Providing unique views of data based on changes or rules

Information

  • Patent Grant
  • 10229284
  • Patent Number
    10,229,284
  • Date Filed
    Tuesday, August 29, 2017
    6 years ago
  • Date Issued
    Tuesday, March 12, 2019
    5 years ago
Abstract
In one embodiment, a method comprises creating and storing, one or more data objects; wherein a first plurality of the data objects is associated with a base set of data representing data shared across a plurality of users; wherein a second plurality of the data objects is associated with one or more child sets of data, wherein each of the child sets of data represents data local to a project, wherein each of the users is associated with one or more of the child sets of data; wherein each data object is associated to an identifier value and to a version identifier value for a plurality of versions of the data object, wherein each of the versions represents a change to the data object by any of a plurality of users; receiving a request from a first user to view a third plurality of data objects; selecting, based on the base set of data, the particular set of data, the version identifier value for the data objects in the third plurality, and one or more rules associated with the particular set of data and the first user, data objects in the third plurality that can be viewed by the first user; creating a particular data view that includes only the selected data objects; and providing a display of the particular data view to the first user.
Description
FIELD OF THE INVENTION

The present disclosure generally relates to computer data systems.


BACKGROUND

The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section.


Computer-based revisioning database systems store data and provide the ability to track changes in database objects and examine a history of what changes were made, which user made the changes, and when the changes were made. Generally, all users of the revisioning database have the same view of the data. However, conventional revisioning database systems are poorly suited to the needs of certain users, such as intelligence analysts. Intelligence database systems typically store highly sensitive and confidential data that is distributed on a “need to know” basis. Security considerations in intelligence analysis impose restrictions on who can access or receive particular kinds of views of data, but revisioning databases do not typically implement controls on access to views. Intelligence analysts often work on multiple discrete investigations that may draw data from the same centralized revisioning database, but one analyst is not typically allowed to view every investigation, or the data associated with every investigation, or changes made by another analyst, even if the same data is associated with that analyst's own investigations.


Further, distribution of copies of intelligence data is typically restricted, but in conventional revisioning database systems users are permitted to maintain a local mirror copy of at least a portion of the data. The use of a local mirror is not acceptable to the intelligence community. Thus, there is a need for improved ways to distribute selected views of data


Further, changes in intelligence data may be associated with reasons for the changes that are useful to track and display in connection with a change history of the revisioning database. However, conventional revisioning databases do not allow a user to associate change reasons or other annotations with a change history from the database.


SUMMARY

Unique views of data are provided to realms and/or users based on changes to the data or rules. In one embodiment, a method comprises creating and storing, in a revisioning database, one or more data objects; wherein a first plurality of the data objects is associated with a base realm representing data shared across all users of the database; wherein a second plurality of the data objects is associated with one or more child realms, wherein each of the child realms represents data local to a project, wherein each of the users is associated with one or more of the child realms; wherein the revisioning database associates each data object to a realm identifier value and to a version identifier value for a plurality of versions of the data object, wherein each of the versions represents a change to the data object by any of a plurality of users; receiving a request from a first user to view a third plurality of data objects in the revisioning database; selecting, based on the base realm, the particular realm, the version identifier value for the data objects in the third plurality, and one or more rules associated with the particular realm and the first user, data objects in the third plurality that can be viewed by the first user; creating a particular data view that includes only the selected data objects; and providing a display of the particular data view to the first user.


In one embodiment, the selecting comprises selecting all objects of the third plurality that are in the base realm. In another embodiment, the selecting comprises selecting all objects of the third plurality that are in each child realm then currently associated with the first user.


In another embodiment, the method further comprises receiving definitions of one or more rules, wherein each rule specifies whether one or more data objects may be provided to a specified child realm; selecting the data objects in the third plurality based upon the rules as well as the base realm the particular realm, and the version identifier value for the data objects.


Still another embodiment provides for receiving the definitions of the one or more rules from a user, other than the first user, who is associated with realm with which the second plurality of data objects is associated. In another embodiment, the method comprises receiving a request of the first user to subscribe to the data objects in a specified child realm; determining that a change has occurred in at least some of the data objects; selecting the third plurality of data objects based on determining whether the data objects that have changed can be provided to the first user based on the base realm, the particular realm, and the version identifier value for the data objects.


In another embodiment, providing the particular data view to the first user comprises providing only particular rows of the revisioning database to the first user. In an embodiment, the creating and storing comprises creating and storing an object table comprising rows that represent versions of data objects and columns that represent, for each of the versions, an associated realm, a version value, and a pointer to a previous version.


In an embodiment, the method further comprises asynchronously concurrently receiving, from different users, a plurality of changes to one data object, and in response thereto, creating a new row in the object table for each of the changes, wherein realm columns comprise realm identifiers of realms that are then currently associated with the different users.





BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:



FIG. 1 illustrates a revisioning database system;



FIG. 2 illustrates internal organization of a revisioning database;



FIG. 3 illustrates organization of realms and investigations;



FIG. 4A illustrates displaying data from a revisioning database based on realms and rules;



FIG. 4B illustrates operation of a revisioning database system using a publish-subscribe model to provide a virtual private database;



FIG. 4C illustrates determining whether a specified object is part of a view for a particular user and realm;



FIG. 5 illustrates an example top-level graphical user interface display that includes historical displays of changes to a revisioning database;



FIG. 6 illustrates an example Summary View display;



FIG. 7 illustrates a computer system with which an embodiment may be implemented.





DESCRIPTION OF EXAMPLE EMBODIMENTS

In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.


In an embodiment, a revisioning database and a method of using the revisioning database enable showing a unique view of database data to each analyst based on his or her changes to the database data, and to synchronize the view with a central repository of data. In an embodiment, a publish-subscribe model is implemented for distribution of data to analysts. Collaborative use of selected data is possible. For example, an analyst working on a particular intelligence investigation determines a view of data, which may be equivalent to identifying selected rows of an RDBMS table, for publication to other analysts, who can subscribe to the view. A subscribing analyst receives and stores only the published rows or row-equivalents. Unlike prior approaches, subscribers do not maintain a local mirror, and therefore security is increased. Each analyst can only change his/her own data.


In an embodiment, a revisioning database and a method of using the revisioning database enable showing a unique view of database data to a particular analyst among a plurality of analysts based on a set of rules governing what data can be seen by the analyst. In an embodiment, a security rules wizard generates views of the data.


I. Revisioning Database System

The techniques described herein may be used in many different database applications. In an embodiment, a revisioning database system stores data collected in intelligence operations by intelligence analysts or other members of an intelligence community. “Intelligence,” in this context, refers to information about people, places, and events that is useful to a government or military organization in relation to issues of security or defense, and may include information obtained in covert operations or open operations. Other embodiments may be used in fields other than intelligence analysis. In an embodiment, the revisioning database system records metadata about changes to stored data, facilitates UNDO and REDO operations, can receive requests to subscribe to particular data and publish updates to such data for delivery to subscribers, and performs other functions.



FIG. 1 illustrates a revisioning database system. A revisioning database 108 is coupled to application logic 112, which implements the functions described herein for interacting with and using the revisioning database 108 in association with data such as intelligence community data. A user terminal 106 is coupled to front-end logic 130, which is coupled to application logic 112. The user terminal 106 of FIG. 1 broadly represents any host computer of an intelligence analyst, database administrator, or other user who interacts with revisioning database 108 through application logic 112.


One or more other intelligence analysts 102, 104 can access application logic 112 through front-end logic 130 to obtain information from revisioning database 108 and to obtain services of the application logic. The intelligence analysts 102, 104 may be located in discrete security domains and different geographical locations, or may be co-located and/or within the same security domain. Each of the intelligence analysts 102, 104 may access application logic 112 through a host computer that is coupled directly or indirectly through one or more networks, network links, or internetworks to the application logic. User terminal 106 and the host computers of the intelligence analysts 102, 104 may comprise a personal computer, workstation, or other data processing system.


Front-end logic 130 comprises a memory 132 that stores copies of objects from revisioning database 108 for use in front-end operations, and a GUI engine 134 that generates graphical user interface displays for presenting data objects on user terminal 106 or displays of the intelligence analysts 102, 104.


In an embodiment, application logic 112 comprises history window logic 110, publish-subscribe module 118, rules wizard 120, and rules engine 122. History window logic 110 is configured to generate views and displays of historical states of objects in revisioning database 108 and historical states of graphs, comprising nodes representing the objects, which have been displayed by GUI engine 134. Publish-subscribe module 118 comprises logic configured to implement receiving and storing requests of analysts to subscribe to particular data views, detecting updates in data, and generating and sending publications of updated data to subscribers. Rules wizard 120 is configured to permit users to define rules that specify how objects in revisioning database 108 can be accessed and exported, as further described below. Rules engine 122 facilitates controlled publication and viewing of objects from revisioning database 108 based on realms and rules defined using the rules wizard 120.


In an embodiment, export module 114, publish-subscribe module 118, rules wizard 120 and rules engine 122 may be implemented in a single computer program or module or may be integrated into revisioning database 108. Functions of rules wizard 120 may be implemented in whole or in part in front-end logic 130. Thus, the structural separation of functional modules as shown in FIG. 1 is not required and the same functions described herein for such functional modules may be implemented structurally in any other convenient manner.



FIG. 2 illustrates internal organization of a revisioning database with example hypothetical data. In an embodiment, as an overview, revisioning database 108 comprises an object table 202, an event table 204, an investigation table 206, an “App Event” table 208, and a revision table 210. In an embodiment, revisioning database 108 may comprise other tables and functional modules for performing support functions and other functions that are not essential to the invention herein. In an embodiment, object table 202 comprises a plurality of rows that store metadata relating to successive versions of one or more objects that are stored in the revisioning database 108 as such objects undergo operations such as addition to the database, changes, and deletion. Event table 204 comprises a plurality of rows that identify, for a one or more particular database objects, all events that have occurred for that object such as adding the object to the database, updating, and deleting.


In an embodiment, object table 202 and event table 204 implement row-based journaling of object changes to provide a revisioning database useful for intelligence analysis. Further, object table 202 permits associating different versions of data in a database object with different data realms. The use of realms, which are described further below, generally enables controlled and selective publication of data to users associated with different investigations may see only particular data from the revisioning database 108.


A simplified example using the hypothetical data shown in object table 202 and event table 204 of FIG. 2 is now described. In an embodiment used herein to illustrate a clear example, the object table 202 comprises columns identifying a Realm, unique object identifier (ID), Label, Version, Current flag, a Deleted flag, and a Previous Version Pointer; other embodiments may include other columns. Further, in the following description certain numbers and other values are provided as examples, but other data types may be used in other embodiments. An example of row-based journaling of object changes to implement a revisioning database is now described, using a hypothetical scenario involving a user adding one database object, updating the object, and deleting the object.


Based on the first row of object table 202, assume that a particular database object having an ID of 1 and a label of “John” is added to the database. The object is given version 0 since this is the first version of the object that has been operated upon, and in Realm 1 version 0 is the current version and the object is not deleted. The Previous Version Pointer is null since no earlier version of the same object exists. The event of adding the object John to the database is reflected by adding a new row to event table 204. In the first row of event table 204 an event having Event ID 1 indicates that the John object, which has an object identifier of “255002,” had an old version number of Null, new version number of 0, and an Add operation was performed. Successive events receive other unique event identifiers.


Now assume that the same object is updated by changing its label to “J” rather than “John.” The update event is reflected by adding a second row to event table 204 in which a second event having ID 2 specifies that the old version of the John/J object was 0, the new version is 1, and the type of operation was Update. Further, because the John/J object changed, a new row is also added to the object table 202, as indicated in the second row of the object table in which object ID 1 has the new label J at version 1, and is current and not deleted. The Previous Version Pointer of the J object points to the first row of the table containing object version 0, and although FIG. 2 shows a value of “0” in the Previous Version Pointer for clarity, the Previous Version Pointer may be implemented as a pointer object rather than an integer. The Current flag of the first row of the object table 202 is changed, but otherwise the first row is not edited or updated; instead, a new row is added and the Current flags are updated to indicate that the first row is not current and the second row is current.


Next assume that the J object is deleted from the database. The third row of event table 204 reflects a Delete event for the old version 1 of the object and indicates that the new version of the deleted object is 2. A third row is also added to object table 202 and indicates that the J object at version 2 is current but also is deleted, as the Deleted flag is false. The Previous Version Pointer indicates object version 0. The preceding information all applies to Realm 1 as indicated in the first column of object table 202. However, the object table 202 also can maintain separate information for the same object in association with a different realm, such as Realm 4. In this realm, the same object having an ID of 1 is labeled John and is current but not deleted. In cooperation with application logic 112, the separation of realms in object table 202 ensures that a first user who is working on an intelligence investigation that is classified in Realm 1 will see the object with ID 1 as “J”, whereas a second user who is working in Realm 4 will see the same object as “John.”


Thus, each row in the object table 202 has a revision value reflecting a time at which that row was valid and was the current revision. Although the preceding example has focused on object labels, the same mechanisms effectively implement controls on all aspects of object data. Thus, because a database object may comprise any form of stored data such as strings, numbers, links, blobs, and other information, the same controls described herein will enable a first analyst in one realm to see one view of even a complex object whereas a second analyst in another realm sees a different view of the object. Event table 204 tracks all events associated with all objects.


The investigation table 206 comprises information about active intelligence investigations; in an embodiment, a state BLOB object is used to store metadata about an investigation.


In an embodiment, application logic 112 can generate and display a graphical user interface (GUI) that includes a graph of nodes that represent database objects that in turn represent people, places, events and things involved in an investigation. In later sections relating to FIG. 5 and other drawing figures, an example GUI is described. The “App Event” table 208 stores information that can be used to display a graph of database objects or a graphical snapshot of database events. In an embodiment, the “App Event” table 208 stores a list of database events, a string description of a graph of objects in a GUI display, and a graphical snapshot of a display of an object history. For example, when an object is added to the revisioning database 108 and a corresponding node is displayed in a GUI display as part of a graph of nodes representing objects, the “App Event” table 208 is updated with an event representing the addition of the node, and a string description of the changed graph. In an embodiment, the graph is stored as an XML string or blob, and the graphical snapshot is a graphics file such as a JPEG file.


The revision table 210 correlates object revision numbers to application events that uniquely relate to a particular form of a displayed graph of nodes. For the preceding example values of object table 202 and event table 204, the contents of revision table 210 would specify that the user progressed in order as follows: App event 0, object revision 0; App event 1, revision 1; App event 0, revision 2; App event 2, revision 3. Thus, as the “John/J” object progressed among versions 0, 1, 2, and 3, the displayed graph had the form associated with App event 0, 1, back to 0, and then 2. The revision table 210 enables application logic 112 to essentially store a linear version of a revision tree that represents states of the displayed graph, thereby facilitating UNDO and REDO operations for displayed graphs.


In an embodiment, application logic 112 associates information in revisioning database 108 with realms that facilitate controlled viewing of objects and controlled publishing of objects of the database to other analysts and users. FIG. 3 illustrates an example organization of realms. In an embodiment, application logic 112 implements a base realm 302, also termed a repository realm or parent realm and one or more other investigative realms or child realms 1, 2, 3, 5, each of which may be associated with one or more projects such as intelligence investigations. The base realm 302 contains data that is shared among all users of the revisioning database 108. Thus, the base realm may represent information that is available to all people who are involved in a team and need to share information.


In an embodiment, an investigative realm or child realm contains data local to a particular project or investigation. While a user can have many investigations, data that is local to another project or investigation of the same user is not more accessible than data local to another user's project or investigation. Thus realms implement controls on data viewing and distribution, rather than user roles or privileges.


For example, the base realm 302 may be denoted Realm 4 and there may be four other realms denoted Realm 1, Realm 2, Realm 3, and Realm 5 each associated with a particular investigation. In an embodiment, application logic 112 implements functions for creating and defining realms, which intelligence investigations are considered within a particular realm, and which objects of revisioning database 108 are considered within a particular realm. As seen in FIG. 2, each object identified in object table 202 has a realm attribute in a column of the object table. Further, application logic 112 implements functions for defining which analysts or users are associated with a particular realm. Information identifying realms, investigations with realms, and analysts within realms may be stored in one or more tables in database 108 or in memory 132.


In this arrangement, an analyst on Investigation 1 in Realm 1 may publish a set of database events from event table 104 to the base realm, Realm 4. The set of events that are published is dictated by a path through the “App Event” tree according to the revision table 210. A different analyst within Realm 3 can subscribe to events associated with Investigation 1. If the analyst in Realm 3 is permitted to receive information from Investigation 1, based on security clearances of the analyst and controls enforced in the publish-subscribe logic module 118, application logic 112 sends copies of selected data rows for Investigation 1 to the analyst in Realm 3. Thus, analysts do not send data directly among themselves. Instead, each analyst publishes data to the base ream 302, and the publish-subscribe module 118 enforces security controls and rules to determine whether a data object can be provided or exported from the database 1008 to a requesting analyst, as further described below for FIG. 4A and FIG. 4B.


In an embodiment, application logic 112 comprises a rules wizard 120 that enables a user or analyst to define one or more restrictions on database objects, properties, or attributes. For example, an analyst can use rules wizard 120 to define rules under which database objects may be exported to other analysts. As a particular example, a rule can specify that a social security number object cannot be exported. As another example, a rule can specify that when a first analyst is a US citizen, an object can be exported to the first analyst in a database view, but when a second analyst is not a US citizen, the same object cannot be exported to the second analyst. Rules can specify decision trees of arbitrary complexity. Rules can apply to objects as a whole or to particular properties of objects.


Rules defined using rules wizard 120 are applied to current versions of objects in revisioning database 108 when a user is generating a Summary View or exporting an investigation, which are described in the next section. In an embodiment, at the time that a user requests an investigation to be exported, the rules wizard 120 examines the current version of each object in the investigation and determines, whether security controls permit actually exporting that object. When objects are created, the objects may be tagged with object properties that specify minimum required security clearance levels to access the objects. During the export operation, the rules wizard compares the security clearance property to the actual security clearance of a person or location to which the export is directed. In one rule implementation, only an analyst holding a security clearance level equal to or greater than the security clearance level of an object can receive an export of that object. If a security control violation is detected, then the object subject to security control is omitted from the export file. An effect of the mechanism defined herein is that an administrator can define a broad policy for security control that is automatically enforced in the system.


Rules defined using rules wizard 120 also can specify how a particular object may be exported from one realm to another realm; that a particular object must be deleted from the database as it is exported; that a particular object may be exported to an export data file format such as XML, PowerPoint, or other data file format; whether a particular analyst can open a particular investigation and receive a display of particular objects; and that a particular object may not be exported from a server that holds the revisioning database to a front-end display application.


The functional elements, data structures, and techniques described above may be used in many data processing operations applicable to intelligence analysis and other fields. As examples, FIG. 4A illustrates displaying data from a revisioning database based on realms and rules, and FIG. 4B illustrates operation of a revisioning database system using a publish-subscribe model to provide a virtual private database.


Referring first to FIG. 4A, in one embodiment, in step 402 a method comprises creating and storing, in a revisioning database, one or more data objects. In an embodiment, the data objects are subjects of intelligence investigations, events in intelligence investigations, or other data relevant to intelligence investigations. One or more analysts or other users asynchronously dynamically change the data objects or values of properties of the data objects. For example, changes from a first analyst are received at one particular time (step 405A) and changes from a second analyst are received (step 405B) at the same time or any other time. In step 404, the object table and related tables in the revisioning database are updated based on the received changes, using a journaling approach that tracks the history of changes as described above for FIG. 2. Any number of updates may be received and processed. When changes are stored, a realm of the changed object is stored in connection with the object, based on a realm that is then currently associated with the user making the change. As a result, the revisioning database stores data objects, all changes to the data objects, and metadata identifying realms with which the objects are associated at the time of each change.


In step 406, a request is received from a first analyst to view data. The first intelligence analyst is working within a particular investigative realm at the time of the request. Thus, each request to view data includes a realm to which a view of the data is to be delivered. A request may seek access to a different investigative realm for the requesting analyst. A request also may comprise performing an expansion view operation on a presently displayed data object, in which the data object is linked to or associated with other data objects in the current investigative realm or other investigative realms.


In step 408, the method automatically determines, based on the base realm, the first analyst's current realm, rules installed for the current realm, and version information for data objects, which data objects the first analyst can view. Step 408 may comprise retrieving, from the revisioning database 108, information identifying all data objects that are responsive to the user's request and that have realm values matching the current investigative realm, or that are in the base realm. Further, step 408 comprises retrieving or identifying only the current version of each object that is in the base realm of the user's current investigative realm.


Step 408 may be implemented using the table structure of FIG. 2 and logic to read table rows, identify realm values that match the base realm and the user's current investigative realm, and identify the most current version of each data object. In an embodiment, the viewable version of an object with a particular object identifier is determined as shown in FIG. 4C and as follows:

    • a. In step 450, the object table (FIG. 2) is accessed with respect to a specified object identifier for an object of interest.
    • b. If there is a row with that object identifier with current flag set to true, as shown in step 452, then data in that row is used at step 456. Otherwise, the row from the parent realm with the current flag set to true is used, as tested at step 454. If there is no such row, the object is considered not to exist, as shown in step 458.
    • c. The row identified at step 456 is filtered by the rules engine according to the rules defined, as shown in step 460. This may be done in memory or as part of a SQL query to the DBMS. If the row returned passes the rules, as tested at step 462, it is included in the view as shown in step 464, or omitted from the view as in step 466.


Thus, when a user is operating in a particular investigative realm, the user is permitted to view only data objects that are local to the investigative realm, or in the base realm. In the intelligence context, an example of data local to an investigative realm is a note that the user added to a suspect while viewing the suspect, and an example of data in the base realm might be the results of reviewing a large number of documents that were directly loaded into in the base realm, or that were published to the base realm from another investigative realm.


In general, data local to other investigative realms is not accessible as a matter of policy. However, the revisioning database supports the operation of a global search. For instance, one may wish to see if any analysts had created a person named “John Smith” in an investigative realm but had failed to publish him to the base realm.


In step 410, a particular view of the data is created, and the view includes only such data objects as the first analyst is permitted to view based upon the base realm, the first analyst's current investigative realm, and the installed rules. In step 412, a display of the particular view is provided to the first analyst.


Thus, one effect of the method herein is that a revisioning database containing data objects can provide automatic controlled delivery of the data to data analysts based on a hierarchy of realms applied at the object level, rather than user privileges or roles. The view of each analyst is consistent with that analyst's edits to the data objects, and multiple analysts can concurrently receive different views of the same data objects based on separate sets of changes to the data objects. In other embodiments, the same kinds of controls may be applied to receivers of data other than analysts, such as export files, data realms, and other systems and applications.


With one embodiment, implemented using technology from Palantir Technologies, Inc. of Palo Alto, Calif., each analyst experiences a private view of data in the revisioning database 108 from the standpoint of a current investigative realm of that analyst. Each analyst receives an apparently private view of the data in the revisioning database 108, and values of the same data objects may be different across different investigative realms, depending on the changes made in each realm. Unlike prior approaches, the present approach does not require local copies of data on local machines of the analysts and does not involve displaying textual changes to a single set of shared data objects.


Referring now to FIG. 4B, in step 430, a publish-subscribe operation initiates when a first analyst creates data for potential publication to others or viewing by others. The first analyst may tag data with classification levels or other metadata. An administrator may use rules wizard 120 to specify rules about which data objects are allowed to be viewed by other analysts that are within the base realm to which the data objects have been published, as shown at step 431. Thus, the data objects are associated with a particular base realm, while the rules restrict access for a particular analyst.


In step 432, a second analyst subscribes to the base realm. In step 434, the second analyst receives only published rows of the data for an investigation that the second analyst is allowed to receive. In an embodiment, step 434 is implemented by rules engine 122 identifying a triggering event, such as a change in a data object in the investigative realm for the investigation to which the second analyst subscribed. In response, the rules engine 122 determines if the changed data object is within the repository realm 302 or the current investigative realm of the second analyst. If so, the data object or a view of the data in the data object is published to the second analyst in step 434. The rules applied by rules engine 122 are associated with the second analyst who is viewing the data, and serve to restrict access of the second analyst, rather than the first analyst who is publishing the data. For example, the first analyst might tag data as TOP SECRET and the second analyst may have a rule that specifies that the second analyst cannot view data that is TOP SECRET. Thus, rules operate on the data and the properties of the viewing analyst.


Additionally or alternatively, the second analyst performs a global search operation at step 436. In response to the global search operations, application logic 112 or rules engine 122 retrieves data objects that are within other investigative realms 306.


II. Summary View of Data Objects

In an embodiment, application logic 112 implements a summary view function in cooperation with wizard 120. In an embodiment, a Summary View interface enables an analyst to share an investigation, present an investigation to a team leader, or save the investigation for future reference. From the Summary View screen, a user can create a customized report by adding a title and description only for the investigation as a whole and for each individual step. The user can choose both which steps to include or exclude and a format to export the investigation. Exported investigations also automatically adapt to the user's clearance level. Thus, an effect of the approach herein is that a user can share results with anyone without having to worry about security issues.


Using revisioning database 108, application logic 112 saves every action performed by an analyst on database information. In an embodiment, records of such actions can be accessed by a History Window interface (section III herein) and the Summary View interface. The steps of the investigation displayed in the Summary View screen are equivalent to those that are seen in a Temporal view of the History Window as further discussed below. That is, the steps represent all the actions that a user has taken in the investigation, including branches, displayed in the order in which they were performed. Steps are displayed as slides within a graphical user interface. Slides not desired for export can be withheld from the report. Application logic 112 also automatically includes titles and brief descriptions of the action represented by each slide, saving users from the tedious task of entering such information manually. However, a user can edit the provided text. In an embodiment, the final, exported product is a professional presentation in any of several file formats.


For purposes of illustrating an example, assume that a user has successfully completed an investigation and has been asked to present the user's findings to the rest of a team. In an embodiment, application logic 112 exposes functions of export module 114, publish-subscribe module 118, and other functions described herein in a graphical user interface that is generated and provided to user terminal 106 and to host computers of intelligence analysts 102, 104. FIG. 5 illustrates an example top-level graphical user interface display. Screen display 502 comprises a plurality of icons 504 configured to select functions of application logic 112, including a Summary View icon 506 configured to select the Summary View described further herein. A workspace 510 displays one or more object icons 512 that identify persons, places, things, or events that are the subject of an intelligence investigation and that represent data stored in revisioning database 108. In an embodiment, object icons 512 are displayed in a spatially separated topology to facilitate creating links and associations between persons, places, things, and events involved in an investigation. A history display 508 comprises an ordered plurality of slides 508A, 508C, 508N, etc., that represent thumbnail views of past arrangements of the workspace 510. Thus, viewing the history display 508 indicates how the appearance of workspace 510 has changed over time and enables a user to return to a previous state of workspace 510 by selecting a slide from within the history display 508.


When the Summary View icon 506 is selected, in response, application logic generates and provides to user terminal 106 an updated GUI display that includes a summary view. FIG. 6 illustrates an example Summary View display. An investigation overview pane 802 comprises a title input field 604 and a description input field 606. A history slides panel 608 displays thumbnail images 610 of history slides that are candidates to appear in an exported report of an investigation. The history slides panel 608 comprises a summary of steps that occurred in an investigation. Each of the thumbnail images 610 is marked with a include symbol or exclude symbol indicating whether the associated history slide will appear in the report. In an embodiment, the include symbol is “+” and the exclude symbol is “X”. In general, using the Summary View of FIG. 6, a user enters a title and description for the investigation, chooses the most relevant steps for the report with history slides panel 608, and selects a preferred export format using export pane 618. Selecting an export button 620 causes application logic to generate a presentation or report in the specified format.


Upon displaying the history slides panel 608, a user may select a particular step in an investigation. In response, in a Preview panel 612, the application logic 112 displays a snapshot 614 of the selected step, a title 615, and a description 616 of the selected step. FIG. 7 is an enlarged view of the Preview panel. Both the description 616 and the title 615 can be editing by selecting the appropriate box, making the desired changes, and selecting a “Save Changes” button 702. In an embodiment, a user can select a specific step or thumbnail 610 in the History Slides panel and can change the include symbol or exclude symbol to signal whether to include the associated slide in your report.


The user may enter a title in title input field 604 and a description in description input field 606. In an embodiment, a user may select an export format from export panel 618 using a pull-down menu or other graphical user interface widget, and may complete an export operation by selecting an “Export Investigation” button 620. In response, application logic 112 automatically opens the exported investigation in the selected format for viewing and sharing.


III. Example Implementation Hardware


FIG. 7 is a block diagram that illustrates a computer system 1300 upon which an embodiment of the invention may be implemented. Computer system 1300 includes a bus 1302 or other communication mechanism for communicating information, and a processor 1304 coupled with bus 1302 for processing information. Computer system 1300 also includes a main memory 1306, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 1302 for storing information and instructions to be executed by processor 1304. Main memory 1306 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 1304. Computer system 1300 further includes a read only memory (ROM) 1308 or other static storage device coupled to bus 1302 for storing static information and instructions for processor 1304. A storage device 1310, such as a magnetic disk or optical disk, is provided and coupled to bus 1302 for storing information and instructions.


Computer system 1300 may be coupled via bus 1302 to a display 1312, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 1314, including alphanumeric and other keys, is coupled to bus 1302 for communicating information and command selections to processor 1304. Another type of user input device is cursor control 1316, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 1304 and for controlling cursor movement on display 1312. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.


The invention is related to the use of computer system 1300 for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 1300 in response to processor 1304 executing one or more sequences of one or more instructions contained in main memory 1306. Such instructions may be read into main memory 1306 from another machine-readable medium, such as storage device 1310. Execution of the sequences of instructions contained in main memory 1306 causes processor 1304 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.


The term “machine-readable medium” as used herein refers to any medium that participates in providing data that causes a machine to operation in a specific fashion. In an embodiment implemented using computer system 1300, various machine-readable media are involved, for example, in providing instructions to processor 1304 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 1310. Volatile media includes dynamic memory, such as main memory 1306. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 1302. Transmission media can also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine.


Common forms of machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.


Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 1304 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 1300 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector can receive the data carried in the infrared signal and appropriate circuitry can place the data on bus 1302. Bus 1302 carries the data to main memory 1306, from which processor 1304 retrieves and executes the instructions. The instructions received by main memory 1306 may optionally be stored on storage device 1310 either before or after execution by processor 1304.


Computer system 1300 also includes a communication interface 1318 coupled to bus 1302. Communication interface 1318 provides a two-way data communication coupling to a network link 1320 that is connected to a local network 1322. For example, communication interface 1318 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 1318 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 1318 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.


Network link 1320 typically provides data communication through one or more networks to other data devices. For example, network link 1320 may provide a connection through local network 1322 to a host computer 1324 or to data equipment operated by an Internet Service Provider (ISP) 1326. ISP 1326 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the “Internet” 1328. Local network 1322 and Internet 1328 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 1320 and through communication interface 1318, which carry the digital data to and from computer system 1300, are exemplary forms of carrier waves transporting the information.


Computer system 1300 can send messages and receive data, including program code, through the network(s), network link 1320 and communication interface 1318. In the Internet example, a server 1330 might transmit a requested code for an application program through Internet 1328, ISP 1326, local network 1322 and communication interface 1318.


The received code may be executed by processor 1304 as it is received, and/or stored in storage device 1310, or other non-volatile storage for later execution. In this manner, computer system 1300 may obtain application code in the form of a carrier wave.


