{"search_session":{},"preferences":{"l":"en","queryLanguage":"en"},"patentId":"120-639-751-141-831","frontPageModel":{"patentViewModel":{"ref":{"entityRefType":"PATENT","entityRefId":"120-639-751-141-831"},"entityMetadata":{"linkedIds":{"empty":true},"tags":[],"collections":[{"id":22721,"type":"PATENT","title":"Citing CNRS publications","description":"Patent documents citing scholarly work of CNRS","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":129822,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:38:15Z","updated":"2017-08-07T04:38:15Z","lastEventDate":"2017-08-07T04:38:15Z"},{"id":22732,"type":"PATENT","title":"Citing UC Berkeley publications","description":"Patent documents citing scholarly work of UC Berkeley","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":71443,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:43:57Z","updated":"2017-08-07T04:43:57Z","lastEventDate":"2017-08-07T04:43:57Z"},{"id":22739,"type":"PATENT","title":"Citing KU Leuven publications","description":"Patent documents citing scholarly work of KU Leuven","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":30113,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:46:44Z","updated":"2017-08-07T04:46:44Z","lastEventDate":"2017-08-07T04:46:44Z"},{"id":22756,"type":"PATENT","title":"Citing SUNYS publications","description":"Patent documents citing scholarly work of SUNYS","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":51828,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:52:17Z","updated":"2017-08-07T04:52:17Z","lastEventDate":"2017-08-07T04:52:17Z"},{"id":22761,"type":"PATENT","title":"Citing Carnegie Mellon Univ publications","description":"Patent documents citing scholarly work of Carnegie Mellon Univ","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":16967,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:54:42Z","updated":"2017-08-07T04:54:42Z","lastEventDate":"2017-08-07T04:54:42Z"},{"id":22771,"type":"PATENT","title":"Citing Univ Southern California publications","description":"Patent documents citing scholarly work of Univ Southern California","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":40914,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:57:43Z","updated":"2017-08-07T04:57:43Z","lastEventDate":"2017-08-07T04:57:43Z"},{"id":22786,"type":"PATENT","title":"Citing Duke Univ publications","description":"Patent documents citing scholarly work of Duke Univ","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":52418,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:04:02Z","updated":"2017-08-07T05:04:02Z","lastEventDate":"2017-08-07T05:04:02Z"},{"id":22790,"type":"PATENT","title":"Citing MIT publications","description":"Patent documents citing scholarly work of MIT","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":143355,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:05:29Z","updated":"2019-11-29T02:59:34Z","lastEventDate":"2019-11-29T02:59:34Z"},{"id":22794,"type":"PATENT","title":"Citing LBNL publications","description":"Patent documents citing scholarly work of LBNL","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":22220,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:08:27Z","updated":"2017-08-07T05:08:27Z","lastEventDate":"2017-08-07T05:08:27Z"},{"id":22799,"type":"PATENT","title":"Citing Univ Alabama System publications","description":"Patent documents citing scholarly work of Univ Alabama System","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":32860,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:09:26Z","updated":"2017-08-07T05:09:26Z","lastEventDate":"2017-08-07T05:09:26Z"},{"id":22802,"type":"PATENT","title":"Citing UC System publications","description":"Patent documents citing scholarly work of UC System","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":266608,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:10:38Z","updated":"2017-08-07T05:10:38Z","lastEventDate":"2017-08-07T05:10:38Z"},{"id":22842,"type":"PATENT","title":"Citing Univ Toronto publications","description":"Patent documents citing scholarly work of Univ Toronto","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":65159,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:27:52Z","updated":"2017-08-07T05:27:52Z","lastEventDate":"2017-08-07T05:27:52Z"},{"id":22844,"type":"PATENT","title":"Citing Northwestern Univ publications","description":"Patent documents citing scholarly work of Northwestern Univ","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":37711,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:29:24Z","updated":"2017-08-07T05:29:24Z","lastEventDate":"2017-08-07T05:29:24Z"},{"id":22860,"type":"PATENT","title":"Citing UC San Diego publications","description":"Patent documents citing scholarly work of UC San Diego","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":70050,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:40:14Z","updated":"2017-08-07T05:40:14Z","lastEventDate":"2017-08-07T05:40:14Z"},{"id":22870,"type":"PATENT","title":"Citing UC Santa Cruz publications","description":"Patent documents citing scholarly work of UC Santa Cruz","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":6086,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:44:35Z","updated":"2017-08-07T05:44:35Z","lastEventDate":"2017-08-07T05:44:35Z"},{"id":23026,"type":"PATENT","title":"Citing Macquarie University publications","description":"Patent documents citing scholarly work of Macquarie University","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":2259,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-15T06:21:20Z","updated":"2017-08-15T06:21:20Z","lastEventDate":"2017-08-15T06:21:20Z"},{"id":182992,"type":"PATENT","title":"4","description":"","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":49206,"tags":[],"user":{"id":320339875,"username":"tadro.abbott@csiro.au","firstName":"Tadro","lastName":"Abbott","created":"2019-06-27T07:11:33.000Z","displayName":"Tadro Abbott","preferences":"{\"usage\":\"public\"}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2020-08-10T02:04:56Z","updated":"2020-08-10T02:09:18Z","lastEventDate":"2020-08-10T02:09:18Z"},{"id":189305,"type":"PATENT","title":"patentes","description":"Netflix","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":16018,"tags":[],"user":{"id":395618856,"username":"Andrewo","firstName":"","lastName":"","created":"2021-03-17T00:11:58.000Z","displayName":"Andrewo","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2021-03-17T00:28:38Z","updated":"2021-03-17T00:28:39Z","lastEventDate":"2021-03-17T00:28:39Z"},{"id":189308,"type":"PATENT","title":"patentes por netflix","description":"","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":444,"tags":[],"user":{"id":395618856,"username":"Andrewo","firstName":"","lastName":"","created":"2021-03-17T00:11:58.000Z","displayName":"Andrewo","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2021-03-17T00:33:44Z","updated":"2021-03-17T00:33:47Z","lastEventDate":"2021-03-17T00:33:47Z"}],"notes":[],"inventorships":[],"privateCollections":[],"publicCollections":[{"id":22721,"type":"PATENT","title":"Citing CNRS publications","description":"Patent documents citing scholarly work of CNRS","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":129822,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:38:15Z","updated":"2017-08-07T04:38:15Z","lastEventDate":"2017-08-07T04:38:15Z"},{"id":22732,"type":"PATENT","title":"Citing UC Berkeley publications","description":"Patent documents citing scholarly work of UC Berkeley","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":71443,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:43:57Z","updated":"2017-08-07T04:43:57Z","lastEventDate":"2017-08-07T04:43:57Z"},{"id":22739,"type":"PATENT","title":"Citing KU Leuven publications","description":"Patent documents citing scholarly work of KU Leuven","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":30113,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:46:44Z","updated":"2017-08-07T04:46:44Z","lastEventDate":"2017-08-07T04:46:44Z"},{"id":22756,"type":"PATENT","title":"Citing SUNYS publications","description":"Patent documents citing scholarly work of SUNYS","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":51828,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:52:17Z","updated":"2017-08-07T04:52:17Z","lastEventDate":"2017-08-07T04:52:17Z"},{"id":22761,"type":"PATENT","title":"Citing Carnegie Mellon Univ publications","description":"Patent documents citing scholarly work of Carnegie Mellon Univ","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":16967,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:54:42Z","updated":"2017-08-07T04:54:42Z","lastEventDate":"2017-08-07T04:54:42Z"},{"id":22771,"type":"PATENT","title":"Citing Univ Southern California publications","description":"Patent documents citing scholarly work of Univ Southern California","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":40914,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T04:57:43Z","updated":"2017-08-07T04:57:43Z","lastEventDate":"2017-08-07T04:57:43Z"},{"id":22786,"type":"PATENT","title":"Citing Duke Univ publications","description":"Patent documents citing scholarly work of Duke Univ","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":52418,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:04:02Z","updated":"2017-08-07T05:04:02Z","lastEventDate":"2017-08-07T05:04:02Z"},{"id":22790,"type":"PATENT","title":"Citing MIT publications","description":"Patent documents citing scholarly work of MIT","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":143355,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:05:29Z","updated":"2019-11-29T02:59:34Z","lastEventDate":"2019-11-29T02:59:34Z"},{"id":22794,"type":"PATENT","title":"Citing LBNL publications","description":"Patent documents citing scholarly work of LBNL","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":22220,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:08:27Z","updated":"2017-08-07T05:08:27Z","lastEventDate":"2017-08-07T05:08:27Z"},{"id":22799,"type":"PATENT","title":"Citing Univ Alabama System publications","description":"Patent documents citing scholarly work of Univ Alabama System","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":32860,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:09:26Z","updated":"2017-08-07T05:09:26Z","lastEventDate":"2017-08-07T05:09:26Z"},{"id":22802,"type":"PATENT","title":"Citing UC System publications","description":"Patent documents citing scholarly work of UC System","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":266608,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:10:38Z","updated":"2017-08-07T05:10:38Z","lastEventDate":"2017-08-07T05:10:38Z"},{"id":22842,"type":"PATENT","title":"Citing Univ Toronto publications","description":"Patent documents citing scholarly work of Univ Toronto","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":65159,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:27:52Z","updated":"2017-08-07T05:27:52Z","lastEventDate":"2017-08-07T05:27:52Z"},{"id":22844,"type":"PATENT","title":"Citing Northwestern Univ publications","description":"Patent documents citing scholarly work of Northwestern Univ","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":37711,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:29:24Z","updated":"2017-08-07T05:29:24Z","lastEventDate":"2017-08-07T05:29:24Z"},{"id":22860,"type":"PATENT","title":"Citing UC San Diego publications","description":"Patent documents citing scholarly work of UC San Diego","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":70050,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:40:14Z","updated":"2017-08-07T05:40:14Z","lastEventDate":"2017-08-07T05:40:14Z"},{"id":22870,"type":"PATENT","title":"Citing UC Santa Cruz publications","description":"Patent documents citing scholarly work of UC Santa Cruz","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":6086,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-07T05:44:35Z","updated":"2017-08-07T05:44:35Z","lastEventDate":"2017-08-07T05:44:35Z"},{"id":23026,"type":"PATENT","title":"Citing Macquarie University publications","description":"Patent documents citing scholarly work of Macquarie University","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":2259,"tags":[],"user":{"id":233682368,"username":"tech","firstName":"The Lens","lastName":"Team","created":"2017-08-06T20:11:49.000Z","displayName":"The Lens Team","profilePictureKey":"lens/users/15eac2a0-031d-4923-92cb-a162e1cb2bbb/profile-picture","preferences":"{\"beta\":true}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2017-08-15T06:21:20Z","updated":"2017-08-15T06:21:20Z","lastEventDate":"2017-08-15T06:21:20Z"},{"id":182992,"type":"PATENT","title":"4","description":"","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":49206,"tags":[],"user":{"id":320339875,"username":"tadro.abbott@csiro.au","firstName":"Tadro","lastName":"Abbott","created":"2019-06-27T07:11:33.000Z","displayName":"Tadro Abbott","preferences":"{\"usage\":\"public\"}","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2020-08-10T02:04:56Z","updated":"2020-08-10T02:09:18Z","lastEventDate":"2020-08-10T02:09:18Z"},{"id":189305,"type":"PATENT","title":"patentes","description":"Netflix","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":16018,"tags":[],"user":{"id":395618856,"username":"Andrewo","firstName":"","lastName":"","created":"2021-03-17T00:11:58.000Z","displayName":"Andrewo","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2021-03-17T00:28:38Z","updated":"2021-03-17T00:28:39Z","lastEventDate":"2021-03-17T00:28:39Z"},{"id":189308,"type":"PATENT","title":"patentes por netflix","description":"","access":"OPEN_ACCESS","displayAvatar":true,"attested":false,"itemCount":444,"tags":[],"user":{"id":395618856,"username":"Andrewo","firstName":"","lastName":"","created":"2021-03-17T00:11:58.000Z","displayName":"Andrewo","accountType":"PERSONAL","isOauthOnly":false},"notes":[],"sharedType":"PUBLISHED","hasLinkedSavedQueries":false,"savedQueries":[],"created":"2021-03-17T00:33:44Z","updated":"2021-03-17T00:33:47Z","lastEventDate":"2021-03-17T00:33:47Z"}],"privateNotes":[],"landscapeCollections":[],"landscapeNotes":[]},"document":{"record_lens_id":"120-639-751-141-831","lens_id":["120-639-751-141-831","165-952-747-077-500"],"doc_key":"US_9400800_B2_20160726","created":"2016-08-19T22:58:24.373","docdb_id":458580756,"lens_internal":{"earliest_lens_id_created_time":"2016-08-19T22:58:24.373","last_modified":"2024-03-25T00:07:25.314","legacy_pub_key":"US_9400800_B2","has_doc_lang":true,"has_biblio_lang":true,"has_all_title_lang":true,"has_all_abstract_lang":true,"has_all_claims_lang":true,"has_description_lang":true},"jurisdiction":"US","doc_number":"9400800","kind":"B2","date_published":"2016-07-26","year_published":2016,"ids":["US_9400800_B2","120-639-751-141-831","165-952-747-077-500","US_9400800_B2_20160726","US","9400800","B2","US9400800B2","US9400800","9400800B2"],"lang":"en","publication_type":"GRANTED_PATENT","application_reference":{"jurisdiction":"US","doc_number":"201213681306","kind":"A","date":"2012-11-19"},"priority_claim":[{"jurisdiction":"US","doc_number":"201213681306","kind":"A","date":"2012-11-19"}],"priority_claim.source":"DOCDB","earliest_priority_claim_date":"2012-11-19","title":{"en":[{"text":"Data transport by named content synchronization","lang":"en","source":"DOCDB","data_format":"DOCDBA"}]},"title_lang":["en"],"has_title":true,"applicant":[{"name":"PALO ALTO RES CT INC","residence":"US","sequence":1,"app_type":"applicant"}],"applicant_count":1,"has_applicant":true,"inventor":[{"name":"JACOBSON VAN L","residence":"US","sequence":1},{"name":"MOSKO MARC E","residence":"US","sequence":2}],"inventor_count":2,"has_inventor":true,"agent":[{"name":"Shun Yao","sequence":1},{"name":"Park, Vaughan, Fleming & Dowler LLP","sequence":2}],"agent_count":2,"has_agent":true,"owner":[{"name":"CISCO TECHNOLOGY INC","address":"170 WEST TASMAN DRIVE, SAN JOSE, CALIFORNIA, 95134-1706","sequence":3,"recorded_date":"2017-02-14","execution_date":"2017-02-10","is_current_owner":true},{"name":"SAMSUNG ELECTRONICS CO. LTD","address":"416 MAELAN-DONG, YEONGTONG-GU, SUWON, KYUNGKI-DO, 442-742","country":"KR","sequence":2,"recorded_date":"2016-12-02","execution_date":"2016-12-02","is_current_owner":true}],"owner_count":2,"owner_all":[{"name":"CISCO SYSTEMS INC","address":"170 WEST TASMAN DRIVE, SAN JOSE, CALIFORNIA, 95134-1706","sequence":5,"recorded_date":"2017-02-14","execution_date":"2017-01-10","is_current_owner":false},{"name":"CISCO TECHNOLOGY INC","address":"170 WEST TASMAN DRIVE, SAN JOSE, CALIFORNIA, 95134-1706","sequence":3,"recorded_date":"2017-02-14","execution_date":"2017-02-10","is_current_owner":true},{"name":"PALO ALTO RESEARCH CENTER INCORPORATED","address":"3333 COYOTE HILL ROAD, PALO ALTO, CALIFORNIA, 94304-1314","sequence":4,"recorded_date":"2016-12-02","execution_date":"2016-12-02","is_current_owner":false},{"name":"SAMSUNG ELECTRONICS CO. LTD","address":"416 MAELAN-DONG, YEONGTONG-GU, SUWON, KYUNGKI-DO, 442-742","country":"KR","sequence":2,"recorded_date":"2016-12-02","execution_date":"2016-12-02","is_current_owner":true}],"owner_all_count":4,"has_owner":true,"primary_examiner":{"name":"Vivek Srivastava","department":"2449"},"assistant_examiner":{"name":"William C McBeth"},"has_examiner":true,"class_ipcr":[{"symbol":"G06F17/30","version_indicator":"2006-01-01","class_symbol_position":"F","class_value":"I","action_date":"2016-07-26","class_status":"B","class_data_source":"H","generating_office":"US","sequence":1},{"symbol":"H04L29/08","version_indicator":"2006-01-01","class_symbol_position":"L","class_value":"I","action_date":"2016-07-26","class_status":"B","class_data_source":"H","generating_office":"US","sequence":2}],"class_ipcr.first_symbol":"G06F17/30","class_ipcr.later_symbol":["H04L29/08"],"class_ipcr.inv_symbol":["G06F17/30","H04L29/08"],"class_ipcr.add_symbol":[],"class_ipcr.source":"DOCDB","class_cpc":[{"symbol":"G06F16/178","version_indicator":"2019-01-01","class_symbol_position":"F","class_value":"I","action_date":"2019-01-03","class_status":"B","class_data_source":"H","generating_office":"US","sequence":1},{"symbol":"G06F16/178","version_indicator":"2019-01-01","class_symbol_position":"F","class_value":"I","action_date":"2019-01-03","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":2},{"symbol":"H04L67/1095","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"I","action_date":"2016-03-03","class_status":"B","class_data_source":"H","generating_office":"US","sequence":3}],"class_cpc_cset":[],"class_cpc.first_symbol":"G06F16/178","class_cpc.later_symbol":["H04L67/1095"],"class_cpc.inv_symbol":["G06F16/178","G06F16/178","H04L67/1095"],"class_cpc.add_symbol":[],"class_cpc.source":"DOCDB","class_national":[],"class_national.later_symbol":[],"reference_cited":[{"patent":{"num":1,"document_id":{"jurisdiction":"US","doc_number":"8332357","kind":"B1","date":"2012-12-11","name":"CHUNG RICHARD Y [US]"},"lens_id":"178-832-446-530-549","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":1}},{"patent":{"num":2,"document_id":{"jurisdiction":"US","doc_number":"2003167318","kind":"A1","date":"2003-09-04","name":"ROBBIN JEFFREY L [US], et al"},"lens_id":"034-302-011-615-869","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":2}},{"patent":{"num":3,"document_id":{"jurisdiction":"US","doc_number":"2004246902","kind":"A1","date":"2004-12-09","name":"WEINSTEIN JOSEPH J [US], et al"},"lens_id":"165-110-857-800-834","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":3}},{"patent":{"num":4,"document_id":{"jurisdiction":"US","doc_number":"2008005195","kind":"A1","date":"2008-01-03","name":"LI JIN [US]"},"lens_id":"158-695-258-083-899","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":4}},{"patent":{"num":5,"document_id":{"jurisdiction":"US","doc_number":"2009006489","kind":"A1","date":"2009-01-01","name":"RAMASUBRAMANIAN VENUGOPALAN SARASWATI [US], et al"},"lens_id":"103-317-261-635-291","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":5}},{"patent":{"num":6,"document_id":{"jurisdiction":"US","doc_number":"2009144343","kind":"A1","date":"2009-06-04","name":"HOLT JOE [US], et al"},"lens_id":"181-713-503-903-863","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":6}},{"patent":{"num":7,"document_id":{"jurisdiction":"US","doc_number":"2009274158","kind":"A1","date":"2009-11-05","name":"SHARP COURTNEY [US], et al"},"lens_id":"054-110-128-086-488","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":7}},{"patent":{"num":8,"document_id":{"jurisdiction":"US","doc_number":"2010030840","kind":"A1","date":"2010-02-04","name":"O'SHEA GREGORY FRANCIS [GB], et al"},"lens_id":"018-231-897-996-369","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":8}},{"patent":{"num":9,"document_id":{"jurisdiction":"US","doc_number":"2010257149","kind":"A1","date":"2010-10-07","name":"COGNIGNI GIORGIO [IT], et al"},"lens_id":"009-002-500-554-971","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":9}},{"patent":{"num":10,"document_id":{"jurisdiction":"US","doc_number":"2011137916","kind":"A1","date":"2011-06-09","name":"DEEN ROBERT GLENN [US], et al"},"lens_id":"143-379-913-760-640","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":10}},{"patent":{"num":11,"document_id":{"jurisdiction":"US","doc_number":"2011219093","kind":"A1","date":"2011-09-08","name":"RAGUNATHAN RAVICHANDRAN [US], et al"},"lens_id":"003-315-440-232-741","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":11}},{"patent":{"num":12,"document_id":{"jurisdiction":"US","doc_number":"2012173656","kind":"A1","date":"2012-07-05","name":"SORENSON III JAMES CHRISTOPHER [US]"},"lens_id":"151-593-895-033-489","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":12}},{"patent":{"num":13,"document_id":{"jurisdiction":"US","doc_number":"2012233490","kind":"A1","date":"2012-09-13","name":"BARTON MICHAEL [US], et al"},"lens_id":"163-887-165-179-557","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":13}},{"patent":{"num":14,"document_id":{"jurisdiction":"US","doc_number":"2013061084","kind":"A1","date":"2013-03-07","name":"BARTON MICHAEL [US], et al"},"lens_id":"179-627-813-972-60X","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":14}},{"patent":{"num":15,"document_id":{"jurisdiction":"US","doc_number":"2014074783","kind":"A1","date":"2014-03-13","name":"ALSINA THOMAS [US], et al"},"lens_id":"175-694-646-371-181","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":15}},{"patent":{"num":16,"document_id":{"jurisdiction":"US","doc_number":"2015120663","kind":"A1","date":"2015-04-30","name":"LE SCOUARNEC NICOLAS [FR], et al"},"lens_id":"068-889-538-031-164","category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[],"sequence":16}},{"npl":{"num":1,"text":"Tzanetakis et al., \"A Scalable Peer-to-Peer System for Music Information Retrieval,\" Computer Music Journal, vol. 28, No. 2, Jun. 2004, pp. 24-33.","npl_type":"a","external_id":["10.1162/014892604323112220"],"record_lens_id":"029-736-421-093-714","lens_id":["189-560-811-466-139","029-736-421-093-714"],"sequence":17,"category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[]}},{"npl":{"num":2,"text":"Zahn et al., \"Feasibility of Content Dissemination Between Devices in Moving Vehicles,\" Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, Dec. 2009, pp. 97-108.","npl_type":"a","external_id":["10.1145/1658939.1658951"],"record_lens_id":"099-716-769-756-110","lens_id":["175-395-218-343-432","099-716-769-756-110"],"sequence":18,"category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[]}},{"npl":{"num":3,"text":"Le Merrer et al., \"Bitbox: Eventually Consistent File Sharing,\" Lecture Notes in Computer Science, vol. 7853, 2013, pp. 274-278.","npl_type":"a","external_id":["10.1007/978-3-642-40148-0_23"],"record_lens_id":"079-312-904-183-700","lens_id":["166-650-287-749-304","079-312-904-183-700"],"sequence":19,"category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[]}},{"npl":{"num":4,"text":"Zhu et al., \"Let's ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking\", 21st IEEE International Conference on Network Protocols, Oct. 7-10, 2013, pp. 1-10.","npl_type":"a","external_id":["10.1109/icnp.2013.6733578"],"record_lens_id":"010-167-180-259-21X","lens_id":["128-268-033-591-636","010-167-180-259-21X"],"sequence":20,"category":[],"us_category":[],"cited_phase":"SEA","rel_claims":[]}},{"patent":{"num":1,"document_id":{"jurisdiction":"US","doc_number":"817441","kind":"A","date":"1906-04-10","name":"NIESZ FRANKLIN B [US], et al"},"lens_id":"078-727-565-000-890","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":1}},{"patent":{"num":2,"document_id":{"jurisdiction":"US","doc_number":"4309569","kind":"A","date":"1982-01-05","name":"MERKLE RALPH C"},"lens_id":"125-593-301-169-133","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":2}},{"patent":{"num":3,"document_id":{"jurisdiction":"US","doc_number":"4921898","kind":"A","date":"1990-05-01","name":"LENNEY WILLIAM E [US], et al"},"lens_id":"029-434-677-436-924","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":3}},{"patent":{"num":4,"document_id":{"jurisdiction":"US","doc_number":"5070134","kind":"A","date":"1991-12-03","name":"OYAMADA TAKEO [JP], et al"},"lens_id":"137-821-501-983-09X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":4}},{"patent":{"num":5,"document_id":{"jurisdiction":"US","doc_number":"5110856","kind":"A","date":"1992-05-05","name":"OYAMADA TAKEO [JP], et al"},"lens_id":"028-772-971-098-562","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":5}},{"patent":{"num":6,"document_id":{"jurisdiction":"US","doc_number":"5506844","kind":"A","date":"1996-04-09","name":"RAO R PADMANABHA [US]"},"lens_id":"149-343-956-367-236","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":6}},{"patent":{"num":7,"document_id":{"jurisdiction":"US","doc_number":"5629370","kind":"A","date":"1997-05-13","name":"FREIDZON YAKOV S [US]"},"lens_id":"018-416-966-325-35X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":7}},{"patent":{"num":8,"document_id":{"jurisdiction":"US","doc_number":"5870605","kind":"A","date":"1999-02-09","name":"BRACHO RAFAEL [US], et al"},"lens_id":"095-832-442-536-194","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":8}},{"patent":{"num":9,"document_id":{"jurisdiction":"US","doc_number":"6052683","kind":"A","date":"2000-04-18","name":"IRWIN GEORGE FRANK [CA]"},"lens_id":"006-892-352-011-059","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":9}},{"patent":{"num":10,"document_id":{"jurisdiction":"US","doc_number":"6091724","kind":"A","date":"2000-07-18","name":"CHANDRA TUSHAR DEEPAK [US], et al"},"lens_id":"046-265-853-905-358","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":10}},{"patent":{"num":11,"document_id":{"jurisdiction":"US","doc_number":"6173364","kind":"B1","date":"2001-01-09","name":"ZENCHELSKY DANIEL N [US], et al"},"lens_id":"142-235-341-183-737","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":11}},{"patent":{"num":12,"document_id":{"jurisdiction":"US","doc_number":"6226618","kind":"B1","date":"2001-05-01","name":"DOWNS EDGAR [US], et al"},"lens_id":"086-718-015-937-115","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":12}},{"patent":{"num":13,"document_id":{"jurisdiction":"US","doc_number":"6233646","kind":"B1","date":"2001-05-15","name":"HAHM JIN HO [KR]"},"lens_id":"145-586-451-816-789","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":13}},{"patent":{"num":14,"document_id":{"jurisdiction":"US","doc_number":"6332158","kind":"B1","date":"2001-12-18","name":"RISLEY CHRIS [US], et al"},"lens_id":"175-653-743-583-118","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":14}},{"patent":{"num":15,"document_id":{"jurisdiction":"US","doc_number":"6366988","kind":"B1","date":"2002-04-02","name":"SKIBA MARK [US], et al"},"lens_id":"149-809-416-742-965","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":15}},{"patent":{"num":16,"document_id":{"jurisdiction":"US","doc_number":"6574377","kind":"B1","date":"2003-06-03","name":"CAHILL THOMAS [US], et al"},"lens_id":"029-568-129-175-755","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":16}},{"patent":{"num":17,"document_id":{"jurisdiction":"US","doc_number":"6654792","kind":"B1","date":"2003-11-25","name":"VERMA ROHIT [US], et al"},"lens_id":"166-786-324-186-84X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":17}},{"patent":{"num":18,"document_id":{"jurisdiction":"US","doc_number":"6667957","kind":"B1","date":"2003-12-23","name":"CORSON MATHEW SCOTT [US], et al"},"lens_id":"179-175-203-690-440","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":18}},{"patent":{"num":19,"document_id":{"jurisdiction":"US","doc_number":"6681220","kind":"B1","date":"2004-01-20","name":"KAPLAN MARC A [US], et al"},"lens_id":"013-349-012-798-27X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":19}},{"patent":{"num":20,"document_id":{"jurisdiction":"US","doc_number":"6681326","kind":"B2","date":"2004-01-20","name":"SON YONG HO [US], et al"},"lens_id":"068-517-249-355-990","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":20}},{"patent":{"num":21,"document_id":{"jurisdiction":"US","doc_number":"6772333","kind":"B1","date":"2004-08-03","name":"BRENDEL JUERGEN [US]"},"lens_id":"055-704-496-888-139","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":21}},{"patent":{"num":22,"document_id":{"jurisdiction":"US","doc_number":"6862280","kind":"B1","date":"2005-03-01","name":"BERTAGNA DREW [US]"},"lens_id":"120-664-679-206-112","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":22}},{"patent":{"num":23,"document_id":{"jurisdiction":"US","doc_number":"6901452","kind":"B1","date":"2005-05-31","name":"BERTAGNA DREW [US]"},"lens_id":"141-800-315-476-520","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":23}},{"patent":{"num":24,"document_id":{"jurisdiction":"US","doc_number":"6917985","kind":"B2","date":"2005-07-12","name":"MADRUGA EWERTON L [US], et al"},"lens_id":"031-668-245-623-797","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":24}},{"patent":{"num":25,"document_id":{"jurisdiction":"US","doc_number":"6968393","kind":"B1","date":"2005-11-22","name":"CHEN ENKE [US], et al"},"lens_id":"174-065-730-514-757","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":25}},{"patent":{"num":26,"document_id":{"jurisdiction":"US","doc_number":"6981029","kind":"B1","date":"2005-12-27","name":"MENDITTO LOUIS F [US], et al"},"lens_id":"194-161-849-900-319","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":26}},{"patent":{"num":27,"document_id":{"jurisdiction":"US","doc_number":"7013389","kind":"B1","date":"2006-03-14","name":"SRIVASTAVA SUNIL K [US], et al"},"lens_id":"139-439-638-689-639","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":27}},{"patent":{"num":28,"document_id":{"jurisdiction":"US","doc_number":"7031308","kind":"B2","date":"2006-04-18","name":"GARCIA-LUNA-ACEVES J J [US], et al"},"lens_id":"053-616-116-083-687","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":28}},{"patent":{"num":29,"document_id":{"jurisdiction":"US","doc_number":"7061877","kind":"B1","date":"2006-06-13","name":"GUMMALLA AJAY CHANDRA V [US], et al"},"lens_id":"093-658-134-419-590","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":29}},{"patent":{"num":30,"document_id":{"jurisdiction":"US","doc_number":"7206860","kind":"B2","date":"2007-04-17","name":"MURAKAMI TOSHIHIKO [JP], et al"},"lens_id":"078-840-155-500-109","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":30}},{"patent":{"num":31,"document_id":{"jurisdiction":"US","doc_number":"7257837","kind":"B2","date":"2007-08-14","name":"XU CHEN [US], et al"},"lens_id":"186-527-024-856-265","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":31}},{"patent":{"num":32,"document_id":{"jurisdiction":"US","doc_number":"7287275","kind":"B2","date":"2007-10-23","name":"MOSKOWITZ SCOTT A [US]"},"lens_id":"037-729-272-956-604","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":32}},{"patent":{"num":33,"document_id":{"jurisdiction":"US","doc_number":"7315541","kind":"B1","date":"2008-01-01","name":"HOUSEL BARRON [US], et al"},"lens_id":"008-863-396-797-401","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":33}},{"patent":{"num":34,"document_id":{"jurisdiction":"US","doc_number":"7339929","kind":"B2","date":"2008-03-04","name":"ZELIG DAVID [IL], et al"},"lens_id":"059-645-770-424-109","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":34}},{"patent":{"num":35,"document_id":{"jurisdiction":"US","doc_number":"7350229","kind":"B1","date":"2008-03-25","name":"LANDER VADIM [US]"},"lens_id":"050-645-562-960-903","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":35}},{"patent":{"num":36,"document_id":{"jurisdiction":"US","doc_number":"7382787","kind":"B1","date":"2008-06-03","name":"BARNES PETER M [US], et al"},"lens_id":"045-003-964-415-873","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":36}},{"patent":{"num":37,"document_id":{"jurisdiction":"US","doc_number":"7444251","kind":"B2","date":"2008-10-28","name":"NIKOVSKI DANIEL N [US], et al"},"lens_id":"084-506-063-136-745","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":37}},{"patent":{"num":38,"document_id":{"jurisdiction":"US","doc_number":"7466703","kind":"B1","date":"2008-12-16","name":"ARUNACHALAM RAMAN [US], et al"},"lens_id":"142-779-766-343-922","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":38}},{"patent":{"num":39,"document_id":{"jurisdiction":"US","doc_number":"7472422","kind":"B1","date":"2008-12-30","name":"AGBABIAN PAUL M [US]"},"lens_id":"009-318-251-008-961","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":39}},{"patent":{"num":40,"document_id":{"jurisdiction":"US","doc_number":"7496668","kind":"B2","date":"2009-02-24","name":"HAWKINSON ELLEN B [US], et al"},"lens_id":"025-534-530-128-655","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":40}},{"patent":{"num":41,"document_id":{"jurisdiction":"US","doc_number":"7509425","kind":"B1","date":"2009-03-24","name":"ROSENBERG JONATHAN D [US]"},"lens_id":"140-168-108-875-665","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":41}},{"patent":{"num":42,"document_id":{"jurisdiction":"US","doc_number":"7543064","kind":"B2","date":"2009-06-02","name":"JUNCKER CHRISTOPHE [US], et al"},"lens_id":"064-219-973-166-276","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":42}},{"patent":{"num":43,"document_id":{"jurisdiction":"US","doc_number":"7552233","kind":"B2","date":"2009-06-23","name":"RAJU JYOTI [US], et al"},"lens_id":"094-418-495-924-203","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":43}},{"patent":{"num":44,"document_id":{"jurisdiction":"US","doc_number":"7555563","kind":"B2","date":"2009-06-30","name":"OTT MAXIMILIAN A [US], et al"},"lens_id":"098-714-358-678-685","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":44}},{"patent":{"num":45,"document_id":{"jurisdiction":"US","doc_number":"7567547","kind":"B2","date":"2009-07-28","name":"MOSKO MARC E [US], et al"},"lens_id":"124-619-135-234-847","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":45}},{"patent":{"num":46,"document_id":{"jurisdiction":"US","doc_number":"7580971","kind":"B1","date":"2009-08-25","name":"GOLLAPUDI SREENIVAS [US], et al"},"lens_id":"100-660-161-431-629","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":46}},{"patent":{"num":47,"document_id":{"jurisdiction":"US","doc_number":"7623535","kind":"B2","date":"2009-11-24","name":"GUICHARD JAMES [US], et al"},"lens_id":"069-338-653-485-909","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":47}},{"patent":{"num":48,"document_id":{"jurisdiction":"US","doc_number":"7647507","kind":"B1","date":"2010-01-12","name":"FENG WEISHI [US]"},"lens_id":"074-829-234-099-12X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":48}},{"patent":{"num":49,"document_id":{"jurisdiction":"US","doc_number":"7660324","kind":"B2","date":"2010-02-09","name":"OGUCHI NAOKI [JP], et al"},"lens_id":"119-291-724-162-397","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":49}},{"patent":{"num":50,"document_id":{"jurisdiction":"US","doc_number":"7685290","kind":"B2","date":"2010-03-23","name":"SATAPATI SURESH [US]"},"lens_id":"166-324-641-437-386","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":50}},{"patent":{"num":51,"document_id":{"jurisdiction":"US","doc_number":"7698463","kind":"B2","date":"2010-04-13","name":"OGIER RICHARD G [US], et al"},"lens_id":"064-125-605-857-99X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":51}},{"patent":{"num":52,"document_id":{"jurisdiction":"US","doc_number":"7769887","kind":"B1","date":"2010-08-03","name":"BHATTACHARYYA SUPRATIK [US], et al"},"lens_id":"115-266-675-254-382","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":52}},{"patent":{"num":53,"document_id":{"jurisdiction":"US","doc_number":"7779467","kind":"B2","date":"2010-08-17","name":"CHOI DAESIK [KR], et al"},"lens_id":"177-994-800-777-102","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":53}},{"patent":{"num":54,"document_id":{"jurisdiction":"US","doc_number":"7801177","kind":"B2","date":"2010-09-21","name":"LUSS HANAN [US]"},"lens_id":"009-894-247-390-980","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":54}},{"patent":{"num":55,"document_id":{"jurisdiction":"US","doc_number":"7816441","kind":"B2","date":"2010-10-19","name":"ELIZALDE OIHANA [DE], et al"},"lens_id":"079-857-275-073-524","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":55}},{"patent":{"num":56,"document_id":{"jurisdiction":"US","doc_number":"7831733","kind":"B2","date":"2010-11-09","name":"SULTAN NEVEIN T [CA], et al"},"lens_id":"033-405-788-365-577","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":56}},{"patent":{"num":57,"document_id":{"jurisdiction":"US","doc_number":"7908337","kind":"B2","date":"2011-03-15","name":"GARCIA-LUNA-ACEVES JOSE J [US], et al"},"lens_id":"074-639-414-666-737","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":57}},{"patent":{"num":58,"document_id":{"jurisdiction":"US","doc_number":"7924837","kind":"B1","date":"2011-04-12","name":"SHABTAY LIOR [IL], et al"},"lens_id":"110-136-644-743-514","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":58}},{"patent":{"num":59,"document_id":{"jurisdiction":"US","doc_number":"7953885","kind":"B1","date":"2011-05-31","name":"DEVIREDDY DILEEP KUMAR [US], et al"},"lens_id":"020-335-640-143-991","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":59}},{"patent":{"num":60,"document_id":{"jurisdiction":"US","doc_number":"8000267","kind":"B2","date":"2011-08-16","name":"SOLIS IGNACIO [US], et al"},"lens_id":"082-002-028-323-834","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":60}},{"patent":{"num":61,"document_id":{"jurisdiction":"US","doc_number":"8010691","kind":"B2","date":"2011-08-30","name":"KOLLMANSBERGER KURT [US], et al"},"lens_id":"159-119-507-828-62X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":61}},{"patent":{"num":62,"document_id":{"jurisdiction":"US","doc_number":"8074289","kind":"B1","date":"2011-12-06","name":"CARPENTIER PAUL [BE], et al"},"lens_id":"093-217-142-859-402","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":62}},{"patent":{"num":63,"document_id":{"jurisdiction":"US","doc_number":"8117441","kind":"B2","date":"2012-02-14","name":"KURIEN THEKKTHALACKAL VARUGIS [US], et al"},"lens_id":"008-067-630-532-739","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":63}},{"patent":{"num":64,"document_id":{"jurisdiction":"US","doc_number":"8160069","kind":"B2","date":"2012-04-17","name":"JACOBSON VAN L [US], et al"},"lens_id":"025-189-262-241-779","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":64}},{"patent":{"num":65,"document_id":{"jurisdiction":"US","doc_number":"8204060","kind":"B2","date":"2012-06-19","name":"JACOBSON VAN L [US], et al"},"lens_id":"125-044-764-510-244","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":65}},{"patent":{"num":66,"document_id":{"jurisdiction":"US","doc_number":"8224985","kind":"B2","date":"2012-07-17","name":"TAKEDA YUTAKA [US]"},"lens_id":"057-464-031-453-664","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":66}},{"patent":{"num":67,"document_id":{"jurisdiction":"US","doc_number":"8225057","kind":"B1","date":"2012-07-17","name":"ZHENG LING [US], et al"},"lens_id":"065-151-997-246-13X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":67}},{"patent":{"num":68,"document_id":{"jurisdiction":"US","doc_number":"8271578","kind":"B2","date":"2012-09-18","name":"SHEFFI GUY [IL], et al"},"lens_id":"173-313-225-497-70X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":68}},{"patent":{"num":69,"document_id":{"jurisdiction":"US","doc_number":"8312064","kind":"B1","date":"2012-11-13","name":"GAUVIN WILLIAM J [US]"},"lens_id":"142-846-643-314-061","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":69}},{"patent":{"num":70,"document_id":{"jurisdiction":"US","doc_number":"8386622","kind":"B2","date":"2013-02-26","name":"JACOBSON VAN L [US]"},"lens_id":"073-006-548-118-22X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":70}},{"patent":{"num":71,"document_id":{"jurisdiction":"US","doc_number":"8467297","kind":"B2","date":"2013-06-18","name":"LIU HANG [US], et al"},"lens_id":"047-384-408-726-456","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":71}},{"patent":{"num":72,"document_id":{"jurisdiction":"US","doc_number":"8553562","kind":"B2","date":"2013-10-08","name":"ALLAN DAVID IAN [CA], et al"},"lens_id":"071-996-516-940-14X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":72}},{"patent":{"num":73,"document_id":{"jurisdiction":"US","doc_number":"8572214","kind":"B2","date":"2013-10-29","name":"GARCIA-LUNA-ACEVES JOSE J [US]"},"lens_id":"156-815-997-336-31X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":73}},{"patent":{"num":74,"document_id":{"jurisdiction":"US","doc_number":"8654649","kind":"B2","date":"2014-02-18","name":"VASSEUR JEAN-PHILIPPE [FR], et al"},"lens_id":"011-074-627-515-19X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":74}},{"patent":{"num":75,"document_id":{"jurisdiction":"US","doc_number":"8665757","kind":"B2","date":"2014-03-04","name":"KLING LARS-OERJAN [SE], et al"},"lens_id":"069-969-122-407-830","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":75}},{"patent":{"num":76,"document_id":{"jurisdiction":"US","doc_number":"8667172","kind":"B2","date":"2014-03-04","name":"RAVINDRAN RAVISHANKAR [US], et al"},"lens_id":"100-459-416-430-659","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":76}},{"patent":{"num":77,"document_id":{"jurisdiction":"US","doc_number":"8688619","kind":"B1","date":"2014-04-01","name":"EZICK JAMES [US], et al"},"lens_id":"190-691-022-164-248","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":77}},{"patent":{"num":78,"document_id":{"jurisdiction":"US","doc_number":"8699350","kind":"B1","date":"2014-04-15","name":"KUMAR ALOK [US], et al"},"lens_id":"152-132-212-398-804","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":78}},{"patent":{"num":79,"document_id":{"jurisdiction":"US","doc_number":"8750820","kind":"B2","date":"2014-06-10","name":"ALLAN DAVID [CA], et al"},"lens_id":"041-168-967-923-478","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":79}},{"patent":{"num":80,"document_id":{"jurisdiction":"US","doc_number":"8761022","kind":"B2","date":"2014-06-24","name":"CHIABAUT JEROME [CA]"},"lens_id":"057-900-767-393-869","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":80}},{"patent":{"num":81,"document_id":{"jurisdiction":"US","doc_number":"8762477","kind":"B2","date":"2014-06-24","name":"XIE HAIYONG [US], et al"},"lens_id":"076-923-551-023-026","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":81}},{"patent":{"num":82,"document_id":{"jurisdiction":"US","doc_number":"8762570","kind":"B2","date":"2014-06-24","name":"QIAN HAIYANG [US], et al"},"lens_id":"046-327-368-956-005","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":82}},{"patent":{"num":83,"document_id":{"jurisdiction":"US","doc_number":"8762707","kind":"B2","date":"2014-06-24","name":"KILLIAN THOMAS J [US], et al"},"lens_id":"024-838-624-585-503","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":83}},{"patent":{"num":84,"document_id":{"jurisdiction":"US","doc_number":"8767627","kind":"B2","date":"2014-07-01","name":"EZURE YUICHIRO [JP], et al"},"lens_id":"178-189-630-571-404","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":84}},{"patent":{"num":85,"document_id":{"jurisdiction":"US","doc_number":"8817594","kind":"B2","date":"2014-08-26","name":"GERO BALÁZS PETER [HU], et al"},"lens_id":"045-482-441-486-542","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":85}},{"patent":{"num":86,"document_id":{"jurisdiction":"US","doc_number":"8826381","kind":"B2","date":"2014-09-02","name":"KIM DAE YOUB [KR]"},"lens_id":"149-906-340-479-05X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":86}},{"patent":{"num":87,"document_id":{"jurisdiction":"US","doc_number":"8832302","kind":"B1","date":"2014-09-09","name":"BRADFORD RICHARD M [US], et al"},"lens_id":"066-471-348-224-204","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":87}},{"patent":{"num":88,"document_id":{"jurisdiction":"US","doc_number":"8862774","kind":"B2","date":"2014-10-14","name":"VASSEUR JEAN-PHILIPPE [FR], et al"},"lens_id":"125-232-521-596-15X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":88}},{"patent":{"num":89,"document_id":{"jurisdiction":"US","doc_number":"8937865","kind":"B1","date":"2015-01-20","name":"KUMAR NITIN [US], et al"},"lens_id":"193-755-558-506-938","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":89}},{"patent":{"num":90,"document_id":{"jurisdiction":"US","doc_number":"9071498","kind":"B2","date":"2015-06-30","name":"BESER NURETTIN BURCAK [US]"},"lens_id":"105-007-043-138-106","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":90}},{"patent":{"num":91,"document_id":{"jurisdiction":"US","doc_number":"2002010795","kind":"A1","date":"2002-01-24","name":"BROWN CHARLES P [US]"},"lens_id":"128-201-738-058-464","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":91}},{"patent":{"num":92,"document_id":{"jurisdiction":"US","doc_number":"2002048269","kind":"A1","date":"2002-04-25","name":"HONG JACK L [US], et al"},"lens_id":"042-254-418-618-259","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":92}},{"patent":{"num":93,"document_id":{"jurisdiction":"US","doc_number":"2002054593","kind":"A1","date":"2002-05-09","name":"MOROHASHI TOMOO [JP], et al"},"lens_id":"026-236-903-324-255","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":93}},{"patent":{"num":94,"document_id":{"jurisdiction":"US","doc_number":"2002077988","kind":"A1","date":"2002-06-20","name":"SASAKI GARY D [US], et al"},"lens_id":"064-269-444-353-717","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":94}},{"patent":{"num":95,"document_id":{"jurisdiction":"US","doc_number":"2002078066","kind":"A1","date":"2002-06-20","name":"ROBINSON DAVID [US], et al"},"lens_id":"150-066-922-418-771","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":95}},{"patent":{"num":96,"document_id":{"jurisdiction":"US","doc_number":"2002138551","kind":"A1","date":"2002-09-26","name":"ERICKSON RODGER D [US]"},"lens_id":"072-377-800-787-916","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":96}},{"patent":{"num":97,"document_id":{"jurisdiction":"US","doc_number":"2002176404","kind":"A1","date":"2002-11-28","name":"GIRARD GREGORY D [US]"},"lens_id":"099-954-832-551-34X","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":97}},{"patent":{"num":98,"document_id":{"jurisdiction":"US","doc_number":"2002188605","kind":"A1","date":"2002-12-12","name":"ADYA ATUL [US], et al"},"lens_id":"052-756-825-364-375","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":98}},{"patent":{"num":99,"document_id":{"jurisdiction":"US","doc_number":"2002199014","kind":"A1","date":"2002-12-26","name":"YANG CHU-SHING [TW], et al"},"lens_id":"088-881-557-074-660","category":[],"us_category":[],"cited_phase":"APP","rel_claims":[],"sequence":99}},{"npl":{"num":1,"text":"Jacobson, Van et al., \"Content-Centric Networking, Whitepaper Describing Future Assurable Global Networks\", Palo Alto Research Center, Inc., Jan. 30, 2007, pp. 1-9.","npl_type":"a","external_id":[],"lens_id":[],"sequence":100,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":2,"text":"Koponen, Teemu et al., \"A Data-Oriented (and Beyond) Network Architecture\", SIGCOMM '07, Aug. 27-31, 2007, Kyoto, Japan, XP-002579021, p. 181-192.","npl_type":"a","xp_number":"000257902","external_id":[],"lens_id":[],"sequence":101,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":3,"text":"Fall, K. et al., \"DTN: an architectural retrospective\", Selected areas in communications, IEEE Journal on, vol. 28, No. 5, Jun. 1, 2008, pp. 828-835.","npl_type":"a","external_id":[],"lens_id":[],"sequence":102,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":4,"text":"Gritter, M. et al., 'An Architecture for content routing support in the Internet', Proceedings of 3rd Usenix Symposium on Internet Technologies and Systems, 2001, pp. 37-48.","npl_type":"a","external_id":[],"lens_id":[],"sequence":103,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":5,"text":"\"CCNx,\" http://ccnx.org/. downloaded Mar. 11, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":104,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":6,"text":"\"Content Delivery Network\", Wikipedia, Dec. 10, 2011, http://en.wikipedia.org/w/index.php?title=Content-delivery-network&oldid=465077460.","npl_type":"a","external_id":[],"lens_id":[],"sequence":105,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":7,"text":"\"Digital Signature\" archived on Aug. 31, 2009 at http://web.archive.org/web/20090831170721/http://en.wikipedia.org/wiki/Digital-signature.","npl_type":"a","external_id":[],"lens_id":[],"sequence":106,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":8,"text":"\"Introducing JSON,\" http://www.json.org/. downloaded Mar. 11, 2015.","npl_type":"a","external_id":["10.1007/978-1-4842-0202-9_4"],"record_lens_id":"178-676-935-402-394","lens_id":["178-676-935-402-394","130-835-951-033-975"],"sequence":107,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":9,"text":"\"Microsoft PlayReady,\" http://www.microsoft.com/playready/.downloaded Mar. 11, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":108,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":10,"text":"\"Pursuing a pub/sub internet (PURSUIT),\" http://www.fp7-pursuit.ew/PursuitWeb/. downloaded Mar. 11, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":109,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":11,"text":"\"The FP7 4WARD project,\" http://www.4ward-project.eu/. downloaded Mar. 11, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":110,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":12,"text":"A. Broder and A. Karlin, \"Multilevel Adaptive Hashing\", Jan. 1990, pp. 43-53.","npl_type":"a","external_id":[],"lens_id":[],"sequence":111,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":13,"text":"Detti, Andrea, et al. \"CONET: a content centric inter-networking architecture.\" Proceedings of the ACM SIGCOMM workshop on Information-centric networking. ACM, 2011.","npl_type":"a","external_id":["10.1145/2018584.2018598"],"record_lens_id":"122-928-712-573-109","lens_id":["136-925-137-289-877","122-928-712-573-109"],"sequence":112,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":14,"text":"A. Wolman, M. Voelker, N. Sharma N. Cardwell, A. Karlin, and H.M. Levy, \"On the scale and performance of cooperative web proxy caching,\" ACM SIGHOPS Operating Systems Review, vol. 33, No. 5, pp. 16-31, Dec. 1999.","npl_type":"a","external_id":["10.1145/319344.319153"],"record_lens_id":"180-686-673-379-251","lens_id":["180-686-673-379-251","011-321-226-053-794"],"sequence":113,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":15,"text":"Afanasyev, Alexander, et al. \"Interest flooding attack and countermeasures in Named Data Networking.\" IFIP Networking Conference, 2013. IEEE, 2013.","npl_type":"a","external_id":[],"lens_id":[],"sequence":114,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":16,"text":"Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic, and Fabian E. Bustamante. Drafting Behind Akamai: Inferring Network Conditions Based on CDN Redirections. IEEE/ACM Transactions on Networking {Feb. 2009).","npl_type":"a","external_id":["10.1109/tnet.2009.2022157"],"record_lens_id":"110-370-771-905-892","lens_id":["171-710-898-678-19X","110-370-771-905-892"],"sequence":115,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":17,"text":"B. Ahlgren et al., 'A Survey of Information-centric Networking' IEEE Commun. Magazine, Jul. 2012, pp. 26-36.","npl_type":"a","external_id":["10.1109/mcom.2012.6231276"],"record_lens_id":"051-039-252-477-963","lens_id":["166-048-157-935-30X","051-039-252-477-963"],"sequence":116,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":18,"text":"Bari, MdFaizul, et al. 'A survey of naming and routing in information-centric networks.' Communications Magazine, IEEE 50.12 (2012): 44-53.","npl_type":"a","external_id":["10.1109/mcom.2012.6384450"],"record_lens_id":"044-915-711-360-638","lens_id":["116-574-609-228-507","044-915-711-360-638"],"sequence":117,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":19,"text":"Baugher, Mark et al., \"Self-Verifying Names for Read-Only Named Data\", 2012 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Mar. 2012, pp. 274-279.","npl_type":"a","external_id":["10.1109/infcomw.2012.6193505"],"record_lens_id":"084-846-087-417-016","lens_id":["178-151-146-640-339","084-846-087-417-016"],"sequence":118,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":20,"text":"Brambley, Michael, A novel, low-cost, reduced-sensor approach for providing smart remote monitoring and diagnostics for packaged air conditioners and heat pumps. Pacific Northwest National Laboratory, 2009.","npl_type":"a","external_id":["10.2172/967227"],"record_lens_id":"042-902-597-579-701","lens_id":["126-465-844-776-079","042-902-597-579-701"],"sequence":119,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":21,"text":"C. Gentry and A. Silverberg. Hierarchical ID-Based Cryptography. Advances in Cryptology-ASIACRYPT 2002. Springer Berlin Heidelberg (2002).","npl_type":"a","external_id":["10.1007/3-540-36178-2_34"],"record_lens_id":"181-813-960-796-336","lens_id":["190-666-483-198-745","181-813-960-796-336"],"sequence":120,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":22,"text":"C.A. Wood and E. Uzun, \"Flexible end-to-end content security in CCN,\" in Proc. IEEE CCNC 2014, Las Vegas, CA, USA, Jan. 2014.","npl_type":"a","external_id":["10.1109/ccnc.2014.6994401"],"record_lens_id":"058-490-696-352-898","lens_id":["058-490-696-352-898","148-319-173-746-591"],"sequence":121,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":23,"text":"Carzaniga, Antonio, Matthew J. Rutherford, and Alexander L. Wolf. 'A routing scheme for content-based networking.' INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. vol. 2. IEEE, 2004.","npl_type":"a","external_id":["10.1109/infcom.2004.1356979"],"record_lens_id":"038-867-909-322-564","lens_id":["053-733-903-700-958","038-867-909-322-564"],"sequence":122,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":24,"text":"Cho, Jin-Hee, Ananthram Swami, and Ray Chen. \"A survey on trust management for mobile ad hoc networks.\" Communications Surveys & Tutorials, IEEE 13.4 (2011): 562-583.","npl_type":"a","external_id":["10.1109/surv.2011.092110.00088"],"record_lens_id":"070-338-792-142-143","lens_id":["174-048-086-887-362","070-338-792-142-143"],"sequence":123,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":25,"text":"Compagno, Alberto, et al. \"Poseidon: Mitigating interest flooding DDoS attacks in named data networking.\" Local Computer Networks (LCN), 2013 IEEE 38th Conference on. IEEE, 2013.","npl_type":"a","external_id":["10.1109/lcn.2013.6761300"],"record_lens_id":"016-813-310-732-776","lens_id":["047-695-983-514-132","068-744-459-492-846","016-813-310-732-776"],"sequence":124,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":26,"text":"Conner, William, et al. \"A trust management framework for service-oriented environments.\" Proceedings of the 18th international conference on World wide web. ACM, 2009.","npl_type":"a","external_id":[],"lens_id":[],"sequence":125,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":27,"text":"Content Centric Networking Project (CCN) [online], http://ccnx.org/releases/latest/doc/technical/, Downloaded Mar. 9, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":126,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":28,"text":"Content Mediator Architecture for Content-aware Networks (COMET) Project [online], http://www.comet-project.org/, Downloaded Mar. 9, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":127,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":29,"text":"D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. Advances in Cryptology-CRYPTO 2001, vol. 2139, Springer Berlin Heidelberg (2001).","npl_type":"a","external_id":["10.1007/3-540-44647-8_13"],"record_lens_id":"058-131-648-894-313","lens_id":["112-852-247-565-734","058-131-648-894-313"],"sequence":128,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":30,"text":"D.K. Smetters, P. Golle, and J.D. Thornton, \"CCNx access control specifications,\" PARC, Tech. Rep., Jul. 2010.","npl_type":"a","external_id":[],"lens_id":[],"sequence":129,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":31,"text":"Dabirmoghaddam, Ali, Maziar Mirzazad Barijough, and J. J. Garcia-Luna-Aceves. 'Understanding optimal caching and opportunistic caching at the edge of information-centric networks,' Proceedings of the 1st international conference on Information-centric networking. ACM, 2014.","npl_type":"a","external_id":["10.1145/2660129.2660143"],"record_lens_id":"119-973-520-653-926","lens_id":["155-960-417-942-124","119-973-520-653-926"],"sequence":130,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":32,"text":"Detti et al., \"Supporting the Web with an information centric network that routes by name\", Aug. 2012, Computer Networks 56, pp. 3705-3702.","npl_type":"a","external_id":["10.1016/j.comnet.2012.08.006"],"record_lens_id":"054-381-511-370-742","lens_id":["057-544-631-914-516","054-381-511-370-742"],"sequence":131,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":33,"text":"Dijkstra, Edsger W., and Carel S. Scholten. 'Termination detection for diffusing computations.' Information Processing Letters 11.1 (1980): 1-4.","npl_type":"a","external_id":["10.1016/0020-0190(80)90021-6"],"record_lens_id":"058-541-033-146-433","lens_id":["151-424-726-808-557","058-541-033-146-433"],"sequence":132,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":34,"text":"Dijkstra, Edsger W., Wim HJ Feijen, and A-J M. Van Gasteren. \"Derivation of a termination detection algorithm for distributed computations.\" Control Flow and Data Flow: concepts of distributed programming. Springer Berlin Heidelberg, 1986. 507-512.","npl_type":"a","external_id":["10.1007/978-3-642-82921-5_13"],"record_lens_id":"078-107-768-149-743","lens_id":["081-911-161-129-004","078-107-768-149-743"],"sequence":133,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":35,"text":"E. Rescorla and N. Modadugu, \"Datagram transport layer security,\" IETF RFC 4347, Apr. 2006.","npl_type":"a","external_id":["10.17487/rfc4347"],"record_lens_id":"028-540-408-685-263","lens_id":["028-540-408-685-263"],"sequence":134,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":36,"text":"E.W. Dijkstra, W. Feijen, and A.J.M. Van Gasteren, \"Derivation of a Termination Detection Algorithm for Distributed Computations,\" Information Processing Letter, vol. 16, No. 5, 1983.","npl_type":"a","external_id":["10.1016/0020-0190(83)90092-3"],"record_lens_id":"046-311-069-923-768","lens_id":["072-493-214-899-470","046-311-069-923-768"],"sequence":135,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":37,"text":"Fayazbakhsh, S. K., Lin, Y., Tootoonchian, A., Ghodsi, A., Koponen, T., Maggs, B., & Shenker, S. {Aug. 2013). Less pain, most of the gain: Incrementally deployable ICN. In ACM SIGCOMM Computer Communication Review (vol. 43, No. 4, pp. 147-158). ACM.","npl_type":"a","external_id":["10.1145/2534169.2486023"],"record_lens_id":"000-984-288-968-066","lens_id":["109-646-557-521-109","000-984-288-968-066"],"sequence":136,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":38,"text":"G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved Proxy Reencryption Schemes with Applications to Secure Distributed Storage. In the 12th Annual Network and Distributed System Security Sympo.","npl_type":"a","external_id":["10.1145/1127345.1127346"],"record_lens_id":"068-460-901-881-226","lens_id":["157-142-682-514-065","068-460-901-881-226"],"sequence":137,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":39,"text":"G. Tyson, S. Kaune, S. Miles, Y. El-Khatib, A. Mauthe, and A. Taweel, \"A trace-driven analysis of caching in content-centric networks,\" in Proc. IEEE ICCCN 2012, Munich, Germany, Jul.-Aug. 2012, pp. 1-7.","npl_type":"a","external_id":["10.1109/icccn.2012.6289181"],"record_lens_id":"078-026-027-082-620","lens_id":["121-631-297-808-893","078-026-027-082-620"],"sequence":138,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":40,"text":"G. Wang, Q. Liu, and J. Wu, \"Hierarchical attribute-based encryption for fine-grained access control in cloud storage services,\" in Proc. ACM CCS 2010, Chicago, IL, USA, Oct. 2010, pp. 735-737.","npl_type":"a","external_id":["10.1145/1866307.1866414"],"record_lens_id":"036-593-487-379-465","lens_id":["152-629-450-371-125","036-593-487-379-465"],"sequence":139,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":41,"text":"G. Xylomenos et al., \"A Survey of Information-centric Networking Research,\" IEEE Communication Surveys and Tutorials, Jul. 2013.","npl_type":"a","external_id":[],"lens_id":[],"sequence":140,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":42,"text":"Garcia, Humberto E., Wen-Chiao Lin, and Semyon M. Meerkov. \"A resilient condition assessment monitoring system.\" Resilient Control Systems (ISRCS), 2012 5th International Symposium on. IEEE, 2012.","npl_type":"a","external_id":["10.1109/isrcs.2012.6309301"],"record_lens_id":"070-597-122-916-265","lens_id":["113-839-694-710-905","070-597-122-916-265"],"sequence":141,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":43,"text":"Garcia-Luna-Aceves, Jose J. 'A unified approach to loop-free routing using distance vectors or link states.' ACM SIGCOMM Computer Communication Review. vol. 19. No. 4. ACM, 1989.","npl_type":"a","external_id":["10.1145/75247.75268"],"record_lens_id":"018-362-712-910-611","lens_id":["018-362-712-910-611","139-728-961-721-177"],"sequence":142,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":44,"text":"Garcia-Luna-Aceves, Jose J. 'Name-Based Content Routing in Information Centric Networks Using Distance Information' Proc ACM ICN 2014, Sep. 2014.","npl_type":"a","external_id":["10.1145/2660129.2660141"],"record_lens_id":"053-182-047-382-986","lens_id":["164-757-332-970-583","053-182-047-382-986"],"sequence":143,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":45,"text":"Ghali, Cesar, GeneTsudik, and Ersin Uzun. \"Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking.\" Proceedings of NDSS Workshop on Security of Emerging Networking Technologies (SENT). 2014.","npl_type":"a","external_id":["10.14722/sent.2014.23014"],"record_lens_id":"157-033-586-909-398","lens_id":["178-816-875-697-54X","157-033-586-909-398"],"sequence":144,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":46,"text":"Ghodsi, Ali, et al. \"Information-centric networking: seeing the forest for the trees.\" Proceedings of the 10th ACM Workshop on Hot Topics in Networks. ACM, 2011.","npl_type":"a","external_id":["10.1145/2070562.2070563"],"record_lens_id":"045-583-512-849-850","lens_id":["138-669-445-100-442","045-583-512-849-850"],"sequence":145,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":47,"text":"Ghodsi, Ali, et al. \"Naming in content-oriented architectures.\" Proceedings of the ACM SIGCOMM workshop on Information-centric networking. ACM, 2011.","npl_type":"a","external_id":["10.1145/2018584.2018586"],"record_lens_id":"136-191-833-044-566","lens_id":["154-969-058-542-050","136-191-833-044-566"],"sequence":146,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":48,"text":"Gupta, Anjali, Barbara Liskov, and Rodrigo Rodrigues. \"Efficient Routing for Peer-to-Peer Overlays.\" NSDI. vol. 4. 2004.","npl_type":"a","external_id":[],"lens_id":[],"sequence":147,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":49,"text":"Heckerman, David, John S. Breese, and Koos Rommelse. \"Decision-Theoretic Troubleshooting.\" Communications of the ACM. 1995.","npl_type":"a","external_id":["10.1145/203330.203341"],"record_lens_id":"044-644-406-430-327","lens_id":["121-859-862-683-992","044-644-406-430-327"],"sequence":148,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":50,"text":"Heinemeier, Kristin, et al. \"Uncertainties in Achieving Energy Savings from HVAC Maintenance Measures in the Field.\" ASHRAE Transactions 118.Part 2 {2012).","npl_type":"a","external_id":[],"lens_id":[],"sequence":149,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":51,"text":"Herlich, Matthias et al., \"Optimizing Energy Efficiency for Bulk Transfer Networks\", Apr. 13, 2010, pp. 1-3, retrieved for the Internet: URL:http://www.cs.uni-paderborn.de/fileadmin/informationik/ag-karl/publications/miscellaneous/optimizing.pdf (retrieved on Mar. 9, 2012).","npl_type":"a","external_id":[],"lens_id":[],"sequence":150,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":52,"text":"Hoque et al., 'NLSR: Named-data Link State Routing Protocol', Aug. 12, 2013, ICN 2013, pp. 15-20.","npl_type":"a","external_id":[],"lens_id":[],"sequence":151,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":53,"text":"I. Psaras, R.G. Clegg, R. Landa, W.K. Chai, and G. Pavlou, \"Modelling and evaluation of CCN-caching trees,\" in Proc. IFIP Networking 2011, Valencia, Spain, May 2011, pp. 78-91.","npl_type":"a","external_id":["10.1007/978-3-642-20757-0_7"],"record_lens_id":"029-677-641-410-454","lens_id":["125-829-570-562-986","029-677-641-410-454"],"sequence":152,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":54,"text":"Intanagonwiwat, Chalermek, Ramesh Govindan, and Deborah Estrin. 'Directed diffusion: a scalable and robust communication paradigm for sensor networks.' Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000.","npl_type":"a","external_id":["10.1145/345910.345920"],"record_lens_id":"000-769-557-779-73X","lens_id":["109-261-606-034-722","000-769-557-779-73X"],"sequence":153,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":55,"text":"J. Aumasson and D. Bernstein, \"SipHash: a fast short-input PRF\", Sep. 18, 2012.","npl_type":"a","external_id":["10.1007/978-3-642-34931-7_28"],"record_lens_id":"110-572-605-432-976","lens_id":["181-428-633-053-163","110-572-605-432-976"],"sequence":154,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":56,"text":"J. Bethencourt, A, Sahai, and B. Waters, 'Ciphertext-policy attribute-based encryption,' in Proc. IEEE Security & Privacy 2007, Berkeley, CA, USA, May 2007, pp. 321-334.","npl_type":"a","external_id":["10.1109/sp.2007.11"],"record_lens_id":"124-256-581-046-82X","lens_id":["199-190-281-226-169","124-256-581-046-82X"],"sequence":155,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":57,"text":"J. Hur, \"Improving security and efficiency in attribute-based data sharing,\" IEEE Trans. Knowledge Data Eng., vol. 25, No. 10, pp. 2271-2282, Oct. 2013.","npl_type":"a","external_id":["10.1109/tkde.2011.78"],"record_lens_id":"077-313-754-535-45X","lens_id":["151-079-619-394-614","077-313-754-535-45X"],"sequence":156,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":58,"text":"J. Shao and Z. Cao. CCA-Secure Proxy Re-Encryption without Pairings. Public Key Cryptography. Springer Lecture Notes in Computer Sciencevol. 5443 (2009).","npl_type":"a","external_id":["10.1007/978-3-642-00468-1_20"],"record_lens_id":"027-580-997-340-81X","lens_id":["161-225-092-061-383","027-580-997-340-81X"],"sequence":157,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":59,"text":"V. Jacobson et al., 'Networking Named Content,' Proc. IEEE CoNEXT '09, Dec. 2009.","npl_type":"a","external_id":["10.1145/1658939.1658941"],"record_lens_id":"109-583-003-752-321","lens_id":["121-982-468-528-066","109-583-003-752-321"],"sequence":158,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":60,"text":"Jacobson, Van et al. 'VoCCN: Voice Over Content-Centric Networks.' Dec. 1, 2009. ACM ReArch'09.","npl_type":"a","external_id":["10.1145/1658978.1658980"],"record_lens_id":"174-821-493-294-789","lens_id":["199-001-017-584-957","174-821-493-294-789"],"sequence":159,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":61,"text":"Jacobson et al., \"Custodian-Based Information Sharing,\" Jul. 2012, IEEE Communications Magazine: vol. 50 Issue 7 (p. 3843).","npl_type":"a","external_id":["10.1109/mcom.2012.6231277"],"record_lens_id":"152-335-086-010-96X","lens_id":["172-599-414-678-083","152-335-086-010-96X"],"sequence":160,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":62,"text":"Ji, Kun, et al. \"Prognostics enabled resilient control for model-based building automation systems.\" Proceedings of the 12th Conference of International Building Performance Simulation Association. 2011.","npl_type":"a","external_id":[],"lens_id":[],"sequence":161,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":63,"text":"K. Liang, L. Fang, W. Susilo, and D.S. Wong, \"A Ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security,\" in Proc. INCoS 2013, Xian, China, Sep. 2013, pp. 552-559.","npl_type":"a","external_id":["10.1109/incos.2013.103"],"record_lens_id":"000-530-705-873-564","lens_id":["095-071-035-019-41X","000-530-705-873-564"],"sequence":162,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":64,"text":"Katipamula, Srinivas, and Michael R. Brambley. \"Review article: methods for fault detection, diagnostics, and prognostics for building systemsa review, Part I.\" HVAC&R Research 11.1 (2005): 3-25.","npl_type":"a","external_id":["10.1080/10789669.2005.10391123"],"record_lens_id":"088-070-139-486-911","lens_id":["143-521-033-398-473","088-070-139-486-911"],"sequence":163,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":65,"text":"Katipamula, Srinivas, and Michael R. Brambley. \"Review article: methods for fault detection, diagnostics, and prognostics for building systemsa review, Part II.\" HVAC&R Research 11.2 (2005): 169-187.","npl_type":"a","external_id":["10.1080/10789669.2005.10391133"],"record_lens_id":"002-911-494-347-880","lens_id":["002-911-494-347-880","069-608-850-587-629"],"sequence":164,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":66,"text":"L. Wang et al., 'OSPFN: An OSPF Based Routing Protocol for Named Data Networking,' Technical Report NDN-0003, 2012.","npl_type":"a","external_id":[],"lens_id":[],"sequence":165,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":67,"text":"L. Zhou, V. Varadharajan, and M. Hitchens, \"Achieving secure role-based access control on encrypted data in cloud storage,\" IEEE Trans. Inf. Forensics Security, vol. 8, No. 12, pp. 1947-1960, Dec. 2013.","npl_type":"a","external_id":["10.1109/tifs.2013.2286456"],"record_lens_id":"030-016-783-671-200","lens_id":["107-558-893-897-09X","030-016-783-671-200"],"sequence":166,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":68,"text":"Li, Wenjia, Anupam Joshi, and Tim Finin. \"Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach.\" Mobile Data Management (MDM), 2010 Eleventh International Conference on. IEEE, 2010.","npl_type":"a","external_id":["10.1109/mdm.2010.57"],"record_lens_id":"021-458-736-907-139","lens_id":["165-197-557-464-095","021-458-736-907-139"],"sequence":167,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":69,"text":"Lopez, Javier, et al. \"Trust management systems for wireless sensor networks: Best practices.\" Computer Communications 33.9 (2010): 1086-1093.","npl_type":"a","external_id":["10.1016/j.comcom.2010.02.006"],"record_lens_id":"056-855-574-759-207","lens_id":["105-179-422-665-919","056-855-574-759-207"],"sequence":168,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":70,"text":"M. Blaze, G. Bleumer, and M. Strauss, 'Divertible protocols and atomic prosy cryptography,' in Proc. EUROCRYPT 1998, Espoo, Finland, May-Jun. 1998, pp. 127-144.","npl_type":"a","external_id":["10.1007/bfb0054122"],"record_lens_id":"035-786-070-311-937","lens_id":["168-078-014-310-29X","035-786-070-311-937"],"sequence":169,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":71,"text":"M. Green and G. Ateniese, \"Identity-based proxy re-encryption,\" in Proc. ACNS 2007, Zhuhai, China, Jun. 2007, pp. 288-306.","npl_type":"a","external_id":["10.1007/978-3-540-72738-5_19"],"record_lens_id":"053-300-135-156-035","lens_id":["128-753-894-132-473","053-300-135-156-035"],"sequence":170,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":72,"text":"M. Ion, J. Zhang, and E.M. Schooler, \"Toward content-centric privacy in ICN: Attribute-based encryption and routing,\" in Proc. ACM SIGCOMM ICN 2013, Hong Kong, China, Aug. 2013, pp. 39-40.","npl_type":"a","external_id":["10.1145/2491224.2491237"],"record_lens_id":"183-723-466-782-83X","lens_id":["183-723-466-782-83X","183-319-742-659-690"],"sequence":171,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":73,"text":"M. Naor and B. Pinkas \"Efficient trace and revoke schemes,\" in Proc. FC 2000, Anguilla, British West Indies, Feb. 2000, pp. 1-20.","npl_type":"a","external_id":[],"lens_id":[],"sequence":172,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":74,"text":"M. Nystrom, S. Parkinson, A. Rusch, and M. Scott, \"PKCS#12: Personal information exchange syntax v. 1.1,\" IETF RFC 7292, K. Moriarty, Ed., Jul. 2014.","npl_type":"a","external_id":["10.17487/rfc7292"],"record_lens_id":"199-923-749-173-847","lens_id":["199-923-749-173-847"],"sequence":173,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":75,"text":"M. Parsa and J.J. Garcia-Luna-Aceves, \"A Protocol for Scalable Loop-free Multicast Routing.\" IEEE JSAC, Apr. 1997.","npl_type":"a","external_id":["10.1109/49.564131"],"record_lens_id":"124-779-961-572-795","lens_id":["138-638-373-095-186","124-779-961-572-795"],"sequence":174,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":76,"text":"M. Walfish, H. Balakrishnan, and S. Shenker, \"Untangling the web from DNS,\" in Proc. USENIX NSDI 2004, Oct. 2010, pp. 735-737.","npl_type":"a","external_id":[],"lens_id":[],"sequence":175,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":77,"text":"Mahadevan, Priya, et al. \"Orbis: rescaling degree correlations to generate annotated internet topologies.\" ACM SIGCOMM Computer Communication Review. vol. 37. No. 4. ACM, 2007.","npl_type":"a","external_id":["10.1145/1282427.1282417"],"record_lens_id":"158-642-931-386-533","lens_id":["158-642-931-386-533","027-928-060-928-205"],"sequence":176,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":78,"text":"Mahadevan, Priya, et al. \"Systematic topology analysis and generation using degree correlations.\" ACM SIGCOMM Computer Communication Review. vol. 36. No. 4. ACM, 2006.","npl_type":"a","external_id":["10.1145/1151659.1159930"],"record_lens_id":"108-972-615-995-159","lens_id":["164-647-588-603-771","123-964-937-498-861","108-972-615-995-159"],"sequence":177,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":79,"text":"Matocha, Jeff, and Tracy Camp. 'A taxonomy of distributed termination detection algorithms.' Journal of Systems and Software 43.3 (1998): 207-221.","npl_type":"a","external_id":["10.1016/s0164-1212(98)10034-1"],"record_lens_id":"015-119-052-360-351","lens_id":["051-985-945-884-730","015-119-052-360-351"],"sequence":178,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":80,"text":"Matteo Varvello et al., \"Caesar: A Content Router for High Speed Forwarding\", ICN 2012, Second Edition on Information-Centric Networking, New York, Aug. 2012.","npl_type":"a","external_id":["10.1145/2342488.2342505"],"record_lens_id":"001-496-096-742-306","lens_id":["118-851-058-496-550","001-496-096-742-306"],"sequence":179,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":81,"text":"McWilliams, Jennifer A., and Iain S. Walker. \"Home Energy Article: A Systems Approach to Retrofitting Residential HVAC Systems.\" Lawrence Berkeley National Laboratory (2005).","npl_type":"a","external_id":[],"lens_id":[],"sequence":180,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":82,"text":"Merindol et al., \"An efficient algorithm to enable path diversity in link state routing networks\", Jan. 10, Computer Networks 55 (2011), pp. 1132-1140.","npl_type":"a","external_id":["10.1016/j.comnet.2010.11.005"],"record_lens_id":"010-668-664-764-998","lens_id":["193-681-669-599-541","010-668-664-764-998"],"sequence":181,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":83,"text":"Mobility First Project [online], http://mobilityfirst.winlab.rutgers.edu/, Downloaded Mar. 9, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":182,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":84,"text":"Narasimhan, Sriram, and Lee Brownston. \"HyDE-A General Framework for Stochastic and Hybrid Modelbased Diagnosis.\" Proc. DX 7 (2007): 162-169.","npl_type":"a","external_id":[],"lens_id":[],"sequence":183,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":85,"text":"NDN Project [online], http://www.named-data.net/, Downloaded Mar. 9, 2015.","npl_type":"a","external_id":[],"lens_id":[],"sequence":184,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":86,"text":"Omar, Mawloud, Yacine Challal, and Abdelmadjid Bouabdallah. \"Certification-based trust models in mobile ad hoc networks: A survey and taxonomy.\" Journal of Network and Computer Applications 35.1 (2012): 268-286.","npl_type":"a","external_id":["10.1016/j.jnca.2011.08.008"],"record_lens_id":"055-208-263-589-397","lens_id":["169-646-883-774-95X","055-208-263-589-397"],"sequence":185,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":87,"text":"P. Mahadevan, E.Uzun, S. Sevilla, and J. Garcia-Luna-Aceves, \"CCN-krs: A key resolution service for ccn,\" in Proceedings of the 1st International Conference on Information-centric Networking, Ser. INC 14 New York, NY, USA: ACM, 2014, pp. 97-106. [Online]. Available: http://doi.acm.org/10.1145/2660129.2660154.","npl_type":"a","external_id":["10.1145/2660129.2660154"],"record_lens_id":"000-277-127-959-561","lens_id":["017-163-528-982-801","000-277-127-959-561"],"sequence":186,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":88,"text":"R. H. Deng, J. Weng, S. Liu, and K. Chen. Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. CANS. Spring Lecture Notes in Computer Science vol. 5339 (2008).","npl_type":"a","external_id":["10.1007/978-3-540-89641-8_1"],"record_lens_id":"067-679-295-502-934","lens_id":["152-098-712-235-730","067-679-295-502-934"],"sequence":187,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":89,"text":"Rosenberg, J. \"Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols\", Apr. 2010, pp. 1-117.","npl_type":"a","external_id":["10.17487/rfc5245"],"record_lens_id":"190-595-153-740-591","lens_id":["190-595-153-740-591"],"sequence":188,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":90,"text":"S. Chow, J. Weng, Y. Yang, and R. Deng. Efficient Unidirectional Proxy Re-Encryption. Progress in Cryptology -AFRICACRYPT 2010. Springer Berlin Heidelberg (2010).","npl_type":"a","external_id":["10.1007/978-3-642-12678-9_19"],"record_lens_id":"011-222-472-281-756","lens_id":["113-525-854-938-457","011-222-472-281-756"],"sequence":189,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":91,"text":"S. Deering, \"Multicast Routing in Internetworks and Extended LANs,\" Proc. ACM SIGCOMM '88, Aug. 1988.","npl_type":"a","external_id":["10.1145/52325.52331"],"record_lens_id":"135-568-438-554-831","lens_id":["135-568-438-554-831","120-029-460-290-951"],"sequence":190,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":92,"text":"S. Deering et al., \"The PIM architecture for wide-area multicast routing,\" IEEE/ACM Trans, on Networking, vol. 4, No. 2, Apr. 1996.","npl_type":"a","external_id":["10.1109/90.490743"],"record_lens_id":"124-467-758-016-299","lens_id":["133-500-498-301-816","124-467-758-016-299"],"sequence":191,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":93,"text":"S. Jahid, P. Mittal, and N. Borisov, \"EASiER: Encryption-based access control in social network with efficient revocation,\" in Proc. ACM ASIACCS 2011, Hong Kong, China, Mar. 2011, pp. 411-415.","npl_type":"a","external_id":["10.1145/1966913.1966970"],"record_lens_id":"006-916-628-465-996","lens_id":["159-451-399-048-582","006-916-628-465-996"],"sequence":192,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":94,"text":"S. Kamara and K. Lauter, \"Cryptographic cloud storage,\" in Proc. FC 2010, Tenerife, Canary Islands, Spain, Jan. 2010, pp. 136-149.","npl_type":"a","external_id":["10.1007/978-3-642-14992-4_13"],"record_lens_id":"005-221-029-321-635","lens_id":["053-170-426-293-600","005-221-029-321-635"],"sequence":193,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":95,"text":"S. Kumar et al. \"Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking,\" 2008, pp. 556-564.","npl_type":"a","external_id":["10.1109/infocom.2008.29"],"record_lens_id":"007-503-267-166-210","lens_id":["011-088-412-494-632","007-503-267-166-210"],"sequence":194,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":96,"text":"S. Misra, R. Tourani, and N.E. Majd, \"Secure content delivery in information-centric networks: Design, implementation, and analyses,\" in Proc. ACM SIGCOMM ICN 2013, Hong Kong, China, Aug. 2013, pp. 73-78.","npl_type":"a","external_id":["10.1145/2491224.2491228"],"record_lens_id":"079-087-950-938-74X","lens_id":["165-315-535-991-147","079-087-950-938-74X"],"sequence":195,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":97,"text":"S. Yu, C. Wang, K. Ren, and W. Lou, \"Achieving secure, scalable, and fine-grained data access control in cloud computing,\" in Proc. IEEE INFOCOM 2010, San Diego, CA, USA, Mar. 2010, pp. 1-9.","npl_type":"a","external_id":["10.1109/infcom.2010.5462174"],"record_lens_id":"050-288-472-671-857","lens_id":["056-260-608-918-024","050-288-472-671-857"],"sequence":196,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":98,"text":"S.J. Lee, M. Gerla, and C. Chiang, \"On-demand Multicast Routing Protocol in Multihop Wireless Mobile Networks,\" Mobile Networks and Applications, vol. 7, No. 6, 2002.","npl_type":"a","external_id":[],"lens_id":[],"sequence":197,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}},{"npl":{"num":99,"text":"Sandvine, Global Internet Phenomena Report-Spring 2012. Located online at http://www.sandvine.com/downloads/ documents/Phenomenal H 2012/Sandvine Global Internet Phenomena Report 1H 2012.pdf.","npl_type":"a","external_id":[],"lens_id":[],"sequence":198,"category":[],"us_category":[],"cited_phase":"APP","rel_claims":[]}}],"reference_cited.source":"DOCDB","reference_cited.patent_count":115,"cites_patent":true,"reference_cited.npl_count":103,"reference_cited.npl_resolved_count":72,"cites_npl":true,"cites_resolved_npl":true,"cited_by":{"patent_count":16,"patent":[{"lens_id":"018-263-173-453-859","document_id":{"jurisdiction":"US","doc_number":"20180322181","kind":"A1"}},{"lens_id":"118-966-211-465-401","document_id":{"jurisdiction":"US","doc_number":"10691877","kind":"B1"}},{"lens_id":"189-623-944-870-472","document_id":{"jurisdiction":"US","doc_number":"10599753","kind":"B1"}},{"lens_id":"156-888-047-664-130","document_id":{"jurisdiction":"US","doc_number":"10063476","kind":"B2"}},{"lens_id":"135-532-841-267-010","document_id":{"jurisdiction":"US","doc_number":"11562000","kind":"B2"}},{"lens_id":"019-830-488-956-148","document_id":{"jurisdiction":"US","doc_number":"10686788","kind":"B2"}},{"lens_id":"094-871-126-263-011","document_id":{"jurisdiction":"US","doc_number":"11894945","kind":"B2"}},{"lens_id":"098-902-565-460-054","document_id":{"jurisdiction":"US","doc_number":"20150281083","kind":"A1"}},{"lens_id":"003-557-557-729-307","document_id":{"jurisdiction":"US","doc_number":"11336648","kind":"B2"}},{"lens_id":"147-388-819-835-482","document_id":{"jurisdiction":"US","doc_number":"10877953","kind":"B2"}},{"lens_id":"167-415-042-334-887","document_id":{"jurisdiction":"US","doc_number":"10846303","kind":"B2"}},{"lens_id":"101-755-953-820-41X","document_id":{"jurisdiction":"US","doc_number":"11675811","kind":"B2"}},{"lens_id":"007-203-041-788-928","document_id":{"jurisdiction":"US","doc_number":"11765162","kind":"B2"}},{"lens_id":"137-197-781-437-539","document_id":{"jurisdiction":"US","doc_number":"11290450","kind":"B2"}},{"lens_id":"036-903-973-763-594","document_id":{"jurisdiction":"US","doc_number":"11275763","kind":"B2"}},{"lens_id":"074-212-454-499-846","document_id":{"jurisdiction":"US","doc_number":"10652238","kind":"B1"}}]},"cited_by_patent":true,"family":{"simple":{"size":2,"id":194934671,"member":[{"lens_id":"120-639-751-141-831","document_id":{"jurisdiction":"US","doc_number":"9400800","kind":"B2","date":"2016-07-26"}},{"lens_id":"011-493-820-493-128","document_id":{"jurisdiction":"US","doc_number":"20140143446","kind":"A1","date":"2014-05-22"}}]},"extended":{"size":2,"id":194717446,"member":[{"lens_id":"120-639-751-141-831","document_id":{"jurisdiction":"US","doc_number":"9400800","kind":"B2","date":"2016-07-26"}},{"lens_id":"011-493-820-493-128","document_id":{"jurisdiction":"US","doc_number":"20140143446","kind":"A1","date":"2014-05-22"}}]}},"has_sequence":false,"legal_status":{"ipr_type":"patent for invention","granted":true,"earliest_filing_date":"2012-11-19","grant_date":"2016-07-26","anticipated_term_date":"2034-03-09","has_disclaimer":true,"patent_status":"ACTIVE","publication_count":2,"has_spc":false,"has_grant_event":true,"has_entry_into_national_phase":false},"abstract":{"en":[{"text":"A collection-synchronizing system synchronizes a local data collection with a remote device. During operation, the system can detect the remote device, and receives collection summaries for one or more data collections stored at the remote device. A collection summary can include at least one additive hash value that represents one or more content items of a data collection. Then, for a data collection that exists at the local device and the remote device, the system compares a remote additive hash value for the remote data collection with a local additive hash value for the local data collection. If the system determines that the local additive hash value does not match the remote additive hash value, the system synchronizes structured names for the data collection at the local device and the remote device.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"}]},"abstract_lang":["en"],"has_abstract":true,"claim":{"en":[{"text":"1. A computer-implemented method, comprising: receiving, by a local computing device over a computer network, collection summaries for one or more data collections at a remote device, wherein a respective collection summary includes only a current additive hash value for each data collection, wherein a respective additive hash value represents a sum of hash values for two or more content items of a corresponding data collection; comparing, for a local data collection that also exists at the remote device, a current local additive hash value for a current version of the local data collection to a current remote additive hash value for a current version of the corresponding remote data collection at the remote device; in response to determining that the current remote additive hash value does not match the current local additive hash value, comparing the current remote additive hash value to one or more historical local additive hash values that were generated for a previous version of the local data collection; and in response to determining that the current remote additive hash value matches a historical local additive hash value for the local collection, sending, to the remote device over the computer network, structured names for content items that have been added to the local data collection after the matching historical local additive hash value was generated.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"2. The method of claim 1 , further comprising synchronizing structured names for the local data collection with the remote device, wherein synchronizing the structured names involves: comparing the current remote additive hash value to one or more historical local additive hash values for the local data collection; and responsive to determining that the received current remote additive hash value does not match a historical local additive hash value for the local data collection: determining a set difference between hash values for content items in the local and remote data collections; determining, based on the hash values of the set difference, structured names for content items from the local data collection that are missing from the remote device's data collection; and sending, to the remote device, the structured names for the identified content items.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"3. The method of claim 1 , further comprising: receiving a filter from the remote device, wherein the filter indicates selection criteria for selecting content items that are desired by the remote device; determining, from the local data collection, a set of content items that satisfy the filter's selection criteria; generating the current local additive hash value using the content items that satisfy the filter's selection criteria; and synchronizing structured names for the local data collection with the remote device, wherein synchronizing the structured names involves: generating a filtered collection of content items that includes, from the content items that satisfy the filter's selection criteria, one or more content items that are missing from the remote data collection; and sending structured names, for content items in the filtered collection, to the remote device.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"4. The method of claim 1 , further comprising: sending, to the remote device, a collection summary for the local data collection; receiving structured names for one or more content items stored in the remote data collection that are not in the local data collection; and storing the received structured names in the local data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"5. The method of claim 4 , further comprising: sending an interest packet for at least one of the received structured names, wherein the interest packet facilitates receiving a content item identified by the structured name from any computing device of a computer network that stores the content item.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"6. The method of claim 4 , further comprising: responsive to synchronizing the structured names, generating one or more additive hash values for the local data collection based on the received structured names for the content items that are not in the local data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"7. The method of claim 1 , wherein the local data collection includes one or more nested hash values, wherein a nested hash value indicates a hash value for a content item of the local data collection or for a nested collection of content items of the local data collection; and wherein the received collection summary further includes one or more nested hash values of the remote data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"8. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method, the method comprising: receiving, over a computer network, collection summaries for one or more data collections at a remote device, wherein a respective collection summary includes only a current additive hash value for each data collection, wherein a respective additive hash value represents a sum of hash values for two or more content items of a corresponding data collection; comparing, for a local data collection that also exists at the remote device, a current local additive hash value for a current version of the local data collection to a current remote additive hash value for a current version of the corresponding remote data collection at the remote device; in response to determining that the current remote additive hash value does not match the current local additive hash value, comparing the current remote additive hash value to one or more historical local additive hash values that were generated for a previous version of the local data collection; and in response to determining that the current remote additive hash value matches a historical local additive hash value for the local collection, sending, to the remote device over the computer network, structured names for content items that have been added to the local data collection after the matching historical local additive hash value was generated.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"9. The storage medium of claim 8 , wherein the method further comprises synchronizing structured names for the local data collection with the remote device, and wherein synchronizing the structured names involves: comparing the current remote additive hash value to one or more historical local additive hash values for the local data collection; and responsive to determining that the received current remote additive hash value does not match a historical local additive hash value for the local data collection: determining a set difference between hash values for content items in the local and remote data collections; determining, based on the hash values of the set difference, structured names for content items from the local data collection that are missing from the remote device's data collection; and sending, to the remote device, the structured names for the identified content items.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"10. The storage medium of claim 8 , wherein the method further comprises: receiving a filter from the remote device, wherein the filter indicates selection criteria for selecting content items that are desired by the remote device; determining, from the local data collection, a set of content items that satisfy the filter's selection criteria; generating the current local additive hash value using the content items that satisfy the filter's selection criteria; and synchronizing structured names for the local data collection with the remote device, wherein synchronizing the structured names involves: generating a filtered collection of content items that includes, from the content items that satisfy the filter's selection criteria, one or more content items that are missing from the remote data collection; and sending structured names, for content items in the filtered collection, to the remote device.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"11. The storage medium of claim 8 , wherein the method further comprises: sending, to the remote device, a collection summary for the local data collection; receiving structured names for one or more content items stored in the remote data collection that are not in the local data collection; and storing the received structured names in the local data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"12. The storage medium of claim 11 , wherein the method further comprises: sending an interest packet for at least one of the received structured names, wherein the interest packet facilitates receiving a content item identified by the structured name from any computing device of a computer network that stores the content item.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"13. The storage medium of claim 11 , wherein the method further comprises: responsive to synchronizing the structured names, generating one or more additive hash values for the local data collection based on the received structured names for the content items that are not in the local data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"14. The storage medium of claim 8 , wherein the local data collection includes one or more nested hash values, wherein a nested hash value indicates a hash value for a content item of the local data collection or for a nested collection of content items of the local data collection; and wherein the received collection summary further includes one or more nested hash values of the remote data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"15. An apparatus, comprising: a communication module to receive, over a computer network, collection summaries for one or more data collections at a remote device, wherein a respective collection summary includes only a current additive hash value for each data collection, wherein a respective additive hash value represents a sum of hash values for two or more content items of a corresponding data collection; a collection-comparing module to: compare, for a local data collection that also exists at the remote device, a current local additive hash value for a current version of the local data collection to a current remote additive hash value for a current version of the corresponding remote data collection at the remote device; and in response to determining that the current remote additive hash value does not match the current local additive hash value, compare the current remote additive hash value to one or more historical local additive hash values that were generated for a previous version of the local data collection; a collection-synchronizing module, wherein in response to determining that the current remote additive hash matches the historical local additive hash value for the local collection, the collection-synchronization module is operable to send, to the remote device over the computer network, structured names for content items that have been added to the local data collection after the matching local historical hash value was generated.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"16. The apparatus of claim 15 , wherein the collection-comparing module is further configured to: compare the current remote additive hash value to one or more historical local additive hash values for the local data collection; and responsive to determining that the received current remote additive hash value does not match a historical local additive hash value for the local data collection, configure the collection-synchronizing module to: determine a set difference between hash values for content items in the local and remote data collections; determine, based on the hash values of the set difference, structured names for content items from the local data collection that are missing from the remote device's data collection; and send, to the remote device, the structured names for the identified content items.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"17. The apparatus of claim 15 , wherein the communication module is further configured to receive a filter from the remote device, wherein the filter indicates selection criteria for selecting content items that are desired by the remote device; wherein the apparatus further comprises a hash-generating module to: determine, from the local data collection, a set of content items that satisfy the filter's selection criteria; and generate the current local additive hash value using the content items that satisfy the filter's selection criteria; and wherein the collection-synchronizing module is further configured to: generate a filtered collection of content items that includes, from the content items that satisfy the filter's selection criteria, one or more content items that are missing from the remote data collection; and send structured names, for content items in the filtered collection, to the remote device.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"18. The apparatus of claim 15 , wherein the communication module is further configured to: send, to the remote device, a collection summary for the local data collection; receive structured names for one or more content items stored in the remote data collection that are not in the local data collection; and store the received structured names in the local data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"19. The apparatus of claim 18 , wherein the communication module is further configured to: send an interest packet for at least one of the received structured names, wherein the interest packet facilitates receiving a content item identified by the structured name from any computing device of a computer network that stores the content item.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"20. The apparatus of claim 18 , further comprising a hash-generating module operable to generate one or more additive hash values for the local data collection in response to the communication module receiving the structured names for the content items that are not in the local data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"},{"text":"21. The apparatus of claim 15 , wherein the local data collection includes one or more nested hash values, wherein a nested hash value indicates a hash value for a content item of the local data collection or for a nested collection of content items of the local data collection; and wherein the received collection summary further includes one or more nested hash values of the remote data collection.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"}]},"claim_lang":["en"],"has_claim":true,"description":{"en":{"text":"BACKGROUND 1. Field This disclosure is generally related to data synchronization. More specifically, this disclosure is related to comparing additive hash values that represent collections of content item names to determine whether a local data collection and a remote data collection are synchronized. 2. Related Art In many computing applications, it is often important for two remote data collections to synchronize their data if their collections are not in agreement. However, to determine an agreement level between the two remote data collections, these two computer systems may need to exchange information based on a substantially large sample of their data. A commonly used measure of the agreement between two collections A and B of data objects (files) is the “overlap.” This overlap can be computed as the number of objects in the intersection of A and B divided by the number of objects in the union (|A∩B|/|A∪B|), which will be a real number between 0 and 1. Individual data objects are typically represented by checksums that are computed from the contents of the data objects, for example 128-bit hash function values. If two checksums agree, it is highly likely that the two data objects also agree. Unfortunately, computing the checksums for large data files can consume substantial processing time. To estimate the overlap between a local data collection A and a remote data collection B, a computer system may receive some or all of the checksums for the data objects in the remote collection B, and compare these checksum values to those for local collection A. However, the overlap estimate may be highly inaccurate unless all the checksums are transferred, and communicating these checksum values for the remote data collection can involve a high-bandwidth file transfer operation. Some overlap-estimation systems reduce the amount of communication by using min-wise hashing to generate a sketch vector. In this technique, there is a set of n universally known hash functions, h 1 , h 2 , . . . , h n , that are used to generate n hash values for each of the data objects in a collection A. The collection A is then represented by a “sketch” vector of n numbers that are generated from these hash values, and the overlap of collections A and B can be estimated by the overlap of their sketches. Unfortunately, generating the sketch vector can consume substantial processing time for large files, given that it requires generating a plurality of different hash values from the data files' contents. SUMMARY One embodiment provides a system that synchronizes a data collection with a remote device. During operation, the system can detect the remote device, for example, by detecting that the local device and the remote device are in close proximity to each other, or detecting a data connection between the local device and the remote device. Then, in response to detecting the remote device, the system receives collection summaries for one or more data collections stored at the remote device. A respective collection summary can include at least one additive hash value that represents one or more content items of a data collection. Then, for a data collection that exists at the local device and the remote device, the system compares a remote additive hash value for the data collection at the remote device with a local additive hash value for the data collection at the local device. If the system determines that the remote additive hash value does not match the local additive hash value, the system synchronizes structured names for the data collection at the local device and the remote device. A structured name indicates a unique and persistent name for a content item independent of a storage location, and facilitates obtaining the content item from any device of a computer network. In some embodiments, while synchronizing the persistent names, the system compares the remote additive hash value to one or more historical hash values for the data collection at the local device. If the system determines that the remote additive hash value matches a historical hash value of the local data collection, the system identifies a set of content items that have been added to the local data collection after the matching historical hash value was generated, and sends structured names for the identified content items to the remote device. In some embodiments, the local device stores one or more nested hash values for the data collection, such that a nested hash value indicates a hash value for a content item of the data collection or for a nested collection of content items of the data collection. Further, the collection summary received from the remote device can also include one or more nested hash values from the remote device. In some embodiments, while synchronizing the structured names, the system compares the remote additive hash value to one or more historical hash values for the data collection at the local device. If the system determines that the received additive hash value matches a historical hash value for the data collection at the local device, then the system determines that the remote collection is a subset of the local collection. It may send to the remote system the set of names added since the historical hash value. Otherwise, the system can determine a set difference between the hash values for content items in the local and remote data collections. The system uses the hash values of the set difference to determine structured names for content items from the local data collection that are missing from the remote device's data collection, and sends these structured names to the remote device. In some embodiments, the system receives a filter from the remote device, such that the filter indicates selection criteria for selecting content items that are desired by the remote device. The system then determines a set of content items from the local data collection that satisfy the filter's selection criteria, and generates the additive hash value using the content items that satisfy the filter's selection criteria. In some embodiments, while synchronizing the structured names with the remote device, the system generates a filtered collection of content items that includes, from the content items that satisfy the filter's selection criteria, one or more content items that are missing from the remote data collection. The system sends structured names for content items in the filtered collection to the remote device. In some embodiments, while synchronizing the structured names with the remote device, the system sends to the remote device a collection summary for a data collection at the local device. The system can receive structured names for one or more content items stored at the remote device that are missing at the local device, and stores the received structured names in the local data collection. In some embodiments, the system sends an interest packet for at least one of the received structured names to a network node of a computer network. The interest packet facilitates receiving a content item identified by the structured name from any computing device of a computer network that stores the content item. In some embodiments, after synchronizing the structured names, the system generates and stores one or more additive hash values for the data collection at the local device based on the received structured names for the content items missing at the local device. BRIEF DESCRIPTION OF THE FIGURES FIG. 1 illustrates an exemplary system that synchronizes a data collection using a content-centric network in accordance with an embodiment. FIG. 2 illustrates an exemplary computing device that stores a data collection in accordance with an embodiment. FIG. 3 presents a flow chart illustrating a method for synchronizing a data collection between a local computing device and a remote computing device in accordance with an embodiment. FIG. 4 presents a flow chart illustrating a method for providing structured names of local content items to a remote computing device in accordance with an embodiment. FIG. 5 presents a flow chart illustrating a method for updating a local data collection using structured names received from a remote computing device in accordance with an embodiment. FIG. 6 presents a flow chart illustrating a method for generating additive hash values for an updated data collection in accordance with an embodiment. FIG. 7 illustrates an exemplary apparatus that facilitates synchronizing a data collection with a remote computing device in accordance with an embodiment. FIG. 8 illustrates an exemplary computer system that facilitates synchronizing a data collection with a remote computing device in accordance with an embodiment. In the figures, like reference numerals refer to the same figure elements. DETAILED DESCRIPTION The following description is presented to enable any person skilled in the art to make and use the embodiments, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present disclosure. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein. Overview Embodiments of the present invention solve the problem of providing a collection-synchronization system that can automatically synchronize collection data between computing devices that are subscribed to a common data collection. For example, a local computing device can store a plurality of content items that are organized into one or more collections of data. A user of the device can subscribe to a collection of data, and the device can synchronize this collection with other devices that are also subscribed to this data collection (e.g., other nearby devices). In a content-centric network (CCN), a data collection can correspond to a namespace, and a namespace can correspond to one or more structured names. Further, each structured name is unique and persistent with respect to a certain content item. The namespace includes at least part of a content name which can be used to match content items with a more specific name that falls logically within the scope of the namespace. Because a content item's structured name is unique and persistent, the system can generate a hash value for each content item based on the structured name, without having to process the data for each content item which can be significantly larger in size (e.g., bytes) than the structured names. The system can also generate an additive hash value for each data collection, based on the hash values for the individual content items of the data collection, so that the additive hash value represents the contents of the data collection. For example, the system can generate the additive hash value by using an addition operation (or some other mathematical function) to process the hash values for the individual content items of the data collection. To synchronize data collections with a remote device, the local device can provide to the remote device a collection summary that includes at least a recent additive hash value for each collection. The local device can receive a collection summary from the remote device as well. If the local device detects a difference in an additive hash value for a data collection, the local and remote devices can engage in a collection-synchronization operation to resolve the discrepancy in their data collections. In some embodiments, data is persistent at each computing device. For example, to remove a content item from a data collection, the device adds an empty “whiteout” item to the collection using this content item's name. This whiteout item includes a unique structured name so that it can be added to the collection without overriding the content item's structured name. For example, the whiteout item can have a prefix that matches the content item's structured name, and can have a suffix that indicates that the content item has been removed from the collection. Further, the whiteout item is “empty” in the sense that it does not store data, and so the whiteout item does not occupy a significant amount of storage space. Once the system generates the whiteout item, the system can also remove the data from the content item without removing the structured name for the content item. This way, the device can store a history of content items that have been stored by the device in the past. In some embodiments, the local device can determine whether a remote device's data collection is an older version of the local device's collection by determining whether the collection of structured names for the content items at the remote device are a subset of the collection of structured names for the content items at the local device. However, performing a cross-comparison between the structured names at the local and remote devices can be a computationally expensive task. To avoid having to perform this expensive cross-comparison operation, the local device can store historical hash values (e.g., additive hash values that have become outdated) for the local data collection. Then, the local device can determine whether the remote device's data collection is an older version (e.g., a subset of the local data collection) by determining whether the additive hash value from the remote device matches a historical hash value for the local data collection. In some embodiments, a device can use a filter to indicate a subset of content items within a remote collection that are to be synchronized. To use the filter, the local and remote devices agree upon a set of filters that are to be used to select content items. The local and remote devices then exchange collection summaries that represent the content items of their local collection that satisfy the filter's selection criteria. The local and remote devices use these collection summaries to determine whether their collections are synchronized, and/or to determine which content items need to be exchanged. The collection-synchronization protocol is inherently a multi-party protocol that does not require the various computing devices to have synchronized clocks, and does not require a computing device to store persistent state information for other devices. When two devices have synchronized collections, the device can use a synchronization operation to detect the synchronized state with an O(1) runtime per collection. The communications cost of the synchronization operation also has an O(1) runtime, because the device only needs to transfer one additive hash value per collection. When collections are out-of-sync, the local device can synchronize the local and remote collections with an O(log n) runtime, where n is the number of content items in the collection. FIG. 1 illustrates an exemplary system 100 that synchronizes a data collection using a content-centric network in accordance with an embodiment. System 100 can include a computing device 104 that can communicate with a remote computing device 106 via a network 102 or a direct signal 108 . Computing devices 104 can include, for example, a desktop computer 104 . 1 , a tablet 104 . 2 , a mobile phone 104 . n , a laptop, a home media center, or any other computing device. In some embodiments, devices 104 and 106 can each subscribe to various collections of content items. For example, user 110 may use device 104 to subscribe to data collections such as bicycling/gear, running/events/Bay_Area, and ACME/projects. The “bicycling/gear” collection can include content related to bicycling gear, such as product reviews, product advertisements, pictures, usage tutorials, and user-generated content. The “running/events/Bay_Area” collection may include any content related to running events within the San Francisco Bay Area, such as new event information, services related to an upcoming running event, images and videos from past events, and discussion content. The “ACME/projects” collection can include content related to projects at the ACME Corporation, the employer of user 110 . As a further example, users 110 and 112 may also be subscribed to the “cooking” collection, and may periodically meet with each other to discuss new recipes. The “cooking” collection can include a plurality of recipes, pictures, instructional videos, and user-generated content (e.g., pictures, videos, and comments). User 110 may use computing device 104 to download new recipes from network 102 (e.g., the Internet). Sometimes user 110 may also modify existing recipes to create a new version of an old recipe, or user 110 may create and store new recipes of his own. Further, user 112 may similarly use computing device 106 to download, modify, and/or create recipes of his own. Because users 110 and 112 are friends, they may have given each other's devices permission to exchange collection data with each other. When users 110 and 112 meet with each other, computing devices 104 and 106 may detect their proximity to each other and may automatically synchronize their collections. This automatic synchronization allows computing devices 104 and 106 to learn about new content from the “cooking” data collection so that users 110 and 112 can discuss this content during their meeting, or at a later date. Device 104 can detect device 106 by detecting direct signal 108 from device 106 (e.g., a Bluetooth signal, a WiFi signal, or an RFID signal). In some other embodiments, device 104 can detect device 106 via a third-party system, such as application server 116 . For example, devices 104 and 106 may periodically send their updated location information (e.g., GPS coordinates) to application server 116 that provides location-based services. Then, if devices 104 and 106 are in close proximity to each other (or are tied to a similar context or activity, such as traveling to the same location), application server 116 can inform computing devices 104 and 106 that they can benefit from synchronizing their data collections. Recall that computing devices 104 and 106 store content in their data collections by assigning a structured name that is unique and persistent to each piece of content. The structured name can indicate a namespace hierarchy for the content item, a name (e.g., a filename) for the content item, information that indicates a version of the content item (e.g., a checksum value), and authentication information for the content. In some embodiments, computing devices 104 and 106 can synchronize their data collections by synchronizing the structured names to the content items in their collections. After synchronizing the content names for a data collection, computing device 104 can obtain the new content items behind these content names directly from computing device 106 while devices 104 and 106 have a direct connection. Alternatively, computing device 104 can obtain a new content item at any time by broadcasting an interest packet via network 102 . This can allow computing device 104 to obtain the desired content item from any device connected to network 102 (e.g., from computing device 106 , or from any other network device 114 ). FIG. 2 illustrates an exemplary computing device 202 that stores a data collection in accordance with an embodiment. Device 202 can include a storage device 204 that stores at least a plurality of data collections 206 , and can store filters 208 . Storage device 204 can include a hard drive, a solid state device, and/or any other non-volatile storage medium now known or later developed. A filter can indicate selection criteria for selecting one or more content items that are to be accounted for in a collection summary for a remote user. In some embodiments, storage device 204 can include a predetermined set of selection criteria 210 for use by each filter. Table 1 presents a plurality of exemplary selection criteria in accordance with an embodiment. TABLE 1Selection CriteriaDescription1. No VideosCollection Summary does not accountfor video files.2. No Image FilesCollection Summary does not accountfor image files.3. No Audio FilesCollection Summary does not accountfor audio files.4. Maximum 10 MB file sizeCollection Summary does not accountfor files larger than 10 MB. Device 202 can receive filters 208 from various other devices that have synchronized their data collections with device 202 in the past. By storing filters 208 , device 202 can use filters 208 over time to generate a record of how hash values for data collections 206 have changed over time (e.g., historical hash values 218 for data collection 212 ). Device 202 can compare these historical hash values to hash values of a remote data collection to determine whether the remote data collection matches an older version of the local data collection. If so, the system can determine that the remote data collection is a subset of the local data collection. Data collections 206 can include one or more data collections to which the local user has subscribed. A data collection 212 , for example, can include content items 220 , and can include nested data collections 222 that can also include other content items. Further, data collection 212 can also include a plurality of additive hash values that represent content items 220 and nested collections 222 . For example, data collection 212 can include a root hash value 214 , filter hash values 216 , and historical hash values 218 . In some embodiments, a nested collection (e.g., nested collection 222 . n ) can also include other content items and nested collections, and can include additive hash values for the nested content items (e.g., a root hash value, filter hash values, historical hash values). A content item (e.g., content item 220 . m ) can include content data 224 , a structured name 226 for content data 224 , and a hash value 228 for content data 224 . Recall that structured name 226 is unique and persistent to the current version of content data 224 . In some embodiments, device 202 generates hash value 228 by processing structured name 226 using a one-way hash function, which is significantly faster than generating a hash value from content data 224 . Device 202 can generate additive hash values for data collection 212 when device 202 synchronizes the local data collection with a remote data collection, or when device 202 receives a new filter from a remote device. Further, device 202 can assign a timestamp to each root hash value and filter hash value (e.g., for data collection 212 or for a nested data collection 222 ). In some embodiments, device 202 can use these timestamps to distinguish between current hash values and historical hash values. In some other embodiments, prior to generating a new root hash value or a filter hash value, device 202 may migrate the existing root hash value and filter hash values into a data store for historical hash values. For example, the system can store these hash values within a database table for historical hash values, or within a nested collection or directory that it reserves for historical hash values. To generate root hash value 214 , device 202 can combine the hash values from content items 220 and the root hash values from nested collections 222 . For example, device 202 can combine these hash values by performing an addition operation on these hash values, or by performing some other mathematical function. Further, device 202 can generate a filter hash value for each of filters 208 by first recursively generating a filter hash value for each of nested collections 222 . Then, device 202 can combine these filter hash values for nested collection 222 with hash values for content items 220 that satisfy the filter's selection criteria (e.g., using an addition operation, or using some other mathematical function). Named Content Recall that the system can associate a persistent structured name (a content identifier) with a content item of a data collection. The term “persistent” means that the content item can move around within a computing device, or across different computing devices, but the name persists with the content. This enables a computing device to generate an interest in a piece of content to obtain the content from wherever it may reside. The term “persistent” also means that if the content changes, then the name changes. The new name can be automatically generated as a version of the original name, can be associated with authentication metadata (e.g., a digital signature by the publisher of the content), or can reflect the nature of the content change. A structured name can be divided into several hierarchical components. For example, in the name “/parc/home/ccn/test.txt,” the individual name components are parc, home, ccn, and test.txt. Note that “PARC” is an acronym for “Palo Alto Research Center,” an exemplary organization used in this disclosure. Structured names also enable efficient routing for named content. A component-wise structure allows a hierarchical organization of names, and a logarithmic efficiency in accessing content by name. There is no single “root” for a naming scheme. However, the naming scheme can be modeled as a forest of trees. Names can be structured in various ways. For example, the structured names can be structured in a left-oriented prefix-major fashion. For example, the name “/parc/home/ccn” can be a “parent” of “/parc/home/ccn/test.” In some embodiments, the system can store a data collection by following a hierarchical data structure that is derived from the collection's naming scheme, without following the collection's naming scheme explicitly. For example, if a collection or nested collection corresponding to a given domain or sub-domain were to have a significantly large set of nested items (e.g., “/parc/home/ccn/” may have 1000 nested items or more), the system can lexicographically sort the names for the nested items, and group them into sub-collections so that any nested sub-collection itself has a constrained maximum number of nested items (e.g., less than 1000 items). Doing so could cause the item named “/parc/home/ccn/test” to be stored within a data collection along the path “/parc/home/ccn/t/.” Name components can be binary strings and can be opaque to the underlying network. More generally, a semantic meaning to a name component is an agreement or convention between name producers and consumers. Names can also be text or in a form where low-level network nodes can understand the meaning of “special” name components. In some embodiments, the semantic meaning of a name component can be defined by a rule that indicates which content items are to belong to a corresponding data collection or sub-collection. The rule can specify, for example, “all files under the ‘/share’ namespace or directory of storage drive X,” “all content items published by Adam,” and/or any rule that generates a specific set of names given to a device's content store. A “file” is represented by a tree of content items under the file's name. For example, if various versions of the same file exist, these various versions can exist within the same prefix of the structured name. If the file (or a version of the file) is deleted, this deletion operation can be represented by adding an additional item under this prefix that indicates the deletion. This way, a deletion is performed by adding items to a data collection, rather than by deleting items from the data collection. If a data collection becomes unsynchronized at two devices, A and B, after an item is deleted at device A, the collection at device B becomes a subset of the collection at device A because it does not have the new “deletion” content item. Also, the system can determine that a content item is missing from its node in the data collection, without having to analyze its constituent data blocks (which could be large for multimedia files). In sum, the system associates persistent structured names with content items. Because of this naming convention, a content item can be addressed, located, retrieved, cached, and disseminated by its name. To obtain content data that is associated with a structured name, the system can publish an interest in the structured name, and can receive the content item from any device that has the content item of the same structured name. Synchronizing Data Collections FIG. 3 presents a flow chart illustrating a method 300 for synchronizing a data collection between a local computing device and a remote computing device in accordance with an embodiment. The system begins by detecting a remote computing device (operation 302 ), and receiving collection summaries for data collections at the remote device (operation 304 ). The collection summary can include additive hash values for the data collections stored at the remote device. In some embodiments, the system sends collection names for one or more data collections that the local device is interested in, and receives collection summaries for these data collections only. The system then obtains additive hash values (e.g., from a collection summary) for a data collection at the remote device that also exists at the local device (operation 306 ). These additive hash values can include a root hash value for the complete data collection, which facilitates the local device to determine whether the remote data collection matches the current or a previous version of the local data collection. In some embodiments, the system can send a filter to the remote device (e.g., during or after operation 302 ), which facilitates the remote device to select which collection items to use for generating the additive hash value. In this case, the additive hash values obtained during operation 306 can include additive hash values that the remote device computes using only collection items that satisfy the filter from the local device. The system then determines whether the remote data collection matches the local data collection by comparing the remote additive hash value with a local additive hash value (operation 308 ). If the remote and local additive hash values match, the system does not have to synchronize the current data collection and proceeds to determine whether there is another data collection to synchronize (operation 312 ). If there is another data collection that exists at the local and remote client devices, the system returns to operation 306 to obtain a remote additive hash value for this data collection. However, if the system determines at operation 308 that the remote and local additive hash values do not match (e.g., the data collection is not synchronized at the local and remote devices), the system synchronizes the structured names for the data collection at the local and remote devices (operation 310 ). Recall that the system does not have to synchronize the content items of the data collection with the remote item. By synchronizing the structured names for the content items (which identifies a content item and its version), the system can issue an interest packet for these structured names to obtain the content items from any device on the network. Further, if the local user is not interested in the content data associated with a hash value (e.g., a movie file, or a sub-directory of the data collection), the system can store the hash value from the remote device to satisfy the synchronization operation, without having to obtain the content data behind the hash value. Whenever the device finishes synchronizing the data collection with the remote device, the local device generates and stores an up-to-date aggregate hash value for the data collection. The system stores this aggregate hash value so that it is associated with a timestamp for the collection-synchronizing operation, and associated with the content items that the hash value represents. Over time, the system builds a history of aggregate hash values for the data collection, which allows the system to quickly determine whether a remote data collection matches a previous version of the local data collection, and which content items are associated with this previous version. The local device can limit the amount of storage that is allocated for historical hash values, given that the usefulness of a historical hash value diminishes with time as the other devices synchronize their data collection to the current version. In some embodiments, when the system determines that the current version of the remote and local data collections do not match, the system can simplify the synchronization operation by determining whether the remote data collection matches a prior version of the local data collection. If so, the system can conclude that the remote data collection is a subset of the local data collection, and can synchronize structured names with the remote device without having to perform an expensive item-by-item comparison operation with the remote data collection. FIG. 4 presents a flow chart illustrating a method 400 for providing structured names of local content items to a remote computing device in accordance with an embodiment. During operation, the system determines whether the remote additive hash value matches a historical additive hash value for the local data collection (e.g., determines whether the remote data collection is a subset of the local data collection) (operation 402 ). If so, the system identifies content items that have been added to the local data collection after the matching historical additive hash value was generated (operation 404 ), and determines structured names for the identified content items (operation 406 ). The system then sends these structured names to the remote device to synchronize the remote data collection with the local data collection (operation 412 ). In some embodiments, the remote hash value does not match a local historical hash value when the remote data collection is not a strict subset of the local data collection. In some other embodiments, these hash values may not match when the local device has expunged (or did not store) a historical hash value that matches the remote hash value. In either case, the system determines a set difference between the hash values for content items in the local and remote data collections (operation 408 ), and determines which structured names to send to the remote device from the hash values of the set difference (operation 410 ). The system then proceeds to operation 412 to send these structured names to the remote device. For example, the system can perform operation 408 by comparing individual hash values for content items between the local and remote devices to detect disparities. The system can obtain nested hash values for the data collection at the remote device, and searches through the local data collection to identify nested hash values of the local data collection that do not match a nested hash value of the remote data collection. A nested hash value can be a hash value for a content item of a data collection, or can be an additive hash value for a nested data collection. The system can obtain the remote device's nested hash values from the collection summary received during operation 304 , or it can obtain these nested hash values by requesting them from the remote device (e.g., by requesting a collection summary for a sub-collection). In some embodiments, the system can process these nested hash values of the local device to determine the structured names of the local data collection (and of any sub-collection) that do not exist at the remote data collection. Further, the system can perform method 400 to recursively synchronize various sub-collections of a collection hierarchy when the current additive hash values for the local and remote sub-collections do not match. It can be inefficient to compare hash values for individual content items when a data collection is large. For example, it would be inefficient for the local and remote devices to exchange individual hash values for a data collection with 100,000 content items when the set difference includes only a few additional content items. In some embodiments, the system can perform set reconciliation (e.g., during operation 408 ) using a technique similar to Eppstein et al. (Eppstein, et al., “What's the Difference? Efficient Set Reconciliation without Prior Context,” Proceedings of SIGCOMM11), which is hereby incorporated by reference. To perform operation 408 , the system can obtain a digest for the data collection of the remote device, and the system can also generate and send a digest for the local data collection to the remote device. The system can generate the digest by generating an invertible bloom filter (IBF) vector for the local data collection. For example, unlike other reconciliation techniques, the system can map each individual content item to k cells of the IBF table by using k hash functions (H k ) to process an identifier for the content item that is derived from the content item's structured name (e.g., using the existing hash value for the content item as the identifier, as opposed to using an identifier derived from the content item's data). The system also uses a hash function that corresponds to a respective cell (H c ) to generate a hash value from an aggregation of the identifiers for the content items that map to that cell. Each cell of the IBF table stores a sum of the hash-value identifiers (idSum) for the content items that map to the cell, a sum of the hash values (hashSum), and a number of content items that are mapped to the cell (count). For example, to add a content item i (with an existing hash value s i for the data collection) to an IBF cell B[j], the system updates the IBF entry by computing the following: B[j] ·idSum= B[j] ·idSum⊕ s i (1) B[j] ·hashSum= B[j] ·hashSum⊕ H c ( s i ) (2) B[j] ·count= B[j] ·count+1 (3) The system then uses the digest for the local data collection (D A ) and the digest of the remote data collection (D B ) to determine identifiers for the content items that make up the set difference between the local and remote data collections. For example, to compute the difference, D A-B =D A −D B , the system performs the following computations for each cell i of the IBF tables for the local and remote content collections (IBFs B 1 and B 2 , respectively): B 3 [i] ·idSum= B 1 [j] ·idSum⊕ B 2 [j] ·idSum (4) B 3 [i] ·hashSum= B 2 [i] ·hashSum⊕ B 2 [i] ·hashSum (5) B 3 [i] ·count= B 1 [i] ·count− B 2 [i] ·count (6) Thus, the IBF B 3 represents the digest difference D A-B =D A −D B , and/or the system can generate an IBF B 4 that represents the digest difference D B-A =D B -D A . Then, the system can scan through IBF B 3 or B 4 to recover identifiers (hash values) for the content items that make up the set difference. The system first detects “pure” cells from the IBF table whose idSum value matches an identifier for a content item s in the set difference, and the system updates the IBF table to remove the content item s from all the IBF cells that it maps to. Then, the system iteratively detects other pure cells, and updates the IBF table to remove entries for other content items that make up the set difference, until either the IBF table is empty or no more pure cells exist. The system can then use the identifiers for the content items in the set difference (e.g., the hash values to these content items) to determine the structured names for the content items that need to be synchronized. In some embodiments, the system can mitigate the scalability issue for exchanging hash values for a large collections by modifying a data collection as necessary to ensure that the collection's set of nested items does not reach a given maximum threshold. For example, if a nested collection corresponding to a given domain were to have a significantly large set of nested items (e.g., “/parc/home/ccn/” may have at least 1000 nested items), the system can lexicographically sort the names for the nested items, and groups them into sub-collections so that any nested sub-collection itself has a constrained maximum number of nested items that does not reach the maximum threshold (e.g., less than 1000 items). Doing so could cause the item named “/parc/home/ccn/test” to be stored within a data collection along the path “/parc/home/ccn/t/.” Then, if only the file “test.txt” is modified within the collection “/parc/home/ccn,” the system would only need to exchange hash values for the sub-collection “/parc/home/ccn/t” (e.g., during operation 208 ). Using Filters to Synchronize a Portion of a Data Collection When the system determines during operation 308 that the current version of the remote and local data collections do not match, the system can provide a local collection summary to the remote device so that the remote device can respond with the structured names that are missing at the local device. In some embodiments, the local device may not be interested in synchronizing all content items that exist at the remote device. For example, the local device may have a limited storage space or a limited network bandwidth, and may not be interested in receiving video or audio content. The system can provide a filter to the remote device to indicate selection criteria for selecting which content items are to be synchronized with the local device. FIG. 5 presents a flow chart illustrating a method 500 for updating a local data collection using structured names received from a remote computing device in accordance with an embodiment. During operation, the system sends to the remote device a collection summary for a data collection at the local device (operation 502 ). The system can also send a filter to the remote device during operation 502 , at which point the remote device uses the filter to select a root hash value and any historical additive hash value that satisfies the filter's selection criteria, or to generate the root hash value when necessary. The system then receives structured names for content items stored at the remote device that are missing at the local device (operation 504 ), and stores the received structured names in the local data collection (operation 506 ). At this point, the current additive hash values for the data collection have become outdated (e.g., the root hash value and any nested additive hash values), so the system stores these additive hash values for the current data collection as historical hash values (operation 508 ). The system also generates new additive hash values for the updated data collection to account for the received structured names (operation 510 ). In some embodiments, while generating the new additive hash values, the system may also generate additive hash values for any filters that it has stored from other remote devices with which it frequently synchronizes data collections. Recall that the system learns about new content items when it synchronizes a data collection with the remote device, but does not necessarily obtain these content items from the remote device. To obtain the new content items, the system can obtain these content items from any device of a content-centric network that is currently storing the correct version by sending an interest packet across the content-centric network for the received structured names (operation 512 ). In some embodiments, the system can generate additive hash values for the local data collection (e.g., a root hash value and/or a filter hash value) when it receives a new filter from a remote device, or when it finishes synchronizing the local data collection with the remote device. FIG. 6 presents a flow chart illustrating a method 600 for generating additive hash values for an updated data collection in accordance with an embodiment. During operation, the system selects a filter (e.g., a filter received from a remote device) (operation 602 ), and selects content items from the local data collection that satisfy the filter's selection criteria (operation 604 ). The system then generates an additive hash value using the selected content items (operation 606 ), and stores the additive hash value with the data collection (operation 608 ). The system then determines whether it needs to apply any other filters to the current version of the data collection (operation 610 ). If so, the system returns to operation 602 to select another filter. FIG. 7 illustrates an exemplary apparatus 700 that facilitates synchronizing a data collection with a remote computing device in accordance with an embodiment. Apparatus 700 can comprise a plurality of modules which may communicate with one another via a wired or wireless communication channel. Apparatus 700 may be realized using one or more integrated circuits, and may include fewer or more modules than those shown in FIG. 7 . Further, apparatus 700 may be integrated in a computer system, or realized as a separate device which is capable of communicating with other computer systems and/or devices. Specifically, apparatus 700 can comprise a communication module 702 , a collection-comparing module 704 , a collection-synchronizing module 706 , and a hash-computing module 708 . In some embodiments, communication module 702 can receive collection summaries for one or more data collections of a remote device. A respective collection summary includes at least one additive hash value that represents one or more content items of a data collection. Collection-comparing module 704 can compare, for a local data collection that also exists at the remote device, a local additive hash value for the local data collection with a remote additive hash value for the corresponding remote data collection at the remote device. Collection-synchronizing module 706 can synchronize structured names for the local data collection and the remote data collection at the remote device. A structured name indicates a unique and persistent name for a content item independent of a storage location. Hash-computing module 708 can generate an additive hash value for the local data collection by performing an arithmetic function (e.g., an addition operation) on individual hash values for a plurality of content items in the data collection (e.g., content items that satisfy a filter's selection criteria). FIG. 8 illustrates an exemplary computer system 802 that facilitates synchronizing a data collection with a remote computing device in accordance with an embodiment. Computer system 802 includes a processor 804 , a memory 806 , and a storage device 808 . Memory 806 can include a volatile memory (e.g., RAM) that serves as a managed memory, and can be used to store one or more memory pools. Furthermore, computer system 802 can be coupled to a display device 810 , a keyboard 812 , and a pointing device 814 . Storage device 808 can store operating system 816 , collection-synchronizing system 818 , and data 828 . Collection-synchronizing system 818 can include instructions, which when executed by computer system 802 , can cause computer system 802 to perform methods and/or processes described in this disclosure. Specifically, collection-synchronizing system 818 may include instructions for receiving collection summaries for one or more data collections of a remote device (communication module 820 ). A respective collection summary includes at least one additive hash value that represents one or more content items of a data collection. Further, collection-synchronizing system 818 can include instructions for comparing, for a local data collection that also exists at the remote device, a local additive hash value for the local data collection with a remote additive hash value for the corresponding remote data collection at the remote device (collection-comparing module 822 ). Collection-synchronizing system 818 can also include instructions for synchronizing structured names for the local data collection and the remote data collection at the remote device (collection-synchronizing module 824 ). A structured name indicates a unique and persistent name for a content item independent of a storage location. Collection-synchronizing system 818 can also include instructions for generating an additive hash value for the local data collection by performing an arithmetic function on individual hash values for a plurality of content items in the data collection (hash-computing module 826 ). Data 828 can include any data that is required as input or that is generated as output by the methods and/or processes described in this disclosure. Specifically, data 828 can store at least a data collection that includes one or more content items, an additive hash value for a data collection, a collection summary that includes at least one or more additive hash values for the data collection, selection criteria for selecting content items from a collection, filters that indicate selection criteria for generating an aggregate hash value and/or a collection summary. The data structures and code described in this detailed description are typically stored on a computer-readable storage medium, which may be any device or medium that can store code and/or data for use by a computer system. The computer-readable storage medium includes, but is not limited to, volatile memory, non-volatile memory, magnetic and optical storage devices such as disk drives, magnetic tape, CDs (compact discs), DVDs (digital versatile discs or digital video discs), or other media capable of storing computer-readable media now known or later developed. The methods and processes described in the detailed description section can be embodied as code and/or data, which can be stored in a computer-readable storage medium as described above. When a computer system reads and executes the code and/or data stored on the computer-readable storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the computer-readable storage medium. Furthermore, the methods and processes described above can be included in hardware modules. For example, the hardware modules can include, but are not limited to, application-specific integrated circuit (ASIC) chips, field-programmable gate arrays (FPGAs), and other programmable-logic devices now known or later developed. When the hardware modules are activated, the hardware modules perform the methods and processes included within the hardware modules. The foregoing descriptions of embodiments of the present invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. Additionally, the above disclosure is not intended to limit the present invention. The scope of the present invention is defined by the appended claims.","lang":"en","source":"USPTO_FULLTEXT","data_format":"ORIGINAL"}},"description_lang":["en"],"has_description":true,"has_docdb":true,"has_inpadoc":true,"has_full_text":true,"biblio_lang":"en"},"jurisdiction":"US","collections":[],"usersTags":[],"lensId":"120-639-751-141-831","publicationKey":"US_9400800_B2","displayKey":"US 9400800 B2","docAssets":{"lensId":"120-639-751-141-831","pdfUrl":"https://www.lens.org/images/patent/US/9400800/B2/US_9400800_B2.pdf","images":[{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000001.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000001.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000002.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000002.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000003.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000003.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000004.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000004.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000005.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000005.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000006.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000006.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000007.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000007.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000008.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000008.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000009.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000009.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000010.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000010.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000011.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000011.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000012.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000012.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000013.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000013.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000014.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000014.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000015.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000015.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000016.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000016.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000017.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000017.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000018.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000018.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000019.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000019.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000020.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000020.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000021.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000021.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000022.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000022.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000023.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000023.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000024.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000024.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/10pc/00000025.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/US/B2/9400/9400800/image/page/full/00000025.png"}],"fallover":false},"countryName":"USA","inventorModel":{"inventors":[{"name":{"value":"JACOBSON VAN L","valueNormalised":"Jacobson Van L"},"inventorship":null},{"name":{"value":"MOSKO MARC E","valueNormalised":"Mosko Marc E"},"inventorship":null}],"inventorships":[],"unmatchedInventorships":[],"activeUserHasInventorship":false},"simpleFamilyId":194934671,"citesPatentCount":115,"countrySpec":{"countryName":"USA","description":"GRANTED PATENT AS SECOND PUBLICATION [FROM 2001 ONWARDS]","rule":"pubdate:AFTER:01-01-2001","docType":"GRANTED_PATENT"},"pageTitle":"US 9400800 B2 - Data transport by named content synchronization","documentTitle":"Data transport by named content synchronization"},"claims":{"source":"xml_claims","claims":[{"lines":["A computer-implemented method, comprising:\n
receiving, by a local computing device over a computer network, collection summaries for one or more data collections at a remote device, wherein a respective collection summary includes only a current additive hash value for each data collection, wherein a respective additive hash value represents a sum of hash values for two or more content items of a corresponding data collection;\n
comparing, for a local data collection that also exists at the remote device, a current local additive hash value for a current version of the local data collection to a current remote additive hash value for a current version of the corresponding remote data collection at the remote device;\n
in response to determining that the current remote additive hash value does not match the current local additive hash value, comparing the current remote additive hash value to one or more historical local additive hash values that were generated for a previous version of the local data collection; and\n
in response to determining that the current remote additive hash value matches a historical local additive hash value for the local collection, sending, to the remote device over the computer network, structured names for content items that have been added to the local data collection after the matching historical local additive hash value was generated."],"number":1,"annotation":false,"title":false,"claim":true},{"lines":["The method of claim 1, further comprising synchronizing structured names for the local data collection with the remote device, wherein synchronizing the structured names involves:\n
comparing the current remote additive hash value to one or more historical local additive hash values for the local data collection; and\n
responsive to determining that the received current remote additive hash value does not match a historical local additive hash value for the local data collection:\n"],"number":2,"annotation":false,"title":false,"claim":true},{"lines":["The method of claim 1, further comprising:\ndetermining a set difference between hash values for content items in the local and remote data collections;\ndetermining, based on the hash values of the set difference, structured names for content items from the local data collection that are missing from the remote device's data collection; and\nsending, to the remote device, the structured names for the identified content items.\n
receiving a filter from the remote device, wherein the filter indicates selection criteria for selecting content items that are desired by the remote device;\n
determining, from the local data collection, a set of content items that satisfy the filter's selection criteria;\n
generating the current local additive hash value using the content items that satisfy the filter's selection criteria; and\n
synchronizing structured names for the local data collection with the remote device, wherein synchronizing the structured names involves:\n"],"number":3,"annotation":false,"title":false,"claim":true},{"lines":["The method of claim 1, further comprising:\ngenerating a filtered collection of content items that includes, from the content items that satisfy the filter's selection criteria, one or more content items that are missing from the remote data collection; and\nsending structured names, for content items in the filtered collection, to the remote device.\n
sending, to the remote device, a collection summary for the local data collection;\n
receiving structured names for one or more content items stored in the remote data collection that are not in the local data collection; and\n
storing the received structured names in the local data collection."],"number":4,"annotation":false,"title":false,"claim":true},{"lines":["The method of claim 4, further comprising:\n
sending an interest packet for at least one of the received structured names, wherein the interest packet facilitates receiving a content item identified by the structured name from any computing device of a computer network that stores the content item."],"number":5,"annotation":false,"title":false,"claim":true},{"lines":["The method of claim 4, further comprising:\n
responsive to synchronizing the structured names, generating one or more additive hash values for the local data collection based on the received structured names for the content items that are not in the local data collection."],"number":6,"annotation":false,"title":false,"claim":true},{"lines":["The method of claim 1, wherein the local data collection includes one or more nested hash values, wherein a nested hash value indicates a hash value for a content item of the local data collection or for a nested collection of content items of the local data collection; and\n
wherein the received collection summary further includes one or more nested hash values of the remote data collection."],"number":7,"annotation":false,"title":false,"claim":true},{"lines":["A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method, the method comprising:\n
receiving, over a computer network, collection summaries for one or more data collections at a remote device, wherein a respective collection summary includes only a current additive hash value for each data collection, wherein a respective additive hash value represents a sum of hash values for two or more content items of a corresponding data collection;\n
comparing, for a local data collection that also exists at the remote device, a current local additive hash value for a current version of the local data collection to a current remote additive hash value for a current version of the corresponding remote data collection at the remote device;\n
in response to determining that the current remote additive hash value does not match the current local additive hash value, comparing the current remote additive hash value to one or more historical local additive hash values that were generated for a previous version of the local data collection; and\n
in response to determining that the current remote additive hash value matches a historical local additive hash value for the local collection, sending, to the remote device over the computer network, structured names for content items that have been added to the local data collection after the matching historical local additive hash value was generated."],"number":8,"annotation":false,"title":false,"claim":true},{"lines":["The storage medium of claim 8, wherein the method further comprises synchronizing structured names for the local data collection with the remote device, and wherein synchronizing the structured names involves:\n
comparing the current remote additive hash value to one or more historical local additive hash values for the local data collection; and\n
responsive to determining that the received current remote additive hash value does not match a historical local additive hash value for the local data collection:\n"],"number":9,"annotation":false,"title":false,"claim":true},{"lines":["The storage medium of claim 8, wherein the method further comprises:\ndetermining a set difference between hash values for content items in the local and remote data collections;\ndetermining, based on the hash values of the set difference, structured names for content items from the local data collection that are missing from the remote device's data collection; and\nsending, to the remote device, the structured names for the identified content items.\n
receiving a filter from the remote device, wherein the filter indicates selection criteria for selecting content items that are desired by the remote device;\n
determining, from the local data collection, a set of content items that satisfy the filter's selection criteria;\n
generating the current local additive hash value using the content items that satisfy the filter's selection criteria; and\n
synchronizing structured names for the local data collection with the remote device, wherein synchronizing the structured names involves:\n"],"number":10,"annotation":false,"title":false,"claim":true},{"lines":["The storage medium of claim 8, wherein the method further comprises:\ngenerating a filtered collection of content items that includes, from the content items that satisfy the filter's selection criteria, one or more content items that are missing from the remote data collection; and\nsending structured names, for content items in the filtered collection, to the remote device.\n
sending, to the remote device, a collection summary for the local data collection;\n
receiving structured names for one or more content items stored in the remote data collection that are not in the local data collection; and\n
storing the received structured names in the local data collection."],"number":11,"annotation":false,"title":false,"claim":true},{"lines":["The storage medium of claim 11, wherein the method further comprises:\n
sending an interest packet for at least one of the received structured names, wherein the interest packet facilitates receiving a content item identified by the structured name from any computing device of a computer network that stores the content item."],"number":12,"annotation":false,"title":false,"claim":true},{"lines":["The storage medium of claim 11, wherein the method further comprises:\n
responsive to synchronizing the structured names, generating one or more additive hash values for the local data collection based on the received structured names for the content items that are not in the local data collection."],"number":13,"annotation":false,"title":false,"claim":true},{"lines":["The storage medium of claim 8, wherein the local data collection includes one or more nested hash values, wherein a nested hash value indicates a hash value for a content item of the local data collection or for a nested collection of content items of the local data collection; and\n
wherein the received collection summary further includes one or more nested hash values of the remote data collection."],"number":14,"annotation":false,"title":false,"claim":true},{"lines":["An apparatus, comprising:\n
a communication module to receive, over a computer network, collection summaries for one or more data collections at a remote device, wherein a respective collection summary includes only a current additive hash value for each data collection, wherein a respective additive hash value represents a sum of hash values for two or more content items of a corresponding data collection;\n
a collection-comparing module to:\n\ncompare, for a local data collection that also exists at the remote device, a current local additive hash value for a current version of the local data collection to a current remote additive hash value for a current version of the corresponding remote data collection at the remote device; and\nin response to determining that the current remote additive hash value does not match the current local additive hash value, compare the current remote additive hash value to one or more historical local additive hash values that were generated for a previous version of the local data collection;\n
a collection-synchronizing module, wherein in response to determining that the current remote additive hash matches the historical local additive hash value for the local collection, the collection-synchronization module is operable to send, to the remote device over the computer network, structured names for content items that have been added to the local data collection after the matching local historical hash value was generated."],"number":15,"annotation":false,"title":false,"claim":true},{"lines":["The apparatus of claim 15, wherein the collection-comparing module is further configured to:\n
compare the current remote additive hash value to one or more historical local additive hash values for the local data collection; and\n
responsive to determining that the received current remote additive hash value does not match a historical local additive hash value for the local data collection, configure the collection-synchronizing module to:\n"],"number":16,"annotation":false,"title":false,"claim":true},{"lines":["The apparatus of claim 15, wherein the communication module is further configured to receive a filter from the remote device, wherein the filter indicates selection criteria for selecting content items that are desired by the remote device;\ndetermine a set difference between hash values for content items in the local and remote data collections;\ndetermine, based on the hash values of the set difference, structured names for content items from the local data collection that are missing from the remote device's data collection; and\nsend, to the remote device, the structured names for the identified content items.\n
wherein the apparatus further comprises a hash-generating module to:\n\ndetermine, from the local data collection, a set of content items that satisfy the filter's selection criteria; and\ngenerate the current local additive hash value using the content items that satisfy the filter's selection criteria; and\n
wherein the collection-synchronizing module is further configured to:\n"],"number":17,"annotation":false,"title":false,"claim":true},{"lines":["The apparatus of claim 15, wherein the communication module is further configured to:\ngenerate a filtered collection of content items that includes, from the content items that satisfy the filter's selection criteria, one or more content items that are missing from the remote data collection; and\nsend structured names, for content items in the filtered collection, to the remote device.\n
send, to the remote device, a collection summary for the local data collection;\n
receive structured names for one or more content items stored in the remote data collection that are not in the local data collection; and\n
store the received structured names in the local data collection."],"number":18,"annotation":false,"title":false,"claim":true},{"lines":["The apparatus of claim 18, wherein the communication module is further configured to:\n
send an interest packet for at least one of the received structured names, wherein the interest packet facilitates receiving a content item identified by the structured name from any computing device of a computer network that stores the content item."],"number":19,"annotation":false,"title":false,"claim":true},{"lines":["The apparatus of claim 18, further comprising a hash-generating module operable to generate one or more additive hash values for the local data collection in response to the communication module receiving the structured names for the content items that are not in the local data collection."],"number":20,"annotation":false,"title":false,"claim":true},{"lines":["The apparatus of claim 15, wherein the local data collection includes one or more nested hash values, wherein a nested hash value indicates a hash value for a content item of the local data collection or for a nested collection of content items of the local data collection; and\n
wherein the received collection summary further includes one or more nested hash values of the remote data collection."],"number":21,"annotation":false,"title":false,"claim":true}]}},"filters":{"npl":[],"notNpl":[],"applicant":[],"notApplicant":[],"inventor":[],"notInventor":[],"owner":[],"notOwner":[],"tags":[],"dates":[],"types":[],"notTypes":[],"j":[],"notJ":[],"fj":[],"notFj":[],"classIpcr":[],"notClassIpcr":[],"classNat":[],"notClassNat":[],"classCpc":[],"notClassCpc":[],"so":[],"notSo":[],"sat":[]},"sequenceFilters":{"s":"SEQIDNO","d":"ASCENDING","p":0,"n":10,"sp":[],"si":[],"len":[],"t":[],"loc":[]}}