The present invention generally relates to graphical element detection, and more specifically, to graphical element detection using a combined series and delayed parallel execution unified target technique, performing default UI element detection technique configuration at the application and/or UI type level, or both.
For robotic process automation (RPA) in a UI, graphical element detection may be performed using selectors, computer vision (CV), or optical character recognition (OCR) for each UI action. However, these techniques are typically applied individually and are not optimal for all scenarios. Accordingly, an improved approach may be beneficial.
Certain embodiments of the present invention may provide solutions to the problems and needs in the art that have not yet been fully identified, appreciated, or solved by current graphical element detection technologies. For example, some embodiments of the present invention pertain to graphical element detection using a combined series and delayed parallel execution unified target technique. Certain embodiments pertain to default UI element detection technique configuration at the application and/or UI type level. This configuration may then be used to detect UI elements at runtime.
In an embodiment, a computer-implemented method for detecting graphical elements in a UI includes receiving, by a designer application, a selection of an activity in an RPA workflow to be configured to perform graphical element detection using a unified target technique. The computer-implemented method also includes receiving, by the designer application, modifications to the unified target technique for the activity and configuring the activity based on the modifications, by the designer application. The unified target technique is a combined series and delayed parallel execution unified target technique that is configured to employ a plurality of graphical element detection techniques.
In another embodiment, a computer program is embodied on a non-transitory computer-readable medium. The computer program is configured to cause at least one processor to analyze a UI at runtime to identify UI element attributes and compare the UI element attributes to UI descriptor attributes for an activity of an RPA workflow using one or more initial graphical element detection techniques. When a match is not found using the one or more initial graphical element detection techniques during a first time period, the computer program is configured to cause the at least one processor to execute one or more additional graphical element detection techniques in parallel with the one or more initial graphical element detection techniques.
In yet another embodiment, a computer program is embodied on a non-transitory computer-readable medium. The computer program is configured to cause at least one processor to analyze a UI at runtime to identify UI element attributes and compare the UI element attributes to UI descriptor attributes for an activity of an RPA workflow using one or more initial graphical element detection techniques. When a match is not found using the one or more initial graphical element detection techniques during a first time period, the computer program is configured to cause the at least one processor to execute one or more additional graphical element detection techniques instead of the one or more initial graphical element detection techniques.
In still another embodiment, a computer-implemented method for detecting graphical elements in a UI includes receiving, by an RPA designer application, a selection of an application or a UI type. The computer-implemented method also includes receiving and saving a default targeting method settings configuration, by the RPA designer application. The computer-implemented method further includes receiving an indication of a screen to be automated, by the RPA designer application. The screen pertains to the selected application or UI type. Additionally, the computer-implemented method includes automatically preconfiguring the default targeting method settings for the selected application or UI type, by the RPA designer application.
In another embodiment, a computer program is embodied on a non-transitory computer-readable medium. The computer program is configured to cause at least one processor to automatically preconfigure default targeting method settings for a selected application or UI type. The computer program is also configured to cause the at least one processor to receive modifications to the default targeting method settings for the application or the UI type and configure the default targeting method settings in accordance with the modifications. The computer program is further configured to cause the at least one processor to configure one or more activities in an RPA workflow using the default targeting method settings for the application or UI type.
In yet another embodiment, a computer program is embodied on a non-transitory computer-readable medium. The computer program is configured to cause at least one processor to automatically preconfigure default targeting method settings for an application or UI type, by a designer application and configure one or more activities in an RPA workflow using the default targeting method settings for the application or UI type. The computer program is also configured to cause the at least one processor to generate an RPA robot to implement the RPA workflow including the one or more configured activities.
In order that the advantages of certain embodiments of the invention will be readily understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. While it should be understood that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which:
Unless otherwise indicated, similar reference characters denote corresponding features consistently throughout the attached drawings.
Some embodiments pertain to graphical element detection using a combined series and delayed parallel execution unified target technique that potentially uses a plurality of graphical element detection techniques (e.g., selectors, CV, OCR, etc.). “Graphical elements” and “UI elements” are used interchangeably herein. At their core, UI descriptors identify the UI elements (e.g., text fields, buttons, labels, menus, checkboxes, etc.). Some types of UI descriptors include, but are not limited to, selectors, CV descriptors, image matching descriptors, OCR descriptors, unified target descriptors that may utilize multiple different types of UI descriptors in series or in parallel, etc. UI descriptors may be used to compare attributes for a given UI descriptor with attributes of UI elements found at runtime in the UI.
In some embodiments, UI descriptors store the attributes of the respective UI element and its parents, e.g., in an Extensible Markup Language (XML) fragment. At runtime, the attributes for the UI elements found in the UI can be searched for matches with attributes for a respective RPA workflow activity, and if an exact match or a “close enough” match is found within a matching threshold, the UI element may be identified and interacted with accordingly. The attributes may include text-based identifiers (IDs), classes, roles, and the like. For CV, the attributes may include the type of the target element and the relation to one or more anchor elements that may be used in a multi-anchor matching approach. For OCR, the attributes may include text in the form of a stored string, for example, and text found via OCR to which the stored string was fuzzy matched during execution. Any suitable attributes and graphical element detection techniques may be used without deviating from the scope of the invention.
As used herein, a “screen” is an image of an application UI or a portion of the application UI at a certain point in time. In some embodiments, UI elements and screens may be further differentiated into specific types of UI elements (e.g., buttons, checkboxes, text fields, etc.) and screens (e.g., top windows, modal windows, popup windows, etc.).
Some embodiments use UI descriptors that store the attributes of a UI element and its parents in an XML fragment. In modern computing systems, the operating system typically represents each user interface as a hierarchical data structure that is commonly referred to as a UI tree. An example UI tree may include a document object model (DOM) underlying a webpage rendered by a web browser application.
Selectors are a type of UI descriptor that may be used to detect UI elements in some embodiments. A selector has the following structure in some embodiments:
The last node represents the GUI element of interest, and all previous nodes represent the parents of that element. <node_1> is usually referred to as a root node, and represents the top window of the application.
Each node may have one or more attributes that assist with correct identification of a specific level of the selected application. Each node has the following format in some embodiments:
Every attribute may have an assigned value, and attributes with constant values may be selected. This is because changes to the value of an attribute each time the application is started may lead to the selector not being able to correctly identify the associated element.
A UI descriptor is a set of instructions for finding a UI element. UI descriptors in some embodiments are an encapsulated data/struct format that includes UI element selector(s), anchor selector(s), CV descriptor(s), OCR descriptor(s), unified target descriptor(s) combining two or more types of UI descriptors, a screen image capture (context), an element image capture, other metadata (e.g., the application and application version), a combination thereof, etc. The encapsulated data/struct format may be extensible with future updates to the platform and is not limited to the above definition. Any suitable UI descriptor for identifying a UI element on a screen may be used without deviating from the scope of the invention. UI descriptors may be extracted from activities in an RPA workflow and added to a structured schema that groups the UI descriptors by UI applications, screens, and UI elements.
The UI descriptors may work with a unified target that encompasses multiple or all UI element detection mechanisms through which image detection and definition are performed in some embodiments. The unified target may merge multiple techniques of identifying and automating UI elements into a single cohesive approach. A unified target descriptor chains together multiple types of UI descriptors in series, uses them in parallel, or uses at least one technique (e.g., a selector) first for a period of time and then runs at least one other technique in parallel or alternatively if the first technique does not find a match within the time period. In some embodiments, a unified target descriptor may function like a finite state machine (FSM), where in a first context, a first UI descriptor mechanism is applied, in a second context, a second UI descriptor is applied, etc. The unified target may prioritize selector-based and driver-based UI detection mechanisms and fall back on CV, image matching, and/or other mechanisms to find a graphical element if the first two mechanisms are not successful in some embodiments.
In some embodiments, fuzzy matching may be employed, where one or more attributes should match with a certain accuracy (e.g., a 70% match, an 80% match, a 99% match, etc.), within a certain range, using string metrics (e.g., a Levenshtein distance, a Hamming distance, a Jaro-Winkler distance, etc.), a combination thereof, etc. One of ordinary skill in the art will appreciate that the similarity measure may quantify an amount of similarity, as well as an amount of mismatch between two attribute values. Furthermore, in various embodiments, the similarity threshold may represent a maximum amount of mismatch or a minimum amount of similarity required for a match.
Depending on the chosen manner of computing the similarity measure, the similarity threshold can have various interpretations. For instance, the similarity threshold may indicate a maximum count of characters that can differ between the two strings or a fractional degree of mismatch calculated as a proportion of the total count of characters (e.g., combined string length). In some embodiments, the similarity threshold may be re-scaled to a predetermined interval, such as between 0 and 1, between 0 and 100, between 7 and 34, etc. In one nonlimiting example, a relatively high similarity threshold (e.g., close to 1 or 100%) indicates a requirement for an almost exact match, i.e., the value of the fuzzy attribute in the runtime target is only allowed to depart very slightly from the value of the respective attribute in the design time target. In contrast, when the similarity threshold is relatively low (e.g., close to 0), almost any values of the respective fuzzy attribute are considered as matching.
In certain embodiments, the matching tolerance may differ on a per-attribute basis. For instance, an exact match may be required for one or more attributes (e.g., it may be desired to find a certain exact name) and fuzzy matching may be performed for one or more other attributes. The number and/or type of attributes used from each graphical element detection technique may be custom-specified by the RPA developer in some embodiments.
In some embodiments, attributes may be stored as attribute-value pairs and/or attribute-value-tolerance pairs (e.g., fuzzy matching). Attribute-value pairs may indicate a name and a type of UI element represented by the respective node in some embodiments. However, one skilled in the art will appreciate that there may be multiple ways to represent a location of a specific node within a UI tree other than a list of attribute-value pairs without deviating from the scope of the invention.
These attribute-value pairs and/or attribute-value-tolerance pairs may be stored in a tag in some embodiments, and each tag may include a sequence of characters with the sequence book-ended by implementation-specific delimiters (e.g., beginning with “<” and ending with “/>”). Attribute-value pairs may indicate a name and a type of UI element represented by the respective node in some embodiments. However, one skilled in the art will appreciate that there may be multiple ways to represent a location of a specific node within a UI tree other than a list of attribute-value pairs without deviating from the scope of the invention.
To enable a successful and ideally unambiguous identification by an RPA robot, some embodiments represent each UI element using an element ID characterizing the respective UI element. The element ID in some embodiments indicates a location of a target node within a UI tree, where the target node represents the respective UI element. For instance, the element ID may identify a target node/UI element as a member of a selected subset of nodes. The selected subset of nodes may form a genealogy, i.e., a line of descent through the UI tree where each node is either an ancestor or a descendant of another node.
In some embodiments, the element ID includes an ordered sequence of node indicators, the sequence tracing a genealogical path through the UI tree, and the path ending in the respective target node/UI element. Each node indicator may represent a member of an object hierarchy of the respective UI and its position within the sequence consistent with the respective hierarchy. For instance, each member of the sequence may represent a descendant (e.g., a child node) of the previous member, and may have the following member as a descendant (e.g., a child node). In one HyperText Markup Language (HTML) example, an element ID representing an individual form field may indicate that the respective form field is a child of an HTML form, which in turn is a child of a specific section of a webpage, etc. The genealogy does not need to be complete in some embodiments.
Some embodiments may use one or more multi-anchor matching attributes. Anchors are other UI elements that can be used to assist in uniquely identifying a target UI element. For instance, if multiple text fields are included in a UI, searching for a text field alone is insufficient to uniquely identify a given text field. Accordingly, some embodiments look for additional information in order to uniquely identify a given UI element. Using the text field example, a text field for entering a first name may appear to the right of the label “First Name”. This first name label may be set as an “anchor” to help uniquely identify the text field, which is the “target”.
Various positional and/or geometric associations between the target and the anchor may be used in some embodiments, potentially within one or more tolerances, to uniquely identify the target. For instance, the center of bounding boxes for the anchor and the target may be used to define a line segment. This line segment could then be required to have a certain length within a tolerance and/or slope within a tolerance to uniquely identify the target using the target/anchor pair. However, any desired position of the location associated with the target and/or anchors may be used in some embodiments without deviating from the scope of the invention. For instance, the point for drawing line segments may be in the center, upper left corner, upper right corner, lower left corner, lower right corner, any other location on the border of the bounding box, any location within the bounding box, a location outside of the bounding box as identified in relation to the bounding box properties, etc. In certain embodiments, the target and one or more anchors may have different locations within or outside of their bounding boxes that are used for geometric matching.
Per the above, a single anchor may not always be sufficient to uniquely identify a target element on a screen with a certain confidence. For instance, consider a web form where two text field for entering a first name appear to the right of respective labels “First Name” in different locations on the screen. In this example, one or more additional anchors may be useful to uniquely identify a given target. The geometric properties between the anchors and the target (e.g., line segment lengths, angles, and/or relative locations with tolerances) may be used to uniquely identify the target. The user may be required to continue to add anchors until a match strength for the target exceeds the threshold.
As used herein, the terms “user” and “developer” are used interchangeably. The user/developer may or may not have programming and/or technical knowledge. For instance, in some embodiments, the user/developer may create RPA workflows by configuring activities in the RPA workflow without manual coding. In certain embodiments, this may be done by clicking and dragging and dropping various features, for example.
In some embodiments, default UI element detection techniques (also called “targeting methods” herein) may be configured at the application and/or UI type level. UI element detection techniques that work well for a given application and/or UI type may not work as well for another application and/or UI type. For instance, techniques that work well for a Java® window may not work as well for a web browser window. Accordingly, the user may configure the RPA robot to use the most effective technique(s) for the given application and/or UI type.
Certain embodiments may be employed for robotic process automation (RPA).
The automation project enables automation of rule-based processes by giving the developer control of the execution order and the relationship between a custom set of steps developed in a workflow, defined herein as “activities.” One commercial example of an embodiment of designer 110 is UiPath Studio™. Each activity may include an action, such as clicking a button, reading a file, writing to a log panel, etc. In some embodiments, workflows may be nested or embedded.
Some types of workflows may include, but are not limited to, sequences, flowcharts, FSMs, and/or global exception handlers. Sequences may be particularly suitable for linear processes, enabling flow from one activity to another without cluttering a workflow. Flowcharts may be particularly suitable for more complex business logic, enabling integration of decisions and connection of activities in a more diverse manner through multiple branching logic operators. FSMs may be particularly suitable for large workflows. FSMs may use a finite number of states in their execution, which are triggered by a condition (i.e., transition) or an activity. Global exception handlers may be particularly suitable for determining workflow behavior when encountering an execution error and for debugging processes.
Once a workflow is developed in designer 110, execution of business processes is orchestrated by conductor 120, which orchestrates one or more robots 130 that execute the workflows developed in designer 110. One commercial example of an embodiment of conductor 120 is UiPath Orchestrator™. Conductor 120 facilitates management of the creation, monitoring, and deployment of resources in an environment. Conductor 120 may act as an integration point, or one of the aggregation points, with third-party solutions and applications.
Conductor 120 may manage a fleet of robots 130, connecting and executing robots 130 from a centralized point. Types of robots 130 that may be managed include, but are not limited to, attended robots 132, unattended robots 134, development robots (similar to unattended robots 134, but used for development and testing purposes), and nonproduction robots (similar to attended robots 132, but used for development and testing purposes). Attended robots 132 may be triggered by user events or be scheduled to automatically happen, and operate alongside a human on the same computing system. Attended robots 132 may be used with conductor 120 for a centralized process deployment and logging medium. Attended robots 132 may help the human user accomplish various tasks, and may be triggered by user events. In some embodiments, processes cannot be started from conductor 120 on this type of robot and/or they cannot run under a locked screen. In certain embodiments, attended robots 132 can only be started from a robot tray or from a command prompt. Attended robots 132 should run under human supervision in some embodiments.
Unattended robots 134 run unattended in virtual environments or on physical machines, and can automate many processes. Unattended robots 134 may be responsible for remote execution, monitoring, scheduling, and providing support for work queues. Debugging for all robot types may be run from designer 110 in some embodiments. Both attended and unattended robots may automate various systems and applications including, but not limited to, mainframes, web applications, VMs, enterprise applications (e.g., those produced by SAP®, SalesForce®, Oracle®, etc.), and computing system applications (e.g., desktop and laptop applications, mobile device applications, wearable computer applications, etc.).
Conductor 120 may have various capabilities including, but not limited to, provisioning, deployment, versioning, configuration, queueing, monitoring, logging, and/or providing interconnectivity. Provisioning may include creating and maintenance of connections between robots 130 and conductor 120 (e.g., a web application). Deployment may include assuring the correct delivery of package versions to assigned robots 130 for execution. Versioning may include management of unique instances of some process or configuration in some embodiments. Configuration may include maintenance and delivery of robot environments and process configurations. Queueing may include providing management of queues and queue items. Monitoring may include keeping track of robot identification data and maintaining user permissions. Logging may include storing and indexing logs to a database (e.g., an SQL database) and/or another storage mechanism (e.g., ElasticSearch®, which provides the ability to store and quickly query large datasets). Conductor 120 may provide interconnectivity by acting as the centralized point of communication for third-party solutions and/or applications.
Robots 130 are execution agents that run workflows built in designer 110. One commercial example of some embodiments of robot(s) 130 is UiPath Robots™ In some embodiments, robots 130 install the Microsoft Windows® Service Control Manager (SCM)-managed service by default. As a result, such robots 130 can open interactive Windows® sessions under the local system account, and have the rights of a Windows® service.
In some embodiments, robots 130 can be installed in a user mode. For such robots 130, this means they have the same rights as the user under which a given robot 130 has been installed. This feature may also be available for High Density (HD) robots, which ensure full utilization of each machine at its maximum potential. In some embodiments, any type of robot 130 may be configured in an HD environment.
Robots 130 in some embodiments are split into several components, each being dedicated to a particular automation task. The robot components in some embodiments include, but are not limited to, SCM-managed robot services, user mode robot services, executors, agents, and command line. SCM-managed robot services manage and monitor Windows® sessions and act as a proxy between conductor 120 and the execution hosts (i.e., the computing systems on which robots 130 are executed). These services are trusted with and manage the credentials for robots 130. A console application is launched by the SCM under the local system.
User mode robot services in some embodiments manage and monitor Windows® sessions and act as a proxy between conductor 120 and the execution hosts. User mode robot services may be trusted with and manage the credentials for robots 130. A Windows® application may automatically be launched if the SCM-managed robot service is not installed.
Executors may run given jobs under a Windows® session (i.e., they may execute workflows. Executors may be aware of per-monitor dots per inch (DPI) settings. Agents may be Windows® Presentation Foundation (WPF) applications that display the available jobs in the system tray window. Agents may be a client of the service. Agents may request to start or stop jobs and change settings. The command line is a client of the service. The command line is a console application that can request to start jobs and waits for their output.
Having components of robots 130 split as explained above helps developers, support users, and computing systems more easily run, identify, and track what each component is executing. Special behaviors may be configured per component this way, such as setting up different firewall rules for the executor and the service. The executor may always be aware of DPI settings per monitor in some embodiments. As a result, workflows may be executed at any DPI, regardless of the configuration of the computing system on which they were created. Projects from designer 110 may also be independent of browser zoom level in some embodiments. For applications that are DPI-unaware or intentionally marked as unaware, DPI may be disabled in some embodiments.
In some embodiments, a robot represents an association between a machine name and a username. The robot may manage multiple executors at the same time. On computing systems that support multiple interactive sessions running simultaneously (e.g., Windows® Server 2012), multiple robots may be running at the same time, each in a separate Windows® session using a unique username. This is referred to as HD robots above.
Agent 214 is also responsible for sending the status of the robot (e.g., periodically sending a “heartbeat” message indicating that the robot is still functioning) and downloading the required version of the package to be executed. The communication between agent 214 and conductor 230 is always initiated by agent 214 in some embodiments. In the notification scenario, agent 214 may open a WebSocket channel that is later used by conductor 230 to send commands to the robot (e.g., start, stop, etc.).
On the server side, a presentation layer (web application 232, Open Data Protocol (OData) Representative State Transfer (REST) Application Programming Interface (API) endpoints 234, and notification and monitoring 236), a service layer (API implementation/business logic 238), and a persistence layer (database server 240 and indexer server 250) are included. Conductor 230 includes web application 232, OData REST API endpoints 234, notification and monitoring 236, and API implementation/business logic 238. In some embodiments, most actions that a user performs in the interface of conductor 230 (e.g., via browser 220) are performed by calling various APIs. Such actions may include, but are not limited to, starting jobs on robots, adding/removing data in queues, scheduling jobs to run unattended, etc. without deviating from the scope of the invention. Web application 232 is the visual layer of the server platform. In this embodiment, web application 232 uses Hypertext Markup Language (HTML) and JavaScript (JS). However, any desired markup languages, script languages, or any other formats may be used without deviating from the scope of the invention. The user interacts with web pages from web application 232 via browser 220 in this embodiment in order to perform various actions to control conductor 230. For instance, the user may create robot groups, assign packages to the robots, analyze logs per robot and/or per process, start and stop robots, etc.
In addition to web application 232, conductor 230 also includes service layer that exposes OData REST API endpoints 234. However, other endpoints may be included without deviating from the scope of the invention. The REST API is consumed by both web application 232 and agent 214. Agent 214 is the supervisor of one or more robots on the client computer in this embodiment.
The REST API in this embodiment covers configuration, logging, monitoring, and queueing functionality. The configuration endpoints may be used to define and configure application users, permissions, robots, assets, releases, and environments in some embodiments. Logging REST endpoints may be used to log different information, such as errors, explicit messages sent by the robots, and other environment-specific information, for instance. Deployment REST endpoints may be used by the robots to query the package version that should be executed if the start job command is used in conductor 230. Queueing REST endpoints may be responsible for queues and queue item management, such as adding data to a queue, obtaining a transaction from the queue, setting the status of a transaction, etc.
Monitoring REST endpoints may monitor web application 232 and agent 214. Notification and monitoring API 236 may be REST endpoints that are used for registering agent 214, delivering configuration settings to agent 214, and for sending/receiving notifications from the server and agent 214. Notification and monitoring API 236 may also use WebSocket communication in some embodiments.
The persistence layer includes a pair of servers in this embodiment—database server 240 (e.g., a SQL server) and indexer server 250. Database server 240 in this embodiment stores the configurations of the robots, robot groups, associated processes, users, roles, schedules, etc. This information is managed through web application 232 in some embodiments. Database server 240 may manage queues and queue items. In some embodiments, database server 240 may store messages logged by the robots (in addition to or in lieu of indexer server 250).
Indexer server 250, which is optional in some embodiments, stores and indexes the information logged by the robots. In certain embodiments, indexer server 250 may be disabled through configuration settings. In some embodiments, indexer server 250 uses ElasticSearch®, which is an open source project full-text search engine. Messages logged by robots (e.g., using activities like log message or write line) may be sent through the logging REST endpoint(s) to indexer server 250, where they are indexed for future utilization.
UI automation activities 330 are a subset of special, lower level activities that are written in lower level code (e.g., CV activities) and facilitate interactions with applications through the UI layer. In certain embodiments, UI automation activities 300 may simulate” user input through window messages or the like, for example. UI automation activities 330 facilitate these interactions via drivers 340 that allow the robot to interact with the desired software. For instance, drivers 340 may include OS drivers 342, browser drivers 344, VM drivers 346, enterprise application drivers 348, etc.
Drivers 340 may interact with the OS at a low level looking for hooks, monitoring for keys, etc. They may facilitate integration with Chrome®, IE®, Citrix®, SAP®, etc. For instance, the “click” activity performs the same role in these different applications via drivers 340.
With respect to
Computing system 500 further includes a memory 515 for storing information and instructions to be executed by processor(s) 510. Memory 515 can be comprised of any combination of Random Access Memory (RAM), Read Only Memory (ROM), flash memory, cache, static storage such as a magnetic or optical disk, or any other types of non-transitory computer-readable media or combinations thereof. Non-transitory computer-readable media may be any available media that can be accessed by processor(s) 510 and may include volatile media, non-volatile media, or both. The media may also be removable, non-removable, or both.
Additionally, computing system 500 includes a communication device 520, such as a transceiver, to provide access to a communications network via a wireless and/or wired connection. In some embodiments, communication device 520 may be configured to use Frequency Division Multiple Access (FDMA), Single Carrier FDMA (SC-FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), Orthogonal Frequency Division Multiplexing (OFDM), Orthogonal Frequency Division Multiple Access (OFDMA), Global System for Mobile (GSM) communications, General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), cdma2000, Wideband CDMA (W-CDMA), High-Speed Downlink Packet Access (HSDPA), High-Speed Uplink Packet Access (HSUPA), High-Speed Packet Access (HSPA), Long Term Evolution (LTE), LTE Advanced (LTE-A), 802.11x, Wi-Fi, Zigbee, Ultra-WideBand (UWB), 802.16x, 802.15, Home Node-B (HnB), Bluetooth, Radio Frequency Identification (RFID), Infrared Data Association (IrDA), Near-Field Communications (NFC), fifth generation (5G), New Radio (NR), any combination thereof, and/or any other currently existing or future-implemented communications standard and/or protocol without deviating from the scope of the invention. In some embodiments, communication device 520 may include one or more antennas that are singular, arrayed, phased, switched, beamforming, beamsteering, a combination thereof, and or any other antenna configuration without deviating from the scope of the invention.
Processor(s) 510 are further coupled via bus 505 to a display 525, such as a plasma display, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, a Field Emission Display (FED), an Organic Light Emitting Diode (OLED) display, a flexible OLED display, a flexible substrate display, a projection display, a 4K display, a high definition display, a Retina® display, an In-Plane Switching (IPS) display, or any other suitable display for displaying information to a user. Display 525 may be configured as a touch (haptic) display, a three dimensional (3D) touch display, a multi-input touch display, a multi-touch display, etc. using resistive, capacitive, surface-acoustic wave (SAW) capacitive, infrared, optical imaging, dispersive signal technology, acoustic pulse recognition, frustrated total internal reflection, etc. Any suitable display device and haptic I/O may be used without deviating from the scope of the invention.
A keyboard 530 and a cursor control device 535, such as a computer mouse, a touchpad, etc., are further coupled to bus 505 to enable a user to interface with computing system 500. However, in certain embodiments, a physical keyboard and mouse may not be present, and the user may interact with the device solely through display 525 and/or a touchpad (not shown). Any type and combination of input devices may be used as a matter of design choice. In certain embodiments, no physical input device and/or display is present. For instance, the user may interact with computing system 500 remotely via another computing system in communication therewith, or computing system 500 may operate autonomously.
Memory 515 stores software modules that provide functionality when executed by processor(s) 510. The modules include an operating system 540 for computing system 500. The modules further include a combined series-and-parallel unified target/default targeting method module 545 that is configured to perform all or part of the processes described herein or derivatives thereof. Computing system 500 may include one or more additional functional modules 550 that include additional functionality.
One skilled in the art will appreciate that a “system” could be embodied as a server, an embedded computing system, a personal computer, a console, a personal digital assistant (PDA), a cell phone, a tablet computing device, a quantum computing system, or any other suitable computing device, or combination of devices without deviating from the scope of the invention. Presenting the above-described functions as being performed by a “system” is not intended to limit the scope of the present invention in any way, but is intended to provide one example of the many embodiments of the present invention. Indeed, methods, systems, and apparatuses disclosed herein may be implemented in localized and distributed forms consistent with computing technology, including cloud computing systems. The computing system could be part of or otherwise accessible by a local area network (LAN), a mobile communications network, a satellite communications network, the Internet, a public or private cloud, a hybrid cloud, a server farm, any combination thereof, etc. Any localized or distributed architecture may be used without deviating from the scope of the invention.
It should be noted that some of the system features described in this specification have been presented as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom very large scale integration (VLSI) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, graphics processing units, or the like.
A module may also be at least partially implemented in software for execution by various types of processors. An identified unit of executable code may, for instance, include one or more physical or logical blocks of computer instructions that may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may include disparate instructions stored in different locations that, when joined logically together, comprise the module and achieve the stated purpose for the module. Further, modules may be stored on a computer-readable medium, which may be, for instance, a hard disk drive, flash device, RAM, tape, and/or any other such non-transitory computer-readable medium used to store data without deviating from the scope of the invention.
Indeed, a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network.
As shown in
If delayed parallel execution is desired, the value of serial execution selector 630 may be set to “No”, and the RPA developer can then choose whether one or more initial techniques will be used via initial techniques selector 640. See
After an initial technique 644 is selected, a parallel techniques dropdown 646 appears with the remaining techniques listed. See
The RPA developer may still add more initial techniques via add link 645, or the RPA developer may remove previously selected initial techniques. In some embodiments, if the RPA developer selects “No” for initial techniques selector 640, parallel techniques dropdown 646 still appears and the RPA developer can custom-select which techniques to execute in parallel. After a parallel technique 647 is selected, the RPA developer may still add more parallel techniques via add link 648, or the RPA developer may remove previously selected parallel techniques. See
In some embodiments, multiple delay periods may be used. For instance, an initial technique may be used for one second, and if a match is not found, one or more other technique(s) may be used in parallel with the initial technique, and if no match is found during the second period, still other technique(s) may be applied in parallel, etc. Any number of delay periods and/or techniques during each delay period may be used without deviating from the scope of the invention.
In some embodiments, mutually exclusive serial stages may be employed. For instance, an initial technique may be used for one second, and if a match is not found, one or more other technique(s) may be used instead of the initial technique, and if no match is found during the second period, still other technique(s) may be applied instead of the initial technique and the second period technique(s), etc. In this manner, techniques that do not appear to be successful may be stopped, potentially reducing resource requirements.
Turning to
However, this technique may not be effective for all applications and/or UI types. For instance, selectors may not work well for many modern web browsers since values for the attributes tend to change dynamically. Turning to
Because using a full selector is not accurate for many web browsers, the run value for full selector setting 724 is set to “False”. On the other hand, the run values for fuzzy selector 725, image selector 726, and enable anchors 727 are set to “True”. This is the opposite configuration as in SAP® targeting method tab 710 in
By configuring targeting methods on a per-application and/or per-UI type basis, a user does not need to reconfigure every graphical element when he or she indicates the element on the screen. For instance, if the user indicates a text field in a web browser, the targeting methods for that text field will be as the user preconfigured them without the user having to go in each time and set the run value for the full selector to “False”, set the run value for fuzzy selector to “True”, etc. However, it should be noted that the user may modify these default values in some embodiments if there is a specific UI element that may be detected more accurately using a different targeting method configuration than the default configuration.
It should be noted that other targeting method settings are possible. For instance, CV, OCR, or a combination thereof may be used in some embodiments. Indeed, any suitable graphical element detection technique(s) may be used without deviating from the scope of the invention.
The RPA designer application may receive modifications to the unified target functionality from the RPA developer at 830 in order to custom-configure the unified target functionality for the activity. The RPA designer application then configures the activity based on the unified target configuration at 840. If more activities are to be configured, the RPA developer may select another activity and the process returns to step 810. Once the desired activit(ies) are configured, the RPA designer application generates an RPA robot to implement an RPA workflow including the configured activit(ies) at 850. The process then ends or proceeds to
After the UI has been analyzed, the UI element attributes are analyzed for the activity using unified target at 920. Turning to
If a match is not found in the initial technique time period at 924, one or more additional graphical element detection techniques are executed in parallel at 928. If a match is found in a second time period at 929, the results from the first technique to find a match out of all of the initial techniques and subsequent parallel techniques are then selected at 926 and the process proceeds to step 930. In some embodiments, finding a match for the graphical element may involve finding a match for the graphical element itself as a target and for its anchor(s), and the first technique to find a match for each may be selected for that respective target/anchor. If a match was not found in the second time period at 929, the process also proceeds to step 930. In some embodiments, multiple stages of delayed parallel execution are performed. In certain embodiments, different techniques are executed at each stage and previous techniques are stopped.
If a matching UI element is found via unified target at 930, the action associated with the activity involving the UI element is performed at 940 (e.g., clicking a button, entering text, interacting with a menu, etc.). If there are more activities at 950, the process proceeds to step 920 for the next activity. If, however, the UI element matching the attributes of the graphical element detection techniques is not found at 930, an exception is thrown or the user is asked how he or she would like to proceed (e.g., whether to continue execution) at 960 and the process ends.
The same developer or a different developer then indicates a screen in a UI, and the screen indication is received at 1015 (e.g., by an RPA designer application such as UiPath Studio™). In other words, different instances of the RPA designer application may be used to configure the default targeting method settings and to subsequently modify the default targeting method settings. Indeed, these instances may not be on the same computing system in some embodiments. The default targeting method settings are then preconfigured for the detected application or UI type associated with the screen at 1020. The RPA designer application may receive modifications to the default targeting method settings and configure the settings accordingly at 1025. For instance, a user may choose which targeting methods he or she wants to use for a screen where the default techniques are not performing as well as desired. For example, perhaps a certain screen has substantially different visual features than other screens in the application or desktop.
After the targeting method settings have been set by default or modified from the default configuration, the user develops an RPA workflow where the activities are configured using these targeting method settings at 1030. In some embodiments, the user may still modify the default targeting method settings while designing the RPA workflow. After the user has completed the RPA workflow, the RPA designer application generates an RPA robot to implement the RPA workflow including the configured activit(ies) at 1035. The process then ends or proceeds to
Turning to
After the UI has been analyzed, the UI element attributes are analyzed for the activity using the default targeting method configuration(s) at 1045, unless overridden for a given UI element by the user during design time development. If a matching UI element is found using the targeting method settings at 1050, the action associated with the activity involving the UI element is performed at 1055 (e.g., clicking a button, entering text, interacting with a menu, etc.). If there are more activities at 1060, the process proceeds to step 1045 for the next activity. If, however, the UI element is not found using the configured targeting method(s) at 1050, an exception is thrown or the user is asked how he or she would like to proceed (e.g., whether to continue execution) at 1065 and the process ends.
The process steps performed in
The computer program can be implemented in hardware, software, or a hybrid implementation. The computer program can be composed of modules that are in operative communication with one another, and which are designed to pass information or instructions to display. The computer program can be configured to operate on a general purpose computer, an ASIC, or any other suitable device.
It will be readily understood that the components of various embodiments of the present invention, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the detailed description of the embodiments of the present invention, as represented in the attached figures, is not intended to limit the scope of the invention as claimed, but is merely representative of selected embodiments of the invention.
The features, structures, or characteristics of the invention described throughout this specification may be combined in any suitable manner in one or more embodiments. For example, reference throughout this specification to “certain embodiments,” “some embodiments,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in certain embodiments,” “in some embodiment,” “in other embodiments,” or similar language throughout this specification do not necessarily all refer to the same group of embodiments and the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
It should be noted that reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussion of the features and advantages, and similar language, throughout this specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages, and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
One having ordinary skill in the art will readily understand that the invention as discussed above may be practiced with steps in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although the invention has been described based upon these preferred embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent, while remaining within the spirit and scope of the invention. In order to determine the metes and bounds of the invention, therefore, reference should be made to the appended claims.
This application is a continuation of, and claims priority to, U.S. patent application Ser. No. 17/014,171 filed on Sep. 8, 2020. The subject matter thereof is hereby incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6115646 | Fiszman et al. | Sep 2000 | A |
7418615 | Chang et al. | Aug 2008 | B2 |
7437614 | Haswell et al. | Oct 2008 | B2 |
7653873 | Brandt et al. | Jan 2010 | B2 |
7653896 | Herdeg, III | Jan 2010 | B2 |
7671796 | Chen et al. | Mar 2010 | B2 |
8170901 | Shukla et al. | May 2012 | B2 |
8190536 | Al-Duwaish | May 2012 | B2 |
8332443 | Plancarte et al. | Dec 2012 | B2 |
8356207 | Hosek et al. | Jan 2013 | B2 |
8385658 | Elangovan et al. | Feb 2013 | B2 |
8407661 | Wang et al. | Mar 2013 | B2 |
8554600 | Reisman | Oct 2013 | B2 |
8694967 | Grieves et al. | Apr 2014 | B2 |
8701090 | Zavatone | Apr 2014 | B2 |
8707280 | Stefansson et al. | Apr 2014 | B2 |
8756044 | Mani et al. | Jun 2014 | B2 |
8843492 | Cao et al. | Sep 2014 | B2 |
8855372 | Rodriguez et al. | Oct 2014 | B2 |
8898442 | Stoitsev | Nov 2014 | B2 |
8917275 | Grieves et al. | Dec 2014 | B2 |
8954419 | Apte et al. | Feb 2015 | B2 |
9021442 | Rossi | Apr 2015 | B2 |
9164776 | Rauh et al. | Oct 2015 | B2 |
9195572 | Rossi | Nov 2015 | B2 |
9274934 | Chandra et al. | Mar 2016 | B2 |
9335920 | Ohashi et al. | May 2016 | B2 |
9424167 | Lee et al. | Aug 2016 | B2 |
9465726 | Kozhuharov | Oct 2016 | B2 |
9501537 | Walter et al. | Nov 2016 | B2 |
9519570 | Srinivasan et al. | Dec 2016 | B2 |
9594367 | D'Mura et al. | Mar 2017 | B2 |
9600401 | Haischt et al. | Mar 2017 | B1 |
9720934 | Dube | Aug 2017 | B1 |
9760475 | Zhang et al. | Sep 2017 | B2 |
9817746 | Li | Nov 2017 | B2 |
9817967 | Shukla et al. | Nov 2017 | B1 |
9836775 | He | Dec 2017 | B2 |
9928106 | Hosabettu et al. | Mar 2018 | B2 |
9965139 | Nychis et al. | May 2018 | B2 |
10042638 | Busi et al. | Aug 2018 | B2 |
10088969 | Schein et al. | Oct 2018 | B2 |
10146785 | Desineni et al. | Dec 2018 | B2 |
10169006 | Kochura | Jan 2019 | B2 |
10180896 | Spycher et al. | Jan 2019 | B2 |
10191889 | Nguyen et al. | Jan 2019 | B2 |
10261658 | Zhang et al. | Apr 2019 | B2 |
10270644 | Valsecchi et al. | Apr 2019 | B1 |
10318576 | Jaber | Jun 2019 | B2 |
10339027 | Garcia et al. | Jul 2019 | B2 |
10354225 | Sharma et al. | Jul 2019 | B2 |
10409712 | Dwarakanath et al. | Sep 2019 | B2 |
10430180 | Kakhandiki et al. | Oct 2019 | B2 |
10503627 | Radhakrishnan et al. | Dec 2019 | B2 |
10575231 | Gay et al. | Feb 2020 | B2 |
10654166 | Hall | May 2020 | B1 |
10659247 | Glaser et al. | May 2020 | B2 |
10705948 | Ramasamy et al. | Jul 2020 | B2 |
10733329 | Ragupathy et al. | Aug 2020 | B1 |
10754493 | Nychis et al. | Aug 2020 | B2 |
10812272 | Copeland et al. | Oct 2020 | B1 |
10853097 | Kakhandiki | Dec 2020 | B1 |
10860905 | Gligan et al. | Dec 2020 | B1 |
10871977 | Hanke et al. | Dec 2020 | B2 |
10908950 | Dennis et al. | Feb 2021 | B1 |
10911546 | Goswami et al. | Feb 2021 | B1 |
20030050800 | Brandt et al. | Mar 2003 | A1 |
20030126517 | Givoni et al. | Jul 2003 | A1 |
20030191559 | Chatsinchai et al. | Oct 2003 | A1 |
20040041827 | Bischof et al. | Mar 2004 | A1 |
20040194065 | McGrath et al. | Sep 2004 | A1 |
20040255269 | Santori et al. | Dec 2004 | A1 |
20050132045 | Hornback et al. | Jun 2005 | A1 |
20050182667 | Metzger et al. | Aug 2005 | A1 |
20060005132 | Herdeg | Jan 2006 | A1 |
20060074730 | Shukla et al. | Apr 2006 | A1 |
20060199167 | Yang et al. | Sep 2006 | A1 |
20070074062 | Chang et al. | Mar 2007 | A1 |
20070150805 | Misovski | Jun 2007 | A1 |
20070229352 | Chen et al. | Oct 2007 | A1 |
20090028440 | Elangovan et al. | Jan 2009 | A1 |
20090103769 | Milov et al. | Apr 2009 | A1 |
20090167493 | Colciago | Jul 2009 | A1 |
20100023141 | Wang et al. | Jan 2010 | A1 |
20100063946 | Al-Duwaish | Mar 2010 | A1 |
20100076600 | Cross et al. | Mar 2010 | A1 |
20100084849 | Masuda | Apr 2010 | A1 |
20100088396 | Armerding | Apr 2010 | A1 |
20100121794 | Heisele et al. | May 2010 | A1 |
20100205529 | Butin | Aug 2010 | A1 |
20110035406 | Petrou et al. | Feb 2011 | A1 |
20110078652 | Mani et al. | Mar 2011 | A1 |
20110173590 | Yanes | Jul 2011 | A1 |
20110239141 | Wang et al. | Sep 2011 | A1 |
20110252356 | Morris | Oct 2011 | A1 |
20110304641 | Grieves et al. | Dec 2011 | A1 |
20120023484 | Demant et al. | Jan 2012 | A1 |
20120102461 | Schwartz et al. | Apr 2012 | A1 |
20120117456 | Koskimies | May 2012 | A1 |
20120124495 | Amichai et al. | May 2012 | A1 |
20120167016 | Rauh et al. | Jun 2012 | A1 |
20120174069 | Zavatone | Jul 2012 | A1 |
20120317165 | Stefansson et al. | Dec 2012 | A1 |
20130019170 | Mounty et al. | Jan 2013 | A1 |
20130148891 | Yassin | Jun 2013 | A1 |
20130159890 | Rossi | Jun 2013 | A1 |
20130212234 | Bartlett et al. | Aug 2013 | A1 |
20130318068 | Apte et al. | Nov 2013 | A1 |
20140149391 | Walter et al. | May 2014 | A1 |
20140281918 | Wei et al. | Sep 2014 | A1 |
20140297818 | Loewenthal et al. | Oct 2014 | A1 |
20140351091 | He | Nov 2014 | A1 |
20140366005 | Kozhuharov | Dec 2014 | A1 |
20150020191 | Vida et al. | Jan 2015 | A1 |
20150290795 | Oleynik | Oct 2015 | A1 |
20150310446 | Tuchman et al. | Oct 2015 | A1 |
20150317240 | Li | Nov 2015 | A1 |
20150339213 | Lee et al. | Nov 2015 | A1 |
20150370694 | Zhang | Dec 2015 | A1 |
20160019049 | Kakhandiki et al. | Jan 2016 | A1 |
20160171285 | Kim et al. | Jun 2016 | A1 |
20160179359 | Kodejs et al. | Jun 2016 | A1 |
20160292015 | Shah et al. | Oct 2016 | A1 |
20160335349 | Desineni et al. | Nov 2016 | A1 |
20160335356 | Desineni et al. | Nov 2016 | A1 |
20170001308 | Bataller et al. | Jan 2017 | A1 |
20170030716 | Ali | Feb 2017 | A1 |
20170052824 | Sharma et al. | Feb 2017 | A1 |
20170060368 | Kochura | Mar 2017 | A1 |
20170147296 | Kumar et al. | May 2017 | A1 |
20170173784 | Shah et al. | Jun 2017 | A1 |
20170228119 | Hosbettu | Aug 2017 | A1 |
20170295243 | Kim | Oct 2017 | A1 |
20180103047 | Turgeman et al. | Apr 2018 | A1 |
20180146157 | Karpinsky | May 2018 | A1 |
20180173614 | Gong et al. | Jun 2018 | A1 |
20180189170 | Dwarakanath et al. | Jul 2018 | A1 |
20180197123 | Parimelazhagan | Jul 2018 | A1 |
20180232663 | Ross | Aug 2018 | A1 |
20180307592 | Topholt et al. | Oct 2018 | A1 |
20180370029 | Hall et al. | Dec 2018 | A1 |
20180370033 | Geffen et al. | Dec 2018 | A1 |
20190015974 | Mummigatti et al. | Jan 2019 | A1 |
20190050323 | Kogan et al. | Feb 2019 | A1 |
20190129827 | Ramasamy et al. | May 2019 | A1 |
20190130094 | Votaw | May 2019 | A1 |
20190141596 | Gay et al. | May 2019 | A1 |
20190155225 | Kothandaraman et al. | May 2019 | A1 |
20190205636 | Saraswat et al. | Jul 2019 | A1 |
20190266254 | Blumenfeld et al. | Aug 2019 | A1 |
20190286474 | Sturtivant | Sep 2019 | A1 |
20190286736 | Sturtivant | Sep 2019 | A1 |
20190302968 | Nychis et al. | Oct 2019 | A1 |
20190332508 | Goyal et al. | Oct 2019 | A1 |
20190340114 | Podoler | Nov 2019 | A1 |
20190347313 | Walsh et al. | Nov 2019 | A1 |
20200004798 | Weinert, Jr. et al. | Jan 2020 | A1 |
20200026263 | Haberkern et al. | Jan 2020 | A1 |
20200050983 | Balasubramanian et al. | Feb 2020 | A1 |
20200059441 | Viet et al. | Feb 2020 | A1 |
20200073686 | Hanke et al. | Mar 2020 | A1 |
20200118076 | Ballaro | Apr 2020 | A1 |
20200134374 | Oros | Apr 2020 | A1 |
20200134524 | Gentilhomme et al. | Apr 2020 | A1 |
20200180155 | Hall | Jun 2020 | A1 |
20200206920 | Ma et al. | Jul 2020 | A1 |
20200219033 | Smutko et al. | Jul 2020 | A1 |
20200225848 | Yoon et al. | Jul 2020 | A1 |
20200226249 | Zhan et al. | Jul 2020 | A1 |
20200234183 | Ghatage et al. | Jul 2020 | A1 |
20200249964 | Fernandes et al. | Aug 2020 | A1 |
20200310844 | Dennis et al. | Oct 2020 | A1 |
20200334136 | Ramasamy et al. | Oct 2020 | A1 |
20200371818 | Banne | Nov 2020 | A1 |
20200379889 | Hamid | Dec 2020 | A1 |
20200401430 | Berg et al. | Dec 2020 | A1 |
20200401431 | Rashid | Dec 2020 | A1 |
20210012102 | Cristescu et al. | Jan 2021 | A1 |
20210019157 | Voicu | Jan 2021 | A1 |
20210019574 | Voicu | Jan 2021 | A1 |
20210051203 | Sathianarayanan et al. | Feb 2021 | A1 |
20210073095 | Beckett et al. | Mar 2021 | A1 |
20210109722 | Ripa | Apr 2021 | A1 |
20210117162 | Thangaraj et al. | Apr 2021 | A1 |
20210125189 | P et al. | Apr 2021 | A1 |
20210133670 | Cella et al. | May 2021 | A1 |
20210182996 | Cella et al. | Jun 2021 | A1 |
20210200387 | Munteanu | Jul 2021 | A1 |
20210248514 | Cella et al. | Aug 2021 | A1 |
20220141386 | Asai | May 2022 | A1 |
20230419387 | Ballaro | Dec 2023 | A1 |
Number | Date | Country |
---|---|---|
102279791 | Dec 2011 | CN |
109446092 | Mar 2019 | CN |
110637283 | Dec 2019 | CN |
110851299 | Feb 2020 | CN |
109669873 | Jun 2022 | CN |
111078339 | Nov 2022 | CN |
1994004280 | Jan 1994 | JP |
20070057646 | Jun 2007 | KR |
20200082801 | Jul 2020 | KR |
2015125017 | Aug 2015 | WO |
2020106437 | May 2020 | WO |
Entry |
---|
Learning Robotic Process Automation (Year: 2018). |
David S. Posigian, “Final Office Action”, issued Nov. 30, 2022, U.S. Appl. No. 17/332,005. |
Dino Kujundzic, “Notice of Allowance”, issued Oct. 12, 2022, U.S. Appl. No. 17/014,171. |
Dino Kujundzic, “Non-Final Office Action”, issued Jun. 8, 2022, U.S. Appl. No. 17/014,171. |
“About the UlAutomationNext Activities Pack,” available at URL:https://web.archive.org/web/20200804053432/https://docs.uipath.com/activities/docs/about-the-ui-automation-next-activities-pack (Aug. 4, 2020). |
David S. Posigian, “Non-Final Office Action”, issued Mar. 24, 2022, U.S. Appl. No. 17/332,005. |
European Search Report issued in EP Application No. 20199241 on Mar. 15, 2021. |
European Search Report issued in EP Application No. 20199254 on Mar. 16, 2021. |
International Search Report & Written Opinion, issued Apr. 29, 2021, PCT Application No. PCT/US20/51481. |
International Search Report & Written Opinion, issued Dec. 6, 2021, PCT Application No. PCT/US21/45966. |
International Search Report & Written Opinion, issued Dec. 8, 2021, PCT Application No. PCT/US21/45974. |
International Search Report and Written Opinion of the International Search Authority issued for PCT Application No. PCT/US2020/051468 on Jun. 7, 2021. |
Jung-Mu T Chuang, “Final Office Action”, issued Aug. 10, 2021, U.S. Appl. No. 17/014,171. |
Jung-Mu T Chuang, “Non-Final Office Action”, issued Apr. 2, 2021, U.S. Appl. No. 17/014,171. |
Jung-Mu T Chuang, “Non-Final Office Action”, issued Jun. 2, 2021, U.S. Appl. No. 17/016,251. |
Jung-Mu T Chuang, “Notice of Allowance”, issued Jan. 5, 2022, U.S. Appl. No. 17/331,558. |
Jung-Mu T Chuang, “Notice of Allowance”, issued Jan. 5, 2022, U.S. Appl. No. 17/332,005. |
Jung-Mu T Chuang, “Notice of Allowance”, issued Oct. 22, 2021, U.S. Appl. No. 17/016,251. |
Jung-Mu T Chuang, “Restriction Requirement”, issued Feb. 25, 2021, U.S. Appl. No. 17/014,171. |
MicroFocus RPA Architecture page available at https://docs.microfocus.com/doc/Robotic_Process_Automation/2019.07/RPAArch (Jul. 18, 2019). |
Microsoft Active Accessibility Wikipedia Page available at https://en.wikipedia.org/wiki/Microsoft_Active_Accessibility (last accessed Aug. 26, 2020). |
Notice of Allowance issued in Korean Application No. 10-2020-7028263 on Mar. 29, 2022. |
Param Kahlon, “UiPath 2020.2 Monthly Update,” available at https://www.uipath.com/blog/february-2020-uipath-monthly-update (Feb. 24, 2020). |
Param Kahlon, “UiPath 2020.3 Monthly Update,” available at https://www.uipath.com/blog/march-2020-uipath-monthly-update (Mar. 23, 2020). |
Renee D Chavez, “Notice of Allowance”, issued Feb. 9, 2022, U.S. Appl. No. 17/014,171. |
Tapani Qvick. Understanding Business Process Complexity for Robotic Process Automation. Lappeenranta University of Technology, Master's Thesis, Jan. 21, 2019, See pp. 45-46. |
Ui Path Community Forum (see “https://forum.uipath.com/t/multiple-instances-of-design-studio/32137”; pub date: 2018; downloaded on May 26, 2021) (Year: 2018). |
Ui Path Studio Guide (https://docs.uipath.com/studio/v2018.4/docs/introduction; pub date: 2018) (Year: 2018. |
UiAutomationNext Project Settings Page available at https://web.archive.org/web/20200804053904/https://docs.uipath.com/activities/docs/project-settings-ui-automation-next (Aug. 4, 2020). |
UiPath February Monthly Update available at https://www.uipath.com/blog/february-2020-uipath-monthly-update (Feb. 24, 2020). |
UiPath Tutorial (https://dev.tutorialspoint.com/uipath/uipath_tutorial.pdf ). |
Second Examination Report issued in EP Application No. 20199241.9 on Jun. 16, 2023. |
Examination Report issued in EP Application No. 20199241.9 on Dec. 13, 2022. |
Notice of Allowance issued in Japanese Application No. 2020-553458 on Feb. 7, 2023. |
TutorialsPoint UiPath Robotic Process Automation Tool tutorial available at https://dev.tutorialspoint.com/uipath/uipath_tutorial.pdf (last accessed Feb. 7, 2023). |
UiPath Studio version 2018.4 release notes available at https://docs.uipath.com/studio/v2018.4.0/docs/introduction (Apr. 1, 2018). |
David S. Posigian, “Examiner's Answer”, issued Apr. 3, 2023, U.S. Appl. No. 17/332,005. |
First Office Action issued in Chinese Application No. 202080002311.5 on Apr. 22, 2023. |
Search Report for First Office Action for Chinese Application No. 202080002311.5 issued Apr. 22, 2023. |
Notice of Grant issued in Chinese Application No. 202080002311.5 on Nov. 24, 2023. |
Search Report for Notice of Grant issued in Chinese Application No. 202080002311.5 on Nov. 24, 2023. |
Federal RPA Community of Practice, RPA Program Playbook, Version 1.1, Jan. 17, 2020. |
Harper Collins Compact Dictionary & Thesaurus 49, 2003. |
Laplante, Phillip A., Dictionary of Computer Science, Engineering, and Technology 532, 2001. |
Robotic Process Automation (RPA), Gartner Information Technology Glossary, Gartner, Inc., Jun. 5, 2019. |
Tuyetlien T Tran, “Decision on Appeal”, issued May 16, 2024, U.S. Appl. No. 17/332,005. |
U.S. GSA, Robotic Process Automation, Tech at GSA, tech.gsa.gov, Jul. 8, 2019. |
Number | Date | Country | |
---|---|---|---|
20220276767 A1 | Sep 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17014171 | Sep 2020 | US |
Child | 17746582 | US |