Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
That post was very informative...thanks smartbiz
KleenAir Systems, Inc. at the Forefront with Their Automotive Emission Technology as Featured on CEOcast.com
IRVINE, Calif.--Sept. 16, 2004--KleenAir Systems, Inc.. (OTCBB:KAIR) is pleased to announce that KleenAir Systems, Inc. President Lionel Simons has been featured on CEOcast.com.
Mr. Simons explained in his interview that KleenAir Systems Selective Catalytic Reduction (SCR) technology has already been tested in the UK where their technology is reducing Nitrogen Oxides. He went on to explain that there are high medical costs in the UK due to NOx inhalation. "KleenAir System's technologies will reduce deaths and medical expense burdens related to NOx inhalation on UK taxpayers," stated Lionel Simons, President of KleenAir Systems, Inc.
In the United States, KleenAir Systems, Inc. has been working with the various federal and state agencies such as the Environmental Protection Agency (EPA) to finalize testing protocols. In the First quarter of 2005, the company expects to have completed the EPA retrofit verification and then they can start generating direct revenues. KleenAir Systems, Inc. should be generating income through their UK affiliate in the Fourth quarter of this year.
To listen to the interview in its entirety, please visit http://www.ceocast.com.
About KleenAir Systems, Inc.
KleenAir is at the cutting edge of automotive emission reduction technology including Selective Catalytic Reduction (SCR), Diesel Particulate Filters, Diesel Oxidizing Catalysts and advanced catalytic technology that significantly reduces nitrogen oxides, carbon monoxide, hydrocarbon and particulates. These pollutants have been shown to be a major contributor to heart and lung disease.
About CEOcast
CEOcast is the premier source of original and syndicated streaming broadcast interviews of CEOs of public companies. CEOcast is distributed to millions of on-line investors at over 700 financial websites as well as to more than 20,000 portfolio managers, buy side analysts and traders at more than 3,300 North American Institutions.
Safe Harbor Statements
Certain statements in this release constitute forward-looking statements or statements which may be deemed or construed to be forward-looking statements within the meaning of the Private Placement Act of 1995. The words "forecast," "project," "intend," "expect," "should," "would," and similar expressions and all statements, which are not historical facts, are intended to identify forward-looking statements. These forward-looking statements involve and are subject to known and unknown risks, uncertainties and other factors which could cause the Company's actual results, performance (finance or operating) or achievements to differ from future results, performance (financing and operating) or achievements expressed or implied by such forward-looking statements. The above are more fully discussed in the Company's SEC filings.
http://www.theautochannel.com/news/2004/09/16/227689.html
About MRI: #msg-3297574
Company Website: http://www.nanosignalcorp.com
Authorized Shares: 500,000,000 Shares (June 21st, 2004)
Outstandings Shares: 253,757,788 7/21/04 (Including the 50,000,000 super prefeered.)
>>>Transfer Agent: Holladay Stock Transfer, Scottsdale, AZ 85251 #480-481-3940
>>>100Million Share Cancellation: #msg-3299648
SLICES is a groundbreaking software that manipulates raw data matrices obtained through the MRI scanning process. Through the use of advanced calculations (NanoSignal's EXACT method), SLICES is able to produce images that boast up to 10 times more clarity and resolutions than standard MRI processing softwares.
In addition to superior image quality, and because of the method of processing, SLICES is able to significantly reduce patient scan time and the need for patient call backs and rescanning. These factors also can contribute to a reduction in film consumption of up to 40%.
Radiologists and technologists utilizing SLICES reported the following advantages:
1) Patient scan times reduced by up to 50% while increasing comfort.
2) Increased information extraction.
3) Film consumption reduction of 30%-80%.
4) Reduced MRI operation costs and per patient billing.
5) Increased radiologist and technologist productivity due to:
>>> a) Rapid accurate review and visualization.
>>> b) Reduction of artifacts thus clearer imaging.
For more info regarding the above company's their relations with NeoMedia Technologies click here: #msg-3001148
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
NeoMedia's patents pertain to linking documents, objects and transactions directly to the Internet through a variety of auto-ID technologies including bar code scanners, RF/ID, magnetic stripe cards, audio coding and voice recognition input, pertinent in a number of mobile commerce applications, including use with
digital and analog cell phones over audio portals.
PaperClick and the surrounding technologies have the ability to "Link the Physical World to the Internet". Big Gig Strategies is currently in discussions with
the mobile operators in the UK, brand owners and media houses. The UK will be the lead market closely followed by Italy, Germany, France and Spain.
PaperClick is protected by United States Patent Nos. 5,933,829, 5,978,773, 6,108,656, 6,199,048 and 6,542,933 as well as other patents pending and/or foreign patents, copyright, trademark, trade secret laws and/or international treaty provisions. Copyright © 2000-2003 NeoMedia Technologies, Inc. All Rights Reserved.
In addition, NeoMedia has numerous other patent applications pending in this area.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
"12SNAP has begun mobile voucher pilot trials in partnership with iCoupon, using bar codes sent by high street retailers to picture messaging-compatible-
handsets."
1. PaperClick Applications: (Last Update: 03 May, 2004 12:30 PM) #msg-3002282
2. Board Members Info: (Last Update: 03 May, 2004 12:30 PM) #msg-3001902
3. Competition/Infringers: (Last Update: 12 June, 2004 1:57 PM) #msg-3318711
4. Important Links: (Last Update: 02 May, 2004 1:15 AM) #msg-3002324
6. Intellectual Property: (Last Update: 12 June, 2004 1:05 PM) #msg-3318541
7. How does PaperClick work?: (Last Update: 03 May, 2004 7:00 AM) #msg-2997858
8. On the News: (Last Update: 02 May, 2004 1:15 AM) #msg-2992650
9. What's New?: (Last Update: 02 May, 2004 1:15 AM #msg-2992657
"We are pleased to be working with some of the bluest of blue chip marketing companies in the UK - or anywhere."
Contract w/12snap: http://www.12snap.com/uk/show_room/index.php
We keep this board clean. Spam is not tolerated. If you feel like your post being deleted was a mistake email me @ smartbiz85@yahoo.com.
Competition:
AirClic Inc.: "A Web-based services company providing the mobile information market with quick, low cost, operationally efficient, highly reliable, low risk solutions. It works with public and private sector companies to enable their field workers to wirelessly capture business events using existing business processes and systems. AirClic services work even while without mobile coverage or when the existing business systems are down and confirm the customers' information was delivered, using "at least once" communication technology. The user experience for the field personnel is familiar and simple - just scan a SmartCode associated with an event or asset and hear the beep. AirClic's customers and their constituents may see the captured information from any Web-enabled device and may extract it into several multiple back-office systems at any frequency. AirClic charges a recurring service fee for customers to obtain a rapid and often immediate return on investment. AirClic Inc. is headquartered in Newtown, PA, USA." http://www.airclic.com
Bango.net: "Provides a globally deployed service that enables interactive mobile content and services to be simply accessed, readily promoted and easily charged for, across all mobile operators in more than 40 countries. Bango works with many industry leaders including Vodafone, Orange, T-Mobile, Telefonica and O2. More than one thousand content providers world-wide promote and charge for their content and services using Bango. The company is headquartered in Cambridge, England. For further information, go toBango works with many industry leaders including Vodafone, Orange, T-Mobile, Telefonica and O2. Thousands of content providers world-wide promote and charge for their content and services using Bango. The company is headquartered in Cambridge, England. http://www.bango.net.
LScan Technologies, Inc.: "Provides tracking and data capture solutions that enable life sciences companies to solve business and regulatory challenges through the advanced use of technology. Located in Conshocken, Pennsylvania, LScan was voted the "Company Most Likely To Go Public" by the 2003 New Jersey Technology Council. LScan is also a member of, and is supported by, the Ben Franklin Technology Partners of Southeastern Pennsylvania (BFTP/SEP)." http://www.lscan.com
MusiKube: MusiKube is a leading developer of music recognition and discovery solutions. The company has developed a suite of mobile and web-based services that give consumers the tools to capture music that interests them wherever and whenever they come across it.
Scanbuy(R), Inc.: "A New York-based software company dedicated to developing solutions that link the physical world and the online environment using personal barcode scanners. Utilizing patent-pending technology, Scanbuy's ScanZoom technology transforms cellphone cameras into barcode scanners." http://www.scanbuy.com
Semacode: "Simply put, a semacode is a URL barcode. Using our free software, you can scan a semacode, and with just one click the proper webpage will be loaded on your phone's browser. The system is open and extensible, and anyone can create semacodes on their own computer." http://semacode.org/
Intellectual Property:
==================================================================================
Connecting the Physical World to the Electronic World
NeoMedia Technologies has a suite of six issued patents covering core concepts behind our techniques for linking the physical world to the electronic world. These patents cover various linkage methods including:
-Barcodes
-RF/ID
-Other machine readable and keyed entry identifiers
http://patft.uspto.gov/netahtml/search-bool.html
1. Automatic Access of Electronic Information Through Secure Machine-Readable Codes on Printed Documents;
The present invention is a secure system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol is encoded with source data (including a file location pointer) that is first obfuscated by generating a checksum of the source data, encrypting the source data by using the checksum as an encryption key, and assembling the checksum with the encrypted source data prior to encoding. The machine-readable symbol is then printed and distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, and de-obfuscates the scanned data by parsing the checksum, decrypting the remainder of the scanned data string (which includes the file location pointer) using the parsed checksum as a decryption key, computing a checksum of the decrypted data string, and comparing the computed checksum with the parsed checksum to determine the validity of the code. The file location pointer is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
2. System and Method for Using an Ordinary Article of Commerce to Access a Remote Computer;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
3. Automatic access of electronic information through machine-readable codes on printed documents;
The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user's name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
4. System and method for automatic access of a remote computer over a network;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the prodoct's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information in then used to access the desired resource. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
5. Method and system for accessing electronic resources via machine-readable data on intelligent documents;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
6. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources;
The present invention operates by inputting into the client computer a linkage code (a machine readable code such as a bar code symbol or a human-readable alphanumeric text string) that includes a server identification code and an item identification code. The client computer then extracts the server identification code, and obtains from local cache or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
==================================================================================
-Pending Patents
http://www.wipo.int/ipdl/en/index.jsp
1. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+71115+BASICHTML-ENG....
2. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+90043+BASICHTML-ENG....
3. METHOD AND SYSTEM FOR ACCESSING ELECTRONIC RESOURCES VIA MACHINE-READABLE DATA ON INTELLIGENT DOCUMENTS;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107199+BASICHTML-EN....
4. SCANNER ENHANCED REMOTE CONTROL UNIT AND SYSTEM FOR AUTOMATICALLY LINKING TO ON-LINE RESOURCES;
A method for providing remote access to on-line resources comprising the steps of encoding address and access information and optional source identification information, embedding the encoded information onto a document (14), scanning the document with a scanner enhanced remote control unit (10, 10A), transmitting the scanned information, receiving the transmitted information, optionally processing the received information, optionally collecting the user demographic and source identification information, retrieving the on-line ressource, and displaying the on-line resource to a user. Also an apparatus which provides remote access to on-line resources comprising an encoder of address and access information and optional source identification information, an embedding system, a scanner enhanced remote control unit (10, 10A) comprising a scanning system (22), a transmitter (24), a receiver (20A), an optional processor, an optional collector of the user demographic and source identification information, a retrieving system, and a display system (20). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107200+BASICHTML-EN....
5. METHOD FOR EMBEDDING LINKS TO A NETWORKED RESOURCE IN A TRANSMISSION MEDIUM;
A method for providing a link between an information signal (98, 100) (such as a broadcast and cable television and/or radio signals) and networked resources (such as the Internet) comprising the steps of embedding access information in a transmission medium, the access information adapted to provide access to content of the networked resource relevant to content of the information signal, transmitting the information signal and the access information (98, 100), receiving the information signal and the access information at a user terminal, extracting the access information from the transmission medium, utilizing the access information to access the networked resource with an access signal (102, 104), and displaying content of the networked resource on the user terminal corresponding to the access information. Embodiments are provided wherein the information signal (98, 100) is provided by the networked resource provider or a distinct audio/video signal content provider (94) via wired (98) and wireless (100) means. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107241+BASICHTML-EN....
6. METHOD AND APPARATUS FOR LINKING CONSUMER PRODUCT INTEREST WITH PRODUCT SUPPLIERS;
A method and system are provided for collecting product-specific information from a collecting device (302), which is transmitted to facilitating organization where information is aggregated (304) and provided to product suppliers in an anonymous fashion (306). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+363159+BASICHTML-EN....
7. SYSTEM AND METHOD FOR LINKING ONLINE RESOURCES TO PRINT MEDIA AND AUTHORING TOOL FOR SAME;
A network-based system and method permit a publisher (12) to generate and encode content to be readily accessed by codes (16) or indicia, such as bar codes, and which may be associated with advertising related to the content via the codes. The system supports composer, reader, discovery, and static web page interfaces for permitting users (26) to act as publishers (12), readers, or browsers (28), using the codes for efficient and rapid access of content. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+332859+BASICHTML-EN....
8. SYSTEM AND METHOD OF USING MACHINE-READABLE OR HUMAN-READABLE LINKAGE CODES FOR ACCESSING NETWORKED DATA RESOURCES;
A method and system for providing a primary content file to a client computer (20) that is interconnected over a computer network (16) with an information server computer (50), a routing server computer (40), a content server computer (60), and a registration server computer (30). The present invention operates by inputting into the client computer a linkage code (10) (a machine readable code such as a bar code symbol (104) or a human-readable alphanumeric text string (106)) that includes a server identification code (110) and an item identification code (112). The client computer then extracts the server identification code, and obtains from local cache (27) or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. At the information server, the location of the primary content file is determined based on the item identification code, and the information server provides the client computer with the primary content file by either redirecting it to the primary content server computer or obtaining it from local storage. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+266015+BASICHTML-EN....
9. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+122208+BASICHTML-EN....
10. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+137931+BASICHTML-EN....
11. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+151449+BASICHTML-EN....
12. METHOD AND APPARATUS FOR OBTAINING CONSUMER DATA IN EXCHANGE FOR CONSUMER INCENTIVES VIA A NETWORKED RESOURCE;
A method and apparatus for obtaining consumer data in exchange for consumer incentives at a point-of-sale including a scanner (12), a personal computer (14), a monitor (16), a mouse (20), and a laser printer (22). A consumer selects merchandise from a display and purchases it. Thereafter, the consumer enters a kiosk enclosing the apparatus and scans a machine-readable code on one ore more tags affixed to the merchandise. A registration form is displayed, which the consumer completes by inserting demographic data. Consumer data comprising the merchandise data and demographic data is transmitted via the Internet to a data management center for storage, collation, analysis and distribution. Upon receipt of the consumer data optionally including the results or outcome of the game via the Internet, the data management center provides the apparatus with incentive data via the Internet. The incentive data is printed on the laser printer (22) and made available to the consumer.
http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+202600+BASICHTML-EN....
13. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. In another embodiment, a two-stage imaging or watermark process captures an image of indicia within an area defined by a ultraviolet coating (30), prepares a bit map thereof and encodes the bit map and/or a derivative thereof in machine-readable symbols that are then printed on the secure document (12). Intrinsic verification of the secure document (12) is accomplished by comparing actual physical measurements and scannings of the secure document with the data content of the machine-readable symbols appearing on the secure document. Extrinsic verification of the secure document is accomplished by comparing information content resident in local and/or remote databases concerning the secure document or its transfer with the data content of the machine-readable symbols appearing on the secure document.
14. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e., one dimensional) barcode (102) which enables a direct link to a designated host computer (120) without third party intervention. Additional information such as client demographics and usage, and data regarding the publication within which the barcode was discovered may be made available to the designated host (120). Access is restricted to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer (104).
15. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e. one dimensional) barcode which enables a direct link to a designated host computer without third party intervention. Additional information may be made available to the designated host or other parties directly or through a commercial server which include but are not limited to client demographics and usage, and data regarding the publication within which the barcode was discovered by the client. The present invention also contemplates a method which restricts access to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer. The present invention pertains to both "open" and "closed" Internet implementations such as TCP/IP and client/server environments (e.g. World Wide Web and html). The invention may be adapted to a wide variety of software and hardware applications available to the typical client such as personal computers equipped with appropriate communications and session software, workstations, dedicated network computers, handheld terminals, and web-ready television.
16. SYSTEM FOR ACCESSING INTERNET VIA WIRELESS DEVICE USING LINKAGE URL BAR-CODE;
A system for accessing a primary content file (206) with a client device (200) that is browser-based (WAP); i.e., that does not require a plug-in type program to be executed on the client device in addition to the browser. URLs based on linkage codes entered into the client device (200) are assembled by a network-based URL-assembly server (202) rather than at the client device, wherein the client device is a wireless device supporting WML content or HTML content.
==================================================================================
Secure Source Technologies
As part of its acquisition of Secure Source Technologies, a provider of security solutions and a pioneer in covert security technology for the manufacturing and financial services industries, NeoMedia gained a suite of seven additional U.S. and Canadian patents as well as other Intellectual Property. A broad range of companies, including Bayer AG, ESPN, American Cyanamid, Bank of Taiwan, American Express, Republic Bank, J.P. Morgan Chase, and others have already licensed, paid fees or royalties for use of the patents or have purchased products incorporating these patents and IP.
http://patft.uspto.gov/netahtml/search-bool.html
1. Machine readable document;
A machine readable document is disclosed with unknown variable data of a specified nature imprinted thereon in unknown, variable locations. The data is imprinted on the document in such a manner that it can be machine located, accurately read, and identified as to type for further use in creating a composite record. In one embodiment, the document is a negotiable instrument or bank check which can be machine read and used in the production of a composite image statement. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
2. Negotiable instrument;
A negotiable instrument operable for automatic bank scanning and processing wherein the negotiable instrument includes three field areas to receive maker, payee, and amount indicia. A fluorescent ink is applied as background on at least one of the field areas of the negotiable instrument. When ultraviolet light is used to illuminate the negotiable instrument indicia added on top of the fluorescent ink may be automatically detected and scanned. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
3. Machine readable document and method for processing;
A method for processing a document including the steps of applying a source of energy to the document having at least one generally rectangular field area with a coating, scanning the document to locate the coated filed, reading only the indicia highlighted, reading a code to determine the character of the indicia, developing digital information signals, and storing the digital information. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
4. Security document;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible ink that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
5. Methods for detecting fraudulent instruments;
Methods for detecting fraudulent documents utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
6. Security system;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to an algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta....
==================================================================================
Intellectual Property:
Connecting the Physical World to the Electronic World
NeoMedia Technologies has a suite of six issued patents covering core concepts behind our techniques for linking the physical world to the electronic world. These patents cover various linkage methods including:
-Barcodes
-RF/ID
-Other machine readable and keyed entry identifiers
1. Automatic Access of Electronic Information Through Secure Machine-Readable Codes on Printed Documents;
The present invention is a secure system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol is encoded with source data (including a file location pointer) that is first obfuscated by generating a checksum of the source data, encrypting the source data by using the checksum as an encryption key, and assembling the checksum with the encrypted source data prior to encoding. The machine-readable symbol is then printed and distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, and de-obfuscates the scanned data by parsing the checksum, decrypting the remainder of the scanned data string (which includes the file location pointer) using the parsed checksum as a decryption key, computing a checksum of the decrypted data string, and comparing the computed checksum with the parsed checksum to determine the validity of the code. The file location pointer is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. System and Method for Using an Ordinary Article of Commerce to Access a Remote Computer;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
3. Automatic access of electronic information through machine-readable codes on printed documents;
The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user's name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
4. System and method for automatic access of a remote computer over a network;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the prodoct's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information in then used to access the desired resource. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
5. Method and system for accessing electronic resources via machine-readable data on intelligent documents;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
6. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources;
The present invention operates by inputting into the client computer a linkage code (a machine readable code such as a bar code symbol or a human-readable alphanumeric text string) that includes a server identification code and an item identification code. The client computer then extracts the server identification code, and obtains from local cache or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
-Pending Patents
1. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+71115+BASICHTML-ENG...
2. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+90043+BASICHTML-ENG...
3. METHOD AND SYSTEM FOR ACCESSING ELECTRONIC RESOURCES VIA MACHINE-READABLE DATA ON INTELLIGENT DOCUMENTS;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107199+BASICHTML-EN...
4. SCANNER ENHANCED REMOTE CONTROL UNIT AND SYSTEM FOR AUTOMATICALLY LINKING TO ON-LINE RESOURCES;
A method for providing remote access to on-line resources comprising the steps of encoding address and access information and optional source identification information, embedding the encoded information onto a document (14), scanning the document with a scanner enhanced remote control unit (10, 10A), transmitting the scanned information, receiving the transmitted information, optionally processing the received information, optionally collecting the user demographic and source identification information, retrieving the on-line ressource, and displaying the on-line resource to a user. Also an apparatus which provides remote access to on-line resources comprising an encoder of address and access information and optional source identification information, an embedding system, a scanner enhanced remote control unit (10, 10A) comprising a scanning system (22), a transmitter (24), a receiver (20A), an optional processor, an optional collector of the user demographic and source identification information, a retrieving system, and a display system (20). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107200+BASICHTML-EN...
5. METHOD FOR EMBEDDING LINKS TO A NETWORKED RESOURCE IN A TRANSMISSION MEDIUM;
A method for providing a link between an information signal (98, 100) (such as a broadcast and cable television and/or radio signals) and networked resources (such as the Internet) comprising the steps of embedding access information in a transmission medium, the access information adapted to provide access to content of the networked resource relevant to content of the information signal, transmitting the information signal and the access information (98, 100), receiving the information signal and the access information at a user terminal, extracting the access information from the transmission medium, utilizing the access information to access the networked resource with an access signal (102, 104), and displaying content of the networked resource on the user terminal corresponding to the access information. Embodiments are provided wherein the information signal (98, 100) is provided by the networked resource provider or a distinct audio/video signal content provider (94) via wired (98) and wireless (100) means. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107241+BASICHTML-EN...
6. METHOD AND APPARATUS FOR LINKING CONSUMER PRODUCT INTEREST WITH PRODUCT SUPPLIERS;
A method and system are provided for collecting product-specific information from a collecting device (302), which is transmitted to facilitating organization where information is aggregated (304) and provided to product suppliers in an anonymous fashion (306). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+363159+BASICHTML-EN...
7. SYSTEM AND METHOD FOR LINKING ONLINE RESOURCES TO PRINT MEDIA AND AUTHORING TOOL FOR SAME;
A network-based system and method permit a publisher (12) to generate and encode content to be readily accessed by codes (16) or indicia, such as bar codes, and which may be associated with advertising related to the content via the codes. The system supports composer, reader, discovery, and static web page interfaces for permitting users (26) to act as publishers (12), readers, or browsers (28), using the codes for efficient and rapid access of content. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+332859+BASICHTML-EN...
8. SYSTEM AND METHOD OF USING MACHINE-READABLE OR HUMAN-READABLE LINKAGE CODES FOR ACCESSING NETWORKED DATA RESOURCES;
A method and system for providing a primary content file to a client computer (20) that is interconnected over a computer network (16) with an information server computer (50), a routing server computer (40), a content server computer (60), and a registration server computer (30). The present invention operates by inputting into the client computer a linkage code (10) (a machine readable code such as a bar code symbol (104) or a human-readable alphanumeric text string (106)) that includes a server identification code (110) and an item identification code (112). The client computer then extracts the server identification code, and obtains from local cache (27) or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. At the information server, the location of the primary content file is determined based on the item identification code, and the information server provides the client computer with the primary content file by either redirecting it to the primary content server computer or obtaining it from local storage. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+266015+BASICHTML-EN...
9. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+122208+BASICHTML-EN...
10. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+137931+BASICHTML-EN...
11. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+151449+BASICHTML-EN...
12. METHOD AND APPARATUS FOR OBTAINING CONSUMER DATA IN EXCHANGE FOR CONSUMER INCENTIVES VIA A NETWORKED RESOURCE;
A method and apparatus for obtaining consumer data in exchange for consumer incentives at a point-of-sale including a scanner (12), a personal computer (14), a monitor (16), a mouse (20), and a laser printer (22). A consumer selects merchandise from a display and purchases it. Thereafter, the consumer enters a kiosk enclosing the apparatus and scans a machine-readable code on one ore more tags affixed to the merchandise. A registration form is displayed, which the consumer completes by inserting demographic data. Consumer data comprising the merchandise data and demographic data is transmitted via the Internet to a data management center for storage, collation, analysis and distribution. Upon receipt of the consumer data optionally including the results or outcome of the game via the Internet, the data management center provides the apparatus with incentive data via the Internet. The incentive data is printed on the laser printer (22) and made available to the consumer.
http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+202600+BASICHTML-EN...
13. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. In another embodiment, a two-stage imaging or watermark process captures an image of indicia within an area defined by a ultraviolet coating (30), prepares a bit map thereof and encodes the bit map and/or a derivative thereof in machine-readable symbols that are then printed on the secure document (12). Intrinsic verification of the secure document (12) is accomplished by comparing actual physical measurements and scannings of the secure document with the data content of the machine-readable symbols appearing on the secure document. Extrinsic verification of the secure document is accomplished by comparing information content resident in local and/or remote databases concerning the secure document or its transfer with the data content of the machine-readable symbols appearing on the secure document.
14. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e., one dimensional) barcode (102) which enables a direct link to a designated host computer (120) without third party intervention. Additional information such as client demographics and usage, and data regarding the publication within which the barcode was discovered may be made available to the designated host (120). Access is restricted to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer (104).
15. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e. one dimensional) barcode which enables a direct link to a designated host computer without third party intervention. Additional information may be made available to the designated host or other parties directly or through a commercial server which include but are not limited to client demographics and usage, and data regarding the publication within which the barcode was discovered by the client. The present invention also contemplates a method which restricts access to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer. The present invention pertains to both "open" and "closed" Internet implementations such as TCP/IP and client/server environments (e.g. World Wide Web and html). The invention may be adapted to a wide variety of software and hardware applications available to the typical client such as personal computers equipped with appropriate communications and session software, workstations, dedicated network computers, handheld terminals, and web-ready television.
16. SYSTEM FOR ACCESSING INTERNET VIA WIRELESS DEVICE USING LINKAGE URL BAR-CODE;
A system for accessing a primary content file (206) with a client device (200) that is browser-based (WAP); i.e., that does not require a plug-in type program to be executed on the client device in addition to the browser. URLs based on linkage codes entered into the client device (200) are assembled by a network-based URL-assembly server (202) rather than at the client device, wherein the client device is a wireless device supporting WML content or HTML content.
Secure Source Technologies
As part of its acquisition of Secure Source Technologies, a provider of security solutions and a pioneer in covert security technology for the manufacturing and financial services industries, NeoMedia gained a suite of seven additional U.S. and Canadian patents as well as other Intellectual Property. A broad range of companies, including Bayer AG, ESPN, American Cyanamid, Bank of Taiwan, American Express, Republic Bank, J.P. Morgan Chase, and others have already licensed, paid fees or royalties for use of the patents or have purchased products incorporating these patents and IP.
1. Machine readable document;
A machine readable document is disclosed with unknown variable data of a specified nature imprinted thereon in unknown, variable locations. The data is imprinted on the document in such a manner that it can be machine located, accurately read, and identified as to type for further use in creating a composite record. In one embodiment, the document is a negotiable instrument or bank check which can be machine read and used in the production of a composite image statement. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. Negotiable instrument;
A negotiable instrument operable for automatic bank scanning and processing wherein the negotiable instrument includes three field areas to receive maker, payee, and amount indicia. A fluorescent ink is applied as background on at least one of the field areas of the negotiable instrument. When ultraviolet light is used to illuminate the negotiable instrument indicia added on top of the fluorescent ink may be automatically detected and scanned. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
3. Machine readable document and method for processing;
A method for processing a document including the steps of applying a source of energy to the document having at least one generally rectangular field area with a coating, scanning the document to locate the coated filed, reading only the indicia highlighted, reading a code to determine the character of the indicia, developing digital information signals, and storing the digital information. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
4. Security document;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible ink that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
5. Methods for detecting fraudulent instruments;
Methods for detecting fraudulent documents utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
6. Security system;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to an algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
Intellectual Property:
Connecting the Physical World to the Electronic World
NeoMedia Technologies has a suite of six issued patents covering core concepts behind our techniques for linking the physical world to the electronic world. These patents cover various linkage methods including:
-Barcodes
-RF/ID
-Other machine readable and keyed entry identifiers
1. Automatic Access of Electronic Information Through Secure Machine-Readable Codes on Printed Documents;
The present invention is a secure system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol is encoded with source data (including a file location pointer) that is first obfuscated by generating a checksum of the source data, encrypting the source data by using the checksum as an encryption key, and assembling the checksum with the encrypted source data prior to encoding. The machine-readable symbol is then printed and distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, and de-obfuscates the scanned data by parsing the checksum, decrypting the remainder of the scanned data string (which includes the file location pointer) using the parsed checksum as a decryption key, computing a checksum of the decrypted data string, and comparing the computed checksum with the parsed checksum to determine the validity of the code. The file location pointer is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. System and Method for Using an Ordinary Article of Commerce to Access a Remote Computer;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
3. Automatic access of electronic information through machine-readable codes on printed documents;
The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user's name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
4. System and method for automatic access of a remote computer over a network;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the prodoct's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information in then used to access the desired resource. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
5. Method and system for accessing electronic resources via machine-readable data on intelligent documents;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
6. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources;
The present invention operates by inputting into the client computer a linkage code (a machine readable code such as a bar code symbol or a human-readable alphanumeric text string) that includes a server identification code and an item identification code. The client computer then extracts the server identification code, and obtains from local cache or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
-Pending Patents
1. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+71115+BASICHTML-ENG...
2. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+90043+BASICHTML-ENG...
3. METHOD AND SYSTEM FOR ACCESSING ELECTRONIC RESOURCES VIA MACHINE-READABLE DATA ON INTELLIGENT DOCUMENTS;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107199+BASICHTML-EN...
4. SCANNER ENHANCED REMOTE CONTROL UNIT AND SYSTEM FOR AUTOMATICALLY LINKING TO ON-LINE RESOURCES;
A method for providing remote access to on-line resources comprising the steps of encoding address and access information and optional source identification information, embedding the encoded information onto a document (14), scanning the document with a scanner enhanced remote control unit (10, 10A), transmitting the scanned information, receiving the transmitted information, optionally processing the received information, optionally collecting the user demographic and source identification information, retrieving the on-line ressource, and displaying the on-line resource to a user. Also an apparatus which provides remote access to on-line resources comprising an encoder of address and access information and optional source identification information, an embedding system, a scanner enhanced remote control unit (10, 10A) comprising a scanning system (22), a transmitter (24), a receiver (20A), an optional processor, an optional collector of the user demographic and source identification information, a retrieving system, and a display system (20). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107200+BASICHTML-EN...
5. METHOD FOR EMBEDDING LINKS TO A NETWORKED RESOURCE IN A TRANSMISSION MEDIUM;
A method for providing a link between an information signal (98, 100) (such as a broadcast and cable television and/or radio signals) and networked resources (such as the Internet) comprising the steps of embedding access information in a transmission medium, the access information adapted to provide access to content of the networked resource relevant to content of the information signal, transmitting the information signal and the access information (98, 100), receiving the information signal and the access information at a user terminal, extracting the access information from the transmission medium, utilizing the access information to access the networked resource with an access signal (102, 104), and displaying content of the networked resource on the user terminal corresponding to the access information. Embodiments are provided wherein the information signal (98, 100) is provided by the networked resource provider or a distinct audio/video signal content provider (94) via wired (98) and wireless (100) means. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107241+BASICHTML-EN...
6. METHOD AND APPARATUS FOR LINKING CONSUMER PRODUCT INTEREST WITH PRODUCT SUPPLIERS;
A method and system are provided for collecting product-specific information from a collecting device (302), which is transmitted to facilitating organization where information is aggregated (304) and provided to product suppliers in an anonymous fashion (306). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+363159+BASICHTML-EN...
7. SYSTEM AND METHOD FOR LINKING ONLINE RESOURCES TO PRINT MEDIA AND AUTHORING TOOL FOR SAME;
A network-based system and method permit a publisher (12) to generate and encode content to be readily accessed by codes (16) or indicia, such as bar codes, and which may be associated with advertising related to the content via the codes. The system supports composer, reader, discovery, and static web page interfaces for permitting users (26) to act as publishers (12), readers, or browsers (28), using the codes for efficient and rapid access of content. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+332859+BASICHTML-EN...
8. SYSTEM AND METHOD OF USING MACHINE-READABLE OR HUMAN-READABLE LINKAGE CODES FOR ACCESSING NETWORKED DATA RESOURCES;
A method and system for providing a primary content file to a client computer (20) that is interconnected over a computer network (16) with an information server computer (50), a routing server computer (40), a content server computer (60), and a registration server computer (30). The present invention operates by inputting into the client computer a linkage code (10) (a machine readable code such as a bar code symbol (104) or a human-readable alphanumeric text string (106)) that includes a server identification code (110) and an item identification code (112). The client computer then extracts the server identification code, and obtains from local cache (27) or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. At the information server, the location of the primary content file is determined based on the item identification code, and the information server provides the client computer with the primary content file by either redirecting it to the primary content server computer or obtaining it from local storage. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+266015+BASICHTML-EN...
9. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+122208+BASICHTML-EN...
10. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+137931+BASICHTML-EN...
11. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+151449+BASICHTML-EN...
12. METHOD AND APPARATUS FOR OBTAINING CONSUMER DATA IN EXCHANGE FOR CONSUMER INCENTIVES VIA A NETWORKED RESOURCE;
A method and apparatus for obtaining consumer data in exchange for consumer incentives at a point-of-sale including a scanner (12), a personal computer (14), a monitor (16), a mouse (20), and a laser printer (22). A consumer selects merchandise from a display and purchases it. Thereafter, the consumer enters a kiosk enclosing the apparatus and scans a machine-readable code on one ore more tags affixed to the merchandise. A registration form is displayed, which the consumer completes by inserting demographic data. Consumer data comprising the merchandise data and demographic data is transmitted via the Internet to a data management center for storage, collation, analysis and distribution. Upon receipt of the consumer data optionally including the results or outcome of the game via the Internet, the data management center provides the apparatus with incentive data via the Internet. The incentive data is printed on the laser printer (22) and made available to the consumer.
http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+202600+BASICHTML-EN...
13. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. In another embodiment, a two-stage imaging or watermark process captures an image of indicia within an area defined by a ultraviolet coating (30), prepares a bit map thereof and encodes the bit map and/or a derivative thereof in machine-readable symbols that are then printed on the secure document (12). Intrinsic verification of the secure document (12) is accomplished by comparing actual physical measurements and scannings of the secure document with the data content of the machine-readable symbols appearing on the secure document. Extrinsic verification of the secure document is accomplished by comparing information content resident in local and/or remote databases concerning the secure document or its transfer with the data content of the machine-readable symbols appearing on the secure document.
14. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e., one dimensional) barcode (102) which enables a direct link to a designated host computer (120) without third party intervention. Additional information such as client demographics and usage, and data regarding the publication within which the barcode was discovered may be made available to the designated host (120). Access is restricted to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer (104).
15. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e. one dimensional) barcode which enables a direct link to a designated host computer without third party intervention. Additional information may be made available to the designated host or other parties directly or through a commercial server which include but are not limited to client demographics and usage, and data regarding the publication within which the barcode was discovered by the client. The present invention also contemplates a method which restricts access to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer. The present invention pertains to both "open" and "closed" Internet implementations such as TCP/IP and client/server environments (e.g. World Wide Web and html). The invention may be adapted to a wide variety of software and hardware applications available to the typical client such as personal computers equipped with appropriate communications and session software, workstations, dedicated network computers, handheld terminals, and web-ready television.
16. SYSTEM FOR ACCESSING INTERNET VIA WIRELESS DEVICE USING LINKAGE URL BAR-CODE;
A system for accessing a primary content file (206) with a client device (200) that is browser-based (WAP); i.e., that does not require a plug-in type program to be executed on the client device in addition to the browser. URLs based on linkage codes entered into the client device (200) are assembled by a network-based URL-assembly server (202) rather than at the client device, wherein the client device is a wireless device supporting WML content or HTML content.
Secure Source Technologies
As part of its acquisition of Secure Source Technologies, a provider of security solutions and a pioneer in covert security technology for the manufacturing and financial services industries, NeoMedia gained a suite of seven additional U.S. and Canadian patents as well as other Intellectual Property. A broad range of companies, including Bayer AG, ESPN, American Cyanamid, Bank of Taiwan, American Express, Republic Bank, J.P. Morgan Chase, and others have already licensed, paid fees or royalties for use of the patents or have purchased products incorporating these patents and IP.
1. Machine readable document;
A machine readable document is disclosed with unknown variable data of a specified nature imprinted thereon in unknown, variable locations. The data is imprinted on the document in such a manner that it can be machine located, accurately read, and identified as to type for further use in creating a composite record. In one embodiment, the document is a negotiable instrument or bank check which can be machine read and used in the production of a composite image statement. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. Negotiable instrument;
A negotiable instrument operable for automatic bank scanning and processing wherein the negotiable instrument includes three field areas to receive maker, payee, and amount indicia. A fluorescent ink is applied as background on at least one of the field areas of the negotiable instrument. When ultraviolet light is used to illuminate the negotiable instrument indicia added on top of the fluorescent ink may be automatically detected and scanned. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
3. Machine readable document and method for processing;
A method for processing a document including the steps of applying a source of energy to the document having at least one generally rectangular field area with a coating, scanning the document to locate the coated filed, reading only the indicia highlighted, reading a code to determine the character of the indicia, developing digital information signals, and storing the digital information. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
4. Security document;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible ink that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
5. Methods for detecting fraudulent instruments;
Methods for detecting fraudulent documents utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
6. Security system;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to an algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
Intellectual Property:
Connecting the Physical World to the Electronic World
NeoMedia Technologies has a suite of six issued patents covering core concepts behind our techniques for linking the physical world to the electronic world. These patents cover various linkage methods including:
-Barcodes
-RF/ID
-Other machine readable and keyed entry identifiers
1. Automatic Access of Electronic Information Through Secure Machine-Readable Codes on Printed Documents;
The present invention is a secure system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol is encoded with source data (including a file location pointer) that is first obfuscated by generating a checksum of the source data, encrypting the source data by using the checksum as an encryption key, and assembling the checksum with the encrypted source data prior to encoding. The machine-readable symbol is then printed and distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, and de-obfuscates the scanned data by parsing the checksum, decrypting the remainder of the scanned data string (which includes the file location pointer) using the parsed checksum as a decryption key, computing a checksum of the decrypted data string, and comparing the computed checksum with the parsed checksum to determine the validity of the code. The file location pointer is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. System and Method for Using an Ordinary Article of Commerce to Access a Remote Computer;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource.
3. Automatic access of electronic information through machine-readable codes on printed documents;
The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user's name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet.
4. System and method for automatic access of a remote computer over a network;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the prodoct's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information in then used to access the desired resource.
5. Method and system for accessing electronic resources via machine-readable data on intelligent documents;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user.
6. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources;
The present invention operates by inputting into the client computer a linkage code (a machine readable code such as a bar code symbol or a human-readable alphanumeric text string) that includes a server identification code and an item identification code. The client computer then extracts the server identification code, and obtains from local cache or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request.
-Pending Patents
1. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+71115+BASICHTML-ENG...
2. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+90043+BASICHTML-ENG...
3. METHOD AND SYSTEM FOR ACCESSING ELECTRONIC RESOURCES VIA MACHINE-READABLE DATA ON INTELLIGENT DOCUMENTS;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107199+BASICHTML-EN...
4. SCANNER ENHANCED REMOTE CONTROL UNIT AND SYSTEM FOR AUTOMATICALLY LINKING TO ON-LINE RESOURCES;
A method for providing remote access to on-line resources comprising the steps of encoding address and access information and optional source identification information, embedding the encoded information onto a document (14), scanning the document with a scanner enhanced remote control unit (10, 10A), transmitting the scanned information, receiving the transmitted information, optionally processing the received information, optionally collecting the user demographic and source identification information, retrieving the on-line ressource, and displaying the on-line resource to a user. Also an apparatus which provides remote access to on-line resources comprising an encoder of address and access information and optional source identification information, an embedding system, a scanner enhanced remote control unit (10, 10A) comprising a scanning system (22), a transmitter (24), a receiver (20A), an optional processor, an optional collector of the user demographic and source identification information, a retrieving system, and a display system (20). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107200+BASICHTML-EN...
5. METHOD FOR EMBEDDING LINKS TO A NETWORKED RESOURCE IN A TRANSMISSION MEDIUM;
A method for providing a link between an information signal (98, 100) (such as a broadcast and cable television and/or radio signals) and networked resources (such as the Internet) comprising the steps of embedding access information in a transmission medium, the access information adapted to provide access to content of the networked resource relevant to content of the information signal, transmitting the information signal and the access information (98, 100), receiving the information signal and the access information at a user terminal, extracting the access information from the transmission medium, utilizing the access information to access the networked resource with an access signal (102, 104), and displaying content of the networked resource on the user terminal corresponding to the access information. Embodiments are provided wherein the information signal (98, 100) is provided by the networked resource provider or a distinct audio/video signal content provider (94) via wired (98) and wireless (100) means. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107241+BASICHTML-EN...
6. METHOD AND APPARATUS FOR LINKING CONSUMER PRODUCT INTEREST WITH PRODUCT SUPPLIERS;
A method and system are provided for collecting product-specific information from a collecting device (302), which is transmitted to facilitating organization where information is aggregated (304) and provided to product suppliers in an anonymous fashion (306). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+363159+BASICHTML-EN...
7. SYSTEM AND METHOD FOR LINKING ONLINE RESOURCES TO PRINT MEDIA AND AUTHORING TOOL FOR SAME;
A network-based system and method permit a publisher (12) to generate and encode content to be readily accessed by codes (16) or indicia, such as bar codes, and which may be associated with advertising related to the content via the codes. The system supports composer, reader, discovery, and static web page interfaces for permitting users (26) to act as publishers (12), readers, or browsers (28), using the codes for efficient and rapid access of content. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+332859+BASICHTML-EN...
8. SYSTEM AND METHOD OF USING MACHINE-READABLE OR HUMAN-READABLE LINKAGE CODES FOR ACCESSING NETWORKED DATA RESOURCES;
A method and system for providing a primary content file to a client computer (20) that is interconnected over a computer network (16) with an information server computer (50), a routing server computer (40), a content server computer (60), and a registration server computer (30). The present invention operates by inputting into the client computer a linkage code (10) (a machine readable code such as a bar code symbol (104) or a human-readable alphanumeric text string (106)) that includes a server identification code (110) and an item identification code (112). The client computer then extracts the server identification code, and obtains from local cache (27) or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. At the information server, the location of the primary content file is determined based on the item identification code, and the information server provides the client computer with the primary content file by either redirecting it to the primary content server computer or obtaining it from local storage. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+266015+BASICHTML-EN...
9. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+122208+BASICHTML-EN...
10. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+137931+BASICHTML-EN...
11. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+151449+BASICHTML-EN...
12. METHOD AND APPARATUS FOR OBTAINING CONSUMER DATA IN EXCHANGE FOR CONSUMER INCENTIVES VIA A NETWORKED RESOURCE;
A method and apparatus for obtaining consumer data in exchange for consumer incentives at a point-of-sale including a scanner (12), a personal computer (14), a monitor (16), a mouse (20), and a laser printer (22). A consumer selects merchandise from a display and purchases it. Thereafter, the consumer enters a kiosk enclosing the apparatus and scans a machine-readable code on one ore more tags affixed to the merchandise. A registration form is displayed, which the consumer completes by inserting demographic data. Consumer data comprising the merchandise data and demographic data is transmitted via the Internet to a data management center for storage, collation, analysis and distribution. Upon receipt of the consumer data optionally including the results or outcome of the game via the Internet, the data management center provides the apparatus with incentive data via the Internet. The incentive data is printed on the laser printer (22) and made available to the consumer.
http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+202600+BASICHTML-EN...
13. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. In another embodiment, a two-stage imaging or watermark process captures an image of indicia within an area defined by a ultraviolet coating (30), prepares a bit map thereof and encodes the bit map and/or a derivative thereof in machine-readable symbols that are then printed on the secure document (12). Intrinsic verification of the secure document (12) is accomplished by comparing actual physical measurements and scannings of the secure document with the data content of the machine-readable symbols appearing on the secure document. Extrinsic verification of the secure document is accomplished by comparing information content resident in local and/or remote databases concerning the secure document or its transfer with the data content of the machine-readable symbols appearing on the secure document.
14. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e., one dimensional) barcode (102) which enables a direct link to a designated host computer (120) without third party intervention. Additional information such as client demographics and usage, and data regarding the publication within which the barcode was discovered may be made available to the designated host (120). Access is restricted to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer (104).
15. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e. one dimensional) barcode which enables a direct link to a designated host computer without third party intervention. Additional information may be made available to the designated host or other parties directly or through a commercial server which include but are not limited to client demographics and usage, and data regarding the publication within which the barcode was discovered by the client. The present invention also contemplates a method which restricts access to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer. The present invention pertains to both "open" and "closed" Internet implementations such as TCP/IP and client/server environments (e.g. World Wide Web and html). The invention may be adapted to a wide variety of software and hardware applications available to the typical client such as personal computers equipped with appropriate communications and session software, workstations, dedicated network computers, handheld terminals, and web-ready television.
16. SYSTEM FOR ACCESSING INTERNET VIA WIRELESS DEVICE USING LINKAGE URL BAR-CODE;
A system for accessing a primary content file (206) with a client device (200) that is browser-based (WAP); i.e., that does not require a plug-in type program to be executed on the client device in addition to the browser. URLs based on linkage codes entered into the client device (200) are assembled by a network-based URL-assembly server (202) rather than at the client device, wherein the client device is a wireless device supporting WML content or HTML content.
Secure Source Technologies
As part of its acquisition of Secure Source Technologies, a provider of security solutions and a pioneer in covert security technology for the manufacturing and financial services industries, NeoMedia gained a suite of seven additional U.S. and Canadian patents as well as other Intellectual Property. A broad range of companies, including Bayer AG, ESPN, American Cyanamid, Bank of Taiwan, American Express, Republic Bank, J.P. Morgan Chase, and others have already licensed, paid fees or royalties for use of the patents or have purchased products incorporating these patents and IP.
1. Machine readable document;
A machine readable document is disclosed with unknown variable data of a specified nature imprinted thereon in unknown, variable locations. The data is imprinted on the document in such a manner that it can be machine located, accurately read, and identified as to type for further use in creating a composite record. In one embodiment, the document is a negotiable instrument or bank check which can be machine read and used in the production of a composite image statement. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. Negotiable instrument;
A negotiable instrument operable for automatic bank scanning and processing wherein the negotiable instrument includes three field areas to receive maker, payee, and amount indicia. A fluorescent ink is applied as background on at least one of the field areas of the negotiable instrument. When ultraviolet light is used to illuminate the negotiable instrument indicia added on top of the fluorescent ink may be automatically detected and scanned. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
3. Machine readable document and method for processing;
A method for processing a document including the steps of applying a source of energy to the document having at least one generally rectangular field area with a coating, scanning the document to locate the coated filed, reading only the indicia highlighted, reading a code to determine the character of the indicia, developing digital information signals, and storing the digital information. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
4. Security document;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible ink that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
5. Methods for detecting fraudulent instruments;
Methods for detecting fraudulent documents utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
6. Security system;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to an algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
Intellectual Property:
Connecting the Physical World to the Electronic World
NeoMedia Technologies has a suite of six issued patents covering core concepts behind our techniques for linking the physical world to the electronic world. These patents cover various linkage methods including:
-Barcodes
-RF/ID
-Other machine readable and keyed entry identifiers
1. Automatic Access of Electronic Information Through Secure Machine-Readable Codes on Printed Documents;
The present invention is a secure system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol is encoded with source data (including a file location pointer) that is first obfuscated by generating a checksum of the source data, encrypting the source data by using the checksum as an encryption key, and assembling the checksum with the encrypted source data prior to encoding. The machine-readable symbol is then printed and distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, and de-obfuscates the scanned data by parsing the checksum, decrypting the remainder of the scanned data string (which includes the file location pointer) using the parsed checksum as a decryption key, computing a checksum of the decrypted data string, and comparing the computed checksum with the parsed checksum to determine the validity of the code. The file location pointer is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. System and Method for Using an Ordinary Article of Commerce to Access a Remote Computer;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource.
3. Automatic access of electronic information through machine-readable codes on printed documents;
The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user's name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet.
4. System and method for automatic access of a remote computer over a network;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the prodoct's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information in then used to access the desired resource.
5. Method and system for accessing electronic resources via machine-readable data on intelligent documents;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user.
6. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources;
The present invention operates by inputting into the client computer a linkage code (a machine readable code such as a bar code symbol or a human-readable alphanumeric text string) that includes a server identification code and an item identification code. The client computer then extracts the server identification code, and obtains from local cache or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request.
-Pending Patents
1. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+71115+BASICHTML-ENG...
2. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+90043+BASICHTML-ENG...
3. METHOD AND SYSTEM FOR ACCESSING ELECTRONIC RESOURCES VIA MACHINE-READABLE DATA ON INTELLIGENT DOCUMENTS;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107199+BASICHTML-EN...
4. SCANNER ENHANCED REMOTE CONTROL UNIT AND SYSTEM FOR AUTOMATICALLY LINKING TO ON-LINE RESOURCES;
A method for providing remote access to on-line resources comprising the steps of encoding address and access information and optional source identification information, embedding the encoded information onto a document (14), scanning the document with a scanner enhanced remote control unit (10, 10A), transmitting the scanned information, receiving the transmitted information, optionally processing the received information, optionally collecting the user demographic and source identification information, retrieving the on-line ressource, and displaying the on-line resource to a user. Also an apparatus which provides remote access to on-line resources comprising an encoder of address and access information and optional source identification information, an embedding system, a scanner enhanced remote control unit (10, 10A) comprising a scanning system (22), a transmitter (24), a receiver (20A), an optional processor, an optional collector of the user demographic and source identification information, a retrieving system, and a display system (20). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107200+BASICHTML-EN...
5. METHOD FOR EMBEDDING LINKS TO A NETWORKED RESOURCE IN A TRANSMISSION MEDIUM;
A method for providing a link between an information signal (98, 100) (such as a broadcast and cable television and/or radio signals) and networked resources (such as the Internet) comprising the steps of embedding access information in a transmission medium, the access information adapted to provide access to content of the networked resource relevant to content of the information signal, transmitting the information signal and the access information (98, 100), receiving the information signal and the access information at a user terminal, extracting the access information from the transmission medium, utilizing the access information to access the networked resource with an access signal (102, 104), and displaying content of the networked resource on the user terminal corresponding to the access information. Embodiments are provided wherein the information signal (98, 100) is provided by the networked resource provider or a distinct audio/video signal content provider (94) via wired (98) and wireless (100) means. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107241+BASICHTML-EN...
6. METHOD AND APPARATUS FOR LINKING CONSUMER PRODUCT INTEREST WITH PRODUCT SUPPLIERS;
A method and system are provided for collecting product-specific information from a collecting device (302), which is transmitted to facilitating organization where information is aggregated (304) and provided to product suppliers in an anonymous fashion (306). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+363159+BASICHTML-EN...
7. SYSTEM AND METHOD FOR LINKING ONLINE RESOURCES TO PRINT MEDIA AND AUTHORING TOOL FOR SAME;
A network-based system and method permit a publisher (12) to generate and encode content to be readily accessed by codes (16) or indicia, such as bar codes, and which may be associated with advertising related to the content via the codes. The system supports composer, reader, discovery, and static web page interfaces for permitting users (26) to act as publishers (12), readers, or browsers (28), using the codes for efficient and rapid access of content. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+332859+BASICHTML-EN...
8. SYSTEM AND METHOD OF USING MACHINE-READABLE OR HUMAN-READABLE LINKAGE CODES FOR ACCESSING NETWORKED DATA RESOURCES;
A method and system for providing a primary content file to a client computer (20) that is interconnected over a computer network (16) with an information server computer (50), a routing server computer (40), a content server computer (60), and a registration server computer (30). The present invention operates by inputting into the client computer a linkage code (10) (a machine readable code such as a bar code symbol (104) or a human-readable alphanumeric text string (106)) that includes a server identification code (110) and an item identification code (112). The client computer then extracts the server identification code, and obtains from local cache (27) or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. At the information server, the location of the primary content file is determined based on the item identification code, and the information server provides the client computer with the primary content file by either redirecting it to the primary content server computer or obtaining it from local storage. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+266015+BASICHTML-EN...
9. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+122208+BASICHTML-EN...
10. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+137931+BASICHTML-EN...
11. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+151449+BASICHTML-EN...
12. METHOD AND APPARATUS FOR OBTAINING CONSUMER DATA IN EXCHANGE FOR CONSUMER INCENTIVES VIA A NETWORKED RESOURCE;
A method and apparatus for obtaining consumer data in exchange for consumer incentives at a point-of-sale including a scanner (12), a personal computer (14), a monitor (16), a mouse (20), and a laser printer (22). A consumer selects merchandise from a display and purchases it. Thereafter, the consumer enters a kiosk enclosing the apparatus and scans a machine-readable code on one ore more tags affixed to the merchandise. A registration form is displayed, which the consumer completes by inserting demographic data. Consumer data comprising the merchandise data and demographic data is transmitted via the Internet to a data management center for storage, collation, analysis and distribution. Upon receipt of the consumer data optionally including the results or outcome of the game via the Internet, the data management center provides the apparatus with incentive data via the Internet. The incentive data is printed on the laser printer (22) and made available to the consumer.
http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+202600+BASICHTML-EN...
13. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. In another embodiment, a two-stage imaging or watermark process captures an image of indicia within an area defined by a ultraviolet coating (30), prepares a bit map thereof and encodes the bit map and/or a derivative thereof in machine-readable symbols that are then printed on the secure document (12). Intrinsic verification of the secure document (12) is accomplished by comparing actual physical measurements and scannings of the secure document with the data content of the machine-readable symbols appearing on the secure document. Extrinsic verification of the secure document is accomplished by comparing information content resident in local and/or remote databases concerning the secure document or its transfer with the data content of the machine-readable symbols appearing on the secure document.
14. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e., one dimensional) barcode (102) which enables a direct link to a designated host computer (120) without third party intervention. Additional information such as client demographics and usage, and data regarding the publication within which the barcode was discovered may be made available to the designated host (120). Access is restricted to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer (104).
15. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e. one dimensional) barcode which enables a direct link to a designated host computer without third party intervention. Additional information may be made available to the designated host or other parties directly or through a commercial server which include but are not limited to client demographics and usage, and data regarding the publication within which the barcode was discovered by the client. The present invention also contemplates a method which restricts access to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer. The present invention pertains to both "open" and "closed" Internet implementations such as TCP/IP and client/server environments (e.g. World Wide Web and html). The invention may be adapted to a wide variety of software and hardware applications available to the typical client such as personal computers equipped with appropriate communications and session software, workstations, dedicated network computers, handheld terminals, and web-ready television.
16. SYSTEM FOR ACCESSING INTERNET VIA WIRELESS DEVICE USING LINKAGE URL BAR-CODE;
A system for accessing a primary content file (206) with a client device (200) that is browser-based (WAP); i.e., that does not require a plug-in type program to be executed on the client device in addition to the browser. URLs based on linkage codes entered into the client device (200) are assembled by a network-based URL-assembly server (202) rather than at the client device, wherein the client device is a wireless device supporting WML content or HTML content.
Secure Source Technologies
As part of its acquisition of Secure Source Technologies, a provider of security solutions and a pioneer in covert security technology for the manufacturing and financial services industries, NeoMedia gained a suite of seven additional U.S. and Canadian patents as well as other Intellectual Property. A broad range of companies, including Bayer AG, ESPN, American Cyanamid, Bank of Taiwan, American Express, Republic Bank, J.P. Morgan Chase, and others have already licensed, paid fees or royalties for use of the patents or have purchased products incorporating these patents and IP.
1. Machine readable document;
A machine readable document is disclosed with unknown variable data of a specified nature imprinted thereon in unknown, variable locations. The data is imprinted on the document in such a manner that it can be machine located, accurately read, and identified as to type for further use in creating a composite record. In one embodiment, the document is a negotiable instrument or bank check which can be machine read and used in the production of a composite image statement. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. Negotiable instrument;
A negotiable instrument operable for automatic bank scanning and processing wherein the negotiable instrument includes three field areas to receive maker, payee, and amount indicia. A fluorescent ink is applied as background on at least one of the field areas of the negotiable instrument. When ultraviolet light is used to illuminate the negotiable instrument indicia added on top of the fluorescent ink may be automatically detected and scanned. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
3. Machine readable document and method for processing;
A method for processing a document including the steps of applying a source of energy to the document having at least one generally rectangular field area with a coating, scanning the document to locate the coated filed, reading only the indicia highlighted, reading a code to determine the character of the indicia, developing digital information signals, and storing the digital information. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
4. Security document;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible ink that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
5. Methods for detecting fraudulent instruments;
Methods for detecting fraudulent documents utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser? Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/srchnum.htm&r=1&f=G&l=50&s1='6315329'.WKU.&OS=PN/6315329&RS=PN/6315329
6. Security system;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to an algorithm will match a selected component of said data. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
Intellectual Property:
Connecting the Physical World to the Electronic World
NeoMedia Technologies has a suite of six issued patents covering core concepts behind our techniques for linking the physical world to the electronic world. These patents cover various linkage methods including:
-Barcodes
-RF/ID
-Other machine readable and keyed entry identifiers
1. Automatic Access of Electronic Information Through Secure Machine-Readable Codes on Printed Documents;
The present invention is a secure system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol is encoded with source data (including a file location pointer) that is first obfuscated by generating a checksum of the source data, encrypting the source data by using the checksum as an encryption key, and assembling the checksum with the encrypted source data prior to encoding. The machine-readable symbol is then printed and distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, and de-obfuscates the scanned data by parsing the checksum, decrypting the remainder of the scanned data string (which includes the file location pointer) using the parsed checksum as a decryption key, computing a checksum of the decrypted data string, and comparing the computed checksum with the parsed checksum to determine the validity of the code. The file location pointer is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/neta...
2. System and Method for Using an Ordinary Article of Commerce to Access a Remote Computer;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource.
3. Automatic access of electronic information through machine-readable codes on printed documents;
The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user's name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet.
4. System and method for automatic access of a remote computer over a network;
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code ("UPC") numbers to Internet network addresses (or "URLs"). To access an Internet resource relating to a particular product, a user enters the prodoct's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information in then used to access the desired resource.
5. Method and system for accessing electronic resources via machine-readable data on intelligent documents;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed user.
6. System and method of using machine-readable or human-readable linkage codes for accessing networked data resources;
The present invention operates by inputting into the client computer a linkage code (a machine readable code such as a bar code symbol or a human-readable alphanumeric text string) that includes a server identification code and an item identification code. The client computer then extracts the server identification code, and obtains from local cache or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request.
-Pending Patents
1. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+71115+BASICHTML-ENG...
2. AUTOMATIC ACCESS OF ELECTRONIC INFORMATION THROUGH MACHINE-READABLE CODES ON PRINTED DOCUMENTS;
The present invention is a system and method for providing automated access to computer files stored in a database in either a local (32) or remote (46) server location. The system utilizes a machine-readable symbol (12) printed on a document (10). The machine-readable symbol (12) is printed and distributed by the vendor to the user. The user then scans the symbol via code scanning equipment (34) connected to a computer, decodes the raw decoded data, and the file location information is then used to retrieve the appropriate file. In a preferred embodiment, a URL of a file on the vendor's web site is encoded in the machine-readable symbol, thus enabling the client computer to access files through the Internet. The use of encryption allows the user to transmit his credit card number, thus enabling electronic commerce in a secure manner over the Internet. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+90043+BASICHTML-ENG...
