US-12625980-B2 - Mapping a tangible instance of a document
Abstract
A computer-implemented method comprises: detecting, by a first computer system, first content of a tangible instance of a first document; generating, by the first computer system, a first hash using the first content, the first hash including first obfuscation content; sending, by the first computer system, the first hash for receipt by a second computer system; and receiving, by the first computer system, a response to the first hash generated by the second computer system, the response including information corresponding to a second document associated with the first content.
Inventors
- Brett Barros
- Alexander James Faaborg
Assignees
- GOOGLE LLC
Dates
- Publication Date
- 20260512
- Application Date
- 20201019
Claims (20)
- 1 . A computer-implemented method comprising: capturing, by an image sensor of a first computer system, first content of a hardcopy instance or an on-screen presentation instance of a first document; generating, by the first computer system, a first hash using the first content, the first hash incorporating content not originating from the first document; sending, by the first computer system, the first hash for a look up against a collection of documents associated with a collaboration program; and receiving, by the first computer system, a response to the first hash, the response including information corresponding to a second document associated with the first content, the second document being included in the collection of documents.
- 2 . The computer-implemented method of claim 1 , wherein the first hash is sent to a second computer system and the second computer system controls the collaboration program for the collection of documents.
- 3 . The computer-implemented method of claim 2 , further comprising sending, by the first computer system and based on the response, the first content for receipt by the second computer system.
- 4 . The computer-implemented method of claim 3 , wherein the second computer system generates a new document for the collaboration program using the first content.
- 5 . The computer-implemented method of claim 2 , further comprising sending, by the first computer system and based on the response, a marked-up change of the first document for receipt by the second computer system.
- 6 . The computer-implemented method of claim 2 , wherein the second computer system generates a second hash using second contents of the second document, the second hash incorporating content not originating from the second document, and wherein the second hash is included in the response.
- 7 . The computer-implemented method of claim 6 , further comprising verifying, by the first computer system and using the second hash, a correspondence between the first document and the second document.
- 8 . The computer-implemented method of claim 7 , further comprising receiving, by the first computer system, the second document from the second computer system.
- 9 . The computer-implemented method of claim 6 , wherein the second computer system performs detection of unauthorized access of the second contents upon receiving the first hash.
- 10 . The computer-implemented method of claim 2 , further comprising receiving, by the first computer system, a history of access for a user of the first computer system, the history including an entry for accessing the second document based on the second computer system having received the first hash.
- 11 . The computer-implemented method of claim 10 , wherein the entry for accessing the second document is based on detecting that the user is proximate to at least one of the hardcopy instance of the first document or the on-screen presentation instance of the first document.
- 12 . The computer-implemented method of claim 10 , wherein the second computer system generates the entry in response to determining that the user has access permission to the second document.
- 13 . The computer-implemented method of claim 10 , wherein the user does not have access permission to the second document, and wherein the information corresponding to the second document includes a control for the user to request access permission to the second document.
- 14 . The computer-implemented method of claim 10 , wherein the user does not have access permission to the second document, and wherein the second computer system grants the access permission to the user in response to determining that the user is accessing the first document for at least a predetermined time.
- 15 . The computer-implemented method of claim 2 , wherein the first computer system identifies a user of the first computer system to the second computer system, and wherein the collection of documents is defined based on the user having access permission to the collection of documents.
- 16 . The computer-implemented method of claim 2 , further comprising receiving, by the first computer system and from a user, a request for text-to-speech service of the first document, wherein the second document contains structure markup, and providing the text-to-speech service of the first document using the second document.
- 17 . The computer-implemented method of claim 2 , wherein the first computer system detects the first content based on the first document being presented on a display device.
- 18 . The computer-implemented method of claim 17 , wherein the display device is controlled by the first computer system and presents a screen sharing application on a desktop, wherein the first document is being screen shared with the first computer system using the screen sharing application.
- 19 . The computer-implemented method of claim 18 , wherein the first computer system further presents a browser on the desktop, and wherein the browser provides a control for opening the second document on the desktop using the collaboration program.
- 20 . The computer-implemented method of claim 18 , further comprising facilitating, by the first computer system, dragging of a representation of the first document to trigger opening of the second document using the collaboration program.
Description
CROSS-REFERENCE TO RELATED APPLICATION This application is a 35 U.S.C. § 371 National Phase Entry Application from PCT/US2020/070674, filed on Oct. 19, 2020, entitled “MAPPING A TANGIBLE INSTANCE OF A DOCUMENT”, the disclosure of which is incorporated herein by reference in its entirety. TECHNICAL FIELD This document relates to mapping a tangible instance of a document. BACKGROUND Historically, documents were typically made from durable media (e.g., paper). When two or more copies of the same document were generated, the copies were often distributed separately from each other and it was not always possible or practical to keep track of what happened to each individual copy. For example, once a person created a paper document, many things could happen to that piece of paper that the person may never learn of or be able to react to. With the advent of computer technology came the possibility to maintain and edit documents in electronic form, and consequently to monitor the development and use of a document over time in a more organized and reliable fashion. However, this increased ability for temporal and logistical recordkeeping has applied only to the electronic records themselves that are maintained digitally by representations in form of ones and zeros. On the other hand, the physical instantiations of such electronic documents—which are necessary in order for any human to directly perceive or understand the document—are often subject to the same challenges that have historically been associated with documents on paper. SUMMARY In a first aspect, a computer-implemented method comprises: detecting, by a first computer system, first content of a tangible instance of a first document; generating, by the first computer system, a first hash using the first content, the first hash including first obfuscation content; sending, by the first computer system, the first hash for receipt by a second computer system; and receiving, by the first computer system, a response to the first hash generated by the second computer system, the response including information corresponding to a second document associated with the first content. Implementations can include any or all of the following features. The second computer system controls a collaboration program for a collection of documents. The computer-implemented method further comprises sending, by the first computer system and based on the response, the first content for receipt by the second computer system. The second computer system generates a new document for the collaboration program using the first content. The computer-implemented method further comprises sending, by the first computer system and based on the response, a marked-up change of the first document for receipt by the second computer system. The collection of documents includes the second document. The second computer system generates a second hash using second contents of the second document, the second hash including second obfuscation content, and wherein the second hash is included in the response. The computer-implemented method further comprises verifying, by the first computer system and using the second hash, a correspondence between the first and second documents. The computer-implemented method further comprises receiving, by the first computer system, the second document from the second computer system. The second computer system performs detection of unauthorized access of the second contents upon receiving the first hash. The computer-implemented method further comprises receiving, by the first computer system, a history of access for a user of the first computer system, the history including an entry for accessing the second document based on the second computer system having received the first hash. The entry for accessing the second document is based on detecting that the user is proximate to at least one of a hardcopy of the first document or an on-screen presentation of the first document. The second computer system generates the entry in response to determining that the user has access permission to the second document. The user does not have access permission to the second document, and wherein the information corresponding to the second document includes a control for the user to request access permission to the second document. The user does not have access permission to the second document, and wherein the second computer system grants the access permission to the user in response to determining that the user is accessing the first document for at least a predetermined time. The first computer system identifies a user of the first computer system to the second computer system, and wherein the collection of documents is defined based on the user having access permission to the collection of documents. The computer-implemented method further comprises receiving, by the first computer system and from a user, a request for text-to-speech service of the first document, wherein the