US20140013222A1 - Allowing Operating System Access to Non-Standard Fonts in a Network Document - Google Patents
Allowing Operating System Access to Non-Standard Fonts in a Network Document Download PDFInfo
- Publication number
- US20140013222A1 US20140013222A1 US13/956,265 US201313956265A US2014013222A1 US 20140013222 A1 US20140013222 A1 US 20140013222A1 US 201313956265 A US201313956265 A US 201313956265A US 2014013222 A1 US2014013222 A1 US 2014013222A1
- Authority
- US
- United States
- Prior art keywords
- computer
- font
- characters
- document
- operating system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000009434 installation Methods 0.000 claims abstract description 48
- 238000000034 method Methods 0.000 description 11
- 230000003287 optical effect Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 230000006978 adaptation Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 238000007639 printing Methods 0.000 description 4
- WWVKQTNONPWVEL-UHFFFAOYSA-N caffeic acid phenethyl ester Natural products C1=C(O)C(O)=CC=C1C=CC(=O)OCC1=CC=CC=C1 WWVKQTNONPWVEL-UHFFFAOYSA-N 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000000463 material Substances 0.000 description 3
- 230000005055 memory storage Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- SWUARLUWKZWEBQ-UHFFFAOYSA-N phenylethyl ester of caffeic acid Natural products C1=C(O)C(O)=CC=C1C=CC(=O)OCCC1=CC=CC=C1 SWUARLUWKZWEBQ-UHFFFAOYSA-N 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
-
- G06F17/214—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/103—Formatting, i.e. changing of presentation of documents
- G06F40/109—Font handling; Temporal or kinetic typography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/93—Document management systems
- G06F16/94—Hypermedia
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/103—Formatting, i.e. changing of presentation of documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/103—Formatting, i.e. changing of presentation of documents
- G06F40/106—Display of layout of documents; Previewing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/134—Hyperlinking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/14—Tree-structured documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/14—Tree-structured documents
- G06F40/143—Markup, e.g. Standard Generalized Markup Language [SGML] or Document Type Definition [DTD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Definitions
- the present invention relates to the field of computer font technology.
- the present invention relates to methods, systems and computer program products for allowing characters of fonts that are not standard to an operating system of a computer to be displayed and/or otherwise used by the operating system of the computer.
- an author using an authoring program loaded on a computer can write an electronic document, such as a web page.
- the authoring program may contain a number of unique or non-standard fonts that allow the author to create the electronic document so as to have a unique or desired appearance.
- a font is simply a set of characters having a predefined typeface or configuration.
- characters represented as image files are typically much larger than characters represented by fonts. Accordingly, using an image file increases the size of the electronic document, thereby increasing its download time. In addition, image files take longer to display on a screen. Thus, operations such as scrolling that require an image to be frequently rendered are slowed down and otherwise degraded. Finally, characters represented as image files cannot be stylized. For example, such characters cannot be italicized.
- a first computer includes a document builder that receives input text so that the input text may be represented in the document.
- the input text is originally defined using pre-defined font descriptions.
- the document builder then creates a new font description (hereinafter called a “proprietary vector font description”) for the input text with the aid of a character shape recorder.
- the proprietary vector font description is then placed in the document.
- the first computer system then delivers the document to a second computer system.
- the second computer system includes a character shape player which is uniquely configured to interpret the proprietary vector font descriptions included in the document. If the second computer system does not already have the character shape player, the character shape player may be downloaded with the document.
- the proprietary vector font description is not standard to a reader's operating system. Accordingly, this solution requires the use of the character shape player by every reader's computer that is to display an electronic document containing the proprietary vector font. Many applications may not be configured to access the services of the character shape player. Accordingly, this solution does not allow the fonts represented by the proprietary vector font description to be freely copied and pasted into or otherwise used, such as by printing, by other applications that do not access the services of the character shape player. In addition, even if an application had access to the object player mechanism, the fonts cannot be rendered as efficiently as they could if the operating system itself was capable of interpreting the fonts. Accordingly, operations such as scrolling of the fonts is sluggish.
- the present invention extends to methods, systems, computer program products and data structures for allowing an operating system to have access to characters of non-standard fonts included in a network document.
- a browser loaded on a computer navigates to a network document, such as a web page, that is hosted by a server.
- the network document can be any HTML document stored on any form of computer readable medium that can be opened by a browser.
- the network document contains characters that are defined by “non-standard fonts,” i. e., fonts that are not loaded on the requesting computer and thus the corresponding characters cannot be displayed or otherwise used by the operating system thereof.
- a font package containing computer readable formatting information necessary for an operating system to render the corresponding characters is provided.
- the formatting information defines the configuration of each character for a corresponding font using standard font file formats such as a scaleable outline format.
- Installation software is also provided. The font package and installation software can be downloaded off of the sever or otherwise loaded onto the computer.
- the computer automatically executes the installation software which in turn either permanently installs or temporarily exposes the computer readable formatting information to the operating system so as to enable the operating system to render the characters of the non-standard fonts.
- the network document is generated and displayed by the computer using the same characters with which it was originally created.
- the installation or exposure of the computer readable formatting information is done in a manner that the operating system of the computer has at least temporary access to utilize the characters of the nonstandard fonts. That is, the operating system is able to use the characters of the nonstandard fonts in the same way that it uses characters of original standard fonts. The operating system is thus able to efficiently copy, paste, print, modify, and otherwise edit the characters of the non-standard fonts.
- FIG. 1 is a schematic diagram of an example of a system that provides a suitable operating environment for the present invention
- FIG. 2 is a schematic diagram of a network architecture in which a developer computer can post a network document, to a server for access by browsing computers;
- FIG. 3A is a schematic diagram of an architecture that may be used to develop the network document as shown in FIG. 2 containing non-standard characters so as to facilitate delivery of the non-standard characters to the browsing computers;
- FIG. 3B is a schematic diagram of an alternative design of the architecture shown in FIG. 3A ;
- FIG. 4 illustrates an example of a data structure that may be used to deliver the non-standard characters to the browsing computers
- FIG. 5 is a flowchart showing one method of operation of the present invention.
- FIG. 6 is a schematic diagram of an installation module operating between a browser and an operating system
- FIG. 7 is a schematic diagram of an HTML network document incorporating features of the present invention.
- FIG. 8 is a schematic diagram of an email based network document incorporating features of the present invention.
- the present invention extends to methods, systems, computer program products and data structures for allowing an operating system to have access to characters of non-standard fonts included in a network document.
- a browser loaded on a computer navigates to a network document, such as a web page, that is hosted by a server.
- the network document can be any HTML document stored on any form of computer readable medium that can be opened by a browser.
- the network document contains characters that are defined by “non-standard fonts,” i. e., fonts that are not loaded on the requesting computer and thus the corresponding characters cannot be displayed or otherwise used by the operating system thereof.
- a font package containing computer readable formatting information necessary for an operating system to render the corresponding characters is provided.
- the formatting information defines the configuration of each character for a corresponding font using standard font file formats such as a scaleable outline format.
- Installation software is also provided. The font package and installation software can be downloaded off of the sever or otherwise loaded onto the computer.
- the computer automatically executes the installation software which in tum either permanently installs or temporarily exposes the computer readable formatting information to the operating system so as to enable the operating system to render the characters of the non-standard fonts.
- the network document is generated and displayed by the computer using the same characters with which it was originally created.
- the installation or exposure of the computer readable formatting information is done in a manner that the operating system of the computer has at least temporary access to utilize the characters of the nonstandard fonts. That is, the operating system is able to use the characters of the nonstandard fonts in the same way that it uses characters of original standard fonts. The operating system is thus able to efficiently copy, paste, print, modify, and otherwise edit the characters of the non-standard fonts.
- Embodiments within the scope of the present invention include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon.
- Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer.
- Such computer-readable media can comprise physical storage media such as RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
- Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
- FIG. 1 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented.
- one embodiment of the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by computers in network environments.
- program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein.
- the particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
- the term “computer” as used herein is broadly intended to include personal computers, hand-held devices such as personal information managers (PIMs), multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like.
- PIMs personal information managers
- the term “computer” also includes distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network.
- program modules may be located in both local and remote memory storage devices.
- one example of a system for implementing the invention includes a general purpose computing device in the form of a conventional computer 120 .
- Conventional computer 120 includes a processing unit 121 , a system memory 122 , and a system bus 123 that couples various system components including the system memory 122 to the processing unit 121 .
- the system bus 123 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
- the system memory includes read only memory (ROM) 124 and random access memory (RAM) 125 .
- a basic input/output system (BIOS) 126 containing the basic routines that help transfer information between elements within the computer 120 , such as during start-up, may be stored in ROM 124 .
- the computer 120 may also include a magnetic hard disk drive 127 for reading from and writing to a magnetic hard disk 139 , a magnetic disk drive 128 for reading from or writing to a removable magnetic disk 129 , and an optical disk drive 130 for reading from or writing to removable optical disk 131 such as a CD-ROM or other optical media.
- the magnetic hard disk drive 127 , magnetic disk drive 128 , and optical disk drive 130 are connected to the system bus 123 by a hard disk drive interface 132 , a magnetic disk drive-interface 133 , and an optical drive interface 134 , respectively.
- the drives and their associated computer-readable media provide nonvolatile storage of computer-executable instructions, data structures, program modules and other data for the computer 120 .
- exemplary environment described herein employs a magnetic hard disk 139 , a removable magnetic disk 129 and a removable optical disk 131
- other types of computer readable media for storing data can be used, including magnetic cassettes, flash memory cards, digital versatile disks, Bernoulli cartridges, RAMs, ROMs, and the like.
- Program code means comprising one or more program modules may be stored on the hard disk 139 , magnetic disk 129 , optical disk 131 , ROM 124 or RAM 125 , including an operating system 135 , one or more application programs 136 , other program modules 137 , and program data 138 .
- a user may enter commands and information into the computer 120 through keyboard 140 , pointing device 142 , or other input devices (not shown), such as a microphone, joy stick, game pad, satellite dish, scanner, or the like.
- These and other input devices are often connected to the processing unit 121 through a serial port interface 146 coupled to system bus 123 .
- the input devices may be connected by other interfaces, such as a parallel port, a game port or a universal serial bus (USB).
- a monitor 147 or another display device is also connected to system bus 123 via an interface, such as video adapter 148 .
- personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
- the computer 120 may operate in a networked environment using logical connections to one or more remote computers, such as remote computers 149 a and 149 b.
- Remote computers 149 a and 149 b may each be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically include many or all of the elements described above relative to the computer 120 , although only memory storage devices 150 a and 150 b and their associated application programs 136 a and 136 b have been illustrated in FIG. 1 .
- the logical connections depicted in FIG. 1 include a local area network (LAN) 151 and a wide area network (WAN) 152 that are presented here by way of example and not limitation.
- LAN local area network
- WAN wide area network
- the computer 120 When used in a LAN networking environment, the computer 120 is connected to the local network 151 through a network interface or adapter 153 .
- the computer 120 may include a modem 154 , a wireless link, or other means for establishing communications over the wide area network 152 , such as the Internet.
- the modem 154 which may be internal or external, is connected to the system bus 123 via the serial port interface 146 .
- program modules depicted relative to the computer 120 may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing communications over wide area network 152 may be used.
- FIG. 1 is provided by way of illustration only.
- the principles of the present invention may be implemented in any operating environment that is able to implement the principles of the present invention.
- general-purpose computers, special-purpose computers or special purpose processing devices might implement the principles of the present invention.
- the principles of the present invention may be implemented by software, hardware, firmware or any combination thereof.
- FIG. 2 illustrates a typical network environment 200 in which one embodiment of the present invention is incorporated.
- Network environment 200 includes a developer computer 201 and a browsing computer 204 .
- Browsing computer 204 is loaded with a network browser 205 , such as MICORSOFT Internet Explorer or NETS CAPE NAVIGATOR, and is selectively coupled in electrical communication with a network 206 .
- Network 206 can comprise one or more LANs such as LAN 151 and/or one or more WAN s such as WAN 152 as described with FIG. 1 .
- network 206 includes a server 203 .
- Server 203 can comprise a conventional Internet server or any other type or combination of computers as previously discussed herein.
- Browser 205 is configured to enable browsing computer 204 to access and communicate with server 203 .
- developer computer and “browsing computer” is each intended to include “computers” as previously defined herein.
- One example of developer computer 201 and browsing computer 204 is computer 120 as discussed with regard to FIG. 1 .
- one or more additional browsing computers 204 a - b can also be electrically coupled with network 206 .
- developer computer 201 can also be electrically coupled with network 206 through a network browser.
- Network document 202 is shown as being hosted or stored on server 203 .
- network document is intended to mean any form of an electronic file that can have a display character embedded therein, attached thereto, referenced therein, such as through a link, or can otherwise be associated therewith.
- character as used herein is intended to mean any discrete letter, number, symbol, design, mark, sign, figure, text, or the like that is currently known or created in the future.
- a “character” also includes a bit value qualified by a corresponding font or default font.
- HTML document such as a web page
- the font tag defines the name of the font, such as Times New Roman or Courier.
- the computer reads each of the characters of the text as a numerical bit value.
- the operating system read the font tag and determines whether a font file corresponding to the font tag is loaded in the standard font directory.
- Each font file includes the formatting information necessary for the operating system to render each character of the font.
- the operating system determines the bit value of each character and then renders each character by matching the bit value to the formatting information in the corresponding font file. Accordingly, although the letter “A” may always have the same bit value, its configuration can be changed by simply associating it with different font tags. Accordingly, in one embodiment computer executable instructions identifying a display character includes the bit value for a character and the font or default font qualifying the bit value.
- display character means the characters of a network document which are intended to be or can selectively be displayed during normal viewing of the network document. “Display characters” are in contrast to computer executable instructions or source code comments.
- non-standard character is intended to mean display characters of a network document for which the corresponding formatting information is not loaded on or otherwise available to a browsing computer for rendering the character prior to requesting or otherwise receiving the network document. It is appreciated that the determination of whether a character qualifies as a non-standard character is based solely upon what formatting information is loaded upon or otherwise available to a discrete browsing computer. As different browsing computers may have different fonts and corresponding formatting information available thereon, a list of non-standard characters for a discrete network document can change between different browsing computers even if the network document remains the same.
- a “font” defines one or a group of characters each having a defined configuration.
- fonts There are thousands of different known fonts. Examples of conventional letter fonts include the characters associated with Times New Roman, Arial, and Courier. Examples of conventional symbol fonts found on MICROSOFT Word 2000 include the characters associated with Symbol, Tahoma, and WP Math A. Furthermore, just as an infinite number of different characters can be created, it is appreciated that an infinite number of unique and different fonts can be created.
- network documents can include web pages and other forms of electronic files that can be posted on the Internet; email communications including those that have an HTML document attached thereto; and an HTML document that has embedded therein or reference to any form of application file that contains a display character.
- application files include text files, WORDPERFECT files, power point presentation files, and other special application files.
- FIG. 3A illustrates one embodiment of developer computer 201 of FIG. 2 having a developer application program 301 loaded thereon.
- developer application program 301 includes a document builder 302 that allows an author to generate network document 202 .
- document builder 302 can be any type of existing program, such as MICROSFT FRONTPAGE or MICROSOFT Word, or a specially written program which is capable of forming an HTML document.
- Developer application program 301 also includes a character packager 303 .
- One function of character packager 303 is to generate a font package 304 that is incorporated into or linked to network document 202 .
- font package 304 includes the formatting information necessary for the operating system of browsing computer 204 to .generate one or more display characters, generally non-standard characters, when browsing computer 204 downloads and displays network document 202 .
- one of the problems of the prior art is that an increasing number of electronic documents are being created using unique characters wherein corresponding formatting information is not loaded on or otherwise available to a browsing computer, i.e., non-standard characters. Accordingly, when a browsing computer downloads the electronic document over a network or otherwise receives and opens the electronic document, the electronic document is displayed on the browsing computer without the non-standard characters or by replacing the non-standard characters with other characters that are available to the browsing computer. In any event, the electronic document is displayed in a format different from that intended at its creation.
- character packager 303 identifies the display characters used in network document 202 that are to be included in font package 304 .
- Character packager 303 is a program that can be written in C++ or other languages and may run as either a standard desktop application or within a web browser via its own plugin technology.
- the identification of the display characters can be accomplished in a variety of different ways.
- a user interface 305 allows the author or another to identify specific characters, groups of characters, or entire fonts that are to be included within font package 304 .
- character packager 303 can enable manual input, manual highlighting, manual selection from a table, and/or other form of manual selection of the specific characters, groups of characters, and/or fonts which are to be included in font package 304 . This selection of characters can be accomplished either before, during, or after the creation of network document 202 .
- the characters and/or groups which are selected include those characters which the individual making the selection believes the corresponding formatting information is most likely not loaded on or otherwise available to browsing computer 204 which will ultimately display network document 202 .
- character groups and/or fonts can be selected even if all of the characters of a group or font are not used within network document 202 .
- all fonts where at least one character thereof is used within network document 202 can be selected for inclusion into font package 304 .
- a document examiner 306 can be used.
- Document examiner 306 examines network document 202 and, based on preestablished parameters, automatically selects characters, character groups, and/or fonts for incorporation into font package 304 .
- document examiner 306 can contain a list of characters, character groups, and/or fonts (hereinafter, “character list”), selected from the entire inventory of characters and fonts available for use by document builder 302 in the creation of document 202 , which are considered likely to be non-standard characters to browsing computer 204 .
- the character list may correspond to those characters or fonts which are not standard to WINDOWS 2000 or some other predefined operating system.
- document examiner 306 searches network document 202 and identifies all characters within document 202 that are found on the character list. The identified characters are then incorporated into character packager 303 .
- document examiner 306 can search electronic document 202 and identify all of the fonts used therein that are located on the character list. The identified fonts are then incorporated into character packager 303 . It is appreciated that there are a variety of different ways in which document examiner 306 can select the characters or fonts. For example, document examiner 306 can also include a list of standard characters and/or fonts and then review network document 202 to identify those characters and/or fonts that are not on the standard list.
- each font file 312 has a font name and corresponds to a defined character, group of characters, or entire font.
- each font file 312 includes all of the computer readable formatting information necessary for a computer operating system to render each of the characters associated with the corresponding font file 312 .
- the type of formatting information is generally the same as that for standard fonts.
- the formatting information is sufficient to enable display, printing, copying, pasting, and other conventional forms of manipulation such as bolding, underlining, strikeout, and the like.
- the formatting information can be in any standard font file format.
- the formatting information is in a scaleable outline form such as TRUETYPE. Examples of other formats include raster and stroke. It is appreciated that meta files can also be used.
- each font file 312 can include formatting information for only one character, more often, each font file 312 includes information on a group of characters or a complete font.
- document examiner 306 can be used to select all characters of a given font used within network document 202 . This group of characters, which is typically less than the entire font, is assigned to a specific font file 312 . The file is typically given a name other than the conventional font name so that the sub-set of the font does not accidentally replace the complete font which may already be loaded on a browsing computer.
- Character packager 303 also creates a discrete control object 314 for each corresponding font file 312 .
- Contained within each control object 314 is select handling information which can be used to selectively enhance, manipulate, or otherwise alter the characters within the corresponding font file 312 .
- the handling information can facilitate stretching, twisting, looping, unique shadowing, or any other manipulation of characters that is not standard to an operating system.
- the handling information generally does not include the information necessary for bolding, underlining, strikeout, italicizing, outlining, and the like.
- character packager 303 combines and compresses font files 312 and control objects 314 so as to form font package 304 .
- FIG. 4 illustrates one embodiment of a data structure for font package 304 .
- font package 304 includes a general header 601 that contains general information about font package 304 in an uncompressed state.
- a document header 602 is in a compressed state and includes general document and version information.
- the discrete font files 312 are also located within font package 304 in a compressed state.
- For each font file 312 has a corresponding character object 603 .
- Character objects 603 are substantially the same as control objects 314 in that each character object 603 includes the handling information for the characters of the corresponding font file 312 .
- character objects 603 specifically reference the corresponding font file 312 so as to facilitate handling of the characters.
- character objects 603 include one or more character objects such as character object A (labeled 604 ) and character object B (labeled 605 ).
- Each character object references and describes handling and version information for a corresponding font file of font files 312 .
- character object A references and describes corresponding handling and version information for font file A (labeled 607 )
- character object B references and describes corresponding handling and version information for font file B (labeled 608 ).
- character packager 303 can also encrypt font package 304 . It is appreciated that the data structure of font package 304 can have a variety of different configurations and that the files therein need not be compressed. Furthermore, in one embodiment, control objects 314 and character objects 603 can be eliminated. That is, where it is only desired to generate the characters as opposed to the additional handling thereof, font package 304 can be created with only font files 312 .
- font package 304 is assigned an extension such as, for example, “.TRZ”.
- font package 304 is imbedded directly within network document 202 .
- font package 304 can be stored in a different directory than network document 202 at server 203 and can also be stored at a different server.
- network document 202 references font package 304 using a corresponding tag.
- font package 304 is also downloaded.
- a file being “referenced” in a document means that downloading the document also causes downloading of the file such as through corresponding tags, such as embedded tags or object tags, or other computer executable instructions.
- character packager 303 also creates instruction code 310 , depicted in FIG. 3A , that is either referenced by or embedded within network document 202 .
- Instruction code 310 comprises computer executable instructions that facilitate downloading onto browsing computer 204 an installation module 501 .
- installation module 501 is loaded onto server 203 ( FIG. 2 ) and comprises computer-executable instructions for automatically installing font package 304 on browsing computer 204 when browsing computer 204 requests network document 202 .
- installation module 501 comprises an ACTIVEX® control.
- Instruction code 310 in one embodiment, comprises a Multipurpose Internet Mail Extension (MIME) type which corresponds to the extension of the font package (e.g., “.TRZ”).
- MIME Multipurpose Internet Mail Extension
- the file name and relative path of installation module 501 are identified in instruction code 310 within a tag that indicates to the browser that installation module 501 is to be downloaded.
- network document 202 references installation module 501 for downloading with network document 202 .
- network document 202 is loaded onto server 203 so as to accessible by browser computer 204 over network 206 .
- installation module 501 is also loaded onto server 203 .
- document builder 302 need not be included in developer application program 301 . This is because it is not necessary that character packaging occur concurrently with the building of network document 202 .
- network document 202 is generated using a conventional document builder 308 that is completely separate from a developer application program 316 . Examples of document builder 308 include all standard and specially designed applications used for creating HTML documents.
- character packager 303 of developer application program 316 creates font package 304 as previously discussed above with regard to FIG. 3A .
- network document 202 can be created on a separate computer and then loaded onto developer computer 201 where developer application program 316 is applied thereto.
- FIG. 5 Depicted in FIG. 5 is a flow chart showing the method of operation between browsing computer 204 and server 203 .
- Actions performed primarily by server 203 are listed in the left column while actions performed primarily by browsing computer 204 are listed in the right column.
- browsing computer 401 navigates to network document 202 by generating a request for network document 202 and communicating the request to server 203 in accordance with a transport protocol such as, for example, HyperText Transport Protocol (HTTP).
- HTTP HyperText Transport Protocol
- browsing computer 204 navigates to network document 202 by either typing in the URL for network document 202 or activating a link thereto.
- server 203 receives the request for network document 202 .
- server 203 downloads network document 202 to browsing computer 204 (act 403 ).
- Network document 202 includes either directly or indirectly, such as through a reference, instruction code 310 and font package 304 .
- instruction code 310 and font package 304 are downloaded with network document 202 .
- browsing computer 204 receives and begins processing the computer executable instructions within network document 202 .
- browsing computer 204 processes instruction code 310 and requests installation module 501 .
- the request for installation module 501 can be automatic which automation can include a prompt.
- Server 203 receives the request and downloads installation module 501 to browsing computer 204 .
- installation module 501 is installed on browsing computer 204 , such as an extension to one or more browsers. Again, the installation of installation module 501 can be automatic which automation can include a prompt. In tum, installation module 501 automatically makes font package 304 available to the operating system of browsing computer 204 .
- FIG. 6 illustrates installation module 501 and surrounding elements that are emulated when computer-executable instructions are executed by the processor associated with browsing computer 204 .
- installation module 501 communicates with a conforming browser 205 A of browsing computer 204 via, for example, function calls and returns.
- Conforming browser 205 A represents browsers that are able to communicate with installation module 501 without an intennediary module. For example, MICROSOFT Internet Explorer may communicate directly with an ACTIVEX® control without a plug in.
- Installation module 501 also may communicate with non-confonning browser 205 B of browsing computer 204 .
- Non-confonning browser 205 B represents browsers that are not able to communicate with installation module 501 without an intennediate module. Accordingly, installation module 501 communicates with nonconforming browser 205 B via an intennediary adaptation module 504 .
- installation module 501 is an ACTIVEX control
- some browsers such as NETSCAPE may not communicate directly with installation module 501 .
- adaptation module 504 may be, for example, a plug-in for NETS CAPE that translates function calls and returns.
- the present invention may be implemented with a wide variety of browsers.
- adaptation module 504 can be selectively downloaded from server 203 with installation module 501 based on the type of browser (confonning or non-con tinning) requesting installation module 501 .
- adaptation module 504 can be incorporated into installation module 501 and thus always downloaded but only accessed when needed.
- Browsers 205 A and/or 205 B can also detennine whether installation module 501 has been previously downloaded to browsing computer 204 . If so, redundant downloading of installation module 501 may be avoided.
- the MIME type used in requesting installation module 501 can also identify the desired version for installation module 501 . The browser can thus check the previously installed installation module 501 and if old, download the new version.
- the version checking can be done by checking the HTML CODEBASE version specified.
- NETSCAPE NAVIGATOR a special JA V ASCRIPT code can be used to check the version number.
- installation module 501 also communicates with operating system 505 of browser computer 204 , thereby accessing all the wealth of resource offered by the operating system 505 .
- installation module 501 first decompresses, if previously compressed, and deciphers, if previously encrypted, character objects 603 and font files 312 along with the header information contained within font package 304 . Once decompressed and deciphered, character objects 603 and font files 312 are automatically either permanently installed on or temporarily exposed to operating system 505 by installation module 501 . Temporary exposure may occur, for example, when it is desired to limit the use or life of the non-standard characters. Permanent installation can be used to allow perpetual unrestricted use of the non-standard characters.
- character objects 603 and corresponding referenced font files 312 are copied into the same directory as the other standard or permanent system fonts 508 .
- permanent system fonts are typically stored in a system fonts directory.
- the system registry 509 is then updated to reflect the addition of the new permanent character objects 603 and corresponding font files 312 .
- Temporary fonts directory 507 may be located so as not to be directly accessible by a user.
- character objects 603 and font files 312 can be copied into hidden temporary files.
- Virtual memory mapped files are used to enable operating systems 505 to access the hidden temporary files.
- character objects 603 and font files 312 can also be copied to virtual memory files.
- system font table 506 is updated to reflect the new temporary font files 312 .
- the installed font files 312 are enumerated in a virtual memory array to ensure that any existing fonts with the same name are not replaced.
- All of the currently running applications may be notified of new font files 312 via, for example, a standard WM_FONTCHANGE message with HWND_BROADCAST as the target message.
- Server 203 may be notified of the successful installation of character objects 603 and font files 312 via a callback to a JA V ASCRIPT ® function provided in HTML document 202 .
- this notification may be accomplished via LIVE CONNECT®.
- Internet Explorer this notification may be accomplished via an ACTIVEX® Component Object Model (COM).
- Temporary fonts directory 507 which contains character objects 603 and font files 312 , can be removed or at least become inaccessible through a variety of different mechanisms.
- installation module 501 can be programmed to automatically delete character objects 603 and font files 312 via a JA V ASCRIPT® control when the browser is turned off or when any other predefined act is performed, such as closing network document 202 or requesting another web page.
- JA V ASCRIPT® control when the browser is turned off or when any other predefined act is performed, such as closing network document 202 or requesting another web page.
- these files are either erased or become inaccessible to operating system 505 once browsing computer 204 is shut down or rebooted.
- font files 312 are enabled on browsing computer 204
- operating system 505 uses font files 312 to generate the display of network document 202 in the same form that it was originally created.
- the characters within font files 312 can be used the same as any of the font characters originally loaded on browsing computer 204 .
- the characters of font files 312 can be cut, pasted, printed and otherwise handled or manipulated, i. e., underlined, italicized, bolded, etc., just the same as originally loaded font characters. In tum, this increases efficient inter-application functionality.
- the characters of font files 312 can also be copied and pasted to any other application being control by operating system 505 , for example, applications 510 a or 510 b as depicted in FIG. 6 .
- FIG. 7 depicted in FIG. 7 is a network document 700 which is in HTML.
- Network document 700 can be posted on a server, attached to an e-mail, recorded on a computer disk or CD, or recorded on any other type of computer readable media which can be requested by or transferred to browsing computer 204 for opening by browser 205 .
- Application 706 Embedded within network document 700 or included by a linked reference is an application 706 .
- Application 706 can comprise any type of application program, application file, plugin, or ACTIVEX that generates or includes one or more display characters.
- font package 704 includes one or more font files which contain the formatting information necessary for the creation of the non-standard display characters of application 706 . If desired, character objects containing handling information can also be incorporated into font package 704 . In this embodiment, font package 704 may be created completely independent of application 706 .
- installation module 501 In substantially the same manner as discussed above with regard to FIG. 5 , as browser 205 opens and begins processing network document 700 , instruction code 310 embedded therein requests installation module 501 which is downloaded by server 203 . In turn, installation module 501 either permanently installs or temporarily exposes the font files of font package 704 on browsing computer 204 . Accordingly, as application 706 is opened or run so as to generate the display characters thereof, the non-standard display characters are displayed in their intended configuration.
- a network document 720 comprises an email. Typed directly on the email can be one or more display characters. Alternatively or in combination therewith, an application 730 can be attached to network document 720 . Application 730 can comprise any type of application program or file that generates or includes one or more display characters.
- Font package 726 includes one or more font files which contain the formatting information necessary for the creation of the non-standard display characters typed on the email and/or which are to be generated or included in application 730 .
- network document 720 is emailed to browsing computer 204 and opened thereon.
- HTML document 722 is selected and then opened by browser 205 .
- instruction code 310 embedded therein requests installation module 501 which is downloaded by server 203 .
- installation module 501 either permanently installs or temporarily exposes the font files of font package 726 on browsing computer 204 .
- the nonstandard characters typed on the email body portion of network document 720 can be appropriately displayed.
- application 706 is opened or run so as to generate display characters, the non-standard display characters can be displayed in their intended configuration.
- the present invention also envisions that an HTML document containing a font package and instruction code 310 can also be delivered to browsing computer 204 completely separate from an HTML document, application program, or application file that contains corresponding non-standard display characters. That is, once font files are permanently installed or temporarily exposed on browsing computer 204 , an HTML document, application program, or application file that was either previously or subsequently loaded can be run or opened. The non-standard display character generated by the document, program, or file can then be appropriately displayed as a result of the loaded font files.
- the principles of the present invention allow the operating system of a browsing computer access to non-standard characters when the browsing computer either retrieves off of the Internet or otherwise opens a network document or application that uses the non-standard characters.
- This allows the author of the electronic document or application to feel secure that no matter how unique the characters chosen to convey a message, the characters will be rendered on the browsing computer as the author intended.
- the operating system can now use the nonstandard characters for copying and pasting across applications, as well as any other editing or printing that is enabled by the operating system, thus enhancing the functionality to the end user.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Artificial Intelligence (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Document Processing Apparatus (AREA)
- Information Transfer Between Computers (AREA)
Abstract
When a browsing computer navigates to a network document, such as a web page, the corresponding . server also downloads computer readable formatting information necessary for the operating system of the browsing computer to render nonstandard characters within the network document. An installation module is also downloaded to the browsing computer. The installation module is loaded onto the browsing computer which in turn either permanently installs or temporarily exposes the operating system of the browsing computer to the computer readable formatting information. As a result, the operating system of the browsing computer is able to display the network document including the non-standard characters.
Description
- This application is a Continuation of and claims priority under 35 U.S.C. § 120 to U.S. patent application Ser. No. 11/443,664, titled “ALLOWING OPERATING SYSTEM ACCESS TO NON-STANDARD FONTS IN A NETWORK DOCUMENT” filed May 30, 2006, which claims priority under 35 U.S.C. § 120 to U.S. patent application Ser. No. 09/906,444, titled “ALLOWING OPERATING SYSTEM ACCESS TO NON-STANDARD FONTS IN A NETWORK DOCUMENT” filed Jul. 16, 2001, later abandoned, the contents of which are all incorporated by reference herein.
- 1. The Field of the Invention
- The present invention relates to the field of computer font technology. In particular, the present invention relates to methods, systems and computer program products for allowing characters of fonts that are not standard to an operating system of a computer to be displayed and/or otherwise used by the operating system of the computer.
- 2. Relevant Technology
- Authors are in the business of conveying a message through the skillful and artistic use of characters often referred to as “text”. In addition to the message read from the text, authors are often also concerned with the impression made by the visual appearance of the text. For example, a skilled author would not draft a technical document using the font style of a child's picture book as doing so would diminish the seriousness and professionalism of the work.
- Recently, network sites, such as Internet web sites, have been made available as a new authoring medium. For example, an author using an authoring program loaded on a computer can write an electronic document, such as a web page. The authoring program may contain a number of unique or non-standard fonts that allow the author to create the electronic document so as to have a unique or desired appearance. In general, a font is simply a set of characters having a predefined typeface or configuration. Once created, the electronic document is stored on a server. A reader can then request and download the electronic document for display on the reader's computer.
- Authors of conventional printed material can generally feel assured that, unless there is some damage to the printed material, the printed material will appear to the reader precisely as it was generated by the author. In contrast, electronic documents requested by a reader are displayed on the reader's computer using only the fonts that are currently loaded on the reader's computer. Accordingly, if the reader's computer does not contain the same fonts that were used by the author in creating the electronic document, the electronic document is displayed on the reader's computer in a form different than that originally created by the author. Generally, the operating system of the reader's computer replaces the unknown fonts with known fonts when displaying the electronic document.
- Several attempts have been made to ensure that electronic documents made with non-standard fonts are displayed on a reader's computer in the same form, i.e., same font(s), as created by the author. One commonly used method is to represent the text as images in a digital format, such as bitmaps or jpeg files. These digital images, however, cannot be resized without a loss of quality. For example, if a digital picture of a text character is enlarged, the resolution of the text character is also enlarged, thereby degrading the visual appearance of the character both on the screen and in print.
- Furthermore, characters represented as image files are typically much larger than characters represented by fonts. Accordingly, using an image file increases the size of the electronic document, thereby increasing its download time. In addition, image files take longer to display on a screen. Thus, operations such as scrolling that require an image to be frequently rendered are slowed down and otherwise degraded. Finally, characters represented as image files cannot be stylized. For example, such characters cannot be italicized.
- In another attempted solution, a first computer includes a document builder that receives input text so that the input text may be represented in the document. The input text is originally defined using pre-defined font descriptions. The document builder then creates a new font description (hereinafter called a “proprietary vector font description”) for the input text with the aid of a character shape recorder. The proprietary vector font description is then placed in the document. The first computer system then delivers the document to a second computer system.
- The second computer system includes a character shape player which is uniquely configured to interpret the proprietary vector font descriptions included in the document. If the second computer system does not already have the character shape player, the character shape player may be downloaded with the document.
- Although this latter solution improves upon the prior state of the art, the proprietary vector font description is not standard to a reader's operating system. Accordingly, this solution requires the use of the character shape player by every reader's computer that is to display an electronic document containing the proprietary vector font. Many applications may not be configured to access the services of the character shape player. Accordingly, this solution does not allow the fonts represented by the proprietary vector font description to be freely copied and pasted into or otherwise used, such as by printing, by other applications that do not access the services of the character shape player. In addition, even if an application had access to the object player mechanism, the fonts cannot be rendered as efficiently as they could if the operating system itself was capable of interpreting the fonts. Accordingly, operations such as scrolling of the fonts is sluggish.
- Therefore, what are desired are methods, systems, and computer program products for allowing characters of fonts that are not standard to an operating system of a reader's computer to be conveniently used by the operating system to facilitate viewing, copying, pasting, printing, and/or editing of the characters in different applications.
- The present invention extends to methods, systems, computer program products and data structures for allowing an operating system to have access to characters of non-standard fonts included in a network document. In one embodiment, a browser loaded on a computer navigates to a network document, such as a web page, that is hosted by a server. In an alternative embodiment, the network document can be any HTML document stored on any form of computer readable medium that can be opened by a browser. The network document contains characters that are defined by “non-standard fonts,” i. e., fonts that are not loaded on the requesting computer and thus the corresponding characters cannot be displayed or otherwise used by the operating system thereof.
- To enable the computer requesting or opening the network document to generate the characters defined by the non-standard fonts, a font package containing computer readable formatting information necessary for an operating system to render the corresponding characters is provided. The formatting information defines the configuration of each character for a corresponding font using standard font file formats such as a scaleable outline format. Installation software is also provided. The font package and installation software can be downloaded off of the sever or otherwise loaded onto the computer.
- The computer automatically executes the installation software which in turn either permanently installs or temporarily exposes the computer readable formatting information to the operating system so as to enable the operating system to render the characters of the non-standard fonts. As a result, the network document is generated and displayed by the computer using the same characters with which it was originally created.
- Furthermore, in one embodiment the installation or exposure of the computer readable formatting information is done in a manner that the operating system of the computer has at least temporary access to utilize the characters of the nonstandard fonts. That is, the operating system is able to use the characters of the nonstandard fonts in the same way that it uses characters of original standard fonts. The operating system is thus able to efficiently copy, paste, print, modify, and otherwise edit the characters of the non-standard fonts.
- To further clarify the above and other advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
-
FIG. 1 is a schematic diagram of an example of a system that provides a suitable operating environment for the present invention; -
FIG. 2 is a schematic diagram of a network architecture in which a developer computer can post a network document, to a server for access by browsing computers; -
FIG. 3A is a schematic diagram of an architecture that may be used to develop the network document as shown inFIG. 2 containing non-standard characters so as to facilitate delivery of the non-standard characters to the browsing computers; -
FIG. 3B is a schematic diagram of an alternative design of the architecture shown inFIG. 3A ; -
FIG. 4 illustrates an example of a data structure that may be used to deliver the non-standard characters to the browsing computers; -
FIG. 5 is a flowchart showing one method of operation of the present invention; -
FIG. 6 is a schematic diagram of an installation module operating between a browser and an operating system; -
FIG. 7 is a schematic diagram of an HTML network document incorporating features of the present invention; and -
FIG. 8 is a schematic diagram of an email based network document incorporating features of the present invention. - The present invention extends to methods, systems, computer program products and data structures for allowing an operating system to have access to characters of non-standard fonts included in a network document. In one embodiment, a browser loaded on a computer navigates to a network document, such as a web page, that is hosted by a server. In an alternative embodiment, the network document can be any HTML document stored on any form of computer readable medium that can be opened by a browser. The network document contains characters that are defined by “non-standard fonts,” i. e., fonts that are not loaded on the requesting computer and thus the corresponding characters cannot be displayed or otherwise used by the operating system thereof.
- To enable the computer requesting or opening the network document to generate the characters defined by the non-standard fonts, a font package containing computer readable formatting information necessary for an operating system to render the corresponding characters is provided. The formatting information defines the configuration of each character for a corresponding font using standard font file formats such as a scaleable outline format. Installation software is also provided. The font package and installation software can be downloaded off of the sever or otherwise loaded onto the computer.
- The computer automatically executes the installation software which in tum either permanently installs or temporarily exposes the computer readable formatting information to the operating system so as to enable the operating system to render the characters of the non-standard fonts. As a result, the network document is generated and displayed by the computer using the same characters with which it was originally created.
- Furthermore, in one embodiment the installation or exposure of the computer readable formatting information is done in a manner that the operating system of the computer has at least temporary access to utilize the characters of the nonstandard fonts. That is, the operating system is able to use the characters of the nonstandard fonts in the same way that it uses characters of original standard fonts. The operating system is thus able to efficiently copy, paste, print, modify, and otherwise edit the characters of the non-standard fonts.
- Embodiments within the scope of the present invention include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise physical storage media such as RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
- When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired and wireless) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of computer-readable media. Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
-
FIG. 1 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. Although not required, one embodiment of the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by computers in network environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps. - Those skilled in the art will appreciate that the invention may be practiced in network computing environments with many types of computer system configurations. The term “computer” as used herein is broadly intended to include personal computers, hand-held devices such as personal information managers (PIMs), multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. The term “computer” also includes distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
- With reference to
FIG. 1 , one example of a system for implementing the invention includes a general purpose computing device in the form of aconventional computer 120.Conventional computer 120 includes a processing unit 121, asystem memory 122, and a system bus 123 that couples various system components including thesystem memory 122 to the processing unit 121. The system bus 123 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read only memory (ROM) 124 and random access memory (RAM) 125. A basic input/output system (BIOS) 126, containing the basic routines that help transfer information between elements within thecomputer 120, such as during start-up, may be stored inROM 124. - The
computer 120 may also include a magnetic hard disk drive 127 for reading from and writing to a magnetic hard disk 139, amagnetic disk drive 128 for reading from or writing to a removable magnetic disk 129, and an optical disk drive 130 for reading from or writing to removable optical disk 131 such as a CD-ROM or other optical media. The magnetic hard disk drive 127,magnetic disk drive 128, and optical disk drive 130 are connected to the system bus 123 by a hard disk drive interface 132, a magnetic disk drive-interface 133, and an optical drive interface 134, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer-executable instructions, data structures, program modules and other data for thecomputer 120. Although the exemplary environment described herein employs a magnetic hard disk 139, a removable magnetic disk 129 and a removable optical disk 131, other types of computer readable media for storing data can be used, including magnetic cassettes, flash memory cards, digital versatile disks, Bernoulli cartridges, RAMs, ROMs, and the like. - Program code means comprising one or more program modules may be stored on the hard disk 139, magnetic disk 129, optical disk 131,
ROM 124 orRAM 125, including an operating system 135, one or more application programs 136,other program modules 137, andprogram data 138. A user may enter commands and information into thecomputer 120 through keyboard 140, pointing device 142, or other input devices (not shown), such as a microphone, joy stick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 121 through aserial port interface 146 coupled to system bus 123. Alternatively, the input devices may be connected by other interfaces, such as a parallel port, a game port or a universal serial bus (USB). A monitor 147 or another display device is also connected to system bus 123 via an interface, such asvideo adapter 148. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers and printers. - The
computer 120 may operate in a networked environment using logical connections to one or more remote computers, such asremote computers 149 a and 149 b.Remote computers 149 a and 149 b may each be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically include many or all of the elements described above relative to thecomputer 120, although only memory storage devices 150 a and 150 b and their associatedapplication programs 136 a and 136 b have been illustrated inFIG. 1 . The logical connections depicted inFIG. 1 include a local area network (LAN) 151 and a wide area network (WAN) 152 that are presented here by way of example and not limitation. Such networking environments are commonplace in office-wide or enterprise-wide computer networks, intranets and the Internet. - When used in a LAN networking environment, the
computer 120 is connected to thelocal network 151 through a network interface or adapter 153. When used in a WAN networking environment, thecomputer 120 may include a modem 154, a wireless link, or other means for establishing communications over thewide area network 152, such as the Internet. The modem 154, which may be internal or external, is connected to the system bus 123 via theserial port interface 146. In a networked environment, program modules depicted relative to thecomputer 120, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing communications overwide area network 152 may be used. -
FIG. 1 is provided by way of illustration only. The principles of the present invention may be implemented in any operating environment that is able to implement the principles of the present invention. For example, given suitable software and/or adaptation, general-purpose computers, special-purpose computers or special purpose processing devices (whether now developed or to be developed in the future) might implement the principles of the present invention. In addition, the principles of the present invention may be implemented by software, hardware, firmware or any combination thereof. -
FIG. 2 illustrates atypical network environment 200 in which one embodiment of the present invention is incorporated.Network environment 200 includes adeveloper computer 201 and abrowsing computer 204.Browsing computer 204 is loaded with a network browser 205, such as MICORSOFT Internet Explorer or NETS CAPE NAVIGATOR, and is selectively coupled in electrical communication with a network 206. Network 206 can comprise one or more LANs such asLAN 151 and/or one or more WAN s such asWAN 152 as described withFIG. 1 . In the embodiment depicted, network 206 includes aserver 203.Server 203 can comprise a conventional Internet server or any other type or combination of computers as previously discussed herein. Browser 205 is configured to enablebrowsing computer 204 to access and communicate withserver 203. - As used herein, the term “developer computer” and “browsing computer” is each intended to include “computers” as previously defined herein. One example of
developer computer 201 andbrowsing computer 204 iscomputer 120 as discussed with regard toFIG. 1 . In one embodiment as depicted inFIG. 2 , one or moreadditional browsing computers 204 a-b can also be electrically coupled with network 206. Likewise, although not required,developer computer 201 can also be electrically coupled with network 206 through a network browser. -
Developer computer 201 is used to create anetwork document 202.Network document 202 is shown as being hosted or stored onserver 203. As used herein, the term “network document” is intended to mean any form of an electronic file that can have a display character embedded therein, attached thereto, referenced therein, such as through a link, or can otherwise be associated therewith. - The term “character” as used herein is intended to mean any discrete letter, number, symbol, design, mark, sign, figure, text, or the like that is currently known or created in the future. With regard to computer code, a “character” also includes a bit value qualified by a corresponding font or default font. For example, as an HTML document, such as a web page, is created, the text which is to be displayed during normal viewing is typed in and bounded on each side by a specific font tag. The font tag defines the name of the font, such as Times New Roman or Courier. The computer reads each of the characters of the text as a numerical bit value. As an operating system processes the HTML document, the operating system read the font tag and determines whether a font file corresponding to the font tag is loaded in the standard font directory. Each font file includes the formatting information necessary for the operating system to render each character of the font.
- If the font file corresponding to the font tag is loaded in the standard font directory, the operating system determines the bit value of each character and then renders each character by matching the bit value to the formatting information in the corresponding font file. Accordingly, although the letter “A” may always have the same bit value, its configuration can be changed by simply associating it with different font tags. Accordingly, in one embodiment computer executable instructions identifying a display character includes the bit value for a character and the font or default font qualifying the bit value.
- The term “display character” as used herein means the characters of a network document which are intended to be or can selectively be displayed during normal viewing of the network document. “Display characters” are in contrast to computer executable instructions or source code comments.
- The term “non-standard character” is intended to mean display characters of a network document for which the corresponding formatting information is not loaded on or otherwise available to a browsing computer for rendering the character prior to requesting or otherwise receiving the network document. It is appreciated that the determination of whether a character qualifies as a non-standard character is based solely upon what formatting information is loaded upon or otherwise available to a discrete browsing computer. As different browsing computers may have different fonts and corresponding formatting information available thereon, a list of non-standard characters for a discrete network document can change between different browsing computers even if the network document remains the same.
- Furthermore, as used herein, a “font” defines one or a group of characters each having a defined configuration. There are thousands of different known fonts. Examples of conventional letter fonts include the characters associated with Times New Roman, Arial, and Courier. Examples of conventional symbol fonts found on MICROSOFT Word 2000 include the characters associated with Symbol, Tahoma, and WP Math A. Furthermore, just as an infinite number of different characters can be created, it is appreciated that an infinite number of unique and different fonts can be created.
- By way of example and not by limitation, “network documents” can include web pages and other forms of electronic files that can be posted on the Internet; email communications including those that have an HTML document attached thereto; and an HTML document that has embedded therein or reference to any form of application file that contains a display character. Examples of such application files include text files, WORDPERFECT files, power point presentation files, and other special application files.
-
FIG. 3A illustrates one embodiment ofdeveloper computer 201 ofFIG. 2 having a developer application program 301 loaded thereon. In one embodiment, developer application program 301 includes adocument builder 302 that allows an author to generatenetwork document 202. For example,document builder 302 can be any type of existing program, such as MICROSFT FRONTPAGE or MICROSOFT Word, or a specially written program which is capable of forming an HTML document. - Developer application program 301 also includes a
character packager 303. One function ofcharacter packager 303 is to generate afont package 304 that is incorporated into or linked tonetwork document 202. As discussed below in greater detail,font package 304 includes the formatting information necessary for the operating system of browsingcomputer 204 to .generate one or more display characters, generally non-standard characters, when browsingcomputer 204 downloads anddisplays network document 202. - That is, as previously discussed, one of the problems of the prior art is that an increasing number of electronic documents are being created using unique characters wherein corresponding formatting information is not loaded on or otherwise available to a browsing computer, i.e., non-standard characters. Accordingly, when a browsing computer downloads the electronic document over a network or otherwise receives and opens the electronic document, the electronic document is displayed on the browsing computer without the non-standard characters or by replacing the non-standard characters with other characters that are available to the browsing computer. In any event, the electronic document is displayed in a format different from that intended at its creation.
- In part,
character packager 303 identifies the display characters used innetwork document 202 that are to be included infont package 304.Character packager 303 is a program that can be written in C++ or other languages and may run as either a standard desktop application or within a web browser via its own plugin technology. The identification of the display characters can be accomplished in a variety of different ways. By way of example and not by limitation, in one embodiment auser interface 305 allows the author or another to identify specific characters, groups of characters, or entire fonts that are to be included withinfont package 304. For example,character packager 303 can enable manual input, manual highlighting, manual selection from a table, and/or other form of manual selection of the specific characters, groups of characters, and/or fonts which are to be included infont package 304. This selection of characters can be accomplished either before, during, or after the creation ofnetwork document 202. - In general, the characters and/or groups which are selected include those characters which the individual making the selection believes the corresponding formatting information is most likely not loaded on or otherwise available to browsing
computer 204 which will ultimately displaynetwork document 202. In one embodiment, rather than selecting specific characters that are actually used onnetwork document 202, character groups and/or fonts can be selected even if all of the characters of a group or font are not used withinnetwork document 202. In yet another embodiment, all fonts where at least one character thereof is used withinnetwork document 202 can be selected for inclusion intofont package 304. - Alternatively or in addition to
user interface 305, adocument examiner 306 can be used.Document examiner 306 examinesnetwork document 202 and, based on preestablished parameters, automatically selects characters, character groups, and/or fonts for incorporation intofont package 304. For example, in oneembodiment document examiner 306 can contain a list of characters, character groups, and/or fonts (hereinafter, “character list”), selected from the entire inventory of characters and fonts available for use bydocument builder 302 in the creation ofdocument 202, which are considered likely to be non-standard characters to browsingcomputer 204. For example, the character list may correspond to those characters or fonts which are not standard to WINDOWS 2000 or some other predefined operating system. - Simultaneously with or subsequent to the creation of
network document 202,document examiner 306searches network document 202 and identifies all characters withindocument 202 that are found on the character list. The identified characters are then incorporated intocharacter packager 303. Alternatively,document examiner 306 can searchelectronic document 202 and identify all of the fonts used therein that are located on the character list. The identified fonts are then incorporated intocharacter packager 303. It is appreciated that there are a variety of different ways in which documentexaminer 306 can select the characters or fonts. For example,document examiner 306 can also include a list of standard characters and/or fonts and then reviewnetwork document 202 to identify those characters and/or fonts that are not on the standard list. - As the different characters, character groups, and/or fonts are selected by
user interface 305 and/ordocument examiner 306,character packager 303 creates corresponding font files 312. Eachfont file 312 has a font name and corresponds to a defined character, group of characters, or entire font. Specifically, eachfont file 312 includes all of the computer readable formatting information necessary for a computer operating system to render each of the characters associated with the correspondingfont file 312. Although the amount of formatting information can vary, the type of formatting information is generally the same as that for standard fonts. For example, the formatting information is sufficient to enable display, printing, copying, pasting, and other conventional forms of manipulation such as bolding, underlining, strikeout, and the like. - The formatting information can be in any standard font file format. In one embodiment, the formatting information is in a scaleable outline form such as TRUETYPE. Examples of other formats include raster and stroke. It is appreciated that meta files can also be used.
- Although each
font file 312 can include formatting information for only one character, more often, eachfont file 312 includes information on a group of characters or a complete font. For example,document examiner 306 can be used to select all characters of a given font used withinnetwork document 202. This group of characters, which is typically less than the entire font, is assigned to aspecific font file 312. The file is typically given a name other than the conventional font name so that the sub-set of the font does not accidentally replace the complete font which may already be loaded on a browsing computer. -
Character packager 303 also creates adiscrete control object 314 for eachcorresponding font file 312. Contained within eachcontrol object 314 is select handling information which can be used to selectively enhance, manipulate, or otherwise alter the characters within the correspondingfont file 312. By way of example and not by limitation, the handling information can facilitate stretching, twisting, looping, unique shadowing, or any other manipulation of characters that is not standard to an operating system. For example, the handling information generally does not include the information necessary for bolding, underlining, strikeout, italicizing, outlining, and the like. - Once font files 312 and control
objects 314 are completed,character packager 303 combines and compresses font files 312 and controlobjects 314 so as to formfont package 304. -
FIG. 4 illustrates one embodiment of a data structure forfont package 304. As shown therein,font package 304 includes ageneral header 601 that contains general information aboutfont package 304 in an uncompressed state. Adocument header 602 is in a compressed state and includes general document and version information. - The discrete font files 312 are also located within
font package 304 in a compressed state. For eachfont file 312 has acorresponding character object 603. Character objects 603 are substantially the same as control objects 314 in that eachcharacter object 603 includes the handling information for the characters of the correspondingfont file 312. Unlike control objects 314, however, character objects 603 specifically reference the correspondingfont file 312 so as to facilitate handling of the characters. - For example, character objects 603 include one or more character objects such as character object A (labeled 604) and character object B (labeled 605). Each character object references and describes handling and version information for a corresponding font file of font files 312. For example, character object A references and describes corresponding handling and version information for font file A (labeled 607), and character object B references and describes corresponding handling and version information for font file B (labeled 608).
- In one embodiment,
character packager 303 can also encryptfont package 304. It is appreciated that the data structure offont package 304 can have a variety of different configurations and that the files therein need not be compressed. Furthermore, in one embodiment, control objects 314 and character objects 603 can be eliminated. That is, where it is only desired to generate the characters as opposed to the additional handling thereof,font package 304 can be created with only font files 312. - Once
font package 304 has been generated, it is assigned an extension such as, for example, “.TRZ”. In one embodiment,font package 304 is imbedded directly withinnetwork document 202. Alternatively,font package 304 can be stored in a different directory thannetwork document 202 atserver 203 and can also be stored at a different server. In this latter case,network document 202references font package 304 using a corresponding tag. Accordingly, whennetwork document 202 is downloaded to browsingcomputer 204,font package 304 is also downloaded. In this description and in the claims, a file being “referenced” in a document means that downloading the document also causes downloading of the file such as through corresponding tags, such as embedded tags or object tags, or other computer executable instructions. - In addition to the creation of
font package 304,character packager 303 also createsinstruction code 310, depicted inFIG. 3A , that is either referenced by or embedded withinnetwork document 202.Instruction code 310 comprises computer executable instructions that facilitate downloading ontobrowsing computer 204 aninstallation module 501. As discussed below,installation module 501 is loaded onto server 203 (FIG. 2 ) and comprises computer-executable instructions for automatically installingfont package 304 on browsingcomputer 204 when browsingcomputer 204requests network document 202. In one embodiment,installation module 501 comprises an ACTIVEX® control.Instruction code 310, in one embodiment, comprises a Multipurpose Internet Mail Extension (MIME) type which corresponds to the extension of the font package (e.g., “.TRZ”). The file name and relative path ofinstallation module 501 are identified ininstruction code 310 within a tag that indicates to the browser thatinstallation module 501 is to be downloaded. In this regard,network document 202references installation module 501 for downloading withnetwork document 202. - As depicted in
FIG. 2 , oncefont package 304 andinstruction code 310 have been included innetwork document 202,network document 202 is loaded ontoserver 203 so as to accessible bybrowser computer 204 over network 206. As mentioned above, also loaded ontoserver 203 isinstallation module 501. - In contrast to the system depicted in
FIG. 3A , it is appreciated thatdocument builder 302 need not be included in developer application program 301. This is because it is not necessary that character packaging occur concurrently with the building ofnetwork document 202. For example, as depicted inFIG. 3B ,network document 202 is generated using aconventional document builder 308 that is completely separate from a developer application program 316. Examples ofdocument builder 308 include all standard and specially designed applications used for creating HTML documents. Oncenetwork document 202 is created,character packager 303 of developer application program 316 createsfont package 304 as previously discussed above with regard toFIG. 3A . In yet another embodiment,network document 202 can be created on a separate computer and then loaded ontodeveloper computer 201 where developer application program 316 is applied thereto. - Depicted in
FIG. 5 is a flow chart showing the method of operation betweenbrowsing computer 204 andserver 203. Actions performed primarily byserver 203 are listed in the left column while actions performed primarily by browsingcomputer 204 are listed in the right column. In anact 401, browsingcomputer 401 navigates to networkdocument 202 by generating a request fornetwork document 202 and communicating the request toserver 203 in accordance with a transport protocol such as, for example, HyperText Transport Protocol (HTTP). In general, browsingcomputer 204 navigates to networkdocument 202 by either typing in the URL fornetwork document 202 or activating a link thereto. - In
act 402,server 203 receives the request fornetwork document 202. In response to this request,server 203downloads network document 202 to browsing computer 204 (act 403).Network document 202 includes either directly or indirectly, such as through a reference,instruction code 310 andfont package 304. As such,instruction code 310 andfont package 304 are downloaded withnetwork document 202. - In
act 410, browsingcomputer 204 receives and begins processing the computer executable instructions withinnetwork document 202. Inact 412, browsingcomputer 204 processesinstruction code 310 andrequests installation module 501. The request forinstallation module 501 can be automatic which automation can include a prompt.Server 203, inact 414, receives the request and downloadsinstallation module 501 to browsingcomputer 204. In turn, in act 416,installation module 501 is installed on browsingcomputer 204, such as an extension to one or more browsers. Again, the installation ofinstallation module 501 can be automatic which automation can include a prompt. In tum,installation module 501 automatically makesfont package 304 available to the operating system of browsingcomputer 204. -
FIG. 6 illustratesinstallation module 501 and surrounding elements that are emulated when computer-executable instructions are executed by the processor associated with browsingcomputer 204. Once downloaded,installation module 501 communicates with a conforming browser 205A ofbrowsing computer 204 via, for example, function calls and returns. Conforming browser 205A represents browsers that are able to communicate withinstallation module 501 without an intennediary module. For example, MICROSOFT Internet Explorer may communicate directly with an ACTIVEX® control without a plug in. -
Installation module 501 also may communicate with non-confonning browser 205B of browsingcomputer 204. Non-confonning browser 205B represents browsers that are not able to communicate withinstallation module 501 without an intennediate module. Accordingly,installation module 501 communicates with nonconforming browser 205B via anintennediary adaptation module 504. For example, ifinstallation module 501 is an ACTIVEX control, some browsers such as NETSCAPE may not communicate directly withinstallation module 501. In this case,adaptation module 504 may be, for example, a plug-in for NETS CAPE that translates function calls and returns. Thus, the present invention may be implemented with a wide variety of browsers. - It is appreciated that
adaptation module 504 can be selectively downloaded fromserver 203 withinstallation module 501 based on the type of browser (confonning or non-con tinning) requestinginstallation module 501. Alternatively,adaptation module 504 can be incorporated intoinstallation module 501 and thus always downloaded but only accessed when needed. - Browsers 205A and/or 205B can also detennine whether
installation module 501 has been previously downloaded to browsingcomputer 204. If so, redundant downloading ofinstallation module 501 may be avoided In addition, the MIME type used in requestinginstallation module 501 can also identify the desired version forinstallation module 501. The browser can thus check the previously installedinstallation module 501 and if old, download the new version. - With Internet Explorer, the version checking can be done by checking the HTML CODEBASE version specified. In NETSCAPE NAVIGATOR a special JA V ASCRIPT code can be used to check the version number.
- As depicted in
FIG. 6 , once installed,installation module 501 also communicates with operating system 505 ofbrowser computer 204, thereby accessing all the wealth of resource offered by the operating system 505. - As depicted in
FIGS. 5 and 6 , inact 418, to enable operating system 505 to access the formatting information withinfont package 304 the formatting information thereof is either permanently installed on or temporarily exposed to operating system 505. Initially, as part of the installation process,installation module 501 first decompresses, if previously compressed, and deciphers, if previously encrypted, character objects 603 andfont files 312 along with the header information contained withinfont package 304. Once decompressed and deciphered, character objects 603 andfont files 312 are automatically either permanently installed on or temporarily exposed to operating system 505 byinstallation module 501. Temporary exposure may occur, for example, when it is desired to limit the use or life of the non-standard characters. Permanent installation can be used to allow perpetual unrestricted use of the non-standard characters. - To facilitate permanent installation, character objects 603 and corresponding referenced
font files 312 are copied into the same directory as the other standard orpermanent system fonts 508. For example, permanent system fonts are typically stored in a system fonts directory. Thesystem registry 509 is then updated to reflect the addition of the new permanent character objects 603 and corresponding font files 312. - To facilitate temporary exposure, character objects 603 and
font files 312 are copied into a temporary fonts directory 507. Temporary fonts directory 507 may be located so as not to be directly accessible by a user. For example, character objects 603 andfont files 312 can be copied into hidden temporary files. Virtual memory mapped files are used to enable operating systems 505 to access the hidden temporary files. Alternatively, character objects 603 andfont files 312 can also be copied to virtual memory files. Once temporary fonts directory 507 is created, system font table 506 is updated to reflect the new temporary font files 312. In one embodiment, the installedfont files 312 are enumerated in a virtual memory array to ensure that any existing fonts with the same name are not replaced. - Once installed or exposed, all of the currently running applications may be notified of new font files 312 via, for example, a standard WM_FONTCHANGE message with HWND_BROADCAST as the target message.
Server 203 may be notified of the successful installation of character objects 603 andfont files 312 via a callback to a JA V ASCRIPT ® function provided inHTML document 202. In NETS CAPE NAVIGATOR, this notification may be accomplished via LIVE CONNECT®. In Internet Explorer this notification may be accomplished via an ACTIVEX® Component Object Model (COM). - Temporary fonts directory 507, which contains character objects 603 and
font files 312, can be removed or at least become inaccessible through a variety of different mechanisms. For example,installation module 501 can be programmed to automatically delete character objects 603 andfont files 312 via a JA V ASCRIPT® control when the browser is turned off or when any other predefined act is performed, such asclosing network document 202 or requesting another web page. Furthermore, due to the volatile nature of hidden temporary files and virtual memory mapped files, these files are either erased or become inaccessible to operating system 505 oncebrowsing computer 204 is shut down or rebooted. - In
act 420 ofFIG. 5 , once font files 312 are enabled on browsingcomputer 204, operating system 505 usesfont files 312 to generate the display ofnetwork document 202 in the same form that it was originally created. One of the unique benefits of the present invention is that once font files 312 are enabled on browsingcomputer 204, the characters within font files 312 can be used the same as any of the font characters originally loaded on browsingcomputer 204. For example, the characters offont files 312 can be cut, pasted, printed and otherwise handled or manipulated, i. e., underlined, italicized, bolded, etc., just the same as originally loaded font characters. In tum, this increases efficient inter-application functionality. For example, the characters offont files 312 can also be copied and pasted to any other application being control by operating system 505, for example, applications 510 a or 510 b as depicted inFIG. 6 . - The above described method is only one embodiment of the application of the present invention. By way of example and not by limitation, depicted in
FIG. 7 is anetwork document 700 which is in HTML.Network document 700 can be posted on a server, attached to an e-mail, recorded on a computer disk or CD, or recorded on any other type of computer readable media which can be requested by or transferred to browsingcomputer 204 for opening by browser 205. - Embedded within
network document 700 or included by a linked reference is anapplication 706.Application 706 can comprise any type of application program, application file, plugin, or ACTIVEX that generates or includes one or more display characters. Also embedded withinnetwork document 700 or included by a linked reference is afont package 704.Font package 704 includes one or more font files which contain the formatting information necessary for the creation of the non-standard display characters ofapplication 706. If desired, character objects containing handling information can also be incorporated intofont package 704. In this embodiment,font package 704 may be created completely independent ofapplication 706. - In substantially the same manner as discussed above with regard to
FIG. 5 , as browser 205 opens and beginsprocessing network document 700,instruction code 310 embedded therein requestsinstallation module 501 which is downloaded byserver 203. In turn,installation module 501 either permanently installs or temporarily exposes the font files offont package 704 on browsingcomputer 204. Accordingly, asapplication 706 is opened or run so as to generate the display characters thereof, the non-standard display characters are displayed in their intended configuration. - In yet another embodiment, as depicted in
FIG. 8 , a network document 720 comprises an email. Typed directly on the email can be one or more display characters. Alternatively or in combination therewith, an application 730 can be attached to network document 720. Application 730 can comprise any type of application program or file that generates or includes one or more display characters. - Also attached to network document 720 is an
HTML document 722. Embedded withinHTML document 722 or included by reference is afont package 726.Font package 726 includes one or more font files which contain the formatting information necessary for the creation of the non-standard display characters typed on the email and/or which are to be generated or included in application 730. - During use, network document 720 is emailed to browsing
computer 204 and opened thereon. In turn,HTML document 722 is selected and then opened by browser 205. As above, as browser 205processes HTML document 722,instruction code 310 embedded therein requestsinstallation module 501 which is downloaded byserver 203. In tum,installation module 501 either permanently installs or temporarily exposes the font files offont package 726 on browsingcomputer 204. In turn, the nonstandard characters typed on the email body portion of network document 720 can be appropriately displayed. Furthermore, asapplication 706 is opened or run so as to generate display characters, the non-standard display characters can be displayed in their intended configuration. - The present invention also envisions that an HTML document containing a font package and
instruction code 310 can also be delivered to browsingcomputer 204 completely separate from an HTML document, application program, or application file that contains corresponding non-standard display characters. That is, once font files are permanently installed or temporarily exposed on browsingcomputer 204, an HTML document, application program, or application file that was either previously or subsequently loaded can be run or opened. The non-standard display character generated by the document, program, or file can then be appropriately displayed as a result of the loaded font files. - Thus, the principles of the present invention allow the operating system of a browsing computer access to non-standard characters when the browsing computer either retrieves off of the Internet or otherwise opens a network document or application that uses the non-standard characters. This allows the author of the electronic document or application to feel secure that no matter how unique the characters chosen to convey a message, the characters will be rendered on the browsing computer as the author intended. In addition, in one embodiment, the operating system can now use the nonstandard characters for copying and pasting across applications, as well as any other editing or printing that is enabled by the operating system, thus enhancing the functionality to the end user.
- The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Claims (1)
1. A network document recorded on a computer readable medium, the network document being adapted for use on a computer having an operating system and a network browser, the network document comprising an electronic file that has embedded therein, attached thereto, or reference to:
computer executable instructions identifying a display character used in the network document and identifying a font used to render the display character;
a font package comprising computer readable formatting information necessary for an operating system of a computer to render the display character using the identified font; and
an exposure module comprising computer executable instructions for installation of the exposure module on the computer and for installation or exposure of the computer readable formatting information contained in the font package on or to the operating system such that the operating system can render the display character using the identified font when displaying the network document and other applications controlled by the operating system can also render the display character using the identified font, whereby when the display character is displayed in the network document or by the other applications, the display character is displayed using the exact same font.
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/956,265 US20140013222A1 (en) | 2001-07-16 | 2013-07-31 | Allowing Operating System Access to Non-Standard Fonts in a Network Document |
US14/793,643 US9405735B1 (en) | 2001-07-16 | 2015-07-07 | Allowing operating system access to non-standard fonts in a network document |
US15/197,389 US9892093B1 (en) | 2001-07-16 | 2016-06-29 | Apparatus of a hand-held device for exposing non-standard fonts in a network document to an operating system |
US15/581,921 US9886421B1 (en) | 2001-07-16 | 2017-04-28 | Allowing operating system access to non-standard fonts in a network document |
US15/582,399 US10102184B1 (en) | 2001-07-16 | 2017-04-28 | Allowing operating system access to non-standard fonts in a network document |
US16/236,065 US10810355B1 (en) | 2001-07-16 | 2018-12-28 | Allowing operating system access to non-standard fonts in a network document |
US16/235,912 US10878172B1 (en) | 2001-07-16 | 2018-12-28 | Allowing operating system access to non-standard fonts in a network document |
US17/133,301 US10963622B1 (en) | 2001-07-16 | 2020-12-23 | Allowing operating system access to non-standard fonts in a network document |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US90644401A | 2001-07-16 | 2001-07-16 | |
US11/443,664 US8522127B2 (en) | 2001-07-16 | 2006-05-30 | Allowing operating system access to non-standard fonts in a network document |
US13/956,265 US20140013222A1 (en) | 2001-07-16 | 2013-07-31 | Allowing Operating System Access to Non-Standard Fonts in a Network Document |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/443,664 Continuation US8522127B2 (en) | 2001-07-16 | 2006-05-30 | Allowing operating system access to non-standard fonts in a network document |
US11/443,665 Continuation US20070059368A1 (en) | 2001-07-16 | 2006-05-30 | Modified release formulations of anti-irritability drugs |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/793,643 Continuation US9405735B1 (en) | 2001-07-16 | 2015-07-07 | Allowing operating system access to non-standard fonts in a network document |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140013222A1 true US20140013222A1 (en) | 2014-01-09 |
Family
ID=37831325
Family Applications (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/443,664 Active 2026-10-10 US8522127B2 (en) | 2001-07-16 | 2006-05-30 | Allowing operating system access to non-standard fonts in a network document |
US13/956,265 Abandoned US20140013222A1 (en) | 2001-07-16 | 2013-07-31 | Allowing Operating System Access to Non-Standard Fonts in a Network Document |
US14/793,643 Expired - Fee Related US9405735B1 (en) | 2001-07-16 | 2015-07-07 | Allowing operating system access to non-standard fonts in a network document |
US15/197,389 Expired - Fee Related US9892093B1 (en) | 2001-07-16 | 2016-06-29 | Apparatus of a hand-held device for exposing non-standard fonts in a network document to an operating system |
US15/581,921 Expired - Fee Related US9886421B1 (en) | 2001-07-16 | 2017-04-28 | Allowing operating system access to non-standard fonts in a network document |
US15/582,399 Expired - Fee Related US10102184B1 (en) | 2001-07-16 | 2017-04-28 | Allowing operating system access to non-standard fonts in a network document |
US16/235,912 Expired - Lifetime US10878172B1 (en) | 2001-07-16 | 2018-12-28 | Allowing operating system access to non-standard fonts in a network document |
US17/133,301 Expired - Lifetime US10963622B1 (en) | 2001-07-16 | 2020-12-23 | Allowing operating system access to non-standard fonts in a network document |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/443,664 Active 2026-10-10 US8522127B2 (en) | 2001-07-16 | 2006-05-30 | Allowing operating system access to non-standard fonts in a network document |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/793,643 Expired - Fee Related US9405735B1 (en) | 2001-07-16 | 2015-07-07 | Allowing operating system access to non-standard fonts in a network document |
US15/197,389 Expired - Fee Related US9892093B1 (en) | 2001-07-16 | 2016-06-29 | Apparatus of a hand-held device for exposing non-standard fonts in a network document to an operating system |
US15/581,921 Expired - Fee Related US9886421B1 (en) | 2001-07-16 | 2017-04-28 | Allowing operating system access to non-standard fonts in a network document |
US15/582,399 Expired - Fee Related US10102184B1 (en) | 2001-07-16 | 2017-04-28 | Allowing operating system access to non-standard fonts in a network document |
US16/235,912 Expired - Lifetime US10878172B1 (en) | 2001-07-16 | 2018-12-28 | Allowing operating system access to non-standard fonts in a network document |
US17/133,301 Expired - Lifetime US10963622B1 (en) | 2001-07-16 | 2020-12-23 | Allowing operating system access to non-standard fonts in a network document |
Country Status (1)
Country | Link |
---|---|
US (8) | US8522127B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10810355B1 (en) | 2001-07-16 | 2020-10-20 | Clantech, Inc. | Allowing operating system access to non-standard fonts in a network document |
US10878172B1 (en) | 2001-07-16 | 2020-12-29 | Clantech, Inc. | Allowing operating system access to non-standard fonts in a network document |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006025127A (en) * | 2004-07-07 | 2006-01-26 | Canon Inc | Image processor and control method thereof |
US7937658B1 (en) * | 2006-04-21 | 2011-05-03 | Adobe Systems Incorporated | Methods and apparatus for retrieving font data |
US20080120541A1 (en) * | 2006-11-22 | 2008-05-22 | Dynacomware Taiwan Inc. | System and method for on-line retrieval and typing of non-standard characters |
US8381101B2 (en) * | 2009-11-16 | 2013-02-19 | Apple Inc. | Supporting platform-independent typesetting for documents |
US9164967B2 (en) * | 2009-11-25 | 2015-10-20 | Red Hat, Inc. | Extracting font metadata from font files into searchable metadata for package distribution |
EP2367118A1 (en) | 2010-03-15 | 2011-09-21 | GMC Software AG | Method and devices for generating two-dimensional visual objects |
US20110258535A1 (en) * | 2010-04-20 | 2011-10-20 | Scribd, Inc. | Integrated document viewer with automatic sharing of reading-related activities across external social networks |
US20110276872A1 (en) * | 2010-05-06 | 2011-11-10 | Xerox Corporation | Dynamic font replacement |
CN102918523A (en) * | 2010-05-26 | 2013-02-06 | 诺基亚公司 | Method and apparatus for specifying mapping parameters for user interface element presentation in an application |
US8683006B2 (en) | 2010-07-17 | 2014-03-25 | Adobe Systems Incorporated | Method and systems for serving fonts during web browsing sessions |
US9442895B1 (en) * | 2012-12-20 | 2016-09-13 | Lucid Software, Inc. | Web-based publishing layout specification |
US9262464B2 (en) * | 2013-04-24 | 2016-02-16 | Piriform Ltd. | Cleaner with browser monitoring |
JP5974024B2 (en) * | 2014-01-18 | 2016-08-23 | 株式会社モリサワ | Font distribution system and font distribution method |
JP6566850B2 (en) * | 2015-11-30 | 2019-08-28 | キヤノン株式会社 | Information processing system, information processing system control method, information processing apparatus, and program |
US12106039B2 (en) * | 2021-02-23 | 2024-10-01 | Coda Project, Inc. | System, method, and apparatus for publication and external interfacing for a unified document surface |
CN109376806A (en) * | 2018-10-26 | 2019-02-22 | 深圳点猫科技有限公司 | A kind of method and electronic equipment based on Web page intelligent detection webpage text |
JP2021063949A (en) * | 2019-10-16 | 2021-04-22 | 京セラドキュメントソリューションズ株式会社 | Information processing apparatus and image forming apparatus |
US11314924B2 (en) | 2020-06-04 | 2022-04-26 | Adobe Inc. | Constructing a path for character glyphs |
US11977830B2 (en) | 2022-09-13 | 2024-05-07 | International Business Machines Corporation | Demand-based deployment of font server to an edge device |
Family Cites Families (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4594674A (en) | 1983-02-18 | 1986-06-10 | International Business Machines Corporation | Generating and storing electronic fonts |
JPH0468638A (en) | 1990-07-04 | 1992-03-04 | Ricoh Co Ltd | Document processor |
JP3236015B2 (en) | 1990-10-09 | 2001-12-04 | キヤノン株式会社 | Information processing apparatus and method |
JPH056323A (en) | 1991-06-27 | 1993-01-14 | Hitachi Ltd | Method for managing resource and information processing system |
EP0569758A3 (en) | 1992-05-15 | 1995-03-15 | Eastman Kodak Co | Method and apparatus for creating and storing three-dimensional font characters and performing three-dimensional typesetting. |
US5471564A (en) | 1992-07-10 | 1995-11-28 | Microsoft Corporation | System and method for dynamic printer timeout |
US5528742A (en) | 1993-04-09 | 1996-06-18 | Microsoft Corporation | Method and system for processing documents with embedded fonts |
US5586241A (en) * | 1993-06-10 | 1996-12-17 | Hewlett-Packard Company | Method and system for creating, specifying, and generating parametric fonts |
CA2125608A1 (en) | 1993-06-30 | 1994-12-31 | George M. Moore | Method and system for providing substitute computer fonts |
US5533174A (en) | 1993-10-26 | 1996-07-02 | Digital Equipment Corporation | Network font server |
US5689724A (en) | 1993-12-23 | 1997-11-18 | International Business Machines Corporation | Generic font specification leading to specific font selection |
US5781714A (en) * | 1994-05-27 | 1998-07-14 | Bitstream Inc. | Apparatus and methods for creating and using portable fonts |
US5583978A (en) * | 1994-05-27 | 1996-12-10 | Bitstream Inc. | Apparatuses and methods for creating and using portable fonted texts with embedded automatically-created font descriptions |
US5675718A (en) | 1995-05-17 | 1997-10-07 | Apple Computer, Inc. | Method and apparatus for dynamic font availability |
US6230173B1 (en) | 1995-07-17 | 2001-05-08 | Microsoft Corporation | Method for creating structured documents in a publishing system |
US5737599A (en) | 1995-09-25 | 1998-04-07 | Rowe; Edward R. | Method and apparatus for downloading multi-page electronic documents with hint information |
EP0870246B1 (en) | 1995-09-25 | 2007-06-06 | Adobe Systems Incorporated | Optimum access to electronic documents |
US5990907A (en) | 1995-12-15 | 1999-11-23 | Colletti; John C. | Automatic font management within an operating system environment |
US6012071A (en) | 1996-01-29 | 2000-01-04 | Futuretense, Inc. | Distributed electronic publishing system |
US5926189A (en) | 1996-03-29 | 1999-07-20 | Apple Computer, Inc. | Method and apparatus for typographic glyph construction including a glyph server |
US5893915A (en) * | 1996-04-18 | 1999-04-13 | Microsoft Corporation | Local font face selection for remote electronic document browsing |
US6356268B1 (en) | 1996-04-26 | 2002-03-12 | Apple Computer, Inc. | Method and system for providing multiple glyphs at a time from a font scaler sub-system |
US6057858A (en) * | 1996-08-07 | 2000-05-02 | Desrosiers; John J. | Multiple media fonts |
US6320587B1 (en) * | 1996-08-26 | 2001-11-20 | Fujitsu Limited | Font processing apparatus in network environment and method thereof |
US5909223A (en) | 1996-09-04 | 1999-06-01 | Apple Computer, Inc. | Text face scaler |
US6785708B1 (en) * | 1996-10-30 | 2004-08-31 | Avaya Inc. | Method and apparatus for synchronizing browse and chat functions on a computer network |
US5983245A (en) | 1996-12-27 | 1999-11-09 | Apple Computer, Inc. | Method and apparatus for implementing universal resource locator menus |
CA2196707A1 (en) * | 1997-02-04 | 1998-08-04 | Ahmed Azizur Rahman | Internet lingual text publishing instruction |
JPH10301924A (en) * | 1997-04-25 | 1998-11-13 | Fujitsu Ltd | Processor for external character classfied by jobs |
US6073147A (en) | 1997-06-10 | 2000-06-06 | Apple Computer, Inc. | System for distributing font resources over a computer network |
US6278465B1 (en) | 1997-06-23 | 2001-08-21 | Sun Microsystems, Inc. | Adaptive font sizes for network browsing |
US6043826A (en) | 1997-09-02 | 2000-03-28 | Microsoft Corporation | Transferring outline fonts to devices requiring raster fonts |
KR100280175B1 (en) | 1997-10-15 | 2001-02-01 | 윤종용 | Text Form Display Device and Method Using Tooltip |
US5871714A (en) * | 1997-10-16 | 1999-02-16 | Pharmacal Biotechnologies, Inc. | Compositions for controlling bacterial colonization |
US6324500B1 (en) * | 1997-11-14 | 2001-11-27 | International Business Machines Corporation | Method and system for the international support of internet web pages |
US6718540B1 (en) * | 1997-11-17 | 2004-04-06 | International Business Machines Corporation | Data processing system and method for storing data in a communication network |
US6526426B1 (en) | 1998-02-23 | 2003-02-25 | David Lakritz | Translation management system |
US6623529B1 (en) | 1998-02-23 | 2003-09-23 | David Lakritz | Multilingual electronic document translation, management, and delivery system |
TW448672B (en) * | 1998-02-25 | 2001-08-01 | Acer Peripherals Inc | Mobile phone handset with special character display |
JPH11282829A (en) | 1998-03-31 | 1999-10-15 | Fuji Photo Film Co Ltd | Font sharing system and method, and storage medium storing program to execute the sharing method |
JP4136066B2 (en) * | 1998-05-11 | 2008-08-20 | パイオニア株式会社 | Document data creation device and character display device |
US6591288B1 (en) | 1998-05-19 | 2003-07-08 | Nortel Networks Limited | Data network accelerated access system |
US6313920B1 (en) | 1998-08-17 | 2001-11-06 | Microsoft Corporation | System and method for remote printing using incremental font subsetting |
US6504554B1 (en) | 1998-09-01 | 2003-01-07 | Microsoft Corporation | Dynamic conversion of object-oriented programs to tag-based procedural code |
US6278449B1 (en) * | 1998-09-03 | 2001-08-21 | Sony Corporation | Apparatus and method for designating information to be retrieved over a computer network |
JP4150452B2 (en) * | 1998-11-12 | 2008-09-17 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Font acquisition method, registration method, and printing method |
US6614541B1 (en) | 1998-12-03 | 2003-09-02 | International Business Machines Corporation | Method and system for specification of data-presentation variability data via scaleable interface |
US6289347B1 (en) | 1998-12-09 | 2001-09-11 | Bull Hn Information Systems Inc. | Data processing system utilizing web forms |
US6449639B1 (en) * | 1998-12-23 | 2002-09-10 | Doxio, Inc. | Method and system for client-less viewing of scalable documents displayed using internet imaging protocol commands |
US6760887B1 (en) | 1998-12-31 | 2004-07-06 | International Business Machines Corporation | System and method for highlighting of multifont documents |
US6678410B1 (en) | 1999-02-17 | 2004-01-13 | Adobe Systems Incorporated | Generating a glyph |
US6342890B1 (en) | 1999-03-19 | 2002-01-29 | Microsoft Corporation | Methods, apparatus, and data structures for accessing sub-pixel data having left side bearing information |
US6512531B1 (en) | 1999-04-09 | 2003-01-28 | Adobe Systems Incorporated | Font navigation tool |
US6111654A (en) | 1999-04-21 | 2000-08-29 | Lexmark International, Inc. | Method and apparatus for replacing or modifying a postscript built-in font in a printer |
CA2273657C (en) * | 1999-05-05 | 2010-09-21 | Nortel Networks Corporation | Telephony and data network services at a telephone |
US7064757B1 (en) | 1999-05-07 | 2006-06-20 | Apple Computer, Inc. | Automatic synthesis of font tables for character layout |
US6452597B1 (en) | 1999-08-24 | 2002-09-17 | Microsoft Corporation | Displaying text on a limited-area display surface |
US6853980B1 (en) * | 1999-09-07 | 2005-02-08 | Bitstream Inc. | System for selecting, distributing, and selling fonts |
JP2001117844A (en) | 1999-10-20 | 2001-04-27 | Nec Corp | Radio communication system and display language switching method for radio client used for same |
US6751726B1 (en) | 1999-12-15 | 2004-06-15 | Microsoft Corporation | Method and system for loading fonts by caching font-loading information |
JP2001184344A (en) | 1999-12-21 | 2001-07-06 | Internatl Business Mach Corp <Ibm> | Information processing system, proxy server, web page display control method, storage medium and program transmitter |
US6707942B1 (en) | 2000-03-01 | 2004-03-16 | Palm Source, Inc. | Method and apparatus for using pressure information for improved computer controlled handwriting recognition, data entry and user authentication |
HK1024380A2 (en) | 2000-03-28 | 2000-08-25 | Lawrence Wai Ming Mo | Internet-based font server |
US7194624B1 (en) | 2000-04-24 | 2007-03-20 | Harris Scott C | Page encryption system |
US7076468B2 (en) | 2000-04-28 | 2006-07-11 | Hillegass James C | Method and system for licensing digital works |
US7155672B1 (en) | 2000-05-23 | 2006-12-26 | Spyglass, Inc. | Method and system for dynamic font subsetting |
US7210099B2 (en) | 2000-06-12 | 2007-04-24 | Softview Llc | Resolution independent vector display of internet content |
US7539939B1 (en) | 2000-07-25 | 2009-05-26 | Creativepro.Com, Inc. | Preview window to preview text in several different fonts simultaneously |
US6882344B1 (en) | 2000-07-25 | 2005-04-19 | Extensis, Inc. | Method for examining font files for corruption |
US7197706B1 (en) | 2000-08-30 | 2007-03-27 | Celartem Inc. | Method and system for ensuring accurate font matching in documents |
US6834048B1 (en) | 2000-09-22 | 2004-12-21 | Dialpad Acquisition Corporation | Method for initiating internet telephone service from a web page |
US6950992B2 (en) | 2000-11-15 | 2005-09-27 | Fujitsu Limited | External-character font creation system and program recording medium therefor |
US7024471B2 (en) * | 2000-12-12 | 2006-04-04 | International Business Machines Corporation | Mechanism to dynamically update a windows system with user specific application enablement support from a heterogeneous server environment |
US20020107887A1 (en) | 2001-02-06 | 2002-08-08 | Cousins Robert E. | Method for compressing character-based markup language files |
US7013289B2 (en) * | 2001-02-21 | 2006-03-14 | Michel Horn | Global electronic commerce system |
US7016963B1 (en) | 2001-06-29 | 2006-03-21 | Glow Designs, Llc | Content management and transformation system for digital content |
US8522127B2 (en) | 2001-07-16 | 2013-08-27 | Robert G. Adamson, III | Allowing operating system access to non-standard fonts in a network document |
JP2007011733A (en) | 2005-06-30 | 2007-01-18 | Dynacomware Taiwan Inc | Method, device and system for preparing asian web font document |
US7937658B1 (en) | 2006-04-21 | 2011-05-03 | Adobe Systems Incorporated | Methods and apparatus for retrieving font data |
US8856647B2 (en) | 2009-02-20 | 2014-10-07 | Microsoft Corporation | Font handling for viewing documents on the web |
US20110115797A1 (en) | 2009-11-19 | 2011-05-19 | Kaplan Gregory A | Dynamic Streaming of Font Subsets |
US9164967B2 (en) | 2009-11-25 | 2015-10-20 | Red Hat, Inc. | Extracting font metadata from font files into searchable metadata for package distribution |
US8683006B2 (en) | 2010-07-17 | 2014-03-25 | Adobe Systems Incorporated | Method and systems for serving fonts during web browsing sessions |
US20150332493A1 (en) | 2014-05-16 | 2015-11-19 | Clantech, Inc. | Portable Typelet File |
US9940744B2 (en) | 2014-09-15 | 2018-04-10 | Microsoft Technology Licensing, Llc | Remote font management |
-
2006
- 2006-05-30 US US11/443,664 patent/US8522127B2/en active Active
-
2013
- 2013-07-31 US US13/956,265 patent/US20140013222A1/en not_active Abandoned
-
2015
- 2015-07-07 US US14/793,643 patent/US9405735B1/en not_active Expired - Fee Related
-
2016
- 2016-06-29 US US15/197,389 patent/US9892093B1/en not_active Expired - Fee Related
-
2017
- 2017-04-28 US US15/581,921 patent/US9886421B1/en not_active Expired - Fee Related
- 2017-04-28 US US15/582,399 patent/US10102184B1/en not_active Expired - Fee Related
-
2018
- 2018-12-28 US US16/235,912 patent/US10878172B1/en not_active Expired - Lifetime
-
2020
- 2020-12-23 US US17/133,301 patent/US10963622B1/en not_active Expired - Lifetime
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10810355B1 (en) | 2001-07-16 | 2020-10-20 | Clantech, Inc. | Allowing operating system access to non-standard fonts in a network document |
US10878172B1 (en) | 2001-07-16 | 2020-12-29 | Clantech, Inc. | Allowing operating system access to non-standard fonts in a network document |
US10963622B1 (en) | 2001-07-16 | 2021-03-30 | Clantech, Inc. | Allowing operating system access to non-standard fonts in a network document |
Also Published As
Publication number | Publication date |
---|---|
US10963622B1 (en) | 2021-03-30 |
US10102184B1 (en) | 2018-10-16 |
US10878172B1 (en) | 2020-12-29 |
US9892093B1 (en) | 2018-02-13 |
US9886421B1 (en) | 2018-02-06 |
US9405735B1 (en) | 2016-08-02 |
US20070055934A1 (en) | 2007-03-08 |
US8522127B2 (en) | 2013-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10963622B1 (en) | Allowing operating system access to non-standard fonts in a network document | |
EP1597680B1 (en) | Markup language cut-and-paste | |
US7197702B2 (en) | Web page rendering mechanism using external programmatic themes | |
US7313757B2 (en) | Method and system for cross-platform form creation and deployment | |
US6493733B1 (en) | Method for inserting interactive HTML objects into an electronic file | |
US6832351B1 (en) | Method and system for previewing and printing customized business forms | |
US7392466B2 (en) | Method and system of annotation for electronic documents | |
KR101130397B1 (en) | Systems and methods for converting a formatted document to a web page | |
US20180101974A1 (en) | Portable typelet file | |
EP1638013A2 (en) | Common charting using shapes | |
US20040049571A1 (en) | Tracking document usage | |
JPH11167448A (en) | System/method/program for generating new file similar to existing file | |
US20060026503A1 (en) | Markup document appearance manager | |
CA2312458A1 (en) | Techmique for creating audience-specific views of documents | |
Merz | Web publishing with Acrobat/PDF | |
US20160196251A1 (en) | Method and apparatus for annotating an electronic document | |
AU760816B2 (en) | System for capturing, annotating and transmitting images of internet web pages | |
EP1625515B1 (en) | System and method for providing multiple renditions of document content | |
US10810355B1 (en) | Allowing operating system access to non-standard fonts in a network document | |
CA2381832A1 (en) | Method and system for cross-platform form creation and deployment | |
Jamsa et al. | HTML & Web Design | |
US7644358B2 (en) | Usability of a portal application | |
KR20230057898A (en) | Method for editing and converting electronic document on cloud-based electronic document platform | |
Wempen | Word 2016 In Depth (includes Content Update Program) | |
Wempen | Microsoft Word 2010 In Depth, Portable Documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CLANTECH, INC., UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ADAMSON, ROBERT G., III;REEL/FRAME:035088/0351 Effective date: 20150302 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |