WO2002052486A2 - Procede de formatage de messages - Google Patents
Procede de formatage de messages Download PDFInfo
- Publication number
- WO2002052486A2 WO2002052486A2 PCT/FR2001/004107 FR0104107W WO02052486A2 WO 2002052486 A2 WO2002052486 A2 WO 2002052486A2 FR 0104107 W FR0104107 W FR 0104107W WO 02052486 A2 WO02052486 A2 WO 02052486A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- characters
- message
- index
- information
- header
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/03—Protocol definition or specification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/103—Formatting, i.e. changing of presentation of documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/126—Character encoding
Definitions
- Identification and security applications must describe precisely and concisely the most diverse objects and products with their components, but also the operations they undergo whatever their nature, the support and the user. To achieve these objectives, the information used must be: well defined, easily and universally writable on most media, developed and used according to precise rules of construction and use. In addition, they must be permanent, easily accessible and understandable by all stakeholders / users, and present a low cost of implementation both in terms of development and final operation.
- the information must be structured in a simple or intuitive manner and comply as much as possible with the conventions in use in the main areas of use.
- FORMATDOTE provides a simple solution through joint implementation:
- indexes allowing, without prior declaration, in writing and in reading, according to the needs, to mix the most diverse fields within the messages. In this situation, a simple codification of the indexes is sufficient for operation. The codifications can be made by field of application, allowing a great diversity and a great flexibility of use. DEFINITIONS OF THE TERMS USED AND DESCRIPTION OF THE FUNCTIONS.
- - Information set of basic elements or characters which support the semantic content of the message and / or the operating orders. These elements are the bytes (more particularly in data processing), the graphic characters (like the characters DOTE) or the characters defined by ASCII (called ASCII characters).
- - Security message is a set of information intended to ensure the identification of the document, object or product, and possibly the integrity of the general message and the authenticity of the origins. It uses formats specific to the fields of application.
- the Elementary Graphic Point is the graphic correspondent, on physical medium, of the basic information element like the bit (in data processing).
- IT can encode a number (numeric), a number or a classic character (alphanumeric), a byte (DOTE character for example).
- IT it takes a value between 0 and 255.
- the Index Character specifies, completes or modifies (the) the normal characters associated with it. Some index characters have complete meaning in themselves, such as function indexes (see page 3).
- the index characters most often represent graphics, real on a medium or simulated in computer science (memory or transmission) and are grouped in alphabets, like the DOTE index alphabets which can be written on any medium, and can represent 256 graphics. different (corresponding to the possible values of the byte) composed of Elementary Graphic Points, simulated in data processing.
- index characters can be represented by a coding based on "ASCII characters" or by (a description of graphics composed of) several bytes.
- index equivalents are developed using sequences of "escape” characters (escape or ⁇ ) followed by one or two characters that specify the value of the index, (example the sequence of characters "escape ç d" to express the index "date").
- sequences of "escape” characters escape or ⁇
- characters that specify the value of the index escape or ⁇
- the first byte encodes the first segment (I) composed of 8 Elementary Graphic Points which ensures the control of the construction of the following segment (like the parities).
- the second byte encodes the second segment (II, fig. 2) which represents the value of the index (from 0 to 255), therefore its meaning, successively using the following powers of 2: 1, 2,4,8 , 16,32,64,128.
- the third byte (optional) encodes the third segment (III, fig. 2) complementary to the second.
- Indexes can also be expressed by alphabets of phonic characters, such as MHS or MI2S.
- index characters or their equivalents are essentially used to designate, qualify and modify the information they precede or frame, such as fields and certain functions.
- Index characters or their equivalents should be easily distinguishable from normal characters, since they can be "embedded” in the middle of them. This is quite obvious when the information is written on a medium (paper %), in particular using DOTE characters or BAR CODES for example.
- indexes and their equivalents are recognizable by their local byte structures (particular ordered groupings of bytes) which reproduce, for example, the graphic structure of DOTE characters ( Figure 2), and / or by the use of special formats described using "escape ( ⁇ )" characters.
- the index characters delimit an information area called a field and determine the meaning of the characters which are inside and which can themselves have a structure.
- the first index (on the left on physical support, paper 7) qualifies the following normal characters and indicates the beginning of the field; the end of the latter is determined by the presence of an index character of the same hierarchical level.
- the index characters or their equivalents can be hierarchical.
- the significance index "date” can insert the indexes days, months, years, etc.
- compatibility degrees can be defined allowing verifications in writing, reading and at the application level.
- indexes are compatible with the higher "date" level; these are mainly classified indexes (temporal and local variables, below) which have different degrees of relevance, therefore of compatibility.
- Modification index modifies the meaning of the associated index.
- the format is an information structure defined by a set of construction rules which use different types of symbols including indexes. It implements information areas of specific significance or fields.
- a formatted message consists of two main parts: the header and the body.
- Formatting is the result of bringing the information structure into conformity with the given format.
- the Field is a subset of information which has a specific meaning and a defined structure.
- the field is delimited at its ends by an index character qualifying the nature and often the structure of the information it contains. If necessary, the fields can be marked with several successive index characters to indicate the direction of reading and extend the possibilities for qualifying the fields.
- the Header is the presentation part of the message. It must be accessible to the various reading devices if the information is on a physical medium. It provides the information necessary to operate the body of the message.
- the header is usually located at the beginning of the message! It is delimited by 2 specific index characters: "start of header” and "end of header”. It is made up of several fields. Its composition may vary depending on the fields of application.
- - Block set of information, generally in the form of characters (numeric, alphanumeric or bytes), participating in the semantic content of the message (useful or intrinsic information). It begins with an index character “start of block” and ends with an index “end of block”. Each block generally displays, after the start index, its serial number in the body of the message. They can thus appear there in an indifferent order.
- the blocks contain, in particular, fields adapted to the characteristics of the field of application.
- the message body is made up of at least 1 block. It is presented in the header. It constitutes almost all of the useful information to be used. In the case of very short messages.
- the header can encapsulate the body. STRUCTURE OF THE HEADER. - Figure 1-
- the header describes the relationships, the implementation conditions and the composition of the message body.
- Field of application (field 2, 1 character): 256 possible fields. 3. Links (including computer addresses) with the outside. The links make it possible to link the user to more detailed sources of information (in particular the suppliers or the person responsible for the message) and to browse the tree of "life" of the support or associated objects.
- the length is variable, field 3 (fig. 1). This field can contain an e-mail or internet address for example.
- the body is made up of at least 1 block framed by an index "start of block” and another of "end of block”.
- the end of the body can include additional edition index characters, such as end of message.
- the block encloses its serial number, possibly its length and useful information in the form of characters with or without fields. It is thus composed of: bytes for computer "messages" such as files stored or being transmitted,
- index characters lie in that they completely free the users from the constraint that constitutes the prior organization and bring it to knowledge of the structure of the message. They allow complete freedom to develop messages that remain readable by all those who respect the codification of indexes.
- the fields can be of variable sizes and be integrated anywhere in the message. The structure of the latter will be reconstructed upon reading, automatically adapting to the context without prior declaration.
- the simple application of the codification of the indexes is sufficient for the exploitation by all the participants.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Communication Control (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Document Processing Apparatus (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2002225124A AU2002225124A1 (en) | 2000-12-22 | 2001-12-20 | Method for formatting messages |
EP01994932A EP1348292A2 (fr) | 2000-12-22 | 2001-12-20 | Procede de formatage de messages |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0016868A FR2818779B1 (fr) | 2000-12-22 | 2000-12-22 | Procede de formatage de messages a l'aide d'index |
FR00/16868 | 2000-12-22 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002052486A2 true WO2002052486A2 (fr) | 2002-07-04 |
WO2002052486A3 WO2002052486A3 (fr) | 2003-01-30 |
Family
ID=8858078
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2001/004107 WO2002052486A2 (fr) | 2000-12-22 | 2001-12-20 | Procede de formatage de messages |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1348292A2 (fr) |
AU (1) | AU2002225124A1 (fr) |
FR (1) | FR2818779B1 (fr) |
WO (1) | WO2002052486A2 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7878413B2 (en) | 2005-02-16 | 2011-02-01 | Alphacode | Method for the dual coding of information on physical media and in a computerized format (DOTEM) |
US8256687B2 (en) | 2005-02-16 | 2012-09-04 | Alphacode | Method of coding information in a dual fashion on physical media and in DOTEM computerised form |
CN113486891A (zh) * | 2021-06-22 | 2021-10-08 | 深圳无境创新科技有限公司 | 螺钉图像处理方法、装置、电子设备和存储介质 |
-
2000
- 2000-12-22 FR FR0016868A patent/FR2818779B1/fr not_active Expired - Fee Related
-
2001
- 2001-12-20 AU AU2002225124A patent/AU2002225124A1/en not_active Abandoned
- 2001-12-20 WO PCT/FR2001/004107 patent/WO2002052486A2/fr not_active Application Discontinuation
- 2001-12-20 EP EP01994932A patent/EP1348292A2/fr not_active Withdrawn
Non-Patent Citations (2)
Title |
---|
NEUFELD G ET AL: "AN OVERVIEW OF ASN.1" COMPUTER NETWORKS AND ISDN SYSTEMS, NORTH HOLLAND PUBLISHING. AMSTERDAM, NL, vol. 23, no. 5, 1 février 1992 (1992-02-01), pages 393-415, XP000249379 ISSN: 0169-7552 * |
STALLINGS W: "IPV6: THE NEW INTERNET PROTOCOL" IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER. PISCATAWAY, N.J, US, vol. 34, no. 7, 1 juillet 1996 (1996-07-01), pages 96-108, XP000623747 ISSN: 0163-6804 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7878413B2 (en) | 2005-02-16 | 2011-02-01 | Alphacode | Method for the dual coding of information on physical media and in a computerized format (DOTEM) |
US8256687B2 (en) | 2005-02-16 | 2012-09-04 | Alphacode | Method of coding information in a dual fashion on physical media and in DOTEM computerised form |
CN113486891A (zh) * | 2021-06-22 | 2021-10-08 | 深圳无境创新科技有限公司 | 螺钉图像处理方法、装置、电子设备和存储介质 |
Also Published As
Publication number | Publication date |
---|---|
FR2818779B1 (fr) | 2003-08-01 |
AU2002225124A1 (en) | 2002-07-08 |
WO2002052486A3 (fr) | 2003-01-30 |
FR2818779A1 (fr) | 2002-06-28 |
EP1348292A2 (fr) | 2003-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
O’Dwyer | Limited edition: Producing artificial scarcity for digital art on the blockchain and its implications for the cultural industries | |
EP2433239B1 (fr) | Code original, procédé de génération et utilisation dudit code original | |
CA2958668A1 (fr) | Methodes et dispositif d'integration de la gestion de droits numeriques dans une chaine de blocs existante | |
Ivancsics | Blockchain in journalism | |
EP1880348B1 (fr) | Procede de codage de l'information de facon duale sur supports physiques et sous forme informatique dotem | |
CN100574408C (zh) | 媒体的解码后添加水印 | |
CN116308325B (zh) | 基于nft的数字资产管理方法及装置 | |
US20100153739A1 (en) | Securable independent electronic document | |
JP2007179375A (ja) | データ改竄防止方法及びデータ改竄防止システム | |
WO2002052486A2 (fr) | Procede de formatage de messages | |
David et al. | Intellectual property & global policy | |
Shughart et al. | Intellectual property rights, public choice, networks, and the new age of informal IP regimes | |
CN116235169A (zh) | 文本数据的数字水印 | |
Mohamed et al. | A novel method to protect content of microsoft word document using cryptography and steganography | |
Hosmani et al. | Dual stage text steganography using unicode homoglyphs | |
JP2005025591A (ja) | 印刷物及び印刷物セット | |
Lee | A secret transmission method via numeric data with a blind authentication capability | |
Malashetti | Impact of Non-Fungible Token (NFT) on World | |
Rajasekaran et al. | Digital Preservation File Format Tools | |
PHANTONG et al. | ENHANCING RESILIENCE AND COPING STRATEGIES FOR CYBERBULLYING IN ADOLESCENCE USING MINDFULNESS-BASEDCOGNITIVE THERAPY THROUGH GROUP COUNSELING | |
Ghosh | StegHTML: A message hiding mechanism in HTML tags | |
EP1436810A1 (fr) | Procede pour marquer, identifier et securiser les fichiers informatiques, les documents, les sons et les composes chimiques | |
CN101433012A (zh) | 一种以记忆卡加密以及解密作为保护数码内容的方法 | |
TURHAN et al. | A FRAMEWORK FOR CREATING A HYBRID EXPERIENCE FOR NFT ARTWORKS THROUGH 3D PRINTING | |
de Valk | TACTICAL WATERMARKS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001994932 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001994932 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |