Token-based access to digital information

Lars Erik Holmquist, Johan Redström, Peter Ljungstrand

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

111 Citations (Scopus)

Abstract

Several systems have been designed where a physical object is used to access digital information that is stored outside the object, but as yet no common vocabulary exists to describe such systems. We introduce a schema with three types of physical objects that can be linked to digital information: Containers are generic objects used to move information between different devices or platforms; tokens are used to access stored information, the nature of which is physically reflected in the token in some way; and tools are used to manipulate digital information. This paper gives special notice to token-based access system, and design implications for such systems are discussed. As an example of token-based access we have implemented WebStickers, where physical objects can be coupled with WWW pages. We present some examples of how tokens are used to access digital information in this system, and discuss future work in this area.

Original languageEnglish
Title of host publicationHandheld and Ubiquitous Computing - 1st International Symposium, HUC 1999, Proceedings
PublisherSpringer
Pages234-245
Number of pages12
ISBN (Electronic)9783540481577
ISBN (Print)9783540665502
DOIs
Publication statusPublished - 1999
Externally publishedYes
Event1st International Symposium on Handheld and Ubiquitous Computing, HUC 1999 - Karlsruhe, Germany
Duration: 27 Sept 199929 Sept 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1707
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Symposium on Handheld and Ubiquitous Computing, HUC 1999
Country/TerritoryGermany
CityKarlsruhe
Period27/09/9929/09/99

Fingerprint

Dive into the research topics of 'Token-based access to digital information'. Together they form a unique fingerprint.

Cite this