Embodiments of the present disclosure relate to an enterprise data portal for use in electronic discovery or other similar electronic document review processes. In general, the enterprise portal provides a means for collecting, ingesting, processing, and publishing content such as electronic and/or digital documents using a plurality of tools integrated through the portal.
Some embodiments may be directed to an electronic discovery system, comprising: a document collection system that collects relevant documents from one or more target sources; an investigation platform that processes the relevant documents; and a portal system that interfaces the document collection system and the investigation platform to provide end-to-end electronic discovery, the portal system being configured to: receive a document collection request, the request comprising criteria used to select the relevant documents from the one or more target sources; generate a tracking unit for the relevant documents, the tracking unit being used to track progression of the relevant documents from collection, to processing through the investigation platform, and to publishing; cause the document collection system to obtain the relevant documents from the one or more target sources; cause the investigation platform to process the relevant documents through an ingest and index process based on the criteria; and a publishing platform that is configured to publish any of the relevant documents identified by the investigation platform.
Some embodiments may be directed to a system comprising: a processor; and a memory for storing instructions, the processor executing the instructions to: receive a document collection request, the request comprising criteria used to select relevant documents from one or more target sources; generate a tracking unit for the relevant documents, the tracking unit being used to track progression of the relevant documents from collection, to processing through an investigation platform, and to publishing on a publishing platform; cause a document collection system to obtain the relevant documents from the one or more target sources; cause an investigation platform to process the relevant documents through an ingest and index process based on the criteria; and cause a publishing platform to publish any of the relevant documents identified by the investigation platform.
Some embodiments may be directed to a method comprising: receiving a content collection request, the request comprising criteria used to select relevant content from one or more target sources; generating a tracking unit for the relevant content, the tracking unit being used to track progression of the relevant content from collection, to crawling and indexing, and to publishing; causing a content collection system to obtain the relevant content from the one or more target sources; causing an investigation platform to process the relevant content through an ingest and index process based on the criteria; and causing a publishing platform to publish any of the relevant content identified by the investigation platform.
The accompanying drawings, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed disclosure, and explain various principles and advantages of those embodiments.
The methods and systems disclosed herein have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
The system 100 comprises a plurality of target sources 102A-102N (e.g., endpoints) that can include laptops, desktops, mobile devices, servers, cloud resources, and so forth. Each of these endpoints can contain or access electronic content such as documents, emails, and other similar electronic data that includes at least some textual content. The electronic content can include audio content, video content, digital data and the like. Thus, while the term “document” may be used in some examples, the systems and methods disclosed herein are not limited to processing only documents but any desired electronic data. These electronic data can be collected and preserved to comply with litigation production requirements, generally referred to as electronic discovery.
The system 100 can also comprise a content collection manager 104, an enterprise data portal 106, an investigation platform 108, a review and analysis platform 110, a launchpad platform 112, and a publishing platform 120. While each of these sub-systems will be described individually, the functionalities of one or more of these sub-systems can be combined in some instances. In some embodiments, the components of the system 100 can be communicatively coupled using a network 116 that can include any public and/or private network that would be known to one of ordinary skill in the art. In general, the launchpad platform 112 functions as a central operation and administration tool in the system. It provides a central location for clients and litigation support personnel to create and configure cases, monitor progress on these cases, and assign users to work on these cases in different roles. Launchpad platform 112 interacts with all the other applications in the electronic discovery setup and synchronizes status of data and tracking objects all through their life-cycles.
As noted above, the content collection manager 104 can be configured to obtain documents from the plurality of target sources 102A-102N such as laptops, desktops, mobile devices, servers, clouds, containers, and other similar systems or devices. The content collection manager 104 can deploy various collection agents 118A-118N to collect documents from the collection targets.
In general, users can utilize the content collection manager 104 (through use of the enterprise data portal 106) to identify what documents should be collected from the various target sources 102A-102N. For example, a user can specify that the desire to obtain all emails from a specified cloud repository. In some instances, the user can specify additional details that specify that only certain documents should be returned (e.g., criteria). For example, the user can specify that they only want documents corresponding to a particular individual (such as a custodian or other individual who provides data for a litigation document review process), or documents having certain keywords or concepts, or from a specific time frame—just to name a few examples. In some embodiments, the content collection manager 104 can deploy and utilize agents to obtain documents from one or more targets. The content collection manager 104 can collect documents that are selected using criteria or the content collection manager 104 can obtain documents in chunks. In general, a chunk comprises a small group of documents. For example, a corpus or collection of 10,000 files can be chunked into 10 chunks of 1000 files each. Chunking large batches of files allow the systems disclosed herein to initiate processing a first 1000 files while the last 1000 files are yet to be collected or being collected.
