The present invention relates to a system for retrieving information from a database. More specifically, the present invention improves a system's response time so that a user's request to view new information is serviced quickly.
The recent proliferation of electronic text and multimedia databases has placed at society's fingertips a wealth of information and knowledge. Typically, a computer is employed that locates and retrieves information from the database in response to a user's input. The requested information is then displayed on the computer's monitor. Modern database systems permit efficient, comprehensive, and convenient access to an infinite variety of documents, publications, periodicals, and newspapers. Yet retrieving information from databases is often slow. Sometimes, this is caused by bandwidth limitations, such as when information is retrieved from remotely-located databases over an ordinary telephone line, a very narrow bottleneck. In other cases, slow retrieval is caused by a relatively slow local mass storage device (e.g., a CD-ROM drive).
There exists a compelling need for a database system that has a quicker response time so that information is displayed very soon after the user requests it. This need can be satisfied by effectively utilizing the time the user spends studying information on the display screen. In a database system or document retrieval system in one embodiment of the present invention, information that the user is likely to eventually request is preloaded into memory while the user is viewing other information. In some embodiments, the present invention takes advantage of the fact that it is possible to accurately predict the information that the user will eventually request be shown on the display. Some embodiments of the present invention also take advantage of the fact that the time that the user spends viewing displayed information is often sufficient to advantageously preload a substantial amount of information.
With these and other objects, advantages, and features of the invention that may become hereinafter apparent, the nature of the invention may be more clearly understood by reference to the following detailed description of the invention, the appended claims, and to the several drawings herein.
a is a block diagram of a general purpose computer.
b is a diagram of multiple computers connected together to form a network of computers and/or networks.
c, 1d, and 1g are diagrams illustrating various procedures for installing and executing software.
e and 1f are flow charts illustrating procedures for installing and executing software.
a) and 4(b) are each a representation of four search documents and three related documents showing a display view and four anticipated views.
a) and 5(b) are each a representation of four search documents and three related documents showing various term views.
a, 13b, 13c, 13d, and 13e are flow charts illustrating the operation of embodiments of the present invention.
a to 17f are representations of a video display screen illustrating various features and embodiments of the present invention.
a and 18b are flow charts illustrating the operation of various embodiments of the invention.
a, 20b, and 20c are flow charts of the operation of embodiments of the present invention illustrating how server demands can be reduced in some circumstances.
a is a block diagram of a general purpose computer 102 that can be used to implement the present invention. The computer 102 has a central processing unit (CPU) 104, memory 113, and input/output (i/o) circuitry 112. The CPU 104 is connected to the memory 113 and the i/o circuitry 112. The i/o circuitry permits the CPU 104 to access various peripheral devices, such as the display or monitor 108, local storage 106, and input device(s) 110. The input device(s) 110 may include a keyboard, mouse, pen, voice-recognition circuitry and/or software, or any other input device. Some type of secondary or mass storage 106 is generally used, and could be, for example, a hard disk or optical drive. The storage 106 can also be eliminated by providing a sufficient amount of memory 113. Either the storage 106 or the memory 113 could act as a program storage medium that holds instructions or source code. The i/o circuitry 112 is also connected to a network 114, thereby connecting the computer 102 to other computers or devices.
b is a representation of multiple computers (251, 252, 253, 254, 255, 256, and 257) connected together to form a network of computers and/or networks. Computers 251, 252, and 256 are shown connected to wide area network (WAN) 263, whereas computers 253, 254, 255, and 257 are shown interconnected by local area network (LAN) 261. The LAN 261 is connected to the WAN 263 by connection 262. Various network resources, such as databases of documents or other objects, are stored on one or more the computers shown in
In a networked environment, such as that of
d shows a different embodiment. When the network-connected computer 1001 connects to or downloads an object stored on the remote computer 1002 over the network, a program 1005 embedded within the downloaded document or object is installed on the computer 1001 and is executed on the computer 1001.
The computer 1001 identifies at 1020 one or more programs embedded within the accessed object. The client computer then determines whether each embedded program has been installed previously on the computer 1001. This can be done by searching the computer's storage or system registry for the program or for the program's identifying characteristics. In Microsoft's ActiveX/COM architecture, for example, this is done by searching the registry for an instance of the program's globally unique identifier (GUID) in the system registry.
If the embedded program has been installed on the client computer, the previously installed program is retrieved from local storage at 1030, and executed at 1028. However, if the program has not been already installed on the client computer, it is retrieved over the network (1023), and installed on the client computer. The installation process will typically involve updating a system registry or other persistent storage with identifying information on the computer 1001.
Preferably, the program is installed at 1024 such that it need not be downloaded again over the network when it is encountered embedded within another object. For example, if the computer 1001 were to access an object on computer 1012 that had program 1005 embedded within it, the program 1005 would not need to be installed again because it has already been installed when computer 1002 was accessed.
f is flow chart illustrating a different embodiment of the present invention. In this system, when the computer 1001 encounters an object on computer 1002, it identifies at 1040 each program embedded within the object. It then retrieves one or more programs over the network, and then installs them at the client computer 1001, but without the use of a persistent storage mechanism. Thus, although the program is executed on the client computer 1001, the embedded program must be downloaded each time it is encountered because no persistent storage mechanism is used. This type of installation procedure may be more secure, and has been used in some of the early Java implementations.
A system in which software is downloaded over the network, perhaps from an untrusted server, has significant security risks associated with it, and for this reason, security restrictions may be placed on computer programs downloaded from the network. Thus, a downloaded computer program may be unable access some of the resources of a client computer or of the network generally. In some embodiments, however, a downloaded program may be tested for authenticity and safety through a code signing procedure, or through a code verifying procedure. If such a program passes such authenticity tests, it may be given more complete access to system or network resources.
In yet another embodiment, shown in
Each of the described techniques for installation and/or use of software can be implemented in connection with the present invention. For example, software used for carrying out one or more embodiments of the present invention may be installed and executed in accordance with the techniques described above.
In
There are also “related documents” (500A, 600A, and 700A) shown in
Related documents may also be related only to a particular view within a search document. For example, a search document that is a judicial opinion may have numerous other judicial opinions cited in the text of the opinion. These cited opinions may be “related documents,” but often they relate only to a particular view within the document. Depending on the implementation of the database system, they might not be considered to be “related” to the search document as a whole. Thus, they are available as related documents only when the corresponding cite is within the currently displayed view. In such an implementation, the related documents are dependent on the view shown on the monitor at any given time.
The user uses one or more input devices to request particular views. For example, an input device might be a keyboard that includes a “next page” key and a “next document” key. The “next page” key requests the next successive view (view 102A) within the document currently being viewed (document 100A). The “next document” view requests the first view (view 201A) of the next successive search document according to the ordering characteristic (document 200A). Many database systems have “next page” and “next document” commands or keys (e.g., Westlaw, LEXIS/NEXIS, and West Publishing Company's CD-ROM products), as well as others (e.g., “previous document,” “previous page”). Westlaw also permits a user to request a particular search document or “page” by typing a command. For example, to view search document three (300A), the user types “r3”; to request page 2 (i.e., view 2) within the currently displayed document, the user types “p2.” And in some systems, multiple commands can be executed together by separating them with a semicolon, so page two from document three (view 302A) can be requested with a single command: “r3;p2.”
In the systems of the prior art, when the database system receives the command to display a different view, the requested view must be loaded from the database before it can be displayed on the monitor or display. Since retrieving information from the database is time-consuming, this loading process is undesirably slow. But in a system employing the present invention, the time required to respond to the user's request for a different view (the “requested view”) is reduced by taking advantage of the fact that it is often possible to predict the requested view before the user actually requests it. In the present invention, the view(s) that the user is likely to next request are preloaded while the user is reading the displayed view.
Thus, in one embodiment of the present invention, the view or views (i.e., anticipated view(s)) that are likely to be next requested by the user are “preloaded” (e.g., in the background) to the extent permitted by the time the user spends reading or studying the display view. When the user does request that a different view be displayed (i.e., the user requests a “requested view”), the requested view can be very quickly displayed on the monitor if it has already been preloaded into memory. Thus, if the requested view is one of the anticipated views, the database system is able to quickly respond to the user's request for the requested view.
As shown in
Instead of loading the entire anticipated view before checking the input device, in other embodiments of the present invention the input device is monitored during the time the anticipated view is being preloaded into the database. If the user requests a requested view, the preloading of the anticipated view stops and the user's request is serviced. This ensures that the system is very responsive to the user's input. Such an embodiment can be implemented by checking the input device each time a segment (i.e., a portion) of the anticipated view is preloaded. If the computer retrieving information from the database is running a multitasking and/or multithreading operating system, such an embodiment can alternatively be carried out using the various techniques appropriate for such an operating system.
a) shows a situation where view 101A (shaded) is the display view, and the retrieval system has identified four views 102A, 501A, 201A, and 401A as anticipated views. View 102A is likely to be requested by the user when the displayed view is view 101A because it is the next view in the document that the user is currently viewing. View 501A is a candidate for the requested view because it is the first view from a document (500A) that relates to the search document (100A) that the user is currently viewing. View 401A is also an anticipated view because the user might wish to view the document that represents the opposite extreme of the ordering characteristic (e.g., the oldest document). And as described above, view 201A is also likely to be requested by the user.
