User level accessing of low-level computer system operations.
First Claim
1. A document orientated, user specific method of allowing a user to enhance computational functionalities of computer system operations that are traditionally encapsulated within the computer system, outside control of the user, comprising:
- initiating an operation request by the user; and
intercepting the operation requests and performing user determined actions in the form of arbitrary extensible behaviors, the interception of the operation requests considered low level operations performed by an operation in the computer system, and being at least one of content read operations, write operations, move operations, and close operations.
8 Assignments
0 Petitions
Accused Products
Abstract
A mechanism is provided which allows a user to enhance the functionalities of system operations in a computer system that were traditionally encapsulated within the computer system, and outside the control of the user. The user is provided with the ability to build arbitrary, extensible behaviors and to have those behaviors executed on low level computer system processes after the user issues an operation request through a known input device. The mechanism may be implemented as properties which are integrated on a content and/or property read write path of the computer system.
-
Citations
20 Claims
-
1. A document orientated, user specific method of allowing a user to enhance computational functionalities of computer system operations that are traditionally encapsulated within the computer system, outside control of the user, comprising:
-
initiating an operation request by the user; and
intercepting the operation requests and performing user determined actions in the form of arbitrary extensible behaviors, the interception of the operation requests considered low level operations performed by an operation in the computer system, and being at least one of content read operations, write operations, move operations, and close operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system allowing a user to enhance computational functionalities of computer system operations of a computer system, which are traditionally encapsulated within the computer system and outside control of the user, comprised of:
-
an operation request mechanism which generates operation requests initiated by the user; and
an operation request interception mechanism configured to intercept the operation request and perform user determined actions in the form of arbitrary extensible behaviors, the interception of the operation requests considered low level operations performed in a computer system and being at least one of content read operations, write operations, move operations and close operations. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification