Paper-based document logging
First Claim
Patent Images
1. A method comprising:
- sequentially examining identified locations of a document in a prioritized ordering of a list that contains a plurality of document locations that are statistically more likely to contain a machine readable code than document locations that are not in the list, wherein each identified location in the prioritized ordering of the list corresponds to a particular region on a page of the document, and wherein the prioritized ordering of identified locations to be examined is prioritized based on a determined layout of content within the document;
scanning bits of the document;
generating, with a processor, a cryptographic hash from the scanned bits of the document, the cryptographic hash identifying the document for document logging;
converting the cryptographic hash into the machine readable code;
rewriting the document with the code contained in a region of the document corresponding to a first identified location in the prioritized ordering of the list of identified locations where the region is empty; and
using the cryptographic hash as an identifier to a document log with one or more sets of metadata entries associated with the document, wherein each of the one or more sets of metadata entries are sets of related user generated comments that are associated with the document.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus are disclosed herein for paper-based document logging. In one embodiment, the method comprises scanning bits of a document, generating a cryptographic hash, converting the cryptographic hash into a machine readable code, and rewriting the document with the code contained thereon.
134 Citations
19 Claims
-
1. A method comprising:
-
sequentially examining identified locations of a document in a prioritized ordering of a list that contains a plurality of document locations that are statistically more likely to contain a machine readable code than document locations that are not in the list, wherein each identified location in the prioritized ordering of the list corresponds to a particular region on a page of the document, and wherein the prioritized ordering of identified locations to be examined is prioritized based on a determined layout of content within the document; scanning bits of the document; generating, with a processor, a cryptographic hash from the scanned bits of the document, the cryptographic hash identifying the document for document logging; converting the cryptographic hash into the machine readable code; rewriting the document with the code contained in a region of the document corresponding to a first identified location in the prioritized ordering of the list of identified locations where the region is empty; and using the cryptographic hash as an identifier to a document log with one or more sets of metadata entries associated with the document, wherein each of the one or more sets of metadata entries are sets of related user generated comments that are associated with the document. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage medium with instructions stored thereon which, when executed by a system, cause the system to perform a method comprising:
-
sequentially examining identified locations of a document in a prioritized ordering of a list that contains a plurality of document locations that are statistically more likely to contain a machine readable code than document locations that are not in the list, wherein each identified location in the prioritized ordering of the list corresponds to a region on a page of the document, and wherein the prioritized ordering of identified locations to be examined is prioritized based on a determined layout of content within the document; scanning bits of a document; generating a cryptographic hash from the scanned bits of the document, the cryptographic hash identifying the document; converting the cryptographic hash into a the machine readable code; rewriting the document with the code contained in a region of the document corresponding to a first identified location in the prioritized ordering of the list of identified locations where the region is empty; and using the cryptographic hash as an identifier to a document log with one or more sets of metadata entries associated with the document, wherein each of the one or more sets of metadata entries are sets of related user generated comments that are associated with the document. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method comprising:
-
sequentially examining identified locations of a document in a prioritized ordering of a list that contains a plurality of document locations that are statistically more likely to contain a machine readable code than document locations that are not in the list, wherein each identified location in the prioritized ordering of the list corresponds to a particular region on a page of the document, and wherein the prioritized ordering of identified locations to be examined is prioritized based on a determined layout of content within the document; generating, with a processor, a machine readable code whose contents are associated with document content when the code is not found in a location specified in the list, wherein the machine readable code encodes a cryptographic hash that is computed from the contents of the document and identifies the document; creating a paper version of the document with the machine readable code contained in a region of the paper version of the document corresponding to a first identified location in the prioritized ordering of the list of identified locations where the region is empty; and using the cryptographic hash as an identifier to a document log with one or more sets of metadata entries associated with the document, wherein each of the one or more sets of metadata entries are sets of related user generated comments that are associated with the document.
-
-
13. A method comprising:
-
scanning bits of a document; detecting, with a processor, a machine readable code in scanned bits of the document, wherein the machine readable code is a code that has been added to a region of the document corresponding to a first identified location in a prioritized ordering of a list of identified locations where the region is empty, and wherein the machine readable code encodes a cryptographic hash that is computed from contents of the document and identifies the document for document logging, and the machine readable code is detected by sequential examination of identified locations of the document in the prioritized ordering of the list that contains a plurality of document locations that are statistically more likely to contain the machine readable code than document locations that are not in the list, wherein each identified location in the prioritized ordering of the list corresponds to a particular region on a page of the document, and wherein the prioritized ordering of identified locations examined is prioritized based on a determined layout of content within the document; gaining access to a document log using contents of the machine readable code as an identifier, wherein the contents of the machine readable code include a cryptographic hash computed from the scanned bits of the document, and wherein the document log includes one or more sets of metadata entries associated with the document, wherein each of the one or more sets of metadata entries are sets of related user generated comments that are associated with the document. - View Dependent Claims (14, 15)
-
-
16. A non-transitory computer-readable storage medium with instructions stored thereon which, when executed by a system, cause the system to perform a method comprising:
-
sequentially examining identified locations of a document in a prioritized ordering of a list that contains a plurality of document locations that are statistically more likely to contain a machine readable code than document locations that are not in the list, wherein each identified location in the prioritized ordering of the list corresponds to a particular region on a page of the document, and wherein the prioritized ordering of identified locations to be examined is prioritized based on a determined layout of content within the document; scanning bits of the document; detecting the machine readable code in scanned bits of the document, wherein the machine readable code is a code that has been added to a region of the document corresponding to a first identified location in the prioritized ordering of the list of identified locations where the region is empty, and wherein the machine readable code encodes a cryptographic hash that is computed from contents of the document and identifies the document for document logging; and gaining access to a document log using contents of the machine readable code as an identifier to the document log, wherein the document log includes one or more sets of metadata entries associated with the document, wherein each of the one or more sets of metadata entries are sets of related user generated comments that are associated with the document. - View Dependent Claims (17, 18)
-
-
19. A method comprising:
-
sequentially examining, with a processor, identified locations of a document in a prioritized ordering of a list that contains a plurality of document locations that are statistically more likely to contain a machine readable code than document locations that are not in the list, wherein each identified location in the prioritized ordering of the list corresponds to a particular region on a page of the document, and wherein the prioritized ordering of identified locations to be examined is prioritized based on a determined layout of content within the document; scanning bits of the document if the machine readable code is not found at the one or more locations; comparing the document image corresponding to scanned bits of the document against stored document images in a memory; and obtaining a cryptographic hash associated with a stored document image that matches the document image corresponding to the scanned bits if a match is found, the cryptographic hash that is computed from contents of the stored document and identifies the document for document logging, wherein the cryptographic hash is an identifier to a document log for the stored document image, and wherein the document log includes one or more sets of metadata entries associated with the stored document, wherein each of the one or more sets of metadata entries are sets of related user generated comments that are associated with the document; computing a cryptographic hash of the document image corresponding to the scanned bits if a match is not found in the memory; and storing the document image corresponding to the scanned bits and the cryptographic hash in the memory, wherein the cryptographic hash is added to a region of the document image corresponding to a first identified location in the prioritized ordering of the list of identified locations where the region is empty.
-
Specification