throbber
IPR No.: IPR2016-00500
`
`IPR No.: IPR2016-00500
`Patent No. 7,864,163
`Patent No. 7,864,163
`
`EXHIBIT 1007
`
`EXHIBIT 1007
`
`

`

`540
`
`PART THREE Systems Design Methods
`
`Input Methods and
`Implementation
`
`But the emergence of the Web as a platform for Internee and intranet applications
`may make a Web browser the most important user interface in the future. Microsoft
`Internet Explorer and Netscape
`avigator are the dominant browser interfaces in
`today's marker. This chapter will address input design techniques for both the Win(cid:173)
`dows client/ server interface and the browser interface.
`
`Remote Batch Batch and on-line represent extremes on the processing spectrum.
`A combination solution also exists-
`the remote batch.
`
`In remote batch pro cessing, data is entered using on-line editing tech(cid:173)
`niques: however, the data is collected into a batch instead of being imme(cid:173)
`diately processed. Later, the batch is processed.
`
`Modern remote batch can take several forms. A simple example uses a PC(cid:173)
`based front-end application to capture and store the data. The data can later be
`transmitted across a network for batch processing. A more contemporary example
`of remote batch processing uses disconnected
`laptop or handheld computers (or
`devices) to collect data for later processing. If you 've recently received a package
`from UPS or Federal Express . you 've seen such devices used by the drivers to
`record pickups and deliveries.
`Now that we 've covered the basic data capture, data entry , and data process(cid:173)
`ing techniques, we can more closely examine the input methods shown as rows
`in Figure 14.1.
`
`Different input devices , such as keyboards and mice , are covered in most intro(cid:173)
`ductory information systems courses. In this section, we are more interested in the
`method and its implementation
`than in the technology. In panicular , we are inter(cid:173)
`ested in how the choice of a method affects dara caprure , entry, and processing
`as described in the previous section. You should continue to study Figure 14.1 as
`we introduce these methods.
`
`Keyboard Keyboard data entry remains the most common form of input. Unfor(cid:173)
`tunately, it requires the most data editing because people make mistakes keying
`data from source documents. Fortunately , graphical user
`interfaces such as
`Microsoft Windows and Web browsers now make it possible
`to design on-line
`screens that reduce errors by forcing correct choices on the user. We will explore
`several useful GUI controls for such interfaces in the next section.
`
`Mouse A mouse is a pointing device used in conjunction with graphical user inter(cid:173)
`faces . The mouse has made it easy to navigate on-line forms and click on com(cid:173)
`mands and input options. For example, the legitimate values for an attribute can
`be recorded on a screen as "clickable·· boxes or buttons that eliminate the need
`to key in that data. This results in fewer data-ent1y errors. We will explore mouse(cid:173)
`based controls in our input designs for this chapter.
`
`Touch Screen An emerging technology that will greatly impact input design in the
`near future is the touch screen display. Such displays are common
`in handheld
`and palm-top computers that are finding their way into countless information sys(cid:173)
`tem applications. A Symbol Technologies handheld computer based on the Palm
`Operating System is shown in the margin. Such devices simplify many data col(cid:173)
`lection activities in a warehouse and on a manufacturing shop floor. Touch screen
`buttons can be programmed
`to collect the data. Most such devices support hand(cid:173)
`writing recognition as well. The Symbol Technologies unit depicted also can scan
`and read bar codes (discussed shortly) .
`
`A Hcmdbe/d Computer
`
`Point-of-Sale Point -of-sale (POS) terminals have been with us for some time. They
`have all but replaced old-fashioned cash registers. These terminals capture data at
`
`Exhibit 1007 - Page 1 of 5
`
`

`

`CHAPTER 14
`
`Input Design and Prototyping
`
`541
`
`the point of sale and provide time-saving ways to enter data, perform transaction al
`calculations , and produce some output. Like the handhelds
`just described, most
`can scan and read bar codes to eliminate keying errors. Automatic teller machines
`(ATMs), another form of POS terminal, are operated directly by the consumer.
`
`Sound and Speech Sound represents another form of input. You might have used
`a Touch-Tone telephone-based
`system to register for this course. Such tone-based
`systems require special input/output
`technology that drives the design. Those sys(cid:173)
`tems are beyond the scope of this book.
`tech(cid:173)
`A more sophisticated
`form of this input method uses voice recognition
`nology to make it possible to input data. Currently this technology
`is relatively
`immature and unreliable. It is best utilized to input commands, not data. But the
`time may come when voice recognition technology replaces the keyboard as the
`principle means by which we enter data.
`The remaining input methods are broadly classified as automatic data capture
`(ADC). With advancements
`in today's input technology, we can eliminate much
`(and sometimes all) human
`intervention associated with the input methods dis(cid:173)
`cussed in the previous section. By eliminating human intervention we can decrease
`the time delay and errors associated with human interaction.
`
`Optical Mark Optical mark recognition
`(OMR) technology for input has existed
`for several decades. It is primarily batch processing-oriented. The classic example
`is the optical mark forms used for objective-based questions (e.g., multiple choice)
`on examinations. The technology
`is also useful in surveys and questionnaires or
`any other application where the number of possible data values is relatively lim(cid:173)
`ited and highly structured. Most applications
`that could benefit from this input
`method have probably already exploited
`it.
`Optical charac ter reco gnition
`(OCR) is less prevalent despite its maturity. It
`requires the user or customer to carefully handwrite input data on a business form.
`If the letters and numbers are properly scribed, an OCR reader can process the
`forms without human intervention. Obviously, this depends on the handwriting of
`the user or customer. But it does work. Columbia House Record Club used to use
`an OCR form for customer responses
`to orders. Like most OCR applications,
`the
`number of fields to be input was very small (reducing the possibility of errors).
`Processing methods must be implemented
`for any inputs rejected due to illegi(cid:173)
`bility.
`involves bar coding. Bar
`Today the most prevalent form of optical technology
`code s are on almost eve1y product we buy, but bar-coding technology is not lim(cid:173)
`ited to retail sales. You can create bar codes for almost any business application .
`You can even integrate bar codes into Windou•s-based applications as shown in
`Figure 14.2.
`
`Magnetic Ink Magnetic ink ADC technology
`is one you will likely recognize.
`It
`usually involves using magnetic stripe cards, but it also may include the use of
`magnetic ink character recognition (MICR). Over 1 billion magnetic stripe cards
`are in use today! They have found their way into a number of business applica(cid:173)
`tions , such as credit card
`transactions, building security access control, and
`employee attendance
`tracking. MICR is most widely used in the banking indust1y.
`
`Electromagnetic Transmission Electromagnetic ADC technology is based on the use
`of radio frequency to identify physical objects. This technology involves attaching
`a tag and antenna
`to the physical object that is to be tracked. The tag contains
`memory that is used to identify the object being tracked. The tag can be read by
`a reader whenever
`the object resides within the electromagnetic field generated
`by the reader. This identification
`technology
`is becoming very popular
`in appli(cid:173)
`cations that involve tracking physical objects that are out of sight and on the move.
`
`Exhibit 1007 - Page 2 of 5
`
`

`

`542
`
`PART THREE Systems Design Methods
`
`l!!!I~ £3
`ii Bar Code Component Example
`UPCIEAN j Interleaved 2 of 5 l Codabar I Code 11 I Code 39 ) Code 93 [c'odei'213"'
`Code: Fil Alpha-Numeric
`j 123456789ABCD
`
`Update Symbol
`
`
`
`11111111111111 I Ill
`
`123456789ABCD
`
`Figure 14.2
`Bar Codes in a Windows
`Application
`
`A Smart Card
`
`Print Test
`
`Save
`
`Copy
`
`Code 93 bar code attached to a database field
`
`
`
`
`
`
`1111111111111~ II lllllll~lllll~ ll~l lllllllllll lllllllill llll llll~IIIIIIIIIIIIII IIII II Ill
`4-976 Suga1loaf Hwy
`
`•
`
`Company
`1221 Kauai Dive Shoppe
`1231 Unisco
`
`Addr1
`4·976 Sugarloaf Hwy
`PO Bm<Z-547
`
`For example , electromagnetic ADC is being used for public transportation tracking
`and control. tracking manufactured products. and tracking anima ls, to name a few.
`
`Smart Cards Smart card technology has the ability to store a massive amount of
`information. Smart cards are similar to, but slightly thicker than, credit cards. They
`also differ in that they contain a microprocessor, memory circuits, and a battery.
`Think of it as a credit card ,vi.th a computer on board. They represent a portable
`storage medium from which input data can be obtained. While this technology is
`only beginning to make inroads in the United States, smart cards are used on a daily
`basis by over 60 percent of the French population. Smart card applications are par(cid:173)
`ticularly promising in the area of health records where a person 's blood type , vac(cid:173)
`cinations, and other past medical history can be made readily available . Other uses
`may include such applications as passports , financial information for point -of-sale
`transactions , and pay television, to name a few. Another future application could be
`a combination debit card that automatically maintains and displays your account bal(cid:173)
`ance. A smart card used in a security application is shown in the margin.
`
`Biometric Biometric ADC technology is based on unique huma n characteristics or
`trait,. For example , individuals can be identified by their own unique fingerprint ,
`voice pattern, or pattern of certain veins (retina or wrist). Biometric ADC systems
`consist of sensors that capture an individual's characteristic or trait, digitize the image
`pattern , and then compare the image to stored patterns for identification. Biometric
`
`I
`
`1
`'
`
`!
`
`I "
`
`I
`
`l
`
`l
`
`j
`
`I
`
`;
`
`'
`I
`
`I
`
`I
`
`'•
`
`!
`
`.;
`
`I
`
`I
`
`~
`
`'
`
`0
`
`Exhibit 1007 - Page 3 of 5
`
`

`

`CHAPTER 14 Input Design and Prototyping
`
`543
`
`System User Issues for
`Input Design
`
`ADC is popular because it offers the most accurate and reliable means for identifi(cid:173)
`cation. This technology is particularly popular for systems that require security access.
`
`inputs originate with system users. human factors play a significant
`Because
`to
`role in input design. Inputs should be as simple as possible and designed
`reduce
`the possibility of incorrect data being entered. The needs of system
`users must be considered. With this in mind . several human factors should be
`evaluated.
`The volume of data to be input should be minimized. The more data that
`is input, the greater the potential number of input errors and the longer it takes
`to input that data. Thus, numerous considerations
`should be given to the data
`that is captured for input. These general principles should be followed for input
`design:
`
`- Capture only variable data . Do not enter constant data. For instance.
`when deciding what elements
`to include
`in a SALES ORDER input. we need
`PART NUMBERS for all parts ordered. However. do we need to input PART
`
`DESCRIPTIO'.'JS for those parts? PART DESCRIPTIO); is probably stored
`in a
`table. If we input PART :\T:\1BER. we can look up PART
`database
`in the
`DESCRIPTIO'.'J. Permanent
`(or semipermanent)
`data should be stored
`database. Of course , inputs must be designed
`for maintaining
`those
`database
`tables.
`- Do not capture data that can be calculated or stored in computer programs.
`For example, if you input Qc_.._...._-rrn· ORDERED and PRICE. you don·t need to
`input EXTENDED PRICE, which is equal to QCA;-..TITY ORDERED x PRICE. Another
`example is incorporating FEDERAL T&'< \\'.1THHOLDI:\'G data in tables (arrays)
`instead of keying in that data eve1y time.
`- Use codes for appropriate attributes. Codes were introduced earlier. Codes can
`be translated in computer programs by using tables .
`
`Second, if source documents are used to capture data they should be easy for sys(cid:173)
`tem users to complete and subsequently enter into the system. The following sug(cid:173)
`gestions may help:
`
`-
`
`Include instructions for completing the Jann. Remember that people don 't like
`to have to read instructions printed on the back side of a form.
`- Minimize the amount of handu·riting. Many people suffer from poor
`penmanship. The data-entry clerk or CRT operator may misread the data and
`input incorrect data. Use check boxes wherever possible so the system user
`only needs to check the appropriate nlues.
`- Data to be entered (ke_ved) should be sequenced so it can be read like this
`book. top to bottom and left to right. Figure 14.3(a) demonstrates
`a good
`flow. The system user should not have to move from right-to-left on a
`line or jump around on the form . as shown
`in Figure 1~.3(b) , to enter
`data.
`- When possible. use designs based on known metaphors. The classic example of
`this is the personal finance application Quicken. The program's ease of use is
`greatly enhanced by its on-screen re-creation of the checkbook metaphor.
`The user writes checks by filling in a graphical representation of the check.
`And the check register looks exactly like its paper equivalent. Not all inputs
`lend themselves to metaphors, but some are greatly enhanced by the
`imitation (see Figure 14.4).
`- There are several other guidelines and issues specific to data input for GUI
`screen designs. We'll introduce these guidelines as appropriate when we
`discuss GUI controls for input design later in this chapter, as well as in the
`chapters on output design and user interface design.
`
`Exhibit 1007 - Page 4 of 5
`
`

`

`
`
`lw
`
`Exhibit 1007 - Page 5 of 5
`
`Exhibit 1007 - Page 5 of 5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket