The present disclosure relates to systems and techniques for data integration, analysis, and visualization. More specifically, the present disclosure relates to systems and techniques for identifying and resolving canonical entity records.
Obtaining relevant information regarding a particular entity from multiple large lists of records can be relatively straightforward in some situations. One particular situation is when records in separate lists are similar and it is desired to obtain information in records having a particular value or character string in a particular field. The fields at issue can be isolated using filtering functions of data interfacing software and the desired information retrieved. By using combinations of filtering functions, more sophistication can be provided to the way in which fields are identified for comparison. Once compared, some records can be isolated based on the comparisons on the particular fields. The isolated records can then be aggregated so as to provide a report including all the records that together constitute the desired information.
But in order to recognize common records, such filtering functions rely on identical fields across the records. In the real world, lists may have no identical fields across the records, despite those records being related, or can have identical fields in a relatively small number of fields (or parts of fields) such that existing filtering functions are unable to provide isolation of the desired records from other records. For example, such problems can occur when a list has records originating from a number of different sources. This problem only worsens as the size of lists becomes larger (e.g., a list having billions of records), in terms of the number of records present.
Access to particular fields, records, or lists may further be restricted for security or privacy reasons, and these restrictions may increase the likelihood that information regarding a particular entity will be stored across multiple records. For example, an individual creating or updating a record regarding a particular entity may not have access to other records regarding the entity, and as a result may create or update a record that contains incomplete, duplicate, or conflicting information.
The systems, methods, and devices described herein each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure, several non-limiting features will now be discussed briefly.
Embodiments of the present disclosure relate to a secure entity resolution system that may automatically analyze a data structure or structures containing large numbers of records, identify records that relate to a common entity, and determine whether and how these records may be securely presented to users who have varying levels of access to the records (or varying levels of access to data fields within the records). Embodiments of the present disclosure also relate to user interfaces for displaying and reconciling records that relate to a common entity, facilitating communications and collaboration between users regarding records that may relate to a common entity, notifying users of potential matches, and maintaining access controls for records and/or fields that reference a common entity but have differing access criteria.
As described below, records in a data structure (e.g., a list) may include one or more fields. A field may include any data, information, or things, such as a person, a place, a date, a time, an identification number, and the like. In an example application, a human agent may be tasked with investigating individuals who are suspected to be engaged in an illegal activity or activities, and may generate or access records in a data structure that contain information regarding the individuals and/or the activities. However, the human agent may be unable to timely correlate thousands or millions of records to identify other records that contain information regarding the same individuals and/or activities without the computing technology and the embodiments of the present disclosure. Further, the implementation of the various embodiments of the present disclosure via computer technology enables many of the advantages described herein, including more efficient interaction with, and presentation of, various types of electronic data.
Accordingly, in various embodiments, large amounts of data are automatically and dynamically calculated interactively in response to user inputs, and the calculated data is efficiently and compactly presented to a user by the system. Thus, in some embodiments, the user interfaces described herein are more efficient as compared to previous user interfaces in which data is not dynamically updated and compactly and efficiently presented to the user in response to interactive inputs.
Further, as described herein, the system may be configured and/or designed to generate user interface data useable for rendering the various interactive user interfaces described. The user interface data may be used by the system, and/or another computer system, device, and/or software program (for example, a browser program), to render the interactive user interfaces. The interactive user interfaces may be displayed on, for example, electronic displays (including, for example, touch-enabled displays).
Additionally, it has been noted that design of computer user interfaces “that are useable and easily learned by humans is a non-trivial problem for software developers.” (Dillon, A. (2003) User Interface Design. MacMillan Encyclopedia of Cognitive Science, Vol. 4, London: MacMillan, 453-458.) The various embodiments of interactive and dynamic user interfaces of the present disclosure are the result of significant research, development, improvement, iteration, and testing. This non-trivial development has resulted in the user interfaces described herein which may provide significant cognitive and ergonomic efficiencies and advantages over previous systems. The interactive and dynamic user interfaces include improved human-computer interactions that may provide reduced mental workloads, improved decision-making, reduced work stress, and/or the like, for a user. For example, user interaction with the interactive user interfaces described herein may provide an optimized display of geographic information and may enable a user to more quickly access, navigate, assess, and digest such information than previous systems.
Further, the interactive and dynamic user interfaces described herein are enabled by innovations in efficient interactions between the user interfaces and underlying systems and components. For example, disclosed herein are improved methods of receiving user inputs, translation and delivery of those inputs to various system components, automatic and dynamic execution of complex processes in response to the input delivery, automatic interaction among various components and processes of the system, and automatic and dynamic updating of the user interfaces. The interactions and presentation of data via the interactive user interfaces described herein may accordingly provide cognitive and ergonomic efficiencies and advantages over previous systems.
Various embodiments of the present disclosure provide improvements to various technologies and technological fields. For example, as described below, existing technologies for resolving canonical entities are limited in various ways (e.g., they are slow and cumbersome, they require more resources than can practically be made available, they cannot securely reconcile records that have varying access restrictions, etc.), and various embodiments of the disclosure provide significant improvements over such technology. Additionally, various embodiments of the present disclosure are inextricably tied to computer technology. In particular, various embodiments rely on detection of user inputs via graphical user interfaces, calculation of updates to displayed electronic data based on those user inputs, automatic processing and updating of associations between records and probabilities that records are associated with a common entity, and secure presentation of records that are likely to relate to a common entity. Such features and others are intimately tied to, and enabled by, computer technology, and would not exist except for computer technology. For example, the interactions with displayed data described below in reference to various embodiments cannot reasonably be performed by humans alone, without the computer technology upon which they are implemented. Further, the implementation of the various embodiments of the present disclosure via computer technology enables many of the advantages described herein, including more efficient interaction with, and presentation of, various types of electronic records.
In various embodiments, systems and/or computer systems are disclosed that comprise a computer readable storage medium having program instructions embodied therewith, and one or more processors configured to execute the program instructions to cause the one or more processors to perform operations comprising one or more aspects of the above- and/or below-described embodiments (including one or more aspects of the appended claims).
In various embodiments, computer-implemented methods are disclosed in which, by one or more processors executing program instructions, one or more aspects of the above- and/or below-described embodiments (including one or more aspects of the appended claims) are implemented and/or performed.
In various embodiments, computer program products comprising a computer readable storage medium are disclosed, wherein the computer readable storage medium has program instructions embodied therewith, the program instructions executable by one or more processors to cause the one or more processors to perform operations comprising one or more aspects of the above- and/or below-described embodiments (including one or more aspects of the appended claims).
Reference will now be made to the accompanying drawings, which illustrate exemplary embodiments of the present disclosure. In the drawings:
Reference will now be made in detail to example embodiments, the examples of which are illustrated in the accompanying drawings. Whenever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
Embodiments of the present disclosure relate to systems, methods, and computer-readable mediums for securely resolving canonical entities. Data records may each refer to a respective entity, and some data records may each refer to a common entity. For example, two data records may contain information regarding the same person, place, object, or other entity. Individual data records, and individual fields within data records, may contain incomplete information, subsets of information, duplicate information, or conflicting information. A probability may be determined that two data records relate to a common entity by, for example, comparing the individual fields of one data record to corresponding fields in the other data record. Machine learning models, clustering of record pairs, or other techniques may be used to identify record pairs and determine probabilities that they relate to a common entity. Some examples of such techniques are disclosed in U.S. patent application Ser. No. 15/233,149, filed Aug. 10, 2016 and titled “SYSTEMS AND METHODS FOR AUTOMATIC CLUSTERING AND CANONICAL DESIGNATION OF RELATED DATA IN VARIOUS DATA STRUCTURES,” the entirety of which is incorporated herein by reference.
Access to particular individual records, or in some embodiments to particular fields within one or more records, may be secured. For example, access to a particular record may be restricted to members of a particular team, or access to a particular field may be limited to individuals having certain permissions or access levels. Confirming that a particular pair of records relate to the same entity may thus be difficult or impossible to achieve due to the limited ability of users to access or view one or both records.
