The present invention relates to improved systems and methodologies for data classification.
The following patent publications are believed to represent the current state of the art:
U.S. Pat. Nos. 5,465,387; 5,899,991; 6,338,082; 6,393,468; 6,928,439; 7,031,984; 7,068,592; 7,403,925; 7,421,740; 7,555,482, 7,606,801 and 7,743,420; and
U.S. Published Patent Application Nos.: 2003/0051026; 2004/0249847; 2005/0108206; 2005/0203881; 2005/0086529; 2006/0064313; 2006/0184530; 2006/0184459; 2007/0203872; 2007/0244899; 2008/0271157; 2009/0100058; 2009/0119298 and 2009/0265780.
The present invention provides improved systems and methodologies for data classification.
There is thus provided in accordance with a preferred embodiment of the present invention a method for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise, the method including characterizing data of interest at least by at least one non-content based data identifier thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and selecting data of interest by considering only data elements from among the multiplicity of data elements which have the at least one non-content based data identifier thereof and the at least one access metric thereof.
Preferably, the characterizing the data of interest includes characterizing data of interest also by at least one content based data identifier thereof and the selecting data of interest includes considering only data elements which have the at least one content based data identifier thereof.
In accordance with a preferred embodiment of the present invention the considering includes defining a field of search in accordance with the at least one access metric and searching within the field of search based on the at least one non-content based data identifier. Alternatively, the considering includes defining a field of search in accordance with the at least one access metric multiple times and searching within the field of search multiple times, wherein the at least one access metric is different at least some of the multiple times.
Preferably, the at least one access metric is a dynamic metric which changes over time during operation of the enterprise.
In accordance with a preferred embodiment of the present invention the method for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes automatically redefining the field of search in accordance with the at least one access metric multiple times and searching within the field of search multiple times, where the at least one access metric is different at least some of the multiple times. Additionally, the searching includes searching only within those portions of the field of search that have been modified or added as the result of redefining the field of search in accordance with changes in the at least one access metric.
In accordance with a preferred embodiment of the present invention the method for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes noting the current status of data elements that have been modified, added or removed in accordance with changes in the at least one access metric.
Preferably, the searching is prioritized at least in accordance with at least one access metric related prioritization characteristic. Additionally, results of the searching are ordered at least in accordance with at least one access metric related prioritization characteristic.
In accordance with a preferred embodiment of the present invention the selecting the data of interest by considering only data elements which have the at least one non-content based data identifier thereof and the at least one access metric thereof from among the multiplicity of data elements includes searching for data elements which have the at least one non-content based data identifier thereof, separately from the searching for data elements which have the at least one non-content based data identifier thereof, identifying data elements from among the multiplicity of data elements in accordance with the at least one access metric and combining results of the searching and the identifying. In accordance with a preferred embodiment of the present invention, the searching and the identifying are performed by separate entities.
Preferably, the method for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes maintaining an access metrics database. In accordance with a preferred embodiment of the present invention the method for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes maintaining a metadata database.
Preferably, the method for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes, responsive to the identification of data elements of interest, modification of access permissions to at least one of the data elements of interest.
There is also provided in accordance with another preferred embodiment of the present invention a system for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise, the system including query generation functionality operable for characterizing data of interest at least by at least one non-content based data identifier thereof and at least one access metric thereof the at least one access metric being selected from data access permissions and actual data access history and query resolution functionality operable for selecting data of interest by considering only data elements from among the multiplicity of data elements which have the at least one non-content based data identifier thereof and the at least one access metric thereof.
Preferably, the query generation functionality is also operable for characterizing data of interest by at least one content based data identifier thereof and the query resolution functionality is also operable for selecting data of interest by considering only data elements which have the at least one content based data identifier thereof.
In accordance with a preferred embodiment of the present invention the considering includes defining a field of search in accordance with the at least one access metric and searching within the field of search based on the at least one non-content based data identifier. Alternatively, the considering includes defining a field of search in accordance with the at least one access metric multiple times and searching within the field of search multiple times, wherein the at least one access metric is different at least some of the multiple times.
Preferably, the at least one access metric is a dynamic metric which changes over time during operation of the enterprise.
In accordance with a preferred embodiment of the present invention the considering also includes automatically redefining the field of search in accordance with the at least one access metric multiple times and searching within the field of search multiple times, wherein the at least one access metric is different at least some of the multiple times. Additionally, the searching includes searching only within those portions of the field of search that have been modified or added as the result of redefining the field of search in accordance with changes in the at least one access metric.
Preferably, the searching includes noting the current status of data elements that have been modified, added or removed in accordance with changes in the at least one access metric. In accordance with a preferred embodiment of the present invention the searching is prioritized at least in accordance with at least one access metric related prioritization characteristic. Additionally, results of the searching are ordered at least in accordance with at least one access metric related prioritization characteristic.
Preferably, the query resolution functionality is also operable for searching for data elements which have the at least one non-content based data identifier thereof, separately from the searching for data elements which have the at least one non-content based data identifier thereof, identifying data elements from among the multiplicity of data elements in accordance with the at least one access metric and combining results of the searching and the identifying. In accordance with a preferred embodiment of the present invention the searching and the identifying are performed by separate entities.
In accordance with a preferred embodiment of the present invention the system for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes access metrics collection functionality and an access metrics database.
Preferably, the system for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes metadata collection functionality and a metadata database.
In accordance with a preferred embodiment of the present invention the system for managing data in an enterprise by identifying data of interest from among a multiplicity of data elements in an enterprise also includes access permissions modification functionality which is operative, responsive to the identification of data elements of interest, to modify access permissions to at least one of the data elements of interest.
The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
Reference is now made to
The operation of the data classification system preferably includes characterizing data of interest at least by at least one non-content based data identifier thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history, and selecting data of interest by considering only data elements from among the multiplicity of data elements which have the at least one non-content based data identifier thereof and the at least one access metric thereof.
The term “non-content based data identifier” is used throughout to refer to metadata associated with a data element. The metadata may include any data element characteristic associated with the data element such as, for example, file type, author, category and language. It is appreciated that the metadata may be predefined characteristics provided by the system which hosts the data elements or user-defined characteristics. It is appreciated that metadata may be manually associated with a data element without having to actually access or modify the content of the data element.
As shown in
Preferably, the system maintains a database of actual access and access permissions of every user to every data element in the enterprise. This functionality is described in U.S. Pat. No. 7,606,801, in U.S. Published Patent Application 2009/0265780 and in U.S. patent application Ser. No. 12/673,691 owned by assignee, the disclosures of which are hereby incorporated by reference. Access permissions and/or actual access are together designated as access metrics and may be used to designate subsets of all of the data elements in the enterprise.
Preferably, the system also crawls over at least a subset of all data elements in the enterprise and maintains a database of metadata associated with each data element of the subset of data elements.
As seen in
At a later date, such as on Jan. 10, 2011, the HR Manager of the enterprise decides to terminate the employment of John, an enterprise employee, and to give John thirty days notice before the termination will take effect.
In accordance with company policy, the IT Security Manager immediately queries the system in order to ascertain to which of the files having the predefined ‘category’ metadata field set to “legal” John has access permissions. Preferably, the IT Security Manager receives a response from the system to his query in near real time, whereby the response includes a list of legal files to which John has access permissions. The IT Security Manager may then restrict John's access permissions to the legal files, in anticipation of John's termination of employment.
It is appreciated that maintenance by the system of a database of actual access and access permissions of every user to every data element in the enterprise and of a database of metadata associated with each of the data elements in the enterprise is operative to enable the system to provide near real time responses to queries to the system.
Reference is now made to
The operation of the data classification system preferably includes characterizing the data of interest at least by at least one non-content based data identifier thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history, and selecting the data of interest by considering only data elements which have the at least one non-content based data identifier thereof and the at least one access metric thereof from among the multiplicity of data elements.
As shown in
Preferably, the system maintains a database of actual access and access permissions of every user to every data element in the enterprise. This functionality is described in U.S. Pat. No. 7,606,801, in U.S. Published Patent Application 2009/0265780 and in U.S. patent application Ser. No. 12/673,691 owned by assignee, the disclosures of which are hereby incorporated by reference. Access permissions and/or actual access are together designated as access metrics and may be used to designate subsets of all of the data elements in the enterprise.
Preferably, the system also crawls over at least a subset of all data elements in the enterprise and maintains a database of metadata associated with each data element of the subset of data elements.
As seen in
At a later date, such as on Jan. 10, 2011, the HR Manager of the enterprise decides to terminate the employment of Mark, an enterprise employee, and to give Mark thirty days notice before the termination will take effect.
In accordance with company policy, the IT Security Manager immediately queries the system in order to ascertain to which of the files having the predefined ‘category’ metadata field set to “sales” and having the user-defined ‘customer profile’ field set to “high” Mark has access permissions. Preferably, the IT Security Manager receives a response from the system to his query in near real time, whereby the response includes a list of high-profile customer sales-related files to which Mark has access permissions. The IT Security Manager may then restrict Mark's access permissions to the high-profile customer sales-related files, in anticipation of Mark's termination of employment.
It is appreciated that maintenance by the system of a database of actual access and access permissions of every user to every data element in the enterprise and of a database of metadata associated with each of the data elements in the enterprise is operative to enable the system to provide near real time responses to queries to the system.
Reference is now made to
As shown in
Upon receiving the search query from the user, the system utilizes the database of access metrics and the database of metadata to provide to the user a search report which comprises a list of files having the at least one search access metric and the at least one search non-content based data identifier associated therewith (308).
Reference is now made to
It is appreciated that the system continuously maintains a database of actual access and access permissions of every user to every data element in the enterprise. This functionality is described in U.S. Pat. No. 7,606,801, in U.S. Published Patent Application 2009/0265780 and in U.S. patent application Ser. No. 12/673,691 owned by assignee, the disclosures of which are hereby incorporated by reference. Access permissions and/or actual access are together designated as access metrics and may be used to designate subsets of all of the data elements in the enterprise.
Query generation functionality 410 is preferably provided to allow a user to compose a file search query to be submitted to query resolution functionality 412. As shown in
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather, the invention also includes various combinations and subcombinations of the features described hereinabove as well as modifications and variations thereof, which would occur to persons skilled in the art upon reading the foregoing and which are not in the prior art.
Reference is made to U.S. Provisional Patent Application Ser. No. 61/348,862, filed May 27, 2010 and entitled “MANAGEMENT OF CHANGES IN ORGANIZATIONAL DATA”, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (4) and (5)(i). Reference is also made to U.S. patent application Ser. No. 13/014,762, filed Jan. 27, 2011, and entitled “AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEMS AND METHODS”, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (1) and (2)(i). Reference is also made to U.S. patent application Ser. No. 13/106,023, filed May 12, 2011, and entitled “AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD”, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (1) and (2)(i). Reference is also made to the following patents and patent applications, owned by assignee, the disclosures of which are hereby incorporated by reference: U.S. Pat. Nos. 7,555,482 and 7,606,801; U.S. Published Patent Application Nos. 2007/0244899, 2008/0271157, 2009/0100058, 2009/0119298; 2009/0265780; 2011/0060916 and 2011/0061111; and U.S. patent application Ser. No. 12/673,691.
Number | Name | Date | Kind |
---|---|---|---|
5465387 | Mukherjee | Nov 1995 | A |
5889952 | Hunnicutt et al. | Mar 1999 | A |
5899991 | Karch | May 1999 | A |
6023765 | Kuhn | Feb 2000 | A |
6308173 | Glasser et al. | Oct 2001 | B1 |
6338082 | Schneider | Jan 2002 | B1 |
6393468 | McGee | May 2002 | B1 |
6772350 | Belani et al. | Aug 2004 | B1 |
6928439 | Satoh | Aug 2005 | B2 |
7017183 | Frey et al. | Mar 2006 | B1 |
7031984 | Kawamura et al. | Apr 2006 | B2 |
7068592 | Duvaut et al. | Jun 2006 | B1 |
7124272 | Kennedy et al. | Oct 2006 | B1 |
7401087 | Copperman et al. | Jul 2008 | B2 |
7403925 | Schlesinger et al. | Jul 2008 | B2 |
7421740 | Fey et al. | Sep 2008 | B2 |
7505973 | Kapadia et al. | Mar 2009 | B2 |
7529748 | Wen et al. | May 2009 | B2 |
7555482 | Korkus | Jun 2009 | B2 |
7606801 | Faitelson et al. | Oct 2009 | B2 |
7716240 | Lim | May 2010 | B2 |
7720858 | Dettinger et al. | May 2010 | B2 |
7743420 | Shulman et al. | Jun 2010 | B2 |
7761471 | Lee | Jul 2010 | B1 |
7882098 | Prahlad et al. | Feb 2011 | B2 |
8135669 | Olstad | Mar 2012 | B2 |
8190638 | Giampaolo et al. | May 2012 | B2 |
8239351 | Hornqvist | Aug 2012 | B2 |
8239925 | Faitelson et al. | Aug 2012 | B2 |
8250048 | Yalamanchi et al. | Aug 2012 | B2 |
8285748 | Thomas et al. | Oct 2012 | B2 |
8306999 | Gass, III et al. | Nov 2012 | B2 |
8438124 | Spivack | May 2013 | B2 |
8626803 | Hsu et al. | Jan 2014 | B2 |
8898623 | Zhao et al. | Nov 2014 | B2 |
9020967 | Spivack | Apr 2015 | B2 |
10037358 | Faitelson et al. | Jul 2018 | B2 |
10701079 | Ledet | Jun 2020 | B1 |
20030048301 | Menninger | Mar 2003 | A1 |
20030051026 | Carter et al. | Mar 2003 | A1 |
20030231207 | Huang | Dec 2003 | A1 |
20040030915 | Sameshima et al. | Feb 2004 | A1 |
20040186809 | Schlesinger et al. | Sep 2004 | A1 |
20040205342 | Roegner | Oct 2004 | A1 |
20040249847 | Wang et al. | Dec 2004 | A1 |
20040254919 | Giuseppini | Dec 2004 | A1 |
20050065823 | Ramraj et al. | Mar 2005 | A1 |
20050086529 | Buchsbaum | Apr 2005 | A1 |
20050108206 | Lam et al. | May 2005 | A1 |
20050120054 | Shulman et al. | Jun 2005 | A1 |
20050203881 | Sakamoto et al. | Sep 2005 | A1 |
20050246762 | Girouard et al. | Nov 2005 | A1 |
20050278334 | Fey et al. | Dec 2005 | A1 |
20060064313 | Steinbarth et al. | Mar 2006 | A1 |
20060184459 | Parida | Aug 2006 | A1 |
20060184530 | Song et al. | Aug 2006 | A1 |
20060277184 | Faitelson et al. | Dec 2006 | A1 |
20070033340 | Tulskie et al. | Feb 2007 | A1 |
20070061487 | Moore et al. | Mar 2007 | A1 |
20070073698 | Kanayama et al. | Mar 2007 | A1 |
20070094265 | Korkus | Apr 2007 | A1 |
20070101387 | Hua et al. | May 2007 | A1 |
20070112743 | Giampaolo et al. | May 2007 | A1 |
20070156659 | Lim | Jul 2007 | A1 |
20070156693 | Soin et al. | Jul 2007 | A1 |
