Custom entities and fields in a multi-tenant database system

Information

  • Patent Grant
  • 10713230
  • Patent Number
    10,713,230
  • Date Filed
    Wednesday, July 11, 2018
    6 years ago
  • Date Issued
    Tuesday, July 14, 2020
    4 years ago
Abstract
Systems and methods for hosting variable schema data such as dynamic tables and columns in a fixed physical database schema. Standard objects, such as tables are provided for use by multiple tenants or organizations in a multi-tenant database system. Each organization may add or define custom fields for inclusion in a standard object. Custom fields for multiple tenants are stored in a custom data column within the object data structure, and this single custom data column may contain different data types for each tenant.
Description
BACKGROUND OF THE INVENTION

The present invention relates generally to multi-tenant databases, and more particularly to systems and methods for creating custom objects, such as custom entities and fields, in a multi-tenant database system.


In multi-tenant database systems, such as the salesforce.com service, a multi-tenant architecture is used wherein customer organizations (i.e., tenants) share database resources in one logical database. The database tables themselves are typically shared; each entity in the data model typically contains an organization_id column that distinguishes rows for each tenant. All queries and data manipulation in the context of a tenant filter on this (indexed) organization_id column to ensure proper security and the appearance of virtual private databases. In the salesforce.com system, for example, this strategy is used to expose standard entities such as Account, Contact, Lead, and Opportunity entities to customers.


However, customers may wish to add their own custom data to the database system in addition to the standard entities and fields provided with the standard application. In a traditional client/server application, where the customer has its own physical database, adding custom data is typically done via DDL (data definition language) against that database to create new physical schema—tables and columns. In an online multi-tenant database system, such as the salesforce.com service, this approach may be untenable for various reasons. For example, for a database system with a large population of tenants (e.g., on the order of 1,000 or 10,000 or more tenants), the union of all desired schema would overwhelm the underlying data dictionary catalog (e.g., Oracle dictionary). Additionally, the maintenance of all of these schema objects would be a nearly impossible burden for DBAs (database administrators). Further, current relational databases do not support online DDL (in a highly concurrent transactional system) well enough for organizations to remain logically independent. Specifically, the creation of schema by one organization could lock the application for all other customers causing unacceptable delays.


Accordingly, it is desirable to provide systems and methods that offer a flexible approach to storing variable schema data in a fixed physical schema so as to overcome the above and other problems.


BRIEF SUMMARY OF THE INVENTION

The present invention provides novel systems and methods for hosting variable schema data such as dynamic tables and columns in a fixed physical database schema.


According to the present invention, standard objects, such as tables are provided for use by multiple tenants or organizations. Each organization may add or define custom fields for inclusion in a standard object. In one aspect, custom fields for multiple tenants are stored in a single field within the object data structure, and this single field may contain different data types for each tenant. Indexing columns are also provided, wherein a tenant may designate a field for indexing. Data values for designated fields are copied to an index column, and each index column may include multiple data types. Each organization may also define custom objects including custom fields and indexing columns. In one aspect, custom objects for multiple tenants are stored in a single custom object data structure. The primary key values for the single custom object table are globally unique, but also include an object-specific identifier which may be re-used among different entities.


An example computer-implemented method of storing multiple fields for multiple tenants in a single multi-tenant data structure, according to the disclosure, includes defining a multi-tenant data structure having a plurality of custom data columns, and defining a first data field for a first tenant. The first data field has a first data type. The method further includes defining a second data field for a second tenant. The second field has a second data type different than the first data type. The method further includes, when records having data values in the first and second fields are created by the first and second tenants, respectively, storing the data values of first and second fields to a single custom data column in the data structure. The single custom data column includes data values have different data types for different tenants.


The example computer-implemented method of storing multiple fields for multiple tenants in a single multi-tenant data structure can include one or more of the following features. Defining a separate data structure, and for each of the first and second fields, storing an indication of the corresponding data type in the separate data structure. The separate data structure has an organization id column, and the method further includes determining a tenant id for each of the first and second tenants, and for each of the first and second tenants, storing the respective tenant id in the organization id column of the separate data structure. Determining at least one of the first data field or the second field has been flagged for indexing, and storing, in the separate data structure, an indication that the at least one of the first data field or the second field has been flagged for indexing. Storing an indication of the data type corresponding to each of the first and second fields in extensible markup language (XML) format. The data values of first and second fields are stored in the single custom data column as text in a canonical format. Defining a separate data structure having one or more columns, and in response to an indication from one of the first tenant and the second tenant that data in the first data field or the second data field, respectively, be unique, copying the data values stored in the single custom data column corresponding to the first data field or the second data field, respectively, to a column in the separate data structure.


An example computer-readable medium storing code for controlling a database system to store multiple fields for multiple tenants in a single multi-tenant data structure, according to the disclosure, includes code having instructions to define a multi-tenant data structure having a plurality of custom data columns, and define a first data field for a first tenant where the first data field having a first data type. The code further has instructions to define a second data field for a second tenant where the second field having a second data type. The second data type is different than the first data type. Finally, the code further has instructions to, when records having data values in the first and second fields are created by the first and second tenants, respectively, store the data values of first and second fields to a single custom data column in the data structure. The single custom data column includes data values having different data types for different tenants.


The example computer-readable medium storing code for controlling a database system to store multiple fields for multiple tenants in a single multi-tenant data structure can further include code that provides one or more of the following features. Define a separate data structure, and, for each of the first and second fields, store an indication of the corresponding data type in the separate data structure. The separate data structure has an organization id column, and the code further has instructions to determine a tenant id for each of the first and second tenants, and for each of the first and second tenants, store the respective tenant id in the organization id column of the separate data structure. Determine at least one of the first data field or the second field has been flagged for indexing, and store, in the separate data structure, an indication that the at least one of the first data field or the second field has been flagged for indexing. Store an indication of the data type corresponding to each of the first and second fields in extensible markup language (XML) format. The data values of first and second fields are stored in the single custom data column as text in a canonical format. Define a separate data structure having one or more columns, and in response to an indication from one of the first tenant and the second tenant that data in the first data field or the second data field, respectively, be unique, copy the data values stored in the single custom data column corresponding to the first data field or the second data field, respectively, to a column in the separate data structure.


An example multi-tenant database system, according to the disclosure, includes a database for storing multi-tenant data objects, and a database management process. The database management process is configured to define a multi-tenant data structure having a plurality of custom data columns, and define a first data field for a first tenant where the first data field having a first data type. The database management process is also configured to define a second data field for a second tenant, where the second field having a second data type different than the first data type. Finally, the database management process is also configured to, when records having data values in the first and second fields are created by the first and second tenants, respectively, store the data values of first and second fields to a single custom data column in the data structure. The single custom data column includes data values having different data types for different tenants.


The example multi-tenant database system further can include a database management process further configured to provide one or more of the following features. Define a separate data structure, and for each of the first and second fields, store an indication of the corresponding data type in the separate data structure. The separate data structure has an organization id column and the database management process is further configured to determine a tenant id for each of the first and second tenants, and for each of the first and second tenants, store the respective tenant id in the organization id column of the separate data structure. Determine at least one of the first data field or the second field has been flagged for indexing, and store, in the separate data structure, an indication that the at least one of the first data field or the second field has been flagged for indexing. Store an indication of the data type corresponding to each of the first and second fields in extensible markup language (XML) format. The data values of first and second fields are stored in the single custom data column as text in a canonical format.


Reference to the remaining portions of the specification, including the drawings and claims, will realize other features and advantages of the present invention. Further features and advantages of the present invention, as well as the structure and operation of various embodiments of the present invention, are described in detail below with respect to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates an environment wherein a multi-tenant database system (MTS) might be used according to one embodiment.



FIG. 2 illustrates elements of an MTS and interconnections therein in more detail according to one embodiment.



FIG. 3 illustrates an example of objects represented as a standard main table and an associated custom field table according to an embodiment of the present invention.



FIG. 4 illustrates a custom object represented as a custom field table 310 including physical index columns 320 according to one embodiment.



FIG. 5 illustrates an example of a custom object represented as a custom entity table according to one embodiment.



FIG. 6a illustrates a custom field definition metadata table according to an embodiment of the present invention.



FIG. 6b illustrates a metadata table used to record the name and other information for each custom entity object defined for each organization according to an embodiment of the present invention.



FIG. 7 illustrates an example of a standard entity table including standard columns and custom field columns, as well as examples of actual data values for multiple fictitious organizations.



FIG. 8 illustrates an example of a custom entity object including a custom table having data values for a fictitious organization.





DETAILED DESCRIPTION OF THE INVENTION


FIG. 1 illustrates an environment wherein a multi-tenant database system might be used. As illustrated in FIG. 1 (and in more detail in FIG. 2) any user systems 12 might interact via a network 14 with a multi-tenant database system (MTS) 16. The users of those user systems 12 might be users in differing capacities and the capacity of a particular user system 12 might be entirely determined by the current user. For example, where a salesperson is using a particular user system 12 to interact with MTS 16, that user system has the capacities allotted to that salesperson. However, while an administrator is using that user system to interact with MTS 16, that user system has the capacities allotted to that administrator.


Network 14 can be a LAN (local area network), WAN (wide area network), wireless network, point-to-point network, star network, token ring network, hub network, or other configuration. As the most common type of network in current use is a TCP/IP (Transfer Control Protocol and Internet Protocol) network such as the global internetwork of networks often referred to as the “Internet” with a capital “I,” that will be used in many of the examples herein, but it should be understood that the networks that the present invention might use are not so limited, although TCP/IP is the currently preferred protocol.


