Patent 5841978

Obviousness

Combinations of prior art that suggest the claimed invention would have been obvious under 35 U.S.C. § 103.

Active provider: Google · gemini-2.5-pro

Obviousness

Combinations of prior art that suggest the claimed invention would have been obvious under 35 U.S.C. § 103.

✓ Generated

Obviousness Analysis of US Patent 5,841,978 under 35 U.S.C. § 103

This analysis assesses whether the invention claimed in U.S. Patent 5,841,978 would have been obvious to a person having ordinary skill in the art (POSITA) at the time the invention was made, considering the prior art references cited during prosecution. The central inventive concept of the '978 patent is the specific combination of steganography with network addresses to create automated hyperlinks from media objects.

A POSITA in 1995 would likely have been a computer scientist or electrical engineer with experience in digital signal processing, image processing, and early internet/network protocols.

The independent claims of the '978 patent are likely obvious in light of the combination of U.S. Patent 5,245,165 (De Vitry) with either U.S. Patent 4,807,031 (Cluts) or U.S. Patent 5,428,453 (Oomen).

Primary Combination of References

  1. De Vitry ('165): Linking from an Object Using an Embedded Address.
    De Vitry explicitly teaches the core functional goal of the '978 patent: linking a document (physical or digital) to a computer-based information system. It discloses a system where a document contains a machine-readable code that stores an address. A user scans this code, and the system uses the address to retrieve the linked information. De Vitry provides the foundational concept of using an embedded address on an object to initiate a data retrieval or "linking" action. The primary difference is that De Vitry teaches the use of a visible machine-readable code, such as a barcode.

  2. Cluts ('031) or Oomen ('453): The Method of Imperceptible Embedding.
    Both Cluts and Oomen teach methods for steganographically embedding digital data into video signals (i.e., image data) in a manner that is imperceptible to a human viewer. Cluts focuses on embedding authentication information, while Oomen describes robust methods for embedding and decoding such hidden information. These patents provide the specific technical mechanism that the '978 patent claims: imperceptible, steganographic encoding within an image.

Motivation to Combine and Reasonable Expectation of Success

A person of ordinary skill in the art, seeking to improve upon the system taught by De Vitry, would have been motivated to combine its linking functionality with the steganographic methods of Cluts or Oomen for several reasons:

  • Aesthetic Improvement: The visible barcode used by De Vitry is aesthetically intrusive. It occupies space and can detract from the visual appeal of an image or document. A POSITA would readily recognize that replacing the visible barcode with an invisible, steganographically embedded code as taught by Cluts would achieve the same linking function without compromising the visual integrity of the host object. This would not be a new invention, but rather a predictable design improvement, substituting one known data-embedding technique (barcodes) for another (steganography) to gain a known benefit (invisibility).
  • Data Portability and Integrity: By the mid-1990s, with the rise of the World Wide Web, the concept of a hyperlink was well-established. However, links were typically stored in header files or markup language (like HTML), separate from the image data itself. If an image file was copied and pasted into a new context, its link would be broken. A POSITA would be motivated to embed the link address directly into the image file to make the link persistent and inseparable from the image. The steganographic methods taught by Cluts and Oomen provide a known and suitable means for this embedding.

There would have been a reasonable expectation of success in this combination. Both De Vitry's "address" and Cluts's "authentication information" are simply digital data payloads. A POSITA would understand that the steganographic method of Cluts is agnostic to the meaning of the bits being embedded. Substituting a network address (a string of bits) for an authentication code (another string of bits) into the embedding process taught by Cluts would have been a straightforward implementation detail.

Application to the Independent Claims

  • Claims 5 and 16 (Linking from a Printed Object): De Vitry teaches linking from a printed document via a machine-readable code containing an address. Cluts teaches imperceptibly embedding data into visual media. Combining these teachings directly yields the invention claimed: a physical object (Claim 16) with a secretly embedded, machine-readable network address, and a method for linking from it (Claim 5) by capturing the object's data, detecting the hidden address, and linking to the network location.

  • Claims 1, 10, 17, and 18 (Linking from a Digital Object and System Implementation): The same rationale applies to digital objects. The '978 patent itself acknowledges that traditional methods used header files to associate a URL with an object. The motivation to create a more integrated and portable link by embedding the URL directly and imperceptibly into the object's data would have been obvious. Claim 10 (the encoding method) is rendered obvious by using the embedding technique of Cluts to embed the address taught by De Vitry. Claims 1, 17, and 18, which cover the method of decoding and linking, and the computer systems and software to perform it, are likewise obvious as they merely describe the necessary implementation of the obvious method. Programming a computer to read data, apply the decoding algorithms taught by Cluts or Oomen, and then use the resulting data string as a network address would have been a routine task for a POSITA in that era.

Conclusion

While the prior art cited does not explicitly disclose the complete combination of elements in any single reference (as noted in the Anticipation analysis), the combination of the linking concept from De Vitry ('165) with the steganographic embedding methods from Cluts ('031) or Oomen ('453) would have rendered the claims of US 5,841,978 obvious under 35 U.S.C. § 103. The motivation to combine—to improve aesthetics and data portability—was strong, and the implementation would have been a predictable application of known techniques.

Generated 4/30/2026, 2:25:11 AM