Patent US8131597
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Active provider: Google · gemini-2.5-pro
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Defensive Disclosure and Prior Art Derivations for US8131597
Publication Date: April 28, 2026
Subject Matter: System and method for using an ordinary article of commerce to access a remote computer.
Citations: US Patent US8131597
This document establishes prior art for a series of technical implementations, variations, and applications derived from the core concepts disclosed in US Patent US8131597. The following disclosures are intended to place these concepts in the public domain, thereby rendering them obvious or non-novel for the purposes of future patent examination. A person having ordinary skill in the art (PHOSITA) in the fields of computer networking, embedded systems, and material science would be able to implement the following descriptions.
Axis 1: Material & Component Substitution
Derivative 1: Chemically-Encoded Index and Spectrometer-Based Reader
Enabling Description: This variation replaces a visually-encoded barcode with a chemically-encoded index. An inert, non-toxic chemical compound or a specific isotopic mixture is applied to an article of commerce. The unique spectral signature of this compound when excited by a specific light frequency (e.g., in the near-infrared spectrum) serves as the
index. The user computing system is equipped with a handheld Raman spectrometer or a Near-Infrared (NIR) spectrometer. The spectrometer illuminates the marked area, captures the reflected light, and performs a Fourier transform to generate a spectral signature graph. This signature is digitized into a unique hash or identifier, which is then transmitted as theindexto the remote server computer. The server's database contains records linking these chemical spectral hashes to network pointers (URLs). This method provides a secure, difficult-to-replicate alternative to optical barcodes for high-value goods.Diagram:
sequenceDiagram participant UserDevice as User Device (Spectrometer) participant Article as Article (Chemical Index) participant RemoteServer as Remote Server participant InfoComputer as Information Computer UserDevice->>Article: Illuminate with NIR laser Article-->>UserDevice: Return spectral signature UserDevice->>UserDevice: Digitize signature to create Index UserDevice->>RemoteServer: Transmit Index RemoteServer->>RemoteServer: Lookup Pointer in Database using Index RemoteServer-->>UserDevice: Return Pointer (URL) UserDevice->>InfoComputer: Use Pointer to request content InfoComputer-->>UserDevice: Return content
Derivative 2: Acoustic Resonance Signature as Index
Enabling Description: This method uses the intrinsic physical properties of an object to generate a unique
index. Every object possesses a unique acoustic resonance signature based on its material, geometry, and internal structure. The user computing system is equipped with a piezoelectric transducer to impart a low-energy impulse (a "ping") to the article and a sensitive microphone to record the resulting acoustic response. A signal processing unit on the user device performs a Fast Fourier Transform (FFT) on the recorded audio to generate a unique frequency spectrum profile. Key peaks and patterns in this profile are converted into a digital hash, which serves as theindex. This index is transmitted to the remote server, which maintains a database mapping these acoustic signatures to network pointers. This is particularly useful for authenticating items where external markings are undesirable, such as works of art or precision mechanical parts.Diagram:
flowchart TD A[User Device: Piezo Transducer pings Article] --> B{Article resonates}; B --> C[User Device: Microphone records acoustic response]; C --> D[Signal Processor: Apply FFT to response]; D --> E[Generate unique Index from frequency spectrum]; E --> F[Transmit Index to Remote Server]; F --> G{Server: Database Lookup}; G --> H[Return Pointer to User Device]; H --> I[User Device connects to Information Computer];
Axis 2: Operational Parameter Expansion
Derivative 3: Nanoscale Component Identification via Atomic Force Microscopy
Enabling Description: This disclosure applies the patented method to the nanoscale for identifying and retrieving data about individual synthetic components, such as quantum dots or custom nanostructures used in anti-counterfeiting. A unique identifier is etched onto the surface of a component at the nanometer scale using electron-beam lithography. The user computing system is an Atomic Force Microscope (AFM) with a network interface. The AFM scans the surface of the component, reading the topographic data of the etched identifier. This data is converted into a digital
index. The index is transmitted over the network to a remote server, which holds a database linking these nanoscale identifiers to pointers. The pointer could resolve to a batch manufacturing record, material composition data, or quantum-state characterization results.Diagram:
stateDiagram-v2 [*] --> Scanning Scanning: AFM tip reads nanoscale etched pattern on component Scanning --> Processing: Raw topographic data captured Processing: Convert topographic data to digital Index Processing --> Transmitting: Send Index to Remote Server Transmitting --> Receiving: Await response from server Receiving --> Resolving: Pointer received from server Receiving --> Timeout: No response Timeout --> [*] Resolving: Use Pointer to access component-specific data repository Resolving --> [*]
Derivative 4: High-Throughput Industrial Sorting System
Enabling Description: This system operates at an industrial scale where latency is critical. On a conveyor belt moving at several meters per second, items (e.g., packages, recycled materials) pass under a high-speed machine vision camera. The camera captures an image of a 2D barcode (e.g., Data Matrix) on each item. An edge computing device connected to the camera decodes the barcode to an
indexin under 5 milliseconds. This index is transmitted over a low-latency network (e.g., a private 5G or fiber optic link) to a distributed, in-memory remote server database (e.g., Redis or Memcached cluster). The server performs the index-to-pointer lookup in under 1 millisecond. The returnedpointeris not a URL but a specific instruction set or routing code (e.g.,{"action": "divert", "gate": "7B"}). The edge device uses this pointer to actuate a pneumatic diverter on the conveyor belt, sorting the item into a specific bin. The entire cycle from scan to actuation is completed in under 50 milliseconds.Diagram:
sequenceDiagram participant Conveyor participant VisionSystem as High-Speed Camera participant EdgeDevice as Edge Compute participant ServerCluster as In-Memory Server participant Actuator as Pneumatic Diverter loop For Each Item Conveyor->>VisionSystem: Item passes under camera VisionSystem->>EdgeDevice: Send image of barcode EdgeDevice->>EdgeDevice: Decode image to Index (5ms) EdgeDevice->>ServerCluster: Transmit Index (low-latency) ServerCluster->>ServerCluster: Lookup Pointer (Instruction Set) (1ms) ServerCluster-->>EdgeDevice: Return Pointer EdgeDevice->>Actuator: Use Pointer to command actuator Actuator->>Conveyor: Divert item to correct bin end
Axis 3: Cross-Domain Application
Derivative 5: Aerospace: In-Situ Component Verification
Enabling Description: In an aerospace maintenance context, critical components are marked with a permanent, machine-readable Data Matrix code. A maintenance engineer uses a ruggedized handheld device to scan this code, retrieving the component's unique serial number (
index). The device transmits this index over a secure satellite link to a distributed ledger technology (DLT) or blockchain-based server network. The server uses the index to retrieve a pointer to a smart contract containing the component's immutable digital record. This record includes its full flight history, maintenance logs, and certified manufacturer data. The system ensures data integrity and provides an unalterable audit trail for every critical part.Diagram:
flowchart LR subgraph Engineer On-Site A[Handheld Scanner] --> B(Scan Component's Data Matrix); B --> C{Extract Index (Serial #)}; end C --> D[Transmit Index via Satellite Link]; subgraph Ground Network D --> E{Blockchain Server}; E --> F[Lookup Pointer to Smart Contract]; end F --> G[Return Pointer to Handheld]; subgraph Engineer On-Site G --> H[Device uses Pointer to access immutable Component Record]; end
Derivative 6: AgTech: Automated Livestock Health Protocol Management
Enabling Description: Each animal in a herd is fitted with a passive UHF RFID ear tag containing a unique identification number (
index). As an animal passes through an automated weighing station or feed trough, an RFID reader captures its index. The station's local controller transmits the index along with the animal's current weight to a remote veterinary management server. The server's database retrieves apointerbased on the animal's health profile. The pointer does not lead to a static webpage, but to a specific API endpoint that triggers a dynamic action. For example, it could point to a "dispense_antibiotic" API for an underweight animal, or a "change_feed_mixture" API for an animal in a specific growth phase. The API call is executed by the local controller, which then operates machinery (e.g., a pump or gate) to administer the specific protocol.Diagram:
sequenceDiagram participant Animal participant RFID_Reader as RFID Reader/Scale participant LocalController as Station Controller participant VetServer as Veterinary Server participant Dispenser as Feed/Medicine Dispenser Animal->>RFID_Reader: Walks through station RFID_Reader->>LocalController: Send Index + Weight LocalController->>VetServer: Transmit Index + Weight VetServer->>VetServer: Lookup health record, determine Pointer (API Endpoint) VetServer-->>LocalController: Return Pointer (e.g., /api/v1/dispense?med=X) LocalController->>Dispenser: Execute API call via local command Dispenser->>Animal: Administer prescribed protocol
Axis 4: Integration with Emerging Tech
Derivative 7: AI-Driven Predictive Pointer Generation
Enabling Description: The user's computing device, upon machine-reading an
indexfrom a product, transmits not only the index but also a package of contextual metadata to the remote server. This metadata includes geolocation, time of day, device language settings, and user's historical interaction patterns (with user consent). The remote server feeds this index and context package into a pre-trained machine learning model (e.g., a multi-layer perceptron or a recommender system). The model's output is not a static database lookup but a dynamically generatedpointerthat is predicted to be most relevant to the user's immediate intent. For instance, scanning a food item at 6 PM near a residential area might yield a pointer to a recipe video, whereas scanning the same item at 1 PM in a commercial district yields a pointer to a coupon for a nearby cafe that uses that ingredient.Diagram:
graph TD A[User Device: Scans Index] --> B[Gather Context: Location, Time, History]; B --> C[Transmit Index + Context]; C --> D{Remote Server}; D --> E[AI/ML Inference Engine]; E --> F[Generate/Select a context-aware Pointer]; F --> D; D --> G[Return tailored Pointer to User Device]; G --> H[User accesses highly relevant content];
Derivative 8: Blockchain-Verified Provenance Pointer
Enabling Description: This variation integrates the patent's lookup method with a blockchain for supply chain verification. The
indexis machine-read from a QR code on a product. The user device sends the index to a remote server. The server acts as an oracle, using the index to query a decentralized supply chain ledger (e.g., built on Hyperledger Fabric or Ethereum). The server retrieves a series of transaction hashes that represent the product's journey from origin to retail. The server then generates a uniquepointerto a web-based visualization tool, pre-populated with these transaction hashes. When the user's device accesses this pointer, the visualization tool makes live calls to the blockchain to pull and display the verified, immutable provenance data for that specific item, such as farm of origin, processing date, and shipping logs.Diagram:
classDiagram class UserDevice { +scanIndex() +transmitIndex() +receivePointer() +accessProvenanceVisualizer() } class OracleServer { +receiveIndex() +queryBlockchain() +generatePointer() +returnPointer() } class BlockchainLedger { +storeTransaction() +getProvenanceTrail(index) } class ProvenanceVisualizer { +displayTrail(transactionHashes) } UserDevice "1" -- "1" OracleServer : Transmits Index OracleServer "1" -- "1" BlockchainLedger : Queries with Index OracleServer "1" -- "1" ProvenanceVisualizer : Generates Pointer to UserDevice "1" -- "1" ProvenanceVisualizer : Accesses with Pointer
Axis 5: The "Inverse" or Failure Mode
Derivative 9: Graceful Degradation with Cached Pointers and Local Content
Enabling Description: The user's computing system (e.g., a mobile application) is designed for operational resilience in network-denied environments. The application maintains a local LRU (Least Recently Used) cache implemented in an SQLite database. When an