20070198608 | Prahlad et al. | Aug 2007 | A1 |
20070203872 | Flinn et al. | Aug 2007 | A1 |
20070244899 | Faitelson | Oct 2007 | A1 |
20070266006 | Buss | Nov 2007 | A1 |
20070276823 | Borden et al. | Nov 2007 | A1 |
20070282855 | Chen et al. | Dec 2007 | A1 |
20080034402 | Botz et al. | Feb 2008 | A1 |
20080097998 | Herbach | Apr 2008 | A1 |
20080162707 | Beck et al. | Jul 2008 | A1 |
20080172720 | Botz et al. | Jul 2008 | A1 |
20080270462 | Thomsen | Oct 2008 | A1 |
20080271157 | Faitelson et al. | Oct 2008 | A1 |
20090031418 | Matsuda et al. | Jan 2009 | A1 |
20090077124 | Spivack et al. | Mar 2009 | A1 |
20090100058 | Faitelson et al. | Apr 2009 | A1 |
20090119298 | Faitelson et al. | May 2009 | A1 |
20090150981 | Amies et al. | Jun 2009 | A1 |
20090157570 | Pall et al. | Jun 2009 | A1 |
20090182715 | Falkenberg | Jul 2009 | A1 |
20090198892 | Alvarez et al. | Aug 2009 | A1 |
20090249290 | Jenkins et al. | Oct 2009 | A1 |
20090249446 | Jenkins et al. | Oct 2009 | A1 |
20090265780 | Korkus et al. | Oct 2009 | A1 |
20090282045 | Hsieh et al. | Nov 2009 | A1 |
20090320088 | Gill et al. | Dec 2009 | A1 |
20100023491 | Huang | Jan 2010 | A1 |
20100037324 | Grant et al. | Feb 2010 | A1 |
20100100524 | Bee et al. | Apr 2010 | A1 |
20100174731 | Vermeulen et al. | Jul 2010 | A1 |
20100185650 | Topatan et al. | Jul 2010 | A1 |
20100241668 | Susanto | Sep 2010 | A1 |
20100257456 | Lieb et al. | Oct 2010 | A1 |
20100299763 | Marcus et al. | Nov 2010 | A1 |
20110010758 | Faitelson et al. | Jan 2011 | A1 |
20110047466 | Michelman | Feb 2011 | A1 |
20110060916 | Faitelson et al. | Mar 2011 | A1 |
20110061093 | Korkus et al. | Mar 2011 | A1 |
20110061111 | Faitelson et al. | Mar 2011 | A1 |
20110184989 | Faitelson et al. | Jul 2011 | A1 |
20110247074 | Manring et al. | Oct 2011 | A1 |
20120179681 | Faitelson et al. | Jul 2012 | A1 |
20120191646 | Faitelson et al. | Jul 2012 | A1 |
20120221550 | Korkus et al. | Aug 2012 | A1 |
20120291100 | Faitelson et al. | Nov 2012 | A1 |
Number | Date | Country |
---|---|---|
1588889 | Mar 2005 | CN |
101583953 | Nov 2009 | CN |
101681405 | Mar 2010 | CN |
1248178 | Oct 2002 | EP |
2008073978 | Jun 2008 | WO |
2008111774 | Sep 2008 | WO |
2011030324 | Mar 2011 | WO |
2011092684 | Aug 2011 | WO |
2011092685 | Aug 2011 | WO |
2011092686 | Aug 2011 | WO |
2011148376 | Dec 2011 | WO |
Entry |
---|
Sahadeb DE, et al; “Secure Access Control in a Multi-user Geodatabase,” available on the Internet at URL htto://www10.qiscafe.com. 2005, 10 pages. |
Findutils; GNU Project—Tree Software Foundation (FSF), 3 pages, Nov. 2006. |
GENUNIX; “Writing Filesystems—VFS and Vnode Interfaces”, 5 pages, Oct. 2007. |
S.R. Kleiman; “Vnodes: An Architecture for Multiple File System Types in Sun UNIX”, USENIX Association: Summer Conference Proceedings, Atlanta 1986; 10 pages. |
Sara C. Madeira; Clustering, Fuzzy Clustering and Biclustering: An Overview; p. 31 to 53, Jun. 27, 2003. |
Sara C. Madeira and Arlindo L. Oliveira; Biclustering Algorithms for Biological data Analysis: A Survey; Mar. 2004; http://www.cs.princeton.edu/courses/archive/spr05/cos598E/bib/bicluster.pdf. |
VARONIS; “Accelerating Audits with Automation: Understanding Who's Accessing Your Unstructured Data”, Oct. 8, 2007, 7 pages. |
“Entitlement reviews: A Practitioner's Guide” by Varonis, 2007. |
Varonis; “White Paper: The Business Case for Data Governance”, dated Mar. 27, 2007, 8 pages. |
Edgar Weippl, et al; “Content-based Management of Document Access”, 14th International Conference on Applications of Prolog (INAP), 2001, 9 pages. |
Alex Woodie; “Varonis Prevents Unauthorized Access to Unstructured Data”, Four Hundred Stuff, vol. 7, No. 9, Jul. 31, 2007, 6 pages. |
DatAdvantage User Guide by Varonis, Version 1.0, Aug. 30, 2005. |
DatAdvantage User Guide by Varonis, Version 2.0, Aug. 24, 2006. |
DatAdvantage User Guide by Varonis, Version 2.5, Nov. 27, 2006. |
DatAdvantage User Guide by Varonis, Version 2.6, Dec. 15, 2006. |
DatAdvantage User Guide by Varonis, Version 2.7, Feb. 6, 2007. |
DatAdvantage User Guide by Varonis, Version 3.0, Jun. 20, 2007. |
A List of database tables in DatAdvantage 2.7, Feb. 6. 2007. |
A List of database tables in DatAdvantage 3.0, Jun. 20, 2007. |
The First Chinse Office Action dated Jan. 23, 2015; Appln. 201180036674.1. |
The Second Chinese Office Action dated Oct. 10, 2015; Appln. 201180036674.1. |
The Third Chinese Office Action dated Apr. 5, 2016; Appln. 201180036674.1. |
The Chinese Patent Office Decision of Rejection dated Oct. 24, 2016; Appln. 201180036674.1. |
The Chinese Patent Office Notification of Reexamination dated Sep. 6, 2017; Appln. 201180036674.1. |
The Extended European Search Report dated Feb. 27, 2014; Appln. 11786228.4. |
Office Action from the EPO dated Apr. 6, 201; Appln. 11786228.4. |
An English Translation of an Office Action dated Sep. 14, 2012, which issued during the prosecution of German Patent Application No. 11 2006 001 378.5. |
IPRP dated Mar. 13, 2012; PCT/IL2010/00069. |
IPRP dated Jul. 31, 2012; PCT/IL2011/000065. |
IPRP dated Jul. 31, 2012; PCT/IL2011/000066. |
IPRP dated Jul. 31, 2012; PCT/IL2011/000078. |
IPRP dated Nov. 27, 2012; PCT/IL2011/000408. |
ISR and WO dated Apr. 13, 2012; PCT/IL11/00902. |
ISR and WO dated May 20, 2010; PCT/IL11/00069. |
ISR and WO dated May 23, 2011; PCT/IL11/00065. |
ISR and WO dated May 24, 2011; PCT/IL11/00077. |
ISR and WO dated May 25, 2020; PCT/IL11/00078. |
ISR and WO dated Jun. 14, 2011; PCT/IL11/00066. |
ISR and WO dated Oct. 1, 2012; PCT/IL2012/000240. |
ISR and WO dated Nov. 15, 2011; PCT/IL11/00408. |
U.S. Appl. No. 60/688,486, filed Jun. 7, 2005. |
U.S. Appl. No. 61/240,726, filed Sep. 9, 2009. |
U.S. Appl. No. 61/348,862, filed May 27, 2010. |
USPTO FOA dated Jan. 30, 2013 in connection with U.S. Appl. No. 12/772,450. |
USPTO FOA dated Apr. 14, 2016 in connection with U.S. Appl. No. 13/384,459. |
USPTO FOA dated Apr. 28, 2011 in connection with U.S. Appl. No. 11/871,028. |
USPTO FOA dated Dec. 14, 2010 in connection with U.S. Appl. No. 11/789,884. |
Interview Summary dated Mar. 2, 2018 in connection with U.S. Appl. No. 13/384,459. |
USPTO Interview Summary dated Jul. 17, 2017 in connection with U.S. Appl. No. 13/384,459. |
USPTO Interview Summary dated Nov. 6, 2015 in connection with U.S. Appl. No. 13/384,459. |
USPTO NFOA dated Jan. 16, 2013 in connection with U.S. Appl. No. 13/413,748. |
USPTO NFOA dated Feb. 12, 2008 in connection with U.S. Appl. No. 11/258,256. |
USPTO NFOA dated Mar. 13, 2012 in connection with U.S. Appl. No. 11/786,522. |
USPTO NFOA dated May 21, 2014 in connection with U.S. Appl. No. 13/384,459. |
USPTO NFOA dated Jun. 14, 2017 in connection with U.S. Appl. No. 13/384,459. |
USPTO NFOA dated Jun. 22, 2012 in connection with U.S. Appl. No. 12/814,807. |
USPTO NFOA dated Jul. 5, 2012 in connection with U.S. Appl. No. 12/772,450. |
USPTO NFOA dated Jul. 9, 2010 in connection with U.S. Appl. No. 11/789,884. |
USPTO NFOA dated Jul. 11, 2012 in connection with U.S. Appl. No. 13/014,762. |
USPTO NFOA dated Aug. 18, 2015 in connection with U.S. Appl. No. 13/384,459. |
USPTO NFOA dated Aug. 28, 2012 in connection with U.S. Appl. No. 12/673,691. |
USPTO NFOA dated Sep. 14, 2012 in connection with U.S. Appl. No. 12/861,967. |
USPTO NFOA dated Sep. 16, 2010 in connection with U.S. Appl. No. 11/871,028. |
USPTO NFOA dated Oct. 31, 2008 in connection with U.S. Appl. No. 11/635,736. |
USPTO NFOA dated Dec. 14, 2010 in connection with U.S. Appl. No. 11/786,522. |
USPTO NOA dated Mar. 28, 2018 in connection with U.S. Appl. No. 13/384,459. |
USPTO NOA dated Aug. 2, 2013 in connection with U.S. Appl. No. 12/772,450. |
USPTO RR dated Nov. 21, 2012 in connection with U.S. Appl. No. 13/106,023. |
USPTO Supplemental Notice of Allowance dated May 3, 2018 in connection with U.S. Appl. No. 13/384,459. |
USPTO FOA dated Jul. 2, 2013 in connection with U.S. Appl. No. 13/413,748. |
USPTO FOA dated Aug. 1, 2008 in connection with U.S. Appl. No. 11/258,256. |
USPTO FOA dated Nov. 18, 2014 in connection with U.S. Appl. No. 13/384,459. |
USPTO FOA dated Dec. 8, 2017 in connection with U.S. Appl. No. 13/384,459. |
Number | Date | Country | |
---|---|---|---|
20180373762 A1 | Dec 2018 | US |
Number | Date | Country | |
---|---|---|---|
61348862 | May 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13384459 | US | |
Child | 16026688 | US |