WO2001001275A1 - Browsing method for focusing research - Google Patents
Browsing method for focusing research Download PDFInfo
- Publication number
- WO2001001275A1 WO2001001275A1 PCT/US2000/017409 US0017409W WO0101275A1 WO 2001001275 A1 WO2001001275 A1 WO 2001001275A1 US 0017409 W US0017409 W US 0017409W WO 0101275 A1 WO0101275 A1 WO 0101275A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- project
- research
- url
- project name
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/954—Navigation, e.g. using categorised browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9562—Bookmark management
Definitions
- This invention relates to a method and system of viewing resources on a network and, more particularly, to a browsing method and system for inputting navigational instructions in a multi-server computer environment such as the "Internet”.
- HTTP Hypertext Transfer Protocol
- HTML Hypertext Markup Language
- HTML is the standard page description language used with HTTP and provides basts document formatting. HTML allows a web page developer to specify these hypertext links to other servers and to other files.
- a user using an HTML-compliant browser may specify a link via a Uniform Resource Locator ("URL").
- URL Uniform Resource Locator
- TCP/IP transmission control protocol/Interface protocol
- XML is a substitute for HTML.
- PROWLER Information available at http://www.webkeys.com/aboutwk.htm
- PROWLER Access to certain catego ⁇ es of websites (i.e., "All age”, “Under 14, “Teenagers”, “Adult content”, and “Explicit violence/sexual content”) is granted or denied based on privileges that are determined by a system administrator. Further, a navigation history, associated with the user, is saved for administrative censoring purposes.
- web resources such as "WESTLAW” and "LEXIS-NEXIS” provide Internet portals or web pages that require login by ID and password (i.e., subscriber sites) in order to gain access.
- ID and password i.e., subscriber sites
- a client matter number may be input, which, optionally, is checked against a database of the user's client matter numbers, to confirm accuracy.
- the user may leave these subscriber sites and do other task/research on the Internet that is not attributed to the client matter number.
- a method and system which provides a graphical interface with which a user may interact which hinders random movement of a download request on the Internet from one server to another server, measures user performance, and helps ensure directed movement of a download request, relevant to a given project goal, thus better allocating human resources, minimizing online time and facilitating and promoting concentrated research directed to one particular project at a time.
- a browsing method is needed which minimizes the number of unnecessary or irrelevant research sessions, these sessions often representing unproductive diversions from project or business objectives and which permits secure posting of information on publicly accessible servers on the Internet or on an intranet.
- a browsing method and system are provided which solve the problems identified above by enabling concentrated web browsing through encouraging or directing the user's concentration to one project at a time.
- the browsing method is encoded on a computer readable and executable medium on a computer, such as a PC, a diskette, a server on the Internet, or the Internet itself.
- the software uses a custom Graphical User Interface ("GUI") having input fields that demand certain user responses and which enable and encourage the user to postpone executing a potentially unrelated line of research until such time as the project at hand is terminated.
- GUI Graphical User Interface
- a user may be able to take advantage of interesting targeted banner promotions or follow potentially interesting hypertext links at a time convenient to the project at hand and attributable to the project for which the potentially interesting research may yield a benefit.
- an object of the invention is to dramatically improve the management and efficiency of web browsing as a tool to reach predetermined business goals. This is accomplished by attributing online time to a project name, focusing research on the project at hand, allowing the time-shifting of less directed research sessions and quantifying and allocating wasteful online time to the responsible parties.
- the method and system provide a convenient means to post and access information on publicly accessible servers on the Internet (or an intranet) in a secure manner
- FIG. 1 is a block diagram of a system of the invention.
- FIG. 2 is a block diagram of an alternate system of the invention.
- FIG. 3 is a block diagram of a client/server architecture of the present invention.
- FIG. 4 is a detailed diagram of a client server architecture of the present invention.
- FIG. 5 is a relational UML class diagram of the method.
- FIG. 6 is a flow chart of the method of the invention.
- FIG. 7 is a plan view of a login window used in the invention.
- FIG. 8 is an authorization table used in the invention.
- FIG. 9 is a log-off window of the invention.
- FIG. 10 is a table showing the URL listings associated with the project names of the invention.
- FIG. 11 is a table of Temporary Bookmark Listings of the invention.
- FIG. 12 is a flow chart of an off-line URL organization step of the invention.
- FIG. 13 is a Graphical User Interface ("GUI”) of the invention
- FIG. 14A is a flow chart of a submethod of the invention which executes upon activation of a link.
- FIG. 14B is a flow chart of an alternate submethod to that shown in FIG. 14A.
- FIG. 15 is a secondary window of the invention.
- FIG. 16 is a UML class diagram of a system administration module of the invention
- FIG. 17 is a flow diagram of a submethod of the invention.
- FIG. 18 is a flow diagram of a logout submethod of the invention.
- FIG. 19 is a diagram of the layout of a GUI of the invention which enables a user to sequentially follow a navigation history created by another.
- FIG. 20 is a flowchart of a submethod of the invention for activating forward and back icons which navigate sequentially between content saved under a project name.
- FIG. 21 is a flowchart of a submethod of the invention operating on a server that scans and updates the bookmarks and other content on a browser when the server is accessed.
- FIG. 1 is a block diagram of a typical system 20 for practicing the va ⁇ ous embodiments of the present invention
- the client browsing method 60 of the present invention is encoded on a computer-readable medium and manages access by users using a computer system 20 to a network of servers 54 and 54'(shown in FIG. 2) such as the Internet.
- a computer system 20 typically includes a computer 22, a display device 24, an input device 26 such as a keyboard, a primary storage device 30, a secondary storage device 32 and a plurality of resources 23.
- Each resource 23 is operatively coupled to at least one of the computers 22.
- Resources 23 include, but are not limited to, printers, databases, special-purpose servers, secu ⁇ ty devices, modems, etc.
- the display device 24 displays a graphical user interface ("GUI") 34 for facilitating the display of text and graphics for the user.
- GUI graphical user interface
- Display devices 24 include p ⁇ nters and computer display screens such as a CRT, LED displays, and LCDs.
- Input devices 26 are numerous and include keyboards and pointing devices such as a mouse 27 having a left mouse button 28 and a right mouse button 29, a trackball, hghtpens, thumbwheels, digitizing tablets, microphones using voice recognition software, and touch screens and pads.
- the computer 22 includes a CPU 36 as well as other components with which all who are skilled in the art are familiar. For a detailed discussion of these components and their interaction, see U.S Pat. No. 5,787,254, the content of which is incorporated by reference.
- the secondary storage 32 supports the browsing method 60, preferably HTTP-compliant, as well as a number of Internet access tools
- the secondary storage 32 may also support other Internet services including mail transfer protocol (SMTP), e- mail, file transfer protocol (“FTP”), network transfer protocol (“NNTP”) or "usenet” and remote terminal access (Telnet)
- the CPU 36 fetches computer instructions from primary storage 30 through an interface 40 such as an input output subsystem connected to a bus 42.
- the computer 22 can be, but is not limited to , an "IBM APTIVA” computer, a product of International Business Machines Corporation of Armonk, New York, or any computer compatible with the IBM PC computer systems based on the X86 or Pent ⁇ um(TM) series processor of Intel Corporation or compatible processors, or any of the "SPARC" station or "ULTRA” workstation computer systems available from Sun Microsystems, Inc. of Mountain View, California, any "MACINTOSH” computer systems based on a "POWERPC” processor and available from Apple Computer, Inc. of Cupertino, California.
- the CPU 36 utilizes an operating system which, depending on the hardware used, may be DOS, "WINDOWS 3.X”, “WINDOWS 95", “NT”, “OS/2”, “AIX”, “LINUX”, or any other suitable operating system.
- the CPU 36 executes these fetched computer instructions. Executing these instructions enables the CPU 36 to retrieve data or write data to the primary storage 30, display information on one or more display devices 24, receive command signals from one or more input devices 26, or transfer data to secondary storage 32 or even other computer systems which collectively form a computer network 25 (shown in FIG. 2).
- primary storage 30 and secondary storage 32 can include any type of computer storage including RAM, ROM, application specific integrated circuits ("ASIC") and storage devices which include magnetic and optical storage media such as a CD-ROM.
- the primary storage 30 stores a number of items including the method 60 and a runtime environment 46.
- the runtime environment 46 typically is an operating system which manages computer resources, such as memory, disk or processor time, required for the method of the invention to run.
- the runtime environment 46 may also be a message passing system, a microkernel, dynamic loadable linkable module(s), or any other system which manages computer resources
- the system 21 includes client computers 22 arranged in a network 25 and a firewall 27 which interfaces with an online service provider 28 such as CompuServe, America Online, a subsc ⁇ ption resource (such as "WESTLAW”) and/or an Internet access provider 29.
- the online service provider 28 and Internet access provider 29 connect to a network 31 of servers 54 which comprise a portion of the Internet.
- FIG. 3 illustrates a block diagram of a client/server architecture which can be utilized in accordance with the method 60 of the present invention.
- User requests 50 for information are sent by a client application program 52 to a server 54.
- the server 54 can be a remote computer system accessible over the Internet or other communications medium.
- Client application program 52 may be utilized with computer 22 of FIG. 1.
- Server 54 performs scanning and searching of raw (e.g., unprocessed) information sources (e.g., newswire feeds or newsgroups) and, based upon these user requests, presents the filtered electronic information as server responses 56 to the client process.
- raw information sources e.g., newswire feeds or newsgroups
- FIG 4 illustrates a detailed block diagram of a client/server architecture which can be utilized in accordance with the method 60 of the present invention.
- client 52 and server 54 are processes which are operative within two computer systems, these processes being generated from a high-level programming language (e.g. PERL), which is interpreted and executed in a computer system 20 at runtime (e.g., a workstation), it can be appreciated by one skilled in the art that they may be implemented in a variety of hardware devices, either programmed or dedicated.
- Client 52 and server 54 communicate using the functionality provided by an HTTP connection 72.
- the World Wide Web includes all the servers adhering to this standard which are accessible to clients via Uniform Resource Locators ("URLs").
- URLs Uniform Resource Locators
- Active within the client 52 is the browser method 60 of the present invention, which establishes the connections with the server 54 and presents information to the user.
- Server 54 executes the corresponding server software which presents information to the client in the form of HTTP server responses 62.
- the HTTP responses 62 correspond with web pages represented using HTML or other data which is generated by the server.
- a web page contains data and a layout language which describes how data should be displayed.
- the layout language used within each web page is predominantly HTML, but may also include "JAVA”, "JAVASCRIPT", VRML, or any other language which supports hypertext functionality 64.
- the user views a web page (e.g., 152 of FIG. 13) from the World Wide Web using the browsing method 60 of the present invention.
- the browsing method 60 accepts the data and the layout language and in response, produces a graphical image containing hypertext links along with text, graphics, and various other types of multimedia.
- the tools needed to implement the browsing method 60 are known in the p ⁇ or art (e.g., see background section).
- a Common Gateway Interface (“CGI") 66 is provided which allows the client program to direct server 54 to commence execution of a specified program contained within server 54. This may include a search engine which scans received information in the server for presentation to the user controlling the client. Using this interface and the HTTP responses 62, the server 54 may notify the client 52 of the results of that execution upon completion of the program steps.
- CGI Common Gateway Interface
- HTTP is a stateless protocol
- every user request 50 for information from the server 54 is treated independently, with the server having no memory of previous connections. This statelessness results in the rapid and efficient transmission of hypertext documents (e.g., the web page 152 of FIG. 13).
- connection 72 There are four states to a HTTP connection 72.
- the connection 72 is opened. This means that contact is made between the client computer 52 and server 54 at the Internet address and port number specified by the URL.
- the client 52 sends a message to the server 54, requesting service.
- This user request 50 is made up of HTTP request headers that define the "method" requested for the transaction and provide information about the capabilities of the client 52, followed by the sending of the data to the server 54.
- Typical HTTP methods are GET, for getting an object from a server 54, or POST, for posting data to an object on the server.
- the server 54 sends a response to the client 52. This consists of response headers describing the state of the transaction, followed by the actual data.
- the connection 72 is closed.
- the relational database 53 is a client-server type 53b
- the advantage of use of a client-server database 53b and access system is that processing on the database server 54'does not affect processing on the client 52.
- Either type of database 53a or 53b may be defined and managed by "PARADOX" software, by Borland International, Inc., of Scotts Valley, CA..
- PARADOX for DOS is a relational database that has features required for storing, viewing, printing, changing, sorting and finding data in tables such as Table 7.
- PARADOX has a character user interface (CUI), supports a mouse and WINDOWS in that environment, and, together with its query by example (QBE) facility, provides all the tools which a person of ordinary skill will require in order to develop the relations and tables of the method
- WINDOWS NT is the operating system
- Microsoft Development Tools for Rapid Application Development can be used to define the database 53 to interchange data in a manner required in the method 60.
- Shared data such as project summaries, project descriptions, etc., is shared in the form of a "virtual desktop" whereby computer systems connected in a network may be operated peer-to-peer with resources shared over the net Further, time may be aggregated from all "virtual" and "LAN" desktops working on a given project.
- a Microsoft "ACCESS” relational database running under Microsoft "WINDOWS”
- An “ACCESS” database is a relational database in which data is stored as a number of tables. Each table consists of a number of “records” (e.g. for different project names 100) and each record contains a number of "fields", such as "group/category”, “temporary bookmarks", “global bookmarks”, or “research session”. Where fields in two different tables take values from the same set, they are referred to as being shared fields. Shared fields have the same value and may therefore be shared between two or more tables. These fields are interrelated via a "join” operation which joins related records in the two tables. Often, but not always, these shared fields will have the same name across related tables. Further, ACCESS permits the filtering of records according to certain criteria and the searching for particular field values.
- UML Unified Modeling Language
- definitions of UML Class notation are available on the Internet at http://www.rational.com uml.
- any one (“1") user in a user field 226 is joined to any number (".") of GlobalMarks in a GlobalMark field 228 (where the user is the pioneer user), any number of Temporary Bookmarks ("TBMs") in a temporary bookmark field 230, any number of groups in a group/category field 232 (and vice versa), and any number of research sessions in a session field 234, the user being generally associated with a participator field 236.
- TBMs Temporary Bookmarks
- any name of a project folder (i.e., a project name 100) in the project field 238 is associated with any number of sessions in the session field 240, any number of GlobalMarks in the GlobalMark field 228, and a defined number of AccessTokens in the AccessToken field 242.
- a VisitMark field 244 indicates which URLs have been marked for deletion
- a location field 246 associates each URL with a description
- a SearchLocation field 248 associates keywords with each URL.
- the Project field 238 associates a project description with a project name 100.
- a ProjecfBookmark field 250 associates URLs with project names 100.
- the method 60 is implementable on the Intranet 25 or a standalone PC 22.
- «other users» refers to either other users of the standalone PC 22 or other users of the intranet who use the method for collaborative browsing, and the term «network administrator)) is interchangeable herein with the term «guard ⁇ an» (a supervisor such as a manager or a parent in the event that the system is used at least m part for censorship purposes), as the case may be.
- the browsing method 60 is encoded on a computer-readable medium.
- the method 60 is implemented in software which instructs a microprocessor to manage system components, inputs and outputs in a manner which controls access to the Internet.
- the method 60 includes an access control matrix having at least the parameter of project name 100 which must be input in order for access to the Internet to be permitted.
- the data st ⁇ ng is classified and filtered against the access control matnx. If the data st ⁇ ng includes a stnng identified as a project name 100, access is permitted; otherwise, access is limited (e.g., only a limited number of preapproved web pages may be accessed, such as a page providing instructions on how to use the method) or denied altogether.
- a first step 80 by clicking on an icon for example on the user's desktop, the browsing method 60, operating on the system 20 of the invention, is loaded into the working directory of the computer 22
- a second step 82 the method then presents an input window (similar to that shown in FIG. 7) in which the user inputs an individual user name 90 and an individual user password 92 (if the system is configured for multi-user access, this may be omitted if only one user is permitted to access the PC). If this information is correctly input, the user then logged on to a PC -resident HTML page.
- This page includes links to subpages and to other pages on the Internet, preferably on a subject related to the target market of the software (for example, legal links would be provided if the software is customized for the legal market).
- a third step 84 upon clicking on a drop-down menu item entitled "begin new project", the method 60, using the display device 24 of the computer 22, then presents the user with a selectable presentation of frequently used bookmarks or URLs. Optionally, entire contents of web pages may be saved in memory, to aid in off-line research. If another drop-down menu item, entitled “Begin Session” is selected, the method 60 goes to step 86.
- the method 60 presents a single input window 101 in which the individual user name 90, the individual user password 92, the project name 100, and, optionally, subproject name 103 (e.g., for project name "TELEPHONE", the subproject name might be "LONG DISTANCE PROVIDERS") are input. If all required fields are completed correctly, then the method jumps to step 102. Further, finding aids such as a browse project name button 105 may be added, should the user not know the name.
- finding aids such as a browse project name button 105 may be added, should the user not know the name.
- Clicking on the "browse project name” button 105 calls up a listing of project names 100, possibly alphabetically listed, from which the user, using the cursor 156, may activate and choose by clicking, or to compare his project name 100 with, to determine whether he made an error in recording the project name.
- Research results associated with any subproject names 103 are stored m association with their root project name 100.
- a begin new project button 107 returns the program to third step 84, above.
- the method 60 presents the user with an input window (such as window 101 of FIG. 7) in which the user must input an individual project name 100, such as PERSONAL or CLIENT 082361. After the user transmits the entered information, the method 60 compares the input name 100 with each name in an approved project name table stored in computer memory.
- the user is prompted to verify that this is a new project and to input a desc ⁇ ption of the project (optional) to be used, for example, in providing a basis for key word search associated with a modified third step 84, desc ⁇ bed in detail below.
- a desc ⁇ ption of the project optionally used, for example, in providing a basis for key word search associated with a modified third step 84, desc ⁇ bed in detail below.
- the method declines access to the Internet unless the input project name matches an existing listing of preapproved project names including such gene ⁇ c project names mentioned above which are stored in a relational database management system running a relational database 53.
- a fifth step 94 after the user has input the required information, he is then presented with any associated (with the project name 100 and the user name 90) TBM Listings (in HTML format and described in detail below in association with FIG. 11) from which he can initiate a new search.
- the research summary or global navigational history shown in FIG. 10 can also be saved as an attachment in an importable form and e-mailed to a third party. If the third party has a compatible browser, the third party may import this data and use it to launch their own research.
- a sixth step 102 particularly where multi-user access is permitted on a standalone PC or an intranet, the individual user name 90 and project name 100 are checked against permissions or AccessTokens in an authorization table (Table 1 of FIG. 8) stored in the relational database 53, to determine whether or not that particular user is permitted to work on the named project 100 and if so, whether the rest ⁇ ctions on use apply (a guardian or system administrator determines the limitations which apply to a given user or project: only he may change these restrictions, as directed by company management for example) If there are no applicable restrictions indicated in the authorization table, the user is permitted to continue.
- an authorization table Table 1 of FIG. 8
- the user can limit access to such projects (over which they have control) to categories/groups of other users, such as management, staff, secreta ⁇ al, attorneys, paralegals, etc.
- the user accomplishes this by checking off a dialog box when the user logs off the current project name 100 as shown in FIG. 9.
- a log off window (not shown) is presented to the user when the user activates a log off feature (such as a pull-down menu, an icon, or answering approp ⁇ ately to a dialog window presented, asking if the user wishes to continue or terminate the current research project).
- An optional window 157 is then presented, which includes, for example, the text "permit access to the following catego ⁇ es: [ ] all: [ ] administration, [ ] lawyers, [ ] staff
- Checking off any box will limit access to the extent of the user category.
- the user will generally have the authority to limit access to anyone in the same category, or of a category which plays a support role in relation to the user.
- certain catego ⁇ es of users (“p ⁇ vileged users") will always have access to research results, such as the system administrator or the responsible attorney in charge of a particular client, or the employee's direct supervisor.
- the method 60 accesses the database 53 (described in detail above in connection with FIG. 5) and checks the user authorization table to determine whether the pnvileged user is the supervisor of the user who performed the research, or whether he is catego ⁇ zed in a privileged level with respect to the user whose research results are sought. If so, the user is granted access, unless otherwise denied by the system administrator (such as in the case of a Chinese wall).
- a seventh step 104 if a previously saved URL Listing, Navigation History or Research Summary exists in association with the project name 100, the user is presented with the associated URL Listing, including all URLs saved in association with the project name 100, or SessionMarks created m a research summary/navigation history associated with the project name (again, see Table 2 and FIG. 5).
- This summary shown in FIG. 10 may be recalled and brought to top of the user's screen at any time during the research session by simply clicking on, for example, a special icon on the field 154 of the GUI 34 (shown m FIG. 13).
- an eighth step 106 upon the input of a user command orde ⁇ ng the downloading of information located on the Internet (such as by clicking on a hypertext link), the log on to the Internet is made (wherein the user name and password for access to the ISP is input), an HTTP connection 72 to a desired server 54 is established, a time Tl is read from the system clock and stored in RAM, a buffer memory or a cache, and the URL is checked against the global navigation history, including the GlobalMarks 228 associated with the project name 100 to see whether the URL is being accessed for the first time. If so, the URL is added to the listing and the user name 90 is listed in Col. 6 of Table 2 as the pioneer user associated with the URL link. The number "1" is attributed to the counter associated with this URL.
- a ninth step 110 the user is provided with the opportunity and means to perform his research.
- the navigation path of the research is tracked and stored by any number of suitable methods, such as that desc ⁇ bed in U.S. Pat. Nos. 5,717,860 and 5,712,979, the contents of which are incorporated herein by reference.
- the downloading of web pages is indicated by a light icon (not shown) which flashes by changing color between red and green du ⁇ ng downloading.
- Each web page associated with the project name 100 may have keywords or comments stored in association with it. These comments or keywords are input by a user upon the creation of a new project and are stored in a corresponding relational database field in association with the project name 100.
- a scan submethod scans the text of each downloaded page for words which match these keywords or comments. If a match is found, the submethod changes the color of the light icon from red to green and stops its flashing. Thus the user can quickly see whether the downloaded page is not relevant to the project name 100 while at the same time receiving an indication that online activity is underway.
- an eleventh step 114 the user ends his research session.
- the total time T ⁇ spent on researching the project name 100 is calculated using conventional methods and is recorded in the research summary section of Table 2.
- the user may close the connection or indicate that a new research session should begin. If the user chooses to end the research, this begins the logout process 116 which includes a twelfth optional step 120 and a thirteenth step 122.
- the user may display the research summary, and edit the bookmarks which he added du ⁇ ng the session. He may also mark any sites which are attributable to him (as the pioneer user) either in the global navigation history or the research summary, for deletion, but he may not delete them himself (unless he is the system administrator).
- the marking tags these records in the file in which is then stored in memory, for easy retrieval by the system administrator or guardian upon scanning the memory for such marked records. Further, such marking for deletion moves the bookmarks or URLs off of the Research Summary and/or the Project Global Navigation History (see Table 2) page and onto a page which is hypertext linked (via a link entitled "Marked for Deletion” for example) to the page on which the summary and navigation history are listed.
- any links which are marked for deletion are not printed, thus permitting the placement of the summary in a client's file without including any potentially emba ⁇ assing or unprofessional information thereon (a "marked for deletion" notation on the print out makes sense because the deletion of sites which are not of interest to a client is an administrative task).
- the system administrator or guardian may then delete these marked records, and adjust the user authorization table appropriately (e.g., if the system administrator finds that a user has marked for deletion a series of sites that fit a particular category to which the system administer may block access in the user authorization table, he may so adjust the user authorization table in order to prevent this content from being accessible to the user.
- the research summary of the session (Table 2, Section 3) is saved in the database 53 for common access and for presentation upon the user's or another privileged user's next login under that project name 100.
- the research summary includes the individual user name 90, project name 100 and navigation path or history 124 (shown in FIG. 10) of the last research session.
- the method 60 presents the user with the opportunity to print out the research summary, project navigation history, and/or associated bookmarks, for placing in an associated file for later reference.
- the printout may simply be that of Table 2 of FIG. 10.
- the user is presented with an input screen which queries the user as to whether he would like the individual user name 90, project name 100 and navigation history 124 printed out. If the user answers affirmatively, the summary is submitted to a printing cache of a connected printer for printing.
- a fourteenth step 126 the user is queried as to whether he would like to begin another research session and if so, the method 60 returns to step three 84 above, the input window 101 of FIG. 7 (wherein the user name 90 and password 92 are automatically input into the windows, or, if the TBMs were created during the research session, the method returns to step 86 above and the TBM listing is presented, carried over to the next research session. If not, the connection closes, the user is asked whether he wishes to save any TBMs created during the research session. If the user responds in the negative, any unsaved TBMs are automatically deleted and the method 60 ends. If the user responds in the positive, the TBMs are saved in association with the project name 100 for presentation, in a selectable form in chronological order with other TBM listings, next time that step 94 is executed.
- the second step 82 and third step 84 may be reversed.
- the third step 84 of presenting frequently used URLs is performed in the following manner.
- the method 60 provides a pull-down menu or a dialog window 137 (such as that shown in FIG. 13), which permits the user to perform a key word search of all descriptions of project names 100 previously searched by others, including any associated or unassociated (i.e., all) bookmarks (by name and by associated description of the bookmark).
- a second substep 132 after input is received from the user, any descriptions, project or bookmark names matching the search criteria are presented to the user in a selectable format such as a URL and description listing in the form of a research summary such as that shown in FIG. 10.
- the research summary may include shortcuts to folders of links common to a particular type of research, thus not requiring duplication in each related project research summary and providing easy access to frequently referenced links.
- These shortcuts may be dragged and dropped into the URL listing in the research summary using, e.g., a project management subroutine controlled by a sub-interface.
- a project management subroutine controlled by a sub-interface.
- This folder is actually a hypertext-type link to a single global folder such as that shown in the upper portion of FIG. 10, which might have links of particular interest to patent related projects
- the project names 100 presented may be limited to those which the user is authorized to view and/use, using the user autho ⁇ zation table 1 of FIG 8.
- the search results are scanned to identify and automatically delete any duplicate URLs from the project global navigation history or bookmarks.
- the user may edit the presented listing for saving in association with a project. Alternatively, the user may begin his search using the bookmarks which he has saved for general use, as is the case in the prior art.
- the method prompts the user for a project name 100 (and subproject name 101, as the case may be) with which to associate the edited URL listing.
- a project name is input
- the selectable listing is saved in association with project name 100 for later access and the user is prompted to input a project descnption (to permit key- word searching by project name).
- the method saves the selectable presentation of matches as the bookmark listing associated with the input new project name 100' and the new individual user name 90. This is done off-line.
- the submethod returns to the method 60, the fourth step 86.
- the method 60 further provides the user with an option enabling the user to focus the key word search on only those projects which he has previously worked on, by scanning saved URL listings for his individual user name and presenting only those navigation histories and/or bookmarks associated with these project names 100
- the user may search by his or another's user name, and receive all URL listing which he or another user (to the extent of his authorization to receive such information from the other user) in listing form.
- the method then returns to the third substep 134.
- the third step 84 provides the search input field 137 (shown in FIG. 13) and search engine (such as that desc ⁇ bed in U.S. Pat. No. 5,864,863 to Bunows, U.S Pat. No. 5,933,822 to Braden-Harder et al. and U.S. Pat. No. 5,924,090 to Krellerstein, the contents of which are incorporated herein by reference) together with canned, pre-organized listing of bookmarks which are pre-loaded in the method, after learning of or estimating/projecting the likely needs or requests of the user.
- the search engine searches the bookmarks using keyword inputs of the user.
- bookmarks and sample searchable projects associated with a project name and potentially relevant URLs are added in order to provide the user with an initial off-line listing of research tasks which are commonly performed among such users
- research tasks such as seeking paralegal service providers, sources of information regarding local or national courts, SEC filing information, private investigation services, corporate address information and officer biographies, telephone or Internet services, computer support services, web page development services, etc., including URLs addressing websites having listings of FAQs and sources of other helpful background information of the user are provided.
- the prepackaged bookmark or URL listings are associated with a readily recognizable generic, descriptive project name 100 and project descnption and generated by experts in the field who have actually performed a typical search. This navigation history generated by these expert searches is pre-packaged in association with generic project names 100. Because bookmarks are saved in association with user name, the user can execute a keyword search constrained to a project name 100 as well as a particular user name 90. This would be particularly useful in large organizations with multiple departments.
- step 106 of method 60 above wherein a user using a client computer 22 initiates a request for information and the request for information is interpreted and retneved, the URL is filtered against a listing of unapproved URLs and, if unapproved, the download is terminated prior to the document being transmitted to the client computer and displayed.
- identifying code of banner advertisements are detected and such advertisements are stnpped from the HTML code prior to the CGI reassembling the page for presentation to the user by the browser.
- FIG. 12 illustrates a GUI layout 150 in which a sample World Wide Web page 152 is displayed in accordance with the method 60 of the present invention.
- a GUI is a type of display format that enables a user to choose commands, start programs, and see lists of files and other options by pointing to picto ⁇ al representations, called "icons", and menu bars and/or buttons 154 allowing the selection of menu items from pull-down lists on the display device.
- Choices can generally be activated by either a keyboard 26 or a mouse cursor 156
- the size and position of elevator 160 within scroll bar 162 corresponds to the size and position of the current viewable page m relation to the document displayed within window 164
- the user can position the mouse cursor 156 over the arrow section 166 or arrow section 170 of scroll bar 162 and click a pointing device (e.g., the mouse 27) to scroll the document upward or downward, as approp ⁇ ate. Scrolling in this manner permits viewing of any desired portion of the document.
- Arrow sections 172 and 174 allow a user to scroll respectively left or right.
- Window 174 is a location field indicating the cwrent URL address.
- a hypertext link 180 permits navigation between the current page 152 and the page referenced by a URL address associated with the link, discussed in more detail below.
- Window 182 includes the description of the page 152, taken from the corresponding tag of the page itself.
- a window 154 indicates the current amount of time on-line for the current project 100.
- the GUI 150 may have a banner display field 184 where display advertisements may be presented, preferably screened or filtered by a suitable method such as described in U.S. Pat. No. 5,826,267 so as to present only approved advertising banners which may be selected based on their relevance to the research goals of the project.
- the links 180 point to Internet services which are typically accessed by specifying a unique address or URL which is associated with the link.
- URLs can point to numerous resources on the Internet, including HTML documents, pictures, sound files, movie files, or database search engines including specific search queries.
- URLs can point to resources located on the client computer 22, or anywhere on the Internet. They can be accessed either through an HTTP server or another Internet server running on top of TCP/IP. The URL may also direct the server computer to run another gateway program and return the result to the client computer 22.
- the URL has two basic components, the protocol to be used and the object path name.
- the URL "http://uspatentinfo.com” specifies a HTTP and a pathname of the server hosting http://uspatentinfo.com.
- the server name is associated with a unique numeric value (TCP/IP address).
- the "PATENT.INFO" home page includes links 180 which are typically underlined or highlighted to indicate the presence of a URL address link.
- the user places cursor pointer 156 with a mouse 27 or other pointing device over the link 180 and activates the pointing device to access the linked page or document.
- the hypertext links 180 are important because they facilitate access to web pages over the vast network of the World Wide Web.
- HTML commands called "tags", mark text as headings, paragraphs, lists, quotations, emphasized, and other formatting information.
- HTML also has tags for including images within the document being read to other documents, fill-in forms 70 (see FIG. 4) that accept user input, and hypertext links 136 connecting documents being read to other documents or Internet resources such as FTP sites, WAIS databases, USENET news, e-mail, gopher sites, or another HTML document. This feature allows the user to click on a string of highlighted text and access a new document, an image, or a sound file from a computer within the network anywhere in the world.
- the element marking a hypertext link 180 in a HTML document is referred to as an "anchor” or “element” and the marked text is referred to as a "hypertext anchor” or “anchor tag”.
- the anchor tag has a destination portion and a text portion. Furthermore, the anchor tag is delimited at the beginning by an " ⁇ A>" and at the end by an " ⁇ /A>” character sequence.
- the destination portion contains an entry which indicates the location of the destination web page.
- the text portion is the text which appears on the GUI 150 and is associated with the hypertext link 180. For example, consider a hypertext link 180 having the following HTML anchor tag:
- the destination portion of this tag is "http://uspatentinfo.com” (shown in field 176 of FIG. 13).
- the text "The Patent.Info Home Page” (shown in field 182 in FIG. 13) occupies the text portion of the HTML based link.
- a web page contains a list of anchor tags which describe hypertext links in HTML.
- the browsing method 60 of the present invention processes these anchor tags and displays co ⁇ esponding hypertext links 180 to the user on the display device 24.
- An anchor tag can be modified such as to prevent access to an associated site, as described in U.S. Pat. No. 5,826,267.
- Links 180 are typically displayed on a web page in color or with an underscore or both. In response to the user pointing and clicking on the link 180, the link is said to be "activated" to begin to download of the linked document or text.
- FIG. 14A a flow chart of a submethod 190 of the method 60 is shown, the submethod runs during step 110 of the method.
- the user is provided with a means of choosing this option, via a drop-down menu with a "set options" selection.
- the submethod 190 modifies the method of the prior art of selecting hypertext in which pressing the left mouse button 28 while the cursor 156 is over a link 180 initiates the downloading of the linked document (i.e., by clicking on a hypertext anchor normally displayed as a hypertext link 180 within a hypertext document displayed on a client computer's display 24) and clicking on the right mouse button 29 provides the user with a menu of actions to choose from.
- a first substep 192 the user places the cursor 156 over the hypertext 180 of interest, thereby activating the link.
- a second step 194 the user decides whether to click on the left mouse button 28 or the right mouse button 29.
- substep 196a if the user clicks once on the hypertext anchor using the left mouse button 28 (or analogous action), the submethod 190 reminds the user of the current project name 100 and solicits the user's confirmation that the research sortie or session, which the user indicated he wished to initiate by his clicking on the link 180, is to be associated with the current project name or a new project name 100' (i.e., window 200, shown in FIG. 13, is presented). Further, substep 196a of the submethod 190 solicits the user's comments or review of the contents of the currently downloaded page via a clearly marked input field 199 in the window 200' .
- substep 196b if the user confirms association with the current research name 100, the submethod 190 continues research by retrieving the information and transmitting it to the client computer 22. The time TN is then stored in a buffer and the URL is stored in the navigation history file. Confirmation of the association may be solicited in a number of ways.
- the submethod 190 activates and displays an input or secondary window 160 (shown in FIG. 13) which prompts the user to press an icon or other button using the mouse cursor 156 to confirm that the project name 100 is not to be changed. If the user confirms by, for example, clicking "yes", the research session is associated with the current project name 100, and as stated of substep 196b, the submethod 190 continues.
- substep 196c if the user clicks "no", the submethod 190 queries the user to determine whether he wishes to create a TBM, thus allowing the user to temporarily save the URL for later access and continue with the current research project. If the user so desires, by responding in the affirmative, then the TBM is saved and the step goes directly to substep 196b and the research continues.
- substep 196d alternatively or together with the TBM feature, the user may use the associated bookmark feature.
- substep 196d if the user responds in the negative, the user is asked whether he wishes to save the URL in association with another project name 100' (as an "Associated Bookmark") and if so, the user inputs the project name 100', a description (optional), and the URL is stored in the URL Listing in association with the project name indicated, optionally highlighted or italicized (see Table 2, under Associated Bookmarks: "SEC FAQ") to indicate that that URL has not yet been accessed and permitting identification of the URL during a later research session.
- the user's individual user name 90 may optionally be associated with this as well, to permit easy identification.
- Associated Bookmark as indicated in the second column of the Associated Bookmark section of Table 2, permits temporary and editable storage of the bookmark to the potentially irrelevant site (with respect to the current project 100) in association with his "personal" or another project name 100. In this way, the user is provided with freedom to navigate to potentially irrelevant sites.
- substep 196e if the user indicates "no" once again, a new research session 100' is initiated and associated with the new project name 100'. Thus, in this substep 196e, the user must input the new project name 100'. After the project name 100' is input, the system clock is read and the time TN is used to calculate the total time on the prior project name 100 and to initialize the clock to commence tracking the time on the new project name 100', using methods well known in the art.
- the submethod 190 retrieves the requested information and transmits it to the client computer 22, where the HTML is compiled into a hypertext document and displayed.
- the client computer 22 where the HTML is compiled into a hypertext document and displayed.
- the user name 90 of the first user to access a site listed on the navigation history (the "pioneer user" indicated in Table 2) is associated with the navigation history, permanently stored in the URL listing in association with the project name.
- the URLs in the navigation history cannot be deleted by the user—only the system administrator or guardian or other privileged user can do this.
- substep 198a if the user clicks the right mouse button (or analogous input), an option window 200' (shown in FIG. 15) opens and the submethod 190 awaits user input. Note that the two windows 200 and 200' are not displayed at the same time—however, they are shown in the FIG. 13 together for the sake of thoroughness and to simplify the drawings.
- substep 198b after input from user is received, the option window 200' is closed and the selected action is implemented. If the option selected was the creation of a TBM, the user has saved the URL for later access, without downloading it (and thus having it stored m association with the project name 100).
- the URL is then stored in an editable, at least semi-p ⁇ vate format (i.e., not accessible by all, rather only by certain p ⁇ vileged users, if any) for later access.
- the method 60 provides the user with an additional incentive not to access a page which is of pnvate interest and/or not relevant to the current project 100 (to avoid an improper association).
- the user is likely to remain focused on the current project 100. This decreases the likelihood that irrelevant sites will be found on the navigation history associated with the project name 100.
- the method 60 of the invention allows users to surf the sites of their choosing, while directing them to focus their research one project at a time.
- the secondary or "target" window 200 may include comment buttons, check boxes, list boxes, drop-down list boxes. It is commonly known in the art that web authors can set up such a link so that when a user clicks on it, an input window such as window 200 appears.
- the input window 200' used in association with the submethod 190, is shown to include other menu items such as those presented m the prior art when the nght mouse button 29 (or equivalent) is pressed. There are a variety of options to select from on this option window 200'.
- the options listed in this option window 200' include, for example, “back”, “forward”, “open this link”, “open in a new window”, “view image”, “save image as”, “set as wallpaper”, “copy link location”, “copy image location”, “save as a TBM”, “add bookmark” (clicking this option adds bookmark to bookmark listing common to all projects), “save as Associated (with current or another project name) Bookmark”, “Internet shortcut”, “select all”, “add to favorites”, “view source”, “refresh”, and “properties”, among others.
- the submethod 190 when the user clicks on the link 180, the submethod 190 first determines whether the web page selected is a subpage of the current page, is a jump link, or includes the same root URL as the current web page before presenting the user with the input window 200. This identification is performed using conventional methods known in the art. If the page selected is a subpage of the current page, a jump link, or is included under the same root URL, the substep 196a skips to substep 196f without a query being initiated. In this way, only those hypertext links leading to a web page that is likely to have different content are subject to confirmation that they are to be associated with the same project name 100.
- submethod 190' an alternate embodiment of the submethod 190, shown in FIG. 14B, the option window 200' is not displayed and the substeps 196a through the 198a are replaced with a substeps 197a, 197b, and 199a and 199b.
- the method 60 immediately accesses and transmits the requested information, just as with a left button click in the prior art.
- substep 199a if the left mouse button is clicked, the option window 200' (as shown in FIG. 15) is displayed and the submethod 190' awaits user input.
- the browser method 60 places an information "object" within each anchor tag of the page being formatted for display. This information object is saved to a separate file or cache within the client computer 22. Multiple information objects may be associated with a single link. Further, the information object need not be related to the link to which it is associated. Those skilled in the art will recognize that other HTML commands and tags, such as a tag dedicated to masking an information object withm the currently displayed page, may be used.
- the input windows 200 and 200' represent examples of a type of information object.
- the input windows 200 or 200' may be formatted and displayed upon activation of a link in a web page being displayed.
- the input window 200 is displayed in this manner whenever a call to a web page is made by clicking on a hypertext link 180, such as when a search to a particular URL is initiated or when a previously stored URL is launched (such as from the TBM listing of Table 3, or associated bookmarks, navigation history and research summary of Table 2).
- the input window 200 may be an HTML "fill-in" form (such as that shown in FIG.
- the window 200 reminds the user of the current project name 100 and asks the user if he would like to continue with the same project or change the project name.
- the user may change setting such that he can review a page in one of several different modes.
- a first mode the user can review a web page without having to attribute it to a project name 100 until he has finished reviewing the page.
- the fact that the user is ready to provide comments regarding a page is indicated by his having activated an anchor tag or URL pointing the browser to another web page which is not a subdomam of the current page, the latter restriction limiting the querying to quenes at the most relevant times, i.e., when the content viewed by the user is likely to change significantly.
- the user may still be queried as to whether the URL associated with an activated anchor tag should be saved as a TBM, in lieu of downloading the selected data at the URL.
- the user is not asked whether the downloaded data is to be associated with the current project name 100 or a new project name 100' until the user has had a chance to review the information downloaded.
- the variations regarding clicking on the nght or left mouse button are available as a user moves away from an already reviewed site. Therefore, in an equivalent to the input window 200 or 200', another menu option, namely, "input keywords and/or comments" 199, is presented to the user, to provide the method 60 the opportunity to capture the user's contemporaneous comments, whether in text or a sound file, regarding the site just visited.
- the substitute for substep 196a is identical except that when a user activates a link 180, he's indicating his desire to leave the cu ⁇ ently downloaded site and is asked to associate the site he's already visited with a project name 100. For example, if the user clicks once on the hypertext anchor using the left mouse button 28 (or analogous action), this alternate embodiment of the submethod 190 reminds the user of the current project name 100 and solicits the user's confirmation that the research sortie or session, which the user had previously initiated, is to be associated with the cunent project name or a new project name 100' (i.e., window 200, shown in FIG. 13, is presented).
- This embodiment although less controlling of navigation, is more appropriate for simply tracking and soliciting, receiving and storing comments, such as key words, metatags, or descriptive terms regarding site content for use in identifying the site when the search feature presented in the dialog window 137 is used.
- the user can change setting so that no dialog window is presented upon activating a link, but rather the window only appears when the user clicks on the nght mouse button.
- the URLs of downloaded pages are automatically associated with the current project name 100.
- a system administrator by evaluating the focus quotient Q across different users under diffenng conditions, may find that it is better, once a project name 100 is selected, to automatically associate all downloaded pages with this project name, without querying the user. If the user knows that, when he downloads a page, it will necessarily be saved in association with the current project name 100 until he otherwise logs out of the current project name, then, when the user sees something of personal interest, he will save it as a TBM or start a new research session under his PERSONAL project name However, this would not eliminate the need to have a dialog window 200, as the option of saving as a TBM and inputting keywords or comments with respect to the page just visited would be important.
- a URL is saved as part of a navigational history data listing, together with a time tag
- the submethod scans the time tags in the data listing and marks all URLs in the listing that are of a predetermined age
- the submethod checks the comment field in the data structure of each marked URL.
- the submethod deletes the marked URL.
- the method 60 is ideally used to deliver specific content in the form of URLs that are selected, reviewed and indexed according to a hierarchical tree structure such as a directory/subdirectory structure.
- a hierarchical tree structure such as a directory/subdirectory structure.
- These trees are generally tailored to the needs of particular professions, such as lawyers, doctors, CPAs, engineers, CFOs, Venture Capitalists, etc.
- the method 60 is tailored to the needs of the professional IP purchasing agent, then the tree would have structured links arranged according to project names 100 such as IP exchanges, IP valuation sites, Glossary sites, general IP content sites, sites of licensing professionals, patent searching sites, etc.
- the method 60 provides a structured means of accessing and navigating the Internet.
- the method 60 of the invention handles this as follows.
- the submethod 210 recognizes this fact by analyzing the URL code/structure invoked and, consequently, identifies the site type as a "search engine” in column 2 of Table 3 of FIG. 11.
- the submethod 210 analyzes the query structure and extracts the characters which occur after this word/expression and stores the same in the TBM listing (col. 3 of Table 3, above). Alternatively, the entire code from the location field 176 corresponding to the search engine search is stored in its URL form in order to permit easy re-execution of the search upon clicking on the URL.
- the submethod 210 checks the query against a table of forbidden keywords. In substep 220a, if the words are forbidden, then the user authorization table is checked to see if the search is nonetheless authonzed (i.e., an indicator such as «no forbidden keywords» is not found m the authorization table).
- substep 220b if the user or project does restrict access, then the submethod 210 denies access and displays a warning window informing the user that access is denied
- substep 220c if the user and project have no restrictions, then the request is processed.
- substep 222 if the words are not forbidden, then the request is processed.
- step 224 the research is continued.
- the first substep recognizes, in the following manner, when a search engine search term is entered.
- the method 60 receives a character on a character based input device such as the keyboard 26, the method analyses the character and determines if the character received was an "enter" key.
- the "enter” key represents any input signal which indicates that the user desires to transmit information to the server If the submethod 210 receives the "enter" key, the characters immediately before the enter key that were entered by the input device such as the keyboard 26 are identified to determine whether they represent a manually input URL or a search keyword or phrase.
- the keyword or phrase typed by the input device just before the "enter" key was pressed together with any Boolean operators and the URL, are extracted and the keyboard-entered words or phase and URL are stored in the appropnate column of tables 2 and 3 (alternatively, as mentioned above, the URL in the location field may be stored in order to permit re-execution of the search dunng a later research session).
- an input window 160 is presented as described above with respect to the submethod 190, for example, in order to provide the opportunity to query the user as to whether the new site to be visited should be associated with the same project name 100.
- new browsing windows may be opened.
- the user inputs a new project name 100'.
- the termination time is stored for calculation of the actual time on the pnor project when the research session associated with that project name 100 is terminated
- the noted time also marks the start time for the research associated with the new project name 100'.
- the method 60 provides a system administrator module 260 which permits the system administrator 262 to manage participants (such as groups/categories and users), access, projects and sessions
- the project names 100 which a user may research and the users who may have access to certain project names are managed via an access management window.
- the system administrator module 260 facilitates the management of access, URL management (including deleting "marked for deletion" URLs), user performance evaluation, use of a focus quotient Q, setting access limitations, time limits, project name access restrictions, and issuing and changing passwords and user names.
- the module 260 allows the system administrator 262 to compare the relative performance of each user using the focus quotient Q, a performance measure, (desc ⁇ bed in more detail below) by displaying a bar chart (now shown) showing the relative score calculated for each user over a specified period of time
- the focus quotient Q takes into account certain research session statistics, such as H ave (the average number of hits per research session over the specified pe ⁇ od), T ave (the average time of a research session, expressed in terms of T totalois the total on-line time over the pe ⁇ od, divided by N totab the total number of project names researched over the specified period); N rs (the average number of research sessions executed per project over the specified period calculated by taking N tota , and divided by N legal, the total number of unique project names researched over the specified period); and T pers , the amount of time spent on the personal project name.
- H ave the average number of hits per research session over the specified pe ⁇ od
- T ave the average time of a research session, expressed in terms of T totalois the total on-line time over the pe ⁇ od, divided by N totab the total number of project names researched over the specified period
- N rs the average number of research sessions executed per project over the specified period calculated by taking N tota
- (T ⁇ , - T- ⁇ /T, ⁇ , is an adjustor for personal time.
- Q can also be expressed as a Summation of Q x , the focus quotient for each project name, divided by ⁇ N total , multiplied by the adjuster for personal time, where:
- a factor namely, the number of windows open by a single user at the same time, tends to indicate that the user is not focusing his research and could optionally be added to the quotient above in the denominator.
- A, ⁇ , ⁇ , and ⁇ optional weighting factors, which may be constants or formulas, determined experimentally. These performance measures thus aid the user, system administrator, and/or management, to evaluate relative performance over time, which can then be presented in a simple histogram or a graph of Q over a time interval, alone in compa ⁇ son with prior performance of the same user (self or user evaluation) or in comparison with other employees (inter-user evaluation). The user's performance may also be evaluated with respect to a particular project.
- a form shows one record in a specified format and allows the system administrator 262 to step through records one at a time.
- a report shows selected records in a specified format, grouped into sections with different kinds of totals (including sum, minimum, maximum, average).
- a flow diagram of the logout submethod 240 of the present method 60 is shown.
- the user indicates, via a pull down menu or by clicking on a menu item presented when selecting a hypertext link or anchor tag, that he would like to end the current research session.
- the submethod 240 presents the user with the listing of URLs created by the TBM feature of the invention, permitting the user to launch another research session associated with another project name 100', using one of the hypertext TBMs on the list.
- the submethod 240 awaits user input.
- the TBM listing includes menu options such as "logoff without saving TBM", "save TBM and logoff, "begin new research session".
- a fourth substep 252 once the user input is received, the submethod 240 carnes out the task associated with the input received. For example, if the user clicks on a TBM in the TBM listing, then the submethod 240 returns to step 86 above and presents the user with input window 101. If "begin new research session" in input window 101 is selected, then the user is presented with the URL listing shown in Table 2 and/or a TBM listing associated with the input project name 100'.
- the submethod 240 prompts the user for a file name and confirmation that the cunent TBM listing is to be saved in association with the cunent project name 100 or another project name.
- the TBM is saved, the connection closes and the user logs off.
- the TBM information stored in the URL listing and presented later allows the user to consolidate his research by providing a means for him to time-shift possibly melevant research, without having to permanently save the URLs in a traditional "favo ⁇ tes" list or "bookmark” list and to associate TBM listings with specific project names 100.
- the user may place potentially irrelevant sites on the TBM listing without going to these sites (thus, they do not show up on the navigation history and are therefore not permanently saved).
- the user may later edit this TBM listing or initiate personal research in association with it.
- secure access (to varying degrees) is provided to HTML documents posted on publicly accessible servers across the Internet or on an intranet.
- a URL may be the following: http://uspatentinfo.com conf-docs/4024- 116-00181.html, which may be e-mailed, preferably in a secure manner, to other persons who are to have access to the document so posted. Unless a user knows the directory and file name extension to the address of the home page, he will not be able to find the document.
- the method of posting these documents involves the following representative steps.
- the user selects an option for the pull-down menu of his word-processing program which states "publish to intranet or Internet”.
- the method converts the documents into HTML.
- the method calls a web page publishing subroutine (such as that embedded in "FRONT PAGE EXPLORER"), opens the page and displays the document in HTML, for possible editing.
- a fourth step after the user selects "publish" from a drop-down menu, the method opens an Internet connection, queries the user for the name and address of the site to which the document is to be published (the user name and password optionally being automatically provided).
- a fifth step when these inputs are correctly provided, the method publishes the document.
- the posting of documents at obscure URLs highlights the usefulness of having URL listings of Table 2, FIG. 10, URLs stored in retrievable form through the input of a password 92 , user name 90 and a project name 100 which point directly to these confidential documents. Further, this highlights the importance of the invention for preventing access to URL listings and navigational histones (such as those of FIG. 10) in association with project names 100, where the user seeking access is not authorized according to an authorization table such as that of FIG. 8.
- the user selects "encrypt" from a drop-down menu, after which the user may be prompted for the project name 100 to be associated with the document.
- the project name 100 is supplied without querying the user (because it has been stored after the user's input at the beginning of the research session) and the document is automatically encrypted such that the decryption key is the project name 100 (or some hashing thereof).
- the project name 100 already input during step 134 or step 86 above (such as a client matter number or project code name) is automatically used to decrypt the encrypted page such that the project name is the decryption key.
- This is accomplished by adding an identifier at the head of the encryption page, which identifies the page as encrypted once the download is initiated, thus executing a decryption program embedded in the method 60 into which the project name 100, stored in association with the research session, is input, for decryption during loading of the page.
- Having the decryption program resident on the client is advantageous as this allows the information downloaded across the public Internet or intranet to remain encrypted.
- the page to be downloaded can include the decryption program which extracts the project name 100 and, optionally, for further security, the IP address of the requestor (for checking against permissible IP addresses) upon initiation of the download and then transmits a decrypted page across the Internet.
- a company using the method 60 of the invention across its various business units may encrypt all its documents (both on the intranet or published on the Internet) such that the decryption key is the project name 100, without the inconvenience of having to input a unique decryption key whenever such an encrypted document is downloaded to a client computer 22.
- the decryption key is the project name 100
- access to project documents is conveniently and seamlessly provided exclusively to those who know the client matter number/project name. This ensures (together with the matching table mentioned above) that the navigation history generated during a research or work session is associated with the co ⁇ ect project name 100.
- the invention significantly enhances the ability of companies having offices at different geographical locations (or dealing with offices of other companies) to be able to access confidential information posted at various servers (of, for example, several companies, consultants or specialists working together on a common project) on the Internet in a secure manner yet in a manner which avoids having to remember separate access codes and passwords for getting beyond a firewall, for example.
- the invention significantly enhances a user's ability to securely post information on publicly accessible servers, thus making such information available to team members located as several locations across the Internet.
- Such a feature is particularly useful for consultants who must work with confidential documents of a company or client, but which do not have the established trust relationship with the company, at least not at a level which would warrant their being able to access the company intranet.
- the method 60 is implemented on a server hosting a page with content specific to a particular profession or industry, and anyone using a prior art browser may then access this web site on the server, which will provide the graphics such as input windows 200 and 200', and bookmarks available for all to use.
- the bookmarks resident on the server are pre-selected to aid in researching the Internet for foreseen purposes specific to the particular profession.
- the method 60 includes a GUI 164' for presenting content (i.e., a downloaded HTML page, a document such as an e-mail, a Word document, a spreadsheet or a graphic) which includes a comment window 165 having a text field and controls opened by an icon 167 which controls the playback and recording of sound files, for users' comments on these contents.
- content i.e., a downloaded HTML page, a document such as an e-mail, a Word document, a spreadsheet or a graphic
- comment window 165 having a text field and controls opened by an icon 167 which controls the playback and recording of sound files, for users' comments on these contents.
- This is accomplished via a right click mouse menu option which, if selected, opens an input window 199 (in FIG. 13) that allows comment, either as text or a sound file, after the user has had a chance to review the content.
- the user may save the comment in association with the web page for presentation to others who follow after the commenting user
- the user may comment on several web pages consistent with a chosen project name theme.
- signpost-like back and forward icons 153a and 153b on the upper menu bar provide a convenient means for those who follow this "project trail”.
- the traditional back and forward icons 155a and 155b continue to move the between websites that he has actually visited. Only when the user visits sites under the project name 100 in the project folder and does not deviate from the order of project sites under the project name 100 will the signpost-like icons and the standard icons appear to produce the same result if selected.
- a submethod 300 executes the following steps.
- the submethod 300 reads the format of the next or subsequent document in the project folder and compares this format with that currently open, including whether the comment is in the form of text or a sound file.
- the submethod 300 checks the format of subsequent document.
- the submethod 300 opens the document/sound file into the conesponding application.
- the submethod 300 then presents the user with a confirmation window (not shown), querying the user as to whether he would like the previous document to be closed, or minimized.
- a fifth step 310 the submethod 300 awaits user input and when received, executes the action requested.
- the submethod 300 opens the application associated with the selected document, and displays the subsequent document.
- the user may re-initiate the submethod 300 by clicking on the forward icon 153b.
- the back signpost icon 153a is activated, essentially the same submethod 300 is executed, except that the submethod moves to the document which is listed prior to the current document in the project folder.
- This embodiment advantageously creates a signposted trail through the Internet that others can follow.
- a teacher/guide can create a trail, including comments on each site, to enable students to follow the trail, read the comments and the site's contents and learn in a directed manner.
- this feature alone will become widespread as a tool to navigate the Internet using an experienced guide (i.e., the "scout" of the original trail).
- this embodiment is combined with the integration of documents of other formats (described in more detail below), a powerful learning tool is created.
- FIGs. 1 and 2 may vary for specific applications.
- peripheral devices such as optical disk media, audio adapters, or chip-programming devices, such as PAL or EPROM programming devices well-known in the art of computer hardware, and the like may be utilized in addition to or in place of hardware already depicted.
- a computer program product i.e., a control program
- computer storage e.g., 30 or 32.
- the method 60 of the present invention is capable of being distributed as a computer program encoded on a floppy disk, CD ROM, or other form of recordable media or via any type of signal bearing media or electronic transmission mechanism, such as a modem or a fiber optic connection to the Internet.
- the functionality of the present invention is integrated into an HTML-compliant browser, such as "NETSCAPE NAVIGATOR X", “MOSAIC”, “MSN”, or “INTERNET EXPLORER X”. It should be understood, however, that the browser method 60 of the invention need not be inseparably integrated. Optionally, a separate program interfacing with the open structure of "NETSCAPE” or a plug-in, embodying the steps of the method 60 of the invention, may augment the functionality of an existing browser. Note that XML may substitute for HTML in the context of this disclosure. Further, the method 60 of the invention, integrated with a GUI comparable to that shown in FIG. 13, may call a third party external browser. For instance, "MAC OS X" may be used in a manner known in the art to communicate with an external browser m a manner that permits it to appear as part of the browser method 60, although
- the "information object” or “information” output to the viewer during the link process should be broadly construed to cover calls to any and all forms of messages, notices, text, graphics, sound, video, tables, diagrams, Applets, and other content, and combinations of any of the above.
- an audio query concerning the use of TBM or associated bookmarks, demanding an audio response may be used.
- the techniques of the invention apply (as shown m FIGs. 3 and 4) whether or not the user accesses the World Wide Web via a direct Internet connection (using an Internet access provider 29) or indirectly through some on-line service provider 28 such as "COMPUSERVE”, "PRODIGY”, “AMERICA ONLINE", etc. Therefore, the computer "network" 25 in which the invention is implemented should be broadly construed to include any server-client model from which a client can link to a "remote" document, even if the document is on the same machine or on an intranet.
- the method 60 cooperates with a co ⁇ esponding software resident on a server 54 such that the server-resident software scans and updates the bookmarks and other content on the browser when the server is accessed by a compatible browser.
- This may be accomplished in the following submethod 350.
- the browser is either pre-set to point to a download page on which is resident associated updating software or the URL of this server 54 is input into the URL field 176 of the browser.
- a download step 354 the download of the page is ordered on the client-side, through the user's pressing the "go" button or hitting "return"
- an identification step 356 the ordered URL or IP address (if performed on the client- side) or the incoming browser identifier (if performed on the server-side) is checked against a list of IP addresses or compatible browser identifiers, as the case may be, associated with downloadable updates for bookmarks.
- a scanning step 360 if a matching IP address or browser identifier is found, then after the download of the page, the submethod 350 initiates a scanning of the browser to read an identification tag associated with the version of the bookmarks on the browser.
- the submethod 350 compares the identification tag associated with the version of the bookmarks and other content on the browser with the latest version available on the server 54.
- a querying step 364 if a version of bookmarks and other content is available on the server 54 that is more up-to-date than that on the browser, the user is queried as to whether or not he would like to have his pre-loaded bookmarks and related content updated.
- an updating step 366 if the user responds in the affirmative, a download of the upgrade is initiated during which all URLs that have broken links are marked for deletion, new URLs and associated descnptions are added to the bookmarks and other content on the browser, and descnptions and keywords of existing bookmarks and other conent are updated, where appropriate.
- the method 60 of the invention may be used in a server-based computing architecture that allows the method to run on a remote server 54 operated by a system administrator.
- This is commonly known as running the application as an ASP (application service provider).
- ASP application service provider
- the model of the project-based, group browser functioning as an ASP is particularly timely, as the market place for ASPs is growing very quickly. It also provides scope for other client/server configurations as the general client market moves increasingly towards support of thin client devices such as Palms, Pocket PC's, WAP or HML enabled phones and other digital portable devices.
- this embodiment allows users to avoid the up-front and continuing costs and technology complexities that might be associated with a client-side application, with the sacrifice of some flexibility because the user may have limited memory, and graphics display and keyboard resources in current thin client device technology.
- the method can be more genenc by removing the prepackaged, client-side database of profession-centric, pre-indexed links and comments while taking full advantage of the basic features of the method 60 including bookmarking, tracking navigational history, and creating research summaries by project name, and pooling of project research data for multi-user access, etc.
- This embodiment is more generic in that any group, including persons who do not share the same local network (i.e., Intranet) can share the project-oriented features of the method 60
- groups might include friends, research teams in different universities, artists, private and public sector groups, church groups, etc.
- the server-based computing architecture is used, thus further allowing the user to avoid the costs that might be associated with a client-side application and concentrate on their own research or other creative pursuits.
- this service builds on and facilitates a feature of the Internet that has already garnered attention, the building of online communities which to a certain extent Internet portals currently try to achieve, and a server-based computing architecture.
- the project-based, group browser is a technical mechanism that would allow users to share and discuss all forms of creative content as it is developed, while restricting access to this content to the group and enabling the technical documenting creation copyrights to be associated with any content generated.
- These users have a communal mechanism for culling the results of research on the Net, all in one web-based interface.
- the method 60 includes project management features which allows different format documents such as word, HTML, XML, and EXCEL, or graphics files to be stored together in association with a common project name 100, such as mentioned above in association with the project management module.
- project management features which allows different format documents such as word, HTML, XML, and EXCEL, or graphics files to be stored together in association with a common project name 100, such as mentioned above in association with the project management module.
- users can add URLs to web pages, cache web pages of interest, define links, and save documents, all within the project-based, group browsing application.
- RPC remote procedure call
- ActiveX and COM Common Object Model
- the server imports, stores, arbitrates access and re-transmits documents and application data files (spreadsheets, CAD drawings etc) to clients for local editing and resubmission to the server.
- chat facilities and optional text to speech (TTS) software can conduct real-time group chat.
- the project-based, group browser provides, via an Internet connection (or alternatively via a simple TCP/IP network connection without the need for other web server software), a generic web interface, with functionalities already described in association with the project-based browsing method, enabling web surfing, providing web tracking history, bookmarking, establishing links, the creation of an HTML page or set of HTML pages, the posting of documents, pictures, database files and other media, as well as other features - all of which can be shared by the group.
- any group participant can enhance the value of the collaboration by adding his or her own contributions (bookmarks, links, search results, new content, etc).
- the group founder tailors the initial interface to indicate the name of the group, any relevant information, or group procedures or rules. Group members submit requests or suggestions to the group founder.
- suggestions include attachments of documents of interest and research summanes on topics of interest, together with the researcher/group member's comments on each site in the ⁇ ng.
- the group member can add the suggestion to the project tree structure at the appropriate point, such as under the member name or under a project folder that has to do with the particular topic.
- the group founder creates a subdomain HTML page under the domain of the purveyor of the system. Similar to the Netscape Communicator or Internet Explorer, a participant can set his or her computer default home-page to this subdomain, the newly initiated project-based, group browser interface for the group.
- the project-based, group browser is a secure application.
- simple projects - such as friends wishing to share their interests, favonte web sites, family news, creating a wedding registry, etc.
- a name and password would be sufficient to gain access to the full features of the project-based, group browser.
- the name and password combination is the most prevalent access system on the Net today, used even by financial services such as E*Trade. If a higher level of security is required, digital signatures can be required of and issued to group participants. This would be an optional feature, like many others, that any group could itself choose to implement (either at the outset or as the project-based, group project evolves).
- E*Trade application in which an individual account holder's data resides with E*Trade (unless downloaded for tax purposes, for example), all information that is generated through use of the project-based, group browser is accessed and processed remotely.
- the purveyor of the system provides the technical infrastructure and services, including servers, dBs, firewall, hosting and web site services, etc.
- a nghts management module is provided so that users can define and regulate several key aspects, such as: ( ⁇ ) who autho ⁇ zes adding or removing group members;
- This control is provided through an access control matrix having tailored permission sets for each user or user types
- the permission sets are determined by the group founder, meaning that a user with special privileges is able to define and determine the rights management structure for a project- based, group browsing project, using a flexible anay or options that would be provided through the browser software
- the method 60 runs on servers 54 and systems provided by the purveyor of the system and managed by a system administrator.
- the system administrator automatically upgrades the software for use by current project-based, group browser groups, so that the most up-to-date platform is always supplied.
- technology advances e.g., broadband connectivity
- new features video, audio, conferencing, etc.
- none of the hardware or software that enables the project-based, group browser to run need be located at the client level.
- individuals, such as the individual artists mentioned above need not concern themselves with technological complexities, capital expenditures and associated start-up issues.
- the group better able to afford to use a highly evolved application, but they are free to devote themselves to the non- technology work and ideas in which they are interested
- server-based embodiment is completely compatible with the client-side embodiment.
- the project folders and research summanes created by the client-side application can be imported, synchronized and merged with the server-side application. In this manner, even when the server-side application is temporarily unavailable, inaccessible for some reason, or where the user has not subsc ⁇ bed to the server-side application, the user can continue to surf the Internet adding URL and commenting on their content.
- the project-based, group browser operates as a subscription service, in which use of the browser is rented for a certain penod, subject to renewal. Rental fees are based on the number of participants in a browser group, with the ability to add or remove members (e.g., payment of a monthly rental fee). If a group member wishes to leave the browser group, they will simply cancel prior to the end of the subsc ⁇ ption period. Alternatively, a one-time start-up fee may be charged.
- the method 60 encompasses, for a fee, other ASP applications that are automatically launched upon clicking on an icon of the particular element stored under the project name 100 of the group browsing method.
- the method may be integrated to include management of e-mails, documents, and general files associated with a common project name 100.
- This combined with the GUI 164' shown in FIG. 19 which includes a comment window 165, will enable navigation of the net, annotated with documents of other formats, to enhance the use of the net for instructional purposes.
- users are directed to perform research on the Internet, one project at a time.
- users are provided with tools needed to postpone possibly irrelevant research or research which should be directed to another project name, thus enabling them to perform research one project at a time.
- a system administrator may monitor Internet usage on a user basis, granting or denying access to particular catego ⁇ es of sites, depending on the business goals of the enterprise.
- the method demands the creation of an organized system of bookmarks and URL, organized in association with project names.
- the method permits collaborative browsing in which the experience gained from one person's research can be shared (through notations and comments) with others within the orgamzation. Further, by e-maihng importable project summaries to clients or outside service providers, the expe ⁇ ence gained within an organization can be shared with those outside an organization.
- the invention has a further technical effect m that the method causes the computer screen to present a user with control means which the user can use to more efficiently manage the downloading of information for viewing by the user on the computer screen.
- the method 60 controls or directs an Internet research session, and discourages random downloads from the Internet.
- the method upon access to a web page, permanently associates a URL associated with the web page with the user on a global navigation history associated with the project name accessible by other users. If the user merely activates the URL of the web page, the user may store the URL m a p ⁇ vate, user-editable presentation for later access, thus providing the user with a means of editably bookmarking interesting URLs while promoting focused research on the initial project, until the user has logged out of the project name. Still further, the method permits the storing for later access, and the p ⁇ ntmg of navigation history and research summary in association with a project name and user name. The resulting efficient acquisition of information is applicable industrially in every domain of technology.
- the invention involves technical issues such as the ordering and control of the communication paths selected to access digital information on a network.
- the figures illustrate one method for practicing the present invention.
- the flow diagrams described herein broadly illustrate the logical flow of steps to perform one embodiment of the present invention. Accordingly, numerous steps may be added to, or taken away from the flow diagrams, irrespective of any occasional use of the term "optionally", without departing from the scope of the invention
- the order of execution of the steps in the flow diagrams may be changed without departing from the scope of the invention. Additional considerations in implementing the method described by the flow diagrams may also dictate changes in the selection and order of the steps.
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002377303A CA2377303A1 (en) | 1999-06-30 | 2000-06-24 | Browsing method for focusing research |
IL14723900A IL147239A0 (en) | 1999-06-30 | 2000-06-24 | Browsing method for focusing research |
AU63376/00A AU780165B2 (en) | 1999-06-30 | 2000-06-24 | Browsing method for focusing research |
EP00950248A EP1208451A4 (en) | 1999-06-30 | 2000-06-24 | Browsing method for focusing research |
US09/951,572 US7249315B2 (en) | 1999-11-23 | 2001-09-13 | System and method of creating and following URL tours |
US10/032,405 US20020091836A1 (en) | 2000-06-24 | 2001-12-21 | Browsing method for focusing research |
US10/631,713 US20040030575A1 (en) | 2000-06-24 | 2003-08-01 | Research cost recovery and auditing system and method |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14125199P | 1999-06-30 | 1999-06-30 | |
US60/141,251 | 1999-06-30 | ||
US14739299P | 1999-08-06 | 1999-08-06 | |
US60/147,392 | 1999-08-06 | ||
US15287199P | 1999-09-08 | 1999-09-08 | |
US60/152,871 | 1999-09-08 | ||
US44729399A | 1999-11-23 | 1999-11-23 | |
US09/447,293 | 1999-11-23 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US44729399A Continuation-In-Part | 1999-06-30 | 1999-11-23 | |
US09/951,572 Continuation-In-Part US7249315B2 (en) | 1999-11-23 | 2001-09-13 | System and method of creating and following URL tours |
US10/032,405 Continuation US20020091836A1 (en) | 2000-06-24 | 2001-12-21 | Browsing method for focusing research |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001001275A1 true WO2001001275A1 (en) | 2001-01-04 |
Family
ID=27495463
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/017409 WO2001001275A1 (en) | 1999-06-30 | 2000-06-24 | Browsing method for focusing research |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1208451A4 (en) |
AU (1) | AU780165B2 (en) |
CA (1) | CA2377303A1 (en) |
IL (1) | IL147239A0 (en) |
WO (1) | WO2001001275A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7469222B1 (en) * | 1999-04-08 | 2008-12-23 | Zap.Com Corporation | System and method of consistent internet web site banners that provide portal-like functionality |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933827A (en) * | 1996-09-25 | 1999-08-03 | International Business Machines Corporation | System for identifying new web pages of interest to a user |
US6055538A (en) * | 1997-12-22 | 2000-04-25 | Hewlett Packard Company | Methods and system for using web browser to search large collections of documents |
US6073135A (en) * | 1998-03-10 | 2000-06-06 | Alta Vista Company | Connectivity server for locating linkage information between Web pages |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5809250A (en) * | 1996-10-23 | 1998-09-15 | Intel Corporation | Methods for creating and sharing replayable modules representive of Web browsing session |
-
2000
- 2000-06-24 CA CA002377303A patent/CA2377303A1/en not_active Abandoned
- 2000-06-24 AU AU63376/00A patent/AU780165B2/en not_active Ceased
- 2000-06-24 WO PCT/US2000/017409 patent/WO2001001275A1/en not_active Application Discontinuation
- 2000-06-24 EP EP00950248A patent/EP1208451A4/en not_active Withdrawn
- 2000-06-24 IL IL14723900A patent/IL147239A0/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933827A (en) * | 1996-09-25 | 1999-08-03 | International Business Machines Corporation | System for identifying new web pages of interest to a user |
US6055538A (en) * | 1997-12-22 | 2000-04-25 | Hewlett Packard Company | Methods and system for using web browser to search large collections of documents |
US6073135A (en) * | 1998-03-10 | 2000-06-06 | Alta Vista Company | Connectivity server for locating linkage information between Web pages |
Non-Patent Citations (1)
Title |
---|
See also references of EP1208451A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7469222B1 (en) * | 1999-04-08 | 2008-12-23 | Zap.Com Corporation | System and method of consistent internet web site banners that provide portal-like functionality |
US9369534B2 (en) | 1999-04-08 | 2016-06-14 | Zap.Com Corporation | System and method of consistent internet web site banners that provide portal-like functionality |
Also Published As
Publication number | Publication date |
---|---|
EP1208451A1 (en) | 2002-05-29 |
EP1208451A4 (en) | 2006-09-06 |
AU780165B2 (en) | 2005-03-03 |
AU6337600A (en) | 2001-01-31 |
IL147239A0 (en) | 2002-08-14 |
CA2377303A1 (en) | 2001-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7249315B2 (en) | System and method of creating and following URL tours | |
US20020091836A1 (en) | Browsing method for focusing research | |
US20080148193A1 (en) | System and method of efficient web browsing | |
Dochartaigh | The internet research handbook: A practical guide for students and researchers in the social sciences | |
US8805814B2 (en) | Methods and systems for searching databases and displaying search results | |
US8095875B2 (en) | Method and apparatus for consolidating network information | |
US20020165856A1 (en) | Collaborative research systems | |
US20050227218A1 (en) | Learning system based on metadata framework and indexed, distributed and fragmented content | |
US20090210391A1 (en) | Method and system for automated search for, and retrieval and distribution of, information | |
US20080028025A1 (en) | Method and system for managing preferred web site links | |
EP2047377A2 (en) | Method and system for sharing and accessing resources | |
US20060074843A1 (en) | World wide web directory for providing live links | |
Bhatnagar | Web-based library services | |
US20120005186A1 (en) | System and method for aggregating and interactive ranking of search engine results | |
AU780165B2 (en) | Browsing method for focusing research | |
De Bra et al. | Searching for arbitrary information in the world-wide web: the fish-search for mosaic | |
Wiggins | The University of Minnesota's Internet Gopher System: A tool for accessing network-based electronic information | |
Sharma et al. | Search engine: a backbone for information extraction in ICT scenario | |
Arora | Web-based digital resources and services: trends and innovations | |
Brack et al. | Collection level description-the riding and agora experience | |
Ma et al. | Genesis of an electronic database expert system | |
Boss | Library portals | |
Kelly et al. | Running a World-Wide Web Service | |
Pandian et al. | Emerging technologies for knowledge resource management | |
Das | Subject gateways: the clever way to information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2377303 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 63376/00 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: IN/PCT/2002/00048/DE Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000950248 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2000 9146 Country of ref document: AT Date of ref document: 20010222 Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20009146 Country of ref document: AT |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 2000950248 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWG | Wipo information: grant in national office |
Ref document number: 63376/00 Country of ref document: AU |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000950248 Country of ref document: EP |