An enterprise data portal 106 functionally links the content collection manager 104 with the investigation platform 108. In general, the integration between the content collection manager 104 and the investigation platform 108 provides seamless data flow and exhaustive document collection through the plurality of target sources 102A-102N all through a single integration interface. The also enterprise data portal 106 provides, automated data progression, client customizations, complete chain of custody, data discovery, and case administration.
With respect to automated data progression, the system 100 provides a single point of control, allowing users to leverage the functionalities of both the content collection manager 104 and the investigation platform 108 simultaneously. The system 100 also allows a user to collect documents from the target sources 102A-102N using user-selected criteria. The system 100 can also provide rule-based data progressions. For example, a user can specify the order in which certain document processing operations are performed. In one use case a user can specify that all document types can be processed to identify certain names of individuals, and then in a subsequent process identify relevant keywords or phrases for documents that include the named individuals.
The investigation platform 108 also leverages the functionalities of the review and analysis platform 110. The enterprise data portal 106 provides for robust endpoints collection through the content collection manager 104 and direct cloud collection of documents through a crawler connector functionality of the investigation platform 108. In some embodiments, the enterprise data portal 106 can coordinate content collection manager 104 and crawler connectors 114A-114N of the investigation platform 108, providing for seamless document collection using portions of each system. Criteria-based.
The crawler connectors 114A-114N can ingest documents which can include crawling and indexing the documents. That is, the crawler connectors 114A-114N can be used to identify textual content in the documents, as well as identify a document type for a document. For example, a document can be crawled and analyzed to identify the document as an email, a webpage, a word processing document, or other general document type. The textual content in the document can also be analyzed for indexing. Specific words, phrases, or other content can be identified.
That is, each of the crawler connectors 114A-114N can pre-process documents from one or more of the plurality of target sources 102A-102N. In some instances, each of the crawler connectors 114A-114N can process a document for a particular purpose. For example, one of the crawler connectors 114A-114N can be configured to identify documents having credit card numbers, while another one of the crawler connectors 114A-114N can be configured to identify phone numbers in documents.
Thus, the enterprise data portal 106 can utilize independent functions provided by two distinct systems (e.g., enterprise data portal 106 and investigation platform 108), coordinating their efforts for a specific purpose or set of purposes involving any of the collection, processing, or publishing of electronic documents in discovery-related tasks. The enterprise data portal 106 provides staged data intake in some embodiments using the crawler connectors 114A-114N. In other embodiments, the enterprise data portal 106 can be embodied in an on-premises appliance or in an in-pod setup. In other embodiments, the enterprise data portal 106 can be accessed virtually as a service.
As noted above, the investigation platform 108, using the crawler connectors 114A-114N, can pre-process the documents obtained from the plurality of target sources 102A-102N to reduce a number of documents using high-level filtering. That is, the volume of documents found using the document collection manager can be reduced to based on relevance using the investigation platform 108. The high-level filtering can include the use of culling and collection criteria and/or keyword search-term criteria.
The investigation platform 108 can narrow scope of review with user-directed controls that leverage more than different metadata fields from basics such as date, source and file type to advanced communication properties. The investigation platform 108 can identify key phrases within documents and create a conceptual map based on relationships among words. The investigation platform allows a user to identify terms that they may have missed while including or excluding select phrases for better search results.
The investigation platform 108 can also pre-process documents to identify who wrote a document to whom, from which domains documents were transmitted/received, when documents were sent and how often documents occurred in the target sources 102A-102N. The investigation platform 108 allows a user to identify data sent to a personal account or an unknown third party.
Thus, once documents have been retrieved, the documents are then subject to processing through the investigation platform 108. The investigation platform 108 can allow for broad types of document processing, such as family level de-duplication of documents (e.g., where identical or duplicative material is excised). A full-text index of all de-duplicated documents can be generated by the investigation platform 108, which includes creating an index that is searchable by keyword or phrases. Users or automated processes can then be used to further reduce the document count using the index. In one example use case, de-duplication could occur when emails in an email string are found during document identification and processing. Multiple emails in the email string are returned, but some may have duplicative information. For example, a single email in the chain may include a relevant social security number. The investigation platform 108 can keep only one email from the string and remove the rest to de-duplicate the data.
In some embodiments, the investigation platform 108 allows for both foldering and tagging of documents based on, for example, category types. For example, all emails can be placed in one folder. In some embodiments, sub-folders can be created that would allow, for example, separation of emails based on sender name into separate sub-folders. In some embodiments, the investigation platform 108 can employ early case assessment (ECA) analytics. In some instances, the investigation platform 108 applies continuous machine learning to identify relevant content in any data set, while also providing flexible, accurate and defensible predictive coding of documents. In some instances, the investigation platform 108 can incorporate feedback received from the review and analysis platform 110. That is, the investigation platform 108 may process documents in an automated manner using criteria/rules. Further analysis by subject matter experts may occur at the review and analysis platform 110 level. If a document that was identified by the investigation platform 108 as being relevant is determined by a subject matter expert to be irrelevant, the rejection of this document can be fed back to the investigation platform 108 to update its machine learning logic so that future documents are processed more accurately. In another example, a subject matter expert may correct the predictive coding of a document. These corrections can be used to update/train the machine learning logic of the investigation platform 108.
Also, the investigation platform 108 can automatically redact sensitive data such as phone numbers, social security numbers (SSNs) and credit cards—virtually any identifiable pattern—in individual documents or across entire data sets. For example, the investigation platform 108 can identify social security numbers in emails and redact the same prior to allow an authorized end user, such as an attorney, to view the documents.
Once the documents have been provisionally processed using the investigation platform 108, the documents can be further processed using the review and analysis platform 110. In general, the review and analysis platform 110 provides a user interface that allows a user to review workflows (discussed in greater detail infra), provide a means for review and batch management, full production, and productivity reporting—just to name a few.
The investigation platform 108 can be configured to provide early case assessment for the data that enters this stage. The tool builds a full-text index on the contents of the documents promoted to investigation and allows the client to do content level searching, full text culling, de-duplication and assessment based on advanced analytics like phrases and concept groups identified. The investigation platform 108 can build a full text index of collected content that will allow for identification, investigation, full-text culling, and global de-duplication based on the content in the documents. The investigation platform 108 can allow the user to interact with the phrases and concept groups identified, and will allow content level search capabilities on the document set. The investigation platform 108 can allow a user to define criteria on the document set for promotion to review, as well as update launchpad platform 112 of the data in the investigation platform 108 and the subset of documents that have been promoted to review for tracking purposes. Investigation platform 108 can allow a client to choose which matter/review instance to which a selected document set is published.
In some embodiments, the use of the content collection manager 104 can be facilitated through a launchpad platform 112. The launchpad platform 112 provides general system management functionalities such as user and matter management, as well as meta-features such as cross-case reporting, such as when documents found in one search are relevant to another search.
In an example use case, a project is initiated within the system 100 that includes, for example, a litigation case or eDiscovery data processing request for which a workspace is created within the system 100 through use of the enterprise data portal 106. One or more of the crawler connectors 114A-114N are enabled to reach out to data hosting locations such as the target sources 102A-102N to collect data such as electronic documents. For example, the target sources 102A-102N could include a folder on a file-sharing service, a mailbox on an exchange server, or any other location where electronic documents of any kind may be stored.
Using the enterprise data portal 106, a user can specify collection criteria such as “identify files modified in the last three months” or “emails with attachments”. As noted above, these collection criteria can be used to identify a corpus of documents that belong to broad-based categories. The collection criteria can be more granular to help identify documents with very specific attributes in some instances.
The system 100 can provide a user with a collection status in some instances that provide an indication as to the status of a data collection process relative to a given data set. For example, a status could include pending, in-progress, completed, or failed. In some instances, the system 100 can provide a user with a data progression status of the data request that indicates how far in the collection process a data request has reached. For example, a publish-in-process status indicates that some data have been published to the review and analysis platform 110, while additional data is currently being collected or processed.
As noted above, the enterprise data portal 106 provides a complete chain of custody control. The enterprise data portal 106 can implement tracking unit functionality where a set of collected documents (e.g., a sub-set of relevant content/documents) obtained at a specific point in time is assigned a tracking unit identifier. The tracking unit identifier allows any portion of the enterprise data portal 106 to identify where these documents are at in the electronic discovery reference model (EDRM) cycle. The tracking unit identifier is used to establish chain of custody and a reference for document audits. Generally, a tracking unit is a fundamental atomic unit of data used for tracking purposes. It will be understood that all data of a tracking unit travels together through the system with no additions or no deletions to the number of documents in the tracking unit being allowed. In some embodiments, persistent data for a tracking unit is data which does not satisfy the criteria for promotion (e.g., culled data).
A tracking unit can be maintained at a custodian-collection source association (CSA) level. In other words, all data belonging to a CSA that is either ships together or is ingested together (for data collected and shipped external to a remote collection tool). The tracking unit can itself have a unique identifier, as well as a case identifier that links the tracking unit back to a greater document collection/processing task/request. The tracking unit can also identify a collection target (an identified of a system from which the data in tracking unit was obtained), a stage identifier that identifies where in document processing the tracking unit currently resides, as well as a status. Also, the tracking unit can be assigned a generation identifier that is indicative of what stage in the document collection and/or processing phases the tracking unit was created.
A tracking unit may be defined (generated) whenever any untracked data that belongs to a CSA (Custodian Source Association) is promoted from one stage to another within the system 100. This can happen in two example instances: (1) remote collection, when data (document set) is picked for adding to delivery in remote collection and the delivery is generated, all data that belongs to a CSA (Custodian Source Association) can be marked under one tracking unit (and moves along with the Delivery and to later stages); and (2) processing for data collected through external collection, the CSA is done for staged data in a processing aspect of the system 100. When some data (document set) can be promoted to investigation, all promoted data that belongs to a CSA (Custodian Source Association) will be marked under one tracking unit.
During an investigation stage 134, full-text culling and publishing from the investigation platform 108 to the review and analysis platform 110 can occur. At a review stage 136 all requested and processed data are available for review, and in a deleted stage (not shown) a collection source has been deleted (or alternatively all data for a particular collection source has been deleted). For any of these stages mentioned above, a tracking unit can have a status that can include any of pending, in-progress, completed, exception resolution needed, or failed.
This unique strategy for electronic discovery content management enables a full chain of custody or end-to-end electronic content discovery platform. By exposing different stages as separate applications (Collection, Processing, Investigation, and Review) the systems disclosed herein allow users to cover full case-management and monitoring from collection, data-loading to production, referred to generally as end-to-end.
In some embodiments, content can be processed using a Raw Data Unit (RDU) or Media Unit, which refers to an identified sub-set of files in a media drive that refers to a collection of files. This RDU can be used for tracking which information shipped in the media has been uploaded to staging, and which files have been left behind. The system 100 can track each high-level folder at a pre-configured depth as a separate RDU. All content under an RDU is either picked for staging or rejected from processing. Specific files may not be selected for staging from a given RDU. In short, these data in an RDU refer to data that is not yet staged but is only in the check-in location, where the uploaded documents arrive, or where the shipped data is copied from media drives.
A Staging Data Unit (SDU) or Transfer Unit is a set of files/documents that are copied to a staging location in one iteration. Based on the priorities given by a project manager or the client, data can be moved from check-in location to staging location in tranches. Each movement constitutes one Transfer Unit and one Transfer Unit can stage one or more RDUs/Media Units. In short, this refers to the data that is staged and is available for further processing.
A collection source graphical user interface 400 is illustrated in
A pair of collection target GUIs 500 and 600 are illustrated in
An example collection criteria GUI 700 is illustrated in
An example data request GUI 800 that includes a plurality of data request instances is illustrated in
An example data request creation form 900 is illustrated in
The GUI 1100 also indicates how many documents belong to the set of documents of the tracking unit, as well as how many of these collected documents have been ingested (e.g., processed), and ultimately published. The set of documents can be time-stamped relative to when the documents were obtained (e.g., creation date), as well as a most recent time stamp when an action occurred relative to the documents of the tracking unit. Further detailed information regarding data associated with a tracking unit can be found in
Next, the method can include a step 1306 of causing a document collection system to obtain the relevant documents from the one or more target sources, as well as a step 1308 of causing an investigation platform to process the relevant documents through an ingest and index process based on the criteria.
The method can include a step 1310 of causing a publishing platform to publish any of the relevant documents identified by the investigation platform. The method can comprise a step 1312 of tracking the progression of the relevant documents from collection to processing through the investigation platform, and publishing using the tracking unit. To be sure, step 1312 is a continuous process that can be initiated when a document collection request is received and continues as documents are collected, ingested (crawled and indexed), and ultimately published to create chain of custody proof. The tracking also identifies relevant metrics related to each document processing step such as numbers of relevant documents that were collected, numbers of relevant documents that were processed (ingested), and numbers of relevant documents that were published.
As noted above, these metrics can be provided on various graphical user interfaces. For example, a graphical user interface can be created that illustrates the progression of the relevant documents from collection, to processing through the investigation platform, and to publishing based on the tracking unit.
A graphical user interface can be created that identifies any of the relevant documents that have failed to progress to publishing. A graphical user interface can be created that identifies progression times required for the relevant documents to be collected, processed through the investigation platform, and published. A graphical user interface can be created that identifies a last current action associated with the tracking unit.
A graphical user interface can comprise a graphical representation of a number of the relevant documents that have been collected versus a number of the relevant documents that have been indexed, as well as a number of the relevant documents that have been published.
A graphical user interface can identify a start and end date for each of collection, processing, and publishing of the relevant documents. A graphical user interface can be configured to identify at least one of the relevant documents that have failed to publish or have failed to be processed.
The computer system 1 includes a processor or multiple processor(s) 5 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both), and a main memory 10 and static memory 15, which communicate with each other via a bus 20. The computer system 1 may further include a video display 35 (e.g., a liquid crystal display (LCD)). The computer system 1 may also include an alpha-numeric input device(s) 30 (e.g., a keyboard), a cursor control device (e.g., a mouse), a voice recognition or biometric verification unit (not shown), a drive unit 37 (also referred to as disk drive unit), a signal generation device 40 (e.g., a speaker), and a network interface device 45. The computer system 1 may further include a data encryption module (not shown) to encrypt data.
The drive unit 37 includes a computer or machine-readable medium 50 on which is stored one or more sets of instructions and data structures (e.g., instructions 55) embodying or utilizing any one or more of the methodologies or functions described herein. The instructions 55 may also reside, completely or at least partially, within the main memory 10 and/or within the processor(s) 5 during execution thereof by the computer system 1. The main memory 10 and the processor(s) 5 may also constitute machine-readable media.
The instructions 55 may further be transmitted or received over a network via the network interface device 45 utilizing any one of a number of well-known transfer protocols (e.g., Hyper Text Transfer Protocol (HTTP)). While the machine-readable medium 50 is shown in an example embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present application, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set of instructions. The term “computer-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, and carrier wave signals. Such media may also include, without limitation, hard disks, floppy disks, flash memory cards, digital video disks, random access memory (RAM), read only memory (ROM), and the like. The example embodiments described herein may be implemented in an operating environment comprising software installed on a computer, in hardware, or in a combination of software and hardware.
The components provided in the computer system 1 of
Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium). The instructions may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the technology. Those skilled in the art are familiar with instructions, processor(s), and storage media.
In some embodiments, the computer system 1 may be implemented as a cloud-based computing environment, such as a virtual machine operating within a computing cloud. In other embodiments, the computer system 1 may itself include a cloud-based computing environment, where the functionalities of the computer system 1 are executed in a distributed fashion. Thus, the computer system 1, when configured as a computing cloud, may include pluralities of computing devices in various forms, as will be described in greater detail below.
In general, a cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors (such as within web servers) and/or that combines the storage capacity of a large grouping of computer memories or storage devices. Systems that provide cloud-based resources may be utilized exclusively by their owners or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
The cloud is formed, for example, by a network of web servers that comprise a plurality of computing devices, such as the computer system 1, with each server (or at least a plurality thereof) providing processor and/or storage resources. These servers manage workloads provided by multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depends on the type of business associated with the user.
It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the technology. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a CPU for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Transmission media include coaxial cables, copper wire and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or data exchange adapter, a carrier wave, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.
Computer program code for carrying out operations for aspects of the present technology may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The foregoing detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with exemplary embodiments. These example embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical, and electrical changes can be made without departing from the scope of what is claimed. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.
