System & Method For Compiling Intellectual Property Asset Data
First Claim
Patent Images
1. A method of operating an access computing system comprising:
- using the access computing system to access a set of records maintained by a target computing system in a first database associated with a first entity over an internet based network, said first database being configured to respond to user queries for said records over said network using a first query protocol presented in a first interface;
wherein said target computing system first query protocol restricts a user to using a first set of N parameters (N>
=1) for locating matching records in said first database;
further wherein said first interface of said target computing system constrains the user to use said first query protocol when accessing records in said first database;
configuring a second database with the computing system to store said set of records;
configuring a second interface for accessing said of records in said second database, said second interface including a second query protocol which includes both said first set of N parameters for locating matching records in said second database as well as at least one search parameter in addition to said first set of N parameters;
wherein said access computing system allows access to the set of records maintained at the target computing system using a different interface and a different protocol which emulates and enhances access options for querying the set of records.
5 Assignments
0 Petitions
Accused Products
Abstract
An access server computing system scrapes a set of records maintained by a target computing system in a database which is only made accessible over the Internet with a limited protocol query and an access challenge. The access server accesses the target computing system through an Internet browser interface based on emulating a user query made through the limited protocol, including by automatically passing locator identifier fields to retrieve a corresponding set of record which are stored in the first database.
-
Citations
20 Claims
-
1. A method of operating an access computing system comprising:
-
using the access computing system to access a set of records maintained by a target computing system in a first database associated with a first entity over an internet based network, said first database being configured to respond to user queries for said records over said network using a first query protocol presented in a first interface; wherein said target computing system first query protocol restricts a user to using a first set of N parameters (N>
=1) for locating matching records in said first database;further wherein said first interface of said target computing system constrains the user to use said first query protocol when accessing records in said first database; configuring a second database with the computing system to store said set of records; configuring a second interface for accessing said of records in said second database, said second interface including a second query protocol which includes both said first set of N parameters for locating matching records in said second database as well as at least one search parameter in addition to said first set of N parameters; wherein said access computing system allows access to the set of records maintained at the target computing system using a different interface and a different protocol which emulates and enhances access options for querying the set of records. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. In a networked computing system including a set of records maintained by
a first entity in a target computing system in a first database over an internet based network, the first database being configured to respond to user queries for said records over said network using a first query protocol presented in a first interface, and wherein the first query protocol restricts a user to using a first set of N parameters (N> - =1) for locating matching records in said first database, the improvement comprising;
configuring a second database with a second computing system to store said set of records; wherein said second computing system is maintained by a second entity separate from and not controlling the first entity; configuring a second interface for accessing said of records in said second database, said second interface including a second query protocol which includes both said first set of N parameters for locating matching records in said second database as well as at least one search parameter in addition to said first set of N parameters; wherein said second computing system allows access to the set of records maintained at the target computing system using a different interface and a different protocol which emulates and enhances access options for querying the set of records.
- =1) for locating matching records in said first database, the improvement comprising;
-
9. A method of operating an access computing system under control of a first entity comprising:
configuring a first access server computing system and a first database coupled to said first access server under control of said first entity; using said first access computing system to access a set of records maintained by a target computing system in a second database over an internet based network, said second database being configured and controlled by a second entity to respond to a user query for said records over said network using a first query protocol presented in a first browser interface which restricts access to no more than one record at one time; wherein said first access computing system accesses said target computing system through an Internet browser interface based on emulating said user query, including by automatically passing a plurality of single locator identifier fields to said first query protocol to retrieve a corresponding plurality of records in said set of records; storing said set of records in said first database. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A system for indirectly analyzing and predicting behavior of a target organization, which target organization processes input submissions from third parties using a staff of human personnel in accordance with a first rule set to generate output events, the system comprising:
-
a first access server computing system and a first database operatively connected to a network; first module for configuring said first access server computing system and said first database under control of said first entity; a second module adapted to use said first access computing system to access a set of records maintained by a target computing system in a second database over an internet based network, said second database being configured and controlled by a second entity to respond to a user query for said records over said network using a first query protocol presented in a first browser interface which restricts access to no more than one record at one time; wherein said first access computing system accesses said target computing system through an Internet browser interface based on emulating said user query, including by automatically passing a plurality of single locator identifier fields to said first query protocol to retrieve a corresponding plurality of records in said set of records; a third module for storing said set of records in said first database.
-
Specification