Welcome!

Industrial IoT Authors: Pat Romanski, William Schmarzo, Elizabeth White, Stackify Blog, Yeshim Deniz

Related Topics: Industrial IoT

Industrial IoT: Article

Patent Mining Using XML

Patent Mining Using XML

We developed a "patent mining" tool for our company utilizing XML. Corporate leaders wanted to provide company-wide browser access to our corporate patent portfolio as well as in-depth analysis of our patent data. They saw this as a way to assist our company in strategic and investment decisions and to encourage innovation and collaboration.

The highly structured format of patent data led easily to a hierarchical representation in XML. The use of XML made programming simpler. We only had to load the XML document containing the patents into a browser, so there was no need to extract from a database. In addition, we were able to present the same XML data in multiple ways, using various XSL stylesheets. XML provided a very straightforward, inexpensive, and effective way to meet this requirement for patent mining.

Packaged software is available that imposes structure on a company's content, making it easily searchable and capable of being displayed in various ways in a browser. For this application, however, the volume is relatively low; our company currently has only a few hundred patents totaling about 10MB of data. The content is fairly static; the issued patent data rarely changes, and relatively few new patents are added each month. And the number of concurrent users will remain low.

Because of these factors, we decided we could safely avoid purchasing any content management, database, or other software.

Implementation Steps
The U.S. Patent and Trademark Office (USPTO) provides downloadable access to all patents that have been issued. We wrote a script to access the USPTO Web site, search for our company's patents, and then download them. Once we had them all together, we identified the consistent structure throughout. Listing 1 shows the XDR Schema we created to model the XML markup (all code references in this article can be downloaded at www. sys-con.com/xml/source.cfm).

The header section of a patent contains field data such as patent number, title, issue date, and assignee. The header data also includes repeating groups such as inventors, references cited, and classes. The detailed body of the patent, which includes the "claim" of the patent and a lengthy description, consists largely of unstructured text.

After downloading the patents, analyzing their structure, and creating a schema from them, we were ready to mark them up with XML. To expedite the markup process we wrote a Perl script to tag the structured fields with XML. This was fairly easy to parse with Perl due to the rigid structure of the data.

Figure 1 shows the first page of a patent as it appears on the USPTO site. Listing 2 is the same patent data after being downloaded and marked up with XML. Figure 2 shows the same patent again as displayed in our tool using XSL; it's deliberately similar to the USPTO presentation because we intended to duplicate that look and feel.

The home page of our application lists the critical information for all current patents: patent number, issue date, title, inventor. From this a user is able to click on a patent number and see the detail of an individual patent, such as the one shown in Listing 2. We also created a page that provides field searches and a keyword search of all corporate patents. We used XPath queries to perform the field searches; for keyword search we used regular expression pattern matching. A citation analysis diagram displays which patents reference a patent and which are referenced by a patent. A class distribution histogram groups the patents according to the USPTO classification scheme.

Mining Unstructured Data
Patent mining starts with searchable access to the patent data, but more in-depth analysis requires mining of the unstructured claims and description data in the body of the patent. We ran various cluster analysis programs against the unstructured data and converted the output of these programs into XML. We then displayed the data in various ways using XSL. For example:

  • Relevance matrix diagram: Uses an algorithm that analyzes overlap in word content and clusters the content accordingly
  • Optimized cluster analysis diagram: Clusters the patents into 20 categories based on word usage
  • Molecule diagram: Shows the clustering in molecules connected to each other based on relevance
Design Decisions
We originally planned to make the patent mining tool a client-side application, which seemed like the simplest and most straightforward route. A client-side application involves downloading the XML data onto each desktop browser, parsing the XML, caching the data in memory, and then transforming it by XSL, all on the client. Some functions, such as keyword search, require loading all 10MB of the data onto the desktop, which became a performance bottleneck. (After the first time, however, the data was cached.)

An additional client-side drawback was that to make effective use of XSLT, each client had to have XSLT installed. Yet many Microsoft Internet Explorer users don't yet have MSXML parser 3.0 or above, which is required for XSLT. So we had to backtrack and use the more limited functionality of XSL (a standard component of IE 4.0 and above) on the client desktop.

We'll soon be converting our application to server-side processing, wherein all the processing takes place on the server and only the resultant HTML is sent to the client. Then we won't have a bandwidth/download problem, since the 10MB of data remains on the server. As there's also a persistent DOM (loaded once into cache) ready for processing on the server, performance and scalability are increased. And the processing is no longer browser-dependent. We don't need to be concerned about whether the client Internet Explorer can handle XSLT, or whether the client browser may even be Netscape, which has limited XML support.

*  *  *

For more complete patent mining functionality, including more analytical tools, we may still buy packaged software. If we decide to expand the scope of patents to include all similar patents issued by the USPTO, which could number in the tens of thousands, we'll definitely need a database. In the short term, however, we have a useful application founded on XML that our company can use to perform basic patent mining.

More Stories By Joseph Moeller

Joseph Moeller is a consultant specialist, working in the Enterprise Information Technology division of EDS. One initiative of EIT is Knowledge Management, which addresses the identification, growth, and reuse of the enterprise's intellectual captial. Joseph Moeller has worked for EDS for 20 years, and currently works in EDS Austin Innovation Lab, which has made XML an important part of their strategic direction.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...