|Publication number||US20040236703 A1|
|Application number||US 10/874,486|
|Publication date||Nov 25, 2004|
|Filing date||Jun 22, 2004|
|Priority date||Sep 10, 1999|
|Also published as||US7444334|
|Publication number||10874486, 874486, US 2004/0236703 A1, US 2004/236703 A1, US 20040236703 A1, US 20040236703A1, US 2004236703 A1, US 2004236703A1, US-A1-20040236703, US-A1-2004236703, US2004/0236703A1, US2004/236703A1, US20040236703 A1, US20040236703A1, US2004236703 A1, US2004236703A1|
|Inventors||Charles Lemaire, Steven Lundberg|
|Original Assignee||Lemaire Charles A., Lundberg Steven W.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (15), Referenced by (3), Classifications (15), Legal Events (1)|
|External Links: USPTO, USPTO Assignment, Espacenet|
 This is a divisional of prior U.S. patent application Ser. No. 09/658,795 entitled “TRANSACTION-BASED OBJECT-ORIENTED MULTIPART DATABASE METHOD AND APPARATUS,” filed Sep. 11, 2000, Attorney Docket 750.006US1, which is incorporated in its entirety by reference, and which claims benefit of the following U.S. Provisional Patent Application: Ser. No. 60/154,026, filed Sep. 10, 1999, titled “TRANSACTION-BASED OBJECT-ORIENTED MULTIPART DATABASE METHOD AND APPARATUS”.
 This invention relates generally to transaction and document exchange, and more particularly to a transaction-based object-oriented multipart database system.
 A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. The following notice applies to the software and data as described below and in the drawings hereto: Copyright © 1999, Schwegman, Lundberg, Woessner and Kluth, P. A. All Rights Reserved.
 Document and transaction and document exchange is conventionally accomplished through an apparatus that encrypts the data and transmits the encrypted data via FTP over the Internet. Optionally, a secure Internet connection, a Lotus Notes server, an extranet, or a secure database is implemented in the connection. However, these implementations do not easily integrate into business data processing systems where multiple parties exchange transactions and documents in a highly-integrated network that supports highly-integrated business processes. Further, the topological relationships in these convention implementations are static and thus are not easily modified in response to changes in the physical configuration.
 What is needed is a system of exchanging documents and transactions between highly-separate parties that have integrated data-processing systems that communicate through a highly-integrated network. This network should be more easily modified to account for changes in the physical configuration.
 The above-mentioned shortcomings, disadvantages and problems are addressed by the present invention, which will be understood by reading and studying the following specification.
 In one aspect, a computerized method for a transaction-based object-oriented multipart database system includes receiving a database transaction, encoding the transaction into an electronic message, transmitting the electronic message, receiving the electronic message, decoding the transaction from the electronic message, and processing the transaction. In some embodiments, processing the transaction includes displaying decoded text of the database transaction.
 Another aspect of the invention is a method that includes receiving transactions from at least one service provider and at least one service consumer, each transaction being associated with a service consumer, storing the transactions, enabling access by a service consumer to stored transactions associated with the service consumer to whom access is enabled, and accessing the stored transactions associated with the service consumer to whom access is enabled, the accessing being performed by the service consumer to whom access is enabled.
 Another aspect of the invention is a computerized system that includes a receiver of database transactions, an encoder of electronic mail messages operatively coupled to the receiver of database transactions, the electronic mail messages being encoded with a database transaction record, a transmitter of electronic mail messages operatively coupled to the encoder of electronic mail messages, a receiver of electronic mail messages operatively coupled to the transmitter of electronic mail messages, a decoder of electronic mail messages operatively coupled to the receiver of electronic mail messages, a transmitter of database transaction information operative coupled to the decoder, and a database transaction processor operatively coupled to the transmitter of database transaction information.
 The present invention describes systems, clients, servers, methods, and computer-readable media of varying scope. In addition to the aspects and advantages of the present invention described in this summary, further aspects and advantages of the invention will become apparent by reference to the drawings and by reading the detailed description that follows.
FIGS. 1a and 1 b are block diagrams of the hardware and operating environments in which different embodiments of the invention are practiced in an exemplary embodiment.
FIG. 2 is a diagram illustrating a system-level overview of an exemplary embodiment of the invention.
FIG. 3 is a flowchart of a method performed by a client according to an exemplary embodiment of the invention.
FIG. 4 is a flowchart of a method performed by a client according to an exemplary embodiment of the invention.
FIG. 5 is a flowchart of a method according to an exemplary embodiment of the invention.
FIG. 6 is a flowchart of a method performed by a server according to an exemplary embodiment of the invention.
FIG. 7 is a flowchart of a method according to an exemplary embodiment of the invention.
FIG. 8 is a block diagram of an apparatus according to an exemplary embodiment of the invention.
FIG. 9 is a block diagram of an apparatus according to an exemplary embodiment of the invention.
FIG. 10 is a block diagram of an apparatus according to an exemplary embodiment of the invention.
FIG. 11 is a block diagram of an apparatus according to an exemplary embodiment of the invention.
FIG. 12 is a block diagram of a data structure according to an exemplary embodiment of the invention.
FIG. 13 is a block diagram of an object-oriented apparatus according to an exemplary embodiment of the invention.
 In the following detailed description of exemplary embodiments of the invention, reference is made to the accompanying drawings (where like numerals represent like elements) that form a part hereof, and in which is shown by way of illustration specific exemplary embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, but other embodiments can be utilized and logical, mechanical, electrical, and other changes can be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims.
FIG. 1a is a block diagram of the hardware and operating environment 100 in which some embodiments of the invention are practiced. The description of FIG. 1a provides an overview of computer hardware and a suitable computing environment in conjunction with which an embodiment of the invention is implemented. The invention is described in terms of a computer executing computer-executable instructions. However, the invention can also be embodied entirely in computer hardware in which the computer-executable instructions are implemented in read-only memory. The invention can also be implemented in client/server computing environments where remote devices that are linked through a communications network perform tasks. Program modules are located in both local and remote memory storage devices in a distributed computing environment.
 Computer 110 is operatively coupled to display device 112, speaker 113, speaker 114, pointing device 115, and keyboard 116. Computer 110 includes a processor 118 (e.g., an Intel Pentium® processor), random-access memory 120 (RAM), read-only memory 122 (ROM), one or more mass storage devices 124, and a system bus 126, which operatively couples various system components including the system memory to the processing unit 118. Mass storage devices are types of nonvolatile storage media and can include a hard disk drive, a floppy disk drive, an optical disk drive, or a tape cartridge drive. The memory (120, 122) and mass storage devices 124 are types of computer-readable media.
 A user can enter commands and information into the computer 110 through input devices such as a pointing device 115 and a keyboard 116. Other input devices (not shown) can include a microphone, joystick, game pad, satellite dish, scanner, or the like.
 The processor 118 executes computer programs stored on the computer-readable media. The invention is not limited to any type of computer. Computer 110 can be a PC-compatible computer, a MacOS-compatible computer, or a UNIX-compatible computer. The construction and operation of such computers are well known within the art.
 Further, computer 110 can be communicatively connected to the Internet via a communication device 128. Internet 130 connectivity is well known within the art. In one embodiment, the computer includes a communication device that is a modem and corresponding communication drivers to connect to the Internet via what is known as a “dial-up connection.” In another embodiment, the computer includes a communication device that is an Ethernet or similar hardware network card connected to a local-area network (LAN) that itself is connected to the Internet via what is known as a “direct connection” (e.g., Ti line).
 Computer 110 also has at least one operating environment running thereon, each desirably providing a graphical user interface. Such operating environments include operating systems such as versions of the Microsoft Windows™ and Apple MacOS™ operating systems. However, the invention is not limited to any particular operating environment. Computer 110 also can have at least one web browser application program running within at least one operating environment, to permit users of computer 110 to access intranet or Internet world-wide-web pages as addressed by Universal Resource Locator (URL) addresses. Such browser application programs include Netscape Navigator™ and Microsoft Internet Explorer™.
 Display device 112 permits the display of information, including computer, video and other information, for viewing by a user of the computer. Such display devices include cathode ray tube (CRT) displays (monitors), as well as flat panel displays such as liquid crystal displays (LCD's). However, the invention is not limited to any particular display device. A display device is connected to the system bus 126. In addition to the display, computers typically include other peripheral output devices such as printers (not shown).
 Speakers 113 and 114 enable the audio output of signals. Speakers 113 and 114 are also connected to the system bus 126.
 Pointing device 115 permits the control of the screen pointer provided by the graphical user interface (GUI) of operating systems such as versions of Microsoft Windows™. Such pointing devices include a mouse, a touch pad, a trackball, a remote control, and a point stick. However, the invention is not limited to any particular pointing device.
 Finally, keyboard 116 permits entry of textual information into computer 110, as known within the art, and the invention is not limited to any particular type of keyboard.
 The computer 110 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer 150. These logical connections are achieved by a communication device coupled to or a part of the computer 110. The invention is not limited to a particular type of communications device. The remote computer 150 can be another computer, such as computer 110, a server, a router, a network PC, a client, a peer device, or other common network node. The logical connections depicted in FIG. 1a include a local-area network (LAN) 151 and a wide-area network (WAN) 152. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
 When used in a LAN-networking environment, computer 110 and remote computer 150 are connected to the local network 151 through a network interface or adapter 153, which is one type of communications device. When used in a conventional WAN-networking environment, the computer 110 and remote computer 150 communicate with a WAN 152 through modems (not shown). The modem, which can be internal or external, is connected to the system bus 126. In a networked environment, program modules depicted relative to computer 110, or portions thereof, can be stored in a remote memory storage device.
