SlideShare a Scribd company logo
1 of 11
Download to read offline
Russian Federation Patent                                                         RU 2,326,433 C1
                                                            Patent No.:
                                                            Date of Patent:                      Jun 10, 2008

                                                            code in the database, through the web site. To ob-
METHOD OF SIMPLIFICATION OF
                                                            tain access to the Internet resource, one should
ACCESS TO INTERNET RESOURCES
                                                            additionally address the said web site, enter the
PLACED ON INTERNET, LINKS ON
                                                            shorter code published by the author and corres-
WHICH ARE PUBLISHED IN PRINT AND
                                                            ponding to the full Internet resource address.
ELECTRONIC MEDIA

                                                                       5 Claims, 7 Drawing Sheets
Inventor: Nikitenko Vladimir Vladimirovich,
Donetsk (UA)

Apll. No.:        2007117564/09

Appl. Date:       May 14, 2007

PCT Filed:        Jan. 14, 2008

PCT No.:          PCT/IB2008/001950

PCT Pub. No.:     WO/2009/013613

PCT Pub. Date.: Jan. 29, 2009

Int. Cl.:         G06F 17/30 (2006.01)

                References Cited

US 2004246531
US 7076541 B1      11.07.2006
US 7082476 B1      25.07.2006
JP 2004362118      24.12.2004
RU 2213368 C2      27.09.2003
KR 20040097849     18.11.2004
KR 20020011841     09.02.2002
EP 1185056
                                                                  DESCRIPTION OF THE INVENTION
                                                            The present invention relates to methods of digital
                   ABSTRACT
                                                            computing and data processing, specifically de-
SUBSTANCE: invention relates to methods of
                                                            signed for information retrieval; database struc-
representation of addresses of Internet resources
                                                            ture    for this      purpose      [G06F     17/30].
placed on the Internet, in particular, to a web site
                                                            More specifically the method could be used by
with a database containing a link to an Internet
                                                            authors of publications, books, articles or other
resource and an alphabetic, numeric, alphanumer-
                                                            print or electronic publications to simplify a list of
ic code assigned to it, or a code that uses other
                                                            links to sources of information (literature), which
characters and/or symbols. The technical effect is
                                                            can be found on the Internet.
the simplification of Internet links publication for
the author of a printed or electronic publication,
                                                                    THE LEVEL OF TECHNOLOGY
attained by using a shorter code in the publica-
                                                            The Internet is increasingly becoming an integral
tions, which corresponds to the full Internet re-
                                                            part of everyday life. A continuously growing
source address. The web server is made accessible
                                                            number of users, and the amount of information
on the Internet either directly through the web
                                                            placed on the network, or rather on servers, which
site, or through another server with a web site, the
                                                            are a major component of the network.
interface of which is used for the interaction be-
                                                                   The Internet has become a global repository
tween the user and the database, in which the user
                                                            of information of many different areas of exper-
(author) establishes correspondence between the
                                                            tise, which is increasingly used by different media
full Internet resource address link and the shorter
                                                       1 
 
and people of different professions. If a person             code to be kept under strictly defined algorithm,
needs to place in a print publication a link to in-          in which encrypted data on print analog of elec-
formation posted on one of many servers of the               tronic media (author, title, edition circulation, date
network, that person needs to post the link as an            of publication, ISBN, etc., as well as the number
Internet address, which often consists of several            of each copy). For example, the book quot;Don Quix-
dozen of characters and symbols. It is obviously             otequot; must have the code quot;CSPNLIT 3. Searching
difficult to the reader of that print publication to         of the electronic version of this book in the library
get information on that link, because he needs to            database is carried out on this code. These codes
reprint without errors this address into the address         are formed or by publishers of print editions or by
window of Internet browser of his Internet access            their distributors supplying them to libraries, and
device (PC, mobile phone, etc.). In addition, it is          then librarians, who have access to the library da-
very difficult to remember or to transmit such link          tabase of codes, enter these codes to the library
in form of an Internet address to the information            database. This system is essentially similar to
posted on the network server not in print (and in            known universal decimal classification (UDC)
general, using a visual channel of information),             with the only difference that the UDC shall con-
and in the process of transferring information               sist only of numbers and be created by another
where the main channel of communication is                   algorithm, and that to find a copy of publication is
sound (communicating orally, by telephone, radio,            possible only entering the correct code, visiting
etc.).                                                       the library.
        It is known the US patent 6023701, which                    The disadvantage of this invention is that
describes the method of faster access to Internet            users have no possibility to add in the library da-
resources of interest by extending the functionali-          tabase any interested for them literary sources of
ty of folder «Favorites». The rationale is that, ex-         information, not being its authors or publishers.
cept for the address of visited resource user can            Users have also no possibility to leave a comment
set the browser which in the folder «Favorites»              to a Web resource of library in form of additional
will get all (or some) Internet addresses which a            text or image file. It is impossible to ensure access
user visit after the first Internet address, and             to the Internet address of any Web site by any user
grouped by category. In a subsequent user may                and for any user of the network. Also, there is no
choose the level of searching desired resources in           way after user entered the code to get simultane-
folder «Favorites».                                          ous access to multiple sources of related informa-
        The disadvantage of the method is that for           tion. Furthermore, there is no possibility of editing
quick access to the desired Web site user should             information on a specific code with reference to
visit it before and add it to the folder «Favorites».        source of information, as well as editing the link.
There is also no possibility in such method to                      Technical results of declared invention are
simplify access to interesting resources for other           that the author of a book, article or other print or
users. That is, each user must first visit the Inter-        electronic publication by using a short code can
net resource and then add it to the folder «Favo-            simplify drawing up a list of links to sources of
rites». That is, simplified access to a desired Web          information (literature), which can be found in
site is possible only through that terminal (and             Internet. The method allows also getting simulta-
only through that Web browser) of access to the              neous access to multiple information resources
Internet, a user of which was previously at this             after entering only one code, and allows the user
Web site and added it to the folder «Favorites».             to complement the content of displayed pages by
Also, there is no way to comment Internet re-                contact, text or graphic information. In addition, it
source in form of additional text or image file.             is possible editing text, graphics and contact in-
Also, there is no way after user entered the code            formation on a specific code with link to source of
to get simultaneous access to multiple sources of            information, as well as editing the link.
related information.
                                                                      DETAILED DESCRIPTION OF THE
        Furthermore, there is no possibility to edit
                                                                                INVENTION
information on a specific code with reference to
                                                                   The declared technical result is achieved by
source of information, such as to edit the link. Al-
                                                             ensuring that the method of simplification of
so, there is no access to Web pages, in event of
                                                             access to Internet resources, links of which are
termination (temporary or permanent) of Web
                                                             published in print and electronic media, is ensured
site.
                                                             by the assignment to links to Internet resources of
        The closest analogue is the GB patent
                                                             individual alphabetic or numeric or alphanumeric
2375195, which describes the system as a deposi-
                                                             codes, and a reader of print and electronic publi-
tory library data, which is formed by assigning to
                                                             cations has access to Internet resources through
each publication in electronic form individual
                                                        2 
 
access to the Internet and enters the code, using at        Web site, in turn, via which the user interacts with
least one server which contains the database,               database.
which in turn consists of a table of links to Inter-               Along with displaying information con-
net resources and assigned to them individual al-           tained on Web page URL of which is correspond-
phabetic or numeric or alphanumeric codes or                ing to entered code, at the user’s terminal is auto-
codes with other characters and / or symbols, and           matically displayed text and / or graphic com-
the mentioned server is made accessible on the              ments which correspond to each Web page, URL
Internet through a Web site directly or through             of which and mentioned comments have been
another server that hosts Web site, in turn, through        added previously by user in mentioned database.
interface of which a user interacts with database,          The database of comments may contain informa-
where user enters via Web site into a database full         tion about the contact data of author of publica-
link addresses of Internet resource, and then using         tion. The database of comments could also pro-
software of the server that hosts Web site this ad-         vide a database consisting of Internet addresses
dress is added into the database, and it assigns to         (URL), indicating the location of Web pages and
the Web site address a unique code, and commu-              relevant to each URL of additional text and / or
nicates this code to the user, who publishes and /          graphic files.
or distributes the code.                                           When a user (1) (see Fig.1) wants to simpli-
       Other possible variations of the method              fy to the reader (4) of its publication (3) access to
provide that the server that hosts Web site and             information (7), which is available on the Internet,
performing coding is able to copy pages of Inter-           to which he refers in its publication, he, using
net resources which user enters into a database to          access device (2) to the Internet, makes the re-
get the code.                                               quest to the server (5), which hosts Web site, per-
       Other possible variations of the method              forming coding. Using Web site interface user (1)
provide that the server that hosts Web site and             enters to the database (6) of Web site(5), which
performing coding is able to permit to user to add          can be implemented as a separate server with the
and / or edit comments on the link to an Internet           database server with links to Web site(5) in form
address resource in form of additional text or im-          of URL (8), full Internet address of the resource
age file.                                                   (7), located on the Internet. Also, the user can en-
       Other possible variations of the method              ter additional information, for example, his con-
provide that comments are carried out in form of            tact information (11), text (9) or graphics (10)
active links to Internet resources.                         comments on the link, in order this information
       Other possible variations of the method              may explain the link. For example, text comments
provide that the server that hosts Web site, per-           (9) can clearly identify the places at the source of
forming coding, is able to permit to user to save,          information (pages or lines), which clarifies that
using code, few links to Internet resources.                relates to his publication. Graphic comments (10)
       Other possible variations of the method              in form of pictures or animations can be, for ex-
provide that the server that hosts Web site, per-           ample, the thematic index that reflects the source
forming coding, is able to permit to user to choose         of information for the URL (8).
code that corresponds to the link to the address of                After entering information via the Web site
Internet resource.                                          interface software of the Web site forms (12) and
       This invention eliminates the above men-             gives to the user (1) unique code and stores it in
tioned difficulties by creating a method of assign-         its database (6). Then the user can place the code
ing to a Web address unique code. Then, to get              (13) in his publication (3) with purpose that it
interested information, which is located on a serv-         subsequently becomes available to the readers (4).
er, the address of which was recorded in the data-          The user can also use mentioned code to commu-
base (and unique code has been assigned to men-             nicate to everyone the location of his information
tioned address), the user has to form a request to          in the network.
the Web site through interface interacting with the                When a reader (4) of publication (3) wants
database of his device of access to the Internet.           to get information to which its author (1) referred
For access to the Internet can be used PC, mobile           using the code, reader (4) using any access device
phone, smartphones and other devices.                       (2) to the Internet through a network makes re-
       The method uses at least one server that             quest to the server (5) of Web site, where the base
contains the database, which in turn consists of a          of codes is placed. Using Web site (5) interface
table of Internet addresses and assigned to them            reader (4) enters previously received code. The
individual alphabetic, numeric or alphanumeric              program of the server (5) searches address of Web
codes. This server is made available on the Inter-          link that corresponds to the code and through the
net directly or through another server that hosts           Internet sends the reader (4) at the Internet address
                                                       3 
 
