[go: up one dir, main page]

EP1334445A2 - Exchanging information between sources and consumers of a computer user's context - Google Patents

Exchanging information between sources and consumers of a computer user's context

Info

Publication number
EP1334445A2
EP1334445A2 EP01964695A EP01964695A EP1334445A2 EP 1334445 A2 EP1334445 A2 EP 1334445A2 EP 01964695 A EP01964695 A EP 01964695A EP 01964695 A EP01964695 A EP 01964695A EP 1334445 A2 EP1334445 A2 EP 1334445A2
Authority
EP
European Patent Office
Prior art keywords
value
state
attribute
client
values
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP01964695A
Other languages
German (de)
French (fr)
Inventor
Kenneth Abbott
Dan Newell
James O. Robarts
Kenneth A. Swapp
Joshua M. Freedman
Johnson Apacible
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tangis Corp
Original Assignee
Tangis Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/724,892 external-priority patent/US7225229B1/en
Priority claimed from US09/724,949 external-priority patent/US6791580B1/en
Priority claimed from US09/724,893 external-priority patent/US6812937B1/en
Priority claimed from US09/724,799 external-priority patent/US7464153B1/en
Priority claimed from US09/724,894 external-priority patent/US6801223B1/en
Priority claimed from US09/724,902 external-priority patent/US7231439B1/en
Priority claimed from US09/724,777 external-priority patent/US7046263B1/en
Priority claimed from US09/724,932 external-priority patent/US6747675B1/en
Application filed by Tangis Corp filed Critical Tangis Corp
Publication of EP1334445A2 publication Critical patent/EP1334445A2/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/016Input arrangements with force or tactile feedback as computer generated output to the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/163Wearable computers, e.g. on a belt
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Definitions

  • Wearables also may have access to a wide variety of non-conventional output devices, such as display eyeglasses and tactile output devices.
  • a position mapping application for a wearable computer may utilize data received from a global positioning system device in order to plot its user's physical location and to dete ⁇ nine whether that position is within a specified region.
  • the global positioning system device produces data that is consumed by the position mapping application.
  • the position mapping application would be designed to interact directly with the global positioning system device sensor to obtain the needed data.
  • the application may be required to instruct the device to obtain position information, retrieve the information obtained by the device, convert it to conventional latitude and longitude representation, and determine whether the represented location is within the special region.
  • the two applications' interactions with the device could interfere with one another.
  • Figure 1 illustrates an embodiment of the characterization module executing on a general-purpose body-mounted wearable computer.
  • Figure 2 is a block diagram illustrating an embodiment of the characterization module executing on an exemplary computer system.
  • Figure 3 is a data flow diagram showing a sample exchange of attributes performed by the characterization module.
  • Figure 4 is a data structure diagram showing an example context server table used to maintain a portion of the state of the characterization module.
  • Figure 5 is a data structure diagram showing an example attribute instance table used to maintain a portion of the state of the characterization module.
  • Figure 6 is a data structure diagram showing an example context client table used to maintain a portion of the state of the characterization module.
  • Figure 7 is a data structure diagram showing updated contents of the attribute instance table.
  • Figure 8 is a flow diagram of an embodiment of the GetAttribute function.
  • Figure 9 is a data structure diagram showing updated contents of the attribute instance table.
  • Figure 10 is a data structure diagram showing an example condition table that contains a portion of the state of the characterization module.
  • Figure 11 is a data structure diagram showing an example condition monitor table that maintains a portion of the state of the characterization module.
  • Figure 12 is a data structure diagram showing updated contents of the condition monitor table.
  • Figure 13 is a data flow diagram showing the operation of the facility without a characterization module.
  • Figure 14 is a data structure diagram showing an example attribute request table used to maintain a portion of the state of the characterization module.
  • Figure 15 illustrates an example of a plain-language, hierarchical, taxonometric attribute nomenclature.
  • Figure 16 illustrates an example of an alternate hierarchical taxonomy related to context.
  • Figure 17 is a flow diagram of an embodiment of the Characterization Module routine.
  • Figure 18 is a flow diagram of an embodiment of the Notification Processing subroutine.
  • Figure 19 is a flow diagram of an embodiment of the Dynamically Specify Available Clients, Servers, and Attributes subroutine.
  • Figure 20 is a flow diagram of an embodiment of the Process Distributed Characterization Module Message subroutine.
  • Figure 21 is a flow diagram of an embodiment of the Process Attribute Value Or Value Request Message subroutine.
  • Figure 22 is a flow diagram of an embodiment of the Process Received Attribute Value subroutine.
  • Figure 23 is a flow diagram of an embodiment of the Process Additional Information About Received Value subroutine.
  • Figure 24 is a flow diagram of an embodiment of the Mediate Available Values subroutine.
  • Figure 25 is a flow diagram of an embodiment of the Pull Attribute Value From Server subroutine.
  • Figure 26 is a flow diagram of an embodiment of the Push Attribute Value To Client subroutine.
  • Figure 27 is a flow diagram of an embodiment of the Context Client routine.
  • Figure 28 is a flow diagram of an embodiment of the Context Server routine.
  • a characterization module operating in a wearable computer system receives context information from one or more context servers (or “suppliers"), and provides that information to one or more context clients (or “consumers”).
  • This context information represents a particular context (or “state” or “condition") of the wearable, the user of the wearable, the surrounding physical environment and/or the available electronic data environment (or “cyber- enviiOinnent”).
  • the context is represented (or "modeled”) with a variety of attributes (or “variables”) each modeling a single aspect of the context.
  • the facility By facilitating the exchange of context information, the facility reduces dependencies of context client applications on specific sensors and other input sources, resolves conflicts between context client applications that consume the same context data, resolves conflicts between multiple sensors or other input sources that produce the same data, and isolates the generation of derived attributes from context client applications.
  • a context is modeled or represented with multiple attributes that each correspond to a specific element of the context (e.g., ambient temperature, location or a current user activity), and the value of an attribute represents a specific measure of that element.
  • a specific element of the context e.g., ambient temperature, location or a current user activity
  • an attribute that represents the temperature of the surrounding air an 80° Fahrenheit value represents a specific measurement of that temperature.
  • Each attribute preferably has the following properties: a name, a value, an uncertainty level, units, and a timestamp.
  • the name of the air temperature attribute may be "ambient-temperature," its units may be degrees Fahrenheit, and its value at a particular time may by 80.
  • Associated with the current value may be a timestamp of 02/27/99 13:07 PST that indicates when the value was generated, and an uncertainty level of +/- 1 degrees.
  • Context servers supply values for attributes by receiving and processing input information from sensors or other sources. Attribute values provided by a context server may either be “measured” (or “observed”) in that they are directly received from an input source, or may instead be “derived” in that they are the result of performing processing on one or more measured attribute values. Indeed, a derived attribute value may be produced by performing additional processing on one or more other derived attribute values.
  • Context attributes or "condition variables" are discussed in greater detail in both U.S. Patent Application No. 09/216,193, filed December 18, 1998 and entitled “METHOD AND SYSTEM FOR CONTROLLING PRESENTATION OF INFORMATION TO A USER BASED ON THE USER'S CONDITION", and provisional U.S. Patent Application No.
  • the characterization module When the characterization module obtains an attribute value from a context server, it caches the value for use when responding to future requests from context clients for a value of the attribute. Thus, when the characterization module receives a request from a context client for the value of an attribute, the characterization module dete ⁇ nines whether it has a cached value for the attribute and, if so, whether the value is sufficiently accurate (e.g., the value does not have too high of an uncertainty) and/or sufficiently recent (e.g., the value is not too old). If the value is not sufficiently accurate or recent, the characterization module requests and receives an updated value for the attribute from the context server that supplied the value. When the characterization module has a sufficiently accurate and recent value, it supplies the value to the context client.
  • the characterization module has a sufficiently accurate and recent value
  • the determination of whether a value is sufficiently accurate and recent can be made in a variety of ways, such as by using thresholds for recency or uncertainty that can be specified by the context client during the request, by a context server for all values of an attribute or for a specific attribute value, or by the characterization module.
  • two or more different context servers may supply to the characterization module their own distinct values for a single attribute.
  • a first context server can supply a value for a user.location attribute based on data received from a global positioning system device
  • a second context server can supply a value for the user.location attribute based on data received from an indoor positioning device.
  • the first and second context servers could use the same input information when determining the value for a single attribute, but could use different methods to perform the determining and could thus arrive at different values.
  • each of the context servers is said to supply values for a separate "instance" of the attribute.
  • the characterization module preferably provides a variety of different approaches, called “mediators,” for deternnning what attiibute value to provide when a context client requests a value for an attribute that has more than one instance.
  • the characterization module performs similar processing to that described above.
  • the characterization module can maintain a unique cached value for each attribute instance. If the characterization module receives a request for a value of a particular attribute instance, the request is handled as discussed above. If the characterization module instead receives a attribute value request for an attribute with multiple instances and the request does not specify a particular instance, the characterization module checks the accuracy of each cached attribute instance and requests an updated value for any instance with a value that is not sufficiently accurate. If multiple sufficiently accurate values are available, the characterization module produces a mediated value that is returned to the context client.
  • the mediator to be used for the mediation can be selected in a variety of ways, such as being a default mediator of the characterization module, being requested by a context client, being specified by one or more of the context servers, or being chosen by the characterization module.
  • a context client may receive an attribute value only after an explicit request, while in other embodiments a context client may be forwarded attribute values without a request (e.g., if the client had previously expressed an interest in receiving values for the attribute and a value has just become available).
  • context servers may supply attribute values only when requested, while in other embodiments the context servers may supply attribute values without a request (e.g., if sensor input information is received from which a new value is produced).
  • Request-based processing is a type of "pull" data flow model, and some forms of processing that occur without explicit requests are referred to as a "push" or "event-driven” data flow model.
  • context servers and context clients perform various interactions with the characterization module (e.g., supplying attribute values and requests) by calling functions provided by the characterization module (e.g., via Component Object Module interfaces). These functions are said to collectively comprise an "application programming interface" (or "API") to the characterization module. In alternate embodiments, such interactions can be performed using other mechanisms, such as passing messages or objects.
  • API application programming interface
  • Those skilled in the art will appreciate that an API can be created to support a pull data model, a push data model, or a hybrid system including both push and pull functionality.
  • each executing context server may register with the characterization module by calling a RegisterContextServer function and supplying parameters to identify itself. If a particular context server is not executing, a context client that desires a value of an attribute or attribute instance supplied by the context server may cause the context server to be launched by using a LaunchContextServer function. After registration, a context server may indicate an ability to supply values for an attribute to the characterization module by using a CreateAttributelnstance function. A particular context server can provide values for a number of different attributes by calling the CreateAttributelnstance function multiple times.
  • a context client may call a RegisterContextClient function in order to identify itself and one or more attributes whose values it seeks to consume.
  • a context client may also call a EnumerateAttributes function to obtain a list of the attributes available from the characterization module.
  • a context client may call a GetAttribute function and use parameters to identify the attribute and any attribute processing that should be applied, such as a specific mediator to be used if values are available for multiple instances of the attribute. For attributes that have multiple instances in the characterization module, a
  • context client may also call a GetAllAttributelnstances function to obtain a value for each instance of the attribute.
  • a context client may call a CompleteContextServerEvaluation function.
  • a context client or other program may call a GetCharacterizationModuleAttribute function.
  • a context client that consumes a particular attribute value may also create a condition in the characterization module (not to be confused with the current modeled condition of the user or the environment that is represented by various attribute values) for testing that attribute by calling a CreateCondition function.
  • a context client Once a context client has created a condition, it can evaluate the condition by calling an EvaluateCondition function using parameters to identify the condition, and may also proceed to create a condition monitor that monitors the condition and notifies the context server when the condition is satisfied by calling a CreateConditionMonitor function.
  • a context server may call a StopConditionMonitor function, and to resume its operation, may call a StartConditionMonitor function.
  • the context server may remove a condition monitor that it created by calling a RemoveConditionMonitor function and, correspondingly, may remove a condition that it created by calling a RemoveCondition function.
  • a context client may unregister with the characterization module by calling an UnregisterContextClient function.
  • a context server may similarly remove attribute instances that it has registered by calling a RemoveAttributelnstance function. Before it does, however, it may first call a CheckAttributelnstanceDependencies function to determine whether any context clients currently depend upon that attribute instance.
  • a context server may unregister with the characterization module by calling an UnregisterContextServer function.
  • attribute value information in a more permanent fashion than a temporary cache.
  • the characterization module may be useful for the characterization module to keep a log of all attribute values received and sent, or of all interactions with context clients and context servers.
  • Figure 1 illustrates an embodiment of the characterization module which executes on a general-purpose body-mounted wearable
  • the computer 120 worn by user 110.
  • Many wearable computers are designed to act as constant companions and intelligent assistants to a user, and are often strapped to a user's body or mounted in a holster.
  • the computer system may also be incorporated in the user's clothing, be implanted in the user, follow the user, or otherwise remain in the user's presence.
  • the user is human, but in additional preferred embodiments, the user may be an animal, a robot, a car, a bus, or another entity whose context is to be modeled. Indeed, the computer system may have no identifiable user, but rather operate as an independent probe, modeling and/or reporting on the context in an arbitrary location.
  • the wearable computer 120 has a variety of user-worn user input devices including a microphone 124, a hand-held flat panel display 130 with character recognition capabilities, and various other user input devices 122.
  • the computer has a variety of user-worn output devices that include the hand-held flat panel display, an earpiece speaker 132, an eyeglass-mounted display 134, and a tactile display 136.
  • the computer can also receive information from various user sensor input devices 116 and from environment sensor input devices 128, including video camera 121.
  • the characterization module can receive and process the various input information received by the computer, either directly or from context servers that process the input information and generate attribute values, and can supply the received information to context clients or directly to the user by presenting the information on the various output devices accessible to the computer.
  • computer 120 is accessible to a computer 150 (e.g., by being in line-of-sight wireless proximity or by being reachable via a long-distance communication device such as a cellular phone) which also has a variety of input and output devices.
  • a computer 150 e.g., by being in line-of-sight wireless proximity or by being reachable via a long-distance communication device such as a cellular phone
  • the computer 150 is non-portable, although the
  • body-mounted computer of the user can similarly communicate with a variety of other types of computers, including body-mounted computers of other users.
  • the devices from which the non-portable computer can directly receive information include various user input devices 152 and various user sensor input devices 156.
  • the non-portable computer can output information directly to a display 160, a speaker 162, an olfactory device 164, and a printer 166.
  • the body- mounted computer can communicate with the non-portable computer via a wireless transmission medium.
  • the characterization module can receive information from the user input devices 152 and the user sensor devices 156 after the information has been transmitted to the non-portable computer and then to the body-mounted computer.
  • the body-mounted computer may be able to directly communicate with the user input devices 152 and the user sensor devices 156, as well as with other various remote environment sensor input devices 158, without the intervention of the non-portable computer 150.
  • the body-mounted computer may be able to supply output information to the display 160, the speaker 162, the olfactory device 164, and the printer 166, either directly or via the non-portable computer, and directly to the telephone 168.
  • attribute values of the characterization module can be updated to reflect that the remote devices are not currently available.
  • the characterization module or an application such as a context server (not shown) executing on the computer 120 to monitor the user and the environment, and to maintain a model (not shown) of the current context.
  • the model may be represented in a single location (e.g., the current cached values of all of the context attributes and attribute instances), while in other embodiments the model may be
  • a model of the current context can include a variety of context attributes that represent information about the user, the computer, and the user's environment at varying levels of abstraction.
  • information about the user at a low level of abstraction can include raw physiological data (e.g., heart rate and EKG) and geographic information (e.g., location and speed), while higher levels of abstraction may attempt to characterize or predict the user's physical activity (e.g., jogging or talking on a phone), emotional state (e.g., angry or puzzled), desired output behavior for different types of information (e.g., to present private family information so that it is perceivable only to myself and my family members), and cognitive load (i.e., the amount of attention required for the user's current activities).
  • raw physiological data e.g., heart rate and EKG
  • geographic information e.g., location and speed
  • higher levels of abstraction may attempt to characterize or predict the user's physical activity (e.g., jogging or talking on a phone), emotional state (
  • the model can similarly hold environment information at a low level of abstraction, such as air temperature or raw data from a motion sensor, or at higher levels of abstraction, such as the number and identities of nearby people, objects, user mood, and locations.
  • the model of the current context can include information added explicitly from other sources (e.g., application programs), as well as user-specified or system-learned defaults and preference information.
  • computer systems 120 and 150 are merely illustrative and are not intended to limit the scope of the present invention.
  • the computer systems may contain additional components or may lack some illustrated components.
  • the characterization module could be implemented on the non-portable computer, with the body-mounted computer replaced by a thin computer client such as a transmitter/receiver for relaying information between the
  • the body-mounted computer may be connected to one or more networks of other devices through wired or wireless communication means (e.g., wireless RF, a cellular phone or modem, infrared, physical cable, a docking station, etc.), either with or without support from other computers such as the computer 150.
  • wired or wireless communication means e.g., wireless RF, a cellular phone or modem, infrared, physical cable, a docking station, etc.
  • the body-mounted computer of a user can make use of output devices in a smart room, such as a television and stereo when the user is at home, if the body-mounted computer is able to transmit information to those devices via a wireless medium or if a cabled or docking mechanism is available.
  • kiosks or other information devices can be installed at various locations (e.g., in airports or at tourist spots) to transmit relevant information to body-mounted computers within the range of the information device.
  • Those skilled in the art will also appreciate that specialized versions of the body-mounted computer, characterization module, context clients and/or context servers can be created for a variety of purposes.
  • FIG. 2 illustrates an exemplary computer system 200 on which an embodiment of the characterization module is executing.
  • the computer includes a memory 230, a CPU 210, a persistent storage device 250 such as a hard drive, and input/output devices including a microphone 222, a video camera 223, a computer-readable media drive 224 (e.g., a CD-ROM drive), a visual display 225, a speaker 226, and other devices 228.
  • the memory preferably includes the characterization module 231, as well as information reflecting the current state of the characterization module (characterization module state) 232.
  • the memory further contains software modules 233, 234, and 237 that consume attribute values and are therefore context clients, and software modules 235, 236, and 237 which provide attribute values and are therefore context servers.
  • While items 231-237 are preferably stored in memory while being used, those skilled in the art will appreciate that these items, or portions of them, can be transferred between memory and the persistent storage device for purposes of memory management and data integrity. Alternately, in other embodiments some or all of the software modules may execute in memory on another device, and communicate with the characterization module via inter-computer communication.
  • a pre-defined set of attributes are available for use by context servers and context clients. This allows a common meaning to be shared between context clients and context servers as to those attributes and their values, and can also allow a context client to request a pre-defined attribute without having to dete ⁇ nine whether the attribute has been created by a context server supplying values for the attribute.
  • a plain-language, hierarchical, taxonometric attribute nomenclature is used to name attributes, such as the example attribute nomenclature illustrated in Figure 15.
  • the names within the nomenclature are preferably specific so that there is no ambiguity as to what they represent, and the ability to extend the nomenclature by adding new attribute names that conform to the hierarchical taxonomy of the nomenclature is preferably supported.
  • the nomenclature preferably has attribute names relating to a variety of aspects of the user.
  • the nomenclature preferably has a variety of types of attribute names, including: attribute names relating to the user's location, such as user.location.latitude, user.location.building, and user.location. street; attribute names relating to the user's movement, such as user. speed and user. direction; attribute names for various user moods, such as user.mood.happiness, user.mood. anger, and user.mood. confusion; attribute names for user activities, such as user, activity, driving, user, activity, eating, and
  • attribute names for aspects of the local environment such as environment.local.temperature and environment.local.ambient_noise_level
  • attribute names for remote environments such as environment.place.chicago.time and environment.place.san_diego.temperature
  • attribute names relating to a future context such as those that predict or estimate a situation (e.g., environment.local.next_ week.temperature)
  • attribute names relating to specific applications such as an email application (e.g., application.mail. available, application.mail.new_messages_waiting, and application.mail.messages_waiting_to_be_ sent); etc.
  • the attribute nomenclature used by the facility provides effective names for attributes relating to the user, the computer system, and the environment. Additional attributes are illustrated in Figure 15, and Figure 16 illustrates an alternate hierarchical taxonomy related to context, such that various attributes could be added for each of the illustrated categories. Those skilled in the art will appreciate that for both Figure 15 and Figure 16, other categories and attributes could be added and existing categories and attributes could be removed or could have alternate names.
  • Figure 3 is a data flow diagram showing a sample exchange of attributes performed by the characterization module.
  • the diagram shows characterization module 300, as well as five other software
  • context server 330 are said to be context servers, in that they provide attribute values to the characterization module.
  • context server 330 provides values for a user.in_region attribute 331.
  • context servers may provide values for more than one attribute.
  • context server 320 provides values for a user.location attribute 321 and an user. elevation attribute 322.
  • values for a single attribute may be provided by more than one context server.
  • context server 310 provides values for user.location attribute 311, while context server 320 provides values for user.location attribute 321.
  • Attributes 311 and 321 will be represented by the characterization module as multiple instances of a single user.location attribute.
  • the characterization module preferably provides functionality for mediating between these two separate instances when the value of the user.location attribute is requested by a context client.
  • Software modules 330, 340, and 350 are said to be context clients because they consume attribute values.
  • context client 340 consumes user.location attribute 341 values.
  • certain software modules may act both as a context server and as a context client.
  • software module 330 is both a context server and a context client, as it provides values for the user.in egion attribute
  • context client 350 consumes values for both user.injregion attribute 351 and user. elevation attribute 352.
  • any of the context clients may request that the characterization module enumerate the available attributes. In response to such a request, the characterization module would enumerate the user.location attribute, the user. elevation attribute, and the user.in_region attribute.
  • FIG. 19 Figure 4 is a data structure diagram showing an example context server table used to maintain a portion of the state of the characterization module.
  • Each row of the table corresponds to a registered context server.
  • Each row contains a context server name field 411 containing the name of the context server, a version field 412 identifying the version of the context server, an installation date 413 identifying the date on which the context server was installed on the computer system, a filename 414 identifying a primary file in the file system representing the context server, and a request handler field 415 containing a reference to a request handler function on the context server that may be called by the characterization module to send messages to the context server (e.g., a request evaluation of one or all of the attributes provided by the context server).
  • Other versions of the context server table may lack some of the illustrated fields (e.g., the version field), or may contain additional fields (e.g., a registered attributes field that contains the names of all of the attributes for which the context server is currently registered to supply values).
  • Figure 5 is a data structure diagram showing an example attribute instance table used to maintain a portion of the state of the characterization module.
  • the attribute instance table contains a row for each attribute or attribute instance for which a context server is currently registered to supply values.
  • Each of these rows contains the following fields: an attribute name field 511 containing the name of the attribute, a context server name field 512 identifying the context server that created the attribute instance, a value field 513 containing the value of the attribute last provided by the context server, and uncertainty field 514 identifying the level of uncertainty of the value, a timestamp 515 indicating the time at which the value is effective, a units field 516 identifying the units for the value and the uncertainty, and an indication 517 of the number of context clients consuming values for the attribute
  • row 501 indicates that an instance of the user.location attribute from the gps context server has a multi-part value of 47° 36.73' N and 122° 18.43' W degrees and minutes, in alternate embodiments multi-part values may not be used, such as instead having two attributes to represent this context element (e.g., user.location.latitude and user.location.longirude).
  • field 517 indicates the number of context clients consuming values for an attribute, in alternate embodiments this number could be dynamically calculated rather than being stored (e.g., by using the attribute request table discussed below), or an identifier for each context client could instead be stored rather than merely a number.
  • versions of the attribute instance table may lack some of the illustrated fields, such as the units field if all the instances of an attribute are restricted to having the same units and if such common information about all the attribute instances is stored elsewhere.
  • some versions of the attribute instance table could include additional information, such as a separate row for each attribute with multiple instances that contains common information about all of instances, and additional fields such as a context client field that contains the name of each context client registered to receive values for the attribute or instance of that row.
  • Other versions of the attribute instance table could include other additional fields such as an optional specified context client field so that the context server can indicate one or more context clients that are able to receive values for the attribute (e.g., a list of authorized clients).
  • Figure 6 is a data structure diagram showing an example context client table used to maintain a portion of the state of the characterization module. Each row corresponds to a registered context client, and contains a context client name field 611 identifying the name of the registered context client as well as a message handler field 612 containing the reference to a message handler provided by the context
  • context client table may lack some of the illustrated fields, or may contain additional fields (e.g., a registered attributes field that contains the names of all of the attributes for which the context server is currently registered to receive values).
  • Figure 7 is a data structure diagram showing updated contents of the attribute instance table illustrated in Figure 5. It can be seen that, in response to registration of a location nap context client consuming values for the user.injregion attribute, the characterization module has incremented the number of context clients consuming the user.in_region attribute from 0 to 1.
  • Figure 14 is a data structure diagram showing an example attribute request table used to maintain a portion of the state of the characterization module.
  • the attribute request table contains a row for each attribute for which a context client is currently registered to receive values. Each of these rows contains the following fields: an attribute name field 1411 containing the name of the attribute, and a context client name field 1412 identifying the context client that registered a request to receive values for the attribute.
  • a context client can request values for an attribute without specifying a particular instance, as in row 1401, or can instead request values for a specific attribute instance, as in row 1403.
  • Other versions of the attribute request table may lack some of the illustrated fields, or may contain additional fields such as an optional field to specify one or more particular context servers that can supply the values for the attribute (e.g., a list of authorized context servers).
  • FIG 8 is a flow diagram of one embodiment of the GetAttribute function.
  • step 801 if the requested attribute exists, then the facility continues in step 803, else the facility continues in step 802 to return an "attribute not found" error.
  • step 803 if a single instance of the attribute was requested, then the facility continues in step 804, else
  • step 804 if the requested instance exists, then the facility continues in step 806, else the facility continues in step 805 to return an "attribute instance not found" error.
  • step 806 if the age criterion specified for the attribute request is satisfied, then the facility continues in step 807 to return the requested attribute instance, else the facility continues in step 808 to "freshen" the attribute instance by calling the appropriate context server's request handler to request evaluation of the attribute instance.
  • step 809 if the age criterion is satisfied by the freshened attribute instance, then the facility continues in step 807 to return the freshened attribute instance, else the facility continues in step 810 to return the freshened attribute instance with an "age not satisfied" error.
  • step 811 where a single attribute instance was not requested, if any registered instances of the attribute satisfy the age criterion, then the facility continues in step 816, else the facility continues in step 812.
  • step 812 the facility freshens all registered instances of the requested attribute.
  • step 813 if any of the attributes freshened in step 812 satisfy the age criterion, then the facility continues in step 816, else the facility continues in step 814.
  • step 814 the facility applies the requested attribute mediator to select one instance, or otherwise derive a value from the registered instances.
  • step 815 the facility returns the instance with an "age not satisfied" error.
  • step 816 where one or more instances satisfy the age criterion, if more than one instance satisfies the age criterion, then the facility continues in step 817, else the facility continues in step 807 to return the attribute instance that satisfies the age criterion.
  • step 817 the facility applies the requested attribute mediator to select one instance from among the instances that satisfy the age criterion, or to otherwise derive a value from the instances that satisfy the age criterion. After step 817, the facility continues in step 807 to return the value produced by the mediator.
  • Figure 9 is a data structure diagram showing updated contents of the attribute instance table illustrated in Figure 7. It can be seen in attribute instance table 900 that, upon reevaluation by the ips context server of its instance of the user. elevation attribute, the characterization module replaced the former contents of the value, uncertainty and timestamp fields of row 903 with the values resulting from the reevaluation.
  • Figure 10 is a data structure diagram showing an example condition table that contains a portion of the state of the characterization module.
  • Condition table 1000 has a row for each condition created by a context client.
  • Row 1001 contains a condition name field 1011 containing the name of the condition, a context client name 1012 identifying the context client that created the condition, a first logical parameter field 1013 and a second logical parameter field 1014 identifying attributes or conditions that are to be compared, a comparison value 1015 that specifies a value to which an attribute listed in the first logical parameter is compared if no second logical parameter is listed, and a logical operator 1016 identifying the logical operator to be applied in the comparison.
  • Figure 11 is a data structure diagram showing an example condition monitor table that maintains a portion of the state of the characterization module.
  • Condition monitor table 1100 has a row 1101 corresponding to a condition and containing each of the following fields: a condition monitor name field 1111 containing the name of the condition monitor; a context client name field 1112 containing the name of the context client that created the condition monitor; a condition name field 1113 that contains the name of the condition monitored by the condition monitor; a behavior field 1114 that indicates whether the condition monitor is triggered when the condition becomes true, when it becomes false, or when it changes value in either direction; a frequency field 1115
  • condition monitors can be used in a variety of ways. For example, when a context client is notified via the triggering of the trigger handler function that the value has changed, the context client can then retrieve the new value.
  • Figure 12 is a data structure diagram showing updated contents of the condition monitor table illustrated in Figure 11. It can be seen from stop field 1218 of row 1201 in condition monitor table 1200 that the region_analysis context client has stopped, or suspended the operation of, the region_boundary_cross condition monitor, perhaps in response to the observation that the user is now asleep and his or her location will remain constant.
  • the facility is described as being implemented using a characterization module that is called by context servers and context clients, that caches attribute values, and that maintains status information about the operation of context servers and context clients.
  • a characterization module that is called by context servers and context clients, that caches attribute values, and that maintains status information about the operation of context servers and context clients.
  • the facility operates without the use of such a characterization module.
  • context servers communicate directly with context clients.
  • Figure 13 is a data flow diagram showing the operation of the facility without a characterization module. It can be seen in Figure 13 that context servers 1310, 1320, and 1330 provide attributes directly to context clients 1330, 1340, and 1350. For example, it can be seen that context server 1320 provides a user. elevation attribute 1322 directly to context client 1350. In this embodiment, the context client may itself
  • context clients may themselves interrogate context servers for an enumeration of their attributes, and mediate between attribute instances provided by different context servers.
  • context client 1340 may mediate between the instance 1311 of the user.location attribute provided by context server 1310 and the instance 1321 of the user.location attribute provided by context server 1320.
  • the facility may operate with a partial characterization module.
  • a partial characterization module may include various combinations of the functionalities of routing communication between context servers and the context clients that consume their attribute values, caching attribute values, enumerating available attributes, and providing attribute mediation.
  • the facility may provide a characterization module that implements a "push" information flow model in which, each time an attribute value provided by a context server changes, the new value is automatically provided to context clients.
  • the facility provides a characterization module that implements a "pull" information flow model, in which attribute values are only obtained by the characterization module from the context servers when they are requested by a context client.
  • characterization modules are provided that support a variety of other information flow models.
  • Figure 17 is a flow diagram of an embodiment of the Characterization Module routine 1700.
  • the routine receives messages from context clients (CCs) and from context servers (CSes), as well as instructions from users, and processes the messages or instructions.
  • CCs context clients
  • CSes context servers
  • a CM could wait to execute code that would provide functionality until the functionality was requested, such as by
  • the routine begins in step 1705, where the characterization module (CM) performs various startup operations (e.g., setting up tables in which to temporarily cache state information, retrieving previous state information, launching CSes or CCs that have previously registered with the CM, etc.).
  • the routine then continues to step 1710 to determine if the newly started CM is to take the place of another previously executing CM (e.g., based on a user indication when the new CM was started). If so, the routine continues to step 1715 to swap places with the other executing CM.
  • CM characterization module
  • One method of executing a swap that would be transparent to the CCs and CSes interacting with the other CM would be to request the other CM to transfer all of its current state information to the new CM (e.g., registrations of CCs, CSes, and attributes, conditions and notification requests, cached values for attributes and attribute properties, etc.), to then update the other CCs and CSes so that the messages they previously sent to the other CM will now be sent to the new CM, and to then have the other CM shutdown.
  • the new CM e.g., registrations of CCs, CSes, and attributes, conditions and notification requests, cached values for attributes and attribute properties, etc.
  • step 1715 the routine continues to step 1720 to receive an indication from a user or a message from a CC or CS.
  • the routine then continues to step 1725 where it performs the Notification Processing subroutine to notify any CCs or CSes about the received message or user indication if appropriate.
  • CCs and CSes can submit notification requests so that they will be notified by the CM upon a particular type of occurrence.
  • Such notification requests could include occurrences such as when an attribute value changes, when a particular CC or CS registers or unregisters, when values for an attribute become available or unavailable (e.g., due to registration or unregistration), when a CC registers or unregisters to receive values for an attribute, when the availability of particular
  • the notification requests can be created based not only on explicit requests, but also after the occurrence of a particular type of event (e.g., if a CC requests a value for an attribute for which no CSes are currently supplying values, a notification request could be automatically created to alert the CC if a CS later registers to supply values for the attribute).
  • additional information about the notification requests can be supplied (e.g., a number of times that the submitter wants to receive notifications for the request, or an expiration date after which the notification will be removed or become inactive).
  • step 1725 the routine continues to step 1730 to determine if a registration or unregistration message was received. If so, the routine continues to step 1735 to execute the Dynamically Specify Available Clients, Servers, and Attributes subroutine.
  • CCs and CSes can register and unregister dynamically as they become available or unavailable, and can similarly modify the status of the attributes that they have registered with the CM. If a registration or unregistration message was not received in step 1730, the routine instead continues to step 1740 to determine if an attribute value or a request for an attribute value has been received from a CC or CS. If so, the routine continues to step 1745 to execute the Process Attribute Value Or Value Request Message subroutine.
  • This subroutine will satisfy requests for attribute values if possible (e.g., by supplying a cached value or requesting one or more CSes to supply the value) and will return the requested value or an error message. Similarly, when attribute values are pushed to the CM from a CS, the CM will send the values if appropriate to CCs that have registered an interest in receiving values for the attribute.
  • step 1740 determines if a request has been received to establish or modify a condition that monitors attribute values or other conditions, or to establish or modify a condition monitor. If so, the routine continues to step 1755 to process the request.
  • conditions and condition monitors can be created, removed, and have their operation suspended (e.g., by deactivating them) or resumed (e.g., by activating them).
  • step 1750 the routine continues instead to step 1760 to determine if a message related to one or more other executing CMs has been received, and if so continues to step 1765 to process the message by executing the Process Distributed Characterization Module Message subroutine. Characterization modules can interact for a variety of reasons, as explained in greater detail below. If a message related to another CM has not been received, the routine continues instead to step 1770 to determine if a request has been received to establish or modify a notification request. If so, the routine continues to step 1775 to process the notification-related request.
  • step 1780 dete ⁇ nine if a shutdown message was received (e.g., from a user). If so, the routine continues to step 1790 to perform shutdown operations (e.g., notifying all registered CCs and CSes to unregister, or saving current state information), and then continues to step 1795 and ends. If it was instead determined that a shutdown message was not received, the routine continues to step 1782 to determine if another supported operation has been requested. If so, the routine continues to step 1784 to perform the other operation, and if not the routine continues to step 1786 to send an error message to the requester. For example, other types of operations may be a request to receive CCs and CSes to unregister, or saving current state information.
  • step 1782 determine if another supported operation has been requested. If so, the routine continues to step 1784 to perform the other operation, and if not the routine continues to step 1786 to send an error message to the requester.
  • other types of operations may be a request to receive
  • any CC or CS may need to satisfy security requirements (e.g., by verifying their identity as an authorized module) before being allowed to request information or functionality from the CM or to provide information to the CM.
  • Figure 18 is a flow diagram of an embodiment of the Notification Processing subroutine 1725.
  • the subroutine examines the message or user indication received by the CM, determines whether any active notification requests are satisfied by the type of message or indication or by information contained in the message or indication, and notifies the submitters of any such requests when the requests are satisfied.
  • the subroutine begins in step 1805 where it receives an indication of the message or user indication received by the CM.
  • the subroutine continues to step 1810 to compare the received message or user indication to the notification requests that are currently stored and active.
  • the subroutine then continues to step 1815 to retrieve any additional information that may be needed to determine if a notification request has been satisfied (e.g., a previous value for an attribute to determine how the attribute value has changed).
  • step 1820 determines if any of the notification requests have been satisfied. If not, the subroutine continues to step 1895 and returns, but if so the subroutine continues to step 1825 to select the next satisfied notification request, beginning with the first. The subroutine then continues to step 1830 to send a notification to the supplier of the request that the request was satisfied, and can include additional information about the occurrence that satisfied the request. The subroutine then continues step 1835 to dete ⁇ nine whether the notification request should be removed (e.g., if it was defined as a one-time request, or has expired).
  • step 1840 the subroutine continues to step 1840 to remove the request, and if not the subroutine continues to step 1845 to determine if the notification request should be deactivated for the current time (e.g., so that a similar occurrence can be monitored at a later time).
  • step 1855 the subroutine continues to step 1855 to dete ⁇ nine if there are more satisfied notification requests. If so, the subroutine returns to step 1825, and if not the subroutine continues to step 1895 and returns.
  • the subroutine could periodically check the various stored notification requests (e.g., as a background process) to determine if their status should be modified (e.g., activated, deactivated, or removed).
  • FIG 19 is a flow diagram of an embodiment of the Dynamically Specify Available Clients, Servers, and Attributes subroutine 1735.
  • the subroutine receives registration or unregistration requests for CCs, CSes, and/or attributes, and satisfies the requests as appropriate.
  • the subroutine begins in step 1905 where it receives a registration or unregistration message.
  • the subroutine continues to step 1910 to determine if security authorization is needed (e.g., for any CC or CS, or for CCs and CSes executing on a different computer from the CM). If so, the subroutine continues to step 1915 to dete ⁇ nine if the security
  • step 1920 authorization has been satisfied (e.g., by the submitter of the message supplying a password or a verified digital signature). It is determined in step 1920 that the security authorization has not been satisfied, the subroutine continues to step 1925 where it sends an error message to the submitter. However, if it is instead determined that the security standard has been satisfied, or if security authorization was not needed in step 1910, the subroutme continues to step 1930 to determine the type of the registration or unregistration message.
  • step 1940 determines if the message is to register the CC. If so, the subroutine continues to step 1941 to register the new client if possible (e.g., if all necessary information has been provided and there is not another registered CC with the same unique identifier). If it is determined in step 1942 that an error occurred during the registration attempt, the subroutine continues to step 1944 to send an error message to the submitter. If no error occurred, the subroutine instead continues to step 1946 to dete ⁇ nine if the registration request includes one or more attributes of interest to be registered for the client. If so, the subroutine continues to step 1982 to register those attributes.
  • step 1940 If it was instead determined in step 1940 that the received message was not to register the client, the subroutine continues to step 1948 to determine if the message was to unregister the client. If so, the subroutine continues to step 1950 to unregister the client, and then continues to step 1952 to determine if any registered attributes remain for the client. If so, the subroutine continues to step 1994 to unregister each of those attributes.
  • step 1930 If it was instead determined in step 1930 that the received message was related to a CS, the subroutine continues to step 1960 to determine whether the message is to register the CS. If so, the subroutine continues to step 1961 to register the new server if possible. It is determined in step 1962 that an e ⁇ or occu ⁇ ed during the registration
  • the subroutine continues to step 1964 to send an e ⁇ or message to the submitter. If no e ⁇ or occu ⁇ ed, however, the subroutine instead continues to step 1966 to determine if the registration request includes one or more attributes to register for which the server is available to supply values. If so, the subroutine continues to step 1982 to register those attributes. If it was instead determined in step 1960 that the received message was not to register the CS, the subroutine continues to step 1968 to determine if the message was to unregister the server. If so, the subroutine continues to step 1970 to unregister the server, and then continues to step 1972 to dete ⁇ nine if any registered attributes remain for the server. If so, the subroutine continues to step 1994 to unregister those attributes.
  • step 1980 determines whether the message is to register those attributes. If so, the subroutine continues to step 1982 to select the next attribute, beginning with the first. The subroutine then continues to step 1984 to determine if at least one instance of the attribute is cu ⁇ ently registered. If so, the subroutine continues to step 1986 to register a new instance of the attribute, and if not the subroutine continues to step 1988 to register the first instance for the attribute. After steps 1986 or 1988, the subroutine continues to step 1990 to determine if there are more attributes to be registered, and if so returns to step 1982. If it is instead determined in step 1980 that the received message was not to register the attributes, the subroutine continues to step 1992 to dete ⁇ nine if the message was to unregister the attributes, and if so continues to step
  • CCs, CSes or attributes e.g., various properties for the attribute.
  • Figure 20 is a flow diagram of an embodiment of the Process Distributed Characterization Module Message subroutine 1765.
  • the subroutine receives information from another CM or an instruction about another CM, and processes the information or instruction as appropriate.
  • the subroutine begins in step 2005 where it receives an indication of the received information or instruction.
  • the subroutine then continues to step 2010 to determine if security authorization is needed. If so, the subroutine continues to step 2012 to determine if the security has satisfied. It is determined at step 2014 that the security authorization has not been satisfied, the subroutine continues to step 2016 to send an e ⁇ or message to the submitter. If it is instead determined that the security authorization has been satisfied or was not needed in step 2010, the subroutine continues to step 2018 to determine whether information from another CM has been received.
  • step 2018 If it is determined in step 2018 that an instruction about another CM has been received, the subroutine continues to step 2020 to determine if the instruction is to register or unregister as a CC or CS of the other CM. If so, the subroutine continues to step 2022 to rename any attributes in the request if necessary. For example, if a current CM 1 wants information about an attribute user.mood.happiness for its own user from another CM 2, CM 1 will have to modify the name of the attribute (e.g., to CM 1. user.mood.happiness) it requests since CM 2's attribute user.mood.happiness will refer to the user of CM 2.
  • step 2020 determines the instruction is to register or unregister as a CC or CS of the other CM. If so, the subroutine continues to step 2022 to rename any attributes in the request if necessary. For example, if a current CM 1 wants information about an attribute user.mood.happiness
  • step 2022 the subroutine then continues to step 2024 to send a request to the other CM to reflect the
  • step 2026 determines whether the instruction is to send an attribute value or an attribute value request to the other CM. If so, the subroutine continues to step 2028 to rename any attributes in the request if necessary, and then continues to step 2030 to determine whether a request or an attribute value is being sent. If an attribute value is being sent, the subroutine sends the value to the other CM in step 2032, and if a request is being sent the subroutine sends the request in step 2034. After step 2034, the subroutine continues to step 2036 to receive the requested value or an e ⁇ or message, and if the value is received rather than an e ⁇ or message, the subroutine sends the received value to the requester at step 2038.
  • step 2026 the subroutine continues to step 2040 to determine if a group-wide attribute is to be modeled (e.g., troop morale for a group of soldiers that would require information for many or all of the soldiers). If so, the subroutine continues to step 2042 to request attribute values from the other CMs that are needed for the modeling, and then continues to step 2044 to receive the requested values or e ⁇ or messages. If the necessary values are received to perform the modeling, in step 2046 the subroutine determines the value of the group-wide attribute and in step 2048 sends the value to the requester. In alternate embodiments, any such modeling of attributes may be performed only by CSes, with the CM merely requesting values from other CMs as instructed and supplying the received values to the appropriate CS.
  • a group-wide attribute e.g., troop morale for a group of soldiers that would require information for many or all of the soldiers.
  • step 2040 If it is instead determined in step 2040 that the received instruction is not to model a group-wide attribute, the subroutine
  • step 2050 determines if the instruction is to aggregate information from subordinate CMs (e.g., in a hierarchical organization such as a business or the military, the hierarchy of users can be reflected in a hierarchy of their CMs) or specialized CMs (e.g., a CM specialized to monitor a user's health and to detect health problems). If so, the subroutine continues to step 2052 to request the information from the other CMs as needed, and continues to step 2054 to receive the requested information or e ⁇ or messages. If the necessary information is received, in step 2056 the subroutine aggregates the information, and in step 2058 sends the aggregated information to the requester. In alternate embodiments, any such aggregating of information may be performed only by CSes, with the CM merely requesting information from other CMs as instructed and supplying the received values to the appropriate CS.
  • subordinate CMs e.g., in a hierarchical organization such as a business or the military, the hierarchy of users can
  • step 2050 the subroutine continues to step 2050 to aggregate information. If it is instead determined in step 2050 that the received instruction is not to aggregate information, the subroutine continues to step 2060 to determine if the received instruction is to use the processing capabilities of another computer or CM. If so, the subroutine continues to step 2062 to request the other computer or CM to perform an indicated task. The subroutine then continues to step 2064 where it receives the results of the task, and uses those results as if the task have been performed locally. If it is instead determined in step 2060 that the received instruction is not to use the processing abilities of another computer, the subroutine continues to step 2065 to determine if the received instruction is to send information to a module such as a thin client.
  • a module such as a thin client.
  • step 2067 the subroutine continues to step 2067 to send the indicated information (e.g., from a CC), and if not the subroutine continues to step 2069 to perform another task as indicated.
  • the subroutine continues to step 2067 to send the indicated information (e.g., from a CC), and if not the subroutine continues to step 2069 to perform another task as indicated.
  • the indicated information e.g., from a CC
  • step 2069 the subroutine continues to step 2069 to perform another task as indicated.
  • other types of tasks could be to instruct another CM to swap itself out or to modify its
  • step 2070 determines if a registration or unregistration request has been received. If so, the subroutine continues to step 2071 to rename any attributes if necessary, and then continues to step 2072 to resubmit the request as if from a CC or a CS using the renamed attributes. If the information was not a registration or unregistration request, the subroutine continues to step 2073 to dete ⁇ nine if an attribute value or an attribute value request has been received. If so, the subroutine continues to step
  • step 2075 determines whether an attribute value or an attribute value request has been received. If an attribute value has been received, the subroutine continues to step 2076 where it resubmits the value as being from a CS, and if not the subroutine continues to step 2077 where it resubmits the attribute value request as being from a CC. After step 2077, the subroutine continues to step 2078 where it receives the requested value or an e ⁇ or message, and in step 2079 sends the received value to the requesting CM if an e ⁇ or message was not received.
  • step 2073 If it was instead determined in step 2073 that an attribute value or attribute value request was not received, the subroutine continues to step 2080 to determine if the received information was an indication to modify the internal state of the CM. If so, the subroutine continues to step 2081 where it modifies the state as indicated. If the received instruction was not to modify the internal state, the subroutine continues to step 2082 to determine if the request is to swap the CM out to be replaced by the other requesting CM. If so, the subroutine continues to step 2084 to send the cu ⁇ ent state information from the CM to the requesting CM. In addition, the CM could perform other tasks if
  • step 2086 to wait for an indication from the other CM to exit, and after receiving the indication, submits a shutdown request in step 2088. If the received instruction was not to swap out, the subroutine continues to step 2090 to perform the other task as indicated if appropriate.
  • steps 2016, 2024, 2032, 2038, 2048, 2058, 2064, 2067, 2069, 2072, 2076, 2079, 2081, 2088, or 2090 the subroutine continues to step 2095 and returns.
  • Figure 21 is a flow diagram of an embodiment of the Process Attribute Value Or Value Request Message subroutine 1745, as illustrated in the accompanying figure and described elsewhere.
  • the subroutine receives an indication of an attribute value or a request for an attribute value, and processes the value or request as appropriate (e.g., pulling values from servers when needed to satisfy requests and pushing received values to clients when appropriate).
  • the subroutine begins at step 2105 where it receives an indication of an attribute value or a request for an attribute value.
  • the subroutine then continues to step 2110 to dete ⁇ nine if an attribute value or a request was received.
  • step 2120 the subroutine continues to step 2120 to execute the Process Received Attribute Value subroutine, such as to store the value and to process additional associated information received about the value.
  • the subroutine next continues in the illustrated embodiment to push the received value or a related value to clients as appropriate.
  • Such values may merely be cached or otherwise stored until requested by a client. Alternately, even if received values are not generally pushed to clients, in other embodiments such values could be
  • the subroutine continues to step 2122 to determine whether there are any previously specified requests or indications of interest related to the received value that would cause the received value or a related value to be pushed to one or more clients. If it is determined in step 2125 that there are any such requests or indications, the subroutine continues to step 2130 to determine if there are multiple attribute instance values available that meet the appropriate criteria (if any are specified) to satisfy the requests or indications. For example, a default or specified threshold for the freshness of values could be used as a criteria. If there are multiple values, the subroutine continues to step 2132 to execute the Mediate Available Values subroutine and produce a mediated value from the multiple available values, and in step 2134 selects the mediated value produced by the subroutine.
  • step 2130 If it was instead determined in step 2130 that there are not multiple attribute instance values available for the received value, the subroutine continues to step 2136 to select the received value. After steps 2134 or 2136, the subroutine continues to step 2138 to select the next request of the identified requests, beginning with the first request. The subroutine then continues to step 2140 to execute the Push Selected Attribute Value To Client subroutine for the selected request, and then continues to step 2142 to determine if there are more identified requests. If so, the subroutine returns to step 2138 to select the next request.
  • step 2110 If it was instead determined in step 2110 that a request for a value was received, the subroutine continues to step 2150 to identify all attribute instances that match the request (e.g., that satisfy one or more criteria for the value that are specified with the request). The subroutine then continues to step 2152 to determine if there are any such instances,
  • step 2154 to send an e ⁇ or message to the requester.
  • the subroutine next pulls cu ⁇ ent values for the identified attribute instances from servers as appropriate.
  • Those skilled in the art will appreciate that in other embodiments only those values that have previously been received and stored may be supplied to clients. Alternately, even if cu ⁇ ent values are not generally pulled from servers, in other embodiments such values could be pulled from servers in limited circumstances, such as when explicitly requested by a client.
  • step 2152 if it is determined in step 2152 that at least one attribute instance is identified, the subroutine continues to step 2156 to select the next such instance, beginning with the first.
  • the subroutine in step 2158 determines if a new value is needed for the selected instance (e.g., the available value does not meet some specified criteria, such as an accuracy threshold specified by the requesting client). If so, the subroutine continues to step 2160 to execute the Pull Attribute Value From Server subroutine.
  • step 2162 next waits for a value or e ⁇ or message response from the server, and determines if a value is received. If a value is received, the subroutine then continues to step 2164 to execute the Process Received Attribute Value subroutine.
  • step 2164 or if it was determined in step 2158 that the instance does not need a new value or in step 2162 that a new value was received, the subroutine continues to step 2166 to determine if there are more instances identified. If so, the subroutine returns to step 2156 to select the next such instance, and if not continues to step 2168 to determine if there are multiple values now available for the request that meet any relevant criteria. While all identified attribute instance values that match the request are used in the illustrated embodiment, in other embodiments a different or additional selection process for the values could be used. For example, information about the
  • various servers that can supply the attribute instance values may be available (e.g., dynamically), and if so only certain of the servers could be selected based on the information with only the values from those servers being used.
  • step 2168 If it is determined in step 2168 that there are multiple values available, the subroutine continues to step 2170 to execute the Mediate Available Values subroutine to produce a mediated value from the multiple available values, and in step 2172 sends the produced mediated value and any additional information about the value (e.g., properties, an associated uncertainty value, an indication of the server that produced the value, an indication of the mediator used to produce the value, etc.) to the requester. If it was instead determined in step 2168 that there are not multiple values available, the subroutine continues to step 2174 to determine if a single value is available, and if not continues to step 2178 to send an e ⁇ or message to the requester.
  • step 2170 execute the Mediate Available Values subroutine to produce a mediated value from the multiple available values
  • step 2172 sends the produced mediated value and any additional information about the value (e.g., properties, an associated uncertainty value, an indication of the server that produced the value, an indication of the mediator used to produce the value, etc.)
  • step 2176 the subroutine continues to step 2176 and sends the value and any additional information to the requester. After steps 2154, 2172, 2176 or 2178, or if it was determined in step 2125 that there were no requests identified or in step 2142 that there were no more requests, the subroutine continues to step 2195 and returns.
  • Figure 22 is a flow diagram of an embodiment of the Process Received Attribute Value subroutine 2200, as illustrated in the accompanying figure and described elsewhere.
  • the subroutine receives an attribute value from a server, stores the value if appropriate (e.g., in a cache or long-term storage), processes additional received information associated with the value if appropriate, and processes any conditions related to the received value.
  • the subroutine begins in step 2205 where it receives an indication of a received attribute value.
  • the subroutine then continues to step 2210 to determine if the attribute for which the value is received is registered, and if not continues
  • step 2215 to send an e ⁇ or message to the server. If it is instead determined in step 2210 that the attribute is registered, the subroutine continues to step 2220 to determine if additional information about the value was received from the server. If so, the subroutine continues to step 2225 to execute the Process Additional Information About Received Value subroutine.
  • step 2230 determines whether values for the attribute are being cached or otherwise temporarily stored. If so, the subroutine continues to step 2235 to cache the received value as well as any additional information received.
  • the length of time used for caching can vary in a variety of ways, such as based on the type of information or for a particular attribute.
  • step 2240 determines if values for the attribute are being stored in a long-term manner (e.g., being logged). If so, the subroutine continues to step 2245 to store the received value as well as any additional information received.
  • step 2245 the subroutine continues to step 2250 to determine if the value and/or any additional information about the value triggers any active stored conditions.
  • step 2255 if there are any such conditions, the subroutine continues to step 2260 to select the next such condition, beginning with the first.
  • step 2265 the subroutine continues to step 2265 to send a message to the entity associated with the condition (e.g., a client that created the condition) to indicate that the condition is satisfied.
  • step 2265 the subroutine continues to step 2270 to determine if the condition should now be removed. If so, the subroutine continues to step 2275 to remove the
  • step 2280 determines if the condition should now be deactivated. If so, the subroutine continues to step 2285 to deactivate the condition. After steps 2275 or 2285, or if it was instead determined in step 2280 that the condition is not to be deactivated, the subroutine continues to step 2290 to dete ⁇ nine if there are more triggered conditions. If so, the subroutine returns to step 2260 to select the next such condition. After step 2215, or if it was instead determined in step 2255 that there were not any triggered conditions or in step 2290 that there were no more triggered conditions, the subroutine continues to step 2295 and returns.
  • attribute values are received by the characterization module from servers either when the characterization module requests a new value from the server or when the server pushes a new value to the characterization module.
  • the server may later send updated values for the attribute to the characterization module without a later request from the characterization module, such as if a more accurate or updated value is obtained by the server.
  • servers could provide other types of information that could be received and processed by the characterization module.
  • a server could provide a variety of types of meta-information about attribute values to the characterization module, such as information about a technique used to generate a value or an indication that a new value is available without sending the value until requested.
  • Figure 23 is a flow diagram of an embodiment of the Process Additional Information About Received Value subroutine 2225, as illustrated in the accompanying figure and described elsewhere. As illustrated and discussed elsewhere, a variety of types of information related to attribute values (e.g., uncertainty or accuracy information, a
  • 43 timestamp of when the value was created or supplied or was most accurate, an indication that the value is a constant, indications of restrictions on whether the availability of the attribute instance or of the particular value should be available to any or to specified CCs, data type, units, a format version, a name, any generic attribute property supplied by the CS, etc.) can be received from CSes, can be used by the CM to dete ⁇ nine whether and how to supply the values to CCs, can be supplied to CCs, and can be used by CCs when processing the received attribute values. For example, units as indicated below could be specified.
  • uncertainty of an attribute value can be indicated in a variety of ways.
  • An example of an uncertainty specification is as follows. For each attribute instance there is a finite likelihood that the real quantity being measured is not the same as the value being expressed. For example, the speedometer of a car may show 30 mph when the "true" instantaneous speed is 32.56 mph. There are numerous factors that may give rise to these discrepancies, including the following: precision of measuring apparatus, conversion of continuous quantities to discrete values in the measurement process, random fluctuations, temporal variation, systematic e ⁇ ors, and measurement
  • the associated uncertainty, ⁇ , shall represent the likelihood that the following condition has a 68% probability of being true: ⁇ tme ⁇ o- ⁇ ⁇ ⁇ ⁇ tnle + ⁇
  • a value timestamp can be indicated in a variety of ways.
  • An example of a timestamp specification is as follows. Attribute values may be thought of as representations of a particular quantity at a point in time. Often this time is not proximate to that of use, so it can be useful to provide the proper timestamp along with the value.
  • One version of a timestamp is defined as follows:
  • the timestamp represents the moment at which the associated value would have been valid had it been measured directly at that moment.
  • This definition results in some attributes having timestamps that do not co ⁇ espond to the time at which their values were calculated. For instance, an attribute that represents the acceleration of the user can be calculated by looking at the change in velocity over a period of time. The necessary computations may further delay the availability of the acceleration value. This timestamp is thus specified to represent the time
  • additional information related to an attribute value can include history information (e.g., frequency of past use and past popularity information), an indication of the supplier of the attribute, indications of equivalent attributes (e.g., for mediation purposes or if a value for this attribute is not available at a later time), indications of clients that have registered for this attribute or consumed values for the attribute, descriptions of clients in order to track statistics, information to be used to evaluate characterization module efficiency and/or to facilitate process optimization, and indication of a verification of accuracy (e.g., from a third-party, or of the value generation technique that was used), a consumer rating or reputation based on input from other clients (e.g., efficiency or reliability), a cost to use the value (e.g., an actual price, or an amount of time needed to retrieve or process the value), future availability of the attribute value (e.g., how intermittent additional values may be), a version of the attribute, etc.
  • history information e.g., frequency of past use and past popularity information
  • an indication of the supplier of the attribute e.
  • the subroutine illustrated in Figure 23 begins in step 2305 where additional information about an attribute value is received.
  • the subroutine continues to step 2310 to determine if a timestamp is received, and if so continues to step 2315 to associate the timestamp information with the received value.
  • step 2315 or if it was instead determined that a timestamp is not received, the subroutine continues to step 2320 to determine if uncertainty or other accuracy information is received, and if so continues to step 2325 to associate that information with the received value.
  • step 2325 the subroutine continues to step 2330 to determine if accuracy decay information (e.g., the rate at which the accuracy of the value changes over time) is received, and if so continues to step 2335 to associate that information with the received
  • accuracy decay information e.g., the rate at which the accuracy of the value changes over time
  • step 2335 the subroutine continues to step 2340 to determine if information indicating that the value is a constant is received, and if so continues to step 2345 to associate that information with the received value.
  • step 2345 or if it was instead determined that constant-related information is not received, the subroutine continues to step 2350 to determine if information about which clients are to have access to the supplied value is received, and if so continues to step 2355 to associate that information with the received value so that client access to the attribute value is so restricted.
  • step 2355 the subroutine continues to step 2360 to associate any other received additional information with the received value, and then continues to step 2360 and returns.
  • additional information can be associated with the received value in a variety of ways, such as by using a data structure to represent a received value that includes elements for the various types of associated information.
  • Figure 24 is a flow diagram of an embodiment of the Mediate Available Values subroutine 2400, as illustrated in the accompanying figure and described elsewhere. As illustrated and discussed elsewhere, a variety of different types of mediators can be defined and specified. For example, some mediators include the following.
  • mediators could similarly be used, including using the previously used value or a default value.
  • other techniques could also be used, such as indicating that no value is available, asking a user to choose between available values or to provide additional instructions, repeatedly trying to obtain an appropriate value, attempt to identify new possible sources or a new mediation mechanism or technique, etc.
  • the subroutine begins at step 2405 where an indication of the values available for the mediation are received.
  • the subroutine then continues to step 2410 to dete ⁇ nine if a requester of the mediated value indicated a mediator to be used, and if so continues to step 2415 to select that mediator. If it is instead determined that the requester did not indicate a mediator to be used, the subroutine continues to step 2420 to determine if a supplier of one or more of values being mediated indicated a mediator to be used, and if so continues to step 2425 to select that mediator.
  • step 2430 dete ⁇ nine if a default mediator is available, and if so continues to step 2435 to select that mediator. If it is instead determined that a default mediator is not available, the subroutine continues to step 2440 to determine the
  • mediators that are available to be used and then in step 2445 selects one of the available mediators.
  • the subroutine continues to step 2450 to apply the selected mediator to the available values in order to select one or the available values or to generate a related value based on the available values.
  • the subroutine then continues to step 2455 to return the mediated value, and returns.
  • mediators could be identified and/or obtained in other manners, such as by being specified by third-parties that are not acting as a client, server, or characterization module.
  • Figure 25 is a flow diagram of an embodiment of the Pull Attribute Value From Server subroutine 2160, as illustrated in the accompanying figure and described elsewhere.
  • the subroutine begins in step 2505 where an indication of a request for an attribute instance value is received.
  • the subroutine then continues to step 2510 to determine if an ID for the request has been received. If not, the subroutine continues to step 2515 to generate a unique request ID.
  • the subroutine continues to step 2520 to request an attribute value from the server registered for the attribute instance, including the unique ID with the request.
  • the unique ID is included so that any circular references during the requests can be detected, as explained in greater detail below.
  • step 2525 receives in response an attribute value and optionally additional information, or to instead receive an e ⁇ or message.
  • step 2530 the received information or e ⁇ or message is sent to the requester of the value, and in step 2595 the subroutine returns.
  • FIG 26 is a flow diagram of an embodiment of the Push Attribute Value To Client subroutine 2140, as illustrated in the accompanying figure and described elsewhere. In particular, in the first
  • the subroutine receives an indication of an attribute instance value and of a client to receive that value.
  • the subroutine then continues to the second step to determine if additional information is associated with the indicated value, and if so retrieves that additional information. After retrieving the additional information, or if it was instead determined that there is no associated additional information, the subroutine next sends the value and any available additional information to the indicated client. The subroutine then returns.
  • Figure 27 is a flow diagram of an embodiment of the Context Client routine 2700.
  • the routine receives messages from the CM as well as instructions from users, sends messages to the CM, and processes received messages and instructions.
  • a CC could indicate to the CM an interest in receiving values for one or more attributes, but not begin to otherwise execute (e.g., by dynamically loading code) until a value for one of the attributes is supplied by the CM.
  • the routine begins in step 2702 where the CC registers with the CM.
  • the routine then continues to step 2704 where the CC optionally registers for one or more attributes of interest with the CM.
  • the routine continues to step 2706 where it receives an indication of an instruction or of information received.
  • the routine continues to step 2708 where it determines whether information or an instruction has been received.
  • step 2710 determines if information about the satisfaction of a notification request has been received, and if so continues to step 2712 to process the notification satisfaction information and to take appropriate action. If notification information has not been received, the routine continues to step 2714 to determine if information about the satisfaction of a condition has been received, and if so continues to step 2716 to process the condition satisfaction information and to take appropriate action. If condition information has not been received, the routine
  • step 2718 determines if a status message from the CM has been received (e.g., that a particular CS or a particular attribute has been unregistered), and if so continues to step 2720 to process the status information and to take appropriate action. If a status message has not been received, the routine continues to step 2722 to dete ⁇ nine if an attribute value has been pushed to the CC. If not, the routine continues to step 2724 to process the other information that has been received, and if so continues to step 2726 to determine if additional information related to the value has also been received. If additional information has been received, the subroutine continues to step 2730 to process the value and the additional information, and if not the routine continues to step 2728 to process the value.
  • a status message from the CM e.g., that a particular CS or a particular attribute has been unregistered
  • step 2740 determines if the instruction is to send a notification-related request (e.g., to establish a request) to the CM, and if so the routine continues to step 2742 to send the request. If the instruction is not to send a notification-related request, the routine continues to step 2744 to determine if the instruction is to send a condition-related request (e.g., to temporarily suspend an existing condition), and if so the routine continues to step 2746 to send the request to the CM. If a condition-related request was not received, the routine continues to step 2748 to determine if an instruction to send an attribute value request was received, and if so continues to step 2750 to request the attribute value from the CM.
  • a notification-related request e.g., to establish a request
  • step 2750 the routine then continues to step 2752 to wait for the requested value or an e ⁇ or message. If it is determined in step 2754 that a value was received, the routine continues
  • step 2726 the routine continues to step 2756 to process the e ⁇ or message.
  • step 2758 determines if the instrument was to send another type of request. If so, the routine continues to step 2760 to send the request, and if not the routine continues to step 2762 to perform another instruction as indicated.
  • a variety of other types of requests could be sent to the CM, such as to shutdown the CM or a CS, to launch a CS, to specify a default mediator for the CM, etc.
  • steps 2712, 2716, 2720, 2724, 2728, 2730, 2742, 2746, 2756, 2760, or 2762 the routine continues to step 2770 to determine whether to continue.
  • step 2772 unregisters the registered attributes for the CC, next to step 2774 to unregister the client with the CM, and then to step 2795 to end. If it is instead determined to continue, the routine continues to step 2776 to determine whether any cu ⁇ ently registered attributes should be unregistered, and if so continues to step 2778 to unregister the attributes with the CM. After step 2778, or if it was determined not to unregister any attributes, the routine continues to step 2780 to determine whether to register any additional attributes. If so, the routine continues to step 2782 to register for one or more attributes of interest. After step 2782, or if it was determined not to register any additional attributes, the routine returns to step 2706.
  • Figure 28 is a flow diagram of an embodiment of the Context Server routine 2800.
  • the routine receives messages from the CM as well as instructions from users, sends messages to the CM, and processes received messages and instructions.
  • a CS could indicate to the CM an ability to supply values for one or more attributes, but not begin to otherwise execute (e.g., by dynamically loading code) until a value is requested.
  • the routine begins in step 2802
  • step 2804 registers with the CM for one or more attributes for which the CS has the ability to supply values.
  • step 2806 receives an indication of an instruction or of information received.
  • step 2808 determines whether information or an instruction has been received.
  • step 2810 determines if the instruction is to send a notification-related request (e.g., to establish a request) to the CM, and if so the routine continues to step 2812 to send the request. If the instruction is not to send a notification-related request, the routine continues to step 2814 to determine if the instruction is to send a condition-related request (e.g., to temporarily suspend an existing condition), and if so the routine continues to step 2816 to send a request to the CM. If a condition-related request was not received, the routine continues to step 2818 to determine if the instruction was to send another type of request. If so, the routine continues to step 2820 to send the request, and if not the routine continues to step 2822 to perform another instruction as indicated.
  • a notification-related request e.g., to establish a request
  • step 2830 determines if information about the satisfaction of a notification request has been received, and if so continues to step 2832 to process the notification information and to take appropriate action. If notification information has not been received, the routine continues to step 2834 to determine if information about the satisfaction of a condition has been received, and if so continues to step 2836 to process the condition information and to take appropriate action. If condition information has not been received, the routine continues to step 2838 to determine if a status message from the CM has been received (e.g., that a particular CC has registered), and if so
  • step 2840 to process the status information and to take appropriate action.
  • step 2850 determines if a pull attribute value request has been received by HIQ CS, along with an ID that uniquely identifies the request.
  • the unique ID in this example embodiment is used to allow the context server to determine if a circular reference exists when determining the requested attribute value. For example, consider the situation in which CS 1 is registered to supply values for attribute 1, and CS 2 is registered to supply values for attribute 2. In addition, imagine that the calculation of the value for attribute 1 depends on the value for attribute 2. Thus, when CS 1 receives a pull request to supply the value for attribute 1, it requests the value for attribute 2 from the CM, which in turn request the value from CS 2.
  • CS 1 After receiving the value for attribute 2 from CS 2 via the CM, CS 1 can then calculate the value for attribute 1 and satisfy the initial request by supplying the value to the CM. If, however, CS 2 also depends on the value for attribute 1 in order to calculate the value for attribute 2, a circular reference may exist. In that situation, after CS 1 requests the value of the attribute 2 in order to calculate the value for attribute 1, CS 2 may in turn request the value of attribute 1 from CS 1 (via the CM), thus creating a loop such that neither attribute value can be calculated. In order to detect such circular references, the example routine uses a unique ID passed along with attribute value requests. Alternate equivalent ways of identifying circular references could instead be used, or no such processing could be performed.
  • step 2852 determines if the received request ID matches a temporarily stored ID for the same attribute value. If so, a circular reference exists,
  • step 2853 to return an e ⁇ or message. If the ID does not match, the routine continues to step 2854 to determine the input information needed (if any) to calculate the requested value. The routine then continues to step 2856 to determine if the value of another attribute is needed. If so, the routine in step 2858 temporarily stores an indication of the attribute whose value is being calculated and of the ID. The routine then continues to step 2860 to request the attribute value needed, including the received ID. In step 2862, the routine waits for the requested value or e ⁇ or message. After receiving the value or e ⁇ or message, the routine continues to step 2864 to dete ⁇ nine if more attribute values are needed, and if so to return to step 2860.
  • step 2866 the routine continues to step 2866 to remove the temporarily stored attribute value and ID, and then continues to step 2868 to determine if any e ⁇ ors were received for needed attribute values such that sufficient information to calculate the value requested of the CS is not available. If so, the routine continues to step 2853 to signal an e ⁇ or.
  • step 2856 the routine contmues to step 2870 to determine if any sensor values or other input information is needed to calculate the value requested of the CS. If so, the routine continues in steps 2872 through 2876 to request and receive the sensor or other input information that is needed. The routine then continues to step 2878 to determine if any e ⁇ ors were received for needed sensor values or other input information such that sufficient information to calculate the value request of the CS is not available. If so, the routine continues to step 2853. If no such e ⁇ ors occu ⁇ ed, or if it was instead determined in step 2870 that no sensor or other input information was needed, the routine continues to step 2887 to calculate the requested attribute value based on the received information. The routine then continues to step
  • step 2889 to send the value and any additional information to the CM to satisfy the request.
  • step 2880 determines if sensor or other input information has been pushed to the CS. If not, the routine continues to step 2882 to process the other information received, and if so continues to step 2884 to determine if the CS has sufficient information to calculate one or more attribute values based on the received input information and other stored information. If so, the routine continues to step 2887 to calculate those values and to push them to the CM, and if not the routine continues to step 2886 to store the sensor information for later use. In alternate embodiments, the CS could request other information that is needed to calculate an attribute value when sensor or other input information is received, rather than waiting until all necessary information has been received.
  • step 2890 determines whether to continue. If not, the routine continues to step 2891 to unregister the registered attributes for the CS, next to step 2892 to unregister the server with the CM, and then to step 2899 to end. If it was instead determined to continue, the routine continues to step 2893 to determine whether any currently registered attributes should be unregistered, and if so continues to step 2894 to unregister the attributes with the CM. After step 2894, or if it was determined not to unregister any attributes, the routine continues to step 2896 to dete ⁇ nine whether to register any additional attributes. If so, the routine continues to step 2897 to register for one or more attributes of interest. After step 2897, or if it
  • Example e ⁇ or messages include the following.
  • Attribute does not exist - Occurs when the CM receives a request for an attribute that does not exist.
  • Attribute instance does not exist - Occurs when the CM receives a request for a specific instance of an attribute which is not registered.
  • Attribute mediator does not exist - Occurs when a request for an attribute mediator could not be fulfilled because the name does not correspond to an existing attribute mediator.
  • CS does not exist - A request has been made for a CS that has not registered. CS not found - A request to launch a CS could not be completed because the CS was not found.
  • Event does not exist - A request has been made for a non-existent event.
  • the module receiving the e ⁇ or may make the request again but specify that diagnostics

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Techniques are described providing mediated information about a current state that is modeled with multiple state attributes. In some situations, the providing includes receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current state, receiving from a second source an indication of a second value for the indicated state attribute, and, after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.

Description

rate monitor for determining the heart rate of its user. Wearables also may have access to a wide variety of non-conventional output devices, such as display eyeglasses and tactile output devices.
Many applications executing on computers utilize data received by the computer from sensors or other input sources. For example, a position mapping application for a wearable computer may utilize data received from a global positioning system device in order to plot its user's physical location and to deteπnine whether that position is within a specified region. In this example, the global positioning system device produces data that is consumed by the position mapping application.
In conventional wearable computer systems, the position mapping application would be designed to interact directly with the global positioning system device sensor to obtain the needed data. For example, the application may be required to instruct the device to obtain position information, retrieve the information obtained by the device, convert it to conventional latitude and longitude representation, and determine whether the represented location is within the special region.
The need for such direct interaction between applications and sensors in order to obtain and process data has several significant disadvantages. First, developing an application to interact directly with a particular sensor can introduce sensor-specific dependencies into the application. Accordingly, the application may need to be subsequently modified to be able to interact successfully with alternatives to that sensor provided by other manufactui'ers, or even to interact successfully with future versions of the same sensor. Alternately, the sensor could be developed to explicitly support a particular type of application (e.g., via a device driver provided with the sensor), which would analogously introduce application-specific dependencies into the sensor. Second, direct interaction between the application and the sensor can give rise to conflicts between multiple applications that consume the same data. For example, if the position mapping application was executing on the same wearable computer as a second application for deteπnining the user's distance from home, and the second application also used the global positioning system device, the two applications' interactions with the device could interfere with one another.
Third, direct interaction between the application and the sensor can give rise to conflicts between multiple sensors that produce the same data. For example, if the position mapping application was executing on a wearable computer that had access to both the global positioning system device and an indoor positioning system, the application might well have trouble determining which device to use to determine the user's current position, and/or have trouble reconciling data produced by both devices.
Fourth, rather than an application having to directly process observable data from the sensors and derive more abstract information itself, it would be advantageous for the application to be able to rely on a separate programmatic entity that derives such abstract information and provides it to the application. For example, it would be more convenient for the position mapping application to be able rely on a separate programmatic entity that determines the user's location, and to then use that information to determine whether the user is in a special region.
Accordingly, a facility for exchanging information between sensors and applications in a wearable computer system would have significant utility. BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 illustrates an embodiment of the characterization module executing on a general-purpose body-mounted wearable computer.
Figure 2 is a block diagram illustrating an embodiment of the characterization module executing on an exemplary computer system.
Figure 3 is a data flow diagram showing a sample exchange of attributes performed by the characterization module.
Figure 4 is a data structure diagram showing an example context server table used to maintain a portion of the state of the characterization module.
Figure 5 is a data structure diagram showing an example attribute instance table used to maintain a portion of the state of the characterization module.
Figure 6 is a data structure diagram showing an example context client table used to maintain a portion of the state of the characterization module.
Figure 7 is a data structure diagram showing updated contents of the attribute instance table.
Figure 8 is a flow diagram of an embodiment of the GetAttribute function.
Figure 9 is a data structure diagram showing updated contents of the attribute instance table.
Figure 10 is a data structure diagram showing an example condition table that contains a portion of the state of the characterization module.
Figure 11 is a data structure diagram showing an example condition monitor table that maintains a portion of the state of the characterization module. Figure 12 is a data structure diagram showing updated contents of the condition monitor table.
Figure 13 is a data flow diagram showing the operation of the facility without a characterization module.
Figure 14 is a data structure diagram showing an example attribute request table used to maintain a portion of the state of the characterization module.
Figure 15 illustrates an example of a plain-language, hierarchical, taxonometric attribute nomenclature.
Figure 16 illustrates an example of an alternate hierarchical taxonomy related to context.
Figure 17 is a flow diagram of an embodiment of the Characterization Module routine.
Figure 18 is a flow diagram of an embodiment of the Notification Processing subroutine.
Figure 19 is a flow diagram of an embodiment of the Dynamically Specify Available Clients, Servers, and Attributes subroutine.
Figure 20 is a flow diagram of an embodiment of the Process Distributed Characterization Module Message subroutine.
Figure 21 is a flow diagram of an embodiment of the Process Attribute Value Or Value Request Message subroutine.
Figure 22 is a flow diagram of an embodiment of the Process Received Attribute Value subroutine.
Figure 23 is a flow diagram of an embodiment of the Process Additional Information About Received Value subroutine.
Figure 24 is a flow diagram of an embodiment of the Mediate Available Values subroutine.
Figure 25 is a flow diagram of an embodiment of the Pull Attribute Value From Server subroutine. Figure 26 is a flow diagram of an embodiment of the Push Attribute Value To Client subroutine.
Figure 27 is a flow diagram of an embodiment of the Context Client routine.
Figure 28 is a flow diagram of an embodiment of the Context Server routine.
DETAILED DESCRIPTION
A software facility is described below that exchanges information between sources of context data and consumers of context data. In particular, in a preferred embodiment, a characterization module operating in a wearable computer system receives context information from one or more context servers (or "suppliers"), and provides that information to one or more context clients (or "consumers"). This context information represents a particular context (or "state" or "condition") of the wearable, the user of the wearable, the surrounding physical environment and/or the available electronic data environment (or "cyber- enviiOinnent"). In some embodiments the context is represented (or "modeled") with a variety of attributes (or "variables") each modeling a single aspect of the context. By facilitating the exchange of context information, the facility reduces dependencies of context client applications on specific sensors and other input sources, resolves conflicts between context client applications that consume the same context data, resolves conflicts between multiple sensors or other input sources that produce the same data, and isolates the generation of derived attributes from context client applications.
A context is modeled or represented with multiple attributes that each correspond to a specific element of the context (e.g., ambient temperature, location or a current user activity), and the value of an attribute represents a specific measure of that element. Thus, for example, for an attribute that represents the temperature of the surrounding air, an 80° Fahrenheit value represents a specific measurement of that temperature. Each attribute preferably has the following properties: a name, a value, an uncertainty level, units, and a timestamp. Thus, for example, the name of the air temperature attribute may be "ambient-temperature," its units may be degrees Fahrenheit, and its value at a particular time may by 80. Associated with the current value may be a timestamp of 02/27/99 13:07 PST that indicates when the value was generated, and an uncertainty level of +/- 1 degrees.
Context servers supply values for attributes by receiving and processing input information from sensors or other sources. Attribute values provided by a context server may either be "measured" (or "observed") in that they are directly received from an input source, or may instead be "derived" in that they are the result of performing processing on one or more measured attribute values. Indeed, a derived attribute value may be produced by performing additional processing on one or more other derived attribute values. Context attributes (or "condition variables") are discussed in greater detail in both U.S. Patent Application No. 09/216,193, filed December 18, 1998 and entitled "METHOD AND SYSTEM FOR CONTROLLING PRESENTATION OF INFORMATION TO A USER BASED ON THE USER'S CONDITION", and provisional U.S. Patent Application No. 60/193,999 (Attorney Docket # 29443.8008), filed April 2, 2000 and entitled "OBTAINING AND USING CONTEXTUAL DATA FOR SELECTED TASKS OR SCENARIOS, SUCH AS FOR A WEARABLE PERSONAL COMPUTER," which are both hereby incorporated by reference.
When the characterization module obtains an attribute value from a context server, it caches the value for use when responding to future requests from context clients for a value of the attribute. Thus, when the characterization module receives a request from a context client for the value of an attribute, the characterization module deteπnines whether it has a cached value for the attribute and, if so, whether the value is sufficiently accurate (e.g., the value does not have too high of an uncertainty) and/or sufficiently recent (e.g., the value is not too old). If the value is not sufficiently accurate or recent, the characterization module requests and receives an updated value for the attribute from the context server that supplied the value. When the characterization module has a sufficiently accurate and recent value, it supplies the value to the context client. The determination of whether a value is sufficiently accurate and recent can be made in a variety of ways, such as by using thresholds for recency or uncertainty that can be specified by the context client during the request, by a context server for all values of an attribute or for a specific attribute value, or by the characterization module.
In some embodiments, two or more different context servers may supply to the characterization module their own distinct values for a single attribute. For example, a first context server can supply a value for a user.location attribute based on data received from a global positioning system device, while a second context server can supply a value for the user.location attribute based on data received from an indoor positioning device. Alternately, the first and second context servers could use the same input information when determining the value for a single attribute, but could use different methods to perform the determining and could thus arrive at different values. When multiple content servers supply values for the same attribute, each of the context servers is said to supply values for a separate "instance" of the attribute. The characterization module preferably provides a variety of different approaches, called "mediators," for deternnning what attiibute value to provide when a context client requests a value for an attribute that has more than one instance.
For attributes with multiple instances, the characterization module performs similar processing to that described above. In particular, the characterization module can maintain a unique cached value for each attribute instance. If the characterization module receives a request for a value of a particular attribute instance, the request is handled as discussed above. If the characterization module instead receives a attribute value request for an attribute with multiple instances and the request does not specify a particular instance, the characterization module checks the accuracy of each cached attribute instance and requests an updated value for any instance with a value that is not sufficiently accurate. If multiple sufficiently accurate values are available, the characterization module produces a mediated value that is returned to the context client. The mediator to be used for the mediation can be selected in a variety of ways, such as being a default mediator of the characterization module, being requested by a context client, being specified by one or more of the context servers, or being chosen by the characterization module.
The manner in which data (e.g., sensor data and attribute values) flows to and from the characterization module can vary. In some embodiments, a context client may receive an attribute value only after an explicit request, while in other embodiments a context client may be forwarded attribute values without a request (e.g., if the client had previously expressed an interest in receiving values for the attribute and a value has just become available). Similarly, in some embodiments context servers may supply attribute values only when requested, while in other embodiments the context servers may supply attribute values without a request (e.g., if sensor input information is received from which a new value is produced). Request-based processing is a type of "pull" data flow model, and some forms of processing that occur without explicit requests are referred to as a "push" or "event-driven" data flow model.
The manner in which the characterization module communicates with the context clients and context servers can also vary. In some embodiments, context servers and context clients perform various interactions with the characterization module (e.g., supplying attribute values and requests) by calling functions provided by the characterization module (e.g., via Component Object Module interfaces). These functions are said to collectively comprise an "application programming interface" (or "API") to the characterization module. In alternate embodiments, such interactions can be performed using other mechanisms, such as passing messages or objects. Those skilled in the art will appreciate that an API can be created to support a pull data model, a push data model, or a hybrid system including both push and pull functionality.
As one example of an API, each executing context server may register with the characterization module by calling a RegisterContextServer function and supplying parameters to identify itself. If a particular context server is not executing, a context client that desires a value of an attribute or attribute instance supplied by the context server may cause the context server to be launched by using a LaunchContextServer function. After registration, a context server may indicate an ability to supply values for an attribute to the characterization module by using a CreateAttributelnstance function. A particular context server can provide values for a number of different attributes by calling the CreateAttributelnstance function multiple times. In order to consume values of an attribute, a context client may call a RegisterContextClient function in order to identify itself and one or more attributes whose values it seeks to consume. To assist in selecting one or more attributes, a context client may also call a EnumerateAttributes function to obtain a list of the attributes available from the characterization module. In order to actually retrieve an attribute value, a context client may call a GetAttribute function and use parameters to identify the attribute and any attribute processing that should be applied, such as a specific mediator to be used if values are available for multiple instances of the attribute. For attributes that have multiple instances in the characterization module, a
10 context client may also call a GetAllAttributelnstances function to obtain a value for each instance of the attribute. To force a particular context server to reevaluate all of its attribute instances, a context client may call a CompleteContextServerEvaluation function. Also, to retrieve values for attributes that model aspects of the configuration of the characterization module, a context client or other program may call a GetCharacterizationModuleAttribute function. A context client that consumes a particular attribute value may also create a condition in the characterization module (not to be confused with the current modeled condition of the user or the environment that is represented by various attribute values) for testing that attribute by calling a CreateCondition function. Once a context client has created a condition, it can evaluate the condition by calling an EvaluateCondition function using parameters to identify the condition, and may also proceed to create a condition monitor that monitors the condition and notifies the context server when the condition is satisfied by calling a CreateConditionMonitor function. To suspend operation of a created condition monitor, a context server may call a StopConditionMonitor function, and to resume its operation, may call a StartConditionMonitor function. The context server may remove a condition monitor that it created by calling a RemoveConditionMonitor function and, correspondingly, may remove a condition that it created by calling a RemoveCondition function. A context client may unregister with the characterization module by calling an UnregisterContextClient function. A context server may similarly remove attribute instances that it has registered by calling a RemoveAttributelnstance function. Before it does, however, it may first call a CheckAttributelnstanceDependencies function to determine whether any context clients currently depend upon that attribute instance. A context server may unregister with the characterization module by calling an UnregisterContextServer function. A set of API functions are discussed in greater detail in both U.S. Patent
11 Application No. 09/541,328, filed April 2, 2000 and entitled "INTERFACE FOR EXCHANGING CONTEXT DATA," and provisional U.S. Patent Application No. 60/194,123, filed April 2, 2000 and entitled "SUPPLYING AND CONSUMING USER CONTEXT DATA," which are both hereby incorporated by reference.
In some embodiments, it may also be useful to store attribute value information in a more permanent fashion than a temporary cache. For example, it may be useful for the characterization module to keep a log of all attribute values received and sent, or of all interactions with context clients and context servers. Alternately, it may be useful to record the current values of some or all of the attributes and attribute instances at the same time, such as to capture a complete model of the current context. Storing attribute value information is discussed in greater detail in both U.S. Patent Application No. 09/464,659, filed December 15, 1999 and entitled "STORING AND RECALLING INFORMATION TO AUGMENT HUMAN MEMORIES", and U.S. Patent Application No. 09/541,326, filed April 2, 2000 and entitled "LOGGING AND ANALYZING COMPUTER USER'S DATA," which are both hereby incorporated by reference. Other uses of attribute value information are described in provisional U.S. Patent Application No. 60/194,000, filed April 2, 2000 and entitled "SOLICITING PRODUCT INFORMATION BASED ON THE USER'S CONTEXT," in provisional U.S. Patent Application No. 60/194,002, filed April 2, 2000 and entitled "AUTOMATED SELECTION OF UNSOLICITED INFORMATION BASED ON A USER'S CONTEXT," and in provisional U.S. Patent Application No. 60/194,758, filed April 2, 2000 and entitled "CREATING PORTALS BASED ON THE USER'S CONTEXT," each of which are hereby incorporated by reference.
Figure 1 illustrates an embodiment of the characterization module which executes on a general-purpose body-mounted wearable
12 computer 120 worn by user 110. Many wearable computers are designed to act as constant companions and intelligent assistants to a user, and are often strapped to a user's body or mounted in a holster. The computer system may also be incorporated in the user's clothing, be implanted in the user, follow the user, or otherwise remain in the user's presence. In one preferred embodiment the user is human, but in additional preferred embodiments, the user may be an animal, a robot, a car, a bus, or another entity whose context is to be modeled. Indeed, the computer system may have no identifiable user, but rather operate as an independent probe, modeling and/or reporting on the context in an arbitrary location.
The wearable computer 120 has a variety of user-worn user input devices including a microphone 124, a hand-held flat panel display 130 with character recognition capabilities, and various other user input devices 122. Similarly, the computer has a variety of user-worn output devices that include the hand-held flat panel display, an earpiece speaker 132, an eyeglass-mounted display 134, and a tactile display 136. In addition to the various user-worn user input devices, the computer can also receive information from various user sensor input devices 116 and from environment sensor input devices 128, including video camera 121. The characterization module can receive and process the various input information received by the computer, either directly or from context servers that process the input information and generate attribute values, and can supply the received information to context clients or directly to the user by presenting the information on the various output devices accessible to the computer.
In the current environment, computer 120 is accessible to a computer 150 (e.g., by being in line-of-sight wireless proximity or by being reachable via a long-distance communication device such as a cellular phone) which also has a variety of input and output devices. In the illustrated embodiment the computer 150 is non-portable, although the
13 body-mounted computer of the user can similarly communicate with a variety of other types of computers, including body-mounted computers of other users. The devices from which the non-portable computer can directly receive information include various user input devices 152 and various user sensor input devices 156. The non-portable computer can output information directly to a display 160, a speaker 162, an olfactory device 164, and a printer 166. In the illustrated embodiment, the body- mounted computer can communicate with the non-portable computer via a wireless transmission medium. In this manner, the characterization module can receive information from the user input devices 152 and the user sensor devices 156 after the information has been transmitted to the non-portable computer and then to the body-mounted computer. Alternately, the body-mounted computer may be able to directly communicate with the user input devices 152 and the user sensor devices 156, as well as with other various remote environment sensor input devices 158, without the intervention of the non-portable computer 150. Similarly, the body-mounted computer may be able to supply output information to the display 160, the speaker 162, the olfactory device 164, and the printer 166, either directly or via the non-portable computer, and directly to the telephone 168. As the user moves out of range of the remote input and output devices, attribute values of the characterization module can be updated to reflect that the remote devices are not currently available.
Information that is received from the various input devices allows the characterization module or an application such as a context server (not shown) executing on the computer 120 to monitor the user and the environment, and to maintain a model (not shown) of the current context. In some embodiments, the model may be represented in a single location (e.g., the current cached values of all of the context attributes and attribute instances), while in other embodiments the model may be
14 distributed. Such a model can be used by various applications, such as context clients, for a variety of purposes. A model of the current context can include a variety of context attributes that represent information about the user, the computer, and the user's environment at varying levels of abstraction. For example, information about the user at a low level of abstraction can include raw physiological data (e.g., heart rate and EKG) and geographic information (e.g., location and speed), while higher levels of abstraction may attempt to characterize or predict the user's physical activity (e.g., jogging or talking on a phone), emotional state (e.g., angry or puzzled), desired output behavior for different types of information (e.g., to present private family information so that it is perceivable only to myself and my family members), and cognitive load (i.e., the amount of attention required for the user's current activities). Background information which changes rarely or not at all can also be included, such as the user's age, gender and visual acuity. The model can similarly hold environment information at a low level of abstraction, such as air temperature or raw data from a motion sensor, or at higher levels of abstraction, such as the number and identities of nearby people, objects, user mood, and locations. The model of the current context can include information added explicitly from other sources (e.g., application programs), as well as user-specified or system-learned defaults and preference information.
Those skilled in the art will appreciate that computer systems 120 and 150, as well as their various input and output devices, are merely illustrative and are not intended to limit the scope of the present invention. The computer systems may contain additional components or may lack some illustrated components. For example, the characterization module could be implemented on the non-portable computer, with the body-mounted computer replaced by a thin computer client such as a transmitter/receiver for relaying information between the
15 body-mounted input and output devices and the non-portable computer. Alternately, the user may not wear any devices or computers.
In addition, the body-mounted computer may be connected to one or more networks of other devices through wired or wireless communication means (e.g., wireless RF, a cellular phone or modem, infrared, physical cable, a docking station, etc.), either with or without support from other computers such as the computer 150. For example, the body-mounted computer of a user can make use of output devices in a smart room, such as a television and stereo when the user is at home, if the body-mounted computer is able to transmit information to those devices via a wireless medium or if a cabled or docking mechanism is available. Alternately, kiosks or other information devices can be installed at various locations (e.g., in airports or at tourist spots) to transmit relevant information to body-mounted computers within the range of the information device. Those skilled in the art will also appreciate that specialized versions of the body-mounted computer, characterization module, context clients and/or context servers can be created for a variety of purposes.
Figure 2 illustrates an exemplary computer system 200 on which an embodiment of the characterization module is executing. The computer includes a memory 230, a CPU 210, a persistent storage device 250 such as a hard drive, and input/output devices including a microphone 222, a video camera 223, a computer-readable media drive 224 (e.g., a CD-ROM drive), a visual display 225, a speaker 226, and other devices 228. The memory preferably includes the characterization module 231, as well as information reflecting the current state of the characterization module (characterization module state) 232. The memory further contains software modules 233, 234, and 237 that consume attribute values and are therefore context clients, and software modules 235, 236, and 237 which provide attribute values and are therefore context servers.
16 While items 231-237 are preferably stored in memory while being used, those skilled in the art will appreciate that these items, or portions of them, can be transferred between memory and the persistent storage device for purposes of memory management and data integrity. Alternately, in other embodiments some or all of the software modules may execute in memory on another device, and communicate with the characterization module via inter-computer communication.
In addition, in some embodiments a pre-defined set of attributes are available for use by context servers and context clients. This allows a common meaning to be shared between context clients and context servers as to those attributes and their values, and can also allow a context client to request a pre-defined attribute without having to deteπnine whether the attribute has been created by a context server supplying values for the attribute. In one embodiment a plain-language, hierarchical, taxonometric attribute nomenclature is used to name attributes, such as the example attribute nomenclature illustrated in Figure 15. The names within the nomenclature are preferably specific so that there is no ambiguity as to what they represent, and the ability to extend the nomenclature by adding new attribute names that conform to the hierarchical taxonomy of the nomenclature is preferably supported. The nomenclature preferably has attribute names relating to a variety of aspects of the user.
For example, as is illustrated in Figure 15, the nomenclature preferably has a variety of types of attribute names, including: attribute names relating to the user's location, such as user.location.latitude, user.location.building, and user.location. street; attribute names relating to the user's movement, such as user. speed and user. direction; attribute names for various user moods, such as user.mood.happiness, user.mood. anger, and user.mood. confusion; attribute names for user activities, such as user, activity, driving, user, activity, eating, and
17 user. activity, sleeping; attribute names for user physiology values, such as user.physiology.body_temperature and user.physiology.blood_pressure; attribute names for similar attributes of people other than the user, such as person.Iohn_ Smith.mood.happiness; attribute names for aspects of the computer system or "platform," such as for aspects of the platform's user interface ("UI") capabilities (e.g., platform.UI. oral_input_device_availability and platform.UI.visual_output_device_ availability) and central processing unit ("CPU") (e.g., platform. cpu.load and platform. cpu. speed); attribute names for aspects of the local environment, such as environment.local.temperature and environment.local.ambient_noise_level; attribute names for remote environments, such as environment.place.chicago.time and environment.place.san_diego.temperature; attribute names relating to a future context, such as those that predict or estimate a situation (e.g., environment.local.next_ week.temperature); attribute names relating to specific applications, such as an email application (e.g., application.mail. available, application.mail.new_messages_waiting, and application.mail.messages_waiting_to_be_ sent); etc. In this manner, the attribute nomenclature used by the facility provides effective names for attributes relating to the user, the computer system, and the environment. Additional attributes are illustrated in Figure 15, and Figure 16 illustrates an alternate hierarchical taxonomy related to context, such that various attributes could be added for each of the illustrated categories. Those skilled in the art will appreciate that for both Figure 15 and Figure 16, other categories and attributes could be added and existing categories and attributes could be removed or could have alternate names.
Figure 3 is a data flow diagram showing a sample exchange of attributes performed by the characterization module. The diagram shows characterization module 300, as well as five other software
18 modules, 310, 320, 330, 340, and 350. Software modules 310, 320, and
330 are said to be context servers, in that they provide attribute values to the characterization module. For example, context server 330 provides values for a user.in_region attribute 331. It can be seen that context servers may provide values for more than one attribute. For example, context server 320 provides values for a user.location attribute 321 and an user. elevation attribute 322. It can further be seen that values for a single attribute may be provided by more than one context server. For example, context server 310 provides values for user.location attribute 311, while context server 320 provides values for user.location attribute 321. Attributes 311 and 321 will be represented by the characterization module as multiple instances of a single user.location attribute. The characterization module preferably provides functionality for mediating between these two separate instances when the value of the user.location attribute is requested by a context client.
Software modules 330, 340, and 350 are said to be context clients because they consume attribute values. For example, context client 340 consumes user.location attribute 341 values. It can be seen that certain software modules may act both as a context server and as a context client. For example, software module 330 is both a context server and a context client, as it provides values for the user.in egion attribute
331 and consumes values for user.location attribute 332. It can also be seen that a context client can consume values for more than one attribute. For example, context client 350 consumes values for both user.injregion attribute 351 and user. elevation attribute 352. To determine which attributes are currently available, any of the context clients may request that the characterization module enumerate the available attributes. In response to such a request, the characterization module would enumerate the user.location attribute, the user. elevation attribute, and the user.in_region attribute.
19 Figure 4 is a data structure diagram showing an example context server table used to maintain a portion of the state of the characterization module. Each row of the table corresponds to a registered context server. Each row contains a context server name field 411 containing the name of the context server, a version field 412 identifying the version of the context server, an installation date 413 identifying the date on which the context server was installed on the computer system, a filename 414 identifying a primary file in the file system representing the context server, and a request handler field 415 containing a reference to a request handler function on the context server that may be called by the characterization module to send messages to the context server (e.g., a request evaluation of one or all of the attributes provided by the context server). Other versions of the context server table may lack some of the illustrated fields (e.g., the version field), or may contain additional fields (e.g., a registered attributes field that contains the names of all of the attributes for which the context server is currently registered to supply values).
Figure 5 is a data structure diagram showing an example attribute instance table used to maintain a portion of the state of the characterization module. The attribute instance table contains a row for each attribute or attribute instance for which a context server is currently registered to supply values. Each of these rows contains the following fields: an attribute name field 511 containing the name of the attribute, a context server name field 512 identifying the context server that created the attribute instance, a value field 513 containing the value of the attribute last provided by the context server, and uncertainty field 514 identifying the level of uncertainty of the value, a timestamp 515 indicating the time at which the value is effective, a units field 516 identifying the units for the value and the uncertainty, and an indication 517 of the number of context clients consuming values for the attribute
20 instance. While row 501 indicates that an instance of the user.location attribute from the gps context server has a multi-part value of 47° 36.73' N and 122° 18.43' W degrees and minutes, in alternate embodiments multi-part values may not be used, such as instead having two attributes to represent this context element (e.g., user.location.latitude and user.location.longirude). Similarly, while field 517 indicates the number of context clients consuming values for an attribute, in alternate embodiments this number could be dynamically calculated rather than being stored (e.g., by using the attribute request table discussed below), or an identifier for each context client could instead be stored rather than merely a number. Other versions of the attribute instance table may lack some of the illustrated fields, such as the units field if all the instances of an attribute are restricted to having the same units and if such common information about all the attribute instances is stored elsewhere. Alternately, some versions of the attribute instance table could include additional information, such as a separate row for each attribute with multiple instances that contains common information about all of instances, and additional fields such as a context client field that contains the name of each context client registered to receive values for the attribute or instance of that row. Other versions of the attribute instance table could include other additional fields such as an optional specified context client field so that the context server can indicate one or more context clients that are able to receive values for the attribute (e.g., a list of authorized clients).
Figure 6 is a data structure diagram showing an example context client table used to maintain a portion of the state of the characterization module. Each row corresponds to a registered context client, and contains a context client name field 611 identifying the name of the registered context client as well as a message handler field 612 containing the reference to a message handler provided by the context
21 client for processing messages from the characterization module. Other versions of the context client table may lack some of the illustrated fields, or may contain additional fields (e.g., a registered attributes field that contains the names of all of the attributes for which the context server is currently registered to receive values).
Figure 7 is a data structure diagram showing updated contents of the attribute instance table illustrated in Figure 5. It can be seen that, in response to registration of a location nap context client consuming values for the user.injregion attribute, the characterization module has incremented the number of context clients consuming the user.in_region attribute from 0 to 1.
Figure 14 is a data structure diagram showing an example attribute request table used to maintain a portion of the state of the characterization module. The attribute request table contains a row for each attribute for which a context client is currently registered to receive values. Each of these rows contains the following fields: an attribute name field 1411 containing the name of the attribute, and a context client name field 1412 identifying the context client that registered a request to receive values for the attribute. Note that a context client can request values for an attribute without specifying a particular instance, as in row 1401, or can instead request values for a specific attribute instance, as in row 1403. Other versions of the attribute request table may lack some of the illustrated fields, or may contain additional fields such as an optional field to specify one or more particular context servers that can supply the values for the attribute (e.g., a list of authorized context servers).
Figure 8 is a flow diagram of one embodiment of the GetAttribute function. In step 801, if the requested attribute exists, then the facility continues in step 803, else the facility continues in step 802 to return an "attribute not found" error. In step 803, if a single instance of the attribute was requested, then the facility continues in step 804, else
22 the facility continues in step 811. In step 804, if the requested instance exists, then the facility continues in step 806, else the facility continues in step 805 to return an "attribute instance not found" error. In step 806, if the age criterion specified for the attribute request is satisfied, then the facility continues in step 807 to return the requested attribute instance, else the facility continues in step 808 to "freshen" the attribute instance by calling the appropriate context server's request handler to request evaluation of the attribute instance. In step 809, if the age criterion is satisfied by the freshened attribute instance, then the facility continues in step 807 to return the freshened attribute instance, else the facility continues in step 810 to return the freshened attribute instance with an "age not satisfied" error. In step 811, where a single attribute instance was not requested, if any registered instances of the attribute satisfy the age criterion, then the facility continues in step 816, else the facility continues in step 812. In step 812, the facility freshens all registered instances of the requested attribute. In step 813, if any of the attributes freshened in step 812 satisfy the age criterion, then the facility continues in step 816, else the facility continues in step 814. In step 814, the facility applies the requested attribute mediator to select one instance, or otherwise derive a value from the registered instances. In step 815, the facility returns the instance with an "age not satisfied" error. In step 816, where one or more instances satisfy the age criterion, if more than one instance satisfies the age criterion, then the facility continues in step 817, else the facility continues in step 807 to return the attribute instance that satisfies the age criterion. In step 817, the facility applies the requested attribute mediator to select one instance from among the instances that satisfy the age criterion, or to otherwise derive a value from the instances that satisfy the age criterion. After step 817, the facility continues in step 807 to return the value produced by the mediator.
23 Figure 9 is a data structure diagram showing updated contents of the attribute instance table illustrated in Figure 7. It can be seen in attribute instance table 900 that, upon reevaluation by the ips context server of its instance of the user. elevation attribute, the characterization module replaced the former contents of the value, uncertainty and timestamp fields of row 903 with the values resulting from the reevaluation.
Figure 10 is a data structure diagram showing an example condition table that contains a portion of the state of the characterization module. Condition table 1000 has a row for each condition created by a context client. Row 1001 contains a condition name field 1011 containing the name of the condition, a context client name 1012 identifying the context client that created the condition, a first logical parameter field 1013 and a second logical parameter field 1014 identifying attributes or conditions that are to be compared, a comparison value 1015 that specifies a value to which an attribute listed in the first logical parameter is compared if no second logical parameter is listed, and a logical operator 1016 identifying the logical operator to be applied in the comparison.
Figure 11 is a data structure diagram showing an example condition monitor table that maintains a portion of the state of the characterization module. Condition monitor table 1100 has a row 1101 corresponding to a condition and containing each of the following fields: a condition monitor name field 1111 containing the name of the condition monitor; a context client name field 1112 containing the name of the context client that created the condition monitor; a condition name field 1113 that contains the name of the condition monitored by the condition monitor; a behavior field 1114 that indicates whether the condition monitor is triggered when the condition becomes true, when it becomes false, or when it changes value in either direction; a frequency field 1115
24 showing the frequency with which the condition monitor evaluates the condition; a condition last evaluated field 1116 showing the time at which the condition monitor last evaluated the condition; a trigger handler reference 1117 that identifies a trigger handler function of the context client that is to be called when the condition monitor is triggered; and a stop field 1118 that indicates whether the context client has suspended operation of the condition monitor. Such condition monitors can be used in a variety of ways. For example, when a context client is notified via the triggering of the trigger handler function that the value has changed, the context client can then retrieve the new value.
Figure 12 is a data structure diagram showing updated contents of the condition monitor table illustrated in Figure 11. It can be seen from stop field 1218 of row 1201 in condition monitor table 1200 that the region_analysis context client has stopped, or suspended the operation of, the region_boundary_cross condition monitor, perhaps in response to the observation that the user is now asleep and his or her location will remain constant.
In the foregoing, the facility is described as being implemented using a characterization module that is called by context servers and context clients, that caches attribute values, and that maintains status information about the operation of context servers and context clients. In an alternative preferred embodiment, however, the facility operates without the use of such a characterization module. In this embodiment, context servers communicate directly with context clients.
Figure 13 is a data flow diagram showing the operation of the facility without a characterization module. It can be seen in Figure 13 that context servers 1310, 1320, and 1330 provide attributes directly to context clients 1330, 1340, and 1350. For example, it can be seen that context server 1320 provides a user. elevation attribute 1322 directly to context client 1350. In this embodiment, the context client may itself
25 cache attribute values recently obtained from a context server. Further, in this embodiment, context clients may themselves interrogate context servers for an enumeration of their attributes, and mediate between attribute instances provided by different context servers. For example, context client 1340 may mediate between the instance 1311 of the user.location attribute provided by context server 1310 and the instance 1321 of the user.location attribute provided by context server 1320.
In additional preferred embodiments, the facility may operate with a partial characterization module. Such a partial characterization module may include various combinations of the functionalities of routing communication between context servers and the context clients that consume their attribute values, caching attribute values, enumerating available attributes, and providing attribute mediation.
In additional preferred embodiments, the facility may provide a characterization module that implements a "push" information flow model in which, each time an attribute value provided by a context server changes, the new value is automatically provided to context clients. In further preferred embodiments, the facility provides a characterization module that implements a "pull" information flow model, in which attribute values are only obtained by the characterization module from the context servers when they are requested by a context client. In additional preferred embodiments, characterization modules are provided that support a variety of other information flow models.
Figure 17 is a flow diagram of an embodiment of the Characterization Module routine 1700. The routine receives messages from context clients (CCs) and from context servers (CSes), as well as instructions from users, and processes the messages or instructions. In some embodiments, a CM could wait to execute code that would provide functionality until the functionality was requested, such as by
26 dynamically loading code to provide a requested mediator. The routine begins in step 1705, where the characterization module (CM) performs various startup operations (e.g., setting up tables in which to temporarily cache state information, retrieving previous state information, launching CSes or CCs that have previously registered with the CM, etc.). The routine then continues to step 1710 to determine if the newly started CM is to take the place of another previously executing CM (e.g., based on a user indication when the new CM was started). If so, the routine continues to step 1715 to swap places with the other executing CM. One method of executing a swap that would be transparent to the CCs and CSes interacting with the other CM would be to request the other CM to transfer all of its current state information to the new CM (e.g., registrations of CCs, CSes, and attributes, conditions and notification requests, cached values for attributes and attribute properties, etc.), to then update the other CCs and CSes so that the messages they previously sent to the other CM will now be sent to the new CM, and to then have the other CM shutdown.
After step 1715, or if it was determined in step 1710 that another CM is not being swapped out, the routine continues to step 1720 to receive an indication from a user or a message from a CC or CS. The routine then continues to step 1725 where it performs the Notification Processing subroutine to notify any CCs or CSes about the received message or user indication if appropriate. As is explained in greater detail below, CCs and CSes can submit notification requests so that they will be notified by the CM upon a particular type of occurrence. Such notification requests could include occurrences such as when an attribute value changes, when a particular CC or CS registers or unregisters, when values for an attribute become available or unavailable (e.g., due to registration or unregistration), when a CC registers or unregisters to receive values for an attribute, when the availability of particular
27 input/output devices changes or other computer system features change, when a package of related themed attributes becomes available or unavailable, for changes in CM internal status (e.g., a change in the default mediator), etc. In addition, the notification requests can be created based not only on explicit requests, but also after the occurrence of a particular type of event (e.g., if a CC requests a value for an attribute for which no CSes are currently supplying values, a notification request could be automatically created to alert the CC if a CS later registers to supply values for the attribute). Moreover, additional information about the notification requests can be supplied (e.g., a number of times that the submitter wants to receive notifications for the request, or an expiration date after which the notification will be removed or become inactive).
After step 1725, the routine continues to step 1730 to determine if a registration or unregistration message was received. If so, the routine continues to step 1735 to execute the Dynamically Specify Available Clients, Servers, and Attributes subroutine. Thus, CCs and CSes can register and unregister dynamically as they become available or unavailable, and can similarly modify the status of the attributes that they have registered with the CM. If a registration or unregistration message was not received in step 1730, the routine instead continues to step 1740 to determine if an attribute value or a request for an attribute value has been received from a CC or CS. If so, the routine continues to step 1745 to execute the Process Attribute Value Or Value Request Message subroutine. This subroutine will satisfy requests for attribute values if possible (e.g., by supplying a cached value or requesting one or more CSes to supply the value) and will return the requested value or an error message. Similarly, when attribute values are pushed to the CM from a CS, the CM will send the values if appropriate to CCs that have registered an interest in receiving values for the attribute.
28 If an attribute value or an attribute value request has not been received from a CC or CS in step 1740, the routine instead continues to step 1750 to determine if a request has been received to establish or modify a condition that monitors attribute values or other conditions, or to establish or modify a condition monitor. If so, the routine continues to step 1755 to process the request. As described previously, conditions and condition monitors can be created, removed, and have their operation suspended (e.g., by deactivating them) or resumed (e.g., by activating them).
If a condition-related request was not received in step 1750, the routine continues instead to step 1760 to determine if a message related to one or more other executing CMs has been received, and if so continues to step 1765 to process the message by executing the Process Distributed Characterization Module Message subroutine. Characterization modules can interact for a variety of reasons, as explained in greater detail below. If a message related to another CM has not been received, the routine continues instead to step 1770 to determine if a request has been received to establish or modify a notification request. If so, the routine continues to step 1775 to process the notification-related request. If a notification-related request was not received, the routine continues instead to step 1780 to deteπnine if a shutdown message was received (e.g., from a user). If so, the routine continues to step 1790 to perform shutdown operations (e.g., notifying all registered CCs and CSes to unregister, or saving current state information), and then continues to step 1795 and ends. If it was instead determined that a shutdown message was not received, the routine continues to step 1782 to determine if another supported operation has been requested. If so, the routine continues to step 1784 to perform the other operation, and if not the routine continues to step 1786 to send an error message to the requester. For example, other types of operations may be a request to receive
