Managing configurations of distributed devices

Information

  • Patent Grant
  • 9491049
  • Patent Number
    9,491,049
  • Date Filed
    Friday, July 18, 2014
    10 years ago
  • Date Issued
    Tuesday, November 8, 2016
    8 years ago
Abstract
A method manages configurations of devices in a system that communicates information between a device and an enterprise. The method includes building a defined configuration for a device type. The defined configuration includes a set of value requirements. An actual configuration having values associated with the device is compared to the defined configurations. The actual configuration and defined configuration are stored in a database of the enterprise. The method also includes determining, in the enterprise, if the values of actual configuration match the corresponding value requirements of the defined configurations. The method runs business logic associated with the device based on a result from the step of determining if the values of the actual configuration match the corresponding values of the defined configurations. The matched configurations are stored for subsequent use.
Description
BACKGROUND

1. Field of the Art


The present disclosure generally relates to configuration management databases and, more particularly, to systems and methods for managing configurations of distributed devices.


2. Background and Relevant Art


Over time, device manufactures produce many configurations of a given product line as features are added and defects are addressed. Manufactures need to know the configuration of the devices to be able to support the components and provide the proper “upgrade” path. The configurations of these devices are changed in the field as customers, users, or technicians update hardware and software components. The ability to track the configuration of the devices becomes more complex when the device has been in the field for a long period of time. For example, the life of a CT scanner or X-Ray machine can typically be about 10 to 20 years.


Some devices are regulated by the FDA. When updating hardware or software on the regulated devices, the FDA mandates tracking the configuration of certain devices and recording software updates. Records are required, for example, on medical devices that track these updates. Various methods have been used to track updates, ranging from an entire paper system to homegrown systems implemented to track devices in an enterprise resource planning (ERP) system as part of software bill of materials (BOM). Many manufacturers do not trust the data collected in these systems since the data accuracy relies on the service technician to properly update the device records, which may or may not occur. Sometimes service technicians update devices that were not scheduled to be updated, which further compounds the problems. Another complicating factor is that some end-customers have the ability to apply updates to the device (e g, when CDs are shipped by the manufacturer), which leaves the manufacturer to rely on the customer or service technician to report on the status of each update. And on some devices, all control is lost by the manufacturer when the end-customers have the ability to update, add, and/or remove software.


Databases have been implemented to store relevant information about the devices in an organization's information technology (IT) services and to store the relationships between those components. This type of database is typically referred to as a configuration management database (CMDB). A CMDB generally organizes data collected from the components into a way that can be viewed and examined from various perspectives. The components of the information system in this context are referred to as configuration items (CI). The CI can include software, hardware, documentation, personnel, and any other conceivable IT component or combination of components.


U.S. Patent Application Publication No. 2005/0193386 to MaCaleb et al. discloses a method for remotely updating software in computer systems. In the method, a client computer sent information about a software application to a server. The server compared the information to the most-updated upgrade package for the software application, which is stored in a part database. When the most up-to-date upgrade package was not installed, the upgrade was automatically sent to the client system. A client database stored configuration files for the client systems, which included a list of the installed software applications and their versions. MaCaleb discloses a “smart” creation of an update based on the “latest version” of components in the parts database. This system does not maintain information about the configuration of the device, but uses it to determine the delta from the latest. This system also does not verify that the update will match the configuration of the hardware and software associated with the device.


In U.S. Patent Application Publication No. 2005/0262076 to Voskuil, a computer system is disclosed that is configured for policy-based management of software updates. The system maintained group-policy objects, with which groups of computers are associated. The system obtained identities of software updates from a source and filter criteria for each update to determine whether the update should be applied to a particular computer. The system assigned newly available updates to selected group-policy objects and added the obtained filter criteria to each group-policy object. The system performed necessary update installations for each group-policy object by determining whether the computer satisfied the filter criteria for the update for each combination of a computer belonging to a group associated with that policy object and an update assigned to that policy object. If so, the system applied the update to that computer. Although this system checks whether the update should be applied to a particular computer by applying filter criteria, it does not verify the configuration criteria. This system uses group policies to control software updates.


The subject matter claimed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is only provided to illustrate one exemplary technology area where some embodiments described herein may be practiced.


BRIEF SUMMARY OF THE INVENTION

A method manages configurations of devices in a system that communicates information between a device and an enterprise. The method includes building defined configurations for a device type. The defined configuration includes a set of value requirements. An actual configuration of the device is compared to the defined configuration. The actual configuration and defined configuration are stored in a database of the enterprise. The actual configuration has values associated with the device. The method also includes determining, in the enterprise, if the values of actual configuration match the corresponding values of the defined configuration. The method runs business logic associated with the device based on a result from the step of determining if the values of the actual configuration match the corresponding values of the defined configurations. The matched configurations are stored for subsequent evaluation.


In another aspect of the invention, a system manages configurations of a device associated with a monitor agent. The system includes a server that communicates with the monitor agent. The monitor agent is configured to collect information from the device to obtain an actual configuration of the device. A database is configured to store the actual configuration of the device and a defined configuration of a device type. The device type is associated with a set of devices. The defined configuration is built for the device type and stored in the database. The defined configuration includes a set of value requirements. The actual configuration has values associated with the device. An enterprise is configured to compare the actual configuration to the defined configuration and to determine whether the values of the actual configuration match the corresponding values of the defined configuration. The enterprise is configured to store the matching defined configuration and running business logic associated with the device based on a result from the comparison between the values of the actual configuration and the corresponding values of the defined configuration.


This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.


Additional features and advantages will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the teachings herein. Features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. Features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.





BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and other advantages and features can be obtained, a more particular description of the subject matter briefly described above will be rendered by reference to specific embodiments which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments and are not therefore to be considered to be limiting in scope, embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:



FIG. 1 illustrates a system managing configurations of distributed devices in accordance with the various embodiments of the present invention;



FIG. 2 is a flowchart illustrating a method of managing configurations of distributed devices in accordance an exemplary embodiment of the invention; and



FIG. 3 is a flowchart illustrating a method of managing configurations of distributed devices in accordance with another exemplary embodiment of the invention.





DETAILED DESCRIPTION OF THE INVENTION

The present system and method includes various embodiments for managing configurations of distributed devices. A configuration management database (CMDB) is configured to manage configuration items (CI) of devices. The CMDB tracks and validates the software and hardware used by the device. The system also tracks the device configuration, including the state of that configuration and can take an appropriate business action. A business action, for instance, can include sending a technician out to a site to update the hardware, such as memory, or complete another action, such as sending a software update or collecting data.


In one exemplary embodiment of the system, the CMDB updates the devices with controlled installations over its lifetime to help assure that the device will operate safely after an update installation. Before an update is sent to the device, the CMDB verifies that it is compatible with a defined configuration of the device, which is stored in the CMDB. If the device is not compatible, a business action can occur before the update is sent to the device since the configuration is known. The system can also allow remote updates to the software and/or the device configuration. The “latest” configuration of the device may not necessarily be the only valid configuration and may require changes to the configuration to match a given update. The business logic can take place soon after the comparison or at a later time. The devices, for example, can be regrouped for later action. The comparison matches are stored in the enterprise so that it can take future action with the devices even if the action takes place days or weeks later.


An IT department for a large corporation may have many thousands of devices to manage on a corporate network, such as server computers, desktop computers, laptops, firewalls, routers, switches, and the like IT departments, especially for large corporations, may have problems trying to track the configurations of each device. Device configurations need to be managed efficiently to be able to handle numerous devices. While the device management problem is similar to the IT problem, the complexity of managing devices beyond the corporate network or a network not owned by the service provider and the expected lifetime of the device makes this problem more complex.


The present invention includes many advantages. Device manufactures will be able to automatically track and manage device configurations to safely update the devices in the field. In addition, the system will streamline device support and service to benefit businesses, for instance, by reducing costs and improving customer satisfaction. The process is streamlined by driving entitlement validation and expediting problem diagnosis. Furthermore, the system reduces the time it takes to launch a product in the marketplace by improving the time and ability to meet regulatory requirements.


In one application of the invention, for example, the system can be used to track medical devices that are regulated by the FDA. Regulated devices often require the manufacturer to record device configurations in the event that an important or even dangerous defect is found. The FDA regulates tracking and updating methods for medical devices to insure quick handling of defects that could cause potential safety issues. It is important to know the current device configuration before software or configuration updates are delivered. The present invention provides a way for the user that installs the update to know that the update is compliant with the device and that the device will operate safely after the installation.


A common methodology for dealing with the configuration management problem in the IT space is called IT Infrastructure Library (ITIL). The present invention builds on the ITIL Configuration Management to deal with the issues raised by device manufacturers.


The system uses Configuration Management. The process identifies and defines CI in a system, records and reports the status of the CI and Requests for Change, and verifies the completeness and correctness of the CI. The CI is a component of an infrastructure—or an item, such as a Request for Change, associated with an infrastructure—which is or will be under the control of Configuration Management. The CI may vary widely in complexity, size, and type, from an entire system, including hardware, software, and documentation, to a single module or minor hardware component. The CMDB contains relevant details of each CI and details of the relationships between the CI.


As shown in FIG. 1, the system can include an enterprise system 100 that communicates with at least one device 200 through a local or global computer network 300, such as the Internet, World Wide Web, or other similar network. The enterprise system 100 includes a server 110 that is connected to a database 120, such as a CMDB. The device 200 communicates with the enterprise 100 at predefined intervals. The device, for instance, can include a power meter, MRI machine, printing press, X-Ray machine, or other devices that include, or can be adapted to include, a monitor agent. These devices may vary in complexity and may have a set of subsystems associated with them.


The device 200 contains or is connected through a serial port, USB, network, or the like to a monitor agent 220. The monitor agent 220 is configured to monitor the device status and verify that the device is properly functioning and maintained. The monitor agent 220 communicates device information to the enterprise 100 as requested by enterprise users or when monitored conditions are met, as defined by rules. The rules can include monitoring rules, which are set up by the user in the monitor agent 220 on the device side, or dynamic group rules, which are set up by the enterprise user to monitor an active status of the devices that belong to the defined group. The status includes operational status, data readings, or configuration of the device.


Other devices 400 can be connected to the enterprise system 100 through the network 300, such as the global computer network or other local network. The devices 400 are represented as systems 2 through n to mean any defined amount of devices, which can meet, but not exceed, the capacity of the enterprise system 100. As the users' needs grow, the enterprise system 100 can be modified to match the users' needs, for example, by adding more bandwidth, servers, and/or database capacity. Each of the other devices 400 includes similar components as those defined in the device 200.


The monitor agent 220 collects information from the sources of device data, such as a database, a registry, the file system, or data collection protocols. The type of data can include various classes of information including: monitoring data, usage data, and configuration data. This data, for example, can include the operational status, operational data usage information, location information, environmental information, SW/HW version information (i.e. “configuration” information), or any data available on the device that can be communicated to the enterprise 100. To collect the data, the monitor agent 220 uses plug-in modules to collect device information using either standard or device-proprietary methods. The monitor agent 220 sends data to the enterprise using Web services. The software is not limited to a specific protocol such as simple mail transfer protocol (SMTP) or hypertext transfer protocol (HTTP) but may be adapted to any protocol known by one skilled in the art for data interchange at the hardware device level or at application program level.


The monitor agent 220 can send data sets of information to an enterprise server at the time of a triggering event, and just before and after the event, to capture the condition of the device to provide a baseline. The data can also be collected at a specific time, such as every evening or at the close of business. Each time the device is updated or software revisions are installed, the data also can be collected. If the user needs information outside the prescribed times, a user request can be sent at any time. For instance, if a user wants to verify the configuration of the device and does not want to wait for a prescribed time, a request can be sent immediately.


The communication between the enterprise 100 and the monitor agent 220 can be rejected due to firewalls, NAT, etc. that are implemented to block unwanted communication. The system can use a “polling server” model to enhance the ability to communication between the device and the enterprise if needed. The “polling server” model is discussed, for example, in U.S. Patent Publication No. 2003/0118353 entitled Method and Apparatus for Managing Intelligent Assets in a Distributed Environment, which is hereby incorporated by reference in its entirety.


When collecting data from a device, the CMDB collects a configuration baseline. The baseline is a configuration of a product or system established at a specific point in time, which captures both the structure and details of that product or system, and enables that product or system to be rebuilt at a later date. The baseline records a snapshot or a position of the data. Although the position may be updated later, the baseline remains unchanged and available as a reference of the original state and as a comparison against the current position of the device. The CMDB collects and stores the actual configuration of a device.


The CMDB also stores one or more defined configurations for each device type. The defined configuration is a set of elements that describe the value requirements. The element can include an attribute and a value. The value may be a literal value, set of literal values, or an expression. The expression may contain numerical and Boolean operators and the like. Defined configurations can be nested into a hierarchy to represent inherently complex devices. In this case, an element references the set of legitimate defined configurations. The collection of elements, including expressions and nested defined configurations, are identified as the value requirements of the defined configuration. The defined configurations allow the CMDB evaluate to stored device information that can be used to identify a device configuration, which may in turn be used for operations such as verifying whether a software update is compatible with the device.


Enterprise users create defined configurations based on the devices that the manufacturer is building and shipping. The defined configuration is comparable to a “specification” for the device. For example, Company X creates a first version of device Y. During the creation of the product, enterprise users create many constructs describing device Y, including a device type, defined configurations, and the like, which enable many aspects of remote management. Device Y ships and the enterprise receives actual configuration updates for the purchased devices. The enterprise processes those updates (e.g., matches defined configurations to the device). Some time later Company X works on new versions of device Y and creates new defined configurations in the process. Once the new device ships, the cycle continues.


A further component of the defined configuration is the state. The value of the state of the device can include, for example, valid, recommended, obsolete, “known bad” and other states known by one skilled in the art. The defined configuration has a state or status that applies to all devices whose actual configuration matches the defined configuration. The configuration state of the device is on the defined configuration and “inherited” by devices whose actual configuration matches it. If an actual configuration does not match any of the defined configurations, then it is generically said to be “invalid.” The state of the device impacts actions taken when a device's actual configuration changes or when the defined configuration status changes. For example, if a device's actual configuration changes from obsolete to recommended, no action is required. But if a defined configuration status changes from valid to known bad, immediate action may be required, including software updates, site visits, or other prescribed actions. If a defined configuration status changes from valid to obsolete, a less aggressive course of action could result, such as a low priority work order to “upgrade the device on the next site visit.”


An actual configuration of the device is also stored in the CMDB. The actual configuration is collected from each device and can, for example, include hardware versions, software versions, environmental conditions, operational status, operational parameters, and other configuration information that can be collected from the device. The actual configurations, like defined configurations, can be simple or complex, for example, including values nested in a hierarchy.


The defined configuration is associated with a device type, such as a laptop, and the actual configuration is associated a particular device. The actual configuration, which is collected from the device, can then be compared to the defined configuration for the device type. For example, three devices are compared to a defined configuration of a laptop device type below. The defined type in this example is for laptops where the defined configuration is shown below in Table A:









TABLE A





devicetype = LapTops



















Configuration
IBM Laptops-T23




State
VALID



Status
LOCKED









Mandatory







Manufacturer
IBM
Y



RAM
>1 GB
Y



OS
Windows XP-Pro
Y



HardDisk

Y



Seagate-M1



Mfg
Seagate



Model
29|30|31



FWVersion
1.2.29



WD-32



Mfg
Western Digital



Model
24



Software 1

N



Office 2003



Word
2003



Excel
2003



Software 2

Y



QuestraSA



Version
5.1.236










The defined configuration includes various components that can be check against the actual configurations of the devices. The defined configuration includes the following values: the configuration is IBM Laptops-T23; the state is valid; and the status is locked. Other configuration values and types are defined. For example, a configuration type is the manufacturer and the value associated with it is IBM. The defined configuration can also include configuration sets, such as software 1 and software 2 shown above. A configuration set can include values that are grouped together based on various subsystems. The other configuration types are defined accordingly as shown in Table A.


Device actual configurations are compared to defined configurations to determine which, if any, defined configurations match the device. The meaning of the term match, as defined within this application, means that a value in the actual configuration of the device complies with an expression for an element in the defined configuration, which comparison includes, for example, operators such as less than (<), less than or equal to (<=), equal to (=), greater than or equal to (>=), and greater than (>), or other Boolean operators. The elements of a defined configuration can be tagged as elective or mandatory values. If the configuration element is mandatory, then the values of the actual configuration must match the respective defined value during the comparison process. If the configuration element is not mandatory, then the component is not required to be present in the system. But if the elective element is present, the configurations must match. When the actual configuration does not match any defined configuration, then the enterprise can be programmed to find the closest match for the device, and/or to run business logic to notify the technician or user, or to perform some other action.


Continuing with the example illustrated above, device 1 can include the following actual configuration shown below in Table B:









TABLE B





Device 1 - Actual Configuration


















Manufacturer
IBM



RAM
2 GB



OS
Windows XP-Pro











Hard
Mfg
Seagate



Disk
Model
30




FWVersion
1.2.29











Software1
Word
2003




Excel
2003



Software2
Version
5.1.236










The actual configuration of device 1 matches the defined configuration in Table A. The hardware and software comply with the requirements in the defined configuration.


A second device in the example includes the actual configuration shown in Table C:









TABLE C





Device 2 - Actual Configuration


















Manufacturer
IBM



RAM
2 GB



OS
Windows XP-Pro











Hard
Mfg
Seagate



Disk
Model
30




FWVersion
1.2.29











Software1
Word
2000




Excel
2000



Software2
Version
5.1.236










The software in the second device does not match all the fields in the defined configuration because the Word and Excel software applications are 2000, not 2003 as defined by the configuration in Table A. Although Word and Excel software are not mandatory, if the device includes the software, it must match the defined configuration. The mismatch may prompt the system to execute business logic to notify users, to fix, or to schedule an event to fix the unmatched values.


In a third device of the example, the actual configuration is shown in Table D below:









TABLE D





Device 3 - Actual Configuration


















Manufacturer
IBM



RAM
512 MB



OS
Windows XP-Pro











Hard
Mfg
Maxtor



Disk
Model
30




FWVersion
1.2.29











Software2
Version
5.1.236










There are two values that do not match the defined configuration in the third device—the size of the memory and the manufacturer. Since the values do not match and these values are mandatory, additional action must be taken to correct the mismatch. For example, new hardware can be installed to update the device to match the defined configuration.


The manufacturers can define and store configurations of devices that will ship to the field. Over the lifetime of a device, the device manufacturers can also assign or change the state of the device to indicate whether the device or its subsystems have values that are valid, recommended, obsolete, known bad, or the like. The defined configurations may be simple or complex. A complex configuration can include nested configurations or Boolean combinations of attributes and values as discussed above.


The actual configurations of each device are compared with the defined configurations to determine matches. If a device does not conform to the defined configuration or if the actual device configuration changes, business logic can run to provide notification, modify the device type or group, or schedule an action. The business logic can include, for example, user notification, external system notification (e.g. to schedule a site visit in a CRM system), schedule software updates, or run another user defined action.


A method of managing configurations is illustrated in FIG. 2 in accordance with the various embodiments of the invention. The method starts in step S20 by building a defined configuration for a device type to validate the devices in the field. Step S20 can occur immediately before or much earlier than any subsequent step, for example, days, weeks, months, or even years later. A technician can build the defined configuration based on the hardware and software specification for the device. Various elements can be added to the defined configuration to match the definition of the device with the specification. If a certain component is required, the element can be tagged as mandatory. The values in the actual configuration of the device must comply with the mandatory values of the defined configuration.


Once the defined configuration is built for the device type, the system may verify each device in the device type. Generally, devices configurations are matched when the actual configuration is sent from the device to the enterprise to reduce resource utilization, such as server load. A user can also request the system to match all devices based on a previously stored configuration. The events that cause the actual configuration to be sent from the device to the enterprise include: agent startup, installation of new software through the system, and manual requests from a user of the agent user interface. This event can trigger the configuration comparison and matching. In step S21, the actual configuration of the device is compared to the defined configuration. When the actual configuration does not match the defined configuration in step S22, the system can run business logic for the device in step S23 to notify users about the mismatch or to schedule an action to fix the noncompliant software or hardware in the device. The method then advances to step S25 to check if the validation process is complete for all the devices in the device type group.


When the actual configuration matches the defined configuration in step S22, the system can run business logic for the device in step S24 such as sending an update to the device, associating a state with the device, or grouping the device with other devices. The method then advances to step S25. When all the devices have been compared and matched, the process ends for the given device type.


If the validation process is not complete for all devices in the device type, the process continues to step S26 where it advances to the next device. The method then repeats the process in step S21 to compare the actual configuration of the next device in the device type against the defined configuration. The process continues until the analysis is complete for the device type or group of devices that are associated with the device type.


Another embodiment of the invention is illustrated in FIG. 3. A method of managing configurations starts in step S30 by building a defined configuration for a device type to validate the devices in the field. The defined configuration can be built based on the device hardware and software specification. The defined configuration includes various elements that are needed to match the definition of the device with the requirements. Some elements can be tagged as mandatory if a component is required. If so, the values in the actual configuration of the device must meet or exceed the mandatory values of the defined configuration.


In step S31, the actual configuration of the device is compared against the value requirements in the defined configuration. The system then determines whether the actual configuration matches the defined configuration in step S32. If the values match, then in step S33 the system runs business logic associated with the device, such as sending a software update or configuration updates. If not, the system can run another set of business logic for the device as shown in step S34 to notify users about the mismatch or to schedule an action to fix the noncompliant software or hardware in the device. After step S33 or step S34 is complete, the process ends for the device and the data from the determined matches are stored in the database.


The system can be configured to send the software update to the device after it has been verified. In another embodiment, the system can be configured to send the update to a group of devices that have been verified at one time. After the device is verified, it can be placed in a group that corresponds to the updated devices. The groups can be based on a group type or set of group types. Device grouping is discussed in more detail below.


Optionally, the devices can be grouped together to simplify actions across multiple devices. The devices can be grouped based on certain criteria, such as geography, software application, version, extension, device type, model number, installation, division, or other device parameter. For example, the verified devices can be grouped together and the nonconforming devices can be placed in a separate group. A device can be added or removed from a given group dynamically without requiring input from any user. The movement in and out of groups can occur when an event triggers the group evaluation, such as (a) after device registration or profile updates, (b) when receiving new device operational, status, environmental data, (c) when receiving new configuration information (i.e. new versions), or (d) when alarms and/or alerts are created for a device. These groups are created automatically and may define where notifications are sent and associate other business logic to devices, such as data collection schedules, software/patch distribution schedules, and the like. The groups are arranged or created such that an administrator is no longer required review each device to verify present device conditions.


The system can collect the actual configuration of a device in the same manner as described above with respect to grouping. The data, for example, can be collected periodically, ad hoc, and on events that are likely to change the configuration, such as software and hardware upgrades. When the device information is received, business logic can be executed to send notifications or perform another action.


The devices can be associated with defined groups in the system to help organize the devices so users can locate the device easily. In addition, “bulk” operations can be performed on multiple devices including, for example, software updates or data collection, such as data readings, configuration information, file transfers, and the like. The groups can also control escalation of alert notifications. Furthermore, they can be used to control access to devices, for example, which users can view or change information regarding certain devices.


A group hierarchy also can be created if desired. The group hierarchy can include dynamically and statically defined groups, where dynamic group hierarchies start at a statically defined root group. A dynamically defined group is a group to which devices are assigned automatically. To set up a dynamic group, the user defines it by setting up criteria against which the devices are evaluated to determine their membership in the group. The statically defined group is a group whose device membership has been manually defined by an administrator. The administrator creates the group and associates devices with it. When a new device is added to the system, the administrator manually associates it with a static group. The dynamic hierarchical groups are created based on analysis of dynamic group rules and information collected directly from the device.


A dynamic group rule can be created to specify how devices will be automatically organized into groups when those devices are manually created or provide information to the enterprise. Devices can be automatically associated with groups based on a set of rules or some aspect of their profiles. As devices are added to the system or provide updated information to the enterprise, they are automatically associated with the applicable dynamic groups. A dynamic group rule causes groups to be created. The first time a device is found to match the membership criteria for a dynamic group that group is created. The static and dynamic groups have a parent group. Those at the top level have a special built-in logical parent are called a root. Groups whose parent is the root are called root groups.


Automatic groupings can be created based on device configuration data. For example, the group can be defined from the software, firmware, hardware revision information, as well as other actual configuration information. The groups are matched with defined configurations on the enterprise system 100.


The groups can also be automated based on extended and configurable registration information. The information, for example, can include device location, such as country, state, city, building, etc., or other customer information, like company name, group, responsible party, and other identifying information.


Business rules can also be applied at the device or the enterprise. The device can be grouped according to the business rule. For example, devices can be grouped based on a dynamic device property exceeding a threshold, such as a temperature, duration, pressure, or the like. If the collected information of the device meets a monitoring rule, then information can be sent to the enterprise where the system evaluates the collected information for dynamic group evaluation. The addition and removal of devices to and/or from groups manages the group-based business logic. The group-based business logic is disassociated from a group when the device is automatically disassociated from the group and group based business logic is associated to a new group when the device is automatically associated with the new group. For example, when a group has been updated, a new group can be created with the updated devices.


Automatic grouping also can be based on a device condition, such as an alert or an alarm. Alarms can be created by the monitor agent or by the enterprise system rules. When an alarm or alert is created, it triggers dynamic group rule evaluation. Alarms and alerts are defined by rules or business logic, which will be discussed below. The devices that are in a specified alert state, that is, meet a condition defined by a rule, can all be grouped together.


Business logic can also be applied to groups. For instance, if the actual configuration of a device does not match the defined configuration, then business logic can be applied. The business logic is applied to or removed from devices that enter or leave a dynamic group, respectively.


A dynamic group rule can create a hierarchy of groups, not just one flat group. A device can belong to multiple groups and subgroups in the hierarchy. The user selects which static groups to associate with the device or creates a rule specifying the device data that should be used to match the current device conditions. During the selection process, for instance, the user may choose to group the device by location, device type, and software application. The device location may be a high level group, which includes many other device types. Thus, the device type group becomes a subgroup of the device location group. Likewise, different software application groups may be found in the device type group making it a subgroup of the device type group. This relationship creates a hierarchy of groups and subgroups—the subgroups being defined within another group. Some groups may be entirely defined within a group while others may be partially defined within the group. The hierarchical groups are defined accordingly for each device.


The business logic can send notifications to users about the current or updated status of the device. The notifications can be sent to business systems or users, such as field service technicians, device operators, etc assigned to groups that are associated with a specific device in an alarm or alert condition. In one embodiment of the present invention, the notifications are defined as alarms and alerts. The alarm is a notification that is recorded and processed when a condition exists. For example, an alarm can be triggered when the actual configuration of a device does not match the defined configuration. The alarm is tracked and stored in a database. An alert is an action to be taken when the alarm condition exists. The alert, for example, can be a user notification sent by e-mail or an event notification to another business system, such as a CRM system. One alarm can generate multiple alerts, for instance, one alarm can cause an e-mail message to be sent to users and a separate notification to other business systems.


In an alternative embodiment, the notifications can escalate. After a notification has been sent to a group, if it has not been acknowledged within a defined time limit, then the notification is escalated to the next higher-level group in the hierarchy. And if the notification is not acknowledged on the higher level, then it is escalated to the next group and so forth. If the notification is acknowledged within the defined time limit, then it will not escalate to the next group. The time limit can be any defined amount of time. Typically, the time limit is defined in hours. In one example, the time limit may be set between three and five hours from the notification. The selection of a time limit is not limited to any particular range since it is based on user input.


The enterprise system 100 can include the various embodiments discussed above. The information collected from the devices is managed through the enterprise system 100 to reduce the administrative time it takes to monitor and update each device individually. The actual and defined configurations of the devices are stored in the CMDB. The values in the actual configuration are checked against the value requirements in the defined configuration to determine the configuration of the device. Business logic can be run based on the results of the comparison, for example, verifying that the software update will be compatible with the existing device and subsystems before the update is sent to the device. If the values are not compatible, business logic can be executed and a technician can update the device to make it compliant with the defined configuration. The present invention provides controlled updates to help assure that the devices will function properly after the installation is complete.


The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims
  • 1. A method, performed at an enterprise, comprising: building a defined configuration for a device type;comparing an actual configuration of a device having the device type to the defined configuration, the actual configuration and defined configuration being stored in a database of the enterprise;associating, based on the comparing, the device with a group that corresponds to the defined configuration, the device being associated with the group automatically because the device meets at least one criterion of the group;identifying an event that triggers a group evaluation to determine, absent user input, whether the device is to be moved out of the group, data representing the event being received from a monitoring agent when the device is updated;performing the group evaluation; andbased on the group evaluation, moving the device out of the group or keeping the device in the group.
  • 2. The method of claim 1, further comprising: collecting information from a device information source to obtain the actual configuration of the device; andassociating business logic with the device based on the device being associated with the group, the business logic comprising functionality to perform one or more tasks relating to the device.
  • 3. The method of claim 1, wherein building the defined configuration comprises setting at least one mandatory value requirement in the defined configuration, the at least one mandatory value requirement being required in each of the actual configuration and the defined configuration to achieve a match upon which the associating is based.
  • 4. The method of claim 3, wherein the defined configuration comprises a mandatory value requirement; wherein comparing comprises determining if the actual configuration of the device at least partly matches the defined configuration; andwherein determining if the actual configuration of the device at least partly matches the defined configuration comprises identifying a match of at least part of the actual configuration to the mandatory value requirement.
  • 5. The method of claim 3, wherein the defined configuration comprises a non-mandatory value requirement; wherein comparing comprises determining if the actual configuration of the device at least partly matches the defined configuration; andwherein determining if the actual configuration of the device at least partly matches the defined configuration comprises identifying a match of at least part of the actual configuration to at least part of the defined configuration that does not include the non-mandatory value requirement.
  • 6. The method of claim 1, further comprising automatically associating the device with another group following moving the device out of the group, the other group being associated with devices having a configuration that is different from the defined configuration.
  • 7. The method of claim 1, wherein the group is a first group, and the method further comprises: sending an alert to a second group associated with the device;waiting an amount of time to receive an acknowledgement; andupon failing to receive an acknowledgement, sending the alert to a third group, the third group being part of a group hierarchy that includes the second group, the third group being at a higher level in the group hierarchy than the second group.
  • 8. The method of claim 1, wherein the defined configuration comprises a state, the state having a value for the device indicative of an action to be taken, the device inheriting the state of the defined configuration when the actual configuration matches the defined configuration.
  • 9. Non-transitory machine-readable storage storing instructions that are executable at an enterprise to perform operations comprising: building a defined configuration for a device type;comparing an actual configuration of a device having the device type to the defined configuration, the actual configuration and defined configuration being stored in a database of the enterprise;associating, based on the comparing, the device with a group that corresponds to the defined configuration, the device being associated with the group automatically because the device meets at least one criterion of the group;identifying an event that triggers a group evaluation to determine, absent user input, whether the device is to be moved out of the group, data representing the event being received from a monitoring agent when the device is updated;performing the group evaluation; andbased on the group evaluation, moving the device out of the group or keeping the device in the group.
  • 10. The non-transitory machine-readable storage of claim 9, wherein the operations comprise: collecting information from a device information source to obtain the actual configuration of the device; andassociating business logic with the device based on the device being associated with the group, the business logic comprising functionality to perform one or more tasks relating to the device.
  • 11. The non-transitory machine-readable storage of claim 9, wherein building the defined configuration comprises setting at least one mandatory value requirement in the defined configuration, the at least one mandatory value requirement being required in each of the actual configuration and the defined configuration to achieve a match upon which the associating is based.
  • 12. The non-transitory machine-readable storage of claim 11, wherein the defined configuration comprises a mandatory value requirement; wherein comparing comprises determining if the actual configuration of the device at least partly matches the defined configuration; andwherein determining if the actual configuration of the device at least partly matches the defined configuration comprises identifying a match of at least part of the actual configuration to the mandatory value requirement.
  • 13. The non-transitory machine-readable storage of claim 11, wherein the defined configuration comprises a non-mandatory value requirement; wherein comparing comprises determining if the actual configuration of the device at least partly matches the defined configuration; andwherein determining if the actual configuration of the device at least partly matches the defined configuration comprises identifying a match of at least part of the actual configuration to at least part of the defined configuration that does not include the non-mandatory value requirement.
  • 14. The non-transitory machine-readable storage of claim 9, wherein the operations comprise automatically associating the device with another group following moving the device out of the group, the other group being associated with devices having a configuration that is different from the defined configuration.
  • 15. The non-transitory machine-readable storage of claim 9, wherein the group is a first group, and wherein the operations comprise: sending an alert to a second group associated with the device;waiting an amount of time to receive an acknowledgement; andupon failing to receive an acknowledgement, sending the alert to a third group, the third group being part of a group hierarchy that includes the second group, the third group being at a higher level in the group hierarchy than the second group.
  • 16. The non-transitory machine-readable storage of claim 9, wherein the defined configuration comprises a state, the state having a value for the device indicative of an action to be taken, the device inheriting the state of the defined configuration when the actual configuration matches the defined configuration.
  • 17. A system comprising: memory storing instructions that are executable; andone or more processing devices to execute the instructions to perform operations comprising: building a defined configuration for a device type;comparing an actual configuration of a device having the device type to the defined configuration, the actual configuration and defined configuration being stored in a database of the enterprise;associating, based on the comparing, the device with a group that corresponds to the defined configuration, the device being associated with the group automatically because the device meets at least one criterion of the group;identifying an event that triggers a group evaluation to determine, absent user input, whether the device is to be moved out of the group, data representing the event being received from a monitoring agent when the device is updated;performing the group evaluation; andbased on the group evaluation, moving the device out of the group or keeping the device in the group.
  • 18. The system of claim 17, wherein the operations comprise: collecting information from a device information source to obtain the actual configuration of the device; andassociating business logic with the device based on the device being associated with the group, the business logic comprising functionality to perform one or more tasks relating to the device.
  • 19. The system of claim 17, wherein the defined configuration comprises a mandatory value requirement; wherein comparing comprises determining if the actual configuration of the device at least partly matches the defined configuration; andwherein determining if the actual configuration of the device at least partly matches the defined configuration comprises identifying a match of at least part of the actual configuration to the mandatory value requirement.
  • 20. The system of claim 17, wherein the defined configuration comprises a non-mandatory value requirement; wherein comparing comprises determining if the actual configuration of the device at least partly matches the defined configuration; andwherein determining if the actual configuration of the device at least partly matches the defined configuration comprises identifying a match of at least part of the actual configuration to at least part of the defined configuration that does not include the non-mandatory value requirement.
  • 21. The system of claim 17, wherein the group is a first group, and wherein the operations comprise: sending an alert to a second group associated with the device;waiting an amount of time to receive an acknowledgement; andupon failing to receive an acknowledgement, sending the alert to a third group, the third group being part of a group hierarchy that includes the second group, the third group being at a higher level in the group hierarchy than the second group.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation (and claims the benefit of priority under 35 USC 120) of U.S. application Ser. No. 13/252,357 filed Oct. 4, 2011 (to be issued U.S. Pat. No. 8,788,632 on Jul. 22, 2014) which is a continuation (and claims the benefit of priority under 35 USC 120) of U.S. application Ser. No. 11/616,136, filed Dec. 26, 2006 (issued at U.S. Pat. No. 8,065,397 on Nov. 22, 2011). The disclosures of the prior applications (13/252,357 and 11/616,136) are considered part of (and are incorporated by reference in) the disclosure of this application as if set forth herein in full.

