1. Technical Field
The present invention relates to a verification service for dynamic content update. More particularly, the present invention relates to a client-side application utilizing a server-based verification server to verify partially updated content against rules or policies for compliance.
2. Description of the Related Art
A computer system typically performs content verification for a static web page by retrieving a URL (Uniform Resource Locator) or by capturing the page using a browser plug-in. Verification technologies typically determine whether the web content violates predefined rules, which may be related to accessibility, corporate branding, copyright rules, or other standards.
Web 2.0 technologies, user-generated content, and increased use of animation and Flash content “partially updates” a web page without changing the web page's URL. In turn, a client's web page includes a portion of the content in the initial page that is not verified. In addition, authorized users may create and publish content (i.e. content creators) on a web page that has not proceeded through verification steps.
A client-side application receives an initial page from an application server that includes initial content and provides the initial page to a user. Next, the client-side application receives user input corresponding to the initial page and updates a portion of the initial content, which results in updated content and unmodified initial content. Subsequently, the client-side application formats the updated content and adds markup tags that describe the updated content. The client-side application then sends the updated content and the markup tags to a verification server. As a result, the client-side application receives a verification report from the verification server that corresponds to the updated content and the markup tags. The client-side application determines whether the verification report includes a verification error and, if so, the client-side application provides the verification error to the user.
The foregoing is a summary and thus contains, by necessity, simplifications, generalizations, and omissions of detail; consequently, those skilled in the art will appreciate that the summary is illustrative only and is not intended to be in any way limiting. Other aspects, inventive features, and advantages of the present invention, as defined solely by the claims, will become apparent in the non-limiting detailed description set forth below.
The present invention may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings, wherein:
Certain specific details are set forth in the following description and figures to provide a thorough understanding of various embodiments of the invention.
Certain well-known details often associated with computing and software technology are not set forth in the following disclosure, however, to avoid unnecessarily obscuring the various embodiments of the invention. Further, those of ordinary skill in the relevant art will understand that they can practice other embodiments of the invention without one or more of the details described below. Finally, while various methods are described with reference to steps and sequences in the following disclosure, the description as such is for providing a clear implementation of embodiments of the invention, and the steps and sequences of steps should not be taken as required to practice this invention. Instead, the following is intended to provide a detailed description of an example of the invention and should not be taken to be limiting of the invention itself. Rather, any number of variations may fall within the scope of the invention, which is defined by the claims that follow the description.
The following detailed description will generally follow the summary of the invention, as set forth above, further explaining and expanding the definitions of the various aspects and embodiments of the invention as necessary. To this end, this detailed description first sets forth a computing environment in
Northbridge 115 and Southbridge 135 connect to each other using bus 119. In one embodiment, the bus is a Direct Media Interface (DMI) bus that transfers data at high speeds in each direction between Northbridge 115 and Southbridge 135. In another embodiment, a Peripheral Component Interconnect (PCI) bus connects the Northbridge and the Southbridge. Southbridge 135, also known as the I/O Controller Hub (ICH) is a chip that generally implements capabilities that operate at slower speeds than the capabilities provided by the Northbridge. Southbridge 135 typically provides various busses used to connect various components. These busses include, for example, PCI and PCI Express busses, an ISA bus, a System Management Bus (SMBus or SMB), and/or a Low Pin Count (LPC) bus. The LPC bus often connects low-bandwidth devices, such as boot ROM 196 and “legacy” I/O devices (using a “super I/O” chip). The “legacy” I/O devices (198) can include, for example, serial and parallel ports, keyboard, mouse, and/or a floppy disk controller. The LPC bus also connects Southbridge 135 to Trusted Platform Module (TPM) 195. Other components often included in Southbridge 135 include a Direct Memory Access (DMA) controller, a Programmable Interrupt Controller (PIC), and a storage device controller, which connects Southbridge 135 to nonvolatile storage device 185, such as a hard disk drive, using bus 184.
ExpressCard 155 is a slot that connects hot-pluggable devices to the information handling system. ExpressCard 155 supports both PCI Express and USB connectivity as it connects to Southbridge 135 using both the Universal Serial Bus (USB) the PCI Express bus. Southbridge 135 includes USB Controller 140 that provides USB connectivity to devices that connect to the USB. These devices include webcam (camera) 150, infrared (IR) receiver 148, keyboard and trackpad 144, and Bluetooth device 146, which provides for wireless personal area networks (PANs). USB Controller 140 also provides USB connectivity to other miscellaneous USB connected devices 142, such as a mouse, removable nonvolatile storage device 145, modems, network cards, ISDN connectors, fax, printers, USB hubs, and many other types of USB connected devices. While removable nonvolatile storage device 145 is shown as a USB-connected device, removable nonvolatile storage device 145 could be connected using a different interface, such as a Firewire interface, etcetera.
Wireless Local Area Network (LAN) device 175 connects to Southbridge 135 via the PCI or PCI Express bus 172. LAN device 175 typically implements one of the IEEE 802.11 standards of over-the-air modulation techniques that all use the same protocol to wireless communicate between information handling system 100 and another computer system or device. Optical storage device 190 connects to Southbridge 135 using Serial ATA (SATA) bus 188. Serial ATA adapters and devices communicate over a high-speed serial link. The Serial ATA bus also connects Southbridge 135 to other forms of storage devices, such as hard disk drives. Audio circuitry 160, such as a sound card, connects to Southbridge 135 via bus 158. Audio circuitry 160 also provides functionality such as audio line-in and optical digital audio in port 162, optical digital output and headphone jack 164, internal speakers 166, and internal microphone 168. Ethernet controller 170 connects to Southbridge 135 using a bus, such as the PCI or PCI Express bus. Ethernet controller 170 connects information handling system 100 to a computer network, such as a Local Area Network (LAN), the Internet, and other public and private computer networks.
While
The Trusted Platform Module (TPM 195) shown in
User 300 provides input 330 to client-side application 310 to view particular content, such as a web page. Input 330 may be a user action, such as a mouse click, to select a link to a particular web page. In turn, client-side application 310 sends initial page request 322 to application server 320. Application server 320 sends initial page 325 to client-side application 310, which client-side application 310 displays on a display for user 300 to view. For example, user 300 may wish to view a weather forecast and, in this example, the web page displays current weather information along with tabs to view extended forecasts, etcetera.
User 300 views the initial page and wishes to view information that the initial page does not include. Using the example described above, user 300 may wish to view an extended forecast and select a tab labeled “Extended Forecast” by providing another input 330 (e.g., mouse click) that selects the tab. As such, client-side application 310 sends partial page request 335 to application server 320, which does not include a different address location (uniform resource locator (URL)) but includes a request for data that is loaded onto the initial page within client-side application 310. Application server 320 sends partial page 340 to client-side application 310, which client-side application 310 displays for user 300 to view. Verification component 315 identifies partial page 340 as “updated content” and, as a result, formats the updated content as needed and sends updated content 350 to verification server 360. Updated content 350 include the new content and markups of the content, formatting of the content as well as additional information about the content in the page for verification server 360 to verify.
Verification server 360 retrieves verification rules from rules store 370 and checks updated content 350 against the verification rules for compliance. For example, a verification rule may require alternative text to be associated with some content features such as images and interactive form fields. In this example, verification server 360 applies the rule to such content feature and report whether violations to the rule exists in the supplied content.
Verification rules may be interpreted from a industrial specification, such as Web Content Accessibility Guidelines (WCAG) from The World Wide Web Consortium (W3C), or a government regulation or law, for instance, Section 508 of the Rehabilitation Act. In one embodiment, updated content 350 may also include information to specify what verification rules should be used to verify the content. In another embodiment, updated content 350 may include the verification rules in which verification server 360 utilizes to check updated content 350.
Once checked, verification server 360 creates verification report 380 and sends verification report 380 to client-side application 310. Verification component 315 receives verification report and may log the error or display an error message to user 300 if verification server 360 detected one or more verification errors in updated content 350.
In one embodiment, the initial page may include automatically updated information, such as stock quotes or news ticker information. In this embodiment, user 300 may not request updates but, rather, application server 320 provides them automatically. As such, verification component 315 detects the updates and sends them to verification server 360 for verification.
The process of verifying updated content 350 is independent of application logic (application server 320), which allows the verification to be based on a policy that applies to a collection of applications, rather than requiring the verification to be implemented in every application individually. As such, updated content verification may be performed by configuring application server 320 to include verification component 315, without modifying the business logic or application logic of application server 320. Verification does not require user action and, in turn, user 300 is unaware of verifying updated content 350 unless verification server 360 detects an error. In another embodiment, user 300 is unaware of the errors, which are logged.
User 300 provides input 400 to client-side application 310 to access particular content. Input 400 may be a user action, such as a mouse click, to select a link to a particular web page. In turn, client-side application 310 sends initial page request 405 to application server 320. Application server 320 sends initial page 408 to client-side application 310, which client-side application 310 displays on a display for user 300 to view. For example, user 300 may be a reporter and, in this example, user 300 may request a news article template from the news reporter's company web site.
User 300 views the initial web page and wishes to enter content into the initial page, such as entering a news article. User 300 provides input 400, such as text and/or image selections to include in the news article. In turn, client-side application 310 may send partial page requests 410 to application server 320 to assist client-side application 310 in processing input 400.
For example, a news reporter may enter the text “New Technology Trade Show” into an input control title field and include formatted text and/or images into a body text area. When the news reporter presses a “Submit” button, verification component 315 intercepts the request, formats the content as required by the verification server, and adds additional information required by the verification server. For example, if the content is an HTML fragment, additional HTML tags may be required so that the content can be verified as a full HTML page. If the fragment is related or is a part of another part in the page, the location of the content in the page may need to be added to the content so that the verification server can properly incorporate the content into the page that is cached in the verification server in order to verify the content in the context of the entire page. Verification component 310 then sends updated content 440, which includes the content to be submitted by the user, markups of the content, as well as additional formatting or location information, to verification server 360 for verification.
Verification server 360 retrieves verification rules from rules store 370 and checks updated content 440 against the verification rules. In one embodiment, content 440 may include information to specify what verification rules should be used to verify the content. In another embodiment, updated content 440 may also include the verification rules in which verification server 360 utilizes to check updated content 440.
Once checked, verification server 360 creates verification report 450 and sends verification report 450 to client-side application 310. Verification component 315 receives verification report 450 and determines whether updated content 440 is compliant based upon verification report 450. If compliant, client-side application 310 sends verified page 460 to application server 320 to publish. Using the example discussed above, client-side application 310 sends the news article, which may include images, to application server 320 to publish. On the other hand, if verification report 450 includes an error, the submission is rejected, and a message may display to user 300 that indicates the error and steps to take to correct the error.
In one embodiment, the content to be published may be an attachment. In this embodiment, when user 300 uploads the attachment, verification component 315 intercepts the upload request and the attachment file is sent to the verification server to verify.
Web page 500 includes initial content 510, which may be a web page heading or other general information pertaining to web page 500's company. Web page 500 also includes tabs 520-540 that a user may select to view different content, such as education materials, product descriptions, or support materials (see
In one embodiment,
The user's web browser requests and receives an initial page from an application server and displays web page 600 for the user to view. Web page 600 includes initial content, which includes title and label information, text boxes 610-620, 640-650, and buttons 630 and 655.
Using the example discussed above, a reporter enters a title of the news article in box 610 and writes the news article in box 620. The reporter may also insert images into the news article by selecting button 630, entering the images file name and path in box 640, and entering an image description in box 650 (see
Web page 600 is the same as that shown in
User 300 views the initial page and provides user input, such as a user action that selects a tab included in the initial page (step 740). The client-side application requests a partial page from application server 320 and receives the requested partial page from application server 320 at step 750. For example, the initial page may be similar the example shown in
At step 760, the client-side application displays the page that includes unmodified initial content (initial content that was not modified) and updated content for user 300 to view. The client-side application sends formatted updated content, which includes the updated content, markups, and additional formatting and location information to verification server 360 to verify (see
The client-side application receives a verification report from verification server 360 at step 780. The verification report includes verification errors (if any) that were generated while verification server 360 was verifying the updated content. A determination is made as to whether the updated content is compliant based upon the verification report (decision 790). If the updated content is compliant, decision 790 branches to “Yes” branch 798 whereupon processing ends at 799. On the other hand, if the updated content is not compliant, decision 790 branches to “No” branch 792 whereupon processing logs and/.or displays an error for user 300 to view, which informs user 300 that the updated content is not compliant (step 795). Processing ends at 799.
Processing receives user input at step 840, such as a news article. At step 850, processing formats the user input and adds markup tags and other additional information as needed. The markup tags describe the updated content. For example, processing may add markup tags to an image when a verification rule requires alternative text to be associated with the image (e.g., <img . . . />). In one embodiment, processing includes partial page updates due to content generation on client-side and/or requested from application server 320. For example, user 300 may enter an article title “Technology on the Rise,” into the client-side application's input control. In this example, when user 300 presses a submit button, the verification component in client-side application may need to convert the text into HTML. In one embodiment, the verification component adds additional location information to the content so that the content can be verified in the context of the entire page. Next, processing sends the user-inputted content as well as any additional formatting and location information to verification server 360 (step 860). Continuing with the example above, processing sends the resulting HTML to verification server 360.
At step 870, processing receives a verification report from verification server 360, and a determination is made as to whether the user input is compliant based upon the results of the verification report (decision 880). If the user input is not compliant, decision 880 branches to “No” branch 882 whereupon processing loops back to display an error message (step 885) and receive more user input. This looping continues until the user input is compliant, at which point decision 880 branches to “Yes” branch 888 whereupon processing submits the user input to application server at step 890. Processing ends at 895.
In another embodiment, the client-side application provides information to indicate which rules to use. For example, the client-side application 310 may indicate to use Web Content Accessibility Guidelines (WCAG) rules for verification. Yet in another embodiment, client-side application 310 provides the verification rules to the verification server when client-side application 310 sends the verification request. For example, client-side application 310 may provide a customized rule to limit the use of colors in images in order to improve the experience of individual with color vision deficiencies.
The verification server receives the identified verification rules from rule store 370 at step 930, and checks the updated content and markup tags against the verification rules at step 940. For example, if any image or interactive form field does not have associated text, a violation to the rule is reported. In another example, the verification server may verify markup tags corresponding to an image when a verification rule requires alternative text to be associated with the image (e.g., <img . . . />). The verification server records verification errors (if any) at step 950, and forms a verification report at 960 that includes identified verification errors. The verification server sends the verification report to client-side application 310 at step 970, and ends at 980.
One of the preferred implementations of the invention is a combination of client and server applications, namely, a set of instructions (program code) or other functional descriptive material in a code module that may, for example, be resident in the random access memory of the computer. Until required by the computer, the set of instructions may be stored in another computer memory, for example, in a hard disk drive, or in a removable memory such as an optical disk (for eventual use in a CD ROM) or floppy disk (for eventual use in a floppy disk drive). Thus, the present invention may be implemented as a computer program product for use in a computer. In addition, although the various methods described are conveniently implemented in a general purpose computer selectively activated or reconfigured by software, one of ordinary skill in the art would also recognize that such methods may be carried out in hardware, in firmware, or in more specialized apparatus constructed to perform the required method steps. Functional descriptive material is information that imparts functionality to a machine. Functional descriptive material includes, but is not limited to, computer programs, instructions, rules, facts, definitions of computable functions, objects, and data structures.
While particular embodiments of the present invention have been shown and described, it will be obvious to those skilled in the art that, based upon the teachings herein, that changes and modifications may be made without departing from this invention and its broader aspects. Therefore, the appended claims are to encompass within their scope all such changes and modifications as are within the true spirit and scope of this invention. Furthermore, it is to be understood that the invention is solely defined by the appended claims. It will be understood by those with skill in the art that if a specific number of an introduced claim element is intended, such intent will be explicitly recited in the claim, and in the absence of such recitation no such limitation is present. For non-limiting example, as an aid to understanding, the following appended claims contain usage of the introductory phrases “at least one” and “one or more” to introduce claim elements. However, the use of such phrases should not be construed to imply that the introduction of a claim element by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim element to inventions containing only one such element, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an”; the same holds true for the use in the claims of definite articles.