of the resource (7), where the reader gets interest-          and / or comments in form of text and / or draw-
ed information.                                               ings.
       The server (5) that hosts Web site, perform-                  The base of hyperlinks is created by admin-
ing coding, is able to index pages of Internet re-            istrator and / or by visitors of the Web site through
sources that users enter into the database to get the         a Web interface.
code. The provisional index allows creating a                        Fig.2 shows an example when a reader (4)
copy of all pages of Internet resources and if serv-          enters code (14) to apply Web site interface (5).
er, where an Internet resource is placed, is tempo-                  Fig.3 shows an example of applying by user
rarily or permanently unavailable, the server that            (1) of Web site interface (5) to enter URL (8), as
hosts Web site would provide access to copies of              well as comments (9) and / or graphic images
pages on the Internet resources. So, in any cir-              (10), contact details (11).
cumstances, using the code of a Web site, a reader                   The implementation of the method is pre-
always gets information, regardless of whether                sented by the scheme shown on Fig.4. It is based
Web site is available in the network at this time or          on the next. Before user (1) through the Web site
not.                                                          (5) leaves the URL (8) to the source of informa-
       The server (5) that hosts Web site, perform-           tion (7), he analyzes the availability of informa-
ing coding, is able to provide user an opportunity            tion on the Web-server (7) using this URL. Make
to save a few links to related topics of Internet             sure that mentioned information is available and
resources using only one code. This allows the                placing it in the field (8) (see Fig.3), as well as
author of publication significantly reduce place in           entering other information (9, 10, 11), the user
the bibliographies by the fact that entered only              sends a request via the interface program, which
one code the reader finds many sources, which                 analyses the correctness of filling user’s informa-
describe an information in support of the author's            tion. Validation of required information can be
words. A reader has not to spend time on analysis             realized based on the algorithm shown in Fig.5. If
of the consistency of the link to the source of in-           the URL specified by user (1) exists, the program
formation with a place in text of book or article,            creates (12) code and grants (16) it to user. If user
which provides the link, because comments to                  (1) enters specified URL, which does not exist or
links replace those requirements.                             Web-server (7), where URL is placed, is not
       Entering the code the reader gets access to            working, Web site (5) program returns the user
the Web site page, where are placed all these                 back to the page of filling data shown in Fig.3,
links, like to the related Internet resources. In this        with possible comment that indicated URL is in-
regard, user gains the possibility to leave com-              correct.
ments on Internet resources in form of additional                    If reader (4) comes to Web site (5) in order
text or image file, because under each of links to            to enter code (14) (see Fig.2), the Web site’s pro-
related Internet resources is possible to leave               gram (5) verifies (20) (see Fig.5) the availability
comments in form of text and / or image file,                 of this code in the database (6) and, if found, redi-
which clearly give the user an understanding of               rects (18) the user's browser to the URL, which
what related Internet resources might be opened               corresponds to the relevant code. As a result, the
then. The advantage of this opportunity consists in           user gets access to source of information (7) at
that the reader sees comments in form of text and /           appropriate Web-server on the Internet.
or image file, instead of Internet links to specific                 If user (1), who had earlier entered a code,
Internet resource, which itself has no information.           wants to make adjustments, it can be easily im-
       The base of hyperlinks is a database con-              plemented based on user registration, which can
sisting of Internet links, to which individual al-            be performed automatically when filling out forms
phabetic, numeric codes, codes based on other                 with the data. This is an opportunity to edit text,
print symbols and signs or combined codes are                 graphics and contact information, such as to edit
assigned. This database is intended to replace In-            the link. For example, if the user entered his con-
ternet links in the print media (books, newspapers,           tact information (11) in form of e-mail addresses,
magazines, etc.) by shorter alphabetic, numeric or            after registering code an automatically generated
by combined codes. Under the code is understand-              password to make changes will be sent on a user’s
ing combination consisting of one or several let-             specified e-mail address.
ters and / or figures and / or signs.                                The user may make changes after entering
       If the Web site allows the user, who uses              the password (21) (see Fig.6), which is checked
only one code, to save few links to related Internet          for correctness (22) of user’s login and password
resources, the code corresponds to one Internet               in the database (6). If login and password are cor-
link that opens a page that contains many links               rect, the user becomes accessible to edit code’s
                                                              profile: URL, contact details, comments, images.
                                                         4 
 
After editing mentioned information the user can                   is communicated to the user and the user pub-
both save changes (24), followed by writing them                   lishes and / or distributes this code, meanwhile
into a database (6), and refuse to change it. If the               the server that hosts Web site, performing cod-
appropriate user’s password and login are incor-                   ing, may be able to enter or to edit comments
rect, the program returns the user to re-entering                  on the link to an address of Internet resource in
the login and password. In doing so, user’s speci-                 form of additional text or image files.
fied e-mail address may be as login.                          2.   The method according to item 1, which is dis-
       The server that hosts Web site, performing                  tinguished by the fact that the server that hosts
coding, may be able to provide user (1) an oppor-                  Web site, performing coding, may be able to
tunity to choose code (14), which corresponds to                   copy pages of Internet resources which the us-
the link (8) to the address of Internet resource (7).              er enters into a database to get the code.
The opportunity to register link (8) under the se-            3.   The method according to item 1, which is dis-
lected code (14) depends on the fact if there is                   tinguished by the fact that the comment is
already the code (14) in the database (6) of Web                   made in form of active link to Internet re-
site (5) or not. If the code (14) is busy (someone                 source.
has registered just this code or the Web site pro-            4.   The method according to item 1, which is dis-
gram (5) has generated it automatically earlier to                 tinguished by the fact that the server that hosts
someone), the Web site program (5) proposes the                    Web site, performing coding, may be able to
user (1) to select another code (14). If selected by               provide the user an opportunity to use one code
user (1) code is not in the database, the Web site                 to save few links to Internet resources.
(5) program allows the user to use it.                        5.   The method according to item 1, which is dis-
       Fig.7 shows example of applying the inter-                  tinguished by the fact that the server that hosts
face with the ability to provide the user an oppor-                Web site, performing coding, may be able to
tunity to choose code which corresponds to ad-                     provide the user an opportunity to choose code
dress of Internet resource.                                        which corresponds to the link to the address of
                                                                   Internet resource.
                     CLAIMS
1. Method of simplification of access to Internet
   resources, placed on the Internet, links to
   which are published in print and electronic
   media, characterized by the fact that readers of
   print and electronic media get access to Inter-
   net resources through access to the Internet
   network and via entering the code, also charac-
   terized by the fact that it used at least one serv-
   er which contains the database, which in turn
   consists of a table of links to Internet resources
   and assigned to them individual alphabetic,
   numeric, alphanumeric codes or codes with
   other characters and / or symbols, the server is
   made available on the Internet through a Web
   site directly or through another server that
   hosts Web site, distinguished by the fact that
   the interaction between user and the database
   is realized through Web site interface, in which
   the user enters into the Web site database the
   full link to address of Internet resource, then
   using software of server that hosts Web site
   this address is added to the database and a
   unique code is assigned to it and then this code
                                                          