In the embodiment of
Once the user issues a request for a requested view, the requested view is loaded from memory (or from the database, if necessary) and displayed on the monitor. The process of determining and preloading anticipated views then starts over. For example, if the requested view is view 201A, the display view will then become view 201A (shaded) as shown in
a) shows another representation of four search documents showing term views 111, 112, 211, 212, 213, 214, 311A, 312A, and 411. In
b) shows the representation of the four search documents showing other term views 171, 271, 272, 371, and 471. These term views are made up of a small number of words surrounding each occurrence of a search term in the search documents. Since the number of words surrounding the search terms is small, more than one set of words can fit on the screen at a given time. Thus, the term view in this embodiment includes information from different parts of the document. The “KWIC” display format in the LEXIS/NEXIS system operates similarly.
Subdocument views may be anticipated views because the user is often particularly interested in a particular portion of the search documents. If the search documents consist of a series of judicial opinions, for example, a user may only wish to view, for each of the search documents, the subdocument for the majority opinion (and not the headnotes, dissenting opinions, etc.). Thus, it may be appropriate for the anticipated views to be drawn primarily from a particular type of subdocument.
In other situations, however, the user may only wish to see the first subdocument view for each subdocument. It would be appropriate in these situations for the anticipated views to be primarily the first views from the various subdocuments within each document.
The retrieval system of the present invention identifies anticipated documents by focussing on the current display view. The current display view gives clues as to which view might be requested by the user because the display view identifies the user's progress in browsing the search documents. In other words, the current display view identifies which search document in the sequence of search documents is currently being viewed. This information is useful because the search document immediately following and preceding the current search document (as defined by the ordering characteristic) is often the search document next requested by the user.
The view displayed just prior to the displayed view might also be a consideration in determining the anticipated views if it tends to show a pattern that can identify the user's next requested view. For example, referring to
In general, any appropriate adaptive prediction scheme can be used that uses the user's history of requested views (and display views) to accurately determine which views are likely to be next requested by the user. It might be appropriate in some cases to consider many display views in determining appropriate anticipated views. Longer histories may tend to identify patterns that would not show up if only a small number of recent display views are considered.
Tendencies can even be monitored over more than one research session in situations where a particular user or group of users tend to request views in a particular pattern each time research is done. In addition, the user could be prompted to indicate the type of research being undertaken, which may give clues as to what type of anticipated views are appropriate for efficient operation. Finally, the particular databases used or type of research being done can be monitored by the database system and advantageously taken into account in determining anticipated views.
In the preferred embodiments of the present invention, the anticipated views are drawn from both related documents and search documents. A fundamental distinction between related documents and search documents is that related documents are statically-related to the search documents, whereas search documents are dynamically-related to one another. This difference is significant because unlike statically-related documents, no predefined link needs to be set up for search documents. A statically-related document is always associated with a particular document, regardless of the query (the related document is therefore statically-related). The search documents, on the other hand, are related to each other by the query. Since the query changes with each search, the search documents are considered dynamically-related to one another:
Some of the recent CD-ROM products have implemented features such as hyperlinked text, and timeline-linked text (clicking on a timeline item will take the user to a relevant article). See The Top 100 CD-ROMs, PC Magazine, Sep. 14, 1994, p. 115. Links of this nature are static because they always apply and do not depend on any particular query run by the user.
The search documents are ordered by an ordering characteristic as described previously. Thus, when a “next document” is requested, it is assumed that the search document requested by a “next document” command is the search document that is “next” according to the ordering characteristic. If the search documents are ordered by publication date, for example, the “next document” will be interpreted as a request for the search document with the next oldest publication date.
In one embodiment of the present invention, it is possible to make a number of different ordering characteristics available for use by the user in browsing the search documents. For example,
The present invention is applicable to single-user, multiple-user, and many-user databases, but the present invention is most effective when used in connection with single-user databases. The efficient operation of the invention depends on being able to retrieve data from the database very frequently, perhaps continually. The present invention is quite effective with single-user databases such as those on CD-ROM or other mass storage devices (this might also include a hard drive implementation). In a single-user database, no other demands are being made on the database by the other users, so the database is often idle.
But since a many-user or multiple-user database must be shared among more than one user, such a database will often be receiving simultaneous and continual requests for data. Databases in such a system are rarely idle, so there is little time to preload anticipated views into memory. In such a situation, the present invention will not be as effective in improving the response time to users' requests for requested views. But in many-user or multiple-user database systems where the database is not as busy, the present invention can be effective in reducing response times to users' requests for information.
As dictated by the retrieval logic 52, the database system then loads into memory a view from one of the search documents. See
The database system then begins to preload these anticipated views into memory from the database, while also continually monitoring the input device to determine if the user has issued a request to display a different view (i.e., a “requested view”) on the monitor. Anticipated views are loaded into memory until the user requests a requested view.
When the user does makes such a request, the database system then determines whether the requested view is in memory. The requested view may be in memory because it could have been preloaded into memory as an anticipated view. If the requested view is in memory, the requested view becomes the new display view, and it is displayed on the monitor. But if the requested view is not in memory, the requested view must first be loaded from the database before it can be displayed on the monitor as the display view.
The anticipated views are a function of the display view because the views that the user is likely to request depend to some degree on the view the user is currently reading. In other words, those views that are anticipated views when view 101A is the display view are not likely to be the same as the anticipated views when view 202A is the display view. Therefore, as shown in
When the display view is changed, the anticipated views for the prior display view can remain in memory so that they are available if they are ever requested by the user. But if memory is limited, the anticipated views for the prior display view can be deleted from memory, preferably in an efficient matter (e.g., anticipated views common to both the new display view and the prior display view are not deleted from memory). It is best to delete those views that are not likely to be requested by the user. It may also be appropriate to consider whether a view is likely to become an anticipated view in the future.
The number of anticipated views for a given display view does not have to be a predetermined or constant number, but rather can vary depending on memory available. Typically, the number of anticipated views for a display view is a trade-off between the amount of memory available and the desired speed of retrieval. In instances where memory is plentiful, where the number of search documents is few, and/or where the search documents are small, it may be possible for all of the search documents to be completely loaded into memory. In such a situation, the number of anticipated views for a given display view could be as high as the total number of views in the search documents. At the other end of the spectrum, there might be only one or two anticipated views for each display view if memory is limited.
Embodiments of the present invention can vary as to how anticipated views are preloaded into memory. In the embodiments of
Simultaneous preloading of multiple anticipated views can be done in a number of ways. In a multitasking operating system, for example, an appropriate time-slicing procedure can be used to preload the anticipated views so that they are preloaded simultaneously. In another embodiment, one segment from each anticipated view is preloaded in turn, and the cycle is repeated until all the anticipated views are fully preloaded into memory (or until the user's request for a requested view interrupts the preloading process). A segment is any portion of an anticipated view, such as one or two lines or even a single byte of the anticipated view.
In another embodiment of the invention, the use of profile information is employed to assist in the selection of views or documents to preload, as illustrated in
Shown within the document viewing area of the window 406 in
a is flow chart representing the operation of one embodiment of the present invention in which profile information is used to assist in the selection of documents to preload. In
At 502, the document viewing program renders document 301 in the window 406, as shown in
After document 302 has been retrieved, if the user has not requested (e.g., through the input device) at 506 that another document be displayed, the document viewing program at 508 retrieves document 303 over the network, and this document is then stored in memory or local storage. The document 301 is still displayed in the window 406 at this point. If the user still has not requested that another document be displayed at 510, the document 304 is retrieved from the network and stored in memory or local storage by the document viewing program in 512.
At 514, the document viewing program in the embodiment of
If the locally stored version of the requested document at 519 is not out of date, then it is displayed at 524. If the preloaded version at 519 is out of date, or if the requested document has not been preloaded at all (516), then the requested document is retrieved over the network and is displayed at 524.
In another embodiment, the document viewing program may continue preloading additional documents at 512 in
As described in connection with
Other data that might be included in the document profile might be the server or database in which each document is stored. This information is shown in
In operation, the server sends to the document viewing program the information of
b is a continuation flow chart of
When the user does request that a different document be displayed in
c is a continuation of the flow chart of
When the user requests a new document, the document viewing program checks at 586 to determine whether the requested document has been preloaded (586). If it has, the preloaded version is retrieved at 588 and analyzed to determine whether it is out of date at 589. If the preloaded document is not out of date, it is displayed at 590. Otherwise, the document is retrieved over the network at 592, and displayed at 590.
d is a partial flow chart in an alternate embodiment of the present invention that can be used to replace 504 in
In an alternate embodiment, shown in
A third thread of execution in
However, if the requested document has been at least partially preloaded, the preloaded version is checked for staleness at 617. At 613 the document viewing program determines whether the requested document has been partially or fully preloaded. If the requested document has been fully preloaded, it is retrieved from local storage (614) and rendered on the display (616). If it has been only partially preloaded, the partially preloaded version is retrieved from local storage (620), and any portion not in local storage is retrieved from the network (622), and then rendered on the display (616).
