US20060078160A1 - Information providing system and identification information adding device - Google Patents

Information providing system and identification information adding device Download PDF

Info

Publication number
US20060078160A1
US20060078160A1 US11/274,462 US27446205A US2006078160A1 US 20060078160 A1 US20060078160 A1 US 20060078160A1 US 27446205 A US27446205 A US 27446205A US 2006078160 A1 US2006078160 A1 US 2006078160A1
Authority
US
United States
Prior art keywords
image data
identity information
information
image
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/274,462
Inventor
Takeshi Fujita
Hitoshi Endoh
Nariaki Hatta
Yasufumi Fujikawa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/JP2000/005228 external-priority patent/WO2001009726A1/en
Application filed by Individual filed Critical Individual
Priority to US11/274,462 priority Critical patent/US20060078160A1/en
Publication of US20060078160A1 publication Critical patent/US20060078160A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • Y10S707/99945Object-oriented database structure processing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99948Application of database or data structure, e.g. distributed, multimedia, or image

Definitions

  • the present invention relates to an information providing system and the like providing information via a network such as internet.
  • the invention relates to an information providing system and the like which enable to easily conduct investigation of an access status of the user by use of identity information added to image data.
  • WWW World Wide Web
  • HTTP Hyper Text Transfer Protocol
  • GUI Graphic User Interface
  • ISP Internet Service Provider
  • the present invention was made in view of the problems mentioned above, and has an object to provide an information providing system permitting relatively easy investigation of the status of user access.
  • the present invention is characterized by generation of intrinsic identity information meeting an access from a terminal, addition of the thus generated identity information to prescribed image data provided by an informant server unit, and recording of the corresponding relationship between the identity information and the image data containing the added identity information.
  • Applicable informant servers include an HTTP server operating on a general-purpose OS, an application software program such as a file server, and other means such as processes incorporated in a specialized OS, and a dedicated software program.
  • Applicable terminals include an HTTP perusal software operating on a general-purpose OS, processes incorporated in a specialized OS, and means such as a dedicated software program.
  • Applicable means or processes generating intrinsic identity information meeting an access from the terminal include an expansion program of an HTTP server, an independent software program monitoring and controlling accesses to image files, and hardware means having similar functions.
  • Applicable means and processes recording the corresponding relationship between the identity information and image data containing the added identity information include software programs operating independently within a server unit, means such as a logging function of an HTTP server, and means such as software operating outside a server unit.
  • An accounting unit of another aspect of the invention comprises receiving means which, in the presence of image data containing added intrinsic identity information meeting an access from an information use terminal, receives the image identity information extracted by the information use terminal from the image data from the information use terminal, and receives terminal identity information of the information use terminal; storage means which correlates and stores the date of the image identity information and the terminal identity information received by the receiving means; and information processing means which determines whether or not the same combination of image identity information and terminal identity information has already been stored in the storage means, so that accounting is not made when the combination is stored, and accounting is made when the combination is not stored.
  • Another accounting unit of the invention comprises receiving means which, in the presence of image data containing added identity information meeting an access from an information use terminal, receives the image identity information extracted by the information use terminal from the image data from the information use terminal, and receives terminal identity information of the information use terminal; storage means which correlates and stores a date on which the receiving means received the image identity information and terminal identity information, with the image identity information and terminal identity information; and information processing means which determines whether or not the same combination of image identity information, terminal identity information and the receiving date has already been stored in the storage means, so that accounting is not made when the combination is stored, and accounting is made when the combination is not stored.
  • user identity information of the user using the information use terminal is used in place of the terminal identity information.
  • FIG. 1 is a block diagram illustrating an information providing system of an embodiment of the present invention
  • FIG. 2 is a conceptual view schematically illustrating operations of a server unit and a terminal unit composing the information providing system shown in FIG. 1 ;
  • FIG. 3 illustrates an example of a table (generation log) recorded by a database of the aforementioned server unit
  • FIG. 4 illustrates an example of an image displayed on a display unit of the aforementioned terminal unit
  • FIG. 5 illustrates an example of a table (update log) recorded by a database of the aforementioned server unit
  • FIG. 6 is a configuration diagram of an information image file illustrating the storage configuration of image-related information
  • FIG. 7 illustrates an example of image-related information
  • FIG. 8 is a descriptive view of an access to a pointer by menu selection
  • FIG. 9 is a descriptive view of a telop display processing
  • FIG. 10 is a descriptive view of addition of information image by drag-and-drop from the menu
  • FIG. 11 is a descriptive view of an embodiment in which tab selection is switched over between display of a first management area and a second management area;
  • FIG. 12 is a descriptive view of an embodiment in which a first management area and a second management area are separated by a frame and displayed simultaneously;
  • FIG. 13 is a descriptive view of an embodiment in which, when accessing the information image file in the first management area (HTML), the second management area (HTML) is displayed after being updated, thus managing a new information image file.
  • HTML first management area
  • FIG. 1 is a block diagram illustrating the configuration of an information providing system of an embodiment of the present invention.
  • This information providing system has a server unit 20 connected via a network 10 such as internet, and a terminal unit 30 .
  • a network 10 such as internet
  • a terminal unit 30 a terminal unit
  • the server unit 20 comprises a microprocessor (MPU) 21 , a memory 22 , a hard disk drive unit (HDD) 23 storing an operating system (OS), software such as an HTTP server, text data, and image data and the like, and a network interface (NIC) 24 and so on.
  • MPU microprocessor
  • HDD hard disk drive unit
  • OS operating system
  • NIC network interface
  • the terminal unit 30 comprises a microprocessor (MPU) 31 , a memory 32 , an HDD 33 storing an operating system (OS) and an HTTP perusal software (Web browser), a display interface 34 , an input interface 35 , and a network interface (NIC) 36 and so on.
  • MPU microprocessor
  • memory 32 storing an operating system (OS) and an HTTP perusal software (Web browser)
  • HTTP perusal software Web browser
  • display interface 34 storing an input interface 35
  • NIC network interface
  • a display unit 37 is connected to the display interface 34 , which displays an OS operating screen and a display screen of the Web browser or the like.
  • Keyboard 38 and Pointing devices 39 such a mouse are connected to the input interface 35 . An instruction of the user or the like is entered via these peripheral devices.
  • FIG. 2 is a conceptual diagram schematically showing functional blocks of the server unit 20 and the terminal unit 30 .
  • the server unit 20 under the control by the OS 201 , control of the entire unit, communication control process 202 allocating the communication process to prescribed services such as Telnet, FTP and HTTP on the basis of port information and the like, and the process of the HTTP server 203 are performed in parallel.
  • communication control process 202 allocating the communication process to prescribed services such as Telnet, FTP and HTTP on the basis of port information and the like, and the process of the HTTP server 203 are performed in parallel.
  • the Web browser 303 When entering a target address (URL: Uniform Resource Locator; having a portion specifying the host name of the server unit in which the HTTP server is executed, and a portion specifying the file name) by operating the terminal unit 30 from the user via the input interface 35 , the Web browser 303 sends a connection request including the file name to the server unit 20 corresponding to the host name.
  • This connection request is supplied to the destination server unit 20 via the communication control process 302 and the network 10 , and supplied to the HTTP server 203 via the communication control process 202 .
  • the HTTP server 203 reads out data corresponding to the file name given in the connection request from the HDD 23 , and transmits the same to the terminal unit 30 .
  • the URL specified first by the user may indicate in some cases only the host name, or only the host name and a specific directory. In such a case, the root directory of that host or a standard name file (index.html) present in the indicated directory is read out and transmitted to the terminal unit 30 .
  • the file from the HTTP server 203 is supplied to the Web browser 303 via the network 10 and the communication control process 302 of the terminal unit 30 .
  • the Web browser 303 generates display image data in accordance with the description in this file, and supplies the same to the OS 301 .
  • the OS 301 forms an image in the window assigned to the Web browser from the display image data from the Web browser 303 , and causes the display screen of the display unit 37 to display the same via the display interface 34 .
  • the Web browser 303 When image display is specified, together with the file name of the image data in the file supplied from the HTTP server 203 , for example, the Web browser 303 requests the HTTP server 203 to transmit the image data corresponding to that file name.
  • HTTP server 203 Upon receipt of such a transmission request, HTTP server 203 reads out the image data of the requested file name from the HDD 23 , and transmits it to the Web browser 303 .
  • the Web browser 303 Upon receipt of the image data, the Web browser 303 treats the received image data as the image data at a prescribed position in the aforementioned display image data, and supplies the same to the OS 301 .
  • the server unit 20 when the HTTP server 203 transmits particular image data, there are executed an identity information adding process 205 which adds intrinsic identity information meeting an access from the user to the image data, and a database 206 recording individual pieces of identity information are executed.
  • the identity information adding process 205 is mounted in the form of an extended program (so-called plug-in) of the HTTP server 203 .
  • an extended program so-called plug-in
  • the identity information adding process 205 adds intrinsic identity information meeting user's access to the image data.
  • the identity information added to the image data suffices to be information intrinsic to the individual accesses. It is therefore possible to generate it on the basis of information such as the date and time of access to the IP address and server of the terminal unit 30 currently operated by the user. Or, the identity information to be added to the image data may be generated by use of intrinsic identity information imparted to each user or each terminal unit 30 to the image data process 304 handling the image data containing the added identity information, as described later.
  • the date and time of access itself may be used as the identity information. Since two or more accesses to one server unit 20 are never processed simultaneously in the usual course of operation, the date and time of access may be the information specifying an access. Even when adding the date and time of access to the image data as identity information, therefore, it is possible to identify individual image data.
  • a function of recording an access log from the user is mounted as a function of the HTTP server.
  • the IP address, the date and time of access and the like of the terminal unit 30 of the user using the HTTP server can be recorded in this access log.
  • the IP address corresponding to the date and time of access added to the image data is available by referring to the access log. It is therefore possible to easily specify an IP address of the user in access to the image data.
  • identity information so as to permit recognition as image data
  • it may, for example, be added in a vacant area defined on the image format, or it may be embedded in the image data, using the so-called electronic water-marking technique of adding the information in a dispersed form in the image data. It may also be added before or after the image data main body on the image format.
  • the identity information may be added as it is to inhibit processing load, or may be added after subjecting the information to processing such as appropriate coding or enciphering for improvement of security.
  • the image data containing the thus added identity information are treated as ordinary image data on the file delivery process 204 and communication control process 202 , and transmitted to the Web browser 303 of the terminal unit 30 .
  • the database 206 acquires the information showing user's access status via the OS 201 , the HTTP server 203 and the like, creates a table (generation.log) representing the corresponding relationship between the identity information added through the identity information adding process 205 and the information showing user's access status, and records the thus created table in the HDD 23 .
  • this generation log contains the accessing IP address, the name of the host of the server unit 20 in which the HTTP server 203 is operating, the date and time of access, the file name of image data, and the identity information (ID) added by the identity information adding process 205 and so on.
  • the identity information added to the image data, and the information showing user's access status such as the accessing IP address and the date and time of access are available. It is therefore possible to relatively easily investigate user's access status and so on.
  • the identity information adding process 205 can add also information such as URL to the image data in addition to the identity information.
  • Such a function has conventionally achieved by use of the HTTP server in the so-called banner advertising.
  • banner advertising it is necessary to provide processes such as defining a button for causing linking with the prescribed URL in accordance with HTML, and specifying the file name of the prescribed image data as the image of this button.
  • the file defining URL is separate from the file of the image data, even a third party can easily refer only to the file of the image data as the image of a button of a link different from that of the original URL. That is, it would be easy to steal the image data for uses not intended by the maker of the image data.
  • identity information is added to the image data, it is possible to certainly retain identity information and to improve reliability of the result of investigation as compared with an investigation using the conventional Cookie and the like.
  • FIG. 2 illustrates an example in which the identity information adding process 205 is mounted as a extended program of the HTTP server 203 , it suffices that there is provided a function of adding intrinsic identity information meeting a user's access to particular image data. Therefore, it is also possible to previously place the image file in a file server independent of the HTTP server, monitor accesses to this file server, and deliver the image data containing the added identity information meeting user's access upon receipt of an access request to a particular image file.
  • the HTTP server and the file server are mounted as separate units, but these units may be executed as a plurality of server programs and identity information adding processes or the like on a single OS.
  • a physically single unit can execute processes equivalent to those of a plurality of units.
  • the access right or the like can be set separately for the HTTP server and the file server or the like, thus bringing about an improvement of flexibility in setting security. As a result, this can contribute to the improvement of security.
  • execution of the application program operating in cooperation, for example, with the Web browser 303 causes execution of a process for handling the image data containing the added intrinsic identity information (image data processing) 304 .
  • This image data process 304 execute a processing in response to the identity information from the image data upon receipt of the supplied image data containing the added identity information from the Web browser 303 .
  • This processing includes management of performing storage, deletion, update and the like of the image data on the basis of the identity information, and in the case where information such as URL is added to the image data as described above, includes processing of execution in accordance with this information.
  • a window 402 is assigned to this image data process 304 by the aforementioned OS 301 as in the window 401 of the Web browser 303 .
  • Supply of the image data from the Web browser 303 to the image data process 304 can be accomplished through so-called drug-and-drop operation under control by the OS 301 .
  • the image data are supplied from the Web browser 303 to the image data process 304 via the OS 301 , by further operating the pointing device 39 to cause the pointer 403 to move onto the window 402 of the image data process 304 , and releasing operation of the button of the pointing device 39 and the like.
  • the image data process 304 Upon supply of the image data, the image data process 304 causes display of the image 405 corresponding to the supplied image data at the position of the pointer 403 .
  • Storage of the image data is accomplished, when the image data are supplied through the aforementioned drag-and-drop operation, by the image data process 304 through storage in a prescribed area of the HDD 33 via the OS 301 . And deletion of the image data is conducted by deleting the image data selected by user's instruction from the prescribed area of the above-mentioned HDD 33 .
  • Update of the image data is performed for updating the stored image data into the latest ones.
  • This update processing may be executed in compliance, for example, with user's instruction, or on the basis of information such as the date of preparation recorded in the file of the image data. It may be automatically executed at prescribed intervals.
  • the image data process 304 After start of the update processing, the image data process 304 first extracts the identity information added to the image data to be updated, and transmits this identity information and the file name or the like to the HTTP server 203 and the database 206 to request update of the image data.
  • Such an update request is supplied to HTTP server 203 and the database 206 as a packet of a prescribed port via the communication control process 302 , the network 10 , and the communication control process 202 .
  • the image data process 304 may transmit the entire image data, and the HTTP server 203 or the database 206 may extract the identity information from the image data thus obtained.
  • client ID intrinsic identity information
  • This client ID is supplied to the HTTP server 203 and the database 206 as a packet for a prescribed port via the communication control process 302 , the network 10 , and the communication control process 202 upon updating the image data or the like.
  • the file delivery process 204 of the HTTP server 203 instructs the HDD 23 to read out the image data corresponding to the file name contained in the update request.
  • the identity information adding process 205 generates new identity information meeting user's access status and adds the same to the image data.
  • the image data containing new added identity information are supplied to the image data process 304 of the terminal unit 30 via a prescribed port, thus causing update of the image data.
  • the database 206 acquires information showing user's access status via the OS 201 and the HTTP server 203 or the like, prepares a table (update log) representing the corresponding relationship between the identity information added anew by the identity information adding process 205 and the information showing user's access status, and records the same in the HDD 23 , separately from the generation log described above.
  • this update log contains, like the generation log, the accessing IP address, the host name of the server unit 20 in which identity information has newly been added, the date and time of access (date and time of update), the file name of the image data, and the identity information added by the identity information adding process 205 , and in addition, information for specifying the server unit 20 having generated the original identity information (generated server ID), and the client ID for specifying the user of the terminal unit 30 used by the user.
  • this update log there is available information for updating the image data and for specifying the user or the terminal unit 30 , in addition to user's access status resulting from the aforementioned generation log. That is, it is possible to relatively easily conduct an investigation of user tendency through image data update status.
  • the update log there is available information for specifying the user or the terminal unit 30 corresponding to the identity information added to the image data, thus permitting more accurate identification of the route of acquisition of the image data and the like.
  • the image data process 304 extracts the added information, and performs the process in accordance with the thus extracted information.
  • the image data process 304 records this URL, and when access to the URL is instructed by the user, instructs the Web browser 303 to access the URL.
  • the user can easily make an access to this URL by causing the image data containing the desired added URL to be supplied from the Web browser 303 to the image data process 304 . That is, the image data serve as a link to a particular URL.
  • bookmark is known to have such a function.
  • the bookmark since the bookmark is stored as character information, it may sometimes be difficult to recognize an actual destination of linkage.
  • the aforementioned banner advertising is known to show a link to a prescribed URL by means of an image.
  • the image data and the link destination URL are independent of each other. By retaining the image data alone, therefore, the URL of the link destination is not retained.
  • FIG. 2 covers a case where the image data process 304 is mounted as a process separate from the Web browser 303 , it suffices to have a function of handling the information added to the image data, so that it may be mounted as an extended program (so-called plug-in) of the Web browser 303 .
  • the present invention is not limited to the above-mentioned embodiment, but the configuration and the mounting method can be changed appropriately within the scope of technical idea of the invention.
  • the server unit 20 and the terminal unit 30 have been shown as independent units. By executing a program carrying out the both processes, it is possible to ensure simultaneous execution of the server unit and the terminal unit.
  • FIG. 6 shows an example of data structure of the image file handled in the above-mentioned embodiment.
  • the image file shown in FIG. 6 comprises a start section 51 indicating the start of a data stream, an image data section 52 describing the display data of the image, a comment section 53 describing information not affecting display of the image, and an end section 54 indicating the end of the data stream.
  • this data structure is adopted in a JPEG file and a GIF file.
  • Identity information to be added to the aforementioned image data and pointer information such as URL can be described in the comment section 53 as those not affecting display of the image.
  • a format having an area of information not affecting display of the image can be described in this area.
  • Identity information intrinsic to the image file one or more information pointers, an index of menu items corresponding to the image file, or/and actual contents of a program can be recorded in an area ignored upon display of the image in a data stream of the image file. Addition may be accomplished by the digital watermark technique to the image data, as described above.
  • image-related information identity information added to the image data and pointer information
  • image-related information An image file containing image-related information added to the image data shall be called an “information image file”.
  • FIG. 7 is a structure diagram of image-related information.
  • the image-related information shown in FIG. 7 ( a ) includes information regarding the name of image, password, expiration date, thumb nail image, category and keyword.
  • the “name of image” is the name of the image thumb-nail-displayed in the window 402 of the image data process 304 .
  • the “password” is the password which the user is requested to enter upon supplying an information image file to the image data process 304 . Only the user knowing this password can register an information image file in the image data process 304 .
  • the “expiration date” is an expiration date of the information image file supplied to the image data process 304 . When the expiration date elapse, the information image file is deleted from the recording area of the HDD 33 .
  • the “thumb nail image” means data of the image file thumb-nail-displayed in the window of the image data process 304 in place of the image so far displayed on the browser upon supplying the information image file displayed on the browser to the window of the image data process 304 .
  • the “category” represents data specifying a folder in which the information image file is to be stored upon supplying the information image file to the image data process 304 .
  • the image data process 304 newly prepares a folder of a specified name.
  • the “keyword” is a word serving as a retrieval key when retrieving an information image file already supplied by the image data process 304 .
  • the image-related information shown in FIG. 7 ( b ) comprises, for each pointer information, a set of command name, action table, allocation of mouse (pointing device) operations, and platform correlated with each other.
  • the “pointer information” specifies the location of a file on a local computer or on the network.
  • a file name a path name indicating the location of resources present on a local computer, a UNC (Universal Naming Convention) indicating the location of resources in a network environment, or an URL (Uniform resource Locator) or URLs (Uniform Resource Identifiers) indicating the location of resources on internet or an intranet constitute pointer information.
  • the “command name” is a display name used when displaying contents of a pointer on the menu, including, for example, “access to a home page”.
  • the “menu” means a menu displayed and becoming capable of being selected on display means 37 upon clicking the right button of the mouse 39 .
  • the “action table” specifies operations of the image data process 304 . Details of the specified operations include whether or not a file indicated by the pointer information added to the information image file upon supply of the information image file to the image data process 304 is to be stored in the HDD 33 (storage means) of the terminal unit 30 , whether or not that file is to be automatically executed, and the method of execution of that file (telop display, image reproduction, audio reproduction) or the like.
  • the “allocation of mouse operations” sets mouse operations for making an access to the pointer information. The kinds of setting include double click, shift+double click, ctrl+double click, and alt+double click.
  • the “platform” specifies an environment (platform, OS) befitting to a file indicated by the pointer information. For example, when the OS 301 is windows (trademark), the image data process 304 selects a corresponding information pointer in the windows and displays the same on the above-mentioned menu.
  • FIG. 8 is a descriptive view of a method of accessing the pointer through menu selection.
  • the user operates the mouse 39 (pointing device), and places the pointer 403 on the image 405 supplied to the window 402 of the image data process. Then, the user clicks the right button of the mouse 39 .
  • the MPU 31 information processing means
  • the MPU 31 reads out image-related information ( FIG. 7 ( b )) contained in the information image file corresponding to the image 405 from the recording means 33 , and generates menu display data.
  • the MPU 31 extracts the “command name” as a menu item, and displays the menu 55 on the display means 37 .
  • the user operates the mouse 39 to move the pointer 403 , and places the same on the menu item to be selected.
  • the MPU 31 refers to the image-related information ( FIG. 7 ( b )), and accesses the pointer by entering the pointer information corresponding to the selected command name in the browser 303 .
  • the MPU 31 executes the received file in accordance with the action table corresponding to the command name selected this time. For example, the MPU 31 executes reproduction of an image based on the Realplayer (trademark).
  • the menu items displayed when clicking the image displayed in the window 402 of the image data process are dependent upon contents of the image-related information embedded in the information image file.
  • the information image file containing the image-related information has been transmitted from the server unit 20 . That is, the menu items displayed by mouse clicking are characterized in that they depend upon information downloaded from the server unit 20 .
  • the MPU 31 When button operation of the mouse 39 or key operation of the keyboard 38 are performed in a state in which the window 402 of the image data process has been selected, access to a prescribed information pointer is made possible in response to these operations.
  • the MPU 31 Upon operation of the mouse 39 or operation of the keyboard 38 , the MPU 31 refers to the image-related information and to the “allocation of mouse operations” ( FIG. 7 ( b )), and determines whether or not the corresponding operations are defined. When the corresponding operations are defined, the MPU 31 reads out the pointer information corresponding to these operations, and accesses that pointer by entering the pointer into the browser 303 .
  • the MPU 31 Upon receipt of the file returned from the server in response to the access destination, the MPU 31 executes the received file in accordance with the action table corresponding to the command name selected this time. The same mouse operation may be allocated to a plurality of actions.
  • FIG. 9 is a descriptive view of telop display operations.
  • the pointer storing the telop text file is specified in the corresponding pointer information, and simultaneous accomplishment of storage of the text file in the local disk upon downloading the information image file is specified in the action table.
  • Action (control code) of telop display is specified.
  • For the allocation of mouse operations for example, single click of the left button is specified (these settings are made usually by the information image provider on the server side).
  • the MPU 31 When the information image file having the image-related information is supplied from the browser 303 to the image data process 304 in the terminal unit 30 , the MPU 31 refers to the image-related information, and begins accessing the pointer having received the specification of “storage”.
  • the text file of telop is downloaded from the server corresponding to that pointer, and the same is stored in the local HDD 33 .
  • the MPU 31 refers to the image-related information corresponding to the selected image, and confirms that the control code defined in the action table is the “telop display”. Then, a long and slender window for telop-display is displayed in the area of window of the image data process (or outside the area) as shown in FIG. 9 , and the telop text read out from the HDD 33 is scroll-displayed in this window. As shown in FIG. 9 , when a plurality of images 405 are supplied, it is also possible to display different telops in response to the images selected by the mouse 39 .
  • supply of the information image file to the image data process has been described as being capable of being accomplished through drag-and-drop operation from the window 401 of the browser to the window 402 of the image data process. Other methods of supply will be described here.
  • FIG. 10 is a descriptive view of drag-and-drop operation from the menu.
  • the menu 55 (first management area) is displayed by clicking the right button of the mouse 39 , and a menu item for adding an information image is selected from the mouse 39 .
  • the menu for adding information image is selected by previously setting the control code of the action table to the control code specially for adding image, as defined in the bottom line in FIG. 7 ( b ).
  • the MPU 31 detects this operation and refers to the image-related information ( FIG. 7 ( b )).
  • downloading of a new information image file and supply thereof to the image data process 304 may be done by clicking the menu item for adding information image simply on the mouse 39 .
  • the new information image file may be stored in an already supplied information image file.
  • the MPU 31 when the menu item for adding information image (first management area) is drag-and-dropped, the MPU 31 , not accessing the server on the network, but refers to the image-related information of the information image file which is the object of the current run of operation, reads out another information image previously registered therein, and supplies the same to the image data process 304 (second management area).
  • the information image file may be supplied to the image data process 304 by drag-and-dropping the information image file attached to the mail software into the window 402 of the image data process.
  • a perusal window of the main text or a confirmation window of the attached file serves as a first management area. In this case, it is possible to cause circulation of the information image file on electronic mail for receiver's use, thus permitting effective diffusion of the information.
  • the information image file once copied on a prescribed folder from the browser or the mail software may be supplied by drag-and-dropping the same from that folder (first management area) to the window 402 (second management area) of the image data process.
  • the MPU 31 detects drag-and-drop operation from an arbitrary folder to the window 402 of the image data process, and supplies the information image file to the image data process 304 as in the above-mentioned case of drag-and-drop processing from the browser.
  • the information image file may be supplied to the image data process 304 as a result of MPU 31 's detection of the fact that the information image file managed outside the image data process 304 was clicked.
  • the information image file may be supplied to the image data process by copying the information image file managed outside the image data process 304 onto a clip-board, and subsequently, when the information image file is pasted to the window 402 of the independent of each other, as shown in FIG. 4 , or may be implemented in any other form.
  • FIG. 11 illustrates an embodiment in which the window 401 of the Web browser and the window 402 of the image data process are provided by a single program; a display selecting tab at the top of the window is selected through operation of input means 35 ; and the selected side window is selectively displayed on the screen.
  • the information image file 404 displayed in the window 401 of the Web browser is accessed and registered in the window 402 of the image data process on the background. Access to the information image file 404 can be made by any of the aforementioned methods.
  • the window 402 of the image data process is displayed by operating the display selecting tab through the input means 35 . This makes it possible to access the information image files already registered in the image data process.
  • FIG. 12 illustrates a case where frame-structured display windows are provided, one as the window 401 of the Web browser, and the other as the window 402 of the image data process.
  • it is easy to conduct an accessing operation of drag-and-dropping the information image file 404 from the frame 401 of the Web browser to the frame of the image data process. It is of course possible, however, to supply the information image file to the image data process by any of the aforementioned accessing methods.
  • processing means 31 when making an access to the information image file 404 displayed in the window 401 of the Web browser, processing means 31 starts up a plug-in previously implemented in the Web browser. Any of the aforementioned accessing methods to the information image file may be adopted.
  • the started plug-in adds management of a new information image file to a local HTML file stored previously in storage means 33 as a second management area.
  • the local HTML file is deployed as a second management area 402 in the Web browser.
  • the browser may be an existing Web browser, or a new Web browser may be started up and separately deployed.
  • the identity information adding process 205 of the server unit 20 has a function of adding image-related information to be added to the image data after encryption.
  • the encryption algorithm is updated at prescribed time intervals By encrypting the image-related information, it is possible to prevent a third party from using the image file by adding, deleting or modifying illegally the image-related information.
  • the MPU 31 when referring to the image-related information added to the image data, the MPU 31 decodes the image-related information.
  • the decoding algorithm is previously stored in the HDD 33 in a manner corresponding to the encryption algorithm in the server unit 20 .
  • the encryption algorithm of the server unit 20 is updated at certain time intervals, it is necessary to update the decoding algorithm of the terminal unit 30 so as to meet the encryption algorithm when updating the encryption algorithm of the server unit 20 .
  • the server unit 20 manages versions of the decoding algorithm stored in the terminal unit 30 in a database for each ID (IP address and the like) of the terminal unit.
  • ID IP address and the like
  • flags are provided for IDs of all the terminal units.
  • a decoding algorithm corresponding to the new encryption algorithm is transmitted for update, and flags corresponding to IDs of the terminal units for which update has been completed are cancelled.
  • the decoding algorithm is stored in the HDD 23 of the server unit.
  • the image data process 304 has a function of trying to decode the image-related information contained in an information image file upon supply of the information image file, and checking up whether or not the data structure of the decoded image-related information is normal. If the data structure after decoding is not normal, supply of that information image file is discontinued. As a result, it is possible to prevent supply of an illegally modified information image file. Determination of an illegal information image file may be based on the identity information added to the image data.
  • the accounting method applied when supplying the information image file from the browser to the image data process 304 will now be described. Accounting is conducted, when supplying the information image file from the browser to the image data process 304 , by that image data process 304 requesting accounting process by accessing the server unit 20 .
  • the access log (generation log) described in the embodiments of the invention is generated under condition that the information image file has been supplied from the browser to the image data process 304 in the terminal unit 30 . That is, when the information image file is supplied to the image data process 304 , the MPU 31 extracts the identity information embedded in the information image file from the supplied information image file, and transmits this identity information and the file name of the information image file to the server unit 20 .
  • the server unit 20 correlates the received identity information and the image file name with the accessing terminal IP address, the host name, and the date and time of access, and generates a generation log ( FIG. 3 ) described above. Therefore, the fact that the information image file was supplied to the image data process in the terminal unit 30 is recorded in the access log of the server unit 20 .
  • the first accounting method comprises accounting only for the first supply and not accounting for the second and subsequent supplies when the same information image file is supplied through the same terminal (or the same user, or image data process 304 having the same ID).
  • the MPU 31 of the terminal unit transmits intrinsic identity information imparted to the information image file and the file name of the information image file to the server unit 20 , and proposes accounting to the server unit 30 .
  • the MPU 21 of the server unit Upon receipt of the proposal of accounting, the MPU 21 of the server unit compares the IP address of the accessing terminal and the host name, as well as the received identity information and the image file name with those recorded in the generation log, and determines whether or not the same information image file has ever been supplied at the same terminal to the image data process 304 in the past. As a result, if the same image file has been supplied, accounting is not made for the current supply. On the other hand, if the same information image file has never been supplied to the image data process 304 at the same terminal, the supply is subjected to accounting as a new supply.
  • the second accounting method is the same as the first accounting method except that, even for a supply of the same information image file at the same terminal, accounting is made if it is a supply on another date.
  • a conceivable usage of the information image file is that, within an effective period, free contents service is available. In such a case, if the same information image file can be supplied repeatedly without accounting at the same terminal, the effective period for the free contents service would lose its meaning. Therefore, even for the supply of the same information image file at the same terminal, one on another date is subjected to accounting.
  • the MPU 31 of the terminal unit transmits the intrinsic identity information imparted to the information image file and the file name of the information image file to the server unit 20 , and proposes accounting to the server unit 30 .
  • the MPU 21 of the server unit compares the IP address of the accessing terminal and the host name, as well as the received identity information and the image file name with those recorded in the generation log to see whether or not quite the same data have been registered on the same date. As a result, if it is registered on the same date, no accounting is made. On the other hand, if it is not registered on the same date, the current supply of the information image file is subjected to accounting.
  • the same user may be determined, not with the same terminal.
  • a user authentication organization (function) is provided in or outside the server unit 20 .
  • the user authentication organization requests authentication to the user, and permits access to the server unit 30 when user authentication is properly conducted. According to this method, it is possible to identify the user. It is therefore possible to determine, for each user, whether or not the same information image file has ever been supplied to the image data process 304 in the past.
  • Java applet and the ActiveX control are program units permitting execution of browser software such as Netscape (trademark) or Internet Explorer (trademark).
  • the execution codes thereof are written in Java intermediate code for the Java applet, and in CPU native code for the ActiveX control, and the browser can start execution in the both cases.
  • Both the Java applet and the ActiveX control permit graphic display on the browser display screen.
  • Java applet or ActiveX control an applet for image display alone is provided in place of the icons having embedded related information. In place of display of these icons by use of tags on the browser (IMG), it suffices to cause implementation of the applet by using (EMBED) or (APPLET). Embedding of the related-information may be accomplished in the program form in the both cases.
  • intrinsic identity information is generated in response to an access from a terminal.
  • the generated identity information is added to prescribed image data provided by an information providing server unit, and the corresponding relationship between the identity information and the image data containing the added identity information is recorded.
  • this corresponding relationship it is possible to obtain information regarding user access corresponding to the identity information added to the image data, such as the address of the terminal used by the user, the time of access and the like. It is therefore possible to relatively easily conduct an investigation of access status from the terminal.
  • identity information adding means separately from the information providing server unit, it is possible to individually set access limitation, and to improve setting flexibility.

Abstract

The present invention has an object to facilitate investigation of access status in internet.
To achieve this object, when the HTTP server (203) transmits prescribed image data, identity information meeting the access from the terminal unit (30) is generated in the identity information adding process (205), and added to prescribed image data. The corresponding relationship between the identity information and the image data containing the added identity information is recorded in the database (206).

Description

    TECHNICAL FIELD
  • The present invention relates to an information providing system and the like providing information via a network such as internet. In particular, the invention relates to an information providing system and the like which enable to easily conduct investigation of an access status of the user by use of identity information added to image data.
  • BACKGROUND ART
  • WWW (World Wide Web) services provided by many HTTP (Hyper Text Transfer Protocol) servers connected to internet can easily be utilized by operating HTTP perusal software such as a Web browser executed on a user terminal connected to internet.
  • Operation of a Web browser has been facilitated by introduction of GUI (Graphical User Interface). The number of HTTP servers in use connected to internet is rapidly increasing. This tendency makes it easy for users to obtain many pieces of information, and WWW services have rapidly become popular.
  • Recently, commercial transactions have been made through WWW services. Because of the possibility to easily investigate access status of the user as compared with ordinary commerce, it has been now used also for marketing activity.
  • For carrying out such an investigation, the following methods are known:
  • (1) Storing identity information intrinsic to the each user using HTTP perusal software such as a so-called Web browser, such as Cookie or the like on the user terminal, an HTTP server acquiring this identity information when the user makes an access to the HTTP server, and recording and analyzing user's accesses to the information provided by the HTTP server;
  • (2) Analyzing a transmission packet from the user terminal connected to an internet service provider (hereinafter simply referred to as an ISP (Internet Service Provider)), and recording and analyzing user's accesses to the information provided by the HTTP server; and
  • (3) Recording and analyzing user's accesses, separately from information provided by the HTTP server and access log of the HTTP server, by an application independent of the HTTP server such as access analyzing software and the like.
  • To put it specifically, there is a method of recording information corresponding to user access in a file by use of the Java (trademark) applet adopted, for example, in http;//www.snippet.com/home.htm or the like.
  • However, in the aforementioned method (1), there has been room for improvement in terms of certainty, for example, in that Cookie cannot be used for some set conditions of the HTTP perusal software executed at the user terminal.
  • Because issuance and management of Cookie are accomplished for each HTTP server, it is impossible to carry out an investigation of access status in cooperation with the other HTTP server. In order to investigate access status of the user to a plurality of HTTP servers, therefore, it is necessary to unify access status data for the individual HTTP servers, and a larger number of servers makes it difficult to conduct such an investigation.
  • In the aforementioned method (2), when investigating access status to an external HTTP server managed outside the ISP used for the user to connect to internet, objects of investigation increase because of a very large number of HTTP servers connected to internet, thus making it very difficult to accomplish investigation.
  • In the aforementioned method (3), it is necessary to operate an application for carrying out the investigation and to analyze logs, separately from management of information and logs provided by the HTTP server, and also to conduct complicated operations such as specification of an HTTP server to be investigated, thus preventing easy accomplishment of the investigation.
  • The present invention was made in view of the problems mentioned above, and has an object to provide an information providing system permitting relatively easy investigation of the status of user access.
  • DISCLOSURE OF INVENTION
  • The present invention is characterized by generation of intrinsic identity information meeting an access from a terminal, addition of the thus generated identity information to prescribed image data provided by an informant server unit, and recording of the corresponding relationship between the identity information and the image data containing the added identity information.
  • Applicable informant servers include an HTTP server operating on a general-purpose OS, an application software program such as a file server, and other means such as processes incorporated in a specialized OS, and a dedicated software program.
  • Applicable terminals include an HTTP perusal software operating on a general-purpose OS, processes incorporated in a specialized OS, and means such as a dedicated software program.
  • Applicable means or processes generating intrinsic identity information meeting an access from the terminal include an expansion program of an HTTP server, an independent software program monitoring and controlling accesses to image files, and hardware means having similar functions.
  • Applicable means and processes recording the corresponding relationship between the identity information and image data containing the added identity information include software programs operating independently within a server unit, means such as a logging function of an HTTP server, and means such as software operating outside a server unit.
  • An accounting unit of another aspect of the invention comprises receiving means which, in the presence of image data containing added intrinsic identity information meeting an access from an information use terminal, receives the image identity information extracted by the information use terminal from the image data from the information use terminal, and receives terminal identity information of the information use terminal; storage means which correlates and stores the date of the image identity information and the terminal identity information received by the receiving means; and information processing means which determines whether or not the same combination of image identity information and terminal identity information has already been stored in the storage means, so that accounting is not made when the combination is stored, and accounting is made when the combination is not stored.
  • Another accounting unit of the invention comprises receiving means which, in the presence of image data containing added identity information meeting an access from an information use terminal, receives the image identity information extracted by the information use terminal from the image data from the information use terminal, and receives terminal identity information of the information use terminal; storage means which correlates and stores a date on which the receiving means received the image identity information and terminal identity information, with the image identity information and terminal identity information; and information processing means which determines whether or not the same combination of image identity information, terminal identity information and the receiving date has already been stored in the storage means, so that accounting is not made when the combination is stored, and accounting is made when the combination is not stored.
  • In the accounting unit, user identity information of the user using the information use terminal is used in place of the terminal identity information.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram illustrating an information providing system of an embodiment of the present invention;
  • FIG. 2 is a conceptual view schematically illustrating operations of a server unit and a terminal unit composing the information providing system shown in FIG. 1;
  • FIG. 3 illustrates an example of a table (generation log) recorded by a database of the aforementioned server unit;
  • FIG. 4 illustrates an example of an image displayed on a display unit of the aforementioned terminal unit;
  • FIG. 5 illustrates an example of a table (update log) recorded by a database of the aforementioned server unit;
  • FIG. 6 is a configuration diagram of an information image file illustrating the storage configuration of image-related information;
  • FIG. 7 illustrates an example of image-related information;
  • FIG. 8 is a descriptive view of an access to a pointer by menu selection;
  • FIG. 9 is a descriptive view of a telop display processing;
  • FIG. 10 is a descriptive view of addition of information image by drag-and-drop from the menu;
  • FIG. 11 is a descriptive view of an embodiment in which tab selection is switched over between display of a first management area and a second management area;
  • FIG. 12 is a descriptive view of an embodiment in which a first management area and a second management area are separated by a frame and displayed simultaneously;
  • FIG. 13 is a descriptive view of an embodiment in which, when accessing the information image file in the first management area (HTML), the second management area (HTML) is displayed after being updated, thus managing a new information image file.
  • BEST MODE FOR CARRYING OUT THE INVENTION
  • FIG. 1 is a block diagram illustrating the configuration of an information providing system of an embodiment of the present invention.
  • This information providing system has a server unit 20 connected via a network 10 such as internet, and a terminal unit 30. In FIG. 1, each one server unit 20 connected to the network 10 and one terminal unit 30 are shown for convenience' sake. There is no particular limitation however on the number of server units 20 and terminal units 30.
  • The server unit 20 comprises a microprocessor (MPU) 21, a memory 22, a hard disk drive unit (HDD) 23 storing an operating system (OS), software such as an HTTP server, text data, and image data and the like, and a network interface (NIC) 24 and so on.
  • The terminal unit 30 comprises a microprocessor (MPU) 31, a memory 32, an HDD 33 storing an operating system (OS) and an HTTP perusal software (Web browser), a display interface 34, an input interface 35, and a network interface (NIC) 36 and so on.
  • A display unit 37 is connected to the display interface 34, which displays an OS operating screen and a display screen of the Web browser or the like. Keyboard 38 and Pointing devices 39 such a mouse are connected to the input interface 35. An instruction of the user or the like is entered via these peripheral devices.
  • FIG. 2 is a conceptual diagram schematically showing functional blocks of the server unit 20 and the terminal unit 30.
  • In the server unit 20, under the control by the OS 201, control of the entire unit, communication control process 202 allocating the communication process to prescribed services such as Telnet, FTP and HTTP on the basis of port information and the like, and the process of the HTTP server 203 are performed in parallel.
  • Similarly, in the terminal unit 30, under the control by the OS 301, processes such as control of the entire unit, communication control process 302, control of input from the user, and the Web browser 303 are executed in parallel.
  • An outline of general operations of the Web browser 303 and the HTTP server 203 will now be described.
  • When entering a target address (URL: Uniform Resource Locator; having a portion specifying the host name of the server unit in which the HTTP server is executed, and a portion specifying the file name) by operating the terminal unit 30 from the user via the input interface 35, the Web browser 303 sends a connection request including the file name to the server unit 20 corresponding to the host name. This connection request is supplied to the destination server unit 20 via the communication control process 302 and the network 10, and supplied to the HTTP server 203 via the communication control process 202.
  • When the connection request is supplied, the HTTP server 203 reads out data corresponding to the file name given in the connection request from the HDD 23, and transmits the same to the terminal unit 30.
  • The URL specified first by the user may indicate in some cases only the host name, or only the host name and a specific directory. In such a case, the root directory of that host or a standard name file (index.html) present in the indicated directory is read out and transmitted to the terminal unit 30.
  • In such a standard name file, or the file specified by the user, character indication, image indication and linkage to the other files or the like are described in accordance with HTML (Hyper Text Markup Language).
  • The file from the HTTP server 203 is supplied to the Web browser 303 via the network 10 and the communication control process 302 of the terminal unit 30. The Web browser 303. generates display image data in accordance with the description in this file, and supplies the same to the OS 301. The OS 301 forms an image in the window assigned to the Web browser from the display image data from the Web browser 303, and causes the display screen of the display unit 37 to display the same via the display interface 34.
  • When image display is specified, together with the file name of the image data in the file supplied from the HTTP server 203, for example, the Web browser 303 requests the HTTP server 203 to transmit the image data corresponding to that file name.
  • Upon receipt of such a transmission request, HTTP server 203 reads out the image data of the requested file name from the HDD 23, and transmits it to the Web browser 303.
  • Upon receipt of the image data, the Web browser 303 treats the received image data as the image data at a prescribed position in the aforementioned display image data, and supplies the same to the OS 301.
  • As a result, an image based on the received image data at the prescribed position in the window of the Web browser 303 is displayed.
  • General operations of the Web browser and the HTTP server have been described above. Characteristic operations of the information providing system of this embodiment will now be described.
  • In the server unit 20, as shown in the aforementioned FIG. 2, when the HTTP server 203 transmits particular image data, there are executed an identity information adding process 205 which adds intrinsic identity information meeting an access from the user to the image data, and a database 206 recording individual pieces of identity information are executed.
  • The identity information adding process 205 is mounted in the form of an extended program (so-called plug-in) of the HTTP server 203. When a file delivery process 204 reads out the file of particular image data from the HDD 23 and transmits the same, the identity information adding process 205 adds intrinsic identity information meeting user's access to the image data.
  • The identity information added to the image data suffices to be information intrinsic to the individual accesses. It is therefore possible to generate it on the basis of information such as the date and time of access to the IP address and server of the terminal unit 30 currently operated by the user. Or, the identity information to be added to the image data may be generated by use of intrinsic identity information imparted to each user or each terminal unit 30 to the image data process 304 handling the image data containing the added identity information, as described later.
  • On the contrary, the date and time of access itself may be used as the identity information. Since two or more accesses to one server unit 20 are never processed simultaneously in the usual course of operation, the date and time of access may be the information specifying an access. Even when adding the date and time of access to the image data as identity information, therefore, it is possible to identify individual image data.
  • A function of recording an access log from the user is mounted as a function of the HTTP server. The IP address, the date and time of access and the like of the terminal unit 30 of the user using the HTTP server can be recorded in this access log. As a result, when using the date and time of access as identity information, the IP address corresponding to the date and time of access added to the image data is available by referring to the access log. It is therefore possible to easily specify an IP address of the user in access to the image data.
  • Because it suffices to add identity information so as to permit recognition as image data, it may, for example, be added in a vacant area defined on the image format, or it may be embedded in the image data, using the so-called electronic water-marking technique of adding the information in a dispersed form in the image data. It may also be added before or after the image data main body on the image format. The identity information may be added as it is to inhibit processing load, or may be added after subjecting the information to processing such as appropriate coding or enciphering for improvement of security.
  • The image data containing the thus added identity information are treated as ordinary image data on the file delivery process 204 and communication control process 202, and transmitted to the Web browser 303 of the terminal unit 30.
  • The database 206 acquires the information showing user's access status via the OS 201, the HTTP server 203 and the like, creates a table (generation.log) representing the corresponding relationship between the identity information added through the identity information adding process 205 and the information showing user's access status, and records the thus created table in the HDD 23. As shown in FIG. 3, for example, this generation log contains the accessing IP address, the name of the host of the server unit 20 in which the HTTP server 203 is operating, the date and time of access, the file name of image data, and the identity information (ID) added by the identity information adding process 205 and so on.
  • As a result, by referring to the generation log (or the update log described later), The identity information added to the image data, and the information showing user's access status such as the accessing IP address and the date and time of access are available. It is therefore possible to relatively easily investigate user's access status and so on.
  • By the way, the identity information adding process 205 can add also information such as URL to the image data in addition to the identity information.
  • When adding URL to the image data, it is possible to make an access to a prescribed URL with reference to only the image data, by extracting this URL on the terminal unit 30 side, supplying this URL to the Web browser 303, and instructing an access.
  • Such a function has conventionally achieved by use of the HTTP server in the so-called banner advertising. In the banner advertising, it is necessary to provide processes such as defining a button for causing linking with the prescribed URL in accordance with HTML, and specifying the file name of the prescribed image data as the image of this button.
  • In this case, since the file defining URL is separate from the file of the image data, even a third party can easily refer only to the file of the image data as the image of a button of a link different from that of the original URL. That is, it would be easy to steal the image data for uses not intended by the maker of the image data.
  • As in this information providing system, in contrast, even if the image data are stolen, it is possible to easily specify a route of acquisition of the image data or the like with reference to the aforementioned generation log by previously adding intrinsic identity information meeting user's access status to the image data. Thus, it is effective for preventing illegal use of the image data.
  • Since identity information is added to the image data, it is possible to certainly retain identity information and to improve reliability of the result of investigation as compared with an investigation using the conventional Cookie and the like.
  • For example, by adding the aforementioned identity information to advertising image data such as banner advertising, it is possible for the sponsor to obtain result of investigation having a higher reliability than in the conventional art as to taste of the users. By using this result of investigation, it becomes possible to provide one-to-one services accurately coping with needs of the individual users.
  • While FIG. 2 illustrates an example in which the identity information adding process 205 is mounted as a extended program of the HTTP server 203, it suffices that there is provided a function of adding intrinsic identity information meeting a user's access to particular image data. Therefore, it is also possible to previously place the image file in a file server independent of the HTTP server, monitor accesses to this file server, and deliver the image data containing the added identity information meeting user's access upon receipt of an access request to a particular image file.
  • In this case, it is not always necessary that the HTTP server and the file server are mounted as separate units, but these units may be executed as a plurality of server programs and identity information adding processes or the like on a single OS. Or, it is also possible, by use of a so-called emulator, to cause execution of a plurality of OS on a single unit, cause execution of processes as an HTTP server on an OS, and cause execution of processes as a file server on the other OS. As a result, a physically single unit can execute processes equivalent to those of a plurality of units.
  • By separating the HTTP server and the file server or the like as described above, the access right or the like can be set separately for the HTTP server and the file server or the like, thus bringing about an improvement of flexibility in setting security. As a result, this can contribute to the improvement of security.
  • In the terminal unit 30, on the other hand, as shown in FIG. 2 mentioned above, execution of the application program operating in cooperation, for example, with the Web browser 303 causes execution of a process for handling the image data containing the added intrinsic identity information (image data processing) 304.
  • This image data process 304 execute a processing in response to the identity information from the image data upon receipt of the supplied image data containing the added identity information from the Web browser 303.
  • This processing includes management of performing storage, deletion, update and the like of the image data on the basis of the identity information, and in the case where information such as URL is added to the image data as described above, includes processing of execution in accordance with this information.
  • The individual processes will now be described in detail.
  • As shown in FIG. 4 illustrating an example of display screen of the display unit 37, a window 402 is assigned to this image data process 304 by the aforementioned OS 301 as in the window 401 of the Web browser 303.
  • Supply of the image data from the Web browser 303 to the image data process 304 can be accomplished through so-called drug-and-drop operation under control by the OS 301.
  • To put it specifically, in a state in which the user operates the pointing device 39 to have the pointer 403 agree with the display position of the image 404 displayed within the window 401 of the Web browser 303, and operates the button or the like of the pointing device 39, the image data are supplied from the Web browser 303 to the image data process 304 via the OS 301, by further operating the pointing device 39 to cause the pointer 403 to move onto the window 402 of the image data process 304, and releasing operation of the button of the pointing device 39 and the like.
  • Upon supply of the image data, the image data process 304 causes display of the image 405 corresponding to the supplied image data at the position of the pointer 403.
  • Storage of the image data is accomplished, when the image data are supplied through the aforementioned drag-and-drop operation, by the image data process 304 through storage in a prescribed area of the HDD 33 via the OS 301. And deletion of the image data is conducted by deleting the image data selected by user's instruction from the prescribed area of the above-mentioned HDD 33.
  • Update of the image data is performed for updating the stored image data into the latest ones. This update processing may be executed in compliance, for example, with user's instruction, or on the basis of information such as the date of preparation recorded in the file of the image data. It may be automatically executed at prescribed intervals.
  • After start of the update processing, the image data process 304 first extracts the identity information added to the image data to be updated, and transmits this identity information and the file name or the like to the HTTP server 203 and the database 206 to request update of the image data.
  • Such an update request is supplied to HTTP server 203 and the database 206 as a packet of a prescribed port via the communication control process 302, the network 10, and the communication control process 202.
  • Upon update, the image data process 304 may transmit the entire image data, and the HTTP server 203 or the database 206 may extract the identity information from the image data thus obtained.
  • And intrinsic identity information (client ID) is imparted for each user or for each terminal unit 30 to the image data process 304. This client ID is supplied to the HTTP server 203 and the database 206 as a packet for a prescribed port via the communication control process 302, the network 10, and the communication control process 202 upon updating the image data or the like.
  • The file delivery process 204 of the HTTP server 203 instructs the HDD 23 to read out the image data corresponding to the file name contained in the update request.
  • At this point, the identity information adding process 205 generates new identity information meeting user's access status and adds the same to the image data.
  • As a result, the image data containing new added identity information are supplied to the image data process 304 of the terminal unit 30 via a prescribed port, thus causing update of the image data.
  • On the other hand, the database 206 acquires information showing user's access status via the OS 201 and the HTTP server 203 or the like, prepares a table (update log) representing the corresponding relationship between the identity information added anew by the identity information adding process 205 and the information showing user's access status, and records the same in the HDD 23, separately from the generation log described above.
  • As shown in FIG. 5, this update log contains, like the generation log, the accessing IP address, the host name of the server unit 20 in which identity information has newly been added, the date and time of access (date and time of update), the file name of the image data, and the identity information added by the identity information adding process 205, and in addition, information for specifying the server unit 20 having generated the original identity information (generated server ID), and the client ID for specifying the user of the terminal unit 30 used by the user.
  • As a result, by referring to this update log, there is available information for updating the image data and for specifying the user or the terminal unit 30, in addition to user's access status resulting from the aforementioned generation log. That is, it is possible to relatively easily conduct an investigation of user tendency through image data update status.
  • By referring to the update log, there is available information for specifying the user or the terminal unit 30 corresponding to the identity information added to the image data, thus permitting more accurate identification of the route of acquisition of the image data and the like.
  • When information such as URL is added to the image data as mentioned above, the image data process 304 extracts the added information, and performs the process in accordance with the thus extracted information.
  • More specifically, if the added information is URL, the image data process 304 records this URL, and when access to the URL is instructed by the user, instructs the Web browser 303 to access the URL.
  • Therefore, the user can easily make an access to this URL by causing the image data containing the desired added URL to be supplied from the Web browser 303 to the image data process 304. That is, the image data serve as a link to a particular URL.
  • A so-called bookmark is known to have such a function. However, since the bookmark is stored as character information, it may sometimes be difficult to recognize an actual destination of linkage. The link based on image data, permitting immediate recognition of the link destination from the image, makes it possible to make an easy understanding as compared with a link based on characters.
  • The aforementioned banner advertising is known to show a link to a prescribed URL by means of an image. In this case, however, the image data and the link destination URL are independent of each other. By retaining the image data alone, therefore, the URL of the link destination is not retained.
  • Because a banner advertising may sometimes be updated in a short period of time, the same image data, i.e., the same link destination URL is not always available in the next access. In order to certainly retain a link destination URL, therefore, it is necessary to retain the link destination URL through preparation of the bookmark or the like.
  • If the information such as URL is an added image data, in contrast, simple storage permits extraction of the URL by means of the image data process 304 and access to this URL, thus facilitating operations.
  • While the aforementioned FIG. 2 covers a case where the image data process 304 is mounted as a process separate from the Web browser 303, it suffices to have a function of handling the information added to the image data, so that it may be mounted as an extended program (so-called plug-in) of the Web browser 303.
  • The present invention is not limited to the above-mentioned embodiment, but the configuration and the mounting method can be changed appropriately within the scope of technical idea of the invention.
  • In FIG. 1, for example, the server unit 20 and the terminal unit 30 have been shown as independent units. By executing a program carrying out the both processes, it is possible to ensure simultaneous execution of the server unit and the terminal unit.
  • The above-mentioned embodiment will now be described further in detail.
  • [Structure of image file]
  • FIG. 6 shows an example of data structure of the image file handled in the above-mentioned embodiment. The image file shown in FIG. 6 comprises a start section 51 indicating the start of a data stream, an image data section 52 describing the display data of the image, a comment section 53 describing information not affecting display of the image, and an end section 54 indicating the end of the data stream. For example, this data structure is adopted in a JPEG file and a GIF file. Identity information to be added to the aforementioned image data and pointer information such as URL can be described in the comment section 53 as those not affecting display of the image. Even for any other image format, a format having an area of information not affecting display of the image can be described in this area. Identity information intrinsic to the image file, one or more information pointers, an index of menu items corresponding to the image file, or/and actual contents of a program can be recorded in an area ignored upon display of the image in a data stream of the image file. Addition may be accomplished by the digital watermark technique to the image data, as described above.
  • In the following description, identity information added to the image data and pointer information are referred to as “image-related information”. An image file containing image-related information added to the image data shall be called an “information image file”.
  • [Structure of image-related information]
  • FIG. 7 is a structure diagram of image-related information. The image-related information shown in FIG. 7(a) includes information regarding the name of image, password, expiration date, thumb nail image, category and keyword.
  • The “name of image” is the name of the image thumb-nail-displayed in the window 402 of the image data process 304. The “password” is the password which the user is requested to enter upon supplying an information image file to the image data process 304. Only the user knowing this password can register an information image file in the image data process 304. The “expiration date” is an expiration date of the information image file supplied to the image data process 304. When the expiration date elapse, the information image file is deleted from the recording area of the HDD 33. The “thumb nail image” means data of the image file thumb-nail-displayed in the window of the image data process 304 in place of the image so far displayed on the browser upon supplying the information image file displayed on the browser to the window of the image data process 304. The “category” represents data specifying a folder in which the information image file is to be stored upon supplying the information image file to the image data process 304. When a specified folder is not present, the image data process 304 newly prepares a folder of a specified name. The “keyword” is a word serving as a retrieval key when retrieving an information image file already supplied by the image data process 304.
  • The image-related information shown in FIG. 7(b) comprises, for each pointer information, a set of command name, action table, allocation of mouse (pointing device) operations, and platform correlated with each other.
  • The “pointer information” specifies the location of a file on a local computer or on the network. For example, a file name, a path name indicating the location of resources present on a local computer, a UNC (Universal Naming Convention) indicating the location of resources in a network environment, or an URL (Uniform resource Locator) or URLs (Uniform Resource Identifiers) indicating the location of resources on internet or an intranet constitute pointer information. The “command name” is a display name used when displaying contents of a pointer on the menu, including, for example, “access to a home page”. The “menu” means a menu displayed and becoming capable of being selected on display means 37 upon clicking the right button of the mouse 39. The “action table” specifies operations of the image data process 304. Details of the specified operations include whether or not a file indicated by the pointer information added to the information image file upon supply of the information image file to the image data process 304 is to be stored in the HDD 33 (storage means) of the terminal unit 30, whether or not that file is to be automatically executed, and the method of execution of that file (telop display, image reproduction, audio reproduction) or the like. The “allocation of mouse operations” sets mouse operations for making an access to the pointer information. The kinds of setting include double click, shift+double click, ctrl+double click, and alt+double click. The “platform” specifies an environment (platform, OS) befitting to a file indicated by the pointer information. For example, when the OS 301 is windows (trademark), the image data process 304 selects a corresponding information pointer in the windows and displays the same on the above-mentioned menu.
  • [Access to pointer information]
  • A method of accessing the pointer recorded in the information image file in the terminal unit 30 will now be described.
  • (1) Method based on menu selection
  • FIG. 8 is a descriptive view of a method of accessing the pointer through menu selection. The user operates the mouse 39 (pointing device), and places the pointer 403 on the image 405 supplied to the window 402 of the image data process. Then, the user clicks the right button of the mouse 39. Upon detecting this click, the MPU 31 (information processing means) reads out image-related information (FIG. 7(b)) contained in the information image file corresponding to the image 405 from the recording means 33, and generates menu display data. In other words, the MPU 31 extracts the “command name” as a menu item, and displays the menu 55 on the display means 37. Then, the user operates the mouse 39 to move the pointer 403, and places the same on the menu item to be selected. The user clicks the left button of the mouse 39 to select and decides one menu item. Upon detection of this click, the MPU 31 refers to the image-related information (FIG. 7(b)), and accesses the pointer by entering the pointer information corresponding to the selected command name in the browser 303. Upon receipt of the file returned from the server in response to the access destination, the MPU 31 executes the received file in accordance with the action table corresponding to the command name selected this time. For example, the MPU 31 executes reproduction of an image based on the Realplayer (trademark).
  • The menu items displayed when clicking the image displayed in the window 402 of the image data process are dependent upon contents of the image-related information embedded in the information image file. The information image file containing the image-related information has been transmitted from the server unit 20. That is, the menu items displayed by mouse clicking are characterized in that they depend upon information downloaded from the server unit 20.
  • (2) Method based on mouse operation
  • When button operation of the mouse 39 or key operation of the keyboard 38 are performed in a state in which the window 402 of the image data process has been selected, access to a prescribed information pointer is made possible in response to these operations. Upon operation of the mouse 39 or operation of the keyboard 38, the MPU 31 refers to the image-related information and to the “allocation of mouse operations” (FIG. 7(b)), and determines whether or not the corresponding operations are defined. When the corresponding operations are defined, the MPU 31 reads out the pointer information corresponding to these operations, and accesses that pointer by entering the pointer into the browser 303. Upon receipt of the file returned from the server in response to the access destination, the MPU 31 executes the received file in accordance with the action table corresponding to the command name selected this time. The same mouse operation may be allocated to a plurality of actions.
  • [Specific examples of access to information pointer]
  • A specific example of operation made when accessing an information pointer will now be described. An example of the “telop display” shown in the action table of FIG. 7(b) will be described here. FIG. 9 is a descriptive view of telop display operations. When defining the “telop display” in the action table, the pointer storing the telop text file is specified in the corresponding pointer information, and simultaneous accomplishment of storage of the text file in the local disk upon downloading the information image file is specified in the action table. Action (control code) of telop display is specified. For the allocation of mouse operations, for example, single click of the left button is specified (these settings are made usually by the information image provider on the server side).
  • When the information image file having the image-related information is supplied from the browser 303 to the image data process 304 in the terminal unit 30, the MPU 31 refers to the image-related information, and begins accessing the pointer having received the specification of “storage”. The text file of telop is downloaded from the server corresponding to that pointer, and the same is stored in the local HDD 33.
  • Subsequently, when the user operates the mouse 39, and selects the image displayed in the window 402 of the image data process by clicking, the MPU 31 refers to the image-related information corresponding to the selected image, and confirms that the control code defined in the action table is the “telop display”. Then, a long and slender window for telop-display is displayed in the area of window of the image data process (or outside the area) as shown in FIG. 9, and the telop text read out from the HDD 33 is scroll-displayed in this window. As shown in FIG. 9, when a plurality of images 405 are supplied, it is also possible to display different telops in response to the images selected by the mouse 39.
  • [Supply of information image file to image data process]
  • In the above-mentioned embodiment, supply of the information image file to the image data process has been described as being capable of being accomplished through drag-and-drop operation from the window 401 of the browser to the window 402 of the image data process. Other methods of supply will be described here.
  • (1) Drag-and-drop from menu
  • FIG. 10 is a descriptive view of drag-and-drop operation from the menu. As already explained, the menu 55 (first management area) is displayed by clicking the right button of the mouse 39, and a menu item for adding an information image is selected from the mouse 39. The menu for adding information image is selected by previously setting the control code of the action table to the control code specially for adding image, as defined in the bottom line in FIG. 7(b). When the user operates the mouse 39 and drag-and-drops the menu item for adding information image into the window 402 (second management area) of the image data process, the MPU 31 detects this operation and refers to the image-related information (FIG. 7(b)). When the control code of the action table corresponding to the operated menu item is checked up to confirm that it is “image addition”, accessing the corresponding pointer is started. When a new information image file is downloaded from a prescribed server in response to this access, the MPU 31 supplies the newly downloaded information image file to the image data process 304, as in the processing of supplying an information image file from the browser 303 to the image data process 304.
  • According to this method, in which a new information image file is supplied, there is available an advantage that it is not necessary to start up the browser for each run of operation.
  • It is needless to mention that downloading of a new information image file and supply thereof to the image data process 304 may be done by clicking the menu item for adding information image simply on the mouse 39.
  • The new information image file may be stored in an already supplied information image file. In this case, when the menu item for adding information image (first management area) is drag-and-dropped, the MPU 31, not accessing the server on the network, but refers to the image-related information of the information image file which is the object of the current run of operation, reads out another information image previously registered therein, and supplies the same to the image data process 304 (second management area).
  • In this case, where the new information file is supplied, there is available an advantage of eliminating the necessity to connect to the server on the network for each run of operation.
  • (2) Drag-and-drop from mail software
  • The information image file may be supplied to the image data process 304 by drag-and-dropping the information image file attached to the mail software into the window 402 of the image data process. A perusal window of the main text or a confirmation window of the attached file serves as a first management area. In this case, it is possible to
    Figure US20060078160A1-20060413-P00999
    cause circulation of the information image file on electronic mail for receiver's use, thus permitting effective diffusion of the information.
  • (3) Drag-and-drop from-an arbitrary folder
  • The information image file once copied on a prescribed folder from the browser or the mail software may be supplied by drag-and-dropping the same from that folder (first management area) to the window 402 (second management area) of the image data process. The MPU 31 detects drag-and-drop operation from an arbitrary folder to the window 402 of the image data process, and supplies the information image file to the image data process 304 as in the above-mentioned case of drag-and-drop processing from the browser.
  • (4) Supplying method other than drag-and-drop
  • Supply of the information image file to the image data process 304 is achievable also by using another operation in place of the above-mentioned drag-and-drop operation. For example, the information image file may be supplied to the image data process 304 as a result of MPU 31's detection of the fact that the information image file managed outside the image data process 304 was clicked. The information image file may be supplied to the image data process by copying the information image file managed outside the image data process 304 onto a clip-board, and subsequently, when the information image file is pasted to the window 402 of the independent of each other, as shown in FIG. 4, or may be implemented in any other form. Several embodiments will be presented.
  • FIG. 11 illustrates an embodiment in which the window 401 of the Web browser and the window 402 of the image data process are provided by a single program; a display selecting tab at the top of the window is selected through operation of input means 35; and the selected side window is selectively displayed on the screen. First, the information image file 404 displayed in the window 401 of the Web browser is accessed and registered in the window 402 of the image data process on the background. Access to the information image file 404 can be made by any of the aforementioned methods. Then, the window 402 of the image data process is displayed by operating the display selecting tab through the input means 35. This makes it possible to access the information image files already registered in the image data process.
  • FIG. 12 illustrates a case where frame-structured display windows are provided, one as the window 401 of the Web browser, and the other as the window 402 of the image data process. In this case, it is easy to conduct an accessing operation of drag-and-dropping the information image file 404 from the frame 401 of the Web browser to the frame of the image data process. It is of course possible, however, to supply the information image file to the image data process by any of the aforementioned accessing methods.
  • In FIG. 13, when making an access to the information image file 404 displayed in the window 401 of the Web browser, processing means 31 starts up a plug-in previously implemented in the Web browser. Any of the aforementioned accessing methods to the information image file may be adopted. The started plug-in adds management of a new information image file to a local HTML file stored previously in storage means 33 as a second management area. After addition of the new information image, the local HTML file is deployed as a second management area 402 in the Web browser. When deploying the local HTML file in the Web browser, the browser may be an existing Web browser, or a new Web browser may be started up and separately deployed.
  • [Encryption of image-related information]
  • Encryption of the image-related information to be added to the image data will now be described.
  • [Encryption in server unit]
  • The identity information adding process 205 of the server unit 20 has a function of adding image-related information to be added to the image data after encryption. The encryption algorithm is updated at prescribed time intervals By encrypting the image-related information, it is possible to prevent a third party from using the image file by adding, deleting or modifying illegally the image-related information.
  • [Encryption in terminal unit]
  • In the terminal unit 30, when referring to the image-related information added to the image data, the MPU 31 decodes the image-related information. The decoding algorithm is previously stored in the HDD 33 in a manner corresponding to the encryption algorithm in the server unit 20. However, since the encryption algorithm of the server unit 20 is updated at certain time intervals, it is necessary to update the decoding algorithm of the terminal unit 30 so as to meet the encryption algorithm when updating the encryption algorithm of the server unit 20.
  • [Update of decoding algorithm]
  • The server unit 20 manages versions of the decoding algorithm stored in the terminal unit 30 in a database for each ID (IP address and the like) of the terminal unit. When updating the encryption algorithm of the image-related information in the server unit 20, flags are provided for IDs of all the terminal units. For a terminal unit subsequently making access to the server unit 20 having a flag corresponding to the ID of that terminal unit, a decoding algorithm corresponding to the new encryption algorithm is transmitted for update, and flags corresponding to IDs of the terminal units for which update has been completed are cancelled. The decoding algorithm is stored in the HDD 23 of the server unit.
  • The image data process 304 has a function of trying to decode the image-related information contained in an information image file upon supply of the information image file, and checking up whether or not the data structure of the decoded image-related information is normal. If the data structure after decoding is not normal, supply of that information image file is discontinued. As a result, it is possible to prevent supply of an illegally modified information image file. Determination of an illegal information image file may be based on the identity information added to the image data.
  • [Accounting process]
  • The accounting method applied when supplying the information image file from the browser to the image data process 304 will now be described. Accounting is conducted, when supplying the information image file from the browser to the image data process 304, by that image data process 304 requesting accounting process by accessing the server unit 20.
  • The access log (generation log) described in the embodiments of the invention is generated under condition that the information image file has been supplied from the browser to the image data process 304 in the terminal unit 30. That is, when the information image file is supplied to the image data process 304, the MPU 31 extracts the identity information embedded in the information image file from the supplied information image file, and transmits this identity information and the file name of the information image file to the server unit 20. The server unit 20 correlates the received identity information and the image file name with the accessing terminal IP address, the host name, and the date and time of access, and generates a generation log (FIG. 3) described above. Therefore, the fact that the information image file was supplied to the image data process in the terminal unit 30 is recorded in the access log of the server unit 20.
  • [Accounting process (1)]
  • The first accounting method comprises accounting only for the first supply and not accounting for the second and subsequent supplies when the same information image file is supplied through the same terminal (or the same user, or image data process 304 having the same ID). When an information image file is supplied to the image data process 304, the MPU 31 of the terminal unit transmits intrinsic identity information imparted to the information image file and the file name of the information image file to the server unit 20, and proposes accounting to the server unit 30. Upon receipt of the proposal of accounting, the MPU 21 of the server unit compares the IP address of the accessing terminal and the host name, as well as the received identity information and the image file name with those recorded in the generation log, and determines whether or not the same information image file has ever been supplied at the same terminal to the image data process 304 in the past. As a result, if the same image file has been supplied, accounting is not made for the current supply. On the other hand, if the same information image file has never been supplied to the image data process 304 at the same terminal, the supply is subjected to accounting as a new supply.
  • [Accounting method (2)]
  • The second accounting method is the same as the first accounting method except that, even for a supply of the same information image file at the same terminal, accounting is made if it is a supply on another date. A conceivable usage of the information image file is that, within an effective period, free contents service is available. In such a case, if the same information image file can be supplied repeatedly without accounting at the same terminal, the effective period for the free contents service would lose its meaning. Therefore, even for the supply of the same information image file at the same terminal, one on another date is subjected to accounting.
  • When the information image file is supplied to the image data process 304, the MPU 31 of the terminal unit transmits the intrinsic identity information imparted to the information image file and the file name of the information image file to the server unit 20, and proposes accounting to the server unit 30. Upon receipt of this proposal of accounting, the MPU 21 of the server unit compares the IP address of the accessing terminal and the host name, as well as the received identity information and the image file name with those recorded in the generation log to see whether or not quite the same data have been registered on the same date. As a result, if it is registered on the same date, no accounting is made. On the other hand, if it is not registered on the same date, the current supply of the information image file is subjected to accounting.
  • [Accounting method (3)]
  • In the same method as the first and second accounting methods, the same user may be determined, not with the same terminal. In this case, a user authentication organization (function) is provided in or outside the server unit 20. When access is requested from the terminal unit 30 to the server unit 20, the user authentication organization requests authentication to the user, and permits access to the server unit 30 when user authentication is properly conducted. According to this method, it is possible to identify the user. It is therefore possible to determine, for each user, whether or not the same information image file has ever been supplied to the image data process 304 in the past.
  • For embedding the image-related information in the information image file (icon), there are available the method of icon-type packaging described above, and implementing in the form of a package by use of Java (trademark) applet or ActiveX (trademark) control. The Java applet and the ActiveX control are program units permitting execution of browser software such as Netscape (trademark) or Internet Explorer (trademark). The execution codes thereof are written in Java intermediate code for the Java applet, and in CPU native code for the ActiveX control, and the browser can start execution in the both cases. Both the Java applet and the ActiveX control permit graphic display on the browser display screen. When using Java applet or ActiveX control, an applet for image display alone is provided in place of the icons having embedded related information. In place of display of these icons by use of tags on the browser (IMG), it suffices to cause implementation of the applet by using (EMBED) or (APPLET). Embedding of the related-information may be accomplished in the program form in the both cases.
  • Industrial Applicability
  • According to the present invention, intrinsic identity information is generated in response to an access from a terminal. The generated identity information is added to prescribed image data provided by an information providing server unit, and the corresponding relationship between the identity information and the image data containing the added identity information is recorded. By referring to this corresponding relationship, it is possible to obtain information regarding user access corresponding to the identity information added to the image data, such as the address of the terminal used by the user, the time of access and the like. It is therefore possible to relatively easily conduct an investigation of access status from the terminal.
  • In another aspect of the invention, by providing identity information adding means separately from the information providing server unit, it is possible to individually set access limitation, and to improve setting flexibility.
  • In still another aspect of the invention, by acquiring the image data containing the added intrinsic identity information from the information providing server unit, and extracting the identity information from the thus acquired image data, it is possible to perform management of the image data meeting the identity information.
  • For example upon updating image data, by requesting processing to the information providing server unit by transmitting this identity information, it is possible to obtain image data corresponding to the identity information or information meeting user access, and it becomes easier to select a processing corresponding to the information.

Claims (14)

1-21. (canceled)
22. An information providing system having an informant server unit providing at least image data via a network, and a terminal acquiring image data provided by said informant server unit, the system comprising:
identity information adding means for adding intrinsic identity information meeting an access from said terminal, to prescribed image data provided by said informant server unit; and
identity information recording means for recording a corresponding relationship between the identity information added by said identity information adding means and the image data containing the added identity information.
23. An information providing system according to claim 22, wherein said identity information adding means generates said identity information on the basis of at least an address of said terminal on the network.
24. An information providing system according to claim 22, wherein said identity information adding means generates said identity information on the basis of at least an access time from said terminal.
25. An information providing system according to claim 22, wherein said identity information adding means is provided separately from said informant server unit.
26. An information providing method providing at least image data from the informant server unit to the terminal via a network, the method comprising the steps of:
generating intrinsic identity information meeting an access from said terminal;
adding the generated identity information to prescribed image data to be transmitted by said informant server unit; and
recording a corresponding relationship between said added identity information and the image data containing the added identity information.
27. An identity information adding unit comprising:
identity information adding means which, when an informant server unit providing at least image data to a terminal via a network provides prescribed image data, generates intrinsic identity information meeting an access of said terminal, and adds the generated identity information to the prescribed image data; and
identity information recording means which records the corresponding relationship between the identity information added by said identity information adding means and the image data containing the added identity information.
28. A machine-readable medium in which an identity information adding program is recorded, wherein: the identity information adding program instructs an informant server unit which provides at least image data to a terminal via a network to generate, upon providing prescribed image data, intrinsic identity information meeting an access of said terminal;
to add the thus generated identity information to said prescribed image data; and
to record the corresponding relationship between said added identity information and the image data containing the added identity information.
29. An informant server unit providing at least image data to a terminal connected via a network, the unit comprising:
identity information adding means for generating intrinsic identity information meeting an access from said terminal, and adding the generated identity information to prescribed image data provided by said informant server unit; and
identity information recording means for recording the corresponding relationship between the identity information added by said identity information adding means and the image data containing the added identity information.
30. A machine-readable medium in which information providing program is recorded, wherein:
the information providing program instructs a computer to generate intrinsic identity information meeting an access, when prescribed image data are provided to a terminal connected via a network, from said terminal; to add the generated identity information to said prescribed image data; and to record the corresponding relationship between said added identity information and the image data containing the added identity information.
31. An information providing system according to claim 22, wherein said image data are publicity image data.
32. An information providing method according to claim 26, wherein said image data are publicity image data.
33. An identity information adding unit according to claim 27, wherein said image data are publicity image data.
34. An informant server unit according to claim 29, wherein said image data are publicity image data.
US11/274,462 1999-10-21 2005-11-15 Information providing system and identification information adding device Abandoned US20060078160A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/274,462 US20060078160A1 (en) 1999-10-21 2005-11-15 Information providing system and identification information adding device

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
JP1999-298958 1999-10-21
JP29895899 1999-10-21
JP2000079183A JP2001188738A (en) 1999-10-21 2000-03-21 System and method for providing information and device for adding identification information and computer readable recording medium stored with the same program and information providing server device and computer readable recording medium stored with the same program and information terminal and computer readable recording medium with information using program and charging device
JP2000-079183 2000-03-21
PCT/JP2000/005228 WO2001009726A1 (en) 1999-08-03 2000-08-03 Computer-readable recorded medium on which image file is recorded, device for producing the recorded medium, medium on which image file creating program is recorded, device for transmitting image file, device for processing image file, and medium on which image file processing program is recorded
WOPCT/JP00/05228 2000-08-03
PCT/JP2000/007323 WO2001029705A1 (en) 1999-10-21 2000-10-20 Information providing system and identification information adding device
US10/110,819 US7099490B1 (en) 1999-10-21 2000-10-20 Information providing system and identification information adding device
US11/274,462 US20060078160A1 (en) 1999-10-21 2005-11-15 Information providing system and identification information adding device

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US10/110,819 Continuation US7099490B1 (en) 1999-10-21 2000-10-20 Information providing system and identification information adding device
PCT/JP2000/007323 Continuation WO2001029705A1 (en) 1999-10-21 2000-10-20 Information providing system and identification information adding device

Publications (1)

Publication Number Publication Date
US20060078160A1 true US20060078160A1 (en) 2006-04-13

Family

ID=56290000

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/110,819 Expired - Fee Related US7099490B1 (en) 1999-10-21 2000-10-20 Information providing system and identification information adding device
US11/274,462 Abandoned US20060078160A1 (en) 1999-10-21 2005-11-15 Information providing system and identification information adding device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/110,819 Expired - Fee Related US7099490B1 (en) 1999-10-21 2000-10-20 Information providing system and identification information adding device

Country Status (9)

Country Link
US (2) US7099490B1 (en)
EP (1) EP1231546A4 (en)
JP (1) JP2001188738A (en)
CN (1) CN1243317C (en)
AU (1) AU2806201A (en)
BR (1) BR0014938A (en)
CA (1) CA2387216A1 (en)
MX (1) MXPA02003694A (en)
WO (1) WO2001029705A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070234286A1 (en) * 2006-03-28 2007-10-04 Bo Huang Methods and apparatus to implement annotation based thunking
US20090279872A1 (en) * 2005-11-02 2009-11-12 Azusa Umemoto Content data output device, television containing same, and content data output program
US20100082555A1 (en) * 2008-09-25 2010-04-01 Hitachi, Ltd. Management device and computer system
US20100118115A1 (en) * 2007-06-14 2010-05-13 Masafumi Takahashi Image data receiving device, operation device, operation system, data structure of image data set, control method, operation method, program, and storage medium
US20110075045A1 (en) * 2008-05-29 2011-03-31 Kenji Mameda Data-processing device, data-processing system, method for controlling data processing device, control program, and computer-readable storage medium containing the program
US8306867B2 (en) 2007-10-22 2012-11-06 Sharp Kabushiki Kaisha Reproducing apparatus, portable communication apparatus, administrative server, and content distribution system
US20150065183A1 (en) * 2012-05-09 2015-03-05 Qing Wang Method, client, server and system for intelligent recognizing contents of short message
US20160164984A1 (en) * 2014-12-05 2016-06-09 Microsoft Technology Licensing, Llc. Determining Browsing Activities
US10622024B2 (en) 2013-12-09 2020-04-14 Godo Kaisha Ip Bridge 1 Interface apparatus and recording apparatus
US11070597B2 (en) * 2012-09-21 2021-07-20 Gree, Inc. Method for displaying object in timeline area, object display device, and information recording medium having recorded thereon program for implementing said method

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3522635B2 (en) * 1999-08-03 2004-04-26 ヴィジョンアーツ株式会社 Computer-readable recording medium recording an image file, apparatus for creating this recording medium, medium recording an image file creation program, image file transmitting apparatus, image file processing apparatus, medium recording image file processing program
JP4902904B2 (en) 2000-10-06 2012-03-21 ソニー株式会社 Information processing method and medium storing program
GB2373884B8 (en) * 2001-03-28 2006-05-04 Nokia Corp Method of configuring electronic devices
JP3879594B2 (en) * 2001-11-02 2007-02-14 日本電気株式会社 Switch method, apparatus and program
US7511842B2 (en) 2002-03-19 2009-03-31 Ricoh Company, Ltd. Image forming apparatus
JP2004213128A (en) 2002-12-27 2004-07-29 Panasonic Communications Co Ltd Documentation management device and documentation management method
JP2004220424A (en) * 2003-01-16 2004-08-05 Canon Inc Documentation management system
US7698152B2 (en) * 2005-01-07 2010-04-13 Siemens Medical Solutions Health Services Corporation Medical image viewing management and status system
WO2006120738A1 (en) * 2005-05-11 2006-11-16 Visionarts, Inc. Menu bar providing method and information read screen configuration file creation program
US20070022081A1 (en) * 2005-07-19 2007-01-25 Ritter Gerd M Record of data repository access
JP2009211601A (en) * 2008-03-06 2009-09-17 Nec Corp Network distribution type document browsing system, document distribution server, document distribution method, and document distribution program
JP4683063B2 (en) * 2008-03-28 2011-05-11 ブラザー工業株式会社 Device management system, device and device management program
US8261363B2 (en) * 2008-04-29 2012-09-04 Ricoh Company, Ltd. Managing electronic data with identification data
US20120054029A1 (en) * 2010-07-29 2012-03-01 Trice Michael E Advertising based medical digital imaging
JP2017169222A (en) * 2017-05-10 2017-09-21 合同会社IP Bridge1号 Interface device for designating link destination, interface device for viewer, and computer program

Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4581656A (en) * 1982-05-10 1986-04-08 Ricoh Company, Ltd. Facsimile communication apparatus
US5355327A (en) * 1991-11-26 1994-10-11 Davox Corporation Automated statistical data collection system
US5365580A (en) * 1991-11-07 1994-11-15 Fujitsu Limited System and method of detecting unauthorized use of identifiers
US5740549A (en) * 1995-06-12 1998-04-14 Pointcast, Inc. Information and advertising distribution system and method
US5745686A (en) * 1995-06-07 1998-04-28 Fuji Xerox Co., Ltd. Information tracing system and information tracing method
US5761404A (en) * 1995-09-20 1998-06-02 Hitachi, Ltd. Image-data managing apparatus
US5842023A (en) * 1995-12-06 1998-11-24 Matsushita Electric Industrial Co., Ltd. Information service processor
US5999968A (en) * 1996-10-24 1999-12-07 Fujitsu Limited System and method for presenting shared information to network user in specific order
US6052728A (en) * 1997-01-08 2000-04-18 Hitachi, Ltd. Method of collectively managing dispersive log, network system and relay computer for use in the same
US6056786A (en) * 1997-07-11 2000-05-02 International Business Machines Corp. Technique for monitoring for license compliance for client-server software
US6131162A (en) * 1997-06-05 2000-10-10 Hitachi Ltd. Digital data authentication method
US6212554B1 (en) * 1997-12-16 2001-04-03 Hearme Advertising banners for destination web sites
US6219669B1 (en) * 1997-11-13 2001-04-17 Hyperspace Communications, Inc. File transfer system using dynamically assigned ports
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US6314409B2 (en) * 1996-01-11 2001-11-06 Veridian Information Solutions System for controlling access and distribution of digital property
US20010042043A1 (en) * 1995-02-13 2001-11-15 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US6366298B1 (en) * 1999-06-03 2002-04-02 Netzero, Inc. Monitoring of individual internet usage
US20020052975A1 (en) * 1992-09-21 2002-05-02 Mitsuru Yamamoto Network system and terminal apparatus
US6393479B1 (en) * 1999-06-04 2002-05-21 Webside Story, Inc. Internet website traffic flow analysis
US6477649B2 (en) * 1997-05-13 2002-11-05 Kabushiki Kaisha Toshiba Information recording apparatus, information reproducing apparatus, and information distribution system
US6487538B1 (en) * 1998-11-16 2002-11-26 Sun Microsystems, Inc. Method and apparatus for local advertising
US6513118B1 (en) * 1998-01-27 2003-01-28 Canon Kabushiki Kaisha Electronic watermarking method, electronic information distribution system, image filing apparatus and storage medium therefor
US6557102B1 (en) * 1997-09-05 2003-04-29 Koninklijke Philips Electronics N.V. Digital trust center for medical image authentication
US6603864B1 (en) * 1998-10-30 2003-08-05 Fuji Xerox Co., Ltd. Image processing apparatus and image processing method
US6654725B1 (en) * 1998-11-09 2003-11-25 Nec Corporation System and method for providing customized advertising on the World Wide Web
US6775023B1 (en) * 1999-07-30 2004-08-10 Canon Kabushiki Kaisha Center server, information processing apparatus and method, and print system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3516094B2 (en) * 1994-01-17 2004-04-05 富士写真フイルム株式会社 Data management method and device
JP3996673B2 (en) * 1996-08-08 2007-10-24 義宇 江 Information collection method and information collection system on the Internet
JPH10187825A (en) 1996-12-27 1998-07-21 Dohme:Kk Image data transmitting and receiving system and its method
JPH10254796A (en) * 1997-01-07 1998-09-25 Fujitsu Ltd Information providing system
JPH11167603A (en) * 1997-12-04 1999-06-22 Toshiba Corp Image entry system, image/character display method and record medium
JPH11288217A (en) * 1998-04-02 1999-10-19 Canon Inc Code generation method and code decoding method for electronic watermark, device for these methods, digital information delivery system, and record medium

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4581656A (en) * 1982-05-10 1986-04-08 Ricoh Company, Ltd. Facsimile communication apparatus
US5365580A (en) * 1991-11-07 1994-11-15 Fujitsu Limited System and method of detecting unauthorized use of identifiers
US5355327A (en) * 1991-11-26 1994-10-11 Davox Corporation Automated statistical data collection system
US20020052975A1 (en) * 1992-09-21 2002-05-02 Mitsuru Yamamoto Network system and terminal apparatus
US20010042043A1 (en) * 1995-02-13 2001-11-15 Intertrust Technologies Corp. Cryptographic methods, apparatus and systems for storage media electronic rights management in closed and connected appliances
US5745686A (en) * 1995-06-07 1998-04-28 Fuji Xerox Co., Ltd. Information tracing system and information tracing method
US5740549A (en) * 1995-06-12 1998-04-14 Pointcast, Inc. Information and advertising distribution system and method
US5761404A (en) * 1995-09-20 1998-06-02 Hitachi, Ltd. Image-data managing apparatus
US5842023A (en) * 1995-12-06 1998-11-24 Matsushita Electric Industrial Co., Ltd. Information service processor
US6314409B2 (en) * 1996-01-11 2001-11-06 Veridian Information Solutions System for controlling access and distribution of digital property
US5999968A (en) * 1996-10-24 1999-12-07 Fujitsu Limited System and method for presenting shared information to network user in specific order
US6052728A (en) * 1997-01-08 2000-04-18 Hitachi, Ltd. Method of collectively managing dispersive log, network system and relay computer for use in the same
US6477649B2 (en) * 1997-05-13 2002-11-05 Kabushiki Kaisha Toshiba Information recording apparatus, information reproducing apparatus, and information distribution system
US6131162A (en) * 1997-06-05 2000-10-10 Hitachi Ltd. Digital data authentication method
US6056786A (en) * 1997-07-11 2000-05-02 International Business Machines Corp. Technique for monitoring for license compliance for client-server software
US6557102B1 (en) * 1997-09-05 2003-04-29 Koninklijke Philips Electronics N.V. Digital trust center for medical image authentication
US6219669B1 (en) * 1997-11-13 2001-04-17 Hyperspace Communications, Inc. File transfer system using dynamically assigned ports
US6212554B1 (en) * 1997-12-16 2001-04-03 Hearme Advertising banners for destination web sites
US6513118B1 (en) * 1998-01-27 2003-01-28 Canon Kabushiki Kaisha Electronic watermarking method, electronic information distribution system, image filing apparatus and storage medium therefor
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US6603864B1 (en) * 1998-10-30 2003-08-05 Fuji Xerox Co., Ltd. Image processing apparatus and image processing method
US6654725B1 (en) * 1998-11-09 2003-11-25 Nec Corporation System and method for providing customized advertising on the World Wide Web
US6487538B1 (en) * 1998-11-16 2002-11-26 Sun Microsystems, Inc. Method and apparatus for local advertising
US6366298B1 (en) * 1999-06-03 2002-04-02 Netzero, Inc. Monitoring of individual internet usage
US6393479B1 (en) * 1999-06-04 2002-05-21 Webside Story, Inc. Internet website traffic flow analysis
US6775023B1 (en) * 1999-07-30 2004-08-10 Canon Kabushiki Kaisha Center server, information processing apparatus and method, and print system

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090279872A1 (en) * 2005-11-02 2009-11-12 Azusa Umemoto Content data output device, television containing same, and content data output program
US20070234286A1 (en) * 2006-03-28 2007-10-04 Bo Huang Methods and apparatus to implement annotation based thunking
US7596783B2 (en) 2006-03-28 2009-09-29 Intel Corporation Methods and apparatus to implement annotation based thunking
US8654176B2 (en) 2007-06-14 2014-02-18 Sharp Kabushiki Kaisha Operating system that includes an image data receiving device and an operation device for processing image data sets
US20100118115A1 (en) * 2007-06-14 2010-05-13 Masafumi Takahashi Image data receiving device, operation device, operation system, data structure of image data set, control method, operation method, program, and storage medium
TWI391841B (en) * 2007-10-22 2013-04-01 Sharp Kk Protable cmmunication apparatus, and service providing server
US8306867B2 (en) 2007-10-22 2012-11-06 Sharp Kabushiki Kaisha Reproducing apparatus, portable communication apparatus, administrative server, and content distribution system
US20110075045A1 (en) * 2008-05-29 2011-03-31 Kenji Mameda Data-processing device, data-processing system, method for controlling data processing device, control program, and computer-readable storage medium containing the program
US8041672B2 (en) * 2008-09-25 2011-10-18 Hitachi, Ltd. Management device and computer system
US20100082555A1 (en) * 2008-09-25 2010-04-01 Hitachi, Ltd. Management device and computer system
US20150065183A1 (en) * 2012-05-09 2015-03-05 Qing Wang Method, client, server and system for intelligent recognizing contents of short message
US9843908B2 (en) * 2012-05-09 2017-12-12 Tencent Technology (Shenzhen) Company Limited Method, client, server and system for intelligent recognizing contents of short message
US11070597B2 (en) * 2012-09-21 2021-07-20 Gree, Inc. Method for displaying object in timeline area, object display device, and information recording medium having recorded thereon program for implementing said method
US11470133B2 (en) * 2012-09-21 2022-10-11 Gree, Inc. Method for displaying object in timeline area, object display device, and information recording medium having recorded thereon program for implementing said method
US10622024B2 (en) 2013-12-09 2020-04-14 Godo Kaisha Ip Bridge 1 Interface apparatus and recording apparatus
US11074940B2 (en) 2013-12-09 2021-07-27 Paronym Inc. Interface apparatus and recording apparatus
US20160164984A1 (en) * 2014-12-05 2016-06-09 Microsoft Technology Licensing, Llc. Determining Browsing Activities
US10404816B2 (en) * 2014-12-05 2019-09-03 Microsoft Technology Licensing, Llc Determining browsing activities

Also Published As

Publication number Publication date
CN1379883A (en) 2002-11-13
CN1243317C (en) 2006-02-22
EP1231546A1 (en) 2002-08-14
AU2806201A (en) 2001-04-30
WO2001029705A8 (en) 2001-07-26
BR0014938A (en) 2002-10-01
US7099490B1 (en) 2006-08-29
WO2001029705A1 (en) 2001-04-26
CA2387216A1 (en) 2001-04-26
JP2001188738A (en) 2001-07-10
MXPA02003694A (en) 2002-08-30
EP1231546A4 (en) 2008-01-23

Similar Documents

Publication Publication Date Title
US20060078160A1 (en) Information providing system and identification information adding device
JP3522635B2 (en) Computer-readable recording medium recording an image file, apparatus for creating this recording medium, medium recording an image file creation program, image file transmitting apparatus, image file processing apparatus, medium recording image file processing program
US7702811B2 (en) Method and apparatus for marking of web page portions for revisiting the marked portions
US7673059B2 (en) Tracking electronic content
US6647531B2 (en) Customization of network documents
JP2003514279A (en) Shared Internet storage resource, user interface system and method thereof
US8046757B2 (en) Method for installing ActiveX control
US11513868B2 (en) Systems and methods for automatically detecting applications
RU2272318C2 (en) Computer-readable data carrier, on which image file is recorded, device for making a data carrier, carrier on which program is recorded for forming an image file, device for transferring image file, device for processing image file and carrier, on which program for processing an image file is recorded
WO2009109628A1 (en) Method of tracking usage of client computer and system for same
US20200104191A1 (en) Systems and methods for automatically detecting desktop applications
JP2000132397A (en) Client, server and software distribution system using them
JP4799581B2 (en) Page customization server, page customization program, and page customization method
EP1229455A1 (en) Information providing system
JP4243039B2 (en) Image file processing apparatus, image file processing program, and medium storing the program
EP1229464A1 (en) Electronic commerce system
JP4243040B2 (en) Information image file installer apparatus, installer program, and computer-readable medium recording the program
AU2003203842B2 (en) Computer-readable Recorded Medium on Which Image File is Recorded, Device for Producing the Recorded Medium, Medium on Which Image File Creating Program is Recorded, Device for Transmitting Image File, Device for Processing Image File, and Medium on Which Image file Processing Program is Recorded
CA2387217A1 (en) Network advertisement method and system
TW574659B (en) Information providing system and identification information adding device
MXPA01003390A (en) Computerreadable recorded medium on whic

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION