Automatic access of electronic information through machine-readable codes on printed documents

ABSTRACT

The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor&#39;s Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user&#39;s name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation application of application Ser. No.08/967,383, which was filed on Nov. 8, 1997 now U.S. Pat. No. 5,933,829,which was on and claimed the priority of then co-pending provisionalpatent application filed in the United States Patent and TrademarkOffice on Nov. 8, 1996 and assigned Serial No. 60/030,166.

BACKGROUND OF THE INVENTION

Electronic data sources, such as conventional databases, the Internet(i.e., the World Wide Web("WWW")) are a rich and important means ofinformation retrieval and distribution and, increasingly, electroniccommerce. However, there are problems finding the information desired inthis increasingly complex and changing network of data sources. Recentlyintroduced Internet "search engines", such as YAHOO, help by allowing auser to search on-line indices of information sources, and even fullsource text, for relevant key words and phrases related to their topicof interest, but even carefully structured queries by experienced usersoften results in hundreds and even thousands of possible "hits" whichare not sufficiently specific to preclude further manual search which isboth data resource inefficient and time consuming.

Because of these inefficiencies, as well as general lack of familiaritywith search engines and their syntax, users often rely on human readableprint and broadcast media advertising to identify source addresses(e.g., Uniform Resource Locators ("URLs")) for Web sites and otheronline information of interest. Print media is particularly effectivesince: (1) it is the most ubiquitous method of communication andadvertising in the modern world; and (2) a printed document can serve asa persistent reference to be saved and used during a subsequent on-linesession.

However, human readable printed source addresses, and especially URL's,are particularly difficult to manually enter in software programs, suchas web browsers, due to their length and use of complex and unfamiliarsymbols. If the characters in a URL are not entered exactly, retrievalis prevented or, in a limited number of cases, a legal but incorrectsource is accessed. This is especially true when URLs incorporateforeign languages and/or complex query instructions to on-linedatabases, as is increasingly frequent in most Web sites. In addition,the inability to type or otherwise manually enter symbolic addressinformation due to either disability or lack of training complicates useof on-line information resources such as the Internet for millions ofindividuals.

Finally, it is widely anticipated that Internet access will increasinglybe provided through interactive cable television via Web-readytelevision receivers and set-top boxes used in conjunction withconventional television receivers. In this home entertainmentenvironment, it is difficult to use keyboards for address entry due toboth lack of typing skill and the cumbersome placement of thesecomponents. Another method which would eliminate typing and allow usersto directly link printed addresses and query scripts to electronicinformation sources would be highly desirable.

Companies that host Web sites for the purpose of providing informationsuch as advertising, often want to know the identity and other relatedinformation of the users who visit their sites (i.e., download filestherefrom). It would be quite advantageous to provide such companies orvendors with this information as part of a specific file transferrequest, e.g., as part of a CGI parameters string included in a URL.Additionally, it would be desirable to be able to effect a secure mannerof transferring this information, so that a user would have confidencein the system and thus send sensitive information such as a credit cardnumber or the like with the file transfer request. This would enableelectronic commerce to flourish well beyond the point it exists today.

SUMMARY OF THE INVENTION

The present invention is a system and method for providing automatedaccess to electronic information stored in a database in either a localor remote location. The system utilizes a machine-readable code printedon a document, referred to herein as an intelligent document since itstores information used to automatically access the information. Themachine-readable symbol comprises encoded source data, wherein thesource data comprises application launch information as well as filelocation information. The source data is encoded and printed, and thendistributed by the vendor by any logical means to the end user. The enduser then scans the code via appropriate code scanning (e.g. bar codescanning) equipment, decodes the raw decoded data, and the file locationinformation is then used to access the appropriate file. In a preferredembodiment, a Web browser program is launched, and the URL of thevendor's Web site is accessed through the Internet. Local file retrievalmay also be implemented on the client computer itself, as well as overan intranet or LAN environment. Additional user-specific demographicdata such as the user's name and address may also be encoded in themachine-readable code when the document is specifically tailored forindividual targeting, such as mailing labels. This demographicinformation is uploaded to the WWW site for use by the vendor. Inaddition, the present invention encodes security data, such as anencryption key, for use in secure data transmissions such as electroniccommerce over the Internet.

In particular, the present invention is a method and system for acomputer, such as a client computer in a networked computer system, toretrieve a computer file in which a symbol data string comprising a filelocation pointer is encoded into a machine readable symbol such as atwo-dimensional bar code symbol, and the machine readable symbol isrendered within a data carrier (e.g. printed on an intelligentdocument). A computer input device such as a two-dimensional bar codescanner is coupled to the client computer and transposes an input datastring from the machine readable symbol. The computer parses the inputdata string to determine the file location pointer, and the filelocation pointer is then utilized pointer to request the computer filedesignated thereby.

The file location pointer may be utilized to request the computer fileby either passing it to an application program on the client computersuitable for processing the corresponding computer file, and then theapplication program retrieving the computer file from the specified filelocation. Alternatively, the file location pointer may be utilized torequest the computer file by retrieving a copy of the computer file fromthe specified file location, and then invoking an application program onthe client computer suitable for processing the corresponding computerfile.

The client computer assembles a computer file transfer request wordincluding the file location pointer and transmits the request word to atarget server computer over a computer network system, which may be awide area network such as the Internet or a local area network (LAN) orintranet. The file location pointer may alternatively specify thelocation of a computer file stored in a local memory resident in theclient computer rather than on a target server computer. When thecomputer file to be retrieved is on a target server computer on anetwork, then the file location pointer is a network address associatedwith the target server computer and a file identifier correlated to thecomputer file requested by said client computer. In particular, whenutilizing the Internet, the file location pointer may be in the form ofa uniform resource locator (URL). In any type of networked environment,the target server computer receives the computer file transfer requestword and transmits a computer file to the client computer in responsethereto.

In addition to the file location pointer, the present invention takesadvantage of the information density of the two-dimensional symbology byencoding a source identifier data string within the machine readablesymbol. The source identifier data string is used to denote theparticular source of the data carrier such as a particular magazine orad, or can be used to denote an expected user or targeted group of usersof the data carrier. The source identifier string is then transposed bythe client computer, assembled within the computer file transfer requestword, and transmitted to the target server computer. The target servercomputer stores the source identifier data string received from theclient computer in the computer file transfer request word.

Additionally, the machine readable symbol also has encoded therein anencryption key associated with the source identifier data string, whichis also transposed by the computer input device. The encryption key isused by the client computer to encrypt information specific to a user ofthe client computer, and the encrypted user information is assembledwithin the computer file transfer request word and transmitted to thetarget server computer. The information specific to a user may beobtained, prior to encryption, from a user information data file storedon the client computer, or it may be obtained from user demographicsdata correlated to a targeted user of the data carrier that had beenpreviously encoded within and transposed from the machine readablesymbol.

The target server computer may then utilize the source identifier datastring received as part of the file transfer request word to access alookup table to determine a decryption key, and then decrypt theencrypted user information received from the client computer in the filetransfer request word. The lookup table may either be stored locally onthe target server computer, or it may be stored remotely on a secondaryserver computer.

The decrypted user information may comprise sensitive user informationsuch as a credit card number associated with the user of said clientcomputer, thus enabling on online electronic commercial transaction byutilizing the credit card number. The user demographics data may be usedby the target server computer to determine the file to transmit to theclient computer; i.e. certain files may be targeted to specific users ofthe system.

The machine-readable symbol may also have encoded therein an executablecommand to launch a software utility resident on the client computer,and the software utility is then automatically launched after themachine readable symbol is transposed. For example, the software utilitymay be an Internet browser program or a word processing program. Inaddition, specific functions may also be encoded in the machine readablesymbol along with the application launch command, such as a command toexecute a print job of the retrieved computer file.

The symbol data string may optionally be obfuscated prior to beingencoded into the machine readable symbol, in which case the input stringtransposed must likewise be de-obfuscated by the client computer. Theobfuscation may be by computing a checksum of the symbol data string,encrypting the symbol data string by utilizing the checksum as anencryption key, and assembling the checksum with the encrypted symboldata string prior to encoding into the machine readable symbol. Thede-obfuscation would then be accomplished by parsing the input datastring to determine the checksum, decrypting the encrypted symbol datastring with the checksum as a decryption key, computing a checksum ofthe decrypted symbol data string, and comparing the computed checksumwith the checksum from said input data string. A valid data conditionwould be indicated when the comparison step is successful; and aninvalid data condition would be indicated when the comparison step isunsuccessful.

BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 is a diagram of the system of the present invention.

FIG. 2 is a diagram of the document generation function of FIG. 1.

FIG. 3 is a diagram of the client computer functions of FIG. 1.

FIG. 4 is a diagram of the deobfuscating function carried out by theclient computer of FIG. 3, and FIG. 5 is a diagram of the target servercomputer of FIG. 1.

FIG. 6 is a top level flowchart of the method of the present invention.

FIG. 7 is a flowchart of the document generation of the presentinvention.

FIGS. 8 and 9 are a flowchart of the scanning and processing by theclient computer of the present invention; and

FIG. 10 is a flowchart of method used by the target server computer ofthe present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The system 100 of the present invention for generating and reading anintelligent document 100 is illustrated in block diagram form in FIG. 1.The system 10 comprises an intelligent document generation system 14,which encodes, assembles and prints an intelligent document 10 forsubsequent scanning at a client computer 32.

The system operates with respect to FIGS. 1 and 6 as follows. A vendorwho wishes to provide an intelligent document 10 programs certainparameters which will be encoded within a machine-readable code 12 andprinted on the document along with text 16 or graphics 18. The documentmay be an advertisement in the form of a magazine insert or page, abrochure, a label for an envelope, a memorandum, and the like.

Parameters to be included within the machine-readable code depend uponthe application desired by the vendor. For example, if the vendor wantsthe end-user to be able to load the vendor's world wide web (WWW) siteautomatically upon scanning the code 12, then the parameters included inthe data string 20 that is assembled into the machine-readable codeinclude a command 22 to launch an Internet browser application, such asNETSCAPE, and a file location pointer such as a uniform resourcelocation (URL) code, such as www.xyzcorp.com (see FIG. 2). Thisinformation is encoded with encoding function 20 in accordance with theparticular type of machine code being used. For example, one type ofcode which may be used by the present invention is a PDF417 symbol,which is described in detail in U.S. Pat. No. 5,304,786, which isincorporated by reference herein. The PDF417 symbol, known as atwo-dimensional bar code symbol, has enough storage information toencode the browser launch command as well as the URL.

A printer 30 then utilizes the encoded data and desired text 16 andgraphics 18 to print an intelligent document 10 a shown in the Figures.

The intelligent document 10 is disseminated to the end user inaccordance with the methods desired by the vendor. For example, if theintelligent document is a magazine advertisement, then the user willobtain the magazine by conventional means such as purchase at a retailoutlet, the mail, etc. Thus, as shown in FIG. 6, the data string at step202 is used to generate and distribute at step 204 the intelligentdocument as desired.

The user, after reading the text and graphics in the document, canaccess the WWW site of the vendor by utilizing a scanner 34 inconjunction with his computer 32, programmed with appropriate softwarein accordance with the invention. That is, the user will optically scanthe code 12 with an optical scanner 34. An optical scanner 34 sufficientto scan bar code symbols and the like is disclosed in U.S. Pat. No.5,448,050, which is incorporated herein by reference. The devicedisclosed in the '050 patent is housed within a mouse type device, thusalso including circuitry useful in point-and-click applications popularin personal computer platforms today.

After the two-dimensional bar code data is scanned by the scanner 34 (atstep 208), a decoder 36 is used at step 210 to decode the raw data intousable commands and data. The decoder is typically a software programexecuted by the microprocessor of the computer, and provides thereby thebrowser launch command and URL which had been encoded by the vendor intothe code. The WWW browser application 40 is then loaded, and the URL isused to access the WWW site of the vendor accordingly (at step 212). Asa result, the user may automatically access the vendor's WWW sitewithout having to enter the URL, thus eliminating all chances of errordue to manual data input. After the file request is made at step 212,the internet server 48 at the target server computer 46 fetches orgenerates the target file 50, as shown in step 214. As shown in step216, the file is transmitted to the client computer 32 and displayed onthe browser 40 for viewing by the user.

The above scenario is useful when a vendor prints and distributes suchintelligent documents on a mass scale. That is, the code distributed isthe same for each user. In an alternative embodiment, specific user datais included with the data string 20 to provide for personalizedoperation as follows. This scenario is useful when the vendor makesindividual printings keyed to individual users, such as when mailinglabels are printed for inclusion on an envelope surrounding a magazineor the like.

In this case, the vendor may include in the code personal data such asthe user's name, location, phone number, and other appropriatedemographic information 23. When the user scans the document and loadsthe WWW site, the personal data is uploaded to the vendor's hostcomputer 46 and stored in demographics log 52, thus providing the vendorwith useful demographic data as to which users have actually utilizedthe intelligent document scanning service.

The code may also include security information useful in completingsecure transfers across the Internet 44. For example, an encryption key25 appropriate in a public or private key system may be embedded withinthe code. An appropriate software routine 38 in the user's computerutilizes the key after decoding it in order to encrypt certain databeing sent across the Internet 44. For example, the encryption of creditcard information is desired in order to thwart would-be intruders frommisappropriating the information. The system of the present inventioncould be used to allow the user to order an item advertised in thebrochure by taking the credit card number, already resident in theuser's computer memory, and encrypting it with the key decoded from thecode. When the user desires to purchase the item, he scans theassociated code, and the credit card number is encoded and transmittedafter the WWW site is accessed. The host computer can match the user'sname (sent with the transmission) with the appropriate decryption keystored at the host, and decrypt the credit card number accordingly.

The system 10 of the present invention has additional embodiments whichallow quick and easy retrieval of a data file on a local basis as wellas the Internet 44. That is, the same principles may be applied within acompany utilizing an intranet or local area network (LAN) 98. Thus, adepartment of a company may distribute fliers regarding certain events,new products, etc., and encode appropriate document access informationin accordance with the teachings of the invention. The user may obtainfurther information by scanning the code on the document, which thencauses his computer to access his network, file server, etc.

This embodiment is also useful in a small office environment, where auser prints out documents such as letters or memos that may need to berevised at a later date. It is common practice to manually type in thedrive location of the document in the lower corner of the document toallow the user to easily access the document at a later date, withoutsearching through massive amounts of files. Thus, a user may type in thetext "c:\user\files\smith\clients.backslash.letters\xyzcorp\jonesltr\dec12" toindicate its location on his drive 94. When he desires to edit orotherwise access the document, he would, in the prior art, have to typein the entire location after launching the proper application (e.g. wordprocessor). In accordance with the teachings of the present invention, amachine readable code may be encoded with this information (as well as acommand to launch the application) and printed on the document. When theuser later desires to edit the document, he scans the code. The code isdecoded, the application is launched, and the file is fetched from thelocation specified in the code.

The symbol data string 20 may be obfuscated by obfuscation function 28prior to being encoded into the machine readable symbol. In thissituation, the input string transposed by the client computer 32 must bede-obfuscated by de-obfuscating function 60. Referring to FIG. 2, thesymbol data string is obfuscated by first computing a checksum of thesymbol data string 20 by checksum computation function 62. The checksumis then utilized by the encryption logic 66 as an obfuscating encryptionkey 64. The symbol data string 20 is input to the encryption logic 66 asshown in FIG. 2, and provided thereby is an encrypted string 67. Theencrypted string 67 is assembled with the checksum 64 (which has notbeen encrypted and is thus "in the clear"), and is input into anencoding function 29. The encoding function 29 then encodes the inputchecksum 64 and encrypted string 67 into a machine readable symbol,which is printed by the printer 30 onto the document 10. As mentionedabove, optional text 16 and/or graphics 18 may also be printed onto thedocument 10 along with the machine readable code 12, if desired by thevendor.

FIG. 7 illustrates the logic flow implemented by the preferredembodiment of the present invention as thus described. That is, at step202, the data string (which may comprise the file location pointer, alaunch command, user demographics, a source identification, anencryption key, and/or a code type) is operated on to compute a checksumat step 218. At step 220, the checksum is used as a key to encrypt thesymbol data string. At step 222, the checksum and encrypted key areassembled together; at step 224 this assembled word is encoded into amachine readable symbol (such as a PDF417 two dimensional bar codesymbol). The symbol is then printed onto the intelligent document 10with optional text or graphics at step 226.

FIG. 3 illustrates in detail the processing of the client computer 32.The machine readable symbol 12 is scanned by the bar code scanner 34,and the scanned data is processed and decoded by block 36 as well knownin the art. The decoded data is input to the de-obfuscation process 37(described in detail below), or, if obfuscation has not been implementedin the system, to parsing block 39 as shown by the dotted line.

De-obfuscation is the reverse process of obfuscation, and is shown indetail in FIG. 4. The decoded input string from decoder 36 is parsedinto two constituent components; the checksum 64, and the encryptedstring 67. The checksum 64 is utilized as a decryption key along withdecryption logic 97 (which is the parallel process of encryption logic66) to produce a decrypted data string that is comprised of a filelocation pointer 21, launch command 22, user demographics 23, sourceidentification 24, encryption key 25, and code type 26. A checksum ofthis decrypted data string is then computed by checksum compute block99, and compared by compare block 101 to the checksum 64 that wasreceived in the clear. When the comparison is successful, then a validcondition is indicated on the go/nogo line 103. Conversely, when thecomparison is not successful (the computed checksum is not equal to thereceived checksum), then an invalid condition is indicated on thego/nogo line 103.

The logic flow of the de-obfuscating function is illustrated in FIG. 8.At step 208, the bar code symbol is scanned by the user. At step 218,the decoded input data string is parsed to obtain the checksum, which isutilized at step 220 as a key to decrypt the remaining portion of thestring (the encrypted data string). At step 222, the checksum of thedecrypted string is computed, and at step 224, it is compared to thereceived checksum. Decision block 226 directs the flow to step 228 whenan invalid data condition is detected (i.e. the checksum comparison isunsuccessful), and the routine exits at step 230. Decision block 226likewise directs the flow to step 232 when a valid data condition isdetected (i.e. the checksum comparison is successful). When successful,a code type 76 (see FIG. 3) is fetched from memory 70 at step 234, andthen compared via comparator function 78 at step 236 to the code typethat was in the received (decrypted) data string. When no match isfound, an invalid data condition is indicated at step 228, and theroutine exits at step 230. When a code type match is found, then thedecrypted string is unpacked at step 238 for further processing.

With reference to FIG. 3, once the de-obfuscation process 37 isdetermined to be successful and the code match is valid, then the filelocation pointer 21 and source identification data 24 is loaded to afile transfer request word for subsequent loading to the Internetbrowser 40, LAN interface 96, or local memory 94, depending on thelocation of the file to be fetched. The file transfer request word mayalso be loaded with client version data 72, which indicates to theserver which version of the client software is requesting the file.

The source identifier data string 24 that is parsed from the decoded(and de-obfuscated) scanned data string may comprise data correlated tothe user (or expected user) of the intelligent document 10. As describedbelow with reference to FIG. 5, the source identifier (source id) stringwill be used to access a lookup table to determine a decryption keyassociated with the file access, so that the target server may decryptcertain (encrypted) user information received from the client computeras part of the file transfer request word.

Local user data 74, such as the user's credit card number, is stored inmemory 70 and accessed by the client computer for inclusion in the filetransfer request word 90 after being encrypted by encryption block 80.That is, when it is desired to transit sensitive user data such as theuser's credit card number to the target server computer 46 over theInternet 44, then the encryption block 80 will encrypt the user data byusing the encryption key 25 that was obtained from the received datastring. In addition, certain user demographics data 23 may be includedin the data string 20 (see FIG. 2), which may be correlated to a user(or expected user) of the document 10. This user demographics data couldthen also be encrypted with encryption block 80 utilizing encryption key25 to produce encrypted user information 82, for inclusion in the filetransfer request word 90.

Optionally, if a launch command 22 was included in the data string 20,then it could be used to execute or launch the designated application.For example, the launch command 22 could cause a word processing programto open and fetch the target file from local memory 94. Likewise, thelaunch command 22 could execute an Internet browser program 40, so thatthe file transfer request word 90 would cause the browser to request theappropriate file over the Internet 44.

The logical flow of this process is shown in FIG. 9. At step 240, theuser data is taken from memory 70 and encrypted, optionally along withuser demographics data obtained from the scanned and de-obfuscated barcode symbol to produce encrypted user information 82. At step 248, thefile transfer request 90 is assembled from the encrypted userinformation (step 242), the file location pointer (optionally comprisingthe IP address and file identifier) 21 and the source identifier data 24that are obtained from the scanned and de-obfuscated bar code symbol(step 244), and the client version 72 fetched from memory 70 (step 246).The browser and/or other client application is launched at step 250, andat step 252 the file transfer request is transmitted over the Internet(or LAN) to the target server computer.

With reference to FIGS. 5 and 10, the operation of the target servercomputer 46 upon receiving the file transfer request will now bedescribed. At step 254, the target server computer 46 receives the filetransfer request, for example from the Internet 44. In the Internetexample, the target server computer 46 is located at "IP ADDR" (internetprotocol address), via means well known in the art. A web server process112 is executing on the target server computer 46, which at step 256uses the source identifier string from the file transfer request tofetch a decryption key from key table 110. That is, for each particularsource ID, there exists a decryption key mapped thereto that iscomplementary to the encryption key 80 utilized by the client computerto encrypt sensitive user information prior to assembly into the filetransfer request. The decryption key is then used at step 258 to decryptthe encrypted user information with decryption process 114 to obtainuser file 122. Optionally, an external key server 116, which may beinterconnected to the Internet, is used to obtain the decryption key.The decrypted user file is then stored in the secure customer datamemory 52, and the user request is tracked in the user log along withthe date and time 120 of the request.

As shown in step 262, if a pre-existing file (i.e a static web page) wasrequested, then the file is obtained from storage 50, wherein thelocation is a function of the file identifier (ID) taken from the filelocation pointer. In this event, the file is fetched from theappropriate location at step 268 and returned to the client computer viathe Internet at step 270. The file is then displayed on the clientbrowser at step 272.

If, however, a static page was not requested, but a dynamic page must begenerated, then the dynamic page is generated at step 266, for exampleas a function of the user data and file ID. This could occur where thefile to be returned is customized to a user in accordance with is or heridentifying indicia. The generated page is then returned to the clientbrowser via the Internet as described above.

Alternatively, the requested file may be located on an external fileserver, which may be accessed by file generation and storage means 50for return thereto or for direct forwarding to the client computer viathe Internet, as shown by the dotted line in FIG. 5.

What is claimed is:
 1. A method for a client computer to retrieve acomputer file comprising the steps of:a) encoding a symbol data stringcomprising a file location pointer into a machine readable symbol; b)rendering said machine readable symbol within a data carrier; c)transposing an input data string from said machine readable symbol witha computer input device coupled to said client computer; d) parsing saidinput data string to determine said file location pointer; and e)utilizing said file location pointer to request the computer filedesignated thereby, byassembling a computer file transfer request wordcomprising said file location pointer, and transmitting said computerfile transfer request word to a target server computer via a computernetwork system; f) said target server computer receiving said computerfile transfer request word and g) said target server computertransmitting a computer file to said client computer in responsethereto;wherein said machine readable symbol also has encoded therein asource identifier data string, said source identifier data stringcomprising data correlated to an expected user of said data carrier, andwherein said source identifier data string is transposed by saidcomputer input device.
 2. The method of claim 1 wherein said computernetwork system is an Internet, and wherein said computer file transferrequest word is directed towards a target server computer incommunication with the Internet.
 3. The method of claim 2 wherein saidfile location pointer comprises a uniform resource locator (URL) forspecifying a file on the target server computer in communication withthe Internet.
 4. The method of claim 1 wherein said file locationpointer comprises a network address associated with said target servercomputer and a file identifier correlated to the computer file requestedby said client computer.
 5. The method of claim 1 wherein said sourcetransposed source identifier data string is assembled within saidcomputer file transfer request word and transmitted to said targetserver computer.
 6. The method of claim 5 wherein said target servercomputer stores said source identifier data string received from saidclient computer in said computer file transfer request word.
 7. Themethod of claim 5 whereinsaid machine readable symbol also has encodedtherein an encryption key associated with said source identifier datastring, said encryption key is transposed by said computer input device,said transposed encryption key is used by said client computer toencrypt information specific to a user associated with said clientcomputer, and said encrypted user information is assembled within saidcomputer file transfer request word and transmitted to said targetserver computer.
 8. The method of claim 7 wherein said informationspecific to a user is obtained, prior to encryption thereof, from a userinformation data file stored on said client computer.
 9. The method ofclaim 7 whereinsaid machine readable symbol also has encoded thereinuser demographics data, said user demographics data correlated to atargeted user of said data carrier, said user demographics data istransposed by said computer input device, and wherein said informationspecific to a user is obtained, prior to encryption thereof, from saidtransposed user demographics data.
 10. The method of claim 7 whereinsaidtarget server computer utilizes said source identifier data string toaccess a lookup table to determine a decryption key associated with saidencryption key, and said target server decrypts said encrypted userinformation received from said client computer.
 11. The method of claim10 wherein said lookup table is stored locally on said target servercomputer.
 12. The method of claim 10 wherein said lookup table is storedremotely on a secondary server computer.
 13. The method of claim 10wherein said user information comprises a credit card number associatedwith said user of said client computer, and wherein on online electroniccommercial transaction is accomplished by utilizing said credit cardnumber.
 14. A method for a client computer to retrieve a computer filecomprising the steps of:a) encoding a symbol data string comprising afile location pointer into a machine readable symbol; b) rendering saidmachine readable symbol within a data carrier; c) transposing an inputdata string from said machine readable symbol with a computer inputdevice coupled to said client computer; d) parsing said input datastring to determine said file location pointer; and e) utilizing saidfile location pointer to request the computer file designated thereby,byassembling a computer file transfer request word comprising said filelocation pointer, and transmitting said computer file transfer requestword to a target server computer via a computer network system; f) saidtarget server computer receiving said computer file transfer requestword and g) said target server computer transmitting a computer file tosaid client computer in response thereto;wherein said machine readablesymbol also has encoded therein user demographics data, said userdemographics data correlated to a targeted user of said data carrier,and wherein said user demographics data is transposed by said computerinput device.
 15. The method of claim 14 wherein said user demographicsdata is included in said file transfer request word transmitted to saidtarget computer, and wherein said user demographics data is stored insaid target server computer.
 16. The method of claim 15 wherein saidcomputer file transmitted by said target server computer to said clientcomputer is at least partially determined by at least part of said userdemographics data.
 17. A computer system comprising:a) a client computerinterconnected to a computer network comprising a target server computerassociated therewith, and b) a computer input device coupled to saidclient computer, adapted to read a machine readable symbol from a datacarrier and transmit to said client computer an input datastring;wherein said client computer comprisesprocessing means fortransposing said input data string to a plurality of constituent fields,said fields comprising at least a file location pointer; means forutilizing said file location pointer to request the computer filedesignated thereby; comprisingmeans for passing said file locationpointer to an application program on said client computer suitable forprocessing the corresponding computer file; means for the applicationprogram to retrieve the computer file from the specified file location;means for assembling a computer file transfer request word comprisingsaid file location pointer, and means for transmitting said computerfile transfer request word to said target server computer via saidnetwork; wherein said target server computer comprises:means forreceiving said computer file transfer request word; and means fortransmitting a computer file to said client computer in response to saidcomputer file transfer request word; wherein said input data stringfields also comprise a source identifier data string, said sourceidentifier data string comprising data correlated to an expected user ofsaid data carrier.
 18. The computer system of claim 17 wherein saidcomputer network is an Internet, and wherein said computer file transferrequest word is directed towards a target server computer incommunication with the Internet.
 19. The computer system of claim 18wherein said file location pointer comprises a uniform resource locator(URL) for specifying a file on the target server computer incommunication with the Internet.
 20. The system of claim 17 wherein saidassembling means also assembles said source identifier data stringwithin said computer file transfer request word.
 21. The computer systemof claim 20 wherein said target server computer further comprises meansfor storing said source identifier data string received from said clientcomputer in said computer file transfer request word.
 22. The computersystem of claim 20 whereinsaid input data string fields also comprise anencryption key associated with said source identifier data string, andwherein said client computer further comprises means for encrypting withsaid encryption key a user information data file stored on said clientcomputer, said user information data file comprising informationregarding the user associated with said client computer, and whereinsaid encrypted user information data file is assembled within saidcomputer file transfer request word and transmitted to said targetserver computer.
 23. The computer system of claim 22 wherein said clientcomputer comprises memory means for storing a user information datafile, and wherein said information specific to a user is obtained, priorto encryption thereof, from said user information data file.
 24. Thecomputer system of claim 22 wherein said input data string fields alsocomprise user demographics data correlated to a targeted user of saiddata carrier, and wherein said information specific to a user isobtained, prior to encryption thereof, from said user demographics data.25. The computer system of claim 22 wherein said target server computercomprisesmeans for accessing a lookup table, said lookup table forstoring a decryption key associated with said source identifier datastring, to obtain said decryption key associated with said sourceidentifier data string, and means for decrypting, utilizing saiddecryption key, said encrypted user information received from saidclient computer.
 26. The computer system of claim 25 wherein said lookuptable is stored locally on said target server computer.
 27. The computersystem of claim 25 wherein said lookup table is stored remotely on asecondary server computer.
 28. The computer system of claim 25 whereinsaid user information comprises a credit card number associated withsaid user of said client computer, and wherein said client computerfurther comprises means for executing on online electronic commercialtransaction by utilizing said credit card number.
 29. A computer systemcomprising:a) a client computer interconnected to a computer networkcomprising a target server computer associated therewith, and b) acomputer input device coupled to said client computer, adapted to read amachine readable symbol from a data carrier and transmit to said clientcomputer an input data string;wherein said client computercomprisesprocessing means for transposing said input data string to aplurality of constituent fields, said fields comprising at least a filelocation pointer; means for utilizing said file location pointer torequest the computer file designated thereby; comprisingmeans forpassing said file location pointer to an application program on saidclient computer suitable for Processing the corresponding computer file;means for the application program to retrieve the computer file from thespecified file location; means for assembling a computer file transferrequest word comprising said file location pointer, and means fortransmitting said computer file transfer request word to said targetserver computer via said network; wherein said target server computercomprises:means for receiving said computer file transfer request word;and means for transmitting a computer file to said client computer inresponse to said computer file transfer request word; wherein said inputdata string fields also comprise user demographics data correlated to atargeted user of said data carrier.
 30. The computer system of claim 29wherein said user demographics data is included in said file transferrequest word transmitted to said target computer, and wherein saidtarget server computer comprises means for storing said userdemographics data.
 31. The computer system of claim 30 wherein saidtarget server computer comprises means for utilizing said userdemographics data to at least partially determine the computer filetransmitted by said target server computer to said client computer.