Patent 11349787

Derivative works

Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.

Active provider: Google · gemini-2.5-pro

Derivative works

Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.

✓ Generated

Defensive Disclosure and Prior Art Derivations for U.S. Patent 11,349,787

Date of Disclosure: April 28, 2026
Disclosing Party: (Fictional) Advanced Technology Research Collective
Subject Matter: Derivative implementations and extensions of the system described in U.S. Patent 11,349,787, intended to enter the public domain and serve as prior art against future patent applications on similar technologies.


1. Material & Component Substitution

Derivative 1.1: Volatile In-Memory Cache with Ephemeral Identifiers

  • Enabling Description: This variation replaces the "persistent data store" (as claimed in Claim 1) with a volatile, in-memory distributed cache system like Redis or Memcached. The "conversation identifier" is generated with a short Time-To-Live (TTL), for example, 300 seconds. If the conversation is inactive beyond the TTL, the identifier and all associated messages are purged automatically. This architecture is optimized for high-throughput, ephemeral conversations where long-term storage is undesirable, such as for one-time password verification or temporary support chats. The system uses a CRDT (Conflict-free Replicated Data Type) model to ensure eventual consistency across cache nodes without relying on a central persistent database for the live conversation data.

  • Mermaid Diagram:

    sequenceDiagram
        participant User as Web Browser (Unauthenticated)
        participant Server as Communication Gateway
        participant Cache as Redis Cluster (Volatile)
        participant Responder as Responder's Device
    
        User->>Server: POST /initiate_request
        Server->>Cache: SETEX conv_id_123 300 "session_data"
        Server-->>User: 200 OK (with conv_id_123)
        Server->>Responder: PUSH "New request from anonymous user"
        Responder-->>Server: POST /reply (conv_id_123)
        Server->>Cache: APPEND conv_id_123 "responder_msg"
        Server-->>User: SSE/WebSocket PUSH "responder_msg"
        Note over Cache: After 300s of inactivity, key "conv_id_123" is auto-purged.
    

Derivative 1.2: Serverless Architecture with Function-as-a-Service (FaaS)

  • Enabling Description: This implementation replaces a monolithic server processor with a serverless architecture using cloud functions (e.g., AWS Lambda, Google Cloud Functions). Each step of the communication flow—receiving the initial request, generating an ID, routing to a responder, and processing replies—is handled by a separate, stateless function. The state (conversation history) is maintained in a high-performance NoSQL database like DynamoDB or Firestore, which is accessed by each function using the conversation identifier as the primary key. This component substitution provides extreme scalability and cost-efficiency, as compute resources are only consumed during active message processing. The communication protocol between functions is managed via a message queue like SQS or Pub/Sub.

  • Mermaid Diagram:

    flowchart TD
        A[Web Browser] -- HTTPS Request --> B(API Gateway)
        B -- Triggers --> C{ReceiveRequest Function};
        C -- Writes to --> D[NoSQL DB: Create Conversation];
        C -- Publishes to --> E[Message Queue: New Request Topic];
        F{RouteToResponder Function} -- Subscribes to --> E;
        F -- Reads from --> D;
        F -- Sends via SMS/Email Gateway --> G[Responder];
        G -- Replies via Webhook --> B;
        B -- Triggers --> H{ProcessReply Function};
        H -- Writes to --> D[NoSQL DB: Append Message];
        H -- Publishes to --> I[Message Queue: New Reply Topic];
        J{NotifyUser Function} -- Subscribes to --> I;
        J -- Pushes via WebSocket --> A;
    

2. Operational Parameter Expansion

Derivative 2.1: High-Frequency, Low-Latency Industrial Control Application

  • Enabling Description: This derivative applies the core invention to a high-frequency industrial control environment. An unauthenticated remote diagnostic tool (the "initiator") communicates with a protected SCADA system (the "responder") through the gateway. The "conversation" consists of telemetry data points and control commands exchanged at a rate exceeding 100 Hz. The conversation identifier is a high-entropy token valid for a single session. The system operates under strict low-latency constraints (<10ms round trip). To achieve this, the server uses a real-time operating system (RTOS) and communicates with both endpoints using a lightweight binary protocol over UDP instead of HTTP. The persistent store is a time-series database (e.g., InfluxDB) optimized for high-speed writes and queries.

  • Mermaid Diagram:

    stateDiagram-v2
        [*] --> SessionInit
        SessionInit: Remote Tool sends UDP packet with API key
        SessionInit --> Handshake: Gateway validates key, generates session token
        Handshake --> Streaming: Gateway opens UDP channels to Tool and SCADA
        state Streaming {
            direction LR
            [*] --> Telemetry
            Telemetry: SCADA sends data point
            Telemetry --> Command: Gateway forwards to Tool
            Command: Tool sends control command
            Command --> Telemetry: Gateway forwards to SCADA
        }
        Streaming --> SessionEnd: Timeout or explicit close packet
        SessionEnd --> [*]
    

Derivative 2.2: Large-Scale Asynchronous Civic Engagement Platform

  • Enabling Description: The system is scaled to handle millions of concurrent, slow-burn conversations between citizens (initiators) and government agencies (responders). A citizen can anonymously submit a civic issue report from a web portal. The system generates a conversation ID and routes the report to the appropriate municipal department's work queue. The conversation may last for weeks or months. The "responder" is not a single person but a team, and responses are asynchronous (e.g., via email or a dedicated portal update). The data store is a distributed ledger or blockchain to ensure a tamper-proof public record of the interaction without revealing the citizen's identity, using zero-knowledge proofs to validate user status (e.g., "is a resident of this district") without PII disclosure.

  • Mermaid Diagram:

    erDiagram
        CITIZEN ||--o{ REPORT : submits
        REPORT {
            string reportID
            string conversationID
            string issue_details
            timestamp created_at
        }
        REPORT ||--|{ MESSAGE : contains
        MESSAGE {
            string messageID
            string content
            string author_role (citizen, agency)
            timestamp sent_at
        }
        REPORT ||--|{ AGENCY_QUEUE : routed_to
        AGENCY_QUEUE {
            string queueID
            string department_name
        }
        CONVERSATION_LEDGER {
            string conversationID
            string reportID
            string encrypted_message_hash
            string block_hash
        }
        REPORT }|--|| CONVERSATION_LEDGER : is_recorded_on
    

3. Cross-Domain Application

Derivative 3.1: Aerospace - Anonymous In-Flight Anomaly Reporting

  • Enabling Description: An in-flight system (e.g., an Electronic Flight Bag used by a pilot or cabin crew) acts as the unauthenticated initiator. When a non-critical anomaly is observed (e.g., a software glitch in the entertainment system, unusual cabin noise), the crew member can submit a report through a dedicated interface. The system, hosted on a ground server via a satellite link, anonymizes the report's origin (masking the specific aircraft tail number) and assigns a conversation ID. It then routes the report to the relevant ground-based engineering team (the responder) via their standard enterprise messaging tool (e.g., Slack, Microsoft Teams). The engineers can ask for clarifying details, and the responses are routed back to the EFB interface, allowing for a real-time, anonymous dialogue to diagnose the issue without creating an official, discoverable maintenance log until necessary.

  • Mermaid Diagram:

    sequenceDiagram
        participant EFB as In-Flight EFB
        participant SatLink as Satellite Comms
        participant Gateway as Ground Server
        participant MaintTeam as Engineering Slack Channel
    
        EFB->>SatLink: Encrypted Report
        SatLink->>Gateway: Submit Anomaly(payload)
        Gateway->>Gateway: Generate ConvID, Anonymize Source
        Gateway->>MaintTeam: Post("New Anonymous Report: [details]...")
        MaintTeam->>Gateway: ReplyInThread("Query: [question]...")
        Gateway->>SatLink: RouteReply(ConvID, payload)
        SatLink->>EFB: Display Message
    

Derivative 3.2: AgTech - Field-Scout to Agronomist Communication Bridge

  • Enabling Description: A farmer or field scout uses a low-connectivity mobile device to send an MMS message containing a photo of a distressed crop to a specific phone number. This is the "communication request." The gateway server receives the MMS, extracts the image and any text, creates a conversation ID, and stores the originating phone number. It then uses image recognition AI to classify the potential issue (e.g., "pest," "fungus," "nutrient deficiency") and routes the request to a pool of available agronomists who have indicated expertise in that area. The agronomist receives the request via email. Their email reply is parsed by the gateway, associated with the conversation ID, and sent back to the farmer's device as an SMS message, creating a seamless, anonymous consultation channel.

  • Mermaid Diagram:

    flowchart TD
        subgraph Farmer in Field
            A[Mobile Device] -- MMS with photo --> B((Gateway Phone Number))
        end
        subgraph Cloud Platform
            B -- Ingests MMS --> C{Conversation Gateway}
            C -- Creates ConvID & Stores Number --> D[Database]
            C -- Sends Image to --> E[AI Image Recognition]
            E -- Returns "Pest Issue" --> C
            C -- Queries for Expert --> D
            D -- Returns Agronomist_Email --> C
            C -- Sends Email --> F{Agronomist}
        end
        subgraph Agronomist
            F -- Replies to Email --> G((Gateway Email Inbox))
        end
        subgraph Cloud Platform
            G -- Ingests Reply --> C
            C -- Matches ConvID --> D
            D -- Retrieves Farmer_Number --> C
            C -- Sends SMS --> H((SMS Gateway))
        end
        H -- SMS --> A
    

Derivative 3.3: Consumer Electronics - Anonymous IoT Device Support

  • Enabling Description: A smart appliance (e.g., a Wi-Fi-enabled refrigerator) detects an internal fault. It sends a diagnostic code as a "communication request" to a manufacturer's server. The server, acting as the gateway, generates a conversation ID and routes the request to a support technician's mobile app via a push notification. The user is "unauthenticated" in that they have not logged into a support portal; the device's unique hardware ID is the initiator. The technician can send a series of simple commands (e.g., "initiate defrost cycle," "run compressor test") back through the gateway. These commands are translated into the device's specific control protocol and executed. The device returns a success/fail code, which is sent back to the technician's app, allowing for remote diagnostics without the consumer needing to be involved or provide any personal information.

  • Mermaid Diagram:

    classDiagram
        class IoT_Device {
            +hardwareID
            +sendDiagnostics()
            +executeCommand()
        }
        class GatewayServer {
            +createConversation(hardwareID, diagCode)
            +routeToTechnician(conversationID)
            +translateCommand(command)
            +processResult(result)
        }
        class TechnicianApp {
            +viewRequest(conversationID)
            +sendCommand(command)
            +receiveResult(result)
        }
        IoT_Device "1" -- "1" GatewayServer : communicates via
        TechnicianApp "1" -- "1" GatewayServer : communicates via
    

4. Integration with Emerging Tech

Derivative 4.1: AI-Optimized Responder Routing and Triage

  • Enabling Description: This derivative enhances the gateway with an AI-driven triage and routing engine. When the initial communication request is received, its content (text, images) is fed into a multi-modal AI model. The model performs sentiment analysis, intent recognition, and topic classification. Based on this analysis, the system routes the request not just based on pre-defined rules, but on which responder has the highest probability of resolving the issue efficiently, calculated from their historical performance data, current workload, and sentiment compatibility. The AI also generates a suggested first response for the chosen responder, streamlining the process.

  • Mermaid Diagram:

    graph LR
    A[Initiator] --> B(Gateway);
    B -- Raw Request --> C(AI Triage Engine);
    C --> D{Sentiment Analysis};
    C --> E{Intent Recognition};
    C --> F{Image Classification};
    subgraph Responder DB
        G[Responder Profiles]
        H[Performance History]
    end
    C -- queries --> G;
    C -- queries --> H;
    C -- Generates Routing Score --> I(Optimal Responder);
    B -- Routes Request to --> I;
    C -- Generates Suggested Reply --> I;
    I --> B;
    B --> A;
    

Derivative 4.2: Blockchain-Verified Anonymous Conversations

  • Enabling Description: The system is integrated with a public blockchain to provide an immutable, auditable record of conversations while preserving anonymity. When a conversation is initiated, a unique cryptographic keypair is generated for the initiator. The conversation ID is the public key. All messages are signed by the initiator's private key (held client-side) and hashed. The message hash, a timestamp, and the responder's message hash are stored as a transaction on the blockchain. This allows any third party to verify the integrity and timeline of the conversation without knowing the content of the messages or the identities of the participants. This is applicable to legally sensitive anonymous reporting (e.g., whistleblower platforms) or high-value negotiations.

  • Mermaid Diagram:

    sequenceDiagram
        participant Initiator
        participant Gateway
        participant Responder
        participant Blockchain
    
        Initiator->>Gateway: Initiate Request
        Gateway->>Initiator: Provide new Keypair (Public=ConvID)
        Initiator->>Gateway: Send Message (signed with PrivateKey)
        Gateway->>Responder: Forward Message
        Responder->>Gateway: Send Reply
        Gateway->>Blockchain: RecordTransaction(ConvID, hash(InitiatorMsg), hash(ResponderMsg))
        Blockchain-->>Gateway: Transaction Confirmed
        Gateway->>Initiator: Forward Reply & TxID
    

5. The "Inverse" or Failure Mode

Derivative 5.1: Graceful Degradation to Asynchronous Mode

  • Enabling Description: This derivative defines a "safe failure" mode for the system under high load or partial network outage. The gateway constantly monitors its own performance (e.g., message queue length, latency). If a threshold is breached, it automatically switches from a real-time (WebSocket/SSE) mode to a store-and-forward asynchronous mode. The initiator's web interface is dynamically updated to inform them that "Live chat is experiencing high volume. Your message has been received and you will be notified via this page when a response is available." The gateway queues the message and delivers it to the responder when resources permit. This prevents message loss and manages user expectations, providing a limited but reliable functionality instead of a total system failure.

  • Mermaid Diagram:

    stateDiagram-v2
        state "Normal Operation (Real-time)" as Realtime
        state "Degraded Operation (Async)" as Async
    
        [*] --> Realtime
        Realtime --> Async: on HighLoad_Event
        Async --> Realtime: on LowLoad_Event
    
        Realtime: Messages pushed via WebSockets. Latency < 2s.
        Async: UI displays "Responses may be delayed." Messages are queued and delivered on a best-effort basis. Initiator must poll for updates.
    

Combination Prior Art with Open-Source Standards

  1. Combination with Matrix Protocol: The system is implemented as a "bridge" in the decentralized Matrix communication network (matrix.org). An unauthenticated web user interacts with a client hosted on a specific homeserver. The gateway acts as a Matrix bridge that receives messages in this temporary, anonymous room and "puppets" a user on an external network (e.g., SMS, XMPP, or a proprietary API), forwarding messages back and forth. The conversation ID is the Matrix internal room ID. This leverages an existing, open-source, federated communication standard to achieve the core functionality, making the specific combination obvious to anyone skilled in both web development and federated messaging.

  2. Combination with WebRTC: The gateway server's initial role is limited to brokering a connection. The unauthenticated user's browser sends a request to the gateway. The gateway finds a responder and securely exchanges signaling messages (using an open protocol like SIP or a custom JSON-based one) between the user's browser and the responder's client to establish a direct, peer-to-peer, encrypted DataChannel using the WebRTC standard. The conversation itself happens directly between the peers, minimizing server load. The "conversation identifier" is the set of credentials used to establish the WebRTC session. This combines the patent's concept with a standard W3C protocol for peer-to-peer communication.

  3. Combination with ActivityPub: The system is designed as a service within the federated social web (Fediverse) using the ActivityPub standard. An anonymous user's action on a webpage generates a "Create" activity with an "Article" object, which is sent to a dedicated service actor's inbox. This service actor (the gateway) then forwards this activity to a relevant responder (another actor in the Fediverse). Replies are handled as "inReplyTo" activities. The conversation ID is the URI of the initial "Create" activity object. This applies the patent's centralized anonymous routing concept to a standardized, decentralized social networking protocol.

Generated 4/28/2026, 11:56:47 PM