Context Conflict Resolution and Automatic Context Source Maintenance
Techniques are disclosed for detecting and resolving conflicts in context information from various sources. That information may be used to automatically update one or more context sources and/or to validate or invalidate (until further notice or for a period of time) input from one or more context sources. Or, the updates can be made in response to the user's instructions. Rules are used in preferred embodiments to dictate the conflict resolution approach for individual users. Updating the context source is particularly useful when the source is an electronic calendar. Updates that may be made to the calendar include adding, deleting, or changing scheduled events and/or working hours. Invalidating data from a context source is particularly useful for lost, forgotten, misplaced, or loaned devices. Marking data from a context source as valid is preferably done when harmony among several context sources is detected. Context suppliers may be notified of errors or discrepancies in their context data.
Latest IBM Patents:
The present invention is related to the following commonly-assigned U.S. patents: U.S. Pat. No. 6,988,128, titled “Calendar Events and Calendar-Driven Application Technique” (Ser. No. 09/670,844); U.S. Pat. No. 6,640,230, titled “Calendar-Driven Application Technique for Preparing Responses to Incoming Events” (Ser. No. 09/671,001); U.S. Pat. No. ______, titled “Calendar-Enhanced Awareness for Instant Messaging Systems and Electronic Status Boards” (Ser. No. 09/941,045); U.S. Pat. No. ______ (Ser. No. 10/245,156, filed concurrently herewith), titled “Keeping Working Hours and Calendar Entries Up-to-Date”; and U.S. Pat. No. ______ (Ser. No. 10/245,200, filed concurrently herewith), titled “Predicting and Adjusting Users' Working Hours and Electronic Calendar Events”. The disclosures of these related inventions are hereby incorporated herein by reference. p
BACKGROUND OF THE INVENTION1. Field of the Invention
The present invention relates to computer systems, and deals more particularly with methods, systems, and computer program products for resolving context conflicts (for example, a person's electronic calendar shows that he has a meeting scheduled in a particular location, but a badge reader or tracking device indicates that he is elsewhere), and programmatically updating the context source, invalidating the source (at least temporarily), or notifying the supplier of context information.
2. Description of the Related Art
The term “context service”, as used herein, refers to an automated service that provides information about user context. Context services are known in the art. Examples of context services include a system referred to as “Owl” in “Issues for Context Services for Pervasive Computing”, M. R. Ebling et al., in Proceedings of the Workshop on Middleware for Mobile Computing 2001, Heidelberg, Germany (November 2001), and the Context Toolkit from Georgia Institute of Technology. Refer to http:/www.cs.arizona.edu/mmc/Program.html and http://www.cc.gatech.edu/fce/contexttoolkit for more information on these context services.
A context service may receive context information from a variety of sources, including electronic calendars, location sensors, and other sensors such as badge readers and motion detectors. The context service then provides the context information to one or more applications, allowing those applications to be “context aware”. Examples of context-aware applications include the following: (1) a notification system that sends notifications to a pager or other device; (2) a location-based service that provides location-specific information (such as traffic data) to a user, depending on the user's context; and (3) a travel-time calculator that uses a person's current location to determine when the person will arrive at another location.
The electronic calendar system 100 may be a product such as Lotus Notes®, Microsoft Outlook® 2000, or Microsoft Exchange, or it may be an advanced calendar system such as that disclosed in the related patents. (“Lotus Notes” is a registered trademark of Lotus Development Corporation and “Outlook” is a registered trademark of Microsoft Corporation.) A calendar system provides context information such as a calendar owner's scheduled events, and optimally the location of meetings and other events, preferred means of contact during certain events, and so forth.
A cell phone 110 may be used to provide context information about its user such as the user's physical location, and the cell phone may also provide device information such as its telephone number or serial number.
A badge reader 120 can be used to provide information about the identification of people who have passed their badge through the reader, as well as the time and location at which this occurred. “Smart badges”, on the other hand, function as transmitters that provide continuous location information without requiring explicit action at a badge reader.
Other sources of context information 130 might include a motion detector in an office building. For example, an organization might place motion detectors in offices or conference rooms in order to automatically turn off the lights when no movement has been detected for a configurable time interval. Executing application programs may be capable of determining a level of awareness about their users (e.g., whether the user is logged in, logged off, inactive, and so forth) and may be another source of context information.
Each context source typically has a context receiver, shown generally at 140 of
The granularity of context information provided to an application 160, 170 may be determined in a variety of ways, according to the prior art. For example, a configurable number of events might be sampled during a configurable time interval. Values of these configurable parameters may vary depending on factors such as a user's location. Thus, an application might receive less granular movement information for a person who is driving down the highway and more granular information for that same person if he is moving within a building.
Context sources can be categorized into two basic types, updateable and fixed, as shown at 200 and 210 in
This context information is gathered for and provided to context-aware applications 160, 170. The applications can use the context directly or may use the services of a mediator (shown in
Electronic calendars often contain a wealth of information about their owners. For example, an individual may use an electronic calendar to maintain information about his work schedule, his meetings and other appointments, his vacation and business travel plans (including when he will be away, which flights or other transportation he will use, where he can be reached while away, who he may visit while away, etc.), phone calls that need to be made at particular times, and so forth.
Electronic calendars may be accessed by people and/or by applications. Calendar data can be used to automate tasks and to inform others about things such as whether the calendar owner is currently available, or is out of the office on business, and so forth. For example, the related invention titled “Calendar Events and Calendar-Driven Application Technique” (U.S. Pat. No. 6,988,128) uses calendar data to automate voice mail greetings, among other things. It does this by analyzing calendar data, including a person's scheduled working hours and other scheduled events. The related invention titled “Calendar-Enhanced Awareness for Instant Messaging Systems and Electronic Status Boards” (U.S. Pat. No. ______) discloses techniques whereby calendar data is used as input to instant messaging (“IM”) systems and electronic status boards. With the increasing use of calendar data, such as disclosed in these related inventions, it becomes more important to keep calendar data up-to-date and accurate.
Occasionally, a person's electronic calendar may not accurately represent his current status. For example, if Lisa is scheduled to be in a meeting from 3 p.m. to 5 p.m. on Friday, but she becomes ill at lunch time and goes home for the rest of the day, her calendar will likely reflect that she should be in her office until 3 p.m., and then in the conference room where the meeting is scheduled for the next two hours. In days past, it was the responsibility of a human administrative assistant or secretary to tend to employees' calendars, taking care of these types of schedule updates. Very few employees have this luxury today, however, and instead are responsible for maintaining their own schedules using electronic calendars. When a calendar user has to manually update her electronic calendar for every variation in her working hours and the meetings and other events which occupy those working hours, it is likely that some updates will not be made. As a result, accesses to the user's calendar data will provide incorrect information about her availability. Accesses may be made by individuals and/or by applications. For example, suppose Ellen is attempting to schedule a last-minute department meeting with all of her co-workers, including Lisa, for Friday afternoon between 2 p.m. and 3 p.m., and accesses their electronic calendars to see whether they will be in the office. Based on Lisa's inaccurate calendar information, Ellen will mistakenly believe that Lisa can attend.
With reference to the related invention titled “Calendar Events and Calendar-Driven Application Technique” (U.S. Pat. No. 6,988,128), if an automated voice mail system according to this related invention takes an incoming call to a calendar user's phone number and generates a message for the caller based on that user's inaccurate calendar data, the caller will be incorrectly informed as to the user's availability. In some cases, this is merely a nuisance. On the other hand, if someone needs to locate the calendar user for an important business matter or for a personal emergency, the incorrect information can have significant consequences.
In general, when an electronic calendar user's actual schedule does not conform to the information that has been provided to the calendar system, individuals looking at the calendar can be misled and applications that rely on calendar data for input cannot function optimally. Similarly, when applications other than electronic calendar systems are using context information that is incorrect, those applications cannot perform optimally. Accordingly, what is needed are improvements that enable context information such as calendar data to more accurately reflect a user's actual status.
SUMMARY OF THE INVENTIONAn object of the present invention is to provide improved techniques for keeping context sources such as calendar data accurate by detecting and resolving conflicts in context information.