User systems 12 might communicate with MTS 16 using TCP/IP and, at a higher network level, use other common Internet protocols to communicate, such as HTTP, FTP, AFS, WAP, etc. As an example, where HTTP is used, user system 12 might include an HTTP client commonly referred to as a “browser” for sending and receiving HTTP messages from an HTTP server at MTS 16. Such HTTP server might be implemented as the sole network interface between MTS 16 and network 14, but other techniques might be used as well or instead. In some implementations, the interface between MTS 16 and network 14 includes load sharing functionality, such as round-robin HTTP request distributors to balance loads and distribute incoming HTTP requests evenly over a plurality of servers. Preferably, each of the plurality of servers has access to the MTS's data, at least as for the users that are accessing that server.


In preferred aspects, the system shown in FIG. 1 implements a web-based customer relationship management (CRM) system. For example, in one aspect, MTS 16 can include application servers configured to implement and execute CRM software applications as well as provide related data, code, forms, web pages and other information to and from user systems 12 and to store to, and retrieve from, a database system related data, objects and web page content. With a multi-tenant system, tenant data is preferably arranged so that data of one tenant is kept separate from that of other tenants so that one tenant does not have access to another's data, unless such data is expressly shared.


One arrangement for elements of MTS 16 is shown in FIG. 1, including a network interface 20, storage 22 for tenant data, storage 24 for system data accessible to MTS 16 and possibly multiple tenants, program code 26 for implementing various functions of MTS 16, and a process space 28 for executing MTS system processes and tenant-specific processes, such as running applications as part of an application service.


Several elements in the system shown in FIG. 1 include conventional, well-known elements that need not be explained in detail here. For example, each user system 12 could include a desktop personal computer, workstation, laptop, PDA, cell phone, or any WAP-enabled device or any other computing device capable of interfacing directly or indirectly to the Internet or other network connection. User system 12 typically runs an HTTP client, e.g., a browsing program, such as Microsoft's Internet Explorer™ browser, Netscape's Navigator™ browser, Opera's browser, or a WAP-enabled browser in the case of a cell phone, PDA or other wireless device, or the like, allowing a user (e.g., subscriber of a CRM system) of user system 12 to access, process and view information and pages available to it from MTS 16 over network 14. Each user system 12 also typically includes one or more user interface devices, such as a keyboard, a mouse, touch screen, pen or the like, for interacting with a graphical user interface (GUI) provided by the browser on a display (e.g., monitor screen, LCD display, etc.) in conjunction with pages, forms and other information provided by MTS 16 or other systems or servers. As discussed above, the present invention is suitable for use with the Internet, which refers to a specific global internetwork of networks. However, it should be understood that other networks can be used instead of the Internet, such as an intranet, an extranet, a virtual private network (VPN), a non-TCP/IP based network, any LAN or WAN or the like.


According to one embodiment, each user system 12 and all of its components are operator configurable using applications, such as a browser, including computer code run using a central processing unit such as an Intel Pentium processor or the like. Similarly, MTS 16 (and additional instances of MTS's, where more than one is present) and all of their components might be operator configurable using application(s) including computer code run using a central processing unit such as an Intel Pentium processor or the like, or multiple processor units. Computer code for operating and configuring MTS 16 to intercommunicate and to process web pages and other data and media content as described herein is preferably downloaded and stored on a hard disk, but the entire program code, or portions thereof, may also be stored in any other volatile or non-volatile memory medium or device as is well known, such as a ROM or RAM, or provided on any media capable of storing program code, such as a compact disk (CD) medium, digital versatile disk (DVD) medium, a floppy disk, and the like. Additionally, the entire program code, or portions thereof, may be transmitted and downloaded from a software source, e.g., over the Internet, or from another server, as is well known, or transmitted over any other conventional network connection as is well known (e.g., extranet, VPN, LAN, etc.) using any communication medium and protocols (e.g., TCP/IP, HTTP, HTTPS, Ethernet, etc.) as are well known. It will also be appreciated that computer code for implementing aspects of the present invention can be implemented in any programming language that can be executed on a server or server system such as, for example, in C, C++, HTML, Java, JavaScript, any other scripting language, such as VBScript and many other programming languages as are well known.


According to one embodiment, each MTS 16 is configured to provide web pages, forms, data and media content to user systems 12 to support the access by user systems 12 as tenants of MTS 16. As such, MTS 16 provides security mechanisms to keep each tenant's data separate unless the data is shared. If more than one MTS is used, they may be located in close proximity to one another (e.g., in a server farm located in a single building or campus), or they may be distributed at locations remote from one another (e.g., one or more servers located in city A and one or more servers located in city B). As used herein, each MTS could include one or more logically and/or physically connected servers distributed locally or across one or more geographic locations. Additionally, the term “server” is meant to include a computer system, including processing hardware and process space(s), and an associated storage system and database application (e.g., RDBMS) as is well known in the art. It should also be understood that “server system” and “server” are often used interchangeably herein. Similarly, the databases described herein can be implemented as single databases, a distributed database, a collection of distributed databases, a database with redundant online or offline backups or other redundancies, etc., and might include a distributed database or storage network and associated processing intelligence.



FIG. 2 illustrates elements of MTS 16 and various interconnections in more detail. In this example, the network interface is implemented as one or more HTTP application servers 100. Also shown is system process space 102 including individual tenant process spaces 104, a system database 106, tenant database(s) 108 and a tenant management process space 110. Tenant database 108 might be divided into individual tenant storage areas 112, which can be either a physical arrangement or a logical arrangement. Within each tenant storage area 112, user storage 114 might similarly be allocated for each user.


It should also be understood that each application server 100 may be communicably coupled to database systems, e.g., system database 106 and tenant database(s) 108, via a different network connection. For example, one server 1001 might be coupled via the Internet 14, another server 100N-1 might be coupled via a direct network link, and another server 100N might be coupled by yet a different network connection. Transfer Control Protocol and Internet Protocol (TCP/IP) are preferred protocols for communicating between servers 100 and the database system, however, it will be apparent to one skilled in the art that other transport protocols may be used to optimize the system depending on the network interconnect used.


In preferred aspects, each application server 100 is configured to handle requests for any user/organization. Because it is desirable to be able to add and remove application servers from the server pool at any time for any reason, there is preferably no server affinity for a user and/or organization to a specific application server 100. In one embodiment, therefore, an interface system (not shown) implementing a load balancing function (e.g., an F5 Big-IP load balancer) is communicably coupled between the servers 100 and the user systems 12 to distribute requests to the servers 100. In one aspect, the load balancer uses a least connections algorithm to route user requests to the servers 100. Other examples of load balancing algorithms, such as round robin and observed response time, also can be used. For example, in certain aspects, three consecutive requests from the same user could hit three different servers, and three requests from different users could hit the same server. In this manner, MTS 16 is multi-tenant, wherein MTS 16 handles storage of different objects and data across disparate users and organizations.


As an example of storage, one tenant might be a company that employs a sales force where each salesperson uses MTS 16 to manage their sales process. Thus, a user might maintain contact data, leads data, customer follow-up data, performance data, goals and progress data, etc., all applicable to that user's personal sales process (e.g., in tenant database 108). In the preferred MTS arrangement, since all of this data and the applications to access, view, modify, report, transmit, calculate, etc., can be maintained and accessed by a user system having nothing more than network access, the user can manage his or her sales efforts and cycles from any of many different user systems. For example, if a salesperson is visiting a customer and the customer has Internet access in their lobby, the salesperson can obtain critical updates as to that customer while waiting for the customer to arrive in the lobby.


While each user's sales data might be separate from other users' sales data regardless of the employers of each user, some data might be organization-wide data shared or accessible by a plurality of users or all of the sales force for a given organization that is a tenant. Thus, there might be some data structures managed by MTS 16 that are allocated at the tenant level while other data structures might be managed at the user level. Because an MTS might support multiple tenants including possible competitors, the MTS should have security protocols that keep data, applications and application use separate. Also, because many tenants will opt for access to an MTS rather than maintain their own system, redundancy, up-time and backup are more critical functions and need to be implemented in the MTS.


In addition to user-specific data and tenant-specific data, MTS 16 might also maintain system level data usable by multiple tenants or other data. Such system level data might include industry reports, news, postings, and the like that are sharable among tenants.


In certain aspects, client systems 12 communicate with application servers 100 to request and update system-level and tenant-level data from MTS 16 that may require one or more queries to database system 106 and/or database system 108. MTS 16 (e.g., an application server 100 in MTS 16) generates automatically one or more SQL statements (the SQL query) designed to access the desired information.


Each database can generally be viewed as a collection of objects, such as a set of logical tables, containing data fitted into predefined categories. A “table” is one representation of a data object, and is used herein to simplify the conceptual description of objects and custom objects according to the present invention. It should be understood that “table” and “object” may be used interchangeably herein. Each table generally contains one or more data categories logically arranged as columns or fields in a viewable schema. Each row or record of a table contains an instance of data for each category defined by the fields. For example, a CRM database may include a table that describes a customer with fields for basic contact information such as name, address, phone number, fax number, etc. Another table might describe a purchase order, including fields for information such as customer, product, sale price, date, etc. In some multi-tenant database systems, standard entity tables might be provided. For CRM database applications, such standard entities might include tables for Account, Contact, Lead and Opportunity data, each containing pre-defined fields.


Custom Fields


According to one embodiment, for a table such as one for a standard entity, an additional set of one or more columns, e.g., 10, 100, or 250 columns, of text data are defined in the physical schema. These additional columns, also referred to herein as custom data columns, custom field columns or custom fields, allow a system administrator to define additional fields that are not included in the pre-defined standard fields for that entity. These custom fields preferably have a data-type of VARCHAR (variable length character). In one aspect, these custom fields are preferably stored out of row from the main entity table, although these fields may be stored in the main table. For example, if the main table is called “sales.account” then the custom field data might be stored in a table called “sales.account_cfdata” where “cf” stands for “custom field.” Both of these tables preferably contain an organization_id column to distinguish tenant rows, as well as the same indexed primary key (e.g., account id, in this case) that identifies those rows throughout the database. Furthermore, both tables are preferably partitioned physically on the DB (e.g., Oracle DB) to encourage parallelization, for example, when necessary to act on the entire table for maintenance purposes and to maintain shallower indexes.



FIG. 3 illustrates an example of objects represented as a main table 200 and an associated custom field table 210. In the specific example shown in FIG. 3, the main table 200 (.account) represents a standard Account entity and the custom field table 210 (.account_cfdata) includes the custom fields defined by the various organizations (tenants) using the main table 200. As shown, main table 200 includes an organization ID (“org id”) column 201 and a table ID (e.g., “acc id” for .account id) column 202 that acts as the primary key for table 200. Data table 200 also includes a plurality of data columns 203. In the specific example of FIG. 3, where the table represents a standard entity, data columns 203 are the predefined data columns, or standard fields, that are provided to the various organizations that might use the table. In the standard Account entity example, such standard fields might include a name column, a site column, a number of employees column and others as would be useful for storing account-related information. Each of the data columns 203 is preferably defined to store a single data type per column. The org id column 201 is provided to distinguish among organizations using the multi-tenant account table 200. As shown, N different organizations have data stored in table 200. The org ids in column 201 are preferably Char(15), but may include other data types. In one aspect, the first 3 characters of the org id is set to a predefined prefix, such as “00d”, although another subset of characters in the org id may be used to hold such a prefix if desired.


Custom field table 210 similarly includes an org id column 211, a table id column 212 and plurality of data columns 213. As above, table id column 212 acts as the primary key for table 210 and preferably includes the same values as table id column 202 of table 200. In the specific example shown, there are 250 data columns 213 labeled as val0, val1 . . . val249. It is appreciated that any other number may be used as desired, such as, for example, 10 or 100.


When an organization is created initially and associated with database table 200, the custom field columns 213 are empty for that organization. However, every time a record or row is created in the main table (e.g., .account) a corresponding row is created in the custom field table—all custom field columns are Null, and therefore take up no space until used.


In one aspect, data is only allowed to enter these custom fields when a new “column” for the organization is defined, e.g., by the administrator for that organization. For example, in the Account entity example, it may be desirable for a specific organization to create one or more additional custom fields, in addition to the standard fields 203, to store specific types of data that may not be accounted for in the predefined standard fields. The present invention advantageously allows an organization to create additional custom columns for such data. Rather than defining a physical column (in Oracle, the definition of which would be placed in the Oracle dictionary catalog) instead this definition is stored in metadata, e.g., in a metadata catalog, which may include one or more metadata tables. The definition of a physical column could likewise be stored in XML or some other format.



FIG. 6a illustrates an example of a custom field definition metadata table 500 (“custom_field_definition”) according to an embodiment of the present invention. Custom_field_definition metadata table 500 is used to record the name, datatype and other information for each custom field column defined for each organization and table (e.g., standard tables and custom tables, which will be described in more detail below). As shown, metadata table 500 includes custom_field_definition_id column 510, organization_id column 520, table name or id column 530, field name column 540, field datatype column 550, is_indexed column 560 and a column_number column 570. Organization_id column 520 stores the org id of the organization for which the custom field is created, and the custom_field_definition_id column is the primary key for table 500. Table name column 530 stores the names of standard entity tables, such as Account, or the id of custom entity tables created for an organization. Field name column 540 stores the text name of the custom field, and field datatype column 550 stores the data type for the custom field. Examples of data types include text, number, date, picklist, etc. A picklist data type is a text field where the value is chosen from an enumerated list of values. A picklist is typically displayed as a dropdown in the UI. Is_indexed column 560 stores a value indicating whether the field has been flagged for indexing, which will be described in more detail below. In one aspect, column 560 stores a boolean value. Column_number column 570 stores the column number (e.g., “val0”) assigned to a custom field in custom field table 210 (FIG. 3).


The creation of a new custom field in the application allocates one of the custom field columns 213 to hold the data. In preferred aspects, the lowest numbered columns are filled first. For example, as shown in FIG. 3, the “val0” column is filled first and then the “val1” column and so on for each organization. Therefore, depending on the number of custom columns defined by an organization, each custom field 213 may or may not contain data for an organization. Now, when users of the application in an organization edit rows for that table, the new custom field appears on the screen (or via the API), which will appear the same as all the other standard fields. However, when this data is persisted in the database, the value of the custom field is stored in the designated custom field column in the separate custom field table 210, instead of in the standard main table 200.


In one aspect, a variety of virtual data-types are allowed for these custom fields even though the underlying physical storage may be character based. When the organization's system administrator defines numeric or date custom field types, for instance, then the values are stored as text in a canonical format that allows easy conversion back to the logical data-type. As mentioned earlier, in one aspect, a data type of VARCHAR is preferably used. For instance, in this aspect, dates are stored in the YYYYMMDD format—which allows for conversion via the TO_DATE(<column>, ‘YYYYMMDD’) function and also allows for proper sorting without doing any conversion. For numbers, the usual decimal format is used, and the Oracle function TO_NUMBER( ) may be used to convert back to numeric values for sorting, mathematical operations, and filtering, etc.


Because the database is multi-tenant, a given physical custom field column may contain data across multiple organizations. For example, because an organization is not limited to specific data types, one organization may define one data type such as a date and another organization may define a different data type such as a string or a number. Therefore it is likely that strings, numbers, and dates will all be found in one physical custom field column. FIG. 3 illustrates an example of a custom field column containing different data types. As shown in the “val0” custom column, for example, the custom column data type defined by organization 1 is data type 1, the custom column data type defined by organization 2 is data type 2, and the custom column data type defined by organization N is data type 3. Data types 1, 2 and 3 may be the same or they may be different. For example, data type 1 may be text, data type 2 may be date, and data type 3 may be number. FIG. 7, and the related discussion below, illustrates an example where different data types are mixed in a custom field column. In one aspect, a separate pool of columns is provided for custom fields of different data types, i.e., each of the custom field columns in the separate pool contains a single data type.


In one embodiment, metadata is used to determine the data type(s) in a given custom field column. That is, metadata is used to track the logical data type for each organization in each custom column. In one aspect, a mapping function is created from the metadata. For example, when an organization defines a custom field for a standard entity, a custom field definition is stored in metadata table 500 including the organization_id for that organization, the table name (e.g., .account_cfdata) and the column number assigned in the custom table (e.g., val0). In this manner, the data type(s) in any custom column can be determined for efficient data retrieval given the column number, table name and organization_id.


Custom Field Indexing


Now consider the problem of indexing the data in these custom field columns (e.g., columns 213) to allow for fast retrieval. For example, users expect to filter on date values as dates and numeric values as numbers. However, in order for these filters to work efficiently, given the expressions above used to convert their values, it would be necessary to place a functional index (e.g., an Oracle DB functional index) on each organization's slice of the data in a given custom field column. This is not possible from the Oracle DB perspective because the Oracle DB does not understand that one physical column contains data in multiple formats. For example, if one tries to create an index on the TO_DATE or TO_NUMBER expressions above, an error would result since other textual values in that physical column would not conform to the desired format.


Similarly, when searching on string data, users expect case insensitive searches. That is, searching for “car” should find “CAR” or “CaR.” However, the definition of case insensitive is language dependent, and a service (e.g., CRM service) using such a multi-tenant database structure may be multi-language enabled. To search properly on multi-language data requires the use of a functional index built using various NLS (natural language standards) functions in Oracle. Since a given physical column could contain data in multiple languages it would be necessary to build N different indexes for each of the languages supported which would result in a non-scalable solution.


For the reasons listed above, such “Indexed Custom Fields” are implemented in one embodiment by storing data in a separate set of indexed columns. According to one embodiment of the present invention, a plurality of additional index columns are provided to allow for indexing custom fields. When a custom field is flagged for indexing by a database administrator, one of the plurality of index columns is allocated to that flagged column. Data from the flagged column is copied to the allocated index column. The data is stored in the index column in a format that facilitates searching, e.g., for dates and strings. For example, the YYYYMMDD is itself a searchable format as strings in that format can be compared lexically using normal string comparison.



FIG. 4 illustrates an example of a custom object represented as a custom field table 310 including physical index columns 320 according to one embodiment. In one aspect, each custom field data table contains multiple (e.g., 10, 100, 250, etc.) physically indexed columns 320, e.g., using standard Oracle B*Tree indexes. In an example with 10 indexed columns, an administrator can therefore designate up to 10 custom fields, of string or date types, to be indexed. When a custom field is flagged for indexing, the data in the original column (which is still maintained to display the un-modified format to the user when necessary) is copied to one of these indexed columns. For example, as shown in FIG. 4, custom data field “val0” was flagged by the system administrator for organization 1 as an indexed custom column. Data from this flagged column is copied to the index column “ival0”. Similarly, custom data field “val1” was flagged by the system administrator for organization 2 as an indexed custom column, and the data from this flagged column is copied to index column “ival0”. At some later time, the system administrator for organization 2 may have flagged another custom field column and the data for this column is copied to another index column (e.g., column “val0” data copied to column “ival1” as shown in FIG. 4). In one aspect, similar to the custom fields, the lowest numbered index columns are preferably used or filled first.


In one aspect, to avoid the problem with searching across multiple languages, a “case folding” algorithm is implemented (e.g., in an application server) that converts each string custom field value to a universal case insensitive format. One such case folding algorithm is an algorithm defined by the Unicode Consortium in the Unicode 4.0 standard, section 3.13—Caseless Matching (http://www.unicode.org/versions/Unicode4.0.0/ch03.pdf), hereby incorporated by reference, which is a tabular lookup function that converts characters to a form that is binary comparable independent of case for all languages that have a concept of case. Whenever values in the original custom field column are searched, the SQL instead filters on the corresponding case-folded indexed column after performing the same case folding operation on the literal being searched. Dates need not be modified from their YYYYMMDD format, which is also included in the index (unmodified) as text.


