Patent 11349787
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Active provider: Google · gemini-2.5-pro
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Defensive Disclosure and Prior Art Derivations for U.S. Patent 11,349,787
Date of Disclosure: April 28, 2026
Disclosing Party: (Fictional) Advanced Technology Research Collective
Subject Matter: Derivative implementations and extensions of the system described in U.S. Patent 11,349,787, intended to enter the public domain and serve as prior art against future patent applications on similar technologies.
1. Material & Component Substitution
Derivative 1.1: Volatile In-Memory Cache with Ephemeral Identifiers
Enabling Description: This variation replaces the "persistent data store" (as claimed in Claim 1) with a volatile, in-memory distributed cache system like Redis or Memcached. The "conversation identifier" is generated with a short Time-To-Live (TTL), for example, 300 seconds. If the conversation is inactive beyond the TTL, the identifier and all associated messages are purged automatically. This architecture is optimized for high-throughput, ephemeral conversations where long-term storage is undesirable, such as for one-time password verification or temporary support chats. The system uses a CRDT (Conflict-free Replicated Data Type) model to ensure eventual consistency across cache nodes without relying on a central persistent database for the live conversation data.
Mermaid Diagram:
sequenceDiagram participant User as Web Browser (Unauthenticated) participant Server as Communication Gateway participant Cache as Redis Cluster (Volatile) participant Responder as Responder's Device User->>Server: POST /initiate_request Server->>Cache: SETEX conv_id_123 300 "session_data" Server-->>User: 200 OK (with conv_id_123) Server->>Responder: PUSH "New request from anonymous user" Responder-->>Server: POST /reply (conv_id_123) Server->>Cache: APPEND conv_id_123 "responder_msg" Server-->>User: SSE/WebSocket PUSH "responder_msg" Note over Cache: After 300s of inactivity, key "conv_id_123" is auto-purged.
Derivative 1.2: Serverless Architecture with Function-as-a-Service (FaaS)
Enabling Description: This implementation replaces a monolithic server processor with a serverless architecture using cloud functions (e.g., AWS Lambda, Google Cloud Functions). Each step of the communication flow—receiving the initial request, generating an ID, routing to a responder, and processing replies—is handled by a separate, stateless function. The state (conversation history) is maintained in a high-performance NoSQL database like DynamoDB or Firestore, which is accessed by each function using the conversation identifier as the primary key. This component substitution provides extreme scalability and cost-efficiency, as compute resources are only consumed during active message processing. The communication protocol between functions is managed via a message queue like SQS or Pub/Sub.
Mermaid Diagram:
flowchart TD A[Web Browser] -- HTTPS Request --> B(API Gateway) B -- Triggers --> C{ReceiveRequest Function}; C -- Writes to --> D[NoSQL DB: Create Conversation]; C -- Publishes to --> E[Message Queue: New Request Topic]; F{RouteToResponder Function} -- Subscribes to --> E; F -- Reads from --> D; F -- Sends via SMS/Email Gateway --> G[Responder]; G -- Replies via Webhook --> B; B -- Triggers --> H{ProcessReply Function}; H -- Writes to --> D[NoSQL DB: Append Message]; H -- Publishes to --> I[Message Queue: New Reply Topic]; J{NotifyUser Function} -- Subscribes to --> I; J -- Pushes via WebSocket --> A;
2. Operational Parameter Expansion
Derivative 2.1: High-Frequency, Low-Latency Industrial Control Application
Enabling Description: This derivative applies the core invention to a high-frequency industrial control environment. An unauthenticated remote diagnostic tool (the "initiator") communicates with a protected SCADA system (the "responder") through the gateway. The "conversation" consists of telemetry data points and control commands exchanged at a rate exceeding 100 Hz. The conversation identifier is a high-entropy token valid for a single session. The system operates under strict low-latency constraints (<10ms round trip). To achieve this, the server uses a real-time operating system (RTOS) and communicates with both endpoints using a lightweight binary protocol over UDP instead of HTTP. The persistent store is a time-series database (e.g., InfluxDB) optimized for high-speed writes and queries.
Mermaid Diagram:
stateDiagram-v2 [*] --> SessionInit SessionInit: Remote Tool sends UDP packet with API key SessionInit --> Handshake: Gateway validates key, generates session token Handshake --> Streaming: Gateway opens UDP channels to Tool and SCADA state Streaming { direction LR [*] --> Telemetry Telemetry: SCADA sends data point Telemetry --> Command: Gateway forwards to Tool Command: Tool sends control command Command --> Telemetry: Gateway forwards to SCADA } Streaming --> SessionEnd: Timeout or explicit close packet SessionEnd --> [*]
Derivative 2.2: Large-Scale Asynchronous Civic Engagement Platform
Enabling Description: The system is scaled to handle millions of concurrent, slow-burn conversations between citizens (initiators) and government agencies (responders). A citizen can anonymously submit a civic issue report from a web portal. The system generates a conversation ID and routes the report to the appropriate municipal department's work queue. The conversation may last for weeks or months. The "responder" is not a single person but a team, and responses are asynchronous (e.g., via email or a dedicated portal update). The data store is a distributed ledger or blockchain to ensure a tamper-proof public record of the interaction without revealing the citizen's identity, using zero-knowledge proofs to validate user status (e.g., "is a resident of this district") without PII disclosure.
Mermaid Diagram:
erDiagram CITIZEN ||--o{ REPORT : submits REPORT { string reportID string conversationID string issue_details timestamp created_at } REPORT ||--|{ MESSAGE : contains MESSAGE { string messageID string content string author_role (citizen, agency) timestamp sent_at } REPORT ||--|{ AGENCY_QUEUE : routed_to AGENCY_QUEUE { string queueID string department_name } CONVERSATION_LEDGER { string conversationID string reportID string encrypted_message_hash string block_hash } REPORT }|--|| CONVERSATION_LEDGER : is_recorded_on
3. Cross-Domain Application
Derivative 3.1: Aerospace - Anonymous In-Flight Anomaly Reporting
Enabling Description: An in-flight system (e.g., an Electronic Flight Bag used by a pilot or cabin crew) acts as the unauthenticated initiator. When a non-critical anomaly is observed (e.g., a software glitch in the entertainment system, unusual cabin noise), the crew member can submit a report through a dedicated interface. The system, hosted on a ground server via a satellite link, anonymizes the report's origin (masking the specific aircraft tail number) and assigns a conversation ID. It then routes the report to the relevant ground-based engineering team (the responder) via their standard enterprise messaging tool (e.g., Slack, Microsoft Teams). The engineers can ask for clarifying details, and the responses are routed back to the EFB interface, allowing for a real-time, anonymous dialogue to diagnose the issue without creating an official, discoverable maintenance log until necessary.
Mermaid Diagram:
sequenceDiagram participant EFB as In-Flight EFB participant SatLink as Satellite Comms participant Gateway as Ground Server participant MaintTeam as Engineering Slack Channel EFB->>SatLink: Encrypted Report SatLink->>Gateway: Submit Anomaly(payload) Gateway->>Gateway: Generate ConvID, Anonymize Source Gateway->>MaintTeam: Post("New Anonymous Report: [details]...") MaintTeam->>Gateway: ReplyInThread("Query: [question]...") Gateway->>SatLink: RouteReply(ConvID, payload) SatLink->>EFB: Display Message
Derivative 3.2: AgTech - Field-Scout to Agronomist Communication Bridge
Enabling Description: A farmer or field scout uses a low-connectivity mobile device to send an MMS message containing a photo of a distressed crop to a specific phone number. This is the "communication request." The gateway server receives the MMS, extracts the image and any text, creates a conversation ID, and stores the originating phone number. It then uses image recognition AI to classify the potential issue (e.g., "pest," "fungus," "nutrient deficiency") and routes the request to a pool of available agronomists who have indicated expertise in that area. The agronomist receives the request via email. Their email reply is parsed by the gateway, associated with the conversation ID, and sent back to the farmer's device as an SMS message, creating a seamless, anonymous consultation channel.
Mermaid Diagram:
flowchart TD subgraph Farmer in Field A[Mobile Device] -- MMS with photo --> B((Gateway Phone Number)) end subgraph Cloud Platform B -- Ingests MMS --> C{Conversation Gateway} C -- Creates ConvID & Stores Number --> D[Database] C -- Sends Image to --> E[AI Image Recognition] E -- Returns "Pest Issue" --> C C -- Queries for Expert --> D D -- Returns Agronomist_Email --> C C -- Sends Email --> F{Agronomist} end subgraph Agronomist F -- Replies to Email --> G((Gateway Email Inbox)) end subgraph Cloud Platform G -- Ingests Reply --> C C -- Matches ConvID --> D D -- Retrieves Farmer_Number --> C C -- Sends SMS --> H((SMS Gateway)) end H -- SMS --> A
Derivative 3.3: Consumer Electronics - Anonymous IoT Device Support
Enabling Description: A smart appliance (e.g., a Wi-Fi-enabled refrigerator) detects an internal fault. It sends a diagnostic code as a "communication request" to a manufacturer's server. The server, acting as the gateway, generates a conversation ID and routes the request to a support technician's mobile app via a push notification. The user is "unauthenticated" in that they have not logged into a support portal; the device's unique hardware ID is the initiator. The technician can send a series of simple commands (e.g., "initiate defrost cycle," "run compressor test") back through the gateway. These commands are translated into the device's specific control protocol and executed. The device returns a success/fail code, which is sent back to the technician's app, allowing for remote diagnostics without the consumer needing to be involved or provide any personal information.
Mermaid Diagram:
classDiagram class IoT_Device { +hardwareID +sendDiagnostics() +executeCommand() } class GatewayServer { +createConversation(hardwareID, diagCode) +routeToTechnician(conversationID) +translateCommand(command) +processResult(result) } class TechnicianApp { +viewRequest(conversationID) +sendCommand(command) +receiveResult(result) } IoT_Device "1" -- "1" GatewayServer : communicates via TechnicianApp "1" -- "1" GatewayServer : communicates via
4. Integration with Emerging Tech
Derivative 4.1: AI-Optimized Responder Routing and Triage
Enabling Description: This derivative enhances the gateway with an AI-driven triage and routing engine. When the initial communication request is received, its content (text, images) is fed into a multi-modal AI model. The model performs sentiment analysis, intent recognition, and topic classification. Based on this analysis, the system routes the request not just based on pre-defined rules, but on which responder has the highest probability of resolving the issue efficiently, calculated from their historical performance data, current workload, and sentiment compatibility. The AI also generates a suggested first response for the chosen responder, streamlining the process.
Mermaid Diagram:
graph LR A[Initiator] --> B(Gateway); B -- Raw Request --> C(AI Triage Engine); C --> D{Sentiment Analysis}; C --> E{Intent Recognition}; C --> F{Image Classification}; subgraph Responder DB G[Responder Profiles] H[Performance History] end C -- queries --> G; C -- queries --> H; C -- Generates Routing Score --> I(Optimal Responder); B -- Routes Request to --> I; C -- Generates Suggested Reply --> I; I --> B; B --> A;
Derivative 4.2: Blockchain-Verified Anonymous Conversations
Enabling Description: The system is integrated with a public blockchain to provide an immutable, auditable record of conversations while preserving anonymity. When a conversation is initiated, a unique cryptographic keypair is generated for the initiator. The conversation ID is the public key. All messages are signed by the initiator's private key (held client-side) and hashed. The message hash, a timestamp, and the responder's message hash are stored as a transaction on the blockchain. This allows any third party to verify the integrity and timeline of the conversation without knowing the content of the messages or the identities of the participants. This is applicable to legally sensitive anonymous reporting (e.g., whistleblower platforms) or high-value negotiations.
Mermaid Diagram:
sequenceDiagram participant Initiator participant Gateway participant Responder participant Blockchain Initiator->>Gateway: Initiate Request Gateway->>Initiator: Provide new Keypair (Public=ConvID) Initiator->>Gateway: Send Message (signed with PrivateKey) Gateway->>Responder: Forward Message Responder->>Gateway: Send Reply Gateway->>Blockchain: RecordTransaction(ConvID, hash(InitiatorMsg), hash(ResponderMsg)) Blockchain-->>Gateway: Transaction Confirmed Gateway->>Initiator: Forward Reply & TxID
5. The "Inverse" or Failure Mode
Derivative 5.1: Graceful Degradation to Asynchronous Mode
Enabling Description: This derivative defines a "safe failure" mode for the system under high load or partial network outage. The gateway constantly monitors its own performance (e.g., message queue length, latency). If a threshold is breached, it automatically switches from a real-time (WebSocket/SSE) mode to a store-and-forward asynchronous mode. The initiator's web interface is dynamically updated to inform them that "Live chat is experiencing high volume. Your message has been received and you will be notified via this page when a response is available." The gateway queues the message and delivers it to the responder when resources permit. This prevents message loss and manages user expectations, providing a limited but reliable functionality instead of a total system failure.
Mermaid Diagram:
stateDiagram-v2 state "Normal Operation (Real-time)" as Realtime state "Degraded Operation (Async)" as Async [*] --> Realtime Realtime --> Async: on HighLoad_Event Async --> Realtime: on LowLoad_Event Realtime: Messages pushed via WebSockets. Latency < 2s. Async: UI displays "Responses may be delayed." Messages are queued and delivered on a best-effort basis. Initiator must poll for updates.
Combination Prior Art with Open-Source Standards
Combination with Matrix Protocol: The system is implemented as a "bridge" in the decentralized Matrix communication network (matrix.org). An unauthenticated web user interacts with a client hosted on a specific homeserver. The gateway acts as a Matrix bridge that receives messages in this temporary, anonymous room and "puppets" a user on an external network (e.g., SMS, XMPP, or a proprietary API), forwarding messages back and forth. The conversation ID is the Matrix internal room ID. This leverages an existing, open-source, federated communication standard to achieve the core functionality, making the specific combination obvious to anyone skilled in both web development and federated messaging.
Combination with WebRTC: The gateway server's initial role is limited to brokering a connection. The unauthenticated user's browser sends a request to the gateway. The gateway finds a responder and securely exchanges signaling messages (using an open protocol like SIP or a custom JSON-based one) between the user's browser and the responder's client to establish a direct, peer-to-peer, encrypted DataChannel using the WebRTC standard. The conversation itself happens directly between the peers, minimizing server load. The "conversation identifier" is the set of credentials used to establish the WebRTC session. This combines the patent's concept with a standard W3C protocol for peer-to-peer communication.
Combination with ActivityPub: The system is designed as a service within the federated social web (Fediverse) using the ActivityPub standard. An anonymous user's action on a webpage generates a "Create" activity with an "Article" object, which is sent to a dedicated service actor's inbox. This service actor (the gateway) then forwards this activity to a relevant responder (another actor in the Fediverse). Replies are handled as "inReplyTo" activities. The conversation ID is the URI of the initial "Create" activity object. This applies the patent's centralized anonymous routing concept to a standardized, decentralized social networking protocol.
Generated 4/28/2026, 11:56:47 PM