To overcome these problems, a secure entity resolution system may be implemented in accordance with aspects of the present disclosure. As described below in detail, a secure entity resolution system may facilitate identification, display, and reconciliation of records that relate to a common entity when only limited access to one or both records is permitted.
In order to facilitate an understanding of the systems and methods discussed herein, a number of terms are defined below. The terms defined below, as well as other terms used herein, should be construed to include the provided definitions, the ordinary and customary meaning of the terms, and/or any other implied meaning for the respective terms. Thus, the definitions below do not limit the meaning of these terms, but only provide exemplary definitions.
Ontology: Stored information that provides a data model for storage of data in one or more databases. For example, the stored data may comprise definitions for object types and property types for data in a database, and how objects and properties may be related.
Data Store: Any computer readable storage medium and/or device (or collection of data storage mediums and/or devices). Examples of data stores include, but are not limited to, optical disks (e.g., CD-ROM, DVD-ROM, etc.), magnetic disks (e.g., hard disks, floppy disks, etc.), memory circuits (e.g., solid state drives, random-access memory (RAM), etc.), and/or the like. Another example of a data store is a hosted storage environment that includes a collection of physical data storage devices that may be remotely accessible and may be rapidly provisioned as needed (commonly referred to as “cloud” storage).
Database: Any data structure (and/or combinations of multiple data structures) for storing and/or organizing data, including, but not limited to, relational databases (e.g., Oracle databases, MySQL databases, etc.), non-relational databases (e.g., NoSQL databases, etc.), in-memory databases, spreadsheets, as comma separated values (CSV) files, eXtendible markup language (XML) files, TeXT (TXT) files, flat files, spreadsheet files, and/or any other widely used or proprietary format for data storage. Databases are typically stored in one or more data stores. Accordingly, each database referred to herein (e.g., in the description herein and/or the figures of the present application) is to be understood as being stored in one or more data stores.
Data Object or Object: A data container for information representing specific things in the world that have a number of definable properties. For example, a data object can represent an entity such as a person, a place, an organization, a market instrument, or other noun. A data object can represent an event that happens at a point in time or for a duration. A data object can represent a document or other unstructured data source such as an e-mail message, a news report, or a written paper or article. Each data object may be associated with a unique identifier that uniquely identifies the data object. The object's attributes (e.g. metadata about the object) may be represented in one or more properties. May also be referred to herein as “records.”
Object Type: Type of a data object (e.g., Person, Event, or Document). Object types may be defined by an ontology and may be modified or updated to include additional object types. An object definition (e.g., in an ontology) may include how the object is related to other objects, such as being a sub-object type of another object type (e.g. an agent may be a sub-object type of a person object type), and the properties the object type may have.
Properties: Attributes of a data object that represent individual data items. At a minimum, each property of a data object has a property type and a value or values. May also be referred to herein as “attributes” or “fields.”
Property Type: The type of data a property is, such as a string, an integer, or a double. Property types may include complex property types, such as a series data values associated with timed ticks (e.g. a time series), etc. May also be referred to herein as “attribute types.”
Property Value: The value associated with a property, which is of the type indicated in the property type associated with the property. A property may have multiple values. May also be referred to herein as “attribute values.”
Client computing devices 110A and 110B can be any computing devices that implement aspects of the present disclosure, and may include one or more software applications such as web browsers, mobile applications, messaging services, or other applications. In some embodiments, one or more client computing devices 110A-B may run on the secure entity resolution system 120. In any event, a user may interact with the example system 100 through one or more of the client computing devices 110A-B. While only two client computing devices 110A-B are shown in the example system 100, it will be understood that the present disclosure includes any number of client computing devices.
The secure entity resolution system 120 can be a computing system configured to identify records that may relate to a common entity and to display and reconcile these records in accordance with various access controls and security policies. For example, the secure entity resolution system 120 can be a computer system configured to execute software or a set of programmable instructions that process records to identify records that may relate to a common entity, determine whether one or more users are authorized to access all or part of one or both records, and display the records accordingly. In some embodiments, the secure entity resolution system 120 can be implemented using a computer system 510, as shown in
The secure entity resolution system 120 can include one or more computing devices (e.g., server(s)), memory storing data and/or software instructions (e.g., database(s), memory device(s), etc.), and other known computing components. According to some embodiments, the secure entity resolution system 120 can include one or more networked computers that execute processing in parallel or use a distributed computing architecture. The secure entity resolution system 120 can be configured to communicate with one or more components of the system 100, and can be configured to securely provide entity resolution information via an interface(s) accessible by users over a network (e.g., the Internet). For example, the secure entity resolution system 120 can include a web server that hosts a web page accessible through network 140. In some embodiments, the secure entity resolution system 120 can include an application server configured to provide data to one or more client applications executing on computing systems connected to the secure entity resolution system 120 via the network 140.
The entity data store 130 may illustratively be any computer-readable data store that implements aspects of the present disclosure. For example, the entity data store 130 may be a magnetic medium such as a hard disc drive, a solid state device, a flash drive, one or more databases, one or more lists, or any other non-transient computer-readable data store. The entity data store 130 may store entity records 132, each of which may contain information relating to a particular entity. As described above and below, each entity record 132 may comprise one or more fields, which may contain values associated with the particular entity. In some embodiments, the entity data store 130 may further store information such as passwords, access control lists, or other information that relates to controlling or limiting access to particular entity records 132 or to particular fields within entity records 132. In further embodiments, as described above and below, the entity data store 130 may store information regarding probabilities that a first and second entity record 132 relate to the same entity, or information indicating whether a particular user or users has confirmed, denied, or commented on the possibility that two entity records 132 reference a common entity.
The example system 100 further includes a network 140, through which the client computing devices 110A-B, secure entity resolution system 120, and entity data store 130 may communicate. The network 140 may illustratively be any wired or wireless network, including but not limited to a local area network (LAN), wide area network (WAN), Wi-Fi network, Bluetooth network, cellular network, mesh network, the Internet, or other network or networks.
It will be understood that
The first record 210 further includes metadata 214, which comprises information about the first record 210 itself rather than information regarding the associated entity. The metadata 214 may include a point of contact 212G, which in various embodiments may be a user responsible for creating or maintaining the first record 210, a user identified as an owner or originator of the first record 210, a user associated with the underlying data contained in the first record 210, a database administrator, or another user or entity. The metadata 214 may further contain information such as an identification number of the first record 210, a type of the first record 210, a status of the first record 210, and so forth.
The user interface 200 further includes a second record 220, which may (or may not) be associated with the same entity as the first record 210. The second record 220 includes fields 222A-F, which may contain the same, similar, incomplete, or conflicting information as compared to the corresponding fields 212A-F of the first record 210. For example, the name field 222A of the second record 220 contains similar but not identical information to the name field 212A of the first record. As a further example, the TIN field 222D contains conflicting information relative to the TIN field 212D. As described below, a secure entity resolution system, such as the secure entity resolution system 120 of
The user interface 200 further includes user interface controls 230, 232, and 234, which may be used to indicate whether or not the records match, or to communicate with a point of contact. The match confirmation control 230, for example, may be used to indicate that the user believes the first record 210 and the second record 220 relate to the same entity. The match rejection control 232 may similarly be used to indicate that the user believes the first record 210 and the second record 220 do not both relate to the same entity. And, as discussed in further detail below, the message control 234 may be used to facilitate communications with the point of contact 222G regarding the possibility that the records relate to the same entity.
It will be understood that the user interface 200 is provided for purposes of example, and that user interfaces displaying more, less, or different information are within the scope of the present disclosure. In some embodiments, the user interface 200 may include an estimated probability that both records relate to a common entity, or may highlight similarities and differences between the records. For example, the user interface 200 may use colors, fonts, or other indications to highlight fields that contain matching information, similar information, or conflicting information. As a further example, the user interface 200 may include uniform resource identifiers (URI) or other links to additional information, such as a link to information regarding the point of contact 222G.
In some embodiments, the message dialog 240 may further include an access control 246, which may enable granting permission to the point of contact 222G to access the first record 210. The access control 246 may optionally be displayed, for example, based on whether the user of the user interface 200 has permission to grant the point of contact 222G access to all or part of the first record 210. In some embodiments, multiple access controls may be provided to enable granting of access to various portions of the first record 210 or to individual fields 212A-F of the first record 210. The message dialog 240 may further include a send control 248, which may enable sending the message to the point of contact 222G. In various embodiments, invoking the send control 248 may trigger sending an email message, a text message, a notification, a log entry, or other communication with the point of contact 222G.
In various embodiments, the message dialog 240 may further include all or part of the first record 210, a link to all or part of the first record 210, corresponding information from the second record 220, a link to the second record 220, a link to the user interface 200, or a link to a corresponding user interface that displays a subset of the first record 210. The content of the message dialog 240 may, in some embodiments, be determined according to whether the point of contact 222G has permission to access all or part of the first record 210, and/or whether the user of the user interface 200 is authorized to grant access to all or part of the first record 210 to the point of contact 222G. In further embodiments, the message dialog 240 may indicate that the point of contact 222G is not authorized to view the first record or even to be informed of the existence of the first record, and the access control 246 and/or the send control 248 may thus be omitted.
At block 302, a first record and a second record may be obtained. The first record and the second record may illustratively be obtained from a data store, such as the entity data store 130 of
At block 304, a probability may be determined that indicates the likelihood that the first record and the second record are both associated with a common entity. As described above, in some embodiments, the probability may be determined using a machine learning model that compares one or more fields of the first record to a corresponding field or fields of the second record. In further embodiments, records that may be associated with a common entity may be identified using criteria such as particular fields (e.g., a name or an address) being similar or identical.
In some embodiments, a machine learning model may be used to process a collection of records that may number in the thousands or millions, and may identify from the collection of records a corpus of potentially matching record pairs and their associated probabilities. In such embodiments, blocks 302 and 304 may be omitted, and the routine 300 may instead iterate through the corpus of potentially matching record pairs.
At decision block 306, a determination may be made as to whether the probability determined at block 304 satisfies a criterion. For example, a determination may be made as to whether the probability exceeds a threshold of, e.g., 50% (that is, that the records are more likely than not to be associated with a common entity). As further examples, a determination may be made as to whether the probability exceeds 60%, exceeds 70%, or satisfies any other criterion. If the probability does not satisfy the criterion, then the routine 300 ends.
If the probability does satisfy the criterion, then at block 308 a first point of contact is identified for the first record, and a second point of contact is identified for the second record. In some embodiments, a point of contact is identified for only one of the records. In various other embodiments, as described above, the point of contact for a record may be a user responsible for creating the record, responsible for maintaining the record, or may be otherwise associated with the record. For example, the identified point of contact for a first record may be a user of a secure entity resolution system who has permission to access the first record. It will be understood that the point of contact identified for a record is not necessary the only point of contact or the main point of contact for the record, and that the ways in which a point of contact may be associated with the record are not limited to being specifically included in record metadata or other record content.
At decision block 310, a determination may be made as to whether the first point of contact can access some or all of the second record. Illustratively, access to the second record (or to individual fields of the second record) may be restricted to users on a particular list, such as an access control list, or may be limited to users having particular characteristics, permissions, settings, or relationships to the second record. If the first point of contact can access all or part of the second record, then at block 314 a notification may be generated and sent to the first point of contact.
At decision block 312, a determination may be made as to whether the second point of contact can access some or all of the first record. As with the second record, access to the first record (or to individual fields of the first records) may illustratively be restricted to users on a particular list, such as an access control list, or may be limited to users having particular characteristics, permissions, settings, or relationships to the first record. If the second point of contact can access all or part of the first record, then at block 316 a notification may be generated and sent to the second point of contact.
In various embodiments, the interactions at decision blocks 310 and 312 may be carried out in parallel or sequentially in either order. In further embodiments, user interfaces (such as the user interface 200 of
In some embodiments, the routine 300 may be carried out periodically or on an as-needed basis. For example, the routine 300 may be carried out nightly, weekly, when new records are created, or when records are updated. As a further example, the routine 300 may be carried out with regard to one or more records of a particular user when that user logs into a computing system or obtains the one or more records from a data store.
It will be understood that the example routine 300 represents a specific technical improvement to a computer-related technology, and may provide a set of rules that allows a computing device to efficiently perform tasks that it would otherwise be unable to perform. For example, one or more aspects of routine 300 may allow a computing device to identify and securely notify users of records that may contain conflicting or redundant information. Carrying out the routine 300 may thus improve the performance of the computing device by making it possible for these redundancies to be eliminated, thereby freeing up the computing resources associated with redundant information. Carrying out the routine 300 may further improve the accuracy of the data stored by the computing device, which thereby improves its performance with regard to providing relevant and accurate information.
At block 402, a first record and a second record that may relate to a common entity may be identified. Illustratively, the first record and the second record may be identified by carrying out a routine, such as the routine 300 described above with reference to
At block 406, the user interface may be displayed to a point of contact who has permission to access both records. The point of contact may be determined, for example, by carrying out routine 300. In some embodiments, the point of contact may only have permission to access a portion of one of the records, and the user interface generated at block 404 may display only that portion of the record. For example, the point of contact may only have permission to view the metadata of a second record, and thus may only be provided with information regarding the second record's point of contact.
At 408, input may be received via the user interface. At decision block 410 the input may be processed and a determination may be made as to whether the input represents confirmation that the first record and the second record relate to the same entity. If so, then at block 412 the first record may be associated with the second record. Illustratively, the first record may be associated with the second record by storing the association in a data store, by merging the records (which in some embodiments may include reconciling incomplete or conflicting data fields), or by logging that the point of contact believes the records relate to the same entity. It will be understood that a confirming input received from a point of contact may not be dispositive, and that a point of contact may incorrectly confirm the records relate to the same entity when in fact they do not. In some embodiments, the routine 400 may require confirmation from two or more points of contact, or from at least one point of contact for each record, before associating the first record with the second record. In further embodiments, multiple executions of the routine 400 may store that various users disagree over whether the first record and the second record relate to the same entity, or may store that a particular user or users have changed their previous opinion.
At decision block 414, a determination may be made as to whether the input indicates that the first record and the second record do not both relate to a common entity. If so, then at block 416 the non-confirmation may be associated with either record, with both records, or with the point of contact from which the input was received, and the non-confirmation may then be stored in a data store. Illustratively, the non-confirmation may be used to prevent the first record and the second record from being re-identified to the point of contact as potentially relating to the same entity. In some embodiments, the secure record identification routine 300 may verify whether a point of contact has already indicated that a pair of records do not both relate to a common entity, and if so may determine not to notify the first point of contact that the routine has again identified them as potentially referencing a common entity. In further embodiments, the routine 300 may require that the probability exceed a higher threshold before re-presenting the same pair to a point of contact, or may automatically reduce the probability given that a point of contact has previously rejected the possibility.
At decision block 418, a determination may be made as to whether a point of contact for one record has requested communication with a point of contact for the other record. If so, then at block 420 a user interface may be generated and displayed to facilitate communication between the points of contact. In various embodiments, the routine 400 may obtain a point of contact for the second record using metadata from the second record, access control lists or other security measures associated with the second record, a default point of contact, or other information. In some embodiments, as described above, the user interface may include controls that enable granting permission to access to all or part of a record.
It will be understood that the interactions at decision blocks 410, 414, and 418 may be carried out in any order, or in parallel. In some embodiments, if the input received via the user interface does not correspond to any of the decision blocks 410, 414, and 418, the routine 400 may branch to block 408 and await further input. The blocks of the routine 400 may further be rearranged, combined, or separated in various embodiments beyond the example embodiment depicted in
It will further be understood that the example routine 400 represents a specific technical improvement to a computer-related technology, and provides a set of rules that may allow a computing device to efficiently perform tasks that it would otherwise be unable to perform. For example, one or more aspects of routine 400 may allow a computing device to securely reconcile and/or remove records that may contain conflicting or redundant information. Carrying out the routine 400 may thus improve the performance of the computing device by making it possible for these redundancies to be eliminated, thereby freeing up the computing resources associated with redundant information without compromising the security of the information. Carrying out the routine 400 may further improve the accuracy of the data stored by the computing device, which thereby improves its performance with regard to securely providing relevant and accurate information.
Various embodiments of the present disclosure may be a system, a method, and/or a computer program product at any possible technical detail level of integration. The computer program product may include a computer readable storage medium (or mediums) having computer readable program instructions thereon for causing a processor to carry out aspects of the present disclosure.
For example, the functionality described herein may be performed as software instructions are executed by, and/or in response to software instructions being executed by, one or more hardware processors and/or any other suitable computing devices. The software instructions and/or other executable code may be read from a computer readable storage medium (or mediums).
The computer readable storage medium can be a tangible device that can retain and store data and/or instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device (including any volatile and/or non-volatile electronic storage devices), a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a solid state drive, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions (as also referred to herein as, for example, “code,” “instructions,” “module,” “application,” “software application,” and/or the like) for carrying out operations of the present disclosure may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages. Computer readable program instructions may be callable from other instructions or from itself, and/or may be invoked in response to detected events or interrupts. Computer readable program instructions configured for execution on computing devices may be provided on a computer readable storage medium, and/or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution) that may then be stored on a computer readable storage medium. Such computer readable program instructions may be stored, partially or fully, on a memory device (e.g., a computer readable storage medium) of the executing computing device, for execution by the computing device. The computer readable program instructions may execute entirely on a user's computer (e.g., the executing computing device), partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present disclosure.
Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart(s) and/or block diagram(s) block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks. For example, the instructions may initially be carried on a magnetic disk or solid state drive of a remote computer. The remote computer may load the instructions and/or modules into its dynamic memory and send the instructions over a telephone, cable, or optical line using a modem. A modem local to a server computing system may receive the data on the telephone/cable/optical line and use a converter device including the appropriate circuitry to place the data on a bus. The bus may carry the data to a memory, from which a processor may retrieve and execute the instructions. The instructions received by the memory may optionally be stored on a storage device (e.g., a solid state drive) either before or after execution by the computer processor.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the blocks may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In addition, certain blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate.
It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions. For example, any of the processes, methods, algorithms, elements, blocks, applications, or other functionality (or portions of functionality) described in the preceding sections may be embodied in, and/or fully or partially automated via, electronic hardware such application-specific processors (e.g., application-specific integrated circuits (ASICs)), programmable processors (e.g., field programmable gate arrays (FPGAs)), application-specific circuitry, and/or the like (any of which may also combine custom hard-wired logic, logic circuits, ASICs, FPGAs, etc. with custom programming/execution of software instructions to accomplish the techniques).
Any of the above-mentioned processors, and/or devices incorporating any of the above-mentioned processors, may be referred to herein as, for example, “computers,” “computer devices,” “computing devices,” “hardware computing devices,” “hardware processors,” “processing units,” and/or the like. Computing devices of the above-embodiments may generally (but not necessarily) be controlled and/or coordinated by operating system software, such as Mac OS, iOS, Android, Chrome OS, Windows OS (e.g., Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server, etc.), Windows CE, Unix, Linux, SunOS, Solaris, Blackberry OS, VxWorks, or other suitable operating systems. In other embodiments, the computing devices may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface functionality, such as a graphical user interface (“GUI”), among other things.
For example,
Computer system 510 also includes a main memory 516, such as a random access memory (RAM), cache and/or other dynamic storage devices, coupled to bus 512 for storing information and instructions to be executed by processor 514. Main memory 516 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 514. Such instructions, when stored in storage media accessible to processor 514, render computer system 510 into a special-purpose machine that is customized to perform the operations specified in the instructions.
Computer system 510 further includes a read only memory (ROM) 518 or other static storage device coupled to bus 512 for storing static information and instructions for processor 514. A storage device 520, such as a magnetic disk, optical disk, or USB thumb drive (Flash drive), etc., is provided and coupled to bus 512 for storing information and instructions.
Computer system 510 may be coupled via bus 512 to a display 522, such as a cathode ray tube (CRT) or LCD display (or touch screen), for displaying information to a computer user. An input device 524, including alphanumeric and other keys, is coupled to bus 512 for communicating information and command selections to processor 514. Another type of user input device is cursor control 526, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 514 and for controlling cursor movement on display 522. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. In some embodiments, the same direction information and command selections as cursor control may be implemented via receiving touches on a touch screen without a cursor.
Computing system 510 may include a user interface module to implement a GUI that may be stored in a mass storage device as computer executable program instructions that are executed by the computing device(s). Computer system 510 may further, as described below, implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system causes or programs computer system 510 to be a special-purpose machine. According to one embodiment, the techniques herein are performed by computer system 510 in response to processor(s) 514 executing one or more sequences of one or more computer readable program instructions contained in main memory 516. Such instructions may be read into main memory 516 from another storage medium, such as storage device 520. Execution of the sequences of instructions contained in main memory 516 causes processor(s) 514 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions.
Various forms of computer readable storage media may be involved in carrying one or more sequences of one or more computer readable program instructions to processor 514 for execution. For example, the instructions may initially be carried on a magnetic disk or solid state drive of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 510 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 512. Bus 512 carries the data to main memory 516, from which processor 514 retrieves and executes the instructions. The instructions received by main memory 516 may optionally be stored on storage device 810 either before or after execution by processor 514.
Computer system 510 also includes a communication interface 528 coupled to bus 512. Communication interface 528 provides a two-way data communication coupling to a network link 530 that is connected to a local network 532. For example, communication interface 528 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 528 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN (or WAN component to communicated with a WAN). Wireless links may also be implemented. In any such implementation, communication interface 528 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
Network link 530 typically provides data communication through one or more networks to other data devices. For example, network link 530 may provide a connection through local network 532 to a host computer 534 or to data equipment operated by an Internet Service Provider (ISP) 536. ISP 536 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 538. Local network 532 and Internet 538 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 530 and through communication interface 528, which carry the digital data to and from computer system 510, are example forms of transmission media.
Computer system 510 can send messages and receive data, including program code, through the network(s), network link 530 and communication interface 528. In the Internet example, a server 540 might transmit a requested code for an application program through Internet 538, ISP 536, local network 532 and communication interface 528.
The received code may be executed by processor 514 as it is received, and/or stored in storage device 520 or other non-volatile storage for later execution.
As described above, in various embodiments certain functionality may be accessible by a user through a web-based viewer (such as a web browser), or other suitable software program). In such implementations, the user interface may be generated by a server computing system and transmitted to a web browser of the user (e.g., running on the user's computing system). Alternatively, data (e.g., user interface data) necessary for generating the user interface may be provided by the server computing system to the browser, where the user interface may be generated (e.g., the user interface data may be executed by a browser accessing a web service and may be configured to render the user interfaces based on the user interface data). The user may then interact with the user interface through the web-browser. User interfaces of certain implementations may be accessible through one or more dedicated software applications. In certain embodiments, one or more of the computing devices and/or systems of the disclosure may include mobile computing devices, and user interfaces may be accessible through such mobile computing devices (for example, smartphones and/or tablets).
Many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure. The foregoing description details certain embodiments. It will be appreciated, however, that no matter how detailed the foregoing appears in text, the systems and methods can be practiced in many ways. As is also stated above, it should be noted that the use of particular terminology when describing certain features or aspects of the systems and methods should not be taken to imply that the terminology is being re-defined herein to be restricted to including any specific characteristics of the features or aspects of the systems and methods with which that terminology is associated.
Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements, and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
The term “substantially” when used in conjunction with the term “real-time” forms a phrase that will be readily understood by a person of ordinary skill in the art. For example, it is readily understood that such language will include speeds in which no or little delay or waiting is discernible, or where such delay is sufficiently short so as not to be disruptive, irritating, or otherwise vexing to user.
Conjunctive language such as the phrase “at least one of X, Y, and Z,” or “at least one of X, Y, or Z,” unless specifically stated otherwise, is to be understood with the context as used in general to convey that an item, term, etc. may be either X, Y, or Z, or a combination thereof. For example, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y, and at least one of Z to each be present.
The term “a” as used herein should be given an inclusive rather than exclusive interpretation. For example, unless specifically noted, the term “a” should not be understood to mean “exactly one” or “one and only one”; instead, the term “a” means “one or more” or “at least one,” whether used in the claims or elsewhere in the specification and regardless of uses of quantifiers such as “at least one,” “one or more,” or “a plurality” elsewhere in the claims or specification.
The term “comprising” as used herein should be given an inclusive rather than exclusive interpretation. For example, a general purpose computer comprising one or more processors should not be interpreted as excluding other computer components, and may possibly include such components as memory, input/output devices, and/or network interfaces, among others.
While the above detailed description has shown, described, and pointed out novel features as applied to various embodiments, it may be understood that various omissions, substitutions, and changes in the form and details of the devices or processes illustrated may be made without departing from the spirit of the disclosure. As may be recognized, certain embodiments of the inventions described herein may be embodied within a form that does not provide all of the features and benefits set forth herein, as some features may be used or practiced separately from others. The scope of certain inventions disclosed herein is indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Number | Name | Date | Kind |
---|---|---|---|
4881179 | Vincent | Nov 1989 | A |
5241625 | Epard et al. | Aug 1993 | A |
5826021 | Mastors et al. | Oct 1998 | A |
5832218 | Gibbs et al. | Nov 1998 | A |
5845300 | Comer | Dec 1998 | A |
5878434 | Draper et al. | Mar 1999 | A |
5897636 | Kaeser | Apr 1999 | A |
5966706 | Biliris et al. | Oct 1999 | A |
5999911 | Berg et al. | Dec 1999 | A |
6006242 | Poole et al. | Dec 1999 | A |
6057757 | Arrowsmith et al. | May 2000 | A |
6065026 | Cornelia et al. | May 2000 | A |
6101479 | Shaw | Aug 2000 | A |
6134582 | Kennedy | Oct 2000 | A |
6232971 | Haynes | May 2001 | B1 |
6237138 | Hameluck et al. | May 2001 | B1 |
6243706 | Moreau et al. | Jun 2001 | B1 |
6243717 | Gordon et al. | Jun 2001 | B1 |
6279018 | Kudrolli et al. | Aug 2001 | B1 |
6370538 | Lamping et al. | Apr 2002 | B1 |
6430305 | Decker | Aug 2002 | B1 |
6463404 | Appleby | Oct 2002 | B1 |
6519627 | Dan et al. | Feb 2003 | B1 |
6523019 | Borthwick | Feb 2003 | B1 |
6642945 | Sharpe | Nov 2003 | B1 |
6665683 | Meltzer | Dec 2003 | B1 |
6850317 | Mullins et al. | Feb 2005 | B2 |
6944777 | Belani et al. | Sep 2005 | B1 |
6944821 | Bates et al. | Sep 2005 | B1 |
6967589 | Peters | Nov 2005 | B1 |
6978419 | Kantrowitz | Dec 2005 | B1 |
7058648 | Lightfoot et al. | Jun 2006 | B1 |
7086028 | Davis et al. | Aug 2006 | B1 |
7174377 | Bernard et al. | Feb 2007 | B2 |
7194680 | Roy et al. | Mar 2007 | B1 |
7213030 | Jenkins | May 2007 | B1 |
7392254 | Jenkins | Jun 2008 | B1 |
7403942 | Bayliss | Jul 2008 | B1 |
7441182 | Beilinson et al. | Oct 2008 | B2 |
7441219 | Perry et al. | Oct 2008 | B2 |
7461158 | Rider et al. | Dec 2008 | B2 |
7627489 | Schaeffer et al. | Dec 2009 | B2 |
7627812 | Chamberlain et al. | Dec 2009 | B2 |
7634717 | Chamberlain et al. | Dec 2009 | B2 |
7716140 | Nielsen et al. | May 2010 | B1 |
7739246 | Mooney et al. | Jun 2010 | B2 |
7757220 | Griffith et al. | Jul 2010 | B2 |
7765489 | Shah | Jul 2010 | B1 |
7770100 | Chamberlain et al. | Aug 2010 | B2 |
7877421 | Berger et al. | Jan 2011 | B2 |
7880921 | Dattilo et al. | Feb 2011 | B2 |
7912842 | Bayliss | Mar 2011 | B1 |
7941336 | Robin-Jan | May 2011 | B1 |
7958147 | Turner et al. | Jun 2011 | B1 |
7962495 | Jain et al. | Jun 2011 | B2 |
7962848 | Bertram | Jun 2011 | B2 |
7966199 | Frasher | Jun 2011 | B1 |
8001465 | Kudrolli et al. | Aug 2011 | B2 |
8001482 | Bhattiprolu et al. | Aug 2011 | B2 |
8010507 | Poston et al. | Aug 2011 | B2 |
8073857 | Sreekanth | Dec 2011 | B2 |
8117022 | Linker | Feb 2012 | B2 |
8126848 | Wagner | Feb 2012 | B2 |
8191005 | Baier et al. | May 2012 | B2 |
8225201 | Michael | Jul 2012 | B2 |
8290838 | Thakur et al. | Oct 2012 | B1 |
8302855 | Ma et al. | Nov 2012 | B2 |
8312367 | Foster | Nov 2012 | B2 |
8364642 | Garrod | Jan 2013 | B1 |
8386377 | Xiong et al. | Feb 2013 | B1 |
8392556 | Goulet et al. | Mar 2013 | B2 |
8417715 | Bruckhaus et al. | Apr 2013 | B1 |
8429527 | Arbogast | Apr 2013 | B1 |
8527949 | Pleis et al. | Sep 2013 | B1 |
8554719 | McGrew | Oct 2013 | B2 |
8601326 | Kirn | Dec 2013 | B1 |
8620641 | Farnsworth et al. | Dec 2013 | B2 |
8639552 | Chen et al. | Jan 2014 | B1 |
8682696 | Shanmugam | Mar 2014 | B1 |
8688573 | Ruknoic et al. | Apr 2014 | B1 |
8732574 | Burr et al. | May 2014 | B2 |
8798354 | Bunzel et al. | Aug 2014 | B1 |
8799313 | Satlow | Aug 2014 | B2 |
8807948 | Luo et al. | Aug 2014 | B2 |
8812444 | Garrod et al. | Aug 2014 | B2 |
8838538 | Landau et al. | Sep 2014 | B1 |
8855999 | Elliot | Oct 2014 | B1 |
8903717 | Elliot | Dec 2014 | B2 |
8924388 | Elliot et al. | Dec 2014 | B2 |
8924389 | Elliot et al. | Dec 2014 | B2 |
8930874 | Duff et al. | Jan 2015 | B2 |
8938434 | Jain et al. | Jan 2015 | B2 |
8938686 | Erenrich et al. | Jan 2015 | B1 |
8984390 | Aymeloglu et al. | Mar 2015 | B2 |
9058315 | Burr et al. | Jun 2015 | B2 |
9105000 | White et al. | Aug 2015 | B1 |
9165100 | Begur et al. | Oct 2015 | B2 |
9230060 | Friedlander et al. | Jan 2016 | B2 |
9286373 | Elliot et al. | Mar 2016 | B2 |
9348499 | Aymeloglu et al. | May 2016 | B2 |
9348851 | Kirn | May 2016 | B2 |
9348880 | Kramer et al. | May 2016 | B1 |
9864770 | Lee | Jan 2018 | B2 |
20010021936 | Bertram | Sep 2001 | A1 |
20020032677 | Morgenthaler et al. | Mar 2002 | A1 |
20020035590 | Eibach et al. | Mar 2002 | A1 |
20020095360 | Joao | Jul 2002 | A1 |
20020103705 | Brady | Aug 2002 | A1 |
20020194058 | Eldering | Dec 2002 | A1 |
20020196229 | Chen et al. | Dec 2002 | A1 |
20030028560 | Kudrolli et al. | Feb 2003 | A1 |
20030036927 | Bowen | Feb 2003 | A1 |
20030061132 | Mason et al. | Mar 2003 | A1 |
20030074187 | Ait-Mokhtar et al. | Apr 2003 | A1 |
20030088438 | Maughan et al. | May 2003 | A1 |
20030093401 | Czahkowski et al. | May 2003 | A1 |
20030093755 | O'Carroll | May 2003 | A1 |
20030105759 | Bess et al. | Jun 2003 | A1 |
20030115481 | Baird et al. | Jun 2003 | A1 |
20030126102 | Borthwick | Jul 2003 | A1 |
20030171942 | Gaito | Sep 2003 | A1 |
20030177112 | Gardner | Sep 2003 | A1 |
20030182313 | Federwisch et al. | Sep 2003 | A1 |
20030212718 | Tester | Nov 2003 | A1 |
20040003009 | Wilmot | Jan 2004 | A1 |
20040006523 | Coker | Jan 2004 | A1 |
20040034570 | Davis | Feb 2004 | A1 |
20040044648 | Anfindsen et al. | Mar 2004 | A1 |
20040078451 | Dietz et al. | Apr 2004 | A1 |
20040083466 | Dapp et al. | Apr 2004 | A1 |
20040117387 | Civetta et al. | Jun 2004 | A1 |
20040153451 | Phillips et al. | Aug 2004 | A1 |
20040205492 | Newsome | Oct 2004 | A1 |
20040210763 | Jonas | Oct 2004 | A1 |
20040236688 | Bozeman | Nov 2004 | A1 |
20040236711 | Nixon et al. | Nov 2004 | A1 |
20050010472 | Quatse et al. | Jan 2005 | A1 |
20050028094 | Allyn | Feb 2005 | A1 |
20050039116 | Slack-Smith | Feb 2005 | A1 |
20050091186 | Elish | Apr 2005 | A1 |
20050097441 | Herbach et al. | May 2005 | A1 |
20050102328 | Ring et al. | May 2005 | A1 |
20050125715 | Di Franco et al. | Jun 2005 | A1 |
20050131935 | O'Leary et al. | Jun 2005 | A1 |
20050262493 | Schmidt et al. | Nov 2005 | A1 |
20050262512 | Schmidt et al. | Nov 2005 | A1 |
20060010130 | Leff et al. | Jan 2006 | A1 |
20060026561 | Bauman et al. | Feb 2006 | A1 |
20060031779 | Theurer et al. | Feb 2006 | A1 |
20060045470 | Poslinski et al. | Mar 2006 | A1 |
20060053097 | King et al. | Mar 2006 | A1 |
20060053170 | Hill et al. | Mar 2006 | A1 |
20060059423 | Lehmann et al. | Mar 2006 | A1 |
20060074866 | Chamberlain et al. | Apr 2006 | A1 |
20060080139 | Mainzer | Apr 2006 | A1 |
20060080283 | Shipman | Apr 2006 | A1 |
20060080316 | Gilmore et al. | Apr 2006 | A1 |
20060129746 | Porter | Jun 2006 | A1 |
20060136513 | Ngo et al. | Jun 2006 | A1 |
20060143075 | Carr et al. | Jun 2006 | A1 |
20060155654 | Plessis et al. | Jul 2006 | A1 |
20060178915 | Chao | Aug 2006 | A1 |
20060178954 | Thukral et al. | Aug 2006 | A1 |
20060218206 | Bourbonnais et al. | Sep 2006 | A1 |
20060218491 | Grossman et al. | Sep 2006 | A1 |
20060253502 | Raman et al. | Nov 2006 | A1 |
20060265417 | Amato et al. | Nov 2006 | A1 |
20060277460 | Forstall et al. | Dec 2006 | A1 |
20070000999 | Kubo et al. | Jan 2007 | A1 |
20070018986 | Hauser | Jan 2007 | A1 |
20070043686 | Teng et al. | Feb 2007 | A1 |
20070061752 | Cory | Mar 2007 | A1 |
20070067285 | Blume | Mar 2007 | A1 |
20070113164 | Hansen et al. | May 2007 | A1 |
20070136095 | Weinstein | Jun 2007 | A1 |
20070162454 | D'Albora et al. | Jul 2007 | A1 |
20070168871 | Jenkins | Jul 2007 | A1 |
20070174760 | Chamberlain et al. | Jul 2007 | A1 |
20070178501 | Rabinowitz et al. | Aug 2007 | A1 |
20070185850 | Walters et al. | Aug 2007 | A1 |
20070192122 | Routson et al. | Aug 2007 | A1 |
20070233756 | D'Souza et al. | Oct 2007 | A1 |
20070245339 | Bauman et al. | Oct 2007 | A1 |
20070271317 | Carmel | Nov 2007 | A1 |
20070284433 | Domenica et al. | Dec 2007 | A1 |
20070295797 | Herman et al. | Dec 2007 | A1 |
20070299697 | Friedlander et al. | Dec 2007 | A1 |
20080005063 | Seeds | Jan 2008 | A1 |
20080016155 | Khalatian | Jan 2008 | A1 |
20080091693 | Murthy | Apr 2008 | A1 |
20080109714 | Kumar et al. | May 2008 | A1 |
20080126344 | Hoffman et al. | May 2008 | A1 |
20080126951 | Sood et al. | May 2008 | A1 |
20080140387 | Linker | Jun 2008 | A1 |
20080172607 | Baer | Jul 2008 | A1 |
20080177782 | Poston et al. | Jul 2008 | A1 |
20080186904 | Koyama et al. | Aug 2008 | A1 |
20080195672 | Hamel et al. | Aug 2008 | A1 |
20080208735 | Balet et al. | Aug 2008 | A1 |
20080228467 | Womack et al. | Sep 2008 | A1 |
20080249820 | Pathria | Oct 2008 | A1 |
20080267386 | Cooper | Oct 2008 | A1 |
20080270316 | Guidotti et al. | Oct 2008 | A1 |
20080276167 | Michael | Nov 2008 | A1 |
20080281580 | Zabokritski | Nov 2008 | A1 |
20080288475 | Kim et al. | Nov 2008 | A1 |
20080301042 | Patzer | Dec 2008 | A1 |
20080313132 | Hao et al. | Dec 2008 | A1 |
20080313243 | Poston et al. | Dec 2008 | A1 |
20090024962 | Gotz | Jan 2009 | A1 |
20090031401 | Cudich et al. | Jan 2009 | A1 |
20090043801 | LeClair | Feb 2009 | A1 |
20090055487 | Moraes et al. | Feb 2009 | A1 |
20090089651 | Herberger et al. | Apr 2009 | A1 |
20090094270 | Alirez et al. | Apr 2009 | A1 |
20090106178 | Chu | Apr 2009 | A1 |
20090106242 | McGrew | Apr 2009 | A1 |
20090112678 | Luzardo | Apr 2009 | A1 |
20090112745 | Stefanescu | Apr 2009 | A1 |
20090150868 | Chakra et al. | Jun 2009 | A1 |
20090157732 | Hao et al. | Jun 2009 | A1 |
20090164387 | Armstrong et al. | Jun 2009 | A1 |
20090164934 | Bhattiprolu et al. | Jun 2009 | A1 |
20090177962 | Gusmorino et al. | Jul 2009 | A1 |
20090187546 | Whyte et al. | Jul 2009 | A1 |
20090199106 | Jonsson et al. | Aug 2009 | A1 |
20090216562 | Faulkner et al. | Aug 2009 | A1 |
20090228365 | Tomchek et al. | Sep 2009 | A1 |
20090228507 | Jain et al. | Sep 2009 | A1 |
20090248757 | Havewala et al. | Oct 2009 | A1 |
20090249178 | Ambrosino et al. | Oct 2009 | A1 |
20090249244 | Robinson et al. | Oct 2009 | A1 |
20090271343 | Vaiciulis et al. | Oct 2009 | A1 |
20090281839 | Lynn et al. | Nov 2009 | A1 |
20090282068 | Shockro et al. | Nov 2009 | A1 |
20090287470 | Farnsworth et al. | Nov 2009 | A1 |
20090299830 | West et al. | Dec 2009 | A1 |
20090307049 | Elliott et al. | Dec 2009 | A1 |
20090313311 | Hoffmann et al. | Dec 2009 | A1 |
20090313463 | Pang et al. | Dec 2009 | A1 |
20090319515 | Minton et al. | Dec 2009 | A1 |
20090319891 | MacKinlay | Dec 2009 | A1 |
20100004857 | Pereira et al. | Jan 2010 | A1 |
20100057622 | Faith et al. | Mar 2010 | A1 |
20100070531 | Aymeloglu et al. | Mar 2010 | A1 |
20100070842 | Aymeloglu et al. | Mar 2010 | A1 |
20100070844 | Aymeloglu et al. | Mar 2010 | A1 |
20100076813 | Ghosh et al. | Mar 2010 | A1 |
20100082541 | Kottomtharayil | Apr 2010 | A1 |
20100082671 | Li et al. | Apr 2010 | A1 |
20100098318 | Anderson | Apr 2010 | A1 |
20100114817 | Broeder et al. | May 2010 | A1 |
20100114831 | Gilbert et al. | May 2010 | A1 |
20100122152 | Chamberlain et al. | May 2010 | A1 |
20100145909 | Ngo | Jun 2010 | A1 |
20100204983 | Chung et al. | Aug 2010 | A1 |
20100223260 | Wu | Sep 2010 | A1 |
20100238174 | Haub et al. | Sep 2010 | A1 |
20100262901 | DiSalvo | Oct 2010 | A1 |
20100280851 | Merkin | Nov 2010 | A1 |
20100306285 | Shah et al. | Dec 2010 | A1 |
20100306722 | LeHoty et al. | Dec 2010 | A1 |
20100313239 | Chakra et al. | Dec 2010 | A1 |
20110004626 | Naeymi-Rad et al. | Jan 2011 | A1 |
20110047540 | Williams et al. | Feb 2011 | A1 |
20110066497 | Gopinath et al. | Mar 2011 | A1 |
20110074788 | Regan et al. | Mar 2011 | A1 |
20110093327 | Fordyce, III et al. | Apr 2011 | A1 |
20110099133 | Chang et al. | Apr 2011 | A1 |
20110107196 | Foster | May 2011 | A1 |
20110161409 | Nair | Jun 2011 | A1 |
20110173093 | Psota et al. | Jul 2011 | A1 |
20110179048 | Satlow | Jul 2011 | A1 |
20110208565 | Ross et al. | Aug 2011 | A1 |
20110208822 | Rathod | Aug 2011 | A1 |
20110225482 | Chan et al. | Sep 2011 | A1 |
20110225586 | Bentley et al. | Sep 2011 | A1 |
20110252282 | Meek et al. | Oct 2011 | A1 |
20110258216 | Supakkul et al. | Oct 2011 | A1 |
20120004894 | Butler | Jan 2012 | A1 |
20120022945 | Falkenborg et al. | Jan 2012 | A1 |
20120059853 | Jagota | Mar 2012 | A1 |
20120065987 | Farooq et al. | Mar 2012 | A1 |
20120078595 | Balandin et al. | Mar 2012 | A1 |
20120084117 | Tavares et al. | Apr 2012 | A1 |
20120084184 | Raleigh | Apr 2012 | A1 |
20120084287 | Lakshminarayan et al. | Apr 2012 | A1 |
20120089606 | Eshwar et al. | Apr 2012 | A1 |
20120123989 | Yu et al. | May 2012 | A1 |
20120136804 | Lucia | May 2012 | A1 |
20120188252 | Law | Jul 2012 | A1 |
20120191446 | Binsztok et al. | Jul 2012 | A1 |
20120197657 | Prodanovic | Aug 2012 | A1 |
20120197660 | Prodanovic | Aug 2012 | A1 |
20120215784 | King et al. | Aug 2012 | A1 |
20120226590 | Love et al. | Sep 2012 | A1 |
20120266245 | McDougal et al. | Oct 2012 | A1 |
20120284670 | Kashik et al. | Nov 2012 | A1 |
20120304244 | Xie et al. | Nov 2012 | A1 |
20120323829 | Stokes et al. | Dec 2012 | A1 |
20130006947 | Akinyemi et al. | Jan 2013 | A1 |
20130016106 | Yip et al. | Jan 2013 | A1 |
20130055264 | Burr et al. | Feb 2013 | A1 |
20130096968 | Van Pelt et al. | Apr 2013 | A1 |
20130097130 | Bingol et al. | Apr 2013 | A1 |
20130097482 | Marantz et al. | Apr 2013 | A1 |
20130124193 | Holmberg | May 2013 | A1 |
20130124567 | Balinsky et al. | May 2013 | A1 |
20130132348 | Garrod | May 2013 | A1 |
20130151305 | Akinola et al. | Jun 2013 | A1 |
20130151453 | Bhanot et al. | Jun 2013 | A1 |
20130166480 | Popescu et al. | Jun 2013 | A1 |
20130226879 | Talukder et al. | Aug 2013 | A1 |
20130226908 | Risher | Aug 2013 | A1 |
20130226944 | Baid et al. | Aug 2013 | A1 |
20130246316 | Zhao et al. | Sep 2013 | A1 |
20130262527 | Hunter et al. | Oct 2013 | A1 |
20130262528 | Foit | Oct 2013 | A1 |
20130263019 | Castellanos et al. | Oct 2013 | A1 |
20130288719 | Alonzo | Oct 2013 | A1 |
20130325826 | Agarwal et al. | Dec 2013 | A1 |
20140006404 | McGrew et al. | Jan 2014 | A1 |
20140089339 | Siddiqui et al. | Mar 2014 | A1 |
20140095363 | Caldwell | Apr 2014 | A1 |
20140108074 | Miller et al. | Apr 2014 | A1 |
20140129936 | Richards et al. | May 2014 | A1 |
20140208281 | Ming | Jul 2014 | A1 |
20140222793 | Sadkin et al. | Aug 2014 | A1 |
20140244284 | Smith | Aug 2014 | A1 |
20140358829 | Hurwitz | Dec 2014 | A1 |
20150012509 | Kirn | Jan 2015 | A1 |
20150026622 | Roaldson et al. | Jan 2015 | A1 |
20150046481 | Elliot | Feb 2015 | A1 |
20150073954 | Braff | Mar 2015 | A1 |
20150089353 | Folkening | Mar 2015 | A1 |
20150100907 | Erenrich et al. | Apr 2015 | A1 |
20150106379 | Elliot et al. | Apr 2015 | A1 |
20150186483 | Tappan et al. | Jul 2015 | A1 |
20150212663 | Papale et al. | Jul 2015 | A1 |
20150254220 | Burr et al. | Sep 2015 | A1 |
20160062555 | Ward et al. | Mar 2016 | A1 |
20160098176 | Cervelli et al. | Apr 2016 | A1 |
20160110369 | Cervelli et al. | Apr 2016 | A1 |
20160162519 | Stowe et al. | Jun 2016 | A1 |
20170006131 | Dennis | Jan 2017 | A1 |
20170255701 | Pratt | Sep 2017 | A1 |
Number | Date | Country |
---|---|---|
2013251186 | Nov 2015 | AU |
2014203669 | May 2016 | AU |
102054015 | May 2014 | CN |
102014204827 | Sep 2014 | DE |
102014204830 | Sep 2014 | DE |
102014204834 | Sep 2014 | DE |
102014213036 | Jan 2015 | DE |
1672527 | Jun 2006 | EP |
2487610 | Aug 2012 | EP |
2778913 | Sep 2014 | EP |
2778914 | Sep 2014 | EP |
2993595 | Mar 2016 | EP |
3002691 | Apr 2016 | EP |
3009943 | Apr 2016 | EP |
3032441 | Jun 2016 | EP |
3035214 | Jun 2016 | EP |
2366498 | Mar 2002 | GB |
2513472 | Oct 2014 | GB |
2513721 | Nov 2014 | GB |
2517582 | Feb 2015 | GB |
2013134 | Jan 2015 | NL |
WO 01025906 | Apr 2001 | WO |
WO 2001088750 | Nov 2001 | WO |
WO 2007133206 | Nov 2007 | WO |
WO 2009051987 | Apr 2009 | WO |
WO 2010030913 | Mar 2010 | WO |
WO 2010030914 | Mar 2010 | WO |
WO 2010030919 | Mar 2010 | WO |
