WO1998051035A1 - Method and system for accessing electronic resources via machine-readable data on intelligent documents - Google Patents
Method and system for accessing electronic resources via machine-readable data on intelligent documents Download PDFInfo
- Publication number
- WO1998051035A1 WO1998051035A1 PCT/US1998/009441 US9809441W WO9851035A1 WO 1998051035 A1 WO1998051035 A1 WO 1998051035A1 US 9809441 W US9809441 W US 9809441W WO 9851035 A1 WO9851035 A1 WO 9851035A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- input data
- compression
- compression dictionary
- dictionary
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/333—Mode signalling or mode changing; Handshaking therefor
- H04N1/33307—Mode signalling or mode changing; Handshaking therefor prior to start of transmission, input or output of the picture signal only
- H04N1/33323—Mode signalling or mode changing; Handshaking therefor prior to start of transmission, input or output of the picture signal only transmission mode only, e.g. speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/4406—Restricting access, e.g. according to user identity
- H04N1/4413—Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/333—Mode signalling or mode changing; Handshaking therefor
- H04N2201/33307—Mode signalling or mode changing; Handshaking therefor of a particular mode
- H04N2201/33342—Mode signalling or mode changing; Handshaking therefor of a particular mode of transmission mode
- H04N2201/33357—Compression mode
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99932—Access augmentation or optimizing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
- Y10S707/99936—Pattern matching access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
Definitions
- the present invention relates to a secure and efficient method and system for embedding machine- readable and executable data in a printed document and linking them to networked computer resources.
- Electronic documents including files, documents, data stores, executable files and the like are increasingly important in business and personal computing applications. Notwithstanding the widespread use of such electronic files, the use of printed media, in particular printed documents, remains essential for various reasons. In particular, printed documents have been shown to be more easily and efficiently read and comprehended, are generally cheaper to generate and distribute, and are desired in many industries and professions over prime electronic documents since * tampering is more likely to be noticed than with electronic documents .
- a method of accessing electronic resources via machine readable - data embedded on a document comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data.
- the compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted.
- the compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data.
- the compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content.
- the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user.
- Fig. 1A is a block diagram which illustrates a method for embedding machine-readable data comprising ⁇ electronic resources on an intelligent document of the present invention.
- Fig. IB is a block diagram which illustrates a method for recovering the electronic resources from the machine-readable data from the intelligent document of the present invention.
- Figure IC illustrates an application of the present invention that encodes network resource pointers in an intelligent document.
- Fig. 2 is a block diagram which illustrates the use of application restricted subsets of compression dictionaries and a method of dictionary registration of the present invention.
- Fig. 3 is a block diagram which illustrates a method of applying customized compression dictionaries of the present invention.
- Fig. 4 is a block diagram which illustrates the use of digital signatures.
- Fig. 5A is a block diagram which illustrates the operation of a secret key cryptosystem.
- Fig. 5B is a block diagram which illustrates the operation of a public key cryptosystem
- Fig. 6A is a block diagram which illustrates a two party trust authentication model .
- Fig. 6B is a block diagram which illustrates a trusted third party authentication model.
- Fig. 7 illustrates an example of a two dimensional bar codes .
- Fig. 8 illustrates examples of linear bar codes .
- Figs.lA and IB illustrate a block diagram of the method and system for encoding, rendering, distributing, recovering and accessing electronic resources via embedded machine-readable data on an intelligent document 46.
- the process of the present invention is initiated by a user, an automated source, or a primary application program 12 with input data 14 consisting of data files, executable programs, pointers to stored information or other digital data having information content stored on a computer system or transmitted on a digital data network.
- a data classification step id first performed by the system.
- the recipient of the intelligent document 46 can scan the machine readable symbol rendered thereon and the application associated with the transferred data file will be automatically invoked.
- the input data 14 is applied to a classification step 16 which sorts and tags the input data 14 according to the corresponding primary application program 12 which was either used to generate the input data 14 or is most closely associated with it.
- This can be done automatically with software by reading and analyzing file extensions of the input data 14 which are then mapped to common application programs 12 by convention. For instance, a file with a .doc extension would be mapped to a Microsoft Word ® application. As a result, the recipient's computer will automatically execute - Microsoft Word ® upon processing the intelligent document 46.
- the classification step 16 could also be accomplished by analyzing the actual content of the input data 14 and identifying the specific or class of primary application programs 12 with which the input data 14 would most likely be associated with. Techniques which analyze the content or syntax of the input data 14 by searching for either specific deterministic markers such as the presence of "getchar' for C source code, or heuristic signatures such as the frequency of ⁇ . Alternatively, the classification step 16 could be performed manually via operator designation upon initialization of the system as well as in real time during operation.
- the input data 14 can be supplemented with prefixes, suffixes, labels or commands which are effective to communicate with subsequent secondary application 18 programs in an application coding step 20.
- the application coding step 20 could also be used to provide pointer registration 22 to a local or distributed retrieval address of the file being referenced. This would provide a means for automatically creating and listing indexes for on-line retrieval of information through the use of machine-readable codes.
- the location pointed to by the intelligent document remains constant but the data itself (i.e. the contents of the file) may change in accordance with the needs of the data content provider. That is, by embedding an Internet URL, the content provider knows that users of a particular intelligent document will always be directed to that location on the Internet, and can change the data file returned by that URL as he desires.
- an index may be encoded within the intelligent document that may be sent by the user's browser program to a lookup table or index database located on a networked resource such as the Internet .
- a URL correlated to the index would be returned to the user's browser, and the browser would then use the URL to retrieve the resource from the appropriate server computer.
- This provides even greater flexibility since the URL may change in the future, and the content provider need only change the mapping function in the lookup table so that the same index is mapped to and returns a different URL.
- pointers such as indexes and/or URLs
- Figure IC is illustrative of the overall system that retrieves a networked resource from - a URL embedded in a machine-readable symbol embedded in an intelligent document, which may be implemented advantageously in the intelligent document system of the present invention as further described herein.
- an optional compression step is implemented so that large data files can be encoded, even if the size of the file is too large to fit within the machine-readable symbology being employed. That is, during the compression step 24 the input data 14 is compressed to reduce the amount of bandwidth required to represent and convey the information without unreasonable distortion in the information content. This can be accomplished using compression methods which reduce the amount of redundant information in a transmission by optimally coding data elements or strings of data elements (i.e. tokens) . In order to use these tokens to restore the original message during decoding, a compression dictionary can be transmitted with the input data 14, in which case a minimal acceptable compression value is defined as that point where the overhead of sending the compression dictionary with the data 14 is less than the bandwidth saved using compression.
- the compression dictionary may reside on an accessible data source (i.e., known and available to the recipient) and correctly mapped to the compressed data during decompression. Since the application programs associated with the input data 14 are known from the classification step 16 an appropriate compression method and associated compression dictionary can be defined and made available to both the compression 24 and decompression 60 steps based upon general message classification (e.g. letter frequency in English for plaintext English messages) or application restricted " subsets (e.g. optimized compression for multi-token strings such as http:// for messages classified as html files) .
- general message classification e.g. letter frequency in English for plaintext English messages
- application restricted " subsets e.g. optimized compression for multi-token strings such as http:// for messages classified as html files
- Fig. 2 illustrates use of application restricted subsets of compression dictionaries 24A.
- a transmitting means has access to a number of subsets of compression dictionaries grouped according to application programs which are most closely associated with potential input data 14.
- a pointer or index is directed to a compression dictionary within a subset defined by the corresponding application program.
- the value of the pointer or index is transferred via in-band 26 or out- band 26A resources to a decompression step 60 on Figure lBwhich then uses the pointer or index to determine the appropriate method for the decompression step 60.
- This method of dictionary registration between the transmitting and receiving means enables the transfer of compressed input data without the explicit transmission of the compression dictionary utilized.
- custom compression dictionaries can be generated for specific input data 14 and either transmitted in-band or posted by transmitting processes and retrieved by receiving processes from out- band sources using an agreed upon indexing or dictionary registration 26 scheme conveyed in either the syntax of compression flags or through pointer registration 22.
- indexing or dictionary registration 26 scheme conveyed in either the syntax of compression flags or through pointer registration 22.
- a totally secure cipher in the form of a one-time pad may be implemented within the custom compression technique .
- Fig. 3 illustrates an embodiment for application of customized compression dictionaries.
- the input data 14 is initially applied to a standard non- customized compression method 24B in order for a customization parameter/coefficient and control logic block 24C to obtain a predetermined sample of the content of the input data 14 in order to analyze it and determine the optimal compression algorithm, coefficients and parameters to apply according to methods well known in the art .