29 information about all available attributes, about all attributes available from a particular CS, about which CCs are receiving values for a particular attribute, about properties and property values associated with attributes and attribute instances, to launch or shutdown a CC or CS, to receive information about an attribute taxonomy, to force a CS to reevaluate the values for all its registered attributes, to change internal CM information (e.g., the default mediator), to provide information about available packages of related themed attributes, to provide information about available computer resources such as input/output devices, etc.. After steps 1735, 1745, 1755, 1765, 1775, 1784, or 1786, the routine returns to step 1720. In other embodiments, additional types of functionality may be available or illustrated functionality may not be available. For example, in some embodiments any CC or CS may need to satisfy security requirements (e.g., by verifying their identity as an authorized module) before being allowed to request information or functionality from the CM or to provide information to the CM.
Figure 18 is a flow diagram of an embodiment of the Notification Processing subroutine 1725. The subroutine examines the message or user indication received by the CM, determines whether any active notification requests are satisfied by the type of message or indication or by information contained in the message or indication, and notifies the submitters of any such requests when the requests are satisfied. The subroutine begins in step 1805 where it receives an indication of the message or user indication received by the CM. The subroutine continues to step 1810 to compare the received message or user indication to the notification requests that are currently stored and active. The subroutine then continues to step 1815 to retrieve any additional information that may be needed to determine if a notification request has been satisfied (e.g., a previous value for an attribute to determine how the attribute value has changed).
30 The subroutine then continues to step 1820 where it determines if any of the notification requests have been satisfied. If not, the subroutine continues to step 1895 and returns, but if so the subroutine continues to step 1825 to select the next satisfied notification request, beginning with the first. The subroutine then continues to step 1830 to send a notification to the supplier of the request that the request was satisfied, and can include additional information about the occurrence that satisfied the request. The subroutine then continues step 1835 to deteπnine whether the notification request should be removed (e.g., if it was defined as a one-time request, or has expired). If so, the subroutine continues to step 1840 to remove the request, and if not the subroutine continues to step 1845 to determine if the notification request should be deactivated for the current time (e.g., so that a similar occurrence can be monitored at a later time). After steps 1840 or 1850, or if the notification request was not deactivated, the subroutine continues to step 1855 to deteπnine if there are more satisfied notification requests. If so, the subroutine returns to step 1825, and if not the subroutine continues to step 1895 and returns. In addition, the subroutine could periodically check the various stored notification requests (e.g., as a background process) to determine if their status should be modified (e.g., activated, deactivated, or removed).
Figure 19 is a flow diagram of an embodiment of the Dynamically Specify Available Clients, Servers, and Attributes subroutine 1735. The subroutine receives registration or unregistration requests for CCs, CSes, and/or attributes, and satisfies the requests as appropriate. The subroutine begins in step 1905 where it receives a registration or unregistration message. The subroutine continues to step 1910 to determine if security authorization is needed (e.g., for any CC or CS, or for CCs and CSes executing on a different computer from the CM). If so, the subroutine continues to step 1915 to deteπnine if the security
31 authorization has been satisfied (e.g., by the submitter of the message supplying a password or a verified digital signature). It is determined in step 1920 that the security authorization has not been satisfied, the subroutine continues to step 1925 where it sends an error message to the submitter. However, if it is instead determined that the security standard has been satisfied, or if security authorization was not needed in step 1910, the subroutme continues to step 1930 to determine the type of the registration or unregistration message.
If the message is determined to be related to a CC, the subroutine continues to step 1940 to determine if the message is to register the CC. If so, the subroutine continues to step 1941 to register the new client if possible (e.g., if all necessary information has been provided and there is not another registered CC with the same unique identifier). If it is determined in step 1942 that an error occurred during the registration attempt, the subroutine continues to step 1944 to send an error message to the submitter. If no error occurred, the subroutine instead continues to step 1946 to deteπnine if the registration request includes one or more attributes of interest to be registered for the client. If so, the subroutine continues to step 1982 to register those attributes. If it was instead determined in step 1940 that the received message was not to register the client, the subroutine continues to step 1948 to determine if the message was to unregister the client. If so, the subroutine continues to step 1950 to unregister the client, and then continues to step 1952 to determine if any registered attributes remain for the client. If so, the subroutine continues to step 1994 to unregister each of those attributes.
If it was instead determined in step 1930 that the received message was related to a CS, the subroutine continues to step 1960 to determine whether the message is to register the CS. If so, the subroutine continues to step 1961 to register the new server if possible. It is determined in step 1962 that an eπor occuπed during the registration
32 attempt, the subroutine continues to step 1964 to send an eπor message to the submitter. If no eπor occuπed, however, the subroutine instead continues to step 1966 to determine if the registration request includes one or more attributes to register for which the server is available to supply values. If so, the subroutine continues to step 1982 to register those attributes. If it was instead determined in step 1960 that the received message was not to register the CS, the subroutine continues to step 1968 to determine if the message was to unregister the server. If so, the subroutine continues to step 1970 to unregister the server, and then continues to step 1972 to deteπnine if any registered attributes remain for the server. If so, the subroutine continues to step 1994 to unregister those attributes.
If it was instead determined in step 1930 that the received message was related only to one or more attributes and not to a CC or CS, the subroutine continues to step 1980 to determine whether the message is to register those attributes. If so, the subroutine continues to step 1982 to select the next attribute, beginning with the first. The subroutine then continues to step 1984 to determine if at least one instance of the attribute is cuπently registered. If so, the subroutine continues to step 1986 to register a new instance of the attribute, and if not the subroutine continues to step 1988 to register the first instance for the attribute. After steps 1986 or 1988, the subroutine continues to step 1990 to determine if there are more attributes to be registered, and if so returns to step 1982. If it is instead determined in step 1980 that the received message was not to register the attributes, the subroutine continues to step 1992 to deteπnine if the message was to unregister the attributes, and if so continues to step
1994 to unregister each attribute. After steps 1925, 1964, 1944, or 1994, or if the determination was made in the negative for one of steps 1946, 1948, 1952, 1966, 1972, 1990, or 1992, the subroutine continues to step
1995 and returns. As discussed previously, a variety of other types of
33 optional information can additionally be supplied when registering CCs, CSes or attributes (e.g., various properties for the attribute).
Figure 20 is a flow diagram of an embodiment of the Process Distributed Characterization Module Message subroutine 1765. The subroutine receives information from another CM or an instruction about another CM, and processes the information or instruction as appropriate. The subroutine begins in step 2005 where it receives an indication of the received information or instruction. The subroutine then continues to step 2010 to determine if security authorization is needed. If so, the subroutine continues to step 2012 to determine if the security has satisfied. It is determined at step 2014 that the security authorization has not been satisfied, the subroutine continues to step 2016 to send an eπor message to the submitter. If it is instead determined that the security authorization has been satisfied or was not needed in step 2010, the subroutine continues to step 2018 to determine whether information from another CM has been received.
If it is determined in step 2018 that an instruction about another CM has been received, the subroutine continues to step 2020 to determine if the instruction is to register or unregister as a CC or CS of the other CM. If so, the subroutine continues to step 2022 to rename any attributes in the request if necessary. For example, if a current CM 1 wants information about an attribute user.mood.happiness for its own user from another CM 2, CM 1 will have to modify the name of the attribute (e.g., to CM 1. user.mood.happiness) it requests since CM 2's attribute user.mood.happiness will refer to the user of CM 2. The same will be true for a variety of other attributes that specify attributes relative to the CM, but not to attributes with absolute specifications (e.g., person.ABC.mood.happiness). After step 2022, the subroutine then continues to step 2024 to send a request to the other CM to reflect the
34 request using the renamed attributes, with the other CM to perform the registration or unregistration.
If it is instead determined in step 2020 that the instruction was not to register or unregister, the subroutine continues to step 2026 to determine whether the instruction is to send an attribute value or an attribute value request to the other CM. If so, the subroutine continues to step 2028 to rename any attributes in the request if necessary, and then continues to step 2030 to determine whether a request or an attribute value is being sent. If an attribute value is being sent, the subroutine sends the value to the other CM in step 2032, and if a request is being sent the subroutine sends the request in step 2034. After step 2034, the subroutine continues to step 2036 to receive the requested value or an eπor message, and if the value is received rather than an eπor message, the subroutine sends the received value to the requester at step 2038.
If it is instead determined in step 2026 that the received instruction is not to send an attribute value or an attribute value request, the subroutine continues to step 2040 to determine if a group-wide attribute is to be modeled (e.g., troop morale for a group of soldiers that would require information for many or all of the soldiers). If so, the subroutine continues to step 2042 to request attribute values from the other CMs that are needed for the modeling, and then continues to step 2044 to receive the requested values or eπor messages. If the necessary values are received to perform the modeling, in step 2046 the subroutine determines the value of the group-wide attribute and in step 2048 sends the value to the requester. In alternate embodiments, any such modeling of attributes may be performed only by CSes, with the CM merely requesting values from other CMs as instructed and supplying the received values to the appropriate CS.
If it is instead determined in step 2040 that the received instruction is not to model a group-wide attribute, the subroutine
35 continues to step 2050 to determine if the instruction is to aggregate information from subordinate CMs (e.g., in a hierarchical organization such as a business or the military, the hierarchy of users can be reflected in a hierarchy of their CMs) or specialized CMs (e.g., a CM specialized to monitor a user's health and to detect health problems). If so, the subroutine continues to step 2052 to request the information from the other CMs as needed, and continues to step 2054 to receive the requested information or eπor messages. If the necessary information is received, in step 2056 the subroutine aggregates the information, and in step 2058 sends the aggregated information to the requester. In alternate embodiments, any such aggregating of information may be performed only by CSes, with the CM merely requesting information from other CMs as instructed and supplying the received values to the appropriate CS.
If it is instead determined in step 2050 that the received instruction is not to aggregate information, the subroutine continues to step 2060 to determine if the received instruction is to use the processing capabilities of another computer or CM. If so, the subroutine continues to step 2062 to request the other computer or CM to perform an indicated task. The subroutine then continues to step 2064 where it receives the results of the task, and uses those results as if the task have been performed locally. If it is instead determined in step 2060 that the received instruction is not to use the processing abilities of another computer, the subroutine continues to step 2065 to determine if the received instruction is to send information to a module such as a thin client. If so, the subroutine continues to step 2067 to send the indicated information (e.g., from a CC), and if not the subroutine continues to step 2069 to perform another task as indicated. For example, other types of tasks could be to instruct another CM to swap itself out or to modify its
36 internal state (e.g., to change a default mediator or to add a new mediator).
If it was instead determined at step 2018 that information from another CM has been received, the subroutine continues to step 2070 to determine if a registration or unregistration request has been received. If so, the subroutine continues to step 2071 to rename any attributes if necessary, and then continues to step 2072 to resubmit the request as if from a CC or a CS using the renamed attributes. If the information was not a registration or unregistration request, the subroutine continues to step 2073 to deteπnine if an attribute value or an attribute value request has been received. If so, the subroutine continues to step
2074 to rename the attributes if necessary, and then continues to step
2075 to determine whether an attribute value or an attribute value request has been received. If an attribute value has been received, the subroutine continues to step 2076 where it resubmits the value as being from a CS, and if not the subroutine continues to step 2077 where it resubmits the attribute value request as being from a CC. After step 2077, the subroutine continues to step 2078 where it receives the requested value or an eπor message, and in step 2079 sends the received value to the requesting CM if an eπor message was not received.
If it was instead determined in step 2073 that an attribute value or attribute value request was not received, the subroutine continues to step 2080 to determine if the received information was an indication to modify the internal state of the CM. If so, the subroutine continues to step 2081 where it modifies the state as indicated. If the received instruction was not to modify the internal state, the subroutine continues to step 2082 to determine if the request is to swap the CM out to be replaced by the other requesting CM. If so, the subroutine continues to step 2084 to send the cuπent state information from the CM to the requesting CM. In addition, the CM could perform other tasks if
37 necessary such as updating the cuπently registered CCs and CSes so that they now will communicate with the other CM. The subroutine then continues to step 2086 to wait for an indication from the other CM to exit, and after receiving the indication, submits a shutdown request in step 2088. If the received instruction was not to swap out, the subroutine continues to step 2090 to perform the other task as indicated if appropriate. After steps 2016, 2024, 2032, 2038, 2048, 2058, 2064, 2067, 2069, 2072, 2076, 2079, 2081, 2088, or 2090, the subroutine continues to step 2095 and returns.
Figure 21 is a flow diagram of an embodiment of the Process Attribute Value Or Value Request Message subroutine 1745, as illustrated in the accompanying figure and described elsewhere. In particular, the subroutine receives an indication of an attribute value or a request for an attribute value, and processes the value or request as appropriate (e.g., pulling values from servers when needed to satisfy requests and pushing received values to clients when appropriate). Those skilled in the art will appreciate that in other embodiments only one of the push and pull data flow models may be supported. The subroutine begins at step 2105 where it receives an indication of an attribute value or a request for an attribute value. The subroutine then continues to step 2110 to deteπnine if an attribute value or a request was received.
If a value was received, the subroutine continues to step 2120 to execute the Process Received Attribute Value subroutine, such as to store the value and to process additional associated information received about the value. The subroutine next continues in the illustrated embodiment to push the received value or a related value to clients as appropriate. Those skilled in the art will appreciate that in other embodiments such values may merely be cached or otherwise stored until requested by a client. Alternately, even if received values are not generally pushed to clients, in other embodiments such values could be
38 pushed to clients in limited circumstances, such as an update to a related value that had previously been sent to a client when the newly received value is more accurate.
In the illustrated embodiment, the subroutine continues to step 2122 to determine whether there are any previously specified requests or indications of interest related to the received value that would cause the received value or a related value to be pushed to one or more clients. If it is determined in step 2125 that there are any such requests or indications, the subroutine continues to step 2130 to determine if there are multiple attribute instance values available that meet the appropriate criteria (if any are specified) to satisfy the requests or indications. For example, a default or specified threshold for the freshness of values could be used as a criteria. If there are multiple values, the subroutine continues to step 2132 to execute the Mediate Available Values subroutine and produce a mediated value from the multiple available values, and in step 2134 selects the mediated value produced by the subroutine. If it was instead determined in step 2130 that there are not multiple attribute instance values available for the received value, the subroutine continues to step 2136 to select the received value. After steps 2134 or 2136, the subroutine continues to step 2138 to select the next request of the identified requests, beginning with the first request. The subroutine then continues to step 2140 to execute the Push Selected Attribute Value To Client subroutine for the selected request, and then continues to step 2142 to determine if there are more identified requests. If so, the subroutine returns to step 2138 to select the next request.
If it was instead determined in step 2110 that a request for a value was received, the subroutine continues to step 2150 to identify all attribute instances that match the request (e.g., that satisfy one or more criteria for the value that are specified with the request). The subroutine then continues to step 2152 to determine if there are any such instances,
39 and if not continues to step 2154 to send an eπor message to the requester. In the illustrated embodiment, the subroutine next pulls cuπent values for the identified attribute instances from servers as appropriate. Those skilled in the art will appreciate that in other embodiments only those values that have previously been received and stored may be supplied to clients. Alternately, even if cuπent values are not generally pulled from servers, in other embodiments such values could be pulled from servers in limited circumstances, such as when explicitly requested by a client.
In the illustrated embodiment, if it is determined in step 2152 that at least one attribute instance is identified, the subroutine continues to step 2156 to select the next such instance, beginning with the first. The subroutine in step 2158 then determines if a new value is needed for the selected instance (e.g., the available value does not meet some specified criteria, such as an accuracy threshold specified by the requesting client). If so, the subroutine continues to step 2160 to execute the Pull Attribute Value From Server subroutine. The subroutine in step 2162 next waits for a value or eπor message response from the server, and determines if a value is received. If a value is received, the subroutine then continues to step 2164 to execute the Process Received Attribute Value subroutine. After step 2164, or if it was determined in step 2158 that the instance does not need a new value or in step 2162 that a new value was received, the subroutine continues to step 2166 to determine if there are more instances identified. If so, the subroutine returns to step 2156 to select the next such instance, and if not continues to step 2168 to determine if there are multiple values now available for the request that meet any relevant criteria. While all identified attribute instance values that match the request are used in the illustrated embodiment, in other embodiments a different or additional selection process for the values could be used. For example, information about the
40 various servers that can supply the attribute instance values may be available (e.g., dynamically), and if so only certain of the servers could be selected based on the information with only the values from those servers being used.
If it is determined in step 2168 that there are multiple values available, the subroutine continues to step 2170 to execute the Mediate Available Values subroutine to produce a mediated value from the multiple available values, and in step 2172 sends the produced mediated value and any additional information about the value (e.g., properties, an associated uncertainty value, an indication of the server that produced the value, an indication of the mediator used to produce the value, etc.) to the requester. If it was instead determined in step 2168 that there are not multiple values available, the subroutine continues to step 2174 to determine if a single value is available, and if not continues to step 2178 to send an eπor message to the requester. If it is instead determined that there is a single value available, the subroutine continues to step 2176 and sends the value and any additional information to the requester. After steps 2154, 2172, 2176 or 2178, or if it was determined in step 2125 that there were no requests identified or in step 2142 that there were no more requests, the subroutine continues to step 2195 and returns.
Figure 22 is a flow diagram of an embodiment of the Process Received Attribute Value subroutine 2200, as illustrated in the accompanying figure and described elsewhere. In particular, the subroutine receives an attribute value from a server, stores the value if appropriate (e.g., in a cache or long-term storage), processes additional received information associated with the value if appropriate, and processes any conditions related to the received value. The subroutine begins in step 2205 where it receives an indication of a received attribute value. The subroutine then continues to step 2210 to determine if the attribute for which the value is received is registered, and if not continues
41 to step 2215 to send an eπor message to the server. If it is instead determined in step 2210 that the attribute is registered, the subroutine continues to step 2220 to determine if additional information about the value was received from the server. If so, the subroutine continues to step 2225 to execute the Process Additional Information About Received Value subroutine.
After step 2225, or if it was instead determined that additional information about the value was not received from the server, the subroutine continues to step 2230 to determine whether values for the attribute are being cached or otherwise temporarily stored. If so, the subroutine continues to step 2235 to cache the received value as well as any additional information received. Those skilled in the art will appreciate that the length of time used for caching can vary in a variety of ways, such as based on the type of information or for a particular attribute. After step 2235, or if it was instead determined that values are not being cached for the attribute, the subroutine continues to step 2240 to determine if values for the attribute are being stored in a long-term manner (e.g., being logged). If so, the subroutine continues to step 2245 to store the received value as well as any additional information received.
After step 2245, or if it was instead determined in step 2240 that values are not being stored for the attribute, the subroutine continues to step 2250 to determine if the value and/or any additional information about the value triggers any active stored conditions. In step 2255, if there are any such conditions, the subroutine continues to step 2260 to select the next such condition, beginning with the first. After step 2260, the subroutine continues to step 2265 to send a message to the entity associated with the condition (e.g., a client that created the condition) to indicate that the condition is satisfied. After step 2265, the subroutine continues to step 2270 to determine if the condition should now be removed. If so, the subroutine continues to step 2275 to remove the
42 condition, and if not the subroutine continues to step 2280 to determine if the condition should now be deactivated. If so, the subroutine continues to step 2285 to deactivate the condition. After steps 2275 or 2285, or if it was instead determined in step 2280 that the condition is not to be deactivated, the subroutine continues to step 2290 to deteπnine if there are more triggered conditions. If so, the subroutine returns to step 2260 to select the next such condition. After step 2215, or if it was instead determined in step 2255 that there were not any triggered conditions or in step 2290 that there were no more triggered conditions, the subroutine continues to step 2295 and returns.
In the illustrated embodiment, attribute values are received by the characterization module from servers either when the characterization module requests a new value from the server or when the server pushes a new value to the characterization module. In some embodiments in which a server has previously sent an attribute value to the characterization module in response to a request, the server may later send updated values for the attribute to the characterization module without a later request from the characterization module, such as if a more accurate or updated value is obtained by the server. In addition, in other embodiments servers could provide other types of information that could be received and processed by the characterization module. In particular, a server could provide a variety of types of meta-information about attribute values to the characterization module, such as information about a technique used to generate a value or an indication that a new value is available without sending the value until requested.
Figure 23 is a flow diagram of an embodiment of the Process Additional Information About Received Value subroutine 2225, as illustrated in the accompanying figure and described elsewhere. As illustrated and discussed elsewhere, a variety of types of information related to attribute values (e.g., uncertainty or accuracy information, a
43 timestamp of when the value was created or supplied or was most accurate, an indication that the value is a constant, indications of restrictions on whether the availability of the attribute instance or of the particular value should be available to any or to specified CCs, data type, units, a format version, a name, any generic attribute property supplied by the CS, etc.) can be received from CSes, can be used by the CM to deteπnine whether and how to supply the values to CCs, can be supplied to CCs, and can be used by CCs when processing the received attribute values. For example, units as indicated below could be specified.
In addition, uncertainty of an attribute value can be indicated in a variety of ways. An example of an uncertainty specification is as follows. For each attribute instance there is a finite likelihood that the real quantity being measured is not the same as the value being expressed. For example, the speedometer of a car may show 30 mph when the "true" instantaneous speed is 32.56 mph. There are numerous factors that may give rise to these discrepancies, including the following: precision of measuring apparatus, conversion of continuous quantities to discrete values in the measurement process, random fluctuations, temporal variation, systematic eπors, and measurement
44 latency. Since different measured quantities have different sources of uncertainty, it is impossible to foresee and account for each individually. It is therefore helpful to express the overall effects with a general characterization of uncertainly. One type of uncertainty values represent the cumulative effects of all possible discrepancy sources. These uncertainty values may conform to a single, universal definition so that attribute mediators and clients can make effective use of them. Thus, the following definition of uncertainty, which is based upon the definition of standard deviation for random fluctuations about a mean value, could be used for numeric values:
For an attribute instance value, μ, the associated uncertainty, σ, shall represent the likelihood that the following condition has a 68% probability of being true: μtme ~ o- ≤ μ ≤ μtnle + σ
Where μtrue represents the "true" value that the attribute represents.
As with uncertainly, a value timestamp can be indicated in a variety of ways. An example of a timestamp specification is as follows. Attribute values may be thought of as representations of a particular quantity at a point in time. Often this time is not proximate to that of use, so it can be useful to provide the proper timestamp along with the value. One version of a timestamp is defined as follows:
The timestamp represents the moment at which the associated value would have been valid had it been measured directly at that moment. This definition results in some attributes having timestamps that do not coπespond to the time at which their values were calculated. For instance, an attribute that represents the acceleration of the user can be calculated by looking at the change in velocity over a period of time. The necessary computations may further delay the availability of the acceleration value. This timestamp is thus specified to represent the time
45 at which the acceleration was "most" valid, which in this case could be the middle of the time period during which the velocity was measured.
Other types of additional information related to an attribute value can include history information (e.g., frequency of past use and past popularity information), an indication of the supplier of the attribute, indications of equivalent attributes (e.g., for mediation purposes or if a value for this attribute is not available at a later time), indications of clients that have registered for this attribute or consumed values for the attribute, descriptions of clients in order to track statistics, information to be used to evaluate characterization module efficiency and/or to facilitate process optimization, and indication of a verification of accuracy (e.g., from a third-party, or of the value generation technique that was used), a consumer rating or reputation based on input from other clients (e.g., efficiency or reliability), a cost to use the value (e.g., an actual price, or an amount of time needed to retrieve or process the value), future availability of the attribute value (e.g., how intermittent additional values may be), a version of the attribute, etc.
The subroutine illustrated in Figure 23 begins in step 2305 where additional information about an attribute value is received. The subroutine continues to step 2310 to determine if a timestamp is received, and if so continues to step 2315 to associate the timestamp information with the received value. After step 2315, or if it was instead determined that a timestamp is not received, the subroutine continues to step 2320 to determine if uncertainty or other accuracy information is received, and if so continues to step 2325 to associate that information with the received value. After step 2325, or if it was instead determined that uncertainty or other accuracy information is not received, the subroutine continues to step 2330 to determine if accuracy decay information (e.g., the rate at which the accuracy of the value changes over time) is received, and if so continues to step 2335 to associate that information with the received
46 value. After step 2335, or if it was instead determined that accuracy decay information is not received, the subroutine continues to step 2340 to determine if information indicating that the value is a constant is received, and if so continues to step 2345 to associate that information with the received value. After step 2345, or if it was instead determined that constant-related information is not received, the subroutine continues to step 2350 to determine if information about which clients are to have access to the supplied value is received, and if so continues to step 2355 to associate that information with the received value so that client access to the attribute value is so restricted. After step 2355, or if it was instead determined that client access information is not received, the subroutine continues to step 2360 to associate any other received additional information with the received value, and then continues to step 2360 and returns. Those skilled in the art will appreciate that the various types of additional information can be associated with the received value in a variety of ways, such as by using a data structure to represent a received value that includes elements for the various types of associated information.
Figure 24 is a flow diagram of an embodiment of the Mediate Available Values subroutine 2400, as illustrated in the accompanying figure and described elsewhere. As illustrated and discussed elsewhere, a variety of different types of mediators can be defined and specified. For example, some mediators include the following.
47
Those skilled in the art will appreciate that a variety of other mediators could similarly be used, including using the previously used value or a default value. In addition, other techniques could also be used, such as indicating that no value is available, asking a user to choose between available values or to provide additional instructions, repeatedly trying to obtain an appropriate value, attempt to identify new possible sources or a new mediation mechanism or technique, etc.
The subroutine begins at step 2405 where an indication of the values available for the mediation are received. The subroutine then continues to step 2410 to deteπnine if a requester of the mediated value indicated a mediator to be used, and if so continues to step 2415 to select that mediator. If it is instead determined that the requester did not indicate a mediator to be used, the subroutine continues to step 2420 to determine if a supplier of one or more of values being mediated indicated a mediator to be used, and if so continues to step 2425 to select that mediator. If it is instead determined that a supplier did not indicate a mediator to be used, the subroutine continues to step 2430 to deteπnine if a default mediator is available, and if so continues to step 2435 to select that mediator. If it is instead determined that a default mediator is not available, the subroutine continues to step 2440 to determine the
48 mediators that are available to be used and then in step 2445 selects one of the available mediators. After steps 2415, 2425, 2435 or 2445, the subroutine continues to step 2450 to apply the selected mediator to the available values in order to select one or the available values or to generate a related value based on the available values. The subroutine then continues to step 2455 to return the mediated value, and returns. Those skilled in the art will appreciate that in other embodiments mediators could be identified and/or obtained in other manners, such as by being specified by third-parties that are not acting as a client, server, or characterization module.
Figure 25 is a flow diagram of an embodiment of the Pull Attribute Value From Server subroutine 2160, as illustrated in the accompanying figure and described elsewhere. In particular, the subroutine begins in step 2505 where an indication of a request for an attribute instance value is received. The subroutine then continues to step 2510 to determine if an ID for the request has been received. If not, the subroutine continues to step 2515 to generate a unique request ID. After step 2515, or if it was instead determined that an ID for the request has been received, the subroutine continues to step 2520 to request an attribute value from the server registered for the attribute instance, including the unique ID with the request. The unique ID is included so that any circular references during the requests can be detected, as explained in greater detail below. The subroutine next continues to step 2525 to receive in response an attribute value and optionally additional information, or to instead receive an eπor message. In step 2530, the received information or eπor message is sent to the requester of the value, and in step 2595 the subroutine returns.
Figure 26 is a flow diagram of an embodiment of the Push Attribute Value To Client subroutine 2140, as illustrated in the accompanying figure and described elsewhere. In particular, in the first
49 step the subroutine receives an indication of an attribute instance value and of a client to receive that value. The subroutine then continues to the second step to determine if additional information is associated with the indicated value, and if so retrieves that additional information. After retrieving the additional information, or if it was instead determined that there is no associated additional information, the subroutine next sends the value and any available additional information to the indicated client. The subroutine then returns.
Figure 27 is a flow diagram of an embodiment of the Context Client routine 2700. The routine receives messages from the CM as well as instructions from users, sends messages to the CM, and processes received messages and instructions. In some embodiments, a CC could indicate to the CM an interest in receiving values for one or more attributes, but not begin to otherwise execute (e.g., by dynamically loading code) until a value for one of the attributes is supplied by the CM. The routine begins in step 2702 where the CC registers with the CM. The routine then continues to step 2704 where the CC optionally registers for one or more attributes of interest with the CM. The routine continues to step 2706 where it receives an indication of an instruction or of information received. The routine continues to step 2708 where it determines whether information or an instruction has been received.
If information has been received, the routine continues to step 2710 to determine if information about the satisfaction of a notification request has been received, and if so continues to step 2712 to process the notification satisfaction information and to take appropriate action. If notification information has not been received, the routine continues to step 2714 to determine if information about the satisfaction of a condition has been received, and if so continues to step 2716 to process the condition satisfaction information and to take appropriate action. If condition information has not been received, the routine
50 continues to step 2718 to determine if a status message from the CM has been received (e.g., that a particular CS or a particular attribute has been unregistered), and if so continues to step 2720 to process the status information and to take appropriate action. If a status message has not been received, the routine continues to step 2722 to deteπnine if an attribute value has been pushed to the CC. If not, the routine continues to step 2724 to process the other information that has been received, and if so continues to step 2726 to determine if additional information related to the value has also been received. If additional information has been received, the subroutine continues to step 2730 to process the value and the additional information, and if not the routine continues to step 2728 to process the value.
If it was instead determined in step 2708 that an instruction was received, the routine continues to step 2740 to determine if the instruction is to send a notification-related request (e.g., to establish a request) to the CM, and if so the routine continues to step 2742 to send the request. If the instruction is not to send a notification-related request, the routine continues to step 2744 to determine if the instruction is to send a condition-related request (e.g., to temporarily suspend an existing condition), and if so the routine continues to step 2746 to send the request to the CM. If a condition-related request was not received, the routine continues to step 2748 to determine if an instruction to send an attribute value request was received, and if so continues to step 2750 to request the attribute value from the CM. In addition, other information could also be specified with the request, such as a mediator to be used if there are multiple available values or an indication of a particular supplier from whom to receive the value. After step 2750, the routine then continues to step 2752 to wait for the requested value or an eπor message. If it is determined in step 2754 that a value was received, the routine continues
51 to step 2726, and if not the routine continues to step 2756 to process the eπor message.
If it was instead determined in step 2748 that the instruction was not to send an attribute value request, the routine continues to step 2758 to determine if the instrument was to send another type of request. If so, the routine continues to step 2760 to send the request, and if not the routine continues to step 2762 to perform another instruction as indicated. A variety of other types of requests could be sent to the CM, such as to shutdown the CM or a CS, to launch a CS, to specify a default mediator for the CM, etc. After steps 2712, 2716, 2720, 2724, 2728, 2730, 2742, 2746, 2756, 2760, or 2762, the routine continues to step 2770 to determine whether to continue. If not, the routine continues to step 2772 to unregister the registered attributes for the CC, next to step 2774 to unregister the client with the CM, and then to step 2795 to end. If it is instead determined to continue, the routine continues to step 2776 to determine whether any cuπently registered attributes should be unregistered, and if so continues to step 2778 to unregister the attributes with the CM. After step 2778, or if it was determined not to unregister any attributes, the routine continues to step 2780 to determine whether to register any additional attributes. If so, the routine continues to step 2782 to register for one or more attributes of interest. After step 2782, or if it was determined not to register any additional attributes, the routine returns to step 2706.
Figure 28 is a flow diagram of an embodiment of the Context Server routine 2800. The routine receives messages from the CM as well as instructions from users, sends messages to the CM, and processes received messages and instructions. In some embodiments, a CS could indicate to the CM an ability to supply values for one or more attributes, but not begin to otherwise execute (e.g., by dynamically loading code) until a value is requested. The routine begins in step 2802
52 where the CS registers with the CM. The routine then continues to step 2804 where it registers with the CM for one or more attributes for which the CS has the ability to supply values. The routine continues to step 2806 where it receives an indication of an instruction or of information received. The routine continues to step 2808 where it determines whether information or an instruction has been received.
If an instruction was received, the routine continues to step 2810 to determine if the instruction is to send a notification-related request (e.g., to establish a request) to the CM, and if so the routine continues to step 2812 to send the request. If the instruction is not to send a notification-related request, the routine continues to step 2814 to determine if the instruction is to send a condition-related request (e.g., to temporarily suspend an existing condition), and if so the routine continues to step 2816 to send a request to the CM. If a condition-related request was not received, the routine continues to step 2818 to determine if the instruction was to send another type of request. If so, the routine continues to step 2820 to send the request, and if not the routine continues to step 2822 to perform another instruction as indicated.
If it was instead determined in step 2808 that information has been received, the routine continues to step 2830 to determine if information about the satisfaction of a notification request has been received, and if so continues to step 2832 to process the notification information and to take appropriate action. If notification information has not been received, the routine continues to step 2834 to determine if information about the satisfaction of a condition has been received, and if so continues to step 2836 to process the condition information and to take appropriate action. If condition information has not been received, the routine continues to step 2838 to determine if a status message from the CM has been received (e.g., that a particular CC has registered), and if so
53 continues to step 2840 to process the status information and to take appropriate action.
If a status message has not been received, the routine continues to step 2850 to determine if a pull attribute value request has been received by HIQ CS, along with an ID that uniquely identifies the request. The unique ID in this example embodiment is used to allow the context server to determine if a circular reference exists when determining the requested attribute value. For example, consider the situation in which CS 1 is registered to supply values for attribute 1, and CS 2 is registered to supply values for attribute 2. In addition, imagine that the calculation of the value for attribute 1 depends on the value for attribute 2. Thus, when CS 1 receives a pull request to supply the value for attribute 1, it requests the value for attribute 2 from the CM, which in turn request the value from CS 2. After receiving the value for attribute 2 from CS 2 via the CM, CS 1 can then calculate the value for attribute 1 and satisfy the initial request by supplying the value to the CM. If, however, CS 2 also depends on the value for attribute 1 in order to calculate the value for attribute 2, a circular reference may exist. In that situation, after CS 1 requests the value of the attribute 2 in order to calculate the value for attribute 1, CS 2 may in turn request the value of attribute 1 from CS 1 (via the CM), thus creating a loop such that neither attribute value can be calculated. In order to detect such circular references, the example routine uses a unique ID passed along with attribute value requests. Alternate equivalent ways of identifying circular references could instead be used, or no such processing could be performed.
In the illustrated embodiment, if it is determined that a pull attribute value request has been received by the CS, the routine continues to step 2852 to determine if the received request ID matches a temporarily stored ID for the same attribute value. If so, a circular reference exists,
54 and the routine continues to step 2853 to return an eπor message. If the ID does not match, the routine continues to step 2854 to determine the input information needed (if any) to calculate the requested value. The routine then continues to step 2856 to determine if the value of another attribute is needed. If so, the routine in step 2858 temporarily stores an indication of the attribute whose value is being calculated and of the ID. The routine then continues to step 2860 to request the attribute value needed, including the received ID. In step 2862, the routine waits for the requested value or eπor message. After receiving the value or eπor message, the routine continues to step 2864 to deteπnine if more attribute values are needed, and if so to return to step 2860. After all of the needed attribute values have been received, the routine continues to step 2866 to remove the temporarily stored attribute value and ID, and then continues to step 2868 to determine if any eπors were received for needed attribute values such that sufficient information to calculate the value requested of the CS is not available. If so, the routine continues to step 2853 to signal an eπor.
If there are no such eπors, or if it was instead determined in step 2856 that no attribute values were needed, the routine contmues to step 2870 to determine if any sensor values or other input information is needed to calculate the value requested of the CS. If so, the routine continues in steps 2872 through 2876 to request and receive the sensor or other input information that is needed. The routine then continues to step 2878 to determine if any eπors were received for needed sensor values or other input information such that sufficient information to calculate the value request of the CS is not available. If so, the routine continues to step 2853. If no such eπors occuπed, or if it was instead determined in step 2870 that no sensor or other input information was needed, the routine continues to step 2887 to calculate the requested attribute value based on the received information. The routine then continues to step
55 2888 to optionally calculate additional information about the value that characterizes it (e.g., a timestamp or uncertainty information), and then continues to step 2889 to send the value and any additional information to the CM to satisfy the request.
If it was instead determined in step 2850 that an attribute value request was not received, the routine continues to step 2880 to determine if sensor or other input information has been pushed to the CS. If not, the routine continues to step 2882 to process the other information received, and if so continues to step 2884 to determine if the CS has sufficient information to calculate one or more attribute values based on the received input information and other stored information. If so, the routine continues to step 2887 to calculate those values and to push them to the CM, and if not the routine continues to step 2886 to store the sensor information for later use. In alternate embodiments, the CS could request other information that is needed to calculate an attribute value when sensor or other input information is received, rather than waiting until all necessary information has been received.
After steps 2812, 2816, 2820, 2822, 2832, 2836, 2840, 2853, 2882, 2886 or 2889, the routine continues to step 2890 to determine whether to continue. If not, the routine continues to step 2891 to unregister the registered attributes for the CS, next to step 2892 to unregister the server with the CM, and then to step 2899 to end. If it was instead determined to continue, the routine continues to step 2893 to determine whether any currently registered attributes should be unregistered, and if so continues to step 2894 to unregister the attributes with the CM. After step 2894, or if it was determined not to unregister any attributes, the routine continues to step 2896 to deteπnine whether to register any additional attributes. If so, the routine continues to step 2897 to register for one or more attributes of interest. After step 2897, or if it
56 was determined not to register any additional attributes, the routine returns to step 2806.
As discussed previously, a variety of eπor messages can be used by the CS, CM, and CC. Example eπor messages include the following.
Attribute already exists - Occurs when a CS attempts to create an attribute instance that already exists.
Attribute does not exist - Occurs when the CM receives a request for an attribute that does not exist.
Attribute instance does not exist - Occurs when the CM receives a request for a specific instance of an attribute which is not registered.
Attribute mediator does not exist - Occurs when a request for an attribute mediator could not be fulfilled because the name does not correspond to an existing attribute mediator.
Attribute unavailable - Occurs when a CS determines that it cannot satisfy a request for reasons other than when an attribute upon which it depends returns an error.
CS already running - A request to launch a CS could not be completed because the CS was already running.
CS does not exist - A request has been made for a CS that has not registered. CS not found - A request to launch a CS could not be completed because the CS was not found.
CS unavailable - A request was made to a CS that cannot respond.
Condition already exists - Occurs when a client attempts to create a condition with a name that is already in use.
Condition does not exist - A request has been made for a non-existent condition.
Event already exists - Occurs when a client attempts to create an event with a name that is already in use.
Event does not exist - A request has been made for a non-existent event.
Inconsistent attribute data type - Occurs when a CS registers or provides an attribute instance for an attribute that already exists that has a different data type.
Request timed out - Occurs when the timeout has been exceeded and the request cannot be satisfied.
When eπor messages are received in some embodiments, the module receiving the eπor may make the request again but specify that diagnostic
57 information is to be received, thus assisting in identifying the source of the eπor.
From the foregoing it will be appreciated that, although specific embodiments have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims. In addition, while certain aspects of the invention are presented below in certain claim forms, the inventors contemplate the various aspects of the invention in any available claim form. For example, while only one some aspects of the invention may cuπently be recited as being embodied in a computer-readable medium, other aspects may likewise be so embodied. Accordingly, the inventors reserve the right to add additional claims after filing the application to purse such additional claim forms for other aspects of the invention.
58

Claims

CLAIMSWe claim:
1. A computer-implemented method for providing mediated information about a cuπent state that is modeled with multiple state attributes, comprising: receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled cuπent state; receiving from a second source an indication of a second value for the indicated state attribute; and after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
2. The method of claim 1 wherein the method is performed in a wearable computer, and wherein the current state is the cuπent state of the user of the wearable computer, and wherein the wearable computer has a plurality of input sensors and executes a plurality of state server modules to supply values for the state attributes, and wherein the wearable computer executes a plurality of state client modules to receive and process values for the state attributes, and wherein the wearable computer executes an intermediate module to facilitate exchange of state attribute values, and wherein the method further comprises: under control of each of the executing state server modules, repeatedly monitoring the modeled cuπent state of the user by, receiving information from at least one of the input sensors; and
59 generating a cuπent value for at least one state attribute of the user from the received information; under control of each of the executing state client modules, sending to the intermediary module an indication of a state attribute of the user of interest; and under control of the intermediary module, for each executing state client module, receiving from the state client module the indication of the state attribute; receiving from at least one of the state server modules a generated cuπent value for the indicated state attribute; and sending an appropriate value for the indicated state attribute to the state client module by, when a single generated cuπent value for the indicated state attribute is received, sending the single value to the state client module; when multiple generated cuπent values for the indicated state attribute are received from a single state server module, sending a most recently generated of the multiple received values to the state client module; and when multiple generated cuπent values for the indicated state attribute are received from multiple state server modules, sending to the state client module one of the multiple received values selected based on accuracy and recency of the selected value.
3. The method of claim 2 wherein the sending of the appropriate values to the state client modules is in response to the receiving of the indication of the state attribute from the state client module.
60
4. The method of claim 2 wherein the sending of the appropriate values to the state client modules is in response to the receiving of the indication of the state attribute from the state client module.
5. The method of claim 4 including, after the receiving of the indication of the state attribute and before the sending of the appropriate value in response: determining whether any previously received generated values for the indicated state attribute are sufficiently accurate and recent to be appropriate; and when it is determined that no previously received generated values for the indicated state attribute are sufficiently accurate and recent to be appropriate, requesting the at least one state server module to supply an updated generated value for the indicated state attribute.
6. The method of claim 2 wherein each state client module has a user and including, for each state client module: receiving the sent appropriate value from the intermediary module; and presenting information to the user of the state client module based on the receiving of the sent appropriate value.
7. The method of claim 2 wherein the state server modules additionally generate cuπent values for additional state attributes of a cuπent state other than for the user, and wherein the intermediary module additionally sends appropriate values for the additional state attributes to state client modules based on received indications of the additional state attributes from the state client modules.
61
8. The method of claim 2 wherein the selecting of a received generated value based on the accuracy and the recency of the value includes determining whether the value has an associated effective time that is less than an indicated recency threshold and deteimήiing whether the value has an associated accuracy indication that is greater than an indicated accuracy threshold.
9. The method of claim 1 wherein the indicated state attribute represents information about a user of the computer.
10. The method of claim 9 wherein the represented information reflects a modeled mental state of the user.
11. The method of claim 1 wherein the indicated state attribute represents information about a physical environment of a user of the computer.
12. The method of claim 1 wherein the indicated state attribute represents information about a cyber-environment of a user of the computer.
13. The method of claim 1 wherein the indicated state attribute represents information about the computer.
14. The method of claim 1 wherein the indicated state attribute represents a cuπent prediction about a future state.
15. The method of claim 14 wherein the client indication is an indication of an interest in receiving values for the indicated state
62 attribute, and wherein the produced mediated value is pushed to the client in response to the receiving of at least one of the first and second values.
16. The method of claim 14 wherein the client indication is a request for the value for the indicated state attribute, and including requesting the first and second sources to supply the first and second values in response to the receiving of the request.
17. The method of claim 1 wherein the client indication is a request for the value for the indicated state attribute, and wherein the sending of the produced mediated value is in response to the receiving of the request.
18. The method of claim 1 wherein the client indication is a request for the value for the indicated state attribute, and including, after receivmg the request from the client and before the sending of the produced mediated value: determή ing for each of the first and second values whether the value satisfies an indicated criteria; and when it is determined that neither of the first and second values satisfy the indicated criteria, requesting at least one of the first and second sources to supply a value for the indicated state attribute that satisfies the indicated criteria; receiving in response to the requesting at least one additional value for the indicated state attribute that satisfies the indicated criteria; and producing the value to be sent to the client by mediating between the received additional values.
63
19. The method of claim 18 wherein the criteria is indicated by the client.
20. The method of claim 18 wherein the criteria for the value is based on precision of the value.
21. The method of claim 18 wherein the criteria for the value is based on recency of generation of the value.
22. The method of claim 18 wherein the criteria for the value is based on recency of receipt of the value.
23. The method of claim 18 wherein the criteria for the value is based on accuracy of the value.
24. The method of claim 1 wherein the available values include a plurality of additional values for the indicated state attribute that are received from a plurality of sources.
25. The method of claim 1 wherein the produced mediated value is the first value, and wherein the sending of the produced mediated value to the client includes sending an indication of the source from which the produced mediated value was received.
26. The method of claim 1 wherein the sending of the produced mediated value to the client includes sending an indication of a mediator type used for the mediating.
27. The method of claim 1 including producing the mediated value to be sent by mediating between the available values for
64 the indicated state attribute based on an indication from a mediation mechanism.
28. The method of claim 27 wherein the client is the first source, and wherein after receiving the sent mediated value the client uses the received value to produce a new value for one of the state attributes.
29. The method of claim 27 wherein the mediation mechanism includes a group of instructions to be executed to perform the mediating.
30. The method of claim 29 including loading and executing the group of instructions in response to receiving of the client indication.
31. The method of claim 27 wherein the first source includes a group of instructions to be executed to produce the first value, and including loading and executing the group of instructions in response to receivmg of the client indication so that the first source can produce the first value.
32. The method of claim 27 including mamtaining a rating for each source based on at least one indicated rating factor, and wherein the mediation mechanism indicates to select an available value from a source with a highest rating.
33. The method of claim 27 wherein the available values for the indicated state attribute have a designated order, and wherein the mediation mechanism indicates to select an available value that is first in the designated order.
65
34. The method of claim 27 wherein the available values for the indicated state attribute have a designated order, and wherein the mediation mechanism indicates to select an available value that is last in the designated order.
35. The method of claim 27 wherein the mediation mechanism indicates to select a generated average of the available values.
36. The method of claim 27 including, before the receiving of the first and second values, receiving a registration message from each of the first and second sources indicating an availability to supply values for the indicated state attribute, and wherein the mediation mechanism indicates to select a value supplied by a source whose registration message was first received.
37. The method of claim 27 wherein the mediation mechanism indicates to indicate each of the available values to a user and to select the produced mediated value based on selection by the user of one of the indicated available values.
38. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a source whose values are most consistent over time.
39. The method of claim 27 wherein the available values have multiple associated properties, and wherein the mediation mechanism indicates to select an available value based on at least one indicated property.
66
40. The method of claim 27 wherein the mediation mechanism indicates to select the available value that is most recently received.
41. The method of claim 27 wherein the mediation mechanism indicates to select the available value that is most recently produced by the source from which the value was received.
42. The method of claim 27 wherein the mediation
mechanism indicates to select an available value that is received from a source with a highest value resolution capability.
43. The method of claim 27 wherein the mediation mechanism indicates to select an available value that is received from a source with a highest value precision capability.
44. The method of claim 27 wherein the mediation mechanism indicates to select a generated weighted average of the available values using an indicated weighting mechanism.
45. The method of claim 27 wherein the mediation mechanism mdicates to select a generated aggregation of the available values.
46. The method of claim 27 wherein the mediation mechanism indicates to select a most frequently occuπing value among the available values.
47. The method of claim 27 including, before the receiving of the first and second values, requesting the first and second
67 sources to supply values for the indicated state attribute, and wherein the mediation mechanism indicates to select a value received first in response to the requesting.
48. The method of claim 27 wherein each of the available values has an associated confidence factor indicating a likelihood of accuracy of the value, and wherein the mediation mechanism indicates to select the available value with the highest associated confidence factor.
49. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a source that is certified by a third party.
50. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a source that is in a group of at least one prefeπed source.
51. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a most recently generated source.
52. The method of claim 27 including receivmg from the client an indication of a source, and wherein the mediation mechanism indicates to select an available value received from the indicated source.
53. The method of claim 27 including selecting ike mediation mechanism to assist in the mediating based on feedback from previous uses of the mediation mechanism.
68
54. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on cost of the mediation mechanism.
55. The method of claim 27 wherein the mediation mechanism is a default mediation mechanism for the indicated state attribute.
56. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on a type of the client.
57. The method of claim 27 including selecting the mediation mechamsm to assist in the mediating based on an indication received from the client.
58. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on an indication received from at least one of the sources of the available values.
59. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on an indication received from a third-party.
60. The method of claim 27 including receiving from the client an indication of another state attribute and an indication that a source for a value for the indicated another state attribute is to be the same source as for the produced mediated value for the indicated state attribute, and wherein a mediation mechanism indicates to select a value
69 for the indicated another state attribute that is received from the same source so that the selected value can be sent to the client.
61. The method of claim 27 including receiving from the first source an indication of a group of at least one authorized client, and wherein the first value received from the first source is used as one of the available values for the mediating only if the client is one of the authorized clients.
62. The method of claim 27 including generating at least one of the available values for the indicated state attribute.
63. The method of claim 27 including receiving a group of instructions for the mediation mechanism that when executed produces the indication from the mediation mechanism.
64. The method of claim 1 wherein receiving of the sent mediated value by the client prompts the client to present information to a user of the client.
65. The method of claim 1 including receiving another value for the indicated state attribute after the sending of the mediated value, and when it is determined that the another value is more appropriate than the sent mediated value, sending the another value to the client.
70
66. A computer-readable medium whose contents cause a computing device to provide mediated information about a cuπent state that is modeled with multiple state attributes, by: receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled cuπent state; receiving from a second source an indication of a second value for the indicated state attribute; and after an indication for a value for the indicated state attribute, producing a mediated value for the indicated state attribute by mediating between available values for the indicated state attribute including at least the first and second values.
67. A computer-readable generated data signal transmitted via a transmission medium, the generated data signal having encoded contents that cause a computer system to provide mediated information about a cuπent state that is modeled with multiple state attributes, by: receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled cuπent state; receiving from a second source an indication of a second value for the indicated state attribute; and after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
71
68. A computer system for providing mediated information about a cuπent state that is modeled with multiple state attributes, comprising: a first module capable of receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled cuπent state, and of receiving from a second source an indication of a second value for the indicated state attribute; and a second module capable of, after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
69. A method in a computer for providing information about a cuπent state that is modeled with multiple attributes, the method comprising: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state; after receiving an indication from a client for a value of the one attribute, supplying to the client a value for the one attribute received from the first source; after the supplying of the value received from the first source, receiving from a second source an indication of an ability to supply values for the one attribute; after receiving an indication from the client for a value of the one attribute, supplying to the client a value for the one attribute based on values received for the one attribute from the first and second sources; after the supplying of the value based on the values received for the one attribute from the first and second sources, receiving from the
72 first source an indication of an inability to supply values for the one attribute; and after receiving an indication from the client for a value of the one attribute, supplying to the client a value for the one attribute received from the second source.
70. The method of claim 69 wherein the method is performed in a wearable computer, and wherein the cuπent state that is modeled is a cuπent state of a user of the wearable computer, and wherein the wearable computer executes a plurality of state server modules (SSMs) to supply values for the state attributes, and wherein the wearable computer executes a plurality of state client modules (SCMs) to receive and process values for the state attributes, and wherein the wearable computer executes an intermediary module to facilitate exchange of state attribute values, the method further comprising: under control of each of the executing SSMs, sending to the intermediary module a registration message indicating a cuπent availability of the SSM to supply values for an indicated one of the state attributes; under control of a first of the executing SCMs, sending to the intermediary module a registration message indicating a cuπent desire of the first SCM to receive values for a specified one of the state attributes; and under control of the intermediary module, receiving the sent registration messages from the SSMs and the first SCM; supplying a first value for the specified state attribute to the first SCM by determining based on the received registration messages at least one of the SSMs that is cuπently available to supply
73 values for the specified state attribute and by sending to the first SCM a value received from one of the determined SSMs; receiving an unregistration message from each of the determined SSMs indicating a cuπent unavailability to supply values for the specified state attribute; receiving from one of the SSMs a registration message indicating a cuπent availability to supply values for the specified state attribute; and supplying a second value for the specified state attribute to the first SCM by determining based on the received registration and unregistration messages that the one SSM is cuπently available to supply values for the specified state attribute and by sending to the first SCM a value received from the one SSM, so that the first SCM receives values for the specified state attribute from whichever SSM is cuπently available to supply values for the specified state attribute.
71. The method of claim 70 wherein the supplying of each of the first and second values to the first SCM is in response to a request received from the first SCM for a value of the specified state attribute.
72. The method of claim 70 including, under the control of the intermediary module: after the receiving of the unregistration messages from the determined SSMs and before the receiving of the registration message from the one SSM, receiving a request for a value of the specified state attribute; and
74 indicating that the value of the specified state attribute is not cuπently available.
73. The method of claim 70 wherein the one SSM is one of the determined SSMs.
74. The method of claim 70 including, under the control of the first SCM: receiving the supplied values from the intermediary module; and presenting information to a user of the first SCM based on the receiving of the supplied values.
75. The method of claim 70 including, under the control of the intermediary module: for each of the executing SCMs, receiving a registration message from the SCM indicating a cuπent desire to receive values for at least one of the state attributes; and in response to the received registration message, supplying values to the SCM for the state attributes indicated in the received registration message from the SCM.
76. The method of claim 70 wherein at least some of the SSMs are available to supply values for additional state attributes of a cuπent state other than for the user, and wherein the intermediary module additionally sends values for the additional state attributes to SCMs based on received registration messages from those SCMs indicating a cuπent desire to receive values for at least one of the additional state attributes.
75
77. The method of claim 69 wherein the receiving of a value for the one attribute from the first source includes receiving descriptive information about the received value.
78. The method of claim 77 wherein the descriptive information includes a time at which the received value is most accurate.
79. The method of claim 77 wherein the descriptive information includes a confidence factor indicating a likelihood of accuracy of the received value.
80. The method of claim 77 including supplying the descriptive information about the received value to the client.
81. The method of claim 69 wherein the supplying of a value for the one attribute to the client includes supplying an indication of the source from which the supplied value was received.
82. The method of claim 69 wherein a received indication from the client for the value of the one attribute additionally include an indication of a source for the value, and wherein the value of the one attribute that is supplied to the client in response is received from the indicated source.
83. The method of claim 69 wherein the supplied value based on the values received from the first and second sources is a mediated value.
76
84. The method of claim 69 including, before supplying a value to the client: determining whether the value to be supplied satisfies a criteria indicated for the requested value; and when it is determined that the value does not satisfy the indicated criteria, requesting at least one of the first and second sources to supply a value for the one attribute that satisfies the indicated criteria; receiving in response to the requesting at least one additional value for the one attribute that satisfies the indicated criteria; and supplying to the client a value for the one attribute based on the received additional values.
85. The method of claim 69 including storing values for attributes that are received from sources so that the stored values can be later supplied to clients.
86. The method of claim 69 wherein the one attribute represents information about a user of the computer.
87. The method of claim 69 wherein the information about the user of the computer indicates a modeled mental state of the user.
88. The method of claim 69 wherein the one attribute represents information about the computer.
77
89. The method of claim 69 wherein the one attribute represents information about a physical environment of a user of the computer.
90. The method of claim 69 wherein the one attribute represents information about a cyber-environment of a user of the computer.
91. The method of claim 69 including : after the supplying of the value that is received from the second source, receiving from the second source an indication of an inability to supply values for the one attribute; and after receiving an indication from the client for a value of the one attribute, indicating to the client that the value of the one attribute is not cuπently available.
92. The method of claim 69 including: after the supplying of the value that is received from the second source, receiving from the second source an indication of an inability to supply values for the one attribute; and after receiving an indication from the client for a value of the one attribute, identifying a criteria that a value to be supplied to the client is to satisfy; determining that a value of the one attribute which satisfies the identified criteria is not available; and supplying to the client a value of the one attribute which does not satisfy the identified criteria.
78
93. The method of claim 69 including: after the supplying of the value that is received from the second source, receiving from the second source an indication of an inability to supply values for the one attribute; and after receiving an indication from the client for a value of the one attribute, generating a value of the one attribute; and supplying to the client the generated value.
94. The method of claim 69 including, after receiving an indication from the client for a value of a second indicated attribute, supplying to the client a value for the second attribute.
95. The method of claim 94 wherein the supplied value for the second attribute is received from the first source.
96. The method of claim 69 including, after receiving an indication from a second client for a value of an attribute, supplying to the second client a value for the attribute.
97. The method of claim 96 wherein the attribute whose value is indicated by the second client is the one attribute.
98. The method of claim 69 wherein the providing of the information about the modeled cuπent state is performed by a first intermediary module, and including: receiving from a second intermediary module an indication of a desire to perform the providing of the information about the modeled cuπent state; and
79 in response to the received indication from the second intermediary module, permitting the second intermediary module to perform future providing of the information about the modeled cuπent state.
99. The method of claim 98 wherein the permitting includes supplying to the second intermediary module an indication of each source which is cuπently indicated to have an ability to supply values for at least one of the state attributes, so that the second intermediary module can receive future indications of abilities and inabilities to supply values for state attributes from sources.
100. The method of claim 99 including: before the receiving of the indication from the second intermediary module, receiving from each of multiple clients an indication of a desire to receive at least one value for a specified state attribute; and in response to the received indication from the second intermediary module, supplying to the second intermediary module an indication of each client from whom an indication of a desire to receive at least one value for a specified state attribute has been received, so that the second intermediary module can receive future indications of desires to receive values for state attributes from clients,
101. The method of claim 99 including, under control of the second intermediary module, receiving the supplied indications of the sources which are cuπently indicated to have an ability to supply values for at least one of the state attributes and notifying the indicated sources to supply the future indications to the second intermediary module.
80
102. The method of claim 98 wherein the permitting includes notifying each source which is cuπently indicated to have an ability to supply values for at least one of the state attributes to supply future indications of abilities and inabilities to supply values for state attributes to the second intermediary module.
103. The method of claim 98 including: before the receiving of the indication from the second intermediary module, receiving from each of multiple clients an indication of a desire to receive at least one value for a specified state attribute; and in response to the received indication from the second intermediary module, notifying each client from whom an indication of a desire to receive at least one value for a specified state attribute has been received to supply future indications of desires to receive values for state attributes to the second intermediary module.
104. The method of claim 69 wherein the received indications from the first and second sources of the ability to supply values for the one attribute are registration messages.
105. The method of claim 104 wherein each of the received indications from the client for the value of the one attribute are requests, and including receiving from the client a registration message before receiving any of the requests, the registration message indicating an interest of the client in receiving values for the one attribute.
106. The method of claim 69 wherein security information for a source must be received before any values of state attributes are received from the source.
81
107. The method of claim 69 wherein security information for a client must be received before any values of state attributes are supplied to the client.
108. The method of claim 69 wherein the indications from he client for the value of the one attribute are based on an indication of a desire to receive values for the one attribute that is received before the receiving of the indications of ability and inability to supply values from the first and second sources, and wherein the supplying of the values to the client is in response to receiving of values for the one attribute from the first or second sources.
109. The method of claim 69 wherein the received indications from the client for the value of the one attribute are requests received from the client, and wherein the supplying of the values to the clients are in response to the receiving of the requests.
110. The method of claim 109 including: sending requests to the first or second sources for a value of the one attribute in response to the receiving of the requests from the clients; and receiving values for the one attribute from the first or second sources in response to the sent requests.
111. The method of claim 69 wherein the first source is at a location remote from the computer, and wherein the indications from the first source of the ability and the inability to supply values for the one attribute are received based on proximity of the computer to the location of the first source.
82
112. The method of claim 69 wherein the first source is software executing on the computer, and wherein the indications from the first source of the ability and the inability to supply values for the one attribute are received based on availability of input information to the first source.
113. The method of claim 69 wherein the providing of the information about the modeled cuπent state is performed by an operating system of the computer.
114. The method of claim 69 wherein the providing of the information about the modeled cuπent state is performed by a software module, and including, upon commencement of execution of the software module, commencing execution of multiple sources that are each to supply values for at least one of the state attributes.
115. The method of claim 114 wherein the multiple sources that are to be executed are determined based on previous received indications of ability to supply values for at least one state attribute.
116. The method of claim 69 wherein the state attributes are part of a predefined taxonomy of attributes.
117. The method of claim 69 wherein the state attributes are dynamically defined by sources who indicate an ability to supply values for the defined attributes.
118. The method of claim 69 including receiving from the client an indication of another state attribute and an indication that a source for a value for the indicated another state attribute is to be a same
83 source as for the supplied value for the one attribute, and selecting a value to be sent to the client for the another state attribute that is received from the same source.
119. The method of claim 69 including receiving from the first source an indication of a group of at least one authorized client, and wherein a value received from the first source is supplied to the client only if the client is one of the authorized clients.
120. The method of claim 69 wherein the first source includes a group of instructions to be executed to produce a value for the one attribute, and including loading and executing the group of instructions in response to the receiving of the indication from the client for a value of the one attribute, the loading and executing so that the first source can produce the first value.
121. The method of claim 69 wherein receiving of the supplied value by the client prompts the client to present information to a user of the client.
122. A computer-readable medium whose contents cause a computing device to provide information about a cuπent state that is modeled with multiple attributes, by: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state; after receiving an indication from a client for a value of the one attribute, supplying to the client a value for the one attribute received from the first source;
84 receiving from a second source an indication of an ability to supply values for the one attribute; after receiving an indication from the client for a value of the one attribute, supplying to the client a value for the one attribute based on values received for the one attribute from the first and second sources; receiving from the first source an indication of an inability to supply values for the one attribute; and after receiving an indication from the client for a value of the one attribute, supplying to the client a value for the one attribute received from the second source.
123. The computer-readable medium of claim 122 wherein the computer-readable medium is a memory of the computing device.
124. A computer-readable generated data signal transmitted via a transmission medium, the generated data signal having encoded contents that cause a computer system to provide information about a cuπent state that is modeled with multiple attributes, by: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state; after receiving an indication from a client for a value of the one attribute, supplying to the client a value for the one attribute received from the first source; receiving from a second source an indication of an ability to supply values for the one attribute; after receiving an indication from the client for a value of the one attribute, supplying to the client a value for the one attribute based on values received for the one attribute from the first and second sources;
85 receiving from the first source an indication of an inability to supply values for the one attribute; and after receiving an indication from the client for a value of the one attribute, supplying to the client a value for the one attribute received from the second source.
125. A computing device for providing information about a cuπent state that is represented with multiple attributes, comprising: an attribute mapping module that is capable of receiving from each of a first source and a second source an indication of an ability to supply values for an indicated one of the attributes of the cuπent state, and that is capable of later receiving from the first source an indication of an inability to supply values for the one attribute; an attribute value receiver module that is capable of receiving values for the one attribute from the first and second sources; and an attribute value supplier module that is capable of, after the indication is received from the first source of the ability to supply values for the one attribute and before the indication is received from the second source, supplying to a client a value for the one attribute received from the first source, after the indications are received from the first and second sources, supplying to the client a value for the one attribute based on values received for the one attribute from the first and second source; and after the indication is received from the second source and after the indication is received from the first source of the inability to supply values for the one attribute, supplying to a client a value for the one attribute received from the second source.
86
126. The computing device of claim 125 wherein the attribute mapping module, the attribute value receiver module, and the attribute value supplier module are components of an intermediary module executing in memory, and further comprising multiple sources and multiple clients executing in the memory.
127. A method in a computer for providing information about a cuπent state that is modeled with multiple state attributes, comprising: receiving from a first client an indication of an interest in receiving values for an indicated one of the state attributes of the modeled current state; receiving from a second client an indication of an interest in receiving values for another of the state attributes of the modeled cuπent state; and in response to receiving a value for the indicated one attribute from a first source, determining that the first client has an interest in receiving the received value; and supplying the received value to the first client.
87
128. A method of claim 127 wherein the computer is a wearable computer, and wherein the cuπent state is a cuπent state of a user of the wearable computer, and wherein the wearable computer executes a plurality of state server modules to supply values for the state attributes, and wherein the wearable computer executes a plurality of state client modules to receive and process values for the state attributes, and wherein the wearable computer executes an intermediary module to facilitate exchange of state attribute values, the method firrther comprising: under control of each of the executing state client modules, sending to the intermediary module a registration message indicating a cuπent desire to receive values for at least one indicated state attribute; under control of each of the executing state server modules, receiving information from at least one input sensor; generating a cuπent value for one of the state attributes based on the received information; and sending to the intermediary module the generated cuπent value; and under control of the intermediary module, receivmg the sent registration messages; and for each of the state server modules, receiving from the state server module the sent cuπent value for one of the state attributes; after the receiving of the cuπent value, determining based on the received registration messages multiple of the state client modules that cuπently have a desire to receive values for the one state attribute; and sending to each of the determined state client modules the received cuπent value,
88 so that the state client modules receive values for the state attributes they have indicated when the values become available.
129. The method of claim 128 including, under the control of the intermediary module: receiving from a first of the state client modules a request for a cuπent value of an indicated state attribute; and in response, supplying the requested value to the first state client module by, requesting at least one of the state server modules to supply a value for the indicated state attribute; and sending to the first state client module a value for the indicated state attribute received in response to the requesting.
130. The method of claim 129 wherein the intermediary module stores values for the state attributes that are received from the state server modules, and wherein the requesting of the state server modules to supply the value to be sent to the first state client module occurs only if an appropriate value for the indicated state attribute is not stored by the intermediary module.
131. The method of claim 129 wherein at least some of the state server modules send registration messages to the intermediary module, each registration message indicating a cuπent availability to supply values for an indicated one of the state attributes, and including determining the at least one state server modules that are to be requested to supply the value for the indicated state attribute based on the registration messages from the state server modules.
89
132. The method of claim 128 wherein the sending of the received cuπent value to the determined state client modules includes an indication of the state server module from which the sent cuπent value was received.
133. The method of claim 128 including, under the control of the intermediary module: receiving from a first of the state client modules an indication of a condition related to at least one of the state attributes; determining after the receiving of at least some of the sent cuπent values whether the received cuπent value satisfies the condition; and when it is determined that the condition is satisfied, notifying the first state client module.
134. The method of claim 128 including, under the control of a first of the state client modules: receiving a sent cuπent value from the intermediary module; and presenting information to a user of the first state client module based on the receiving of the value.
135. The method of claim 128 wherein at least some of the state server modules generate values for additional state attributes of a current state other than for the user and send those generated values to the intermediary module, and wherein the intermediary module additionally sends received values for the additional state attributes to state client modules based on received registration messages from those state client modules indicating a cuπent desire to receive values for at least one of the additional state attributes.
90
136. The method of claim 127 wherein the receiving of the value for the one attribute from the first source includes receiving descriptive information about the received value.
137. The method of claim 136 wherein the descriptive information includes a time at which the received value is most accurate.
138. The method of claim 136 wherein the descriptive information includes a confidence factor indicating a likelihood of accuracy of the received value.
139. The method of claim 136 wherein the supplying of the received value to the first client includes supplying the descriptive information to the first client.
140. The method of claim 127 wherein the supplying of the received value to the first client includes supplying an indication of the first source.
141. The method of claim 127 wherein the received indication from the first client additionally includes an indication of a source for the values of the one attribute, and wherein the supplying of the received value to the first client occurs only if the first source is the indicated source.
91
142. The method of claim 127 including supplying the received value to the first client only if the received value satisfies a criteria for values supplied to the first client.
143. The method of claim 127 including storing values for attributes that are received from sources so that the stored values can be later supplied to clients.
144. The method of claim 127 wherein the one attribute represents information about a user of the computer.
145. The method of claim 144 wherein the represented information reflects a modeled mental state of the user.
146. The method of claim 127 wherein the one attribute represents information about the computer.
147. The method of claim 127 wherein the one attribute represents information about a physical environment.
148. The method of claim 127 wherein the one attribute represents information about a cyber-environment of a user of the computer.
149. The method of claim 127 wherein the one attribute represents a cuπent prediction about a future state.
150. The method of claim 127 including receiving from the first source a registration message before receiving the value for the
92 one attribute, the registration message indicating an ability to supply values for the one attribute.
151. The method of claim 127 wherein the received indications from the first and second clients are registration messages.
152. The method of claim 127 including, after receiving an indication from the first client for a value of a second indicated attribute and receiving a value from a source for the second attribute, supplying to the first client the received value for the second attribute.
153. The method of claim 152 wherein the received value for the second attribute is from the first source.
154. The method of claim 127 including, after receiving a value for the one attribute from a second source, supplying the received value to the first client.
155. The method of claim 127 including, after receiving a value for the another attribute from a source, supplying the received value to the second client.
156. The method of claim 127 wherein the received value is supplied by the first source in response to receiving by the first source of input information related to the one attribute.
157. The method of claim 127 including: receiving from the first client an indication of a condition; and
93 when it is determined that the condition is satisfied, notifying the first client.
158. The method of claim 157 including determining after the receiving of the value for the one attribute whether the received value satisfies the condition.
159. The method of claim 157 wherein the condition relates to a specified one of the state attributes having a specified value.
160. The method of claim 157 including monitoring the condition to deteπnine when it is satisfied.
161. The method of claim 127 including: receiving from a client a request for a cuπent value of a specified state attribute; and in response, supplying the requested value to the client by, requesting at least one source to supply a value for the indicated state attribute; and sending to the client a value for the indicated state attribute received in response to the requesting.
162. The method of claim 127 wherein the first source includes a group of instructions to be executed to produce a value for the one attribute, and including loading and executing the group of instructions in response to the receiving of the indication from the first client for a value of the one attribute, the loading and executing so that the first source can produce the first value.
94
163. The method of claim 127 wherein the first client includes a group of instructions to be executed to receive a value for the one attribute, and including loading and executing the group of instructions in response to receiving of a value for the one attribute from a source, the loading and executing before the receiving of the indication from the first client.
164. The method of claim 127 wherein security information must be received for a source before any values of state attributes are accepted from the source.
165. The method of claim 127 wherein security information must be received for a client before any values of state attributes are supplied to the client.
166. The method of claim 127 wherein the state attributes are part of a predefined taxonomy of attributes.
167. The method of claim 127 wherein the state attributes are dynamically defined by sources who indicate an ability to supply values for the defined attributes.
168. The method of claim 127 wherein the state attributes are dynamically defined by clients who indicate an interest in receiving values for the defined attributes.
169. The method of claim 127 including supplying to the first client a mediated value for the one attiibute that is based on multiple received values for the one attribute.
95
170. The method of claim 127 wherein receiving of the supplied value by the first client prompts the first client to present information to a user of the first client.
171. The method of claim 127 wherein the providing of the information about the modeled cuπent state is performed by an operating system of the computer.
172. The method of claim 127 wherein the providing of the information about the modeled cuπent state is performed by a software module, and including, upon commencement of execution of the software module, commencing execution of multiple sources that are each to supply values for at least one of the state attributes.
173. The method of claim 172 wherein the multiple sources that are to be executed are determined based on previous received indications of ability to supply values for at least one state attribute.
174. The method of claim 127 wherein the providing of the information about the modeled cuπent state is performed by a software module, and including, upon commencement of execution of the software module, commencing execution of multiple client that are each to receive values for at least one of the state attributes.
175. The method of claim 174 wherein the multiple clients that are to be executed are determined based on previous received indications of an indication of an interest in receiving values for at least one state attribute.
96
176. A computer-readable medium whose contents cause a computing device to provide information about a cuπent state that is modeled with multiple state attributes, by: receiving from a first client an indication of an interest in receiving values for an indicated one of the state attributes of the modeled cuπent state; receivmg from a second client an indication of an interest in receiving values for another of the state attributes of the modeled cuπent state; and in response to receiving a value for the indicated one attribute from a first source, determining that the first client has an interest in receiving the received value; and supplying the received value to the first client.
177. The computer-readable medium of claim 176 wherein the computer-readable medium is a memory of the computing device.
178. A computer-readable generated data signal transmitted via a transmission medium, the generated data signal having encoded contents that cause a computer to provide information about a cuπent state that is modeled with multiple state attributes, by: receiving from a first client an indication of an interest in receiving values for an indicated one of the state attributes of the modeled cuπent state; receiving from a second client an indication of an interest in receiving values for another of the state attributes of the modeled cuπent state; and
97 in response to receiving a value for the indicated one attribute from a first source, determining that the first client has an interest in receiving the received value; and supplying the received value to the first client.
179. The computer-readable generated data signal of claim 178 wherein the contents are encoded using a caπier wave.
180. A computing device for providing information about a cuπent state that is represented with multiple attributes, comprising: an attribute mapping module that is capable of receiving from a first client an indication of an interest in receiving values for an indicated one of the attributes of the cuπent state and of receivmg from a second client an indication of an interest in receiving values for another of the attributes of the cuπent state; an attribute value receiver module that is capable of receiving a value for the one attribute from a first source; and an attiibute value supplier module that is capable of, in response to the receiving of the value for the one attribute, determining that the first client has an interest in receiving the received value and supplying the received value to the first client.
181. The computing device of claim 180 wherein the attribute mapping module, the attribute value receiver module, and the attribute value supplier module are components of an intermediary module executmg in memory.
98
182. The computing device of claim 180 further comprising multiple sources and multiple clients executing in the memory.
183. A method in a computer for providing information about a cuπent state that is modeled with multiple state attributes, comprising: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state; receivmg from a second source an indication of an ability to supply values for another of the state attributes of the modeled cuπent state; and after receiving an indication of the indicated attribute from a first client, determining that the first source is available to supply a value for the indicated attribute; obtaining from the first source an indication of the value and information describing the indicated value; determining based at least in part on the descriptive information whether the indicated value is appropriate to be supplied to the client; and when it is determined that the indicated value is appropriate, supplying the indicated value to the client.
184. The method of claim 183 wherein the computer is a wearable computer, and wherein the cuπent state is the cuπent state of a user of the wearable computer, and wherein the wearable computer executes a plurality of state server modules to supply values for the state attributes, and wherein the wearable computer executes a plurality of state
99 client modules to receive and process values for the state attributes, and wherein the wearable computer executes an intermediary module to facilitate exchange of state attribute values, and wherein the method further comprises: under control of each of the state server modules, sending to the intermediary module a registration message indicating a cuπent availability of the state server module to supply values for an indicated one of the state attributes; under control of the intermediary module, receiving the sent registration messages; and for each of multiple state client modules, receiving from the state client module a request for a cuπent value of a specified state attribute; requesting a value for the specified state attribute from at least one state server module that is determined to be currently available to supply values for the specified state attribute, the determining based on the received registration messages; receiving from at least one of the determined state server modules the requested value and additional descriptive information related to usage of the requested value, the additional information indicating an accuracy of the requested value and a time at which the requested value has the indicated accuracy; and sending to the state client module one of the received values and the received additional descriptive information related to the one value; and under control of each of the multiple state client modules, receiving from the intermediary module a requested value and additional descriptive information; and processing the received requested value based on the received additional descriptive information.
100
185. The method of claim 184 wherein the intermediary module stores values and additional descriptive information for the state attributes that are received from the state server modules, and wherein the requesting of the determined state server modules to supply a requested value of a specified state attribute to be sent to a state client module occurs only if an appropriate value for the specified state attribute is not stored by the intermediary module, the appropriateness of a stored value based at least in part on the stored additional descriptive information related to the stored value.
186. The method of claim 184 including, under the control of each of the determined state server modules: receiving the request from the intermediary module to supply the requested value; determining at least one input sensor able to supply input information related to the requested value; and in response to the receiving of the request, obtaining the related input information from the determined input sensors; generating the requested value based on the obtained information; deterrriining additional descriptive information related to the generated value; and sending to the intermediary module the generated value and the determined additional descriptive information.
101
187. The method of claim 184 wherein the received request from the state client module for the current value of the specified state attribute includes an indication of an accuracy threshold for the cuπent value, and including: after the receiving of the requested values and the additional descriptive information from the determined state server modules, selecting one of the received values to be sent to the client module based on the accuracy of the selected value being above the indicated accuracy threshold, the accuracy of the selected value being indicated by the received additional descriptive information related to the selected value.
188. The method of claim 184 wherein the processing of the received requested value includes presenting information to a user of the state client module based on the received requested value.
189. The method of claim 184 wherein at least some of the state client modules send requests to the intermediary module for values of additional state attributes of a cuπent state other than for the user, and wherein the intermediary module sends values for the additional state attributes to those state client modules, the values for the additional state attributes received from state server modules in response to requests from the intermediary module for the values.
190. The method of claim 183 wherein the descriptive information indicates that the indicated value is a constant value for the indicated state attribute.
191. The method of claim 190 including: storing the obtained constant value; and
102 supplying the stored constant value to clients in response to future requests for a value of the indicated state attribute.
192. The method of claim 183 wherein the descriptive information indicates a name of the indicated attribute.
193. The method of claim 192 wherein the indicated attribute is part of a predefined taxonomy of attributes such that each of the attributes in the predefined taxonomy has a predefined name.
194. The method of claim 192 wherein the indicated attribute is dynamically defined by the first source, and wherein the descriptive information provides an indication of an applicability of the indicated value so as to assist clients in determining whether to use the indicated value.
195. The method of claim 182 wherein the descriptive information indicates a time at which the indicated value was generated.
196. The method of claim 195 wherein the obtaining of the value includes requesting the first source to supply a value, the requesting including an indication of a time period, and wherein the indicated value is determined to be appropriate if the time period includes the time at which the indicated value was generated.
197. The method of claim 195 including: storing the indicated value; and in response to receiving requests from clients for a value of the indicated state attribute, supplying the stored value to the clients while
103 a difference from a current time to the time at which the stored value was generated is less than a threshold.
198. The method of claim 183 wherein the descriptive information indicates a time at which the indicated value is most accurate.
199. The method of claim 198 wherein the obtaining of the value includes requesting the first source to supply a value, the requesting including an indication of a time period, and wherein the indicated value is deteimined to be appropriate if the time period includes the time at which the indicated value is most accurate.
200. The method of claim 198 including: storing the indicated value; and in response to receiving requests from clients for a value of the indicated state attribute, supplying the stored value to the clients while a difference from a cuπent time to the time at which the stored value is most accurate is less than a threshold.
201. The method of claim 183 wherein the descriptive information includes a likelihood of accuracy of the indicated value.
202. The method of claim 201 wherein the obtaining of the value includes requesting the first source to supply a value, the requesting including an indication of a minimum accuracy, and wherein the indicated value is determined to be appropriate if the likelihood of accuracy is at least the minimum accuracy.
104
203. The method of claim 201 wherein the likelihood of accuracy decays over time, and including: storing the indicated value; and in response to receivmg requests from clients for a value of the indicated state attribute, supplying the stored value to the clients if a cuπent decayed likelihood of accuracy of the stored value satisfies an accuracy threshold.
204. The method of claim 183 wherein the descriptive information indicates an uncertainty of the indicated value.
205. The method of claim 204 wherein the obtaining of the value includes requesting the first source to supply a value, the requesting including an indication of a maximum uncertainty, and wherein the indicated value is determined to be appropriate if the uncertainty is less than the maximum uncertainty.
206. The method of claim 183 wherein the descriptive information indicates a precision of the indicated value.
207. The method of claim 183 wherein the descriptive information indicates properties of the indicated value.
208. The method of claim 183 wherein the descriptive information mdicates a group of at least one authorized client, and wherein the mdicated value is determined to be appropriate for the client if the client is one of the authorized clients.
209. The method of claim 183 wherein the descriptive information indicates a version of the first source.
105
210. The method of claim 183 wherein the descriptive information indicates how the mdicated value was generated.
211. The method of claim 183 wherein the descriptive information indicates how the indicated value is to be interpreted.
212. The method of claim 183 wherein the received indication from the first client is a request for a value of the indicated attiibute, and wherein the obtaining of the value from the first source includes requesting the first source to supply the value, the requesting in response to the receivmg of the request from the first client.
213. The method of claim 183 including: receiving from a source without request a cuπent value of a specified state attribute and descriptive information for the cuπent value; and in response to the receiving of the cuπent value, determining at least one client having an interest in receiving the received cuπent value for the specified state attribute, the deterrnining based at least in part of the received descriptive information; and sending the received cuπent value to each of the determined clients.
214. The method of claim 183 wherein the determining of whether the indicated value is appropriate includes deterrnining whether the obtained descriptive information satisfies a specified criteria.
215. The method of claim 183 wherein the indicated attribute represents information about a user of the computer.
106
216. The method of claim 215 wherein the represented information reflects a modeled mental state of the user.
217. The method of claim 183 wherein the indicated attribute represents information about the computer.
218. The method of claim 183 wherein the indicated attribute represents information about a physical environment.
219. The method of claim 183 wherein the indicated attribute represents information about a cyber-environment of a user of the computer.
220. The method of claim 183 wherein the indicated attribute represents a current prediction about a future state.
221. The method of claim 183 wherein multiple sources have an ability to supply values for the indicated attribute, and including requesting each of the multiple sources to supply a value of the indicated attribute after the receiving of the indication from the first client.
222. The method of claim 221 including receiving multiple values for the indicated attribute and receiving descriptive information for each of the multiple values, and wherein the obtaining of the value includes selecting one of the multiple values based on the received descriptive information for the one value.
223. The method of claim 183 including, after receiving an indication from the first client for a value of a second indicated
107 attribute and after receiving from a source a value for the second attribute, supplying to the first client the received value for the second attribute.
224. The method of claim 223 wherein the received value for the second attribute is from the first source.
225. The method of claim 183 including, after obtaining from a source a second value for the indicated attribute and descriptive information for the second value, supplying the second value to the first client.
226. The method of claim 225 wherein the second value is distinct from the indicated value, and wherein the descriptive information for the second value is the same as the descriptive information for the indicated value.
227. The method of claim 225 wherein the second value is the same as the indicated value, and wherein the descriptive information for the second value is distinct from the descriptive information for the indicated value.
228. The method of claim 183 including supplying to the first client a mediated value for the indicated attribute that is based on multiple received values for the indicated attribute, the mediating based on descriptive information received for each of the multiple received values.
229. The method of claim 183 wherein receiving of the supplied value by the first client prompts the first client to present information to a user of the first client.
108
230. A computer-readable medium whose contents cause a computing device to provide information about a cuπent state that is modeled with multiple state attributes, by: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state; and after receiving an indication of the indicated attribute from a first client, determining that the first source is available to supply a value for the indicated attribute; obtaining from the first source an indication of the value and information describing the indicated value; determining based at least in part on the descriptive information whether the indicated value is appropriate to be supplied to the client; and when it is determined that the indicated value is appropriate, supplying the indicated value to the client.
231. The computer-readable medium of claim 230 wherein the computer-readable medium is a memory of the computing device.
232. A computer-readable generated data signal transmitted via a transmission medium, the generated data signal having encoded contents that cause a computer system to provide information about a current state that is modeled with multiple state attributes by: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state;
109 receiving from a second source an indication of an ability to supply values for another of the state attributes of the modeled cuπent state; and after receiving an indication of the indicated attribute from a first client, determining that the first source is available to supply a value for the indicated attribute; obtaining from the first source an indication of the value and information describing the indicated value; determining based at least in part on the descriptive information whether the indicated value is appropriate to be supplied to the client; and when it is determined that the indicated value is appropriate, supplying the indicated value to the client.
233. A computing device for providing information about a cuπent state that is represented with multiple attributes, comprising: an attribute mapping module that is capable of receivmg from a first source an indication of an ability to supply values for an indicated one of the attributes of the cuπent state and of receiving from a second source an indication of an ability to supply values for another of the attributes of the cuπent state; an attribute value request module that is capable of receivmg an indication from a first client of the indicated attribute; and an attribute value supplier module that is capable of, after the receiving of the indication from the first client, requesting the first source to supply a value of the indicated attribute, receiving from the first source an indication of the requested value and information describing the received value, deterrnining based on the received descriptive information whether the received requested value is appropriate to be supplied to the
110 client, and supplying the received value to the client when it is determined that the received requested value is appropriate.
234. The computing device of claim 233 wherein the attribute mapping module, the attribute value request module, and the attribute value supplier module are components of an intermediary module executing in memory.
235. The computing device of claim 233 further comprising multiple sources and multiple clients executing in the memory.
236. A method in a computer for providing information about a cuπent state that is modeled with multiple state attributes, comprising: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state; receiving from a second source an indication of an ability to supply values for another of the state attributes of the modeled current state; and in response to receiving a request from a first client for a value of the indicated one attribute, determining that the first source is available to supply the value; obtaining the value from the first source; and supplying a value obtained from the first source to the first client.
Ill
237. The method of claim 236 wherein the computer is a wearable computer, and wherein the cuπent state is a cuπent state of a user of the wearable computer, and wherein the wearable computer executes a plurality of state server modules (SSMs) to supply values for the state attributes, and wherein the wearable computer executes a plurality of state client modules (SCMs) to receive and process values for the state attributes, and wherein the wearable computer executes an intermediary module to facilitate exchange of state attiibute values, and wherein the method further comprises: under control of each of the executing SSMs, sending to the intermediary module a registration message indicating a cuπent availability of the SSM to supply values for at least one indicated state attiibute; under control of each of the executing SCMs, determining a need for a value of one of the state attributes; and sending to the intermediary module a request for a value of the one state attribute; and under control of the intermediary module, receiving the sent registration messages; and for each of the executing SCMs, receivmg from the SCM the request for the value of the one state attribute; determining based on the received registration messages multiple of the SSMs that are cuπently available to supply values for the one state attribute; in response to the receiving of the request from the SCM, requesting the determined SSMs to supply the requested value; receiving at least one value of the one state attribute in response to the requesting; and
112 sending to the SCM at least one of the received values, so that the SCMs receive values for the state attributes as requested from available SSMs.
238. The method of claim 237 including, under the control of the intermediary module: receiving from a first of the SSMs a cuπent value of the indicated state attribute, the receiving not in response to a request of the first SSM for the cuπent value; and in response to the received cuπent value, supplying the received cuπent value to a first SCM.
239. The method of claim 238 wherein at least some of the SCMs send registration messages to the intermediary module, each registration message indicating a cuπent desire to receive values for an indicated one of the state attributes, and including determining that the first SCM is to receive the received cuπent value based on a registiation message previously received from the first SCM.
240. The method of claim 237 wherein the intermediary module stores values for the state attributes that are received from the SSMs, and wherein the requesting of determined SSMs to supply a requested value to be sent to a SCM occurs only if an appropriate value for the indicated state attribute is not stored by the intermediary module.
241. The method of claim 237 wherein the sending of a received value to an SCM includes an indication of the SSM from which the sent value was received.
113
242. The method of claim 237 including, under the control of each of the determined SSMs: receiving the request from the intermediary module to supply the requested value; determining at least one input sensor able to supply input information related to the requested value; and in response to the receiving of the request, obtaining the related input information from the determined input sensors; generating the requested value based on the obtained information; and sending to the intermediary module the generated value.
243. The method of claim 237 including, under the control of a first of the SCMs: receiving a sent value from the intermediary module; and presenting information to a user of the first state client module based on the receiving of the value.
244. The method of claim 237 wherein at least some of the SCMs send to the intermediary module requests for values of additional state attributes of a current state other than for the user, and wherein the intermediary module sends values for the additional state attributes to those SCMs, the values for the additional state attributes received from SSMs in response to requests for the values from the intermediary module.
114
245. The method of claim 236 wherein the obtaining of the value for the one attribute from the first source includes receivmg descriptive information about the obtained value.
246. The method of claim 245 wherein the supplying of the obtained value to the first client includes supplying the descriptive information to the first client.
247. The method of claim 236 wherein the supplying of the obtained value to the first client includes supplying an indication of the first source.
248. The method of claim 236 wherein the received request from the first client additionally includes an indication of a source for the values of the one attribute, and wherein the supplying of the obtained value to the first client occurs only if the first source is the indicated source.
249. The method of claim 236 including, before supplying the obtained value to the first client: determining whether the obtained value satisfies a criteria for values supplied to the first client; and when it is determined that the obtained value does not satisfy the criteria, requesting at least one source to supply a value for the one attribute that satisfies the criteria; receiving in response to the requesting at least one additional value for the one attribute that satisfies the criteria; and supplying to the first client a value for the one attribute based on the received additional values.
115
250. The method of claim 249 wherein the criteria is based on recency of the value.
251. The method of claim 236 including storing values for attributes that are received from sources so that the stored values can be later supplied to clients.
252. The method of claim 236 wherein the one attribute represents information about a user of the computer.
253. The method of claim 252 wherein the represented information reflects a modeled mental state of the user.
254. The method of claim 236 wherein the one attribute represents a cuπent prediction about a future state.
255. The method of claim 236 wherein the one attribute represents information about the computer.
256. The method of claim 236 wherein the one attribute represents information about a physical environment.
257. The method of claim 236 wherein the one attribute represents information about a cyber-environment of a user of the computer.
258. The method of claim 236 wherein the obtaining of the value from the first source involves requesting the first source to supply the value, wherein the first source includes a group of instructions to be executed to produce a value for the one attribute, and including
116 loading and executing the group of instructions in response to the requesting of the first source to supply the value, the loading and executing so that the first source can produce the requested value.
259. The method of claim 236 wherein the first client includes a group of instructions to be executed to receive a value for the one attribute, and including loading and executing the group of instructions in response to receiving of a value for the one attribute from a source, the loading and executing before the receiving of the request from the first client.
260. The method of claim 236 including receiving from the first client an indication of a second of the state attributes and an indication that a source for a value for the second state attribute is to be a same source as for the supplied value for the one attribute, and selecting a value to be supplied to the first client for the second state attribute that is received from the same source.
261. The method of claim 236 including, after receiving a request from the first client for a value of a second indicated attribute and receiving a value from a source for the second attiibute, supplying to the first client the received value for the second attribute.
262. The method of claim 261 wherein the received value for the second attiibute is from the first source.
263. The method of claim 236 including, after receiving a value for the one attribute from a third source, supplying the received value to the first client.
117
264. The method of claim 236 including, after receiving a request from a second client for a value of the another attribute and receiving a value from the second source for the another attribute, supplying the received value to the second client.
265. The method of claim 236 wherein the obtaining of the value from the first source by the intermediary module involves requesting the first source to supply the value and receiving the requested value in response, and wherein the received value from the first source in based on input information related to the one attribute that is retiieved by the first source in response to the requesting.
266. The method of claim 236 including: receiving from a source a cuπent value of a specified state attribute, the receiving not in response to requesting the cuπent value from the source; and in response to the receiving of the cuπent value, determining at least one client having an interest in receiving values for the specified state attribute; and sending the received cuπent value to each of the determined clients.
267. The method of claim 236 including supplying to the first client a mediated value for the one attiibute that is based on multiple received values for the one attribute.
268. The method of claim 236 wherein receiving of the supplied value by the first client prompts the first client to present information to a user of the first client.
118
269. The method of claim 236 including: receiving from the first client an indication of a condition; and when it is determined that the condition is satisfied, notifying the first client.
270. The method of claim 269 wherein the condition relates to a specified one of the state attributes having a specified value.
271. A computer-readable medium whose contents cause a computing device to provide information about a cuπent state that is modeled with multiple state attributes, by: receiving from a first source an indication of an ability to supply values for an indicated one of the state attributes of the modeled cuπent state; and in response to receiving a request from a first client for a value of the indicated one attribute, determining that the first source is available to supply the value; obtaining the value from the first source; and supplying a value obtained from the first source to the first client.
272. The computer-readable medium of claim 271 wherein the computer-readable medium is a memory of the computing device.
273. A computer-readable generated data signal transmitted via a transmission medium, the generated data signal having
119 encoded contents that cause a computer system to provide information about a cuπent state that is modeled with multiple state attiibutes, by: receiving from a first source an indication of an ability to supply values for an indicated one of the state attiibutes of the modeled cuπent state; receiving from a second source an indication of an ability to supply values for another of the state attiibutes of the modeled cuπent state; and in response to receiving a request from a first client for a value of the indicated one attribute, determining that the first source is available to supply the value; obtaining the value from the first source; and supplying a value obtained from the first source to the first client.
274. A computing device for providing information about a cuπent state that is represented with multiple attributes, comprising: an attiibute mapping module that is capable of receiving from a first source an indication of an ability to supply values for an indicated one of the attributes of the cuπent state and of receiving from a second source an indication of an ability to supply values for another of the attributes of the cuπent state; an attribute value request module that is capable of receiving a request for a value of the one attribute from a first client; and an attribute value supplier module that is capable of, in response to the receiving of the request, determining that the first source is available to supply the value, requesting the value from the first source, and supplying to the first client a value received from the first source.
120
275. The computing device of claim 274 wherein the attribute mapping module, the attribute value request module, and the attribute value supplier module are components of an intermediary module executing in memory.
276. The computing device of claim 274 further comprising multiple sources and multiple clients executing in the memory.
277. A method in a first computer for providing information about a cuπent state that is represented with multiple attributes, the method comprising: receivmg indications of multiple characterization modules, each characterization module executing on a computer to model an aspect of a cuπent state related to that computer; receiving an indication of one of the multiple attributes of the represented cuπent state; determining multiple of the characterization modules whose modeled aspects are related to the indicated one attribute; and gathering information about the modeled aspects related to the indicated one attribute from the determined characterization modules so that a value for the indicated one attribute can be generated based on the gathered information.
278. The method of claim 277 wherein the first computer is a wearable computer, and wherein a characterization system executing on the wearable computer provides information about a cuπent state of a user of the wearable computer, the user characterization system modeling the cuπent state with multiple state attributes, the user characterization system further including state server modules (SSMs) to supply values for the state
121 attributes, state client modules (SCMs) to process values for the state attributes, and an intermediary module to facilitate exchange of state attribute values, the method further comprising: under control of each SSM, generating values for at least one of the state attiibutes and sending the generated values to the intermediary module; under control of each SCM, receiving values for at least one state attiibute from the intermediary module and performing processing based on the received values; under control of the intermediary module, facilitating exchange of values by, receiving values for the state attributes from SSMs and from a first of multiple other characterization systems, each of the other characterization systems executing on another computer to model a cuπent state related to the another computer; for each state attribute, storing the received values for the attribute; and receiving requests for values of indicated state attiibutes from SCMs and from a second of the other characterization systems, and sending stored values of the indicated state attributes to the SCMs and the second other characterization system; and modeling an aspect of a cuπent state using distributed state information by, identifying multiple portions of the distributed state information needed for the modeling of the aspect, and identifying multiple of the other characterization systems each having access to one of the identified multiple portions; gathering the identified portions of the distributed state information from the identified other characterization systems; and
122 generating at least one value for the modeled aspect based on the gathered portions of the distributed state information, so that the user characterization system can interact with other characterization systems in order to exchange and use distributed state information of interest.
279. The method of claim 278 including: deterrnining a need for access to a resource available to one of the other characterization systems executing on another computer; requesting the one other characterization system to provide access to the resource; and accessing the resource after the one other characterization system provides access to the resource.
280. The method of claim 279 wherein the resource is processing capabilities of the another computer, wherein the accessing of the resource includes use of the processing capabilities on behalf of the user characterization system, and including receiving an indication of results of the use of the processing capabilities.
281. The method of claim 279 wherein the resource is an input device of the another computer, and wherein the accessing of the resource includes receiving input information from the input device.
282. The method of claim 279 wherein the resource is information used during the executing of the one other characterization system, and wherein the accessing of the resource includes retrieving the information.
123
283. The method of claim 279 wherein the resource has access to a first portion of the distributed state information, wherein the determined need for access to the resource is to retrieve the first portion, and wherein the accessing of the resource results in the retrieving of the first portion.
284. The method of claim 278 wherein the distributed state information relates to a cuπent state of a group of users, wherein the identified other characterization systems are user characterization systems each modeling a cuπent state of one of the users in the group, and wherein the modeled aspect is of the cuπent state of the group of users.
285. The method of claim 278 wherein the other characterization systems are hierarchically organized such that the identified other characterization systems are supervisors each having an associated group of other subordinate characterization systems, wherein the portion of the distributed state information gathered from each of the supervisors includes pieces of distributed state information obtained from the subordinate characterization systems associated with that supervisor, and wherein the modeled aspect is of the cuπent state of the hierarchical organization.
286. The method of claim 278 wherein each of the other characterization systems is specialized to model a distinct facet of the cuπent state of the user, wherein the aspect of the cuπent state to be modeled includes information about multiple of the facets, and wherein the identified other characterization systems are the specialized characterization systems that model the multiple facets.
124
287. The method of claim 278 wherein the user characterization system executes on a computer remote from the wearable computer, and wherein the wearable computer is a thin client device to communicate with the executing user characterization system.
288. The method of claim 287 wherein the wearable computer includes at least one sensor to supply input information to the
SSMs.
289. The method of claim 287 wherein the wearable computer includes at least one output device to present information to the user.
290. The method of claim 278 wherein the first other characterization system executes on another computer having a sensor receiving information about the user of the wearable computer, and wherein the received values from the first other characterization system for a state attribute of the modeled cuπent state of the user are based on the received information from the sensor.
291. The method of claim 278 wherein the second other characterization system executes on another computer with an output device that is perceivable by the user of the wearable computer, and including presenting information to the user on the output device based on the state attiibute values sent to the second other characterization system from the intermediary module.
292. The method of claim 278 wherein each of the state attributes has a local name used by the user characterization system, wherein the receiving of each value for a state attribute from the first
125 other characterization system includes an indication of a first state attribute using a reference for the first state attribute other than the local name of the first state attribute, wherein the receiving of each request for a value of a state attribute from the second other characterization system includes an indication of a second state attribute using a reference for the second state attiibute other than the local name of the second state attribute, and including translating the references for the first and second state attributes into the local names of the first and second state attributes before responding.
293. The method of claim 278 wherein at least some of the SSMs are available to supply values for additional state attiibutes of a cuπent state other than for the user, and wherein the intermediary module additionally sends values for the additional state attributes to SCMs based on indications from those SCMs of a cuπent desire to receive values for at least one of the additional state attributes.
294. The method of claim 277 including: determining a need for access to a resource available on another computer on which one of the other characterization systems is executing; and using the one other characterization system to access the resource.
295. The method of claim 294 wherein the resource is processing capabilities of the another computer, and wherein accessing of the resource includes use of the processing capabilities.
126
296. The method of claim 294 wherein the resource is an input device of the another computer, and wherein accessing of the resource includes receiving input information from the input device.
297. The method of claim 294 wherein the resource is information used during the executing of the one other characterization system, and wherein accessing of the resource includes retrieving the information.
298. The method of claim 277 wherein the determined characterization modules each model a cuπent state of a user of the computer on which the characterization module is executing, and wherein the one attribute is related to the cuπent state of the group of the users of the determined characterization modules.
299. The method of claim 277 wherein the determined characterization modules are hierarchically organized such that some of the characterization modules are supervisors each having an associated group of other subordinate characterization modules, and wherein the one attribute is related to the cuπent state of the hierarchical organization.
300. The method of claim 277 wherein each of the determined characterization modules is specialized to model a portion of the cuπent state of a single user, and wherein the one attribute is related to information about the user including information for multiple of the portions of the cuπent state.
301. The method of claim 277 wherein the gathered information from two of the determined characterization modules includes information about a first of the multiple attributes, wherein the two
127 determined characterization modules specify the first attribute with distinct names in their gathered information, and wherein the gathering of the information includes translating the specified names for the first attribute in the gathered information into a common name.
302. The method of claim 277 wherein the received indication of the one attribute additionally includes an indication of characterization modules, and wherein the deterrnining of the characterization modules include selecting the indicated characterization modules.
303. The method of claim 277 including: determining whether the information gathered from one of the deteimined characterization modules satisfies a criteria; and when it is determined that the gathered information does not satisfy the criteria, obtaining additional information from the one determined characterization module that satisfies the criteria and replacing the gathered information from the one determined characterization module with the obtained additional information.
304. The method of claim 277 wherein the one attribute represents information about a user of the first computer.
305. The method of claim 304 wherein the represented information reflects a modeled mental state of the user.
306. The method of claim 277 wherein the one attribute represents information about the first computer.
128
307. The method of claim 277 wherein the one attribute represents information about a physical environment of a user of the first computer.
308. The method of claim 277 wherein the one attribute represents information about a cyber-environment of a user of the first computer.
309. The method of claim 277 wherein the one attribute represents a cuπent prediction about a future state.
310. The method of claim 277 wherein the one attribute represents information about a group of users such that each of the users is a user of a computer on which one of the multiple characterization modules is executmg.
311. The method of claim 277 wherein the one attribute represents information about the group of computers on which the multiple characterization modules are executing.
312. The method of claim 277 wherein the one attribute represents information about a physical environment common to the computers on which the multiple characterization modules are executing.
313. The method of claim 277 wherein the one attribute represents information about a cyber-environment common to the computers on which the multiple characterization modules are executing.
314. The method of claim 277 including, after receiving a request from a client for a value of a second indicated attribute, obtaining
129 information from multiple characterization modules about modeled aspects related to the second attribute and supplying the obtained information to the client.
315. The method of claim 277 wherein the received indication is from a client, and including generating the value for the indicated one attribute and supplying the generated value to the client.
316. The method of claim 315 wherein receiving of the supplied value by the client prompts the client to present information to a user.
317. The method of claim 277 wherein the determining of the multiple characterization modules is based on previously received registration modules from each of the multiple characterization modules that indicate the modeled aspects.
318. The method of claim 277 wherein security information must be received for a characterization module before any information is accepted from the characterization module.
319. The method of claim 277 wherein security information must be received for a characterization module before information is supplied to the characterization module.
320. The method of claim 277 wherein the providing of the information about the represented cuπent state is performed by one of the multiple characterization modules executing on the first computer.
130
321. The method of claim 277 wherein the generating of the value is performed by a client after the gathered information is supplied to the client.
322. A computer-readable medium whose contents cause a computing device to provide information about a cuπent state that is represented with multiple attributes, by: receiving indications of multiple characterization modules, each characterization module executing on a computer to model an aspect of a current state related to that computer; receivmg an indication of one of the multiple attributes of the represented cuπent state; determining multiple of the characterization modules whose modeled aspects are related to the indicated one attribute; obtaining information about the modeled aspects related to the indicated one attribute from the determined characterization modules; and supplying the obtained information to a client able to generate a value for the indicated one attribute based on the supplied obtained information.
323. The computer-readable medium of claim 322 wherein the computer-readable medium is a memory of the computing device.
131
324. A computer-readable generated data signal transmitted via a transmission medium, the generated data signal having encoded contents that cause a computer system to provide information about a cuπent state that is represented with multiple attributes, by: receiving indications of multiple characterization modules, each characterization module executing on a computer to model an aspect of a current state related to that computer; receiving an indication of one of the multiple attiibutes of the represented cuπent state; deterniining multiple of the characterization modules whose modeled aspects are related to the indicated one attribute; and gathering information about the modeled aspects related to the indicated one attiibute from the deteimined characterization modules so that a value for the indicated one attribute can be generated based on the gathered information.
325. A computing device for providing information about a cuπent state that is represented with multiple attributes, comprising: an input module that is capable of receiving indications of multiple characterization modules each executing on a computer to model an aspect of a cuπent state related to that computer, and of receiving an indication of one of the multiple attributes of the represented cuπent state; an information gatherer module that is capable of deteraiining multiple of the characterization modules whose modeled aspects are related to the indicated one attribute and of obtaining information about the modeled aspects related to the indicated one attribute from each of the determined characterization modules; and an output module capable of supplying the obtained information from the deteimined characterization modules to a client able
132 to determine a value for the indicated one attribute based on the obtained information.
326. A method in a computer for providing information about a cuπent state that is modeled with multiple state attributes, the method comprising: receivmg from a module a request related to the modeling of the current state with the multiple state attributes; and without further intervention related to the request by the module, determining that the request cannot cuπently be satisfied, and indicating to the module that the request cannot cuπently be satisfied; after the indicating, monitoring at later times to determine whether the request can be satisfied; and when it is determined at one of the later times that the request can currently be satisfied, indicating to the module that the request can be satisfied.
327. The method of claim 326 wherein the method is performed in a wearable computer, and wherein the cuπent state is a cuπent state of a user of the wearable computer, and wherein the wearable computer executes a plurality of state server modules to supply values for the state attributes, a plurality of state client modules to receive and process values for the state attributes, and an intermediary module to facilitate exchange of state attribute values, and wherein the method further comprises: under control of each of the executing state server modules, sending to the intermediary module a registration message indicating a
133 current availability to supply values for an indicated one of the state attributes; under control of a first of the executing state client modules, sending to the intermediary module a request for a cuπent value of a first of the state attributes; and under control of the intermediary module, receiving the sent registration messages and the sent request; and without further intervention by the first state client module, determining that the first state attribute is not one of the state attributes indicated by the state server modules; sending to the first state client module an indication that the requested value is not available; after the sending of the indication, receiving an indication from a first state server module of an ability to supply values for the first state attribute; and in response to the receiving of the indication, notifying the first state client module that the requested value is available, so that the state client modules can automatically be notified when state attribute values of interest become available.
328. The method of claim 327 wherein the received indication from the first state server module includes a value for the first state attribute, and wherein the notifying of the first state client module includes sending the received value to the first state client module.
134
329. The method of claim 327 including, under the control of the intermediary module: receiving from a second of the state client modules a request for a cuπent value of a second state attribute that was indicated in the registration message sent by a second of the state server modules; and without further intervention by the second state client, determining that the second state server module is not cuπently able to supply the requested cuπent value for the second state attribute; in response to the determining, sending to the second state client module an indication that the requested cuπent value for the second state attribute is not available; after the sending of the indication to the second state client module, deterrnining that the second state server module is cuπently able to supply the requested cuπent value for the second state attribute; and notifying the second state client module that the requested current value for the second state attribute is available.
330. The method of claim 329 wherein the determining that the second state server module is cuπently able to supply the requested cuπent value for the second state attribute is based on the intermediary module receiving a cuπent value for the second state attiibute from the second state server module, and wherein the notifying of the second state client module includes sending the received value for the second state attribute to the second state client module.
135
331. The method of claim 327 including, under the control of the intermediary module: receiving from each of multiple modules an indication of an event of interest; and when one of the indicated events of interest occurs, notifying the module that indicated the occuπing event of the occuπence.
332. The method of claim 331 wherein a received indication from a first module of a first event of interest includes a criteria related to the first event, and wherein the notifying of the first module of the occuπence of the first event is performed only when the criteria is satisfied by the occuπence of the first event.
333. The method of claim 331 including, under the control of the intermediary module: receiving from a second of the state client modules an indication of a condition related to one or more specified state attributes such that the second state client module desires to know when the condition has been satisfied; determining whether any received values for the specified state attributes satisfy the condition; and when it is determined that the condition is satisfied, notifying the second state client module.
334. The method of claim 331 including: monitoring activities of a module; detecting an occuπence; and automatically without further intervention by the module, determining based on the monitoring that the detected occuπence would be of interest to the module; and
136 notifying the module of the detected occuπence.
335. The method of claim 327 including, under the control of a third of the state client modules: receiving a sent cuπent value from the intermediary module; and presenting information to a user of the third state client module based on the receiving of the value.
336. The method of claim 327 wherein at least some of the state server modules generate values for additional state attributes of a cuπent state other than for the user and send those generated values to the intermediary module, and wherein the intermediary module additionally sends received values for the additional state attiibutes to state client modules based on requests from those state client modules for the received values.
337. The method of claim 326 wherein the monitoring includes detecting changes in status of the modeling of the cuπent state.
338. The method of claim 326 including : receivmg from the module an indication of a condition related to a value of one of the state attributes such that the module desires to know when the condition has been satisfied; detecting changes in the value of the one state attribute to determine whether the condition is satisfied; and when it is determined that the condition is satisfied, notifying the module that the condition is satisfied.
137
339. The method of claim 338 wherein the condition relates to the one state attribute having a specified value.
340. The method of claim 326 wherein the module is a source of values for at least one of the state attributes.
341. The method of claim 326 wherein the module is a consumer of values for at least one of the state attributes.
342. The method of claim 326 wherein the request is from a client module for a value of a specified state attribute such that no sources are cuπently available to supply values for the specified state attribute value.
343. The method of claim 342 wherein the monitoring involves detecting when a value for the specified state attribute is received.
344. The method of claim 342 wherein the momtoring involves detecting when a source indicates an ability to supply values for the specified state attribute.
345. The method of claim 342 wherein the indicating to the client module that the request can be satisfied involves sending the requested value to the client module.
346. The method of claim 326 wherein the request is from a client module for a value of a specified state attribute that satisfies a specified criteria, and wherein each of ϋa.e sources cuπently available to
138 supply values for the specified state attribute are unable to supply a value for the specified state attribute that satisfies the specified criteria.
347. The method of claim 346 wherein the momtoring involves detecting when a value for the specified state attribute is received.
348. The method of claim 346 wherein the monitoring involves repeatedly requesting at least one of the sources to supply a value for the specified state attribute.
349. The method of claim 346 wherein the specified criteria is that the requested value come from a specified source that is not cuπently available to supply state attribute values, and wherein the monitoring involves detecting that the specified source is able to supply values for the specified state attribute.
350. The method of claim 326 wherein the request is from a source module to send a supplied value of a state attribute to a specified client that is not cuπently available to receive state attribute values.
351. The method of claim 350 wherein the determining that the request can be satisfied is based on receiving a request from the specified client for a value of the state attribute.
352. The method of claim 326 wherein the request is from a source module to send a supplied value of a specified state attribute to at least one client, the receiving of the request at a time when no clients that have an interest in receiving values for the specified state attribute are cuπently available to receive values for the specified state attribute.
139
353. The method of claim 352 wherein the deteimi ing that the request can be satisfied is based on receiving an indication from a client of an interest in receivmg at least one value for the specified state attribute.
354. The method of claim 326 wherein the computer has access to various devices, and wherein the request is for access to a device.
355. The method of claim 354 wherein the device is an input device of the computer.
356. The method of claim 354 wherein the device is an output device of the computer.
357. The method of claim 354 wherein the device is a remote device.
358. The method of claim 326 wherein the request is for access to a group of themed attributes.
359. The method of claim 358 wherein the deteimining that the request can be satisfied is based on one or more sources being executed that are able to supply values for the themed attributes of the group.
360. The method of claim 326 wherein the providing of the information about the cuπent state is performed by a characterization module, and wherein the request is for access to other functionality provided by the characterization module.
140
361. The method of claim 360 wherein the other functionality is a specified mediator, and wherein the determining that the request can be satisfied is based on loading of software that when executed will provide mediating for the specified mediator.
362. The method of claim 326 wherein the request is to be notified when a specified criteria is satisfied, and wherein the deterrnining that the request cannot cuπently be satisfied is based on the specified criteria not being satisfied at the time of the receiving of the request.
363. The method of claim 362 wherein the indicating to the module that the request cannot cuπently be satisfied is performed by not notifying the module that the request is satisfied.
364. The method of claim 362 wherein the specified criteria is availability or unavailability of a source for supplying values of a specified state attribute.
365. The method of claim 362 wherein the specified criteria is availability or unavailability of a specified source for supplying values of at least one state attribute.
366. The method of claim 362 wherein the specified criteria is availability or unavailability of a client for receiving values of a specified state attribute.
367. The method of claim 362 wherein the specified criteria is availability or unavailability of a specified client for receiving values of at least one state attribute.
141
368. The method of claim 362 wherein the specified criteria is availability or unavailability of a specified device.
369. The method of claim 362 wherem the specified criteria is availability or unavailability of specified other functionality.
370. The method of claim 362 wherein a module performing the method provides alternatives for at least one type of behavior, and wherein the specified criteria is a change in a value for at least one of the types of behavior.
371. The method of claim 362 wherein the specified criteria is a change in a value of a specified state attribute.
372. The method of claim 362 wherein the request includes an indication of a number of times that the satisfaction of the specified criteria is to occur.
373. The method of claim 326 wherein the state attiibutes represent information about a user of the computer.
374. The method of claim 373 wherein the represented information reflects a modeled mental state of the user.
375. The method of claim 326 wherein the state attributes represent information about the computer.
376. The method of claim 326 wherein the state attributes represent information about a physical environment.
142
377. The method of claim 326 wherein the state attributes represent information about a cyber-environment of a user of the computer.
378. The method of claim 326 wherein the state attributes represent cuπent predictions about a future state.
379. The method of claim 326 wherein receiving of a state attribute value by the module prompts the module to present information to a user of the module.
380. The method of claim 326 wherein receivmg of the indication that the request can be satisfied prompts the module to present information to a user of the module.
381. A computer-readable medium whose contents when executed cause a computing device to provide information about a cuπent state that is represented with multiple attributes, by: receiving from a module a request related to the modeling of the current state with the multiple attributes; and without further input from the module related to the request, indicating to the module a determination that the request cannot cuπently be satisfied; after the indicating, monitoring to determine whether the request can be satisfied; and when it is determined that the request can cuπently be satisfied, indicating to the module that the request can be satisfied.
143
382. The computer-readable medium of claim 381 wherein the computer-readable medium is a memory of the computing device.
383. A computing device for providing information about a cuπent state that is represented with multiple attributes, comprising: an attribute request receiver component that is capable of receiving from a module a request related to the modeling of the cuπent state with the multiple state attributes; and an attribute request satisfier component that is capable of, without further input from the module related to the request, indicating to the module a determination that the request cannot cuπently be satisfied, automatically monitoring to determine whether the request can be satisfied after the indicating, and indicating to the module that the request can be satisfied after it is determined that the request can cuπently be satisfied.
384. The computing device of claim 383 wherein the attribute request receiver component and the attribute request satisfier component are part of an intermediary module executing in memory.
385. The computing device of claim 383 further comprising multiple sources and multiple clients executing in the memory.
144
386. A method in a computer for providing information about a cuπent state that is modeled with multiple state attributes, at least some of the state attributes having values that are requested by client- sources to be used for generating values of other state attributes, the method comprising: receivmg a request from a first client for a value of a first of the state attributes; determining a client-source able to generate and supply the requested value of the first state attribute by using a value of at least one other state attribute; requesting the client-source to supply the requested value of the first state attribute; and during generating of the requested value of the first state attiibute by the client-source, monitoring requests from the client-source for values of one or more indicated state attributes needed for the generating of the requested value of the first state attribute; monitoring other requests for values of indicated state attributes needed for generating values of state attributes that are indicated in previously monitored requests; and when it is deteimined that a state attribute indicated in one of the monitored requests is the first state attribute, indicating a presence of a circular reference during the generating of the requested value of the first state attribute.
387. The method of claim 386 wherein the method is performed in a wearable computer, the wearable computer executing a plurality of state server modules (SSMs) to supply values for the state attributes, a plurality of state client modules (SCMs) to receive and process values for the state attributes, and an intermediary module (IM) to
145 facilitate exchange of state attribute values, the method further comprising: under control of each SSM, generating values for at least one of the state attributes and sending the generated values to the IM; under control of each SCM, requesting the IM to supply values for at least one specified state attribute and receiving requested values from the IM; under control of a first module that is one of the SSMs and one of the SCMs, if a value of a first specified state attribute is received from the IM, generating a value for a first state attribute based at least in part on the received value and sending the generated value to the IM; under control of a second module that is one of the SSMs and one of the SCMs, if a value of a second specified state attribute is received from the IM, generating a value for a second state attribute based at least in part on the received value and sending the generated value to the IM; and under control of the IM, receiving the values for state attributes sent from the SSMs, receiving the requests for values of specified state attributes from the SCMs, and sending values received from the SSMs for the specified state attributes to the SCMs in response to the received requests; deterrnining if a value to be generated by the first module for the first state attribute and if a value to be generated by the second module for the second state attribute are each based at least in part on a received input value of the other of the first and second state attribute; and when it is determined that values to be generated for the first and second state attributes are each based at least in part on received input values of the other first and second state attribute, notifying
146 at least one of the first and second modules to not generate values for the first or second state attribute, so that the intermediary module supplies values for state attributes only when appropriate.
388. The method of claim 387 including: under the control of the first module, before the sending of a generated value for the first state attribute to the IM, sending to the IM a registration message indicating a cuπent availability of the first module to supply values for the first state attribute based at least in part on values of the first specified state attribute; and under the control of the second module, before the sending of a generated value for the second state attribute to the IM, sending to the IM a registiation message indicating a cuπent availability of the second module to supply values for the second state attribute based at least in part on values of the second specified state attribute, and wherein the determining by the IM of whether the values to be generated for each of the first and second state attributes are based at least in part on received input values of the other first and second state attribute is based on analysis of the sent registration messages.
389. The method of claim 388 including: under control of each SSM, before the sending of generated values for an indicated state attribute to the IM, sending to the IM a registration message indicating a cuπent availability of the SSM to supply values for the indicated state attribute; and under control of each SCM, before the requesting by the SCM that the IM supply the values of a specified state attiibute, sending to the IM a registration message indicating a cuπent desire to receive values for the specified state attribute.
147
390. The method of claim 387 wherein the determining of whether the values to be generated for each of the first and second state attributes are based at least in part on received input values of the other of the first and second state attributes is dynamically performed as part of the generating of a value for the first or second state attributes by, during the generating of the value for the attribute, recursively tiacking requests sent to the IM to supply values for state attributes to be used as input values for the generating of other state attribute values and detecting a circular reference for the value of the attribute being generated when a value of the attribute is requested in one of the tracked requests as an input value for the generating of one of the other state attribute values.
391. The method of claim 387 including notifying the first module to not generate values for the first state attiibute by not supplying a requested value for the first specified state attribute to the first module.
392. The method of claim 387 wherein multiple SSMs are able to supply values for the second state attribute, and including: when it is determined that the values to be generated for the first and second state attributes by the first and second modules are each based at least in part on received input values of the other of the first and second state attributes, determining if one of the multiple SSMs other than the second module can generate a value for the second state attribute in such a manner that the values to be generated for the first and second state attributes by the first module and the one SSM are not each based at least in part on received input values of the other of the first and second state attributes; and when it is determined that the values to be generated for the first and second state attributes by the first module and the one SSM are not each based at least in part on received input values of the other of the
148 first and second state attributes, using the one SSM to generate values for the second state attribute rather than the second module.
393. The method of claim 387 wherein the first module and the second module are the same module.
394. The method of claim 387 wherein the generating of a value for a state attribute by at least some of the SSMs includes: receiving a request from the intermediary module to supply the value to be generated; determining at least one input sensor able to supply input information related to the requested value; and in response to the receiving of the request, obtaining the related input information from the determined input sensors; and generating the requested value based on the obtained information.
395. The method of claim 387 including, under the control of a third SCM: receiving a sent value from the intermediary module; and presenting information to a user of the third SCM based on the receiving of the value.
396. The method of claim 387 wherein at least some of the SCMs send to the intermediary module requests for values of additional state attributes of a cuπent state other than for the user, and wherein the intermediary module sends values for the additional state attributes to those SCMs, the values for the additional state attributes
149 received from SSMs in response to request for the values from the intermediary module.
397. The method of claim 386 wherein the value of the indicated first state attribute that is requested in the one monitored request is needed for generating a value of another state attribute, and wherein the indicating of the presence of the circular reference includes halting the generating of the value of the another state attribute.
398. The method of claim 386 wherein the value of the indicated first state attiibute that is requested in the one monitored request is needed for generating a value of another state attribute, and including: after the determining that the state attiibute indicated in the one monitored request is the first state attribute, determining a manner of generating the value of the another state attiibute without needing the value of the first state attribute; and facilitating the generating of the value of the first other state attribute in the determined manner.
399. The method of claim 386 wherein the value of the indicated first state attribute that is requested in the one monitored request is needed for generating a value of another state attribute, and including: after the determining that the state attiibute indicated in the one monitored request is the first state attribute, determining an alternate state attribute whose value can replace a need for the value of the another state attribute; and facilitating a generating of the value of the alternate state attribute.
150
400. The method of claim 386 wherein the received request from the first client additionally indicates that the client-source is to be the source of the requested first state attribute value, and wherein the determining of the client-source is based on the receiving of the indication.
401. The method of claim 386 including, before the requesting of the client-source to supply the requested value of the first state attribute, determining whether a previously obtained value satisfies a criteria for the requested value, and wherein the requesting is performed only when it is determined that the previously obtained value does not satisfy the criteria.
402. The method of claim 386 includmg receiving the value of the first state attribute from the client-source and supplying the received value to the first client.
403. The method of claim 386 including determining whether a requested value of an indicated state attribute is needed for the generating of a value of another state attribute that is indicated in one of the monitored requests based on an identifier related to the generating of the first state attribute value that is included in the request.
404. The method of claim 386 wherein the multiple state attributes represent information about a user of the computer.
405. The method of claim 404 wherein the represented information reflects a modeled mental state of the user.
151
406. The method of claim 386 wherein the multiple state attributes represent information about the computer.
407. The method of claim 386 wherein the multiple state attributes represent information about a physical environment.
408. The method of claim 386 wherein the multiple state attributes represent information about a cyber-environment of a user of the computer.
409. The method of claim 386 wherein receiving of the requested value by the first client prompts the first client to present information to a user of the first client.
410. A computer-readable medium containing contents that cause a computing device to provide information about a cuπent state that is modeled with multiple state attributes, at least some of the state attributes having values that are requested by client-sources to be used for generatmg values of other state attributes, by: receiving a request from a first client for a value of a first of the state attributes; determining a client-source able to generate and supply the requested value of the first state attribute by using a value of at least one other state attribute; requesting the client-source to supply the requested value of the first state attribute; and during generating of the requested value of the first state attribute by the client-source,
152 monitoring requests from the client-source for values of one or more indicated state attributes needed for the generating of the requested value of the first state attribute; monitoring other requests for values of indicated state attributes needed for generating values of state attributes that are indicated in previously monitored requests; and when it is determined that a state attribute indicated in one of the monitored requests is the first state attribute, indicating a presence of a circular reference during the generating of the requested value of the first state attribute.
411. The computer-readable medium of claim 410 wherein the computer-readable medium is a memory of the computing device.
412. A computing device for providing information about a cuπent state that is represented with multiple attributes, comprising: an attribute value request component that is capable of receiving a request for a value of a first of the state attributes from a first client; and an attribute value supplier component that is capable of deterπύriing a client-source able to generate and supply the requested value of the first state attribute by using a value of at least one other state attribute, of requesting the client-source to supply the requested value of the first state attiibute, and of, during generating of the requested value of the first state attribute by the client-source, monitoring requests from the client-source for values of one or more indicated state attributes needed for the generating of the requested value of the first state attribute, monitoring other requests for values of indicated state attributes needed for generating values of other state attiibutes that are indicated in one of
153 the monitored requests, and indicating presence of a circular reference when it is determined that a state attribute indicated in one of the monitored requests is the first state attiibute.
413. The computing device of claim 412 wherein the attribute value request component and the attribute value supplier component are part of an intermediary module executing in memory.
414. The computing device of claim 412 further comprising multiple sources and multiple clients executing in the memory.
154
EP01964695A 2000-04-02 2001-04-02 Exchanging information between sources and consumers of a computer user's context Withdrawn EP1334445A2 (en)

Applications Claiming Priority (35)

Application Number Priority Date Filing Date Title
US19399800P 2000-04-02 2000-04-02
US19400600P 2000-04-02 2000-04-02
US19422200P 2000-04-02 2000-04-02
US19476000P 2000-04-02 2000-04-02
US19475900P 2000-04-02 2000-04-02
US19412300P 2000-04-02 2000-04-02
US19400300P 2000-04-02 2000-04-02
US19400100P 2000-04-02 2000-04-02
US19400400P 2000-04-02 2000-04-02
US194003P 2000-04-02
US194004P 2000-04-02
US194006P 2000-04-02
US194222P 2000-04-02
US194123P 2000-04-02
US194001P 2000-04-02
US194759P 2000-04-02
US193998P 2000-04-02
US194760P 2000-04-02
US09/724,892 US7225229B1 (en) 1998-12-18 2000-11-28 Automated pushing of computer user's context data to clients
US09/724,949 US6791580B1 (en) 1998-12-18 2000-11-28 Supplying notifications related to supply and consumption of user context data
US724932 2000-11-28
US724799 2000-11-28
US724902 2000-11-28
US724893 2000-11-28
US724949 2000-11-28
US09/724,893 US6812937B1 (en) 1998-12-18 2000-11-28 Supplying enhanced computer user's context data
US09/724,799 US7464153B1 (en) 2000-04-02 2000-11-28 Generating and supplying user context data
US724894 2000-11-28
US09/724,894 US6801223B1 (en) 1998-12-18 2000-11-28 Managing interactions between computer users' context models
US09/724,902 US7231439B1 (en) 2000-04-02 2000-11-28 Dynamically swapping modules for determining a computer user's context
US09/724,777 US7046263B1 (en) 1998-12-18 2000-11-28 Requesting computer user's context data
US724892 2000-11-28
US724777 2000-11-28
US09/724,932 US6747675B1 (en) 1998-12-18 2000-11-28 Mediating conflicts in computer user's context data
PCT/US2001/010779 WO2001075592A2 (en) 2000-04-02 2001-04-02 Exchanging information between sources and consumers of a computer user's context

Publications (1)

Publication Number Publication Date
EP1334445A2 true EP1334445A2 (en) 2003-08-13

Family

ID=27586033

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01964695A Withdrawn EP1334445A2 (en) 2000-04-02 2001-04-02 Exchanging information between sources and consumers of a computer user's context

Country Status (2)

Country Link
EP (1) EP1334445A2 (en)
WO (1) WO2001075592A2 (en)

Also Published As

Publication number Publication date
WO2001075592A2 (en) 2001-10-11
WO2001075592A8 (en) 2003-06-12

Similar Documents

Publication Publication Date Title
US7058893B2 (en) Managing interactions between computer users' context models
US7346663B2 (en) Automated response to computer user's context
US6812937B1 (en) Supplying enhanced computer user's context data
US6791580B1 (en) Supplying notifications related to supply and consumption of user context data
US7689919B2 (en) Requesting computer user's context data
US7444594B2 (en) Mediating conflicts in computer user's context data
US7647400B2 (en) Dynamically exchanging computer user's context
US8181113B2 (en) Mediating conflicts in computer users context data
US7464153B1 (en) Generating and supplying user context data
US8225214B2 (en) Supplying enhanced computer user's context data
EP1334445A2 (en) Exchanging information between sources and consumers of a computer user's context

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20021104

AK Designated contracting states

Designated state(s): DE GB

17Q First examination report despatched

Effective date: 20090213

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20131101