In some situations, it may be useful to have the user exercise some direct control over the preloading process. For example,
In
a is a flow chart illustrating the operation of an embodiment of the present invention that is similar to that described in connection with
In the embodiment of
In some embodiments, the document may also be checked at 818 to determine whether it is sufficiently new or current. If its download date, modification date, or other information indicates that the contents of the document are not sufficiently new, or are out of date, the requested document is again retrieved over the network at 812.
b illustrates an embodiment of the present invention in which a document is displayed at 830 by the viewing program, and then one or more threads of execution begin preloading the documents that are linked to by the displayed document (832). Another thread of execution monitors the user's input to determine whether the user has selected a link to preload (834) or whether the user has selected a link to display (836).
When the user selects a link to preload at 834, such as by selecting one or more of the buttons 708, 710, or 712 in
Where more than one link has been selected by the user, each could be preloaded at a priority higher than that of the documents being preloaded at 832. In another embodiment, the document most recently selected for preloading could be given a priority higher than any other, so that the resources of the document viewing program are being applied to the preloading of the most recently selected-document.
Once the user selects a document to be displayed, the viewing program determines at 842 whether the document has been preloaded into local storage. If so, the preloaded version is retrieved from local storage (848), and displayed (846). Otherwise, the requested document is retrieved over the network (844) and displayed (846).
In the embodiments described in
In
The button 710 in
In some document retrieval systems, the user may incur a cost for each document or set of information that he or she retrieves from a database or over a network. In such a system, preloading documents before they are requested by the user could incur fees for documents that the user has never intended to see, use, or retrieve from the network. In other words, some documents may be retrieved in such a system simply because they are linked or otherwise related to one of the documents that the user did retrieve. This can undesirably increase costs for the user.
When the user selects a document to be displayed at 906, the viewing program determines at 908 whether an encrypted version of the requested document has been preloaded. If so, the viewing program retrieves the password or key required to decrypt the encrypted version of the document, and at that time, the cost of retrieving the document is incurred at 910. The encrypted version of the document stored locally is decrypted at 912 and then displayed at 914.
By retrieving only the password or key over the network and then decrypting the locally-stored encrypted version of the requested document, the document will typically be displayed much more quickly than if the entire document would have to be retrieved from the network. Normally, the size of the key will be much smaller than the size of the document. Retrieving only the key, and processing the encrypted document at the client will therefore typically be much faster than retrieving the unencrypted version of the document over the network upon receiving a request for it.
The use of the procedures described herein may, in some environments, substantially increase the number of requests that are issued to network servers, and may also increase the amount of bandwidth required for a given network. This can be exacerbated where each document has embedded within it additional objects that must be separately requested from the server. Thus, it may be desirable to implement techniques to alleviate, eliminate, or avoid these effects. In one embodiment of the present invention, each time a request is issued to a network server, additional information is included within the request so that the database server (or any other network hardware or resources) is notified of the type of the request. This will allow requests to be prioritized so that server and/or other network resources are not allocated to tasks that may have less priority (e.g., a request to preload a document) than other tasks (e.g., a normal document request).
a is a flow chart of a system in which the document viewing program communicates to the database server (or to the network itself) a priority for each request. At 1102, the document viewing program issues a normal priority request to the database server for document A. The database server responds to this request, and at 1104, document A is retrieved over the network by the document viewing program. When it is received, it is displayed by the document viewing program at 1106.
The document viewing program then starts a thread that monitors the user input at 1108 to determine whether the user has requested a document for display. Another thread is also started, and this thread at 1120 issues a low priority request to the server for document B (one of the documents it seeks to preload). The user at this point has not requested that document B be displayed, so the retrieval of document B is done based on the expectation that the user may wish to view document B at some point. For this reason, the request for document B is issued on a low-priority basis. (Document B may be a document that is linked to document A, that is identified in profile information, or that is otherwise related to document A.) When the server responds to the request, document B is downloaded over the network at 1122, and stored locally at 1124.
The low-priority request allows the network server to respond to other normal or high priority requests in advance of responding to the low-priority request for document B. This can be used to ensure that when the user actually requests a document from the server, the server will service that request before other low-priority requests by either that user or by other users. This information can also be used by the network hardware (e.g., network routers) itself to prioritize the routing of the requests or the routing of packets of data.
When a request that a document be displayed is made by the user at 1108, the document viewing program determines whether the requested document is in local storage at 1110. If it is, it is retrieved from local storage at 1116, and displayed at 1118. However, if the requested document is not stored in local storage, a normal-priority request is issued to the server at 1112. The request is a “normal” priority request because the user has actually requested a document, in contrast to the request made at 1120 of
b is another embodiment of the present invention that deals generally with the types of problems addressed in
When the user requests a document for display, the document viewing program determines whether the requested document has already been preloaded. If necessary, the requested document is retrieved over the network at 1136; otherwise, it is retrieved from local storage at 1140. After it is retrieved, it is displayed at 1138.
c is a flow chart of an embodiment of the present invention in which an anticipated document, document B, is stored in a file along with the objects that are embedded within the document B, are referenced by the document B, or are linked to by document B. By downloading such a file, the number of requests that must be issued to the server can be reduced. And if data compression is used to reduce the size of the file at the server and decompress the file at the client, the number of bits that must be downloaded to the client computer can be reduced.
Once document A is displayed at 1148 in
The present invention is suitable for implementation as an ActiveX or Java control, which could be downloaded as part of a web page into a browser or an operating system for execution on a client computer. In such an embodiment, there may be security restrictions placed on the downloaded control. Appendix A is an outline of a Java program or psuedocode for applet written in Java that can be inserted into a web page, and appears on the web page as a button that it is associated with an HTML link. When the button is selected, the document corresponding to the associated link is preloaded onto the client, and the base HTML document and at least some of the embedded objects are stored on the client's local file storage system. The client's file system is typically much faster than the network.
In some Java environments, the client's local file system is not accessible because of security restrictions if the applet is downloaded from a remote host. These security restrictions can be avoided by using an insecure environment, or by using a code signing technique that allows the user to verify the author of the applet. Once the code is identified as being written by a trusted author, the security restrictions can be safely eased or eliminated.
In another embodiment, a secure means of accessing the client's file system can be used to securely and safely store data on the client's file system. In such a system, the applet may only be allowed to write files to certain directories. The applet may also be limited to reading only files that it had created. One such secure file system for Java has been referred to as “protected domains,” and can be useful in implementing some embodiments of the present invention.
Appendix B is another listing of Java code/psuedocode in an implementation of the computer program or applet that does not use the local file system for storing preloaded documents. Instead, the Java program in Appendix B stores preloaded documents in memory, and implements a web server on the client to serve the documents back to the document viewing program running on the client. Thus, when the user selects a link, the link is redirected to the server running on the client, and that local server responds with the preloaded document if it is available. The document viewing program would, in effect, be retrieving preloaded documents from local memory, thereby making access to preloaded documents quite fast. Such an implementation may also avoid the security restrictions placed on accesses to the local file system in some embodiments.
When the user selects a document for display at 1206, the request is routed to the local server (1210) if the requested document had been stored locally. Otherwise, the a request for the document requested by the user is issued to the server (usually a remote server) on the network (1216). When the document is retrieved (or as it is retrieved), the document is displayed at 1214.
Because a web page control may have to be downloaded with each page, it may be desirable to implement techniques to speed the amount of time that a user has to wait for a document to be retrieved from the network. One such procedure is to embed a small applet into the web page that is downloaded by the user, where the small applet then retrieves a larger program that carries out the remaining steps. Such a procedure will allow the user to begin interacting with the web page after the small applet is downloaded, and will not require that the user wait for a larger program to be downloaded before interacting with the web page. Once the small applet is downloaded, the larger applet is downloaded in the background while the user is viewing or interacting with the web page.
Because the initializing program is small, it takes relatively little time to download, and the document viewing program is able to promptly start the execution of the initializing program. This may allow the display of the document at 1304 to take place more quickly. The effect is a more responsive program that does not cause the user significant delay while an applet implementing the present invention is being downloaded.
Many embodiments of the present invention have been described as storing preloaded documents into local storage at the client computer. However, the present invention need not be limited to contexts in which information is stored at the client computer or in local storage at the client computer. The present invention is useful in any environment where it is possible to store preloaded information in an area where access to the preloaded information is faster than that of the original location for the information. For example,
An example is shown in
When the preloaded document 1440 is stored on the computer 1403, it can be more quickly retrieved from computer 1403 than from computer 1410. Thus, significant enhancements to the responsiveness of the document viewing program can be made in the present invention, even if the preloaded documents or objects are not stored directly in local storage, but instead, are stored elsewhere where they can be retrieved quickly.
Some embodiments of the present invention have been described in the context of accessing the database and identifying search documents through a search term query. The present invention can be applicable in other research-related contexts where search documents are identified using another type of entry path. For example, a time-line can be used for locating information or documents that are associated with a given time or time-frame. Another information access method uses a topic tree that permits a user to choose from successively narrowing topics until the desired topic is located. It is possible for the present invention to be applicable even in other non-research contexts where similar preloading techniques may permit efficient navigation of information and/or short response times. The present invention can also be used in combination with caching systems where previously-displayed documents or views are stored for repeated use.
The present invention has been primarily described in the context of a general purpose computer implementation. As one skilled in the art will recognize, however, it is possible to construct a specialized machine that can carry out the present invention.
The additional references listed below are hereby fully incorporated by reference to the extent that they enable, provide support for, provide a background for, or teach methodology, techniques, and/or procedures employed herein.
Although the present invention has been shown and described with respect to preferred embodiments, various changes and modifications, even if not shown or specifically described herein, are deemed to lie within the spirit and scope of the invention and the following claims. Importantly, it should be understood that any specific features or aspects of the embodiments described or illustrated herein are not intended to limit the scope and interpretation of the claims in a manner not explicitly required by the claims.
This application is a continuation of application Ser. No. 09/974,242, filed Oct. 9, 2001, now U.S. Pat. No. 6,604,103, issued Aug. 5, 2003, which is a continuation of Ser. No. 09/620,651, filed Jul. 20, 2000 now abandoned, which is a continuation of Ser. No. 09/083,382, filed May 22, 1998 now abandoned, which is a continuation-in-part of Ser. No. 08/918,912, filed Aug. 27, 1997, now U.S. Pat. No. 5,946,682, issued Aug. 31, 1999, which is a continuation of Ser. No. 08/474,921, filed Jun. 7, 1995, now U.S. Pat. No. 5,715,445, issued Feb. 3, 1998, which is a continuation of Ser. No. 08/300,343, filed Sep. 2, 1994, now abandoned. Application Ser. No. 09/083,382 filed May 22, 1998. This application also claims the benefit of provisional application Ser. No. 60/047,554, filed May 22, 1997. All of these applications are hereby fully incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4723211 | Barker et al. | Feb 1988 | A |
4730252 | Bradshaw | Mar 1988 | A |
4760606 | Lesnick et al. | Jul 1988 | A |
4815029 | Barker et al. | Mar 1989 | A |
4839853 | Deerwester et al. | Jun 1989 | A |
4855725 | Fernandez | Aug 1989 | A |
4860197 | Langendorf | Aug 1989 | A |
4899292 | Montagna | Feb 1990 | A |
4931935 | Ohira | Jun 1990 | A |
4943908 | Emma | Jul 1990 | A |
4945476 | Bodick et al. | Jul 1990 | A |
4954969 | Tsumura | Sep 1990 | A |
4980823 | Liu | Dec 1990 | A |
4982344 | Jordan | Jan 1991 | A |
4996642 | Hey | Feb 1991 | A |
5014327 | Potter | May 1991 | A |
5021989 | Fujisawa et al. | Jun 1991 | A |
5062074 | Kleinberger | Oct 1991 | A |
5122951 | Kamiya | Jun 1992 | A |
5123088 | Kasahara et al. | Jun 1992 | A |
5157783 | Anderson et al. | Oct 1992 | A |
5206949 | Cochran et al. | Apr 1993 | A |
5220648 | Sato | Jun 1993 | A |
5235680 | Bijnagte | Aug 1993 | A |
5241671 | Reed et al. | Aug 1993 | A |
5243149 | Comerford et al. | Sep 1993 | A |
5253337 | Hirose | Oct 1993 | A |
5255386 | Prager | Oct 1993 | A |
5257367 | Goodlander | Oct 1993 | A |
5261071 | Lyon | Nov 1993 | A |
5265065 | Turtle | Nov 1993 | A |
5289569 | Taniguchi | Feb 1994 | A |
5295243 | Robertson | Mar 1994 | A |
5301109 | Landauer et al. | Apr 1994 | A |
5305389 | Palmer | Apr 1994 | A |
5325298 | Gallant | Jun 1994 | A |
5341293 | Vertelney | Aug 1994 | A |
5345551 | Shelley | Sep 1994 | A |
5347632 | Filepp et al. | Sep 1994 | A |
5390281 | Luciw et al. | Feb 1995 | A |
5392387 | Fitzpatrick et al. | Feb 1995 | A |
5404442 | Foster | Apr 1995 | A |
5408655 | Oren et al. | Apr 1995 | A |
5414811 | Parulski | May 1995 | A |
5418948 | Turtle | May 1995 | A |
5421008 | Banning et al. | May 1995 | A |
5444615 | Bennett | Aug 1995 | A |
5471575 | Giansante | Nov 1995 | A |
5485609 | Vitter | Jan 1996 | A |
5495581 | Tsai | Feb 1996 | A |
5511160 | Robson | Apr 1996 | A |
5524193 | Covington | Jun 1996 | A |
5526520 | Krause | Jun 1996 | A |
5535422 | Chiang | Jul 1996 | A |
5544352 | Egger | Aug 1996 | A |
5572643 | Judson | Nov 1996 | A |
