaHmrn it~~eif, and the (quote) ftxrn is the means of
`
`preventing irnmec.liate ~;valuation, as described atKWliot
`
`The working lcrrns database i.s then expanded to incil1de each uniqlie parent
`form of the recognized maximai..form, 'With th3 newly added ltems marked for
`
`30
`
`184
`
`MSLV_lN\/ OOHVi6
`
`Unified Patents
`Exhibit 1002
`Page 1302 of 2584
`
`

`

`.At the conclusion of lhis <:dgorlthrn, there is a collection of transformed
`
`5
`
`expressions in which maximal common subexpressions have been identifo~d and
`
`'·Nhern on!y nonredurn::lar:t evaluation is petforrned
`
`The reader inay wisr~ to veri~i' that the algorithrn pr:oduc .. ss ex;::wt!y the oesite<:.i
`
`result on thf:l pooi of five relevance ck1uses !ndleated earlier.
`
`10
`
`15
`
`The invention contmnplates a situation where rnessages arrive .and computati1:.1ns
`are perlorrned to e:rvaluate certain assertions with the general g(ial ot natij\<'!ng the
`user about certai!1 a~'>sociated m~%sages, wrH:~re the timing, format, am:! cth€.ff
`
`attrfoutes of the notification. including th;:; decision to notify or not, are infkienced
`
`by the results of the spec!fo.?d c:ompuiatlons. The tw:iader notion of influencing
`relevance appra1sai may be implemented by a slight variation on the system
`described above.
`
`norH:iinary criteria.. A well formed phrase in the re!evf.i.nce language resu!ts in
`
`25
`
`nunierical values rather than Boolean v.a!!.ies, 8oolBan Trne ls vie\ived Jis
`equivalent to the rn.Jmerical va!ue1 .0, and the Boolean False as equivalent to the
`numerical value 0,C.( Suppose ~hat certain clauses in a body of .sdvice yield
`Bodean vah..ies«, but other clauses yleid numbers taking va!ues betvmen 0 and 1.
`f:, va!ue between O 0J1d i is !nterpr€!ted as ind!oating a degree of re!ev;"'nca th~t
`
`Hes lntermei:tlate between certaln relev;:i:nce and ceitain Irrelevance ..
`
`ln one
`
`3 0
`
`to degree ct relevance, with those having value 1 .0 at the top of the Hst and those
`
`185
`
`MSLV_lN\/ 00'19·17
`
`Unified Patents
`Exhibit 1002
`Page 1303 of 2584
`
`

`

`user interfo.ce is \<:eyed to display messages lai:n~:led Tnrn. However, there $rn
`
`labels, such <:is Attractive Offer or Chmnic Household Situation Needing Eventual
`
`,;\ttentlon, Such labels result from evaluation ot relevf.mce clauses and,
`depend!nn upon the user inteiiace attached to the invention, suc!1 !abets lead to
`d:'fferent mt:thods of notification or dffetent rnethods of presentatitxi than other
`
`l 0
`
`kinds cf b:tbels. Ths !mp!ernentaticn of a centralized coordinafo:in authority such
`
`\abels. Th~' implementation rn' user side flitering a!lovvs the user to associate
`rneans of notification to vadcius l~~bek", which rnsans include the possibihty of no
`
`l 5
`
`not!-ficat~on.
`
`!.n ont0' erntiodirnent of the invention, a layer C·f extr•~ ana!ysls ls inserted behveen
`
`computation may· be Wtered based OT1 usm preforemces and on observation of
`
`20
`
`the ussr .. Thus, the relevance computation, rather than detE:rmining uniquely the
`
`a user side Wtering method (sE:e above) whereby a user suppre$Sf}S the display
`
`embodiment such censorinq mechanisms are applied automatlcal!y, .An advlce
`
`25
`
`reader or ctn.er application etmtalins a rnodule to observe user behavior and
`
`appiiecl autornatk:ai!y. An <~dvice reader or other application Gontains a module ti:>
`
`186
`
`MSLV_lN\/ 0019H~
`
`Unified Patents
`Exhibit 1002
`Page 1304 of 2584
`
`

`

`5
`
`20
`
`interpretation i(~ the XML lan9uage, This languag& aiso rmJ.kes possible
`hlernn.:hica\ n1essa9in9, and is able to accmmru.:idah:;; mess.age- components: of
`
`There are many imp!ernentatic;ns ot the bask~ arrangement d:sclosed hereirt
`
`\iVitether uslng <Nell kr:ov.:T1 protocols such E-tS MIME Hnd XML or pn.)\Xbtary
`
`protocols, they constitute lrnp!ernemations of the invention.
`
`The Invention is discussed in terrns of a three~part message», containing hwrnan\y
`
`;nterpretab!e infonnation, a relevance \:lat.me, and cornputer lnterpn~tab!e
`
`il1f.-:se parts, For example, the ASUP pmtoco! ssnds abstracts cont<:.iin!ng only
`
`message idenHfiers and the reievanct~ cl.mise sepamtely from the m:;'!ssa£~B body,
`com>isting of ei,-:piarmtory content, software:, and referenGes. Under ASUP,
`
`R '1
`'·I
`
`MSLV_lN\/ 00'19H3
`
`Unified Patents
`Exhibit 1002
`Page 1305 of 2584
`
`

`

`The relevance language is <~ convenient means ot describing t!:e state ct a
`
`consumer computer Bnd its snvirorirnent. Hmvevm. oth;~f bnguages can be
`
`moi:Hfled into foirns \Nhich enable ccrnputed .. relovanc!"' messaging.
`
`!n one erntiodlrnent of the invention, the rol~~ of the relevance ianguag~~ is played
`
`using software tools lrnp\emented in the JAVA programming iangu;3.ge, Owing to
`
`the popuiarity ot JAVA this rnight find 1.vide acceptance among srJttv~'are
`
`15
`
`20
`
`specia.i variant of JAVA, RELEVANCE-JAVA
`
`1s developed, with its own
`
`machine, The intent of this speda! version ls to provlda sorne of the sarne privacy
`
`RELEVANCE>JAVA supplies three specific features which make lt vary useful:
`
`to f:nabk the determinatkin of properties of the consumer cornputer. These
`
`188
`
`MSLV_lN\/ 00'1920
`
`Unified Patents
`Exhibit 1002
`Page 1306 of 2584
`
`

`

`and its envin:mment. This is <::dfoctEid by tumir.9 on certain
`
`featun.::s in tile
`
`JAVA. v!rtua! machine \'Vhlch enable <"J.G~':.ess of machine characteristics,
`
`VVhile RELEVA.NCE>J;.\ VA IS abk! to !Barn a great
`deal about the user rnachin.e~ it rioes not ha\le !he abHit~{ to tr~~r1srrdt any
`
`5
`
`1nstai!ed obiects and dasses <:Ind tmning off certain fe.:ltures in the J/:~ VA
`
`virtual machine.i,
`
`10
`
`The three part rnessaging rnodel r:h:o:c~cribed abo~1e is conducted <.~s fo!lovvs: One
`part consists of hurnan!y interpn:;tab!e explanatory content; on€.' part consists of
`
`1 5
`
`interpretable code, perfo:.\pS in a diffon~nt db!ect of JAVA, <:1:ble to cause effoch:;
`
`on the consurner rnachir.e after consumer approval.
`
`20
`
`30
`
`189
`
`MSLV_lN\/ 00'1921
`
`Unified Patents
`Exhibit 1002
`Page 1307 of 2584
`
`

`

`ln the currently understOG(~ best rnethod d developing this implementation, a
`
`special variant of \.fisua! Basic, HEL£\lANT-8AS!C ls (fove!opE:d \:Vhh its OWTi
`
`hterpreler. The inlent of this spedal wm~kH1 is to provide some of foe sarne
`
`pivaGy and :%x;uri1y characteristics as the relevance languane describE.!ci eadiE:t(cid:173)
`
`RELE\/ANT·BAS!C supplies three specific faatures which mske it very useful:
`
`*· SpeciaHzed inspector Hbraries ..
`types are dev:eioped to enable thE: determination of properties of the
`
`.l 0
`
`cGnsumer computer. ThEise have the ablilty to inspect Hie system, systen1
`
`settings, and m!<:Hed properfa~s of the computer and lts environrnent.
`
`VVhllE~ RELEVANT-·8AS!(; ls HblB to learn a great
`
`deal about the user machine, lt doi%. not havfl tt1~3 at::i!Hty to transmit any
`
`l 5
`
`gathered infonnation back to thi:: author. Thls is effected by l!mi\ing the
`
`insta!!ed ob_iect~~ and cl.assi;:s and t:..Jrn\ng oft certain fon:itures in thfl 8A8lC
`
`2.0
`
`deal <'lbout the user rnachlne, it does not have the ability to rnodlfy the
`
`The three pa.rt rm~issaging model ls conducted <:ts fallows: One part consists of
`humanlv interpretable explanatory conter1t; one part consists of RELEVANT,
`BASIC code spedfyln9 conditions under whioh a rnessage bt~eomes relevant on
`
`25
`
`c:ertaln c0nst.iff1er machines; and one p<.H1 of computer interpretable code,
`perhaps in ;::i_ diffon~nt dialect d Visual Bask, able to cause eHects tin the
`
`190
`
`MSLV_lN\/ 00'1922
`
`Unified Patents
`Exhibit 1002
`Page 1308 of 2584
`
`

`

`!angua£Jf:\ a well known and widely avaHable tooi for examining pr~-;perties of a
`5 me system and sp1~dfying computations.
`
`ln one embodn1t:ff'.tt of the invention, the rola <WSiQt'lE:d to the relevance ianguagB
`is instead played by sz;ftv,«ar~~ took; implemented in the UN!X sheH ;~nzj associated
`
`UNLX ·rools. O\·ving to tht: popularity of UNlX in lts variant forms, this might find
`
`l ()
`
`wide acceptance among scrftvvare developers and othe:r cornputer prokiss!ona!s,
`
`ln ihe curn:mtly understood t«?i:;t method of d~$Veloping this lrnp!ernentation, ts
`
`spi~cia! variant ot frie UN!X Shell, RELEVANT--Sheli
`
`is developed with its own
`
`specialized resources and evalua.ted by a spedaliz~$d <,,taria:tnt of the Shel!
`
`l 5
`
`intE:n-pre.;h~L The intent of this special version ls to provide some of the same
`
`privacy and sBcunty d1mact!?ristics as the relevancca languag~:> desi::dbed earlier.
`HELEV14J,rf ·Shel! suppi!es thre1;.: specific features whkh rnake it useftd:
`
`• Speda!lzed inspector Applications.
`
`Special appHcaHons are developed to
`
`25
`
`Prtvacy Rostdctions.
`machine, it does not have the ablHty to transrnlt any gat!1>::::red information
`back to the .:.u.ithor. This is: ,;;ftectcad by diSflbhng <:tcces:s t1..J cenam
`cornrru .. mh.::ations and netwz)rking features in the shell interprBteL
`
`tc Security Restrktions, V,h1i!e thf:> app!k:ations reachable frrrcn.igh RELE\l,A,NT-
`
`3 0
`
`Sheil <.:tre ab!e to learn about the user machine. they do not have H'ie. ability to
`
`l 9 1
`
`MSLV_lN\/ 00'1923
`
`Unified Patents
`Exhibit 1002
`Page 1309 of 2584
`
`

`

`except through standard mec:hanisrns, such as cn,;:atlng
`
`temporary files in
`
`standard locations such as trnp and subject to resoun::s metmin~l
`
`5
`
`The three part mi:;ssa9h:g triode! is conducted as follows: One paii consists oi
`
`humard~l interpretable explanatory conh::mt; onn ixut consists of RELEVANT-Shell
`
`code specil~1in9 GondiHons '1nder which a rnes.saqe bec;oirii,;:s relevant on certain
`
`consumer rmlchines; and cn-1~: part cif cornputer-lnterpretab!e r.:ode, pmhaps in a
`
`diffi.?mnt dbiect of Shell or othr::~r UNIX-interpn-::tab!e code, able to cause effects
`
`t 0
`
`on th;::: consu:nEir machine atter consumer approvaL
`
`Tht: possibl!Hy of alt6,rnate methods of describing trH:l sb:tte cf frie consumer
`
`l 5
`
`computer is described abov€l.
`
`!tis: pi::iss:\b!e to describe the state without using an
`
`overan relevance language lf one has ava\iab!e a community of v·iatchers, each
`
`wlth tht~ir own peculiar interfaces. The re!E::vance ianguage ls then replaci,;:d by
`w·hatever means of Bxpe~~sk<t'l by which the said applieaticn rnodules. are
`invoked and controHecL
`
`20
`
`The descrlpt!on of the invention has taken 1he ::;tance that the pmpGse of
`
`rn!mmnce evaluation \s to mediate the decislon to notify a eot!sumer about the
`exist<:.mc:e of a mes$age. "ft) that end, the advlce rE1ttdEff app!lcatlon funchons as
`
`25
`
`a messaging centt~r, and advisories p!ay a role analogous to messages in ehmaiL
`
`USENET n<:PNS, and other rr1essa9ing rnoda.!ities, in tr1at they are rc:iad by thG
`
`user as pf.Ht cf a user defined scl1et:iule. ln ti1is viev,ipoint, the user is a manager
`of his cornputer, his property, <-sJH1 his •~ffHiations, and he reaijs Hdvke \Nhieh
`helps hhn \«.>!th !1is concems in u·1at managetfal role,
`
`30
`
`192
`
`MSLV_lN\/ 00'1924
`
`Unified Patents
`Exhibit 1002
`Page 1310 of 2584
`
`

