MXPA99004043A - Automatic access of electronic information through machine-readable codes on printed documents - Google Patents

Automatic access of electronic information through machine-readable codes on printed documents

Info

Publication number
MXPA99004043A
MXPA99004043A MXPA/A/1999/004043A MX9904043A MXPA99004043A MX PA99004043 A MXPA99004043 A MX PA99004043A MX 9904043 A MX9904043 A MX 9904043A MX PA99004043 A MXPA99004043 A MX PA99004043A
Authority
MX
Mexico
Prior art keywords
computer
file
user
symbol
data
Prior art date
Application number
MXPA/A/1999/004043A
Other languages
Spanish (es)
Inventor
T Durst Robert
Hunter Kevin
Original Assignee
Neomedia Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neomedia Technologies Inc filed Critical Neomedia Technologies Inc
Publication of MXPA99004043A publication Critical patent/MXPA99004043A/en

Links

Abstract

The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet.

Description

AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH LEGIBLE CODES BY DOCUMENT MACHINE PRINTED CROSS REFERENCES FOR THE RELATED APPLICATION This application is based on and claims the priority of the pending provisional patent application filed with the United States Patent and Trademark Office on November 8, 1996 and with the assignment of Serial No. 60 / 030,166. BACKGROUND OF THE INVENTION Electronic data sources, such as conventional databases, the Internet (ie the World Wide Web ("WWW")) are a rich and important element of information retrieval and distribution. and, of an electronic commerce that increases more every time. However, there are some problems to find the desired information in this network of data sources that is increasingly complex and changing. The recent introduction of Internet "search engines", such as YAHOO, have helped by allowing the user to search the indexes of the sources of information online, and even the complete text of the source, for the key words and phrases relevant to your topic of interest, but even carefully structured consultancies by experienced users often result in hundreds and even thousands of possible "caps" that are not specific enough to exclude subsequent manual search which is inefficient in terms of data resource and time consuming. Due to these inefficiencies, as well as a generalized lack of familiarity with the search engines and their syntax, users are frequently inclined to the use of human readable impressions and the diffusion of advertisements in the media to identify the addresses of the sources (for example, Uniform Resource Locators ("URLs")) for Web sites and other information of interest on the line. Print media are particularly effective because: (1) it is the most ubiquitous method of communication and advertising in the modern world; and (2) a printed document can serve as a persistent reference to be stored and used during a subsequent online session. However, human-readable source addresses, and especially URLs, are particularly difficult to manually enter into software programs, such as Web sweepers, due to their length and use of unknown complex symbols. If the characters in a URL are not captured exactly, recovery is avoided or, in a limited number of cases, access to a legal but incorrect source will be available. This is especially true when URLs incorporate foreign languages and / or complicated query instructions into the online database, as is increasingly common in most Web sites. In addition, the inability to type or manually enter symbolic address information due to inability or lack of training complicates the use of online information resources such as the Internet for millions of individuals. Finally, it is widely anticipated that Internet access will increasingly be provided through interactive cable television via Web-ready television receivers and armed boxes used in conjunction with conventional television receivers. In this home entertainment environment, it is difficult to use keyboards to enter an address due to both the lack of typing skills and the problematic placement of these components. Another method that would eliminate typing and allow users to directly link printed and written queries to electronic information sources would be highly desirable. The companies that host the websites for the purpose of providing information such as advertising, they often want to know the identity and other related information of the users who visit their sites (that is, download files from there). It would be very advantageous to provide these companies or providers with this information as part of a specific transfer request file, for example, as part of a chain of CGI parameters included in a URL. In addition, it would be desirable to be able to carry out in a secure manner the transfer of this information, in such a way that the user has confidence in the system and in this way send sensitive information such as a credit card number or something similar with the request of file transfer. This could allow electronic commerce to flourish beyond the point where it is currently.
DISCLOSURE OF THE INVENTION The present invention is a system and method for providing automated access to electronic information stored in a database in a local or remote location. The system uses a machine-readable code printed on a document, referred to herein as a smart document, as it stores information used to automatically access this information. The machine-readable symbol is comprised of coded data from the source, where the source data is comprised of information of the launch request as well as the location information of the file. The source data is encoded and printed, and then distributed by the supplier through any logical element to the end user. The end user then scans the code through the correct equipment to shorten the codes (for example a barcode scanner), decode the unprocessed decoded data, and information about the location of the file is then used to access the code. correct file. In a preferred embodiment, the web sweep program is launched, and the provider's URL or website is accessed through the Internet. The recovery of the local file can also be implemented on the same client computer, as well as on an intranet or LAN environment. You can also code the demographic data of the specific user such as the user's name and address in machine-readable code when the document is made specifically tailored to the individual to be reached, such as mailing labels. This demographic information is uploaded to the WWW site for use by the provider. In addition, the present invention encodes security data, such as a coded key, for use in secure data transmissions such as electronic commerce over the Internet. In particular, the present invention is a method and system for a computer, such as a computer of a client in a networked computer system, to retrieve a computer file in which a string of symbol data comprised by a pointer of The file location is encoded within a machine-readable symbol such as a two-dimensional bar code symbol, and a machine-readable symbol is delivered within a data carrier (e.g. in an intelligent document). A computer input device such as a two-dimensional barcode scanner is coupled to the client computer and transposes a string of input data from the machine-readable symbol. The computer analyzes the input data string to determine the location pointer of the file, and the location pointer of the file then used to point to the request of the computer file designated by it. The file location pointer can be used to request a computer file by passing it to the computer in a suitable application program for processing the corresponding computer file, and then the application program that retrieves the computer file from the location of the specified file. Alternatively, the file location pointer can be used to request a computer file by retrieving a copy of a computer file from a specific file location and then invoking an application program, on the client computer, that is suitable for processing the corresponding computer file.
The client computer assembles a computer file transfer request word that includes the file location pointer and transmits the request word to the server computer for execution through a computer network system, which can be a extended area network, such as the Internet or a local area network (LAN) or intranet. The file location pointer can alternatively specify the location of a computer file stored in a local memory resident on the client computer instead of on a server computer for execution on a network, then the file location pointer is the address of a network associated with the server computer for execution and a file identifier correlated with the computer file requested by the client computer. In particular, when using the Internet, the file location pointer may be in the form of a uniform resource locator (URL). In any type of network environment, the server computer for execution receives the transfer word from the computer file and transmits it to a computer file to the client computer in response to this. In addition to the file location pointer, the present invention takes advantage of the information density in two-dimensional symbology by coding a data string for identification of the source within a machine-readable symbol. The data string for identification of the source is used to denote the particular source of the data carrier such as from a particular magazine or advertisement, or it may be used to denote an expected user or a group of target users of the data carrier. data. The chain for identification of the source is then transposed by the client computer, assembled in the word for request of transfer of file for computer, and transmitted to the computer of the server for execution. The execution server computer stores the data string for identification of the source that comes from the client computer in a transfer request word of a computer file. Additionally, the machine-readable symbol also has encoded therein, an encoded key associated with the data string for identification of the source, which is also transposed by the computer's input device. The encoded key is used by the client computer to encode specific information of a user of the client computer, and the user's encoded information is assembled into the transfer request word of a computer file and transmitted to the server computer for execution. The specific information for a user can be obtained, before coding, from a user information data file stored on the client computer, or it can be obtained from the user's demographic data correlated with a user destined for the data carrier that it has been previously encoded within the machine-readable symbol and transposed from it. The server computer for execution may then use the data string for source identification received as part of the transfer request word of a file to access a look-up table in order to determine a decoding key, and then decoding the coded information of the user received from the client computer in the transfer request word of a file file. The look-up table can be stored locally on the execution server computer, or it can be stored remotely on a secondary server computer. The decoded information of the user may be comprised of sensitive user information such as the number of a credit card associated with the user of said client computer, thus enabling the online electronic business transaction or by using the credit card number. The demographic data of the user can be used by the server computer for execution, in order to determine the files that will be transmitted to the client computer; that is, certain files can be directed to specific users of the system. The machine-readable symbol may also have encoded in it, an executable command to launch a software utility resident on the client's computer, and the software utility is then automatically released after the machine-readable symbol is transposed. For example, the utility of the software can be a sweep program for the Internet or a word processing program. In addition, encoded specific functions can also be found in the machine-readable symbol along with the application of the launch command, such as a command to execute a print job retrieved from the computer file. The symbol data string can optionally be obfuscated before being coded into the machine-readable symbol, in which case the transposed input string can be de-flushed in the same way by the client computer. The obfuscation can be through the calculation of a checksum of the data string of the symbols, coding the data string of the symbols using the checksum as a coding key, and assembling the checksum with the string of encoded symbol files before encoding it into the machine-readable symbol. The decoding must then be carried out by analyzing the input data string to determine the checksum, the decoding of the symbol data string encoded with the revision sum as a decoding key, calculated a revision sum of the data string of the decoded symbols, and comparing the calculated checksum with the checksum of this input data string. A valid data condition will be indicated when the comparison step succeeds; u An invalid data condition will be indicated when the comparison step is unsuccessful. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a diagram of the system of the present invention. Figure 2 is a diagram of the document generation function. Figure 3 is a diagram of the functions of the client computer of Figure 1. Figure 4 is a diagram of the de-flushing function carried out by the client computer of Figure 3. Figure 5 is a diagram of the server computer for execution of Figure 1. Figure 6 is a top-level flow diagram of the method of the present invention. Figure 7 is a flow chart of document generation of the present invention. Figures 8 and 9 are flow diagrams of scanning and processing by the client computer of the present invention; and Figure 10 is a flowchart of the method used by the server computer for execution of the present invention. BEST MODALITY FOR CARRYING OUT THE INVENTION The system 100 of the present invention for generating and reading an intelligent document 10 is illustrated in the form of the block diagram of Figure 1. The system 100 is comprised of a system for the generation of a document intelligent 14, which encodes, assembles and prints an intelligent document 10 to be subsequently scanned by the client computer. The system operates as follows: A provider who wishes to supply an intelligent document 10 schedules certain parameters within the data string 20 which will be encoded within a code readable by a machine 12 and printed in a document together with a text 16 or graphs 18. The document can be an advertisement in the form of an insert in a magazine, or a page, or a brochure, a label for an envelope, a memorandum and anything similar. The parameters that are included within the code readable by a machine depends on the desired application of the provider. Figure 2 illustrates fields 1-6 of the symbol data string 20, which may comprise a file location pointer 21, a launch command 22, a user demography field 23, a source identifier 24, a coding key 25, and / or a field of code type 26. For example, if the provider wants the end user to be able to access the provider's Web site automatically when the symbol 12 is scarce, then the parameters included in the machine-readable symbol can include the launch command 22 to launch an application. Internet sweep, such as the code for NETSCAPE, and the Uniform Resource Location (URL) within the file location pointer 21 such as http: // www. xyzcorp.com This information is encoded according to the type of code of the particular machine that is used. For example, a type of code that can be used by the present invention is the symbol PDF417, which is described in detail in the U.S. Patent. No. 5,304,786, is incorporated herein by reference. The symbol PDF417, known as a two-dimensional bar code symbol, that has enough storage information to encode the sweep launch command as well as the full URL. A printer 30 then uses the encoded data and the desired text and graphics to print an intelligent document 10 as shown in the Figures. The symbol data string 20 may also be obfuscated for security purposes, which will be described in detail below. The smart document 10 is disseminated to the end user according to the desired methods of the provider. For example, if the smart document 10 is an advertisement in a magazine, then the user will obtain. the magazine through the conventional means such as the purchase in a retail sales position, the mail, etc. The user, after reading the text and the graphics in the document, can access the website of the provider's website by using a scanner 34 together with his client computer 32, programmed with the appropriate software according to the invention. That is, the user will optically scan the code 12 with an optical scanner. An optical scanner sufficient to scarce the symbols of the bar code and the like is disclosed in the U.S. Patent. No. 5,448,050, which is incorporated herein by reference. The device disclosed in the '050 patent is housed within a mouse-type device, thus including also useful circuits for popular point-and-click applications on current personal computer platforms. After the two-dimensional bar code data is scanned by the scanner 34, a decoder is used to decode the raw data into usable commands and data. The decoder is typically a software program executed by the computer microprocessor, and thereby provides through an Internet sweep 40 the URL that has been encoded by the provider into a symbol 12. The sweep application 40 is then loaded (if not already working on the computer 32) by the launch command, and the URL is used to access the provider's web site correspondingly on the server computer for execution 46 via the Internet 44 As a result of this, the user can have automatic access to the supplier's Web site to obtain a computer file in it without having to enter the URL through a keyboard, thus eliminating the opportunities for error due to data revenue. manuals The requested file is obtained from a storage of files and generation elements 50, and sent to the client computer through the Internet to be displayed to the user in scan 40. The above scenario is useful when a provider prints and distributes these documents intelligent on a massive scale. This is, symbol 12, distributed in the same manner for each of the users, In an alternative embodiment, the specific demographic information is included with the code that is provided for custom operations as follows. This scenario is useful when the supplier makes individual prints with passwords for individual users, such as mailing labels that are printed to be included in an envelope around a magazine or similar. In this case, the provider may include in the demographic field 23 of the user personal data such as the user's name, location, telephone number, and other demographic information. When the user scans the document and accesses the Web site, the personal data is uploaded to the execution server, thus providing the provider with useful demographic data when the user actually uses the intelligent document scanning service. The code can also include useful security information when filling out security transfers over the Internet. For example, a correct coded key in a private or public key system may be embedded within the symbol 12. A correct software routine on the user's computer that uses the key after decoding it in order to encode certain data that is sent over the Internet. For example, the coding of the information of a credit card is desired in order to prevent intruders from misappropriating the information there. The system of the present invention can be used to allow the user to order an item promoted in a booklet by taking the credit card number, which is already resident in the memory of the user's computer, when coding it with the code decoding key. When the user wishes to purchase an item, it scans the associated code, and the credit card number is encoded and transmitted at the time the website is accessed. The execution server computer may match the source identification string 24 sent with the transmission with the correct decoding key stored in the search table on the execution server or on an external computer, and decode the card number from the server. credit correspondingly. The system 10 of the present invention has additional embodiments that allow a quick and easy retrieval of a data file from an internet or a Local Area Network (LAN). Thus, a department of a company can distribute leaflets about certain events, new products, etc., and code the correct information of access to the document according to the teachings of the invention. The user can obtain more information by shortening the code in the document, which then causes his computer to have access to the network, the file server, etc. This embodiment is also useful in the environment of a small office, where a user prints documents such as letters or memoranda that can be reviewed at a later date. It is a common practice to manually type in the location of the document's disk drive in the lower corner of the document to allow the user to have easy access to the document at a later date, without searching through massive amounts of files. This is how the user can type the text "c: \ user \ files \ smith \ clients \ letters \ xyzcorp \ jo nesltr \ decl2" to indicate their location on their disk drive. When he wishes to edit or otherwise access the document, he would, in the previous technology, have to type the full location after launching the correct application (for example, a word processor). In accordance with the teachings of the present invention, a machine-readable code can be encoded with this information as the file location pointer (as well as a command to launch the application) and printed on the document. When the user subsequently wants to edit the document, he scans the code. The code is decoded, the application is launched, and the file is activated from the location specified in the code. This invention will now be described in greater detail.
Figure 2 is an illustration of the obfuscation function of the present invention. Before being encoded, the symbol data string can optionally be obfuscated in order to improve the security aspects of the system. The symbol data string is entered into a check sum calculation element 62, which calculates the revision sum of the symbol data string according to the well-known teachings of the prior art. The calculated checksum is used as a key in the coding scheme 66 which may be one of several well-known coding methodologies of the prior art. The key 64 is assembled in free space (ie, decoded) together with the data string of the encoded symbol within a decoding function 29. After this data string is decoded and the revision sum data clarified they are encoded, delivered by the printer 30 according to the well-known methods in the technology and the intelligent document is generated in this way. After the smart document 10 is distributed to the user, the bar code symbol 12 is scanned by the bar code scanner 34 and processed as follows. The data of the symbol that is scanned is decoded through elements well known in the technology according to the particular symbology implemented to encode the symbol 12. Once the symbol data has been decoded, it is de-fused (in case the symbols are decoded). original data of the symbol have been obfuscated as described above) through the desuffusment function 37 which is illustrated in detail in Figure 4. First, the cleared revision sum 64 is used as a key for the decoding function 97 for decoding the encoded string 67. The decoding function 97 that was previously loaded into the client's computer as part of an initialization process with the system is corollary to the encoding function 66. By moving to the cleared 64 revision sum and to the use it as a key, this allows the client computer and the calculation element for document generation to be synchronized with res regarding the decoding methodology. After the decoding function 97 produces the clear data string comprising the location pointer of the original file 21, the launch command 22, the user demographics 23m the identification of the source 24, the key 24 and the type of code 26, then the calculation element of the revision amount 99 operates to calculate a revision sum of those fields. That revision sum calculated then compared to the comparison block 101 with the received clear revision sum 64 that was decoded by the decoding process 36, If the comparison process 101 indicates that the calculated checksum is equal to the sum of cleared clear received, then the signals go / no go 103 indicates that the data transmission and the decoding process has been successful. However, the checksums are not compared favorably, then the go / no go signal 103 will indicate a transmission and a decoding process without success. If this does not succeed, then the subsequent processing is aborted. Once the symbol data is de-confused, it is analyzed through the analysis block 39 in order to use the constituent fields in the following manner. The file location pointer 21 and the source identification string 24 are assembled into a record that will be understood by the file transfer request. The record of the file transfer request is also loaded with a client version 72 taken from local memory 70 on the client's computer. The demographic chain 23 of the user is optionally fed into the coded block 80 which is then used with the coding key 25 to encode the data and put the results as coded information of the user 82 in the file transfer request chain 90 Optionally, the coding function 80 'can use certain local user data 74 that has been stored in the memory 70 of the client's computer. This local user data may be comprised of sensitive information, such as the user's credit card number. Advantageously when coding this information, the user can have a higher level of confidentiality that this sensitive information can be transmitted over the Internet for applications such as electronic commerce. In this way, the file transfer request record 90 will be comprised of the file location pointer 21, the client version 72, certain coded information of the user 82 and the source identifier 22. The string of the code type 26 is compared by a block 78 with the internally stored code type 76. If the comparison is not successful, then the subsequent processing is aborted. This process is useful to allow certain versions of the client software to be distributed for example in a demonstration or test bases, and this test software will only work with certain documents generated by the software modules for corresponding document generation. Thus, a user who has a trial version will not be able to fully utilize the system until they purchase the license or otherwise the production version. The use of this type of code of the matching type also allows the supplier's system to control the licenses that have expired, etc. Once the file transfer request has been successfully assembled, it is then sent to the appropriate interface in order to obtain the requested file. In a preferred embodiment, the file transfer request will take the form of a uniform resource locator (URL) which will be sent to the Internet scanning software 40 that is resident and on the client's computer. Optionally, if the file transfer request string indicates that the file is located in a Local Area Network such as LAN 98, then the file transfer request will be transmitted through the LAN 96 interface of the client's computer with In order to get the correct file. Further optionally as described above, the file transfer request may search to obtain a file stored in the local memory, such as on the hard disk of the user 94. With reference to Figure 5, the operation of the server computer execution will now be described in detail. When the file transfer request 90 indicates that the file to be recovered is located on an Internet file server, then the file location pointer 21 will be comprised of a URL, which comprises an IP (Internet Protocol) address, as well as a file identifier. The IP address, as is well known in the technology, is the computer address of the execution server on the Internet. The program of the Web server 112 that is running on the computer of the execution server 46 receives the URL through the Internet 44 and bands with hundreds of parameters contained therein. The source identifier 24 is used to access a look-up table 110 comprising a plurality of source identification strings and their associated decoding keys. This decoding key which is obtained from the key table 110 is then used by the decoding block 114 to decode the coded information of the user received in the file transfer request. The decoding function 114 is corollary to the coding function 80 performed on the client computer. In this way, the secured information transferred with the file transfer request is decoded and the user information file 122 can be stored in the user's record 52, together with the date and time stamped 120 to indicate when the particular request was received. This information is very valuable for the provider, since it allows to determine the name and other useful information related to the users that have had access to its Web site. This information can also be used by the 50 file generation and storage elements to dynamically determine the file or files that will be sent back to the client computer. For example, if the demographic data indicates that the user prefers that the file be sent in a language other than English, the file can be accessed or generated correctly. Thus, in addition to recovering a static page stored on the execution server computer, the system of the present invention allows the dynamic generation and return of computer files according to the user's preferences indicated in the transfer request. In addition, as described in this document, if the user has allowed their credit card number to be coded and sent with the file transfer request, then the execution server computer can decode the credit card number and use it to make a secure transaction online. In the alternative of having a resident file on the execution server computer, the execution server computer may be required to access an auxiliary file server 118 to obtain the external file and return it to the client computer. The auxiliary file server 118 can be accessed directly, through a connection marked by modem, or through the Internet. In addition, an external key server 116 is accessible through the execution server computer if desired by the system designer to maintain the remote key table 110 of the execution server computer, instead of being local to the server. same. By keeping the key table 110 in a central server location, the system provider can track server requests to decode user information and charge a fee accordingly. Thus, a provider that uses this system may have the option to pay a fee "per click" to determine the user's demographics of each user accessing their server or can only provide the files back to the user without obtaining that knowledge in a less expensive base. When the file is returned to the client computer via the Internet 44, it can be displayed in a manner well known in Internet sweep technology 40. In this way, the system of the present invention has provided an easy and trial-like way of errors for a user to obtain a computer file from an Internet server computer by simply missing a code provided in a smart document and by having the client automatically process the code, request the file inside the file that will be returned through a computer on the execution server and it is deployed to the user. Figures 6 to 10 illustrate the flow diagrams of the methodologies employed by the present invention. Figure 6 is a general flow diagram where step 202 illustrates the data string comprising the file location pointer, the launch command, the user demography, the source identifier, the type of key and code . In block 204, the data string is used to generate an intelligent document 10 which is also distributed to the end users. In step 208, the bar code symbol is scanned, and in step 210 the data is decoded and processed and the file request is assembled. In step 212 the file request is transmitted over the Internet and in step 214 the execution server reaches and / or generates the requested computer file. Finally, in step 215 the file is transmitted to the client computer and displayed in a sweep for the user. Figure 7 is a more detailed flow chart of the document generation process. The data string at 202 is used to calculate a revision sum in step 218. In step 220, the revision sum is used to encode the data string and in step 222 the revision sum and the data string encoded are assembled. In step 224 the bar code symbol is encoded and step 226 the bar code symbol is printed with text and optional graphics in the smart document 10. Figures 8 and 9 illustrate the detailed operation of the client computer. In step 208 of Figure 8, the bar code symbol is scanned. In step 218 the input of the data string is analyzed in order to derive a revision sum and then decode with the revision sum as the key. The decoded string is used to calculate a revision sum and the revision sum is compared to the calculated revision sum. If the revision checksums are not equal, an invalidation condition is declared and the process is output in step 230. If the data is indicated as valid in step 232, then the stored code type is reached from the customer's memory in step 234. The type of code in the customer's memory is compared to the type of code received in step 230. If an invalid data condition is indicated in this test, then the process is output in step 230 and if the The code type is matched, then the process continues to unpack the decoded string in step 238. Referring now to Figure 9, step 240 will encode the user's data file from the client's memory and optionally the demographics of the user received from the bar code to generate a file of the coded user. In step 242, the encoded user file is assembled within the file transfer request 248. In step 244, the file location pointer comprising the IP address and the identification of the file and the identification of the source is they also assemble within the file transfer request, and in step 246, the client version is reached from the local memory and assembled within the file transfer request. In step 250, the sweep is provided with the file transfer request and is optionally started by the launch command in the received chain. In step 253, the file transfer request is transmitted to the execution server, preferably in the preferred embodiment via the Internet in order to obtain the requested file. Figure 109 illustrates the details of the methodology used through the execution server's computer. In step 254, the execution server computer receives the file transfer request and in step 256 the Web server program running on the execution server computer uses the received source identifier to achieve the associated decode key which can be located internally or externally. In step 258, the user's file is decoded and the user's data is stored in a register. If the user has requested the static page, then the location of the file is searched as a function of the file identifier. In step 264, the file is reached from that location in step 268 and returned to the client computer via the Internet in step 270. If the static page has not been required in block 262, then a dynamic page is generated in step 266 which will typically be a function of the file identifier and / or user data that has been received and decoded. Again, the file is returned to the client computer over the Internet and taken off in the user's sweep in step 272.

Claims (56)

  1. CLAIMS 1. A method for a client computer to retrieve a computer file comprising the steps of: a) encoding a chain of symbol data comprising a file location pointer in a machine-readable symbol; b) deliver this symbol readable by a machine inside a data carrier; c) transpose a string of input data of this symbol readable by a machine with a computer input device coupled to the client computer; d) analyze the input data string to determine the file location pointer; and e) use the file location pointer to request the designated computer file there, by: (i) assembling a computer file transfer request word comprising the file location pointer, and (ii) transmitting the word request for transfer of computer file to a computer of the execution server via a system, computer network; f) the computer of the execution server will receive the word of request for transfer of computer file; and g) the execution server computer will transmit a computer file to the client computer in response to it; where the machine-readable symbol also has a code encoding a source identification data string, this source identification data string comprising data correlated with an expected user of the data bearer, and where this chain of identification data from the source is transposed by the computer's input device.
  2. 2. The method for a client computer to retrieve a computer file comprises the steps of: a) encoding a chain of symbol data comprising a file location pointer into a machine-readable symbol; b) deliver the readable symbol by a machine inside a data carrier; c) transpose a string of input data from the symbol readable by a machine with a computer input device coupled to the client computer; d) analyze the input data string to determine the file location pointer; and e) use the file location pointer to request the designated computer file in this, by: (i) assembling a file transfer request word comprising the file location pointer, and (ii) transmitting the file location pointer. request word to transfer file from computer to server computer of execution via a computer network system; f) the execution server computer receives the request word for transfer of computer file and g) the execution server computer transmits a computer file to the client computer in response to it; where the machine-readable symbol also has the user's demographic data encoded therein, this demographic data of the user correlated with a given user of the data carrier, and where the user's demographic data transposed by the user's input device. computer.
  3. 3. A method for a client computer to retrieve a computer file comprising the steps of: a) encoding a symbol data string comprising a file location pointer in a machine-readable symbol; b) deliver the readable symbol by a machine inside a data carrier; c) transpose a string of input data from the symbol readable by a machine with a computer input device coupled to the client computer; d) analyze the input data string to determine the file location pointer; and e) use the file location pointer to request the computer file designated therein, through: (i) assembling a computer file transfer request word comprising a file location pointer, and (ii) ) transmit the word of computer file transfer to a computer running server via a computer network system; f) the computer of the execution server will receive the word of request for transfer of computer file; and g) the execution server computer will transmit a computer file to the client computer in response to it / and will further understand the step of obfuscating the symbol data string before coding it into the machine-readable symbol.
  4. The method of any one of Claims 1, 2 or 3 wherein this step of use is comprised of the steps of passing the file location pointer of an application program on the appropriate client computer to process the corresponding computer file; and the recovery of the application program of the computer file from the specified file location.
  5. The method of any of Claims 1, 2 or 3 wherein the step of use is comprised by the steps of recovering a copy of the computer file from the specified file location; and invoke an application program on the client computer that is suitable for processing the corresponding computer file.
  6. The method of any of Claims 1, 2 or 3 wherein the computer network system is Internet, and where the computer transfer request word is directed to the execution server computer in communication with the Internet.
  7. The method of Claim 6 wherein the file location pointer is comprised of a uniform resource locator (URL) to specify a file on the execution server computer in communication with the Internet.
  8. The method of any of Claims 1, 2, or 3 wherein the computer network system is a local area network, and where the request word for transferring a computer file is directed to a server computer of execution in communication with the local area network.
  9. 9. The method of any of Claims 1, 2 or 3 wherein the file location pointer is comprised of a network address associated with the execution server computer and a file identifier correlated with the computer file requested by the client computer .
  10. The method of Claim 1 wherein the source transposed to the source identification data string is assembled within the transfer request word of a computer file and transmitted to the execution server computer.
  11. The method of Claim 10 wherein the execution server computer stores the source identification data string received from the client computer in the file transfer request word.
  12. 12. The method of Claim 10 wherein the machine-readable symbol also has encoded therein the coding key associated with the source identification data string, the encoded key is transposed by the computer's input device. , the transposed encoding key is used by the client computer to encode user-specific information associated with the client computer, and the encoded user information is assembled within the transfer request word of a computer file and transmitted to the Execution server computer.
  13. The method of Claim 12 wherein the specific information of a user is obtained, before coding thereof, from a user information data file stored on the client's computer.
  14. 14. The method of Claim 12 wherein, the symbol readable by a machine where the user's demographic data has also been encoded, the user's demographic data is correlated with a user chosen from the data carrier, the user's demographic data are transposed by the input device of the computer, and where the specific information of a user is obtained before the encoding of the same, from the demographic data of the transposed user.
  15. 15. The method of Claim 12 wherein, the execution server computer uses the source identification data string to access a lookup table to determine the decoding key associated with the encryption key, and the server execution decodes the coded information of the user received from the client computer.
  16. 16. The method of Claim 15 wherein the search table is stored locally on the execution server computer.
  17. 17. The method of Claim 15 wherein the look-up table is remotely stored in a secondary server computer.
  18. The method of Claim 15 wherein the user information comprises a credit card number associated with the user of the client computer, and where an electronic business transaction is conducted by using the number of this credit card.
  19. The method of Claim 2 wherein the user's demographic data is included in the file transfer request word transmitted to the execution computer and where the user's demographic data is stored on the execution server's computer.
  20. 20. The method of Claim 19 wherein the computer file transmitted by the execution server computer to the client computer is at least partially determined through at least part of the user's demographic data.
  21. The method of any one of Claims 1, 2 or 3 wherein the machine-readable symbol also has an encoded command executable to launch software utilities resident on the client computer, and where the software utilities are automatically released afterwards. that the symbol readable by a machine has been transposed.
  22. 22. The method of Claim 21 wherein the utility of the software is a scanning program of Internet .
  23. 23. The method of Claim 21 wherein the software utilities are a word processor program.
  24. 24. The method of Claim 23 wherein the word processor program executes a print command of a computer file.
  25. 25. The method of any of Claims 1, 2, or 3 wherein the data carrier is a document, the machine-readable symbol is a bar code symbol, and the computer's input device is a device that Scan the barcode.
  26. 26. The method of Claim 25 wherein the bar code symbol is a two-dimensional bar code symbol encoded in the PDF417 symbology.
  27. 27. The method of Claim 3 further comprises the step of de-flushing the input data string according to a program stored in the client computer.
  28. The method of Claim 27 wherein the step of obfuscating the symbol data string comprises the steps of calculating a revision sum of the symbol data string; coding the symbol data string when using the revision sum of an encoding key; assemble the revision sum with the data string of the coded symbol before coding it into the machine-readable symbol.
  29. 29. The method of Claim 28 wherein the step of debuffing comprises the steps of analyzing the input data string to determine the revision sum; decode the data string of the encoded symbol with the revision sum as a decoding key; calculate a revision sum of the decoded symbol data string; compare the calculated revision sum with the revision sum of the input data string; indicate a valid data condition when the comparison step is successful; and indicate an invalid data condition when the comparison step has not been successful.
  30. 30. A computer system comprising: a) a client computer connected to a computer network comprising a computer running server associated therewith, and b) a computer input device coupled to the client computer, adapted to read a computer. symbol readable by a machine from a data carrier and transmitting an input data string to the client computer; where the client computer comprises processing elements for transposing the input data string to a plurality of constituent fields, these fields comprise at least one file location pointer; elements for the use of the file location pointer to request a computer file designated by this, the use elements of the file location pointer comprise elements for assembling the transfer request word of a computer file, and elements for transmitting the request word for file transfer for computer to the execution server computer via a network; wherein the execution server computer comprises: elements for receiving the transfer request word from a computer file; and elements for transmitting a computer file to the client computer in response to the request word for transferring a computer file; where the fields of the input data string are also comprised by a source identification data string, the source identification data string is comprised of data correlated with an expected user of the data bearer.
  31. 31. The computer system is comprised of: a) a client computer interconnected to a computer network comprising a computer running server associated with this, and b) a computer input device coupled to the client computer, adapted to read a symbol readable by a machine from the data carrier and transmit an input data string to the client computer; Where the client computer comprises: processing elements for transposing the input data string to a plurality of constituent fields, these fields are comprised of at least one file location pointer; the elements for the use of the file location pointer to request the computer file designated there, the element for the use of the file location pointer is comprised of elements for assembling a transfer request word of a computer file comprising the location and file location pointer for transmitting the request word for transferring a computer file to the execution server computer via a network; where the execution server computer comprises; elements to receive the word of request for transfer of a computer file; and elements for transmitting a computer file to the client computer in response to the request word for transferring a computer file; where the fields of the input data string also comprise the demographic data of the user correlated with a user destined for the data bearer.
  32. 32. A computer system comprising: a) a client computer interconnected to a computer network comprising an execution server computer associated with this, and b) a computer input device coupled to the client's computer, adapted to read a symbol readable by a machine from the data carrier and transmit a string of input data to the client computer; where the client computer comprises processing elements for transposing the input data string to a plurality of constituent fields, these fields comprise at least one file location pointer; elements for using the file location pointer to request the computer file designated there, the element for use of the file location pointer comprises elements for assembling a transfer request word of a computer file comprising the location pointer of file, and elements to transmit the request word to transfer the computer file to the execution server computer via a network; wherein the execution server computer comprises: elements for receiving the transfer request word from a computer file; and elements for transmitting a computer file to the client computer in response to a request word for transferring a computer file; where the client computer is comprised of elements to de-fuse the input data string according to a program stored on the client's computer.
  33. 33. The computer system of any of Claims 30, 31, or 32 wherein the use element of the file location pointer comprises elements for passing the file location pointer to an application program on the client computer, suitable for process the corresponding computer file; and elements for the application program to retrieve the computer file from the location of the specified file.
  34. 34. The system of any of Claims 30, 31 or 32 wherein the use element of the file location pointer comprises elements for retrieving a copy of the computer file from the location of the specified file; and elements for invoking an application program on the appropriate client computer for processing the corresponding computer file.
  35. 35. The system of any of Claims 30, 31, or 32, wherein the computer network is the Internet, and wherein the request word for transferring the computer file is directed to a computer running the server in communication with the Internet.
  36. 36. The computer system of Claim 35 wherein the file location pointer comprises a uniform resource locator. (URL) to specify a file on a computer running server in communication with Internet .
  37. 37. The computer system of any of Claims 30, 31 or 32 wherein the computer network is a local area network and where the request word for transferring a computer file is directed to a computer running the server in communication in the local area network.
  38. 38. The computer system of any of Claims 30, 31, or 32 wherein the file location pointer comprises a network address associated with the execution server computer and an identification file correlated with the computer file requested by the computer. the client computer.
  39. 39. The computer system of Claim 30 wherein the assembly elements also assemble the source identification data string in the transfer request word of a computer file.
  40. 40. The computer system of Claim 39 where the execution server computer, comprises elements for storing the source identification data string received from the client computer within the transfer request word of a computer file.
  41. 41. The computer system of Claim 39 wherein the fields of the input data string also comprise an encoded key associated with the source identification data string, and wherein the client computer further comprises elements for encoding with the key. encoding a user information data file stored on the client computer, the user information data file comprises information related to the user associated with the client computer, and where the encoded user information data file is assembled within of the transfer request word from a computer file and is transmitted to the execution server computer.
  42. 42. The computer system of Claim 41 wherein the client computer is comprised of memory elements for storing the data file of the user information, and where the specific information of a user is obtained, prior to the encoding of this, from the user information data file.
  43. 43. The computer system of claim 41 wherein the fields of the input data string also comprise user demographic data correlated to a user determined by the data carrier, and where a user's specific information is obtained, before of the coding of this, from the demographic data of the user.
  44. 44. The computer system of Claim 41 wherein the execution server computer comprises elements for accessing a lookup table, this lookup table for storing a decoding key associated with the source identification data string, to obtain the decoding key associated with the source identification data string, and elements to be decoded, using the decoding key, encoded in the user information received from the client computer.
  45. 45. The computer system of Claim 44 where the search table is stored locally on the execution server computer.
  46. 46. The system of Claim 44 where the lookup table is remotely stored in a secondary server computer.
  47. 47. The computer system of claim 44 wherein the user information comprises a credit card number associated with the user of the client computer, and wherein the client computer further comprises elements for running an electronic business transaction online using the Credit card number.
  48. 48. The computer system of Claim 44 wherein the user's demographic data is included in the transfer request word of a file transmitted to the execution computer, and where the execution server computer comprises elements for storing the demographic data. of the user.
  49. 49. The computer system of Claim 48 wherein the execution server computer comprises elements for using the user's demographic data to at least partially determine the computer file transmitted by the execution server computer to the client computer.
  50. 50. The computer system of any of Claims 30, 31 or 32 wherein the fields of the input data stream also comprises an executable command to launch a software utility resident on the client computer, and where the software utility is launched automatically after the symbol readable by a machine has been transposed.
  51. 51. The computer system of Claim 50 where the software utility is an Internet sweep program.
  52. 52. The computer system of Claim 50 where the software utility is a word processor program.
  53. 53. The computer system of Claim 52 where the word processor program is caused to execute a print command of a computer file.
  54. 54. The computer system of any of Claims 30, 31, or 32 wherein the input device of the computer is a barcode scanning device.
  55. 55. The computer system of Claim 54 wherein the bar code scanning device is suitable for scanning a two-dimensional bar code symbol.
  56. 56. The computer system of Claim 32 wherein the de-sharpening element comprises elements for analyzing the input data string to determine a revision sum; elements to decode the rest of the input data string with the revision sum as a decoding key; elements to calculate a revision sum of the decoding chain; elements to compare the calculated revision sum with the revision sum of the input data string; elements to indicate a valid condition of the data when this comparison step is successful; and elements to indicate an invalid condition of the data when the comparison step is unsuccessful.
MXPA/A/1999/004043A 1996-11-08 1999-04-30 Automatic access of electronic information through machine-readable codes on printed documents MXPA99004043A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US60/030,166 1996-11-08

Publications (1)

Publication Number Publication Date
MXPA99004043A true MXPA99004043A (en) 2000-05-01

Family

ID=

Similar Documents

Publication Publication Date Title
US5933829A (en) Automatic access of electronic information through secure machine-readable codes on printed documents
WO1998020411A9 (en) Automatic access of electronic information through machine-readable codes on printed documents
US20030093384A1 (en) Scanner enhanced remote control unit and system for automatically linking to on-line resources
US6542933B1 (en) System and method of using machine-readable or human-readable linkage codes for accessing networked data resources
CA2382776C (en) System and method for integrating paper-based business documents with computer-readable data entered via a computer network
US6189009B1 (en) System and method for integrating paper-based business documents with computer-readable data entered via a computer network
US6212522B1 (en) Searching and conditionally serving bookmark sets based on keywords
WO1998038761A2 (en) Automatic server access in an internetworked computer system
EP1336272B1 (en) Processing content for electronic distribution using a digital rights management system
CN101601033A (en) Generate the Search Results of specialty in response to the medelling inquiry
US20020152215A1 (en) Distributing electronic books over a computer network
AU2007202639B2 (en) Method and apparatus for converting a document universal resource locator to a standard document identifier
EP2315140A1 (en) Method and system for hyperlinking web content
KR20010031603A (en) Method and system for accessing information on a network
WO2002035426A1 (en) Fulfilling a request for an electronic book
US20040073679A1 (en) Global unique identification of subscriber
CN101436927A (en) System and method for file transfer management
US20030105774A1 (en) Systems and Methods of referencing uniform resource locators
US7953700B2 (en) Home page automatic update system and home page automatic update method
MXPA99004043A (en) Automatic access of electronic information through machine-readable codes on printed documents
CN103823905A (en) Method and device for marking URL in search result page
CN101145936A (en) A method and system for adding tags in Web pages
CN1452762A (en) Charge system for use of two-dimensional code
AU3780899A (en) Method and system for alternate internet resource identifiers and addresses
KR100992748B1 (en) The methode of file conversion from a document file with code data to an embeded font document file on computer connected with internet or network