An additional object of the present invention is to provide techniques for adding, deleting, and/or changing calendar entries to resolve conflicts in a calendar user's status.
Another object of the present invention is to provide techniques for adjusting a user's working hours to resolve conflicts in a calendar user's status.
A further object of the present invention is to provide techniques for invalidating (until further notice or temporarily) a context source to resolve conflicts in a user's status.
Another object of the present invention is to provide techniques for indicating that a context source is valid (until further notice or temporarily) when conflicts involving that context source have been resolved.
Still another object of the present invention is to provide techniques for programmatically notifying a context supplier of conflicts in context information.
Yet another object of the present invention is to make electronic calendars more useful.
A further object of the present invention is to increase the accuracy of information available from context sources, including electronic calendars.
Other objects and advantages of the present invention will be set forth in part in the description and in the drawings that follow and, in part, will be obvious from the description or may be learned by practice of the invention.
To achieve the foregoing objects, and in accordance with the purpose of the invention as broadly described herein, the present invention provides systems, methods, and computer program products for detecting context conflicts and automatically resolving the conflicts. In one aspect, this technique comprises: gathering context information from a plurality of context sources; determining whether a conflict exists in the gathered context information; and if a conflict is determined to exist, resolving the determined conflict by applying a set of rules and performing action(s) specified by one or more of the matching rules. Preferably, the rules are checked by a rules system to ensure that they do not conflict with each other and cause the conflict resolution system to go into a loop. Preferably, gathering of context information is triggered by detecting a context change. This technique may further comprise ignoring, when gathering context information or determining conflicts, any context information marked as invalid.
User interaction may optionally be included when determining how to resolve a detected conflict.
In one scenario, performing the actions may further comprise updating a context source, which may (for example) be a user's electronic calendar. The update to the user's electronic calendar may comprise one or more of adding, deleting, or changing events or working hours on the calendar.
In another scenario, performing the actions may comprise invalidating a context source. The invalidation may be effective until further notice, until an ending time, or for a duration of time. A previously-invalidated context source may be returned to a valid state upon detecting harmony among the context sources.
In yet another scenario, performing the actions may comprise notifying a context supplier of the determined conflict.
The determination of conflicts may, in some cases, determine that a plurality of conflicts exist in the gathered context information, in which case the plurality of conflicts are resolved by applying the set of rules and performing action(s) specified by one or more of the matching rules.
In another aspect, the present invention provides techniques for detecting harmony in context information. Preferred embodiments of this aspect comprise: gathering context information from a plurality of context sources; determining, using the gathered context information, whether harmony exists among multiple ones of the context sources; and if harmony is determined to exist and any of the context sources are marked as invalid, applying a set of rules to determine whether the sources marked as invalid should be marked as providing valid context information.
Techniques of the present invention may also be used advantageously in various methods of doing business. For example, a context conflict resolution system providing the advantageous features disclosed herein may be marketed to users under various revenue models, including monthly subscriptions (or other periodic subscriptions), pay-per-use, etc.
The present invention will now be described with reference to the following drawings, in which like reference numbers denote the same element throughout.
The present invention defines improved techniques for use with context sources such as electronic calendars, whereby calendar data or other context information will more accurately reflect a user's context. Conflicts in the user's context are detected and resolved, and the context source may then be automatically updated. When the context source is a user's calendar, the updates may comprise one or more of adding, deleting, or changing scheduled events and/or working hours. Alternatively, the context source may be invalidated (at least temporarily) to resolve the conflict. As yet another alternative, a notification may be sent to the context supplier, informing the context supplier of the conflict. Combinations of these actions are also possible (such as invalidating a context source and notifying the context supplier). Rules are used in preferred embodiments to specify how the resolution of conflicts should be carried out, as will be described. A set of rules that is applicable to all users or groups of users within an organization may be used; in preferred embodiments, individual users are also allowed to specify rules. The user may be prompted for input before context resolution actions are taken, and may be allowed to confirm or reject impending actions.
Using the techniques disclosed herein, electronic calendar users are able to keep accurate working hours and scheduled events on their calendars much more easily and efficiently, without having to manually detect conflicts in their context and without having to manually resolve such conflicts. Because programmatic means are used, as disclosed herein, it is much more likely that the user's calendar will accurately reflect his working hours and his scheduled events. This improved accuracy will be of benefit to other people viewing the user's calendar as well as to other systems/applications that analyze or use calendar data. Similar advantages may be realized with updateable context sources other than electronic calendars.
The term “calendar data”, as used herein, refers to information of the type used by electronic calendars. In preferred embodiments, this information comprises calendar entries (referred to equivalently herein as “calendar events”) as well as other information such as user profiles and user preferences. User preferences may be used to indicate how a particular calendar owner's calendar entries should be interpreted, such as the user's preferred mode of contact (e.g., by phone, by pager, etc.) during various types of scheduled events, how often the user checks voice mail, and so forth. User profiles store information such as the calendar owner's working hours, the default time zone to be applied to the user's calendar, and optional profile-specific preferences (such as a pager number with which a user can be contacted during the working hours defined in the particular profile).
It should be noted that while preferred embodiments are described with reference to modifying electronic calendars, this is by way of illustration and not of limitation. The techniques disclosed herein may also be used advantageously to reflect conflict resolutions in other systems.
Preferred embodiments of the present invention leverage a context service. Context services of the prior art were described above with reference to
The monitor 340 used with preferred embodiments is augmented as disclosed herein to perform context conflict resolution and automatic context source maintenance, in addition to checking for conflicts. This monitor may operate as part of a context service, or independently from the context service. The monitor preferably uses a set of rules that is customizable by organizations and/or individual users. The monitor may receive input from context receivers via the API 150 directly or via a mediator 230, from users as shown at 330 (e.g., asynchronously or by querying a user for input and receiving the user's reply), and/or from utility services 360.
Context-aware applications rely on accurate context information. An implementation of the present invention may update a context source, as shown in
Along with the actual context information, context services can provide associated information about the validity of the context information they provide. Preferred embodiments of the present invention may make use of this validity information to invalidate a context source for a period of time, letting the interested applications know that the context from this source may be incorrect. For example, when used with a notification system that sends notifications to a pager or other device, setting the pager's context to invalid might result in temporarily holding a page (rather than sending it to the pager) or in sending it to another device whose context is valid. As another example, when a location-based service sends information to a device, the information would not be sent to a device whose context is marked invalid.
Invaliding a context source is preferably done by setting an associated “validity” attribute or field to “invalid”. Preferred embodiments also provide an ending time or duration for the invalid status, or the invalid status may be allowed to persist until further notice. Context data marked “invalid” will generally be ignored by applications; however, applications can still access the context information and certain applications, such as context logging applications, may still use the information. This validity information is preferably available to all users of the context information, including mediators and monitors. The monitors may, for example, use context information marked “invalid” to decide when the information may again be valid.
Just as conflicts in context information can be used to set a context source to “invalid”, harmony in context can be used to reset the source to “valid”. For example multiple context sources may indicate that a person is in his office while his cell phone location indicates that he is at his home. This conflict can be used to mark the cell phone context information as “invalid”. Should the cell phone location once again come into harmony with the other context sources, this could indicate that the person now has the cell phone in his possession and that the cell phone location can now be marked as “valid”.
There are many potential sources of context information. By way of illustration but not of limitation, the discussion below will use three context sources; however, embodiments of the present invention may handle a variety of other forms of context information. The three forms used herein for illustration are: (1) calendar-based context; (2) cell phone-based location information; and (3) smart badge location information.
A context receiver for calendar-based context can indicate various types of status information about a calendar owner. For example, a user's calendar typically specifies when he is in the office, out of the office, busy (e.g., in a meeting), on vacation, and when it is outside this user's working hours. In some cases, calendar-based context can also indicate a user's location (i.e., as specified on his calendar entries).
A context receiver for cell-phone-based location information can provide location, and may also provide information about the user's speed and direction of travel. This information might be used to detect conflicts such as impossible or improbable physical locations for a user. For example, suppose that Mary is scheduled to participate in a meeting in conference room A123 in 5 minutes, according to her electronic calendar. Further suppose that Mary's cell phone indicates that she is 30 miles away and is moving at 60 miles per hour. Mary's calendar and her cell phone thus provide conflicting context data, and the monitor may conclude (based on the rules) from its input sources that Mary is either going to be late for the meeting, or is not going to attend the meeting. The monitor may make use of various types of systems or services as it evaluates rules (as shown in
A context receiver for smart badge location information can track a person's location within a set of buildings. This context receiver can provide events/notifications when a person enters or leaves one of the buildings and also when the person moves from one room to another in a building.
The input the monitor receives for calendar-based context, cell phone-based location context, and smart badge-based location context may be obtained, as needed, by one or more of the following techniques: by query when needed, by periodic polling, or by events.
In addition to these inputs from the context receivers 220 (typically received via the context server API 150 or via a mediator 230, as shown in
The current time and date may be useful for looking at a user's calendar data. The rules applied when the monitor is analyzing/resolving conflicts may also be time-sensitive, and the current time and date may be used for analyzing these rules.
The monitor may also store or access a history (say for the last 24 hours) of all changes to all the context sources it monitors, as well as queries to users and their replies. This information can be used, for example, in the case where a set of users report that the same location service is giving bad information. This data could be used to determine that the location service is having problems, rather than the set of users, and a notification may be sent to the provider of the location service (represented in
In preferred embodiments, when a user's context information changes, the monitor 340 checks for conflicts in that user's context. The monitor has inputs from a number of sources (as discussed above with reference to
Timer expiration events (along with information about the event that caused the timer to be started) may be useful in many different scenarios, such as when an event is ambiguous. For example, suppose Fred is detected leaving the building at 11:15 a.m. but there is no corresponding event on his calendar. Fred might be leaving the building for a smoking break. If Fred normally takes 15 minutes for such breaks, he might define a rule that sets a “smoking break” timer for 15 minutes. If Fred reenters the building before the timer expires, the timer is simply canceled. However, if Fred does not reenter the building before the timer expires, then maybe Fred is not taking a smoking break after all. A rule might specify that if it is between 11:00 a.m. and 1:00 p.m., a message should be sent to Fred's cell phone, asking him whether he would like the monitor to schedule a lunch break on his calendar. (The duration of this lunch break might be determined by the rule, or by another rule, or could be determined by asking Fred to use the keys on his phone to signal the expected ending time or the expected duration of his lunch break.) Or, a rule might specify that a lunch break is to be automatically added to Fred's calendar, without requiring his input.
The rules are used to apply the judgment or decisions in the monitor. The rules used by a particular implementation may vary widely, depending on what context data is available, what the supporting organization (such as a corporation) wants, and what the individual user wants. The rules can change as the supporting organization and/or the user adds, deletes, or modifies them. The rules therefore allow organizations/users to personalize their own conflict detection and resolution techniques.
Preferably, all rules have a default action. In the simplest case, the default action is to do nothing.
If a rule includes the starting of a timer, the rule preferably also includes the specification of an action to take if a user response or other event doesn't cancel the timer before it expires. For example, with reference to the previously-described scenario of Fred leaving the building and starting a 15-minute timer, the action upon timer expiration might be “update the calendar by adding a lunch event”.
Conceptually, the rules are modeled after the instructions that a person might give to an administrative assistant or those which the assistant might learn through observation. Several rules will now be provided by way of illustration. (Note that this set of rules contains some overlapping conditions with different corresponding actions. These rules are intended to show different possibilities, rather than a set of rules that might be applied for a particular individual.)
-
- If the current time is after 4:00 p.m., and there are no off-site events on my calendar, and my smart badge indicates that I have left the building, then update my calendar to indicate that I have left for the day.
- If the current time is between 1:00 p.m. and 4:00 p.m., and there are no off-site events on my calendar, and my smart badge indicates that I have left the building, then set a 10-minute “end of working hours” timer.
- If my 10-minute “end of working hours” timer expires before I reenter the building, then update my calendar to indicate that I have left for the day.
- If the current time is between 11:00 a.m. and 1:00 p.m., and there are no off-site events on my calendar, and my smart badge indicates that I have left the building, then add a 1-hour lunch event to my calendar.