`

`PCTll.lM'Nl975l
`
`Hc:wever, them are c>ther non~rnana\;ieriai settin9s in which r€~leva.nce can drive
`
`the pr•?sE:ritafa:m of lnfonmition to a consumEff as an inti?grai part of \~ertain other
`
`processes in 1ivhlch the cor'lsurner is engaged.
`
`G\.ildancs. The consumer is the us;<;r of a cornpute.r applications prograrn, and
`
`relevance based messaging provides g1.ddance to thE~ consurner at trH?:
`rrwment before performing a certain action or at the moment after performing
`
`a D~O'!ttain <~cfa:m.
`
`1'- Composition, The consunwr is reading a document usinfJ a dispiav
`
`appHc"1Uon on the computer, and reiev'-moe based content cldaptatlon shapes
`
`the ;jocurnent so that the hurnanly interpretable rnessage targets dlrncHy the
`
`chamcteristics of the reader.
`
`In foct an such appHcations ar€ embodiments of lhe irivenUori- Computed
`relevance messagin~1 is of value much more broadly than ln t!1e trictriageda!
`
`5
`
`lQ
`
`L5
`
`The foHo\lvh1g is an E:>:amp!e s:hovvlng hovv an advisor/ is used to guide a ~Jser in
`
`the opernfa)n of a piece of software.
`
`2 5
`
`Consider the foUowing problem: ,A. certain dangerous e·-mall ;r11~ssage has been
`obtaining "NidE~ dlstributiori, When receivr.H.~ by a user with the e-rnai! program
`
`Eudora 4.0, the user sees an innocent !ooklng rnali rnessa~1e inclu:din~1 an
`
`attaci1ment \NHh i~n invitation to the user to open the attachrnent. The <~tt~chmenl
`
`is a.dually' a rna!idous!y prE,pared document whkh, lf opened, can cause darnage
`
`3 0
`
`to the user's computer.
`
`193
`
`MSLV_lN\/ 00·1925
`
`Unified Patents
`Exhibit 1002
`Page 1311 of 2584
`
`

`

`messaging which helps to tk:iai effectively \Nith this situatlon. Under that
`
`implementation,. an aufr!t:ir writes an advisory which is evaiuated for reievance
`
`5
`
`before a user oi Eudora opens an attachment The relevance clause inspects
`
`open an tJt£(chm0nt with certain attrlbutes, The advisory thf:in returns text to the
`
`rnail a.ppik:ation w!1li::h the rnall applk--:ation tfa~p.!ays to the user.
`
`• The mail readt:r application has a speciai coilection of re!evancf:l e-1m!uatkiri
`events, i.o. pwcfoflned events ~·vhlch are '<Ne!! known to authors d advisories.
`
`15
`
`reader of the event via a standard event no@catlon pmtocoL
`
`20
`
`evaluation upon receiving notice of certain events.
`
`~ The advice n::iader eva!1.i>::Hes the advisct\es ln an event pool upon re~~eivlng
`
`notice ot the corresponding GVE:nt
`
`"' The advice reader notifies the user of a reievant messa~w try either;
`
`194
`
`MSLV_lN\/ 00'1926
`
`Unified Patents
`Exhibit 1002
`Page 1312 of 2584
`
`

`

`Sending the re!evant messages t\; the maii reader. The tnail reader then
`
`standards of that app!lcation,
`
`5
`
`The c.:hoics betwi?.en th~~se methods of rH.3\itlcation is made under the control of
`
`10
`
`The appk::alion sending a.n event signal includes dest:riptive information
`
`;~bout the Ei\"E:•nL in th;; rnail n%l:<::1er context. the Eivent Eudora About to Opsn
`AHaonment is accompanle\i by infonnahon about the sender ol the rnwl,
`!nforms.th:.;n atiout th(~ narrn:; oi trie attachn1ent rne, inforrnmlon about th(i
`s;;.mder of the rnni!, and information about attributes of the attachment rne,
`
`L5
`
`lit The advice reader contains ·~n inspector !ibrary which refers to properties
`
`fuffilshed by th;;.\ appiication. f:1.g. mail sender and tlie narne.
`
`in this context, lt somf.lor:e wants to \Nam every user receivinfJ mail frorn
`
`20
`
`king@athi::ns.gr vv!th an attachment named trojanJxt that he should not open the
`
`attachrnent, !t is possible to <H.Jthcr a relevance clause targeting tho advisoiy to
`those people about to open such an attachment The routinq of a.dvisodes to
`
`>~dvke E:fvent poois is hand!od throu9h the header line n-1i2c!1~m!srn of !\MME and
`
`the rnessage- Hm.i variations discussed above. A simpl!S hGader lins of the kirrn
`advlce"event·poo!:, foHowt:.~d by Hw narne of a predefined advicEi event, indicates
`
`2 5
`
`the desired rovtlng
`
`195
`
`MSLV_lN\/ 00'1927
`
`Unified Patents
`Exhibit 1002
`Page 1313 of 2584
`
`

