EP1074113A4 - Information distribution system - Google Patents

Information distribution system

Info

Publication number
EP1074113A4
EP1074113A4 EP98953819A EP98953819A EP1074113A4 EP 1074113 A4 EP1074113 A4 EP 1074113A4 EP 98953819 A EP98953819 A EP 98953819A EP 98953819 A EP98953819 A EP 98953819A EP 1074113 A4 EP1074113 A4 EP 1074113A4
Authority
EP
European Patent Office
Prior art keywords
information
book
accordance
text
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP98953819A
Other languages
German (de)
French (fr)
Other versions
EP1074113A1 (en
Inventor
Michael M Saigh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digeo Inc
Original Assignee
IPDN CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IPDN CORP filed Critical IPDN CORP
Publication of EP1074113A1 publication Critical patent/EP1074113A1/en
Publication of EP1074113A4 publication Critical patent/EP1074113A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • the present invention relates to a system for distributing information in electronic form and more particularly, relates to a communication network for transmittal information between a central information bank and a user interface.
  • information With the current information publishing and distribution system, information usually is delivered as fixed printed images on paper or fixed in other media forms such as tapes, diskettes, cartridges, laser disk, or compact disk. Prior to and at various points in the delivery process, the information usually is warehoused. Eventually, the information is delivered to retail outlets scattered throughout a distribution territory. Upon receipt of the information, the retailers either store the information or display the materials for resale.
  • the present publishing and distribution system has many disadvantages.
  • One disadvantage is the amount of time and labor required for preparing, printing, producing and distributing information.
  • Another disadvantage of the current system is the lack of control over the production quantity of information, i.e., the number of copies made and sold.
  • the current distribution system is further disadvantaged by the time, work and costs required in publishing and distributing information updates.
  • Networks such as Internet
  • Known networks generally utilize a telephone network or some other network as a communication media and can be accessed using commercially available software and almost any type of computer.
  • Such networks are unsuitable for the distribution of proprietary information and information which is intended for limited copying.
  • the free transfer of information using such networks provides little or no protection for copyright and proprietary information owners.
  • An information distribution system in one aspect, is an information distribution system which overcomes disadvantages and shortcomings of the current information publishing and distribution system.
  • An information distribution system in accordance with one form of the present invention, includes a central information bank and a central transactional data base coupled to point-of-sale delivery systems.
  • the central information bank and central transactional data base do not necessarily have to be co-located and can be implemented on different, but coupled, computer systems.
  • information obtained from publishers is digitized, i.e., converted to an electronic form, to create a master copy in a uniform electronic format.
  • Information obtained from publishers in digitized format simply is converted into the uniform electronic format.
  • the master copies are stored in the central information bank.
  • the central transactional data base performs a record keeping function.
  • the transactional data base records and stores information related to each transaction performed at each point-of-sale site. Upon request, the transactional data base transmits sales data to a requesting publisher.
  • the point-of-sale delivery systems may take one of many forms including a point of purchase delivery system, a point of rental delivery system, a "book bank" subsystem, a promotional delivery system, or any combination of such systems.
  • information is downloaded, i.e., copied, onto a user's storage media for later access by the user.
  • the point of rental delivery system is similar to the point of purchase system except that in addition to downloading information, an automatic erasure time period designation is downloaded. As explained in more detail hereinafter, the time period designation is utilized so that upon expiration of the designated time, the downloaded information is automatically erased from the user's storage media.
  • the book bank subsystem is a sub-network established between authorized users, such as employees of a corporation. Each user within the sub-network with the proper authorization, or approval, can access designated information stored within the subnetwork. Such a configuration enables sharing of information.
  • promotional and other commercial information can be accessed for viewing and ordering of products.
  • Book Bank A most important element of each point-of-sale delivery system is the user interface, sometimes referred to herein as the "Book Bank”.
  • Book Bank refers to the interface between the network and the user.
  • Book Bank may imply “booktype” material, such term is not so limited.
  • the material may be of many types such as movies, music, video, images, text, audio, and computer software material.
  • the Book Bank is a self-service, user interactive information vending device.
  • Each Book Bank contains a high volume, local memory storage having, a customized portfolio of the most demanded information products for the particular site at which the Book Bank is located.
  • Other information is transferred, via commercial communication networks (i.e., telephone networks, cable systems, satellite or cellular system or other similar communication networks), to a Book Bank for supplemental, secondary and less demanded purposes.
  • a central processing unit contained within the Book Bank and coupled to the Book Bank local memory, storage controls downloading and dynamic encryption of the information.
  • a user may select portions or entire contents of one or more books.
  • the selected information may then be combined and downloaded to the user's storage device, for example a cartridge.
  • the cartridge in one embodiment, includes a unique identification number and a determined amount of memory for storing the selected information.
  • the present architecture reduces the amount of time and resources required for the distribution of information. Further, information updates can easily be made simply by updating the master copy stored in the central information bank and then either writing over the copies stored in each Book Bank with the updated master copy or downloading the updated master copy and storing both the old and updated versions in each Book Bank.
  • Each Book Bank contains an electronic index of the various information titles accessible from the Book Bank.
  • the number of production quantities of a particular work can be readily controlled using the central transactional data base to track the number of copies made and sold, within the network, for each work.
  • the present invention also readily enables controlling reproduction of information and greatly simplifies updating of text, and the dynamic encryption of text provides copyright and proprietary information owners sufficient confidence in the present network to allow such information to be transmitted on the network.
  • Fig. 1 illustrates one embodiment of the present information distribution system architecture
  • FIG. 2 illustrates information flow in the system architecture shown in Fig. 1;
  • Fig. 3 is a block diagram illustration of a point of purchase delivery system;
  • Fig. 4 is a more detailed block diagram illustration of the host fileserver shown in Fig. 3;
  • Fig. 5 is a perspective view of a Book Bank embodiment
  • Fig. 5A is an alternative Book Bank embodiment
  • Fig. 6 is a block diagram illustration of the Book Bank circuitry
  • Fig. 7 is a block diagram illustration of an end user's storage media
  • Fig. 8 illustrates the information flow for the point of purchase configuration
  • Fig. 9 is a block diagram illustration of certain elements of a point of rental delivery system
  • Fig. 10 is a block diagram illustration of certain elements of a Book Bank subsystem
  • Fig. 11 is a block diagram illustration of certain elements of a promotional delivery system.
  • Fig. 12 is a flow chart illustrating the encryption process implemented in accordance with the present invention.
  • Fig. 13 is another Book Bank embodiment.
  • information is distributed from a central information bank to a user's personalized storage medium.
  • Information to be so distributed by the present system is received from outside sources either electronically, over various communication networks (e.g., telephone lines, cable systems, cellular systems or other similar commercial communication networks) or from various storage mediums (e.g., magnetic or electronic disks, cartridges, or tape reels or compact disks, laser disks, tape cassettes, etc.), or in hard copy format. If information is received in a hard copy format, it is initially converted to a standard digital format (e.g., ASCII text, DOS text or other similar standard commercially available text format) by scanning or direct transcription.
  • a standard digital format e.g., ASCII text, DOS text or other similar standard commercially available text format
  • the information is digitized, formatted, compressed and initially encrypted to form an electronic master copy which is stored in the central information bank.
  • the master copy is duplicated electronically and dispatched electronically through a communication network, such as a telephone or satellite network, to a point-of-sale delivery system.
  • Book Banks form a part of such a delivery system, and the electronic copies are retained in the Book Banks for downloading into a user's personalized storage medium.
  • a user selects the information to be downloaded and a tracking entry is made into a transactional database to record the transfer.
  • the information Prior to and during downloading of the copy on the user' s storage medium, the information is dynamically encrypted utilizing a varying level of encryption which is dependent upon a variety of variables, for example, an economic value of the information.
  • a "dynamic" encryption process is utilized so that only the electronic reader associated with the user card used to access the information from the Book Bank and download the information to the user storage cartridge can be utilized to display the information in an understandable text format.
  • FIG. 1 illustrates one embodiment of the present information distribution system.
  • the system is shown, for illustration purposes only, as being implemented across the world.
  • a central information bank 100 is the central "library,” or storage location, for information.
  • Peripheral information banks 102A-F, coupled to central information bank 100 are libraries, or storage locations, for community oriented information.
  • the information stored in central information bank 100 accessed most often from the San Francisco bay area peripheral information bank 102A may not be accessed often from the peripheral information bank for Rome, Italy 102E.
  • central information bank 100 is coupled to each peripheral information bank 102A-F to enable sharing of information.
  • each peripheral information bank 102A-F is coupled to one or more point-of-sale sites.
  • Central information bank 100 and central transactional data base 104 preferably, are commercially available main frame computers, such as an IBM main frame computer. The particular main frame model selected depends on the amount of information to be centrally stored in the network, the extent of record keeping functions to be performed, and the speed at which transfer and processing of information is to occur. Importantly, the present invention is not limited to any one particular computer to serve as the central information bank and/or the central transactional data base.
  • FIG. 1 is an exploded view of the various couplings between central information bank 100 and transactional data base 104, peripheral information bank 102F and various point-of-sale delivery sites, particularly, point of purchase sites 108A-C, point of rental sites 110A-D, promotional sites 112A-D, -8- and Book Bank subsystem sites 114A-C.
  • Each point of purchase site 108 includes a point of purchase transactional database, represented by a box, and a user interface, represented by a circle.
  • the user interface is sometimes referred to herein as the "Book Bank.”
  • point of purchase site 108 A contains Book Bank 116A and transactional data base 118 A
  • site 108B contains Book Bank 116B and transactional data base 118B
  • site 108C contains Book Bank 116C and transactional data base 118C.
  • the central information bank 100 and peripheral information bank 102F, and specifically peripheral information bank memory storage unit 106A also could serve as Book Banks, such units are illustrated as circles. Further details regarding Book Banks and transactional data bases are provided below in Section C.
  • each point-of-sale delivery system such as systems 112A, 108A-B, 110A, and 114A-B, may be networked directly to peripheral information bank 102F, or the point-of-sale delivery system, such as systems 108C, 110B-D, 112B, 112D and 114B-C, may be networked to the point of purchase site 108B, which is networked to the peripheral information bank 102F.
  • Point-of-sale delivery system configurations are explained in more detail below in Section C.
  • the delivery systems may be integrated into various combinations, such as a promotional point of rental system as shown by HOB and 112B, or a promotional point of purchase system as shown by 108B and 112C or a combination of a promotional, point of purchase, and point of rental systems as shown by 108C, 110D and 112D.
  • Communication network links between the central information bank 100 central transactional data base 104, peripheral information banks 102A-F, and point of sale sites can be made utilizing one or a combination of many commercials available networks such as telephone, satellite or cable networks or any other medium suitable for transmitting information in digitized format.
  • Many well-known protocols could be used in connection with the present system. For example, if the Internet is used as the "backbone" network, the well-known TCP/IP protocol could be used.
  • FIG. 2 illustrates the flow of information in accordance with the embodiment of the system architecture illustrated in Figure 1.
  • peripheral memory storage unit 106A is consolidated into central information bank 100
  • peripheral transactional data base 106B is consolidated into central transactional data base 104.
  • communication links between the peripheral information bank 102F and central information bank 100 and central transactional data base 104 are provided.
  • a publisher will receive inventory reports from the central information bank 100 and sales data from central transactional data base 104. Based on this and other information the publisher can determine whether to place additional information on the network. For ease of reference such information is sometimes referred to herein as "information titles" as shown in block 204.
  • the information is digitized 206, disposed in an electronic format 208 and then undergoes electronic authoring 210.
  • the digitized information is then transmitted to a data converter 212 for converting the digitized information into a uniform format.
  • a data converter 212 for converting the digitized information into a uniform format. For example, if the central information bank 104 and central transactional database 104 are DOS-based systems, the data converter will convert the information into a DOS format. If the information titles are in a digitized format, the information titles are transmitted directly to data converter 212 for direct conversion into the uniform format as illustrated by line 214.
  • the data undergoes an initial encryption and compression to both reduce the amount of storage space required to store the data and to make the data ready for being transmitted with less risk of unauthorized use while being transmitted through a communications network.
  • the compression is accomplished through the use of one of the commercially available -10- compression protocols.
  • the initial encryption is performed using one of the standard available encryption protocols as discussed below in Section D.
  • the information titles are stored in central information bank 100.
  • An electronic index listing all titles available and accessible by author, title, subject or ISBN codes is prepared. As new information titles are added, the electronic index is updated to include the new titles.
  • the information titles may then be downloaded to Book Bank 116A.
  • the information titles and corresponding electronic index information may, in addition to or rather than being stored in central information bank 100, be disposed on laser disk masters as illustrated at block 216. Laser disk masters 216 can then be installed directly into Book Bank 116A.
  • the user may access an electronic index which contains all the information titles available for downloading from Book Bank 116A.
  • the electronic index the user obtains the listing for available information titles by author's name, by specific title of the work, by ISBN code or by subject matter.
  • a listing of the available information titles included in the index category selected and the other necessary information to allow the user to purchase or rent any information title contained in the index category listed is displayed on the video screen.
  • the user selects any title listed thereon and obtains a printout of the relevant information through the printer slot 342.
  • the information titles may then be downloaded from Book Bank 116A onto a user's storage media 218.
  • transactional data base 118 A sometimes referred to herein as a host fileserver, which in turn generates a status sales report.
  • the sales report is transmitted to central transactional data base 104.
  • Transactional data base 104 sends the necessary action instruction back to host fileserver 118 A and a transaction report to publisher 202 for uses such as accounting and auditing.
  • the point-of-sale delivery systems are classified by function.
  • the functions include one or more of the following: (1) point of purchase delivery system, (2) point of rental delivery system, (3) book bank subsystem, and (4) promotional delivery system.
  • the configurations for each of these functions are separately discussed in detail below.
  • Point of Purchase Delivery System A point of purchase system is illustrated in block form in Figure 3. The point of purchase system is described herein for illustration purposes only as a system from which books can be purchased. As pointed out above, however, the -12- system is not limited to books and other media capable of being expressed in electronic form such as computer software, music and video could be purchased utilizing the present system.
  • the point of purchase system illustrated in Figure 3 includes a Book Bank 302 coupled to host fileserver 304.
  • Server 304 is coupled to a customer service terminal 306 (of course, there could be more than one terminal) and a cashier's station 308A which is further interconnected to other cashier stations 308B-D.
  • Server 304 also is coupled to an institution network 310 which in turn connects to institution terminals 312A-E.
  • Service terminal 306, cashier stations 304A-D and institution network 310 are connected to server 304 via a computer communication link such as a commercially available computer networking system such as CompuServe or Internet.
  • Book Bank 302 and server 304 are connected to central information bank 100 and central transactional database 104 as hereinbefore explained with reference to Figs. 1 and 2.
  • Cashier stations 308 A-D are in serial, linear networking connections which allows the addition and removal of a number of cashier stations at any time. This configuration accommodates extra cashier stations required during rush seasons or rush hours and the desire to remove cashier stations for better utilization of space after the rush seasons.
  • Customer service terminal 306 has local processing capability that provides customer services such as personal identification initiation, personal identification number changes, processing of complimentary books, book refunds, customer information entries and updates.
  • the customer services terminal 306 can also provide the retail outlet with internal administration and the management functions, such as the book inventory cards management, the book list management, book requests, book reports, financial reports, and E-Mail and Bulletin Board management.
  • server 304 includes a central processing unit (CPU) 316, a primary power supply 318, an uninterrupted power supply 320 to assure -13- continuous operation during power failure, and a high density storage 322 that holds all the programs and the data bases required for server 304 operation.
  • CPU central processing unit
  • primary power supply 318 a primary power supply 318
  • uninterrupted power supply 320 to assure -13- continuous operation during power failure
  • high density storage 322 that holds all the programs and the data bases required for server 304 operation.
  • Server 304 has four (4) interfaces, i.e., a network interface 324, a maintenance interface 326, a customer service station interface 328 and a cashier station interface 330.
  • CPU 316 transmits instructions to Book Bank 302, creates transaction data bases and reports, and processes orders from cashier stations
  • server 304 communicates with central transaction data base 104 for electronic filing of transaction reports and communicates with Book Bank 302 to give Book Bank 302 downloading instruction orders and to receive the status reports and the inventory reports from Book Bank 302.
  • Server 304 also is coupled, through network interface 324 to a Book Bank subsystem to receive subsystem reports in order to give instructions and orders whenever necessary, as hereinafter discussed.
  • External network systems such as institutional or corporate network systems with local merchants terminals, community bulletin board services and others can also be coupled to the network interface 324.
  • the network interface 324 also allows two-way connecting with interbank networks such as Cirrus, Plus or other similar data transfer network. Coupling to merchants' terminals, promotional system provides local merchants and the local business direct access to update their promotions and coupons.
  • Maintenance interface 326 enables remote or on-site diagnosis and repair of server 304.
  • Customer service station interface 328 provides for communication between server 304 and customer service terminals 306A-D to handle customer service transactions. Customer service terminals 306A-D are illustrated as being coupled through a data switch 332 to a printer 334. Cashier station interface 330 provides that cashier stations 308A-D can communicate with server 304.
  • Book Bank 302 includes a high resolution color graphic display 336 which is a touch screen device -14- used to display, for example, instructions, messages, and status reports to the user, indexing information and to receive the user's touch screen input selections.
  • Book Bank 302 also has a keypad 338 that is for the user to input a personal identification as well as other inputs.
  • a magnetic code or other generally accepted card reader 341, shown as an insertion slot, is provided for customers' transactions with a bank card, credit card or some other form of debit card.
  • a bar code reader 340 shown as an insertion slot, is provided to allow users to insert cards containing ISBN codes for desired information titles for reading by the Book Bank.
  • ISBN codes may also be manually inserted by typing the relevant numbered keys on the keypad 338.
  • a printer slot 342 also is provided to enable the user to access the output of Book Bank 302, a printer (not shown in Fig. 5), as hereinafter described, to retrieve receipts and transactions reports and ISBN access vouchers.
  • Book Bank 302 also includes a base member 344 with a cut-out portion 346 to enable a user to stand comfortably at keypad 338.
  • Book Bank 302 also includes a cartridge slot 348 for the user to input a reading cartridge, as explained in detail hereinafter, to obtain a copy of the information selected for downloading.
  • Book Bank 302 may be altered . More specifically and in one embodiment, Book Bank 302 is positioned on a desk 339 using a personal computer 349, for example those available from IBM Corporation. The user operates Book Bank 302 as described above with reference to Figure 5 except, the user may for example, sit in a chair (not shown). Such a configuration may be used, for example, in a corporate, dormitory, library, or other similar environment where the user may be accessing information for longer periods of time or in a professional type environment. In other embodiments, readers 340 and 34 land cartridge slot 348 each may be located within computer 349 or in separate devices which are electrically coupled to computer 349.
  • FIG. 6 is a block diagram description of Book Bank 302 circuitry.
  • Bonk Bank 302 includes a central processing unit (CPU) 350 which -15- is coupled to display 336, keypad 338, magnetic strip reader 341 and bar code reader 340.
  • CPU 350 is illustrated as one unit, it is contemplated that CPU 350 could be a parallel processor or distributed processor arrangement. Selection of CPU 350 type depends, of course, on the amount of information to be processed, the desired speed of processing and costs.
  • CPU 350 also is coupled to an automatic teller machine (ATM) module 352 to allow transactions with ATM cards.
  • ATM automatic teller machine
  • CPU 350 is coupled to a media driver 354 which enables users to insert personalized media for acknowledgment or other functions as hereinafter discussed.
  • ATM automatic teller machine
  • Book Bank 302 also includes a primary local storage device 356 provided for the storage of all information masters selected for loading into Book Bank 302 and related index information.
  • a secondary storage device 358 is provided to hold other programs, instructions and transaction related information.
  • a buffer memory 360 is utilized to speed up downloading in order to accommodate high volume users during the peak seasons.
  • a printer 362 is provided to print coupons on demand, receipts and various reports for the users.
  • a power supply 364 provides power to printer 362.
  • An uninterrupted power supply 366 coupled to primary power supply 364 assures continuous operation even during power down time.
  • CPU 350 is coupled to a network interface 368 to provide communication to central information bank 100, host fileserver 304 or a Book Bank subsystem, as hereinafter discussed.
  • CPU 350 also is coupled to a wireless communication port 370, which in turn is coupled to an antenna 372.
  • Wireless communication port 370 enables compatibility with an alternative communication media in the event that such media is required.
  • Figure 7 illustrates, in block diagram form, the structure for a user's personalized media storage cartridge 374. As explained hereinafter, a user inserts cartridge 374 into cartridge slot 348 for downloading of the information selected from Book Bank 302. The downloaded information is stored, in an encrypted format, on cartridge 374 together with relevant basic index information copied from -16- the electronic index contained in Book Bank 202 at the time of initial downloading.
  • Cartridge 374 is compatible with readers to enable the user to view information stored on the cartridge.
  • Cartridge 374 includes reading software 376 which, as explained in more detail hereinafter, performs sequential encryption and decryption of information.
  • Registry correspondence segment 378 also is provided.
  • a book file registry 380 is created at the time of downloading information onto cartridge 374. Encrypted bookfiles 382 together with relevant electronic index information are stored on cartridge 374 as well as a non-erasable permanently marked serial number 384.
  • Cartridge 374 also contains a commercial operating system environment 386 and free disk space 388.
  • Figure 8 illustrates the user process and component processing which occurs when a user utilizes the point-of-purchase system described above. Particularly, once the user enters the site 390, and if the user a first-time patron 392, the user will complete a user's application form 394. The user will then take the completed application and a picture LD. to customer service station 306A, where the user will select and input a personal identification number (PIN) and a password 396. The customer service clerk will open an account for the customer 398. The user- selected password is automatically matched with a sequentially created customer account number within the central data banks. Using the keypad accompanying the cashier station, the clerk types in the name, address and social security number for the user.
  • PIN personal identification number
  • password password
  • the written application will then be inserted into the printer slot accompanying the cashier station. While loading the customers' information, the central data bank reviews the information to determine if there are any prior problems with the customer or other discrepancies. When the verification process is completed, the designated customer account number for the user is printed on the users application. Then, the clerk places, into the card slot, a user identification card (for example, a plastic card having dimensions of the standard credit card and containing a magnetic strip on the back on which can be placed magnetic coded information). The card is then embossed with the user's name and account number -17- and the magnetic strip is encoded with the applicable user codes (account number, card number and designated password information). The written application is then transmitted to the central data storage center for retention.
  • a user identification card for example, a plastic card having dimensions of the standard credit card and containing a magnetic strip on the back on which can be placed magnetic coded information.
  • the card is then embossed with the user's name and account number -17- and the magnetic strip is encoded
  • the machine used to emboss and encode the cards is a standard commercially available machine of the type currently being used in connection with the issuance of a bank's card, credit cards or debit cards.
  • a new enrollee purchases a reader/computer or other acceptable reading device (such as a special computerized interface, or an audio or video playback device).
  • a reader/computer or other acceptable reading device such as a special computerized interface, or an audio or video playback device.
  • Each such device is assigned a unique serial number and a special code number.
  • the serial number is contained on a read only memory chip enclosed within the device. All of the many cartridges which accompany each such reading device is encoded in such a manner that information recorded on the cartridge can only be read by the related reading device. This is accomplished by a simple program contained within the permanent memory of the device.
  • the cartridge will cause to be displayed in the reading device the words "cartridge cannot be read by this device” and to not allow any further access to any information contained on the cartridge by the particular reading device in question. If the numbers match, further access will be allowed.
  • the clerk enters the serial number for the device into the central data bank through the cashiers station.
  • the central data bank contains a list of the serial numbers of all approved reading devices and the corresponding special code number.
  • the personal identification card for the customer purchasing the reading device is placed by the clerk into an appropriate slot on the cashier's station and the magnetic strip on the identification card is encoded with the applicable serial number for the reading device being purchased.
  • the user needs only present his personal identification card and the cartridge to be properly coded to the clerk and by inserting the cartridge into the cartridge slot and the identification card into the card slot and pressing the designated button on the cashiers station, the new cartridge will be correctly encoded to be readable by the user's reading device.
  • a publisher may expand or limit access to those users having a proper authorization or defined purpose. For example, a publisher may purpose encode a portion of a selected book to be readable by any user, i.e., any purpose encoded. This type of purpose encoding may be used on, for example, promotional books or some governmental publications. Other information may be purpose encoded to limit access to a single user to only view the information, i.e., classified material. The requirement reduces the possibility of unauthorized use of information titles.
  • the customer takes the customer identification card to the book display area for shopping 400. If the customer previously opened an account, the customer will not have to go through the above described process and can proceed directly to shopping area 400, where the customer will select a book inventory card matching his book selection.
  • the book inventory card has the book ISB numbers, a bar code and information related to the particular information title, author, publisher, and edition date printed thereon.
  • the customer brings the selected book inventory card to the cashier's station 308 A.
  • the cashier magnetically reads the codes on the customer's LD. card and scans or manually enters the bar codes on book inventory cards 402.
  • the customer then makes a proper payment, and the customer codes and information title bar codes are transmitted to host fileserver 304.
  • Server 304 searches the existing customer account file to match the -19- identification (i.e., pin and password) and will generate a downloaded book list file based on the bar codes from the book inventory cards or as manually loaded. Server 304 downloads the file to Book Bank 302 which electronically generates a portfolio of information titles ready to be downloaded on demand. The user can then proceed to Book Bank 302 at any later time and insert the identification card into the slot 340 of Book Bank 302 and a coded point-of-purchase cartridge 374 into Book Bank cartridge slot 348 to identify himself with a personal identification number, as illustrated in step 404. The user also enters a password 406 into the key pad 338.
  • -19- identification i.e., pin and password
  • Book Bank CPU 350 matches the personal identification number with a downloaded list portfolio
  • Book Bank CPU 350 starts downloading the requested information from local storage 356, through buffer memory 360, to media driver 354 which copies the information onto cartridge 374.
  • the data is dynamically encrypted to make the data uniquely readable only by authorized reading devices.
  • the dynamic encrypting is described below in Section D.
  • the user removes cartridge 374 and then inserts cartridge 374 into his personal reader/computer to access the information acquired.
  • the reader/computers are configured for long-term reading applications.
  • the reading application software is stored on cartridges with the ability to read the applicable software on the cartridges permanently stored within the memory of the reader/computers or other authorized reading device.
  • a user may select portions of selected information to combine and download.
  • the user may select at least one book and select at least one portion of each selected book. If more than one portion is selected, where each portion includes up to the entire selected book, the portions are combined and downloaded to user's cartridge 374.
  • a student may be required to download specific chapters from ten different books. After selecting the ten books and ten specific chapters of the selected books, the selected information is combined, encrypted using the determined level of protection, and downloaded to the students cartridge 374.
  • a user may -20- select individual tracks from music information to combine and download the selected tracks to a single cartridge 374 for playback at a later time.
  • a point of rental system is illustrated in Figure 9.
  • the rental system is identical to the point of purchase system previously described herein (e.g., includes a host fileserver) except with respect to the differences pointed out below.
  • a single site or Book Bank may serve as a point of purchase system site and a point of rental system site and a point of delivery system for promotional or commercial information site or any combination thereof.
  • the point of rental system includes Book Bank user terminal hubs 41 OA-B coupled to terminals 412A-E, and customer service station 414.
  • User terminals 412A-E allow a customer to do an information title search and index search of the Book Bank memory and to transmit other information between Book Bank 302 and himself.
  • Customer service station 414 combines the function of customer service as well as the cashier's station. For example, at customer service station 414, a credit customers' debit card can be credited and the ATM operation can be overridden, via ATM module 416, if necessary. Information can be printed out from customer service station 414 via printer 418.
  • Point of rental storage media 420 is used in the rental system.
  • Point of rental media 420 is the same as point of purchase media 374 except that media 420 includes an automatic erasure mechanism that erases the information downloaded after the expiration of a preset time interval. More specifically, when information is downloaded from Book Bank 302 onto media 420, Book Bank 302 also downloads a "time stamp" equal to the time period for which the user has paid to retain a copy of the information.
  • the time stamp could take the form of a value -21- loaded into a memory location on media 420, which value corresponds to the rental time period. During usage, the actual usage time elapsed is subtracted from the electronically stamped time period.
  • the information title will self-destruct, i.e., be deleted from media 420.
  • Another method for automatic erasure is for each rental or library cartridge to contain a real time clock and independent rechargeable power supply. When the cartridge is initially encoded for use, the real time clock mechanism is activated. As rented information titles are being downloaded, an expiration date is logged into the index information for each title.
  • the cartridge With this method, if the real time clock falls to operate, the cartridge will become unreadable without repair. To repair a defective cartridge, the user need only bring the cartridge together with his personal identification card to the nearest service center where the real time clock will either be repaired or the relevant information titles will be loaded onto a replacement cartridge. The user will be credited for any lost time while the cartridge was unreadable.
  • a service center could be located, for example, near each separate point of delivery site.
  • the automatic erasure program could be created as an operating system module or as a separate executable program designed to be "terminate and stay resident" (TAR).
  • a module integral with the operating system is preferred since -22- such a structure ensures that if the operating system is viable, the automatic erasure module is viable.
  • the user may return to the point of rental site and "re-rent" the information.
  • the user could renew the rental via a modem coupled to the reader.
  • the user when a point of rental patron enters a point of rental site, the user will use a valid ATM card, bank card, credit card, or some other debit card and proceed directly to a user terminal 412A-E.
  • the user can perform information title searching and download an order entry to Book Bank 302.
  • Book Bank 302 When the download entry is complete, the user will go to Book Bank 302, insert a rental media, an identification card, and a credit card, bank card, or debit card into Book Bank 302 for the transaction approval. If the transaction is not cleared or if the ATM system is not working properly, the patron can proceed to the customer service center and have the attendant manually override the ATM process, if appropriate. If the user does not have a valid ATM credit card or debit card, the user will go to the customer service center, pay the service clerk to receive credit on the Book Bank debit card. Then the customer may proceed to the user terminal where the user downloads the order entry.
  • the patron After the transaction approval is cleared, the patron inserts point of rental media 420 into Book Bank media driver 354, has his personal identification card scanned and enters a password.
  • the information is dynamically encrypted and downloaded from Book Bank 302 to media 420 with an electronic stamp of the number of hours of usage authorized for each information title or an expiration date. After the downloading, the user will apply this media on the personal reader/ computer to access the information on the media.
  • Typical examples for the point of rental site are libraries (commercial, education or public access) and book rental shops.
  • the information downloaded -23- by the user may be free of charge to the users such as in the case of a library, or may incur certain rental fees at a predetermined rate, such as in the case of a rental shop or library charging on a per page use basis.
  • Any given point of rental site may operate as a traditional library in allowing free use to library members for a limited period of time or may operate as a rental shop where fees are collected from users in accordance with the period of use allowed.
  • a Book Bank subsystem couples to a Book Bank and host fileserver as described in more detail below.
  • the central element of the subsystem is a Book Bank which is a modified version of the point-of-purchase Book Bank 302.
