Method and system for personal policy-controlled automated response to information transfer requests
First Claim
1. In a computer system, a method for sending from the computer system a user policy-controlled automated response to an information transfer request from a requesting computing system, the method comprising:
- setting a user policy controlled by a user, the user policy defining parameters for use in controlling an automated reply to information transfer requests from the requesting computing system;
receiving the information transfer request from the requesting computing system;
applying parameters of the user policy to the information transfer request to allocate a response and to set a response level based on the user policy in order to provide the user policy-controlled automated response to the requesting computing system; and
delegating the response based on the response level and sending the response to the requesting computing system, wherein the act of delegating and sending the response comprises at least one of sending an unqualified response based on a first response level where the unqualified response is a complete response having no restrictions on use of transferred information; and
sending a qualified response based on a second response level where the qualified response is a partial response with restrictions on the use of the transferred information, wherein the act of sending the qualified response comprises;
detecting if use restrictions are to be included with the response sent to the requesting computing system, and attaching a restricted use policy to the response sent to the requesting computing system, the use policy controlling use and further distribution of the response by the requesting computing system.
2 Assignments
0 Petitions
Accused Products
Abstract
A user'"'"'s computer system sends a policy controlled response to an information request from a requesting computing system. A user policy is set by the user, and the user policy defines parameters, i.e. rules and values, for use in controlling the response information to be provided in reply to information requests from the requesting computing system. When an information request is received from the requesting computing system, parameters of the user policy are applied to the information request to allocate a response and to set a response level based on the user policy. A response based on the response level is created and sent to the requesting computing system. In one embodiment of the invention a policy engine system in a computing cell phone controls automated responses from the computing cell phone to a requesting computing system. The controlled responses are based on a user policy specified by the user of the computing cell phone. The user policy is stored in a database. An apply policy module applies rules of the user policy to information requests from the requesting computing system. It also filters stored response information to create a filtered response for the requesting computing system based on the rules of the user policy. A delegate response module sends the filtered response along with a use policy to the requesting computing system. The use policy controls use of the information in the filtered response by the requesting computing system.
-
Citations
20 Claims
-
1. In a computer system, a method for sending from the computer system a user policy-controlled automated response to an information transfer request from a requesting computing system, the method comprising:
- setting a user policy controlled by a user, the user policy defining parameters for use in controlling an automated reply to information transfer requests from the requesting computing system;
receiving the information transfer request from the requesting computing system;
applying parameters of the user policy to the information transfer request to allocate a response and to set a response level based on the user policy in order to provide the user policy-controlled automated response to the requesting computing system; and
delegating the response based on the response level and sending the response to the requesting computing system, wherein the act of delegating and sending the response comprises at least one of sending an unqualified response based on a first response level where the unqualified response is a complete response having no restrictions on use of transferred information; and
sending a qualified response based on a second response level where the qualified response is a partial response with restrictions on the use of the transferred information, wherein the act of sending the qualified response comprises;
detecting if use restrictions are to be included with the response sent to the requesting computing system, and attaching a restricted use policy to the response sent to the requesting computing system, the use policy controlling use and further distribution of the response by the requesting computing system. - View Dependent Claims (2, 3, 4, 5, 6)
- setting a user policy controlled by a user, the user policy defining parameters for use in controlling an automated reply to information transfer requests from the requesting computing system;
-
7. A policy engine system stored in a computer readable storage medium in a computing cell phone for controlling automated responses from the computing cell phone to a requesting computing system, the controlled automated responses being based on a user policy specified by a user of the computing cell phone, the policy engine system comprising:
- a set policy module controlled by the user for entering and updating the user policy and response information;
a database storing the user policy and response information;
an apply policy module applying parameters of the user policy to information transfer requests from the requesting computing system and filtering stored response information to create a filtered response for the requesting computing system based on the parameters of the user policy; and
a delegate response module sending the filtered response along with a use policy to the requesting computing system, wherein sending the filtered response comprises at least one of;
sending an unqualified response based on a first response level where the unqualified response is a complete response having no restrictions on use of transferred information; and
sending a qualified response based on a second response level where the qualified response is a partial response with restrictions on the use of the transferred information, wherein the act of sending the qualified response comprises;
detecting if use restrictions are to be included with the response sent to the requesting computing system, and attaching a restricted use policy to the response sent to the requesting computing system, the use policy controlling use and further distribution of the response by the requesting computing system. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
- a set policy module controlled by the user for entering and updating the user policy and response information;
-
15. A computer storage medium for storing computer instructions for a computer process for sending from a computer system a personal, policy-controlled automated response to an information transfer request from a requesting computing system, the computer process comprising:
- receiving the information transfer request from the requesting computing system;
applying parameters of a user policy exclusively controlled by the user to the information transfer request to compile a response and a response level based on the user policy; and
sending the response to the requesting computing system based on the response level in order to provide the personal, policy-controlled automated response to the requesting computing system, wherein sending the response comprises at least one of;
sending an unqualified response based on a first response level where the unqualified response is a complete response having no restrictions on use of transferred information;
sending a qualified response based on a second response level where the qualified response is a partial response with restrictions on the use of the transferred information, wherein the act of sending the qualified response comprises;
detecting if use restrictions are to be included with the response sent to the requesting computing system, and attaching a restricted use policy to the response sent to the requesting computing system, the use policy controlling use and further distribution of the response by the requesting computing system; and
sending no response based on a third response level. - View Dependent Claims (16, 17, 18, 19, 20)
- receiving the information transfer request from the requesting computing system;
Specification