Patent 5905248
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Active provider: Google · gemini-2.5-pro
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Defensive Disclosure and Prior Art Generation
Reference Patent: U.S. Patent 5,905,248
Subject Matter: System and method for initiating an internet-based transaction by scanning a physical symbol encoded with a Uniform Resource Locator (URL), which directs a client device to a web document containing a transaction-enabling applet that is automatically launched and executed.
Purpose: This document establishes public prior art for a series of derivative inventions and improvements related to the core claims of U.S. Patent 5,905,248. The disclosures herein are intended to be enabling for a person having ordinary skill in the art, thereby rendering subsequent patent applications for these concepts as obvious or lacking novelty.
Axis 1: Material & Component Substitution
Derivative 1.1: Near-Field Communication (NFC) Initiated Transaction Applet
Enabling Description: The optical barcode symbol is replaced with a passive Near-Field Communication (NFC) tag (ISO/IEC 14443 compliant). The URL is written to the tag's NDEF (NFC Data Exchange Format) record. The code symbol reader is an NFC-enabled mobile device (smartphone, tablet). When the device is brought within proximity (typically < 4 cm) of the NFC tag, the device's operating system automatically reads the NDEF record, identifies the URI (Uniform Resource Identifier), and launches the default web browser to the specified URL. The web server at this URL serves an HTML5 document containing a JavaScript-based transaction application (replacing the Java Applet) which executes automatically upon page load to handle the transaction.
Mermaid Diagram:
sequenceDiagram participant UserDevice as Mobile Device (NFC Enabled) participant NFCTag as NFC Tag participant WebServer as HTTP Server participant TransactionApp as Web App (JavaScript) UserDevice->>+NFCTag: Tap device on tag NFCTag-->>-UserDevice: Transmit NDEF Record (contains URL) UserDevice->>UserDevice: OS URI Handler launches browser UserDevice->>+WebServer: HTTP GET Request (URL from tag) WebServer-->>-UserDevice: HTTP 200 OK (HTML/JS Payload) UserDevice->>+TransactionApp: Browser executes JavaScript on load TransactionApp-->>-UserDevice: Render transaction interface
Derivative 1.2: Biometric-Indexed Transaction Applet Launch
Enabling Description: The transaction initiation is triggered by a biometric scan rather than a manufactured symbol. A user's biometric data (e.g., a fingerprint hash, iris template) is pre-registered in a secure database and linked to a specific transaction URL. The "reader" is a standard biometric scanner (e.g., FAP 30 fingerprint sensor) connected to a client terminal. Upon a successful scan, the terminal generates a hash of the biometric data and sends it to a secure lookup server. The server retrieves the corresponding URL and returns it to the client terminal. The client terminal then launches a web browser and navigates to the returned URL, where the transaction applet is served and executed.
Mermaid Diagram:
flowchart TD A[User presents biometric] --> B{Biometric Scanner}; B --> C[Generate Biometric Hash]; C --> D[Send Hash to Lookup Server]; subgraph Secure Backend D --> E{Biometric DB}; E -- URL --> F[Retrieve Associated URL]; end F --> G[Return URL to Client]; G --> H{Client Terminal}; H --> I[Launch Browser with URL]; I --> J[Execute Transaction Applet];
Derivative 1.3: Thermochromic Ink for Conditional URL Visibility
Enabling Description: The URL is encoded in a 2D barcode (e.g., QR Code) printed using thermochromic ink that is invisible at a standard ambient temperature (e.g., 20°C) but becomes visible and scannable above a specific activation temperature (e.g., 35°C). A transaction kiosk is equipped with a standard optical scanner and a controlled heating element (e.g., a Peltier device or infrared lamp). To initiate a transaction, the user places their transaction card on a designated platen. The heating element raises the surface temperature of the card, revealing the barcode. The optical scanner then reads the URL, and the system proceeds to launch the transaction applet. This provides a physical security layer, as the URL is not scannable via casual photography.
Mermaid Diagram:
stateDiagram-v2 [*] --> Inactive Inactive: Card at ambient temp. Barcode invisible. Inactive --> Heating: User places card on platen Heating: Peltier element warms card to >35°C Heating --> Scannable: Barcode becomes visible state Scannable { direction LR [*] --> Scanning Scanning --> Success: Scanner reads URL Scanning --> Timeout: Scanner fails to read Success --> [*] Timeout --> Inactive } Scannable --> Inactive: Card cools down
Axis 2: Operational Parameter Expansion
Derivative 2.1: DNA-Encoded URL for Nanoscale Biological Transactions
Enabling Description: The URL is encoded as a sequence of nucleotide bases (A, C, G, T) and synthesized into a single-stranded DNA molecule. This DNA is suspended in a solution or affixed to a substrate. The "reader" is a nanopore sequencing device (e.g., Oxford Nanopore MinION). The DNA sample is introduced to the sequencer, which determines the base sequence in real-time. A connected computer translates the base sequence back into an ASCII URL string using a predefined encoding scheme (e.g., 2 bits per base). The computer then launches a browser to this URL, which opens a specialized web applet for bioinformatics, such as ordering a custom synthetic gene from a genomics foundry or querying a protein folding database.
Mermaid Diagram:
graph LR A(DNA Strand w/ Encoded URL) -- Sampled --> B(Nanopore Sequencer); B -- Electrical Signals --> C(Basecalling Software); C -- Nucleotide Sequence --> D(Decoder Module); D -- "ACGT -> 'http://...'" --> E(ASCII URL String); E --> F(Web Browser); F -- HTTP Request --> G(Genomics Web Server); G -- Applet --> F;
Derivative 2.2: Long-Range Optical Scan for Industrial Asset Management
Enabling Description: A large-format (e.g., 1m x 1m) 2D barcode with high error correction (e.g., QR Code Level H) is affixed to industrial equipment, such as a wind turbine nacelle or a large chemical tank. The "reader" is a drone or robotic vehicle equipped with a high-resolution camera and a telephoto lens. The drone navigates to the asset, captures an image of the barcode from a standoff distance (e.g., 50-100 meters), and performs image processing to decode the URL. The URL includes the unique asset ID and points to a web-based industrial IoT platform. The platform's applet launches, displaying real-time telemetry from the asset's sensors, its complete maintenance history, and providing controls for remote diagnostics.
Mermaid Diagram:
sequenceDiagram participant Drone as UAV with Camera participant Asset as Industrial Equipment participant GroundControl as Ground Control Station participant IIoT_Platform as Industrial IoT Server GroundControl->>+Drone: Fly to Asset Coordinates Drone->>Asset: Capture image of large-format barcode Drone-->>-GroundControl: Transmit image GroundControl->>GroundControl: Decode URL from image GroundControl->>+IIoT_Platform: HTTP Request (URL with Asset ID) IIoT_Platform-->>-GroundControl: Serve Asset Management Applet GroundControl->>GroundControl: Display telemetry and controls
Axis 3: Cross-Domain Application
Derivative 3.1: Aerospace In-Situ Component Analysis
Enabling Description: A unique Data Matrix code is laser-etched onto a critical, life-limited aerospace component (e.g., a compressor disk in a jet engine). During an on-wing inspection, a technician uses a ruggedized borescope equipped with a camera to scan the code. The borescope is connected to a tablet. The decoded URL contains the component's unique serial number. It directs the tablet's browser to a secure manufacturer's portal. A WebGL-based applet loads, rendering a 3D model of that specific component. The applet overlays historical manufacturing quality data, previous inspection reports, and live data from nearby sensors (e.g., vibration, temperature) streamed via a local avionics bus gateway. The technician can then log new inspection data directly into the applet, which updates the component's digital twin record.
Mermaid Diagram:
flowchart TD subgraph On-Wing Inspection A(Technician uses Borescope) --> B{Scan Etched Data Matrix}; B --> C[Decode URL with Serial Number]; end subgraph Tablet C --> D[Browser requests URL]; end subgraph Secure Cloud D --> E(Manufacturer Server); E --> F[Authenticate Technician]; F --> G{Serve Component Digital Twin Applet}; G --> H(Load Manufacturing & Sensor Data); end H --> I{Render 3D Model & Data Overlay}; I --> Tablet; Tablet --> J(Technician logs new inspection); J --> G;
Derivative 3.2: AgTech Livestock Health Management
Enabling Description: An electronic ear tag on a farm animal (e.g., a cow) contains an NFC chip storing a URL. The URL includes the animal's unique ID. A farmhand uses an NFC-enabled mobile device to scan the tag. This action launches a web applet connected to a farm management platform. The applet automatically pulls the animal's history (birth, vaccinations, breeding). It then uses the mobile device's camera and a client-side machine learning model (e.g., TensorFlow.js) to perform a real-time visual health assessment (e.g., analyzing gait, eye clarity, or body condition). The results are logged in the applet and a recommendation for action (e.g., quarantine, dietary change) is displayed.
Mermaid Diagram:
sequenceDiagram participant Farmer as Farmer's Mobile Device participant CowTag as Animal NFC Tag participant FarmServer as Farm Management Server participant MLModel as On-Device ML Model Farmer->>+CowTag: Scan NFC Ear Tag CowTag-->>-Farmer: Return URL with Animal ID Farmer->>+FarmServer: GET /animal/{ID} FarmServer-->>-Farmer: Serve Health Applet + Animal History Farmer->>Farmer: Activate Camera via Applet Farmer->>+MLModel: Perform Visual Health Analysis MLModel-->>-Farmer: Return Health Score/Metrics Farmer->>+FarmServer: POST /health-log/{ID} (Data from ML Model) FarmServer-->>-Farmer: Acknowledge & provide recommendation
Axis 4: Integration with Emerging Tech
Derivative 4.1: AI-Optimized Equipment Calibration
Enabling Description: A QR code on a scientific instrument (e.g., a mass spectrometer) encodes a URL pointing to a cloud-based management platform. When a technician scans the code, the launched web applet sends the instrument's unique ID to an AI backend. The AI model has been trained on performance data from thousands of similar instruments. It analyzes the specific instrument's recent usage patterns, error logs, and environmental sensor data (via IoT). The AI generates a dynamic, optimized calibration procedure tailored to the instrument's current state and anticipated workload, rather than a generic, fixed schedule. The applet then guides the technician through this custom procedure step-by-step.
Mermaid Diagram:
graph TD A[Scan QR Code on Instrument] --> B(Launch Calibration Applet); B -- Instrument ID --> C{AI Backend}; subgraph Cloud Platform C -- Analyzes --> D(Historical Usage Data); C -- Analyzes --> E(IoT Sensor Data); C --> F[Generate Optimized Calibration Workflow]; end F -- Custom Steps --> B; B --> G[Guide Technician through steps];
Derivative 4.3: Blockchain-Verified Supply Chain Audit
Enabling Description: A QR code on a pallet of high-value goods (e.g., organic produce) contains a URL. The URL points to a decentralized application (dApp) front-end. When a supply chain participant (e.g., a customs officer) scans the code, the dApp is launched. The dApp prompts the officer to connect their decentralized identity wallet (e.g., MetaMask). Using their wallet, the officer signs a transaction that records the scan event (location, timestamp, their public key) on a permissioned blockchain. The dApp then reads the blockchain and displays the complete, immutable chain of custody for that specific pallet, verifying its origin and path.
Mermaid Diagram:
sequenceDiagram participant Officer as Customs Officer's Device participant QRCode as Pallet QR Code participant dApp as dApp Frontend participant Wallet as Identity Wallet (MetaMask) participant Blockchain as Supply Chain Ledger Officer->>QRCode: Scan QR Code QRCode-->>Officer: Provide URL to dApp Officer->>+dApp: Load dApp Frontend dApp->>+Wallet: Request Wallet Connection Wallet-->>-dApp: Wallet Connected dApp->>+Wallet: Request Signature for Scan Event Wallet-->>-dApp: Return Signed Transaction dApp->>+Blockchain: Broadcast Signed Transaction Blockchain->>Blockchain: Record new custody event in block Blockchain-->>-dApp: Confirmation dApp->>+Blockchain: Read full history for Pallet ID Blockchain-->>-dApp: Return complete audit trail dApp-->>-Officer: Display verified chain of custody
Axis 5: The "Inverse" or Failure Mode
Derivative 5.1: Graceful Degradation with Embedded Fallback URL
Enabling Description: The data encoded in a QR code is a structured format (e.g., a JSON object) containing a
primaryUrland afallbackUrl. A custom scanner application (instead of the OS-default) reads the QR code. It first attempts to make an HTTP HEAD request to theprimaryUrl. If the request succeeds within a 500ms timeout and returns a 200-series status code, the app launches a full web view with this URL. If it fails or times out, the app immediately launches thefallbackUrl. ThefallbackUrlpoints to a statically-generated, CDN-hosted, text-only HTML page that allows for submission of the most critical transaction data via a simple form, ensuring core functionality even in poor network conditions.Mermaid Diagram:
flowchart TD A[Scan QR with structured data] --> B{Custom Scanner App}; B --> C{"Extract primaryUrl & fallbackUrl"}; C --> D{HTTP HEAD to primaryUrl}; D -- Success (200 OK, <500ms) --> E[Launch full applet at primaryUrl]; D -- Fail (Timeout, Error) --> F[Launch lite page at fallbackUrl]; E --> G[Full Transaction]; F --> H[Limited Transaction];
Combination Prior Art with Open-Source Standards
Scenario 1: OAuth 2.0 for Secure Service Onboarding: A QR code on a newly purchased IoT device contains a pre-formatted OAuth 2.0 authorization URL for the device manufacturer's service. The URL includes the
client_id(representing the device model), a uniquestateparameter (tied to the device serial number), and the requestedscope(e.g.,device_registration,data_sync). When the user scans this code with their phone, it launches their browser, directs them to their chosen identity provider (e.g., Google, Apple), and initiates an authorization flow. Upon user consent, the provider redirects back to the manufacturer's service with an authorization code, which is then exchanged for an access token. This token securely links the physical device to the user's account without the user ever needing to manually enter serial numbers or passwords.Scenario 2: WebAuthn for Phishing-Resistant Kiosk Authentication: An interactive kiosk for financial services displays a QR code containing a session-specific URL. A user scans the QR code with their mobile phone, which opens the URL in their phone's browser. The web page served is a remote authenticator interface. It initiates a WebAuthn ceremony, prompting the user to authenticate on their phone using a platform authenticator (Face ID, Android fingerprint). The phone signs a challenge and sends the signed assertion back to the kiosk's session via a secure WebSocket connection established by the applet. The kiosk verifies the assertion and logs the user into their account, completely bypassing the need for passwords on the public kiosk.
Scenario 3: Verifiable Credentials for Decentralized Access Control: A secure facility uses QR codes at entry points. The QR code contains a URL that initiates a request for a Verifiable Credential (VC) based on the W3C DID and VC standards. When an employee scans the code, the launched web applet communicates with their digital wallet on their device. The wallet presents a cryptographically signed VC issued by the company's HR department, proving their identity and access level (
role: "Level 3 Engineer"). The applet verifies the VC's signature against the company's public DID. If valid, the applet sends a signal to the physical access control system to open the door.
Generated 4/28/2026, 4:52:21 AM