5617526 | Oran et al. | Apr 1997 | A |
5619247 | Russo | Apr 1997 | A |
5623679 | Rivette et al. | Apr 1997 | A |
5632022 | Warren | May 1997 | A |
5644686 | Hekmatpur | Jul 1997 | A |
5675788 | Husick | Oct 1997 | A |
5692107 | Simudis | Nov 1997 | A |
5696965 | Dedrick | Dec 1997 | A |
5706452 | Ivanov | Jan 1998 | A |
5706507 | Schloss | Jan 1998 | A |
5714971 | Shalit | Feb 1998 | A |
5715445 | Wolfe | Feb 1998 | A |
5717914 | Husick | Feb 1998 | A |
5721902 | Schultz | Feb 1998 | A |
5729594 | Klingman | Mar 1998 | A |
5737734 | Schultz | Apr 1998 | A |
5742284 | Duggan | Apr 1998 | A |
5742816 | Barr | Apr 1998 | A |
5754766 | Shaw | May 1998 | A |
5765138 | Aycock | Jun 1998 | A |
5768578 | Kirk | Jun 1998 | A |
5778398 | Nagashima | Jul 1998 | A |
5781189 | Holleran | Jul 1998 | A |
5801702 | Dolan | Sep 1998 | A |
5802292 | Mogul | Sep 1998 | A |
5806077 | Wecker | Sep 1998 | A |
5808611 | Johnson | Sep 1998 | A |
5822537 | Katseff | Oct 1998 | A |
5822539 | van Hoff | Oct 1998 | A |
5822731 | Schultz | Oct 1998 | A |
5826025 | Gramlich | Oct 1998 | A |
5826261 | Spencer | Oct 1998 | A |
5826267 | McMillan | Oct 1998 | A |
5826269 | Hussey | Oct 1998 | A |
5835922 | Shima | Nov 1998 | A |
5860074 | Rowe | Jan 1999 | A |
5864850 | Nordman | Jan 1999 | A |
5870552 | Dozier | Feb 1999 | A |
5870770 | Wolfe | Feb 1999 | A |
5873076 | Barr | Feb 1999 | A |
5877760 | Onda | Mar 1999 | A |
5878421 | Ferrel | Mar 1999 | A |
5890172 | Borman | Mar 1999 | A |
5893914 | Clapp | Apr 1999 | A |
5905492 | Straub | May 1999 | A |
5913040 | Rakavy | Jun 1999 | A |
5915256 | Rogers | Jun 1999 | A |
5933811 | Angles | Aug 1999 | A |
5946682 | Wolfe | Aug 1999 | A |
5948040 | DeLorme | Sep 1999 | A |
5948061 | Merriman et al. | Sep 1999 | A |
5951620 | Ahrens | Sep 1999 | A |
5953005 | Liu | Sep 1999 | A |
5959621 | Nawaz | Sep 1999 | A |
5959623 | van Hoff | Sep 1999 | A |
5960409 | Wexler | Sep 1999 | A |
5963205 | Sotomayor | Oct 1999 | A |
RE36422 | Pazel | Nov 1999 | E |
5995976 | Walker | Nov 1999 | A |
6006252 | Wolfe | Dec 1999 | A |
6011537 | Slotznick | Jan 2000 | A |
6012053 | Pant | Jan 2000 | A |
6023698 | Lavey | Feb 2000 | A |
6023726 | Saksena | Feb 2000 | A |
6034680 | Kessenich | Mar 2000 | A |
6038601 | Lambert et al. | Mar 2000 | A |
6094675 | Sunaga | Jul 2000 | A |
6138128 | Perkowitz | Oct 2000 | A |
6151021 | Berquist | Nov 2000 | A |
6151603 | Wolfe | Nov 2000 | A |
6182068 | Culliss | Jan 2001 | B1 |
6216141 | Straub | Apr 2001 | B1 |
6226655 | Borman | May 2001 | B1 |
6263351 | Wolfe | Jul 2001 | B1 |
6263505 | Walker | Jul 2001 | B1 |
6282548 | Burner | Aug 2001 | B1 |
6292813 | Wolfe | Sep 2001 | B1 |
6301576 | Wolfe | Oct 2001 | B1 |
6321991 | Knowles | Nov 2001 | B1 |
6336131 | Wolfe | Jan 2002 | B1 |
6341305 | Wolfe | Jan 2002 | B1 |
6366947 | Kavner | Apr 2002 | B1 |
6539377 | Culliss | Mar 2003 | B1 |
6604103 | Wolfe | Aug 2003 | B1 |
6816850 | Culliss | Nov 2004 | B1 |
Number | Date | Country | |
---|---|---|---|
60047554 | May 1997 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09974242 | Oct 2001 | US |
Child | 10611077 | US | |
Parent | 09620651 | Jul 2000 | US |
Child | 09974242 | US | |
Parent | 09083382 | May 1998 | US |
Child | 09620651 | US | |
Parent | 08474921 | Jun 1995 | US |
Child | 08918912 | US | |
Parent | 08300343 | Sep 1994 | US |
Child | 08474921 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 08918912 | Aug 1997 | US |
Child | 09083382 | US |