Abstract: A method and system is provided for identifying potentially infringing products on a patent. The method includes user entering the patent number on a user interface. The user interface prompts user to enter additional information for carrying out search. Additional information may be field to be used for analysis like claims etc. The method includes extracting keywords based on contextual and machine intelligence from the field and formulating search queries based on it. The search queries are executed through a single window on multiple databases to identify potentially infringing products.
TECHNICAL FIELD OF THE INVENTION
[0001] The present invention relates generally to identifying items, and, more particularly, to method and system for identifying items that potentially infringe a patent.
BACKGROUND OF THE INVENTION [0002] A patent is a set of exclusive rights granted by a sovereign state. The rights are conferred to an inventor or an applicant. The rights are granted for a limited time. In return, the inventor has to completely disclose his invention in form of an application. Although, complete disclosure is used by patent office examiner’s to ascertain patentability characteristics of the patent application however, someone might use the disclosures to actually copy the invention. Grant of the patent does not guarantee non infringement of the patent. The owner has to ascertain whether someone is infringing his patent or not. [0003] To ascertain infringement, the patent owner needs to identify and be sure of infringement as the patent application is generally written in techno legal language. For this, the patent owner must identify potentially infringing goods and products. The patent owner needs to carefully examine the patent and meaning of various terms disclosed. Then he compares the features of the identified products and goods to these identified terms. Such an analysis requires time and experience. [0004] Further, searching of products is also a tiresome and needs lot of precision and understanding of disclosed patent terms. Usually there is no single search window available where in the patent owner may search for potentially infringing products.
3
[0005] Hence, there is a need for an efficient system and method to identify potentially infringing products.
SUMMARY OF THE INVENTION
[0006] This summary is provided to introduce concepts related to system and method for automatic data collection as further described in the detailed description. This summary is not intended to identify essential features of the claimed subject matter nor is it intended for use in determining or limiting the scope of the claimed subject matter.
[0007] In an embodiment of the invention there is provided a system for identifying items using textual input. The system includes a user device that includes a display and a control module. The display is configured to provide a user interface to a user in order to take input. The control module, communicably connected to the display, is configured to receive inputs from the user on the user interface. The control module further prompts the user for additional inputs from the user. based on the additional input, the control module identifies key words based on contextual and machine intelligence information. Based on the key words extracted, the control module formulates search queries and runs these search queries and identify items based on the search query. The system also includes a server, connected to the user device through a network.
[0008] In another embodiment of the invention, there is provided a method for identifying items. The method includes the steps of receiving textual input, by a control module, through a user interface from a user. Further, the method includes step of prompting the user for some more additional input to be used for identification. Method further includes identification of
4
keywords based on contextual and machine intelligence from information that is extracted based on the additional user input. Further, method includes formulating search queries based on the extracted keywords, running the search queries on multiple databases through a single search interface and displaying the results that includes potentially infringing items on a display to the user device.
[0009] In yet another embodiment of the invention, there is provided a non-transitory computer-readable storage medium for performing item identification, when executed by a computing device, cause the computing device to perform method steps. The method includes the steps of receiving textual input, by a control module, through a user interface from a user. Further, the method includes step of prompting the user for some more additional input to be used for identification. Method further includes extracting of keywords based on contextual and machine intelligence from information that is extracted based on the additional user input. Further, method includes formulating search queries based on the extracted keywords, running the search queries on multiple databases through a single search interface and displaying the results that includes potentially infringing items on a display to the user device.
[0010] Other and further aspects and features of the disclosure will be evident from reading the following detailed description of the embodiments, which are intended to illustrate, not limit, the present disclosure
5
BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS:
[0011] The illustrated embodiments of the subject matter will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The following description is intended only by way of example, and simply illustrates certain selected embodiments of devices, systems, and processes that are consistent with the subject matter as claimed herein.
[0012] FIG. 1 illustrates block diagram of a system for item identification, in accordance with an embodiment of the present disclosure;
[0013] FIG. 2 illustrates block diagram of interaction of a display and a control module, in accordance with an embodiment of the present disclosure;
[0014] FIG. 3, illustrates block diagram of a server and its components to identify items, in accordance with an embodiment of the present disclosure.
[0015] FIG. 4 illustrates a flow chart illustrating overall method of identifying items, in accordance with an exemplary embodiment of the present disclosure;
[0016] FIG. 5A-5B illustrates block diagrams depicting user interface on a user device to identify items, in accordance with an exemplary embodiment of the present disclosure;
[0017] FIG. 6A-6B illustrates block diagrams of user interface of a user device for analysis, in accordance with an exemplary embodiment of the present disclosure;
[0018] FIG. 7 is a block diagram of an exemplary computer system, in accordance with an aspect of the embodiments;
6
DETAILED DESCRIPTION OF THE INVENTION
[0019] A few inventive aspects of the disclosed embodiments are explained in detail below with reference to the various figures. Embodiments are described to illustrate the disclosed subject matter, not to limit its scope, which is defined by the claims. Those of ordinary skill in the art will recognize a number of equivalent variations of the various features provided in the description that follows.
[0020] Reference throughout the specification to “various embodiments,” “some embodiments,” “one embodiment,” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, appearances of the phrases “in various embodiments,” “in some embodiments,” “in one embodiment,” or “in an embodiment” in places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner in one or more embodiments.
[0021] Now referring to FIG. 1, a block diagram of a system 100 for identifying items is illustrated, in accordance to an embodiment of the present disclosure. The system 100 includes a user device 102 connected to a server 106 through a network 104. The system 100 identifies items based on textual input from a user. the textual input may be a patent number and based on that, the system 100 identifies items that are goods, products, processes etc. that potentially infringe the patent. In another embodiment, the system 100 is built on a personal
7
computer platform, such as a Wintel PC or a Mac computer. The personal computer can be a desktop or a notebook computer. In another embodiment, the system 100 is implemented on a computer network within a client/server environment. In various versions of the network-based embodiment, the system 100 is implemented on the Internet, an intranet, or an extranet.
[0022] The system 100 executes instructions causing it to perform the steps of the methods described below, receiving inputs and generating results as described. The instructions may take the form of program code embodied in machine-readable storage media, such as hard drives, floppy diskettes, CD-ROMS, or DVDs. The program code can also be transmitted over a transmission medium, for example, over electrical wiring or cabling, through optical fiber, wirelessly, or by any other form of physical transmission. The transmission can take place over a dedicated link between telecommunication devices, or through a wide- or local-area network, such as the Internet, an intranet, extranet, or any other type of public or private network.
[0023] In an implementation, the user device 102 may be a desktop computer, a laptop computer, a smartphone, a tablet computer, a thin client, a smart watch, or a personal digital assistant. The user device 102 may include a pre-installed application or a web application that may be launched by a user. The pre-installed application may be inbuilt into operating software of the user device 102. Also, the application may be installed by the user. The user device 102 may also include an input interface (not shown in the figure) to the user device. The input device may be any one of a touch screen, a keyboard, a mouse, a touch pad, a user pointing device, etc.
8
[0024] In another implementation, the network 104 may be a wired or a wireless network. In case of wired networks, it may be a Local Area Network (LAN), Metropolitan Area Network (MAN), or a Wide Area Network (WAN). Whereas, wireless networks may be wireless LAN, ZigBee, Bluetooth, Infra-Red, Wi-Fi or cellular networks including 2G, 3G, 4G, CDMA, etc.
[0025] In another implementation server 106 may be a remote server or a locally placed server. Server 106 may be an a single or a collection of multiple servers. Server 106 may further be connected to multiple search databases on which identification may be performed to identify items. The server 106 may further include a data store (not shown in the figure) to store information and login id credentials of multiple users.
[0026] The user may initiate the application on the user device 102 through the input device. Once the application is initiated, the user inputs the textual input. As described earlier, the textual input may be a patent number. The application after accepting the patent number may prompt the user for additional information. This additional information may be what field of patent does the user wants to analyze and identify products upon. The field may be abstract of the patent, or claims etc. Based on the field identified by the user, keywords based on contextual and machine intelligence are extracted from the specified field of the patent details of which will be described later. Based on the extracted keywords, search queries are formulated. The search queries are sent to the server106 through the network 104. The server 106, searches multiple search databases through a single search window. The identified items are then collated and sent back to the user device 102 which are then displayed on the display.
9
The user may perform further analysis on the results obtained using the user interface on the user device 102.
[0027] Now referring to FIG. 2, a block diagram of interaction of the user device 102 and the control module 204, in accordance with an embodiment of the present disclosure. The user device 102 includes a display 202. The user device interacts with the server through a control module 204, and a memory 206. The display 202 is communicably connected to the control module 204. Control module 204 is further communicably connected to the memory 206.
[0028] The control module 204 further includes set of modules for data processing. Control module 204 includes a data collection module 208, a data extraction module 210, a swift keyword extraction module 212, a query generator module 214, and a display and assessment module 216. Control module 204 may be a single processor or a collection of microprocessors. The set of modules may be microprocessors working in tandem and in coordination to each other.
[0029] Control module 204 is connected to the memory 206. The memory 206 may store various operating instructions for the control module for various stages. In other embodiments, the instruction may be stored within the control module internal memory (not shown in figure). The memory may be a Random-Access memory (RAM), a Read only memory (ROM), a flash memory, a solid-state drive memory, or cloud memory etc.
[0030] Display 202, of the user device 102, may be a Light Emitting Diode (LED) display, a Liquid Crystal Display (LCD), a plasma screen, an Organic LED (OLED), Active matrix
10
OLED, etc. The display 202 may be a touch screen display in order to take inputs from the user with touch input through a user interface.
[0031] The display 202, displays a user interface to the user using the application. Details of the application has been discussed above. The display 202 is communicably connected to the control module 204. The control module 204 receives the user input through the data collection module 208. The data collection module 208 after receiving the user input prompts the user for additional information. The prompt may be a pop up message or a window that displays the message to the user. The user may then input the additional information which is again received by the data collection module 208. The data collection module 208 may forward this additional information received from the display 202 to the data extraction module 210. The data extraction module 210 identifies secondary information based on the additional information and extracts it. The extracted secondary information is then forwarded to the Swift Keyword Extraction (SKE) module 212. The SKE module 212 extracts keywords based on contextual and machine intelligence from the secondary information. Contextual information is the information important to understand from a piece of information. It enables to identify relevant things and aspects of the information. Hence, contextual information is important and best way to understand. Search based on contextual information increases precision of the search and increases the value of the search for the user. the SKE module 212 may use semantic analysis for contextual information identification. Semantic search seeks to improve search accuracy by understanding the searcher's intent and the contextual meaning of terms as they appear in the searchable dataspace. Machine intelligence is computer’s own learning and understanding behavior. The computer may evolve and self-learn and
11
automatically use its intelligence to extract important key words or key phrases from text of the patent in a manner as a human would do. Hence, the complete process is automatic and the user may just have to enter patent number and the field on which it wants to identify potentially infringing items.
[0032] After extraction of the keywords the SKE module 212 forwards the information to the Query Generator module (QGM) 214. The QGM 214, after receiving the extracted keywords is configured to formulate search queries to be run to identify the items. The QGM 214 formulates multiple search strategies for same extracted keywords. Also, the QGM 214 is configured to formulate multiple strategies depending on search algorithm of the multiple databases on which queries will be run. Hence QGM 214 generates queries adapted to be run for various multiple databases without human intervention or inputs. The search strategies are then sent to the query execution module 218 of the server 106 for further carrying out the searching process details of which will be explained in greater detail in conjunction with FIG. 3 and 4.
[0033] Results of the search queries are received and displayed by the display and assessment module (DAM) 216. The DAM 216 may also provide analytical interface to the user. The user may be able to perform various analysis on the results. Analysis may range from preparing a comparison chart of patent’s context elements to relevant information of products, analyzing the firms active in technological space, analyzing infringing product trends, etc. various analytical tools help the users in the analysis. Various kinds of graphical analysis tools may include comparison charts or tables, bar charts, bubble charts, pie charts,
12
line charts, or other statistical charts. Also, the DAM 216 is configured to provide a final report as per the user’s input and choice.
[0034] Now referring to FIG. 3, a block diagram of the query execution module 218 and its various components is illustrated, in accordance with an embodiment of the present disclosure. The query execution module 218 includes a data transceiver module 302, a query running and data collection module (QRDCM) 304 and database collection interface 306. The data transceiver module 302 receives the search queries formulated by the DAM 216 and forwards them to the QRDCM 304. The QRDCM 304, segregates queries to be run on different search engines and continuously transmits them to the database collection interface 306. The database collection interface 306 is an interface to the multiple search databases for running the queries. The multiple databases may include e-commerce databases, web archives databases, commercial products databases, or any other product databases. The QRDCM 304 is also configured to collect the results from search queries run from multiple search databases. The results are then collated and then forwarded to the data transceiver module 302 to be forwarded to the DAM 216. Results may include meta information about the corresponding search query and the corresponding database.
[0035] No referring to FIG. 4, a flow chart illustrating overall method 400 for identifying items, in accordance with an exemplary embodiment of the invention. The method starts with step 402 wherein the user inputs textual information on the user device 102. Input may be a patent number for which potential infringement study needs to be carried out. This information is then sent to the server 106 to the control module 204. Further, at step 404, the
13
control module 204, prompts the user for further additional information. The additional information may be the field of the patent to be used for infringement study. Field may be a specific field like abstract or claims or a specific claim, like claim 1 or a set of claims like claims 1-5 etc. After the additional input is received from the user, data from only the specific field of the patent may be extracted from a patent database like paid or government database. Based on the additional information input from the user, keywords based on contextual and machine intelligence are extracted from the at step 406. Keywords may only be extracted for data extracted from specific field or part of the patent.
[0036] Further at step 408, the control module 204, formulates search strategies for all permutations and combinations using search syntax from the multiple databases on which search queries need to be executed. The search queries may be formulated in any language as per the patent information. At step 410, the formulated search queries are run on the multiple databases for identifying the items or products. The results of the searches executed are collated and at step 412 are displayed to the user on the display 202. The user may be able to perform various analysis on the products identified that will be explained later. In an implementation, more databases may be added or some may be deleted by the user himself or by an administrator. Also, the server 106 may itself analyze the viability of existing search databases like whether they provide good results or not and keeps a check on their history of results. The databases may also be removed by the server 106 itself automatically. Also, the server 106 may be configured to identify new databases on the basis of their ranks and search viability like ease of search syntax etc.
14
[0037] Now referring to FIG. 5A-5C illustrates user interface 500 on the user device 102, in accordance with an exemplary embodiment of the present disclosure. The user interface 500 may be through a software application that may be pre-installed or installed by the user at his own will. The user interface 500 may also be accessed through a web interface like a web application or a web browser. User interface 500 on initiation provides a login page to the user wherein the user is required to input his login credentials as depicted by FIG. 5A. The login credentials may be entered to a username field 502, and a password field 504 available on the user interface 500. In other embodiments, various other information may be utilized as login credentials like speech pattern, retinal scan, finger print scans etc. Login credentials may be useful as the work done by a specific user may also be stored specifically for the specific login credentials. After a successful login, the user is provided with a field 506 to enter the patent number, as shown in FIG. 5B. After the user enters the patent number, the user is prompted for additional information using a pop-up message window 508. The user may be also provided with specific field tabs like 510 for Claims and 512 for Abstract as shown in FIG. 5C. In other embodiments, there may be a drop down or simply fillable field to gather additional information.
[0038] Now referring to FIG. 6A, a block diagram of user diagram 500 for analysis is illustrated, in accordance with an exemplary embodiment of the present disclosure. The user interface 500 may include multiple tabs for analysis of results gathered after executing search results. The user interface 500 may include a comparison table 602 that may information in a tabulated form. The table 602 may be updated for every patent searched and may include the result list within the same. The table 602 may be configured display a limited number of
15
products or all results in tabular form. This setting may be changed by the administrator or the user himself. The user interface 500 may further include tabs for carrying out various other analysis like company analysis field 604, key companies in domain field 606, infringing product trends 608, and existing litigation analysis 610.
[0039] Now referring to FIG 6B, another block diagram of user diagram 500 for analysis is illustrated, in accordance with an exemplary embodiment of the present disclosure. As shown in the figure, the results analysis may be performed in a tabular form 620. The tabular form may include claim elements row 622 and products’ information 624. The user may choose products for comparison using a “Choose products for comparison” tab from check boxes provided, for each product (item) identified, like 618.
[0040] The table 620 may break contextual information from claim elements or any other field of the patent, as per user’s input, and present that in a single row 622. Other rows like 624 may include the products identified and the relevant information for each contextual claim element highlighted. Highlighting may be performed in a single color, multicolor or by underlining and making relevant or related text bold by a text handling module (not shown in the figure). Also, the text handling module is configured to provide the user a feature to add comments or commentary to every claim element mapping. The commentary may be added in any row. The table 620 may be also converted to a software formal report and printed out through a printer etc.
[0041] Now referring to FIG. 7, illustrating a block diagram of an exemplary computer system 702 for implementing various embodiments is disclosed. Computer system 702 may
16
comprise a central processing unit (“CPU” or “processor”) 704. Processor 704 may comprise at least one data processor for executing program components for executing user- or system-generated requests. A user may include a person, a person using a device such as such as those included in this disclosure, or such a device itself. Processor 704 may include specialized processing units such as integrated system (bus) controllers, memory management control units, floating point units, graphics processing units, digital signal processing units, etc. Processor 704 may include a microprocessor, such as AMD Athlon, Duron or Opteron, ARM’s application, embedded or secure processors, IBM PowerPC, Intel’s Core, Itanium, Xeon, Celeron or other line of processors, etc. Processor 704 may be implemented using mainframe, distributed processor, multi-core, parallel, grid, or other architectures. Some embodiments may utilize embedded technologies like application-specific integrated circuits (ASICs), digital signal processors (DSPs), Field Programmable Gate Arrays (FPGAs), etc.
[0042] Processor 704 may be disposed in communication with one or more input/output (I/O) devices via an I/O interface 706. I/O interface 706 may employ communication protocols/methods such as, without limitation, audio, analog, digital, monoaural, RCA, stereo, IEEE-1394, serial bus, universal serial bus (USB), infrared, PS/2, BNC, coaxial, component, composite, digital visual interface (DVI), high-definition multimedia interface (HDMI), RF antennas, S-Video, VGA, IEEE 802.n /b/g/n/x, Bluetooth, cellular (e.g., code-division multiple access (CDMA), high-speed packet access (HSPA+), global system for mobile communications (GSM), long-term evolution (LTE), WiMax, or the like), etc.
17
[0043] Using I/O interface 706, computer system 702 may communicate with one or more I/O devices. For example, an input device 708 may be an antenna, keyboard, mouse, joystick, (infrared) remote control, camera, card reader, fax machine, dongle, biometric reader, microphone, touch screen, touchpad, trackball, sensor (e.g., accelerometer, light sensor, GPS, gyroscope, proximity sensor, or the like), stylus, scanner, storage device, transceiver, video device/source, visors, etc. An output device 710 may be a printer, fax machine, video display (e.g., cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode (LED), plasma, or the like), audio speaker, etc. In some embodiments, a transceiver 712 may be disposed in connection with processor 704. Transceiver 712 may facilitate various types of wireless transmission or reception. For example, transceiver 712 may include an antenna operatively connected to a transceiver chip (e.g., Texas Instruments WiLink WL1283, Broadcom BCM4760IUB8, Infineon Technologies X-Gold 618-PMB9800, or the like), providing IEEE 802.11a/b/g/n, Bluetooth, FM, global positioning system (GPS), 2G/3G HSDPA/HSUPA communications, etc.
[0044] In some embodiments, processor 704 may be disposed in communication with a communication network 714 via a network interface 716. Network interface 716 may communicate with communication network 714. Network interface 716 may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc. Communication network 714 may include, without limitation, a direct interconnection, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), the Internet, etc. Using network interface
18
716 and communication network 714, computer system 702 may communicate with devices 718, 720, and 722. These devices may include, without limitation, personal computer(s), server(s), fax machines, printers, scanners, various mobile devices such as cellular telephones, smartphones (e.g., Apple iPhone, Blackberry, Android-based phones, etc.), tablet computers, eBook readers (Amazon Kindle, Nook, etc.), laptop computers, notebooks, or the like. In some embodiments, the computer system 602 may itself embody one or more of these devices.
[0045] In some embodiments, processor 704 may be disposed in communication with one or more memory devices (e.g., a RAM 726, a ROM 728, etc.) via a storage interface 724. Storage interface 724 may connect to memory devices 730 including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as serial advanced technology attachment (SATA), integrated drive electronics (IDE), IEEE-1394, universal serial bus (USB), fiber channel, small computer systems interface (SCSI), etc. The memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, redundant array of independent discs (RAID), solid-state memory devices, solid-state drives, etc.
[0046] Memory devices 730 may store a collection of program or database components, including, without limitation, an operating system 732, a user interface application 734, a web browser 736, a mail server 738, a mail client 740, a user/application data 742 (e.g., any data variables or data records discussed in this disclosure), etc. Operating system 732 may facilitate resource management and operation of computer system 702. Examples of operating
19
system 732 include, without limitation, Apple Macintosh OS X, Unix, Unix-like system distributions (e.g., Berkeley Software Distribution (BSD), FreeBSD, NetBSD, OpenBSD, etc.), Linux distributions (e.g., Red Hat, Ubuntu, Kubuntu, etc.), IBM OS/2, Microsoft Windows (XP, Vista/7/8, etc.), Apple iOS, Google Android, Blackberry OS, or the like. User interface 734 may facilitate display, execution, interaction, manipulation, or operation of program components through textual or graphical facilities. For example, user interfaces may provide computer interaction interface elements on a display system operatively connected to computer system 702, such as cursors, icons, check boxes, menus, scrollers, windows, widgets, etc. Graphical user interfaces (GUIs) may be employed, including, without limitation, Apple Macintosh operating systems’ Aqua, IBM OS/2, Microsoft Windows (e.g., Aero, Metro, etc.), Unix X-Windows, web interface libraries (e.g., ActiveX, Java, Javascript, AJAX, HTML, Adobe Flash, etc.), or the like.
[0047] In some embodiments, computer system 702 may implement web browser 736 stored program component. Web browser 736 may be a hypertext viewing application, such as Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari, etc. Secure web browsing may be provided using HTTPS (secure hypertext transport protocol), secure sockets layer (SSL), Transport Layer Security (TLS), etc. Web browsers may utilize facilities such as AJAX, DHTML, Adobe Flash, JavaScript, Java, application programming interfaces (APIs), etc. In some embodiments, computer system 702 may implement mail server 738 stored program component. Mail server 738 may be an Internet mail server such as Microsoft Exchange, or the like. Mail server 738 may utilize facilities such as ASP, ActiveX, ANSI C++/C#, Microsoft .NET, CGI scripts, Java, JavaScript, PERL, PHP, Python, WebObjects,
20
etc. Mail server 738 may utilize communication protocols such as internet message access protocol (IMAP), messaging application programming interface (MAPI), Microsoft Exchange, post office protocol (POP), simple mail transfer protocol (SMTP), or the like. In some embodiments, computer system 702 may implement mail client 740 stored program component. Mail client 740 may be a mail viewing application, such as Apple Mail, Microsoft Entourage, Microsoft Outlook, Mozilla Thunderbird, etc.
[0048] In some embodiments, computer system 702 may store user/application data 742, such as the data, variables, records, etc. as described in this disclosure. Such databases may be implemented as fault-tolerant, relational, scalable, secure databases such as Oracle or Sybase. Alternatively, such databases may be implemented using standardized data structures, such as an array, hash, linked list, struct, structured text file (e.g., XML), table, or as object-oriented databases (e.g., using ObjectStore, Poet, Zope, etc.). Such databases may be consolidated or distributed, sometimes among the various computer systems discussed above in this disclosure. It is to be understood that the structure and operation of the any computer or database component may be combined, consolidated, or distributed in any working combination.
[0049] The order in which the method is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method or alternate methods. Additionally, individual blocks may be deleted from the method without departing from the spirit and scope of the subject matter described herein. Furthermore, the method can be implemented in any suitable hardware, software,
21
firmware, or combination thereof. However, for ease of explanation, in the embodiments described below, the method may be considered to be implemented in the above described system and/or the apparatus and/or any electronic device (not shown).
[0050] The above description does not provide specific details of manufacture or design of the various components. Those of skill in the art are familiar with such details, and unless departures from those techniques are set out, techniques, known, related art or later developed designs and materials should be employed. Those in the art are capable of choosing suitable manufacturing and design details.
[0051] Note that throughout the following discussion, numerous references may be made regarding servers, services, engines, modules, interfaces, portals, platforms, or other systems formed from computing devices. It should be appreciated that the use of such terms is deemed to represent one or more computing devices having at least one processor configured to or programmed to execute software instructions stored on a computer readable tangible, non-transitory medium or also referred to as a processor-readable medium. For example, a server can include one or more computers operating as a web server, database server, or other type of computer server in a manner to fulfill described roles, responsibilities, or functions. Within the context of this document, the disclosed devices or systems are also deemed to comprise computing devices having a processor and a non-transitory memory storing instructions executable by the processor that cause the device to control, manage, or otherwise manipulate the features of the devices or systems.
22
[0052] Some portions of the detailed description herein are presented in terms of algorithms and symbolic representations of operations on data bits performed by conventional computer components, including a central processing unit (CPU), memory storage devices for the CPU, and connected display devices. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is generally perceived as a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
[0053] It should be understood, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the discussion herein, it is appreciated that throughout the description, discussions utilizing terms such as “generating,” or “monitoring,” or “displaying,” or “tracking,” or “identifying,” “or receiving,” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
23
[0054] The methods illustrated throughout the specification, may be implemented in a computer program product that may be executed on a computer. The computer program product may comprise a non-transitory computer-readable recording medium on which a control program is recorded, such as a disk, hard drive, or the like. Common forms of non-transitory computer-readable media include, for example, floppy disks, flexible disks, hard disks, magnetic tape, or any other magnetic storage medium, CD-ROM, DVD, or any other optical medium, a RAM, a PROM, an EPROM, a FLASH-EPROM, or other memory chip or cartridge, or any other tangible medium from which a computer can read and use.
[0055] Alternatively, the method may be implemented in transitory media, such as a transmittable carrier wave in which the control program is embodied as a data signal using transmission media, such as acoustic or light waves, such as those generated during radio wave and infrared data communications, and the like.
[0056] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. It will be appreciated that several of the above-disclosed and other features and functions, or alternatives thereof, may be combined into other systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein may subsequently be made by those skilled in the art without departing from the scope of the present disclosure as encompassed by the following claims.
[0057] The claims, as originally presented and as they may be amended, encompass variations, alternatives, modifications, improvements, equivalents, and substantial equivalents
24
of the embodiments and teachings disclosed herein, including those that are presently unforeseen or unappreciated, and that, for example, may arise from applicants/patentees and others.
[0058] It will be appreciated that variants of the above-disclosed and other features and functions, or alternatives thereof, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.
We claim:
1. A system for identifying potentially infringing items using textual input comprising;
a user device, wherein the user device further comprises;
a display configured to present a user interface to a user;
a server, connected to the user device through a network, wherein the server comprises;
a control module, communicably connected to the display, is configured:
to receive inputs from the user;
prompt the user for additional inputs;
to extract key words based on contextual and machine intelligence from information extracted based on the additional user input;
to formulate search queries based on the extracted keyword information; and
to run the search query and identify potentially infringing items based on the search query;
2. The system of claim 1, wherein the server further comprises a display assessment module configured to provide a plurality of analysis tools to the user to analyze the identified potentially infringing items
3. The system of claim 1, wherein the textual input is a patent number.
4. The system of claim 3, wherein the additional user input is field of patent documents to be used for identifying items, wherein the field is anyone of an abstract or claims.
5. The system of claim 1, further comprising multiple databases connected to the server, wherein the server receives search queries from the control module and runs it on the multiple databases.
6. The system of claim 1, wherein the multiple databases are a combination of ecommerce databases, web archives databases, commercial products databases, individual websites databases, and other product resources.
7. The system of claim 10, wherein the potentially infringing items are displayed by the control module on the display.
8. A method of identifying potentially infringing items comprising;
| # | Name | Date |
|---|---|---|
| 1 | 201711029778-STATEMENT OF UNDERTAKING (FORM 3) [23-08-2017(online)].pdf | 2017-08-23 |
| 2 | 201711029778-FORM FOR SMALL ENTITY(FORM-28) [23-08-2017(online)].pdf | 2017-08-23 |
| 3 | 201711029778-FORM FOR SMALL ENTITY [23-08-2017(online)].pdf | 2017-08-23 |
| 4 | 201711029778-FORM 1 [23-08-2017(online)].pdf | 2017-08-23 |
| 6 | 201711029778-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [23-08-2017(online)].pdf | 2017-08-23 |
| 7 | 201711029778-EVIDENCE FOR REGISTRATION UNDER SSI [23-08-2017(online)].pdf | 2017-08-23 |
| 8 | 201711029778-DRAWINGS [23-08-2017(online)].pdf | 2017-08-23 |
| 9 | 201711029778-DECLARATION OF INVENTORSHIP (FORM 5) [23-08-2017(online)].pdf | 2017-08-23 |
| 10 | 201711029778-COMPLETE SPECIFICATION [23-08-2017(online)].pdf | 2017-08-23 |
| 11 | abstract.jpg | 2017-08-29 |
| 12 | 201711029778-Proof of Right (MANDATORY) [01-09-2017(online)].pdf | 2017-09-01 |
| 13 | 201711029778-FORM-26 [01-09-2017(online)].pdf | 2017-09-01 |
| 14 | 201711029778-Power of Attorney-050917.pdf | 2017-09-07 |
| 15 | 201711029778-OTHERS-050917.pdf | 2017-09-07 |
| 16 | 201711029778-Correspondence-050917.pdf | 2017-09-07 |