3. METHOD AND SYSTEM FOR ACCESSING ELECTRONIC RESOURCES VIA MACHINE-READABLE DATA ON INTELLIGENT DOCUMENTS;
A method of accessing electronic resources via machine readable data embedded on a document which comprises compressing input data with a transmitter adapted to save a first bandwidth using a compression method adapted to minimize utilization of bandwidth by the compressed input data while retaining substantially all information content of the input data and appending a compression flag to the compressed input data indicative of the compression method enabling a receiver to decompress the compressed input data. The compression step further comprises utilizing a compression dictionary adapted to map the elements and strings of the input data to minimized representations having redundancies deleted. The compression dictionary may be appended to the compressed input data (as cleartext or cyphertext) under circumstances where a bandwidth occupied by the appended compression dictionary is less than the bandwidth saved by the step of compressing the input data. The compression dictionary may also be selected by the receiver independently from the transmitter independently indexes, pointer registration, application restricted subsets or customized according to the input data content. Also the input data may be encrypted, and an encryption flag appended which is indicative of the encryption method enabling decryption via public or private key cryptosystems as well as utilizing various authentication techniques such as digital signatures to ensure that the document was created by a licensed http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107199+BASICHTML-EN...
4. SCANNER ENHANCED REMOTE CONTROL UNIT AND SYSTEM FOR AUTOMATICALLY LINKING TO ON-LINE RESOURCES;
A method for providing remote access to on-line resources comprising the steps of encoding address and access information and optional source identification information, embedding the encoded information onto a document (14), scanning the document with a scanner enhanced remote control unit (10, 10A), transmitting the scanned information, receiving the transmitted information, optionally processing the received information, optionally collecting the user demographic and source identification information, retrieving the on-line ressource, and displaying the on-line resource to a user. Also an apparatus which provides remote access to on-line resources comprising an encoder of address and access information and optional source identification information, an embedding system, a scanner enhanced remote control unit (10, 10A) comprising a scanning system (22), a transmitter (24), a receiver (20A), an optional processor, an optional collector of the user demographic and source identification information, a retrieving system, and a display system (20). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107200+BASICHTML-EN...
5. METHOD FOR EMBEDDING LINKS TO A NETWORKED RESOURCE IN A TRANSMISSION MEDIUM;
A method for providing a link between an information signal (98, 100) (such as a broadcast and cable television and/or radio signals) and networked resources (such as the Internet) comprising the steps of embedding access information in a transmission medium, the access information adapted to provide access to content of the networked resource relevant to content of the information signal, transmitting the information signal and the access information (98, 100), receiving the information signal and the access information at a user terminal, extracting the access information from the transmission medium, utilizing the access information to access the networked resource with an access signal (102, 104), and displaying content of the networked resource on the user terminal corresponding to the access information. Embodiments are provided wherein the information signal (98, 100) is provided by the networked resource provider or a distinct audio/video signal content provider (94) via wired (98) and wireless (100) means. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+107241+BASICHTML-EN...
6. METHOD AND APPARATUS FOR LINKING CONSUMER PRODUCT INTEREST WITH PRODUCT SUPPLIERS;
A method and system are provided for collecting product-specific information from a collecting device (302), which is transmitted to facilitating organization where information is aggregated (304) and provided to product suppliers in an anonymous fashion (306). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+363159+BASICHTML-EN...
7. SYSTEM AND METHOD FOR LINKING ONLINE RESOURCES TO PRINT MEDIA AND AUTHORING TOOL FOR SAME;
A network-based system and method permit a publisher (12) to generate and encode content to be readily accessed by codes (16) or indicia, such as bar codes, and which may be associated with advertising related to the content via the codes. The system supports composer, reader, discovery, and static web page interfaces for permitting users (26) to act as publishers (12), readers, or browsers (28), using the codes for efficient and rapid access of content. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+332859+BASICHTML-EN...
8. SYSTEM AND METHOD OF USING MACHINE-READABLE OR HUMAN-READABLE LINKAGE CODES FOR ACCESSING NETWORKED DATA RESOURCES;
A method and system for providing a primary content file to a client computer (20) that is interconnected over a computer network (16) with an information server computer (50), a routing server computer (40), a content server computer (60), and a registration server computer (30). The present invention operates by inputting into the client computer a linkage code (10) (a machine readable code such as a bar code symbol (104) or a human-readable alphanumeric text string (106)) that includes a server identification code (110) and an item identification code (112). The client computer then extracts the server identification code, and obtains from local cache (27) or from the routing server a URL template associated with the server identification code. The URL template includes the name of an information server and at least one parameter field to be completed by the client computer. The URL template is completed by the client computer by filling in at least the item identification code, and the completed URL template is then sent to the information server named therein as a primary content URL request. At the information server, the location of the primary content file is determined based on the item identification code, and the information server provides the client computer with the primary content file by either redirecting it to the primary content server computer or obtaining it from local storage. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+266015+BASICHTML-EN...
9. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+122208+BASICHTML-EN...
10. PRINTED COUPONS WITH EMBEDDED DISCOUNTS FOR ONLINE PURCHASES;
A method for providing discounts in e-commerce transactions comprising printing a discount coupon (2) with human readable information describing the incentive, product, vendor, and a machine-readable symbol (2b) such as a linear or two-dimensional bar code symbol. The symbol is encoded with data fields comprising a first identifier associated with the Internet Protocol address of a vendor's computer, optionally, a second identifier associated with the discount applied to a product, optionally, a third identifier associated with the targeted consumer, and optionally, instructions to enable a computer to access a client program. The method also comprises the steps of disseminating the discount coupon (2); scanning the machine-readable coupon symbol; decoding the scanned data to generate the vendor's IP address; launching the client program to enable access to the online system; communicating with the vendor's host computer; and downloading a file from the vendor's host computer associated with the scanned coupon (2). http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+137931+BASICHTML-EN...
11. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+151449+BASICHTML-EN...
12. METHOD AND APPARATUS FOR OBTAINING CONSUMER DATA IN EXCHANGE FOR CONSUMER INCENTIVES VIA A NETWORKED RESOURCE;
A method and apparatus for obtaining consumer data in exchange for consumer incentives at a point-of-sale including a scanner (12), a personal computer (14), a monitor (16), a mouse (20), and a laser printer (22). A consumer selects merchandise from a display and purchases it. Thereafter, the consumer enters a kiosk enclosing the apparatus and scans a machine-readable code on one ore more tags affixed to the merchandise. A registration form is displayed, which the consumer completes by inserting demographic data. Consumer data comprising the merchandise data and demographic data is transmitted via the Internet to a data management center for storage, collation, analysis and distribution. Upon receipt of the consumer data optionally including the results or outcome of the game via the Internet, the data management center provides the apparatus with incentive data via the Internet. The incentive data is printed on the laser printer (22) and made available to the consumer.
http://www.wipo.int/cgi-pct/guest/ifetch5?ENG+PCT-ALL.vdb+14+1111368-SCORE+256+0+202600+BASICHTML-EN...
13. IMPROVED SECURE DOCUMENTS;
A method of generating and verifying secure documents (12) wherein the secure document (12) is printed with machine-readable symbols (28) representing physical parameters of the secure document prior to application of hand or machine-printed indicia, human and/or machine-printed indicia appearing thereon, biometrics (finger and voice prints), and transaction history. In another embodiment, a two-stage imaging or watermark process captures an image of indicia within an area defined by a ultraviolet coating (30), prepares a bit map thereof and encodes the bit map and/or a derivative thereof in machine-readable symbols that are then printed on the secure document (12). Intrinsic verification of the secure document (12) is accomplished by comparing actual physical measurements and scannings of the secure document with the data content of the machine-readable symbols appearing on the secure document. Extrinsic verification of the secure document is accomplished by comparing information content resident in local and/or remote databases concerning the secure document or its transfer with the data content of the machine-readable symbols appearing on the secure document.
14. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e., one dimensional) barcode (102) which enables a direct link to a designated host computer (120) without third party intervention. Additional information such as client demographics and usage, and data regarding the publication within which the barcode was discovered may be made available to the designated host (120). Access is restricted to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer (104).
15. AUTOMATIC SERVER ACCESS IN AN INTERNETWORKED COMPUTER SYSTEM;
The present invention provides a method for encoding a host Internet Protocol (IP) address within a linear (i.e. one dimensional) barcode which enables a direct link to a designated host computer without third party intervention. Additional information may be made available to the designated host or other parties directly or through a commercial server which include but are not limited to client demographics and usage, and data regarding the publication within which the barcode was discovered by the client. The present invention also contemplates a method which restricts access to only those server addresses which exhibit authorized and licensed codes validated and analyzed by a process resident on the client computer. The present invention pertains to both "open" and "closed" Internet implementations such as TCP/IP and client/server environments (e.g. World Wide Web and html). The invention may be adapted to a wide variety of software and hardware applications available to the typical client such as personal computers equipped with appropriate communications and session software, workstations, dedicated network computers, handheld terminals, and web-ready television.
16. SYSTEM FOR ACCESSING INTERNET VIA WIRELESS DEVICE USING LINKAGE URL BAR-CODE;
A system for accessing a primary content file (206) with a client device (200) that is browser-based (WAP); i.e., that does not require a plug-in type program to be executed on the client device in addition to the browser. URLs based on linkage codes entered into the client device (200) are assembled by a network-based URL-assembly server (202) rather than at the client device, wherein the client device is a wireless device supporting WML content or HTML content.
Secure Source Technologies
As part of its acquisition of Secure Source Technologies, a provider of security solutions and a pioneer in covert security technology for the manufacturing and financial services industries, NeoMedia gained a suite of seven additional U.S. and Canadian patents as well as other Intellectual Property. A broad range of companies, including Bayer AG, ESPN, American Cyanamid, Bank of Taiwan, American Express, Republic Bank, J.P. Morgan Chase, and others have already licensed, paid fees or royalties for use of the patents or have purchased products incorporating these patents and IP.
1. Machine readable document;
A machine readable document is disclosed with unknown variable data of a specified nature imprinted thereon in unknown, variable locations. The data is imprinted on the document in such a manner that it can be machine located, accurately read, and identified as to type for further use in creating a composite record. In one embodiment, the document is a negotiable instrument or bank check which can be machine read and used in the production of a composite image statement.
2. Negotiable instrument;
A negotiable instrument operable for automatic bank scanning and processing wherein the negotiable instrument includes three field areas to receive maker, payee, and amount indicia. A fluorescent ink is applied as background on at least one of the field areas of the negotiable instrument. When ultraviolet light is used to illuminate the negotiable instrument indicia added on top of the fluorescent ink may be automatically detected and scanned.
3. Machine readable document and method for processing;
A method for processing a document including the steps of applying a source of energy to the document having at least one generally rectangular field area with a coating, scanning the document to locate the coated filed, reading only the indicia highlighted, reading a code to determine the character of the indicia, developing digital information signals, and storing the digital information.
4. Security document;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible ink that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data.
5. Methods for detecting fraudulent instruments;
Methods for detecting fraudulent documents utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to a algorithm will match a selected component of said data.
6. Security system;
A security system for a document utilizing a plurality of fluorescent snippets on the document with other encryption data printed thereon with visible and invisible inks that becomes bright when subjected to certain light. The system combines visible and invisible data that is encrypted, totaled and when subjected to an algorithm will match a selected component of said data.
SAN DIEGO--April 28, 2004--One Voice Technologies, Inc. (OTCBB: ONEV) Chairman and CEO Dean Weber, today issued the following corporate update:
"We are pleased to provide our shareholders with the following corporate update on sales prospects and funding requirements. The following is a summarization of these topics.
Regarding funding, in December, 2003 One Voice secured a financing package for an aggregate amount of $2.75M. This amount we feel is sufficient to last throughout the remainder of 2004. We are working closely with our investor and if more funds are required, throughout this year or into 2005, we are confident these additional funds will be available. Although we continue to rely on outside funding, and will throughout 2004, we are diligently working to close revenue contracts to offset the amount of funding required. Additionally on the finance side, we have recently changed our independent auditor firm and hired San Diego based Peterson & Company, LLP as our new independent auditor to provide our ongoing quarterly and annual financial reports.
In the telecom sector, in February, 2004 we hired two top sales executives to lead our telecom sales initiatives. Jack Johnson joined the company as Vice President of Telephony Sales and Rick Stone as Vice President of Telephony Business Development, North America. Both Jack and Rick have numerous years of telephony sales experience and a proven track record in closing carrier deals. In just two months of employment at One Voice, Jack and Rick have closed our first revenue generating carrier contract with Golden State Cellular. This accelerated sales cycle is due in part to Jack and Rick's industry relationships combined with our innovative MobileVoice™ carrier product. We welcome Jack and Rick on-board and anticipate their continued success in this sector.
We recently attended the CTIA Wireless 2004 tradeshow and exhibited at the Rural Cellular Association (RCA) tradeshow. I was very pleased to see the positive response from potential carrier customers regarding One Voice's products and the many contracts that we now have out to potential customers for review. At these shows, One Voice impressed potential customers and showed our industry leadership in voice recognition by demonstrating both our MobileVoice carrier product along with our Windows XP Media Center Edition PC product and the seamless voice recognition and E-mail integration from both a mobile phone and from a PC. One Voice is delivering on the powerful vision of enabling both mobile phones and digital home entertainment systems with the ability to instantly communicate with friends, colleagues and family members, all by voice!
In summary, as a company we have had many challenges over the last several years and I am glad to see that One Voice is turning the corner in sales and beginning to close revenue-generating deals. I believe there is a brighter outlook for our company in 2004 now that we have secured financing, commercially viable products and a proven/experienced sales team. As always, I wish to thank all the shareholders for your continued support of One Voice."
About One Voice Technologies, Inc.
One Voice Technologies, Inc. (OTCBB: ONEV) is the world's first developer of 4th Generation voice solutions for the Telecom and Interactive Multimedia markets. Our Intelligent Voice™ solutions employ revolutionary, patented technology that allows people to send messages (Email, SMS, Instant Messaging and paging), purchase products, get information and control devices - all by using their voice. The company is headquartered in San Diego, California. For more information, please visit http://www.onev.com
http://www.onev.com/News/disp_release.asp?d=28+April+2004&r=2004_04_28
Windows Hardware Showcase
WinHEC 2004 Fact Sheet: Demo Descriptions
Windows Small Business Server 2003
For most small businesses, what runs on their servers is mission-critical. So providing “hardware fundamentals” for a small-business server means building great features so the user doesn’t need to be a server guru. It also means designing form factors that fit well: small and quiet, with support for wireless LAN to avoid network cables. A great operating system plus a great hardware platform allows users to concentrate on their business — not on working to keep their servers running. Microsoft® Windows® Small Business Server 2003, together with Janus Server by First International Computer Inc. (FIC), is a server platform solution ideally suited to the needs of today’s small businesses.
Windows VOIP Conferencing
Voice over Internet Protocol (VoIP) conferencing is hot. Come see how industry leaders are leveraging Windows VoIP technology and Microsoft Office Live Communications Server to deliver greater knowledge worker productivity by enabling instant messaging, presence awareness and high-quality videoconferencing. No longer relegated to movie portrayals, high-quality videoconferencing has been made possible through powerful integration of hardware and software. This solution features hardware created by Toshiba Corp.
