CN1292960A - Information distribution system - Google Patents

Information distribution system Download PDF

Info

Publication number
CN1292960A
CN1292960A CN98813996.0A CN98813996A CN1292960A CN 1292960 A CN1292960 A CN 1292960A CN 98813996 A CN98813996 A CN 98813996A CN 1292960 A CN1292960 A CN 1292960A
Authority
CN
China
Prior art keywords
books
information
text
user
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN98813996.0A
Other languages
Chinese (zh)
Inventor
迈克尔·M·塞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IPPN Inc
Original Assignee
IPPN Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IPPN Inc filed Critical IPPN Inc
Publication of CN1292960A publication Critical patent/CN1292960A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Abstract

An information distribution system, in accordance with one form of the present invention, includes a central information bank (100) and a central transactional data base (104) coupled to point-of-sale delivery systems (202). Information flows between each point-of-sale delivery system and the central information bank and central transactional data base via communication network such as the telephone network, a satellite network, or any other network suitable for the transfer of information. The point-of-sale delivery systems may take one of many forms including a point of purchase delivery system, a point of rental delivery system, a ''book bank'' (116A) subsystem, a promotional delivery system, or any combination of such systems. Information exchanged within the system is controlled using various levels of encryption and is monitored to prevent unauthorized exchange.

Description

Information distribution system
The present invention relates to system, more particularly, relate to the communication network of the information that between central information storehouse and user interface, transmits with the electronic format distribution of information.
For existing information issue and publishing system, usually with the fixing printing image on the paper, or with the mode of the still image on other media such as tape, disk, cassette tape, videodisc or CD, delivery information.On the each point before the delivery process and in delivery process, usually with information stores in the storehouse.Finally, information is delivered to spreads all over the retail outlet of issuing the region.In case the information of receiving, retailer or stored information or display data are so that resell.
Existing issue and publishing system have many unfavorable conditions.One of unfavorable conditions be need that plenty of time and work are prepared, printed, making and distribution of information.Another unfavorable conditions of existing system is the control that lacks the production quantity (as the copy number of making and selling) to information.Other unfavorable conditions of existing publishing system are that issue and distribution of information renewal need the time, work and cost.
People have set up the billboard network, to attempt to improve the distribution of information of some type.Set up or set up the network such as the internet.Well-known network utilizes telephone network or other networks as communication media usually, and utilizes the computer of commercially available software and nearly all type to conduct interviews.Yet shown in current operation, this type of network is not suitable for issuing Proprietary Information and is used as limited information of duplicating.Everyone provides protection to copyright and Proprietary Information hardly to use this type of network freedom to transmit information.
With regard in a certain respect, the present invention is a kind of overcome existing information issue and the unfavorable conditions of publishing system and information distribution system of shortcoming.The information distribution system of a certain form according to the present invention comprises a central information storehouse and a central transaction database of being connected to the point of sale delivery system.Central information storehouse and central transaction database need not to be positioned at jointly same position, and can realize on the computer system of different (but needing to connect).By any other network such as telephone network, satellite network or suitable transmission information, information flows between each point of sale delivery system and central information storehouse and central transaction database.
Or rather, the information that obtains from publisher is carried out digitlization there, promptly be converted to electronic format, so that create a primary copy with identical electronic format.Only the information translation of the digitized format that will there obtain from publisher is identical electronic format.In the central information storehouse, store primary copy.
Central transaction database realizes that record keeps function.Particularly, transaction data base writes down and stores the relevant information of finishing with each point of sale of every transaction.In case receive request, transaction data base just is sent to sales data the publisher that is asking.
The point of sale delivery system can be taked one of following various ways, the combination in any that comprises point of purchase delivery system, hires out some delivery system, " stack room (book bank) " subsystem, distribution delivery system or this type systematic.In the delivery system of point of sale, with download of information, promptly copy on user's the storage medium, so that the user visits subsequently.Hire out the some delivery system and be similar to point of purchase system, but except that download message, also will download automatic cycle in erasing time indication.As explain in detail hereinafter like that, the indication of cycle service time so that the closing date of an arrival fixed time, is just wiped the information of download from user's the storage medium automatically.The stack room subsystem is the subnet of setting up between the authorized user such as employee of company.Have proper authorization perhaps can subnet in each user, appointed information that can the access subnetwork stored.This type of configuration allows information sharing.In promoting delivery system, can visit and promote and other business informations, so that check and order products.
Most important element in each point of sale delivery system is a user interface, is called " stack room " sometimes herein.Term as used herein stack room mean the interface between network and the user.Although " books kind (booktype) " data can be inferred in the term stack room, this kind qualification do not done in this term.Data can be polytype, as film, music, video, image, text, audio frequency and computer software data.
Stack room are that a kind of self-service customer interaction information is sold equipment.Each stack room comprises the local storage of a high power capacity, and the latter has the customized file folder that needs most information products of relevant this stack room particular station of living in.By the business correspondence network (as, telephone network, cable system, satellite or cellular system or other similar communication networks), other information are sent to stack room, be used to replenish, auxiliary and less demand purposes.Be included in the stack room and be connected to the center processing parts of stack room local storage, the download of control information and dynamic encryption.
In one embodiment, the user can select the partial content or the full content of a book or several books.Make up selected information then, and download on user's the memory device, as cassette tape.In certain execution mode, cassette tape comprises unique identifying number and the definite memory space that is used to store selected information.
Widely-used the present invention can greatly simplify and reduction and information issue and distribution cost related.Particularly, present architecture can reduce needed time of information distribution and resource.In addition, only need to upgrade the primary copy of storing in the central information storehouse, write the copy of storing in each stack room then or with the primary copy that upgraded, the perhaps primary copy crossed of down loading updating and the version in each stack room, storing legacy version simultaneously and upgraded, just lastest imformation easily.Each stack room comprises the electronic index of the various message headers that can visit from these stack room.In addition, can control the making number of particular work easily by using central transaction database, so that follow the tracks of in this network the copy number of each works of making, selling.
The present invention is duplicating of control information easily, can greatly simplify text and upgrade, and the dynamic encryption of text can everyone provides enough confidence for the copyright in the present networks and Proprietary Information, to transmit this type of information in this network.
By reading following detail specifications together with accompanying drawing, above-mentioned purpose of the present invention and advantage, and other feature and advantage will be more apparent.Wherein accompanying drawing is:
Fig. 1 represents a kind of execution mode of this information distribution system architecture;
Fig. 2 represents the information flow of system architecture shown in Figure 1;
Fig. 3 represents the block diagram of point of purchase delivery system;
Fig. 4 represents the more detailed diagram of Hosts file server shown in Figure 3;
Fig. 5 is the perspective view of stack room execution mode;
Fig. 5 A is another kind of stack room execution modes;
Fig. 6 represents the block diagram of stack room circuit;
Fig. 7 represents the block diagram of end user's storage medium;
Fig. 8 represents the information flow of point of purchase configuration;
Fig. 9 represents to hire out the block diagram of some parts in the delivery system;
Figure 10 represents the block diagram of some parts in the subsystem of stack room;
Figure 11 represents to promote the block diagram of some parts in the delivery system;
Figure 12 represents the flow chart of the encryption of realization according to the present invention; And
Figure 13 is the another kind of execution mode in stack room.
Following part provides the brief introduction of native system and the detailed description of system architecture.After description architecture, describe the point of sale in detail and pay configuration.Describe the processing of other encryption of various level that can in native system, use subsequently in detail.
A. brief introduction
According to one embodiment of the present invention, from the individualized storage medium distribution of information of center information bank to the user.Perhaps in the electronics mode by various communication networks (as telephone wire, cable system, cellular system or other similar business communications systems) from external source, perhaps with the form of hard copy from various storage mediums (as disk or electronic magnetic disc, cassette tape, tape reel, CD, videodisc or cassette magnetic tape), receive the information that native system is issued in a manner described.If information is to receive with the form of hard copy, then, at first be converted into standard digital form (as ASCII text, DOS text or the popular text format of other similar standards) by scanning or direct recording.Then information is carried out digitlization, format, compression and initial the encryption, to be formed in the main electronic copy of storing in the central information storehouse.By the communication network such as telephone network or satellite network, the reprography primary copy and its electronic distribution to the point of sale delivery system.Stack room constitute the part of this type of delivery system, and electronic copy is remained in the stack room to download to user's individualized storage medium.At first, the information that user's selection will be downloaded, and in transaction data base, generate tracking clauses and subclauses to write down this transmission.With this copy download before user's the storage medium and in this process, adopt other encryption of variable stage that depends on multiple variable (for example economic worth of this information), information is carried out dynamic encryption.Adopt " dynamically " encryption, thereby can only utilize the electronic reader relevant with this subscriber card, show this information with intelligible text format, wherein subscriber card is with visiting the information in the stack room and this download of information being arrived this user's cassette memory magnetic tape unit.
B. system architecture
Fig. 1 represents a kind of execution mode of this information distribution system.Represent this system in the mode that realizes that is found everywhere through the world, this figure only is used for illustration purpose.With reference to Fig. 1, central information storehouse 100 is the center " storehouse " of information, i.e. memory location.The peripheral information storehouse 102A-F that is connected to central information storehouse 100 is the storehouse towards the information of community, i.e. memory location.For example, be used for the peripheral information storehouse 102E of Rome, ITA, may not can often visit canned data in the central information storehouse 100, and the frequent access to information database 100 of SF Bay area peripheral information storehouse 102A.In any case, central information storehouse 100 is connected to each peripheral information storehouse 102A-F to share information.As hereinafter with reference to peripheral information storehouse 102F describe in detail, each peripheral information storehouse 102A-F is connected to one or more point of sales.
Be connected to the central transaction database 104 of central information storehouse 100 and peripheral information storehouse 102A-F, provide the central record of central information storehouse 100 and peripheral information storehouse 102A-F to keep function.Central information storehouse 100 and central transaction database 104 are preferably commercially available mainframe computer, as the mainframe computer of IBM.Concrete which kind of large-scale computer model of selecting depends on network center's canned data amount, and the record that carry out keeps scope, the transfer rate that take place and the information processing speed of function.Importantly, the present invention is not limited to the certain computer as central information storehouse and/or central transaction database.
As shown in Figure 1, this figure is that the various decomposition views that are connected between the website are paid with transaction data base 104, peripheral information storehouse 102F and each point of sale in central information storehouse 100, and wherein payment website in point of sale comprises point of purchase website 108A-C, hires out a some website 110A-D, promotes website 112A-D and stack room subsystem website 114A-C.Each point of purchase website 108 comprises a point of purchase transaction data base with box indicating, and one is represented user interface with circle.As mentioned above, sometimes user interface is called " stack room " herein.Particularly, point of purchase website 108A comprises stack room 116A and transaction data base 118A, and website 108B comprises stack room 116B and transaction data base 118B, and website 108C comprises stack room 116C and transaction data base 118C.Because central information storehouse 100 and peripheral information storehouse 102F, particularly peripheral information storehouse memorizer parts 106A also can be used as stack room, so represent this base part with circle.The details of relevant stack room and transaction data base partly is provided at C later on.
As shown in Figure 1, can be with each the point of sale delivery system such as the 112A of system, 108A-B, 110A and 114A-B, directly be networked to peripheral information storehouse 102F, perhaps will be networked to point of purchase website 108B, wherein the latter will be networked to peripheral information storehouse 102F such as the point of sale delivery system the 108C of system, 110B-D, 112B, 112D and the 114B-C.In following C part, explain the configuration of point of sale delivery system.Yet, on level shown in Figure 1, importantly understand and delivery system can be integrated in the various combinations, the selling point of the rental system shown in 110B and 112B, the selling point of the purchase system shown in 108B and the 112C, the perhaps combination of the selling point shown in 108C, 110D and the 112D, the point of purchase and rental system point.
Can utilize the combination that is suitable for the multiple commercial network such as phone, satellite or cable system or other media of number format transmission information, be implemented in the communication network link between central information storehouse 100, central transaction database 104, peripheral information storehouse 102A-F and the point of sale.Can use multiple known agreement together with native system.For example, if use the internet, then can use well-known ICP/IP protocol as " backbone " network.
Fig. 2 represents the information flow according to the execution mode of system shown in Figure 1 architecture.For convenience of explanation, peripheral storage parts 106A is merged in the central information storehouse 100, peripheral transaction data base 106B is merged in the central transaction database 104.Certainly, should be appreciated that, be provided at the communication link between peripheral information storehouse 102F and central information storehouse 100 and the central transaction database 104.
Shown in the input that is provided to square 202, publisher will receive the inventory report from center information bank 100, and receive sales data from central transaction database 104.According to this information and other information, publisher can determine whether additional information is put on the network.Shown in square 204,, sometimes this information is called " message header " herein for the ease of quoting.If this information is not to occur with the form of electronic format, then this information is carried out digitlization 206, dispose 208 with electronic format, carry out electronics creation 210 then.Subsequently, with digitized message transmission to data converter 212, so that be consolidation form with digitized information translation.For example, if central information storehouse 100 and central transaction database 104 are the system based on DOS, then data converter is a dos format with this information translation.If message header is a digitized format, then directly this message header is transferred to data converter 212, so that, directly be converted to consolidation form in the mode shown in the straight line 214.
In case these data are in unified digitized format, just carry out initial encryption and compression, to reduce the needed memory space of these data of storage, be ready to these data simultaneously, so that when transmit, transmit with lower unauthorized application risk via communication network.Realize this compression by using certain commercial compression protocol.As described in the D part, use the available cryptographic protocol of certain standard to carry out initial encryption.
