CN102270283A - User management method of e-book reader, and e-book reader - Google Patents

User management method of e-book reader, and e-book reader Download PDF

Info

Publication number
CN102270283A
CN102270283A CN2010101913428A CN201010191342A CN102270283A CN 102270283 A CN102270283 A CN 102270283A CN 2010101913428 A CN2010101913428 A CN 2010101913428A CN 201010191342 A CN201010191342 A CN 201010191342A CN 102270283 A CN102270283 A CN 102270283A
Authority
CN
China
Prior art keywords
user
book reader
type
books
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101913428A
Other languages
Chinese (zh)
Inventor
张俊明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI EDO ELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI EDO ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI EDO ELECTRONIC TECHNOLOGY Co Ltd filed Critical SHANGHAI EDO ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN2010101913428A priority Critical patent/CN102270283A/en
Publication of CN102270283A publication Critical patent/CN102270283A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to e-book reading equipment, and discloses a user management method of an e-book reader, and the e-book reader. In the invention, the e-book reader sets and stores corresponding information for each user, wherein the information corresponding to each user comprises authority type of the user, user password, user name and books allowed to read. The information corresponding to the currently logged in user is found out according to the information input by the user while logging in, and the books allowed to read are displayed for the user. Since not all the people getting the e-book reader can read the content of the e-book reader, users can effectively protect own privacy, and some users with limited authority cannot read all the books in the e-book reader, and can only read the authorized books, so that level-to-level administration for the users and the books is implemented.

Description

The user management method of E-book reader and E-book reader
Technical field
The present invention relates to e-book reading device, particularly the user management technology of E-book reader.
Background technology
Electric ink is innovating technologies of a kind of display message.Naked eyes be it seems electric ink as one bottle of common ink, but have millions of tiny microcapsules to be suspended in the electric ink liquid.Each capsule is the potpourri of dyestuff and pigment chip, and these tiny chips can be subjected to charge effect.Can liken the microcapsules of electric ink to transparent plastic water-ball.Comprise tens tablees tennis in each water polo, what charge in the water polo is pigment water.If see water polo from the top, we can see that many white tablees tennis float on a liquid, so water polo seems to be white in color.See water polo from the bottom, what you only saw is pigment water, so water polo seems to be black.If you are put into a container to several thousand water polo, and by electric field these tablees tennis are moved between the top and bottom of water polo, you just can see that container is changing color.The basic functional principle of Here it is a kind of typical electronic ink.In fact these water polo are microcapsules of 100 microns of diameters.
Electric ink has many advantages, comprises legibility, flexibility, easily cheap manufacturing and low-power consumption etc.Compare with other display technique, the reflectivity and the contrast of electric ink are preferable.Seem the China ink on their sensitive papers, people are read and feel well when handling.Under light comprised direct sunlight, other display technique can feel that some is light and be difficult to read, and saw easily and read based on the demonstration of electric ink.
Under the prerequisite that does not expend any additional electrical energy, electric ink can keep image to reach several weeks, and the power consumption that other display technique need continue when showing usually.
A kind of application of electric ink is to make E-book reader (e-book device, display screen e-bookreader).Because utilize electric ink can keep but consumed power not of image for a long time, therefore this E-book reader only needs small amount of electrical energy when page turning, a fritter lithium battery just can roll up ten thousand pages.And the reflectivity of electric ink and contrast are preferable, so long-time the reading do not hindered eyes yet.
Therefore numerous characteristics such as (volume is generally all little than book, and it is light a lot of that weight is also wanted, and is easy to carry very much), capacity are big because E-book reader has possessed and is convenient for carrying, power saving, support form are many have been subjected to people's extensive welcome.
Yet; the present inventor finds; existing E-book reader makes the user be difficult to the privacy of protection oneself; anyone is after taking this user's E-book reader; can know easily that what book you are reading, your bookmark, your annotations and comments content; even your notepad, your schedule etc.In addition, existing E-book reader can't be realized user's differentiated control, as limiting the books that other users can read by certain user.Specifically, father and mother buy E-book reader of child, but wish that child reads some healthy books, rather than remove to read some rubbish books, and existing E-book reader can't be realized this function.
Summary of the invention
The object of the present invention is to provide a kind of user management method and E-book reader of E-book reader, the protection privacy of user, and can realize user's differentiated control.
For solving the problems of the technologies described above, embodiments of the present invention provide a kind of user management method of E-book reader, comprise following steps:
E-book reader is the information that each user is provided with and storage is corresponding, and the pairing information of each user comprises the books that user's permission type, user cipher, user name, permission are read;
The information of input when E-book reader is logined according to the user is searched the user's information corresponding with current login, and shows that to the user this user allows the books of reading.
Embodiments of the present invention also provide a kind of E-book reader, comprise:
Module is set, is used to each user that corresponding information is set, the pairing information of each user comprises the books that user's permission type, user cipher, user name, permission are read;
Memory module is used to store each user's that the module setting is set corresponding informance;
Search module, be used for the information of input when logining, search the user's information corresponding with current login according to the user,
Display module is used for showing that to the user this user allows the books of reading.
Embodiment of the present invention compared with prior art, the key distinction and effect thereof are:
E-book reader is the information that each user is provided with and storage is corresponding, and the pairing information of each user comprises the books that user's permission type, user cipher, user name, permission are read.The information of input finds user's information corresponding storage and current login, and shows that to the user this user allows the books of reading when logining according to the user.Because E-book reader need just can demonstrate the books of reading of relative users according to correct input information, read for the user.Therefore; be not that all people that take this E-book reader can both read wherein content; make the user can effectively protect the privacy of oneself; even other people take this E-book reader; also can't know the books that you read, the bookmark of setting easily; annotations and comments content, and any relevant information.And for some authority limited users, also can't read wherein all books, can only read the books that are authorized to, realize the differentiated control of user and books, help the development of e-book industry, make that the head of a family is that child buys e-book and is without fear of an attack from the rear.
Further, user's permission type is divided into the not limited first kind of authority and the second limited type of authority.E-book reader is the user's of the first kind input according to permission type, and the corresponding informance that permission type is the user of second type is set; Permission type is the user's of the first kind a corresponding informance, is arranged on acquiescently in the described E-book reader.User's permission type is divided into two classes, the first kind (being the power user) and second type (being domestic consumer), by the newly-built domestic consumer of power user, and be the books that newly-built domestic consumer's selection can be read, being particularly useful for by the head of a family is the scene that children buy e-book, owing to after father and mother buy e-book, can be child and set the books that can read, thereby what guaranteed that child reads is some healthy books.
Further, the first kind possesses following authority: check permission type be the user of second type corresponding informance, to revise permission type be the user's of second type corresponding informance; Second type can possess following authority: revise this user's password, add annotations and comments, label in allowing the books of reading.Further perfect differentiated control to the user.
Further, E-book reader is in each start or when screen protection is withdrawed from, and the prompting user lands again.Owing in each start or when screen protection is withdrawed from, need the user to re-enter log-on message, further protected user's privacy, and ensured that further each user can only operate this E-book reader within the limits of one's authority.
Description of drawings
Fig. 1 is the user management method process flow diagram according to the E-book reader of first embodiment of the invention;
Fig. 2 is the synoptic diagram according to the newly-increased domestic consumer in the first embodiment of the invention;
Fig. 3 be according to user in the first embodiment of the invention add annotations and comments the synoptic diagram of bookmark;
Fig. 4 is the structural representation according to the E-book reader of third embodiment of the invention.
Embodiment
In the following description, in order to make the reader understand the application better many ins and outs have been proposed.But, persons of ordinary skill in the art may appreciate that even without these ins and outs with based on the many variations and the modification of following each embodiment, also can realize each claim of the application technical scheme required for protection.
For making the purpose, technical solutions and advantages of the present invention clearer, embodiments of the present invention are described in further detail below in conjunction with accompanying drawing.
First embodiment of the invention relates to a kind of user management method of E-book reader, and idiographic flow as shown in Figure 1.
In step 110, E-book reader is the user's of the first kind input according to permission type, the corresponding informance that permission type is the user of second type is set, and the pairing information of each user comprises the books that user's permission type, user cipher, user name, permission are read.
Specifically, the user of two kinds of permission types of domestic consumer that power user that the E-book reader support authority in the present embodiment is not limited and authority are limited, permission type is user's (being the power user) of the first kind, possesses the user that newly-increased permission type is second type (being domestic consumer), the erase right type is the authorities such as user of second type.The pairing information of power user is arranged in the E-book reader acquiescently, such as the user who stores the power user in the E-book reader acquiescently is called AAA, and user cipher is 000000, and authority is unrestricted, can read information such as all books.Directly buy the user of E-book reader, can on product description, find power user's log-on message, login this E-book reader for the power user.
Directly buy the user of E-book reader according to user name that on instructions, finds and user cipher, after logining this E-book reader with power user's identity, can increase domestic consumer newly, for newly-increased domestic consumer provides user name, user cipher, selects books etc. for it.Such as the power user has increased 2 domestic consumers newly: little strong and little fourth.E-book reader is according to power user's input, the corresponding informance that is provided with for little strong and little fourth as shown in Figure 2, wherein, little strong user cipher is 123456, the books that can read are: those things of the Ming Dynasty, how is the steel produced, Lu xun's miscellaneous work; The user cipher of little fourth is 123123, and the books that can read are: number difficult to understand decide the issue of the battle guide, physics high score guide, how to learn chemistry, those things of the Ming Dynasty well.
This shows that each user is just as a form, charting corresponding information, just as the registered permanent residence.These information leave the inside of E-book reader in.Just have only the power user to possess direct deletion to domestic consumer, modification, authority such as newly-increased, in addition, for managerial convenience, the E-book reader in the present embodiment is only supported a power user.The books that each domestic consumer is authorized to read are stored in the mode of accessible file tabulation.
Then, in step 120, E-book reader is waited for the information of input when receiving the user logins.The information of input was user name and user cipher when in the present embodiment, the user logined.In addition, be appreciated that in actual applications that the information of input also can be user cipher when the user logined.
Then, in step 130, the information of input when E-book reader is logined according to the user is searched the user's information corresponding with current login, and shows that to the user this user allows the books of reading.Owing to have only right user name+password, can login success, in a single day therefore to login successfully, E-book reader is just known the user of current login, and corresponding authority.
At above-mentioned case, when the user is little take by force E-book reader and the login after, E-book reader can be according to the user name and the user cipher of the little strong input of user, find the relevant information of unique correspondence, comprise the little strong authority of this user, accessible file tabulation (promptly be allowed to read books) etc.Books in the tabulation of this accessible file not, because can be to the little strong demonstration of this user, so the user be little can't read uncommitted books by force.
Certainly, if the power user logins this E-book reader, then E-book reader according to the corresponding informance that finds as can be known, this power user's authority is unrestricted, therefore the books of reading that show are the whole books in this E-book reader.
Then, in step 140, E-book reader according to user's input, is carried out operation accordingly in the extent of competence of current login user.
Specifically, power user's authority is unrestricted, therefore can carry out any operation that this E-book reader is supported, comprising: create any domestic consumer, for it is provided with initial password; The corresponding informance of domestic consumer is checked or revised to books on management this locality and the storage card; Delete any domestic consumer, delete books list information of this user's correspondence or the like simultaneously.And the authority of domestic consumer is restricted, so therefore can't read books, can only read the books that are authorized to.But domestic consumer can also possess this user's of modification password, adds authorities such as annotations and comments, label in allowing the books of reading.That is to say, after domestic consumer's login, can only see and also can only read the books that the power user authorizes, can not delete, duplicate, but can add annotations and comments, bookmark.And other users are invisible for these information.Such as, when the user is little go by force to read D: historical during those things .txt of the Ming Dynasty, it can read this document, he can add annotations and comments bookmark (as shown in Figure 3), the Pi Zhu bookmark of all its interpolations, E-book reader all can be recorded as the little strong interpolation of user.But when the login of the little fourth of user, though little fourth also can read D: historical this this book of those things .txt of the Ming Dynasty, the bookmark of little strong interpolation annotations and comments, little fourth can't see, because the user name of correspondence does not match when logining.