In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a nonexclusive “or,” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. Furthermore, all publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. The descriptions are not intended to limit the scope of the technology to the particular forms set forth herein. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described described exemplary embodiments. It should be understood that the above description is illustrative and not restrictive. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the technology as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art. The scope of the technology should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
This application is a continuation of and claims the benefit and priority of U.S. application Ser. No. 16/749,920, filed Jan. 22, 2020, entitled “Seamless Enterprise Discovery System with an Enterprise Data Portal,” which in turn claims the benefit and priority of U.S. Provisional Application Ser. No. 62/797,084, filed on Jan. 25, 2019, entitled “Seamless Enterprise Discovery System with Enterprise Data Portal,” all of which are hereby incorporated by reference in their entirety, including all references and appendices cited therein, for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5826257 | Snelling, Jr. | Oct 1998 | A |
5862325 | Reed et al. | Jan 1999 | A |
5950196 | Pyreddy et al. | Sep 1999 | A |
6014680 | Sato et al. | Jan 2000 | A |
6222530 | Sequeira | Apr 2001 | B1 |
6233575 | Agrawal et al. | May 2001 | B1 |
6539375 | Kawasaki | Mar 2003 | B2 |
6546385 | Mao et al. | Apr 2003 | B1 |
6694329 | Murray | Feb 2004 | B2 |
6757710 | Reed | Jun 2004 | B2 |
6999962 | Julliard et al. | Feb 2006 | B2 |
7143089 | Petras et al. | Nov 2006 | B2 |
7747631 | Puzicha et al. | Jun 2010 | B1 |
7890533 | Pollara | Feb 2011 | B2 |
7949629 | Pollara | May 2011 | B2 |
7958164 | Ivanov et al. | Jun 2011 | B2 |
7996211 | Gao et al. | Aug 2011 | B2 |
8010341 | Achan et al. | Aug 2011 | B2 |
8024333 | Puzicha et al. | Sep 2011 | B1 |
8103678 | Puzicha et al. | Jan 2012 | B1 |
8140323 | Johnson et al. | Mar 2012 | B2 |
8204738 | Skuratovsky | Jun 2012 | B2 |
8266148 | Guha et al. | Sep 2012 | B2 |
8306922 | Kunal et al. | Nov 2012 | B1 |
8311950 | Kunal et al. | Nov 2012 | B1 |
8429159 | Puzicha et al. | Apr 2013 | B1 |
8433558 | Bangalore et al. | Apr 2013 | B2 |
8443013 | Lin et al. | May 2013 | B1 |
8566897 | Sequeira | Oct 2013 | B2 |
8589394 | Vignet | Nov 2013 | B2 |
8589419 | Puzicha et al. | Nov 2013 | B2 |
8856642 | Riediger et al. | Oct 2014 | B1 |
8943397 | Palleschi et al. | Jan 2015 | B2 |
8965886 | Puzicha et al. | Feb 2015 | B2 |
9122729 | Love | Sep 2015 | B2 |
9146916 | Moroze | Sep 2015 | B2 |
9495347 | Stadermann et al. | Nov 2016 | B2 |
10102193 | Riediger et al. | Oct 2018 | B2 |
10191893 | Riediger et al. | Jan 2019 | B2 |
10387557 | Riediger et al. | Aug 2019 | B2 |
10650091 | Riediger et al. | May 2020 | B2 |
10762142 | Puzicha et al. | Sep 2020 | B2 |
11048762 | Puzicha et al. | Jun 2021 | B2 |
11610277 | Krovvidi | Mar 2023 | B2 |
11631021 | Benjamin | Apr 2023 | B1 |
20010014852 | Tsourikov et al. | Aug 2001 | A1 |
20010047290 | Petras et al. | Nov 2001 | A1 |
20020040375 | Simon et al. | Apr 2002 | A1 |
20020095454 | Reed et al. | Jul 2002 | A1 |
20020099714 | Murray | Jul 2002 | A1 |
20020103834 | Thompson et al. | Aug 2002 | A1 |
20020107853 | Hofmann et al. | Aug 2002 | A1 |
20020194026 | Klein et al. | Dec 2002 | A1 |
20030018668 | Britton et al. | Jan 2003 | A1 |
20030191727 | Yao et al. | Oct 2003 | A1 |
20030200533 | Roberts et al. | Oct 2003 | A1 |
20030212544 | Acero et al. | Nov 2003 | A1 |
20030217052 | Rubenczyk et al. | Nov 2003 | A1 |
20030229854 | Lemay | Dec 2003 | A1 |
20040078190 | Fass et al. | Apr 2004 | A1 |
20040193520 | LaComb et al. | Sep 2004 | A1 |
20040202065 | Chen | Oct 2004 | A1 |
20060010029 | Gross | Jan 2006 | A1 |
20060020942 | Ly et al. | Jan 2006 | A1 |
20060155703 | Dejean et al. | Jul 2006 | A1 |
20070011134 | Langseth et al. | Jan 2007 | A1 |
20070214010 | Beaver et al. | Sep 2007 | A1 |
20070271249 | Cragun et al. | Nov 2007 | A1 |
20080132799 | Xue | Jun 2008 | A1 |
20080162111 | Bangalore et al. | Jul 2008 | A1 |
20080172597 | DeHaan | Jul 2008 | A1 |
20080221874 | Cao et al. | Sep 2008 | A1 |
20080294679 | Gatterbauer et al. | Nov 2008 | A1 |
20090013246 | Cudich et al. | Jan 2009 | A1 |
20090044095 | Berger et al. | Feb 2009 | A1 |
20090067717 | Iwasaki | Mar 2009 | A1 |
20090110279 | Jain et al. | Apr 2009 | A1 |
20090148048 | Hosomi | Jun 2009 | A1 |
20090175532 | Zuev | Jul 2009 | A1 |
20090300043 | MacLennan | Dec 2009 | A1 |
20100106485 | Lu et al. | Apr 2010 | A1 |
20100138894 | Kyojima | Jun 2010 | A1 |
20100145902 | Boyan et al. | Jun 2010 | A1 |
20100161627 | Vossen et al. | Jun 2010 | A1 |
20100174732 | Levy et al. | Jul 2010 | A1 |
20100241451 | Gatt | Sep 2010 | A1 |
20100257144 | Lambert et al. | Oct 2010 | A1 |
20100293451 | Carus | Nov 2010 | A1 |
20100312725 | Privault et al. | Dec 2010 | A1 |
20100325690 | Suzuki et al. | Dec 2010 | A1 |
20110029854 | Nashi et al. | Feb 2011 | A1 |
20110047166 | Stading et al. | Feb 2011 | A1 |
20110047171 | Paparizos et al. | Feb 2011 | A1 |
20110055206 | Martin et al. | Mar 2011 | A1 |
20110067005 | Bassin et al. | Mar 2011 | A1 |
20110106892 | Nelson et al. | May 2011 | A1 |
20110141521 | Qiao | Jun 2011 | A1 |
20110153647 | Hoellwarth | Jun 2011 | A1 |
20110295854 | Chiticariu et al. | Dec 2011 | A1 |
20120011428 | Chisholm | Jan 2012 | A1 |
20120030157 | Tsuchida et al. | Feb 2012 | A1 |
20120036130 | Light et al. | Feb 2012 | A1 |
20120099792 | Chevion et al. | Apr 2012 | A1 |
20120102049 | Puzicha et al. | Apr 2012 | A1 |
20120191865 | Duff et al. | Jul 2012 | A1 |
20120221583 | Kulack et al. | Aug 2012 | A1 |
20120296891 | Rangan | Nov 2012 | A1 |
20130013999 | Kerry-Tyerman et al. | Jan 2013 | A1 |
20130054419 | Yusko et al. | Feb 2013 | A1 |
20130073571 | Coulet et al. | Mar 2013 | A1 |
20130117012 | Orlin et al. | May 2013 | A1 |
20130124960 | Velingkar et al. | May 2013 | A1 |
20130166548 | Puzicha et al. | Jun 2013 | A1 |
20130198123 | Stadermann | Aug 2013 | A1 |
20130198201 | Fukuda et al. | Aug 2013 | A1 |
20130238550 | Mandelstein et al. | Sep 2013 | A1 |
20130238596 | Mandelstein et al. | Sep 2013 | A1 |
20130297412 | Batra et al. | Nov 2013 | A1 |
20130311490 | Mansfield et al. | Nov 2013 | A1 |
20140052755 | Pitman et al. | Feb 2014 | A1 |
20140122535 | Gerard et al. | May 2014 | A1 |
20140208218 | Carasso et al. | Jul 2014 | A1 |
20140214758 | Tripathi et al. | Jul 2014 | A1 |
20150026556 | Stadermann et al. | Jan 2015 | A1 |
20150026559 | Riediger et al. | Jan 2015 | A1 |
20150058374 | Golubev et al. | Feb 2015 | A1 |
20150074507 | Riediger et al. | Mar 2015 | A1 |
20150149879 | Miller et al. | May 2015 | A1 |
20150254791 | Stockton et al. | Sep 2015 | A1 |
20150286636 | Elkhou et al. | Oct 2015 | A1 |
20150324338 | Levy et al. | Nov 2015 | A1 |
20170177650 | Devine et al. | Jun 2017 | A1 |
20180260370 | Riediger et al. | Sep 2018 | A1 |
20180300300 | Riediger et al. | Oct 2018 | A1 |
20190286667 | Puzicha et al. | Sep 2019 | A1 |
20190286668 | Puzicha et al. | Sep 2019 | A1 |
20200159891 | Patel | May 2020 | A1 |
20200242710 | Krovvidi | Jul 2020 | A1 |
20210397522 | Owen | Dec 2021 | A1 |
20220351315 | Forte | Nov 2022 | A1 |
Number | Date | Country |
---|---|---|
2590117 | May 2013 | EP |
3734489 | Oct 2021 | EP |
WO2002027542 | Apr 2002 | WO |
WO2012030954 | Mar 2012 | WO |
Entry |
---|
Cooper et al., OBIWAN-a visual interface for prompted query refinement, Jan. 6-9, 1998, IEEE, Vo1.2, 277-285. |
Xu et al., Query expansion using local and global document analysis, Aug. 1996, ACM, 4-11. |
Grewal et al., A Visual Representation of Search-Engine Queries and Their Results, IEEE, vol. 1, pp. 352-356, 2000. |
Lelescu, Ana et al., “Approximate Retrieval from Multimedia Databases Using Relevance Feedback,” 1999, IEEE, 215-223. |
Cui, Hang et al., “Query Expansion by Mining User Logs,” Jul./Aug. 2003, vol. 15, No. 4, 829-839. |
Pyreddy, Pallavi, et al., “Tintin: A system for retrieval in text tables”, Proceedings of the second ACM international conference on Digital libraries. ACM, 1997, 12 pages. |
Pinto, David, et al., “Table extraction using conditional random fields”, Proceedings of the 26th annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 2003, 8 pages. |
Chen, Hsin-Hsi, et al., “Mining tables from large scale HTML texts”, Proceedings of the 18th conference on Computational linguistics-vol. 1, Association for Computational Linguistics, 2000, 7 pages. |
Tengli, Ashwin, et al., “Learning table extraction from examples,” Proceedings of the 20th international conference on Computational Linguistics, Association for Computational Linguistics, 2004, 7 pages. |
Gatterbauer, Wolfgang, et al., “Table extraction using spatial reasoning on the CSS2 visual box model”, Proceedings of the National Conference On Artificial Intelligence. vol. 21. No. 2, Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2006, 6 pages. |
Liu, Ying, et al., “Tableseer: automatic table metadata extraction and searching in digital libraries”, Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries, ACM, 2007, 10 pages. |
Liu, Ying, et al., “Improving the table boundary detection in pdfs by fixing the sequence error of the sparse lines”, Document Analysis and Recognition, 2009, ICDAR'09, 10th International Conference on IEEE, 2009, 5 pages. |
Yildiz, Burcu, et al., “pdf2table: A method to extract table information from pdf files.” 2nd Indian Int. Conf. on AI, Pune. 2005, 13 pages. |
RecoStar OCR Solution OpenText Corp., Waterloo, ON, Canada; http://www.opentext.com, accessed Oct. 29, 2013, 4 pages. |
OmniPage, Nuance Communications, Inc., Burlington, Mass., USA; <http://www.nuance.com/for-business/by-product/omnipage/index.htm> accessed Oct. 29, 2013, 3 pages. |
Lerman et al., Using the Structure of Web Sites for Automatic Segmentation of Tables, ACM 2004, pp. 119-130, 12 pages. |
Silva et al., Design of an End-to-end Method to Extract Information from Tables, Google 2006, pp. 144-171. |
Begum et al. A Greedy approach for computing longest common subsequences. 2008. [retrieved on Jan. 22, 2014] Retrieved from the Internet: <http://www.sms.edu.pk/journals/jprm/jprmvol4/jprm9_4.pdfl>, 6 pages. |
Kondrak et al. N-gram similarity and distance. 2005. [retrieved on Jan. 22, 2014] Retrieved from the Internet: <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.67.9369&rep=rep1&type=pdf>, 13 pages. |
Wang et al., Data Extraction and Label Assignment for Web Database, ACM 2003, pp. 187-196. |
Shafait et al., Table Detection in Heterogeneous Documents, ACM 2010, pp. 65-72. |
Eberius et al., Building the Dresden Web Table Corpus: A Classification Approach, IEEE 2015, pp. 41-50. |
Wenzel et al., An Approach to Context0driven Document Analysis and Understanding, Google 2003, pp. 1-12. |
Number | Date | Country | |
---|---|---|---|
20230206365 A1 | Jun 2023 | US |
Number | Date | Country | |
---|---|---|---|
62797084 | Jan 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16749920 | Jan 2020 | US |
Child | 18165889 | US |