WO 2012061162 | May 2012 | WO |
WO 2012119008 | Sep 2012 | WO |
Entry |
---|
“A Tour of Pinboard,” <http://pinboard.in/tour> as printed May 15, 2014 in 6 pages. |
Abbey, Kristen, “Review of Google Docs,” May 1, 2007, pp. 2. |
Adams et al., “Worklets: A Service-Oriented Implementation of Dynamic Flexibility in Workflows,” R. Meersman, Z. Tani et al. (Eds.): OTM 2006, LNCS, 4275, pp. 291-308, 2006. |
Anonymous, “A Real-World Problem of Matching Records,” Nov. 2006, <http://grupoweb.upf.es/bd-web/slides/ullman.pdf> pp. 1-16. |
Bluttman et al., “Excel Formulas and Functions for Dummies,” 2005, Wiley Publishing, Inc., pp. 280, 284-286. |
Brandel, Mary, “Data Loss Prevention Dos and Don'ts,” <http://web.archive.org/web/20080724024847/http://www.csoonline.com/article/221272/Dos_and_Don_ts_for_Data_Loss_Prevention>, Oct. 10, 2007, pp. 5. |
Chaudhuri et al., “An Overview of Business Intelligence Technology,” Communications of the ACM, Aug. 2011, vol. 54, No. 8. |
Conner, Nancy, “Google Apps: The Missing Manual,” May 1, 2008, pp. 15. |
Delicious, <http://delicious.com/> as printed May 15, 2014 in 1 page. |
“E-MailRelay,” <http://web.archive.org/web/20080821175021/http://emailrelay.sourceforge.net/> Aug. 21, 2008, pp. 2. |
Ferreira et al., “A Scheme for Analyzing Electronic Payment Systems,” Brazil 1997. |
Galliford, Miles, “Snaglt Versus Free Screen Capture Software: Critical Tools for Website Owners,” <http://www.subhub.com/articles/free-screen-capture-software>, Mar. 27, 2008, pp. 11. |
Gill et al. “Computerised Linking of Medical Records: Methodological Guidelines,” Journal of Epidemiology and Community Health, 1993, vol. 47, pp. 316-319. |
“GrabUp—What a Timesaver!” <http://atlchris.com/191/grabup/>, Aug. 11, 2008, pp. 3. |
Gu et al., “Record Linkage: Current Practice and Future Directions,” Jan. 15, 2004, pp. 32. |
Hua et al., “A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services”, HiPC 2006, LNCS 4297, pp. 277-288, 2006. |
JetScreenshot.com, “Share Screenshots via Internet in Seconds,” <http://web.archive.org/web/20130807164204/http://www.jetscreenshot.com/>, Aug. 7, 2013, pp. 1. |
Johnson, Maggie “Introduction to YACC and Bison”, Handout 13, Jul. 8, 2005, in 11 pages. |
Johnson, Steve, “Access 2013 on demand,” Access 2013 on Demand, May 9, 2013, Que Publishing, 22 pages. |
Kwout, <http://web.archive.org/web/20080905132448/http://www.kwout.com/> Sep. 5, 2008, pp. 2. |
Lim et al., “Resolving Attribute Incompatibility in Database Integration: An Evidential Reasoning Approach,” Department of Computer Science, University of Minnesota, 1994, <http://reference.kfupm.edu.sa/content/r/e/resolving_attribute_incompatibility_in_d_531691.pdf> pp. 1-10. |
Litwin et al., “Multidatabase Interoperability,” IEEE Computer, Dec. 1986, vol. 19, No. 12, http://www.lamsade.dauphine.fr/˜litwin/mdb-interoperability.pdf, pp. 10-18. |
Microsoft Windows, “Microsoft Windows Version 2002 Print Out 2,” 2002, pp. 1-6. |
Microsoft, “Registering an Application to a URI Scheme,” <http://msdn.microsoft.com/en-us/library/aa767914.aspx>, printed Apr. 4, 2009 in 4 pages. |
Microsoft, “Using the Clipboard,” <http://msdn.microsoft.com/en-us/library/ms649016.aspx>, printed Jun. 8, 2009 in 20 pages. |
Nadeau et al., “A Survey of Named Entity Recognition and Classification,” Jan. 15, 2004, pp. 20. |
Nin et al., “On the Use of Semantic Blocking Techniques for Data Cleansing and Integration,” 11th International Database Engineering and Applications Symposium, 2007, pp. 9. |
Nitro, “Trick: How to Capture a Screenshot As PDF, Annotate, Then Share It,” <http://blog.nitropdf.com/2008/03/04/trick-how-to-capture-a-screenshot-as-pdf-annotate-it-then-share/>, Mar. 4, 2008, pp. 2. |
Online Tech Tips, “Clip2Net—Share files, folders and screenshots easily,” <http://www.online-tech-tips.com/free-software-downloads/share-files-folders-screenshots/>, Apr. 2, 2008, pp. 5. |
O'Reilly.com, http://oreilly.com/digitalmedia/2006/01/01/mac-os-x-screenshot-secrets.html published Jan. 1, 2006 in 10 pages. |
Pythagoras Communications Ltd., “Microsoft CRM Duplicate Detection,” Sep. 13, 2011, https://www.youtube.com/watch?v=j-7Qis0D0Kc. |
Qiang et al., “A Mutual-Information-Based Approach to Entity Reconciliation in Heterogeneous Databases,” Proceedings of 2008 International Conference on Computer Science & Software Engineering, IEEE Computer Society, New York, NY, Dec. 12-14, 2008, pp. 666-669. |
Schroder, Stan, “15 Ways To Create Website Screenshots,” <http://mashable.com/2007/08/24/web-screenshots/>, Aug. 24, 2007, pp. 2. |
Sekine et al., “Definition, Dictionaries and Tagger for Extended Named Entity Hierarchy,” May 2004, pp. 1977-1980. |
SnagIt, “SnagIt 8.1.0 Print Out 2,” Software release date Jun. 15, 2006, pp. 1-3. |
SnagIt, “SnagIt Online Help Guide,” <http://download.techsmith.com/snagit/docs/onlinehelp/enu/snagit_help.pdf>, TechSmith Corp., Version 8.1, printed Feb. 7, 2007, pp. 284. |
Wang et al., “Research on a Clustering Data De-Duplication Mechanism Based on Bloom Filter,” IEEE 2010, 5 pages. |
Warren, Christina, “TUAW Faceoff: Screenshot apps on the firing line,” <http://www.tuaw.com/2008/05/05/tuaw-faceoff-screenshot-apps-on-the-firing-line/>, May 5, 2008, pp. 11. |
Wikipedia, “Multimap,” Jan. 1, 2013, https://en.wikipedia.org/w/index.php?title-Multimap&oldid=530800748. |
Winkler, William E., “Bureau of the Census Statistical Research Division Record Linkage Software and Methods for Merging Administrative Lists,” Statistical Research Report Series No. RR2001/03, Jul. 23, 2001, https://www.census.gov/srd/papers/pdf/rr2001-03.pdf, retrieved on Mar. 9, 2016. |
Zhao et al., “Entity Matching Across Heterogeneous Data Sources: An Approach Based On Constrained Cascade Generalization,” Data & Knowledge Engineering, vol. 66, No. 3, Sep. 2008, pp. 368-381. |
Number | Date | Country | |
---|---|---|---|
62492579 | May 2017 | US |