FIG. 1b is a block diagram of the hardware and operating environment in which computers 110 and 150 are used in some embodiments. FIG. 1b shows docketing provider system 170, service consumer systems 172-1 and 172-2, and service provider systems 172-3 and 172-4, each of which can be implemented using computer 110 or computer 150. A service provider provides services to a service consumer. Thus, the service consumer is the customer, client, beneficiary, or user of services provided by a service provider. A service provider can be, for example, a law firm, an accounting firm, a printing firm, an educational organization, or any other organization that provides services; the invention is not so limited. In some embodiments, the docketing provider, the service providers, and the service consumers communicate with each other by sending and receiving electronic mail messages encoded with data about service matters, as further described below in FIGS. 2-12.
 Docketing provider system 170 contains service database 180 and action processor 182. Database 180 contains data concerning service matters, which represent services that service providers are providing to service consumers. Service matters are further described below in FIG. 12. In one embodiment, docketing provider system 170 receives actions from an external source and communicates the actions to the appropriate service consumer and service provider. In one example embodiment, the external source is the U.S. Patent and Trademark Office, the service consumer is the applicant for a patent, and the service provider is the law firm prosecuting the patent application. The docketing provider receives the action from the U.S. Patent and Trademark Office and sends electronic mail encoded with data regarding the action to the applicant (the service consumer) and the applicant's law firm (the service provider).
 Service consumer system 172-1 contains local database 184-1 and action processor 182-1. Local database 184-1 contains only those service matters that pertain to service consumer 172-1. Thus, local database 184-1 is a subset of database 180.
 Service consumer system 172-2 contains local database 184-2 and action processor 182-2. Local database 184-2 contains only those service matters that pertain to service consumer 172-2. Thus, local database 184-2 is a subset of database 180.
 Service provider system 172-3 contains local database 184-3 and action processor 182-3. Local database 184-3 contains only those service matters that pertain to the consumers of service provider 172-3. Thus, local database 184-3 is a subset of database 180.
 Service provider system 172-4 contains local database 184-4 and action processor 182-4. Local database 184-4 contains only those service matters that pertain to the consumers of service provider 172-4. Thus, local database 184-4 is a subset of database 180.
 In some embodiments, database 180 contains the sum of all data in local databases 184-1, 184-2, 184-3, and 184-4. When local databases 184-1, 184-2, 184-3, and 18 service database 180 is optional. When service database 180 exists, one or more of local databases 184-1, 184-2, 184-3, and 184-4 are optional. Service consumer 172-1 is shown as using the services of two service providers 172-3 and 172-4, and service consumer 172-2 is shown as using the services of one service provider 172-4. Similarly, service provider 172-3 is shown as providing services to one service consumer 172-1, and service provider 172-4 is shown as providing services to two service consumers 172-2 and 172-2. Thus, each service consumer can obtain services from one or more service providers; each service provider can provide services to one or more service consumers. Further, although two service consumers (172-1, 172-2) and two service providers (172-3, 172-4) are shown, any number can exist.
 The operation of action processors 182, 182-1, 182-2, 182-3, and 182-4 are further described below in FIGS. 2-12.
 A system level overview of the operation of an exemplary embodiment of the invention is described by reference to FIG. 2 and FIG. 3. The concepts of the invention are described as operating in a multi-processing, multi-threaded operating environment on a computer, such as computer 110 in FIG. 1a.
 In FIG. 2, system 200 includes an action record 210 that is input to an action processor 220. The action processor generates an action object 230 from the action record 210. In one embodiment, action record 210 contains a database transaction that includes an action and at least one operand. In another embodiment, action record 210 contains a request for service. In one embodiment, action object 230 is an electronic message that encodes or encapsulates action record 210. The action object 230 can be transmitted between service consumers, service providers, and the docketing provider, as previously described above in FIG. 1b. For example, action object 230 is transmitted as electronic mail between source and destination(s) in order that if the destination system is not running and connected, action object 230 is queued until later. This allows the sending and receiving of action objects 230 to be asynchronous. Further, in some embodiments, action object 230 is encrypted for security during electronic mail handling. The contents of action record 210 and action object 230 and the processing of action processor 220 are further described below under the description for FIGS. 4 and 5.
 In FIG. 3, system 300 includes an action object 310 that is input to an action processor 320. The action processor 320 generates an action record 330 from the action object 310. In one embodiment, action object 310 is an electronic mail message (e-mail) that encodes action record 330. In one embodiment, action record 330 contains a database transaction that includes an action and at least one operand. In another embodiment, action record 330 contains a request for service. The contents of action object 310 and action record 330 and the processing of action processor 320 are further described below in FIGS. 4 and 5. In some embodiments, action objects 310 are received and queued into an e-mail inbox and later processed by action processor 320.
 The system level overview of the operation of an exemplary embodiment of the invention has been described in this section of the detailed description. An action processor generates an action object from an input action record. The action processor can also generate an action record from an input action object. Action objects can be sent as e-mail, for example on the Internet, and can be queued up in the e-mail outbox of the sender until convenient to send, and once sent, can be enqueued at the receiver's inbox until convenient for the receiver to process using an action processor. While the invention is not limited to any particular action, for sake of clarity a simplified action has been described.
 In the previous section, a system level overview of the operation of an exemplary embodiment of the invention was described. In this section, the particular methods performed by the computers, such as computers 110 and 150, of such an exemplary embodiment are described by reference to a series of flowcharts. The methods performed by the computers constitute computer programs made up of computer-executable instructions. Describing the methods by reference to a flowchart enables one skilled in the art to develop such programs including such instructions to carry out the methods on suitable computers, where the processor of the computer executes the instructions from computer-readable media. Computer-readable media can include RAM 120, ROM 122, mass storage 124, optionally including diskettes and/or CDROMs, or signals downloaded through Internet 130, LAN 151, or WAN 152, including wireless communications.
 Referring to FIG. 4, a flowchart of a method 400 performed by a computer according to an exemplary embodiment of the invention is shown. Method 400 is performed by a program executing on a computer, such as computer 110 in FIG. 1a, and is inclusive of the acts performed by action processor 220 or 320.
 Method 400 starts with the receipt of an action record 410. In one embodiment, an action is a database transaction that includes an action and at least one operand. Thereafter, the action is encoded into an electronic message 420. In one embodiment, the encoding is performed in reference to a data template that identifies a superset of actions that various computers implement. More specifically, particular computers implement a subset of all actions within a greater realm of actions. Therefore, a generalized method 400 is implemented to support all actions, and the method uses a template that describes all actions in the encoding 420 so that all actions are recognized and encoding accordingly. Actions that are not described in the template are unrecognized and are not encoded. In another embodiment, the electronic message is an email message compliant to Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP) defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 1123, Secure Electronic Transaction Protocol (SET), Multipurpose Internet Mail Extensions (MIME), or Lotus Notes. The email message could also use extensions to the Internet mail format that allow it to carry multiple types of data (binary, audio, video, graphics, etc.) as attachments to the email message.
 In yet another embodiment, an action is a request for service. After encoding of the action into an electronic message 420, the electronic message is transmitted 430. The electronic message is received 440, and the electronic message is decoded 450 into an action. In the decoding 450, a data template is used as in the encoding 420. Finally, the action is processed or executed 460. In another embodiment, the text of the decoded action is displayed via a browser. In still another embodiment, where the action is a database transaction, the processing is execution of the operation through a database management system (DBMS) using the operand of the action. Thereafter, the method 400 ends.
 Referring to FIG. 5, a flowchart of a method 500 performed by computers, such as computer 110 in FIG 1 a. Method 500 is inclusive of the acts required by an action processor, such as action processor 220 or 320.
 Method 500 starts with creating a transaction object 510. An example of a transaction object is action record 210. Following creating the transaction object, a local database is updated using the transaction object 520, the transaction object is encoded 530, and the encoded transaction object 540 is transmitted to a remote computer, such as computer 150 in FIG. 1a. An example of an encoded transaction object is action object 230. Transmission can be accomplished in compliance to protocols of varying embodiments, such as eXtensible Markup Language (XML), American National Standards Institute (ANSI) Electronic Data Interchange (EDI), Standard Generalized Markup Language (SGML) or Microsoft™ Channel Definition Format (CDF). Thereafter, the encoded transaction object is received at the remote computer 550, the encoded transaction object is decoded or unencoded 560, and a database at the remote computer is updated using the transaction object 570. Thereafter, method 500 ends.
 Consider the following examples, which illustrate method 500 in an embodiment where service provider 172-3 is a patent attorney (or law firm), the service consumer 172-1 is an inventor (or a company that employs the inventor), and the docketing provider 170 handles matters relating to a patent application regarding the inventor's invention.
 When the patent application is filed by service provider 172-3, the transaction object attaches data such as a scanned image copy of application, the filing date of the application, and data identifying the inventors and the assignee of the patent application. The transaction object is applied to local database 184-3, an email containing the transaction object is sent to service consumer 172-1 and docketing provider 170, and the transaction object is applied to local database 184-1 and service database 180.
 When an office action or other communication is received by docketing 170 from the United States Patent & Trademark Office, or other office, a transaction object is generated that includes such data as due dates, examiner contact information, a citation list of references, and a scanned image copy of the office action and references. The transaction object is applied to local database 180. E-mail including the transaction object is sent to service consumer 172-1 and service provider 172-3, and the transaction object is applied to respective databases 184-1 and 184-3.
 When the inventor generates comments on the office action, the transaction object includes, for example, an authorization to file a response and notes to the attorney with analysis of references. E-mail including the transaction object is sent to docketing provider 170 and service provider 172-3, and the transaction object is applied to respective databases 180 and 184-3.
 When the patent attorney drafts an amendment and response, the transaction object includes, for example, a value indicating the date-filed and a scanned copy of the amendment and response. The transaction object is applied to the local database 184-3. E-mail containing the transaction object is sent to docketing provider 170 and service consumer 172-1 where the transaction object is applied to the databases 180 and 184-1, respectively.
 When the docketing provider 170 generates a bill to service consumer 172-1, the transaction object contains such data as the date, a description of services, and the dollar amount billed. An e-mail including the transaction object is sent to consumer 172-1 where it is applied to database 184-1.
 When service provider 172-3 generates a bill to the service consumer, the transaction object includes such data as the date, a description of services and disbursements, and the dollar amount billed. An e-mail including the transaction object is sent to the consumer 172-1 where it is applied to database 184-1.
 Referring to FIG. 6, a flowchart of a method 600 performed by computers, such as computer 110 and 150 in FIG. 1 a, according to an exemplary embodiment of the invention is shown. Method 600 is inclusive of the acts required by an action processor.
 Method 600 starts with receiving one or more transactions from a provider of services or receiving a transaction from a consumer of services 610. In either case, because each activity involves a consumer of services, each transaction is associated with a service consumer. In an object-oriented embodiment, the association with a consumer of services is indicated by an attribute indicating the consumer of the service. In another embodiment, the association is indicated by a field indicating the consumer. In one embodiment, the transactions are received by a server computer, such as computer 150 in FIG. 1a from a client computer, such as computer 110 in FIG. 1a. Thereafter, the transaction is stored 620 by the server computer. Subsequently, access by a consumer of services to the stored transactions associated with the service consumer is enabled 630. The service consumer is one of the service consumers that are associated with the transactions received 610 and stored 620. Finally, the stored transactions to which access was enabled are accessed 640 by a computer, such as computer 110 in FIG. 1a. Thereafter, the method 600 ends.
 For example, when a series of e-mails arrives at the email inbox of service consumer 172-1, action processor 182-1 extracts the transaction objects from the e-mails and applies them to local database 184-1 at 620. Block 630 enables access to local database 184-1 to a consumer and optionally e-mails the consumer notifying the consumer of where local database 184-1 was changed. Block 640 accesses the changed local database 184-1 and displays the results to the consumer. Similar actions apply to all service providers and docketing provider 170.
FIG. 7 is a flowchart of a method 700 according to an exemplary embodiment of the invention. Method 700 begins upon an initial meeting with a service consumer. A service matter will be created 710 by an associated service provider. This service matter will be stored in a service database, such as docketing service database 180, and will be accessible via the Internet to both the service consumer and the service provider. In one embodiment of action 710, the initial meeting takes place with a new service consumer and later, using the service database, the service provider (e.g., 172-3) creates a new service matter in the service database (e.g., service database 180 as well as local database 184-3). The service consumer is provided with a username/password and URL address of a secure site. In another embodiment of action 710, the initial meeting takes place with an existing service consumer and the service provider creates a new service matter in the service database, and the service matter is appended to a set of pre-existing service matters associated with that service consumer. After action 710, actions 720, 730, 740, 750, 760, 770, 780, 790, and 795 can occur in any chronological order.
 Service consumers, in some embodiments, use a browser-based interface to access service-matter data 720. The service consumers will log into the system and only have access to service matters associated with them. In one embodiment of action 720, a new service consumer uses the username/password to log into a secure site, and the service consumer is presented with a view of containing only one service matter, the service matter that was created in step 710. In another embodiment of action 720, an existing service consumer logs into a secure site and the existing service consumer is presented with a view containing all current (not closed out) service matters including the newly created service matter.
 In another embodiment of action 720, all service consumers will be able to view the data for a particular service matter and tailor the view based on available filters. These filters include time, service provider(s), billings, and actions due. In one embodiment of viewing based on filters, a service consumer selects a filter of “actions due” in which service matters are sorted in descending order with the number of action items due as the sorted upon field.
 In another embodiment of viewing based on filters, a service consumer selects service provider name(s) and thereafter, service matters handled only by specified service provider(s) are displayed.
 In yet another embodiment of viewing based on filters, a service consumer specifies service provider names and selects a filter of “actions due” and thereafter service matters handled only by specified service provider(s) are displayed in descending order of the quantity of actions due.
 In yet another embodiment of action 720, a service provider uses a browser interface executing on a computer 100 in FIG. 1a to view service matters for various service consumers.
 In a more specific embodiment, a service provider logs into a secured site and is provided with a list of service matters that the service provider is involved with.
 In another more specific embodiment, service provider with ‘super’ privileges logs in and thereafter views all service matters currently stored in the service database.
 Several persons from the same organization will simultaneously view various different service matters belonging to that particular organization. In one embodiment, employee ‘A’ logs in and views service matters pertaining to him while employee ‘B’ logs in and views service matters specific to employee ‘B’ in which ‘A’ and ‘B’ are working on separate items. In another embodiment, employee ‘B’ logs in and views service matters and employee ‘B’ logs in and looks at the same data as ‘A’.
 A service consumer will receive automatic email reminders of actions due 730. These reminders may be sent out to multiple persons within the service consumer and/or service provider organization. In one embodiment of action 730, a service provider generates a list of actions due by the service consumer. Upon generation, e-mail referencing the service matters involved is sent out to a service consumer. In another embodiment of action 730, a service provider generates a list of actions due by various persons at the service consumer organization in which email containing the action due information is transmitted to the responsible person at the service provider, and also has the choice to “carbon-copy” (cc) or “blind-carbon-copy” (bcc) persons not directly involved with the due action. In another embodiment, docketing provider 170 generates a list of actions due by the service provider(s).
 Service providers, service consumers, and/or docketing providers will set alarms 740. In one embodiment, for an existing service matter, the service provider sets alarm events and when the system time reaches the alarm time, email is sent out to the service provider as a reminder about the pending alarm. In another embodiment the service provider logs into the system and acts on the alarm, thus marking it finished. In yet another embodiment, when an alarming event is not satisfied, up to n alarms are generated at a predetermined time interval.
 Service providers receive email notification prior to the alarms triggering 750. Action 740 must occur prior to action 750 for each individual alarm. In one embodiment, the time and number of times the alarms occur will be settable. In another embodiment, the service provider receives multiple alarms before acting upon that alarm event. In yet another embodiment, after an action is completed, the alarm associated with the action is removed.
 Service consumers receive transmitted data 760. In one embodiment, a service consumer logs in and downloads all data related to selected service matters. The service consumer uses programs that use API's provided by the service provider to access data. In another embodiment, service consumers will only be allowed a static view of data stored by the service provider.
 After action 760, the data transmitted in action 760 is merged into the service consumer's own private data store 770. In one embodiment, the service consumer uses API's provided by the service provider to merge into an internal database.
 The service consumer and the service provider will view a log of action items pending service provider/service consumer review 780.
 The service consumer or the service provider will submit a request to download data 790, which is fulfilled by transmitting the data. In one embodiment, a service consumer logs in and selects a particular service matter in which, for that service matter, the service consumer views the current draft and selects File Transfer Protocol (FTP) link to download a document and finally the document is transmitted to the service consumer's computer.
 For example, in some embodiments, method 700 provides an interactive docketing system providing each service provider and each service consumer with sorted to-do lists, e-mail reminders, an various alarms having different exigencies to ensure that crucial dates for completing various tasks are not missed.
 The service consumer or service provider annotates existing documents 795. In one embodiment, the service consumer logs in and selects to view a certain service matter. Then the service consumer views the current draft of the service matter, and finally, the service consumer adds and saves annotations to the draft.
 Following is table 1 that identifies, for some embodiments, the system privileges of the service provider a service consumer with basic privileges, and a service consumer with advanced privileges. There is a “system administrator” who will manage accounts for service providers and service consumers:
TABLE 1 ROLES Service Service Service Consumer Consumer Privilege Provider (Basic) (Advanced) Create Service matter Yes No No Delete Service matter (Abandon) Yes No No Close Service matter Yes No No View Service matter Yes Yes Yes Add Inventors Yes No No Delete Inventors Yes No No Add alarms (email reminders) Yes Yes Yes Leave messages Yes Yes Yes Create Action Items (Action proc.) Yes Yes Yes View Action Items Yes Yes Yes View billing information Yes No Yes Create Service consumer “inboxes” Yes No No Correspond via system Yes Yes Yes Create personal view profiles Yes Yes Yes
 The particular methods performed by remote database synchronization of an exemplary embodiment of the invention have been described. The method performed by remote database synchronization has been shown by reference to a flowchart including all the acts from remote database synchronization until a transaction-based object-oriented multipart database.
 In this section of the detailed description, a particular object-oriented implementation apparatus 800 and 900 of the invention is described in conjunction with the system overview in FIG. 2 and FIG. 3 and the methods described in conjunction with FIG. 4, FIG. 5, FIG. 6, and FIG. 7.
 In FIG. 8, an apparatus 800 includes a database 810 that enables a DBMS (Database Management System) 820 to retrieve an action record (not shown) from the database 810. The action record is a fixed-field record identifying a service. The DBMS 820 transmits the action record to the action processor 830, which generates an action object 840 from the action record. An action object 840 identifies a service.
 In FIG. 9, an apparatus 900 includes an action object 910 that is transmitted to the action processor 920. An action object 910 identifies a service. The action processor 920 generates an action record (not shown) from the action object 910. The action record is transmitted to a DBMS 930, which performs the action on a database 940.
 Email-Based Implementation
 In this section of the detailed description, a particular email-based implementation apparatus 1000 of the invention is described in conjunction with the system overview in FIG. 2 and FIG. 3 and the methods described in conjunction with FIG. 4, FIG. 5, FIG.6, and FIG. 7 that is email-based.
 In FIG. 10, an apparatus 1000 includes a client computer 1005, such as computer 110 in FIG. 1a. The client transmits an action to a server 1090, which includes a receiver of actions 1010. In one embodiment, the action is a database transaction that is identified by a phase and task, and that also includes a description, such as any one of the following in Table 2:
TABLE 2 PHASE TASK DESCRIPTION P50 051 Non-Prosecution matters P75 076 Miscellaneous Non-Fixed Fee P100 110 Novelty Searching P100 120 Drafting Opinion P200 210 Intake - CMG File setup P200 220 Drafting & Filing (Includes Preliminary Amendments) P200 230 Drawings P200 240 Sequence Listings P300 320 Original Filing - Information Disclosure Statements P300 321 Original filing - Response to 1st Nonfinal Office Action P300 322 Original Filing - Response to 2nd Nonfinal Office Action P300 323 Original Filing - Response to First Final Office Action P300 324 Original Filing - Response to Second Final Office Action P300 325 Original Filing - Post Filing Formalities P300 326 Original Filing - All other communication to USPTO P300 327 Original Filing - Allowance and Issue Activity P300 328 Original Filing - Miscellaneous prosecution matters P300 350 All other billing beyond second FWC P300 360 Translation P400 410 Notice, Research and Brief Writing P400 420 Oral Argument P500 510 Post Issuance P600 610 Preliminary Statement P600 620 Affidavit and Expert Witness Prep P600 630 Legal Research P600 640 Motion Drafting P600 650 Testimony P600 660 Briefs and Final Hearing P300 330 First FWC - Information Disclosure Statements P300 340 Second FWC - Information Disclosure Statements P300 331 First FWC - Response to First Nonfinal Office Action P300 341 Second FWC - Response to First Nonfinal Office Action P300 332 First FWC - Response to Second Nonfinal Office Action P300 342 Second FWC - Response to Second Nonfinal Action P300 333 First FWC - Response to First Final Office Action P300 343 Second FWC - Response to First Final Office Action P300 334 First FWC - Response to Second Final Office Action P300 344 Second FWC - Response to Second Final Office Action P300 335 First FWC - Post Filing Formalities P300 345 Second FWC - Post Filing Formalities P300 336 First FWC - All other communications to USPTO P300 346 Second FWC - All other communications to USPTO P300 337 First FWC - Allowance and Issue Activity P300 347 Second FWC - Allowance and Issue Activity P300 338 First FWC - Miscellaneous prosecution matters P300 348 Second FWC - Miscellaneous prosecution matters P700 710 Intake - CMG File setup P700 720 Drafting and Filing (including Preliminary Amendments) P700 730 Drawings P700 740 Sequence Listings P800 810 PCT - Report and response International search report P800 820 PCT - Report and response written opinion P800 830 PCT - Report International Preliminary Examination P800 840 PCT - Post filing formalities P800 850 PCT - Report Chapter II Demand P800 860 Foreign miscellaneous - non PCT P800 855 PCT - Miscellaneous
 In another embodiment, the action is an accounting of services rendered. The receiver 1010 in varying embodiments stores and retrieves the actions in a manner that is well known to those skilled in the art, such as a queue, a file or database. The receiver 1010 of the server 1090 sends the actions to an encoder 1020. In varying embodiments, the encoder 1020 generates a data stream from the action that is encoded compliant to any one of the various protocols well known to those skilled in the art, such as Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP) defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 1123, Secure Electronic Transaction Protocol (SET), Multipurpose Internet Mail Extensions (MIME) or Lotus Notes. In another embodiment, the encoder 1020 may be a browser extended with a plugin or add-in component well-know to those skilled in the art. In some embodiments, encoding includes data encryption in order to make transmission more secure. The data streams being encoded with an action record. The server 1090 further includes a transmitter 1030 of the data stream operatively coupled to the encoder that transmits the encoded action to a computer 1095, which in varying embodiments is an email server or a client. Computer 1095 includes a receiver of encoded action 1040 operatively coupled to the transmitter 1030 of server 1090. In one embodiment, the receiver 1040 is an email server. The receiver 1040 in varying embodiments includes a queue, a file or database for storing and retrieving the actions, which is well known to those skilled in the art. Receiver 1040 in varying embodiments communicates to the transmitter 1030 via the Internet, a wide-area network (WAN) or a local-area network (LAN). Computer 1095 further includes a decoder 1050 operatively coupled to the receiver 1040. In varying embodiments, the decoder 1050 decodes and/or decrypts database transactions from the data stream according to the protocol or format of the data stream that is well known to those skilled in the art, such as those described above for the encoding. In another embodiment, the encoder 1050 may be a browser extended with a plugin or add-in component well known to those skilled in the art. The server 1095 also includes a transmitter of actions 1060 operatively coupled to the decoder that transmits the action to a database transaction processor 1070. In one embodiment, the action processor 1070 is a database management system (DBMS) well-known to those skilled in the art, such as Microsoft SQL Server™ in which the DBMS uses the action to update the database 1080. In another embodiment, the action processor 1070 is an email browser which displays the action.
FIG. 11 is a block diagram of an apparatus 1100 according to an exemplary embodiment of the invention. System 1100 includes a service database 1110 that stores objects or records describing service actions. The service database 1110 transmits actions 1120 to an action processor 1130. The action processor also receives actions 1140 from other electronic sources. The action processor 1130 encapsulates the actions 1130 and 1140 into action objects 1150 and transmits the action objects 1150 to a server 1160. The server 1160 stores and retrieves action objects to a database 1170. The server 1160 exchanges action objects with one or more client computers 1180.
FIG. 12 is a block diagram of a data structure 1200 according to an exemplary embodiment of the invention. FIG. 12 describes the structure of matters described above in one embodiment in association with FIG. 7. Each individual at a service provider has access to a number of matters, matter1 1210, matter2 1220, matter 3 1230, matter n 1240. Each matter 1245 includes a number of data objects, such as a billing record 1250, an attorney record 1260, an inventor record 1270, or actions items 1280 and 1290.
FIG. 13 is a block diagram of an object-oriented domain apparatus 1300 according to an exemplary embodiment of the invention.
 The figure uses the Unified Modeling Language (UML), which is the industry-standard language for specifying, visualizing, constructing, and documenting the object-oriented artifacts of software systems. In the figures, a solid-filled diamond is used to indicate that an object of the class that is depicted above an object of another class is composed of the lower depicted object. Composition defines the attributes of an instance of a class as containing an instance of one or more existing instances of other classes in which the composing object does not inherit from the object(s) it is composed of.
 Each client 1310 is composed of any number of accounts 1320. A client 1310 may exist with no accounts 1320. Each account 1320 is composed of any number of matters 1330 as described in FIG. 12 and FIG. 7. An account 1320 may exist with no matters 1330. Each matter 1330 includes an indication of the stage of the matter, which is one position of many positions of a service process. Each matter is composed of any number of licensee representatives 1340, and actions 1370, and one intellectual property lawyer representative 1350 and one client representative 1360. Each licensee representative 1340 is composed of an indication of an attorney, and a billee and one or more individuals 1390. Moreover, each intellectual property lawyer law representative 1350 and each client representative 1360 also are composed of one or more individuals 1390. Furthermore each intellectual property law lawyer representative 1350 includes an indication of an attorney, an indication of a paralegal and an indication of a case management group representative and each client representative 1360 includes an indication of an attorney, and indication of an inventor, and indication of an owner, and an indication of a billee. Each action 1370 includes an indication of an intellectual property law lawyer and a client. Each action 1370 is also associated with a trigger 1380.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4868877 *||Feb 12, 1988||Sep 19, 1989||Fischer Addison M||Public key/signature cryptosystem with enhanced digital signature certification|
|US5710887 *||Aug 29, 1995||Jan 20, 1998||Broadvision||Computer system and method for electronic commerce|
|US5809242 *||Apr 19, 1996||Sep 15, 1998||Juno Online Services, L.P.||Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system|
|US5982863 *||Aug 27, 1997||Nov 9, 1999||Phytel, Inc.||Communications system for a service provider|
|US5991751 *||Jun 2, 1997||Nov 23, 1999||Smartpatents, Inc.||System, method, and computer program product for patent-centric and group-oriented data processing|
|US6298356 *||Nov 20, 1998||Oct 2, 2001||Aspect Communications Corp.||Methods and apparatus for enabling dynamic resource collaboration|
|US6304860 *||Oct 3, 1997||Oct 16, 2001||Joseph B. Martin, Jr.||Automated debt payment system and method using ATM network|
|US6314425 *||Aug 17, 1999||Nov 6, 2001||Critical Path, Inc.||Apparatus and methods for use of access tokens in an internet document management system|
|US6330575 *||Mar 31, 1998||Dec 11, 2001||International Business Machines Corporation||Web commerce tool kit for distributed payment processing|
|US6336099 *||Apr 24, 1998||Jan 1, 2002||Brightstreet.Com||Method and system for electronic distribution of product redemption coupons|
|US6345288 *||May 15, 2000||Feb 5, 2002||Onename Corporation||Computer-based communication system and method using metadata defining a control-structure|
|US6347307 *||Jun 13, 2000||Feb 12, 2002||Integral Development Corp.||System and method for conducting web-based financial transactions in capital markets|
|US6434580 *||Oct 23, 1998||Aug 13, 2002||Nec Corporation||System, method, and recording medium for drafting and preparing patent specifications|
|US6529885 *||Sep 24, 1999||Mar 4, 2003||Oracle Corporation||Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts|
|US20050262023 *||Jul 25, 2005||Nov 24, 2005||Intarsia Software Llc||Method for controlling database copyrights|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7350152 *||Oct 28, 2004||Mar 25, 2008||Microsoft Corporation||System and method for providing a server control interface|
|US7634499||Jan 6, 2007||Dec 15, 2009||Objectivity, Inc.||Method, system and computer-readable media for repairing data record corruption|
|US7853572 *||Mar 21, 2005||Dec 14, 2010||Foundationip, Llc||Bulk download of documents from a system for managing documents|
|Cooperative Classification||G06Q50/18, G06Q10/10, G06Q30/04, G06Q20/3821, Y10S707/99944, Y10S707/99939, Y10S707/99942, Y10S707/99945, Y10S707/99943|
|European Classification||G06Q10/10, G06Q50/18, G06Q20/3821, G06Q30/04|
|Apr 8, 2008||AS||Assignment|
Owner name: FOUNDATIONIP, LLC, MINNESOTA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SCHWEGMAN, LUNDBERG, WOESSNER & KLUTH P.A.;REEL/FRAME:020772/0901
Effective date: 20080221