- the customization parameter/coefficient and control logic block 24C may then direct the output 24E of the compression method to be derived from the customized compression method 24D by applying the appropriate select signal 24F to the multiplexor 24G. Due to the closed loop structure of this method dynamic variations in algorithm, coefficients, and parameters may continue to be provided to the customized compression, method 24D during operation in order to maintain optimal performance of the overall compression step 24.
- the compression dictionary may be transferred either in-band with the compressed data, via out-band resources, or not at all.
- semantic- based variable coding compression may be utilized, whereby raw text information is analyzed and represented symbolically, transmitted in-band and then expanded at the receiving end using a set of common mapping conventions.
- Another example would be the substitution of large numbers of boilerplate application parameters in an application data file with a symbolically coded value ' which indicates the application and the specific configuration in use in a native file. This could then be expanded through substitution during the decompression step 60, thereby saving an appreciable amount of bandwidth.
- a compression flag 28 is appended to indicate which compression method was used and thus which method to be used during the decompression step 60.
- Any of a variety of cipher or encryption methods can optionally be used during an encryption step 30.
- the appropriate encryption method is selected during configuration or interactively by the operator and identified using an encryption flag 32 which is transmitted with the encrypted input data 14.
- Certificate authentication 34 for public key encryption generation and authorization may also be used.
- the processes of encryption and decryption also known as encipherment and decipherment, can be expressed as a number of steps involving well-defined rules, decisions and calculations. Stated simply, they are algorithms. The steps may be many or few, and the mathematics simple or complex. Because they are inverse operations, the steps used to encrypt and decrypt are usually different . Companion encryption and decryption algorithms are jointly called a cryptosystem.
- Digital signatures 30A are to electronic transmission of information what handwritten signatures are to printed correspondence except that they are virtually impossible to forge. This is due to the fact that each digital signature 30A is unique to the message 30B it signs since the message 30B itself as well as the sender's key 30C are used in creating the digital signature 30A within the signature algorithm 30D.
- An additional advantage of using digital signatures 30A is the verification of message integrity since a digitally signed message which has been altered will fail the recipient's signature verification.
- the signature algorithm 30D could perform a one-way hashing function on the contents of the message 3OB and then encrypt the result with the sender's key 30C.
- a hashing function is a checksum which " comprises an appropriate number of bits with respect to the length of a typical message such that it becomes unreasonable to expect that the message could be altered while retaining the same result of the hashing function.
- secret-key cryptosystems Two fundamentally different types of key-based cryptosystems are typically used. They are called secret-key cryptosystems as illustrated in Fig. 5A, and public-key cryptosystems as illustrated in Fig. 5B.
- secret key 30E indicates that the security of a ciphertext message lies largely in the ability of the sender and receiver to keep the key a secret .
- a secret key 30E is used for both the encryption step 30 and the decryption step 58. For this reason, they are also called symmetric cryptosystems or symmetric ciphers.
- public key cryptosystems as illustrated in Fig. 5B, always use different encryption and decryption keys, with the required characteristic that one cannot realistically be derived from the other.
- the encryption key may be disclosed to the general public which is termed the public key 30F.
- Messages encrypted with the public key 30F can only be decrypted by the holder of the decryption key, which is called the private key 30G.
- the reverse is also true in some forms of public key cryptography. Since the keys are different, and knowledge of the public key 30F does not generally reveal the private key 30G (although one could in theory determine the private key given substantial computer power; i.e it is simply impracticle to derive the private key from the public key) , public-key cryptosystems are known as asymmetric cryptosystems or asymmetric ciphers. The discussion above appears in greater detail and refinement in Hughes, Internet Security Techniques (1995) , which is hereby incorporated by reference.
- the present invention may also use a digital signature or similar authentication technique in an authentication step 36 to ensure that only licensed sources generate the document. Among other features, this will permit free dissemination of decoding software, since the decoding software can only be used with documents originating from licensed users.
- Data pertinent to the authentication step 36 is included in the message in the form of an authentication flag 38 (e.g. digital signature) .
- Access to a certificate authentication 34 is also provided as shown in Fig. 1 to be used as required according to the method chosen for authentication.
- Digital signatures may be used to certify authenticity as well as to ensure the veracity of message (i.e. that is has not been tampered with) .
- Authentication primarily establishes proof of the identity of a potential user. Usually this involves one or a combination of something the user is, something the user knows or something the user has. Friends, family, and acquaintances commonly identify someone by something they are (e.g., physical characteristics). Bank automated teller machines identify someone as a potential customer by something they have (e.g., an authorized ATM card) in combination with something they know (e.g., their Personal Identification Number (PIN)).
- PIN Personal Identification Number
- biometric techniques Some of - the disadvantages of biometric techniques is that the implementation cost is relatively high, there is a tendency to make errors in judgment due to the required tolerances, and the concern of some users of the potential for spreading communicable diseases via contact.
- the assumption with biometrics is that the characteristics being measured cannot be borrowed, stolen, or found and are very difficult if not impossible to duplicate.
- User to host authentication schemes identify users to computer systems .
- the purpose of this type of authentication is to provide users with services for which they are authorized, and to deny access to services for which they are not.
- Those services might include an interactive login session, networked access to the host's file system or access to electronic resources as in the present invention.
- the most ubiquitous authentication scheme employed in computing systems is based on static passwords.
- a user chooses or is assigned an account name and an associated password. Given together these satisfy the host of the user's identity. The host need only have some way to confirm that a password entered by the user is correct.
- a host uses a challenge-response scheme to verify that a user knows her password without requiring her to send it over the network. Assume that a host receives a login request from a user who responds by issuing a challenge string likely to be unique, perhaps including a timestamp and a process identification. The user's client software concatenates the password entered to the challenge string and computes a one-way hash of the result. This ⁇ hash output is forwarded to the user who independently performs the same calculation. If the host's hash matches the user's hash then the password entered was correct .
- An alternative scheme that prevents such attacks is a one-time password system. Unlike authentication mechanisms based on static passwords, those based on one-time passwords are not at all endangered by cleartext password entry. Three popular one-time password mechanisms are Bellcore's S/KEY, handheld authenticators, and smart cards.
- Handheld authenticators also called handheld password generators or tokens, are small hardware devices that generate one-time passwords. Use of handheld authenticators is based on the premise that each one is uniquely associated with exactly one user in the host's authentication database.
- the authenticators are about the size of a credit card or a calculator, with numbered keys and comprise a small LCD display. They contain dedicated integrated circuitry that calculates one-time passwords.
- Asynchronous handheld authenticators involve the use of a challenge- response scheme wherein the host issues a challenge that the user keys into the authenticator. The response appears on the display which the user then enters and transfers to the host.
- the same concept may be used with an added requirement that the user enter a PIN.
- Synchronous handheld authenticators provide a password which is based on its internal clock without the issuance of a challenge by the host. This method may also require the entry of a PIN prior to the challenge.
- Each of these schemes require that both the authenticator and the host know a common algorithm which computes the one-time password.
- the algorithm may either be publicly known or proprietary according to the application.
- Methods which require a PIN effectively authenticate the user to the handheld authenticator and not to the host so that the possibility for eavesdropping is limited to non-network means.
- the authenticators usually disable themselves after several consecutive incorrect PIN's are entered. When these types of authenticators are coupled with static passwords an extremely secure system results .
- Handheld authenticators must be relatively tamper proof in order to prevent modification and analysis. They are generally powered by batteries and relatively inexpensive in order to facilitate disposal and replacement.
- Smart cards operate much the same as handheld authenticators, however, they comprise more complex circuitry such as a central processing unit (CPU) , a clock, program read only memory (ROM) , RAM, and nonvolatile RAM or electrically erasable program read only memory (EEPROM) which are used to store and retain the key during power shutdown.
- CPU central processing unit
- ROM program read only memory
- RAM random access memory
- EEPROM electrically erasable program read only memory
- the smart card permits the use of long keys without user intervention beyond entry of the PIN.
- the smart card communicates directly with the challenging entity via a reader and with the user via parallel, serial or PCMCIA interfaces.
- a user's authenticity is judged by a host 36B based upon the user's credentials such as a password.
- Each party decides to trust the other.
- the user 36A must trust that the host 36B is the intended one and not an impostor in a position to accept his password and use it as an illegal entry into the system.
- the host36B must trust that the user 36A is actually authorized and has not merely stolen the password.
- a trusted third party configuration as illustrated in Fig. 6B, the host 36B and user 36A each rely on the judgment of a trusted third party 36C or key distribution center (KDC) to ascertain the authenticity of each others identity.
- the KDC treats both the user 36A and host 36B as equal entities or principals.
- the trusted third party configuration represents an improvement over the two party configuration in that neither principal divulges a secret key to the other when attempting authentication. Since the KDC is the only arbiter of authentication it must present a highly reliable and secure system since a breach of its security represents a problem to all principals which utilize its services. Also the KDC can become a bottleneck or result in total breakdown of communication links between any principal since all communications must pass through the KDC.
- Kerberos authentication system is an example of a trusted third party authentication method and is described in detail in Hughes, Internet Security Techniques pp. 91-125, (1995), which is hereby incorporated by reference.
- the authentication step 36 of the present invention could either be incorporated or operated in conjunction with any of the aforementioned methods of authentication (i.e., passwords, handheld authenticators, smart cards, and trusted third parties, or the equivalent method well known in the art) .
- An encoding step 40 converts the input data
- a bar code is typically a linear array of elements that are either printed directly on an object or on labels that are affixed to the object. Bar code elements typically comprise bars and spaces with bars of varying widths representing strings of binary ones and spaces of varying widths representing strings of binary zeros . Many bar codes are optically detectable and are read by devices such as scanning laser beams or handheld wands .
- bar codes are implemented in magnetic media.
- the readers and scanning systems electro- optically decode the symbol to multiple alpha-numerical characters that are intended to be descriptive of the article or some characteristic thereof. Such characters are typically represented in digital form as an input to a data processing system for a variety of applications.
- U.S. Pat. No. 5,388,158 discloses a method which secures a printed document against tampering or alteration.
- This invention contemplates the document in question being scanned to produce a digital signal which is compressed, encrypted, and coded as a two dimensional bar code or some other appropriate form of coding, which is then incorporated onto a label and affixed to the document.
- the signal representing the image is encrypted using a pubic key encryption system and the key is downloaded from a central location. This key maybe changed from time to time in order to increase security.
- the corresponding decryption key is encrypted with another key and incorporated on the card.
- To validate the document the encoded signal is scanned from the label decoded, decrypted, expanded and displayed. The card may then be authenticated by comparing the displayed representation of the image with the document .
- Encoded symbology graphics must be configured and incorporated into the machine-readable documents according to aesthetic and functional considerations during a formatting step 42. In addition, even when aesthetics are not highly relevant, it is often desirable to place the symbologies in known positions so that they may easily be found and identified by automated processes prior to decoding.
- the placement of the symbology graphics is determined by configuration parameters, application settings and user selection. Options include appending all symbols as an appendix to the document, as notation on a page by page basis (e.g. the lower margin) or paragraph by paragraph basis, or as embedded elements in text and graphics which indicate associations with embedded, on-line, or other forms of electronic formation.
- An intelligent document is prepared for distribution and display during a rendering step 44. This requires that the graphic symbology be represented so as not to distort the physical dimensions of each symbol due to insufficiencies in the rendering process since such distortions would hamper or prevent successful interpretation during a decoding step 54.
- the completed intelligent document 46 contains graphically rendered machine readable symbols which contain compressed and optionally encrypted data representing the following:
- the compression flag 28 which indicates the method of compression and the compression dictionary used to compress the data as well as the optional pointer to the compression dictionary as indicated by the dictionary registration 26;
- an authentication flag 38 which indicates that encoded data originated from an authorized licensed source, which may take the form of a digital signature with appropriate pointers to on-line certificate authentication 34 or other methods of authentication described in detail above.
- the intelligent document 46 is scanned with an imaging device in an acquire image step 48 the " " acquired image must be searched to find the symbols and corrected for orientation, skew, contrast and other distortions (e.g. warp) in a find and normalize symbols step 52 prior to decoding.
- the document is encoded with symbology which can be scanned with a flying spot (e.g. laser scanner) in a scan image step 50 (e.g. PDF417) the find and normalize symbols step 52 is not required.
- Machine readable symbology consists of highly structured patterns of light and dark areas contained in either a static image memory or conveyed as a series of edge transition patterns by a moving spot .
- these patterns are analyzed and demodulated to reconstruct an error corrected data stream which is then further processed to extract application layer data.
- the decoding step 54 can be performed in software, hardware or a combination of the two and is often combined with the scan image step 50 or acquire image step 48 in physical devices such as laser or CCD scanners or high-speed imaging equipment. It can also be performed as a separate software process, particularly when acquisition is performed with image- processing equipment (e.g. document scanners).
- the authentication flag 38 or signature is confirmed during an authentication step 56. This step may include confirmation that the certificate authentication 34 is still valid via access to an on- line Certificate Revocation Identification List (CRIL) or equivalent cache. If the authentication flag 38 is confirmed, processing of the decoded input data is permitted to proceed. If the authentication flag 38 is not confirmed, processing terminates with appropriate error conditions asserted to the user or application layer.
- a decryption step 58 the encryption flag 32 is analyzed to determine whether encryption has been performed on the decoded data and if so which decryption method to use. A decryption key is loaded and authenticated and a decryption algorithm indicated by the encryption flag 32 is performed which produces clear, compressed text for subsequent stages of processing. Access is optionally provided to on-line or cache verification including CRIL's.
- a decompression step 60 clear text produced by the decryption the step 58 is decompressed using the compression method and compression dictionary indicated by the compression flag 28.
- the compression dictionary may be universal, conveyed in-line as clear text, a cached application class dictionary (e.g. html) or fetched from an on-line source identified by the compression flag 28.
- the CGI application gateway interface offered "" by httpd is a powerful tool that effectively converts Web browsers into multifaceted application clients. Almost any application that relies on form-based input from users can be adapted to CGI .
- CGI programs on the server do little more than write HTML streams in standard output and parse formatted form input on the return trip. The ease or difficulty of everything else depends largely on the nature of the background application tasks. Programs written in Perl, a powerful C-like interpretive language, have become a favorite of CGI developers. Under the guidance of Web servers, browsers can provide HTML-based forms to users, which can be filled out and submitted back to the server for subsequent processing. This is best accomplished with the assistance of application gateways via CGI on the server system. For instance, a CGI program might transparently convert the user's form input into SQL and access a relational database in real-time.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP54854098A JP2001526857A (en) | 1997-05-09 | 1998-05-09 | Method and system for accessing electronic resources via machine-readable data on intelligent documents |
BR9809252-9A BR9809252A (en) | 1997-05-09 | 1998-05-09 | Method and system for accessing electronic resources through machine-readable data in smart documents |
EP98921065A EP0983661A1 (en) | 1997-05-09 | 1998-05-09 | Method and system for accessing electronic resources via machine-readable data on intelligent documents |
CA002286707A CA2286707C (en) | 1997-05-09 | 1998-05-09 | Method and system for accessing electronic resources via machine-readable data on intelligent documents |
AU73750/98A AU7375098A (en) | 1997-05-09 | 1998-05-09 | Method and system for accessing electronic resources via machine-readable da ta on intelligent documents |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US4603797P | 1997-05-09 | 1997-05-09 | |
US60/046,037 | 1997-05-09 | ||
US08/967,383 US5933829A (en) | 1996-11-08 | 1997-11-08 | Automatic access of electronic information through secure machine-readable codes on printed documents |
US08/967,383 | 1997-11-08 | ||
US2391898A | 1998-02-13 | 1998-02-13 | |
US09/023,918 | 1998-02-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998051035A1 true WO1998051035A1 (en) | 1998-11-12 |
Family
ID=27362214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/009441 WO1998051035A1 (en) | 1997-05-09 | 1998-05-09 | Method and system for accessing electronic resources via machine-readable data on intelligent documents |
Country Status (7)
Country | Link |
---|---|
US (1) | US6434561B1 (en) |
EP (1) | EP0983661A1 (en) |
JP (1) | JP2001526857A (en) |
AU (1) | AU7375098A (en) |
BR (1) | BR9809252A (en) |
CA (1) | CA2286707C (en) |
WO (1) | WO1998051035A1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1107504A2 (en) * | 1999-12-02 | 2001-06-13 | International Business Machines Corporation | Method of updating encryption keys in a data communication system |
US6321991B1 (en) | 1993-11-24 | 2001-11-27 | Metrologic Instruments, Inc. | Web-based television system and method for enabling a viewer to access and display HTML-encoded documents located on the World Wide Web (WWW) by reading bar code symbols printed in a WWW-site guide using a wireless bar-code driven remote control device |
US6321992B1 (en) | 1997-03-19 | 2001-11-27 | Metrologic Instruments, Inc. | Internet-based system and method for tracking objects bearing URL-encoded bar code symbols |
US6375078B1 (en) | 1990-09-11 | 2002-04-23 | Metrologic Instruments, Inc. | Universal transaction machine for carrying out information-related transactions using html-encoded documents embodying transaction-enabling java-applets automatically launched and executed in response to reading code symbols |
US6386453B1 (en) | 1996-11-25 | 2002-05-14 | Metrologic Instruments, Inc. | System and method for carrying out information-related transactions |
US6400272B1 (en) | 1999-04-01 | 2002-06-04 | Presto Technologies, Inc. | Wireless transceiver for communicating with tags |
US6464139B1 (en) | 1993-11-24 | 2002-10-15 | Metrologic Instruments, Inc. | Wireless hand-supportable internet-enabled access terminal for enabling information-related transactions over the internet |
US6505776B1 (en) | 1995-06-07 | 2003-01-14 | Metrologic Instruments, Inc. | System for storing, accessing and displaying html-encoded documents relating to an object being worked upon in a work environment by a human operator wearing a wireless http-enabled client system equipped with a code symbol reader programmed to read a url-encoded symbol on the object, access said html-encoded documents from http-enabled information servers connected to an information network, and display same for review while working said object |
US6510997B1 (en) | 1993-11-24 | 2003-01-28 | Metrologic Instruments, Inc. | Hand-supportable bar code symbol reading device having an integrated world wide web (www) browser command generator for automatically generating www browser program commands to initiate the execution of hyper-text transmission protocol (http) requests |
WO2003050641A2 (en) | 2001-12-10 | 2003-06-19 | Virtual Locality Ltd. | Apparatus and method for optimized and secured reflection of network services to remote locations |
US6622919B1 (en) | 1996-11-25 | 2003-09-23 | Metrologic Instruments, Inc. | System and method for accessing internet-based information resources by scanning Java-Applet encoded bar code symbols |
US6622917B1 (en) | 1993-11-24 | 2003-09-23 | Metrologic Instruments, Inc. | System and method for composing sets of URL-encoded bar code symbols while using an internet browser program |
US6942150B2 (en) | 1993-11-24 | 2005-09-13 | Metrologic Instruments, Inc. | Web-based mobile information access terminal |
US6959286B2 (en) | 1997-10-27 | 2005-10-25 | Ipf, Inc. | Method and system for searching a dynamically updated database of UPN/TM/PD and URL data links |
US6961713B2 (en) | 1996-10-25 | 2005-11-01 | Ipf, Inc. | Internet-based method of and system for enabling communication of consumer product information between vendors and consumers in a stream of commerce, using vendor created and managed upn/tm/pd/url data links |
US6988662B2 (en) | 1997-06-04 | 2006-01-24 | Metrologic Instruments, Inc. | System and method for carrying out information-related transactions using web documents embodying transaction-enabling applets automatically launched and executed in response to reading url-encoded symbols pointing thereto |
US7089199B2 (en) | 1997-10-27 | 2006-08-08 | Metrologic Instruments, Inc. | System for and method of managing and delivering manufacturer-specified consumer product information to consumers in the marketplace |
US7337968B2 (en) | 1997-11-24 | 2008-03-04 | Metrologic Instruments, Inc. | System for storing, accessing and displaying HTML-encoded documents relating to an object being worked upon in a work environment by a human operator |
GB2480262A (en) * | 2010-05-10 | 2011-11-16 | Etsem Ltd | An algorithm for cyclic compression and decompression of a data sequence |
GB2480261A (en) * | 2010-05-10 | 2011-11-16 | Etsem Ltd | An algorithm for cyclic compression and decompression of a data sequence |
Families Citing this family (199)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8352400B2 (en) | 1991-12-23 | 2013-01-08 | Hoffberg Steven M | Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore |
US6522770B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Management of documents and other objects using optical devices |
US8094949B1 (en) | 1994-10-21 | 2012-01-10 | Digimarc Corporation | Music methods and systems |
US7986806B2 (en) | 1994-11-16 | 2011-07-26 | Digimarc Corporation | Paper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network |
US6085740A (en) * | 1996-02-21 | 2000-07-11 | Aerogen, Inc. | Liquid dispensing apparatus and methods |
US7289643B2 (en) | 2000-12-21 | 2007-10-30 | Digimarc Corporation | Method, apparatus and programs for generating and utilizing content signatures |
US8429205B2 (en) | 1995-07-27 | 2013-04-23 | Digimarc Corporation | Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals |
US6650761B1 (en) * | 1999-05-19 | 2003-11-18 | Digimarc Corporation | Watermarked business cards and methods |
US6411725B1 (en) * | 1995-07-27 | 2002-06-25 | Digimarc Corporation | Watermark enabled video objects |
US7003731B1 (en) | 1995-07-27 | 2006-02-21 | Digimare Corporation | User control and activation of watermark enabled objects |
US8379908B2 (en) | 1995-07-27 | 2013-02-19 | Digimarc Corporation | Embedding and reading codes on objects |
US8180844B1 (en) | 2000-03-18 | 2012-05-15 | Digimarc Corporation | System for linking from objects to remote resources |
US20030009670A1 (en) * | 2001-04-02 | 2003-01-09 | Digimarc Corporation | Background watermark processing |
US7596755B2 (en) * | 1997-12-22 | 2009-09-29 | Ricoh Company, Ltd. | Multimedia visualization and integration environment |
US7954056B2 (en) * | 1997-12-22 | 2011-05-31 | Ricoh Company, Ltd. | Television-based visualization and navigation interface |
US7263659B2 (en) * | 1998-09-09 | 2007-08-28 | Ricoh Company, Ltd. | Paper-based interface for multimedia information |
US7586398B2 (en) | 1998-07-23 | 2009-09-08 | Universal Electronics, Inc. | System and method for setting up a universal remote control |
US7263671B2 (en) | 1998-09-09 | 2007-08-28 | Ricoh Company, Ltd. | Techniques for annotating multimedia information |
US7215436B2 (en) * | 1998-09-09 | 2007-05-08 | Ricoh Company, Ltd. | Device for generating a multimedia paper document |
US7266782B2 (en) * | 1998-09-09 | 2007-09-04 | Ricoh Company, Ltd. | Techniques for generating a coversheet for a paper-based interface for multimedia information |
US7197156B1 (en) | 1998-09-25 | 2007-03-27 | Digimarc Corporation | Method and apparatus for embedding auxiliary information within original data |
US7373513B2 (en) * | 1998-09-25 | 2008-05-13 | Digimarc Corporation | Transmarking of multimedia signals |
US7532740B2 (en) | 1998-09-25 | 2009-05-12 | Digimarc Corporation | Method and apparatus for embedding auxiliary information within original data |
US7904187B2 (en) | 1999-02-01 | 2011-03-08 | Hoffberg Steven M | Internet appliance system and method |
US6880155B2 (en) * | 1999-02-02 | 2005-04-12 | Sun Microsystems, Inc. | Token-based linking |
IL128720A (en) * | 1999-02-25 | 2009-06-15 | Cidway Technologies Ltd | Method for certification of over the phone transactions |
US20070055884A1 (en) | 1999-05-19 | 2007-03-08 | Rhoads Geoffrey B | User control and activation of watermark enabled objects |
US8095796B2 (en) | 1999-05-19 | 2012-01-10 | Digimarc Corporation | Content identifiers |
US6903838B1 (en) * | 1999-12-20 | 2005-06-07 | Hewlett-Packard Development Company, L.P. | Automatically specifying address where document is to be sent |
AUPQ486599A0 (en) * | 1999-12-23 | 2000-02-03 | Zentronix Pty Ltd | A method of storing and retrieving miniaturised data |
US7185018B2 (en) * | 1999-12-23 | 2007-02-27 | Zentronix Pty Limited | Method of storing and retrieving miniaturized data |
US6687694B2 (en) * | 2000-01-05 | 2004-02-03 | Jim Miller | Configurable pattern recognition and filtering tool |
KR100865247B1 (en) | 2000-01-13 | 2008-10-27 | 디지맥 코포레이션 | Authenticating metadata and embedding metadata in watermarks of media signals |
US8355525B2 (en) | 2000-02-14 | 2013-01-15 | Digimarc Corporation | Parallel processing of digital watermarking operations |
US8959582B2 (en) | 2000-03-09 | 2015-02-17 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US20060173848A1 (en) * | 2000-03-09 | 2006-08-03 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US8230482B2 (en) * | 2000-03-09 | 2012-07-24 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US20060155731A1 (en) * | 2000-03-09 | 2006-07-13 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US20060143714A1 (en) * | 2000-03-09 | 2006-06-29 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US7844579B2 (en) | 2000-03-09 | 2010-11-30 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US20050015608A1 (en) | 2003-07-16 | 2005-01-20 | Pkware, Inc. | Method for strongly encrypting .ZIP files |
US6879988B2 (en) | 2000-03-09 | 2005-04-12 | Pkware | System and method for manipulating and managing computer archive files |
US20060143250A1 (en) * | 2000-03-09 | 2006-06-29 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US20060143252A1 (en) * | 2000-03-09 | 2006-06-29 | Pkware, Inc. | System and method for manipulating and managing computer archive files |
US6611881B1 (en) | 2000-03-15 | 2003-08-26 | Personal Data Network Corporation | Method and system of providing credit card user with barcode purchase data and recommendation automatically on their personal computer |
US7409543B1 (en) * | 2000-03-30 | 2008-08-05 | Digitalpersona, Inc. | Method and apparatus for using a third party authentication server |
US7698565B1 (en) | 2000-03-30 | 2010-04-13 | Digitalpersona, Inc. | Crypto-proxy server and method of using the same |
US6666377B1 (en) | 2000-07-18 | 2003-12-23 | Scott C. Harris | Bar code data entry device |
WO2002013094A1 (en) * | 2000-08-03 | 2002-02-14 | Digimarc Corporation | Linking from paper invoices and statements to on-line resources |
JP2002082987A (en) * | 2000-09-06 | 2002-03-22 | Seiko Epson Corp | Document information reading support device, digital content generating system, digital content distributing system and storage medium |
WO2002033954A2 (en) | 2000-10-17 | 2002-04-25 | Digimarc Corporation | User control and activation of watermark enabled objects |
US6651060B1 (en) * | 2000-11-01 | 2003-11-18 | Mediconnect.Net, Inc. | Methods and systems for retrieval and digitization of records |
US8594364B2 (en) * | 2000-11-02 | 2013-11-26 | Digimarc Corporation | Batch identifier registration and embedding in media signals |
US7680324B2 (en) | 2000-11-06 | 2010-03-16 | Evryx Technologies, Inc. | Use of image-derived information as search criteria for internet and other search engines |
US9310892B2 (en) | 2000-11-06 | 2016-04-12 | Nant Holdings Ip, Llc | Object information derived from object images |
US8218873B2 (en) * | 2000-11-06 | 2012-07-10 | Nant Holdings Ip, Llc | Object information derived from object images |
US8224078B2 (en) | 2000-11-06 | 2012-07-17 | Nant Holdings Ip, Llc | Image capture and identification system and process |
US7899243B2 (en) | 2000-11-06 | 2011-03-01 | Evryx Technologies, Inc. | Image capture and identification system and process |
US7565008B2 (en) | 2000-11-06 | 2009-07-21 | Evryx Technologies, Inc. | Data capture and identification system and process |
JP2004524605A (en) * | 2000-12-14 | 2004-08-12 | クィジッド テクノロジーズ リミテッド | Authentication system |
US7007105B1 (en) * | 2001-01-11 | 2006-02-28 | Remote Knowledge, Inc. | Method and system for improving data transmission and storage of markup language documents |
US20010011281A1 (en) * | 2001-03-12 | 2001-08-02 | Fry Randolph A. | Instant random display of electronic file through machine-readable codes on printed documents |
US6972863B2 (en) * | 2001-03-19 | 2005-12-06 | Hewlett-Packard Development Company, L.P. | Direct barcode printing from internet database |
US7046819B2 (en) | 2001-04-25 | 2006-05-16 | Digimarc Corporation | Encoded reference signal for digital watermarks |
US8543823B2 (en) | 2001-04-30 | 2013-09-24 | Digimarc Corporation | Digital watermarking for identification documents |
US20020169963A1 (en) * | 2001-05-10 | 2002-11-14 | Seder Phillip Andrew | Digital watermarking apparatus, systems and methods |
US20020169721A1 (en) * | 2001-05-10 | 2002-11-14 | Cooley William Ray | Digital watermarking apparatus, systems and methods |
US7916124B1 (en) | 2001-06-20 | 2011-03-29 | Leapfrog Enterprises, Inc. | Interactive apparatus using print media |
US7106470B2 (en) * | 2001-08-10 | 2006-09-12 | Hewlett-Packard Development Company, L.P. | Direct printing from internet database |
US7075668B2 (en) * | 2001-08-10 | 2006-07-11 | Hewlett-Packard Development Company, L.P. | Direct printing from internet database |
US20030033524A1 (en) * | 2001-08-13 | 2003-02-13 | Luu Tran | Client aware authentication in a wireless portal system |
US7809710B2 (en) * | 2001-08-14 | 2010-10-05 | Quigo Technologies Llc | System and method for extracting content for submission to a search engine |
US7788080B2 (en) * | 2001-11-19 | 2010-08-31 | Ricoh Company, Ltd. | Paper interface for simulation environments |
US7495795B2 (en) | 2002-02-21 | 2009-02-24 | Ricoh Company, Ltd. | Interface for printing multimedia information |
US7747655B2 (en) | 2001-11-19 | 2010-06-29 | Ricoh Co. Ltd. | Printable representations for time-based media |
US8635531B2 (en) | 2002-02-21 | 2014-01-21 | Ricoh Company, Ltd. | Techniques for displaying information stored in multiple multimedia documents |
US7861169B2 (en) | 2001-11-19 | 2010-12-28 | Ricoh Co. Ltd. | Multimedia print driver dialog interfaces |
US7149957B2 (en) | 2001-11-19 | 2006-12-12 | Ricoh Company, Ltd. | Techniques for retrieving multimedia information using a paper-based interface |
US8539344B2 (en) * | 2001-11-19 | 2013-09-17 | Ricoh Company, Ltd. | Paper-based interface for multimedia information stored by multiple multimedia documents |
US7743347B2 (en) | 2001-11-19 | 2010-06-22 | Ricoh Company, Ltd. | Paper-based interface for specifying ranges |
US7703044B2 (en) | 2001-11-19 | 2010-04-20 | Ricoh Company, Ltd. | Techniques for generating a static representation for time-based media information |
US20030142358A1 (en) * | 2002-01-29 | 2003-07-31 | Bean Heather N. | Method and apparatus for automatic image capture device control |
GB0210692D0 (en) * | 2002-05-10 | 2002-06-19 | Assendon Ltd | Smart card token for remote authentication |
US6860422B2 (en) * | 2002-09-03 | 2005-03-01 | Ricoh Company, Ltd. | Method and apparatus for tracking documents in a workflow |
US7652555B2 (en) | 2002-09-03 | 2010-01-26 | Ricoh Company, Ltd. | Container for storing objects |
US7506250B2 (en) | 2002-09-03 | 2009-03-17 | Ricoh Company, Ltd. | Techniques for determining electronic document information for paper documents |
US7129840B2 (en) * | 2002-09-03 | 2006-10-31 | Ricoh Company, Ltd. | Document security system |
US7424974B2 (en) * | 2002-09-03 | 2008-09-16 | Ricoh Company, Ltd. | Techniques that facilitate tracking of physical locations of paper documents |
US7884955B2 (en) | 2002-09-03 | 2011-02-08 | Ricoh Company, Ltd. | Techniques for performing actions based upon physical locations of paper documents |
JP4349789B2 (en) * | 2002-11-06 | 2009-10-21 | 富士通株式会社 | Safety judgment device and safety judgment method |
JP2004185312A (en) * | 2002-12-03 | 2004-07-02 | Canon Inc | Document managing device |
JP4532871B2 (en) * | 2003-01-29 | 2010-08-25 | 株式会社日本総合研究所 | Office management system, office management method, and office management program |
US7320052B2 (en) | 2003-02-10 | 2008-01-15 | Intel Corporation | Methods and apparatus for providing seamless file system encryption and redundant array of independent disks from a pre-boot environment into a firmware interface aware operating system |
US20040229195A1 (en) * | 2003-03-18 | 2004-11-18 | Leapfrog Enterprises, Inc. | Scanning apparatus |
JP2005020346A (en) * | 2003-06-26 | 2005-01-20 | Konica Minolta Business Technologies Inc | Data encrypting device, data decrypting device, image data storage device, and image forming device |
US20050027731A1 (en) * | 2003-07-30 | 2005-02-03 | Daniel Revel | Compression dictionaries |
GB2404487A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital storage medium content |
US20050097003A1 (en) * | 2003-10-06 | 2005-05-05 | Linker Jon J. | Retrieving and formatting information |
US20050083413A1 (en) * | 2003-10-20 | 2005-04-21 | Logicalis | Method, system, apparatus, and machine-readable medium for use in connection with a server that uses images or audio for initiating remote function calls |
US20050142263A1 (en) * | 2003-12-30 | 2005-06-30 | Lauren Keilbach | Fish food flakes |
US7734729B2 (en) * | 2003-12-31 | 2010-06-08 | Amazon Technologies, Inc. | System and method for obtaining information relating to an item of commerce using a portable imaging device |
US8615487B2 (en) | 2004-01-23 | 2013-12-24 | Garrison Gomez | System and method to store and retrieve identifier associated information content |
US8442331B2 (en) | 2004-02-15 | 2013-05-14 | Google Inc. | Capturing text from rendered documents using supplemental information |
US7707039B2 (en) | 2004-02-15 | 2010-04-27 | Exbiblio B.V. | Automatic modification of web pages |
US7812860B2 (en) | 2004-04-01 | 2010-10-12 | Exbiblio B.V. | Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device |
US10635723B2 (en) | 2004-02-15 | 2020-04-28 | Google Llc | Search engines and systems with handheld document data capture devices |
US7774283B2 (en) * | 2004-02-23 | 2010-08-10 | Pitney Bowes Inc. | Method and system for using a camera cell phone in transactions |
US20050203854A1 (en) * | 2004-02-23 | 2005-09-15 | Pitney Bowes Incorporated | Method and system for using a camera cell phone in transactions |
US20110108622A1 (en) * | 2004-02-23 | 2011-05-12 | Pitney Bowes Inc. | Method and system for using a camera cell phone in transactions |
US20060033725A1 (en) * | 2004-06-03 | 2006-02-16 | Leapfrog Enterprises, Inc. | User created interactive interface |
US7853193B2 (en) | 2004-03-17 | 2010-12-14 | Leapfrog Enterprises, Inc. | Method and device for audibly instructing a user to interact with a function |
US20060066591A1 (en) * | 2004-03-17 | 2006-03-30 | James Marggraff | Method and system for implementing a user interface for a device through recognized text and bounded areas |
US7453447B2 (en) * | 2004-03-17 | 2008-11-18 | Leapfrog Enterprises, Inc. | Interactive apparatus with recording and playback capability usable with encoded writing medium |
US7831933B2 (en) | 2004-03-17 | 2010-11-09 | Leapfrog Enterprises, Inc. | Method and system for implementing a user interface for a device employing written graphical elements |
US7779355B1 (en) | 2004-03-30 | 2010-08-17 | Ricoh Company, Ltd. | Techniques for using paper documents as media templates |
US7894670B2 (en) | 2004-04-01 | 2011-02-22 | Exbiblio B.V. | Triggering actions in response to optically or acoustically capturing keywords from a rendered document |
US9008447B2 (en) | 2004-04-01 | 2015-04-14 | Google Inc. | Method and system for character recognition |
US7990556B2 (en) | 2004-12-03 | 2011-08-02 | Google Inc. | Association of a portable scanner with input/output and storage devices |
US20060081714A1 (en) | 2004-08-23 | 2006-04-20 | King Martin T | Portable scanning device |
US9116890B2 (en) | 2004-04-01 | 2015-08-25 | Google Inc. | Triggering actions in response to optically or acoustically capturing keywords from a rendered document |
US8146156B2 (en) | 2004-04-01 | 2012-03-27 | Google Inc. | Archive of text captures from rendered documents |
US8081849B2 (en) | 2004-12-03 | 2011-12-20 | Google Inc. | Portable scanning and memory device |
US20060098900A1 (en) | 2004-09-27 | 2006-05-11 | King Martin T | Secure data gathering from rendered documents |
US9143638B2 (en) | 2004-04-01 | 2015-09-22 | Google Inc. | Data capture from rendered documents using handheld device |
US8713418B2 (en) | 2004-04-12 | 2014-04-29 | Google Inc. | Adding value to a rendered document |
US8620083B2 (en) | 2004-12-03 | 2013-12-31 | Google Inc. | Method and system for character recognition |
US8489624B2 (en) | 2004-05-17 | 2013-07-16 | Google, Inc. | Processing techniques for text capture from a rendered document |
US8874504B2 (en) | 2004-12-03 | 2014-10-28 | Google Inc. | Processing techniques for visual capture data from a rendered document |
US8346620B2 (en) | 2004-07-19 | 2013-01-01 | Google Inc. | Automatic modification of web pages |
US7454086B2 (en) * | 2004-09-28 | 2008-11-18 | Ricoh Company, Ltd. | Techniques for positioning images in electronic documents |
US20060123041A1 (en) * | 2004-12-07 | 2006-06-08 | Nokia Corporation | Mode based action invocation through tag scanning |
US20060178916A1 (en) * | 2005-02-07 | 2006-08-10 | Dmitry Domnin | Method for automating task with portable device |
US7424112B2 (en) * | 2005-03-16 | 2008-09-09 | Microsoft Corporation | Ciphertext switching for syntax compliant encryption |
WO2006106539A1 (en) * | 2005-04-07 | 2006-10-12 | Arca Consulting S.R.L. | Process and system for transmitting, storing and managing electronic documents |
US7922099B1 (en) | 2005-07-29 | 2011-04-12 | Leapfrog Enterprises, Inc. | System and method for associating content with an image bearing surface |
US20070050468A1 (en) * | 2005-08-09 | 2007-03-01 | Comverse, Ltd. | Reality context menu (RCM) |
US8023746B2 (en) * | 2005-10-14 | 2011-09-20 | Disney Enterprises, Inc. | Systems and methods for decoding an image to determine a digital identifier |
US7801359B2 (en) * | 2005-10-14 | 2010-09-21 | Disney Enterprise, Inc. | Systems and methods for obtaining information associated with an image |
US7480422B2 (en) * | 2005-10-14 | 2009-01-20 | Disney Enterprises, Inc. | Systems and methods for information content delivery relating to an object |
US20100004980A1 (en) * | 2006-01-20 | 2010-01-07 | Berkley Bowen | Systems and methods for managing product and consumer information |
US8094870B2 (en) | 2006-01-27 | 2012-01-10 | Spyder Lynk, Llc | Encoding and decoding data in an image |
JP2007233924A (en) * | 2006-03-03 | 2007-09-13 | Sony Corp | Information processing system, information processor and information processing method, program and recording medium |
US20070233732A1 (en) * | 2006-04-04 | 2007-10-04 | Mozes Incorporated | Content request, storage and/or configuration systems and methods |
US20080004978A1 (en) * | 2006-06-30 | 2008-01-03 | Rothschild Trust Holdings, Llc | System and method for identifying digital media content and downloading the content or a portion thereof to a mobile device |
US8261967B1 (en) | 2006-07-19 | 2012-09-11 | Leapfrog Enterprises, Inc. | Techniques for interactively coupling electronic content with printed media |
US8171469B2 (en) | 2006-08-15 | 2012-05-01 | Hewlett-Packard Development Company, L.P. | Package compatibility |
EP2067119A2 (en) | 2006-09-08 | 2009-06-10 | Exbiblio B.V. | Optical scanners, such as hand-held optical scanners |
US8194914B1 (en) | 2006-10-19 | 2012-06-05 | Spyder Lynk, Llc | Encoding and decoding data into an image using identifiable marks and encoded elements |
US8171237B2 (en) | 2006-10-31 | 2012-05-01 | Yahoo! Inc. | Automatic association of reference data with primary process data based on time and shared identifier |
CN101202622A (en) * | 2006-12-15 | 2008-06-18 | 上海交通大学 | Method and device for reducing parameter transmit band width and method of cipher key exchange |
US20080142599A1 (en) * | 2006-12-18 | 2008-06-19 | Michael Benillouche | Methods and systems to meter point-of-purchase conduct with a wireless communication device equipped with a camera |
WO2008078390A1 (en) * | 2006-12-26 | 2008-07-03 | Fujitsu Limited | Data compression device and data restoring device |
US8127219B1 (en) * | 2007-01-22 | 2012-02-28 | Adobe Systems Incorporated | Printing and rendering hyperlink destinations |
US20080263366A1 (en) * | 2007-04-19 | 2008-10-23 | Microsoft Corporation | Self-verifying software to prevent reverse engineering and piracy |
US20080313720A1 (en) * | 2007-06-18 | 2008-12-18 | Adam Boalt | System, Device and Method for Conducting Secure Economic Transactions |
US8391148B1 (en) * | 2007-07-30 | 2013-03-05 | Rockstar Consortion USLP | Method and apparatus for Ethernet data compression |
US7885145B2 (en) * | 2007-10-26 | 2011-02-08 | Samsung Electronics Co. Ltd. | System and method for selection of an object of interest during physical browsing by finger pointing and snapping |
US8073198B2 (en) * | 2007-10-26 | 2011-12-06 | Samsung Electronics Co., Ltd. | System and method for selection of an object of interest during physical browsing by finger framing |
US20090169001A1 (en) * | 2007-12-28 | 2009-07-02 | Cisco Technology, Inc. | System and Method for Encryption and Secure Transmission of Compressed Media |
US8406531B2 (en) * | 2008-05-15 | 2013-03-26 | Yahoo! Inc. | Data access based on content of image recorded by a mobile device |
US9753948B2 (en) * | 2008-05-27 | 2017-09-05 | Match.Com, L.L.C. | Face search in personals |
US7953881B1 (en) * | 2008-06-12 | 2011-05-31 | Juniper Networks, Inc. | Network characteristic-based compression of network traffic |
US8098894B2 (en) * | 2008-06-20 | 2012-01-17 | Yahoo! Inc. | Mobile imaging device as navigator |
US8719912B2 (en) * | 2008-06-27 | 2014-05-06 | Microsoft Corporation | Enabling private data feed |
EP2164176A1 (en) * | 2008-09-12 | 2010-03-17 | Thomson Licensing | Method for lossless compressing prefix-suffix-codes, method for decompressing a bit sequence representing integers or symbols encoded in compressed prefix-suffix-codes and storage medium or signal carrying compressed prefix-suffix-codes |
WO2010096193A2 (en) | 2009-02-18 | 2010-08-26 | Exbiblio B.V. | Identifying a document by performing spectral analysis on the contents of the document |
US8447066B2 (en) | 2009-03-12 | 2013-05-21 | Google Inc. | Performing actions based on capturing information from rendered documents, such as documents under copyright |
EP2406767A4 (en) | 2009-03-12 | 2016-03-16 | Google Inc | Automatically providing content associated with captured information, such as information captured in real-time |
US9298722B2 (en) * | 2009-07-16 | 2016-03-29 | Novell, Inc. | Optimal sequential (de)compression of digital data |
US8453040B2 (en) | 2009-11-05 | 2013-05-28 | International Business Machines Corporation | Obscuring information in messages using compression with site-specific prebuilt dictionary |
US8539224B2 (en) * | 2009-11-05 | 2013-09-17 | International Business Machines Corporation | Obscuring form data through obfuscation |
US9081799B2 (en) | 2009-12-04 | 2015-07-14 | Google Inc. | Using gestalt information to identify locations in printed information |
US9323784B2 (en) | 2009-12-09 | 2016-04-26 | Google Inc. | Image search using text-based elements within the contents of images |
US9189669B2 (en) | 2010-06-24 | 2015-11-17 | Metrologic Instruments, Inc. | Distinctive notice for different symbology information |
US9589164B2 (en) | 2010-06-24 | 2017-03-07 | Metrologic Instruments, Inc. | Distinctive notice for different symbology information |
US8325019B2 (en) | 2010-09-13 | 2012-12-04 | Ricoh Company, Ltd. | Motion tracking techniques for RFID tags |
US8631089B1 (en) | 2010-12-14 | 2014-01-14 | Brilliance Publishing, Inc. | Previewing audio data associated with an item |
US9973899B1 (en) | 2011-03-01 | 2018-05-15 | Sozo Innovations, LLC | System for location based triggers for mobile devices |
US8555327B2 (en) | 2011-03-28 | 2013-10-08 | Google Inc. | Broadcasting links to enhanced content |
US20120278883A1 (en) * | 2011-04-28 | 2012-11-01 | Raytheon Company | Method and System for Protecting a Computing System |
US8469270B1 (en) | 2012-02-25 | 2013-06-25 | Reagan Inventions, Llc | Systems and methods for indicating the existence of accessible information pertaining to articles of commerce |
US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
US9626697B2 (en) | 2013-12-08 | 2017-04-18 | Marshall Feature Recognition Llc | Method and apparatus for accessing electronic data via a plurality of electronic tags |
US10057217B2 (en) * | 2014-07-15 | 2018-08-21 | Sap Se | System and method to secure sensitive content in a URI |
US9970862B2 (en) | 2014-07-16 | 2018-05-15 | International Business Machines Corporation | Reflective tag and polarized light sensor for transmitting information |
EP3207470A1 (en) * | 2014-10-14 | 2017-08-23 | Google, Inc. | Assistive browsing using context |
US10949507B2 (en) * | 2014-10-17 | 2021-03-16 | Vulpecula, Llc. | Methods, systems, and computer program products for web browsing |
US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US9817992B1 (en) * | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
US11108767B2 (en) * | 2016-04-21 | 2021-08-31 | Tharmalingam Satkunarajah | Apparatus and system for obtaining and encrypting documentary materials |
JP6780428B2 (en) * | 2016-10-06 | 2020-11-04 | 富士通株式会社 | Coding program, coding method, coding device, decoding program, decoding method and decoding device |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5355411A (en) * | 1990-08-14 | 1994-10-11 | Macdonald John L | Document security system |
US5369702A (en) * | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5426779A (en) * | 1991-09-13 | 1995-06-20 | Salient Software, Inc. | Method and apparatus for locating longest prior target string matching current string in buffer |
US5467087A (en) * | 1992-12-18 | 1995-11-14 | Apple Computer, Inc. | High speed lossless data compression system |
US5506697A (en) * | 1990-01-05 | 1996-04-09 | Symbol Technologies, Inc. | Apparatus for processing human-readable and machine-readable documents |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5247575A (en) * | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
CA2039652C (en) * | 1990-05-30 | 1996-12-24 | Frank Zdybel, Jr. | Hardcopy lossless data storage and communications for electronic document processing systems |
US5505494B1 (en) * | 1993-09-17 | 1998-09-29 | Bell Data Software Corp | System for producing a personal id card |
US5822436A (en) * | 1996-04-25 | 1998-10-13 | Digimarc Corporation | Photographic products and methods employing embedded information |
US6122403A (en) * | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
NZ329891A (en) * | 1994-01-13 | 2000-01-28 | Certco Llc | Method of upgrading firmware of trusted device using embedded key |
JP2842796B2 (en) * | 1994-12-06 | 1999-01-06 | 富士通株式会社 | Moving image encryption processing method and apparatus, and encrypted moving image decryption processing method and apparatus |
US5671282A (en) * | 1995-01-23 | 1997-09-23 | Ricoh Corporation | Method and apparatus for document verification and tracking |
DE69633809T2 (en) * | 1995-04-21 | 2005-03-17 | Xerox Corp. | Processing of machine-readable forms |
US5778102A (en) * | 1995-05-17 | 1998-07-07 | The Regents Of The University Of California, Office Of Technology Transfer | Compression embedding |
US5781901A (en) * | 1995-12-21 | 1998-07-14 | Intel Corporation | Transmitting electronic mail attachment over a network using a e-mail page |
US6012102A (en) * | 1996-04-02 | 2000-01-04 | Infogear Technology Corporation | System using machine-readable printed symbols created from encoded data resource specifiers to establish connection to data resource on data communications network |
US5915018A (en) * | 1996-11-05 | 1999-06-22 | Intel Corporation | Key management system for DVD copyright management |
-
1998
- 1998-05-09 WO PCT/US1998/009441 patent/WO1998051035A1/en active Application Filing
- 1998-05-09 EP EP98921065A patent/EP0983661A1/en not_active Withdrawn
- 1998-05-09 BR BR9809252-9A patent/BR9809252A/en not_active IP Right Cessation
- 1998-05-09 US US09/075,238 patent/US6434561B1/en not_active Expired - Fee Related
- 1998-05-09 JP JP54854098A patent/JP2001526857A/en not_active Abandoned
- 1998-05-09 CA CA002286707A patent/CA2286707C/en not_active Expired - Fee Related
- 1998-05-09 AU AU73750/98A patent/AU7375098A/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5506697A (en) * | 1990-01-05 | 1996-04-09 | Symbol Technologies, Inc. | Apparatus for processing human-readable and machine-readable documents |
US5355411A (en) * | 1990-08-14 | 1994-10-11 | Macdonald John L | Document security system |
US5426779A (en) * | 1991-09-13 | 1995-06-20 | Salient Software, Inc. | Method and apparatus for locating longest prior target string matching current string in buffer |
US5467087A (en) * | 1992-12-18 | 1995-11-14 | Apple Computer, Inc. | High speed lossless data compression system |
US5369702A (en) * | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6375078B1 (en) | 1990-09-11 | 2002-04-23 | Metrologic Instruments, Inc. | Universal transaction machine for carrying out information-related transactions using html-encoded documents embodying transaction-enabling java-applets automatically launched and executed in response to reading code symbols |
US7341191B2 (en) | 1990-09-11 | 2008-03-11 | Metrologic Instruments, Inc. | Internet-based system for enabling information-related transactions over the internet |
US6827273B2 (en) | 1993-11-24 | 2004-12-07 | Metrologic Instruments, Inc. | Mobile bar code driven information access terminal for remotely accessing package delivery instructions from an internet information server |
US6345764B1 (en) | 1993-11-24 | 2002-02-12 | Metrologic Instruments, Inc. | Hand-held WWW access device with GUI-based www browser program integrated with bar code symbol reader for automatically accessing and displaying HTML-encoded documents by reading bar code symbols |
US6942150B2 (en) | 1993-11-24 | 2005-09-13 | Metrologic Instruments, Inc. | Web-based mobile information access terminal |
US6622917B1 (en) | 1993-11-24 | 2003-09-23 | Metrologic Instruments, Inc. | System and method for composing sets of URL-encoded bar code symbols while using an internet browser program |
US6464139B1 (en) | 1993-11-24 | 2002-10-15 | Metrologic Instruments, Inc. | Wireless hand-supportable internet-enabled access terminal for enabling information-related transactions over the internet |
US6510997B1 (en) | 1993-11-24 | 2003-01-28 | Metrologic Instruments, Inc. | Hand-supportable bar code symbol reading device having an integrated world wide web (www) browser command generator for automatically generating www browser program commands to initiate the execution of hyper-text transmission protocol (http) requests |
US6321991B1 (en) | 1993-11-24 | 2001-11-27 | Metrologic Instruments, Inc. | Web-based television system and method for enabling a viewer to access and display HTML-encoded documents located on the World Wide Web (WWW) by reading bar code symbols printed in a WWW-site guide using a wireless bar-code driven remote control device |
US6505776B1 (en) | 1995-06-07 | 2003-01-14 | Metrologic Instruments, Inc. | System for storing, accessing and displaying html-encoded documents relating to an object being worked upon in a work environment by a human operator wearing a wireless http-enabled client system equipped with a code symbol reader programmed to read a url-encoded symbol on the object, access said html-encoded documents from http-enabled information servers connected to an information network, and display same for review while working said object |
US6961713B2 (en) | 1996-10-25 | 2005-11-01 | Ipf, Inc. | Internet-based method of and system for enabling communication of consumer product information between vendors and consumers in a stream of commerce, using vendor created and managed upn/tm/pd/url data links |
US6622919B1 (en) | 1996-11-25 | 2003-09-23 | Metrologic Instruments, Inc. | System and method for accessing internet-based information resources by scanning Java-Applet encoded bar code symbols |
US6386453B1 (en) | 1996-11-25 | 2002-05-14 | Metrologic Instruments, Inc. | System and method for carrying out information-related transactions |
US6321992B1 (en) | 1997-03-19 | 2001-11-27 | Metrologic Instruments, Inc. | Internet-based system and method for tracking objects bearing URL-encoded bar code symbols |
US6988662B2 (en) | 1997-06-04 | 2006-01-24 | Metrologic Instruments, Inc. | System and method for carrying out information-related transactions using web documents embodying transaction-enabling applets automatically launched and executed in response to reading url-encoded symbols pointing thereto |
US6959286B2 (en) | 1997-10-27 | 2005-10-25 | Ipf, Inc. | Method and system for searching a dynamically updated database of UPN/TM/PD and URL data links |
US7089199B2 (en) | 1997-10-27 | 2006-08-08 | Metrologic Instruments, Inc. | System for and method of managing and delivering manufacturer-specified consumer product information to consumers in the marketplace |
US7337968B2 (en) | 1997-11-24 | 2008-03-04 | Metrologic Instruments, Inc. | System for storing, accessing and displaying HTML-encoded documents relating to an object being worked upon in a work environment by a human operator |
US6400272B1 (en) | 1999-04-01 | 2002-06-04 | Presto Technologies, Inc. | Wireless transceiver for communicating with tags |
EP1107504A3 (en) * | 1999-12-02 | 2003-10-29 | International Business Machines Corporation | Method of updating encryption keys in a data communication system |
EP1107504A2 (en) * | 1999-12-02 | 2001-06-13 | International Business Machines Corporation | Method of updating encryption keys in a data communication system |
EP1451708A2 (en) * | 2001-12-10 | 2004-09-01 | Virtual Locality Ltd. | Apparatus and method for optimized and secured reflection of network services to remote locations |
EP1451708A4 (en) * | 2001-12-10 | 2006-10-11 | Sap Portals Israel Ltd | Apparatus and method for optimized and secured reflection of network services to remote locations |
WO2003050641A2 (en) | 2001-12-10 | 2003-06-19 | Virtual Locality Ltd. | Apparatus and method for optimized and secured reflection of network services to remote locations |
EP2275947A1 (en) * | 2001-12-10 | 2011-01-19 | SAP Portals Israel Ltd. | Apparatus and method for optimized and secured reflection of network services to remote locations |
EP2284721A1 (en) * | 2001-12-10 | 2011-02-16 | SAP Portals Israel Ltd. | Apparatus and method for optimized and secured reflection of network services to remote locations |
GB2480262A (en) * | 2010-05-10 | 2011-11-16 | Etsem Ltd | An algorithm for cyclic compression and decompression of a data sequence |
GB2480261A (en) * | 2010-05-10 | 2011-11-16 | Etsem Ltd | An algorithm for cyclic compression and decompression of a data sequence |
Also Published As
Publication number | Publication date |
---|---|
JP2001526857A (en) | 2001-12-18 |
BR9809252A (en) | 2000-06-27 |
AU7375098A (en) | 1998-11-27 |
CA2286707C (en) | 2006-06-06 |
US6434561B1 (en) | 2002-08-13 |
EP0983661A1 (en) | 2000-03-08 |
CA2286707A1 (en) | 1998-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6434561B1 (en) | Method and system for accessing electronic resources via machine-readable data on intelligent documents | |
US11546756B2 (en) | System and method for dynamic multifactor authentication | |
EP2220840B1 (en) | Method of authentication of users in data processing systems | |
US6769061B1 (en) | Invisible encoding of meta-information | |
US7020773B1 (en) | Strong mutual authentication of devices | |
US7069440B2 (en) | Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system | |
US8689287B2 (en) | Federated credentialing system and method | |
US8626666B2 (en) | Confirming physical custody of objects | |
US7100048B1 (en) | Encrypted internet and intranet communication device | |
CN1937492A (en) | Information processing device and controlling method thereof | |
IL137099A (en) | Method for carrying out secure digital signature and a system therefor | |
KR20030056285A (en) | Apparatus and method for detecting illegitimate change of web resources | |
CN102685110A (en) | Universal method and system for user registration authentication based on fingerprint characteristics | |
WO2007071140A1 (en) | A method for transmitting data securely | |
US20030076961A1 (en) | Method for issuing a certificate using biometric information in public key infrastructure-based authentication system | |
US6904524B1 (en) | Method and apparatus for providing human readable signature with digital signature | |
Naser et al. | QR code based two-factor authentication to verify paper-based documents | |
JP4698261B2 (en) | Cryptographic communication system and method, and program | |
KR100409270B1 (en) | An authentication service method using code image physically represented and apparatus thereof | |
JP3885882B2 (en) | Image forming apparatus and image forming system | |
MXPA99010112A (en) | Method and system for accessing electronic resources via machine-readable data on intelligent documents | |
KR20010000316A (en) | Fingerprint authentication process and the system therefor | |
KR20000059249A (en) | mail system for document security using a nonstandard 2-dimensional barcode | |
JP2002351841A (en) | Password generation and storing method, and authentication method | |
JP4902691B2 (en) | Password information concealment system, program, and method for application form |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref document number: 2286707 Country of ref document: CA Ref country code: CA Ref document number: 2286707 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/1999/010112 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 1998 548540 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998921065 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1998921065 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |