Alternating display of web browsers for simulating single-browser navigation

ABSTRACT

A browser application has at least two web browser objects for browsing Private PAIR while hiding multi-page navigation from a user. The browser application is configured to automatically download XML data from Private PAIR, and generate one or more reports therefrom, including a Daily Updates report, a Cross Checker report, and a Docket Listing report. The browser application is preferably configured to selectively provide limited access to Private PAIR by restricting user navigation to programmatic navigation.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a U.S. continuation patent application of, andclaims priority under 35 U.S.C. § 120 to, U.S. nonprovisional patentapplication Ser. No. 17/962,569, filed Oct. 10, 2022, incorporatedherein by reference, which '569 application is a U.S. continuationpatent application of, and claims priority under § 120 to, U.S.nonprovisional patent application Ser. No. 16/860,023, filed Apr. 27,2020, incorporated herein by reference, which '023 application issued asU.S. Pat. No. 11,470,072, which patent is hereby incorporated herein byreference, and which '023 application is a U.S. continuation patentapplication of, and claims priority under § 120 to, U.S. nonprovisionalpatent application Ser. No. 15/904,643, filed Feb. 26, 2018,incorporated herein by reference, which '643 application issued as U.S.Pat. No. 10,637,844, which patent is hereby incorporated herein byreference, and which '643 application is a U.S. continuation patentapplication of, and claims priority under § 120 to, U.S. nonprovisionalpatent application Ser. No. 15/401,774, filed Jan. 9, 2017, incorporatedherein by reference, which '774 application issued as U.S. Pat. No.9,906,515, which patent is hereby incorporated herein by reference, andwhich '774 application is a U.S. continuation patent application of, andclaims priority under § 120 to, U.S. nonprovisional patent applicationSer. No. 14/629,038, filed Feb. 23, 2015, incorporated herein byreference, which '038 application issued as U.S. Pat. No. 9,544,302,which patent is hereby incorporated herein by reference, and which '038application is a U.S. continuation patent application of, and claimspriority under § 120 to, U.S. nonprovisional patent application Ser. No.13/836,764, filed Mar. 15, 2013, incorporated herein by reference, which'764 application issued as U.S. Pat. No. 8,966,242, which patent ishereby incorporated herein by reference, and which '764 application is aU.S. continuation patent application of, and claims priority under § 120to, U.S. nonprovisional patent application Ser. No. 12/891,782, filedSep. 27, 2010, incorporated herein by reference, which '782 applicationis a U.S. nonprovisional patent application of, and claims priorityunder 35 U. S.C. § 119(e) to, U.S. provisional patent application61/246,083, filed Sep. 25, 2009, which provisional patent application ishereby incorporated herein by reference. The present application alsohereby incorporates herein by reference Appendix A, attached hereto.

COPYRIGHT STATEMENT

All of the material in this patent document, including the computerprogram listing, is subject to copyright protection under the copyrightlaws of the United States and other countries. The copyright owner hasno objection to the facsimile reproduction by anyone of the patentdocument or the patent disclosure, as it appears in officialgovernmental records but, otherwise, all other copyright rightswhatsoever are reserved.

Computer Program Listing

Submitted herewith via the USPTO's electronic filing system, andincorporated herein by reference, are computer program files includinginstructions, routines, and/or other contents of several computerprogram. A table setting forth the name and size of each file includedin the computer program listing is included below.

File Name Creation Date Size in Bytes Description readme.txt Sep. 27,2010 - 3:34 PM 2,873 Instructions ascify.txt Sep. 27, 2010 - 3:50 PM37,473 assembly source code access0.txt Sep. 27, 2010 - 1:34 PM7,570,823 PAIR Access Base Folder access1.txt Sep. 27, 2010 - 1:35 PM19,667,506 PAIR Access Subfolder(s) access2.txt Sep. 27, 2010 - 1:35 PM18,626,773 PAIR Access Subfolder(s) access3.txt Sep. 27, 2010 - 1:35 PM22,779,941 PAIR Access Subfolder(s) access4.txt Sep. 27, 2010 - 1:36 PM23,838,300 PAIR Access Subfolder(s) inine0.txt Sep. 27, 2010 - 1:53 PM22,623,687 Insight 2k9 Base Folder inine1.txt Sep. 27, 2010 - 1:54 PM8,006,867 Insight 2k9 Subfolder(s)

A first of these files, “readme.txt”, contains instructions forutilizing a second of the files “ascify.txt” to extract information fromthe remaining files. These remaining files are compressed binary filesthat have been converted to ascii format. These files can be convertedback to binary format utilizing an assembly conversion program sourcecode for which is contained in “ascify.txt”. The readme file includesinstructions for compiling and running this conversion program, as wellas instructions for converting the other text files to compressed,binary files. The compressed, binary files include source code writtenin C Sharp that can be compiled utilizing Microsoft Visual Studio 2008.The target environment for this implementation is 32-bit Windows XP,Vista, or 7.

BACKGROUND OF THE INVENTION

The present invention generally relates to software for facilitatingaccess to U.S. patent data. A need exists for improvement in patent databrowsing and display. This, and other needs, are addressed by one ormore aspects of the present invention.

SUMMARY OF THE INVENTION

The present invention includes many aspects and features. Moreover,while many aspects and features relate to, and are described in, thecontext of Private PAIR browsing, the present invention is not limitedto use only in Private PAIR browsing, as will become apparent from thefollowing summaries and detailed descriptions of aspects, features, andone or more embodiments of the present invention.

Accordingly, one aspect of the present invention relates to a method forproviding access to Private PAIR to a user. The method includes steps ofdisplaying, via a monitor, a graphical user interface element promptinga user to identify, via one or more peripheral devices, a location of asecurity certificate for use in logging in to Private PAIR; displaying,via a monitor, a graphical user interface element prompting a user toinput, via one or more peripheral devices, a password associated withthe security certificate for use in logging in to Private PAIR; storing,in a computer readable medium at a computing device under control of theuser, the location of the security certificate for use in logging in toPrivate PAIR, an identification of the location having been input by auser via one or more peripheral devices; storing, in a computer readablemedium at a computing device under control of the user, the passwordassociated with the security certificate for use in logging in toPrivate PAIR, the password having been input by a user via one or moreperipheral devices; upon launching of an application, effectingnavigation to a login page for Private PAIR; automatically effectinglogin to Private PAIR, said automatically effecting login includinginputting, via the login page, the location of the security certificateand the password associated with the security certificate; anddisplaying, to a user via a monitor, a Private PAIR page.

In a feature of this aspect, the method further includes receiving, froma user via a program user interface, a navigation request; and effectingnavigation to fulfill the navigation request.

In a feature of this aspect, the method further includes the step ofdisplaying, via a monitor, a graphical user interface element promptinga user to acknowledge, via one or more peripheral devices, exportcontrol regulations.

In a feature of this aspect, the method further includes, prior to saidsteps of storing the location and password, a step of confirming thatthe export control regulations were acknowledged.

In a feature of this aspect, the security certificate is a PKIcertificate.

Another aspect of the present invention relates to a computer readablemedium containing computer executable instructions for carrying out amethod in accordance with the first aspect.

A third aspect of the present invention relates to a method. The methodincludes displaying, to a user via a monitor, a first web page via afirst browser; receiving, from the user via a program user interface, anavigation request; effecting navigation, based on the received usernavigation request, utilizing a second browser, the second browser notbeing visible to the user; determining that navigation based on thereceived user navigation request is completed; and displaying, to theuser via the monitor, web content via the second browser, wherein, uponsuch displaying, the first browser is no longer visible to the user.

In a feature of this aspect, the first web page is a first Private PAIRweb page, and wherein the received navigation request is a request tonavigate to a second Private PAIR web page. In accordance with thisfeature, in at least some implementations, the received navigationrequest includes an application number input by the user via the programuser interface, and wherein the second Private PAIR web page includesdata associated with that application number, and further comprising astep of determining that a text string input by the user is anapplication number. Further, in accordance with this feature, in asub-feature, in at least some implementations, the received navigationrequest includes an attorney docket number input by the user via theprogram user interface, and wherein the second Private PAIR web pageincludes data associated with that attorney docket number, and furthercomprising a step of determining that a text string input by the user isan attorney docket number. Still further, in accordance with thissub-feature, in at least some implementations, the step of determiningthat a text string input by the user is an attorney docket numberincludes a step of determining that the text string begins with aparticular character. Still yet further, in accordance with thisfeature, in at least some implementations, the received navigationrequest includes an indication of a Private PAIR tab selected by theuser via the program user interface, and wherein the second Private PAIRweb page displays that tab. And even still further, in accordance withthis feature, in at least some implementations, the method furtherincludes, after a user attempts to navigate Private PAIR via clicking ona link or button on a Private PAIR web page displayed via the firstbrowser, a step of canceling navigation of the first browser to preventthe user from navigating utilizing such link or button.

In a feature of this aspect, the method further includes receiving, fromthe user via the program user interface, a second navigation request;effecting navigation, based on the received second user navigationrequest, utilizing the first browser, the first browser not beingvisible to the user; determining that navigation based on the receiveduser navigation request is completed; and displaying, to the user viathe monitor, web content via the second browser.

Another aspect relates to a computer readable medium containing computerexecutable instructions for carrying out a method in accordance with thethird aspect.

A fifth aspect relates to a method. The method includes, upon launchingof an application, effecting navigation via a first browser to a loginpage for Private PAIR; automatically effecting login to Private PAIR,said automatically effecting login including inputting, via the loginpage, a location of the security certificate and a password associatedwith the security certificate; displaying, to a user via a monitor, aPrivate PAIR page via a first browser; effecting navigation, via asecond browser that is not visible to the user, to a Private PAIRdownload page; and automatically downloading, via the Private PAIR datadownload page, data associated with the security certificate.

In a feature of this aspect, the data associated with the securitycertificate is data associated with customer numbers associated with thesecurity certificate.

In a feature of this aspect, the data associated with the securitycertificate is XML, data.

In a feature of this aspect, the method further includes steps ofgenerating one or more reports based on automatically downloaded dataand displaying one of the one or more reports to a user via a monitor.

Another aspect relates to a computer readable medium containing computerexecutable instructions for carrying out a method in accordance with thefifth aspect.

In addition to the aforementioned aspects and features of the presentinvention, it should be noted that the present invention furtherencompasses the various possible combinations and subcombinations ofsuch aspects and features. Thus, for example, any aspect may be combinedwith an aforementioned feature in accordance with the present inventionwithout requiring any other aspect or feature.

BRIEF DESCRIPTION OF THE DRAWINGS

One or more preferred embodiments of the present invention now will bedescribed in detail with reference to the accompanying drawings, whereinthe same elements are referred to with the same reference numerals, andwherein,

FIG. 1 represents an exemplary process flow illustrating the use ofmultiple web browser controls for Private PAIR navigation; and

FIG. 2 represents an exemplary process flow illustrating the use of athird web browser control for the automatic downloading of Private PAIRdata.

DETAILED DESCRIPTION

As a preliminary matter, it will readily be understood by one havingordinary skill in the relevant art (“Ordinary Artisan”) that the presentinvention has broad utility and application. Furthermore, any embodimentdiscussed and identified as being “preferred” is considered to be partof a best mode contemplated for carrying out the present invention.Other embodiments also may be discussed for additional illustrativepurposes in providing a full and enabling disclosure of the presentinvention. As should be understood, any embodiment may incorporate onlyone or a plurality of the above-disclosed aspects of the invention andmay further incorporate only one or a plurality of the above-disclosedfeatures. Moreover, many embodiments, such as adaptations, variations,modifications, and equivalent arrangements, will be implicitly disclosedby the embodiments described herein and fall within the scope of thepresent invention.

Accordingly, while the present invention is described herein in detailin relation to one or more embodiments, it is to be understood that thisdisclosure is illustrative and exemplary of the present invention, andis made merely for the purposes of providing a full and enablingdisclosure of the present invention. The detailed disclosure herein ofone or more embodiments is not intended, nor is to be construed, tolimit the scope of patent protection afforded the present invention,which scope is to be defined by the claims and the equivalents thereof.It is not intended that the scope of patent protection afforded thepresent invention be defined by reading into any claim a limitationfound herein that does not explicitly appear in the claim itself.

Thus, for example, any sequence(s) and/or temporal order of steps ofvarious processes or methods that are described herein are illustrativeand not restrictive. Accordingly, it should be understood that, althoughsteps of various processes or methods may be shown and described asbeing in a sequence or temporal order, the steps of any such processesor methods are not limited to being carried out in any particularsequence or order, absent an indication otherwise. Indeed, the steps insuch processes or methods generally may be carried out in variousdifferent sequences and orders while still falling within the scope ofthe present invention. Accordingly, it is intended that the scope ofpatent protection afforded the present invention is to be defined by theappended claims rather than the description set forth herein.

Additionally, it is important to note that each term used herein refersto that which the Ordinary Artisan would understand such term to meanbased on the contextual use of such term herein. To the extent that themeaning of a term used herein—as understood by the Ordinary Artisanbased on the contextual use of such term—differs in any way from anyparticular dictionary definition of such term, it is intended that themeaning of the term as understood by the Ordinary Artisan shouldprevail.

Regarding applicability of 35 U.S.C. § 112, ¶6, no claim element isintended to be read in accordance with this statutory provision unlessthe explicit phrase “means for” or “step for” is actually used in suchclaim element, whereupon this statutory provision is intended to applyin the interpretation of such claim element.

Furthermore, it is important to note that, as used herein, “a” and “an”each generally denotes “at least one,” but does not exclude a pluralityunless the contextual use dictates otherwise. Thus, reference to “apicnic basket having an apple” describes “a picnic basket having atleast one apple” as well as “a picnic basket having apples.” Incontrast, reference to “a picnic basket having a single apple” describes“a picnic basket having only one apple.”

When used herein to join a list of items, “or” denotes “at least one ofthe items,” but does not exclude a plurality of items of the list. Thus,reference to “a picnic basket having cheese or crackers” describes “apicnic basket having cheese without crackers”, “a picnic basket havingcrackers without cheese”, and “a picnic basket having both cheese andcrackers.” Finally, when used herein to join a list of items, “and”denotes “all of the items of the list.” Thus, reference to “a picnicbasket having cheese and crackers” describes “a picnic basket havingcheese, wherein the picnic basket further has crackers,” as well asdescribes “a picnic basket having crackers, wherein the picnic basketfurther has cheese.”

Referring now to the drawings, one or more preferred embodiments of thepresent invention are next described. The following description of oneor more preferred embodiments is merely exemplary in nature and is in noway intended to limit the invention, its implementations, or uses.

A browser application for use with Private PAIR in accordance with oneor more preferred aspects of the present invention enables a user to login to Private PAIR via a login form. The login form includes severalcheckboxes representing configuration options described more fullyhereinbelow. The login screen also includes digital certificate andpassword input boxes, as well as an import control checkbox. Clicking inthe digital certificate input box enables the user to browse and selectsuch digital certificate via a standard windows browse window. In orderto login, a user selects a digital certificate, enters the passwordassociated with that digital certificate, acknowledges displayed importcontrol considerations by checking the appropriate checkbox, and hits alogin button to initiate login.

The browser application then effects navigation of a first web browsercontrol to a website address corresponding to Private PAIR, specificallyPrivatePAIR_url, which redirects the first web browser control to anauthentication page. Once the authentication page is fully loaded, theapplication automatically populates certificate and password fields ofthe authentication page, and passes the user's acknowledgement of theimport control considerations into the page by checking the appropriatecheckbox. The application then effects login, either by clicking theappropriate button, or making an appropriate JavaScript call. In apreferred implementation, the above described process is effected bynavigating the web browser control to “javascript: command1; command2;command3;” where command1, command2, and command3 are representative ofa series of JavaScript commands which accomplish such task.Additionally, or alternatively, the above described process is effectedby obtaining a reference to html elements of a collection of htmlelements and then appropriately manipulating same. It will beappreciated that the series of JavaScript commands may accomplish thisas well.

In a preferred implementation, the browser application includes a textbox for entry of an application number, patent number, publicationnumber, or docket number, as well as a drop down menu with menu choicescorresponding to Private PAIR tabs. The browser application allows auser to input a number into the text box, and select one of the dropdown menu choices to effect navigation to a desired tab.

Upon entry by a user of a number, the program determines what type ofnumber was entered by determining whether it corresponds to a set formatfor each type of number. In a preferred implementation, a seven digitnumber is presumed to be a patent number, an eight digit number or anumber with a “I” in its third digit is presumed to be an applicationnumber, etc. In at least some preferred implementations, a matter numbermay be indicated by utilizing a control character either before or afterthe entry. For example, “0.1000”, “m1000”, or “/m1000” might correspondto entry of matter number 1000. Alternatively (or additionally), a radiobutton or other user interface element might allow a user to select whattype of number has been entered.

Following entry of a number and selection of a drop down menu itemcorresponding to a Private PAIR tab, the browser application clears theinput text box, navigates a second web browser control to Private PAIR,automatically inputs the input number, selects the appropriate radiobutton on the Private PAIR page to indicate what type of number it is(if necessary), submits that page, and then, if necessary, navigates tothe appropriate Private PAIR tab via a JavaScript call.

During such navigation, the first web browser control remains visible ontop. Once the second web browser control completes navigation to thedesired Private PAIR tab for the desired application, the second webbrowser control is moved to the top so that it is visible to the user.An exemplary process flow in accordance with this process is illustratedin FIG. 1 .

If the user then wishes to navigate to another tab of the sameapplication, the user can select the menu item corresponding to that tabin the drop down menu, and navigation will be effected in the displayedweb browser control to that tab. If the user wishes to navigate toanother tab of a different application and inputs an application numberinto the input text box and selects a drop down menu item correspondingto a Private PAIR tab, navigation is effected in the first web browsercontrol (which is now not visible to the user because the second webbrowser control is on top) to the selected tab of the selectedapplication according to the process described above, and, uponcompletion of such navigation, the first web browser control is onceagain brought to the front so that it is visible by the user. Such afront and back web browser control methodology allows for multi-pagenavigation without having to present every page to the user. Preferably,each web browser control has a visible property set to true, but issimply not visible to a user because another web browser control is ontop of it.

In one or more preferred implementations, limited access to Private PAIRis provided. In a preferred implementation, a flag is used to determinewhether or not full access to Private PAIR is available at any giventime. In some preferred implementations, this flag is set or not basedon a user's choice, and access can be switched from limited to full viathe entry of a password. This password may be the password associatedwith a user's PKI certificate, or may be a different password.

When only limited access is provided, navigation via webpage buttons andlinks in Private PAIR is programmatically prevented, for example bycanceling navigation when the limited access flag is set unlessnavigation is itself effected programmatically.

In a preferred implementation, this is accomplished via use of two webbrowser controls as described hereinabove. Specifically, navigation of afront web browser control that is visible to a user is prevented, whilea user's navigation request entered via a program user interface willeffect navigation of a back web browser control, which is then broughtto the front when navigation is complete. Once this web browser controlis brought to the front, further navigation in this web browser controlwould be blocked, and to effect further navigation the user would needto once again utilize the program's user interface.

This allows for the provision of limited access to Private PAIR, forexample allowing an individual to access Private PAIR via a PKIcertificate while still ensuring no changes will be made to any dataassociated with this certificate.

In at least some preferred implementations, however, a user is stillable to programmatically navigate to other tabs of a particularapplication in the same web browser via the program's user interface.For example, in a preferred implementation, this is accomplished bytemporarily allowing a limited navigation option in a front window.Similarly, in at least one preferred implementation, restricted accessand navigation via a program interface might be provided utilizing onlya single web browser control, and simply selectively allowing userinterface effected navigation while disallowing all other navigation.

In at least some preferred implementations, upon logging in for thefirst time, the browser application performs one or more checks todetermine whether or not to download Private PAIR data and generatereports therefrom. Preferably, the browser application checks to seewhether or not data has been downloaded, or reports have been generated,already that day. Additionally, the browser application preferablychecks whether a user has selected that Private PAIR data should bedownloaded, and reports updated (as described hereinbelow) every timethe browser application first logs in to Private PAIR.

In a preferred implementation, upon a successful login to Private PAIR,a third web browser control below the first and second web browsercontrols is navigated to Private PAIR, and automatically downloads oneor more XML, files corresponding to each customer number associated witha user's digital certificate. A process flow illustrating this step isprovided in FIG. 2 . Navigating and initiating the download ispreferably accomplished in a manner similar to that described above,e.g. JavaScript, while a custom download manager is preferablyimplemented to prevent the display of any window asking a user where tosave the downloaded XML files. In a preferred implementation, anextended web browser control, such as, for example, the extended webbrowser control available at http://code.google.com/p/csexwb2, isutilized to accomplish this.

After the XML files corresponding to each customer number aredownloaded, the application data contained in these XML files iscombined into a single XML file. This XML file is then utilized togenerate a plurality of reports which present the data in a morereadable way. Exemplary such reports are displayed in screenshotsincluded in Appendix A attached hereto.

In a preferred implementation, XSLT transforms are utilized to generateeach HTML report from the combined XML. Additionally, processing may beperformed on the XML data prior to such transforms. For example, anattribute could be added detailing whether or not a particular elementshould be displayed, or whether it should be highlighted in a particularcolor.

Alternatively, a reporting tool, such as, for example, Crystal Reports,could be utilized to organize and display XML data. As yet anotheralternative, the program could generate an HTML page incorporating theXML data without utilizing XSLT transforms. As still yet anotheralternative, windows forms may be utilized to display data.

In preferred implementations, a Daily Updates report, a Daily CrossChecker report, and a Docket Listing report are generated.

The Daily Updates report displays applications for which a transactionor status update occurred the previous day.

The Daily Cross Checker report displays applications for which adeadline or action might be required on the present day. The browserapplication includes one or more algorithms to filter such applicationsby considering the data associated with each application. For example,if an application's status on Sep. 25, 2009 indicates that an OfficeAction was mailed on Jun. 25, 2009, the report displays that an OfficeAction was mailed three months ago and a response may be due if it hasnot already been filed. Notably, if a response had been filed and thestatus of the case was updated by the USPTO to reflect that a responsehad been received, then this application would not be displayed.

The Docket Listing report displays a listing of each patent applicationfor which data was downloaded.

In at least some preferred implementations, one or more reports may begenerated sorted based on any data contained in the downloaded data. Forexample, a Docket Listing report may be sorted by Docket No. and onlydisplay active cases. Or, a cross checker report may only display caseswhich have been published. In a preferred implementation, multiplereports of the same type are generated sorted by different values.

Preferably, the browser application further includes a logout button.This logout button effects navigation of a web browser control to alogout URL of Private PAIR, grabs the source for the loaded logout page,and then finds the href target of a logout link, and navigates the webbrowser control to that link to effect logout of Private PAIR, and thenexits.

Based on the foregoing description, it will be readily understood bythose persons skilled in the art that the present invention issusceptible of broad utility and application. Many embodiments andadaptations of the present invention other than those specificallydescribed herein, as well as many variations, modifications, andequivalent arrangements, will be apparent from or reasonably suggestedby the present invention and the foregoing descriptions thereof, withoutdeparting from the substance or scope of the present invention.Accordingly, while the present invention has been described herein indetail in relation to one or more preferred embodiments, it is to beunderstood that this disclosure is only illustrative and exemplary ofthe present invention and is made merely for the purpose of providing afull and enabling disclosure of the invention. The foregoing disclosureis not intended to be construed to limit the present invention orotherwise exclude any such other embodiments, adaptations, variations,modifications or equivalent arrangements, the present invention beinglimited only by the claims appended hereto and the equivalents thereof.

What is claimed is:
 1. A method for providing access to Private PAIR toa user, comprising: (a) displaying, via a monitor, a graphical userinterface element prompting a user to identify, via one or moreperipheral devices, a location of a security certificate for use inlogging in to Private PAIR; (b) displaying, via a monitor, a graphicaluser interface element prompting a user to input, via one or moreperipheral devices, a password associated with the security certificatefor use in logging in to Private PAIR; (c) storing, in a computerreadable medium at a computing device under control of the user, thelocation of the security certificate for use in logging in to PrivatePAIR, an identification of the location having been input by a user viaone or more peripheral devices; (d) storing, in a computer readablemedium at a computing device under control of the user, the passwordassociated with the security certificate for use in logging in toPrivate PAIR, the password having been input by a user via one or moreperipheral devices; (e) upon launching of an application, effectingnavigation to a login page for Private PAIR; (f) automatically effectinglogin to Private PAIR, said automatically effecting login includinginputting, via the login page, the location of the security certificateand the password associated with the security certificate; and (g)displaying, to a user via a monitor, a Private PAIR page.
 2. The methodof claim 1, further comprising steps of: (a) receiving, from a user viaa program user interface, a navigation request; and (b) effectingnavigation to fulfill the navigation request.
 3. The method of claim 1,further comprising the step of displaying, via a monitor, a graphicaluser interface element prompting a user to acknowledge, via one or moreperipheral devices, export control regulations.
 4. The method of claim1, further comprising, prior to said steps of storing the location andpassword, a step of confirming that the export control regulations wereacknowledged.
 5. The method of claim 1, wherein the security certificateis a PKI certificate.
 6. A computer readable medium containing computerexecutable instructions for carrying out the method of claim
 1. 7. Amethod, comprising: (a) displaying, to a user via a monitor, a first webpage via a first browser; (b) receiving, from the user via a programuser interface, a navigation request; (c) effecting navigation, based onthe received user navigation request, utilizing a second browser, thesecond browser not being visible to the user; (d) determining thatnavigation based on the received user navigation request is completed;and (e) displaying, to the user via the monitor, web content via thesecond browser, wherein, upon such displaying, the first browser is nolonger visible to the user.
 8. The method of claim 7, wherein the firstweb page is a first Private PAIR web page, and wherein the receivednavigation request is a request to navigate to a second Private PAIR webpage.
 9. The method of claim 8, wherein the received navigation requestincludes an application number input by the user via the program userinterface, and wherein the second Private PAIR web page includes dataassociated with that application number, and further comprising a stepof determining that a text string input by the user is an applicationnumber.
 10. The method of claim 8, wherein the received navigationrequest includes an attorney docket number input by the user via theprogram user interface, and wherein the second Private PAIR web pageincludes data associated with that attorney docket number, and furthercomprising a step of determining that a text string input by the user isan attorney docket number.
 11. The method of claim 10, wherein said stepof determining that a text string input by the user is an attorneydocket number includes a step of determining that the text string beginswith a particular character.
 12. The method of claim 8, wherein thereceived navigation request includes an indication of a Private PAIR tabselected by the user via the program user interface, and wherein thesecond Private PAIR web page displays that tab.
 13. The method of claim8, further comprising, after a user attempts to navigate Private PAIRvia clicking on a link or button on a Private PAIR web page displayedvia the first browser, a step of canceling navigation of the firstbrowser to prevent the user from navigating utilizing such link orbutton.
 14. The method of claim 7, further comprising steps of (a)receiving, from the user via the program user interface, a secondnavigation request; (b) effecting navigation, based on the receivedsecond user navigation request, utilizing the first browser, the firstbrowser not being visible to the user; (c) determining that navigationbased on the received user navigation request is completed; and (d)displaying, to the user via the monitor, web content via the secondbrowser.
 15. A computer readable medium containing computer executableinstructions for carrying out the method of claim
 7. 16. A method,comprising: (a) upon launching of an application, effecting navigationvia a first browser to a login page for Private PAIR; (b) automaticallyeffecting login to Private PAIR, said automatically effecting loginincluding inputting, via the login page, a location of the securitycertificate and a password associated with the security certificate; and(c) displaying, to a user via a monitor, a Private PAIR page via a firstbrowser; (d) effecting navigation, via a second browser that is notvisible to the user, to a Private PAIR download page; and (e)automatically downloading, via the Private PAIR data download page, dataassociated with the security certificate.
 17. The method of claim 16,wherein the data associated with the security certificate is dataassociated with customer numbers associated with the securitycertificate.
 18. The method of claim 16, wherein the data associatedwith the security certificate is XML data.
 19. The method of claim 16,further comprising steps of generating one or more reports based onautomatically downloaded data and displaying one of the one or morereports to a user via a monitor.
 20. A computer readable mediumcontaining computer executable instructions for carrying out the methodof claim 16.