                                                          

                                                          

                                                          
                                                         5 
 
FIGURES

                                        Entry of user’s contact infor‐
                                                  mation 11 
     Creation of code 

              12 
                                          Image entry 

                                                 10 



                                        Comment entry 
                                                                                   Entry of user’s 
                                                 9                                  contact data 



                                         URL entry into Web 
                                              server  8 
    Database of 
     Web site  

         6                                             Reader gets code from 

                                                                                    
                                                       publication  4         


                         Web site  

                                                                                 Publication with code 
                                                           2 
                            5 
                                                                                           3 

         2 

                                       Code entry be 
                                        reader  14 

        User                                                         Placement of re‐
                                                                      ceived code in 
         1 
                                                                        publication 
                              Web 
                                                                             13 
                             server 
                                             7




                                             Fig. 1


                                                 6 
 
14 




          Fig. 2




                                    8 


                               9 



                         10 


    11 




          Fig. 3




            7 
 
User   1                         Analyze of availability of URL 
                                                                          source of information on Web 
                                                                                      server 

                                                                                        15 
                                  URL entry into Web 
                                       server 8 
                                                                          Web site 5 

        Grant of code to 
              user 

                 16 


                                                         Code entry by 
    Placement of received 
                                                           reader 14 
      code in publication 

                 13 

                                                        Search of code in 
                                                        database of Web 
                                                            site    17 
     Publication with code 


                         
            3     

                                             Redirection of user's browser to 
                                              the URL, which corresponds to 
                                                    the relevant code 

                                                               18    


    Reader gets code from 

                               
    publication 4         

                                                          Web 
                                                         server 

                                      7




                                                      Fig. 4




                                                        8 
 
Web site  

                                          5 

                                                                   Code entry by 
                                                                    reader  14 
          Entry of URL on Web 
                server 8 




                                                                     Check for 
                                                          No 
                                 19                                correctness of 
           Check for correct‐
    No 
                                                                        code 
             ness of code                           20 


                                                                               Yes 
                        Yes 
                                                          Redirection of user's browser to 
                                   Database of 
            Creation of code                               the URL, which corresponds to 
                                       Web site  
                                                                 the relevant code  
                  12 
                                          6                             18  


            Grant of code to 
                                   Web server 
                user  16 
                                          7 




                                        Fig. 5




                                          9 
 
Web site  

                                         5 



               User’s entry of 
                 password                                No            Save changes 

                     21 
                                                       24 




                                   22 
              Check for correct‐
    No 
                                                                             Yes 
                ness of code 

           


                                                        Database of 
                        Yes 
                                                         Web site  
     Editing of code’s profile: 
                                                               6 
    ‐ URL 

    ‐ Contact information 

    ‐ Comments 

    ‐ Images 



                                              Fig. 6




                                               10 
 
8 


                    9 



    10                   14 


     11 




           Fig. 7




            11 
 

More Related Content

What's hot

Activity 13 common online terminologies
Activity 13 common online terminologiesActivity 13 common online terminologies
Activity 13 common online terminologiesdodug5841
 
Semantic Web & Web 3.0 – Eine Einführung
Semantic Web & Web 3.0 – Eine EinführungSemantic Web & Web 3.0 – Eine Einführung
Semantic Web & Web 3.0 – Eine Einführungbasis06 AG
 
Internet basics
Internet basicsInternet basics
Internet basicscetrosoft
 
Stid1103 ch2 introduction_to_internet_
Stid1103 ch2 introduction_to_internet_Stid1103 ch2 introduction_to_internet_
Stid1103 ch2 introduction_to_internet_Ninie Sharil
 
M.Florence Dayana Web Design-UNit 1
  M.Florence Dayana  Web Design-UNit 1  M.Florence Dayana  Web Design-UNit 1
M.Florence Dayana Web Design-UNit 1Dr.Florence Dayana
 
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIINFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIAman Dwivedi
 
Md.sajal khan(182482510)
Md.sajal khan(182482510)Md.sajal khan(182482510)
Md.sajal khan(182482510)SajalKhan18
 
182482527, md najmul hasan
182482527, md najmul hasan 182482527, md najmul hasan
182482527, md najmul hasan MD Najmul Hasan
 
Activity 11 Common Online Terminologoies
Activity 11 Common Online TerminologoiesActivity 11 Common Online Terminologoies
Activity 11 Common Online TerminologoiesKendrick Villanueva
 
A basic guide to the internet
A basic guide to the internetA basic guide to the internet
A basic guide to the internetarunabhatla
 
Internet Tools in Education
Internet Tools in EducationInternet Tools in Education
Internet Tools in EducationRavi Raj Kamal
 
PTAR UITM Website review
PTAR UITM Website review PTAR UITM Website review
PTAR UITM Website review Dirz M
 

What's hot (16)

Ict internet and html
Ict   internet and htmlIct   internet and html
Ict internet and html
 
Activity 13 common online terminologies
Activity 13 common online terminologiesActivity 13 common online terminologies
Activity 13 common online terminologies
 
Internet
InternetInternet
Internet
 
Semantic Web & Web 3.0 – Eine Einführung
Semantic Web & Web 3.0 – Eine EinführungSemantic Web & Web 3.0 – Eine Einführung
Semantic Web & Web 3.0 – Eine Einführung
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Stid1103 ch2 introduction_to_internet_
Stid1103 ch2 introduction_to_internet_Stid1103 ch2 introduction_to_internet_
Stid1103 ch2 introduction_to_internet_
 
M.Florence Dayana Web Design-UNit 1
  M.Florence Dayana  Web Design-UNit 1  M.Florence Dayana  Web Design-UNit 1
M.Florence Dayana Web Design-UNit 1
 
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDIINFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
INFORMATION TECHNOLOGY FOR MANAGERS PRESENTATION BY AMAN DWIVEDI
 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
 
Md.sajal khan(182482510)
Md.sajal khan(182482510)Md.sajal khan(182482510)
Md.sajal khan(182482510)
 
182482527, md najmul hasan
182482527, md najmul hasan 182482527, md najmul hasan
182482527, md najmul hasan
 
Activity 11 Common Online Terminologoies
Activity 11 Common Online TerminologoiesActivity 11 Common Online Terminologoies
Activity 11 Common Online Terminologoies
 
A basic guide to the internet
A basic guide to the internetA basic guide to the internet
A basic guide to the internet
 
Internet Tools in Education
Internet Tools in EducationInternet Tools in Education
Internet Tools in Education
 
L017447590
L017447590L017447590
L017447590
 
PTAR UITM Website review
PTAR UITM Website review PTAR UITM Website review
PTAR UITM Website review
 

Viewers also liked

presentation for print media
presentation for print mediapresentation for print media
presentation for print medialinkod
 
Biomedicina Plano De Aula3
Biomedicina Plano De Aula3Biomedicina Plano De Aula3
Biomedicina Plano De Aula3Caio Maximino
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionguest71ebd38
 
use in TV
use in TVuse in TV
use in TVlinkod
 
Rus. (original)
Rus. (original)Rus. (original)
Rus. (original)linkod
 
Biomedicina Plano De Aula5
Biomedicina Plano De Aula5Biomedicina Plano De Aula5
Biomedicina Plano De Aula5Caio Maximino
 
Variáveis e mensuração
Variáveis e mensuraçãoVariáveis e mensuração
Variáveis e mensuraçãoCaio Maximino
 
Evaluating Web Sources For Research
Evaluating Web Sources For ResearchEvaluating Web Sources For Research
Evaluating Web Sources For Researchmahrya
 

Viewers also liked (9)

presentation for print media
presentation for print mediapresentation for print media
presentation for print media
 
Biomedicina Plano De Aula3
Biomedicina Plano De Aula3Biomedicina Plano De Aula3
Biomedicina Plano De Aula3
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
use in TV
use in TVuse in TV
use in TV
 
Rus. (original)
Rus. (original)Rus. (original)
Rus. (original)
 
Biomedicina Plano De Aula5
Biomedicina Plano De Aula5Biomedicina Plano De Aula5
Biomedicina Plano De Aula5
 
Aula 3 Cf1
Aula 3 Cf1Aula 3 Cf1
Aula 3 Cf1
 
Variáveis e mensuração
Variáveis e mensuraçãoVariáveis e mensuração
Variáveis e mensuração
 
Evaluating Web Sources For Research
Evaluating Web Sources For ResearchEvaluating Web Sources For Research
Evaluating Web Sources For Research
 

Similar to In English

Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt Sai Swamy
 
Introduction to web technology
Introduction to web technologyIntroduction to web technology
Introduction to web technologyPallawiBulakh1
 
Internet and services by Jaspinder Singh
Internet and services by Jaspinder SinghInternet and services by Jaspinder Singh
Internet and services by Jaspinder Singhsekhonkittu
 
Internet-8432104.ppsx
Internet-8432104.ppsxInternet-8432104.ppsx
Internet-8432104.ppsxJeetuRaj8
 
internet and its services
internet and its servicesinternet and its services
internet and its servicesamitpal163
 
prachi-180626061322.pdf
prachi-180626061322.pdfprachi-180626061322.pdf
prachi-180626061322.pdfTanweer24
 
Common Online Terminologies
Common Online TerminologiesCommon Online Terminologies
Common Online Terminologieskirstinemorante
 
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicSecurity-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicNana Kwame(Emeritus) Gyamfi
 
Web Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesWeb Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesVigneshkumar Ponnusamy
 
Internet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptxInternet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptxSumit Kumar
 
Chapter1-HTML.docx
Chapter1-HTML.docxChapter1-HTML.docx
Chapter1-HTML.docxJanessaCruz
 

Similar to In English (20)

internet world, computer ppt
internet world, computer pptinternet world, computer ppt
internet world, computer ppt
 
Sai internet ppt
Sai   internet ppt Sai   internet ppt
Sai internet ppt
 
Introduction to web technology
Introduction to web technologyIntroduction to web technology
Introduction to web technology
 
Internet and services by Jaspinder Singh
Internet and services by Jaspinder SinghInternet and services by Jaspinder Singh
Internet and services by Jaspinder Singh
 
How Internet Work
How Internet WorkHow Internet Work
How Internet Work
 
Internet-8432104.ppsx
Internet-8432104.ppsxInternet-8432104.ppsx
Internet-8432104.ppsx
 
Internet
InternetInternet
Internet
 
internet and its services
internet and its servicesinternet and its services
internet and its services
 
prachi-180626061322.pdf
prachi-180626061322.pdfprachi-180626061322.pdf
prachi-180626061322.pdf
 
Internet services
Internet servicesInternet services
Internet services
 
INTERNET
INTERNETINTERNET
INTERNET
 
Common Online Terminologies
Common Online TerminologiesCommon Online Terminologies
Common Online Terminologies
 
internet ppt
internet pptinternet ppt
internet ppt
 
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-LogicSecurity-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
Security-Challenges-in-Implementing-Semantic-Web-Unifying-Logic
 
Sup documentation
Sup documentationSup documentation
Sup documentation
 
Web Technologies Introduction to web technologies
Web Technologies Introduction to web technologiesWeb Technologies Introduction to web technologies
Web Technologies Introduction to web technologies
 
Internet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptxInternet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptx
 
Chapter1-HTML.docx
Chapter1-HTML.docxChapter1-HTML.docx
Chapter1-HTML.docx
 
ch1.pptx
ch1.pptxch1.pptx
ch1.pptx
 
Internet
InternetInternet
Internet
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

In English

  • 1. Russian Federation Patent RU 2,326,433 C1 Patent No.: Date of Patent: Jun 10, 2008 code in the database, through the web site. To ob- METHOD OF SIMPLIFICATION OF tain access to the Internet resource, one should ACCESS TO INTERNET RESOURCES additionally address the said web site, enter the PLACED ON INTERNET, LINKS ON shorter code published by the author and corres- WHICH ARE PUBLISHED IN PRINT AND ponding to the full Internet resource address. ELECTRONIC MEDIA 5 Claims, 7 Drawing Sheets Inventor: Nikitenko Vladimir Vladimirovich, Donetsk (UA) Apll. No.: 2007117564/09 Appl. Date: May 14, 2007 PCT Filed: Jan. 14, 2008 PCT No.: PCT/IB2008/001950 PCT Pub. No.: WO/2009/013613 PCT Pub. Date.: Jan. 29, 2009 Int. Cl.: G06F 17/30 (2006.01) References Cited US 2004246531 US 7076541 B1 11.07.2006 US 7082476 B1 25.07.2006 JP 2004362118 24.12.2004 RU 2213368 C2 27.09.2003 KR 20040097849 18.11.2004 KR 20020011841 09.02.2002 EP 1185056 DESCRIPTION OF THE INVENTION The present invention relates to methods of digital ABSTRACT computing and data processing, specifically de- SUBSTANCE: invention relates to methods of signed for information retrieval; database struc- representation of addresses of Internet resources ture for this purpose [G06F 17/30]. placed on the Internet, in particular, to a web site More specifically the method could be used by with a database containing a link to an Internet authors of publications, books, articles or other resource and an alphabetic, numeric, alphanumer- print or electronic publications to simplify a list of ic code assigned to it, or a code that uses other links to sources of information (literature), which characters and/or symbols. The technical effect is can be found on the Internet. the simplification of Internet links publication for the author of a printed or electronic publication, THE LEVEL OF TECHNOLOGY attained by using a shorter code in the publica- The Internet is increasingly becoming an integral tions, which corresponds to the full Internet re- part of everyday life. A continuously growing source address. The web server is made accessible number of users, and the amount of information on the Internet either directly through the web placed on the network, or rather on servers, which site, or through another server with a web site, the are a major component of the network. interface of which is used for the interaction be- The Internet has become a global repository tween the user and the database, in which the user of information of many different areas of exper- (author) establishes correspondence between the tise, which is increasingly used by different media full Internet resource address link and the shorter 1   
  • 2. and people of different professions. If a person code to be kept under strictly defined algorithm, needs to place in a print publication a link to in- in which encrypted data on print analog of elec- formation posted on one of many servers of the tronic media (author, title, edition circulation, date network, that person needs to post the link as an of publication, ISBN, etc., as well as the number Internet address, which often consists of several of each copy). For example, the book quot;Don Quix- dozen of characters and symbols. It is obviously otequot; must have the code quot;CSPNLIT 3. Searching difficult to the reader of that print publication to of the electronic version of this book in the library get information on that link, because he needs to database is carried out on this code. These codes reprint without errors this address into the address are formed or by publishers of print editions or by window of Internet browser of his Internet access their distributors supplying them to libraries, and device (PC, mobile phone, etc.). In addition, it is then librarians, who have access to the library da- very difficult to remember or to transmit such link tabase of codes, enter these codes to the library in form of an Internet address to the information database. This system is essentially similar to posted on the network server not in print (and in known universal decimal classification (UDC) general, using a visual channel of information), with the only difference that the UDC shall con- and in the process of transferring information sist only of numbers and be created by another where the main channel of communication is algorithm, and that to find a copy of publication is sound (communicating orally, by telephone, radio, possible only entering the correct code, visiting etc.). the library. It is known the US patent 6023701, which The disadvantage of this invention is that describes the method of faster access to Internet users have no possibility to add in the library da- resources of interest by extending the functionali- tabase any interested for them literary sources of ty of folder «Favorites». The rationale is that, ex- information, not being its authors or publishers. cept for the address of visited resource user can Users have also no possibility to leave a comment set the browser which in the folder «Favorites» to a Web resource of library in form of additional will get all (or some) Internet addresses which a text or image file. It is impossible to ensure access user visit after the first Internet address, and to the Internet address of any Web site by any user grouped by category. In a subsequent user may and for any user of the network. Also, there is no choose the level of searching desired resources in way after user entered the code to get simultane- folder «Favorites». ous access to multiple sources of related informa- The disadvantage of the method is that for tion. Furthermore, there is no possibility of editing quick access to the desired Web site user should information on a specific code with reference to visit it before and add it to the folder «Favorites». source of information, as well as editing the link. There is also no possibility in such method to Technical results of declared invention are simplify access to interesting resources for other that the author of a book, article or other print or users. That is, each user must first visit the Inter- electronic publication by using a short code can net resource and then add it to the folder «Favo- simplify drawing up a list of links to sources of rites». That is, simplified access to a desired Web information (literature), which can be found in site is possible only through that terminal (and Internet. The method allows also getting simulta- only through that Web browser) of access to the neous access to multiple information resources Internet, a user of which was previously at this after entering only one code, and allows the user Web site and added it to the folder «Favorites». to complement the content of displayed pages by Also, there is no way to comment Internet re- contact, text or graphic information. In addition, it source in form of additional text or image file. is possible editing text, graphics and contact in- Also, there is no way after user entered the code formation on a specific code with link to source of to get simultaneous access to multiple sources of information, as well as editing the link. related information. DETAILED DESCRIPTION OF THE Furthermore, there is no possibility to edit INVENTION information on a specific code with reference to The declared technical result is achieved by source of information, such as to edit the link. Al- ensuring that the method of simplification of so, there is no access to Web pages, in event of access to Internet resources, links of which are termination (temporary or permanent) of Web published in print and electronic media, is ensured site. by the assignment to links to Internet resources of The closest analogue is the GB patent individual alphabetic or numeric or alphanumeric 2375195, which describes the system as a deposi- codes, and a reader of print and electronic publi- tory library data, which is formed by assigning to cations has access to Internet resources through each publication in electronic form individual 2   
  • 3. access to the Internet and enters the code, using at Web site, in turn, via which the user interacts with least one server which contains the database, database. which in turn consists of a table of links to Inter- Along with displaying information con- net resources and assigned to them individual al- tained on Web page URL of which is correspond- phabetic or numeric or alphanumeric codes or ing to entered code, at the user’s terminal is auto- codes with other characters and / or symbols, and matically displayed text and / or graphic com- the mentioned server is made accessible on the ments which correspond to each Web page, URL Internet through a Web site directly or through of which and mentioned comments have been another server that hosts Web site, in turn, through added previously by user in mentioned database. interface of which a user interacts with database, The database of comments may contain informa- where user enters via Web site into a database full tion about the contact data of author of publica- link addresses of Internet resource, and then using tion. The database of comments could also pro- software of the server that hosts Web site this ad- vide a database consisting of Internet addresses dress is added into the database, and it assigns to (URL), indicating the location of Web pages and the Web site address a unique code, and commu- relevant to each URL of additional text and / or nicates this code to the user, who publishes and / graphic files. or distributes the code. When a user (1) (see Fig.1) wants to simpli- Other possible variations of the method fy to the reader (4) of its publication (3) access to provide that the server that hosts Web site and information (7), which is available on the Internet, performing coding is able to copy pages of Inter- to which he refers in its publication, he, using net resources which user enters into a database to access device (2) to the Internet, makes the re- get the code. quest to the server (5), which hosts Web site, per- Other possible variations of the method forming coding. Using Web site interface user (1) provide that the server that hosts Web site and enters to the database (6) of Web site(5), which performing coding is able to permit to user to add can be implemented as a separate server with the and / or edit comments on the link to an Internet database server with links to Web site(5) in form address resource in form of additional text or im- of URL (8), full Internet address of the resource age file. (7), located on the Internet. Also, the user can en- Other possible variations of the method ter additional information, for example, his con- provide that comments are carried out in form of tact information (11), text (9) or graphics (10) active links to Internet resources. comments on the link, in order this information Other possible variations of the method may explain the link. For example, text comments provide that the server that hosts Web site, per- (9) can clearly identify the places at the source of forming coding, is able to permit to user to save, information (pages or lines), which clarifies that using code, few links to Internet resources. relates to his publication. Graphic comments (10) Other possible variations of the method in form of pictures or animations can be, for ex- provide that the server that hosts Web site, per- ample, the thematic index that reflects the source forming coding, is able to permit to user to choose of information for the URL (8). code that corresponds to the link to the address of After entering information via the Web site Internet resource. interface software of the Web site forms (12) and This invention eliminates the above men- gives to the user (1) unique code and stores it in tioned difficulties by creating a method of assign- its database (6). Then the user can place the code ing to a Web address unique code. Then, to get (13) in his publication (3) with purpose that it interested information, which is located on a serv- subsequently becomes available to the readers (4). er, the address of which was recorded in the data- The user can also use mentioned code to commu- base (and unique code has been assigned to men- nicate to everyone the location of his information tioned address), the user has to form a request to in the network. the Web site through interface interacting with the When a reader (4) of publication (3) wants database of his device of access to the Internet. to get information to which its author (1) referred For access to the Internet can be used PC, mobile using the code, reader (4) using any access device phone, smartphones and other devices. (2) to the Internet through a network makes re- The method uses at least one server that quest to the server (5) of Web site, where the base contains the database, which in turn consists of a of codes is placed. Using Web site (5) interface table of Internet addresses and assigned to them reader (4) enters previously received code. The individual alphabetic, numeric or alphanumeric program of the server (5) searches address of Web codes. This server is made available on the Inter- link that corresponds to the code and through the net directly or through another server that hosts Internet sends the reader (4) at the Internet address 3   
  • 4. of the resource (7), where the reader gets interest- and / or comments in form of text and / or draw- ed information. ings. The server (5) that hosts Web site, perform- The base of hyperlinks is created by admin- ing coding, is able to index pages of Internet re- istrator and / or by visitors of the Web site through sources that users enter into the database to get the a Web interface. code. The provisional index allows creating a Fig.2 shows an example when a reader (4) copy of all pages of Internet resources and if serv- enters code (14) to apply Web site interface (5). er, where an Internet resource is placed, is tempo- Fig.3 shows an example of applying by user rarily or permanently unavailable, the server that (1) of Web site interface (5) to enter URL (8), as hosts Web site would provide access to copies of well as comments (9) and / or graphic images pages on the Internet resources. So, in any cir- (10), contact details (11). cumstances, using the code of a Web site, a reader The implementation of the method is pre- always gets information, regardless of whether sented by the scheme shown on Fig.4. It is based Web site is available in the network at this time or on the next. Before user (1) through the Web site not. (5) leaves the URL (8) to the source of informa- The server (5) that hosts Web site, perform- tion (7), he analyzes the availability of informa- ing coding, is able to provide user an opportunity tion on the Web-server (7) using this URL. Make to save a few links to related topics of Internet sure that mentioned information is available and resources using only one code. This allows the placing it in the field (8) (see Fig.3), as well as author of publication significantly reduce place in entering other information (9, 10, 11), the user the bibliographies by the fact that entered only sends a request via the interface program, which one code the reader finds many sources, which analyses the correctness of filling user’s informa- describe an information in support of the author's tion. Validation of required information can be words. A reader has not to spend time on analysis realized based on the algorithm shown in Fig.5. If of the consistency of the link to the source of in- the URL specified by user (1) exists, the program formation with a place in text of book or article, creates (12) code and grants (16) it to user. If user which provides the link, because comments to (1) enters specified URL, which does not exist or links replace those requirements. Web-server (7), where URL is placed, is not Entering the code the reader gets access to working, Web site (5) program returns the user the Web site page, where are placed all these back to the page of filling data shown in Fig.3, links, like to the related Internet resources. In this with possible comment that indicated URL is in- regard, user gains the possibility to leave com- correct. ments on Internet resources in form of additional If reader (4) comes to Web site (5) in order text or image file, because under each of links to to enter code (14) (see Fig.2), the Web site’s pro- related Internet resources is possible to leave gram (5) verifies (20) (see Fig.5) the availability comments in form of text and / or image file, of this code in the database (6) and, if found, redi- which clearly give the user an understanding of rects (18) the user's browser to the URL, which what related Internet resources might be opened corresponds to the relevant code. As a result, the then. The advantage of this opportunity consists in user gets access to source of information (7) at that the reader sees comments in form of text and / appropriate Web-server on the Internet. or image file, instead of Internet links to specific If user (1), who had earlier entered a code, Internet resource, which itself has no information. wants to make adjustments, it can be easily im- The base of hyperlinks is a database con- plemented based on user registration, which can sisting of Internet links, to which individual al- be performed automatically when filling out forms phabetic, numeric codes, codes based on other with the data. This is an opportunity to edit text, print symbols and signs or combined codes are graphics and contact information, such as to edit assigned. This database is intended to replace In- the link. For example, if the user entered his con- ternet links in the print media (books, newspapers, tact information (11) in form of e-mail addresses, magazines, etc.) by shorter alphabetic, numeric or after registering code an automatically generated by combined codes. Under the code is understand- password to make changes will be sent on a user’s ing combination consisting of one or several let- specified e-mail address. ters and / or figures and / or signs. The user may make changes after entering If the Web site allows the user, who uses the password (21) (see Fig.6), which is checked only one code, to save few links to related Internet for correctness (22) of user’s login and password resources, the code corresponds to one Internet in the database (6). If login and password are cor- link that opens a page that contains many links rect, the user becomes accessible to edit code’s profile: URL, contact details, comments, images. 4   
  • 5. After editing mentioned information the user can is communicated to the user and the user pub- both save changes (24), followed by writing them lishes and / or distributes this code, meanwhile into a database (6), and refuse to change it. If the the server that hosts Web site, performing cod- appropriate user’s password and login are incor- ing, may be able to enter or to edit comments rect, the program returns the user to re-entering on the link to an address of Internet resource in the login and password. In doing so, user’s speci- form of additional text or image files. fied e-mail address may be as login. 2. The method according to item 1, which is dis- The server that hosts Web site, performing tinguished by the fact that the server that hosts coding, may be able to provide user (1) an oppor- Web site, performing coding, may be able to tunity to choose code (14), which corresponds to copy pages of Internet resources which the us- the link (8) to the address of Internet resource (7). er enters into a database to get the code. The opportunity to register link (8) under the se- 3. The method according to item 1, which is dis- lected code (14) depends on the fact if there is tinguished by the fact that the comment is already the code (14) in the database (6) of Web made in form of active link to Internet re- site (5) or not. If the code (14) is busy (someone source. has registered just this code or the Web site pro- 4. The method according to item 1, which is dis- gram (5) has generated it automatically earlier to tinguished by the fact that the server that hosts someone), the Web site program (5) proposes the Web site, performing coding, may be able to user (1) to select another code (14). If selected by provide the user an opportunity to use one code user (1) code is not in the database, the Web site to save few links to Internet resources. (5) program allows the user to use it. 5. The method according to item 1, which is dis- Fig.7 shows example of applying the inter- tinguished by the fact that the server that hosts face with the ability to provide the user an oppor- Web site, performing coding, may be able to tunity to choose code which corresponds to ad- provide the user an opportunity to choose code dress of Internet resource. which corresponds to the link to the address of Internet resource. CLAIMS 1. Method of simplification of access to Internet resources, placed on the Internet, links to which are published in print and electronic media, characterized by the fact that readers of print and electronic media get access to Inter- net resources through access to the Internet network and via entering the code, also charac- terized by the fact that it used at least one serv- er which contains the database, which in turn consists of a table of links to Internet resources and assigned to them individual alphabetic, numeric, alphanumeric codes or codes with other characters and / or symbols, the server is made available on the Internet through a Web site directly or through another server that hosts Web site, distinguished by the fact that the interaction between user and the database is realized through Web site interface, in which the user enters into the Web site database the full link to address of Internet resource, then using software of server that hosts Web site this address is added to the database and a unique code is assigned to it and then this code         5   
  • 6. FIGURES Entry of user’s contact infor‐ mation 11  Creation of code  12  Image entry  10  Comment entry  Entry of user’s  9  contact data  URL entry into Web  server  8  Database of  Web site   6  Reader gets code from    publication  4          Web site   Publication with code  2  5  3  2  Code entry be  reader  14  User  Placement of re‐ ceived code in  1  publication  Web  13  server  7 Fig. 1 6   
  • 7. 14  Fig. 2 8  9  10  11  Fig. 3 7   
  • 8. User   1  Analyze of availability of URL  source of information on Web  server  15  URL entry into Web  server 8  Web site 5  Grant of code to  user  16  Code entry by  Placement of received  reader 14  code in publication  13  Search of code in  database of Web  site    17  Publication with code    3      Redirection of user's browser to  the URL, which corresponds to  the relevant code  18     Reader gets code from    publication 4          Web  server  7 Fig. 4 8   
  • 9. Web site   5  Code entry by  reader  14  Entry of URL on Web  server 8  Check for  No  19  correctness of  Check for correct‐ No  code  ness of code  20  Yes  Yes  Redirection of user's browser to  Database of  Creation of code  the URL, which corresponds to  Web site   the relevant code   12  6   18   Grant of code to  Web server  user  16  7  Fig. 5 9   
  • 10. Web site   5  User’s entry of  password  No  Save changes  21  24  22  Check for correct‐ No  Yes  ness of code    Database of  Yes  Web site   Editing of code’s profile:  6  ‐ URL  ‐ Contact information  ‐ Comments  ‐ Images  Fig. 6 10   
  • 11. 9  10  14  11  Fig. 7 11