In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. Thus, the sole and exclusive indicator of what is the invention, and is intended by the applicants to be the invention, is the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. Any definitions expressly set forth herein for terms contained in such claims shall govern the meaning of such terms as used in the claims. Hence, no limitation, element, property, feature, advantage or attribute that is not expressly recited in a claim should limit the scope of such claim in any way. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims
  • 1. A computer-implemented method, comprising: storing by one or more servers a first child set of data, wherein the first child set of data comprises a first plurality of data object versions that are only accessible at the one or more servers to particular computer users that are currently accessing the first child set of data;storing by the one or more servers a base set of data, wherein the base set of data comprises a second plurality of data object versions that are only accessible at the one or more servers to the particular computer users and other computer users that are not currently accessing the first child set of data at the one or more servers;storing by the one or more servers a second child set of data, wherein the second child set of data comprises a third plurality of data object versions that are not accessible at the one or more servers to the particular computer users;receiving by the one or more servers, from a first user that is currently accessing the first child set of data, a server command to send a particular version of a particular data object from the first child set of data to the base set of data;in response to receiving the server command, sending the particular version of the particular data object from the first child set of data to the base set of data;in response to receiving the server command, preventing one or more other versions of the particular data object from the first child set of data from being sent to the base set of data by configuring the one or more servers to deny requests to send one or more other versions of the particular data object from the first child set of data;receiving by the one or more servers, from a second computer user that is currently accessing the second child set of data, a request to access any version of the particular data object that has been sent to the base set of data;in response to the request, and based at least in part on the sending of the particular version of the particular data object to the base set of data, permitting the second user to access the particular version of the particular data object that has been sent to the base set of data by configuring the one or more servers to permit access to the second user to the particular version of the particular data object that has been sent to the base set of data;wherein the method is performed through application logic by one or more computing devices.
  • 2. A method as recited in claim 1, further comprising: receiving by the one or more servers definitions of one or more rules and configuring the one or more servers to process the rules, wherein each rule restricts access for one or more computer users to one or more data objects regardless of which set of data contains the one or more data objects; andwherein permitting the second computer user to access the particular version of the particular data object is based on determining that the one or more rules do not restrict access for the second user to the particular data object as well as being based on the base set of data and a version identifier value for the one or more data objects.
  • 3. A method as recited in claim 1, further comprising: detecting that a change has occurred in the particular data object; andwherein permitting the second computer user to access the particular version of the particular data object is based on determining whether the particular data object can be provided to the second computer user based on the base set of data and a version identifier value for the particular data object.
  • 4. A method as recited in claim 1, wherein permitting the second computer user to access the particular version of the particular data object comprises providing only a selected subset of rows of data to the second computer user.
  • 5. A method as recited in claim 1, further comprising: creating and storing by the one or more servers an object table comprising rows that represent the first plurality of data object versions and the second plurality of data object versions and columns that represent, for each of the first plurality of data object versions and the second plurality of data object versions, an associated set of data, a version value, and a pointer to a previous version, wherein said associated set of data is different from said version value.
  • 6. A method as recited in claim 5, further comprising asynchronously receiving, from different computer users, a plurality of changes to the particular data object, and in response thereto, creating a new row in the object table for each of the changes.
  • 7. A method as recited in claim 1, wherein sending the particular version of the particular data object to the base set of data comprises sending the particular version of the particular data object to the base set of data without sending data directly between the first computer user and the second computer user.
  • 8. A method as recited in claim 1, further comprising: creating and storing one or more data object versions; andwherein each data object version of the one or more data object versions is associated to a version identifier value and to an identifier value for a set of data.
  • 9. A computer-implemented method, comprising: storing by one or more servers a base set of data, wherein the base set of data comprises a first plurality of data object versions that are accessible to one or more computer users of a project set of data and other computer users different from the one or more computer users;storing by the one or more servers the project set of data, wherein the project set of data comprises a second plurality of data object versions that are only accessible through the one or more servers to the one or more computer users of the project set of data;receiving by the one or more servers a first rule definition, wherein the first rule definition restricts access for one or more particular computer users of the one or more computer users of the project set of data to one or more data objects in the project set of data by configuring the one or more servers to restrict access for the one or more particular computer users to the project set of data to the one or more data objects in the project set of data;receiving, by the one or more servers, from a first computer user of the one or more computer users of the project set of data, a request to access any version of a particular data object;based on the base set of data, the project set of data, and the first rule definition, identifying one or more particular versions of the particular data object that the first user can access by configuring the server to identify the one or more particular versions in response to the receiving the request to access any version of a particular data object;generating a view of data on a computer display that includes the one or more particular versions of the particular data object;displaying the view of data on the computer display to the first computer user;wherein the method is performed through application logic by one or more computing devices.
  • 10. A method as recited in claim 9, wherein identifying one or more particular versions of the particular data object that the first computer user can view comprises: identifying all data object versions for the particular data object that are associated with the base set of data or the project set of data.
  • 11. A method as recited in claim 9, wherein identifying one or more particular versions of the particular data object that the first computer user can view further comprises: identifying a most recently modified current version of all data object versions for the particular data object that are associated with the base set of data or the project set of data.
  • 12. A method as recited in claim 9, wherein each data object version of at least one of the first and second plurality of data object versions is associated to a version identifier value and to an identifier value for a set of data.
  • 13. One or more non-transitory computer-readable storage media comprising instructions, which when executed by one or more processors, cause the one or more processors to perform: storing by one or more servers a first child set of data, wherein the first child set of data comprises a first plurality of data object versions that are only visible to particular users that are currently accessing the first child set of data;storing by the one or more servers a base set of data, wherein the base set of data comprises a second plurality of data object versions that are only visible to the particular users and other users that are not currently accessing the first child set of data;storing by the one or more servers a second child set of data, wherein the second child set of data comprises a third plurality of data object versions that are not visible to the particular users;receiving by the one or more servers, from a first computer user that is currently accessing the first child set of data, a command to send a particular version of a particular data object from the first child set of data to the base set of data;in response to the command received by the one or more servers, sending by the one or more servers the particular version of the particular data object from the first child set of data to the base set of data;in response to the command received by the one or more servers, configuring the server to prevent one or more other versions of the particular data object from the first child set of data from being sent to the base set of data;receiving by the one or more servers, from a second computer user that is currently accessing the second child set of data, a request to access any version of the particular data object that has been sent to the base set of data; andin response to the request, and based at least in part on the sending of the particular version of the particular data object to the base set of data, configuring the server to permit the second computer user to access the particular version of the particular data object that has been sent to the base set of data.
  • 14. The one or more non-transitory computer-readable storage media of claim 13, further comprising instructions, which when executed by the one or more processors, cause the one or more processors to perform: receiving definitions of one or more rules by one or more servers, wherein each rule restricts access for one or more computer users to one or more data objects regardless of which set of data contains the one or more data objects; andwherein permitting the second computer user to access the particular version of the particular data object is based on determining by the one or more servers that the one or more rules do not restrict access for the second computer user to the particular data object as well as being based on the base set of data and a version identifier value for the one or more data objects.
  • 15. The one or more non-transitory computer-readable storage media of claim 13, further comprising instructions, which when executed by the one or more processors, cause the one or more processors to perform: detecting at one or more servers that a change has occurred in the particular data object; andwherein permitting the second computer user to access the particular version of the particular data object is based on determining whether the particular data object can be provided to the second computer user based on the base set of data and a version identifier value for the particular data object.
  • 16. The one or more non-transitory computer-readable storage media of claim 13, wherein permitting the second computer user to access the particular version of the particular data object comprises providing only a selected subset of rows of data to the second computer user.
  • 17. The one or more non-transitory computer-readable storage media of claim 13, further comprising instructions, which when executed by the one or more processors, cause the one or more processors to perform: creating and storing by one or more servers an object table comprising rows that represent the first plurality of data object versions and the second plurality of data object versions and columns that represent, for each of the first plurality of data object versions and the second plurality of data object versions, an associated set of data, a version value, and a pointer to a previous version, wherein said associated set of data is different from said version value.
  • 18. The one or more non-transitory computer-readable storage media of claim 17, further comprising instructions, which when executed by the one or more processors, cause the one or more processors to perform: asynchronously receiving at one or more servers, from different users, a plurality of changes to the particular data object, and in response thereto, creating a new row in the object table for each of the changes.
  • 19. The one or more non-transitory computer-readable storage media of claim 13, wherein sending the particular version of the particular data object to the base set of data comprises sending the particular version of the particular data object to the base set of data without sending data directly between the first computer user and the second computer user.
  • 20. The one or more non-transitory computer-readable storage media of claim 13, further comprising instructions, which when executed by the one or more processors, cause the one or more processors to perform: creating and storing by the one or more servers one or more data object versions; andwherein each data object version of the one or more data object versions is associated to a version identifier value and to an identifier value for a set of data.
Parent Case Info

This application claims benefit and priority under 35 U.S.C. § 120 as a Continuation of U.S. patent application Ser. No. 15/438,453, filed Feb. 21, 2017, now U.S. Pat. No. 9,760,733, which is a continuation of U.S. patent application Ser. No. 14/578,389, filed Dec. 20, 2014, now U.S. Pat. No. 9,576,003, which is a continuation of U.S. patent application Ser. No. 11/709,462, filed Feb. 21, 2007, now U.S. Pat. No. 8,930,331, the entire contents of which are hereby incorporated by reference as if fully set forth herein. The applicant(s) hereby rescind any disclaimer of claim scope in the parent application(s) or the prosecution history thereof and advise the USPTO that the claims in this application may be broader than any claim in the parent application(s).