Organizations that choose not to use indexed custom fields will have null values in these fields, and Nulls do not take up any space in the indexes. In this manner space is used up in the database only as custom columns are actually indexed. Also, index columns 320 are preferably stored in the corresponding custom field table, however, they may be stored out of row, in which case it is preferred that the org id 311 and table id 312 columns be copied to the separate indexed column table to facilitate searching.


Custom Field Uniqueness


Another desired schema feature is the concept of a uniqueness constraint. Again, a unique index cannot be placed on a custom field physical column because, although the values may be unique for one organization, they may not be unique for some other organization that shares that physical column. For example, it is possible that two records for two different organizations would have the same exact data value stored in the same custom field.


To implement this uniqueness feature, in one aspect, a separate table is provided that contains only the data values for customers who require uniqueness. Once the organization administrator has enabled a custom field for uniqueness, all values for that organization are inserted in this unique index table, and ongoing changes to that custom field column are updated synchronously to the unique index table (described below). If either of these operations causes an Oracle DB unique index violation then the error is passed back to the end user—the administrator would need to “clean up” the data in a field before declaring it unique.


One schema for a unique index maintenance table is as follows:


1. organization_id


2. custom_field_definition id


3. custom field value


This schema allows multiple custom fields from the same organization (and entity) to be indexed. The first two columns are preferably compressed in the Oracle DB unique index since that would make the physical index smaller, and this table could be index organized since its only purpose as a table is to be used as a unique index.


Custom Tables


It is also desirable to create whole new logical entity tables (entities) for the purpose of extending a base application or for integrating with other systems. For example, an organization using the standard entities provided by the system may desire that one or more new entities be created to specifically cater to, and to facilitate data storage and retrieval for, that organization's particular business model. Accordingly, one embodiment of the present invention provides the functionality to create custom entity tables or custom entities.


As with the approach for custom fields, all custom entity data rows are stored in a single multi-tenant physical table according to one embodiment. However, unlike standard custom field tables, the custom entity data table in one aspect contains multiple logical tables per organization. It is transparent to customers that their multiple “tables” are in fact stored in one large table.



FIG. 5 illustrates an example of a custom object represented as a custom entity table 400 according to one embodiment. Table 400 includes an org id column 401, a custom entity id column 402 and a plurality of custom field columns 403 (labeled “val0”, “val1”, . . . ). A plurality of optional index columns 420 (labeled “ival0”, “ival1”, . . . ) may also be provided. The org id column is used to distinguish among the various organizations populating table 400. For example, multiple organizations may create custom entities, all of which are stored to table 400 in one aspect. Custom entity id column 402 is used to distinguish among the various custom entity tables stored in table 400. Custom entity id column 402 also acts as the primary key column for table 400. Custom field columns 403 are used to store the data for the various custom entities defined by the various organizations. Specifically, custom field columns 403 store the columns defined for each of the various custom entities defined by the various organizations populating table 400. Index columns 420 are implemented similar to custom field indexed columns 320 described above with reference to FIG. 4.


According to one embodiment, the first 3 characters of the globally unique primary key field 402 are used to identify the specific entity type. This technique advantageously allows for multiple custom entity types for one organization to be distinguished in this one custom entity table 400 as will be discussed below. It will be appreciated, however, that fewer or more than the first 3 characters of the primary key may be used to identify entities, or that any subcombination of characters of the primary key may be used.


When an organization administrator defines a new custom entity, the definition is stored in the metadata instead of the underlying data dictionary. FIG. 6b illustrates an example of a custom entity definition metadata table 600 (“custom_entity_definition”) according to an embodiment of the present invention. When a new custom entity is defined, the database system allocates a unique (within that organization) 3-character prefix for rows of that entity type. In one aspect, the letter ‘a’ is chosen as the first character of all custom entity primary keys, e.g., a01 . . . a02 . . . a03 . . . aMN . . . as shown in column 402 of table 400. As shown, across all organizations the same 3-character prefix may be re-used. For example, “a01” is reused as a prefix for multiple organizations. However, the remainder of the custom entity id ensures global uniqueness (and that data from different organizations is never mingled). In one aspect, these 3-character id's are encoded in base62, so that each initial character allows for 62*62=3844 different custom entity types per organization—a large enough number for virtually all uses. It should be appreciated, however, that different encoding bases may be used to provide a fewer or greater number of custom entity types per organization. It should also be appreciated that the custom entity id field may be a composite primary key, for example, spanning two or more columns, one column for the prefix and the other column(s) for the remainder of the custom entity id. For the sake of simplicity, row partitions are not shown in table 400, however organization partitions 450 and entity partitions 460 are shown.


Referring to FIG. 6b, custom_entity_definition metadata table 600 is used to record the name and other information for each custom entity object defined for each organization. As shown, metadata table 600 includes custom_entity_definition_id column 610, organization_id column 620, entity_name column 630, and key prefix column 540. Organization_id column 620 stores the org id of the organization for which the custom entity is created, and the custom_entity_definition_id column 610 is the primary key for table 600. Entity name column 630 stores the names of the custom entity table, e.g., as a text datatype. Key prefix column 640 stores the 3-character prefix (e.g., “a01”, “a02”, etc.) allocated for rows of that entity type.


When creating a custom entity table, the administrator for an organization specifies a unique (within the organization) developer name for the custom entity—this is the name used to identify that particular entity for API calls and other developer entry points into the system. This name is stored in the entity name column 630 of table 600. Custom fields may also be defined for custom entities, and where desired, custom fields may be flagged for indexing, as described above. Once custom fields are defined for the custom entity, the organization can begin to use that custom entity like any other standard entity. For example, all API operations (e.g., describe, insert, update, delete, query, search) are available and the organization may define a user interface for editing that custom entity in an online application. Transparent to the users and organization, however, the custom entity table is stored in a single custom entity table 400 along with other custom entity tables defined by that organization as well as other organizations.


One difference in terms of SQL when operating on a custom entity table is the need to filter on the custom entity id in addition to the organization id to ensure that the data from multiple logical entity types within one organization are not mixed together. For example, the leading 3-character portion of the primary key index (e.g., a01 . . . aMN) can be used for this efficient filtering. Thus, filtering on the organization id and the 3-character prefix provides a determination of a specific entity type for the organization. Similarly, an insert PL/SQL call should be told which 3-character prefix to use when inserting a new primary key value and custom entity row.


Similar to custom field columns 213 of FIG. 3, custom field columns 403 may contain multiple data types. For example, when organization #1 defines custom entity table 1 (identified by “a01” for org 1 “00d1” in table 400) a custom field column definition having data type 1 may be allocated to the “val0” column as shown. Similarly, a custom field column definition for a second custom entity table (identified by “a02” for org 1) having data type 2 may be allocated to the same “val0” column as shown. Data types 1 and 2 may be the same or different. In this manner, it is possible that numerous data types may be stored in any given custom field column 403 in custom entity table 400 for the various custom entities defined by the various organizations. Accordingly, using optional index fields 420, an organization is able to flag one or more columns in its custom entities for indexing as described above. Filtering would also proceed similar to that discussed above.


In one embodiment, foreign keys may be defined as a data type when creating custom entities. In this manner a relationship with a standard entity, or another custom entity may be provided to facilitate data storage and retrieval (e.g., reduce redundant data storage). For example, when defining a custom entity, a system administrator may define a custom field as a foreign key data type to establish a relationship with one or more other entities. The primary key for the related entity is copied and stored in that custom field. In one aspect, a plurality of columns is provided to store custom fields of type foreign key. These separate columns may be indexed.


SPECIFIC EXAMPLES


FIG. 7 illustrates an example of a standard entity table 700 including standard columns 703 and custom field columns 713, as well as examples of actual data values for multiple organizations. As shown, the standard table 700 represents an Account entity having a standard name field and other standard fields 703. In this example, ABC Corp. (identified by “00d1” in org id field 701) has defined a custom column for “account web address” that has been allocated to the val0 column. The data type for this custom field is defined as text. Additionally, ABC Corp. has defined a second custom field for “account stock price”, which has been allocated to the val1 column, and a third custom field for “account ticker symbol”, which has been allocated to another column. The data types for these columns are number and text, respectively. Similarly, 123 Corp. (identified by “00d2” in org id field 701) and XYZ Corp. (identified by “00dN” in org id field 701) have each defined a custom field for “account next annual meeting date” and “account fiscal year”, respectively. The data types for these custom fields are date and picklist, respectively. These custom fields have both been allocated to the val0 column, even though their data types are different. The definitions of these custom fields are stored to metadata, e.g., metadata table 500, as discussed above.


As shown, table 700 holds account data for ABC Corp. including specific account data for “IBM”, “Dell” and “Apple” as shown. Similarly, table 700 also holds account data for 123 Corp. and XYZ Corp. As shown, both 123 Corp. and XYZ Corp. each have a specific entry for an account with the same name: “Disney”. However, these entries are distinguished based on the globally unique primary key 702 (or 712). For example, for XYZ Corp., the account entry for “Disney” has a primary key value of “001 . . . 932”, whereas the “Disney” account entry for 123 Corp. has a primary key value of “001 . . . 87”. As above, the data values in the val0 custom column have mixed data types. For example, for ABC Corp. the “web address” field is text, whereas the “next annual meeting date” field for 123 Corp. has a date data type, and the “fiscal year” field for XYZ Corp. has a picklist data type.