  • the subsystem is specifically configured for the collective use by members or the staff of a commercial or business entity or a corporation. It delivers and it recalls information titles among authorized users within the business or corporate entity, and provides the capability of limiting the number of copies of a given work that may be distributed to other authorized users. If all of the licensed copies of any information titles have been checked out by the staff of an organization, then no other users may access the same information title within that particular subsystem until one or more of the licensed copies of the particular information is uploaded or recalled to the subsystem or additional copies are purchased.
  • the information is purpose encoded so as to limit a purpose to which access by a user to the information is allowed.
  • a central corporate library may allow specific users, i.e., R&D personnel, to selected information, i.e., pending patent applications. All non-R&D personnel users without the proper purpose, or authorization code, are prevented from accessing the information.
  • a commercial or business entity may lease the limited use of an unlimited number of copies or the use of a specified portion of a given information title. Under such circumstances, the commercial or business entity would be charged each time the -24- subsystem is accessed from a participating work station for the portion of a specified information titled accessed and for the period of time the access occurs.
  • the restricted operations would be those related to the duplication or transmission of data related to information titles being accessed through the subsystem.
  • Book Bank subsystem 422 contains a high resolution color graphic display 424 coupled to CPU 426 to display the instructions or status of subsystem 422.
  • Subsystem 422 also includes a keyboard 428 with limited access to the system for keying selections for operating certain given functions such as product display.
  • Subsystem 422 has a media driver 430 for the downloading of information and a local storage 432 which holds a portfolio of information the business entity has ordered for use.
  • a secondary storage 434 is also provided to hold all the software programs that control and perform the functions of subsystem 422.
  • Subsystem 422 further includes a power supply 436 and an uninterrupted power supply 438 to assure continuous operation during power failure downtime.
  • a printer 440 is provided to print various reports.
  • Book Bank subsystem 422 has a network interface 442 that connects subsystem 422 to Book Bank 302 and host fileserver 304.
  • Network interface 442 also may couple to the corporate or business entity network system 444. With such a structure, the corporate entity may transmit or download its own corporate proprietary information through Book Bank subsystem 422.
  • Media port extension interface 446 provides access by an adequate number of media drivers to the desired corporate terminals for corporate network stations.
  • Media driver 430 is connected to the terminals or stations by a proprietor driver card.
  • the corporate administration can utilize the dynamic encryption and the dynamic downloading function of Book Bank subsystem 422 to incorporate and accommodate the corporate proprietary information.
  • the corporate proprietary -25- information may be transmitted to Book Bank subsystem 422 using an encryption process and then downloaded selectively to the destination port and to the properly identified authorized personnel.
  • Book Bank subsystem 422 is not only a customized corporate library of copyrighted and proprietary information, but also is a corporate document security device that encrypts and dispatches the corporate documents and the corporate confidential proprietary information in the corporate network system.
  • a separate unit e.g., a memory storage unit restricts certain operations which may be performed from the work station so long as the work station has access to encrypted information from the subsystem. The restrictions limit or prevent operations related to the duplication or transmission of data.
  • the promotional system is a point of delivery system for promotional and commercial information. It distributes promotional and commercial information in electronic format and users may either view the digitized promotional and commercial information at the site or download the information to their personalized media for later viewing. User's call access the promotional and commercial information including the dynamic viewing electronically of advertising available discounts, commercials, special promotional events, software demos and product catalogs. Users may even shop electronically by manipulating the promotional and commercial information and placing orders through E-Mail from a personal reader/computer or by ordering directly from an interactive promotional Book Bank.
  • the promotional Book Bank has the same structure as Book Bank 302 for the point-of-purchase system.
  • a promotional system in accordance with the present invention is illustrated in block diagram form in Figure 11.
  • Book Bank 302 is networked to host fileserver 304.
  • the promotional system further -26- includes a number of promotional units 448 A-D which electronically display and promote products.
  • Unit 448A is coupled directly to central transactional data base 104 and central information bank 100 while units 448B-D are coupled to host fileserver 304.
  • Unit 448A receives information from merchant terminals 450-A-D and host fileserver 304, receives information via merchant terminals 450E-G.
  • host fileserver 304 receives advertising and special offer updates from the local businesses, national or regional advertisers, and corporate sponsors through merchants terminals (MT) 450E-G.
  • the host fileserver 304 is also networked to a central transaction data base which, in turn, provides a report to the publishers, advertisers, accounting, auditing firms, merchandise vendors, and others.
  • the promotional Book Bank allows selective downloading of promotional and commercial information to the user's point of rental media (see discussion in Section B, System Architecture, for explanation of such downloading) for the user' s private review and personal shopping at his convenience.
  • the promotional and the commercial information downloaded will self-destruct (i.e., automatically erase) at the expiration of a pre-determined time interval as explained above with respect to point of rental delivery systems.
  • the promotional Book Bank also provides a user interactive self-service vending feature.
  • the user may order products or information electronically via the network.
  • Some of the promotional functions are : coupons on demand, virtual shopping, catalog sales, demos ; subscription orders, electronic applications of credit cards, calling cards, or other types of services.
  • Some public domain information distributed such as community events, ticket sales, institutional events or even public bulletins could also be distributed with the promotional information as a free or low cost service to the community.
  • the promotional and the commercial information flow is very similar to the information flow within the point-of-sale delivery system.
  • the information sources are local -27- businesses, national or regional advertisers, and appropriate sponsors through advertising agents and other entities.
  • a tracking entry is transmitted, or stored, in an appropriate transactional database, for example central transactional database 104, to record movement, or transfer, of information from a first location to a second location.
  • an information owner may monitor movement of the information and take appropriate action.
  • a tracking entry may be recorded in transactional database 104 each time any information is copied into, removed from, or copied from, Book Bank 302.
  • the information owner may charge the receiving or transferring party a fee as defined by the owner of the information. The fee charged may be based on a variety of factors including, but not limited to, an economic value of the information, use or purpose of the information, number of users, and the availability from other sources.
  • the tracking entries may also include additional data so that the information owner may determine who transferred the information, the amount of information transferred, type of transfer, i.e., rental for specified period of time, and the time of transfer.
  • Tracking entries in one embodiment, are recorded for all transfers, i.e., Book Bank 302 to cartridge 374 and central information bank 100 to Book Bank 302. Utilizing these entries, an information owner may also determine the type of information that is being transferred, the number of transfers, and the identification of the information receivers. For example, the information may be used to determine if certain promotional materials are being received by targeted users, or to determine responses to different information pricing strategies. -28-
  • Dynamic encryption refers to the process in which the Book Bank works together with the storage media to perform a proprietary encryption of downloaded data.
  • different levels of encryption are utilized based on a series of factors or variables. These variables include, but are not limited to, an economic life, a market value, a general availability, a replacement cost, time sensitivity, and potential number of users, of the information. For example, today's TV listings may have a low level, or complexity, of encryption as a result of the low market value, low replacement cost, and general availability from many sources.
  • a multi-volume legal treatise may, for example, have a high, or complex, level of encryption as a result of the limited availability, replacement cost, and long economic life of the information.
  • a source i.e., publisher
  • the level of information encryption in any location, i.e., bank 100, may be higher or lower than another location, i.e., cartridge 374. More specifically, each time information is downloaded, or transmitted, the level of encryption may be independently altered, or determined. For example, the level of encryption at central information bank 100 may be different, i.e., higher or lower, than the level of encryption of a book downloaded to a user's cartridge 374.
  • Figure 12 illustrates a three level encryption process.
  • the data prior to transmitting information on the network, the data may be encrypted. This facilitates preventing unauthorized users from accessing the transmitted information on the network.
  • the data may be encrypted prior to being placed in a book bank. Publishers or other -29- owners of the information may have approval authority over this level of encryption to provide such information owners with satisfaction that the data is adequately protected.
  • the storage media ( Figure 7) includes a proprietary environment for building, reading, viewing and processing.
  • the media also has a commercial operating system environment for processing information files.
  • An information file directory registry forms a part of the proprietary application, and a file directory pointer is contained in the operating system application.
  • the dynamic encryption process uses the permanent serial numbers stored in the storage media, the user's personal identification number, a personal signature code number, and a password to further encrypt the data stored in the book bank as the data is downloaded to a user's storage media.
  • the personalized variables and codings are combined with various individualized information file variables to form an individualized data structure for the data downloaded to the user's personalized media.
  • those information files are individualized pertaining to the media, the version of software, the information file itself, and other variables.
  • the dynamic encryption assists in reducing the possibility of the unauthorized use of proprietary or other information by causing all information downloaded through the point-of-sale delivery system to be readable and accessible by a selected number of user readers/computers. Specifically, data storage medium accessible from one reader/computer will not be accessible using another reader/ computer unless such access has been prearranged such as by providing the other reader/computer with an identical user identification number and password.
  • DCP Z8068 Data Ciphering Processor
  • the DCP contains the structure to encrypt and decrypt -30- data using National Bureau of Standards encryption algorithms. It may be used in a variety of environments including in dedicated controllers, communication concentrators, terminals and peripheral task processors in general processor systems.
  • DCP provides a high throughput rate using cipher feedback, electronic code book or cipher block chain operating modes. The provisions of separate ports for key input, clear data and enciphered data enhances security.
  • the host system communicates with the DCP using commands entered in the master port or through auxiliary control lines. Once set up, data can flow through the DCP at high speeds because input, output and ciphering activities can be performed concurrently.
  • encryption and decryption may be performed in dedicated hardware and/or software functions.
  • each reader and cartridge 374 may include a dedicated encryption integrated circuit (IC) and a dedicated decryption IC to maximize the transfer speed of the information.
  • the level of encryption and decryption may altered by adding additional functions and by enabling or disabling the additional levels.
  • each regularly used alpha or numeric symbol is assigned a corresponding number as illustrated in Table 1.
  • serial number stored on the cartridge would be used to determine how many slots the code should shift to the left at the start the encrypting. For example, if the serial number ended with six, before starting of encryption, the code would be shifted to the left by six places. Table 2 illustrates the code table after the shift.
  • the selected user password then is used to determine after how many symbols the code should again shift to the left.
  • the password were ROSE, then using the codes from Table 2, the numeric statement for rose would be 24212511.
  • the corresponding numbers are added together until reaching, a number between 1 and 10, the number reached in our example is 9 [18.9]. So after every 9th letter, the codes would be shifted another 6 spaces to the -32- left. After the encrypting of 9 letters, the codes would be set as set forth in Table 3.
  • decoding an -33- encrypted phrase is simply a reversal of the process applying each of the tables in reverse.
  • access to the information is monitored, or recorded, to determine attempted unauthorized access to the information. If an unauthorized access is recorded, or stored, onto a user's media, for example cartridge 374, the next time that user attempts to download additional information to cartridge 374, an unauthorized access message may be transmitted to notify the appropriate party, for example the cashier. As a result of the unauthorized access message, the cashier may revoke user's cartridge 374, notify the proper authorities, or record an entry into the user's account for future action. More specifically and in one embodiment, the unauthorized access is determined by first reading, or recording, the specific identification data from the information requester, or receiver. If the data provided by the information receiver is determined to not match, i.e., is unequal, predefined values, the unauthorized access message is recorded and information exchange is prevented. The data determination may be completed using known comparison hardware and/or software functions.
  • the unauthorized access message may be generated if a user having an incorrect purpose, or authorization code, attempts to access unauthorized information. For example, in a corporate environment, if a user attempted to access information for which the user did not have the proper authorization code, an unauthorized access message is generated and may be sent to, for example a system -34- administrator or a security official. Different level of unauthorized access messages may also be generated. For example, a high level message may be generated if a user attempts to decrypt the information stored in various locations within the system, for example Book Bank 302 using an unauthorized device. A lower level message may be generated if a remote user has attempted to access data that is one level above that user's authorized level.
  • Book Bank 302 may be configured to capture and exchange real-time information. For example, as a professor presents material to students in a classroom, the professor' s presentation may be captured and converted into copyrighted text and exchanged with remote users. This conversion may be completed using known voice to text conversion systems using a known computer system. The professor's presentation may be supplemented with previously prepared, or concurrently prepared, written text. The text may be digitized and properly integrated into the text using known methods. Remote users may receive information from the professor's lecture in real-time as the material is presented or may receive the information at a later time. Remote users receive only that information which the remote user is authorized to receive from Book Bank 302 as described above.
  • Book Bank 302 is configured to receive audio, video, and/or computer software code.
  • Book Bank 302 is coupled to a Video Cassette Recorder (VCR) 600, a stereo system 610 including a cassette recorder/player 620, a Compact Disk (CD) player and/or recorder 630, a television 640, and a computer 650.
  • VCR Video Cassette Recorder
  • CD Compact Disk
  • authorized information is received from Book Bank 302, and in one embodiment is stored to a storage device, for example a memory device 660.
  • the memory device 660 may be a plurality of memory cells, for example Read Access Ram (RAM), Read Only Memory (ROM), a rotating storage unit, i.e., a hard disk, -35- a magnetic storage media, i.e., magnetic tape, or other storage media, for example an optical storage media.
  • RAM Read Access Ram
  • ROM Read Only Memory
  • a rotating storage unit i.e., a hard disk, -35- a magnetic storage media, i.e., magnetic tape, or other storage media, for example an optical storage media.
  • the remote user has selected the appropriate information to receive from Book Bank 302, the information is stored in device 660.
  • Device 660 is configured to transfer the stored information to the selected playback device, i.e., Video Cassette Recorder (VCR) 600, stereo system 610, cassette recorder/player 620, CD player/recorder 630, television 640, or computer 650.
  • VCR Video Cassette Recorder
  • the remote user downloads, or receives, the entire contents of a top ten music album.
  • the contents of the album is stored in device 660.
  • the information may be permanently stored or may be stored for a fixed period of time or number of uses.
  • the remote user may transfer the information to stereo system 610 for listening.
  • the information may be transferred to, or through, device 660 to one of the other components, i.e., cassette recorder 620, VCR 610, CD recorder 630, or computer 650.
  • the information may be playback using only those components, i.e., cassette recorder 620, VCR 610, CD recorder 630, or computer 650, coupled to device 660.
  • the remote user may download a feature movie by saving the movie on a tape using VCR 610. The remote user may then playback the movie as authorized as long as the tape is playback in VCR 610 that is coupled to device 660.
  • the remote user may download a software program so that the information is stored in device 660 or in a storage media in computer 650.
  • the program may be configured to execute only from computer 650 when computer 650 is coupled to device 660.
  • the above described system facilitates controlled and monitored exchange of information between many types of information owners, distributors, and users.
  • a user may obtain many types of authorized information.
  • the user may, as determined by the information owner, purchase, rent, or obtain without charge, the authorized information.
  • the information in one -36- embodiment, is encrypted using various levels, or complexities, of encryption to prevent unauthorized access.
  • the level of encryption depends upon a variety of factors or variables, for example, the economic life of the information.
  • Book Bank 302 may include information representing a reference dictionary and a top ten music album. Information from the reference dictionary and the album may have the same or different levels of encryption.
  • students from a determined class may access the reference dictionary information without charge as the result of the school purchasing an unlimited use copy of the information, however, those same students would be required to purchase any information downloaded from the album.
  • the type of access may differ for different portions of the information. For example, a first track of the album information may be coded so that anyone may download the information without charge, however, the remaining tracks of the album information may be coded to require payment to download.

Abstract

An information distribution system, in accordance with one form of the present invention, includes a central information bank (100) and a central transactional data base (104) coupled to point-of-sale delivery systems (202). Information flows between each point-of-sale delivery system and the central information bank and central transactional data base via communication network such as the telephone network, a satellite network, or any other network suitable for the transfer of information. The point-of-sale delivery systems may take one of many forms including a point of purchase delivery system, a point of rental delivery system, a 'book bank' (116A) subsystem, a promotional delivery system, or any combination of such systems. Information exchanged within the system is controlled using various levels of encryption and is monitored to prevent unauthorized exchange.

Description

-1- INFORMATION DISTRIBUTION SYSTEM
Field of the Invention The present invention relates to a system for distributing information in electronic form and more particularly, relates to a communication network for transmittal information between a central information bank and a user interface.
Background of the Invention With the current information publishing and distribution system, information usually is delivered as fixed printed images on paper or fixed in other media forms such as tapes, diskettes, cartridges, laser disk, or compact disk. Prior to and at various points in the delivery process, the information usually is warehoused. Eventually, the information is delivered to retail outlets scattered throughout a distribution territory. Upon receipt of the information, the retailers either store the information or display the materials for resale.
The present publishing and distribution system has many disadvantages. One disadvantage is the amount of time and labor required for preparing, printing, producing and distributing information. Another disadvantage of the current system is the lack of control over the production quantity of information, i.e., the number of copies made and sold. The current distribution system is further disadvantaged by the time, work and costs required in publishing and distributing information updates.
In an attempt to improve the dissemination of some types of information, bulletin board networks have been established. Networks, such as Internet, also have been or are being established. Known networks generally utilize a telephone network or some other network as a communication media and can be accessed using commercially available software and almost any type of computer. As presently operated, however, such networks are unsuitable for the distribution of proprietary information and information which is intended for limited copying. The free transfer of information using such networks provides little or no protection for copyright and proprietary information owners.
Summary of the Invention The present invention, in one aspect, is an information distribution system which overcomes disadvantages and shortcomings of the current information publishing and distribution system. An information distribution system, in accordance with one form of the present invention, includes a central information bank and a central transactional data base coupled to point-of-sale delivery systems. The central information bank and central transactional data base do not necessarily have to be co-located and can be implemented on different, but coupled, computer systems. Information flows between each point-of-sale delivery system and the central information bank and central transactional data base via a communication network such as the telephone network, a satellite network, or any other network suitable for the transfer of information. More specifically, information obtained from publishers is digitized, i.e., converted to an electronic form, to create a master copy in a uniform electronic format. Information obtained from publishers in digitized format simply is converted into the uniform electronic format. The master copies are stored in the central information bank. The central transactional data base performs a record keeping function.
Particularly, the transactional data base records and stores information related to each transaction performed at each point-of-sale site. Upon request, the transactional data base transmits sales data to a requesting publisher.
The point-of-sale delivery systems may take one of many forms including a point of purchase delivery system, a point of rental delivery system, a "book bank" subsystem, a promotional delivery system, or any combination of such systems. In the point of purchase delivery system, information is downloaded, i.e., copied, onto a user's storage media for later access by the user. The point of rental delivery system is similar to the point of purchase system except that in addition to downloading information, an automatic erasure time period designation is downloaded. As explained in more detail hereinafter, the time period designation is utilized so that upon expiration of the designated time, the downloaded information is automatically erased from the user's storage media. The book bank subsystem is a sub-network established between authorized users, such as employees of a corporation. Each user within the sub-network with the proper authorization, or approval, can access designated information stored within the subnetwork. Such a configuration enables sharing of information. In the promotional delivery system, promotional and other commercial information can be accessed for viewing and ordering of products.
A most important element of each point-of-sale delivery system is the user interface, sometimes referred to herein as the "Book Bank". The term Book Bank, as used herein, refers to the interface between the network and the user. Although the term Book Bank may imply "booktype" material, such term is not so limited. The material may be of many types such as movies, music, video, images, text, audio, and computer software material.
The Book Bank is a self-service, user interactive information vending device. Each Book Bank contains a high volume, local memory storage having, a customized portfolio of the most demanded information products for the particular site at which the Book Bank is located. Other information is transferred, via commercial communication networks (i.e., telephone networks, cable systems, satellite or cellular system or other similar communication networks), to a Book Bank for supplemental, secondary and less demanded purposes. A central processing unit contained within the Book Bank and coupled to the Book Bank local memory, storage controls downloading and dynamic encryption of the information.
In one embodiment, a user may select portions or entire contents of one or more books. The selected information may then be combined and downloaded to the user's storage device, for example a cartridge. The cartridge, in one embodiment, includes a unique identification number and a determined amount of memory for storing the selected information.
Widespread use of the present invention should greatly simplify, and reduce the costs associated with, the publication and distribution of information.
Particularly, the present architecture reduces the amount of time and resources required for the distribution of information. Further, information updates can easily be made simply by updating the master copy stored in the central information bank and then either writing over the copies stored in each Book Bank with the updated master copy or downloading the updated master copy and storing both the old and updated versions in each Book Bank. Each Book Bank contains an electronic index of the various information titles accessible from the Book Bank. In addition, the number of production quantities of a particular work can be readily controlled using the central transactional data base to track the number of copies made and sold, within the network, for each work.
The present invention also readily enables controlling reproduction of information and greatly simplifies updating of text, and the dynamic encryption of text provides copyright and proprietary information owners sufficient confidence in the present network to allow such information to be transmitted on the network.
Brief Description of the Drawings
These and other objects and advantages of the present invention, together with further features and advantages thereof, will become apparent from the following detailed specification when read together with the accompanying drawings, in which:
Fig. 1 illustrates one embodiment of the present information distribution system architecture;
Fig. 2 illustrates information flow in the system architecture shown in Fig. 1; Fig. 3 is a block diagram illustration of a point of purchase delivery system;
Fig. 4 is a more detailed block diagram illustration of the host fileserver shown in Fig. 3;
Fig. 5 is a perspective view of a Book Bank embodiment; Fig. 5A is an alternative Book Bank embodiment;
Fig. 6 is a block diagram illustration of the Book Bank circuitry;
Fig. 7 is a block diagram illustration of an end user's storage media;
Fig. 8 illustrates the information flow for the point of purchase configuration; Fig. 9 is a block diagram illustration of certain elements of a point of rental delivery system;
Fig. 10 is a block diagram illustration of certain elements of a Book Bank subsystem;
Fig. 11 is a block diagram illustration of certain elements of a promotional delivery system; and
Fig. 12 is a flow chart illustrating the encryption process implemented in accordance with the present invention; and
Fig. 13 is another Book Bank embodiment.
Detailed Description of the Drawings The following sections provide a brief overview of the present system and a detailed description of the system architecture. Following the detailed architecture description is a detailed description of point of sale delivery configurations. A detailed description of the various levels of encryption which may be used in the present system is then provided. -6-
A. Brief Overview
In accordance with one embodiment of the present invention, information is distributed from a central information bank to a user's personalized storage medium. Information to be so distributed by the present system is received from outside sources either electronically, over various communication networks (e.g., telephone lines, cable systems, cellular systems or other similar commercial communication networks) or from various storage mediums (e.g., magnetic or electronic disks, cartridges, or tape reels or compact disks, laser disks, tape cassettes, etc.), or in hard copy format. If information is received in a hard copy format, it is initially converted to a standard digital format (e.g., ASCII text, DOS text or other similar standard commercially available text format) by scanning or direct transcription. Then the information is digitized, formatted, compressed and initially encrypted to form an electronic master copy which is stored in the central information bank. The master copy is duplicated electronically and dispatched electronically through a communication network, such as a telephone or satellite network, to a point-of-sale delivery system. Book Banks form a part of such a delivery system, and the electronic copies are retained in the Book Banks for downloading into a user's personalized storage medium. Initially, a user selects the information to be downloaded and a tracking entry is made into a transactional database to record the transfer. Prior to and during downloading of the copy on the user' s storage medium, the information is dynamically encrypted utilizing a varying level of encryption which is dependent upon a variety of variables, for example, an economic value of the information. A "dynamic" encryption process is utilized so that only the electronic reader associated with the user card used to access the information from the Book Bank and download the information to the user storage cartridge can be utilized to display the information in an understandable text format. -7-
B. System Architecture
Figure 1 illustrates one embodiment of the present information distribution system. The system is shown, for illustration purposes only, as being implemented across the world. Referring to Figure 1, a central information bank 100 is the central "library," or storage location, for information. Peripheral information banks 102A-F, coupled to central information bank 100, are libraries, or storage locations, for community oriented information. For example, the information stored in central information bank 100 accessed most often from the San Francisco bay area peripheral information bank 102A may not be accessed often from the peripheral information bank for Rome, Italy 102E. In any event, central information bank 100 is coupled to each peripheral information bank 102A-F to enable sharing of information. As explained in more detail hereinafter with respect to peripheral information bank 102F, each peripheral information bank 102A-F is coupled to one or more point-of-sale sites. A central transactional data base 104 coupled to the central information bank 100 and the peripheral information banks 102A-F, serves a central record keeping function for central information bank 100 and peripheral information banks 102A-F. Central information bank 100 and central transactional data base 104 preferably, are commercially available main frame computers, such as an IBM main frame computer. The particular main frame model selected depends on the amount of information to be centrally stored in the network, the extent of record keeping functions to be performed, and the speed at which transfer and processing of information is to occur. Importantly, the present invention is not limited to any one particular computer to serve as the central information bank and/or the central transactional data base.
As shown in Figure 1 is an exploded view of the various couplings between central information bank 100 and transactional data base 104, peripheral information bank 102F and various point-of-sale delivery sites, particularly, point of purchase sites 108A-C, point of rental sites 110A-D, promotional sites 112A-D, -8- and Book Bank subsystem sites 114A-C. Each point of purchase site 108 includes a point of purchase transactional database, represented by a box, and a user interface, represented by a circle. As explained above, the user interface is sometimes referred to herein as the "Book Bank." Specifically, point of purchase site 108 A contains Book Bank 116A and transactional data base 118 A, site 108B contains Book Bank 116B and transactional data base 118B, and site 108C contains Book Bank 116C and transactional data base 118C. Since the central information bank 100 and peripheral information bank 102F, and specifically peripheral information bank memory storage unit 106A, also could serve as Book Banks, such units are illustrated as circles. Further details regarding Book Banks and transactional data bases are provided below in Section C.
As illustrated in Figure 1, each point-of-sale delivery system, such as systems 112A, 108A-B, 110A, and 114A-B, may be networked directly to peripheral information bank 102F, or the point-of-sale delivery system, such as systems 108C, 110B-D, 112B, 112D and 114B-C, may be networked to the point of purchase site 108B, which is networked to the peripheral information bank 102F. Point-of-sale delivery system configurations are explained in more detail below in Section C. At the level illustrated in Figure 1, however, it is important to understand that the delivery systems may be integrated into various combinations, such as a promotional point of rental system as shown by HOB and 112B, or a promotional point of purchase system as shown by 108B and 112C or a combination of a promotional, point of purchase, and point of rental systems as shown by 108C, 110D and 112D.
Communication network links between the central information bank 100 central transactional data base 104, peripheral information banks 102A-F, and point of sale sites can be made utilizing one or a combination of many commercials available networks such as telephone, satellite or cable networks or any other medium suitable for transmitting information in digitized format. Many well- known protocols could be used in connection with the present system. For example, if the Internet is used as the "backbone" network, the well-known TCP/IP protocol could be used.
Figure 2 illustrates the flow of information in accordance with the embodiment of the system architecture illustrated in Figure 1. For ease of illustration only, peripheral memory storage unit 106A is consolidated into central information bank 100, and peripheral transactional data base 106B is consolidated into central transactional data base 104. It should be understood, of course, that communication links between the peripheral information bank 102F and central information bank 100 and central transactional data base 104 are provided. As illustrated by the inputs provided to block 202, a publisher will receive inventory reports from the central information bank 100 and sales data from central transactional data base 104. Based on this and other information the publisher can determine whether to place additional information on the network. For ease of reference such information is sometimes referred to herein as "information titles" as shown in block 204. If the information is not present in an electronic format, then the information is digitized 206, disposed in an electronic format 208 and then undergoes electronic authoring 210. The digitized information is then transmitted to a data converter 212 for converting the digitized information into a uniform format. For example, if the central information bank 104 and central transactional database 104 are DOS-based systems, the data converter will convert the information into a DOS format. If the information titles are in a digitized format, the information titles are transmitted directly to data converter 212 for direct conversion into the uniform format as illustrated by line 214.
Once the data is in a uniform, digitized format, it undergoes an initial encryption and compression to both reduce the amount of storage space required to store the data and to make the data ready for being transmitted with less risk of unauthorized use while being transmitted through a communications network. The compression is accomplished through the use of one of the commercially available -10- compression protocols. The initial encryption is performed using one of the standard available encryption protocols as discussed below in Section D.
Once in uniform, encrypted and digitized form, the information titles are stored in central information bank 100. An electronic index listing all titles available and accessible by author, title, subject or ISBN codes is prepared. As new information titles are added, the electronic index is updated to include the new titles. The information titles may then be downloaded to Book Bank 116A. The information titles and corresponding electronic index information may, in addition to or rather than being stored in central information bank 100, be disposed on laser disk masters as illustrated at block 216. Laser disk masters 216 can then be installed directly into Book Bank 116A.
Prior to downloading desired information titles, the user may access an electronic index which contains all the information titles available for downloading from Book Bank 116A. Through the electronic index, the user obtains the listing for available information titles by author's name, by specific title of the work, by ISBN code or by subject matter. Once compiled, a listing of the available information titles included in the index category selected and the other necessary information to allow the user to purchase or rent any information title contained in the index category listed is displayed on the video screen. Using the video listing, the user selects any title listed thereon and obtains a printout of the relevant information through the printer slot 342. Upon proper access by a user, the information titles may then be downloaded from Book Bank 116A onto a user's storage media 218.
After downloading of information and corresponding electronic index information form central information bank 100 or installation of laser masters 216 to Book Bank 116A, inventory reports are generated by Book Bank 116 A and transmitted to central information bank 100. These inventory reports reflect the information titles presently stored in Book Bank 116A. These reports are then are sent to publisher 202. Also, a download completion report is sent from Book Bank -11-
116A to transactional data base 118 A, sometimes referred to herein as a host fileserver, which in turn generates a status sales report. The sales report is transmitted to central transactional data base 104. Transactional data base 104 sends the necessary action instruction back to host fileserver 118 A and a transaction report to publisher 202 for uses such as accounting and auditing.
For publishers who wish to allow a user to be able to produce a hard printed copy of a portion of an information title for study purposes, when the information titles are being downloaded into the master file, special authorization codes are included in the data. The codes accompany the information title to the storage medium, or cartridge, of the user. The codes limit the particular amount of the information title which the user may produce in hard copy. With such coding in place, the user may print, from the cartridge, the allowable amount of text as a hard copy. The cartridge retains information relating to such printing and restricts further printing once the limits have been reached. The user determines, within the defined limits, or authorized purposes, the portion of the text to be produced as a hard copy by using the high lighting features of the reader programming to make a selection.
C. Point-of-Sale Delivery System Configurations
The point-of-sale delivery systems, as previously discussed, are classified by function. The functions include one or more of the following: (1) point of purchase delivery system, (2) point of rental delivery system, (3) book bank subsystem, and (4) promotional delivery system. The configurations for each of these functions are separately discussed in detail below.
1. Point of Purchase Delivery System A point of purchase system is illustrated in block form in Figure 3. The point of purchase system is described herein for illustration purposes only as a system from which books can be purchased. As pointed out above, however, the -12- system is not limited to books and other media capable of being expressed in electronic form such as computer software, music and video could be purchased utilizing the present system.
The point of purchase system illustrated in Figure 3 includes a Book Bank 302 coupled to host fileserver 304. Server 304 is coupled to a customer service terminal 306 (of course, there could be more than one terminal) and a cashier's station 308A which is further interconnected to other cashier stations 308B-D. Server 304 also is coupled to an institution network 310 which in turn connects to institution terminals 312A-E. Service terminal 306, cashier stations 304A-D and institution network 310 are connected to server 304 via a computer communication link such as a commercially available computer networking system such as CompuServe or Internet. Book Bank 302 and server 304 are connected to central information bank 100 and central transactional database 104 as hereinbefore explained with reference to Figs. 1 and 2. Cashier stations 308 A-D are in serial, linear networking connections which allows the addition and removal of a number of cashier stations at any time. This configuration accommodates extra cashier stations required during rush seasons or rush hours and the desire to remove cashier stations for better utilization of space after the rush seasons. Customer service terminal 306 has local processing capability that provides customer services such as personal identification initiation, personal identification number changes, processing of complimentary books, book refunds, customer information entries and updates. The customer services terminal 306 can also provide the retail outlet with internal administration and the management functions, such as the book inventory cards management, the book list management, book requests, book reports, financial reports, and E-Mail and Bulletin Board management.
Referring now to Figure 4, point of purchase fileserver 304 is shown in more detail. Particularly, server 304 includes a central processing unit (CPU) 316, a primary power supply 318, an uninterrupted power supply 320 to assure -13- continuous operation during power failure, and a high density storage 322 that holds all the programs and the data bases required for server 304 operation.
Server 304 has four (4) interfaces, i.e., a network interface 324, a maintenance interface 326, a customer service station interface 328 and a cashier station interface 330. CPU 316 transmits instructions to Book Bank 302, creates transaction data bases and reports, and processes orders from cashier stations
308A-D and customer service terminals 306A-D.
From network interface 324, server 304 communicates with central transaction data base 104 for electronic filing of transaction reports and communicates with Book Bank 302 to give Book Bank 302 downloading instruction orders and to receive the status reports and the inventory reports from Book Bank 302. Server 304 also is coupled, through network interface 324 to a Book Bank subsystem to receive subsystem reports in order to give instructions and orders whenever necessary, as hereinafter discussed. External network systems such as institutional or corporate network systems with local merchants terminals, community bulletin board services and others can also be coupled to the network interface 324. The network interface 324 also allows two-way connecting with interbank networks such as Cirrus, Plus or other similar data transfer network. Coupling to merchants' terminals, promotional system provides local merchants and the local business direct access to update their promotions and coupons. Maintenance interface 326 enables remote or on-site diagnosis and repair of server 304.
Customer service station interface 328 provides for communication between server 304 and customer service terminals 306A-D to handle customer service transactions. Customer service terminals 306A-D are illustrated as being coupled through a data switch 332 to a printer 334. Cashier station interface 330 provides that cashier stations 308A-D can communicate with server 304.
Figure 5 illustrates one embodiment of Book Bank 302. Book Bank 302 includes a high resolution color graphic display 336 which is a touch screen device -14- used to display, for example, instructions, messages, and status reports to the user, indexing information and to receive the user's touch screen input selections. Book Bank 302 also has a keypad 338 that is for the user to input a personal identification as well as other inputs. A magnetic code or other generally accepted card reader 341, shown as an insertion slot, is provided for customers' transactions with a bank card, credit card or some other form of debit card. A bar code reader 340, shown as an insertion slot, is provided to allow users to insert cards containing ISBN codes for desired information titles for reading by the Book Bank. ISBN codes may also be manually inserted by typing the relevant numbered keys on the keypad 338. A printer slot 342 also is provided to enable the user to access the output of Book Bank 302, a printer (not shown in Fig. 5), as hereinafter described, to retrieve receipts and transactions reports and ISBN access vouchers. Book Bank 302 also includes a base member 344 with a cut-out portion 346 to enable a user to stand comfortably at keypad 338. Importantly, Book Bank 302 also includes a cartridge slot 348 for the user to input a reading cartridge, as explained in detail hereinafter, to obtain a copy of the information selected for downloading.
In another embodiment and as shown in Figure 5A, the physical embodiment of Book Bank 302 may be altered . More specifically and in one embodiment, Book Bank 302 is positioned on a desk 339 using a personal computer 349, for example those available from IBM Corporation. The user operates Book Bank 302 as described above with reference to Figure 5 except, the user may for example, sit in a chair (not shown). Such a configuration may be used, for example, in a corporate, dormitory, library, or other similar environment where the user may be accessing information for longer periods of time or in a professional type environment. In other embodiments, readers 340 and 34 land cartridge slot 348 each may be located within computer 349 or in separate devices which are electrically coupled to computer 349.
Figure 6 is a block diagram description of Book Bank 302 circuitry. Particularly, Bonk Bank 302 includes a central processing unit (CPU) 350 which -15- is coupled to display 336, keypad 338, magnetic strip reader 341 and bar code reader 340. Although CPU 350 is illustrated as one unit, it is contemplated that CPU 350 could be a parallel processor or distributed processor arrangement. Selection of CPU 350 type depends, of course, on the amount of information to be processed, the desired speed of processing and costs. CPU 350 also is coupled to an automatic teller machine (ATM) module 352 to allow transactions with ATM cards. CPU 350 is coupled to a media driver 354 which enables users to insert personalized media for acknowledgment or other functions as hereinafter discussed. Book Bank 302 also includes a primary local storage device 356 provided for the storage of all information masters selected for loading into Book Bank 302 and related index information. A secondary storage device 358 is provided to hold other programs, instructions and transaction related information. A buffer memory 360 is utilized to speed up downloading in order to accommodate high volume users during the peak seasons. A printer 362 is provided to print coupons on demand, receipts and various reports for the users. A power supply 364 provides power to printer 362. CPU 350, secondary storage device 358 and local storage 356. An uninterrupted power supply 366 coupled to primary power supply 364 assures continuous operation even during power down time.
CPU 350 is coupled to a network interface 368 to provide communication to central information bank 100, host fileserver 304 or a Book Bank subsystem, as hereinafter discussed. CPU 350 also is coupled to a wireless communication port 370, which in turn is coupled to an antenna 372. Wireless communication port 370 enables compatibility with an alternative communication media in the event that such media is required. Figure 7 illustrates, in block diagram form, the structure for a user's personalized media storage cartridge 374. As explained hereinafter, a user inserts cartridge 374 into cartridge slot 348 for downloading of the information selected from Book Bank 302. The downloaded information is stored, in an encrypted format, on cartridge 374 together with relevant basic index information copied from -16- the electronic index contained in Book Bank 202 at the time of initial downloading. Cartridge 374 is compatible with readers to enable the user to view information stored on the cartridge. Cartridge 374 includes reading software 376 which, as explained in more detail hereinafter, performs sequential encryption and decryption of information. Registry correspondence segment 378 also is provided. A book file registry 380 is created at the time of downloading information onto cartridge 374. Encrypted bookfiles 382 together with relevant electronic index information are stored on cartridge 374 as well as a non-erasable permanently marked serial number 384. Cartridge 374 also contains a commercial operating system environment 386 and free disk space 388.
Figure 8 illustrates the user process and component processing which occurs when a user utilizes the point-of-purchase system described above. Particularly, once the user enters the site 390, and if the user a first-time patron 392, the user will complete a user's application form 394. The user will then take the completed application and a picture LD. to customer service station 306A, where the user will select and input a personal identification number (PIN) and a password 396. The customer service clerk will open an account for the customer 398. The user- selected password is automatically matched with a sequentially created customer account number within the central data banks. Using the keypad accompanying the cashier station, the clerk types in the name, address and social security number for the user. The written application will then be inserted into the printer slot accompanying the cashier station. While loading the customers' information, the central data bank reviews the information to determine if there are any prior problems with the customer or other discrepancies. When the verification process is completed, the designated customer account number for the user is printed on the users application. Then, the clerk places, into the card slot, a user identification card (for example, a plastic card having dimensions of the standard credit card and containing a magnetic strip on the back on which can be placed magnetic coded information). The card is then embossed with the user's name and account number -17- and the magnetic strip is encoded with the applicable user codes (account number, card number and designated password information). The written application is then transmitted to the central data storage center for retention. The user now is able to use the issued card to make purchases or to rent the use of information titles. The machine used to emboss and encode the cards is a standard commercially available machine of the type currently being used in connection with the issuance of a bank's card, credit cards or debit cards.
In addition to obtaining a personal identification card, a new enrollee purchases a reader/computer or other acceptable reading device (such as a special computerized interface, or an audio or video playback device). Each such device is assigned a unique serial number and a special code number. In one embodiment, the serial number is contained on a read only memory chip enclosed within the device. All of the many cartridges which accompany each such reading device is encoded in such a manner that information recorded on the cartridge can only be read by the related reading device. This is accomplished by a simple program contained within the permanent memory of the device. In one embodiment, if the special code on the device is not the same as the number which the cartridge is seeking, then the cartridge will cause to be displayed in the reading device the words "cartridge cannot be read by this device" and to not allow any further access to any information contained on the cartridge by the particular reading device in question. If the numbers match, further access will be allowed. At the time a reading device is purchased, the clerk enters the serial number for the device into the central data bank through the cashiers station. The central data bank contains a list of the serial numbers of all approved reading devices and the corresponding special code number. The personal identification card for the customer purchasing the reading device is placed by the clerk into an appropriate slot on the cashier's station and the magnetic strip on the identification card is encoded with the applicable serial number for the reading device being purchased. Thereafter, whenever the user desires to obtain additional cartridges for reading by his or her -18- reading device, the user needs only present his personal identification card and the cartridge to be properly coded to the clerk and by inserting the cartridge into the cartridge slot and the identification card into the card slot and pressing the designated button on the cashiers station, the new cartridge will be correctly encoded to be readable by the user's reading device.
The requirement that reading device codes and cartridge codes match, before access will be allowed, means that issued cartridges will not be readily readable by multiple reading devices. Multiple device reading will require special programming and the granting of special allowances, or approved purposes. In one embodiment, by purpose encoding the information, a publisher may expand or limit access to those users having a proper authorization or defined purpose. For example, a publisher may purpose encode a portion of a selected book to be readable by any user, i.e., any purpose encoded. This type of purpose encoding may be used on, for example, promotional books or some governmental publications. Other information may be purpose encoded to limit access to a single user to only view the information, i.e., classified material. The requirement reduces the possibility of unauthorized use of information titles.
In operation, the customer takes the customer identification card to the book display area for shopping 400. If the customer previously opened an account, the customer will not have to go through the above described process and can proceed directly to shopping area 400, where the customer will select a book inventory card matching his book selection. The book inventory card has the book ISB numbers, a bar code and information related to the particular information title, author, publisher, and edition date printed thereon. The customer brings the selected book inventory card to the cashier's station 308 A. The cashier magnetically reads the codes on the customer's LD. card and scans or manually enters the bar codes on book inventory cards 402. The customer then makes a proper payment, and the customer codes and information title bar codes are transmitted to host fileserver 304. Server 304 searches the existing customer account file to match the -19- identification (i.e., pin and password) and will generate a downloaded book list file based on the bar codes from the book inventory cards or as manually loaded. Server 304 downloads the file to Book Bank 302 which electronically generates a portfolio of information titles ready to be downloaded on demand. The user can then proceed to Book Bank 302 at any later time and insert the identification card into the slot 340 of Book Bank 302 and a coded point-of-purchase cartridge 374 into Book Bank cartridge slot 348 to identify himself with a personal identification number, as illustrated in step 404. The user also enters a password 406 into the key pad 338. When Book Bank CPU 350 matches the personal identification number with a downloaded list portfolio, Book Bank CPU 350 starts downloading the requested information from local storage 356, through buffer memory 360, to media driver 354 which copies the information onto cartridge 374. As part of the downloading process, the data is dynamically encrypted to make the data uniquely readable only by authorized reading devices. The dynamic encrypting is described below in Section D. After downloading, the user removes cartridge 374 and then inserts cartridge 374 into his personal reader/computer to access the information acquired. The reader/computers are configured for long-term reading applications. The reading application software is stored on cartridges with the ability to read the applicable software on the cartridges permanently stored within the memory of the reader/computers or other authorized reading device.
A user may select portions of selected information to combine and download. In one embodiment, the user may select at least one book and select at least one portion of each selected book. If more than one portion is selected, where each portion includes up to the entire selected book, the portions are combined and downloaded to user's cartridge 374. For example, for a specific college course, a student may be required to download specific chapters from ten different books. After selecting the ten books and ten specific chapters of the selected books, the selected information is combined, encrypted using the determined level of protection, and downloaded to the students cartridge 374. Similarly, a user may -20- select individual tracks from music information to combine and download the selected tracks to a single cartridge 374 for playback at a later time.
2. Point of Rental Delivery System
If a user is not interested in obtaining a permanent copy of a particular work but requires a copy for a period of time, e.g., a semester, the user may prefer to visit a point of rental site rather than a point of purchase site. A point of rental system is illustrated in Figure 9. The rental system is identical to the point of purchase system previously described herein (e.g., includes a host fileserver) except with respect to the differences pointed out below. In many instances, a single site or Book Bank may serve as a point of purchase system site and a point of rental system site and a point of delivery system for promotional or commercial information site or any combination thereof. As shown in Figure 9, the point of rental system includes Book Bank user terminal hubs 41 OA-B coupled to terminals 412A-E, and customer service station 414. User terminals 412A-E allow a customer to do an information title search and index search of the Book Bank memory and to transmit other information between Book Bank 302 and himself. Customer service station 414 combines the function of customer service as well as the cashier's station. For example, at customer service station 414, a credit customers' debit card can be credited and the ATM operation can be overridden, via ATM module 416, if necessary. Information can be printed out from customer service station 414 via printer 418.
Point of rental storage media 420 is used in the rental system. Point of rental media 420 is the same as point of purchase media 374 except that media 420 includes an automatic erasure mechanism that erases the information downloaded after the expiration of a preset time interval. More specifically, when information is downloaded from Book Bank 302 onto media 420, Book Bank 302 also downloads a "time stamp" equal to the time period for which the user has paid to retain a copy of the information. The time stamp could take the form of a value -21- loaded into a memory location on media 420, which value corresponds to the rental time period. During usage, the actual usage time elapsed is subtracted from the electronically stamped time period. Once the user has consumed all of the usage hours authorized, the information title will self-destruct, i.e., be deleted from media 420. This can be achieved simply by calling a stored program which erases the information associated with the memory location where the time value is stored. For example, when the value of the memory location where the authorized usage time is stored is zero, the stored erase program would be called upon to erase the information associated with the "zero" time usage authorization. Another method for automatic erasure is for each rental or library cartridge to contain a real time clock and independent rechargeable power supply. When the cartridge is initially encoded for use, the real time clock mechanism is activated. As rented information titles are being downloaded, an expiration date is logged into the index information for each title. Any time after the real time clock on the cartridge reaches the designated expiration date, access to the relevant information title is denied. If use of the title is not extended, after the expiration of an additional number of days, use of the cartridge will cause a permanent erasure of the information title from the cartridge memory. With this method, if the real time clock falls to operate, the cartridge will become unreadable without repair. To repair a defective cartridge, the user need only bring the cartridge together with his personal identification card to the nearest service center where the real time clock will either be repaired or the relevant information titles will be loaded onto a replacement cartridge. The user will be credited for any lost time while the cartridge was unreadable. A service center could be located, for example, near each separate point of delivery site.
The automatic erasure program could be created as an operating system module or as a separate executable program designed to be "terminate and stay resident" (TAR). A module integral with the operating system is preferred since -22- such a structure ensures that if the operating system is viable, the automatic erasure module is viable.
If the user still needs more time with any particular information titles, the user may return to the point of rental site and "re-rent" the information. Alternatively, it is contemplated that the user could renew the rental via a modem coupled to the reader.
With respect to the user process for renting information, when a point of rental patron enters a point of rental site, the user will use a valid ATM card, bank card, credit card, or some other debit card and proceed directly to a user terminal 412A-E. Using such a terminal, the user can perform information title searching and download an order entry to Book Bank 302. When the download entry is complete, the user will go to Book Bank 302, insert a rental media, an identification card, and a credit card, bank card, or debit card into Book Bank 302 for the transaction approval. If the transaction is not cleared or if the ATM system is not working properly, the patron can proceed to the customer service center and have the attendant manually override the ATM process, if appropriate. If the user does not have a valid ATM credit card or debit card, the user will go to the customer service center, pay the service clerk to receive credit on the Book Bank debit card. Then the customer may proceed to the user terminal where the user downloads the order entry.
After the transaction approval is cleared, the patron inserts point of rental media 420 into Book Bank media driver 354, has his personal identification card scanned and enters a password. The information is dynamically encrypted and downloaded from Book Bank 302 to media 420 with an electronic stamp of the number of hours of usage authorized for each information title or an expiration date. After the downloading, the user will apply this media on the personal reader/ computer to access the information on the media.
Typical examples for the point of rental site are libraries (commercial, education or public access) and book rental shops. The information downloaded -23- by the user may be free of charge to the users such as in the case of a library, or may incur certain rental fees at a predetermined rate, such as in the case of a rental shop or library charging on a per page use basis. Any given point of rental site may operate as a traditional library in allowing free use to library members for a limited period of time or may operate as a rental shop where fees are collected from users in accordance with the period of use allowed.
3. Book Bank Subsystem
A Book Bank subsystem couples to a Book Bank and host fileserver as described in more detail below. The central element of the subsystem is a Book Bank which is a modified version of the point-of-purchase Book Bank 302. The subsystem is specifically configured for the collective use by members or the staff of a commercial or business entity or a corporation. It delivers and it recalls information titles among authorized users within the business or corporate entity, and provides the capability of limiting the number of copies of a given work that may be distributed to other authorized users. If all of the licensed copies of any information titles have been checked out by the staff of an organization, then no other users may access the same information title within that particular subsystem until one or more of the licensed copies of the particular information is uploaded or recalled to the subsystem or additional copies are purchased. In one embodiment, the information is purpose encoded so as to limit a purpose to which access by a user to the information is allowed. For example, a central corporate library may allow specific users, i.e., R&D personnel, to selected information, i.e., pending patent applications. All non-R&D personnel users without the proper purpose, or authorization code, are prevented from accessing the information. Instead of purchasing the unlimited use of a limited number of copies, a commercial or business entity may lease the limited use of an unlimited number of copies or the use of a specified portion of a given information title. Under such circumstances, the commercial or business entity would be charged each time the -24- subsystem is accessed from a participating work station for the portion of a specified information titled accessed and for the period of time the access occurs. By restrictions encoded on the interface between a participating work station and the subsystem, while accessing information from the subsystem, the ability of the work station to perform certain operations would be restricted. The restricted operations would be those related to the duplication or transmission of data related to information titles being accessed through the subsystem.
More specifically, and referring to Figure 10, Book Bank subsystem 422 contains a high resolution color graphic display 424 coupled to CPU 426 to display the instructions or status of subsystem 422. Subsystem 422 also includes a keyboard 428 with limited access to the system for keying selections for operating certain given functions such as product display. Subsystem 422 has a media driver 430 for the downloading of information and a local storage 432 which holds a portfolio of information the business entity has ordered for use. A secondary storage 434 is also provided to hold all the software programs that control and perform the functions of subsystem 422. Subsystem 422 further includes a power supply 436 and an uninterrupted power supply 438 to assure continuous operation during power failure downtime. A printer 440 is provided to print various reports.
Book Bank subsystem 422 has a network interface 442 that connects subsystem 422 to Book Bank 302 and host fileserver 304. Network interface 442 also may couple to the corporate or business entity network system 444. With such a structure, the corporate entity may transmit or download its own corporate proprietary information through Book Bank subsystem 422.
Media port extension interface 446 provides access by an adequate number of media drivers to the desired corporate terminals for corporate network stations. Media driver 430 is connected to the terminals or stations by a proprietor driver card. The corporate administration can utilize the dynamic encryption and the dynamic downloading function of Book Bank subsystem 422 to incorporate and accommodate the corporate proprietary information. The corporate proprietary -25- information may be transmitted to Book Bank subsystem 422 using an encryption process and then downloaded selectively to the destination port and to the properly identified authorized personnel. Book Bank subsystem 422 is not only a customized corporate library of copyrighted and proprietary information, but also is a corporate document security device that encrypts and dispatches the corporate documents and the corporate confidential proprietary information in the corporate network system. As part of the network interface connection linking each participating work station to the subsystem and allowing access to encrypted information, a separate unit, e.g., a memory storage unit restricts certain operations which may be performed from the work station so long as the work station has access to encrypted information from the subsystem. The restrictions limit or prevent operations related to the duplication or transmission of data.
4. Promotional Delivery System
The promotional system is a point of delivery system for promotional and commercial information. It distributes promotional and commercial information in electronic format and users may either view the digitized promotional and commercial information at the site or download the information to their personalized media for later viewing. User's call access the promotional and commercial information including the dynamic viewing electronically of advertising available discounts, commercials, special promotional events, software demos and product catalogs. Users may even shop electronically by manipulating the promotional and commercial information and placing orders through E-Mail from a personal reader/computer or by ordering directly from an interactive promotional Book Bank. The promotional Book Bank has the same structure as Book Bank 302 for the point-of-purchase system.
A promotional system in accordance with the present invention is illustrated in block diagram form in Figure 11. As in the other point-of-sale systems, Book Bank 302 is networked to host fileserver 304. The promotional system further -26- includes a number of promotional units 448 A-D which electronically display and promote products. Unit 448A is coupled directly to central transactional data base 104 and central information bank 100 while units 448B-D are coupled to host fileserver 304. Unit 448A receives information from merchant terminals 450-A-D and host fileserver 304, receives information via merchant terminals 450E-G. More specifically, host fileserver 304 receives advertising and special offer updates from the local businesses, national or regional advertisers, and corporate sponsors through merchants terminals (MT) 450E-G. The host fileserver 304 is also networked to a central transaction data base which, in turn, provides a report to the publishers, advertisers, accounting, auditing firms, merchandise vendors, and others.
The promotional Book Bank allows selective downloading of promotional and commercial information to the user's point of rental media (see discussion in Section B, System Architecture, for explanation of such downloading) for the user' s private review and personal shopping at his convenience. The promotional and the commercial information downloaded will self-destruct (i.e., automatically erase) at the expiration of a pre-determined time interval as explained above with respect to point of rental delivery systems. The promotional Book Bank also provides a user interactive self-service vending feature. The user may order products or information electronically via the network. Some of the promotional functions are : coupons on demand, virtual shopping, catalog sales, demos; subscription orders, electronic applications of credit cards, calling cards, or other types of services. Some public domain information distributed such as community events, ticket sales, institutional events or even public bulletins could also be distributed with the promotional information as a free or low cost service to the community.
The promotional and the commercial information flow is very similar to the information flow within the point-of-sale delivery system. However, rather than a publisher or copyright information owners, the information sources are local -27- businesses, national or regional advertisers, and appropriate sponsors through advertising agents and other entities.
5. Information Tracking
In one embodiment, for each exchange, or download, of information, a tracking entry is transmitted, or stored, in an appropriate transactional database, for example central transactional database 104, to record movement, or transfer, of information from a first location to a second location. By reviewing these tracking entries, an information owner may monitor movement of the information and take appropriate action. For example, a tracking entry may be recorded in transactional database 104 each time any information is copied into, removed from, or copied from, Book Bank 302. Based upon the tracking entries, the information owner may charge the receiving or transferring party a fee as defined by the owner of the information. The fee charged may be based on a variety of factors including, but not limited to, an economic value of the information, use or purpose of the information, number of users, and the availability from other sources. The tracking entries may also include additional data so that the information owner may determine who transferred the information, the amount of information transferred, type of transfer, i.e., rental for specified period of time, and the time of transfer. Tracking entries, in one embodiment, are recorded for all transfers, i.e., Book Bank 302 to cartridge 374 and central information bank 100 to Book Bank 302. Utilizing these entries, an information owner may also determine the type of information that is being transferred, the number of transfers, and the identification of the information receivers. For example, the information may be used to determine if certain promotional materials are being received by targeted users, or to determine responses to different information pricing strategies. -28-
D. Encryption
The above-described point-of-sale delivery systems have the capability of performing dynamic encryption of data as the data is downloaded onto a user's storage media. Dynamic encryption refers to the process in which the Book Bank works together with the storage media to perform a proprietary encryption of downloaded data. In one embodiment, different levels of encryption are utilized based on a series of factors or variables. These variables include, but are not limited to, an economic life, a market value, a general availability, a replacement cost, time sensitivity, and potential number of users, of the information. For example, today's TV listings may have a low level, or complexity, of encryption as a result of the low market value, low replacement cost, and general availability from many sources. Conversely, a multi-volume legal treatise may, for example, have a high, or complex, level of encryption as a result of the limited availability, replacement cost, and long economic life of the information. Based on the described factors, a source, i.e., publisher, of information may decide the appropriate level of encryption for each portion of information from the initial transmission to central information bank 100 to a user's cartridge 374. The level of information encryption, in any location, i.e., bank 100, may be higher or lower than another location, i.e., cartridge 374. More specifically, each time information is downloaded, or transmitted, the level of encryption may be independently altered, or determined. For example, the level of encryption at central information bank 100 may be different, i.e., higher or lower, than the level of encryption of a book downloaded to a user's cartridge 374.
In addition to dynamic encryption, other encryption may be performed as illustrated in Figure 12. Figure 12 illustrates a three level encryption process. For example, prior to transmitting information on the network, the data may be encrypted. This facilitates preventing unauthorized users from accessing the transmitted information on the network. In addition to the pre-transport encryption, the data, may be encrypted prior to being placed in a book bank. Publishers or other -29- owners of the information may have approval authority over this level of encryption to provide such information owners with satisfaction that the data is adequately protected.
Once the data is stored in the book bank, dynamic encryption techniques may be used when downloading the data onto storage media. The storage media (Figure 7) includes a proprietary environment for building, reading, viewing and processing. The media also has a commercial operating system environment for processing information files. An information file directory registry forms a part of the proprietary application, and a file directory pointer is contained in the operating system application.
The dynamic encryption process, in one form, uses the permanent serial numbers stored in the storage media, the user's personal identification number, a personal signature code number, and a password to further encrypt the data stored in the book bank as the data is downloaded to a user's storage media. The personalized variables and codings are combined with various individualized information file variables to form an individualized data structure for the data downloaded to the user's personalized media. As a result, those information files are individualized pertaining to the media, the version of software, the information file itself, and other variables. The dynamic encryption assists in reducing the possibility of the unauthorized use of proprietary or other information by causing all information downloaded through the point-of-sale delivery system to be readable and accessible by a selected number of user readers/computers. Specifically, data storage medium accessible from one reader/computer will not be accessible using another reader/ computer unless such access has been prearranged such as by providing the other reader/computer with an identical user identification number and password.
Examples of well-known encryption algorithms which may used in performing the above described three level encryption include the Z8068 Data Ciphering Processor (DCP). The DCP contains the structure to encrypt and decrypt -30- data using National Bureau of Standards encryption algorithms. It may be used in a variety of environments including in dedicated controllers, communication concentrators, terminals and peripheral task processors in general processor systems. DCP provides a high throughput rate using cipher feedback, electronic code book or cipher block chain operating modes. The provisions of separate ports for key input, clear data and enciphered data enhances security. The host system communicates with the DCP using commands entered in the master port or through auxiliary control lines. Once set up, data can flow through the DCP at high speeds because input, output and ciphering activities can be performed concurrently.
In alternative embodiments, encryption and decryption may be performed in dedicated hardware and/or software functions. For example, each reader and cartridge 374 may include a dedicated encryption integrated circuit (IC) and a dedicated decryption IC to maximize the transfer speed of the information. The level of encryption and decryption may altered by adding additional functions and by enabling or disabling the additional levels.
With respect to dynamic encryption, the following describes one of many methods of dynamic encryption which could be used. Particularly, each regularly used alpha or numeric symbol is assigned a corresponding number as illustrated in Table 1.
Table 1 symbol A B C D E F G H I J K code 1 2 3 4 5 6 7 8 9 10 11
symbol L M N O P Q R S T U V code 12 13 14 15 16 17 18 19 20 21 22
symbol W X Y Z 0 1 2 3 4 5 6 code 23 24 25 26 27 28 29 30 31 32 33 -31-
symbol 7 8 9 + - x code 34 35 36 37 38 39 40 41 42 43 44
The serial number stored on the cartridge would be used to determine how many slots the code should shift to the left at the start the encrypting. For example, if the serial number ended with six, before starting of encryption, the code would be shifted to the left by six places. Table 2 illustrates the code table after the shift.
Table 2 symbol A B C D E F G H I J K code 7 8 9 10 11 12 13 14 15 16 17
symbol L M N O P Q R S T U V code 18 19 20 21 22 23 24 25 26 27 28
symbol W X Y z 0 1 2 3 4 5 6 code 29 30 31 32 33 34 35 36 37 38 39
symbol 7 8 9 + - X code 40 41 42 43 44 1 2 3 4 45 6
The selected user password then is used to determine after how many symbols the code should again shift to the left. As an example, if the password were ROSE, then using the codes from Table 2, the numeric statement for rose would be 24212511. When the corresponding numbers are added together until reaching, a number between 1 and 10, the number reached in our example is 9 [18.9]. So after every 9th letter, the codes would be shifted another 6 spaces to the -32- left. After the encrypting of 9 letters, the codes would be set as set forth in Table 3.
Table 3 symbol A B C D E F G H I J K code 13 14 15 16 17 18 19 20 21 22 23
symbol L M N O P Q R S T U V code 24 25 26 27 28 29 30 31 32 33 34
symbol W X Y Z 0 1 2 3 4 5 6 code 35 36 37 38 39 40 41 42 43 44 1
symbol 7 8 9 + - x code 2 3 4 5 6 7 8 9 10 11 12
Because the fact that the encrypting tables are constantly shifting, under this simple method, the phrase "My brown dog has fleas." would be encrypted as follows: 19 31 6 8 24 21 29 20 6
16 27 19 12 20 13 31 18 24 23 19 37 11 Decoding using only Table 1, the coded phrase would read as follows: S 4 F H X U 2 T F P 0 S L T M 4 R X
W S . K
Without knowing other information, it would be very difficult to find a pattern that would allow one to decode the symbols.
Knowing the placement of the codes relative to the symbols at the start of the encryption process and the number of symbols between shifts, decoding an -33- encrypted phrase is simply a reversal of the process applying each of the tables in reverse.
There are any number of similar methods of dynamic encryption which use a different manner of determining how encryption codes will vary as one proceeds through the data to be encrypted. The objective, of course, is to make decoding difficult by avoiding obvious patterns associated with conventional language and number usage.
E. Tamper Protection
In one embodiment of the present invention, access to the information is monitored, or recorded, to determine attempted unauthorized access to the information. If an unauthorized access is recorded, or stored, onto a user's media, for example cartridge 374, the next time that user attempts to download additional information to cartridge 374, an unauthorized access message may be transmitted to notify the appropriate party, for example the cashier. As a result of the unauthorized access message, the cashier may revoke user's cartridge 374, notify the proper authorities, or record an entry into the user's account for future action. More specifically and in one embodiment, the unauthorized access is determined by first reading, or recording, the specific identification data from the information requester, or receiver. If the data provided by the information receiver is determined to not match, i.e., is unequal, predefined values, the unauthorized access message is recorded and information exchange is prevented. The data determination may be completed using known comparison hardware and/or software functions.
Additionally, the unauthorized access message may be generated if a user having an incorrect purpose, or authorization code, attempts to access unauthorized information. For example, in a corporate environment, if a user attempted to access information for which the user did not have the proper authorization code, an unauthorized access message is generated and may be sent to, for example a system -34- administrator or a security official. Different level of unauthorized access messages may also be generated. For example, a high level message may be generated if a user attempts to decrypt the information stored in various locations within the system, for example Book Bank 302 using an unauthorized device. A lower level message may be generated if a remote user has attempted to access data that is one level above that user's authorized level.
F. Other Embodiments
In another embodiment, Book Bank 302 may be configured to capture and exchange real-time information. For example, as a professor presents material to students in a classroom, the professor' s presentation may be captured and converted into copyrighted text and exchanged with remote users. This conversion may be completed using known voice to text conversion systems using a known computer system. The professor's presentation may be supplemented with previously prepared, or concurrently prepared, written text. The text may be digitized and properly integrated into the text using known methods. Remote users may receive information from the professor's lecture in real-time as the material is presented or may receive the information at a later time. Remote users receive only that information which the remote user is authorized to receive from Book Bank 302 as described above. In yet another embodiment Book Bank 302 is configured to receive audio, video, and/or computer software code. For example and in one embodiment shown in Figure 13, Book Bank 302 is coupled to a Video Cassette Recorder (VCR) 600, a stereo system 610 including a cassette recorder/player 620, a Compact Disk (CD) player and/or recorder 630, a television 640, and a computer 650. As described above, authorized information is received from Book Bank 302, and in one embodiment is stored to a storage device, for example a memory device 660. The memory device 660 may be a plurality of memory cells, for example Read Access Ram (RAM), Read Only Memory (ROM), a rotating storage unit, i.e., a hard disk, -35- a magnetic storage media, i.e., magnetic tape, or other storage media, for example an optical storage media. After the remote user has selected the appropriate information to receive from Book Bank 302, the information is stored in device 660. Device 660 is configured to transfer the stored information to the selected playback device, i.e., Video Cassette Recorder (VCR) 600, stereo system 610, cassette recorder/player 620, CD player/recorder 630, television 640, or computer 650. For example, in one embodiment, the remote user downloads, or receives, the entire contents of a top ten music album. The contents of the album is stored in device 660. As described above, the information may be permanently stored or may be stored for a fixed period of time or number of uses. After downloading the information to device 660, the remote user may transfer the information to stereo system 610 for listening. In another embodiment, the information may be transferred to, or through, device 660 to one of the other components, i.e., cassette recorder 620, VCR 610, CD recorder 630, or computer 650. To limit unauthorized copying or playback, the information may be playback using only those components, i.e., cassette recorder 620, VCR 610, CD recorder 630, or computer 650, coupled to device 660. For example, the remote user may download a feature movie by saving the movie on a tape using VCR 610. The remote user may then playback the movie as authorized as long as the tape is playback in VCR 610 that is coupled to device 660. Similarly, the remote user may download a software program so that the information is stored in device 660 or in a storage media in computer 650. Depending upon the authorization code of the software, the program may be configured to execute only from computer 650 when computer 650 is coupled to device 660. The above described system facilitates controlled and monitored exchange of information between many types of information owners, distributors, and users. By using the described system, a user may obtain many types of authorized information. The user may, as determined by the information owner, purchase, rent, or obtain without charge, the authorized information. The information, in one -36- embodiment, is encrypted using various levels, or complexities, of encryption to prevent unauthorized access. The level of encryption depends upon a variety of factors or variables, for example, the economic life of the information. For example, Book Bank 302 may include information representing a reference dictionary and a top ten music album. Information from the reference dictionary and the album may have the same or different levels of encryption. In addition, students from a determined class may access the reference dictionary information without charge as the result of the school purchasing an unlimited use copy of the information, however, those same students would be required to purchase any information downloaded from the album. Additionally, the type of access may differ for different portions of the information. For example, a first track of the album information may be coded so that anyone may download the information without charge, however, the remaining tracks of the album information may be coded to require payment to download. While the present invention has been described with respect to specific embodiments, many modifications, variations, substitutions, and equivalents will be apparent to those skilled in the art. Accordingly, the invention is to be considered as limited only by the spirit and scope of the appended claims.

Claims

-37- CLAIMS:
1. Apparatus for facilitating obtaining text of a book, comprising: a storage device having stored therein text of a plurality of books; a processor connected to said storage device, said storage device further having stored therein a program for controlling said processor, said processor operative with the program to: receive a book selection request; receive a user identification associated with the book selection request; and output encrypted text of the selected book if the user identification and book selection are valid utilizing a determined level of book encryption.
2. Apparatus in accordance with Claim 1 wherein said processor is further operative with the program to purpose encode the text of the selected book so as to limit a purpose which access by the user to the text is authorized.
3. Apparatus in accordance with Claim 1 wherein said processor is further operative with the program to encrypt the text of the selected book utilizing an identifier associated with the user.
4. Apparatus in accordance with Claim 1 wherein said determined level of book encryption is based on at least an economic value of the selected book.
-38-
5. Apparatus in accordance with Claim 1 further comprising at least one local unit communicatively coupled to said processor, said local unit comprising a memory for storing, in electronic form, information transmitted to said unit from said processor, and a local unit processor for controlling transfer of information stored in said unit to electronic storage media of system users, said local unit configured to encrypt the information when the information is to be transferred to the electronic storage media, said local unit configured to encrypt the information utilizing a determined level of information encryption.
6. Apparatus in accordance with Claim 5 wherein the information stored on the user's storage media comprises a personal signature code number and serial number.
7. Apparatus in accordance with Claim 5 wherein said determined level of information encryption is based upon at least an economic value of the selected book.
8. Apparatus in accordance with Claim 7 wherein the level of information encryption is not equal to the level of the book encryption.
9. Apparatus in accordance with Claim 1 wherein said processor is further operative with the program to determine attempted unauthorized access to the output copies of the text of a book. -39-
10. A method for operating a computer to obtain text of a book, comprising: inputting into the computer a book selection request; inputting into the computer a user identification associated with the book selection request; and outputting encrypted text of the selected book if the user identification and book selection are valid utilizing a determined level of book encryption.
11. A method in accordance with Claim 10 wherein inputting the computer a book selection comprises the steps of: selecting at least one of the books in the memory storage; and selecting the text of at least a portion of each the selected books.
12. A method in accordance with Claim 11 wherein inputting the computer a book selection further comprises the steps of: determining if more than one portion is selected; and if more than one portion is selected, then combining the selected portions.
13. A method in accordance with Claim 11 further comprising the step of generating tracking information corresponding to the selected portions and the selected books.
14. A method in accordance with Claim 10 further comprising the step of purpose encoding the outputted text of the selected book so as to limit a purpose which access by the user to the text is authorized.
15. A method in accordance with Claim 10 further comprising the step of determining a level of book encryption. -40-
16. A method in accordance with Claim 15 wherein determining a level of book encryption comprises the step of selecting at least one of a plurality of levels of encryption code.
17. A method for operating a processor communicatively coupled to a network to obtain text of a book, the network being coupled to a memory storage having stored therein text of a plurality of books, said method comprising: determining a book selection request; inputting into the processor the book selection request; inputting into the processor a user identification associated with the book selection request; and outputting encrypted text of the selected book if the user identification and book selection request are valid utilizing a determined level of encryption.
18. A method in accordance with Claim 17 wherein determining the book selection request comprises the steps of: reviewing the books in the memory storage; selecting the text of at least a portion of at least one of the books in the memory storage.
19. A method in accordance with Claim 17 wherein determining the book selection request comprises the steps of: selecting at least one books in the memory storage; selecting the text of at least a portion of each selected book in the memory storage; combining the selected portions of the selected books. -41-
20. A method in accordance with Claim 19 wherein selecting the text of at least a portion of each selected book in the memory storage comprises the step of selecting the entire book.
21. A method in accordance with Claim 19 wherein selecting the text of at least a portion of each selected book in the memory storage comprises the step of selecting at least one word of each selected book.
22. A method in accordance with Claim 19 wherein selecting the text of at least a portion of each selected book in the memory storage comprises the step of selecting at least one section of each selected book.
23. A method in accordance with Claim 19 further comprising the step of generating tracking information corresponding to the selected books in the memory storage.
24. A method in accordance with Claim 23 further comprising the step of generating tracking information corresponding to the selected portions of the selected books.
25. A method in accordance with Claim 17 further comprising the step of purpose encoding the outputted text of the selected book so as to define a purpose of use which access by the user to the text is authorized.
26. A method in accordance with Claim 17 further comprising the step of determining unauthorized access to the encrypted text. -42-
27. Apparatus for facilitating obtaining text of a book, comprising: a storage device having stored therein text of a plurality of books; a processor connected to said storage device, said storage device further having stored therein a program for controlling said processor, said processor operative with the program to: receive a book selection request; receive a user identification associated with the book selection request; and dynamically encrypting text of the selected book utilizing a determined level of encryption if the book selection request and user identification are valid, the dynamic encryption performed using a user identifier as the text is outputted.
28. Apparatus in accordance with Claim 27 wherein said apparatus is communicatively coupled to a communications network.
29. Apparatus in accordance with Claim 27 wherein said processor is further operative with the program to purpose encode the text of the selected book so as to limit a purpose which access by the user to the text is authorized.
30. Apparatus in accordance with Claim 27 further comprising at least one local unit communicatively coupled to said processor, said local unit comprising a memory for storing, in electronic form, information transmitted to said unit from said processor, and a local unit processor for controlling transfer of information stored in said unit to electronic storage media of system users, said local unit configured to encrypt the information when the information is to be transferred to the electronic storage media, said local unit configured to encrypt the information utilizing a determined level of encryption. -43-
31. A method for operating a computer to obtain information, comprising: inputting into the computer an information selection request; inputting into the computer a user identification associated with the information selection request; and outputting encrypted information of the selected information if the user identification and information selection are valid utilizing a determined level of information encryption.
32. A method in accordance with Claim 31 wherein inputting the computer an information selection comprises the step of selecting at least one portion of information in the memory storage.
33. A method in accordance with Claim 32 wherein inputting the computer a book selection further comprises the steps of: determining if more than one portion is selected; and if more than one portion is selected, then combining the selected portions.
34. A method in accordance with Claim 32 further comprising the step of generating tracking information corresponding to the selected portions of information.
35. A method in accordance with Claim 31 further comprising the step of purpose encoding the encrypted information so as to limit a purpose which access by the user to the information is authorized.
36. A method in accordance with Claim 31 wherein the information includes at least one of visual, music, software, and video information.
EP98953819A 1998-03-27 1998-10-21 Information distribution system Withdrawn EP1074113A4 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US175559 1988-03-31
US4932198A 1998-03-27 1998-03-27
US49321 1998-03-27
US17555998A 1998-10-20 1998-10-20
PCT/US1998/022238 WO1999049615A1 (en) 1998-03-27 1998-10-21 Information distribution system

Publications (2)

Publication Number Publication Date
EP1074113A1 EP1074113A1 (en) 2001-02-07
EP1074113A4 true EP1074113A4 (en) 2002-04-03

Family

ID=26727066

Family Applications (1)

Application Number Title Priority Date Filing Date
EP98953819A Withdrawn EP1074113A4 (en) 1998-03-27 1998-10-21 Information distribution system

Country Status (5)

Country Link
EP (1) EP1074113A4 (en)
CN (1) CN1292960A (en)
AU (1) AU1109499A (en)
CA (1) CA2326098A1 (en)
WO (1) WO1999049615A1 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US7774220B2 (en) * 1999-11-29 2010-08-10 The Strategic Coach Inc. Project management system for aiding users in attaining goals
AU4166601A (en) * 2000-02-23 2001-09-03 Ipdn Corp Methods and devices for storing, distributing, and accessing intellectual property in digital form
KR20000037085A (en) * 2000-04-07 2000-07-05 이상훈 Method to provide On-Line lending service
KR20000049851A (en) * 2000-05-03 2000-08-05 최강석 A system for lending and purchasing a video tape, and mehtod thereof on the internet
FR2810759A1 (en) * 2000-06-26 2001-12-28 Radoslaw Galka Method for purchasing and distributing digital goods, comprises secure encoded communication over a communication system between a users smartcard and terminal and a furnisher's server
KR20020004398A (en) * 2000-07-05 2002-01-16 김운일 Method and system for lending image media using internet
KR20020006372A (en) * 2000-07-12 2002-01-19 배인천 Electronic business using a member store and method thereof
US6895503B2 (en) 2001-05-31 2005-05-17 Contentguard Holdings, Inc. Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US6876984B2 (en) 2001-05-31 2005-04-05 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
KR20010079197A (en) * 2001-06-21 2001-08-22 조병철 Method for providing lending service using a network and computer-readable recording medium on which a program relating thereto is recorded
JP4251796B2 (en) * 2001-08-27 2009-04-08 ソニー株式会社 Information providing system, information providing apparatus and method, information processing apparatus and method, recording medium, and program
JP2004133502A (en) * 2002-10-08 2004-04-30 Matsushita Electric Ind Co Ltd Data distribution system, device or method for the system and recording medium or program for the system
KR20040048153A (en) * 2002-12-02 2004-06-07 주식회사 웰소프트 Lending system for apartment based on network and method thereof
CN101505312B (en) * 2008-12-24 2012-06-06 福州博远无线网络科技有限公司 Method for reading photographic book on demand combining server and mobile device
US11354614B2 (en) 2009-09-16 2022-06-07 The Strategic Coach Systems and methods for providing information relating to professional growth

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996024092A2 (en) * 1995-02-01 1996-08-08 Greg Benson A method and system for managing a data object so as to comply with predetermined conditions for usage
WO1998008344A2 (en) * 1996-08-13 1998-02-26 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2659896B2 (en) * 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
JPH0855164A (en) * 1994-08-10 1996-02-27 Fujitsu Ltd Software distribution system, repeating device, and user terminal device
US5694469A (en) * 1995-11-17 1997-12-02 Le Rue; Charles Method and system for disseminating stored programs and data
US5708709A (en) * 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996024092A2 (en) * 1995-02-01 1996-08-08 Greg Benson A method and system for managing a data object so as to comply with predetermined conditions for usage
WO1998008344A2 (en) * 1996-08-13 1998-02-26 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials

Also Published As

Publication number Publication date
CN1292960A (en) 2001-04-25
WO1999049615A1 (en) 1999-09-30
EP1074113A1 (en) 2001-02-07
AU1109499A (en) 1999-10-18
CA2326098A1 (en) 1999-09-30

Similar Documents

Publication Publication Date Title
US5734823A (en) Systems and apparatus for electronic communication and storage of information
US6633877B1 (en) Method and apparatus for delivery of selected electronic works and for controlling reproduction of the same
AU761284B2 (en) Mobile electronic commerce system
EP0719485B1 (en) Access control for portable data storage media
CA2370083A1 (en) Methods and devices for storing, distributing, and accessing intellectual property in digital form
US20020112172A1 (en) System and method for secure distribution of digital products
US7191153B1 (en) Content distribution method and apparatus
US20050076020A1 (en) Digital data vending system and method of selling digital data files
EP1074113A1 (en) Information distribution system
US20020013940A1 (en) Content rental system
CN102160326A (en) System and method for dispensing digital information from an automated transaction machine
EP0870380A1 (en) System and method for access control for data storage media
JP2002042013A (en) Contents distributing method, contents distributing system and recording medium with contents distributing program recorded thereon
JP2003509756A (en) Portable terminal suitable for electronic publication system
JP4122707B2 (en) DIGITAL CONTENT DISTRIBUTION METHOD AND SYSTEM, AND MEDIUM CONTAINING THE PROCESSING PROGRAM
KR20050048689A (en) Content price management system, method, and recording medium
KR20210000156A (en) E-book sales and management system
KR100342400B1 (en) Electronic publication system and method for selling and managing electronic publication
AU715638C (en) System and method for access control for data storage media
AU694742C (en) Access control for portable data storage media
JP2003187095A (en) Mail magazine issuing device, mail magazine issuing system, mail magazine issuing method and its program

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20001017

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

A4 Supplementary search report drawn up and despatched

Effective date: 20020218

AK Designated contracting states

Kind code of ref document: A4

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

RIC1 Information provided on ipc code assigned before grant

Free format text: 7H 04L 9/32 A, 7G 06F 1/00 B

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: DIGEO INC

17Q First examination report despatched

Effective date: 20041203

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIN1 Information on inventor provided before grant (corrected)

Inventor name: SAIGH, MICHAEL, M.

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20060926