HK1036709A - Information distribution system - Google Patents
Information distribution system Download PDFInfo
- Publication number
- HK1036709A HK1036709A HK01107446.4A HK01107446A HK1036709A HK 1036709 A HK1036709 A HK 1036709A HK 01107446 A HK01107446 A HK 01107446A HK 1036709 A HK1036709 A HK 1036709A
- Authority
- HK
- Hong Kong
- Prior art keywords
- information
- book
- text
- user
- encryption
- Prior art date
Links
Description
The present invention relates to systems for distributing information in electronic format, and more particularly to communications networks for communicating information between a central repository and a user interface.
With existing information distribution and distribution systems, information is typically delivered as a fixed printed image on paper, or as a fixed image on other media such as magnetic tape, disk, cassette, laser video disk, or optical disk. The information is typically stored in a library prior to the delivery process and at various points in the delivery process. Finally, the information is delivered to retail outlets throughout the distribution territory. Upon receiving the information, the retailer either stores the information or displays the material for resale.
Existing distribution and distribution systems have a number of disadvantages. One of the disadvantages is the large amount of time and effort required to prepare, print, produce and distribute the information. Another disadvantage of existing systems is the lack of control over the amount of production of the information (e.g., the number of copies produced and sold). Other disadvantages of existing distribution systems are the time, effort, and cost required to distribute and distribute information updates.
Bulletin board networks have been established in an attempt to improve certain types of information distribution. A network such as the internet has been established or is being established. Well-known networks typically utilize a telephone network or other network as the communication medium and are accessed using commercially available software and virtually all types of computers. However, as shown by the current operation, such networks are not suitable for publishing proprietary information and for use as limited copy information. The free transfer of information using such networks provides little protection to the copyright and proprietary information owners.
In one aspect, the present invention is an information distribution system that overcomes the disadvantages and shortcomings of existing information distribution and distribution systems. An information distribution system according to one format of the present invention includes a central information repository and a central transaction database coupled to a point-of-sale delivery system. The central information repository and the central transaction database need not be co-located and may be implemented on different (but connected) computer systems. Information flows between the point-of-sale delivery systems and the central information repository and central transaction database via, for example, a telephone network, a satellite network, or any other network suitable for transmitting information.
More precisely, the information obtained from the publisher is digitized, i.e. converted into electronic format, in order to create a master copy in the same electronic format. Only information obtained from the publisher in a digitized format is converted to the same electronic format. The master copy is stored in a central repository.
The central transaction database implements a record keeping function. In particular, the transaction database records and stores information relating to each transaction completed at the respective point of sale. Upon receiving the request, the transaction database communicates the sales data to the requesting publisher.
The point-of-sale delivery system may take one of a variety of forms including a point-of-purchase delivery system, a point-of-lease delivery system, a "book bank" subsystem, a promotional delivery system, or any combination of such systems. In point-of-sale delivery systems, the information is downloaded, i.e., copied, to the user's storage medium for subsequent access by the user. The rental point delivery system is similar to the point of purchase system, but downloads the auto-erase time period indication in addition to the information. As explained in detail below, the time period indication is used so that the downloaded information is automatically erased from the user's storage medium as soon as the expiration date of the specified time is reached. The library subsystem is a subnet established between authorized users, such as company employees. Each user within the subnet, with appropriate authorization or permissions, can access the specified information stored within the subnet. Such a configuration allows information sharing. In a promotional delivery system, promotions and other business information may be accessed to view and order products.
The most important element in each point-of-sale delivery system is the user interface, sometimes referred to herein as a "library". The term library, as used herein, refers to the interface between the network and the user. Although the term library may implicitly refer to "book type" material, this term is not so limited. The material can be of various types such as movies, music, video, images, text, audio, and computer software material.
The library is a self-service user interaction information selling device. Each library contains a high capacity local storage with custom folders for the most needed information products for the particular site where the library is located. Other information is transmitted to the library for supplemental, auxiliary, and less demanding uses via commercial communication networks (e.g., telephone networks, cable systems, satellite or cellular systems, or other similar communication networks). A central processing unit contained within the library and connected to the library's local memory controls the downloading and dynamic encryption of information.
In one embodiment, the user may select some or all of the contents of a book or books. The selected information is then combined and downloaded to the user's storage device, such as a magnetic tape cartridge. In one embodiment, the magnetic tape cartridge includes a unique identification number for storing selected information and a determined amount of storage.
Widespread use of the present invention can greatly simplify and reduce costs associated with information distribution and distribution. Specifically, the architecture can reduce the time and resources required for information distribution. In addition, the information can be easily updated by only updating the master copy stored in the central information repository and then either writing the copy stored in each library with the updated master copy or downloading the updated master copy and storing both the old version and the updated version in each library. Each library contains an electronic index of various information titles accessible from the library. In addition, the number of productions of a particular work can be easily controlled by using a central transaction database to track the number of copies of each work produced, sold within the network.
The invention can also easily control the copying of information, can greatly simplify text updating, and the dynamic encryption of the text can provide enough confidence for copyright and proprietary information owners in the network to transmit such information in the network.
The above objects and advantages, and other features and advantages of the present invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings. Wherein the attached drawings are as follows:
FIG. 1 illustrates one embodiment of the present information distribution system architecture;
FIG. 2 is a diagram illustrating the flow of information in the system architecture of FIG. 1;
FIG. 3 shows a block diagram of a point of purchase delivery system;
FIG. 4 shows a more detailed block diagram of the host file server shown in FIG. 3;
FIG. 5 is a perspective view of an embodiment of a library;
FIG. 5A is another embodiment of a library;
FIG. 6 shows a block diagram of a library circuit;
FIG. 7 shows a block diagram of a storage medium for an end user;
FIG. 8 illustrates the flow of information for a point of purchase configuration;
FIG. 9 shows a block diagram of certain components of a rental point delivery system;
FIG. 10 shows a block diagram of certain components in the library subsystem;
FIG. 11 shows a block diagram of certain components in a promotional delivery system;
FIG. 12 illustrates a flow diagram of an encryption process implemented in accordance with the present invention; and
FIG. 13 is another embodiment of a library.
The following section provides a brief overview of the present system and a detailed description of the system architecture. After detailing the architecture, the point-of-sale delivery configuration is detailed. The processing of the various levels of encryption that can be used in the present system is described in detail later.
A. Brief introduction to the drawings
According to one embodiment of the invention, information is distributed from a central repository to a user's personalized storage medium. The information distributed by the present system in the manner described above is received either electronically from an external source via various communications networks, such as a telephone line, cable system, cellular system, or other similar commercial communications system, or in hard copy from various storage media, such as magnetic or electronic disks, tape cassettes, magnetic tape disks, optical disks, laser video disks, or cartridge type cassettes. If the information is received in hard copy form, it is first converted to a standard digital format (e.g., ASCII text, DOS text, or other similar standard popular text format) by scanning or direct recording. The information is then digitized, formatted, compressed, and initially encrypted to form a master electronic copy that is stored in a central repository. The master copy is electronically copied and distributed to the point-of-sale delivery system via a communications network, such as a telephone network or a satellite network. The library forms part of such a delivery system and the electronic copies are kept in the library for download to the user's personalized storage medium. Initially, the user selects the information to be downloaded and creates a tracking entry in the transaction database to record the transfer. The information is dynamically encrypted before and during the download of the copy to the user's storage medium, with variable levels of encryption processing depending on a variety of variables, such as the economic value of the information. A "dynamic" encryption process is employed so that the information can only be displayed in an understandable textual format using an electronic reader associated with the user card used to access the information in the library and download the information to the user's cartridge.
B. System architecture
Fig. 1 shows an embodiment of the information distribution system. The system is shown in a manner that is implemented throughout the world, which is for illustrative purposes only. Referring to FIG. 1, a central information repository 100 is a central "repository," i.e., storage location, of information. The peripheral information repositories 102A-F connected to the central information repository 100 are community-oriented repositories, i.e., storage locations, of information. For example, the peripheral information repository 102E for roman in italy may not have frequent access to the information stored in the central information repository 100, whereas the peripheral information repository 102A for the gulf region in san francisco has frequent access to the information repository 100. In any event, the central information repository 100 is connected to each of the peripheral information repositories 102A-F to share information. Each peripheral information repository 102A-F is connected to one or more points of sale, as described in detail below with reference to the peripheral information repository 102F.
A central transaction database 104, coupled to the central repository 100 and the peripheral repositories 102A-F, provides central record keeping functions for the central repository 100 and the peripheral repositories 102A-F. The central information repository 100 and the central transaction database 104 are preferably commercially available mainframe computers such as IBM's mainframe computer. The particular type of mainframe selected depends on the amount of information stored by the hub, the range of record keeping functions to be performed, the transfer rate to occur, and the processing rate of the information. Importantly, the present invention is not limited to a particular computer used as a central repository of information and/or a central transaction database.
As shown in fig. 1, which is an exploded view of the various connections between the central information repository 100 and the transaction database 104, the peripheral information repository 102F, and the point-of-sale delivery sites, including the point-of-purchase sites 108A-C, the rental sites 110A-D, the merchandising sites 112A-D, and the library subsystem sites 114A-C. Each point of purchase site 108 includes a point of purchase transaction database, represented by a box, and a user interface, represented by a circle. As mentioned above, the user interface is sometimes referred to herein as a "library". Specifically, point of purchase site 108A includes library 116A and transaction database 118A, site 108B includes library 116B and transaction database 118B, and site 108C includes library 116C and transaction database 118C. Since the central information repository 100 and the peripheral information repository 102F, and in particular the peripheral information repository memory component 106A, may also be used as book repositories, such components are represented by circles. Details regarding the library and transaction database are provided later in section C.
As shown in FIG. 1, each point-of-sale delivery system, such as systems 112A, 108A-B, 110A, and 114A-B, can be networked directly to the peripheral information repository 102F, or point-of-sale delivery systems, such as systems 108C, 110B-D, 112B, 112D, and 114B-C, can be networked to the point-of-purchase site 108B, the latter of which is networked to the peripheral information repository 102F. The configuration of the point-of-sale delivery system is explained in section C below. At the level shown in fig. 1, however, it is important to understand that the delivery system can be integrated into various combinations, such as the point of sale of the rental system shown as 110B and 112B, the point of sale of the purchase system shown as 108B and 112C, or a combination of the point of sale, point of purchase, and rental system points shown as 108C, 110D, and 112D.
The communication network links between the central information repository 100, the central transaction database 104, the peripheral information repositories 102A-F, and the point of sale may be implemented using a combination of various commercial networks, such as telephone, satellite or cable networks, or other mediums suitable for transmitting information in a digital format. A variety of well known protocols may be used in connection with the present system. For example, if the Internet is used as the "backbone" network, the well-known TCP/IP protocol may be used.
FIG. 2 illustrates information flow according to an embodiment of the system architecture shown in FIG. 1. For ease of illustration, peripheral memory component 106A is incorporated into central repository 100 and peripheral transaction database 106B is incorporated into central transaction database 104. Of course, it should be understood that communication links are provided between the peripheral information repository 102F and the central information repository 100 and the central transaction database 104.
As shown by the input provided to block 202, the publisher will receive inventory reports from the central information repository 100 and sales data from the central transactional database 104. Based on this information, as well as other information, the publisher can determine whether to place additional information on the network. As indicated at block 204, for ease of reference, this information is sometimes referred to herein as an "information title". If the information is not in electronic format, the information is digitized 206, deployed 208 in electronic format, and then electronically authored 210. The digitized information is then transmitted to a data converter 212 for converting the digitized information to a unified format. For example, if the central information repository 100 and the central transaction database 104 are DOS-based systems, the data converter converts the information to DOS format. If the information header is in a digitized format, the information header is directly transmitted to the data converter 212 for direct conversion to a uniform format in the manner shown by line 214.
Once the data is in a uniform digitized format, initial encryption and compression is performed to reduce the storage space required to store the data, while the data is prepared for transmission over a communication network with a lower risk of unauthorized use. The compression is achieved by using some commercial compression protocol. As described in section D, the initial encryption is performed using some standard available encryption protocol.
Once the information title is in a unified, encrypted, digitized format, the information title is stored in the central information repository 100. And prepares to list all available and accessible electronic indexes by author, title, subject or ISBN code. When a new information title is added, the electronic index is updated to contain the new title. The information title may then be downloaded into library 116A. In addition to storing the information title and corresponding electronic index information in the central information repository 100, the information title may be deployed to the master laser disc, or to the master laser disc without being stored in the central information repository 100, as shown in block 216. The master laser disc 216 may then be installed directly into the library 116.
Before downloading the desired information title, the user may access an electronic index containing all information titles available for download from library 116A. With the electronic index, the user obtains a list of available information by author name, title of a particular work, ISBN code, or subject matter. Once assembled, a list of available information titles contained in the selected index category is displayed on a video screen along with other necessary information to allow the user to purchase or rent any of the information titles contained in the listed index categories. By using the video list, the user selects any of the titles listed thereon, and obtains a printout of the relevant information through the print slot 342. Once properly accessed by the user, the information title is downloaded from library 116A onto the user's storage medium 218.
After the information and corresponding electronic index information is downloaded from the central repository 100, or after the master laser disc 216 is installed into the library 116A, an inventory report is generated by the library 116A and transmitted to the central repository 100. These inventory reports reflect the information currently stored in library 116A. The report is then sent to the publisher 202. At the same time, a download complete report is sent from library 116A to transaction database 118A, which in turn generates a sales status report, and transaction database 118A is sometimes referred to herein as a host file server. The sales report is transmitted to the central transaction database 104. The transaction database 104 sends back the necessary operating instructions to the host file server 118A and sends back a transaction report to the publisher 202 for use in billing and auditing, etc.
For publishers who wish to allow users to make hard copies of portions of information titles for learning use, special authentication codes are included in the data when downloading such information titles to the master file. These coded accompanying information headers arrive at the user's storage medium or cartridge. These codes limit the specific number of information titles that a user can make in hard copy. When such coding is in place, the user can print the allowed amount of text from the cartridge as a hard copy. The tape cartridge holds information relating to such printing and, when this limit is reached, further printing is restricted. By making the selection using the highlighting function of the reader, the user determines the text portion made in hard copy within the defined limits (authorized use).
C. Configuration of point-of-sale delivery system
As described above, the point-of-sale delivery systems are classified by function. The functions comprise one or more of the following functions: (1) a purchase point delivery system, (2) a rental point delivery system, (3) a library subsystem, and (4) a promotion delivery system. The configuration of the various functions is discussed in detail below, respectively.
1. Purchase point delivery system
Figure 3 shows a point of purchase system in block diagram form. The point of purchase system is described herein only as a system from which books can be purchased. However, as described above, this system is not limited to books, and other media that can be represented in electronic formats such as computer software, music, and video may be purchased using the present system.
The point of purchase system shown in fig. 3 includes a library 302 connected to a host file server 304. The server 304 is connected to a customer service terminal 306 (of course, there may be more than one terminal) and a cashier station 308A, the cashier station 308A being interconnected with other cashier stations 308B-D. The server 304 is also connected to an organization network 310, which organization network 310 is in turn connected to organization terminals 312A-E. The service terminal 306, the cashier stations 308A-D and the facility network 310 are connected to the server 304 by a computer communication link, such as a commercial computer networking system such as the compusserver or the Internet. As described above with reference to fig. 1 and 2, the book repository 302 and the server 304 are connected to the central information repository 100 and the central transaction database 104.
The cashier stations 308A-D employ a serial, linear network connection that allows the cashier stations to be added or removed at any time. This configuration can accommodate additional teller stations required during peak seasons or times and remove the teller stations after the peak season to better utilize space. Customer service terminal 306 has local processing capabilities that provide customer services such as pin generation, pin change, handling gifts, book refunds, customer information entry and updates. Customer service terminal 306 may also provide a retail outlet with internal management and administration functions including book inventory card management, book listing management book requests, book reports, financial reports, email, and bulletin board management.
Referring now to FIG. 4, the point of purchase file server 304 is illustrated in detail. Specifically, the server 304 includes a Central Processing Unit (CPU)316, a main power supply 318, an uninterruptible power supply 320 to ensure continuous operation in the event of a power failure, and a high density memory 322, the memory 322 holding all programs and databases needed for the operation of the server 304.
Server 304 has four (4) interfaces, namely network interface 324, maintenance interface 326, customer service station interface 328, and cashier station interface 330. The CPU316 transmits instructions to the library 302, creates a transaction database and report, and processes orders from the cashier stations 308A-D and the customer service terminals 306A-D.
The server 304 communicates with the central transaction database 104 via the network interface 324 to electronically archive transaction reports, communicates with the library 302 to issue download instructions to the library 302, and receives status reports and inventory reports from the library 302. The server 304 is also connected to the library subsystem through the network interface 324 to receive subsystem reports for issuing instructions and commands as needed, as described below. An organization or corporate network system with local retailer terminals, community bulletin board services, and other services may also be connected to the network interface 324. Network interface 324 allows bi-directional connectivity to an inter-bank network such as a Cirrus, Plus, or other similar data transfer network. By connecting to the retailer's terminal, the promotion system can provide direct access to local retailers and local businesses to update their promotions and coupons. The maintenance interface 326 enables remote or field diagnostics and repair of the server 304.
Customer service station interface 328 provides communication between server 304 and customer service terminals 306A-D to process customer service transactions. Customer service terminals 306A-D are illustrated as being connected to a printer 334 through a data exchange 332. The cashier station interface 330 provides communication between the cashier stations 308A-D and the server 304.
FIG. 5 illustrates one embodiment of a library 302. Library 302 includes a high resolution color graphic adapter 336, which is a touch screen device for displaying, for example, instructions, messages, status reports and index information to the user, and for receiving user touch screen input selections. Library 302 also has a keyboard 338 for user entry of personal identification and other inputs. A magnetic code or other widely accepted card reader 341 is provided, represented in slot form, for the customer to conduct transactions using a bank card, credit card or other form of debit card. A bar code reader 340 is provided, represented in slot form, to allow a user to insert an ISBN-encoded card containing the desired information title for reading with the library. The ISBN code may also be entered manually by typing the associated number keys on the keypad 338. A print slot 342 is also provided to allow the user to access the output of the library 302, as described below, and a printer (not shown in fig. 5) is used to retrieve receipts, transaction reports, and ISBN access coupons. Library 302 also includes a base assembly 344 having a cutting portion 346 for comfortably standing in front of keyboard 338 with a user. Importantly, library 302 also includes a cartridge slot 348 for user entry of a disk reading cartridge to obtain a copy of selected downloaded information, as described in detail below.
In another embodiment, shown in FIG. 5A, the physical implementation of library 302 may be modified. More specifically, in one embodiment, the library 302 is located on a table 339 using a personal computer 349, such as a personal computer table available from IBM corporation. In addition to the user being able to sit, for example, on a chair (not shown), the user operates the library 302 in the manner shown with reference to FIG. 5. For example, this configuration may be used in a company, apartment, library, or other similar environment where a user may have access to information for a long period of time, or in a professional-type environment. In other embodiments, the readers 340, 341 and the cartridge slot 348 may be located within the computer 349 or within a separate device that is electronically connected to the computer 349.
Fig. 6 is a block diagram of circuitry of the library 302. Specifically, library 302 includes a Central Processing Unit (CPU)350 coupled to display 336, keyboard 338, magnetic strip reader 341, and bar code reader 340. Although the CPU350 is shown as a single component, it is envisioned that the CPU350 may be a parallel processor or a distributed architecture. Of course, what type of CPU350 is selected depends on the amount of information to be processed, the processing speed and cost required. The CPU350 may be connected to an Automated Teller Machine (ATM) module 352 to allow transactions to be conducted using an ATM card. The CPU350 may also be connected to a media drive 354 which enables the user to insert personalized media to respond or perform other functions as described below. Library 302 also includes a local primary storage device 356 for storing all primary information selected for loading into library 302, as well as associated index information. A secondary storage device 358 is provided to hold other programs, instructions, and information related to the transaction. The download is accelerated using the buffer memory 360 to accommodate a large number of users during peak seasons. A printer 362 is provided to print coupons, receipts, and various reports desired by the user. A power supply 364 provides power to the printer 362, CPU350, secondary storage 358, and local memory 356. An uninterruptible power supply 366 is connected to the main power supply 364 to ensure continued operation in the event of a power failure.
The CPU350 is connected to a network interface 368, as described below, to provide communication to the central information repository 100, the host file server 304, or the library subsystem. CPU350 is also connected to a wireless communication port 370, which in turn is connected to an antenna 372. The wireless communication port 370 ensures compatibility with selective communication media when such media is required.
FIG. 7 shows, in block diagram form, the structure of a user's personalized media storage cartridge 374. As described below, the user inserts the cartridge 374 into the cartridge slot 348 to download selected information from the library 302. The downloaded information, as well as the associated basic index information copied from the electronic index contained in library 302 at the time of the initial download, is stored on cartridge 374 in an encrypted format. The cartridge 374 is compatible with a reader to enable a user to view the information stored on the cartridge. As described in detail below, cartridge 374 includes reading software 376 that performs the sequential encryption and decryption of information. A registration communication segment 378 is also provided. The book file registration 380 is created when information is downloaded onto the magnetic tape cartridge 374. The encrypted book file 382, and the associated electronic index, are stored on the cartridge 374 along with a non-erasable, permanent identification serial number 384. Cartridge 374 also contains a commercial operating system environment 386 and free disk space 388.
FIG. 8 illustrates the user process and component processing that occurs when a user utilizes the point of purchase system described above. Specifically, when a user enters site 390, if the user is a first visit 392, the user will complete a user application form 394. The user then takes the completed application and a photograph to customer service station 306A, where the user selects and enters a Personal Identification Number (PIN) and a password 396. The customer service clerk will open an account 398 for the customer. The user-selected password is automatically matched to customer accounts that are sequentially created within the central database. By using a keyboard accompanying the cashier station, the clerk keys in the user's name, address, and social security number. The written application is then inserted into a print slot accompanying the cashier station. When customer information is loaded, the central database reviews the information to determine if the customer has a problem or has an entrance or exit. When the authentication process is completed, the specified customer account number is printed on the user's application. The clerk then inserts a customer identification card (e.g., a plastic card having a standard credit card size and containing a magnetic strip on its back that can hold magnetic code information) into the card slot. The user name and account number are then molded onto the card and the magnetic stripe is encoded with the appropriate user code (account number, card number and designated password information). The written application is then transmitted to a central data storage center for retention. The user can now use the issued card to purchase or lease the usage information title. The machines used for embossing and encoding cards are of the standard commercial type currently in use in connection with the issuance of bank, credit or debit cards.
In addition to obtaining a personal identification card, the new entrant may also purchase a reader/computer or other acceptable reading device (e.g., a special computerized interface, audio or video playback device). Each of the devices is issued a unique serial number and a unique coded number. In one embodiment, a read-only memory chip packaged within the device contains the serial number. All cartridges accompanying such reading devices are encoded in such a way that only the relevant device can read the information recorded on its cartridge. This is achieved by means of a simple program contained in the permanent memory of the device. In one embodiment, if the special coding on the device is different from the number that the cartridge is looking for, the cartridge will display a message on the reading device that the device is unable to read the cartridge, and the particular reading device in question is not allowed to further access any information contained on the cartridge. If the numbers match, further access is allowed. When purchasing a reading device, a clerk would enter the serial number of the device into the central database through a cashier station. The central database contains a list of serial numbers of all permitted reading devices, and the corresponding specially encoded numbers. The clerk places the personal identification card of the reading device purchased by the customer into the appropriate slot on the cashier station and encodes the magnetic strip on the identification card with the appropriate serial number of the reading device being purchased. Thereafter, whenever a user needs to obtain additional cartridges to read with his or her reading device, the user need only submit his personal identification card and the cartridge to be correctly encoded to a clerk, and by inserting the cartridge into the cartridge slot, inserting the identification card into the card slot, and then pressing a designated button on the cashier station, the new cartridge can be correctly encoded to be readable by the user's reading device.
The reading device code needs to match the cartridge code before access is allowed, which means that the issued cartridge will not become easily readable by many reading devices. Numerous device reads will require special programming processes and grant special permissions, i.e. licensing purposes. In one embodiment, a publisher may extend or restrict access to users with appropriately authorized or defined intent by encoding the information in a intent code (purpose code). For example, the publisher may encode a certain portion of the intent of the selected book as readable by all users, i.e., a universal encoding. This type of intent coding may be used, for example, on promotional books or certain government publications. Other information intentions may be coded to restrict access so that only a single user views the information, i.e., the profile. This need reduces the likelihood of unauthorized use of the information header.
In operation, a customer carries his customer identification card to the book display area for purchase 400. If the customer has previously opened an account, the customer need not perform the above process and directly reaches the shopping area 400 where the customer will select a book inventory card that matches his book selection. The book inventory card has printed thereon the ISBN number of the book, a bar code, and information relating to the title of the particular information, the author, the publisher, and the date of the version. The customer brings the selected book inventory card to the cashier station 308A. The cashier magnetically reads the code on the customer ID and scans or manually enters the bar code 402 of the book inventory card. The customer then pays the appropriate fee and transmits the customer code and information title code to the host file server 304. The server 304 searches the existing customer account file to match the identification (i.e., PIN and password) and generates a downloaded book list file based on a bar code on the book inventory card or entered manually. The server 304 downloads the file to the library 302, which electronically generates a folder of information titles that can be downloaded as needed. As shown in step 404, the user may arrive at library 302 at any later time, insert an identification card into slot 340 of library 302, and insert an encoded point of purchase cartridge 374 into library cartridge slot 348 to identify himself with a personal identification number. While the user enters password 406 using keypad 338. When library CPU350 matches the pin with the downloaded list folder, library CPU350 proceeds to download the information requested from local memory 356 via buffer memory 360 to media drive 354, which copies the information to cartridge 374. As part of the download process, the data is dynamically encrypted so that only authorized reading devices can read the data. Dynamic encryption is illustrated in section D. After downloading, the user removes the cartridge 374 and then inserts the cartridge 374 into his personal reader/computer to access the desired information. The reader/computer is configured to read the application program for an extended period of time. The reading application software is stored on a magnetic tape cartridge and is capable of reading the applicable software on a magnetic tape cartridge permanently stored in the memory of the reader/computer or other authorized reading device.
The user may select certain portions of the selected information to combine and download. In one embodiment, the user may select at least one book and select at least a portion of each selected book. If more than one section is selected, including up to the entire selected book, the sections may be combined and downloaded to the user's cartridge 374. For example, for a particular university course, a student may need to download a particular chapter from ten different books. After the ten books and ten specific chapters of the selected book are selected, the selected information is combined, encrypted using the determined level of protection, and downloaded to the student's cassette 374. Likewise, the user may select tracks from the music information to combine and download the selected tracks to a single cartridge 374 for later playback.
2. Rental point delivery system
If a user is not interested in obtaining a permanent copy of a particular work but requires a copy for a certain period of time, such as a copy for a certain schdule, the user may prefer to visit a rental point site rather than a point of purchase. Fig. 9 shows a rental spot system. The rental system is identical to the point of purchase system described above herein (e.g., includes a host file server), except for the differences noted below. In many instances, a single site or library may serve as both a point of purchase system site and a point of rental system site, as well as a point of delivery system for marketing or a commercial information site, or any combination thereof. As shown in fig. 9, the rental spot system includes library user terminal hubs 410A-B connected to terminals 412A-E, and a customer service site 414. User terminals 412A-E allow a user to perform title and index searches of the library storage and to transfer other information between library 302 and itself. Customer service site 414 combines customer service functions with a cashier station. For example, at customer service site 414, credit customers' debit cards may be credited and, if desired, ATM operations may be denied through ATM module 416. Information may be printed from customer service station 414 via printer 418.
The rental-point storage medium 420 is used in a rental system. The rental point medium 420 is the same as the purchase point medium 374 except that the medium 420 includes an automatic deletion mechanism that deletes downloaded information after expiration of a preset time interval. More specifically, when information is downloaded from library 302 to media 420, library 302 also downloads a "time stamp" that is equal to the period that the user has paid to rent out a copy of the information. The time stamp is in the form of a value loaded into a memory location on the medium 420, the value corresponding to the rental period. In use, the actual time of use is subtracted from the period of the electronic representation. Once the user has consumed all of the authorized usage time, the information title will self-destruct, i.e., be deleted from the medium 420. This can be achieved by simply calling a stored program which deletes the information relating to the storage location where the time value is stored. For example, when the value of the storage location storing the authorized use time is equal to 0, the stored program will be called to delete the information corresponding to the authorized use time of "0".
Another automatic deletion method is for each rental or library cartridge to contain a real time clock and an independent rechargeable power supply. The real time clock mechanism is activated when the tape cartridge is initially encoded for use. When downloading rental information titles, an expiration date is registered in the index information of each title. Access to the associated information title is denied when the real time clock on the cartridge reaches any time after the specified expiration date. If the use of the title is not extended, the use of the cartridge permanently deletes the information title from the cartridge's memory several days after the expiration date is reached. With this method, if the real time clock is not operational, the cartridge will become unreadable without repair. To repair a failed cartridge, the user simply carries the cartridge with his pin to the nearest service center, either repairs the real time clock at the service center, or loads the relevant information header into a replacement cartridge. And returns the time lost during the unreadable cartridge to the user. For example, a service center may be located near each point-of-delivery site.
The automatic deletion program may be created in the form of an operating system module, or in the form of a stand-alone executable program designed to be "terminal resident" (TSR). It is preferable to use a module integrated with the operating system, since this structure ensures that the automatic deletion of the module can be executed as long as the operating system is executable.
If the user still requires more time for any particular information title, the user returns to the rental point and then "rerents" the information. Alternatively, it is conceivable that the user could update the rental by means of a modem connected to the reader.
As for the user process for renting information, when a rental point customer enters the rental point site, the user will use a valid ATM card, bank card, credit card, or other debit card and go directly to the user terminals 412A-E. By using such a terminal, the user can perform a search for information titles and download ordered items to the library 302. When the download of the item is complete, the user will arrive at library 302 and insert the rental media, identification card, credit card, bank card or debit card into library 302 for transaction approval. If the transaction cannot be cleared or the ATM system is not operating properly, the customer may arrive at the customer service center and ask the attendant to manually reject the ATM process, if applicable. If the user does not have a valid ATM credit or debit card, the user will arrive at the customer service center and pay the attendant to credit the library debit card. The customer may then arrive at the user terminal and download the order item.
After clearing the transaction approval, the customer inserts rental media 420 into library media drive 354, scans his personal identification card and enters a password. Information is dynamically encrypted and downloaded from the library 302 to the medium 420 with an electronic time stamp of the number of authorized uses or expiration dates for each information title. After downloading, the user will apply the medium on a personal reader/computer to access the information on the medium.
Typical examples for rental point sites are libraries (business, educational or public visits) and book rental stores. The information downloaded by the user may be free, such as a library, or some rental fee may be charged at a predetermined price, such as a rental store or library that charges on a per page basis. All designated rental site sites may be operated in the manner of a conventional library, in which library members are allowed to use for free for a certain limited period of time, or in the manner of rental stores, in which users are charged according to the allowed usage period.
3. Library subsystem
As described in detail below, the library subsystem connects the library to the host file server. The central component of the subsystem is a library, which is a modified version of the point of purchase library 302. The subsystem is specially configured for collective use by members, or business entities, or employees of a company. It delivers and recalls information titles among authorized users within a business or corporate entity and provides the ability to limit the number of copies of a given work that can be distributed to other unauthorized users. If personnel within an organization verify all of the permissible copies of all of the information titles, other users will not be able to access the same information title within a particular subsystem until one or more permissible copies of the particular information are uploaded or recalled to the subsystem, or additional copies are purchased. In one embodiment, the information is intent coded to limit the intent of the user to access the information. For example, a company's central library may allow a particular user, such as a developer, to select information, such as pending patent applications. All non-developers who do not have the proper intent or authority to encode are prevented from accessing this information.
The business entity may rent limited use of an unlimited number of copies or use a specific portion of a given information title rather than purchase unlimited use of a limited number of copies. In this case, the particular information title portion accessed is charged each time the business entity accesses the subsystem from a participating workstation, and the period of access that occurs is charged. With restrictions encoded on the interface between the participating workstation and the subsystem, the ability of the workstation to perform certain operations may be restricted when accessing information from the subsystem. The restricting operation is an operation involving data copying and data transfer involving access to information titles from the subsystems.
More specifically, referring to FIG. 10, the library subsystem 422 is a high resolution color graphics adapter 424 coupled to the CPU426 for displaying the instructions and status of the subsystem 422. Subsystem 422 also includes a keyboard 428 with limited access to the system for entering selections to perform certain specified functions, such as product display. The subsystem 422 also has a media drive 430 for downloading information and a local storage 432 that holds folders for use of information ordered by the business entity. Secondary memory 434 is provided to hold all software programs that control and perform the functions of subsystem 422. Subsystem 422 also includes a power supply 436 and an uninterruptible power supply 438 to ensure continued operation in the event of a power failure. A printer 440 is provided to print various reports.
Library subsystem 422 has a network interface 442 that connects subsystem 422 to library 302 and host file server 304. The network interface 442 is also coupled to a corporate or business entity network system 444. With this arrangement, a corporate entity can transmit or download its own corporate-specific information through the library subsystem 422.
Media port expansion interface 446 provides access to the desired corporate terminals of the corporate web site using an appropriate number of media drives. The media drive 430 is connected to a terminal or web site through a proprietary driver card. The company administrator may use the dynamic encryption and dynamic download functionality of the library subsystem 422 to incorporate and accommodate company specific information. The company's proprietary information may be transferred to the library subsystem 422 using an encryption process and then selectively downloaded to the destination port and to the authorized person for proper identification. The library subsystem 422 is not only a customized, copyrighted and proprietary information company library, but is also a company document security device that encrypts and distributes company documents and company secret proprietary information within the company network. A separate component, such as a memory component, that is part of the network interface connection that connects each participating workstation to the subsystem and allows access to the encrypted information, limits certain operations that may be performed from the workstation so that the workstation can access the encrypted information from the subsystem. The above-described limitations define or prevent operations involving data copying or data transfer.
4. Sales promotion delivery system
The promotional system is used in a point of delivery system for promotional and commercial information. It distributes promotional and commercial information in electronic format, which the user either views at the site or downloads to his personalized media for later viewing. The user requests access to promotional and commercial information including discounts on available advertisements dynamically viewed electronically, businesses, special promotions, software presentations and catalogs of products. The user can even make electronic purchases by processing promotional and commercial information and then ordering by email from a personal reader/computer, or directly from an interactive promotional library. The structure of the sales promotion library is the same as that of the purchase point system.
Fig. 11 shows in block diagram form a marketing system according to the invention. As in other point-of-sale systems, library 302 is connected to a host file server 304. The merchandising system also includes a number of merchandising components 448A-D that electronically display and market the product. The component 448A is directly connected to the central transaction database 104 and the central information repository 100, while the components 448B-D are connected to the host file server 304. Component 448A receives information from the retailer terminals 450A-D and the host file server 304, and through the retailer terminals 450E-G. More specifically, the host file server 304 receives advertisements and specifically offered updates from local commercial, national or regional advertisers, and corporate sponsors through retailer terminals (MT) 450E-G. Host file server 304 is also networked to a central transaction database that in turn provides reports to publishers, advertisers, billing, audit companies, merchandise producers, and other personnel.
The promotional library allows promotional and commercial information to be selectively downloaded to the user's rental media (see discussion in section B, system architecture to illustrate such downloads) for private viewing by the user and purchase at a convenient time. As described above with reference to the rental point delivery system, the downloaded promotional and commercial information will self-destruct (i.e., automatically delete) upon expiration of a predetermined time interval. The promotional bookstore also provides a user-interactive self-service vending function. A user may order a product or information electronically via a network. Some promotional functions are: coupons, virtual shopping, catalog sales, presentations, subscription ordering, electronic application credit cards, industry cards, or other kinds of services as needed. Certain public domain information, such as community events, ticket sales, institutional events, and even announcements, may also be released to communities where promotional information is served as a free or low cost service.
The flow of promotional and commercial information is very similar to the flow of information within a point-of-sale delivery system. However, the source of information is a local commercial, national or regional advertiser, an appropriate sponsor via advertising agencies and other entities, and not a publisher or owner of copyright information.
5. Information tracking technology
In one embodiment, for each exchange or download of information, the tracking entries are transmitted or stored to an appropriate transaction database, such as the central transaction database 104, to record the movement or transfer of information from the first location to the second location. By examining the above-mentioned tracking entries, the owner of the information can monitor the movement of the information and take appropriate action. For example, a tracking entry is recorded in the transactional database 104 whenever information is copied to the library 302, deleted from the library 302, or copied from the library 302. Based on these tracking entries, the owner of the information can charge the receiver or transmitter a fee according to his defined criteria. The charge may be based on a variety of factors including, but not limited to, the economic value of the information, the use or intent of the information, the number of users, and the availability of other sources. The tracking entries may also include additional data so that the owner of the information can determine who delivered the information, the amount of information delivered, the type of delivery (e.g., rental for a specified period of time), and the time of delivery. In one embodiment, all transferred tracking entries are recorded, including library 302 to cartridge 374, and central repository 100 to library 302 transfer entries. By using these entries, the owner of the information can also determine the type of information transferred, the number of transfers, and the identity of the recipient of the information. This information may be used, for example, to determine whether the target user has received certain promotional material, or to determine a reflection of a different information pricing strategy.
D. Encryption
The point-of-sale delivery system described above is capable of dynamically encrypting data as it is downloaded to the user's storage medium. Dynamic encryption refers to the process of working with a storage medium to exclusively encrypt downloaded data. In one embodiment, different levels of encryption are used depending on a series of factors or variables. These variables include, but are not limited to, economic life of the information, market value, general availability, replacement costs, time sensitivity, and the number of potential users. For example, television program listings today have a lower level (i.e., less complex) of encryption due to lower market value, lower replacement cost, and universal availability from many sources. Instead, a multi-volume legal statement has a higher (i.e., more complex) level of encryption due to the limited availability of this information, replacement costs, and longer economic life. Based on the above factors, the source of the information (i.e., the publisher) can determine the appropriate encryption level for each portion of the information that is initially transferred from the central repository 100 to the user's cartridge 374. The encryption level of information at one location, such as library 100, may be higher or lower than the encryption level at another location, such as cartridge 374. Rather, the encryption level may be independently changed or determined each time information is downloaded or transmitted. For example, the encryption level of the central repository 100 may be different from (i.e., higher or lower than) the encryption level of the book downloaded to the user's cartridge 374.
In addition to dynamic encryption, other encryption may be performed in the manner shown in FIG. 12. Fig. 12 shows a three-level encryption process. For example, the data may be encrypted before transmitting the information onto the network. This easily prevents unauthorized users from accessing the information transmitted onto the network. In addition to encryption prior to transmission, the data may be encrypted prior to being placed in the library. The publisher, or other owner of the information, may have permission to encrypt at this level to provide sufficient data protection to the owner of the information that it is satisfied with.
Once the data is stored in the library, dynamic encryption techniques may be used when downloading the data to the storage medium. The storage medium (fig. 7) includes a proprietary environment for construction, reading, viewing and processing. The medium also has a commercially available operating system for processing the information files. The information file directory registry forms part of a proprietary application and the operating system application contains a file pointer.
Upon downloading the data to the user's storage medium, the dynamic encryption process uses the permanent serial number stored on the storage medium, the user's personal identification number, the code number of the personal signature, and the password in some form to further encrypt the data stored in the library. The personalized variables and codes are combined with the various personalized information file variables to form a personalized data structure of the data downloaded onto the user's personalized media. Thus, the information file is a personalized file that fits the medium, the software version, the information file itself, and other variables.
Dynamic encryption helps reduce the likelihood of unauthorized use of proprietary or other information by making all information downloaded via the point-of-sale system readable and accessible by the selected user reader/computer number. In particular, a data storage medium that is accessible from one reader/computer will not be accessible from another reader/computer unless such access is prearranged by providing the other reader/computer with the same user identification number and password.
For example, a well-known algorithm that may be used in the above-described three-level encryption includes a Z8068 data encryption processor (DCP). The DCP includes a structure for encrypting and decrypting data using an encryption algorithm of the national institute of standards (NBS). It can be used in a variety of environments including dedicated controllers, communication concentrators, terminals and peripheral task processors in general purpose processors. DCP provides high throughput by using cipher feedback, codebook or cipher block chaining modes of operation. The separate port for key entry, unencrypted data and encrypted data enhances security. The host system communicates with the DCP using commands entered at the host port or through an auxiliary control line. Once installed, data can be passed through the DCP at high speed, since input, output, and encryption operations can be performed in parallel.
In another embodiment, the encryption and decryption may be performed in dedicated hardware and/or software functions. For example, each reader and cartridge 374 may include a dedicated encryption Integrated Circuit (IC) and a dedicated decryption IC to maximize the speed of information transfer. By adding additional functionality and by enabling or disabling additional levels, the encryption and decryption levels may be changed.
For dynamic encryption, the following describes one of many dynamic encryption methods that may be used. Specifically, as shown in table 1, respective numbers are assigned to respective frequently used letters and numerical symbols.
TABLE 1
(symbol) | A | B | C | D | E | F | G | H | I | J | K |
Encoding | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
(symbol) | L | M | N | O | P | Q | R | S | T | U | V |
Encoding | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 |
(symbol) | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 |
Encoding | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 |
(symbol) | 7 | 8 | 9 | . | , | ; | : | + | - | × | |
Encoding | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 |
The number of bits to shift the encoding to the left at the start of encryption will be determined using the serial number stored on the cartridge tape. For example, if the sequence number ends with 6, the encoding will be shifted left by 6 bits before starting the encryption. Table 2 shows the code after shifting.
TABLE 2
(symbol) | A | B | C | D | E | F | G | H | I | J | K |
Encoding | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 |
(symbol) | L | M | N | O | P | Q | R | S | T | U | V |
Encoding | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 |
(symbol) | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 |
Encoding | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 |
(symbol) | 7 | 8 | 9 | . | , | ; | : | + | - | × | |
Encoding | 40 | 41 | 42 | 43 | 44 | 1 | 2 | 3 | 4 | 5 | 6 |
The selected user password is then used to determine the number of symbols that the code should be left shifted again. Assuming, by way of example, that the password is ROSE, then using the codes in Table 2, the digital expression for ROSE would be 24212511. When the corresponding numbers are added up until a number between 1 and 10 is reached, in our example, the number reaches 9[ 18.9 ]. Thus, after every 9 th letter, the code will be shifted left by 6 bits again. After 9-letter encryption, the encoding will be as shown in table 3.
TABLE 3
(symbol) | A | B | C | D | E | F | G | H | I | J | K |
Encoding | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 |
(symbol) | L | M | N | O | P | Q | R | S | T | U | V |
Encoding | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 |
(symbol) | W | X | Y | Z | 0 | 1 | 2 | 3 | 4 | 5 | 6 |
Encoding | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 1 |
(symbol) | 7 | 8 | 9 | . | , | ; | : | + | - | × | |
Encoding | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 |
Due to the fact that the encryption table is continuously shifted, under the above simple method, the phrase "My brown dog has leaves.
19 31 6 8 24 21 29 20 6
16 27 19 12 20 13 31 18 24
23 19 37 11
Using only table 1 for decoding, the encoded phrase will read as:
S 4 F H X U 2 T F
P 0 S L T M 4 R X
W S.K
it is difficult to find a pattern that can decode a symbol if no other information is known.
Knowing the substitution of the encoding versus the symbol at the beginning of the encryption process, and the number of symbols between shifts, decoding the encrypted phrase is simply a reverse process that applies the tables in reverse order.
There are many similar dynamic encryption methods that use different ways to determine the way in which the encryption code changes as it passes through the data that needs to be encrypted. The goal, of course, is to increase the difficulty of decoding by avoiding the obvious patterns associated with conventional language and digital use.
E. Tamper protection
In one embodiment of the invention, access to information is monitored or recorded to determine an unauthorized attempt to access the information. If an unauthorized access is recorded or stored on the user's media (e.g., cartridge 374), then when the user next attempts to download additional information onto cartridge 374, an unauthorized access message will be transmitted to notify the appropriate party, such as a cashier. As a result of the unauthorized access message, the cashier may withdraw the user's cartridge 374, notify the appropriate regulatory agency, or record an entry in the user's account for future action. More precisely, in one embodiment, the specific identification data of the information requester or receiver is first determined by reading or by recording. If it is determined that the data provided by the information recipient does not match (i.e., is not equal to) the predetermined value, then the unauthorized access message is recorded and the information exchange is prevented. The data determination may be implemented using well-known comparison hardware and/or software functions.
Further, if a user with incorrect intent or authorized code attempts to access unauthorized information, an unauthorized access message is generated. For example, in a corporate environment, if a user attempts to access information for which the user does not have the correct authorization code, an unauthorized access message is generated and sent to personnel such as a system administrator or security officer. Different levels of unauthorized access messages may be generated. For example, if a user attempts to decrypt information stored at a different location within the system (e.g., library 302) using an unauthorized device, a high-level message is generated. If a remote user attempts to exceed the user's authorization level data, a low level message is generated.
F. Other embodiments
In another embodiment, library 302 may be configured to capture and exchange real-time information. For example, when a professor introduces material to a student in a classroom, the professor's introduction may be captured, converted to copyrighted text and exchanged with a remote user. The conversion may be accomplished using well known speech conversion systems using well known computer systems. The professor's introduction may be supplemented with previously prepared, or currently prepared, written text. The text can be digitized and correctly integrated into the text using well known methods. When presenting the material, the remote user may receive the information in the professor in a real-time manner or at some later time. As described above, the remote user can only receive information that the remote user is authorized to receive from library 302.
Further, in another embodiment, library 302 may be configured to receive audio, video, and/or computer software code. For example, in the embodiment shown in FIG. 13, library 302 is connected to a Video Cassette Recorder (VCR)600, a stereo system 610 including a video cassette recorder/player 620, a Compact Disc (CD) player and/or recorder 630, a television 640, and a computer 650. As described above, authorization information is received from library 302 and, in some implementation, stored to a storage medium, such as storage device 660. The storage 660 may have a number of storage units, such as Random Access Memory (RAM), Read Only Memory (ROM), a rotating storage component such as a hard disk, a magnetic storage medium such as magnetic tape, or other storage medium, such as an optical storage medium. After the remote user selects the appropriate information to receive from library 302, the information is stored in device 660. The device 660 is configured to transfer the stored information to a selected playback device, such as a Video Cassette Recorder (VCR)600, stereo system 610, cassette recorder/player 620, CD player/recorder 630, television 640 or computer 650. For example, in one embodiment, the remote user downloads or receives all of the content of a babble music album. The content of the album is stored to the device 660. As described above, this information may be stored permanently or in a fixed period of time or number of uses. After downloading the information to device 660, the remote user may transfer the information to stereo system 610 for listening. In another embodiment, the information may be transferred to device 660 or transferred through device 660 to one of the other components, such as cassette recorder 620, VCR610, CD recorder 630 or computer 650. To limit authorized copying or playback, the information may be played back using only the components of cassette recorder 620, VCR610, CD recorder 630 or computer 650 connected to device 660. For example, a remote user may download a feature by storing a feature film on a video tape using the VCR 610. The remote user can then playback the movie in an authorized manner whenever the video cassette is played back on the VCR610 connected to the device 660. Likewise, a remote user may download a software program to store the information in device 660 or on a storage medium in computer 650. Depending on the authorized encoding of the software, the program may be configured to be executed by the computer 650 only when the computer 650 is connected to the device 660.
The above-described system facilitates controlling and monitoring the exchange of information between various types of information owners, publishers, and users. By using the above system, many types of authorization information are available to the user. The user may purchase, rent, or obtain free authorization information as specified by the owner of the information. In one embodiment, information is encrypted using various levels (i.e., complexity) of encryption algorithms to prevent unauthorized access. The level of encryption depends on various factors or variables, such as the economic life of the information. For example, library 302 may include information representing a reference dictionary and a babble music album. The information in the reference dictionary and the album may have the same or different encryption levels. Furthermore, students in a given class may have free access to the reference dictionary information because their schools purchased unlimited-use copies of the information, however, the students may be required to purchase the information downloaded from the album. In addition, different portions of the information may have different access types. For example, the first track in the album information may be encoded such that all persons can download the information free of charge, while the remaining tracks of the album information are encoded to be downloaded for a fee.
While the invention has been described with reference to specific embodiments, many modifications, changes, substitutions, and equivalents will now occur to those skilled in the art. Accordingly, the invention should be considered as limited only by the spirit and scope of the appended claims.
Claims (36)
1. An apparatus for facilitating obtaining text of a book, the apparatus comprising:
a storage device having stored thereon the text of a plurality of books;
a processor connected to said storage device, said storage device further having stored thereon a program for controlling said processor, said processor operating in conjunction with the program to receive book selection requests;
receiving a user identification associated with the book selection request; and
and if the user identification and the book selection are effective, outputting the encrypted text of the selected book by using the determined book encryption level.
2. The apparatus of claim 1, wherein the processor is further operative with the program to purpose code the text of the selected book to limit the intent of access to the text by authorized users.
3. The apparatus of claim 1, wherein the processor is further operative with the program to encrypt the text of the selected book with an identifier associated with the user.
4. The apparatus of claim 1, wherein the determined level of book encryption is based on an economic value of at least one selected book.
5. The apparatus of claim 1, further comprising at least one local component communicatively coupled to said processor, said local component comprising a memory for storing information transmitted from said processor to said component in electronic format and a local component processor for controlling the transfer of information stored in said component to an electronic storage medium of a user of the system, said local component encrypting the information when configured to transfer the information to the electronic storage medium, said local component configured to encrypt the information using the determined information encryption level.
6. The apparatus of claim 5, wherein the information stored on the user storage medium includes a code number and a serial number of the personal signature.
7. The apparatus of claim 5, wherein the determined level of encryption of the information is based on an economic value of the at least one selected book.
8. The apparatus of claim 7, wherein the level of information encryption is different from the level of book encryption.
9. The apparatus of claim 1, wherein the processor further operates in conjunction with the program to determine an unauthorized access attempt to the output copy of the text of the book.
10. A method for operating a computer to obtain text of a book, the method comprising:
inputting a book selection request into a computer;
inputting the user identification associated with the book selection request into the computer; and
and if the user identification and the book selection are effective, outputting the encrypted text of the selected book by using the determined book encryption level.
11. The method of claim 10, wherein the step of inputting the book selection into the computer further comprises the steps of:
selecting at least one book in the memory; and
at least a portion of the text of each selected book is selected.
12. The method of claim 11 wherein the step of inputting the book selection into the computer further comprises the steps of:
determining whether more than a portion is selected; and
if more than one part is selected, the selected parts are combined.
13. The method of claim 11, further comprising the step of generating tracking information corresponding to the selected portion and the selected book.
14. The method of claim 10, further comprising the step of purpose coding the output text of the selected book to limit the intent of access to the text by authorized users.
15. The method of claim 10, further comprising the step of determining a level of book encryption.
16. The method of claim 15, wherein determining the level of encryption of the book further comprises the step of selecting at least one level of encryption from a plurality of levels of encryption codes.
17. A method for operating a computer communicatively connected to a network for obtaining text of a book, the network being connected to a memory having stored therein text of a plurality of books, the method comprising:
determining a book selection request;
inputting a book selection request into a processor;
inputting into a processor a user identification associated with the book selection request; and
if the user identification and book selection are valid, the encrypted text of the selected book is output with the determined encryption level.
18. The method of claim 17, wherein the step of determining a book selection request further comprises the steps of:
checking books in the memory;
at least a portion of text of at least one book in the memory is selected.
19. The method of claim 17, wherein the step of determining a book selection request further comprises the steps of:
selecting at least one book in the memory;
selecting at least a portion of the text of each selected book in the memory;
the selected portions of the selected book are combined.
20. A method in accordance with claim 19 wherein the step of selecting text of at least a portion of each selected book in the memory comprises the step of selecting an entire book.
21. A method in accordance with claim 19 wherein the step of selecting text of at least a portion of each selected book in the memory comprises the step of selecting at least one word of each selected book.
22. A method in accordance with claim 19 wherein the step of selecting text of at least a portion of each selected book in the memory comprises the step of selecting at least one section of each selected book.
23. The method of claim 19 further comprising the step of generating tracking information corresponding to the selected book in the memory.
24. The method of claim 23 further comprising the step of generating tracking information corresponding to the selected portion of the selected book.
25. The method of claim 17 further comprising the step of purpose coding the output text of the selected book to define a purpose for which the user is authorized to access the text.
26. The method of claim 17 further comprising the step of determining unauthorized access to the encrypted text.
27. An apparatus for facilitating obtaining text of a book, comprising:
a storage device having stored thereon the text of a plurality of books;
a processor connected to said storage device, said storage device further having stored thereon a program for controlling said processor, said processor operating in conjunction with the program to receive book selection requests;
receiving a user identification associated with the book selection request; and
if the book selection and the user identification are valid, the text of the selected book is dynamically encrypted by using the determined encryption level, and the user identification is used for dynamic encryption when the text is output.
28. The apparatus of claim 27, wherein the apparatus is communicatively connected to a communication network.
29. The apparatus of claim 27, wherein the processor is further operative with the program to purpose code the text of the selected book to limit the intent of access to the text by authorized users.
30. The apparatus of claim 27, further comprising at least one local component communicatively coupled to said processor, said local component comprising a memory and a local component processor, wherein the memory stores information transmitted from said processor to said component in electronic format, the local component processor controlling the transfer of information stored in said component to an electronic storage medium of a user of the system, said local component encrypting the information when configured to transfer the information to the electronic storage medium, said local component configured to encrypt the information using the determined encryption level.
31. A method for operating a computer to obtain information, the method comprising:
inputting an information selection request into a computer;
inputting a user identification associated with the information selection request into the computer; and
if the user identification and the information selection are valid, the encryption information of the selected information is output with the determined information encryption level.
32. The method of claim 31, wherein the step of inputting the selection of information into the computer further comprises the step of selecting at least a portion of the information in the memory.
33. The method of claim 32, wherein the step of inputting the book selection into the computer further comprises the steps of:
determining whether more than a portion is selected; and
if more than one part is selected, the selected parts are combined.
34. The method of claim 32, further comprising the step of generating tracking information corresponding to the selected portion of information.
35. The method of claim 31, further comprising the step of purpose-coding the encrypted information to limit the intent of authorized users to access the information.
36. The method of claim 31, wherein the information includes at least one of visual, music, software, and video information.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/049,321 | 1998-03-27 | ||
US09/175,559 | 1998-10-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1036709A true HK1036709A (en) | 2002-01-11 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6633877B1 (en) | Method and apparatus for delivery of selected electronic works and for controlling reproduction of the same | |
US5734823A (en) | Systems and apparatus for electronic communication and storage of information | |
CN1292960A (en) | Information distribution system | |
US7191153B1 (en) | Content distribution method and apparatus | |
US5457746A (en) | System and method for access control for portable data storage media | |
US7062468B2 (en) | Licensed digital material distribution system and method | |
EP1222597A1 (en) | Methods and devices for storing, distributing, and accessing intellectual property in digital form | |
US10217181B2 (en) | Digital watermarking systems and methods | |
US5677953A (en) | System and method for access control for portable data storage media | |
US20050187936A1 (en) | Rechargeable Media Distribution and Play System | |
US20050076020A1 (en) | Digital data vending system and method of selling digital data files | |
US20060190409A1 (en) | Method and system for licensing digital works | |
US20070203845A1 (en) | Method and system for creating multimedia | |
US7487129B2 (en) | Method and apparatus for the distribution of digitised information on demand | |
HK1036709A (en) | Information distribution system | |
CN1728803A (en) | Flexible Content Distribution Methods and Devices | |
KR100342400B1 (en) | Electronic publication system and method for selling and managing electronic publication | |
KR20210000156A (en) | E-book sales and management system | |
AU715638C (en) | System and method for access control for data storage media | |
AU694742C (en) | Access control for portable data storage media | |
WO2004079608A2 (en) | Apparatus and method for data file distribution |