Sélection de la langue

Search

Sommaire du brevet 2420008 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Brevet: (11) CA 2420008
(54) Titre français: ANALYSEUR DE MESSAGES DE PANIQUE
(54) Titre anglais: PANIC MESSAGE ANALYZER
Statut: Périmé et au-delà du délai pour l’annulation
Données bibliographiques
(51) Classification internationale des brevets (CIB):
  • G6F 11/32 (2006.01)
  • G6F 11/36 (2006.01)
(72) Inventeurs :
  • BAGG, RODERICK E. (Etats-Unis d'Amérique)
(73) Titulaires :
  • NETWORK APPLIANCE, INC.
(71) Demandeurs :
  • NETWORK APPLIANCE, INC. (Etats-Unis d'Amérique)
(74) Agent: BERESKIN & PARR LLP/S.E.N.C.R.L.,S.R.L.
(74) Co-agent:
(45) Délivré: 2012-04-03
(86) Date de dépôt PCT: 2001-09-10
(87) Mise à la disponibilité du public: 2002-03-14
Requête d'examen: 2006-08-29
Licence disponible: S.O.
Cédé au domaine public: S.O.
(25) Langue des documents déposés: Anglais

Traité de coopération en matière de brevets (PCT): Oui
(86) Numéro de la demande PCT: PCT/US2001/029049
(87) Numéro de publication internationale PCT: US2001029049
(85) Entrée nationale: 2003-02-25

(30) Données de priorité de la demande:
Numéro de la demande Pays / territoire Date
09/658,208 (Etats-Unis d'Amérique) 2000-09-08

Abrégés

Abrégé français

L'invention se rapporte à un procédé et à un système d'acquisition et d'analyse automatique de messages d'erreur en provenance d'utilisateurs finaux de produits logiciels et matériels. L'invention se rapporte également à un procédé et à un système permettant d'élaborer des solutions pour la correction automatique et manuelle des erreurs. Une base de données d'erreurs et de solutions, dont la taille croît constamment, est gérée de sorte que des problèmes identiques ou similaires sont résolus de manière accélérée sans intervention humaine. Une analyse réussie à tout niveau excepté au niveau le plus bas permet automatiquement au niveau précédent de bénéficier d'une plus grande efficacité pour l'analyse future d'erreurs identiques ou similaires.


Abrégé anglais


The invention provides a method and system for automatically obtaining and
analyzing error messages from end users of software and hardware products.
Additionally, the invention provides a method and system of providing
solutions that automatically and manually correct the errors. An ever-growing
database of errors and solutions is maintained so that future identical or
similar problems are expedited without human intervention. Successful analysis
at any but the lowest level automatically allows previous levels to be taught
greater efficiency for future analysis of the same or similar errors.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CLAIMS:
1. A method comprising:
receiving a panic message including information regarding a failure
event of a storage server and a mini core dump of the storage server, the mini
core dump representing less than all of a complete core dump of the storage
server, wherein the mini core dump contains a back trace of a sequence of
executed program instructions and additional information including contents of
a random access memory of the storage server;
applying a set of rules to the panic message and information extracted
from the mini core dump to attempt to identify a bug in the storage server;
determining that applying the set of rules to the panic message and the
information extracted from the mini core dump has failed to identify the bug;
in response to determining that applying the set of rules to the panic
message and the information extracted from the mini core dump has failed to
identify the bug, obtaining and analyzing a complete core dump of the storage
server to identify the bug; and
generating an action in response to identifying the bug.
2. The method of claim 1, wherein the panic message includes an address
value and source code.
3. The method of claim 2, wherein the address value in the panic message is
an address of where the storage server was last operating.
4. The method of claim 2, wherein the panic message is responsive to an
operation taken by a user of the storage server.
5. The method of claim 4, wherein the operation is electronic transfer of the
panic message from the user to a manufacturer of the storage server via a
communications network.
6. The method of claim 5, wherein the panic message includes a product
release version as entered by the user.
13

7. The method of claim 1, wherein applying the set of rules comprises
comparing the panic message against a first database of known bugs.
8. The method of claim 7, wherein applying the set of rules further comprises
identifying the panic message as matching a known bug in the first database.
9. The method of claim 8, wherein the known bug is linked to solutions
associated with a version.
10. The method of claim 9, wherein a solution is extracted from the solutions
by matching a version entered by the user to the version associated with the
known bug.
11. The method of claim 1, wherein the action is delivery of a solution to a
user of the storage server.
12. The method of claim 1, wherein the action comprises recording statistics
to a second database.
13. The method of claim 12, wherein the statistics comprise information
related to the message.
14. The method of claim 1, wherein applying the set of rules comprises
analyzing the back trace.
15. A server system comprising:
a processor,
a bugs database containing information about known bugs; and
a memory storing instructions which, when executed by the processor,
cause the server system to perform a process that comprises:
receiving a panic message including information regarding a
failure event in a client system and a mini core dump of the client system,
the
mini core dump representing less than all of a complete core dump of the
14

client system, wherein the mini core dump contains a back trace of a
sequence of executed program instructions and additional information
including contents of a random access memory of the storage server;
applying the panic message and information extracted from the
mini core dump to the bugs database to attempt to identify a bug in the client
system;
determining that applying the panic message and the
information to the bugs database has failed to identify the bug;
in response to determining that applying the panic message and
the information extracted from the mini core dump to the bugs database has
failed to identify the bug, requesting and analyzing a complete core dump of
the client system to identify the bug; and
generating an action in response to identifying the bug.
16. The server system of claim 15, wherein the process comprises analyzing
the back trace.
17. The server system of claim 15, wherein the panic message includes an
address value and source code.
18. The server system of claim 15, wherein the panic message is responsive
to an operation taken by a user of the client system.
19. The server system of claim 18, wherein the operation is electronic
transfer of the panic message from the user to a manufacturer via a
communications network.
20. The server system of claim 19, wherein the panic message includes a
product release version as entered by the user.
21. The server system of claim 20, wherein applying the panic message and
the mini core dump to the bugs database comprises identifying the panic
message as matching a known bug in the first database.

22. The server system of claim 21, wherein the known bug is linked to
solutions associated with a version.
23. The server system of claim 22, wherein a solution is extracted from the
solutions by matching a version entered by a user to the version associated
with the known bug.
24. The server system of claim 15, wherein the action is delivery of a
solution to a user.
25. The server system of claim 15, wherein the action comprises recording
statistics to a second database.
26. The server system of claim 25, wherein the statistics comprise
information related to the message.
16

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
PANIC MESSAGE ANALYZER
Background of the Invention
1. Field of the invention
This invention relates to analysis of panic messages from network servers.
2. Related Art
Computers rely on programmed instructions to direct their operation. General
purpose computers most often receive these instructions from software that
executes within
their memory. Despite the fact that software engineers vigorously test
programs to eliminate
the presence of coded instructions that may cause errors (commonly known as
bugs), the
presence of bugs is practically unavoidable in simple programs and a foregone
conclusion in
complex programs.
When a computer executes a program instruction that causes an error, the
error may have relatively no effect on the system, or the error may cause the
system to crash.
All errors are of importance to software engineers, however, those that cause
a catastrophic
result, such as a crash, are of primary importance. Generally, systems are
designed to
provide an alert to a system operator that they have suffered some type of
failure. Error
messages provide this alert, and these messages are useful when reporting
errors to a
manufacturer of the software.
A first known method to enable reporting of a software application error is to
provide a pre-public release of a software package to a select group customers
for "beta
testing." During this trial period, customers report to the company any
problems that they
encounter and the software engineers at the company fix the bugs and provide
updated
versions of the software to the beta testers who continue testing with the new
version. This
process continues for a short testing period until the software is hopefully
error free.
1

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
While this first known method provides reporting of software bugs to a
manufacturer it suffers from several drawbacks. First, it provides no method
for
automatically reporting the problem to the manufacturer. It relies solely on
the beta tester to
inform the manufacturer. Second, it provides no automated analysis of a
problem identified
by a beta tester. That is, it requires an employee at the manufacturer to
determine whether
the problem has already been reported, fixed, or is a new problem. Third, it
provides no
method for delivery of updated software to a user who is determined to be
using older
software with an identified and fixed problem.
A second known method of reporting computer system errors is to rely on the
end user to call the manufacturer and report a problem when it occurs. The
customer is
provided a customer support line that they may call to report problems they
are having.
Based on the frequency and subject matter of calls received, the manufacturer
may conclude
there is a problem with some portion of a program.
While this second known method provides reporting of software bugs to a
manufacturer it suffers from several drawbacks. First, the customer may decide
not to call as
customer support calls tend to involve long waits on hold listening to musak
and often
provides no relief as the manufacturer has no formal structure in place to
coordinate and
analyze the calls they receive. Second, the customer may not be knowledgeable
enough to
provide the manufacturer with the necessary information they need to diagnose
the problem,
or worse, they may misinform the manufacturer as to the origin of the problem.
Accordingly, it would be advantageous to provide a method for computer
system errors to be reliably reported to a manufacturer in such a manner that
the process is
automated to the level of determining whether the problem is known or unknown.
And, if
the problem is known, providing channels for delivery of updated software to
clients, and if
unknown, providing a method to obtain and analyze necessary information from
the suspect
system to enable diagnosis and correction of the errors.
2

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
Summary of the Invention
The invention includes a system and method for analyzing panic messages
from computer systems that have suffered failures. One of the last processes a
filer (server
dedicated to file storage and retrieval) performs before it crashes is to
render a panic
message. This message is indicative of the problem that caused the filer to
crash. This
message is sent to the manufacturer via a communications network such as the
Internet. The
message also includes other information, such as the user's name, the version
of the
software, a back trace, and a mini core dump.
At the manufacturer, automatic analysis commences to determine if the bug
can be identified. First, the panic message is analyzed by comparing it
against a database of
panic messages that correspond with known bugs. If successful, automated
housekeeping
occurs which includes updating this instance in a tracking database, delivery
of an answer to
the customer (including solutions), updating analysis statistics, and
additional activities. If
unsuccessful the process continues.
Second, a back trace analyzer analyzes the back trace using an expression
algorithm that looks for exact matches on function names and recognized
sequences of
matches that correspond to known bugs. If successful, automated housekeeping
occurs as
indicated above. If unsuccessful, the process continues.
Third, a core script analyzer analyzes a core dump for recognizable patterns
of code that correspond to known bugs. If successful, automated housekeeping
occurs as
indicated above If unsuccessful the process continues.
Fourth, if the automated methods above fail to identify the problem as a
known bug, the core in manually analyzed to detect known and unknown bugs.
Manual and
automatic housekeeping is performed following this manual analysis.
Brief Description of the Drawings
Figure 1 illustrates a block diagram of a system for a panic message analyzer.
3

CA 02420008 2010-04-27
Figure 1 B is a block diagram illustrating the core dump of Figure 1.
Figure 2 illustrates a panic message analyzer process in a system for a panic
message analyzer.
Figure 3 illustrates an auto support process in a system for a panic message
analyzer.
Figure 4 illustrates a core dump process in a system for a panic message
analyzer.
Detailed Description of the Preferred Embodiment
In the following description, a preferred embodiment of the invention is
described with regard to preferred process steps and data structures.
Embodiment of the invention can be implemented using general purpose
processors or special purpose processors operating under program control, or
other circuits, adapted to particular process steps and data structures
described herein. Implementation of the process steps and data structures
described herein would not require undue experimentation or further
investigation.
Lexicography
The following terms refer to or relate to aspects of the invention as
described below. The descriptions of general meanings of these terms are not
intended to be limiting, only illustrative.
= filer- This term refers to a file server. A file server is a computer and
storage device dedicated to data storage and retrieval.
= Core dump- A core dump is the printing or the copying to a more
permanent medium (such as a hard disk) the contents of random access
memory at one moment in time.
4

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
= Mini core dump - A subset of data from a core dump.
= Back-trace - A list of computer instructions in the reverse order they were
executed.
As noted above, these descriptions of general meanings of these terms are not
intended to be limiting, only illustrative. Other and further applications of
the invention,
including extensions of these terms and concepts, would be clear to those of
ordinary skill in
the art after perusing this application. These other and further applications
are part of the
scope and spirit of the invention, and would be clear to those of ordinary
skill in the art,
without further invention or undue experimentation.
System Elements
Figure 1 shows a block diagram of a system for a panic message analyzer.
A system 100 includes a client device 110 associated with a customer, a
communications link 120, a communications network 130, a server device 140
associated
with a manufacturer, a mass storage 150, a housekeeping database 151, a bugs
database
152, and a core dump 160.
The client device 110 includes a processor, a main memory, and software for
executing instructions (not shown, but understood by one skilled in the art).
Although the
client device 110 and server device 140 are shown as separate devices there is
no
requirement that they be separate devices.
The communications link 120 operates to couple the client device 110 to the
communications network 130.
The server device 140 includes a processor, a main memory, software for
executing instructions (not shown, but understood by one skilled in the art),
and a mass
storage 150. Although the client device 110 and server device 140 are shown as
separate
devices there is no requirement that they be separate devices. Additionally,
although the
5

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
server device 140 and mass storage 150 are shown as combined there is no
requirement
that they be combined. They could be separate devices.
The mass storage 150 includes the housekeeping database 151 and bugs
database 152.
The core dump 160 includes a mini core dump 161, a back-trace 162, and
a panic message 163.
Method of Operation - Manual Message Processing
Figure 2 illustrates a panic message analyzer process, indicated by general
reference character 200. The manual panic message analyzer process 200
initiates at a `start'
terminal 201. The panic message analyzer process 200 continues to a `panic
message
created' procedure 203 which allows the customer's device to create a panic
message 163
prior to failure.
A `customer submits panic message' procedure 205 allows the customer to
submit the panic message 163 for analysis utilizing the client device 110 to
transmit the
panic message 163 to the server device 140. In a preferred embodiment, the
customer
submits the message via interaction and transfer over an Internet connection
which is well-
known in the art. There is, however, no requirement the panic message 163 be
transferred
by this method as long as it is delivered to the manufacturer.
An `analyze panic message' procedure 207 allows the panic message 163 to
be analyzed by comparing recognized data elements it contains (a panic message
includes
the address of where a system was last operating, line numbers, text and
source code
filenames, and other data) against known data elements that correspond to
known bugs in the
bugs database 152 on the server device 140.
A `known bug?' decision procedure 209 determines whether the panic
message identifies a known bug. If the "known bug?' decision procedure 209
determines
6

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
that the bug is a known bug, the panic message analyzer process 200 continues
to a "solution
to customer' 'Procedure 213.
An `investigate via auto support' procedure 211 takes note that analysis of
the
customer-submitted panic message 163 failed to identify the problem with the
affected
system and that further investigation is required. The panic message analyzer
process 200
continues to an "automatic housekeeping" procedure 215.
The `solution to customer' procedure 213 extracts a solution from the
database which is associated with the bug identified by the `known bug'
decision procedure
209. The solution provided to the customer can be written instructions
detailing how to fix
and avoid further occurrences, a copy of a software program to fix the
problem, or
recommendations for the purchase of additional products from the manufacturer
that fix the
problem.
An `automatic housekeeping' procedure 215 records all relevant information
regarding identification/non-identification of the bug, the solution sent to
the customer (if
any), and statistics relating to these events in the housekeeping database
151. If the panic
message analyzer failed to diagnose the problem, the `automatic housekeeping'
procedure
leaves the case active (i.e. marked as unresolved).
Method of Operation - Auto Support Analysis
Figure 3 illustrates an auto support process, indicated by general reference
character 300. The auto support process 300 initiates at a `start' terminal
301. The auto
support process 300 continues to an `auto support message sent' procedure 303
which allows
the client device 110 to automatically send a message to the sever device 140
containing a
copy of the panic message 163 and mini core dump 161.
An `auto support message received' procedure 305 allows the server device
140 to receive the panic message 163 and mini core dump 161 from the client
device 110.
7

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
An `analyze panic message' procedure 307 allows the panic message 163 to
be analyzed by comparing recognized data elements it contains (a panic message
includes
the address of where a system was last operating, line numbers, text and
source code
filenames, and other data) against known data elements that correspond to
known bugs in the
bugs database 152 on the server device 140.
A 'known panic bug?' decision procedure 309 determines whether the panic
message identifies a known bug. If the "known bug?' decision procedure 209
determines
that the bug is a known bug, the panic message analyzer process 200 continues
to a "discard
mini core dump" procedure 321.
An `extract back-trace' procedure 311 extracts the back-trace 162 from the
mini core dump 161.
An `analyze back-trace' procedure 313 allows the back-trace 162 to be
analyzed using an expression algorithm that looks for exact matches on
function names and
recognized sequences of function names that correspond to known bugs in the
bugs
database 152 on the server device 140.
A `known back-trace bug?' decision procedure 315 determines whether the
back-trace 162 identifies a known bug. If the `known back-trace bug?' decision
procedure
315 determines that the bug is a known bug, the auto support process 300
continues to a
"discard mini core dump" procedure 321.
A `request core dump' 317 procedure notifies the customer that a core dump
160 of the affected system is required. This notification includes all the
instructions
necessary to create the core dump 160 and deliver it to the manufacturer. In a
preferred
embodiment, the notification would be sent electronically to the customer;
however, there is
no requirement that notification be accomplished in this manner.
An `automatic housekeeping' procedure 319 records all relevant information
regarding identification/non-identification of the bug, the solution sent to
the customer (if
any), and statistics relating to these events in the housekeeping database
151. If the panic
8

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
message analyzer failed to diagnose the problem, the `automatic housekeeping'
procedure
leaves the case active (i.e. marked as unresolved).
Additionally, if the bug was identified by analysis of the back-trace,
functionality exists that allows the back-trace analyzer to teach the panic
message analyzer
about the bug. This allows future instances of the bug to be resolved at an
earlier stage.
For example, if the bug first appeared in version one of the software at line
10, the panic message analyzer would not identify it in version two if the bug
now appeared
at line 20 due to the exact matching methodology used. The back-trace
analyzer, however,
might identify the bug as it uses a more sophisticated approach, and it would
then pass this
information to the panic message analyzer. The auto support process 300
terminates through
an `end' terminal 325.
A `discard mini core dump' procedure 321 causes the mini core dump 161 to
be discarded as it is no longer needed due to identification of the bug.
A `solution sent to customer' procedure 323 causes a solution to be extracted
from the bugs database 152 which is associated with the identified bug. The
solution
provided to the customer varies depending on the bug identified. For example,
it can be
written instructions detailing how to fix and avoid further occurrences, a
copy of a software
program to fix the problem, or recommendations for the purchase of additional
products
from the manufacturer that fix the problem.
The auto support process 300 continues to an `automatic housekeeping'
procedure 319.
Method of Operation - Core Dump Analysis
Figure 4 illustrates a core dump process, indicated by general reference
character 400. The core dump process 400 initiates at a `start' terminal 401.
The core dump
process 400 continues to a `core arrives from customer' procedure 403 which
allows analysis
9

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
of the core dump 160 to begin. The core dump 160 is requested by a' request
core dump'
procedure 317 (illustrated in Figure 3) when prior analysis of the panic
message 163 and
back-trace 162 have failed. These two analysis techniques, however, are
duplicated during
the core dump process 400 further providing fail-safe systematic analysis.
An `analyze panic message' procedure 405 allows the panic message 163 to
be analyzed by comparing recognized data elements it contains (a panic message
includes
the address of where a system was last operating, line numbers, text and
source code
filenames, and other data) against known data elements that correspond to
known bugs in the
bugs database 152 on the server device 140.
A 'known panic bug?' decision procedure 407 determines whether the panic
message identifies a known bug. If the "known bug?' decision procedure 407
determines
that the bug is a known bug, the core dump process 400 continues to a "store
core dump"
procedure 423.
An `extract back-trace' procedure 409 extracts the back-trace 162 from the
core dump 160.
An `analyze back-trace' procedure 411 allows the back-trace 162 to be
analyzed using an expression algorithm that looks for exact matches on
function names and
recognized sequences of function names that correspond to known bugs within
the bugs
database 152.
A `known back-trace bug?' decision procedure 413 determines whether the
back-trace 162 identifies a known bug. If the `known back-trace bug?' decision
procedure
413 determines that the bug is a known bug, the core dump process 400
continues to a `store
core dump' procedure 423.
A `core script analyzer' procedure 415 automatically analyzes the core dump
160 by searching for data elements in the core dump 160 that correspond to
known bugs
within the bugs database 152.

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
A `known core bug?' decision procedure 417 determines whether core script
analysis has identified a known bug. If the `known core bug?' decision
procedure 417
determines it has identified a known core bug, the core dump process 400
continues to a
`store core dump' procedure 423.
A `manual core dump analysis' procedure 419 allows the core dump 160 to
be analyzed manually by personnel at the manufacturer.
A `manual solution sent to customer' procedure 421 allows personnel at the
manufacturer to send a solution to the customer based on the manual analysis
of the core
dump 160. The core dump process 400 continues to a "automatic housekeeping"
procedure
427.
A `store core dump' procedure 423 allows the mini core dump 161 to be
moved to a storage location.
A `solution sent to customer' procedure 425 causes a solution to be extracted
from the bugs database 152 which is associated with the identified bug. The
solution
provided to the customer varies depending on the bug identified. For example,
it can be
written instructions detailing how to fix and avoid further occurrences, a
copy of a software
program to fix the problem, or recommendations for the purchase of additional
products
from the manufacturer that fix the problem.
An `automatic housekeeping' procedure 427 records all relevant information
regarding identification/non-identification of the bug, the solution sent to
the customer (if
any), statistics relating to these events, and any entries necessary to the
bugs database 152.
Additionally, if the bug was identified by analysis of the back-trace,
functionality exists that allows the back-trace analyzer to teach the panic
message analyzer
about the bug. This allows future instances of the bug to be resolved at an
earlier stage.
11

CA 02420008 2003-02-25
WO 02/21281 PCT/US01/29049
Furthermore, if the bug was identified by analysis of the core, functionality
exists that allows the core to teach the back-trace analyzer and panic message
analyzer about
the bug. This allows future instances of the bug to be resolved at an earlier
stage.
The core dump process 400 terminates through an `end' terminal 429.
Generality of the Invention
The invention has general applicability to various fields of use, not
necessarily related to the services described above. For example, these fields
of use can
include one or more of, or some combination of, the following:
= In addition to general applicability to file servers the invention has broad
applicability to
networks, network devices, and all types of software. Other and further
applications of
the invention, in its most general form, will be clear to those skilled in the
art after
perusal of this application, and are within the scope and spirit of the
invention.
Alternate Embodiments
Although preferred embodiments are disclosed herein, many variations are
possible which remain within the concept, scope, and spirit of the invention,
and these
variations would become clear to those skilled in the art after perusal of
this application.
12

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Le délai pour l'annulation est expiré 2016-09-12
Lettre envoyée 2015-09-10
Accordé par délivrance 2012-04-03
Inactive : Page couverture publiée 2012-04-02
Inactive : Taxe finale reçue 2012-01-13
Préoctroi 2012-01-13
Un avis d'acceptation est envoyé 2011-12-29
Lettre envoyée 2011-12-29
month 2011-12-29
Un avis d'acceptation est envoyé 2011-12-29
Inactive : Approuvée aux fins d'acceptation (AFA) 2011-12-20
Inactive : Demande ad hoc documentée 2011-09-06
Inactive : Supprimer l'abandon 2011-09-06
Inactive : Abandon. - Aucune rép dem par.30(2) Règles 2011-06-08
Modification reçue - modification volontaire 2011-06-01
Inactive : Dem. de l'examinateur par.30(2) Règles 2010-12-08
Modification reçue - modification volontaire 2010-04-27
Inactive : Dem. de l'examinateur par.30(2) Règles 2009-11-04
Modification reçue - modification volontaire 2008-07-04
Inactive : Dem. de l'examinateur par.30(2) Règles 2008-01-30
Inactive : IPRP reçu 2007-10-02
Modification reçue - modification volontaire 2007-03-27
Inactive : Dem. de l'examinateur par.30(2) Règles 2006-12-28
Modification reçue - modification volontaire 2006-11-09
Lettre envoyée 2006-09-22
Toutes les exigences pour l'examen - jugée conforme 2006-08-29
Exigences pour une requête d'examen - jugée conforme 2006-08-29
Requête d'examen reçue 2006-08-29
Inactive : CIB de MCD 2006-03-12
Inactive : Page couverture publiée 2003-05-05
Inactive : Notice - Entrée phase nat. - Pas de RE 2003-04-30
Lettre envoyée 2003-04-30
Demande reçue - PCT 2003-03-21
Exigences pour l'entrée dans la phase nationale - jugée conforme 2003-02-25
Exigences pour l'entrée dans la phase nationale - jugée conforme 2003-02-25
Demande publiée (accessible au public) 2002-03-14

Historique d'abandonnement

Il n'y a pas d'historique d'abandonnement

Taxes périodiques

Le dernier paiement a été reçu le 2011-08-22

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Les taxes sur les brevets sont ajustées au 1er janvier de chaque année. Les montants ci-dessus sont les montants actuels s'ils sont reçus au plus tard le 31 décembre de l'année en cours.
Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Historique des taxes

Type de taxes Anniversaire Échéance Date payée
Taxe nationale de base - générale 2003-02-25
TM (demande, 2e anniv.) - générale 02 2003-09-10 2003-02-25
Enregistrement d'un document 2003-02-25
TM (demande, 3e anniv.) - générale 03 2004-09-10 2004-08-19
TM (demande, 4e anniv.) - générale 04 2005-09-12 2005-08-17
TM (demande, 5e anniv.) - générale 05 2006-09-11 2006-08-23
Requête d'examen - générale 2006-08-29
TM (demande, 6e anniv.) - générale 06 2007-09-10 2007-08-24
TM (demande, 7e anniv.) - générale 07 2008-09-10 2008-08-29
TM (demande, 8e anniv.) - générale 08 2009-09-10 2009-08-27
TM (demande, 9e anniv.) - générale 09 2010-09-10 2010-08-24
TM (demande, 10e anniv.) - générale 10 2011-09-12 2011-08-22
Taxe finale - générale 2012-01-13
TM (brevet, 11e anniv.) - générale 2012-09-10 2012-08-17
TM (brevet, 12e anniv.) - générale 2013-09-10 2013-08-19
TM (brevet, 13e anniv.) - générale 2014-09-10 2014-09-08
Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
NETWORK APPLIANCE, INC.
Titulaires antérieures au dossier
RODERICK E. BAGG
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document (Temporairement non-disponible). Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(yyyy-mm-dd) 
Nombre de pages   Taille de l'image (Ko) 
Page couverture 2012-03-05 2 46
Description 2003-02-24 12 544
Revendications 2003-02-24 5 166
Abrégé 2003-02-24 2 61
Dessin représentatif 2003-02-24 1 16
Dessins 2003-02-24 3 61
Page couverture 2003-05-04 1 41
Revendications 2003-02-25 5 169
Revendications 2007-03-26 5 125
Revendications 2008-07-03 5 144
Description 2010-04-26 12 543
Revendications 2010-04-26 4 126
Dessins 2010-04-26 4 67
Revendications 2011-05-31 4 119
Dessin représentatif 2012-03-05 1 11
Avis d'entree dans la phase nationale 2003-04-29 1 189
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2003-04-29 1 107
Rappel - requête d'examen 2006-05-10 1 125
Accusé de réception de la requête d'examen 2006-09-21 1 176
Avis du commissaire - Demande jugée acceptable 2011-12-28 1 163
Avis concernant la taxe de maintien 2015-10-21 1 170
PCT 2003-02-24 2 64
Taxes 2006-08-22 1 38
Taxes 2007-08-23 1 39
PCT 2003-02-25 11 417
Taxes 2008-08-28 1 38
Taxes 2009-08-26 1 200
Taxes 2010-08-23 1 200
Taxes 2011-08-21 1 202
Correspondance 2012-01-12 1 41