- If my smart badge indicates that I have entered the building, and my cell phone is located outside the building, then set the validity attribute for my cell phone location context to “ignore until 5:00 p.m.” and notify me that my cell phone is being ignored since the phone is not with me. (This rule might be used to account for cases in which the user forgot to bring his cell phone to his office.)
- If I have a meeting scheduled for the current time, but my smart badge indicates that I am not in the meeting room, then send a message to my pager to remind me of the meeting and provide the following response options:
1) I plan to attend (the system will take no other action)
2) Inform the other participants that I will be late (this will invoke another service to send the notice)
3) Delete the event from my calendar and inform the other participants that I will not attend.
-
- If my smart badge indicates that I have returned to my office prior to the ending time of a meeting scheduled on my calendar, then change my calendar to indicate that I am available by updating my calendar, setting the actual end of meeting time to the current time.
- If my smart badge indicates that I have arrived in my building, and my calendar indicates that my scheduled working hours have not yet started, then update my calendar to change my working hours to start at the current time.
- If it is 30 minutes past my scheduled end of working hours, and my smart badge indicates that I am still in the building, then send me a message asking me how long I plan to stay.
- If my smart badge locates me in my office, but my cell phone location changes from my office to the parking lot, then disable my smart badge as a context source until the start of my next scheduled working hours and notify me that my badge is being ignored since the badge is not with me. (This rule might be used to account for cases where the person forgets to take his badge when he leaves his office for the day.)
As demonstrated by these sample rules, the actions to be performed as a result of the rules can vary widely. In general, possible actions include (with each action being specific to a particular user, in preferred embodiments):
-
- add, delete, or change calendar events;
- update an updateable context source;
- add, delete, or change working hours intervals;
- inform the owner of the calendar or other context information of a detected discrepancy or event, and ask what action to take (optionally setting a timer to control how long to wait for the owner's response);
- in a context receiver, set the context information's validity attribute to “invalid” or “valid” for a time period;
- notify the supplier of context information that there is an error in the data being provided;
- initiate a task; and
- set or cancel a timer.
As an example of setting the validity attribute for a context source to “invalid”, if a conflict is detected between Allen's smart badge and his cell phone (perhaps because Allen left his location-sensing cell phone at home), Allen might indicate that the context receiver for location data from his cell phone should set the validity attribute for this cell phone to invalid until 6:00 p.m. (when Allen expects to be back home). Given this same conflict between cell phone and smart badge, another user Lynn might specify a rule that resolves the conflict in a completely different way. For example, Lynn might realize that she frequently loses her smart badge, but that she always has her cell phone, and thus in her case, her rules specify that her cell phone should “win” the conflict with her smart badge.
When querying the user for whom a conflict was detected, many different techniques might be used, such as displaying a pop-up window on the user's workstation, sending the user a 2-way page, or initiating a telephone call to the user. Preferably, regardless of the query technique, the query provides a brief description of the conflict and gives the user predefined options from which to select. For example, a message might say, “Your smart badge locates you in your office, but your calendar has a meeting scheduled at this time in Room 310. Press 1 to ignore your smart badge until further notice, press 2 to remove the meeting from your calendar, or press 3 if you want no action taken.”
Referring now to
Block 410 checks to see if the context sources are in harmony. If so, then Block 415 applies rules that are applicable to this user. In applying these rules, Block 415 may make use of utility services (as illustrated at 360 in
Block 425 is reached following completion of Block 420, or when the harmony was not detected in Block 410. Block 425 ignores context information from sources whose validity attribute is set to “invalid” for the current time.
Block 430 then determines whether a context conflict exists. To avoid creating false conflicts, certain context information (such as location information) should not be interpreted too precisely. For example, having the smart badge and cell phone location information within 20 feet of one another should not be interpreted as a conflict. This distance is preferably configurable and may vary for different physical locations as well as with different context sources.
If no conflict exists, then the process of
After correlating the response with a query, Block 520 checks to see if the query to which this response corresponds has an associated timer. If so, then Block 515 cancels this timer. In either case, processing continues at Block 525, which performs the unit(s) of work (as described in
If Block 705 has a negative result, then Block 715 tests to see if the action was to invalidate (or validate) a context source until further notice. If so, Block 720 sets the validity attribute for that source to “invalid” or “valid”, as appropriate.