`

`WOll(llDHl
`
`Rolev~mce~Adapted Cornmunicatlon
`
`Tho k:!loi;-..dng is <:m example showing how wh:Nanco :s used tc.> customizf:' the
`c1!stt'ibutiGn cir a lJ(idy of information (see Fig, mt
`
`5
`
`Consider the foHov1ing prob!f:m; ;)., ceri~lin publisher vvants to create an <~\edrcmic
`
`document whose content k~ iaikm~d to the reader, for example because it
`
`consists of m:lverUs!ng which ls rnoro suitable for some readers than otlwrs, or
`
`because it consists of technical inforn1ation which is more suit.able for soma
`
`l 0
`
`read~:H"s. than others, However, an idea! custornizatlon requires intimate
`
`kno1,vledga of the configuration and d~)tails of tt:e consumer's preferences,
`
`tly consumers.
`
`15
`
`Thf.l di~>cussbn beiow describi?s an irnpternentaHon of a syst~~m using the
`
`n;ilevanc€> evaluation components ot invention. Thls irnplEm1N1t;:1tion ~tHovvs the
`
`publis!·:er to create r1ifevance ad:~pted ijocurrn:w1ts, alio1,:vin~1 solution of the
`
`problern. The publication is t.fa>fribu1ed as a dig\t<:·d docurnent containing
`
`embedded wlthln H references to many po.ssib\e variations in content- The
`
`20
`
`s~:Hect!on arnon~1 p~J.ssibfe v~uiants ls l'..iriven by relevancto: dauses, The
`
`cornponents of the document ti1at actuaHy appear on the ~is;:,m:; t1lsplay me those
`
`which are seieded tiasad on intimate knciwii?dge of !hB characteristics of the
`user.
`
`25
`
`The following i~> one lrnp!ementation of such .a systern: /\ cert<:iin base docurr1ent
`
`processing t,~rget formal is chos(in, Suppose for ct.mcreteness this :s HTML A
`
`special source forrnat is then d8fawd, consisting of docurnents,
`
`!n 1he present
`
`context, this is referred to as PRE"HTrv1L, This source forrr1at 194 offers the
`posslbiMy of arranging tnany hh?$rarcnlc;.al!y nested fragments ot modified HTML
`in a linear or(ler. Each component of such an arrangement is protected by one
`
`3 Cl
`
`196
`
`MSLV_lN\/ 00'1928
`
`Unified Patents
`Exhibit 1002
`Page 1314 of 2584
`
`

`

`or rncre relevance clauses, The components (lf the- source forrnat differ from
`
`HTiv1L in that they a!so o!for mnbedded jnq)_lJ_Q_§. expressions from th€!
`
`relevance
`
`language.
`
`clauses 191. To cre:atE! a custc.ir:n document for a spaciiic user, the sourci~ forrrK~t
`docwment ~s trnrispot\ed to the 1Jser cornputor i 92. nnc !hi.'.~ document in source
`
`forn1at is complied into <'l custom targm fr.irrl:l<~t document ·195_ The target format
`
`doourm.o=nt is. then prncessed by the intended target docurnent prnce~:sing system.
`
`i 0
`
`pr·oduchg a display of a custorrnzed doc~iment 193.
`
`ThEl compilation step is the step vvriem the custorn1zaHon occurs and bears
`
`ckJs.er exarn~rh~tton. l~~s th~;} s·our<:e docun1ent is proee~~se.d( vadous corr:ponents
`
`arE! l.'.H·1colin1f:ri:.:d. Those which me protected by ri?levance c!awses w'hici·i
`evaluate to False or at any ratB not to True are d:scarded Ti1ey do r;ot appear in
`
`l .5
`
`the final tMget format fife, Those ·which ar0 prot<?cted by rekv<>nce ciauses which
`
`~~valuate to True are retalnEH:L Th~y do appear in the fins.! target format file,
`Each reta!ri~{j COrt1fX'.H'\8!'1t is processed before placement in nw tar£wt document
`lf any include e~;pressions are identifa~ij in the rne, then those expressions
`fi!EL
`are evaiuated, and the results aw !nti?rpc,h3.tG:d into the tar~F~t document me,
`
`20
`
`This solves !he problem of customized docurnent prn:paratlc:in because the
`
`relev~nce !angua~ie enables thE: pmvid:(::if" to prepare documents \Nhich are
`custornized ~s H the aufr10r rwd access to detailed intimate iu:o\tvle1jge of
`properthzs .of the consurner's computer and envlmnrnent, but it does so wlthout
`
`25
`
`the need for the consumer to reveal that htimatt~ inforrnation to thB provkim·,
`
`Thl.s embodirnenl cf the irwentlon posits a provk1er \.·vith inforrnation v./hk~h i:~
`
`pres(3nttid to various eonsumers in prndsely defoed clrcurnstar:ces, snd it uses
`
`197
`
`MSLV_lN\/ 00·1929
`
`Unified Patents
`Exhibit 1002
`Page 1315 of 2584
`
`

`

`the wc:,tcher, ani:l th:: notifier have different ~~twcture than they do in the inv\:.::ntion
`
`as descr!bf.xi above, but at an abs.tract levei their functions are simii<'JJ. For
`
`example, the too! which complies a source format docuinent into a target forrn<.~<t
`
`5
`
`docwnent plays H1f: role ot bz)th '#atcher and notWer in the five·part rnodel
`discussed atiove. while thi? taq;;i?t document pmc~'ssir:g system p!ays ti'H:'! role of
`u::<er int13rface for tne notifier. The roie of gafr'H?:rt:H· is p!<:ty;;:d ny 'whatever systern
`
`ot· systems bring the soun:::i;: tonr:at doeument into the consi_imer environment.
`
`15
`
`compiled once and for aH into >:l target document !n <:1 well hno'(vn forrnat but,
`
`rather the source tloci.m1E~nt is structured for interactive intt:irpretatfon. The
`
`foH01,ving is an example:
`
`.A source document consists of rnany pages of PRE(cid:173)
`
`HT~4L Embt:~dded in U1e sourcl?. document are conditional cornpHation blocks
`
`document frnrn page to page, each page is cornpl!ed from PRE-HTML lC HHAL
`
`and displayed as needed. Under friis mode!, the Liser's path through t!·ie
`
`document is tietermir.ed oniy at run 1imE:, For m:tHnp!e. certain links in tt1e
`
`doi:::urnent are reievance protech;id. The relev~-lnce e,iq:m.:::sslons refer to attrlbut8S
`cif the onvin:mment that a.re changing as the rt~atfor progrns~~es throu9h the
`document, l.e, they am: cr1i'J.n9ing because the reader is progressing t!1mugh the
`document For E<>;'$,mpie, a reader is prornpted for inforrnafa.in as part cf his
`reading of th\.~ document and, as a result of the prompt a site profHe variabki
`chan9es. causing pagt::is v\sltecl bt<::r ln the re<:tding to Ghange as a result
`
`25
`
`30
`
`MSLV_lN\/ 00'1930
`
`Unified Patents
`Exhibit 1002
`Page 1316 of 2584
`
`

`

`The invention tYiak;;os it possibie for an advisory <.:i1..1thor to target 3itu;:~tions besBd
`
`c:-i: an arbitw.ry co~r:bination of cornputat!onally vi.arifiah!e conditions of the
`
`w·hlch rn.ay l:lo of a pEffSOnai nature. To the ~:xtent that certV:in i~lnds of per~•ona!
`data 1-n.ny be '.Nidely assurm.~d to exist in a standard format on a :;;ubstantia!
`populatioH ol personal coinputers
`this cn~ates me pos~~ibility of H1fc~ invention
`being used to advise a substantial pcipulatlon of lndlvldua!s on issues of a
`personal mi.ture. N.:~tura! ;:~pplicatlons t·ffeas inc!tKie:
`
`l 0
`
`~ Persona! Fimmce: H inforrnatiGr1 <'lbout individual financial assets 1~; <~ssurned
`
`to exist on tho consurnet· cornputer or in its E>iWironrnent in a standard f onnat
`
`on a large coHaction of consumer wmputers., then advk~e authors can prcvkle
`
`l 5
`
`a large br.:dy of individuals fa'nely an<.i reievant GH.lvice about their bank
`
`account management or about thelr invastrn;.:int portfolii:-i_
`
`2 n
`
`11> Personal Health !;"sues; ff infonnatitx: about lndrvidua! m.zdical records b
`assumed to exist on the const.wMJr cornputer iJr in its eiwironment ln a
`
`standa.rd format on a !arge coilectlon oi consumer computers, then advic>:.':
`
`authors can provide a iarge body d lnd!vlduals timely and relevant advkt~
`about drug intemctons, or ~\bout interactions bet1iveen twnetic or bkiod type
`intonnaHon and drugs.
`
`25
`
`This creates an unprecedented opporh.inity, 1:e: .. the ability tc.i offor hlghly target(~d
`advice without ,::omprornlsing individual privacy. Although the advice author is
`
`aithough it requ!rn:s inthnr.tr:: kno-.,v!odg~: of sensitivt.$ pEm'>onal lnforrnafam ic
`
`ev;:iluale those asserHt!ns, the system :tseif !s not revealing Hiis infonTiaHon bacl~
`
`199
`
`MSLV_lN\/ 00'1931
`
`Unified Patents
`Exhibit 1002
`Page 1317 of 2584
`
`

`

`to frn~ author. The consumer may, in somci cirt:urnst<.snces, choose to reV<SBi
`
`such inforrnafo:in after reading fl relevant adv1sory,
`
`Such ar;,plk?JJkms are lirnited by the need for const.1rriers to capture F1nd rnaintain
`
`5
`
`accurate tfata !n a standard format about items which concern the consumers
`
`hif,ihty dos1ratJ!e to rnniove the data rnanagE:trient and dda .input burden under
`
`this arran9ems.;;nt, so that consun1ers a.rf:.: not requlred to beccH1W data mfmagers.
`ln partici.~!ar, it wou!d be hlghly desdat)le for the professional organt:Z:•:'ltions
`
`1 n
`
`rnsponslblo for rnaint<~inlng accurate data <:tbc,ut thr;!r custornars to be the locus.
`
`of responsH;:dHty for data integrity, ~:or exmnple:
`
`These ;~ctors are paid, tr1 part for i~eeping accurate and fonely recr:1rds about
`
`2 O
`
`tt1elr pat!Gnls, cust~xners, c:r clients.
`
`H wou!d be l1lghly dE~sirable fer consumers to have access to some key
`!nforrn;'3.t1on fr)at is maintained tor them by thl?.i professional organizations with
`
`'Nhlc!: they are affiliated. For- example:
`
`25
`
`~ Instead of a consumer i.:::nter!n9 into his computer \:lata about h!z; drug
`
`prescriptions, it would be desirable -fc1r th.to: needed data to be obt~linable from
`
`the pharmacy automatically on demand by th~J consurner con-iputer.
`
`200
`
`MSLV_lN\/ 00'1932
`
`Unified Patents
`Exhibit 1002
`Page 1318 of 2584
`
`

`

`!nstead of ~~ consumer entenng into his compute:r data about his stock
`
`pc·rtfr::1lio and rnanipulatin9 it daily, it wouk.i be desirable for any needed data
`
`to be obtained frorn the Hnarn:.:iai institution .1utornafo:ally on d~~rnand by the
`
`consumer cornputer,
`
`s
`
`~ Advice authors write advic~: conc:erning vatlous issw::s associated with such
`
`personal information,
`
`20
`
`... Certain r.ioctors, financial ins1itutlons, and pharmacit~s instal! server side
`
`cornponenh'> a1 cornpukirs in thelr ottices. They advertise to tne pubilc the
`avaHatJHlty of rcn-iote information armess ..
`
`is interested !n benefiting from advice wrilten using
`
`remote inforrnat:on acet~ss <lpproaches the financial institution, doctr::r, or
`
`software.
`
`20l
`
`MSLV_lN\/ 00·1933
`
`Unified Patents
`Exhibit 1002
`Page 1319 of 2584
`
`

`

`advice making use of nie remote inspectors. The subscnptkm i$o> initiaHzed
`
`appropriately so that the ccn:surner computers advic1;: r<Jadi3f rnake use of the
`
`inkxrnalion.
`
`5
`
`Such adv\Ct'>' ls pedodicaliy evalwated ac1::ord!ng to thie w:lvirn poo! in 'Nhicr1
`
`U-1e advice is placed, Evaluation c<:u ... mes the consumer computer to <:.:str:b!ish
`
`connecticms to remote GNnputers to obtain nt::edE:ti infr:irrnation. For ex<~mpla,
`
`the remote drug prescription inspector l.ibrary on the i::onst.1rner rnachine
`
`1 O
`
`estab!ish.E!S a connechon witr1 the pharrn.acy information .sf:irver and performs
`cart~'in q1.1sries to d1eck if the t:onsumHr has certain probh::rnatic pn;;scription
`
`comblnations.
`
`1 5
`
`Th~~ foi!o'vvln9 is an exampie of ctn advisory tr1at is written using this system;
`Suppose that <'l certain pr1arm3.ceutical rnanl!factumr provide;.> f.l.n antidepressant
`drng to its p1;l.tients, and that il is discovered ii'w.t patif:.mts ;,,vho also use a cc.!rtain
`
`anti·!rrlbmmatory may expt.~rienrn difficulties, In practice, one prescription rnight
`
`be due to n psyct-1iatrist and the other by an orthopedist -.vho r-niqht not be ~lW&re
`ot the patient's other mBdlcal prnscriptions. The rnanufa.cturer authors an
`
`25
`
`The rnani.itacturer ini:::!ud:::s a descripUcwi of the potentially dangNous
`combination for a mest~atJe bt>ciy, Wh::ln ttm advice reader on the consmner
`computer i:~ncounters this relevance da1,ise, it contacts the pharmacy server v,'ith
`It
`
`queries k)r pharrnai;:;y prescription Xanax and pharmacy prescrlption But€>rin,
`
`detm-rnhe& fr1e reit~v,~nce of ths ad\t\soiy based on tt1is. It notifies the consumer
`
`of the situation if it tu ms out K1 be relevant
`
`202
`
`MSLV_lN\/ 00'1934
`
`Unified Patents
`Exhibit 1002
`Page 1320 of 2584
`
`

`

`ability of the system to protect consun1er privacy. T~'J this end, tiie intEffacHon
`
`betvJeen client and server is carefully protected:
`
`5
`
`~ The connect!on between consumer client and pharmacy server is secured by
`
`l {)
`
`15
`
`*
`
`Tht~ identity of the client requesting the information is euthenHcate.>::l by the
`
`pham1acv server by standard crypto9raphic means.
`
`person exc:Eipt to the advice reader on that person's computer. The advke
`
`teast under ordinary opemti~'Jns.
`
`The foHovvln9 !s a convenient interaction protocol for St.JCh rnrno1e inspectors. tn
`
`this protocoL it is slfnp!a to make the dlent skfo sofhvare. Thi? client transmits,
`over a secure Hnk, ASCH strings describin9 the qwerie~: exactly c<S they are
`dEiscrlbed ln trH:~ surface ian9uage.
`In the above exnrnp!e. the dient transmits
`pharrtHlC/ prescription Xanax." The servei- parses this uslng a rniniature version
`
`authentication work .and, usinq standard d;;:i.tabasa lnquhy methods, searches t!1e
`phanmtey database for an entry indicating Hnt Mr, Patient had a pharrnacy
`prescription to Xanax. Tht~ server then returns True or Fal$e as an ASCH string,
`
`25
`
`string and returns th0 corresponding Boolean to the
`
`MSLV_lN\/ 00'1935
`
`Unified Patents
`Exhibit 1002
`Page 1321 of 2584
`
`

`

`An intent of the inventk)n is to alkw-.' only one \vay cormrmriication, tar<:mg
`information from aavk:e provider to advice consumEff, but not aHuwing information
`
`5
`
`to leak back from eon sumer to provldeL The phn~~se one way nK~ffibmne •?vokes
`
`th.is,
`
`Hi:iwever, there are rn .. irnerous situ<'ltions "!Vhero this rnodel i~> rnstridive, For
`
`example, in certain ~>huations consumers am 1:viHln9 to cooperate with providers,
`
`l O
`
`par1iC\Jlarly wh~~n they receive a benem !rorn cooperatin9, An example 1.s w!ien
`consurners \Nant to get techn:fcal support to sohtt~ a specific prob~en1 '..tvhich
`\'::xistin9 advisories do nnt address, For !l-10 s;.~k:e of ~~o!ving their problern, tht:iy
`are '>'VilHng to d!sciosEi various pieces ot inforrnatlc:in about their confi9urnt.:on w
`!i1e soluticin provkier, !n other situations, advice consumers $Ubscribing to a
`
`15
`
`ci:.trtain dt0 an3 actually emp!oyees of the otganizatk:in vvhich operates tne <'ldvice
`
`site, and so they are 'will!nq to sr:are information >.vit!1 that partic:ular advice
`
`provider,
`
`20
`
`The phrase opE~n t,ldirect!onai cornmunk:atkxis
`
`reders to a setting wi·10re me
`!nventbn is mn and the commlmkations are typicHHy one way, but occaslona:Hy
`
`there are processes vvhich feed back !nformation tt:! the advice provh;ler, and tt1e
`
`process takes place in H'1e ckKi.r with the consum€H' computer ldenfay e.xp.llciHy
`e-:val!atdi? to tl"ie provider.
`
`2 5
`
`ln one impiementation (see Fig. 20), a particular docurnont type is di::faii~Ki,
`
`30
`
`referred to as a questionnaire 200, containing text together 'Nith comments,
`
`204
`
`MSLV_lN\/ 00'1936
`
`Unified Pat

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket