Method and system for accessing electronic resources via machine-readable data on intelligent documents
First Claim
1. A method of accessing electronic resources via machine readable data on a document, comprising the steps of:
- compressing input data with a transmitting means adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by said compressed input data while retaining substantially all information content of input data; and
appending a compression flag to said compressed input data indicative of said compression method thereby enabling a receiving means to decompress said compressed input data, wherein said step of compressing input data further comprises utilizing a compression dictionary adapted to map said elements and strings of said input data to minimized representations of said elements and strings comprising redundant elements and strings deleted.
8 Assignments
0 Petitions
Accused Products
Abstract
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user.
489 Citations
31 Claims
-
1. A method of accessing electronic resources via machine readable data on a document, comprising the steps of:
-
compressing input data with a transmitting means adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by said compressed input data while retaining substantially all information content of input data; and
appending a compression flag to said compressed input data indicative of said compression method thereby enabling a receiving means to decompress said compressed input data, wherein said step of compressing input data further comprises utilizing a compression dictionary adapted to map said elements and strings of said input data to minimized representations of said elements and strings comprising redundant elements and strings deleted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
appending a compression dictionary to said compressed input data; and
transferring said compression dictionary with said compressed input data under circumstances where a second bandwidth occupied by said appended compression dictionary is less than said first bandwidth saved by said step of compressing said input data.
-
-
3. The method of claim 2, wherein said compression dictionary is appended as cleartext.
-
4. The method of claim 2, wherein said compression dictionary is appended as cyphertext.
-
5. The method of claim 1, wherein said step of utilizing a compression dictionary further comprises selecting said compression dictionary by said receiving means and said transmitting means whereby said receiving means selects said compression dictionary independently from said transmitting means.
-
6. The method of claim 3, wherein said selection of said compression dictionary is dependent upon a classification of said input data according to applications associated with said input data.
-
7. The method of claim 1, wherein said step of utilizing a compression dictionary further comprises selecting a compression dictionary by said transmitting means and said receiving means according to applications associated with said input data from application restricted subsets of compression dictionaries.
-
8. The method of claim 1, wherein said step of utilizing a compression dictionary further comprises customizing said compression dictionary according to said input data content.
-
9. The method of claim 6, further comprising appending said customized compression dictionary to said compressed input data;
- and transferring said compression dictionary with said compressed input data.
-
10. The method of claim 6, further comprising transferring said customized compression dictionary separately from said compressed input data through out-band resources.
-
11. The method of claim 8, further comprising accessing said customized compression dictionary using an index conveyed with said compression flag.
-
12. The method of claim 8, further comprising accessing said customized compression dictionary using a pointer, registration of said pointer being directed by an application associated with said input data.
-
13. The method of claim 1, wherein said customized compression dictionary is adapted to encrypt said input data with a secure cypher.
-
14. The method of claim 1, wherein said compression dictionary is universally accessible to both said receiving means and said transmitting means.
-
15. The method of claim 1, wherein said compression dictionary is fetched from on-line resources.
-
16. The method of claim 1, wherein said compression dictionary is cached in resources local to both said receiving means and said transmitting means.
-
17. A method of accessing electronic resources via machine readable data on a document, comprising the steps of:
-
compressing input data with a transmitting means adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by said compressed input data while retaining substantially all information content of input data; and
appending a compression flag to said compressed input data indicative of said compression method thereby enabling a receiving means to decompress said compressed input data, wherein said step of compressing said input data further comprises token frequency compression of said elements and strings, whereby frequency of repetitive elements and strings is enumerated rather than copying said repetitive elements and strings in order to represent repetition.
-
-
18. A method of accessing electronic resources via machine readable data on a document, comprising the steps of:
-
compressing input data with a transmitting means adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by said compressed input data while retaining substantially all information content of input data; and
appending a compression flag to said compressed input data indicative of said compression method thereby enabling a receiving means to decompress said compressed input data, further comprising the steps of;
encrypting said input data using an encryption method; and
appending an encryption flag indicative of said encryption method whereby said encrypted data may subsequently be decrypted, wherein said step of encrypting said input data further comprises a public-key cryptosystem, wherein said access authentication technique utilizes passwords to verify that said document was created by a licensed source, wherein said access authentication technique utilizes one-time passwords. - View Dependent Claims (26)
-
-
19. A method of creating a document capable of accessing electronic resources, comprising the steps of:
-
encoding a static file in a machine readable code;
encoding in the machine readable code a reference to an electronic resource in a computer network, wherein the electronic resource is capable of being modified without modification of the reference encoded in the code; and
embedding said machine readable code in a machine readable symbol on a document, further comprising the steps of;
compressing said input data using a compression method adapted to minimize utilization of bandwidth by said compressed input data while retaining substantially all information content of input data so as to save a first bandwidth; and
appending a compression flag to said compressed input data indicative of said compression method thereby enabling a receiving means to decompress said compressed input data. - View Dependent Claims (20, 21, 22, 23, 24, 25)
utilizing a compression dictionary adapted to map elements and strings of said input data to minimized representations of said elements and strings whereby redundant elements and strings are deleted;
appending the compression dictionary to said compressed input data; and
transferring said compression dictionary with said compressed input data under circumstances where a second bandwidth occupied by said appended compression dictionary is less than said first bandwidth saved by said step of compressing said input data.
-
-
21. The method of claim 20, further comprising the step of selecting said compression dictionary based upon a classification of said input data according to applications associated with said input data.
-
22. The method of claim 20, wherein said step of utilizing a compression dictionary further comprises selecting a compression dictionary according to applications associated with said input data from application restricted subsets of compression dictionaries.
-
23. The method of claim 20, wherein said step of utilizing a compression dictionary further comprises customizing said compression dictionary according to said input data content.
-
24. The method of claim 20, further comprising transferring said compression dictionary separately from said compressed input data through out-band resources.
-
25. The method of claim 20, wherein said compression dictionary is universally accessible to both said receiving means and said transmitting means.
-
27. A method of creating a document capable of accessing electronic resources, comprising the steps of:
-
encoding a static file in a machine readable code;
encoding in the machine readable code a reference to an electronic resource in a computer network, wherein the electronic resource is capable of being modified without modification of the reference encoded in the code; and
embedding said machine readable code in a machine readable symbol on a document, further comprising the steps of;
encrypting said input data using an encryption method;
appending an encryption flag indicative of said encryption method whereby said encrypted data may subsequently be decrypted; and
authenticating access to on-line resources via an access authentication technique adapted to ensure that said document was created by a licensed user, wherein said step of encrypting said input data further comprises a public-key cryptosystem, wherein said access authentication technique utilizes passwords to verify that said document was created by a licensed source, and wherein said access authentication technique utilizes one-time passwords.
-
-
28. A method of accessing electronic resources from a machine readable document, said method comprising the steps of:
-
scanning a machine readable code from a machine readable symbol on said machine readable document;
decoding a static file from said machine readable code;
decoding a reference to an electronic resource in a computer network from the machine readable code, wherein the electronic resource is capable of being modified without modification of the reference encoded in the code;
using the reference to an electronic resource to access an online electronic resource; and
combining data obtained from said online electronic resource with the file decoded from said machine readable code, further comprising the steps of;
reading a compression flag included with said input data, said compression flag indicative of a compression method used to save a first bandwidth by minimizing utilization of bandwidth by said compressed input data while retaining substantially all information content of input data;
decompressing said input data according to a decompression method selected to match said compression method; and
utilizing a compression dictionary adapted to map elements and strings of said input data from minimized representations of said elements and strings whereby redundant elements and strings are deleted.
-
-
29. A method of accessing electronic resources from a machine readable document, said method comprising the steps of:
-
scanning a machine readable code from a machine readable symbol on said machine readable document;
decoding a static file from said machine readable code;
decoding a reference to an electronic resource in a computer network from the machine readable code, wherein the electronic resource is capable of being modified without modification of the reference encoded in the code;
using the reference to an electronic resource to access an online electronic resource; and
combining data obtained from said online electronic resource with the file decoded from said machine readable code, further comprising the steps of;
reading an encryption flag appended to said input data, said encryption flag indicative of an encryption method used to encrypt said input data;
decrypting said input data according to a method selected to reverse said encryption;
authenticating access to on-line resources via an access authentication technique adapted to ensure that said document was created by a licensed user, wherein said step of encrypting said input data further comprises a public-key cryptosystem, wherein said access authentication technique utilizes passwords to verify that said document was created by a licensed source, and wherein said access authentication technique utilizes one-time passwords.
-
-
30. A method of accessing electronic resources from an intelligent document, comprising the steps of:
-
encoding a static file in a machine readable code;
encoding a reference to an electronic resource in a computer network in the machine readable code, wherein the electronic resource is capable of being modified without modification of the reference encoded in the code;
embedding said machine readable code in a machine readable symbol on a document;
scanning said machine readable code from said machine readable symbol on said machine readable document;
decoding the static file from the machine readable code;
decoding the electronic resource reference from the machine readable code;
using the electronic resource reference to access an online electronic resource; and
combining data obtained from said online electronic resource with the static file decoded from said machine readable code, further comprising the steps of;
compressing said input data using a compression method adapted to minimize utilization of bandwidth by said compressed input data while retaining substantially all information content of input data so as to save a first bandwidth;
appending a compression flag to said compressed input data indicative of said compression method thereby enabling a receiving means to decompress said compressed input data;
reading a compression flag included with said input data, said compression flag indicative of a compression method used to save a first bandwidth by minimizing utilization of bandwidth by said compressed input data while retaining substantially all information content of input data;
decompressing said input data according to a decompression method selected to match said compression method; and
utilizing a compression dictionary adapted to map elements and strings of said input data from minimized representations of said elements and strings whereby redundant elements and strings are deleted.
-
-
31. A method of accessing electronic resources from an intelligent document, comprising the steps of:
-
encoding a static file in a machine readable code;
encoding a reference to an electronic resource in a computer network in the machine readable code, wherein the electronic resource is capable of being modified without modification of the reference encoded in the code;
embedding said machine readable code in a machine readable symbol on a document;
scanning said machine readable code from said machine readable symbol on said machine readable document;
decoding the static file from the machine readable code;
decoding the electronic resource reference from the machine readable code;
using the electronic resource reference to access an online electronic resource; and
combining data obtained from said online electronic resource with the static file decoded from said machine readable code, further comprising the steps of;
encrypting said input data using an encryption method;
appending an encryption flag indicative of said encryption method whereby said encrypted data may subsequently be decrypted;
authenticating access to on-line resources via an access authentication technique adapted to ensure that said document was created by a licensed user;
reading an encryption flag appended to said input data, said encryption flag indicative of an encryption method used to encrypt said input data;
decrypting said input data according to a method selected to reverse said encryption; and
authenticating access to on-line resources via an access authentication technique adapted to ensure that said document was created by a licensed user, wherein said steps of encrypting and decrypting said input data further comprise a public-key cryptosystem, wherein said access authentication technique utilizes passwords to verify that said document was created by a licensed source, and
-
Specification