FIG. 8 illustrates an example of a custom entity object 800 including an custom table 810 for ABC Corp. As shown, ABC Corp. (identified by “00d1” in org id column 801) has defined a custom object 810 to represent Assets. The definition of Assets object 810 is stored to metadata, e.g., in table 600 (FIG. 6b). Assets object 810 has been allocated the prefix “a02” for the custom entity id. Also, as shown, ABC Corp. has defined another custom object, e.g., identified by prefix “a01” in custom entity id column 802. A separate column may be provided in table 800 to store the prefixes (e.g., “a01”) of the various objects stored in table 800. Assets object 810 has been defined with a custom foreign key column and various data columns. The custom foreign key (FK) column is allocated to the “Val0” column, whereas data fields for “asset name”, “asset value”, “asset depreciation type” and “asset replacement date” have been allocated to columns “Val1” to “Val4”, respectively. In this example, the data types for these fields are text, number, picklist and date, respectively.


Assets object 810 is a child custom object of Account object 700. The custom foreign key column connects each row in object 810 to its parent account (in these examples, Account object 700 has been allocated a prefix of “001” for its table id). For example, the foreign key value “001 . . . 9” connects to the row in table 700 for account name “DELL”. Similarly, the foreign key values “001 . . . 8” and “001 . . . 10” connect to the rows in table 700 for account names “IBM” and “APPLE”, respectively. Also, as shown, XYZ Corp. (identified by “00dN” in org id column 801) has defined a custom object to suit their business needs, which custom object is also stored in table 800. As such, any given data column 803 may contain mixed data types depending on the definitions of the various custom objects stored in table 800.


Re-Usable Services


One goal of custom entities is not only to support a grid of data (e.g., rows and columns configured by organizations/customers) but also to support the same set of application high-level semantic services exposed for standard entities. This provides for a system that is not only more than just an online data provider, but also an application-building infrastructure with rich re-usable services.


With reference to the salesforce.com service, several examples of such reusable services, and how they apply to custom entities, follow:


History Tracking


Standard entities in salesforce.com (such as Case and Opportunity entities) support automatic auditing of data changes to records. This auditing typically occurs at a low-level in the application server where all data is being written to the database. This same code path is preferably used with custom entities.


The same generalized schema used for standard entities works for custom entities as well—this is preferably a pivoted schema with one field delta per row:


1. organization_id


2. custom entity data id


3. custom field definition id


4. old value


5. new value.


However, it may be a non-pivoted schema. A non-pivoted schema has columns for each separate piece of information. It looks like an excel spreadsheet:















ID
Name
Phone
Email address







111
Craig
555-1212
foo@bar.com









A pivoted schema uses generic column names such as:














ID
Property Name
Property Value







111
Name
Craig


111
Phone
555-1212


111
Email Address
foo@bar.com









The pivoted schema has many more rows in it, but the rows are skinnier (imagine if there were 50 columns of data—that would turn into 50 rows in the pivoted schema, but the pivoted schema itself would have the same columns). So a normal schema is short and wide, whereas a pivoted schema is tall and skinny A pivoted schema is useful, for example, for auditing purposes such as for providing a case history related list—where the user is shown every field value change as one row in a grid. Pivoted schemas, however, are typically difficult to use for normal data display like a detail screen with all the information for a person.


If the administrator “turns on” this property in the definition of the custom entity and custom field then this behavior happens automatically (changes are logged to this one multi-tenant auditing table). The data in this generic history table is available for display in the online application or via an API query.


As an example, consider changes made to a standard entity such as Case. The system might record the following history rows when edits to Case are saved:

















Org
Case
Field
Old
New



Id
Id
Name
Value
Value
Date







00d1
5001
Subject
Problem with
Problem with
Mar. 4, 2004





Disc drive
Disk Drive


00d1
5001
Status
Open
In Progress
Mar. 4, 2004


00d1
5001
Priority
Low
Medium
Mar. 4, 2004


00d1
5002
Status
Open
Closed
Mar. 5, 2004


00d1
5002
Rep Name
Frank
Sally
Mar. 5, 2004




(custom)









The above data records two edit operations, one for case 5001 that occurred on Mar. 4, 2004, and another for case 5002 that occurred on Mar. 5, 2004. Several fields were edited each time.


As another example, consider changes made to the Assets custom object 810 of FIG. 8. An example of history tracking rows for a single edit operation made on Mar. 4, 2004 might look like the following:

















Org
Cust Ent
Field
Old
New



Id
Id
Name
Value
Value
Date







00d1
a02
Asset Name
Laptop X
Laptop Y
Mar. 4, 2004


00d1
a02
Asset Value
50
45
Mar. 4, 2004


00d1
a02
Deprec.
Linear
Accelerated
Mar. 4, 2004




Type









All this information is recorded automatically by the system. The user interface (UI) might present the information similar to that shown above, or in any other convenient format.


Permission Based Security and Sharing Model


Administrators may wish to restrict access to particular entity types from particular user profiles—in the same way that standard entities have permissions such as EDIT ACCOUNT.


The administrator can define that a given entity type requires an explicit READ or EDIT permission. A generic profileCustomEntity metadata table (available for edit through the API) allows creation of relationship rows that associate a profile (read access) with a custom entity type and optionally declares whether users in that profile can edit rows in that entity type.


The common Application Server and PL/SQL code that retrieves and edits custom entity data can then check this metadata for the current user and reject the operation if the user does not have the proper permission.


In one aspect, a sharing model allows even finer granularity of access to rows—in addition to the permission checks above. The administrator, when defining a custom entity type, can choose whether the entity type is editable by all users (Public Read/Write), read-only for all users (Public Read/Only), or privately available only to the owner of a record or to users who are granted explicit sharing access to a record (Private).


To support the latter sharing model, in one aspect, a standard owner field is added to the custom entity data table and becomes available in the API. The same semantics attached to the owner field in other standard entities apply. For example, managers in the role hierarchy gain access to all records owned by a subordinate. Also, a generic sharing entity, e.g., customEntityShare, is used in one aspect for entering manual explicit sharing access for particular custom entity rows to users or groups—in the same way that the accountShare entity is available in the API (and UI) to allow granting explicit account access.


Currency Type


A standard field in custom entities is a single currency type that controls the currency of all numeric currency custom fields in that row. This functionality is consistent with all standard entities and allows for the same currency translation as elsewhere in the application.


Multiple Business Processes Per Entity Type


Standard entities allow for the definition of multiple “Record Types” or business processes. For instance, an opportunity entity can have both telesales opportunities as well as direct sales opportunities. Depending on the record type of an individual opportunity row, the values available for picklist fields change as configured by the organization administrator.


Custom entities also allow for the specification of this same metadata by the administrator. The picklist custom fields in that entity are preferably affected in the same manner as for standard entities.


Workflow


In one aspect, the present invention provides for the definition of trigger conditions and actions for specific entity types. For instance, if an opportunity amount exceeds a particular value (trigger condition) then a notification, such as an email, is sent (action) to a predesignated individual or group, e.g., the VP of sales of that organization.


Once again the metadata used internally for defining these rules preferably operates similarly for custom entities as for standard entities. The code, e.g., executing in an application server or database server, that evaluates these conditions for each row edit occurs at a low level where both standard and custom entities are able to take advantage of this functionality.


While the invention has been described by way of example and in terms of the specific embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. To the contrary, it is intended to cover various modifications and similar arrangements as would be apparent to those skilled in the art. Therefore, the scope of the appended claims should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements.

Claims
  • 1. A method comprising: defining, at a server system that is communicatively coupled to at least one storage device, a multi-tenant data structure in the at least one storage device including a data table having a plurality of data columns and a plurality of rows, wherein at least two of the rows of the data table are each specific to different tenants and store data for a corresponding one of the different tenants;receiving, at the server system from a first tenant a first definition for a first data column of the plurality data columns, the first definition designating a first data field of the first data column for storing data that is of a first data type,receiving, at the server system from a second tenant a second definition for the data column, the second definition designating a second data field of the first data column for storing data that is of a second data type, wherein the second data type is different than the first data type;storing in metadata of the multi-tenant data structure, at the at least one storage device by the server system, the first definition for the first data column and the second definition for the first data column by: storing, in the metadata at the at least one storage device, an identifier of the first tenant in association with an identifier of the first data column and an identifier of the first data type, andstoring, in the metadata at the at least one storage device, an identifier of the second tenant in association with the identifier of the first data column and an identifier of the second data type;receiving, by the server system from the first tenant, a first data value of the first data type to be stored in the first data column;storing, at the at least one storage device by the server system, the first data value of the first data type received from the first tenant using the first data field of the first data column;receiving, by the server system from the second tenant, a second data value of the second data type to be stored in the first data column; andstoring, at the at least one storage device by the server system, the second data value of the second data type received from the second tenant using the second data field of the first data column.
  • 2. The method of claim 1, further comprising: when the first data field has been flagged for indexing, storing, in the metadata at the at least one storage device, an indication that the first data field has been flagged for indexing; andwhen the second data field has been flagged for indexing, storing, in the metadata at the at least one storage device, an indication that the second data field has been flagged for indexing.
  • 3. The method of claim 1, wherein the first definition and the second definition are stored in the metadata at the at least one storage device using an extensible markup language (XML) format.
  • 4. The method of claim 1, wherein a second data column of the plurality of data columns of the data table is specific to an identifier of one of the different tenants, such that a third data field of the second data column in a first row specific to the first tenant stores an identifier of the first tenant and a fourth data field of the second data column in a second row specific to the second tenant stores an identifier of the second tenant.
  • 5. The method of claim 1, wherein the first data type and the second data type are selected from the group consisting of: a string, a number, a date, and a picklist.
  • 6. The method of claim 1, further comprising: accessing, at the at least one storage device communicatively coupled to the server system, to the first data value stored using the first data field by reading the first data type stored in the metadata; andproviding, to the server system, the first data value in a format indicated by the first data type.
  • 7. The method of claim 6, further comprising: determining, at the server system, the first data type from the metadata based on the identifier of the first tenant and the identifier of the data column.
  • 8. The method of claim 6, further comprising: restricting, by the server system, access to the first data value stored in the at least one storage device to the first tenant.
  • 9. The method of claim 1, further comprising: accessing, by the server system, the second data value stored at the at least one storage device using the second data field by reading the second data type stored in the metadata; andproviding, at the server system, the second data value in a format indicated by the second data type.
  • 10. The method of claim 9, further comprising: determining, at the server system, the second data type from the metadata based on the identifier of the second tenant and the identifier of the data column.
  • 11. The method of claim 8, further comprising: restricting, by the server system, access to the second data value stored in the at least one storage device to the second tenant.
  • 12. The method of claim 1, further comprising: storing, at the at least one storage device, a third row in the data table that stores data specific to a third tenant.
  • 13. The method of claim 12, further comprising: storing, at the at least one storage device, a null value in a field of the third row corresponding to the data column when a definition for the data column is not received from the third tenant.
  • 14. The method of claim 1, wherein the data table further comprises at least one second data column having a standard data type for storing data of a same data type for the tenants.
CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 12/764,780, filed Apr. 21, 2010, by Craig Weissman et al., which is a continuation of U.S. patent application Ser. No. 10/817,161, filed Apr. 2, 2004, by Craig Weissman et al., and issued on Aug. 17, 2010 as U.S. Pat. No. 7,779,039. Both related patent applications listed hereinabove are hereby incorporated by reference in their entirety.

US Referenced Citations (504)
Number Name Date Kind
4698160 Haraguchi Oct 1987 A
5047291 Talvalkar et al. Sep 1991 A
5072370 Durdik Dec 1991 A
5182770 Medveczky Jan 1993 A
5495610 Shing Feb 1996 A
5577188 Zhu Nov 1996 A
5608872 Schwartz Mar 1997 A
5649104 Carleton Jul 1997 A
5715450 Ambrose Feb 1998 A
5721911 Ha Feb 1998 A
5734887 Kingberg Mar 1998 A
5737592 Nguyen Apr 1998 A
5761419 Schwartz Jun 1998 A
5787437 Potterveld Jul 1998 A
5794229 French Aug 1998 A
5794232 Mlahlum Aug 1998 A
5799310 Anderson Aug 1998 A
5819038 Carleton Oct 1998 A
5821937 Tonelli Oct 1998 A
5831610 Tonelli Nov 1998 A
5860012 Luu Jan 1999 A
5873096 Lim Feb 1999 A
5892909 Grasso Apr 1999 A
5918159 Fomukong Jun 1999 A
5941947 Brown Aug 1999 A
5950010 Hesse Sep 1999 A
5950190 Yeager Sep 1999 A
5963953 Cram Oct 1999 A
5970488 Crowe Oct 1999 A
5974409 Sanu Oct 1999 A
5977471 Rosenzweig Nov 1999 A
5987471 Bodine Nov 1999 A
5999948 Nelson Dec 1999 A
6014666 Helland Jan 2000 A
6038563 Bapat Mar 2000 A
6044374 Nesamoney Mar 2000 A
6047291 Anderson Apr 2000 A
6052720 Traversat Apr 2000 A
6064656 Angal May 2000 A
6067582 Smith May 2000 A
6085191 Fisher Jul 2000 A
6092083 Brodersen Jul 2000 A
6105066 Hayes Aug 2000 A
6112198 Lohman Aug 2000 A
6112209 Gusack Aug 2000 A
6134542 Rustige Oct 2000 A
6141010 Hoyle Oct 2000 A
6161149 Achacoso Dec 2000 A
6163770 Gamble Dec 2000 A
6169534 Raffel Jan 2001 B1
6173439 Carlson Jan 2001 B1
6178425 Brodersen Jan 2001 B1
6189000 Gwertzman Feb 2001 B1
6189011 Lim Feb 2001 B1
6205476 Hayes Mar 2001 B1
6216135 Brodersen Apr 2001 B1
6219667 Lu Apr 2001 B1
6226641 Hickson May 2001 B1
6233617 Rothwein May 2001 B1
6233618 Shannon May 2001 B1
6236996 Bapat May 2001 B1
6240416 Immon May 2001 B1
6266669 Brodersen Jul 2001 B1
6269369 Robertson Jul 2001 B1
6275825 Kobayashi Aug 2001 B1
6295530 Ritchie Sep 2001 B1
6324568 Diec Nov 2001 B1
6324693 Brodersen Nov 2001 B1
6330560 Harrison Dec 2001 B1
6336137 Lee Jan 2002 B1
6341288 Yach Jan 2002 B1
6452888 Reed Feb 2002 B1
D454139 Feldcamp Mar 2002 S
6356915 Chtchetkine Mar 2002 B1
6366921 Hansen Apr 2002 B1
6367077 Brodersen Apr 2002 B1
6377943 Jakobsson Apr 2002 B1
6377955 Hartmann Apr 2002 B1
6393605 Loomans May 2002 B1
6405220 Brodersen Jun 2002 B1
6434550 Warner Aug 2002 B1
6438562 Gupta Aug 2002 B1
6446089 Brodersen Sep 2002 B1
6446109 Gupta Sep 2002 B2
6453038 McFarlane Sep 2002 B1
6473800 Jerger Oct 2002 B1
6493717 Junkin Dec 2002 B1
6493720 Chu Dec 2002 B1
6523027 Underwood Feb 2003 B1
6535909 Rust Mar 2003 B1
6539396 Bowman-Amuah Mar 2003 B1
6549901 Loaiza Apr 2003 B1
6549908 Loomans Apr 2003 B1
6553563 Ambrose Apr 2003 B2
6560461 Fomukong May 2003 B1
6574635 Stauber Jun 2003 B2
6577726 Huang Jun 2003 B1
6578037 Wong Jun 2003 B1
6587854 Guthrie Jul 2003 B1
6601087 Zhu Jul 2003 B1
6604117 Lim Aug 2003 B2
6604128 Diec Aug 2003 B2
6609148 Salo Aug 2003 B1
6609150 Lee Aug 2003 B2
6611838 Lgnat Aug 2003 B1
6611839 Nwabueze Aug 2003 B1
6611840 Baer Aug 2003 B1
6615253 Bowman-Amuah Sep 2003 B1
6621834 Scherpbier Sep 2003 B1
6654032 Zhu Nov 2003 B1
6654039 Hollines, III Nov 2003 B1
6664648 Winderl Dec 2003 B2
6665648 Brodersen Dec 2003 B2
6665655 Warner Dec 2003 B1
6684438 Brodersen Feb 2004 B2
6687902 Curtis Feb 2004 B1
6697804 Elsbernd Feb 2004 B1
6711565 Subramaniam Mar 2004 B1
6721765 Ghosh Apr 2004 B2
6724399 Katchour Apr 2004 B1
6728702 Subramaniam Apr 2004 B1
6728960 Loomans Apr 2004 B1
6732095 Warshavsky May 2004 B1
6732100 Brodersen May 2004 B1
6732109 Lindberg May 2004 B2
6732111 Brodersen May 2004 B2
6754681 Brodersen Jun 2004 B2
6763351 Subramaniam Jul 2004 B1
6763501 Zhu Jul 2004 B1
6768904 Kim Jul 2004 B2
6772229 Achacoso Aug 2004 B1
6775674 Agassi Aug 2004 B1
6775675 Nwabueze Aug 2004 B1
6782383 Subramaniam Aug 2004 B2
6792540 Smith Sep 2004 B1
6804330 Jones Oct 2004 B1
6804680 Melli Oct 2004 B2
6823384 Wilson Nov 2004 B1
6826565 Ritchie Nov 2004 B2
6826582 Chatterjee Nov 2004 B1
6826745 Coker Nov 2004 B2
6829655 Huang Dec 2004 B1
6836777 Holle Dec 2004 B2
6839608 Sarabi Jan 2005 B2
6839680 Liu Jan 2005 B1
6842748 Warner Jan 2005 B1
6850895 Brodersen Feb 2005 B2
6850949 Warner Feb 2005 B2
6944133 Wisner Sep 2005 B2
6947927 Chaudhuri Sep 2005 B2
6959306 Nwabueze Oct 2005 B2
6961734 Kauffman Nov 2005 B2
6965903 Agarwal Nov 2005 B1
6981207 Bakman Dec 2005 B1
7035842 Kauffman Apr 2006 B2
7062502 Kesler Jun 2006 B1
7069231 Cinarkaya Jun 2006 B1
7069497 Desai Jun 2006 B1
7080383 Fernando Jul 2006 B1
7120598 Ocampo Oct 2006 B2
7146617 Mukundan Dec 2006 B2
7149698 Guheen Dec 2006 B2
7162689 Demers Jan 2007 B2
7174483 Becher Feb 2007 B2
7181758 Chan Feb 2007 B1
7185192 Kahn Feb 2007 B1
7206805 McLaughlin Apr 2007 B1
7206807 Cheenath Apr 2007 B2
7209929 Dominguez, Jr. Apr 2007 B2
7257820 Fischer Aug 2007 B2
7289976 Kihneman Oct 2007 B2
7296023 Geyer Nov 2007 B2
7305577 Zhang Dec 2007 B2
7305656 Fish Dec 2007 B2
7308704 Vogel Dec 2007 B2
7313572 Lin Dec 2007 B2
7315826 Guheen Jan 2008 B1
7340411 Cook Mar 2008 B2
7340481 Baer Mar 2008 B1
7346844 Baer Mar 2008 B1
7350237 Vogel Mar 2008 B2
7356482 Frankland Apr 2008 B2
7373364 Chapman May 2008 B1
7392232 Wizdo Jun 2008 B1
7401094 Kesler Jul 2008 B1
7412455 Dillon Aug 2008 B2
7434257 Garg Oct 2008 B2
7437723 Kihara Oct 2008 B1
7448079 Tremain Nov 2008 B2
7508789 Chan Mar 2009 B2
7529728 Weissman May 2009 B2
7580975 Cheenath Aug 2009 B2
7599953 Galindo-Legaria Oct 2009 B2
7603483 Psounis Oct 2009 B2
7620655 Larsson Nov 2009 B2
7657887 Kothandaraman Feb 2010 B2
7661027 Langen Feb 2010 B2
7685537 Hoyle Mar 2010 B2
7691860 Otake Apr 2010 B2
7693820 Larson Apr 2010 B2
7698160 Beaven Apr 2010 B2
7734608 Fell Jun 2010 B2
7769825 Karakashian Aug 2010 B2
7774366 Fisher Aug 2010 B2
7779039 Weissman Aug 2010 B2
7779475 Jakobson Aug 2010 B2
7814052 Bezar Oct 2010 B2
7827138 Salmon Nov 2010 B2
7851004 Hirao Dec 2010 B2
7873671 Barsness Jan 2011 B2
7949684 Brooks May 2011 B2
7988160 Lindner Aug 2011 B2
8014943 Jakobson Sep 2011 B2
8015495 Achacoso Sep 2011 B2
8024128 Rabinowitz Sep 2011 B2
8032297 Jakobson Oct 2011 B2
8045495 Jung Oct 2011 B2
8065178 Lloyd Nov 2011 B2
8065594 Limberg Nov 2011 B2
8073850 Steven Dec 2011 B1
8082301 Ahlgren Dec 2011 B2
8085594 Okhonin Dec 2011 B2
8095413 Beaven Jan 2012 B1
8095594 Beaven Jan 2012 B2
8146097 Mukundan Mar 2012 B2
8209308 Rueben Jun 2012 B2
8209333 Hubbard Jun 2012 B2
8244759 Brooks Aug 2012 B2
8275836 Douglas Sep 2012 B2
8443366 Yancey May 2013 B1
8457545 Chan Jun 2013 B2
8473469 Yancey Jun 2013 B1
8473518 Yancey Jun 2013 B1
8484111 Sturgeon Jul 2013 B2
8490025 Jakobson Jul 2013 B2
8499005 Brooks Jul 2013 B2
8504945 Jakobson Aug 2013 B2
8505027 Warner Aug 2013 B2
8510045 Rueben Aug 2013 B2
8510664 Rueben Aug 2013 B2
8566301 Rueben Oct 2013 B2
8646103 Jakobson Feb 2014 B2
8698160 Ohtani Apr 2014 B2
8756275 Jakobson Jun 2014 B2
8769004 Jakobson Jul 2014 B2
8769017 Jakobson Jul 2014 B2
8776067 Yancey Jul 2014 B1
8799233 Brooks Aug 2014 B2
8903851 Brooks Dec 2014 B2
9009117 Brooks Apr 2015 B2
20010023440 Franklin Sep 2001 A1
20010025370 Maruyama Sep 2001 A1
20010037407 Dragulev Nov 2001 A1
20010039565 Gupta Nov 2001 A1
20010044791 Richter Nov 2001 A1
20010044827 Zhuk Nov 2001 A1
20020007746 Berti Jan 2002 A1
20020022986 Coker Feb 2002 A1
20020029161 Brodersen Mar 2002 A1
20020029376 Ambrose Mar 2002 A1
20020035514 Whitley Mar 2002 A1
20020035577 Brodersen Mar 2002 A1
20020042264 Kim Apr 2002 A1
20020042843 Diec Apr 2002 A1
20020049841 Johnson Apr 2002 A1
20020072951 Lee Jun 2002 A1
20020077921 Morrison Jun 2002 A1
20020078094 Krishnaprasad Jun 2002 A1
20020082892 Raffel Jun 2002 A1
20020095454 Reed Jul 2002 A1
20020107746 Jacoby Aug 2002 A1
20020129056 Conant Sep 2002 A1
20020129352 Brodersen Sep 2002 A1
20020133392 Angel Sep 2002 A1
20020133484 Chau Sep 2002 A1
20020140731 Subramaniam Oct 2002 A1
20020143906 Tormasov Oct 2002 A1
20020143997 Huang Oct 2002 A1
20020144174 Nwabueze Oct 2002 A1
20020156874 Suorsa Oct 2002 A1
20020162090 Parnell Oct 2002 A1
20020163910 Wisner Nov 2002 A1
20020165742 Robins Nov 2002 A1
20020174010 Rice Nov 2002 A1
20020174128 Govindarajan Nov 2002 A1
20020174142 Demers Nov 2002 A1
20030004971 Gong Jan 2003 A1
20030009507 Shum Jan 2003 A1
20030014294 Yoneyama Jan 2003 A1
20030018705 Chen Jan 2003 A1
20030018830 Chen Jan 2003 A1
20030028540 Lindberg Feb 2003 A1
20030028598 Moller Feb 2003 A1
20030033437 Fischer Feb 2003 A1
20030046422 Narayanan Mar 2003 A1
20030058277 Bowman-Amuah Mar 2003 A1
20030066031 Laane Apr 2003 A1
20030066032 Ramachadran Apr 2003 A1
20030069936 Warner Apr 2003 A1
20030070000 Coker Apr 2003 A1
20030070004 Mukundan Apr 2003 A1
20030070005 Mukundan Apr 2003 A1
20030074418 Coker Apr 2003 A1
20030101197 Sorensen May 2003 A1
20030120584 Zarefoss Jun 2003 A1
20030120675 Stauber Jun 2003 A1
20030126160 Engelhardt-Cronk Jul 2003 A1
20030139174 Rao Jul 2003 A1
20030151633 George Aug 2003 A1
20030154197 Millet Aug 2003 A1
20030159136 Huang Aug 2003 A1
20030172084 Holle Sep 2003 A1
20030172135 Bobick Sep 2003 A1
20030182656 Leathers Sep 2003 A1
20030187586 Katzenmaier Oct 2003 A1
20030187921 Diec Oct 2003 A1
20030189600 Gune Oct 2003 A1
20030204427 Gune Oct 2003 A1
20030206192 Chen Nov 2003 A1
20030217027 Farber Nov 2003 A1
20030225730 Warner Dec 2003 A1
20030227482 Bach Dec 2003 A1
20030227487 Hugh Dec 2003 A1
20030229646 Bach Dec 2003 A1
20040001092 Rothwein Jan 2004 A1
20040006549 Mullins Jan 2004 A1
20040006606 Marotta Jan 2004 A1
20040007121 Graves Jan 2004 A1
20040010489 Rio Jan 2004 A1
20040010714 Stewart Jan 2004 A1
20040015578 Karakashian Jan 2004 A1
20040015981 Coker Jan 2004 A1
20040017397 Bach Jan 2004 A1
20040027388 Berg Feb 2004 A1
20040044656 Cheenath Mar 2004 A1
20040045004 Cheenath Mar 2004 A1
20040059587 Astle Mar 2004 A1
20040103019 Reid May 2004 A1
20040107125 Guheen Jun 2004 A1
20040111387 Nelson Jun 2004 A1
20040123048 Mullins Jun 2004 A1
20040128001 Levin Jul 2004 A1
20040133876 Sproule Jul 2004 A1
20040139075 Brodersen Jul 2004 A1
20040172397 Asherman Sep 2004 A1
20040186860 Lee Sep 2004 A1
20040193510 Catahan Sep 2004 A1
20040199489 Barnes-Leon Oct 2004 A1
20040199514 Rosenblatt Oct 2004 A1
20040199536 Barnes-Leon Oct 2004 A1
20040199543 Braud Oct 2004 A1
20040199605 LaCroix Oct 2004 A1
20040206834 Imai Oct 2004 A1
20040216127 Datta Oct 2004 A1
20040220952 Cheenath Nov 2004 A1
20040249854 Barnes-Leon Dec 2004 A1
20040250120 Ng Dec 2004 A1
20040260534 Pak Dec 2004 A1
20040260659 Chan Dec 2004 A1
20040268299 Lei Dec 2004 A1
20050015591 Thrash Jan 2005 A1
20050027797 San Andres Feb 2005 A1
20050028151 Roth Feb 2005 A1
20050033728 James Feb 2005 A1
20050050555 Exley Mar 2005 A1
20050065925 Weissman Mar 2005 A1
20050071345 Lin Mar 2005 A1
20050072940 Beloussov Apr 2005 A1
20050075544 Shapiro Apr 2005 A1
20050091098 Brodersen Apr 2005 A1
20050091185 Koutyrine Apr 2005 A1
20050108688 Lucovsky May 2005 A1
20050108768 Deshpande May 2005 A1
20050125353 Schlesinger Jun 2005 A1
20050125438 Krishnaswamy Jun 2005 A1
20050131971 James Jun 2005 A1
20050132207 Mourad Jun 2005 A1
20050132343 Bender Jun 2005 A1
20050132350 Markley Jun 2005 A1
20050165639 Ross Jul 2005 A1
20050165734 Vicars Jul 2005 A1
20050188345 Chang Aug 2005 A1
20050198048 Barsness Sep 2005 A1
20050203876 Cragun Sep 2005 A1
20050223022 Weissman Oct 2005 A1
20050223374 Wishart Oct 2005 A1
20050240569 Cheng Oct 2005 A1
20050246283 Gwiazda Nov 2005 A1
20050251449 Pape Nov 2005 A1
20050262087 Wu Nov 2005 A1
20050283478 Choi Dec 2005 A1
20050289383 Illowsky Dec 2005 A1
20060004907 Pape Jan 2006 A1
20060012081 Ferren Jan 2006 A1
20060020530 Hsu Jan 2006 A1
20060021019 Hinton Jan 2006 A1
20060031263 Arrouye Feb 2006 A1
20060058277 Yanni Mar 2006 A1
20060069936 Lint Mar 2006 A1
20060080259 Wajs Apr 2006 A1
20060095960 Arregoces May 2006 A1
20060100912 Kumar May 2006 A1
20060112081 Qureshi May 2006 A1
20060120675 Goldner Jun 2006 A1
20060123350 Fender Jun 2006 A1
20060136341 Wajs Jun 2006 A1
20060136382 Dettinger Jun 2006 A1
20060136748 Bade Jun 2006 A1
20060151633 Presz Jul 2006 A1
20060159136 Spiekermann Jul 2006 A1
20060165639 Gauweiler Jul 2006 A1
20060173894 Kristoffersen Aug 2006 A1
20060204427 Ghenciu Sep 2006 A1
20060206192 Tower Sep 2006 A1
20060206834 Fisher Sep 2006 A1
20060230027 Kellet Oct 2006 A1
20060235831 Adinolfi Oct 2006 A1
20060242655 Fernando Oct 2006 A1
20060248121 Cacenco Nov 2006 A1
20060248507 Benjes Nov 2006 A1
20060253492 Omansky Nov 2006 A1
20060253849 Avram Nov 2006 A1
20060282482 Castro Dec 2006 A1
20060294051 Kapadia Dec 2006 A1
20070022135 Malik Jan 2007 A1
20070022155 Owens Jan 2007 A1
20070078705 Abels Apr 2007 A1
20070088741 Brooks Apr 2007 A1
20070124276 Weissman May 2007 A1
20070130130 Char Jun 2007 A1
20070130137 Oliver Jun 2007 A1
20070150546 Karakashian Jun 2007 A1
20070162452 Becker Jul 2007 A1
20070179828 Elkin Aug 2007 A1
20070180432 Gassner Aug 2007 A1
20070198320 Lloyd Aug 2007 A1
20070198920 Lloyd Aug 2007 A1
20070208639 Lloyd Sep 2007 A1
20070214463 Mukundan Sep 2007 A1
20070226032 White Sep 2007 A1
20080010243 Weissman Jan 2008 A1
20080052705 Kaufman Feb 2008 A1
20080082540 Weissman Apr 2008 A1
20080082572 Ballard Apr 2008 A1
20080082986 Cheenath Apr 2008 A1
20080086358 Doshi Apr 2008 A1
20080086447 Weissman Apr 2008 A1
20080086479 Fry Apr 2008 A1
20080086482 Weissman Apr 2008 A1
20080086514 Weissman Apr 2008 A1
20080086567 Langen Apr 2008 A1
20080086735 Cheenath Apr 2008 A1
20080134018 Kembel Jun 2008 A1
20080162544 Weissman Jul 2008 A1
20080201701 Hofhansl Aug 2008 A1
20080249972 Dillon Oct 2008 A1
20080270354 Weissman Oct 2008 A1
20080270987 Weissman Oct 2008 A1
20090030906 Doshi Jan 2009 A1
20090037452 Baitalmal Feb 2009 A1
20090037492 Baitalmal Feb 2009 A1
20090049065 Weissman Feb 2009 A1
20090049101 Weissman Feb 2009 A1
20090049102 Weissman Feb 2009 A1
20090049288 Weissman Feb 2009 A1
20090063415 Chatfield Mar 2009 A1
20090100342 Jakobson Apr 2009 A1
20090164986 Lee Jun 2009 A1
20090177744 Marlow Jul 2009 A1
20090276395 Weissman Nov 2009 A1
20090276405 Weissman Nov 2009 A1
20100205216 Durdik Aug 2010 A1
20100205227 Weissman Aug 2010 A1
20100223284 Brooks Sep 2010 A1
20110196883 Brooks Aug 2011 A1
20110202508 Brooks Aug 2011 A1
20110202911 Brooks Aug 2011 A1
20110218958 Warshavsky Sep 2011 A1
20110247051 Bulumulla Oct 2011 A1
20120042218 Cinarkaya Feb 2012 A1
20120054241 Brooks Mar 2012 A1
20120054328 Brooks Mar 2012 A1
20120059807 Brooks Mar 2012 A1
20120059862 Brooks Mar 2012 A1
20120084266 Brooks Apr 2012 A1
20120233137 Jakobson Sep 2012 A1
20120239629 Brooks Sep 2012 A1
20120246120 Brooks Sep 2012 A1
20120290407 Hubbard Nov 2012 A1
20120317145 Reghetti Dec 2012 A1
20120317146 Brooks Dec 2012 A1
20130024906 Carney Jan 2013 A9
20130212497 Zelenko Aug 2013 A1
20130217028 Mandel Aug 2013 A1
20130218948 Jakobson Aug 2013 A1
20130218949 Jakobson Aug 2013 A1
20130218966 Jakobson Aug 2013 A1
20130246469 Brooks Sep 2013 A1
20130247028 Brooks Sep 2013 A1
20130247216 Cinarkaya Sep 2013 A1
20140359537 Jackobson Dec 2014 A1
20150006289 Jakobson Jan 2015 A1
20150007050 Jakobson Jan 2015 A1
20150095162 Jakobson Apr 2015 A1
Foreign Referenced Citations (4)
Number Date Country
H09251469 Sep 1997 JP
2001014329 Jan 2001 JP
2004030221 Jan 2004 JP
0177787 Oct 2001 WO
Non-Patent Literature Citations (34)
Entry
PCT/US05/10915, International Search Report, dated Apr. 20, 2007, 3 pages.
EP 10181726.0—Extended European Search Report dated Mar. 29, 2011, 8 pages.
EP 10181726.0—Response to Extended European Search Report dated Mar. 29, 2011 filed Oct. 21, 2011, 15 pages.
EP 10181726.0—First Office Action dated Jan. 18, 2012, 6 pages.
EP 10181726.0—Response to First Office Action dated Jan. 18, 2012 filed May 8, 2012, 30 pages.
EP 10181726.0—Summons to Attend Oral Proceedings dated May 10, 2017, 10 pages.
U.S. Appl. No. 13/281,607, Non Final Office Action, dated Jun. 25, 2014, 9 pages.
U.S. Appl. No. 13/281,607, Non Final Office Action, dated Jan. 13, 2014, 9 pages.
U.S. Appl. No. 13/281,607, Final Office Action, dated Jul. 19, 2013, 13 pages.
U.S. Appl. No. 13/281,607, Non Final Office Action, dated Feb. 4, 2013, 10 pages.
EP 05730865.2—Supplementary Search Report dated Dec. 30, 2007, 5 pages.
EP 05730865.2—First Examination Report dated Jul. 17, 2008, 4 pages.
EP 05730865.2—Response to First Examination Report dated Jul. 17, 2008 filed Jan. 22, 2009, 18 pages.
EP 05730865.2—Second Examination Report dated May 25, 2011, 9 pages.
EP 05730865.2—Response to Second Examination Report dated May 25, 2011 filed Sep. 13, 2011, 14 pages.
EP 05730865.2—Summons to Attend Oral Proceedings dated Jun. 27, 2016, 8 pages.
CN 200580009510.4—First Office Action dated Jan. 9, 2009, 8 pages.
CN 200580009510.4—Response to First Office Action dated Jan. 9, 2009 filed Jul. 24, 2009, 17 pages.
CN 200580009510.4—Notice of Allowance dated Aug. 28, 2009, 4 pages.
CN 200910224563.8—First Office Action dated Sep. 1, 2011, 8 pages.
CN 200910224563.8—Response to First Office Action dated Sep. 1, 2011 filed Jan. 12, 2012, 5 pages.
CN 200910224563.8—Notice of Allowance dated Sep. 1, 2011 filed Jun. 6, 2012, 4 pages.
JP 2007-506562—First Office Action dated Aug. 1, 2010, 8 pages.
JP 2007-506562—Response to First Office Action dated Aug. 1, 2010 filed Feb. 28, 2011, 17 pages.
JP 2007-506562—Second Office Action dated Apr. 25, 2011, 8 pages.
JP 2007-506562—Response to Second Office Action dated Apr. 25, 2011 filed Jul. 22, 2011, 7 pages.
JP 2007-506562—Third (Final) Office Action dated Feb. 27, 2012, 7 pages.
JP 2007-506562—Response to Third Office Action dated Feb. 27, 2012 filed May 28, 2012, 10 pages.
JP 2007-506562—Fourth Office Action (Final Rejection) dated Aug. 3, 2012, 3 pages.
JP 2007-506562—Response to Fourth Office Action dated Aug. 3, 2012 filed Nov. 28, 2012, 14 pages.
JP 2007-506562—Notice of Allowance dated Dec. 25, 2012, 3 pages.
JP 2011-028268—Notice of Allowance dated Apr. 5, 2013, 3 pages.
PCT/US2005/10915, International Preliminary Report on Patentability, dated May 16, 2008, 7 pages.
PCT/US2005/10915, Written Opinion of the International Searching Authority, dated Dec. 28, 2006, 5 pages.
Related Publications (1)
Number Date Country
20180322153 A1 Nov 2018 US
Continuations (5)
Number Date Country
Parent 14705877 May 2015 US
Child 16032405 US
Parent 13589020 Aug 2012 US
Child 14705877 US
Parent 13281607 Oct 2011 US
Child 13589020 US
Parent 12764780 Apr 2010 US
Child 13281607 US
Parent 10817161 Apr 2004 US
Child 12764780 US