If neither Block 705 or Block 715 is true, control reaches Block 725, which tests to see if the unit of work calls for updating a context source (e.g., to update the specified working hours and/or scheduled events on this user's calendar). If this test has a positive response, then the corresponding update of the context source (as indicated by the matching rule) is performed (Block 730).
If the unit of work still does not match any of the tests, control reaches Block 735, which checks to see if the unit of work calls for sending a notification to the user or to the context supplier. If so, then the notification is sent at Block 740.
Finally, Block 745 checks to see if the unit of work calls for performing some other type of work. If so, then that work is performed at Block 750. For example, a task might be started, or a service might be requested, as indicated in
Following completion of Blocks 710, 720, 730, 740, or 750, control transfers to Block 755. In addition, if the unit of work does not match any of the tests, then the input is preferably ignored, and control transfers to Block 755.
Block 755 tests whether there are any more units of work to be processed. If so, then control returns to Block 705; otherwise, the processing of
Rule-based systems and context services are known in the art. Using rules to detect and resolve conflicts in information from multiple context receivers, as disclosed herein, is not known. Many systems are known in the art that provide and use location information. IBM's Tempus Fugit project, for example, uses both calendar information and location information for time-based purposes, such as predicting when a person may arrive at a meeting. (See http://time.almaden.ibm.com for more information on Tempus Fugit.) No systems are known to the inventors that use context information to update an updateable context source (such as by adjusting scheduled calendar events and/or working hours upon detecting context conflicts), or to invalidate a context source based upon a detected conflict, or to notify a context supplier that it is providing erroneous data.
As has been demonstrated, the present invention discloses advantageous techniques for detecting conflicts in context information from various sources, and that information may be used to automatically update one or more context sources and/or to invalidate (for a period of time or until further notice) input from one or more context sources. Or, the update may be made after querying the user for input. Rules are preferably used to specify how conflicts for each user (and/or for a particular organization or other user category) are to be resolved. Updating the context source is particularly useful for electronic calendars, and invalidating the source data is particularly useful for lost, forgotten, misplaced, or loaned devices. When using the present invention, more accurate data will be reflected on users' calendars with less effort required of those users, enabling other individuals to more accurately determine where the calendar owner is and his availability at a point in time. Additionally, calendar-based tools (such as those disclosed in the related U.S. patents for responding to incoming events such as voice mail and for using calendar events to update status in other applications), vacation planners, and so forth will have more accurate calendar data with which to work. Location-based applications and other context-aware applications will have more accurate context information from sources that are updateable and will have better knowledge of when context data is valid. Suppliers of context information will be notified when their service is providing erroneous context information, allowing them to correct these errors.
As will be appreciated by one of skill in the art, embodiments of the present invention may be provided as methods, systems, or computer program products. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product which is embodied on one or more computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-readable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or flow diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or flow diagrams, and combinations of blocks in the flowchart illustrations and/or flows in the flow diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart and/or flow diagram block(s) or flow(s).
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart and/or flow diagram block(s) or flow(s).
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart and/or flow diagram block(s) or flow(s). Furthermore, the instructions may be executed by more than one computer or data processing apparatus.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims shall be construed to include all such variations and modifications as fall within the spirit and scope of the invention.
Claims
1. A method of detecting harmony in context information using computer-readable program code executed by a computer, comprising:
- obtaining context information gathered from a plurality of context sources;
- determining, using the obtained context information, whether harmony exists among the context sources; and
- if harmony is determined to exist and any of the context sources are marked as providing invalid context information, applying a set of user-customizable rules to determine whether one or more of the context sources marked as providing invalid context information should be changed to mark that context source as providing valid context information.
Type: Application
Filed: Oct 31, 2009
Publication Date: Feb 25, 2010
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION (Armonk, NY)
Inventors: J. Smith Doss (Raleigh, NC), Renee M. Kovales (Cary, NC), Diane P. Pozefsky (Chapel Hill, NC), Robert J. Sundstrom (Cary, NC)
Application Number: 12/610,288