indexis successfully resolved, the index-pointer pair is stored in this cache with a TTL (Time To Live). When the user machine-reads an index, the system first checks for network connectivity. If online, it proceeds as normal but updates the cache. If offline, it queries the local SQLite database for the index. If a valid, non-expired entry exists, it uses the cachedpointerto access the resource (which may also be cached). If the index is not in the cache, the system uses the index to retrieve a pre-packaged, limited set of information stored locally within the application's assets, providing essential "offline mode" functionality.Diagram:
flowchart TD A[Start: Machine-read Index] --> B{Network Connection?}; B -- Yes --> C[Transmit Index to Remote Server]; C --> D{Pointer Received?}; D -- Yes --> E[Store Pointer in Local Cache]; E --> F[Use Pointer to access remote resource]; F --> G[End]; B -- No --> H[Query Local Cache for Index]; H -- Found --> F; H -- Not Found --> I[Retrieve fallback content from local assets]; I --> G; D -- No --> H;
Combination Prior Art with Open-Source Standards
1. Combination with W3C Verifiable Credentials and Decentralized Identifiers (DIDs)
- Enabling Description: The
indexencoded on an article is a W3C-compliant Decentralized Identifier (DID), e.g.,did:example:123456789abcdefghi. The user's computing system reads this DID. It transmits the DID to a remote server which acts as a "DID Resolver" conforming to the open DID Resolution specification. The resolver accesses a Verifiable Data Registry (e.g., a blockchain or distributed database) to find the DID Document associated with the product's DID. The server does not return a simple URL. Instead, it constructs and returns apointerin the form of a JSON-LD Verifiable Credential (VC), cryptographically signed by the manufacturer. This VC contains claims about the product (e.g., "isOrganic": true). The user's device, using open-source libraries, can then independently verify the cryptographic signature of the VC, providing a much higher degree of trust than a simple link to a website.
2. Combination with GS1 Digital Link Standard
- Enabling Description: The system is an implementation of the open GS1 Digital Link standard. The machine-readable data carrier is a QR code containing a URL-formatted
indexsuch ashttps://d.example.com/01/09506000122415. The user's computing system is a standard smartphone camera and browser, which natively reads the QR code and navigates to this URL. The remote server atd.example.comis a GS1-compliant "Resolver." It parses the incoming URL to extract the GS1 identifier (GTIN09506000122415). The server then inspects the HTTP request headers (e.g.,Accept-Language,User-Agent). Based on these headers and the identifier, it performs a database lookup to find the most appropriatepointer. It then issues an HTTP 302 Redirect, sending the user's browser to the selected pointer—for example, a French-language nutritional information page for a user in France, or a product recall notice for a user in the USA. The system claimed in the patent is thus implemented using a standardized, open URL-based syntax and standard web protocols.
3. Combination with MQTT Protocol for Asynchronous IoT Communication
- Enabling Description: This system is used for interacting with IoT devices in a factory setting, leveraging the open MQTT protocol. Each machine component has a QR code that encodes its MQTT "Topic" string (
index), for example,/acme/factory1/cnc/spindle/status. A technician's mobile device scans this index. The device does not make an HTTP request. Instead, it uses an open-source MQTT client library (e.g., Paho) to connect to a central MQTT Broker (the remote server) and subscribes to a response topic (e.g.,/acme/factory1/technician/dave/response). It then publishes an empty message to the Topic it scanned. A separate service (a "resolver" microservice) is subscribed to/acme/factory1/cnc/spindle/status. When it receives the message, it looks up the URLpointerfor the spindle's real-time diagnostic dashboard and publishes this URL to the technician's response topic. The technician's device receives the pointer asynchronously and displays it. This decouples the request from the response and uses a lightweight, open pub/sub architecture instead of HTTP.
Generated 4/28/2026, 2:23:26 AM