US Referenced Citations (823)
Number Name Date Kind
4881179 Vincent Nov 1989 A
5109399 Thompson Apr 1992 A
5241625 Epard et al. Aug 1993 A
5329108 Lamoure Jul 1994 A
5623659 Shi et al. Apr 1997 A
5632009 Rao et al. May 1997 A
5670987 Doi et al. Sep 1997 A
5724575 Hoover et al. Mar 1998 A
5781704 Rossmo Jul 1998 A
5798769 Chiu et al. Aug 1998 A
5845300 Comer Dec 1998 A
5872973 Mitchell et al. Feb 1999 A
5897636 Kaeser Apr 1999 A
5999911 Berg et al. Dec 1999 A
6057757 Arrowsmith et al. May 2000 A
6065026 Cornelia et al. May 2000 A
6073129 Levine et al. Jun 2000 A
6091956 Hollenberg Jul 2000 A
6094653 Li et al. Jul 2000 A
6101479 Shaw Aug 2000 A
6161098 Wallman Dec 2000 A
6219053 Tachibana et al. Apr 2001 B1
6232971 Haynes May 2001 B1
6237138 Hameluck et al. May 2001 B1
6243706 Moreau et al. Jun 2001 B1
6243717 Gordon Jun 2001 B1
6247019 Davies Jun 2001 B1
6279018 Kudrolli et al. Aug 2001 B1
6304873 Klein et al. Oct 2001 B1
6341310 Leshem et al. Jan 2002 B1
6366933 Ball et al. Apr 2002 B1
6369835 Lin Apr 2002 B1
6370538 Lamping et al. Apr 2002 B1
6418438 Campbell Jul 2002 B1
6430305 Decker Aug 2002 B1
6456997 Shukla Sep 2002 B1
6510504 Satyanarayana Jan 2003 B2
6523019 Borthwick Feb 2003 B1
6549752 Tsukamoto Apr 2003 B2
6549944 Weinberg et al. Apr 2003 B1
6560620 Ching May 2003 B1
6574635 Stauber et al. Jun 2003 B2
6581068 Bensoussan et al. Jun 2003 B1
6594672 Lampson et al. Jul 2003 B1
6631496 Li et al. Oct 2003 B1
6642945 Sharpe Nov 2003 B1
6665683 Meltzer Dec 2003 B1
6674434 Chojnacki et al. Jan 2004 B1
6714936 Nevin, III Mar 2004 B1
6745382 Zothner Jun 2004 B1
6775675 Nwabueze et al. Aug 2004 B1
6820135 Dingman Nov 2004 B1
6828920 Owen et al. Dec 2004 B2
6839745 Dingari et al. Jan 2005 B1
6850317 Mullins et al. Feb 2005 B2
6877137 Rivette et al. Apr 2005 B1
6889210 Vainstein May 2005 B1
6944777 Belani et al. Sep 2005 B1
6944821 Bates et al. Sep 2005 B1
6967589 Peters Nov 2005 B1
6976210 Silva et al. Dec 2005 B1
6978419 Kantrowitz Dec 2005 B1
6980984 Huffman et al. Dec 2005 B1
6985950 Hanson et al. Jan 2006 B1
7036085 Barros Apr 2006 B2
7043702 Chi et al. May 2006 B2
7055110 Kupka et al. May 2006 B2
7058648 Lightfoot et al. Jun 2006 B1
7086028 Davis et al. Aug 2006 B1
7111231 Huck et al. Sep 2006 B1
7139800 Bellotti et al. Nov 2006 B2
7158878 Rasmussen et al. Jan 2007 B2
7162475 Ackerman Jan 2007 B2
7168039 Bertram Jan 2007 B2
7171427 Witowski et al. Jan 2007 B2
7174377 Bernard et al. Feb 2007 B2
7194680 Roy et al. Mar 2007 B1
7213030 Jenkins May 2007 B1
7269786 Malloy et al. Sep 2007 B1
7278105 Kitts Oct 2007 B1
7290698 Poslinski et al. Nov 2007 B2
7333998 Heckerman et al. Feb 2008 B2
7370047 Gorman May 2008 B2
7379811 Rasmussen et al. May 2008 B2
7379903 Caballero et al. May 2008 B2
7392254 Jenkins Jun 2008 B1
7426654 Adams et al. Sep 2008 B2
7440978 Chan et al. Oct 2008 B2
7441182 Beilinson et al. Oct 2008 B2
7441219 Perry et al. Oct 2008 B2
7454466 Bellotti et al. Nov 2008 B2
7461158 Rider Dec 2008 B2
7467375 Tondreau et al. Dec 2008 B2
7487139 Fraleigh et al. Feb 2009 B2
7502786 Liu et al. Mar 2009 B2
7525422 Bishop et al. Apr 2009 B2
7529727 Arning et al. May 2009 B2
7529734 Dirisala May 2009 B2
7558677 Jones Jul 2009 B2
7574409 Patinkin Aug 2009 B2
7574428 Leiserowitz et al. Aug 2009 B2
7579965 Bucholz Aug 2009 B2
7596285 Brown et al. Sep 2009 B2
7614006 Molander Nov 2009 B2
7617232 Gabbert et al. Nov 2009 B2
7620628 Kapur et al. Nov 2009 B2
7627812 Chamberlain et al. Dec 2009 B2
7634455 Keene et al. Dec 2009 B1
7634717 Chamberlain et al. Dec 2009 B2
7685109 Ransil et al. Mar 2010 B1
7703021 Flam Apr 2010 B1
7706817 Bamrah et al. Apr 2010 B2
7712049 Williams et al. May 2010 B2
7716077 Mikurak May 2010 B1
7716140 Nielsen et al. May 2010 B1
7725530 Sah et al. May 2010 B2
7725547 Albertson et al. May 2010 B2
7725728 Ama et al. May 2010 B2
7730082 Sah et al. Jun 2010 B2
7730109 Rohrs et al. Jun 2010 B2
7761407 Stern Jul 2010 B1
7765489 Shah Jul 2010 B1
7770100 Chamberlain et al. Aug 2010 B2
7802305 Leeds Sep 2010 B1
7805457 Viola et al. Sep 2010 B1
7809703 Balabhadrapatruni et al. Oct 2010 B2
7814084 Hallett et al. Oct 2010 B2
7814085 Pfleger et al. Oct 2010 B1
7818658 Chen Oct 2010 B2
7870493 Pall et al. Jan 2011 B2
7877421 Berger et al. Jan 2011 B2
7880921 Dattilo et al. Feb 2011 B2
7894984 Rasmussen et al. Feb 2011 B2
7899611 Downs et al. Mar 2011 B2
7917376 Bellin et al. Mar 2011 B2
7920963 Jouline et al. Apr 2011 B2
7933862 Chamberlain et al. Apr 2011 B2
7941336 Robin-Jan May 2011 B1
7958147 Turner et al. Jun 2011 B1
7962281 Rasmussen et al. Jun 2011 B2
7962495 Jain et al. Jun 2011 B2
7962848 Bertram Jun 2011 B2
7966199 Frasher Jun 2011 B1
7970240 Chao et al. Jun 2011 B1
7971150 Raskutti et al. Jun 2011 B2
7984374 Caro et al. Jul 2011 B2
8001465 Kudrolli et al. Aug 2011 B2
8001482 Bhattiprolu et al. Aug 2011 B2
8010507 Poston et al. Aug 2011 B2
8010545 Stefik et al. Aug 2011 B2
8015487 Roy et al. Sep 2011 B2
8024778 Cash et al. Sep 2011 B2
8036632 Cona et al. Oct 2011 B1
8041714 Aymeloglu et al. Oct 2011 B2
8073857 Sreekanth Dec 2011 B2
8103543 Zwicky Jan 2012 B1
8112425 Baum et al. Feb 2012 B2
8126848 Wagner Feb 2012 B2
8134457 Velipasalar et al. Mar 2012 B2
8145703 Frishert et al. Mar 2012 B2
8185819 Sah et al. May 2012 B2
8191005 Baier et al. May 2012 B2
8214361 Sandler et al. Jul 2012 B1
8214764 Gemmell et al. Jul 2012 B2
8225201 Michael Jul 2012 B2
8229902 Vishniac et al. Jul 2012 B2
8229947 Fujinaga Jul 2012 B2
8230333 Decherd et al. Jul 2012 B2
8271461 Pike et al. Sep 2012 B2
8280880 Aymeloglu et al. Oct 2012 B1
8290838 Thakur et al. Oct 2012 B1
8290926 Ozzie et al. Oct 2012 B2
8290942 Jones et al. Oct 2012 B2
8301464 Cave et al. Oct 2012 B1
8301904 Gryaznov Oct 2012 B1
8302855 Ma et al. Nov 2012 B2
8312367 Foster Nov 2012 B2
8312546 Alme Nov 2012 B2
8352881 Champion et al. Jan 2013 B2
8368695 Howell et al. Feb 2013 B2
8392556 Goulet et al. Mar 2013 B2
8397171 Klassen et al. Mar 2013 B2
8412707 Mianji Apr 2013 B1
8447722 Ahuja et al. May 2013 B1
8452790 Mianji May 2013 B1
8463036 Ramesh et al. Jun 2013 B1
8489331 Kopf et al. Jul 2013 B2
8489641 Seefeld et al. Jul 2013 B1
8498984 Hwang et al. Jul 2013 B1
8504542 Chang et al. Aug 2013 B2
8510743 Hackborn et al. Aug 2013 B2
8514082 Cova et al. Aug 2013 B2
8515207 Chau Aug 2013 B2
8527949 Pleis et al. Sep 2013 B1
8554579 Tribble et al. Oct 2013 B2
8554653 Falkenborg et al. Oct 2013 B2
8554709 Goodson et al. Oct 2013 B2
8555403 Kilday Oct 2013 B1
8560413 Quarterman Oct 2013 B1
8577911 Stepinski et al. Nov 2013 B1
8589273 Creeden et al. Nov 2013 B2
8595234 Siripuapu et al. Nov 2013 B2
8620641 Farnsworth et al. Dec 2013 B2
8639757 Zang et al. Jan 2014 B1
8646080 Williamson et al. Feb 2014 B2
8676857 Adams et al. Mar 2014 B1
8682696 Shanmugam Mar 2014 B1
8688573 Ruknoic et al. Apr 2014 B1
8689108 Duffield et al. Apr 2014 B1
8713467 Goldenberg et al. Apr 2014 B1
8726379 Stiansen et al. May 2014 B1
8732574 Burr et al. May 2014 B2
8739278 Varghese May 2014 B2
8742934 Sarpy et al. Jun 2014 B1
8744890 Bernier Jun 2014 B1
8745516 Mason et al. Jun 2014 B2
8781169 Jackson et al. Jul 2014 B2
8787939 Papakipos et al. Jul 2014 B2
8788407 Singh et al. Jul 2014 B1
8799313 Satlow Aug 2014 B2
8799799 Cervelli et al. Aug 2014 B1
8807948 Luo et al. Aug 2014 B2
8812960 Sun et al. Aug 2014 B1
8830322 Nerayoff et al. Sep 2014 B2
8832594 Thompson et al. Sep 2014 B1
8868537 Colgrove et al. Oct 2014 B1
8917274 Ma et al. Dec 2014 B2
8924872 Bogomolov et al. Dec 2014 B1
8930331 McGrew et al. Jan 2015 B2
8930874 Duff et al. Jan 2015 B2
8937619 Sharma et al. Jan 2015 B2
8938686 Erenrich et al. Jan 2015 B1
8954410 Chang et al. Feb 2015 B2
8984390 Aymeloglu et al. Mar 2015 B2
9009171 Grossman et al. Apr 2015 B1
9009827 Albertson et al. Apr 2015 B1
9021260 Falk et al. Apr 2015 B1
9021384 Beard et al. Apr 2015 B1
9043696 Meiklejohn et al. May 2015 B1
9043894 Dennison et al. May 2015 B1
9058315 Burr et al. Jun 2015 B2
9092482 Harris et al. Jul 2015 B2
9116975 Shankar et al. Aug 2015 B2
9165100 Begur et al. Oct 2015 B2
9208159 Stowe et al. Dec 2015 B2
9230280 Maag et al. Jan 2016 B1
9280532 Cicerone Mar 2016 B2
9286373 Elliot et al. Mar 2016 B2
9348880 Kramer et al. May 2016 B1
9383911 Aymeloglu et al. Jul 2016 B2
9542446 Duffield et al. Jan 2017 B1
9576003 McGrew et al. Feb 2017 B2
9639578 Stowe et al. May 2017 B2
20010021936 Bertram Sep 2001 A1
20010051949 Carey et al. Dec 2001 A1
20010056522 Satyanarayana Dec 2001 A1
20020032677 Morgenthaler et al. Mar 2002 A1
20020033848 Sciammarella et al. Mar 2002 A1
20020065708 Senay et al. May 2002 A1
20020091694 Senay et al. Jul 2002 A1
20020091707 Hrle et al. Jul 2002 A1
20020095360 Keller Jul 2002 A1
20020095416 Joao Jul 2002 A1
20020095658 Schwols Jul 2002 A1
20020103705 Shulman Aug 2002 A1
20020116120 Brady Aug 2002 A1
20020174201 Ruiz et al. Nov 2002 A1
20020184517 Tadayon Dec 2002 A1
20020188638 Ramer et al. Dec 2002 A1
20020194119 Wright et al. Dec 2002 A1
20020196229 Chen et al. Dec 2002 A1
20030028560 Kudrolli et al. Feb 2003 A1
20030036927 Bowen Feb 2003 A1
20030039948 Donahue Feb 2003 A1
20030050976 Block Mar 2003 A1
20030061132 Mason et al. Mar 2003 A1
20030093755 O'Carroll May 2003 A1
20030105759 Bess et al. Jun 2003 A1
20030110397 Supramaniam Jun 2003 A1
20030115481 Baird et al. Jun 2003 A1
20030120675 Stauber et al. Jun 2003 A1
20030126102 Borthwick Jul 2003 A1
20030130993 Mendelevitch et al. Jul 2003 A1
20030140106 Raguseo Jul 2003 A1
20030144868 MacIntyre et al. Jul 2003 A1
20030154381 Ouye Aug 2003 A1
20030163352 Surpin et al. Aug 2003 A1
20030196108 Kung Oct 2003 A1
20030212718 Tester Nov 2003 A1
20030225755 Iwayama et al. Dec 2003 A1
20030229848 Arend et al. Dec 2003 A1
20040032432 Baynger Feb 2004 A1
20040034570 Davis Feb 2004 A1
20040044648 Anfindsen et al. Mar 2004 A1
20040049395 Gaya Mar 2004 A1
20040064256 Barinek et al. Apr 2004 A1
20040085318 Hassler et al. May 2004 A1
20040095349 Bito et al. May 2004 A1
20040111410 Burgoon et al. Jun 2004 A1
20040117345 Bamford et al. Jun 2004 A1
20040117387 Civetta et al. Jun 2004 A1
20040126840 Cheng et al. Jul 2004 A1
20040143602 Ruiz et al. Jul 2004 A1
20040143796 Lerner et al. Jul 2004 A1
20040148301 McKay et al. Jul 2004 A1
20040163039 Gorman Aug 2004 A1
20040193600 Kaasten et al. Sep 2004 A1
20040205492 Newsome Oct 2004 A1
20040215649 Whalen et al. Oct 2004 A1
20040221223 Yu et al. Nov 2004 A1
20040236688 Bozeman Nov 2004 A1
20040236711 Nixon et al. Nov 2004 A1
20040254934 Ho Dec 2004 A1
20040260702 Cragun et al. Dec 2004 A1
20040267746 Marcjan et al. Dec 2004 A1
20050010472 Quatse et al. Jan 2005 A1
20050021980 Kanai Jan 2005 A1
20050027705 Sadri et al. Feb 2005 A1
20050028094 Allyn Feb 2005 A1
20050039116 Slack-Smith Feb 2005 A1
20050039119 Parks et al. Feb 2005 A1
20050065811 Chu et al. Mar 2005 A1
20050080769 Gemmell Apr 2005 A1
20050086207 Heuer et al. Apr 2005 A1
20050091186 Elish Apr 2005 A1
20050097441 Herbach May 2005 A1
20050097482 Hanson et al. May 2005 A1
20050108231 Findleton et al. May 2005 A1
20050114763 Nonomura et al. May 2005 A1
20050125715 Di Franco et al. Jun 2005 A1
20050131964 Saxena Jun 2005 A1
20050162523 Darrell et al. Jul 2005 A1
20050166144 Gross Jul 2005 A1
20050180330 Shapiro Aug 2005 A1
20050182793 Keenan et al. Aug 2005 A1
20050183005 Denoue et al. Aug 2005 A1
20050210409 Jou Sep 2005 A1
20050246327 Yeung et al. Nov 2005 A1
20050251786 Citron et al. Nov 2005 A1
20050288939 Peled Dec 2005 A1
20050289524 McGinnes Dec 2005 A1
20060026120 Carolan et al. Feb 2006 A1
20060026170 Kreitler et al. Feb 2006 A1
20060026561 Bauman et al. Feb 2006 A1
20060031779 Theurer et al. Feb 2006 A1
20060045470 Poslinski et al. Mar 2006 A1
20060053097 King et al. Mar 2006 A1
20060053170 Hill et al. Mar 2006 A1
20060059139 Robinson Mar 2006 A1
20060059423 Lehmann et al. Mar 2006 A1
20060062426 Levy et al. Mar 2006 A1
20060074866 Chamberlain et al. Apr 2006 A1
20060074881 Vembu et al. Apr 2006 A1
20060080139 Mainzer Apr 2006 A1
20060080316 Gilmore Apr 2006 A1
20060080619 Carlson et al. Apr 2006 A1
20060093222 Saffer et al. May 2006 A1
20060095521 Patinkin May 2006 A1
20060106847 Eckardt et al. May 2006 A1
20060116991 Calderwood Jun 2006 A1
20060129746 Porter Jun 2006 A1
20060136513 Ngo et al. Jun 2006 A1
20060139375 Rasmussen et al. Jun 2006 A1
20060142949 Helt Jun 2006 A1
20060143034 Rothermel Jun 2006 A1
20060143075 Carr et al. Jun 2006 A1
20060149596 Surpin et al. Jul 2006 A1
20060155654 Plessis et al. Jul 2006 A1
20060161558 Tamma et al. Jul 2006 A1
20060178915 Chao Aug 2006 A1
20060203337 White Sep 2006 A1
20060218149 Patrick Sep 2006 A1
20060218206 Bourbonnais et al. Sep 2006 A1
20060218405 Ama et al. Sep 2006 A1
20060218491 Grossman et al. Sep 2006 A1
20060218637 Thomas et al. Sep 2006 A1
20060241974 Chao et al. Oct 2006 A1
20060242040 Rader Oct 2006 A1
20060242630 Koike et al. Oct 2006 A1
20060248083 Sack Nov 2006 A1
20060248084 Sack et al. Nov 2006 A1
20060253502 Raman et al. Nov 2006 A1
20060265397 Bryan et al. Nov 2006 A1
20060265417 Amato et al. Nov 2006 A1
20060265758 Khandelwal Nov 2006 A1
20060271277 Hu et al. Nov 2006 A1
20060277460 Forstall et al. Dec 2006 A1
20060279630 Aggarwal et al. Dec 2006 A1
20060288056 Yamakawa et al. Dec 2006 A1
20070000999 Kubo et al. Jan 2007 A1
20070011150 Frank Jan 2007 A1
20070016363 Huang et al. Jan 2007 A1
20070018986 Hauser Jan 2007 A1
20070038646 Thota Feb 2007 A1
20070038962 Fuchs et al. Feb 2007 A1
20070043686 Teng et al. Feb 2007 A1
20070050429 Goldring et al. Mar 2007 A1
20070056034 Fernstrom Mar 2007 A1
20070057966 Ohno et al. Mar 2007 A1
20070061487 Moore et al. Mar 2007 A1
20070061752 Cory Mar 2007 A1
20070078832 Ott et al. Apr 2007 A1
20070083541 Fraleigh et al. Apr 2007 A1
20070094389 Nussey et al. Apr 2007 A1
20070094594 Matichuk Apr 2007 A1
20070113164 Hansen et al. May 2007 A1
20070136095 Weinstein Jun 2007 A1
20070143253 Kostamaa et al. Jun 2007 A1
20070150369 Zivin Jun 2007 A1
20070168292 Jogand-Coulomb et al. Jul 2007 A1
20070168871 Jenkins Jul 2007 A1
20070174760 Chamberlain et al. Jul 2007 A1
20070185850 Walters et al. Aug 2007 A1
20070192265 Chopin et al. Aug 2007 A1
20070198571 Ferguson et al. Aug 2007 A1
20070208497 Downs et al. Sep 2007 A1
20070208498 Barker et al. Sep 2007 A1
20070208736 Tanigawa et al. Sep 2007 A1
20070233709 Abnous Oct 2007 A1
20070233756 D'Souza et al. Oct 2007 A1
20070240062 Christena et al. Oct 2007 A1
20070245339 Bauman et al. Oct 2007 A1
20070260648 Friesenhahn Nov 2007 A1
20070266336 Nojima et al. Nov 2007 A1
20070271212 Jones et al. Nov 2007 A1
20070271317 Carmel Nov 2007 A1
20070284433 Domenica et al. Dec 2007 A1
20070294643 Kyle Dec 2007 A1
20070299697 Friedlander et al. Dec 2007 A1
20080015970 Brookfield et al. Jan 2008 A1
20080016155 Khalatian Jan 2008 A1
20080040684 Crump Feb 2008 A1
20080051989 Welsh Feb 2008 A1
20080052142 Bailey et al. Feb 2008 A1
20080077597 Butler Mar 2008 A1
20080077642 Carbone et al. Mar 2008 A1
20080082486 Lermant et al. Apr 2008 A1
20080091693 Murthy Apr 2008 A1
20080104019 Nath May 2008 A1
20080104060 Abhyankar et al. May 2008 A1
20080104141 McMahon May 2008 A1
20080109714 Kumar et al. May 2008 A1
20080126951 Sood et al. May 2008 A1
20080148398 Mezack et al. Jun 2008 A1
20080155440 Trevor et al. Jun 2008 A1
20080162616 Gross et al. Jul 2008 A1
20080172607 Baer Jul 2008 A1
20080177782 Poston et al. Jul 2008 A1
20080186904 Koyama et al. Aug 2008 A1
20080195417 Surpin et al. Aug 2008 A1
20080195608 Clover Aug 2008 A1
20080195672 Hamel et al. Aug 2008 A1
20080201339 McGrew Aug 2008 A1
20080215546 Baum et al. Sep 2008 A1
20080222295 Robinson et al. Sep 2008 A1
20080249820 Pathria Oct 2008 A1
20080255973 El Wade et al. Oct 2008 A1
20080263468 Cappione et al. Oct 2008 A1
20080267107 Rosenberg Oct 2008 A1
20080270316 Guidotti et al. Oct 2008 A1
20080276167 Michael Nov 2008 A1
20080278311 Grange et al. Nov 2008 A1
20080288306 MacIntyre et al. Nov 2008 A1
20080301378 Carrie Dec 2008 A1
20080301643 Appleton et al. Dec 2008 A1
20080313132 Hao et al. Dec 2008 A1
20080313243 Poston et al. Dec 2008 A1
20090002492 Velipasalar et al. Jan 2009 A1
20090027418 Maru et al. Jan 2009 A1
20090030915 Winter et al. Jan 2009 A1
20090031247 Walter et al. Jan 2009 A1
20090031401 Cudich et al. Jan 2009 A1
20090037417 Shankar et al. Feb 2009 A1
20090043801 LeClair Feb 2009 A1
20090055251 Shah et al. Feb 2009 A1
20090088964 Schaaf et al. Apr 2009 A1
20090089651 Herberger et al. Apr 2009 A1
20090106178 Chu Apr 2009 A1
20090106308 Killian et al. Apr 2009 A1
20090112678 Luzardo Apr 2009 A1
20090112745 Stefanescu Apr 2009 A1
20090119309 Gibson et al. May 2009 A1
20090125359 Knapic May 2009 A1
20090125369 Kloosstra et al. May 2009 A1
20090125459 Norton et al. May 2009 A1
20090132921 Hwangbo et al. May 2009 A1
20090132953 Reed et al. May 2009 A1
20090143052 Bates et al. Jun 2009 A1
20090144262 White et al. Jun 2009 A1
20090144274 Fraleigh et al. Jun 2009 A1
20090150868 Chakra et al. Jun 2009 A1
20090164387 Armstrong et al. Jun 2009 A1
20090164934 Bhattiprolu et al. Jun 2009 A1
20090171939 Athsani et al. Jul 2009 A1
20090172511 Decherd et al. Jul 2009 A1
20090172669 Bobak et al. Jul 2009 A1
20090172821 Daira et al. Jul 2009 A1
20090177962 Gusmorino et al. Jul 2009 A1
20090179892 Tsuda et al. Jul 2009 A1
20090187464 Bai et al. Jul 2009 A1
20090187546 Whyte et al. Jul 2009 A1
20090199106 Jonsson et al. Aug 2009 A1
20090216562 Faulkner et al. Aug 2009 A1
20090222400 Kupershmidt et al. Sep 2009 A1
20090222759 Drieschner Sep 2009 A1
20090222760 Halverson et al. Sep 2009 A1
20090234720 George et al. Sep 2009 A1
20090240664 Dinker et al. Sep 2009 A1
20090248757 Havewala et al. Oct 2009 A1
20090249178 Ambrosino et al. Oct 2009 A1
20090249244 Robinson et al. Oct 2009 A1
20090254970 Agarwal et al. Oct 2009 A1
20090254971 Herz Oct 2009 A1
20090271343 Vaiciulis et al. Oct 2009 A1
20090271435 Yako et al. Oct 2009 A1
20090281839 Lynn et al. Nov 2009 A1
20090282068 Shockro et al. Nov 2009 A1
20090287470 Farnsworth et al. Nov 2009 A1
20090292626 Oxford Nov 2009 A1
20090307049 Elliott et al. Dec 2009 A1
20090313223 Rantanen Dec 2009 A1
20090313311 Hoffmann et al. Dec 2009 A1
20090313463 Pang et al. Dec 2009 A1
20090319891 MacKinlay Dec 2009 A1
20100011282 Dollard et al. Jan 2010 A1
20100036831 Vemuri et al. Feb 2010 A1
20100042922 Bradateanu et al. Feb 2010 A1
20100057622 Faith et al. Mar 2010 A1
20100057716 Stefik et al. Mar 2010 A1
20100070489 Aymeloglu et al. Mar 2010 A1
20100070523 Delgo et al. Mar 2010 A1
20100070842 Aymeloglu et al. Mar 2010 A1
20100070844 Aymeloglu et al. Mar 2010 A1
20100070845 Facemire et al. Mar 2010 A1
20100070897 Aymeloglu et al. Mar 2010 A1
20100076813 Ghosh et al. Mar 2010 A1
20100076939 Iwaki et al. Mar 2010 A1
20100082541 Kottomtharayil Apr 2010 A1
20100098318 Anderson Apr 2010 A1
20100100963 Mahaffey Apr 2010 A1
20100103124 Kruzeniski et al. Apr 2010 A1
20100114817 Broeder et al. May 2010 A1
20100114831 Gilbert et al. May 2010 A1
20100114887 Conway et al. May 2010 A1
20100122152 Chamberlain et al. May 2010 A1
20100131457 Heimendinger May 2010 A1
20100138842 Balko et al. Jun 2010 A1
20100145909 Ngo Jun 2010 A1
20100161565 Lee et al. Jun 2010 A1
20100161688 Kesselman et al. Jun 2010 A1
20100162176 Dunton Jun 2010 A1
20100173619 Hua et al. Jul 2010 A1
20100191563 Schlaifer et al. Jul 2010 A1
20100191884 Holenstein et al. Jul 2010 A1
20100198684 Eraker et al. Aug 2010 A1
20100199225 Coleman et al. Aug 2010 A1
20100211550 Daniello et al. Aug 2010 A1
20100211618 Anderson et al. Aug 2010 A1
20100223260 Wu Sep 2010 A1
20100228812 Uomini Sep 2010 A1
20100235606 Oreland et al. Sep 2010 A1
20100238174 Haub et al. Sep 2010 A1
20100250412 Wagner Sep 2010 A1
20100262901 DiSalvo Oct 2010 A1
20100280851 Merkin Nov 2010 A1
20100280857 Liu et al. Nov 2010 A1
20100283787 Hamedi et al. Nov 2010 A1
20100293174 Bennett et al. Nov 2010 A1
20100306713 Geisner et al. Dec 2010 A1
20100306722 LeHoty et al. Dec 2010 A1
20100313119 Baldwin et al. Dec 2010 A1
20100313239 Chakra et al. Dec 2010 A1
20100318838 Katano et al. Dec 2010 A1
20100318924 Frankel et al. Dec 2010 A1
20100321399 Ellren et al. Dec 2010 A1
20100325526 Ellis et al. Dec 2010 A1
20100325581 Finkelstein et al. Dec 2010 A1
20100330801 Rouh Dec 2010 A1
20110029498 Ferguson et al. Feb 2011 A1
20110029526 Knight et al. Feb 2011 A1
20110047159 Baid et al. Feb 2011 A1
20110047540 Williams et al. Feb 2011 A1
20110060753 Shaked et al. Mar 2011 A1
20110061013 Bilicki et al. Mar 2011 A1
20110066933 Ludwig Mar 2011 A1
20110074788 Regan et al. Mar 2011 A1
20110074811 Hanson et al. Mar 2011 A1
20110078055 Faribault et al. Mar 2011 A1
20110078173 Seligmann et al. Mar 2011 A1
20110093327 Fordyce, III et al. Apr 2011 A1
20110099133 Chang et al. Apr 2011 A1
20110106795 Maim May 2011 A1
20110107196 Foster May 2011 A1
20110117878 Barash et al. May 2011 A1
20110119100 Ruhl et al. May 2011 A1
20110137766 Rasmussen et al. Jun 2011 A1
20110153384 Horne et al. Jun 2011 A1
20110153592 DeMarcken Jun 2011 A1
20110161096 Buehler et al. Jun 2011 A1
20110161132 Goel et al. Jun 2011 A1
20110161409 Nair Jun 2011 A1
20110167105 Ramakrishnan et al. Jul 2011 A1
20110170799 Carrino et al. Jul 2011 A1
20110173032 Payne et al. Jul 2011 A1
20110173093 Psota et al. Jul 2011 A1
20110173619 Fish Jul 2011 A1
20110179048 Satlow Jul 2011 A1
20110184813 Barne et al. Jul 2011 A1
20110185316 Reid et al. Jul 2011 A1
20110208565 Ross et al. Aug 2011 A1
20110208724 Jones et al. Aug 2011 A1
20110213655 Henkin Sep 2011 A1
20110218934 Elser Sep 2011 A1
20110219450 McDougal et al. Sep 2011 A1
20110225198 Edwards et al. Sep 2011 A1
20110225482 Chan et al. Sep 2011 A1
20110238495 Kang Sep 2011 A1
20110238553 Raj et al. Sep 2011 A1
20110251951 Kolkowtiz Oct 2011 A1
20110258158 Resende et al. Oct 2011 A1
20110258242 Eidson et al. Oct 2011 A1
20110270705 Parker Nov 2011 A1
20110270812 Ruby Nov 2011 A1
20110289397 Eastmond et al. Nov 2011 A1
20110289407 Naik et al. Nov 2011 A1
20110289420 Morioka et al. Nov 2011 A1
20110291851 Whisenant Dec 2011 A1
20110310005 Chen et al. Dec 2011 A1
20110314007 Dassa et al. Dec 2011 A1
20120004894 Butler Jan 2012 A1
20120013684 Robertson et al. Jan 2012 A1
20120019559 Siler et al. Jan 2012 A1
20120022945 Falkenborg et al. Jan 2012 A1
20120036013 Neuhaus et al. Feb 2012 A1
20120036434 Oberstein Feb 2012 A1
20120050293 Carlhian et al. Mar 2012 A1
20120059853 Jagota Mar 2012 A1
20120065987 Farooq et al. Mar 2012 A1
20120066296 Appleton et al. Mar 2012 A1
20120072825 Sherkin et al. Mar 2012 A1
20120079363 Folting et al. Mar 2012 A1
20120084117 Tavares et al. Apr 2012 A1
20120084118 Bai et al. Apr 2012 A1
20120084184 Raleigh Apr 2012 A1
20120106801 Jackson May 2012 A1
20120117082 Koperda et al. May 2012 A1
20120123989 Yu et al. May 2012 A1
20120124179 Cappio et al. May 2012 A1
20120131512 Takeuchi et al. May 2012 A1
20120136804 Lucia May 2012 A1
20120137235 TS et al. May 2012 A1
20120144335 Abeln et al. Jun 2012 A1
20120150791 Willson Jun 2012 A1
20120159307 Chung et al. Jun 2012 A1
20120159362 Brown et al. Jun 2012 A1
20120159399 Bastide et al. Jun 2012 A1
20120170847 Tsukidate Jul 2012 A1
20120173985 Peppel Jul 2012 A1
20120180002 Campbell et al. Jul 2012 A1
20120188252 Law Jul 2012 A1
20120196557 Reich et al. Aug 2012 A1
20120196558 Reich et al. Aug 2012 A1
20120197651 Robinson et al. Aug 2012 A1
20120197657 Prodanovic Aug 2012 A1
20120197660 Prodanovic Aug 2012 A1
20120203708 Psota et al. Aug 2012 A1
20120208636 Feige Aug 2012 A1
20120215784 King et al. Aug 2012 A1
20120221511 Gibson et al. Aug 2012 A1
20120221553 Wittmer et al. Aug 2012 A1
20120221580 Barney Aug 2012 A1
20120226590 Love et al. Sep 2012 A1
20120245976 Kumar et al. Sep 2012 A1
20120246148 Dror Sep 2012 A1
20120254129 Wheeler et al. Oct 2012 A1
20120284345 Costenaro et al. Nov 2012 A1
20120284670 Kashik et al. Nov 2012 A1
20120290879 Shibuya et al. Nov 2012 A1
20120296907 Long et al. Nov 2012 A1
20120311684 Paulsen et al. Dec 2012 A1
20120323888 Osann, Jr. Dec 2012 A1
20120330801 McDougal et al. Dec 2012 A1
20120330908 Stowe et al. Dec 2012 A1
20120330973 Ghuneim et al. Dec 2012 A1
20130006426 Healey et al. Jan 2013 A1
20130006725 Simanek et al. Jan 2013 A1
20130006916 McBride et al. Jan 2013 A1
20130016106 Yip et al. Jan 2013 A1
20130018796 Kolhatkar et al. Jan 2013 A1
20130024268 Manickavelu Jan 2013 A1
20130036346 Cicerone Feb 2013 A1
20130046635 Grigg et al. Feb 2013 A1
20130046842 Muntz et al. Feb 2013 A1
20130055264 Burr et al. Feb 2013 A1
20130060742 Chang et al. Mar 2013 A1
20130060786 Serrano et al. Mar 2013 A1
20130061169 Pearcy et al. Mar 2013 A1
20130073377 Heath Mar 2013 A1
20130073454 Busch Mar 2013 A1
20130078943 Biage et al. Mar 2013 A1
20130086482 Parsons Apr 2013 A1
20130097130 Bingol et al. Apr 2013 A1
20130097482 Marantz et al. Apr 2013 A1
20130101159 Chao et al. Apr 2013 A1
20130110822 Ikeda et al. May 2013 A1
20130110877 Bonham et al. May 2013 A1
20130111320 Campbell et al. May 2013 A1
20130117651 Waldman et al. May 2013 A1
20130124567 Balinsky et al. May 2013 A1
20130150004 Rosen Jun 2013 A1
20130151148 Parundekar et al. Jun 2013 A1
20130151305 Akinola et al. Jun 2013 A1
20130151388 Falkenborg et al. Jun 2013 A1
20130151453 Bhanot et al. Jun 2013 A1
20130157234 Gulli et al. Jun 2013 A1
20130166348 Scotto Jun 2013 A1
20130166480 Popescu et al. Jun 2013 A1
20130166550 Buchmann et al. Jun 2013 A1
20130176321 Mitchell et al. Jul 2013 A1
20130179420 Park et al. Jul 2013 A1
20130224696 Wolfe et al. Aug 2013 A1
20130225212 Khan Aug 2013 A1
20130226318 Procyk Aug 2013 A1
20130226953 Markovich et al. Aug 2013 A1
20130232045 Tai et al. Sep 2013 A1
20130238616 Rose et al. Sep 2013 A1
20130246170 Gross et al. Sep 2013 A1
20130251233 Yang et al. Sep 2013 A1
20130262527 Hunter et al. Oct 2013 A1
20130263019 Castellanos et al. Oct 2013 A1
20130267207 Hao et al. Oct 2013 A1
20130268520 Fisher et al. Oct 2013 A1
20130279757 Kephart Oct 2013 A1
20130282696 John et al. Oct 2013 A1
20130290011 Lynn et al. Oct 2013 A1
20130290825 Arndt et al. Oct 2013 A1
20130297619 Chandrasekaran et al. Nov 2013 A1
20130304770 Boero et al. Nov 2013 A1
20130311375 Priebatsch Nov 2013 A1
20130318060 Chang et al. Nov 2013 A1
20140019936 Cohanoff Jan 2014 A1
20140032506 Hoey et al. Jan 2014 A1
20140033010 Richardt et al. Jan 2014 A1
20140040371 Gurevich et al. Feb 2014 A1
20140047319 Eberlein Feb 2014 A1
20140047357 Alfaro et al. Feb 2014 A1
20140059038 McPherson et al. Feb 2014 A1
20140067611 Adachi et al. Mar 2014 A1
20140068487 Steiger et al. Mar 2014 A1
20140074855 Zhao et al. Mar 2014 A1
20140089339 Siddiqui et al. Mar 2014 A1
20140095273 Tang et al. Apr 2014 A1
20140095509 Patton Apr 2014 A1
20140108068 Williams Apr 2014 A1
20140108380 Gotz et al. Apr 2014 A1
20140108985 Scott et al. Apr 2014 A1
20140129261 Bothwell et al. May 2014 A1
20140129936 Richards et al. May 2014 A1
20140149272 Hirani et al. May 2014 A1
20140149436 Bahrami et al. May 2014 A1
20140156527 Grigg et al. Jun 2014 A1
20140157172 Peery et al. Jun 2014 A1
20140164502 Khodorenko et al. Jun 2014 A1
20140181833 Bird et al. Jun 2014 A1
20140189536 Lange et al. Jul 2014 A1
20140195515 Baker et al. Jul 2014 A1
20140195887 Ellis et al. Jul 2014 A1
20140208281 Ming et al. Jul 2014 A1
20140214579 Shen et al. Jul 2014 A1
20140222521 Chait Jul 2014 A1
20140222793 Sadkin et al. Aug 2014 A1
20140244284 Smith Aug 2014 A1
20140244388 Manouchehri et al. Aug 2014 A1
20140267294 Ma Sep 2014 A1
20140267295 Sharma Sep 2014 A1
20140279824 Tamayo Sep 2014 A1
20140310266 Greenfield Oct 2014 A1
20140316911 Gross Oct 2014 A1
20140324876 Konik et al. Oct 2014 A1
20140333651 Cervelli et al. Nov 2014 A1
20140337772 Cervelli et al. Nov 2014 A1
20140344230 Krause et al. Nov 2014 A1
20140344231 Stowe et al. Nov 2014 A1
20140358829 Hurwitz Dec 2014 A1
20150019394 Unser et al. Jan 2015 A1
20150026622 Roaldson et al. Jan 2015 A1
20150039886 Kahol et al. Feb 2015 A1
20150046870 Goldenberg et al. Feb 2015 A1
20150073954 Braff Mar 2015 A1
20150089353 Folkening Mar 2015 A1
20150089424 Duffield et al. Mar 2015 A1
20150100897 Sun et al. Apr 2015 A1
20150100907 Erenrich et al. Apr 2015 A1
20150106347 McGrew et al. Apr 2015 A1
20150106379 Elliot et al. Apr 2015 A1
20150112956 Chang et al. Apr 2015 A1
20150134666 Gattiker et al. May 2015 A1
20150169709 Kara et al. Jun 2015 A1
20150169726 Kara et al. Jun 2015 A1
20150170077 Kara et al. Jun 2015 A1
20150178825 Huerta Jun 2015 A1
20150178877 Bogomolov et al. Jun 2015 A1
20150186483 Tappan et al. Jul 2015 A1
20150186821 Wang et al. Jul 2015 A1
20150187036 Wang et al. Jul 2015 A1
20150212663 Papale et al. Jul 2015 A1
20150213043 Ishii et al. Jul 2015 A1
20150213134 Nie et al. Jul 2015 A1
20150227295 Meiklejohn et al. Aug 2015 A1
20150242397 Zhuang Aug 2015 A1
20150254220 Burr et al. Sep 2015 A1
20150261817 Harris et al. Sep 2015 A1
20150309719 Ma et al. Oct 2015 A1
20150317342 Grossman et al. Nov 2015 A1
20150324868 Kaftan et al. Nov 2015 A1
20150341467 Lim et al. Nov 2015 A1
20160034545 Shankar et al. Feb 2016 A1
20160062555 Ward et al. Mar 2016 A1
20160098176 Cervelli et al. Apr 2016 A1
20160110369 Cervelli et al. Apr 2016 A1
20160147730 Cicerone May 2016 A1
20160162519 Stowe et al. Jun 2016 A1
20170169244 McGrew et al. Jun 2017 A1
Foreign Referenced Citations (52)
Number Date Country
2013251186 Nov 2015 AU
2014206155 Dec 2015 AU
102054015 May 2014 CN
102014103482 Sep 2014 DE
102014215621 Feb 2015 DE
0652513 May 1995 EP
1672527 Jun 2006 EP
2551799 Jan 2013 EP
2555126 Feb 2013 EP
2560134 Feb 2013 EP
2778977 Sep 2014 EP
2835745 Feb 2015 EP
2835770 Feb 2015 EP
2838039 Feb 2015 EP
2846241 Mar 2015 EP
2851852 Mar 2015 EP
2858014 Apr 2015 EP
2858018 Apr 2015 EP
2863326 Apr 2015 EP
2863346 Apr 2015 EP
2869211 May 2015 EP
2881868 Jun 2015 EP
2884439 Jun 2015 EP
2884440 Jun 2015 EP
2891992 Jul 2015 EP
2911078 Aug 2015 EP
2911100 Aug 2015 EP
2940603 Nov 2015 EP
2940609 Nov 2015 EP
2993595 Mar 2016 EP
3002691 Apr 2016 EP
3009943 Apr 2016 EP
2516155 Jan 2015 GB
2518745 Apr 2015 GB
2012778 Nov 2014 NL
2013306 Feb 2015 NL
624557 Dec 2014 NZ
WO 2000009529 Feb 2000 WO
WO 01025906 Apr 2001 WO
WO 2001088750 Nov 2001 WO
WO 2002065353 Aug 2002 WO
WO 2005104736 Nov 2005 WO
WO 2007133206 Nov 2007 WO
WO 2008064207 May 2008 WO
WO 2009061501 May 2009 WO
WO 2010000014 Jan 2010 WO
WO 2010030913 Mar 2010 WO
WO 2010030914 Mar 2010 WO
WO 2012025915 Mar 2012 WO
WO 2012119008 Sep 2012 WO
WO 2013010157 Jan 2013 WO
WO 2013102892 Jul 2013 WO
Non-Patent Literature Citations (348)
Entry
Abbey, Kristen, “Review of Google Docs,” May 1, 2007, pp. 2.
Official Communication for European Patent Application No. 14180321.3 dated Apr. 17, 2015.
Official Communication for European Patent Application No. 15190307.7 dated Feb. 19, 2016.
Official Communication for European Patent Application No. 15188106.7 dated Feb. 3, 2016.
Official Communication for European Patent Application No. 14187996.5 dated Feb. 12, 2015.
Official Communication for New Zealand Patent Application No. 628263 dated Aug. 12, 2014.
Official Communication for European Patent Application No. 15155846.7 dated Jul. 8, 2015.
“GrabUp—What a Timesaver!” <http://atlchris.com/191/grabup/>, Aug. 11, 2008, pp. 3.
Microsoft, “Registering an Application to a URI Scheme,” <http://msdn.microsoft.com/en-us/library/aa767914.aspx>, printed Apr. 4, 2009 in 4 pages.
Palmas et al., “An Edge-Bunding Layout for Interactive Parallel Coordinates” 2014 IEEE Pacific Visualization Symposium, pp. 57-64.
Kwout, <http://web.archive.org/web/20080905132448/http://www.kwout.com/> Sep. 5, 2008, pp. 2.
Official Communication for New Zealand Patent Application No. 622473 dated Jun. 19, 2014.
Manske, “File Saving Dialogs,” <http://www.mozilla.org/editor/ui_specs/FileSaveDialogs.html>, Jan. 20, 1999, pp. 7.
Online Tech Tips, “Clip2Net—Share files, folders and screenshots easily,” <http://www.online-tech-tips.com/free-software-downloads/share-files-folders-screenshots/>, Apr. 2, 2008, pp. 5.
Official Communication for Australian Patent Application No. 2014210604 dated Jun. 5, 2015.
The Apache Cassandra Project.
Keylines.com, “An Introduction to KeyLines and Network Visualization,” Mar. 2014, <http://keylines.com/wp-content/uploads/2014/03/KeyLines-White-Paper.pdf> downloaded May 12, 2014 in 8 pages.
Yang et al., “HTML Page Analysis Based on Visual Cues”, A129, pp. 859-864, 2001.
European Claims in application No. 08730336.8-1951, dated Oct. 2016, 8 pages.
Bernstein et al., “Hyder—A Transactional Record Manager for Shared Flash”, 5th Biennial Conference on Innovative Data Systems Research (CIDR '11), vol. 12, Asilomar, California, Jan. 9-12, 2011.
Li et al., “Interactive Multimodal Visual Search on Mobile Device,” IEEE Transactions on Multimedia, vol. 15, No. 3, Apr. 1, 2013, pp. 594-607.
Gesher, Ari, “Palantir Screenshots in the Wild: Swing Sightings,” The Palantir Blog, Sep. 11, 2007, pp. 1-12, retrieved from the internet https://www.palantir.com/2007/09/palantir-screenshots/ retrieved on Aug. 18, 2015.
“Hbase-Hbase Home,” downloaded from the internet on Sep. 14, 2011, http://hbase.appache.org, 1 page.
Olanoff, Drew, “Deep Dive with the New Google Maps for Desktop with Google Earth Integration, It's More than Just a Utility,” May 15, 2013, pp. 1-6, retrieved from the internet: http://web.archive.org/web/20130515230641/http://techcrunch.com/2013/05/15/deep-dive-with-the-new-google-maps-for-desktop-with-google-earth-integration-its-more-than-just-a-utility/.
Official Communication for European Patent Application No. 14187739.9 dated Jul. 6, 2015.
Map of San Jose, CA. Retrieved Oct. 2, 2013 from http://maps.bing.com.
Niepert et al., “A Dynamic Ontology for a Dynamic Reference Work”, Joint Conference on Digital Libraries, Jun. 17_22, 2007, Vancouver, British Columbia, Canada, pp. 1-10.
Microsoft, “How Word Creates and Recovers the AutoRecover files,” <http://support.microsoft.com/kb/107686>, Article ID: 107686, printed Feb. 11, 2010 in 3 pages.
Griffith, Daniel A., “A Generalized Huff Model,” Geographical Analysis, Apr. 1982, vol. 14, No. 2, pp. 135-144.
Official Communication for Australian Patent Application No. 2014213553 dated May 7, 2015.
Official Communication for European Patent Application No. 09813695.5 dated Apr. 9, 2014.
Official Communication in New Zealand Application No. 628840 dated Aug. 28, 2014.
Celik, Tantek, “CSS Basic User Interface Module Level 3 (CSS3 UI),” Section 8 Resizing and Overflow, Jan. 17, 2012, retrieved from internet http://www.w3.org/TR/2012/WD-css3-ui-20120117/#resizing-amp-overflow retrieved on May 18, 2015.
Official Communication for European Patent Application No. 09813693.0 dated Apr. 8, 2014.
Ananiev et al., “The New Modality API,” http://web.archive.org/web/20061211011958/http://java.sun.com/developer/technicalArticles/J2SE/Desktop/javase6/modality/ Jan. 21, 2006, pp. 8.
Huang et al., “Systematic and Integrative Analysis of Large Gene Lists Using DAVID Bioinformatics Resources,” Nature Protocols, 4.1, 2008, 44-57.
“Potential Money Laundering Warning Signs,” snapshot taken 2003, https://web.archive.org/web/20030816090055/http:/finsolinc.com/ANTI-MONEY%20LAUNDERING%20TRAINING%20GUIDES.pdf.
GIS-NET 3 Public _ Department of Regional Planning. Planning & Zoning Information for Unincorporated LA County. Retrieved Oct. 2, 2013 from http://gis.planning.lacounty.gov/GIS-NET3_Public/Viewer.html.
Official Communication for Canadian Patent Application No. 2,677,464 dated Jan. 16, 2013.
Official Communication for Australian Patent Application No. 2014202442 dated Mar. 19, 2015.
Official Communication for European Patent Application No. 14189802.3 dated May 11, 2015.
Ask Drexel University Knowledge Base, “How to: Auto Save a Document Before Printing in Word 2007,” published Nov. 13, 2007.
Baker et al., “Megastore: Providing Scalable, Highly Available Storage for Interactive Services”, 5th Biennial Conference on Innovative Data Systems Research (CIDR '11), Asilomar, California, Jan. 9-12, 2011.
Official Communication for Australian Patent Application No. 2012203606 dated Jan. 22, 2014.
Definition “Overlay”, downloaded Jan. 22, 2015, 1 page.
Schroder, Stan, “15 Ways to Create Website Screenshots,” <http://mashable.com/2007/08/24/web-screenshots/>, Aug. 24, 2007, pp. 2.
Shi et al., “A Scalable Implementation of Malware Detection Based on Network Connection Behaviors,” 2013 International Conference on Cyber-Enabled Distributed Computing Knowledge Discovery, IEEE, Oct. 10, 2013, pp. 59-66.
Manno et al., “Introducing Collaboration in Single-user Applications through the Centralized Control Architecture,” 2010, pp. 10.
Kokossi et al., “D7-Dynamic Ontology Management System (Design)”, Information Societies Technology Programme, pp. 1-27.
Official Communication for European Patent Application No. 14197895.7 dated Apr. 28, 2015.
Wang et al., “Research on a Clustering Data De-Duplication Mechanism Based on Bloom Filter,” IEEE 2010, 5 pages.
Nitro, “Trick: How to Capture a Screenshot As PDF, Annotate, Then Share It,” <http://blog.nitropdf.com/2008/03/04/trick-how-to-capture-a-screenshot-as-pdf-annotate-it-then-shareh, Mar. 4, 2008, pp. 2.
Claims for Australian Patent Application No. 2012203606 dated Jan. 2014.
Liu, Tianshun, “Combining GIS and the Huff Model to Analyze Suitable Locations for a New Asian Supermarket in the Minneapolis and St. Paul, Minnesota USA,” Papers in Resource Analysis, 2012, vol. 14, pp. 8.
Galliford, Miles, “SnagIt Versus Free Screen Capture Software: Critical Tools for Website Owners,” <http://www.subhub.com/articles/free-screen-capture-software>, Mar. 27, 2008, pp. 11.
Official Communication for New Zealand Patent Application No. 622517 dated Apr. 3, 2014.
Antoshenkov, Gennady, “Dictionary-Based Order-Preserving String Compression”, The VLDB Journal, pp. 26-39, 1997.
Keylines.com, “Visualizing Threats: Improved Cyber Security Through Network Visualization,” Apr. 2014, <http://keylines.com/wp-content/uploads/2014/04/Visualizing-Threats1.pdf> downloaded May 12, 2014 in 10 pages.
Ferreira et al., “A Scheme for Analyzing Electronic Payment Systems,” Basil 1997.
Keylines.com, “KeyLines Datasheet,” Mar. 2014, <http://keylines.com/wp-content/uploads/2014/03/KeyLines-datasheet.pdf> downloaded May 12, 2014 in 2 pages.
Official Communication for Canadian Patent Application No. 2831660 dated Jun. 9, 2015.
Official Communication for New Zealand Patent Application No. 628495 dated Aug. 19, 2014.
Umagandhi et al., “Search Query Recommendations Using Hybrid User Profile with Query Logs,” International Journal of Computer Applications, vol. 80, No. 10, Oct. 1, 2013, pp. 7-18.
Official Communication for New Zealand Patent Application No. 622513 dated Apr. 3, 2014.
Official Communication for Great Britain Patent Application No. 1404499.4 dated Aug. 20, 2014.
“Using Whois Based Geolocation and Google Maps API for Support Cybercrime Investigations,” http://wseas.us/e-library/conferences/2013/Dubrovnik/TELECIRC/TELECIRC-32.pdf.
Canese et al., “Chapter 2: PubMed: The Bibliographic Database,” The NCBI Handbook, Oct. 2002, pp. 1-10.
Thompson, Mick, “Getting Started with GEO,” Getting Started with GEO, Jul. 26, 2011.
“Remove a Published Document or Blog Post,” Sharing and Collaborating on Blog Post.
Official Communication for European Patent Application No. 14180432.8 dated Jun. 23, 2015.
Microsoft, “Introduction to Versioning,” <http://office.microsoft.com/en-us/sharepointtechnolgy/HA010021576.aspx?mode=print>, 2007 in 3 pages.
Official Communication for Great Britain Patent Application No. 1408025.3 dated Nov. 6, 2014.
Hibbert et al., “Prediction of Shopping Behavior Using a Huff Model Within a GIS Framework,” Healthy Eating in Context, Mar. 18, 2011, pp. 16.
Microsoft Office—Visio, “Add and glue connectors with the Connector tool,” <http://office.microsoft.com/en-us/visio-help/add-and-glue-connectors-with-the-connector-tool-HA010048532.aspx?CTT=1> printed Aug. 4, 2011 in 1 page.
Symantec Corporation, “E-Security Begins with Sound Security Policies,” Announcement Symantec, Jun. 14, 2001.
Warren, Christina, “TUAW Faceoff: Screenshot apps on the firing line,” <http://www.tuaw.com/2008/05/05/tuaw-faceoff-screenshot-apps-on-the-firing-line/>, May 5, 2008, pp. 11.
Official Communication for New Zealand Patent Application No. 622473 dated Mar. 27, 2014.
Official Communication for Australian Patent Application No. 2013251186 dated Mar. 12, 2015.
“A First Look: Predicting Market Demand for Food Retail using a Huff Analysis,” TRF Policy Solutions, Jul. 2012, pp. 30.
Notice of Acceptance for Australian Patent Application No. 2013251186 dated Nov. 6, 2015.
Microsoft, “Using the Clipboard,” <http://msdn.microsoft.com/en-us/library/ms649016.aspx>, printed Jun. 8, 2009 in 20 pages.
Devanbu et al., “Authentic Third-party Data Publication”, http://www.cs.ucdavis.edu/˜devanbu/authdbpub.pdf, p. 19, 2000.
Azad, Khalid, “A Visual Guide to Version Control,” <http://betterexplained.com/articles/a-visual-guide-to-version-control/>, Sep. 27, 2007 in 11 pages.
Official Communication for Great Britain Patent Application No. 1404457.2 dated Aug. 14, 2014.
Hansen et al., “Analyzing Social Media Networks with NodeXL: Insights from a Connected World”, Chapter 4, pp. 53-67 and Chapter 10, pp. 143-164, published Sep. 2010.
Official Communication for Netherlands Patent Application No. 2012438 dated Sep. 21, 2015.
Amnet, “5 Great Tools for Visualizing Your Twitter Followers,” posted Aug. 4, 2010, http://www.amnetblog.com/component/content/article/115-5-grate-tools-for-visualizing-your-twitter-followers.html.
Snaglt, “Snaglt Online Help Guide,” <http://download.techsmith.com/snagit/docs/onlinehelp/enu/snagit_help.pdf>, TechSmith Corp., Version 8.1, printed Feb. 7, 2007, pp. 284.
Hogue et al., “Thresher: Automating the Unwrapping of Semantic Content from the World Wide Web”, 14th International Conference on World Wide Web, WWW 2005: Chiba, Japan, May 10-14, 2005.
Official Communication for Netherlands Patent Application No. 2012436 dated Nov. 6, 2015.
Adams et al., “Worklets: A Service-Oriented Implementation of Dynamic Flexibility in Workflows,” R. Meersman, Z. Tari et al. (Eds.): OTM 2006, LNCS, 4275, pp. 291-308, 2006.
Definition “Identify”, downloaded Jan. 22, 2015, 1 page.
Bugzilla@Mozilla, “Bug 18726—[feature] Long-click means of invoking contextual menus not supported,” http://bugzilla.mozilla.org/show_bug.cgi?id=18726 printed Jun. 13, 2013 in 11 pages.
Official Communication for European Patent Application No. 14180142.3 dated Feb. 6, 2015.
Microsoft—Developer Network, “Getting Started with VBA in Word 2010,” Apr. 2010, <http://msdn.microsoft.com/en-us/library/ff604039%28v=office.14%29.aspx> as printed Apr. 4, 2014 in 17 pages.
Official Communication for European Patent Application No. 14199182.8 dated Mar. 13, 2015.
About 80 Minutes, “Palantir in a Number of Parts—Part 6—Graph,” Mar. 21, 2013, pp. 1-6, retrieved from the internet http://about80minutes.blogspot.nl/2013/03/palantir-in-number-of-parts-part-6-graph.html retrieved on Aug. 18, 2015.
Chen et al., “Bringing Order to the Web: Automatically Categorizing Search Results,” CHI 2000, Proceedings of the SIGCHI conference on Human Factors in Computing Systems, Apr. 1-6, 2000, The Hague, The Netherlands, pp. 145-152.
Official Communication for European Patent Application No. 14197879.1 dated Apr. 28, 2015.
Claims for European Patent Application No. 12173312.5 dated Jun. 2012.
Anonymous, “BackTult—JD Edwards One World Version Control System”, in 1 page, Jul. 23, 2007.
Official Communication for Canadian Patent Application No. 2,677,464 dated Mar. 19, 2012.
Hua et al., “A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services”, HiPC 2006, LNCS 4297, pp. 277-288, 2006.
Dramowicz, Ela, “Retail Trade Area Analysis Using the Huff Model,” Directions Magazine, Jul. 2, 2005 in 10 pages, http://www.directionsmag.com/articles/retail-trade-area-analysis-using-the-huff-model/123411.
Official Communication for European Patent Application No. 14158861.6 dated Jun. 16, 2014.
Alur et al., “Chapter 2: IBM InfoSphere DataStage Stages,” IBM InfoSphere DataStage Data Flow and Job Design, Jul. 1, 2008, pp. 35-137.
Official Communication for European Patent Application No. 12181585.6 dated Sep. 4, 2015.
Official Communication for Australian Patent Application No. 2014210614 dated Jun. 5, 2015.
Official Communication for Netherlands Patent Application No. 2013306 dated Apr. 24, 2015.
Official Communication for European Patent Application No. 14159464.8 dated Jul. 31, 2014.
Nolan et al., “MCARTA: A Malicious Code Automated Run-Time Analysis Framework,” Homeland Security, 2012 IEEE Conference on Technologies for, Nov. 13 2012, pages.
Rouse, Margaret, “OLAP Cube,” <http://searchdatamanagement.techtarget.com/definition/OLAP-cube>, Apr. 28, 2012.
Goswami, Gautam, “Quite Writly Said!,” One Brick at a Time, Aug. 21, 2005, pp. 7.
Elmasri et al., “Fundamentals of Database Systems”, Fourth Edition, pp. 455-491, 2004.
Official Communication for European Patent Application No. 14159464.8 dated Aug. 20, 2014.
Palantir Technologies, “Palantir Labs—Timeline,” Oct. 1, 2010, retrieved from the internet https://www.youtube.com/watch?v=JCgDW5bru9M.
Official Communication for European Patent Application No. 15165244.3 dated Aug. 27, 2015.
Perdisci et al., “Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces,” USENIX, Mar. 18, 2010, pp. 1-14.
Official Communication for European Patent Application No. 14159464.8 dated Sep. 22, 2014.
Official Communication for Great Britain Patent Application No. 1404489.5 dated Aug. 27, 2014.
Official Communication for Australian Patent Application No. 2014250678 dated Jun. 17, 2015.
Nierman, “Evaluating Structural Similarity in XML Documents”, 6 pages, 2002.
Official Communication for European Patent Application No. 14191540.5 dated May 27, 2015.
Official Communication for European Patent Application No. 14186225.0 dated Feb. 13, 2015.
Wollrath et al., “A Distributed Object Model for the Java System,” Conference on Object-Oriented Technologies and Systems, Jun. 17-21, 1996, pp. 219-231.
Microsoft, “Managing Versions and Checking Documents In and Out (Windows SharePoint Services 2.0),” <http://technet.microsoft.com/en-us/library/cc287876.aspx>, Aug. 22, 2005 in 2 pages.
Miklau et al., “Securing History: Privacy and Accountability in Database Systems”, 3rd Biennial Conference on Innovative Data Systems Research (CIDR), pp. 387-396, Asilomar, California, Jan. 7-10, 2007.
Official Communication for New Zealand Patent Application No. 627962 dated Aug. 5, 2014.
“A Word About Banks and the Laundering of Drug Money,” Aug. 18, 2012, http://www.golemxiv.co.uk/2012/08/a-word-about-banks-and-the-laundering-of-drug-money/.
Official Communication for Great Britain Patent Application No. 1404486.1 dated Aug. 27, 2014.
Klemmer et al., “Where Do Web Sites Come From? Capturing and Interacting with Design History,” Association for Computing Machinery, CHI 2002, Apr. 20-25, 2002, Minneapolis, MN, pp. 8.
Official Communciation for Great Britain Patent Application No. 1411984.6 dated Dec. 22, 2014.
Microsoft Office—Visio, “About connecting shapes,” <http://office.microsoft.com/en-us/visio-help/about-connecting-shapes-HP085050369.aspx> printed Aug. 4, 2011 in 6 pages.
International Search Report and Written Opinion for Patent Application No. PCT/US2009/056700 dated Apr. 19, 2010.
Mentzas et al. “An Architecture for Intelligent Assistance in the Forecasting Process,” Proceedings of the Twenty-Eighth Hawaii International Conference on System Sciences, Jan. 3-6, 1995, vol. 3, pp. 167-176.
Thomson et al., “The Case for Determinism in Database Systems”, The 36th International Conference on Very Large Data Bases, Proceedings of the VLDB Endowment, vol. 3, Issue No. 1, p. 11, Singapore, Sep. 13-17, 2010.
Official Communication for European Patent Application No. 14189344.6 dated Feb. 20, 2015.
European Patent Office, “Search Report” in application No. 08730336.8-1951, dated Oct. 19, 2016, 4 pages.
Official Communication for European Patent Application No. 13170952.9 dated Jan. 21, 2014.
Official Communication for European Patent Application No. 15175106.2 dated Nov. 5, 2015.
Boyce, Jim, “Microsoft Outlook 2010 Inside Out,” Aug. 1, 2010, retrieved from the internet https://capdtron.files.wordpress.com/2013/01/outlook-2010-inside_out.pdf.
Microsoft Windows, “Microsoft Windows Version 2002 Print Out 2,” 2002, pp. 1-6.
Wikipedia, “Federated Database System,” Sep. 7, 2013, retrieved from the internet on Jan. 27, 2015 http://en.wikipedia.org/w/index.php?title=Federated_database_system&oldid=571954221.
Official Communication for Great Britain Patent Application No. 1413935.6 dated Jan. 27, 2015.
Map of San Jose, CA. Retrieved Oct. 2, 2013 from http://maps.yahoo.com.
Conner, Nancy, “Google Apps: The Missing Manual,” May 1, 2008, pp. 15.
Official Communication for European Patent Application No. 15175151.8 dated Nov. 25, 2015.
International Search Report and Written Opinion in Application No. PCT/US2009/056703, dated Mar. 15, 2010.
Wright et al., “Palantir Technologies VAST 2010 Challenge Text Records _ Investigations into Arms Dealing,” Oct. 29, 2010, pp. 1-10.
Gu et al., “Record Linkage: Current Practice and Future Directions,” Jan. 15, 2004, pp. 32.
Official Communication for Netherlands Patent Application No. 2011729 dated Aug. 13, 2015.
Official Communication for European Patent Application No. 08730336.8 dated Jun. 6, 2012.
Official Communication for European Patent Application No. 151832721.8 dated Nov. 23, 2015.
“Money Laundering Risks and E-Gaming: A European Overview and Assessment,” 2009, http://www.cf.ac.uk/socsi/resources/Levi_Final_Money_Laundering_Risks_egaming.pdf.
Huff et al., “Calibrating the Huff Model Using ArcGIS Business Analyst,” ESRI, Sep. 2008, pp. 33.
Official Communication for New Zealand Patent Application No. 624557 dated May 14, 2014.
Acklen, Laura, “Absolute Beginner's Guide to Microsoft Word 2003,” Dec. 24, 2003, pp. 15-18, 34-41, 308-316.
Beverley, Bill, “Windows Tips & Tricks,” <http://alamopc.org/pcalamode/columns/beverley/bb0301.shtml>, Mar. 2001 in 5 pages.
QUEST, “Toad for Oracle 11.6—Guide to Using Toad,” Sep. 24, 2012, pp. 1-162.
Chung, Chin-Wan, “Dataplex: An Access to Heterogeneous Distributed Databases,” Communications of the ACM, Association for Computing Machinery, Inc., vol. 33, No. 1, Jan. 1, 1990, pp. 70-80.
Official Communication for European Patent Application No. 15183721.8 dated Nov. 23, 2015.
Official Communication for European Patent Application No. 14189347.9 dated Mar. 4, 2015.
Chaudhuri et al., “An Overview of Business Intelligence Technology,” Communications of the ACM, Aug. 2011, vol. 54, No. 8.
Official Communication for New Zealand Patent Application No. 628161 dated Aug. 25, 2014.
Peng et al., “Large-scale Incremental Processing Using Distributed Transactions and Notifications”, Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, USENIX, p. 14, 2010.
Huff, David L., “Parameter Estimation in the Huff Model,” ESRI, ArcUser, Oct.-Dec. 2003, pp. 34-36.
Official Communication for European Patent Application No. 15155845.9 dated Oct. 6, 2015.
“Refresh CSS Ellipsis When Resizing Container—Stack Overflow,” Jul. 31, 2013, retrieved from internet http://stackoverflow.com/questions/17964681/refresh-css-ellipsis-when-resizing-container, retrieved on May 18, 2015.
Official Communication for European Patent Application No. 14197938.5 dated Apr. 28, 2015.
Delcher et al., “Identifying Bacterial Genes and Endosymbiont DNA with Glimmer,” BioInformatics, vol. 23, No. 6, 2007, pp. 673-679.
Hardesty, “Privacy Challenges: Analysis: It's Surprisingly Easy to Identify Individuals from Credit-Card Metadata,” MIT News on Campus and Around the World, MIT News Office, Jan. 29, 2015, 3 pages.
Official Communication for New Zealand Patent Application No. 628585 dated Aug. 26, 2014.
Bluttman et al., “Excel Formulas and Functions for Dummies,” 2005, Wiley Publishing, Inc., pp. 280, 284-286.
Notice of Acceptance for Australian Patent Application No. 2014250678 dated Oct. 7, 2015.
JetScreenshot.com, “Share Screenshots via Internet in Seconds,” <http://web.archive.org/web/20130807164204/http://www.jetscreenshot.com/>, Aug. 7, 2013, pp. 1.
Official Communication for European Patent Application No. 14180281.9 dated Jan. 26, 2015.
Map of San Jose, CA. Retrieved Oct. 2, 2013 from http://maps.google.com.
Chang et al., “Bigtable: A Distributed Storage System for Structured Data”, Google, Inc., OSDI'06: Seventh Symposium on Operating System Design and Implementation, Seattle, WA, Nov. 2006.
Official Communication for European Patent Application No. 12173312.5 dated Oct. 25, 2012.
International Search Report for International Patent Application No. PCT/US2008/054511 dated Jul. 31, 2008.
O'Reilly.com, http://oreilly.com/digitalmedia/2006/01/01/mac-os-x-screenshot-secrets.html published Jan. 1, 2006 in 10 pages.
Sigrist, et al., “PROSITE, a Protein Domain Database for Functional Characterization and Annotation,” Nucleic Acids Research, 2010, vol. 38, pp. D161-D166.
Sirotkin et al., “Chapter 13: The Processing of Biological Sequence Data at NCBI,” The NCBI Handbook, Oct. 2002, pp. 1-11.
Mizrachi, Ilene, “Chapter 1: Gen Bank: The Nuckeotide Sequence Database,” The NCBI Handbook, Oct. 2002, pp. 1-14.
Official Communication for Great Britain Patent Application No. 1404574.4 dated Dec. 18, 2014.
Official Communication for Netherlands Patent Application No. 2012437 dated Sep. 18, 2015.
Kitts, Paul, “Chapter 14: Genome Assembly and Annotation Process,” The NCBI Handbook, Oct. 2002, pp. 1-21.
“A Quick Guide to UniProtKB Swiss-Prot & TrEMBL,” Sep. 2011, pp. 2.
“The FASTA Program Package,” fasta-36.3.4, Mar. 25, 2011, pp. 29.
Madden, Tom, “Chapter 16: The BLAST Sequence Analysis Tool,” The NCBI Handbook, Oct. 2002, pp. 1-15.
Kahan et al., “Annotea: an Open RDF Infrastructure for Shared Web Annotations”, Computer Networks, Elsevier Science Publishers B.V., vol. 39, No. 5, dated Aug. 5, 2002.
European Patent Office, “Search Report” in application No. 08730336.8-1951, dated Jun. 28, 2017.
U.S. Appl. No. 14/134,558, filed Dec. 19, 2013, Office Action, dated Oct. 7, 2015.
U.S. Appl. No. 13/831,791, filed Mar. 15, 2013, Office Action, dated Mar. 4, 2015.
U.S. Appl. No. 13/831,791, filed Mar. 15, 2013, Final Office Action, dated Aug. 6, 2015.
U.S. Appl. No. 14/473,552, filed Aug. 29, 2014, Interview Summary, dated Feb. 24, 2015.
U.S. Appl. No. 14/135,289, filed Dec. 19, 2013, Notice of Allowance, dated Oct. 14, 2014.
U.S. Appl. No. 13/839,026, filed Mar. 15, 2013, Restriction Requirement, dated Apr. 2, 2015.
U.S. Appl. No. 14/225,006, filed Mar. 24, 2014, Final Office Action, dated Sep. 2, 2015.
U.S. Appl. No. 13/827,491, filed Mar. 14, 2013, Office Action, dated Oct. 9, 2015.
U.S. Appl. No. 14/319,765, filed Jun. 30, 2014, Final Office Action, dated Jun. 16, 2015.
U.S. Appl. No. 14/306,147, filed Jun. 16, 2014, Final Office Action, dated Feb. 19, 2015.
U.S. Appl. No. 14/225,006, filed Mar. 25, 2014, First Action Interview, dated Feb. 27, 2015.
U.S. Appl. No. 14/306,154, filed Jun. 16, 2014, Advisory Action, dated May 15, 2015.
U.S. Appl. No. 14/225,160, filed Mar. 24, 2014, Final Office Action, dated Feb. 11, 2015.
U.S. Appl. No. 14/306,138, filed Jun. 16, 2014, Office Action, dated May 26, 2015.
U.S. Appl. No. 14/148,568, filed Jan. 6, 2014, Notice of Allowance, dated Aug. 26, 2015.
U.S. Appl. No. 14/326,738, filed Jul. 9, 2014, Notice of Allowance, dated Nov. 18, 2015.
U.S. Appl. No. 14/473,552, filed Aug. 29, 2014, Notice of Allowance, dated Jul. 24, 2015.
U.S. Appl. No. 13/669,274, filed Nov. 5, 2012, Final Office Action, dated May 6, 2015.
U.S. Appl. No. 14/715,834, filed May 19, 2015, Office Action Interview, dated Apr. 13, 2016.
U.S. Appl. No. 14/504,103, filed Oct. 1, 2014, First Action Interview, dated Feb. 5, 2015.
U.S. Appl. No. 14/306,147, filed Jun. 16, 2014, First Action Interview, dated Sep. 9, 2014.
U.S. Appl. No. 14/225,160, filed Mar. 25, 2014, First Office Action Interview, dated Jul. 29, 2014.
U.S. Appl. No. 14/148,568, filed Jan. 6, 2014, Office Action, dated Mar. 26, 2015.
U.S. Appl. No. 13/196,788, filed Aug. 2, 2011, Interview Summary, dated Nov. 25, 2015.
U.S. Appl. No. 13/167,680, filed Jun. 23, 2011, Notice of Allowance, dated Mar. 7, 2014.
U.S. Appl. No. 14/319,765, filed Jun. 30, 2014, First Office Action Interview, dated Nov. 25, 2014.
U.S. Appl. No. 14/323,935, filed Jul. 3, 2014, Office Action, dated Jun. 22, 2015.
U.S. Appl. No. 14/225,006, filed Mar. 25, 2014, First Office Action Interview, dated Sep. 10, 2014.
U.S. Appl. No. 14/323,935, filed Jul. 3, 2014, First Office Action Interview, dated Nov. 28, 2014.
U.S. Appl. No. 14/616,080, filed Feb. 6, 2015, Notice of Allowance, dated Apr. 2, 2015.
U.S. Appl. No. 14/571,098, filed Dec. 15, 2014, First Office Action Interview, dated Aug. 5, 2015.
U.S. Appl. No. 14/222,364, filed Mar. 21, 2014, Office Action, dated Dec. 9, 2015.
U.S. Appl. No. 14/306,147, filed Jun. 16, 2014, Office Action, dated Aug. 7, 2015.
U.S. Appl. No. 14/289,599, filed May 28, 2014, Advisory Action, dated Sep. 4, 2015.
U.S. Appl. No. 14/639,606, filed Mar. 5, 2015, First Office Action Interview, dated Jul. 24, 2015.
U.S. Appl. No. 14/225,084, filed Mar. 25, 2014, Office Action, dated Sep. 11, 2015.
U.S. Appl. No. 14/225,084, filed Mar. 25, 2014, First Office Action Interview, dated Sep. 2, 2014.
U.S. Appl. No. 14/289,599, filed May 28, 2014, Final Office Action, dated May 29, 2015.
U.S. Appl. No. 14/486,991, filed Sep. 15, 2014, Notice of Allowance, dated May 1, 2015.
U.S. Appl. No. 12/556,318, filed Jun. 16, 2014, Office Action, dated Jul. 2, 2015.
U.S. Appl. No. 14/196,814, filed Mar. 4, 2014, Office Action, dated May 5, 2015.
U.S. Appl. No. 14/961,481, filed Dec. 7, 2015, Office Action Interview, dated Mar. 2, 2016.
U.S. Appl. No. 14/741,256, filed Jun. 16, 2015, Office Action, dated Feb. 9, 2016.
U.S. Appl. No. 12/556,321, filed Sep. 9, 2009, Office Action, dated Jul. 7, 2015.
U.S. Appl. No. 14/306,154, filed Jun. 16, 2014, Final Office Action, dated Mar. 11, 2015.
U.S. Appl. No. 14/268,964, filed May 2, 2014, First Office Action Interview, dated Sep. 3, 2014.
U.S. Appl. No. 14/631,633, filed Feb. 25, 2015, First Office Action Interview, dated Sep. 10, 2015.
U.S. Appl. No. 13/826,228, filed Mar. 14, 2013, Notice of Allowance, dated Mar. 27, 2015.
U.S. Appl. No. 14/746,671, filed Jun. 22, 2015, First Office Action Interview, dated Nov. 12, 2015.
U.S. Appl. No. 14/975,215, filed Dec. 18, 2015, First Office Action Interview, dated May 19, 2016.
U.S. Appl. No. 14/800,447, filed Jul. 15, 2012, Final Office Action, dated Jun. 6, 2016.
U.S. Appl. No. 13/835,688, filed Mar. 15, 2013, First Office Action Interview, dated Jun. 17, 2015.
U.S. Appl. No. 14/726,353, filed May 29, 2015, First Office Action Interview, dated Sep. 10, 2015.
U.S. Appl. No. 14/294,098, filed Jun. 2, 2014, Final Office Action, dated Nov. 6, 2014.
U.S. Appl. No. 14/319,765, filed Jun. 30, 2014, First Office Action Interview, dated Feb. 4, 2015.
U.S. Appl. No. 14/326,738, filed Jul. 9, 2014, First Office Action Interview, dated Mar. 31, 2015.
U.S. Appl. No. 14/225,084, filed Mar. 25, 2014, Notice of Allowance, dated May 4, 2015.
U.S. Appl. No. 14/803,749, filed Jul. 30, 2015, Office Action, dated Sep. 28, 2015.
U.S. Appl. No. 14/579,752, filed Dec. 22, 2014, First Office Action Interview, dated May 26, 2015.
U.S. Appl. No. 14/676,621, filed Apr. 1, 2015, Notice of Allowance, dated Feb. 10, 2016.
U.S. Appl. No. 14/883,498, filed Oct. 14, 2015, First Office Action Interview, dated Dec. 24, 2015.
U.S. Appl. No. 14/319,765, filed Jun. 30, 2014, First Action Interview, dated Nov. 25, 2014.
U.S. Appl. No. 14/225,160, filed Mar. 24, 2014, Office Action, dated Aug. 12, 2015.
U.S. Appl. No. 14/490,612, filed Sep. 18, 2014, Final Office Action, dated Aug. 18, 2015.
U.S. Appl. No. 14/225,084, filed Mar. 25, 2014, First Action Interview, dated Feb. 20, 2015.
U.S. Appl. No. 14/326,738, filed Jul. 9, 2014, First Action Interview, dated Dec. 2, 2014.
U.S. Appl. No. 14/473,860, filed Aug. 29, 2014, Notice of Allowance, dated Jan. 5, 2015.
U.S. Appl. No. 13/196,788, filed Aug. 2, 2011, Notice of Allowance, dated Dec. 18, 2015.
U.S. Appl. No. 14/842,734, filed Sep. 1, 2015, First Office Action Interview, dated Nov. 19, 2015.
U.S. Appl. No. 14/479,160, filed Sep. 5, 2014, First Office Action Interview, dated Apr. 20, 2016.
U.S. Appl. No. 14/294,098, filed Jun. 2, 2014, First Office Action Interview, dated Aug. 15, 2014.
U.S. Appl. No. 14/451,221, filed Aug. 4, 2014, Notice of Allowance, dated Aug. 4, 2015.
U.S. Appl. No. 14/225,006, filed Mar. 25, 2014, First Office Action Interview, dated Feb. 27, 2015.
U.S. Appl. No. 14/504,103, filed Oct. 1, 2014, Notice of Allowance, dated May 18, 2015.
U.S. Appl. No. 13/747,170, filed Jan. 22, 2013, Notice of Allowance, dated Apr. 4, 2014.
U.S. Appl. No. 14/579,752, filed Dec. 22, 2014, Final Office Action, dated Aug. 19, 2015.
U.S. Appl. No. 14/225,160, filed Mar. 25, 2014, Final Office Action, dated Feb. 11, 2015.
U.S. Appl. No. 14/306,154, filed Jun. 16, 2014, Final Office Action, dated Nov. 16, 2015.
U.S. Appl. No. 14/746,671, filed Jun. 22, 2015, Notice of Allowance, dated Jan. 21, 2016.
U.S. Appl. No. 13/247,987, filed Sep. 28, 2011, Office Action, dated Apr. 2, 2015.
U.S. Appl. No. 14/552,336, filed Nov. 24, 2014, Notice of Allwance, dated Nov. 3, 2015.
U.S. Appl. No. 14/225,160, filed Mar. 25, 2014, First Office Action Interview, dated Oct. 22, 2014.
U.S. Appl. No. 14/225,160, filed Mar. 25, 2014, Advisory Action, dated May 20, 2015.
U.S. Appl. No. 14/306,138, filed Jun. 16, 2014, First Office Action Interview, dated Sep. 23, 2015.
U.S. Appl. No. 14/486,991, filed Sep. 15, 2014, Office Action, dated Mar. 10, 2015.
U.S. Appl. No. 13/167,680, filed Jun. 23, 2011, Office Action, dated Sep. 26, 2012.
U.S. Appl. No. 13/839,026, filed Mar. 15, 2013, Office Action, dated Aug. 4, 2015.
U.S. Appl. No. 14/504,103, filed Oct. 1, 2014, First Office Action Interview, dated Mar. 31, 2015.
U.S. Appl. No. 14/639,606, filed Mar. 5, 2015, Final Office Action, dated Oct. 16, 2015.
U.S. Appl. No. 14/726,211, filed May 29, 2015, Office Action, dated Apr. 5, 2016.
U.S. Appl. No. 14/323,935, filed Jul. 3, 2014, First Office Action Interview, dated Mar. 31, 2015.
U.S. Appl. No. 14/715,834, filed May 19, 2015, First Office Action Interview, dated Feb. 19, 2016.
U.S. Appl. No. 14/265,637, filed Apr. 30, 2014, Notice of Allowance, dated Feb. 13, 2015.
U.S. Appl. No. 14/289,596, filed May 28, 2014, Advisory Action, dated Apr. 30, 2015.
U.S. Appl. No. 14/225,084, filed Mar. 25, 2014, First Office Action Interview, dated Feb. 20, 2015.
U.S. Appl. No. 14/451,221, filed Aug. 4, 2014, Ex Parte Quayle Action, Apr. 6, 2015.
U.S. Appl. No. 14/289,596, filed May 28, 2014, Final Office Action, dated Jan. 26, 2015.
U.S. Appl. No. 15/438,453, filed Feb. 21, 2017, Notice of Allowance, dated May 10, 2017.
U.S. Appl. No. 14/571,098, filed Dec. 15, 2014, First Office Action Interview, dated Nov. 10, 2015.
U.S. Appl. No. 13/247,987, filed Sep. 28, 2011, Office Action, dated Sep. 22, 2015.
U.S. Appl. No. 12/556,321, filed Sep. 9, 2009, Final Office Action, dated Feb. 25, 2016.
U.S. Appl. No. 14/800,447, filed Jul. 15, 2012, First Office Action Interview, dated Dec. 10, 2010.
U.S. Appl. No. 14/639,606, filed Mar. 5, 2015, First Office Action Interview, dated May 18, 2015.
U.S. Appl. No. 13/167,680, filed Jun. 23, 2011, Final Office Action, dated Mar. 13, 2013.
U.S. Appl. No. 14/578,389, dated Dec. 20, 2014, Notice of Allowance, dated Oct. 7, 2016.
U.S. Appl. No. 14/102,394, filed Dec. 10, 2013, Notice of Allowance, dated Aug. 25, 2014.
U.S. Appl. No. 14/715,834, filed May 19, 2015, First Office Action Interview, dated Mar. 14, 2016.
U.S. Appl. No. 14/294,098, filed Jun. 2, 2014, Notice of Allowance, dated Dec. 29, 2014.
U.S. Appl. No. 14/289,599, filed May 28, 2014, First Office Action Interview, dated Jul. 22, 2014.
U.S. Appl. No. 14/148,568, filed Jan. 6, 2014, Final Office Action, dated Oct. 22, 2014.
U.S. Appl. No. 13/669,274, filed Nov. 5, 2012, Office Action, dated May 2, 2016.
U.S. Appl. No. 14/192,767, filed Feb. 27, 2014, Notice of Allowance, dated Dec. 16, 2014.
U.S. Appl. No. 14/289,596, filed May 28, 2014, First Office Action Interview, dated Jul. 18, 2014.
U.S. Appl. No. 14/306,138, filed Jun. 16, 2014, Final Office Action, dated Sep. 14, 2015.
U.S. Appl. No. 14/306,138, filed Jun. 16, 2014, Interview Summary, dated Dec. 3, 2015.
U.S. Appl. No. 14/306,154, filed Jun. 16, 2017, Office Action, dated Jul. 6, 2015.
U.S. Appl. No. 14/108,187, filed Dec. 16, 2013, Notice of Allowance, dated Aug. 29, 2014.
U.S. Appl. No. 13/669,274, filed Nov. 5, 2012, Advisory Action, dated Aug. 26, 2015.
U.S. Appl. No. 14/268,964, filed May 2, 2014, Notice of Allowance, dated Dec. 3, 2014.
U.S. Appl. No. 14/306,138, filed Jun. 16, 2014, Final Office Action, dated Feb. 18, 2015.
U.S. Appl. No. 12/556,318, filed Sep. 9, 2009, Notice of Allowance, dated Apr. 11, 2016.
U.S. Appl. No. 14/552,336, filed Nov. 24, 2014, First Office Action Interview, dated Jul. 20, 2015.
U.S. Appl. No. 14/578,389, filed Dec. 20, 2014, Office Action, dated Oct. 21, 2015.
U.S. Appl. No. 14/571,098, filed Dec. 15, 2014, First Office Action Interview, dated Aug. 24, 2015.
U.S. Appl. No. 13/196,778, filed Aug. 2, 2011, Office Action, dated Oct. 23, 2015.
U.S. Appl. No. 14/578,389, filed Dec. 20, 2014, Office Action, dated Apr. 22, 2016.
U.S. Appl. No. 13/167,680, filed Jun. 23, 2011, Ex-Parte Quayle Office Action, May 23, 2013.
U.S. Appl. No. 12/556,318, filed Sep. 9, 2009, Notice of Allowance, dated Nov. 2, 2015.
U.S. Appl. No. 14/306,154, filed Jun. 16, 2014, First Office Action Interview, dated Sep. 9, 2014.
U.S. Appl. No. 14/451,221, filed Aug. 4, 2014, Office Action, dated Oct. 21, 2014.
U.S. Appl. No. 14/580,218, filed Dec. 23, 2014, Office Action, dated Jun. 26, 2015.
U.S. Appl. No. 14/996,179, filed Jan. 14, 2016, Notice of Allowance, dated Oct. 24, 2016.
U.S. Appl. No. 14/278,963, filed May 15, 2014, Notice of Allowance, dated Sep. 2, 2015.
U.S. Appl. No. 14/734,772, filed Jun. 9, 2015, First Office Action Interview, dated Jul. 24, 2015.
U.S. Appl. No. 14/734,772, filed Jun. 9, 2015, First Office Action Interview, dated Oct. 30, 2015.
U.S. Appl. No. 11/709,462, filed Feb. 21, 2007, Final Office Action, dated Jan. 7, 2011.
U.S. Appl. No. 14/961,830, filed Jun. 22, 2015, First Office Action Interview, dated Sep. 28, 2015.
U.S. Appl. No. 14/961,830, filed Dec. 7, 2015, Office Action, dated May 20, 2016.
U.S. Appl. No. 14/849,454, filed Sep. 9, 2015, Notice of Allowance, dated May 25, 2016.
U.S. Appl. No. 14/278,963, filed May 15, 2014, Final Office Action, dated Jan. 30, 2015.
U.S. Appl. No. 11/709,462, filed Feb. 21, 2007, Final Office Action, dated Mar. 26, 2010.
U.S. Appl. No. 11/709,462, filed Feb. 21, 2007, Office Action, dated May 25, 2012.
U.S. Appl. No. 14/883,498, filed Oct. 14, 2015, Office Action, dated Mar. 17, 2016.
U.S. Appl. No. 14/800,447, dated Jul. 15, 2015, Interview Summary, dated Mar. 3, 2016.
U.S. Appl. No. 11/709,462, Feb. 21, 2007, Final Office Action, dated Dec. 2, 2012.
U.S. Appl. No. 11/709,462, filed Feb. 21, 2007, Notice of Allowance, dated Aug. 27, 2014.
U.S. Appl. No. 14/841,338, filed Aug. 31, 2015, Office Action, dated Feb. 18, 2016.
U.S. Appl. No. 14/571,098, filed Dec. 15, 2014, First Office Action Interview, dated Mar. 11, 2015.
U.S. Appl. No. 14/734,772, filed Jun. 9, 2015, Notice of Allowance, dated Apr. 27, 2016.
U.S. Appl. No. 11/709,462, filed Feb. 21, 2007, Office Action, dated Oct. 13, 2009.
U.S. Appl. No. 11/709,462, filed Feb. 21, 2007, Office Action, dated Sep. 1, 2010.
U.S. Appl. No. 14/871,465, filed Sep. 30, 2015, First Office Action Interview, dated Apr. 11, 2016.
U.S. Appl. No. 13/827,491, filed Mar. 14, 2013, Final Office Action, dated Jun. 22, 2015.
U.S. Appl. No. 14/871,465, filed Sep. 30, 2015, First Office Action Interview, dated Feb. 9, 2016.
U.S. Appl. No. 15/446,917, filed Aug. 29, 2017, Notice of Allowance, dated Aug. 24, 2017.
U.S. Appl. No. 15/446/917, filed Aug. 29, 2017, Office Action, dated Apr. 21, 2017.
Related Publications (1)
Number Date Country
20180046821 A1 Feb 2018 US
Continuations (3)
Number Date Country
Parent 15438453 Feb 2017 US
Child 15690099 US
Parent 14578389 Dec 2014 US
Child 15438453 US
Parent 11709462 Feb 2007 US
Child 14578389 US