In step 150, whether the user who judges current login logs off or because of there not being any operation to enter the screen protection state for a long time, if do not have, then continues to get back to step 140; If the user log off of current login or because of there not being any operation to enter the screen protection state is for a long time then got back to step 120.That is to say that E-book reader all can require the user to land again in each start or when screen protection is withdrawed from.Owing in each start or when screen protection is withdrawed from, need the user to re-enter log-on message, further protected user's privacy, and ensured that further each user can only operate this E-book reader within the limits of one's authority.
Be not difficult to find, in the present embodiment,, read or other operations for the user because E-book reader need just can demonstrate the books of reading of relative users according to correct input information.Therefore; be not that all people that take this E-book reader can both read wherein content; make the user can effectively protect the privacy of oneself; even other people take this E-book reader; also can't know the books that you read, the bookmark of setting easily; annotations and comments content, and any relevant information.And for some authority limited users, also can't read wherein all books, can only read the books that are authorized to, realize the differentiated control of user and books, help the development of e-book industry, make that the head of a family is that child buys e-book and is without fear of an attack from the rear.
And, user's permission type is divided into two classes, the first kind (being the power user) and second type (being domestic consumer), by the newly-built domestic consumer of power user, and select the books that can read for newly-built domestic consumer, being particularly useful for by the head of a family is the scene that children buy e-book, because after father and mother buy e-book, can be child and set the books that to read, thereby what guaranteed that child reads is some healthy books.
Second embodiment of the invention relates to a kind of user management method of E-book reader.Second embodiment improves on the basis of first embodiment, and main improvements are: E-book reader switches between the user model of different rights type according to user's input.That is to say, under superuser mode, can switch to domestic consumer; Under user EXEC, also can switch to the power user.
In addition, in the first embodiment, the user is logging off at every turn or because of after not having any operation to enter the screen protection state for a long time, is reusing this E-book reader if desired, then this E-book reader all can point out the user to login again, requires the user to re-enter username and password.And in the present embodiment, this function can have only the user to open this option just as an option, just can start this function.
Each method embodiment of the present invention all can be realized in modes such as software, hardware, firmwares.No matter the present invention be with software, hardware, or the firmware mode realize, instruction code can be stored in the storer of computer-accessible of any kind (for example permanent or revisable, volatibility or non-volatile, solid-state or non-solid-state, fixing or removable medium or the like).Equally, storer can for example be programmable logic array (Program mable Array Logic, be called for short " PAL "), random access memory (Random Access Memory, be called for short " RAM "), programmable read only memory (Programmable Read Only Memory, be called for short " PROM "), ROM (read-only memory) (Read-Only Memory, be called for short " ROM "), Electrically Erasable Read Only Memory (Electrically Erasable Programmable ROM, be called for short " EEPROM "), disk, CD, digital versatile disc (Digital Versatile Disc is called for short " DVD ") or the like.
Third embodiment of the invention relates to a kind of E-book reader, and as shown in Figure 4, this E-book reader comprises:
Module is set, is used to each user that corresponding information is set, the pairing information of each user comprises the books that user's permission type, user cipher, user name, permission are read.
Memory module is used to store each user's that the module setting is set corresponding informance.
Search module, be used for the information (as user name and user cipher) of input when logining, search the user's information corresponding with current login according to the user,
Display module is used for showing that to the user this user allows the books of reading.This display module also is used in each start or when screen protection is withdrawed from, and the prompting user lands again.
In the present embodiment, user's permission type is divided into the not limited first kind of authority and the second limited type of authority.The first kind possesses following authority: newly-increased permission type be second type user, user that the erase right type is second type, check permission type be the user of second type corresponding informance, to revise permission type be the user's of second type corresponding informance.It is the user's of the first kind input according to permission type that module is set, and the corresponding informance that permission type is the user of second type is set.Permission type is the user's of the first kind a corresponding informance, is arranged in the E-book reader acquiescently.
Second type can possess one of following authority or its combination: revise this user's password, add annotations and comments, label in allowing the books of reading.
Be not difficult to find that first embodiment is and the corresponding method embodiment of present embodiment, present embodiment can with the enforcement of working in coordination of first embodiment.The correlation technique details of mentioning in first embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in the present embodiment also can be applicable in first embodiment.
Four embodiment of the invention relates to a kind of E-book reader.The 4th embodiment improves on the basis of the 3rd embodiment, and main improvements are: E-book reader also comprises handover module, is used for the input according to the user, switches between the user model of different rights type.
Be not difficult to find that second embodiment is and the corresponding method embodiment of present embodiment, present embodiment can with the enforcement of working in coordination of second embodiment.The correlation technique details of mentioning in second embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in the present embodiment also can be applicable in second embodiment.
Need to prove, each unit of mentioning in each equipment embodiment of the present invention all is a logical block, physically, a logical block can be a physical location, it also can be the part of a physical location, can also realize that the physics realization mode of these logical blocks itself is not most important with the combination of a plurality of physical locations, the combination of the function that these logical blocks realized is the key that just solves technical matters proposed by the invention.In addition, for outstanding innovation part of the present invention, above-mentioned each the equipment embodiment of the present invention will not introduced not too close unit with solving technical matters relation proposed by the invention, and this does not show that there is not other unit in the said equipment embodiment.
Though pass through with reference to some of the preferred embodiment of the invention, the present invention is illustrated and describes, but those of ordinary skill in the art should be understood that and can do various changes to it in the form and details, and without departing from the spirit and scope of the present invention.

Claims (12)

1. the user management method of an E-book reader is characterized in that, comprises following steps:
E-book reader is the information that each user is provided with and storage is corresponding, and the pairing information of each user comprises the books that user's permission type, user cipher, user name, permission are read;
The information of input when described E-book reader is logined according to the user is searched the user's information corresponding with current login, and shows that to the user this user allows the books of reading.
2. the user management method of E-book reader according to claim 1 is characterized in that, described user's permission type is divided into the not limited first kind of authority and the second limited type of authority; The described first kind possesses following authority:
Newly-increased permission type be second type user, user that the erase right type is second type, check permission type be the user of second type corresponding informance, to revise permission type be the user's of second type corresponding informance;
Described E-book reader is the user's of the first kind input according to permission type, and the corresponding informance that permission type is the user of second type is set;
Permission type is the user's of the first kind a corresponding informance, is arranged on acquiescently in the described E-book reader.
3. the user management method of E-book reader according to claim 2 is characterized in that, described second type possesses one of following authority or its combination:
Revise this user's password, in allowing the books of reading, add annotations and comments, label.
4. the user management method of E-book reader according to claim 2 is characterized in that, also comprises following steps:
Described E-book reader switches between the user model of different rights type according to user's input.
5. according to the user management method of each described E-book reader in the claim 1 to 4, it is characterized in that the information of input was user name and user cipher when described user logined.
6. according to the user management method of each described E-book reader in the claim 1 to 4, it is characterized in that, also comprise following steps:
Described E-book reader is in each start or when screen protection is withdrawed from, and the prompting user lands again.
7. an E-book reader is characterized in that, comprises:
Module is set, is used to each user that corresponding information is set, the pairing information of each user comprises the books that user's permission type, user cipher, user name, permission are read;
Memory module is used to store the described corresponding informance that each user of module setting is set;
Search module, be used for the information of input when logining, search the user's information corresponding with current login according to the user,
Display module is used for showing that to the user this user allows the books of reading.
8. E-book reader according to claim 7 is characterized in that, described user's permission type is divided into the not limited first kind of authority and the second limited type of authority; The described first kind possesses following authority:
Newly-increased permission type be second type user, user that the erase right type is second type, check permission type be the user of second type corresponding informance, to revise permission type be the user's of second type corresponding informance;
The described module that is provided with is the user's of the first kind input according to permission type, and the corresponding informance that permission type is the user of second type is set;
Permission type is the user's of the first kind a corresponding informance, is arranged on acquiescently in the described E-book reader.
9. E-book reader according to claim 8 is characterized in that, described second type possesses one of following authority or its combination:
Revise this user's password, in allowing the books of reading, add annotations and comments, label.
10. E-book reader according to claim 8 is characterized in that described E-book reader also comprises handover module, is used for the input according to the user, switches between the user model of different rights type.
11., it is characterized in that the information of input was user name and user cipher when described user logined according to each described E-book reader in the claim 7 to 10.
12., it is characterized in that described display module also is used in each start or when screen protection is withdrawed from according to each described E-book reader in the claim 7 to 10, the prompting user lands again.
CN2010101913428A 2010-06-03 2010-06-03 User management method of e-book reader, and e-book reader Pending CN102270283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101913428A CN102270283A (en) 2010-06-03 2010-06-03 User management method of e-book reader, and e-book reader

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101913428A CN102270283A (en) 2010-06-03 2010-06-03 User management method of e-book reader, and e-book reader

Publications (1)

Publication Number Publication Date
CN102270283A true CN102270283A (en) 2011-12-07

Family

ID=45052586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101913428A Pending CN102270283A (en) 2010-06-03 2010-06-03 User management method of e-book reader, and e-book reader

Country Status (1)

Country Link
CN (1) CN102270283A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425637A (en) * 2012-05-18 2013-12-04 英奇达资讯股份有限公司 Electronic book grading method
CN103677800A (en) * 2012-09-14 2014-03-26 柯尼卡美能达株式会社 Mobile information terminal, information management system and sharing method
CN103716412A (en) * 2014-01-03 2014-04-09 汉柏科技有限公司 Cloud computing system and method and device for controlling user permission through quadratic mapping of cloud computing system
CN105224595A (en) * 2015-08-26 2016-01-06 北京京东尚科信息技术有限公司 A kind of e-book search method of client and device
CN107454044A (en) * 2016-06-01 2017-12-08 北京泰克贝思科技股份有限公司 A kind of e-book reading protection of usage right method and system
CN107665529A (en) * 2017-09-15 2018-02-06 泾县麦蓝网络技术服务有限公司 Smart lock unlocking method, the electric car and its unlocking method with the smart lock
CN111324406A (en) * 2020-01-22 2020-06-23 上海工艺美术职业学院 Electronic book display method and system, electronic equipment and computer storage medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425637A (en) * 2012-05-18 2013-12-04 英奇达资讯股份有限公司 Electronic book grading method
CN103677800A (en) * 2012-09-14 2014-03-26 柯尼卡美能达株式会社 Mobile information terminal, information management system and sharing method
CN103677800B (en) * 2012-09-14 2017-04-12 柯尼卡美能达株式会社 Mobile information terminal, information management system and sharing method
CN103716412A (en) * 2014-01-03 2014-04-09 汉柏科技有限公司 Cloud computing system and method and device for controlling user permission through quadratic mapping of cloud computing system
CN105224595A (en) * 2015-08-26 2016-01-06 北京京东尚科信息技术有限公司 A kind of e-book search method of client and device
CN105224595B (en) * 2015-08-26 2019-07-02 北京京东尚科信息技术有限公司 A kind of the e-book search method and device of client
CN107454044A (en) * 2016-06-01 2017-12-08 北京泰克贝思科技股份有限公司 A kind of e-book reading protection of usage right method and system
CN107665529A (en) * 2017-09-15 2018-02-06 泾县麦蓝网络技术服务有限公司 Smart lock unlocking method, the electric car and its unlocking method with the smart lock
CN111324406A (en) * 2020-01-22 2020-06-23 上海工艺美术职业学院 Electronic book display method and system, electronic equipment and computer storage medium

Similar Documents

Publication Publication Date Title
CN102270283A (en) User management method of e-book reader, and e-book reader
Lees et al. Resisting planetary gentrification: The value of survivability in the fight to stay put
CN103488940A (en) Password protection system and method for application programs of intelligent equipment
Bowers Digital detachment: How computer culture undermines democracy
World Bank Enhancing Opportunities for Clean and Resilient Growth in Urban Bangladesh: Country Environmental Analysis 2018
Mikulecký Remarks on ubiquitous intelligent supportive spaces
Michelsen Industry 4.0 in Retrospect and in Context
KR101173103B1 (en) Electric device for providing smart card with form of graphical user interface
Tschirhart Theory talk# 41: Mark Duffield on human (in) security, liberal interventionism and fortified aid compounds
CN101996546A (en) Reader and display method based on E-paper display (EPD)
Alkatiri et al. Not like eating chili: constructing alternative cultural space for the Betawians
Boland et al. Lean Startup: Opportunity Discovery or Opportunity Creation?
Buchele Using OLPC laptop technology as a computer science case study teaching tool
CN203982393U (en) Security server rack
CN103268434A (en) Embedded type system and remote injection running method thereof
Williamson Process and Purpose, Not Thing and Technique: How to Pose Data Science Research Challenges
Borup et al. Expectations in nanotechnology and in energy-Foresight in the sea of expectations. Background paper
Durbin Sustainable Activism, the Center for Energy and Environmental Policy and Experimental Learning
JOSHI Sustainability, a priority
Ismibeyli et al. Digital Ecosystem
Temple Reeve et al. Online simulation powered learning modules for materials science
Fjaestad Nuclear Waste and Historical Time
Vink Gamma-ray burst progenitors and the population of rotating Wolf–Rayet stars
Scalambrino Steve Fuller, Veronika Lapinska: The Proactionary Imperative: A Foundation for Transhumanism
Klauer et al. Different approaches to sustainability policy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20111207