Windows Biometric Authentication
With so much critical and confidential information being stored on end-user PCs, the risk of password compromise and unauthorized access to data is increasing for corporations and consumers. Windows biometric authentication offers convenient, fast, local-machine logon, without the complexity of managing passwords. Security is strengthened because the password is unique: the individual user’s fingerprint. See the variety of biometric solutions available from industry partners, including DigitalPersona Inc., Gateway Inc., IBM Corp. and Sony Corp.
Windows “Longhorn”: Communications Experience
The PC is used increasingly for communications. Last year at WinHEC, Microsoft Corp. and HP demonstrated the “Athens” PC prototype, a vision for a future communications PC. In 2004, the “Longhorn” Communications demo shows the next steps, including Microsoft’s plans for the next version of Windows, code-named “Longhorn.” The demo also shows how communications hardware plays a role in this experience.
Currently, the PC typically is used for PC-focused communications such as e mail and instant messaging. However, much of a person’s communication is conducted on other devices such as cell and landline phones, alternating among these disconnected methods throughout the day. As a result, data is spread across silos and extra overhead is required to find data and manage presence, while users must maintain multiple address books for contacts and multiple communications logs, ranging from an e-mail inbox on a PC to a call list on a cell phone.
The “Longhorn” Communications demo shows how these scenarios can be integrated into a seamless experience in which data is shared and synchronized across the PC and devices. The demo shows call-handling functionality for any type of phone communication, from cell phone calls to VoIP. Any of these phone calls can be complemented with other communication channels such as video or simultaneous viewing of photos and documents. The demo shows “Longhorn’s” plans for integrating communication across different software and devices into one unified history, with quick access to data. Hardware such as cell phones and a communications control panel are integrated with the proposed software experience. The combination of these features results in a PC optimized for communications.
Windows Network Connected Device Technology
Connecting devices to a home network can be as easy as connecting them to a PC. Microsoft shows how this is possible with Windows XP Service Pack 2 (SP2), the Windows Network Connected Device Driver Development Kit (DDK) and WS-Discovery — a Web services specification co-authored by BEA Systems Inc., Canon Inc., Intel Corporation and Microsoft. By integrating Web services with the existing Plug and Play infrastructure, devices can be easily and securely connected to the typical “unmanaged” home network. In this example, a new digital picture frame powered by a small-form-factor chipset from VIA Technologies Inc. is added to a typical home network. The picture frame is found, added to the network and configured as if it were directly connected to the PC. The frame can display images stored on the PC and from the Internet through a Web service run by Corbis. Digital pictures also are transferred wirelessly to the PC by a Nikon digital camera. These pictures can be displayed in the picture frame or printed to a Web-services-enabled laser printer from Canon. Key technologies include these:
§ Windows XP SP2 and Windows Network Connected Device Technology DDK
§ WS-Discovery specification, co-authored by BEA Systems,
Canon, Intel and Microsoft
§ Nikon digital camera
§ VIA small-form-factor chipset
§ Canon Web-services-enabled laser printer
§ Corbis Web services
Windows XP Media Center Edition Hardware Innovation
The ways in which people enjoy media on their PCs are being redefined by Windows XP Media Center Edition. Innovations by Microsoft’s hardware industry partners that take advantage of Windows XP Media Center Edition are resulting in exciting new media experiences. A few highlights presented here include these:
§ The unique design of the Niveus Media AVX, inspired by high-end audio equipment, enables it to use full-powered PC components while providing extremely quiet operation — it is completely fanless. Using a powerful processor and video card, the system supports playback of stunning Windows Media® Video High-Definition DVDs, bringing high-resolution discs to the consumer home entertainment experience while leveraging the power and flexibility of the Media Center PC.
§ Consumers have complained about the complexity required to record a television program. Microsoft and One Voice Technologies Inc. have developed a wireless microphone integrated into the Media Center remote control and supported by innovative voice command software. Users can now simply say what they want to do — record their favorite program, locate content or view what they recorded.
Technologies that are part of this solution include these:
§ Windows XP Media Center Edition
§ Passive cooling (fanless)
§ High-definition Windows Media Video (WMV)
§ Remote control with built-in wireless microphone
§ Digital video control through Microsoft DirectX®
§ Modem with Telephony API (TAPI) Caller ID
Windows XP Media Center Edition Hardware Showcase
See the broad range of innovative form factors and hardware solutions being brought to market that support Windows XP Media Center Edition. Microsoft and industry partners are working together to ensure that well-integrated hardware and software solutions deliver new, exciting and superior customer experiences. The breadth of solutions available will leave you inspired.
Windows Smart Network Key
With the growth in adoption of home networks among consumers, the typical user is still challenged to set up and configure a network. To help users, Microsoft partnered with leading hardware and device manufacturers to develop the Windows Smart Network Key solution. This solution allows users to easily configure devices and PCs on an 802.11 wireless home network using a USB flash drive and Windows XP SP2. Industry partners showcased in this solution include HP and AboCom Systems Inc.
Windows XP 64-Bit Edition
Formerly available only to high-end workstations, the recently released Windows XP 64-Bit Edition supports a new level of performance for consumer applications. Together with leading industry partners, Microsoft is encouraging adoption of the x64 platform for consumer, prosumer, gaming and mobile computing. This demo shows examples of applications harnessing the power of the x64 platform. Included here is “Far Cry,” from Ubisoft and Crytek GmbH, which is the first PC game available for 64-bit and 32-bit Windows running on an AMD 64-bit system. With software that leverages new Microsoft DirectX 9 features, users experience an enhanced gaming experience as a result of shader modeling and translucent rendering, plus increased performance from software that takes advantage of the larger memory address spaces available with the x64 platform.
Microsoft Power Sense Technologies
Microsoft Power Sense is a set of evolving technologies that combine improvements in PC hardware architecture and the Windows platform to provide customers with better power management options. On PCs running Windows XP with Power Sense technologies, users can enjoy direct access to media, helping save time and improve their PC experience. Power Sense functionality also reduces PC noise, so that Windows can quietly perform unattended tasks such as recording video, remotely streaming media and downloading software updates while the PC appears to be turned off.
Microsoft Research Real-Time Collaboration Prototype
Microsoft Research has developed a real-time collaboration prototype that integrates newly affordable hardware with enhanced communications software for real-time information exchange in meetings, especially when most participants are in one conference room or family room while a few others are elsewhere. This greatly extends end-user experiences that previously have been possible only with expensive videoconferencing solutions.
Windows Home Concept
Home computing is expanding to every room, complementing the flow of life in homes. The Windows Home Concept is a vision of seamless computing, featuring high-fidelity entertainment and integrated communication experiences. Innovations in Windows and hardware that focus on simplicity, availability, high-quality entertainment and communications serve to enable the Windows Home Concept, delivering always-ready, connected and consistent computing experiences. New business opportunities for software and hardware are created around the evolving home computing platform and form factors.
http://download.microsoft.com/download/D/A/A/DAA7245D-E01D-46A4-AB70-3A95ED3F6934/DemoDescriptionsFS....
The following customers use One Voice technologies in their products:
http://www.warnervideo.com/
Related Press Releases:
-One Voice Technologies and Warner Home Video Unveil the World's First Voice Interactive DVD With Harry Potter and the Sorcerer's Stone (1 April 2002)
http://www.onev.com/News/disp_release.asp?d=01+April+2002&r=2002_04_01B
-One Voice Technologies CEO Comments On Large Scale Deployment-Of Voice Recognition Platform (3 April 2002) http://www.onev.com/News/disp_release.asp?d=03+April+2002&r=2002_04_03
-Upcoming Harry Potter DVD To Contain One Voice DVD Technology (23 January 2003) http://www.onev.com/News/disp_release.asp?d=23+January+2003&r=2003_01_23
http://www.t-mobile.net/
Related Press Releases:
-T-Mobile Austria Signs Agreement for Joint Philips and One Voice Voice-to-Text SMS and E-mail Messaging Solution (24 February 2003)
http://www.onev.com/News/disp_release_wPhillips.asp?d=24+February+2003&r=2003_02_24
-One Voice Completes MobileVoice Upgrade at T-Mobile Austria's Future House (13 August 2003)
http://www.onev.com/News/disp_release.asp?d=13+August+2003&r=2003_08_13
Other:
-T-Mobile's Future House: #msg-3010788
http://www.wdig.com/
Related Press Release
-We are still waiting for a press release.
http://www.goldenstatecellular.com/
Related Press Release:
-Golden State Cellular to Offer One Voice's MobileVoice™ Service (SAN DIEGO--April 26, 2004) http://www.onev.com/News/disp_release.asp?d=26+April+2004&r=2004_04_26
The following customers use One Voice technologies in their products:
http://www.warnervideo.com/
Press Releases:
-One Voice Technologies and Warner Home Video Unveil the World's First Voice Interactive DVD With Harry Potter and the Sorcerer's Stone (1 April 2002)
http://www.onev.com/News/disp_release.asp?d=01+April+2002&r=2002_04_01B
-One Voice Technologies CEO Comments On Large Scale Deployment-Of Voice Recognition Platform (3 April 2002) http://www.onev.com/News/disp_release.asp?d=03+April+2002&r=2002_04_03
-Upcoming Harry Potter DVD To Contain One Voice DVD Technology (23 January 2003) http://www.onev.com/News/disp_release.asp?d=23+January+2003&r=2003_01_23
http://www.t-mobile.net/
Press Releases:
-T-Mobile Austria Signs Agreement for Joint Philips and One Voice Voice-to-Text SMS and E-mail Messaging Solution (24 February 2003)
http://www.onev.com/News/disp_release_wPhillips.asp?d=24+February+2003&r=2003_02_24
-One Voice Completes MobileVoice Upgrade at T-Mobile Austria's Future House (13 August 2003)
http://www.onev.com/News/disp_release.asp?d=13+August+2003&r=2003_08_13
http://www.wdig.com/
http://www.goldenstatecellular.com/
Press Releases:
-Golden State Cellular to Offer One Voice's MobileVoice™ Service (SAN DIEGO--April 26, 2004) http://www.onev.com/News/disp_release.asp?d=26+April+2004&r=2004_04_26
The following customers use One Voice technologies in their products:
http://www.warnervideo.com/
Press Releases:
-One Voice Technologies and Warner Home Video Unveil the World's First Voice Interactive DVD With Harry Potter and the Sorcerer's Stone (1 April 2002)
http://www.onev.com/News/disp_release.asp?d=01+April+2002&r=2002_04_01B
-One Voice Technologies CEO Comments On Large Scale Deployment-Of Voice Recognition Platform (3 April 2002) http://www.onev.com/News/disp_release.asp?d=03+April+2002&r=2002_04_03
-Upcoming Harry Potter DVD To Contain One Voice DVD Technology (23 January 2003) http://www.onev.com/News/disp_release.asp?d=23+January+2003&r=2003_01_23
http://www.t-mobile.net/
Press Releases:
-T-Mobile Austria Signs Agreement for Joint Philips and One Voice Voice-to-Text SMS and E-mail Messaging Solution (24 February 2003)
http://www.onev.com/News/disp_release_wPhillips.asp?d=24+February+2003&r=2003_02_24
-One Voice Completes MobileVoice Upgrade at T-Mobile Austria's Future House (13 August 2003)
http://www.onev.com/News/disp_release.asp?d=13+August+2003&r=2003_08_13
http://www.wdig.com/
http://www.goldenstatecellular.com/
Press Releases:
-Golden State Cellular to Offer One Voice's MobileVoice™ Service (SAN DIEGO--April 26, 2004) http://www.onev.com/News/disp_release.asp?d=26+April+2004&r=2004_04_26
The following customers use One Voice technologies in their products:
http://www.warnervideo.com/
Press Releases:
-One Voice Technologies and Warner Home Video Unveil the World's First Voice Interactive DVD With Harry Potter and the Sorcerer's Stone (1 April 2002)
http://www.onev.com/News/disp_release.asp?d=01+April+2002&r=2002_04_01B
-One Voice Technologies CEO Comments On Large Scale Deployment-Of Voice Recognition Platform (3 April 2002) http://www.onev.com/News/disp_release.asp?d=03+April+2002&r=2002_04_03
-Upcoming Harry Potter DVD To Contain One Voice DVD Technology (23 January 2003) http://www.onev.com/News/disp_release.asp?d=23+January+2003&r=2003_01_23
http://www.t-mobile.net/
Press Releases:
-T-Mobile Austria Signs Agreement for Joint Philips and One Voice Voice-to-Text SMS and E-mail Messaging Solution (24 February 2003)
http://www.onev.com/News/disp_release_wPhillips.asp?d=24+February+2003&r=2003_02_24
-One Voice Completes MobileVoice Upgrade at T-Mobile Austria's Future House (13 August 2003)
http://www.onev.com/News/disp_release.asp?d=13+August+2003&r=2003_08_13
http://www.wdig.com/
http://www.goldenstatecellular.com/
Press Releases:
-Golden State Cellular to Offer One Voice's MobileVoice™ Service (SAN DIEGO--April 26, 2004) http://www.onev.com/News/disp_release.asp?d=26+April+2004&r=2004_04_26
T-mobile Austria signs agreement for joint Philips and One Voice-to-Text SMS and e-mail messaging solution
"Our T-Mobile Future House is Europe's first comprehensive showcase for the real applications of the mobile future with 3G. Exciting new applications can be seen in action: One of them is MobileVoice", said Dr. Harald Stadlbauer, responsible for new business at T-Mobile Austria."
"This agreement is a major step forward in our penetration into the European markets," said Dean Weber, president and CEO at One Voice. "It is a great opportunity to work with T-Mobile Austria, one of the industry's leading global wireless providers. We have just completed the installation of MobileVoice at the T-Mobile Product Center for all customers to see. We look forward to working closely with Philips on launching the industry's first mobile Voice-to-Text SMS and E-mail messaging solution. A launch date is to be decided. "
"The successful partnership of One Voice and Philips Speech Processing will enable us to feature the industry's latest and most revolutionary development: the very first voice-to-text SMS solution!", said Marcel Wassink, Managing Director, Philips Speech Processing.
For more info on T-Mobile Future House: #msg-3010788
"We are glad to have been selected by Microsoft and showcased in their Windows Hardware Showcase," said Dean Weber, president and CEO of One Voice.
ONEV mentioend on MSFT website:
http://download.microsoft.com/download/D/A/A/DAA7245D-E01D-46A4-AB70-3A95ED3F6934/DemoDescriptionsFS...
The following customers use One Voice technologies in their products:
http://www.warnervideo.com/
Press Releases:
-One Voice Technologies and Warner Home Video Unveil the World's First Voice Interactive DVD With Harry Potter and the Sorcerer's Stone (1 April 2002)
http://www.onev.com/News/disp_release.asp?d=01+April+2002&r=2002_04_01B
-One Voice Technologies CEO Comments On Large Scale Deployment-Of Voice Recognition Platform (3 April 2002) http://www.onev.com/News/disp_release.asp?d=03+April+2002&r=2002_04_03
-Upcoming Harry Potter DVD To Contain One Voice DVD Technology (23 January 2003) http://www.onev.com/News/disp_release.asp?d=23+January+2003&r=2003_01_23
http://www.t-mobile.net/
Press Releases:
-T-Mobile Austria Signs Agreement for Joint Philips and One Voice Voice-to-Text SMS and E-mail Messaging Solution (24 February 2003)
http://www.onev.com/News/disp_release_wPhillips.asp?d=24+February+2003&r=2003_02_24
-One Voice Completes MobileVoice Upgrade at T-Mobile Austria's Future House (13 August 2003)
http://www.onev.com/News/disp_release.asp?d=13+August+2003&r=2003_08_13
http://www.wdig.com/
http://www.goldenstatecellular.com/
Press Releases:
-Golden State Cellular to Offer One Voice's MobileVoice™ Service (SAN DIEGO--April 26, 2004) http://www.onev.com/News/disp_release.asp?d=26+April+2004&r=2004_04_26
The following customers use One Voice technologies in their products.
-One Voice Technologies and Warner Home Video Unveil the World's First Voice Interactive DVD With Harry Potter and the Sorcerer's Stone (1 April 2002) http://www.onev.com/News/disp_release.asp?d=01+April+2002&r=2002_04_01B
-One Voice Technologies CEO Comments On Large Scale Deployment-Of Voice Recognition Platform (3 April 2002) http://www.onev.com/News/disp_release.asp?d=03+April+2002&r=2002_04_03
-Upcoming Harry Potter DVD To Contain One Voice DVD Technology (23 January 2003) http://www.onev.com/News/disp_release.asp?d=23+January+2003&r=2003_01_23
T-Mobile Austria Signs Agreement for Joint Philips and One Voice Voice-to-Text SMS and E-mail Messaging Solution (24 February 2003)
http://www.wdig.com/
http://www.goldenstatecellular.com/
-Golden State Cellular to Offer One Voice's MobileVoice™ Service (SAN DIEGO--April 26, 2004) http://www.onev.com/News/disp_release.asp?d=26+April+2004&r=2004_04_26
The following customers use One Voice technologies in their products.
One Voice Technologies and Warner Home Video Unveil the World's First Voice Interactive DVD With Harry Potter and the Sorcerer's Stone (1 April 2002) http://www.onev.com/News/disp_release.asp?d=01+April+2002&r=2002_04_01B
One Voice Technologies CEO Comments On Large Scale Deployment Of Voice Recognition Platform (3 April 2002) http://www.onev.com/News/disp_release.asp?d=03+April+2002&r=2002_04_03
Upcoming Harry Potter DVD To Contain One Voice DVD Technology (23 January 2003) http://www.onev.com/News/disp_release.asp?d=23+January+2003&r=2003_01_23
T-Mobile Austria Signs Agreement for Joint Philips and One Voice Voice-to-Text SMS and E-mail Messaging Solution (24 February 2003)
http://www.wdig.com/
http://www.goldenstatecellular.com/
Golden State Cellular to Offer One Voice's MobileVoice™ Service (SAN DIEGO--April 26, 2004) http://www.onev.com/News/disp_release.asp?d=26+April+2004&r=2004_04_26
Future House Portal
http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/anwendungen/index.html (German)
In June 2001 the t-mobile Future House was opened. A goal was it to present future mobile applications experiencable. Many that as vision of the future presented applications became reality at that time. To that extent the exhibition concept had to be revised and be merged parts of the products already gelaunchten such as MMS, etc. as interactive part with. The contentwise emphasis is settled in the range serviceability/customer use of mobile Multimedia services. The Austellungsbereich is into modules divided, which represent small in each case scenes, around the technology is produced. The mobile terminals in the t-mobile Future House: the newest HP iPAQ pocket PC, Siemens Loox, SonyEricsson, Nokia, as well as Siemens laptop The mobile technology: Wireless LAN - all applications are mobilely usable within the Future House Applications from the following ranges are presented:
news #msg-3010690 / town center #msg-3010697 / entertainment #msg-3010705 / shopping #msg-3010713 / sport & fun #msg-3010718 / banking #msg-3010727 / business #msg-3010732 / voting #msg-3010739/
Closed circle of users With all applications t-mobile attached particular importance to offer a closed circle of users. Thus for instance cinema tickets are mobilely selected, bought, loaded directly on the display and indicated exactly the way to the cinema. The amount spent on the tickets seems in the account in Banking naturally as deduction up. The virtual ticket on your terminal makes the admission possible.
About Future House:
"The true freedom ton move." Experience-cash customer use has highest priority with t-mobile Austria. That applies also to all future services and applications. In the t-mobile Future House in the Viennese mirror lane number 2 are shown the mobile services and applications of the future. And that already for quite some time: Already since the opening in June 2001 t-mobile Austria in co-operation with the technical Leadpartner Siemens as well as a set of co-operation partners could leave the visitors in the Future House future air schnuppern. Now the Future House goes into the next round: The Future House was converted and received a new Design. If you liked to visit the t-mobile Future House, announce yourselves please by telephone. Here you receive also large information. There are four new main topics: Health & Wellness, mobiles office & telematics, t-zones world as well as technology. Uses of traffic sensors, navigation systems or Ticketing lasers are there likewise to admire like Voting Tools or new applications from the ranges hospital service, insurance or logistics. A mobile Defibrilator, a m-Learning Tool as well as the "mobile manager cockpit" supplement the innovative Reigen. http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/index.html (German)
Following the guidance you have the possibility of giving us over a Voting Tool the company maxx feedback to the t-mobile Future House. http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/voting/index.html
At the Business portal to the visitor t-mobile Future House the following applications are at the disposal: SAP The mobile field representative can here directly at the customer over the mobile terminal Customer data query and change Article enquiries start Orders D urchfuehren FlightPlaner The FlightPlaner makes a setting of alarms regarding the takeoff data of all flights from the airport for Vienna and Duesseldorf possible. The information at the customers takes place with delays, loss etc. via SMS. m-learning Training via mobile terminals for field representatives. As example you see here a Showcase aligned to the needs of t-mobile field representatives. Logistics application The distribution of products covers a multiplicity of work procedures, which can be documented and administered directly locally by means of Handy and/or PDA. Application of insurance Insurance brokers or experts can seize customer data with the help of this application for example, call product informations up and work on cases of damage. Application of hospital services House attendance require the insight of current patient data. Anamnesis, various findings and auxiliary information are simply locally called up and/or registered into the virtual patient sheet. http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/business/index.html
Who clicks the menu option Banking, group comes on the mobile application of banks of the BAWAG PSK. To the selection the here following functionalities stand: Control: The customer can control its transfers. Account: Current account overview. Account functionalities correspond naturally to a genuine account. All purchases and/or also evtl. Money gains e.g. of the on-line play code breaker are evident and comprehensible in the account overview. Current: In the menu option Chartmix finds the mobile customer minute-current data over more than 300,000 securities world-wide. Direct broker: Here the user receives an overview of the personal deposit of securities and can also equal on-line Orders deliver and Alertfunktionen furnish. By registering Bookmarks the customer receives a notification with over or falls below from limit. Payments: In this menu option transfers can be assigned from the mobile terminal.
http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/banking/index.html
Within the range sport & Fun find you single-und multiplayer able Games with interactive features of the company Siemens. Naturally also the football fans come at your expense - with Soccer, a soccer game of the league class. Beyond that are callable over an extra for the Future House furnished mobile portal also sport-Nachrichten of www.sport1.at at any time up-to-date.
http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/sport_fun/index.html
The mobile Shoppingcenter in the t-mobile Future House convinces by its various offer, which is presented multimedially and interactively and naturally on push of a button be bought can. All transacted purchases seem in the account overview in the range Banking as deductions up. The following Shops is available: Niedermeyer In the Niedermeyer Shop there is a rich selection of mobile terminals, PCS and software. All products are presented in picture and text. Additionally plays and/or software are offered and introduced by short product videos. Audio Shop in the audio Shop stand the most current hits exactly the same to the Download for order like classical music titles. To each title can be belonged before the purchase and after the payment directly into the Multimedia Juke box of the visitor one downloads. Like that is on the way always provided for the musical maintenance. Music gives it from the columns to Top 10, Rock/Pop, Blues, film music and classical period. Travel agent of the Travel agent is a mobile load minute travel offerer. The user can read off the most current offers from the display and examine the individual Urlaubsdestinationen also by video. High-speeddecided can book immediately over the mobile terminal, pay and the ticket either by post office dispatched to get or in the next travel agency fetch. The way to the travel agency, which is appropriate for the location users next, a map and/or when desired also an aerial photograph with drawn in route shows. The bank account in the Banking range proves the travel expenditures after the purchase. OETicket Meeting maps (e.g. from the ranges Family, skirt, sport, etc..) simply and comfortably from the mobile terminal to to buy, Future House is not a problem in the t-mobile. Visitors go simply into the Shop from Austria ticket, look at themselves the information, the photos and short videos to the offered meetings and select the desired maps and the seat at the respective place of event. The tickets are sent to the payment by transfer directly on the display of the PDAs and serve thereby directly as ticket. These are 2D-Barcodes, which is read off over an appropriate reader directly from the display of the mobile terminal.
http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/shopping/index.html
In the Entertainment range six menu options stand to the selection: TV Guide The interactive TV Guide shows the TV program for the current week. In addition it points all in the Tele magazine available channel information to various TV transmitters. In order taste on film hits to gotten, gives it to Filmtipps. In addition the remote programming of the video recorder is at home possible over the mobile terminal by depressing the key simply and fast. Individual points of program can also as if tap by email to friends to be passed on. Multimedia Juke box who in the audio Shop music files bought, has these to the payment directly into the Juke box loaded, where they are ready for listening to stored now at any time. Who enters into the Juke box, the list of the songs the available receives and can a playing by means of clicks activates. Radio Often one hears a song in the radio and would like to know, how it means, who sings it and which place in the Charts it has. Exactly this application offers these information. Beyond that one can listen to the also live in the same moment songs at the mobile terminal, played in the radio. Are ordered a selection of Austrian and international transmitters. Web club Together with the Austrian lotterien we present you the play with the promiseful name code breaker. In contrast to the plays purchasable in the Shopping range, plays the user with the code breaker with genuine money employment and genuine money gains, which are evident on its account in the Banking. On the basis code breaker the direction, in which the mobile on-line plays go, can be suspected easily: Multicolored, animated, tones and sophistiated. Sportkanal/Betting Here the customer from the mobile terminal e.g. horse bets can participate on. It decides, at which time and to which ratio he enters. Merged into the Payment application the employment is deducted and one can pursue if necessary a running directly.
http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/entertainment/index.html
In the range town center shows t-mobile applications, which by means of location Based services and Live Web Cams the daily life the user facilitates in the future among other things and will support. Through goal-exact information and assistance the portable radio customers from tomorrow save valuable time and win thereby quality of life. Advertising To receive advertisement at the Handy and profit but from various advantages to - that is a range of topics, which is discussed up-to-date in numerous media and already practiced in some countries. In the Future House t-mobile in co-operation with Mc Donalds an example for mobile Advertising prepared. Town center Cams at the mobile terminal of the future moves closer the world in Live pictures. In the Future House shows t-mobile a selection of such pictures over a set of Live Webcams and extends thereby indirectly the view horizon of the guests. Traffic sensors The Showcase of the company traffic.at shows like a punctual stower identification by traffic sensors is possible. Translator Language barriers become the children's game. The developers of this application received an honor in the context t-mobile of the Futureaward 2002. Town center Scout with town center the Scout is mad in the future impossible. This route planner meets the desires of mobile humans with information, city plan and naturally Routing on a special vienna map. Descriptive in an old timer with inserted console are presented to the town center Scout as well as the Live Cams and the traffic content. Thus the visitor of the Future Houses gets the feeling of the Live situation during the drive.
http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/city/index.html
Future House of guests, who click on its mobile terminal (Compaq iPAQ) the menu range News, can select between: ORF Teletext: ORF Teletext is already into that t-zones callable and enjoys of large popularity. News Corner: Top informs with real-time message portals (e.g. Financial Times, Sacbee, courier, that standard) Press mirror: Reference search, personal Zeitungsportfolio and real-time of stock exchange courses inclusive Charts.
http://www.t-mobile.at/unternehmen/aktivitaeten/futurehouse/news/index.html
Patents:
Network interactive user interface using speech recognition and natural language processing
Abstract
A system and method to interact with networked objects, via a computer using utterances, speech processing and natural language processing. A Data Definition File relates networked objects and a speech processor. The Data Definition File encompasses a memory structure relating the networked objects, including grammar files and a natural language processor. The speech processor searches a first grammar file for a matching phrase for the utterance, and to search a second grammar file for the matching phrase if the matching phrase is not found in the first grammar file. The system also includes a natural language processor to search a database for a matching entry for the matching phrase; and an application interface to perform an action associated with the matching entry if the matching entry is found in the database. The system utilizes context-specific grammars, thereby enhancing speech recognition and natural language processing efficiency. Additionally, the system adaptively and interactively "learns" words and phrases, and their associated meanings. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/search....
Interactive user interface using speech recognition and natural language processing.:
Abstract
A system and method to interact with a computer using utterances, speech processing and natural language processing. The system comprises a speech processor to search a first grammar file for a matching phrase for the utterance, and to search a second grammar file for the matching phrase if the matching phrase is not found in the first grammar file. The system also includes a natural language processor to search a database for a matching entry for the matching phrase; and an application interface to perform an action associated with the matching entry if the matching entry is found in the database. The system utilizes context-specific grammars, thereby enhancing speech recognition and natural language processing efficiency. Additionally, the system adaptively and interactively "learns" words and phrases, and their associated meanings.
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/search....
Object interactive user interface using speech recognition and natural language processing:
Abstract
A system and method for interacting with objects, via a computer using utterances, speech processing and natural language processing. A Data Definition File relates networked objects and a speech processor. The Data Definition File encompasses a memory structure relating the objects, including grammar files, a context-specific dictation model, and a natural language processor. The speech processor searches a first grammar file for a matching phrase for the utterance, and for searching a second grammar file for the matching phrase if the matching phrase is not found in the first grammar file. The system also includes a natural language processor for searching a database for a matching entry for the matching phrase; and an application interface for performing an action associated with the matching entry if the matching entry is found in the database. The system utilizes context-specific grammars and dictation models, thereby enhancing speech recognition and natural language processing efficiency. Additionally, for each user the system adaptively and interactively "learns" words and phrases, and their associated meanings, storing the adaptive updates into user voice profiles. Because the user voice profiles can be stored locally or remotely, users can access the adaptively learned words and phrases at various locations. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/search....
Technology:
MobileVoice Platform:
Our messaging and voice-activated dialing applications are built on our MobileVoice™ platform, which combines the power of natural language speech processing with the scalability, redundancy and fault-tolerance of a server based, telco-ready architecture. The result is the world's only completely integrated solution that allows people to:
- Send free-format voice-to-text messages
- Make voice-activated dialing calls to thousands of
contacts in minutes
- Access their E-Mail and Instant Messages - using
only their voice.
Now users can send and receive E-Mail, Instant Messages, SMS and Paging messages without touching a key.
IntelligentVoice Platform:
We have also utilized our 4th Generation voice technology in our IntelligentVoice™ platform, which was developed for voice applications on other devices such as PDA's, PC's and for use in Interactive Multimedia solutions. The IntelligentVoice™ platform allows users to enter free-format information such as contacts and appointments and compose documents using voice. It can also tap into powerful artificial intelligence capabilities that dynamically learn user preferences and provide access to information based on free-form requests. It also opens the doors to new levels of interactivity in games, e-learning and multimedia solutions by providing a powerful, easy-to-use voice interface.
VoiceSite:
VoiceSite is One Voice's proprietary Web technology that allows websites to quickly and easily deliver customized voice messages to people visiting your site and visitors to navigate your site using their voice. Using Dialog Studio™, our easy to use voice-scripting application, anyone can now add high-impact messages and personalized greetings to their website without waiting for weeks or burdening the IT department or the Webmaster. The end result is a constantly up-to-date website, a more impactful traffic
pattern and a significantly enhanced end-user experience.
MultiSite:
MultiSite is One Voice's exclusive, contextually based search technology solution. It allows users to search and display a variety of relevant results simultaneously - getting more information to the user faster than ever before. Incorporated in the IVAN desktop product, MultiSite™ brings unmatched power and flexibility to the search process.
Streaming Windows Media:
-Low Bandwidth - 100 kbps
http://www.onevoicetech.com/video/OV_web_v2_1_100k.asf
-High Bandwidth - 200 kbps
http://www.onevoicetech.com/video/OV_web_v2_1_200k.asf
MultiSite: Get More Information, Faster
MultiSite™ is One Voice's exclusive, contextually based search technology solution. It allows users to search and display a variety of relevant results simultaneously - getting more information to the user faster than ever before. Incorporated in the IVAN desktop product, MultiSite™ brings unmatched power and flexibility to the search process.
VoiceSite: Increase Profits by Voice-Enabling Your Site Quickly & Easily
VoiceSite is One Voice's proprietary Web technology that allows websites to quickly and easily deliver customized voice messages to people visiting your site and visitors to navigate your site using their voice. Using Dialog Studio™, our easy to use voice-scripting application, anyone can now add high-impact messages and personalized greetings to their website without waiting for weeks or burdening the IT department or the Webmaster. The end result is a constantly up-to-date website, a more impactful traffic
pattern and a significantly enhanced end-user experience.
IntelligentVoice Platform:
We have also utilized our 4th Generation voice technology in our IntelligentVoice™ platform, which was developed for voice applications on other devices such as PDA's, PC's and for use in Interactive Multimedia solutions. The IntelligentVoice™ platform allows users to enter free-format information such as contacts and appointments and compose documents using voice. It can also tap into powerful artificial intelligence capabilities that dynamically learn user preferences and provide access to information based on free-form requests. It also opens the doors to new levels of interactivity in games, e-learning and multimedia solutions by providing a powerful, easy-to-use voice interface.
MobileVoice Platform
Our messaging and voice-activated dialing applications are built on our MobileVoice™ platform, which combines the power of natural language speech processing with the scalability, redundancy and fault-tolerance of a server based, telco-ready architecture. The result is the world's only completely integrated solution that allows people to:
- Send free-format voice-to-text messages
- Make voice-activated dialing calls to thousands of
contacts in minutes
- Access their E-Mail and Instant Messages - using
only their voice.
Now users can send and receive E-Mail, Instant Messages, SMS and Paging messages without touching a key.
Board Members DD
-Board Chat Room:
http://groups.yahoo.com/group/NeoMedia_Technologies_Inc/chat
-DiamondTech's Possible PR's Page (Updated Feb 24/2004):
#msg-3003664
-MAILMAN's NeoMedia DD Page:
#msg-2306534
DD Links: (Last Update: 02 May, 2004 1:15 AM)
-Google: (#1 DD LINK)
http://www.Google.com :)
-Baniak, Pine & Gannon:
http://www.bpglaw.com/Page.html
-Connecting the physical world to the Internet (Jan. 1-7 2001):
http://www.neom.com/corporate/press/2001/wscr.pdf
-HP's "Cool Town" (bazaar):
http://www.cooltown.hp.com/
-In-Depth Tech Interview with MusiKube Officials (April 2003):
http://www.pocketpcflash.net/articles/musikube-01.htm
-Metro Furure Store(Virtual Tour):
http://www.future-store.org/servlet/PB/menu/1000373_l2/1075910645620.html
-NeoMedia MicroPaint Repair Video:
http://www.neom.com/products/mpr/mprVideo.jsp
-Nokia's Press Conference:
http://www.nokiawebcast.com/
-PaperClick (Flash Presentation):
http://www.paperclick.com/chkflash.htm
-PaperClick (OverView Presentation):
http://www.neom.com/products/paperclick/PaperClickOverview.pps
-PaperClick Shareholder Presentation:
http://www.neom.com/products/paperclick/PaperClickShareHolder2003.pdf
-RFID Journal
http://www.rfidjournal.com/
-SmartMobs:
http://www.smartmobs.com/index.html
-UVerify's Presentation:
http://www.neom.com/products/ip/UVerifyPresentation.pdf
-VodaFone's Virtual World Revolution:
http://www.vodafone.com/flash/futures/
-Wallstreet Transcript (Dec. 11 2000):
http://www.neom.com/corporate/press/2000/twst.pdf
PaperClick Applications:
-PaperClick for Cell Phones:
http://www.paperclick.com/download/PaperClick_for_cell_phones.pdf
-PaperClick For Palm OS:
http://www.paperclick.com/ToGo/palmos.htm
PaperClick Applications:
-PaperClick for Cell Phones:
http://www.paperclick.com/download/PaperClick_for_cell_phones.pdf
-PaperClick For Palm OS:
http://www.paperclick.com/ToGo/palmos.htm
PaperClick Applications:
1. PaperClick for Cell Phones:
http://www.paperclick.com/download/PaperClick_for_cell_phones.pdf
2. PaperClick For Palm OS™
http://www.paperclick.com/ToGo/palmos.htm
Competition:
Patent Infringement Lawsuit Brought by NeoMedia Against AirClic Inc., Scanbuy, Inc., and LScan Technologies Inc. http://www.neom.com/corporate/press/2004/20040126.jsp (Jan. 26, 2004)
Scanbuy(R), Inc. is a New York-based software company dedicated to developing solutions that link the physical world and the online environment using personal barcode scanners. Utilizing patent-pending technology, Scanbuy's ScanZoom technology transforms cellphone cameras into barcode scanners. http://www.scanbuy.com
AirClic Inc. is a Web-based services company providing the mobile information market with quick, low cost, operationally efficient, highly reliable, low risk solutions. It works with public and private sector companies to enable their field workers to wirelessly capture business events using existing business processes and systems. AirClic services work even while without mobile coverage or when the existing business systems are down and confirm the customers' information was delivered, using "at least once" communication technology. The user experience for the field personnel is familiar and simple - just scan a SmartCode associated with an event or asset and hear the beep. AirClic's customers and their constituents may see the captured information from any Web-enabled device and may extract it into several multiple back-office systems at any frequency. AirClic charges a recurring service fee for customers to obtain a rapid and often immediate return on investment. AirClic Inc. is headquartered in Newtown, PA, USA. http://www.airclic.com
LScan Technologies, Inc. provides tracking and data capture solutions that enable life sciences companies to solve business and regulatory challenges through the advanced use of technology. Located in Conshocken, Pennsylvania, LScan was voted the "Company Most Likely To Go Public" by the 2003 New Jersey Technology Council. LScan is also a member of, and is supported by, the Ben Franklin Technology Partners of Southeastern Pennsylvania (BFTP/SEP). http://www.lscan.com
Bango.net provides a globally deployed service that enables interactive mobile content and services to be simply accessed, readily promoted and easily charged for, across all mobile operators in more than 40 countries. Bango works with many industry leaders including Vodafone, Orange, T-Mobile, Telefonica and O2. More than one thousand content providers world-wide promote and charge for their content and services using Bango. The company is headquartered in Cambridge, England. For further information, go toBango works with many industry leaders including Vodafone, Orange, T-Mobile, Telefonica and O2. Thousands of content providers world-wide promote and charge for their content and services using Bango. The company is headquartered in Cambridge, England. http://www.bango.net.
Patent Infringement Lawsuit Brought by NeoMedia Against AirClic Inc., Scanbuy, Inc., and LScan Technologies Inc. http://www.neom.com/corporate/press/2004/20040126.jsp
Scanbuy(R), Inc. is a New York-based software company dedicated to developing solutions that link the physical world and the online environment using personal barcode scanners. Utilizing patent-pending technology, Scanbuy's ScanZoom technology transforms cellphone cameras into barcode scanners. http://www.scanbuy.com
AirClic Inc. is a Web-based services company providing the mobile information market with quick, low cost, operationally efficient, highly reliable, low risk solutions. It works with public and private sector companies to enable their field workers to wirelessly capture business events using existing business processes and systems. AirClic services work even while without mobile coverage or when the existing business systems are down and confirm the customers' information was delivered, using "at least once" communication technology. The user experience for the field personnel is familiar and simple - just scan a SmartCode associated with an event or asset and hear the beep. AirClic's customers and their constituents may see the captured information from any Web-enabled device and may extract it into several multiple back-office systems at any frequency. AirClic charges a recurring service fee for customers to obtain a rapid and often immediate return on investment. AirClic Inc. is headquartered in Newtown, PA, USA.
http://www.airclic.com
LScan Technologies, Inc. provides tracking and data capture solutions that enable life sciences companies to solve business and regulatory challenges through the advanced use of technology. Located in Conshocken, Pennsylvania, LScan was voted the "Company Most Likely To Go Public" by the 2003 New Jersey Technology Council. LScan is also a member of, and is supported by, the Ben Franklin Technology Partners of Southeastern Pennsylvania (BFTP/SEP).
www.lscan.com
Bango.net provides a globally deployed service that enables interactive mobile content and services to be simply accessed, readily promoted and easily charged for, across all mobile operators in more than 40 countries. Bango works with many industry leaders including Vodafone, Orange, T-Mobile, Telefonica and O2. More than one thousand content providers world-wide promote and charge for their content and services using Bango. The company is headquartered in Cambridge, England. For further information, go toBango works with many industry leaders including Vodafone, Orange, T-Mobile, Telefonica and O2. Thousands of content providers world-wide promote and charge for their content and services using Bango. The company is headquartered in Cambridge, England. www.bango.net.
Board Members DD
-Board Chat Room:
http://groups.yahoo.com/group/NeoMedia_Technologies_Inc/chat
-DiamondTech's Possible PR's Page (Updated Feb 24/2004):
http://www.investorshub.com/boards/read_msg.asp?message_id=2453666
-MAILMAN's NeoMedia DD Page:
http://www.investorshub.com/boards/manage_msg.asp?message_id=2306534
DD Links: (Last Update: 02 May, 2004 1:15 AM)
-12snap
http://www.12snap.com
-Add2Phone
http://www.add2phone.com
-AirClic
http://www.airclic.com
-Bango
http://www.Bango.net
-Baniak, Pine & Gannon:
http://www.bpglaw.com/Page.html
-Big Gig Strategies
http://www.biggigstrategies.com
-Connecting the physical world to the Internet (Jan. 1-7 2001):
http://www.neom.com/corporate/press/2001/wscr.pdf
-Cool Town (Updated March 1rst):
http://www.cooltown.hp.com/
-In-Depth Tech Interview with MusiKube Officials (April 2003):
http://www.pocketpcflash.net/articles/musikube-01.htm
-I-Coupons:
http://www.m-bar-go.com
-L-Scan:
http://www.lscan.com
-Metro Furure Store(Virtual Tour):
http://www.future-store.org/servlet/PB/menu/1000373_l2/1075910645620.html
-Wallstreet Transcript (Dec. 11 2000):
http://www.neom.com/corporate/press/2000/twst.pdf
-Nokia's Press Conference:
http://www.nokiawebcast.com/
-17. Nokia's RFID Phone Scanning:
http://www.rfidjournal.com/article/articleview/834/1/1/
-PaperClick (Flash Presentation):
http://www.paperclick.com/chkflash.htm
-PaperClick (OverView Presentation):
http://www.neom.com/products/paperclick/PaperClickOverview.pps
-PaperClick Shareholder Presentation:
http://www.neom.com/products/paperclick/PaperClickShareHolder2003.pdf
-PaperClick Info-Site:
http://www.paperclick.com/Download/PaperClick_for_Cell_Phones.pdf
-ScanBuy:
http://www.ScanBuy.com
-SEC Filings:
http://www.pinksheets.com/quote/filings.jsp?symbol=NEOM
-Relco:
http://www.relco.com
-SmartMobs:
http://www.smartmobs.com/index.html
-Seven Worldwide:
http://sevenww.com
-UVerify's Presentation:
http://www.neom.com/products/ip/UVerifyPresentation.pdf
-VodaFone's Virtual World Revolution:
http://www.vodafone.com/flash/futures/
NeoMedia Technologies, Inc. is a developer and international marketer of software and patented technologies which link products, print, and physical objects directly to targeted online data, with expertise in homeland security and e-authentication applications. NeoMedia markets PaperClick™ and PaperClick for Cell Phones™, which link physical information and objects to the Internet, and its Systems Integration Group specializes in providing expert-based IT consulting, hardware, and software solutions. http://www.neom.com/corporate/press/2003/20031030.jsp
12snap is an award-winning advertisind agencey focused on mobile channels. Providing campaign realisation and delivery, 12snap develops innovative and effective marketing and CRM programmes for top global companies including McDonald's, Procter & Gamble, Coca-Cola, Budweiser, L'Oreal and Disney.
http://www.12snap.com/uk/press_lounge/upload/040427173312.pdf
Digital Rum is Europe's market leader in delivering mobile solutions. Its product suite enables wireless operators and brands to define, build and deploy a wide range of rich push & pull services to mobile users anytime, anywhere. http://www.neom.com/corporate/press/2004/20040116.jsp
Big Gig Strategies is a U.K.-based consultancy that helps clients explore and execute technologies within the mobile media sector, offering what it calls "technology with a twist." Big Gig operates across all the main brand-related sectors, such as FMCG, pharmaceutical, travel and entertainment, helping brand owners/managers capitalize on the new growth market of mobile permission marketing. http://www.neom.com/corporate/press/2003/20030909.jsp
Seven Worldewide is a subsidiary of Applied Graphics Technologies (AGT). AGT provides digital media asset management services across all forms of media, including print, broadcast, and the Internet and is a leading application service provider for the on-line management of brands. AGT offers a variety of digital imaging and related services to major corporations, which include magazine and newspaper publishers, advertisers and their agencies, entertainment companies, catalogers, retailers, and consumer goods and packaging companies. From locations across the United States, the United Kingdom, and Australia, AGT supplies a complete range of services that are tailored to provide solutions for specific customer needs, with focus on improving and standardizing the management and delivery of visual communications for clients on a local, national, and international basis. Additionally, AGT provides a wide range of advertising and marketing-related creative services for customers, primarily in retailing. http://www.neom.com/corporate/press/2003/20031103.jsp
Based in London, iCoupon Ltd. (Light) is the market leader in mobile bar code technology, and has developed patent-protected technology which links mobile phones, CRM and retailer's EPOS systems, offering brand owners a secure, measurable and traceable alternative to conventional paper. http://www.neom.com/corporate/press/2004/20040113.jsp
Followers
|
2
|
Posters
|
|
Posts (Today)
|
0
|
Posts (Total)
|
66
|
Created
|
05/02/04
|
Type
|
Free
|
Moderators |
Volume | |
Day Range: | |
Bid Price | |
Ask Price | |
Last Trade Time: |