US Referenced Citations (784)
Number Name Date Kind
4086434 Bocchi Apr 1978 A
4412292 Sedam et al. Oct 1983 A
4497037 Kato et al. Jan 1985 A
4583834 Seko et al. Apr 1986 A
4853946 Elliott et al. Aug 1989 A
4962368 Dobrzanski et al. Oct 1990 A
4964065 Hicks et al. Oct 1990 A
4965946 Hegedus et al. Oct 1990 A
4996703 Gray Feb 1991 A
5038319 Carter et al. Aug 1991 A
5057866 Hill, Jr. et al. Oct 1991 A
5061837 Gilbert et al. Oct 1991 A
5062147 Pickett Oct 1991 A
5077582 Kravette et al. Dec 1991 A
5084875 Weinberger et al. Jan 1992 A
5129080 Smith Jul 1992 A
5138377 Smith et al. Aug 1992 A
5163151 Bronikowski et al. Nov 1992 A
5184179 Tarr et al. Feb 1993 A
5204699 Birnbaum et al. Apr 1993 A
5212645 Wildes et al. May 1993 A
5214772 Weinberger et al. May 1993 A
5216461 Maekawa et al. Jun 1993 A
5220380 Hirata et al. Jun 1993 A
5224157 Yamada et al. Jun 1993 A
5243382 Takano et al. Sep 1993 A
5257069 Hirata et al. Oct 1993 A
5261061 Ju Nov 1993 A
5270775 Suzuki Dec 1993 A
5282127 Mii Jan 1994 A
5291244 Kajiwara et al. Mar 1994 A
5293196 Kaneko et al. Mar 1994 A
5297034 Weinstein Mar 1994 A
5297256 Wolstenholme et al. Mar 1994 A
5300980 Maekawa et al. Apr 1994 A
5303005 Takano et al. Apr 1994 A
5305055 Ebner et al. Apr 1994 A
5305199 LoBiondo et al. Apr 1994 A
5307263 Brown Apr 1994 A
5315580 Phaal May 1994 A
5325156 Ulinski Jun 1994 A
5333286 Weinberger et al. Jul 1994 A
5335048 Takano et al. Aug 1994 A
5339168 Evanitsky et al. Aug 1994 A
5342037 Martin Aug 1994 A
5347346 Shimizu et al. Sep 1994 A
5359391 Kuroyanagi et al. Oct 1994 A
5361265 Weinberger et al. Nov 1994 A
5365310 Jenkins et al. Nov 1994 A
5367667 Wahlquist et al. Nov 1994 A
5369469 Leo et al. Nov 1994 A
5369471 Yamada Nov 1994 A
5369472 Raj et al. Nov 1994 A
5373349 Ito Dec 1994 A
5384622 Hirata et al. Jan 1995 A
5386271 Maekawa et al. Jan 1995 A
5392095 Siegel Feb 1995 A
5398257 Groenteman Mar 1995 A
5404199 Hirata et al. Apr 1995 A
5412779 Motoyama May 1995 A
5414494 Aikens et al. May 1995 A
5420667 Kaneko et al. May 1995 A
5420978 Tozawa et al. May 1995 A
5424808 Maekawa et al. Jun 1995 A
5424844 Koyanagi et al. Jun 1995 A
5428551 Trainor et al. Jun 1995 A
5430709 Galloway Jul 1995 A
5434650 Nakahara et al. Jul 1995 A
5442541 Hube et al. Aug 1995 A
5444517 Nagashima Aug 1995 A
5444851 Woest Aug 1995 A
5446522 Tahara et al. Aug 1995 A
5452057 Imaizumi et al. Sep 1995 A
5459552 Ohira Oct 1995 A
5463775 DeWitt et al. Oct 1995 A
5469353 Pinsky et al. Nov 1995 A
5485142 Stute et al. Jan 1996 A
5488454 Fukada et al. Jan 1996 A
5491535 Hirata et al. Feb 1996 A
5493364 Kuroyanagi et al. Feb 1996 A
5517491 Nanni et al. May 1996 A
5528691 Rosauer et al. Jun 1996 A
5530899 MacDonald Jun 1996 A
5543892 Hirata et al. Aug 1996 A
5548376 Kikuno Aug 1996 A
5550957 Davidson, Jr. et al. Aug 1996 A
5555191 Hripcsak Sep 1996 A
5561501 Honma Oct 1996 A
5572672 Dewitt et al. Nov 1996 A
5579087 Salgado Nov 1996 A
5586254 Kondo et al. Dec 1996 A
5594529 Yamashita et al. Jan 1997 A
5600301 Robinson, III Feb 1997 A
5600403 Inoo Feb 1997 A
5603060 Weinberger et al. Feb 1997 A
5603323 Pflugrath et al. Feb 1997 A
5619024 Kolls Apr 1997 A
5619716 Nonaka et al. Apr 1997 A
5631724 Sawada et al. May 1997 A
5636008 LoBiondo et al. Jun 1997 A
5636333 Davidson, Jr. et al. Jun 1997 A
5638427 Flemming et al. Jun 1997 A
5640495 Colbert et al. Jun 1997 A
5642202 Williams et al. Jun 1997 A
5642208 Takahashi et al. Jun 1997 A
5655084 Pinsky et al. Aug 1997 A
5659794 Caldarale et al. Aug 1997 A
5673190 Kahleck et al. Sep 1997 A
5675744 Tsujii Oct 1997 A
5677775 Yamaguchi et al. Oct 1997 A
5694528 Hube Dec 1997 A
5696903 Mahany Dec 1997 A
5699494 Colbert et al. Dec 1997 A
5708908 Hirata et al. Jan 1998 A
5708909 Yamashita et al. Jan 1998 A
5715393 Naugle Feb 1998 A
5715496 Sawada et al. Feb 1998 A
5715823 Wood et al. Feb 1998 A
5720015 Martin et al. Feb 1998 A
5727135 Webb et al. Mar 1998 A
5727248 Ogura Mar 1998 A
5732212 Perholz et al. Mar 1998 A
5736965 Mosebrook et al. Apr 1998 A
5740801 Branson Apr 1998 A
5745268 Eastvold et al. Apr 1998 A
5745718 Cline et al. Apr 1998 A
5748892 Richardson May 1998 A
5748907 Crane May 1998 A
5752125 Yamashita et al. May 1998 A
5752128 Yamashita May 1998 A
5752917 Fuchs May 1998 A
5761529 Raji et al. Jun 1998 A
5764918 Poulter Jun 1998 A
5768516 Sugishima Jun 1998 A
5772585 Lavin et al. Jun 1998 A
5774052 Hamm et al. Jun 1998 A
5786994 Friz et al. Jul 1998 A
5787149 Yousefi et al. Jul 1998 A
5787278 Barton et al. Jul 1998 A
5790793 Higley Aug 1998 A
5790977 Ezekiel Aug 1998 A
5798738 Yamada Aug 1998 A
5801964 McCarthy Sep 1998 A
5809237 Watts et al. Sep 1998 A
5809297 Kroenke et al. Sep 1998 A
5812397 Pech et al. Sep 1998 A
5812874 Yamashita et al. Sep 1998 A
5818603 Motoyama Oct 1998 A
5819015 Martin et al. Oct 1998 A
5819110 Motoyama Oct 1998 A
5822221 Groenteman Oct 1998 A
5826027 Pedersen et al. Oct 1998 A
5828943 Brown Oct 1998 A
5835816 Sawada et al. Nov 1998 A
5835911 Nakagawa et al. Nov 1998 A
5844550 Trainor et al. Dec 1998 A
5845061 Miyamoto et al. Dec 1998 A
5845230 Lamberson Dec 1998 A
5857207 Lo et al. Jan 1999 A
5857967 Frid et al. Jan 1999 A
5862348 Pedersen Jan 1999 A
5862404 Onaga Jan 1999 A
5865745 Schmitt et al. Feb 1999 A
5872635 Akiyama Feb 1999 A
5872928 Lewis et al. Feb 1999 A
5873009 Yamashita et al. Feb 1999 A
5873659 Edwards et al. Feb 1999 A
5878746 Lemelson et al. Mar 1999 A
5880677 Lestician Mar 1999 A
5884072 Rasmussen Mar 1999 A
5887216 Motoyama Mar 1999 A
5890029 Hirata et al. Mar 1999 A
5894416 Kuroyanagi et al. Apr 1999 A
5897235 Honma Apr 1999 A
5901286 Danknick et al. May 1999 A
5905906 Goffinet et al. May 1999 A
5909493 Motoyama et al. Jun 1999 A
5911095 Atsumi et al. Jun 1999 A
5913060 Discavage Jun 1999 A
5917405 Joao Jun 1999 A
5923842 Pedersen et al. Jul 1999 A
5933675 Sawada et al. Aug 1999 A
5935060 Iliff Aug 1999 A
5941949 Pedersen Aug 1999 A
5956487 Venkatraman et al. Sep 1999 A
5956698 Lacheze et al. Sep 1999 A
5961586 Pedersen Oct 1999 A
5968116 Day et al. Oct 1999 A
5970149 Johnson Oct 1999 A
5974234 Levine et al. Oct 1999 A
5975737 Crater et al. Nov 1999 A
5991810 Shapiro et al. Nov 1999 A
6003061 Jones et al. Dec 1999 A
6003070 Frantz Dec 1999 A
6003078 Kodimer et al. Dec 1999 A
6006045 Miyawaki Dec 1999 A
6009274 Fletcher et al. Dec 1999 A
6009284 Weinberger et al. Dec 1999 A
6012088 Li et al. Jan 2000 A
6014631 Teagarden et al. Jan 2000 A
6014691 Brewer et al. Jan 2000 A
6014694 Aharoni et al. Jan 2000 A
6016535 Krantz et al. Jan 2000 A
6021284 Serizawa et al. Feb 2000 A
6022315 Iliff Feb 2000 A
6023223 Baxter, Jr. Feb 2000 A
6023507 Wookey Feb 2000 A
6023721 Cummings Feb 2000 A
6023749 Richardson Feb 2000 A
6025925 Davidson, Jr. et al. Feb 2000 A
6031964 Anderson Feb 2000 A
6041041 Ramanathan et al. Mar 2000 A
6042111 Rivers et al. Mar 2000 A
6057857 Bloomfield May 2000 A
6060994 Chen May 2000 A
6061603 Papadopoulos et al. May 2000 A
6064915 Kaneko et al. May 2000 A
6065118 Bull et al. May 2000 A
6081623 Bloomfield et al. Jun 2000 A
6088718 Altschuler et al. Jul 2000 A
6091915 Takagishi Jul 2000 A
6098116 Nixon et al. Aug 2000 A
6101407 Groezinger Aug 2000 A
6108492 Miyachi Aug 2000 A
6112035 Kuroyanagi et al. Aug 2000 A
6112256 Goffinet et al. Aug 2000 A
6115489 Gupta et al. Sep 2000 A
6118899 Bloomfield et al. Sep 2000 A
6119934 Kolls Sep 2000 A
6122463 Nagatani Sep 2000 A
6125363 Buzzeo et al. Sep 2000 A
6130999 Serizawa et al. Oct 2000 A
6139177 Venkatraman et al. Oct 2000 A
6141737 Krantz et al. Oct 2000 A
6152365 Kolls Nov 2000 A
6157944 Pedersen Dec 2000 A
6161145 Bainbridge Dec 2000 A
6163317 de Judicibus Dec 2000 A
6167432 Jiang Dec 2000 A
6167448 Hemphill et al. Dec 2000 A
6172683 Bloomfield Jan 2001 B1
6175866 Holloway et al. Jan 2001 B1
6181331 Trainor et al. Jan 2001 B1
6189113 Rabb et al. Feb 2001 B1
6196735 Inamine Mar 2001 B1
6205466 Karp et al. Mar 2001 B1
6209048 Wolff Mar 2001 B1
6221011 Bardy Apr 2001 B1
6226650 Mahajan et al. May 2001 B1
6230199 Revashetti et al. May 2001 B1
6246485 Brown et al. Jun 2001 B1
6256378 Iggulden et al. Jul 2001 B1
6256668 Slivka et al. Jul 2001 B1
6260148 Aggarwal et al. Jul 2001 B1
6260248 Cramer et al. Jul 2001 B1
6282454 Papadopoulos et al. Aug 2001 B1
6282711 Halpern et al. Aug 2001 B1
6286038 Reichmeyer et al. Sep 2001 B1
6286059 Sugiura Sep 2001 B1
6289461 Dixon Sep 2001 B1
6292828 Williams Sep 2001 B1
6295527 McCormack et al. Sep 2001 B1
6298457 Rachlin et al. Oct 2001 B1
6304895 Schneider et al. Oct 2001 B1
6307570 Stergiades Oct 2001 B1
6308099 Fox et al. Oct 2001 B1
6311024 Serizawa et al. Oct 2001 B1
6312378 Bardy Nov 2001 B1
6317570 Uchida et al. Nov 2001 B1
6317783 Freishtat et al. Nov 2001 B1
6317848 Sorens et al. Nov 2001 B1
6325540 Lounsberry et al. Dec 2001 B1
6327594 Van Huben et al. Dec 2001 B1
6338086 Curtis et al. Jan 2002 B1
6343320 Fairchild et al. Jan 2002 B1
6356933 Mitchell et al. Mar 2002 B2
6356949 Katsandres et al. Mar 2002 B1
6366741 Fukushima Apr 2002 B1
6368284 Bardy Apr 2002 B1
6370552 Bloomfield Apr 2002 B1
6370570 Muir et al. Apr 2002 B1
6370582 Lim et al. Apr 2002 B1
6377162 Delestienne et al. Apr 2002 B1
6377971 Madden et al. Apr 2002 B1
6381557 Babula et al. Apr 2002 B1
6397212 Biffar May 2002 B1
6405310 Simpson Jun 2002 B1
6406426 Reuss et al. Jun 2002 B1
6412026 Graf Jun 2002 B1
6415023 Iggulden Jul 2002 B2
6415392 Suzuki et al. Jul 2002 B1
6421671 Bryan et al. Jul 2002 B1
6426798 Yeung Jul 2002 B1
6430612 Iizuka Aug 2002 B1
6430711 Sekizawa Aug 2002 B1
6434572 Derzay et al. Aug 2002 B2
6437692 Petite et al. Aug 2002 B1
6437803 Panasyuk et al. Aug 2002 B1
6438598 Pedersen Aug 2002 B1
6446192 Narasimhan et al. Sep 2002 B1
6449633 Van et al. Sep 2002 B1
6449663 Carney et al. Sep 2002 B1
6453127 Wood et al. Sep 2002 B2
6453129 Simpson et al. Sep 2002 B1
6457038 Defosse Sep 2002 B1
6462831 Akiyama Oct 2002 B1
6466971 Humpleman et al. Oct 2002 B1
6471521 Dornbush et al. Oct 2002 B1
6477117 Narayanaswami et al. Nov 2002 B1
6479792 Beiermann et al. Nov 2002 B1
6487513 Eastvold et al. Nov 2002 B1
6493517 Hanson Dec 2002 B1
6493871 McGuire et al. Dec 2002 B1
6494831 Koritzinsky Dec 2002 B1
6502132 Kumano Dec 2002 B1
6510350 Steen et al. Jan 2003 B1
6510454 Walukiewicz Jan 2003 B1
6523013 Shah et al. Feb 2003 B2
6523063 Miller et al. Feb 2003 B1
6523130 Hickman et al. Feb 2003 B1
6529848 Sone Mar 2003 B2
6538667 Duursma et al. Mar 2003 B1
6549612 Gifford et al. Apr 2003 B2
6553336 Johnson et al. Apr 2003 B1
6553490 Kottapurath et al. Apr 2003 B1
6559965 Simpson et al. May 2003 B1
6560611 Nine et al. May 2003 B1
6560641 Powderly et al. May 2003 B1
6560656 O'Sullivan et al. May 2003 B1
6564227 Sakakibara et al. May 2003 B2
6567813 Zhu et al. May 2003 B1
6574729 Fink et al. Jun 2003 B1
6581092 Motoyama et al. Jun 2003 B1
6581094 Gao Jun 2003 B1
6587812 Takayama Jul 2003 B1
6591272 Williams Jul 2003 B1
6598011 Howards et al. Jul 2003 B1
6601087 Zhu et al. Jul 2003 B1
6601159 Smith et al. Jul 2003 B1
6604212 Sekizawa et al. Aug 2003 B2
6609108 Pulliam et al. Aug 2003 B1
6611863 Banginwar Aug 2003 B1
6631407 Mukaiyama et al. Oct 2003 B1
6636899 Rabb et al. Oct 2003 B1
6643650 Slaughter et al. Nov 2003 B1
6643690 Duursma et al. Nov 2003 B2
6646655 Brandt et al. Nov 2003 B1
6651110 Caspers et al. Nov 2003 B1
6651190 Worley et al. Nov 2003 B1
6654032 Zhu et al. Nov 2003 B1
6654720 Graham et al. Nov 2003 B1
6654726 Hanzek Nov 2003 B1
6665425 Sampath et al. Dec 2003 B1
6670810 Duncan et al. Dec 2003 B2
6671695 McFadden Dec 2003 B2
6675197 Satoh et al. Jan 2004 B1
6681344 Andrew Jan 2004 B1
6681349 Sekizawa Jan 2004 B2
6684259 Discavage et al. Jan 2004 B1
6686838 Rezvani et al. Feb 2004 B1
6687848 Najmi Feb 2004 B1
6687873 Ballantyne et al. Feb 2004 B1
6691106 Sathyanarayan Feb 2004 B1
6691154 Zhu et al. Feb 2004 B1
6691157 Muir et al. Feb 2004 B2
6704807 Mathur et al. Mar 2004 B1
6710893 Hou et al. Mar 2004 B1
6711593 Gordon et al. Mar 2004 B1
6711618 Danner et al. Mar 2004 B1
6717513 Sandelman et al. Apr 2004 B1
6738798 Ploetz et al. May 2004 B1
6754664 Bush Jun 2004 B1
6757714 Hansen Jun 2004 B1
6757899 Zdankin et al. Jun 2004 B2
6760761 Sciacca Jul 2004 B1
6763274 Gilbert Jul 2004 B1
6763501 Zhu et al. Jul 2004 B1
6766333 Wu et al. Jul 2004 B1
6775238 Suzuki et al. Aug 2004 B1
6779004 Zintel Aug 2004 B1
6782542 Mein et al. Aug 2004 B1
6785015 Smith et al. Aug 2004 B1
6785713 Freeman et al. Aug 2004 B1
6785726 Freeman et al. Aug 2004 B1
6789112 Freeman et al. Sep 2004 B1
6789119 Zhu et al. Sep 2004 B1
6792337 Blackett et al. Sep 2004 B2
6799209 Hayton Sep 2004 B1
6799270 Bull et al. Sep 2004 B1
RE38609 Chen et al. Oct 2004 E
6804712 Kracht Oct 2004 B1
6807580 Freeman et al. Oct 2004 B2
6810488 Teng Oct 2004 B2
6816616 Teng Nov 2004 B2
6823397 Rawson, III Nov 2004 B2
6826606 Freeman et al. Nov 2004 B2
6831555 Miller et al. Dec 2004 B1
6832239 Kraft et al. Dec 2004 B1
6832373 O'Neill Dec 2004 B2
6834298 Singer et al. Dec 2004 B1
6842903 Weschler Jan 2005 B1
6857013 Ramberg et al. Feb 2005 B2
6886046 Stutz et al. Apr 2005 B2
6891830 Curtis May 2005 B2
6901448 Zhu et al. May 2005 B2
6904593 Fong et al. Jun 2005 B1
6920480 Mitchell et al. Jul 2005 B2
6922724 Freeman et al. Jul 2005 B1
6925335 May et al. Aug 2005 B2
6925645 Zhu et al. Aug 2005 B2
6928469 Duursma et al. Aug 2005 B1
6940405 Script et al. Sep 2005 B2
6950991 Bloomfield et al. Sep 2005 B2
6952714 Peart Oct 2005 B2
6963899 Fernandez et al. Nov 2005 B1
6972676 Kimmel et al. Dec 2005 B1
6983020 Christiansen Jan 2006 B2
6985779 Hsiung et al. Jan 2006 B2
6986040 Kramer et al. Jan 2006 B1
6990395 Ransom et al. Jan 2006 B2
7003574 Bahl Feb 2006 B1
7016966 Saulpaugh et al. Mar 2006 B1
7020706 Cates et al. Mar 2006 B2
7020773 Otway et al. Mar 2006 B1
7028025 Collins Apr 2006 B2
7028081 Kawashima Apr 2006 B2
7031342 Teng Apr 2006 B2
7032005 Mathon et al. Apr 2006 B2
7043677 Li May 2006 B1
7046134 Hansen May 2006 B2
7051084 Hayton et al. May 2006 B1
7057724 Mead et al. Jun 2006 B1
7065576 Kamel et al. Jun 2006 B2
7069298 Zhu et al. Jun 2006 B2
7072946 Shafer Jul 2006 B2
7079010 Champlin Jul 2006 B2
7080267 Gary et al. Jul 2006 B2
7082426 Musgrove et al. Jul 2006 B2
7082460 Hansen et al. Jul 2006 B2
7085814 Gandhi et al. Aug 2006 B1
7085824 Forth et al. Aug 2006 B2
7089567 Giradot et al. Aug 2006 B2
7091846 Wu Aug 2006 B2
7092370 Jiang et al. Aug 2006 B2
7099110 Detzler Aug 2006 B2
7100200 Pope et al. Aug 2006 B2
7103357 Kirani et al. Sep 2006 B2
7103799 Dixon Sep 2006 B2
7107312 Hackbarth Sep 2006 B2
7113988 Chirashya et al. Sep 2006 B2
7116681 Hovell et al. Oct 2006 B1
7117239 Hansen Oct 2006 B1
7117243 Peart Oct 2006 B2
7127525 Coleman et al. Oct 2006 B2
7130883 Zhu et al. Oct 2006 B2
7142839 Pelaez et al. Nov 2006 B2
7143153 Black Nov 2006 B1
7149792 Hansen Dec 2006 B1
7158483 Takabatake et al. Jan 2007 B1
7162315 Gilbert Jan 2007 B2
7162628 Gentil et al. Jan 2007 B2
7178149 Hansen Feb 2007 B2
7185014 Hansen Feb 2007 B1
7194743 Hayton et al. Mar 2007 B2
7203755 Zhu et al. Apr 2007 B2
7213051 Zhu et al. May 2007 B2
7216172 Yang et al. May 2007 B2
7234943 Aleali Jun 2007 B1
7254601 Baller et al. Aug 2007 B2
7266526 Drummond et al. Sep 2007 B1
7290061 Lentini et al. Oct 2007 B2
7293176 Otway et al. Nov 2007 B2
7330872 Peart et al. Feb 2008 B2
7334119 Gentil et al. Feb 2008 B2
7340772 Panasyuk et al. Mar 2008 B2
7346842 Hayton et al. Mar 2008 B1
7353253 Zhao Apr 2008 B1
7359953 Muir et al. Apr 2008 B2
7376695 Duursma et al. May 2008 B2
7421484 Das Sep 2008 B2
7444071 Chen Oct 2008 B2
7453379 Plamondon Nov 2008 B2
7460038 Samuels et al. Dec 2008 B2
7490166 Yang et al. Feb 2009 B2
7496097 Rao et al. Feb 2009 B2
7502726 Panasyuk et al. Mar 2009 B2
7502784 Collins Mar 2009 B2
7529767 DeAnna et al. May 2009 B2
7532134 Samuels et al. May 2009 B2
7542471 Samuels et al. Jun 2009 B2
7555529 Bloomfield et al. Jun 2009 B2
7562121 Berisford Jul 2009 B2
7562146 Panasyuk et al. Jul 2009 B2
7562226 Aiken et al. Jul 2009 B2
7565526 Shaw et al. Jul 2009 B1
7581005 Montemayor et al. Aug 2009 B2
7584294 Plamondon Sep 2009 B2
7587755 Kramer Sep 2009 B2
7593514 Zhuang et al. Sep 2009 B1
7594018 Pedersen Sep 2009 B2
7596593 Mitchell et al. Sep 2009 B2
7606902 Rao et al. Oct 2009 B2
7609721 Rao et al. Oct 2009 B2
7613131 Decasper et al. Nov 2009 B2
7617531 Chauhan et al. Nov 2009 B1
7619545 Samuels et al. Nov 2009 B2
7656799 Samuels et al. Feb 2010 B2
7657657 Rao et al. Feb 2010 B2
7661129 Panasyuk et al. Feb 2010 B2
7661131 Shaw et al. Feb 2010 B1
7664857 Ovsiannikov et al. Feb 2010 B2
7676813 Bisset et al. Mar 2010 B2
7831699 Kumar et al. Nov 2010 B2
8065397 Taylor et al. Nov 2011 B2
8165893 Goldberg et al. Apr 2012 B1
8260907 O'Sullivan Sep 2012 B2
8296413 Bornhoevd Oct 2012 B2
8370479 Hart et al. Feb 2013 B2
8769095 Hart et al. Jul 2014 B2
8788632 Taylor et al. Jul 2014 B2
20010007117 Cooper et al. Jul 2001 A1
20010025377 Hinderks Sep 2001 A1
20010027439 Holtzman et al. Oct 2001 A1
20010049690 McConnell et al. Dec 2001 A1
20010049717 Freeman et al. Dec 2001 A1
20010052999 Hiraoka Dec 2001 A1
20010056547 Dixon Dec 2001 A1
20020006790 Blumenstock et al. Jan 2002 A1
20020019844 Kurowski et al. Feb 2002 A1
20020026514 Ellis et al. Feb 2002 A1
20020032470 Linberg Mar 2002 A1
20020032720 Nelson et al. Mar 2002 A1
20020035533 Mache et al. Mar 2002 A1
20020038320 Brook Mar 2002 A1
20020052932 Curtis et al. May 2002 A1
20020054169 Richardson May 2002 A1
20020059489 Davis et al. May 2002 A1
20020064138 Saito et al. May 2002 A1
20020078135 Venkatsubra Jun 2002 A1
20020078259 Wendorf et al. Jun 2002 A1
20020080391 Sugiura et al. Jun 2002 A1
20020095600 Deen Jul 2002 A1
20020116550 Hansen Aug 2002 A1
20020133753 Mayberry et al. Sep 2002 A1
20020135801 Tessman Sep 2002 A1
20020138567 Ogawa Sep 2002 A1
20020144016 Spicer et al. Oct 2002 A1
20020157090 Anton, Jr. Oct 2002 A1
20020174085 Nelson et al. Nov 2002 A1
20020178241 Eriksson Nov 2002 A1
20020191612 Curtis Dec 2002 A1
20030014733 Ringseth et al. Jan 2003 A1
20030023957 Bau et al. Jan 2003 A1
20030025931 Dorfman et al. Feb 2003 A1
20030037148 Pedersen Feb 2003 A1
20030056140 Taylor et al. Mar 2003 A1
20030061403 Miyata et al. Mar 2003 A1
20030063119 Bloomfield et al. Apr 2003 A1
20030063309 Parry Apr 2003 A1
20030070006 Nadler et al. Apr 2003 A1
20030072027 Haines et al. Apr 2003 A1
20030118353 Baller Jun 2003 A1
20030154284 Bernardin et al. Aug 2003 A1
20030158897 Ben-Natan et al. Aug 2003 A1
20030158919 Fomenko Aug 2003 A1
20030163569 Panasyuk et al. Aug 2003 A1
20030177172 Duursma et al. Sep 2003 A1
20030182375 Zhu Sep 2003 A1
20030200285 Hansen et al. Oct 2003 A1
20030200329 Delaney Oct 2003 A1
20030229529 Mui et al. Dec 2003 A1
20030229785 Daseke et al. Dec 2003 A1
20040027376 Calder et al. Feb 2004 A1
20040030768 Krishnamoorthy et al. Feb 2004 A1
20040098515 Rezvani et al. May 2004 A1
20040128370 Kortright Jul 2004 A1
20040139309 Gentil et al. Jul 2004 A1
20040152450 Brasher et al. Aug 2004 A1
20040158630 Chang et al. Aug 2004 A1
20040158631 Chang et al. Aug 2004 A1
20040177124 Hansen Sep 2004 A1
20040186693 Xiang et al. Sep 2004 A1
20040199272 Yamamoto Oct 2004 A1
20040199792 Tan et al. Oct 2004 A1
20040210450 Atencio et al. Oct 2004 A1
20040215605 Mester Oct 2004 A1
20040221026 Dorland Nov 2004 A1
20040252628 Detzler Dec 2004 A1
20040260801 Li Dec 2004 A1
20050005152 Singh et al. Jan 2005 A1
20050015501 Kaplan et al. Jan 2005 A1
20050021772 Shedrinski Jan 2005 A1
20050033588 Ruiz et al. Feb 2005 A1
20050044196 Pullen et al. Feb 2005 A1
20050055397 Zhu et al. Mar 2005 A1
20050080897 Braun et al. Apr 2005 A1
20050086172 Stefik Apr 2005 A1
20050102388 Tabbara et al. May 2005 A1
20050114352 Ronneburg May 2005 A1
20050141507 Curtis Jun 2005 A1
20050144612 Wang et al. Jun 2005 A1
20050154787 Cochran et al. Jul 2005 A1
20050182834 Black Aug 2005 A1
20050190769 Smith Sep 2005 A1
20050193099 Reus et al. Sep 2005 A1
20050193386 McCaleb et al. Sep 2005 A1
20050196023 Chen et al. Sep 2005 A1
20050198189 Robinson et al. Sep 2005 A1
20050198245 Burgess et al. Sep 2005 A1
20050198292 Duursma et al. Sep 2005 A1
20050198379 Panasyuk et al. Sep 2005 A1
20050198380 Panasyuk et al. Sep 2005 A1
20050198393 Stutz et al. Sep 2005 A1
20050232168 Schauser et al. Oct 2005 A1
20050235014 Schauser et al. Oct 2005 A1
20050246445 Panasyuk et al. Nov 2005 A1
20050246702 Yeh et al. Nov 2005 A1
20050251551 Mitchell et al. Nov 2005 A1
20050256614 Habermas Nov 2005 A1
20050256923 Adachi Nov 2005 A1
20050262076 Voskuil Nov 2005 A1
20050267974 Panasyuk et al. Dec 2005 A1
20050273513 Panasyuk et al. Dec 2005 A1
20060002315 Theurer et al. Jan 2006 A1
20060015740 Kramer Jan 2006 A1
20060029062 Rao et al. Feb 2006 A1
20060029063 Rao et al. Feb 2006 A1
20060029064 Rao et al. Feb 2006 A1
20060031237 DeAnna et al. Feb 2006 A1
20060031476 Mathes et al. Feb 2006 A1
20060031779 Theurer et al. Feb 2006 A1
20060037022 Byrd et al. Feb 2006 A1
20060037071 Rao et al. Feb 2006 A1
20060037072 Rao et al. Feb 2006 A1
20060039354 Rao et al. Feb 2006 A1
20060039355 Rao et al. Feb 2006 A1
20060039356 Rao et al. Feb 2006 A1
20060039404 Rao et al. Feb 2006 A1
20060047956 Calvin Mar 2006 A1
20060059239 Brasher et al. Mar 2006 A1
20060066448 Berisford et al. Mar 2006 A1
20060069662 Laborczfalvi et al. Mar 2006 A1
20060069668 Braddy et al. Mar 2006 A1
20060069683 Braddy et al. Mar 2006 A1
20060069750 Momtchilov et al. Mar 2006 A1
20060069753 Hu et al. Mar 2006 A1
20060070029 Laborczfalvi et al. Mar 2006 A1
20060070090 Gulkis Mar 2006 A1
20060070131 Braddy et al. Mar 2006 A1
20060074837 Braddy et al. Apr 2006 A1
20060075080 Burr et al. Apr 2006 A1
20060075114 Panasyuk et al. Apr 2006 A1
20060075123 Burr et al. Apr 2006 A1
20060075381 Laborczfalvi et al. Apr 2006 A1
20060075463 Braddy et al. Apr 2006 A1
20060077941 Alagappan et al. Apr 2006 A1
20060087408 Korzeniowski Apr 2006 A1
20060087409 Korzeniowski Apr 2006 A1
20060090171 Laborczfalvi et al. Apr 2006 A1
20060095334 Simmons May 2006 A1
20060095370 Seth et al. May 2006 A1
20060100972 Chianese et al. May 2006 A1
20060130073 Faist et al. Jun 2006 A1
20060135192 Surendra et al. Jun 2006 A1
20060150249 Gassen et al. Jul 2006 A1
20060159080 Mazzaferri et al. Jul 2006 A1
20060159432 Mazzaferri et al. Jul 2006 A1
20060161555 Mazzaferri et al. Jul 2006 A1
20060161671 Ryman et al. Jul 2006 A1
20060161783 Aiken et al. Jul 2006 A1
20060161959 Ryman et al. Jul 2006 A1
20060161974 Innes et al. Jul 2006 A1
20060179143 Walker et al. Aug 2006 A1
20060184614 Baratto et al. Aug 2006 A1
20060190719 Rao et al. Aug 2006 A1
20060200307 Riess Sep 2006 A1
20060200494 Sparks Sep 2006 A1
20060203007 Bullard et al. Sep 2006 A1
20060206820 Bullard et al. Sep 2006 A1
20060224742 Shahbazi Oct 2006 A1
20060236325 Rao et al. Oct 2006 A1
20060236385 Innes et al. Oct 2006 A1
20060242415 Gaylor Oct 2006 A1
20060247502 Chen Nov 2006 A1
20060248144 Zhu Nov 2006 A1
20060271875 Green et al. Nov 2006 A1
20060271877 Theurer et al. Nov 2006 A1
20060282521 Anderson et al. Dec 2006 A1
20060288119 Kim Dec 2006 A1
20070005736 Hansen et al. Jan 2007 A1
20070011295 Hansen Jan 2007 A1
20070011356 Schauser et al. Jan 2007 A1
20070022159 Zhu Jan 2007 A1
20070056009 Spilo et al. Mar 2007 A1
20070078976 Taylor et al. Apr 2007 A1
20070088826 Raphel et al. Apr 2007 A1
20070094076 Perkowski et al. Apr 2007 A1
20070094672 Hayton et al. Apr 2007 A1
20070100892 Kephart et al. May 2007 A1
20070106810 Ryman May 2007 A1
20070106811 Ryman May 2007 A1
20070113069 Gentil et al. May 2007 A1
20070124476 Oesterreicher May 2007 A1
20070130167 Day et al. Jun 2007 A1
20070130337 Arnison Jun 2007 A1
20070143837 Azeez et al. Jun 2007 A1
20070150903 Hansen Jun 2007 A1
20070156810 Kumar Jul 2007 A1
20070156923 Kumar Jul 2007 A1
20070157101 Indiran et al. Jul 2007 A1
20070171921 Wookey et al. Jul 2007 A1
20070174410 Croft et al. Jul 2007 A1
20070174429 Mazzaferri et al. Jul 2007 A1
20070174454 Mitchell et al. Jul 2007 A1
20070179955 Croft et al. Aug 2007 A1
20070180447 Mazzaferri et al. Aug 2007 A1
20070180448 Low et al. Aug 2007 A1
20070180449 Croft et al. Aug 2007 A1
20070180450 Croft et al. Aug 2007 A1
20070180493 Croft et al. Aug 2007 A1
20070186212 Mazzaferri et al. Aug 2007 A1
20070192329 Croft et al. Aug 2007 A1
20070198656 Mazzaferri et al. Aug 2007 A1
20070198661 Hansen Aug 2007 A1
20070203952 Baron et al. Aug 2007 A1
20070239886 Montemayor et al. Oct 2007 A1
20070271599 Rosenstein Nov 2007 A1
20070282623 Dattorro Dec 2007 A1
20070288629 Taylor et al. Dec 2007 A2
20070294237 John et al. Dec 2007 A1
20080005321 Ma et al. Jan 2008 A1
20080031235 Harris et al. Feb 2008 A1
20080034057 Kumar et al. Feb 2008 A1
20080034072 He et al. Feb 2008 A1
20080034110 Suganthi et al. Feb 2008 A1
20080034111 Kamath et al. Feb 2008 A1
20080034119 Verzunov et al. Feb 2008 A1
20080034410 Udupa et al. Feb 2008 A1
20080034413 He et al. Feb 2008 A1
20080034418 Venkatraman et al. Feb 2008 A1
20080034419 Mullick et al. Feb 2008 A1
20080043617 Schekochikhin et al. Feb 2008 A1
20080043622 Kamath et al. Feb 2008 A1
20080043749 Suganthi et al. Feb 2008 A1
20080043760 Venkatraman et al. Feb 2008 A1
20080043761 Kumar et al. Feb 2008 A1
20080046371 He et al. Feb 2008 A1
20080046616 Verzunov et al. Feb 2008 A1
20080046714 Suganthi et al. Feb 2008 A1
20080046717 Kanekar et al. Feb 2008 A1
20080046727 Kanekar et al. Feb 2008 A1
20080046994 Venkatraman et al. Feb 2008 A1
20080049616 Kamath et al. Feb 2008 A1
20080065757 Motoyama et al. Mar 2008 A1
20080068289 Piasecki Mar 2008 A1
20080068290 Muklashy et al. Mar 2008 A1
20080069005 von Eicken et al. Mar 2008 A1
20080069104 von Eicken et al. Mar 2008 A1
20080071905 Sullivan et al. Mar 2008 A1
20080082657 Hart et al. Apr 2008 A1
20080109912 Rivera May 2008 A1
20080126978 Bai et al. May 2008 A1
20080154409 Srikumar et al. Jun 2008 A1
20080154957 Taylor et al. Jun 2008 A1
20080201405 Duursma et al. Aug 2008 A1
20080208605 Sinha et al. Aug 2008 A1
20080219122 Detzler et al. Sep 2008 A1
20080231414 Canosa Sep 2008 A1
20080250110 Zhao Oct 2008 A1
20090013064 Taylor et al. Jan 2009 A1
20090019226 Edwards et al. Jan 2009 A1
20090055745 Christiansen Feb 2009 A1
20090064134 Cox Mar 2009 A1
20090099836 Jacobsen et al. Apr 2009 A1
20090100349 Hancock et al. Apr 2009 A1
20090106347 Harwood et al. Apr 2009 A1
20090117890 Jacobsen et al. May 2009 A1
20090119408 Teze et al. May 2009 A1
20090187654 Raja et al. Jul 2009 A1
20090234972 Raghu et al. Sep 2009 A1
20090259728 Berisford et al. Oct 2009 A1
20120117203 Taylor et al. May 2012 A1
20130179565 Hart et al. Jul 2013 A1
20150032882 Hart et al. Jan 2015 A1
Foreign Referenced Citations (45)
Number Date Country
0874306 Oct 1998 EP
1 191 744 Mar 2002 EP
1 362 282 Nov 2003 EP
1 695 485 Aug 2006 EP
2797728 Feb 2001 FR
2305820 Apr 1997 GB
60-263162 Dec 1985 JP
06-062130 Mar 1994 JP
07-325513 Dec 1995 JP
09-163008 Jun 1997 JP
09-305407 Nov 1997 JP
09-325925 Dec 1997 JP
10-190922 Jul 1998 JP
10-224372 Aug 1998 JP
11-203079 Jul 1999 JP
11-296453 Oct 1999 JP
2000-112863 Apr 2000 JP
2000-122952 Apr 2000 JP
2000-278773 Oct 2000 JP
2000-309145 Nov 2000 JP
2001-337817 Dec 2001 JP
2003-223603 Aug 2003 JP
WO9730879 Aug 1997 WO
WO9820439 May 1998 WO
WO9833302 Jul 1998 WO
WO9838910 Sep 1998 WO
WO9841943 Sep 1998 WO
WO9921336 Apr 1999 WO
WO9957649 Nov 1999 WO
WO9957837 Nov 1999 WO
WO9957838 Nov 1999 WO
WO9964958 Dec 1999 WO
WO0023894 Apr 2000 WO
WO0210919 Feb 2002 WO
WO0221239 Mar 2002 WO
WO0221299 Mar 2002 WO
WO0221414 Mar 2002 WO
WO0221415 Mar 2002 WO
WO0221777 Mar 2002 WO
WO0225501 Mar 2002 WO
WO03021464 Mar 2003 WO
WO03054439 Jul 2003 WO
WO2004059447 Jul 2004 WO
WO2006009402 Jan 2006 WO
WO2008083177 Jul 2008 WO
Non-Patent Literature Citations (132)
Entry
“Frequently Asked Questions about the Extensible Markup Language—The XML FAQ” Version 1.41 (http://www.oasis-open.org/cover/xm1FAQ141-19981006.html) (Oct. 6, 1998).
24x7, HealthTech Publishing Company, Inc. (Nov. 1996).
“Remote Diagnostics: Strategic weapon in the war for multi-vendor service contracts,” Tech Assessment, vol. 3, No. 12, Dec. 1995.
“Siemens Medical, BJC Health System Extend deal to multivendor service,” Medical Imaging News, vol. 6, No. 26, Jun. 27, 1997.
Dec. 27, 1995, SCAN Diagnostic Imaging, vol. 8, No. 24.
Apr. 22, 2005 Literature Search by Keyword: CyberTAC.
Adelberg, D., “Building Robust Wrappers for Text Sources”, [online] Retrieved from the Internet<URL:http://student.bu.ac.bd/˜mumit/Research/NLP-bib/papers/Adelberg99.pdf> [retrieved on Nov. 24, 2008] (1999).
Allegro Software product release 1-61 overview Greenhills Software Inc., [online] Jun. 10, 2002, pp. 1-1, XPOO2201939 Retrieved from the Internet: <URL:http://www.ghs.com/partners/allegro/> [retrieved on Jun. 10, 2002] the whole document.
Allegro, RomWebCLient Embedded HTTP client Toolkit: ALLEGROSOFT, Circuit Cellar Online, Sep. 7, 2000, pp. 1-2, XP-002201983, URL:http://web.archive.orgweb/20000709204234/http://www.allegrosoft.com/romwebclient.html.
Bock, G., “Mainstreaming XML-based Enterprise Applications: Using Oracle XML DB to Manage Financial Information within a Global Banking System”, Oracle Corporation, (C) 2003.
Box, et al., Simple Object Acces Protocol (SOAP) 1.1, Document No. XP002250270, May 8, 2000.
Chandler, T. et al., “The Technology Development of Automatic Metering and Monitoring Systems”, Int'l Power Engineering Conf. 2005, IEEE, 4 pgs.
Cheung, D. et al., “Distributed and Scalable XML Document Processing Architecture for E-Commerce Systems”, Adv. Issues of E-Commerce and Web-Based Information Systems, WECWIS 2000, 2nd Int'l Workshop, (Jun. 2000), pp. 152-157.
Ennis, D., “CORBA and XML Integration in Enterprise Systems”, IONA Technologies Inc.[online], Retrieved from the Internet:<URL:http://citeseer.ist.psu.edu/cache/papers/cs/16013/http:zSzzSzwww.iona.comzSzinfozSztechcenterzSzecoop2000apr17.pdf/ennis00corba.pdf> [retrieved on Nov. 24, 2008] (2000).
CyberTAC & RadScape Presentation (May 1997).
CyberTAC Design Presentation (1997).
CyberTAC from Virtual Impact Systems, Inc. Presentation (1997).
CyberTAC Remote Support System Presentation (1997).
Database WIP, Section EI, Week 200156, Abstract, Document No. XP002253876 (Korea Electronics & Telecom Res Inst.) Derwent Publications, Ltd., London, GB, (Mar. 2001).
Eastvold, Roger, “Services: The Next Generation,” The Professional Journal, vol. 20, No. 4.
Eastvold, Roger, “Tiss and Tell,” Medical Imaging, Sep. 1995.
EBITS:Electronic Business & Information Technology for Society Research Consortium, Proposal for Development of an Educational and Research Infrastructure for Safe Electronic Commerce, [online] Retrieved from the Internet:<URL:http://www.cs.dartmouth.edu/˜makedon/cs188/proposal.html>, [retrieved Feb. 15, 2005].
Jiang, et al., “Record-Boundary Discovery in Web Documents”, [online] Retrieved from the Internet:<URL:http://osm7.cs.byu.edu/deg/papers/SJ.Thesis.ps>, [retrieved on Nov. 24, 2008] (1998).
Emmerich et al., Implementing Incremental Code Migration with XML, IEEE, 4-11, (Jun. 2000).
EmWare Press Release: “emWare Announces Support for Sun Microsystems Jini Technology,” Salt Lake City, UT (Feb. 1999).
EmWare Press Release: “emWare Delivers Emit 3.0 SDK Pro-A Complete Device Networking Kit for Developing End-to-end, Embedded Device Networking Solutions,” Salt Lake City, UT (May 1999).
EmWare Press Release: “emWare, IBM Demonstrate Next Phase in Establishing Worldwide Access to Embedded Devices,” Chicago, IL (Mar. 1999).
EmWare Press Release: “emWare's emLink (TM) Used to Internet-enable Welch Allyn's Vital Signs Monitor,” Chicago, IL (Mar. 1999).
EmWare Press Release: “Invensys Selects emWare EMIT Device-Networking Software to Add Remote Monitoring and Control Capabilities to its Controller Products,” Salt Lake City, UT (Jun. 1999).
EmWare Press Release: “Motorola, Mitsubishi and National Semiconductor Join emWare's Embed the Internet Alliance,” Chicago, IL (Mar. 1999).
Franklin, M. et al., “Data in Your Face: PUSH Technology in Perspective”, Proc. ACM SIGMOD Int'l Conf. on Mgmt of Data, (Jun. 1998), #XP000886180, pp. 516-519.
Hanckmann, J., “Telescript: The Emerging Standard for Intelligent Messaging,” Philips Telecommunications Review, vol. 52(1), pp. 15-19 (Mar. 1994).
Universal Plug & Play Device Architecture, (C) Microsoft Corporation (Jun. 8, 2000), [online] Retrieved from the Internet: <URL:http://www.upnp.org/specs/arch/upnpda10—20000613.htm>, [retrieved on Nov. 24, 2008].
Incremona, A. “Remote Service Diagnostics for Imaging Equipment: Today and Tomorrow,” Advanced Imaging, 12(9):90(2) (1997).
Jennyc, Kenn S., “Linking Enterprise Business Systems to the Factory Floor,” The Hewlett-Packard Journal, Article 9 (May 1998).
Kafeza, E. et al., “Alerts in Mobile Healthcare Applications: Requirements and Pilot Study”, IEEE, vol. 8, No. 2, pp. 173-181 (Jun. 2004).
Kimball, R., “XML Will Make it Easier,” Intelligent Enterprise, [online] Retrieved from the Internet:<URL:http://www.intelligententerprise.com/010416/webhouse1—1.jhtml> [retrieved on Nov. 24, 2008] (Apr. 16, 2001).
Koppen, E., et al., “Active Hypertext for Distributed Web Applications”, Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE '99), Proc. IEEE 8th Int'l. Workshop (1999), pp. 297-302.
Kovar, J., “Xerox Unveils Expanded Channel Lineup; Also Plans to Introduce E-Mail, Queue Management Software,” PC Expo,(Jun. 1999).
Lassman, M. et al., “Modern Nuclear Medical Diagnostics with Efficient Gamma Cameras,” Electromedica, 66(2):43-51, (1998).
Lewandowska, J., et al., “System for Grouping Technologically Similar Devices”, v. 48 n 12; (Dec. 1975), pp. 636-638 (English Abstract).
Layman, et al., “XML-Data,” Position Paper from Microsoft Corp. (Jun. 1997), [online] Retrieved from the Internet<URL:http://www.oasis-open.org/cover/xml-data9706223.html> [retrieved on Sep. 2, 2004].
Lerner, R., “At the Forge: Introducing SOAP”, Linux Journal, #XP002292162 (Mar. 2001).
Lindley, D., “Xerox unveils copier that phones for help,” Rochester Democrat and Chronicle, (Mar. 28, 1990).
Luh, James C., “With several specs complete, XML enters widespread development,” Internet World, (Jan. 4, 1999).
Martin, D., “Protessional XML”., WROX Press Ltd., pub., Ch. 11, ‘Server to Server’, pp. 559-562, 819-820 (2000).
Mason, K. “XML Translation for block structured languages”, IBM Corporation: Research Disclosure, Kenneth Mason Publications, 44176 (2001).
Math Markup Language (Chapter 4); [online] Retrieved from the Internet:<URL:http://www.w3.org/TR/REC-MathML/chap4—4.html>, [retrieved on Feb. 15, 2005].
McBride, R.A., “Security Considerations for Active Messages,” ACM SIGICE Bulletin, vol. 22 (2), (Oct. 1996).
Memphis Educational Computer Connectivity Alliance (MECCA), [online] Retrieved from the Internet:<URL:http://www.mecca.org/˜ltague/nsfnocostextension.html>, [retrieved on Feb. 15, 2005].
Mills et al., “A knowledge-based method for inferring semantic concepts from visual models of system behavior,” ACM (Jul. 2000), pp. 306-337.
Orasis Medical Services, Inc., Business Plan Copy No. 001, (Nov. 1995).
Pfeiffer, R., “XML Tutorials for Programmers: Tutorial 2: Writing XML Documents,” (1999) [online] Retrieved from the Internet<URL:http://imb.com/xml>, [retrieved on Mar. 2, 1999].
Questra Applications Data Sheet (2002).
Questra Preliminary Invalidity Contentions, dated Apr. 29, 2005.
Reagan, K., “Technology for the Soul,” OC Metro, (Sep. 1, 1995).
Rytting, T., “Dispensing the Goods, Embedded Style,” Circuit Cellar Online, (Oct. 1999).
Schmidt, the Evolution of Workflow Standards, IEEE (1999).
SOAP Archives Online, “Multiple Method Calls in SOAP Packet”; [online] Retrieved from the Internet:<URL:http://discuss.develop.com/archives/wa.exe?A2=ind9912&L=soap&T=O&F=&S=&P=25113>, [retrieved on Dec. 8, 2000].
Steinfeld, E., “From Standalone to Internet Appliance”, Circuit Cellar Online, [online] (Jul. 9, 2000), #XP002201938, Retrieved from the Internet: <URL:http://web.archive.org/web/20000709204234/http://www.alegrosoft.com/romwebclient.html>retrieved on Jun. 12, 2002 the whole document.
Steinfeld, E., “Internet-appliance technology automates test equipment” EDN Magazine, pp. 157-169, Oct. 2000, www.edbmag.com.
Suresh et al., “XML-based Data System for Earth Science Applications”, IEEE 2000 International, vol. 3, pp. 242-28, Jul. 2000.
Searls, “The Next Bang: The Explosive Combination of Embedded Linux, XML, and Instant Mess.”, ACM (Sep. 2000) Issue 77 [online] Retrieved from the Internet:<URL:http://www.linuxjournal.com/article.php?sid=4195>, [retrieved on Nov. 20, 2001].
The Simple Times, vol. 7, No. 1, Mar. 1999; [online] Retrieved from the Internet:<URL:http://www.simple-times.org/pub/simple-times/issues/7-1.html> [retrieved on Aug. 3, 2005].
Trewitt, G., “Using Tcl to Process HTML Forms,” Digital Network Systems Laboratory, NSL Technical Note TN-14, Palo Alto, CA (Mar. 1994).
Virtual Reality Transfer Protocol (VRTP); Retrieved from the Internet:<URL:http://www.stl.nps.navy.mil/˜brutzman/vrtp> (1998).
Walsh, Norman, “XSL The Extensible Style Language: Styling XML Documents,” New Architect Daily, Jan. 1999.
webmethods B2B Whitepaper; [online] Retrieved from the Internet<URL:http://www.cs.wisc.edu/˜vganti/papers/b2b—wpB2Bintegration.html> (1999).
White Paper, Medical Imaging, East Providence, RI (Sep. 1995).
Wigget, Jeremy, “Intraview: Roger Eastvold of Orasis Inc.,” 24x33 7, Nov. 1996.
Williams, T., “Java Goes to Work Controlling Networked Embedded Systems” Computer Design, Pennwell Publ. Littleton, MA, 35:9:36-37, Aug. 1996.
Winer, Dave, “XML-RPC Specification,” (http://XML-RPC.com), Jun. 15, 1999.
Winter 1992, Field of View, vol. 2, No. 3, Toshiba America Medical System, Inc.
Wu et al., “A knowledge sharing and collaboration system model based on Internet”, Systems, Man, and Cybernetics, 1999. IEEE SMC'99 Conference Proceedings, vol. 2, pp. 148-152 (1999).
Xerox 190 Copier, Electronic Data Interface Operator Guide, ver. 1.0, (1989).
Van der Werff, M., et al., “A Mobile-Based Home Automatic System”, IEEE Mobility Conference (2005).
Defense Information Systems Agency, Field Services Office, White Paper Report “pcAnywhere 10.5” (Sep. 2003).
Examination Report in EP Application No. 01955993.9, dated Jan. 29, 2004.
Examination Report in EP Application No. 01955993.9, dated Aug. 5, 2004.
Examination Report in EP Application No. 01955993.9, dated Dec. 16, 2004.
Examination Report in EP Application No. 01973431.8, dated Mar. 8, 2005.
Communication in EP Application No. 01973431.8, dated Mar. 30, 2005.
Examination Report in EP Application No. 01973431.8, dated Jan. 15, 2008.
Office Action in EP Application No. 01996048.3, dated Jun. 22, 2004.
Office Action in EP Application No. 01996048.3, dated Mar. 11, 2005.
Office Action in EP Application No. 01955993.9, dated Jun. 6, 2005.
Examination Report in EP Application No. 03719774.6, dated Sep. 12, 2005.
Examination Report in EP Application No. 03719774.6, dated Apr. 12, 2006.
Examination Report in EP Application No. 01973431.8, dated Feb. 6, 2009.
Search Report in EP Application No. 02792391.1, dated Nov. 19, 2009.
Examination Report in EP Application No. 01973431.8, dated Mar. 23, 2010.
Examination Report in EP Application No. 02792391.1, dated Mar. 10, 2010.
Response to Examination Report in EP Application No. 01973431.8, dated Oct. 4, 2010.
Letter from Foreign Associate regarding response filed in EP Application No. 01973431.8, dated Oct. 8, 2010.
English translation of Notification of Reasons for Refusal in Japanese Application No. 2002-529431, dated Nov. 8, 2010.
Notice of Reasons for Rejection in Japanese Application No. 2002-529431, dated Nov. 8, 2010.
Machine Translation of Japanese Patent Publication No. 09-305407 (Pub Date Nov. 1997).
Machine Translation of Japanese Patent Publication No. 11-296453, (Pub Date Oct. 1999).
Machine Translation of Japanese Patent Publication No. 11-203079, (Pub Date Jul. 1999).
Machine Translation of Japanese Patent Publication No. 2001-337817, (Pub Date Dec. 2001).
Machine Translation of Japanese Application No. 2000-122952,(Pub Date Apr. 2000).
International Search Report in Application No. PCT/US2002/040058, dated Nov. 3, 2003.
International Preliminary Examination Report in Application No. PCT/US2002/040058, dated Jun. 10, 2004.
International Search Report in Application No. PCT/US01/23651, dated Jun. 3, 2002.
International Search Report in Application No. PCT/US01/29787, dated Jun. 28, 2002.
International Preliminary Examination Report in Application No. PCT/US01/29787, dated Aug. 21, 2002.
International Preliminary Examination Report in Application No. PCT/US01/23651, dated Oct. 10, 2002.
International Search Report in Application No. PCT/US01/45198, dated Apr. 29, 2003.
International Search Report in Application No. PCT/US03/11707, dated Sep. 24, 2003.
International Search Report and Written Opinion in Application No. PCT/US03/11701, dated Oct. 13, 2004.
Written Opinion in Application No. PCT/US01/45198, dated May 31, 2007.
International Preliminary Examination Report in Application No. PCT/US01/45198, dated Apr. 2, 2008.
International Preliminary Report on Patentability (incl. Written Opinion) in Application No. PCT/US2007/088858, dated Jul. 9, 2009.
International Search Report &. Written Opinion in Application No. PCT/US2007/088858, dated May 21, 2008.
Summons to attend Oral Proceedings in counterpart EP Application No. 01973431.8, dated Feb. 2, 2011.
Second Auxiliary Response in EP Application No. 01973431.8, dated Apr. 26, 2011.
Summons to attend oral proceedings in corresponding European Application No. 01955993.9 dated Oct. 31, 2005.
Result of Consultation of Nov. 24, 2005 and Nov. 25, 2005 from corresponding European Application No. 01955993.
Submission in German dated Nov. 25, 2005 from corresponding European Application No. 01955993.9.
Annex to EPO Form 2004 with claims for grant in European Application No. 01955993.9 (Nov. 29, 2005).
Oral Proceeding Minutes in European Application No. 01955993.9, dated Jan. 16, 2006.
Communication dated Apr. 26, 2005 in European Application No. 01955993.9.
Al-Shaer, Ehab, “A dynamic group management framework for large-scale distributed event monitoring” [Online] 2001 [Retrieved on Feb. 5 2014, IEEE/IFIP International Symposium on Integrated Network Management Proceedings, pp. 361-374 [Retrieved from: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=918053].
Notice of allowance from U.S. Appl. No. 13/727,097, mailed Feb. 20, 2014 (59 pages).
IBM Technical Disclosure Bulletin, “Dynamic icon Navigation to Nested Containers”, vol. 34, No. 8, pp. 386-388, Jan. 1992.
Prosecution History of U.S. Pat. No. 8,370,479 (Aug. 18, 2015).
Prosecution history of U.S. Pat. No. 8,769,095 (downloaded Aug. 18, 2015).
Prosecution History of U.S. Pat. No. 8,788,632 (downloaded Aug. 18, 2015).
Prosecution History of U.S. Pat. No. 8,065,397 (downloaded Aug. 18, 2015).
Non Final Office action issued in U.S. Appl. No. 14/317,151 on Sep. 15, 2015 (29 pages).
File History for U.S. Appl. No. 14/317,151 (317 pages), downloaded Apr. 26, 2016.
Third Party Submission for U.S. Appl. No. 14/317,151, mailed Mar. 4, 2015 (20 pages).
Related Publications (1)
Number Date Country
20150074248 A1 Mar 2015 US
Continuations (2)
Number Date Country
Parent 13252357 Oct 2011 US
Child 14335428 US
Parent 11616136 Dec 2006 US
Child 13252357 US