In case message header just stores this message header in the central information storehouse 100 into for digitized format unified, through encrypting.And prepare to list all available and addressable electronic index by author, title, theme or ISBN coding.When adding new message header, upgrade this electronic index to comprise new title.This message header can be downloaded among the 116A of stack room then.Shown in square frame 216,, perhaps be deployed to the main laser optic disk and not storage in central information storehouse 100 except that can being deployed to the main laser optic disk with this message header and corresponding electronic index information stores are in the central information storehouse 100.Main laser optic disk 216 directly can be installed in the stack room 116 then.
Before downloading the information needed title, the user can visit certain electronic index that comprises all message headers that can download from stack room 116A.By this electronic index, the user obtains the tabulation of available information according to title, ISBN coding or the theme of author's name, particular work.In case compilation just shows tabulation and other necessary informations of the available information title that comprises in the selected index kind on video screen, so that allow user's purchase or hire out any message header that comprises in institute's column index kind.By using list of videos, the user selects any title listed on it, and by printing the printout that slot 342 obtains for information about.In case the user correctly visits, just this message header is downloaded on user's the storage medium 218 from stack room 116A.
Downloaded information and corresponding electronic index information from center information bank 100 after, perhaps after main laser optic disk 216 is installed to stack room 116A, generates the inventory report by stack room 116A, and be transferred to central information storehouse 100.These inventories report reflection current in the 116A of stack room canned data.Then above-mentioned report is sent to publisher 202.Simultaneously, send download from stack room 116A to transaction data base 118A and finish report, the latter generates the distribution state report again, sometimes transaction data base 118A is called the Hosts file server herein.Sales Reports are transferred to central transaction database 104.Transaction data base 104 is sent the operations necessary instruction back to Hosts file server 118A, and sends transaction reporting back to for uses such as record keeping and audits to publisher 202.
For hope allows publisher that hard copy that the user can make the part message header uses for study, when downloading to above-mentioned message header in the master file, comprise special checking in the data and encode.The subsidiary message header of these codings arrives user's storage medium or cassette tape.The specific quantity of the message header that these coding limited subscribers can be made in the hard copy mode.When this type of was coded in the appropriate location, the user can print the text of permission quantity as hard copy from cassette tape.Cassette tape keeps printing relevant information with this type of, and when arriving this restriction, restriction is further printed.Select the definite body part of making in the hard copy mode of user's (mandate purposes) in defined restriction by the function that highlights of using read routine.
C. the configuration of point of sale delivery system
As mentioned above, by function the point of sale delivery system is classified.Function comprises following one or more functions: (1) point of purchase delivery system, (2) are hired out the some delivery system, (3) stack room subsystem, and (4) promote delivery system.Below discuss the configuration of various functions respectively in detail.
1. point of purchase delivery system
Fig. 3 represents point of purchase system in the mode of block diagram.Only with point of purchase system description be can be from the system of these systems buying books herein.Yet as mentioned above, this system is not limited to books, and can use native system to buy other media that can represent with the electronic format such as computer software, music and video.
Point of purchase system shown in Figure 3 comprises stack room 302 that are connected to Hosts file server 304.Server 304 is connected to customer service terminal 306 (certainly, a more than terminal can be arranged) and the cashier 308A that stands, and cashier 308A and other cashiers 308B-D that stands that stands interconnects.Also server 304 is connected to organization network 310, organization network 310 is connected to the terminal 312A-E of mechanism again.By the compunication link,, stand 308A-D and organization network 310 of service terminal 306, cashier is connected to server 304 as the business computer networked systems such as CompuServe or Internet.As above see figures.1.and.2 described, stack room 302 and server 304 are connected to central information storehouse 100 and central transaction database 104.
The cashier 308A-D that stands adopts the linear network connected mode of serial, and this mode allows to add at any time or withdraw the cashier station.The extra cashier station of needs when this configuration can be held peak season or peak, and after peak season, withdraw the cashier station to utilize the space better.Customer service terminal 306 has local disposal ability, and its disposal ability provides customer service, as person identifier generation, personal identification number's change, processing presentation copy, books reimbursement, customer information input and renewal.Customer service terminal 306 can also provide the outlet of the retail with internal control and management function, and above-mentioned management comprises the card management of books inventory, the request of books list management books, books report, financial report, Email and broadcasting bulletin system management.
Referring now to Fig. 4, this figure illustrates point of purchase file server 304 in detailed mode.Particularly, server 304 comprises the uninterrupted power supply 320 that moves continuously when 318, one of 316, one main power sources of a central processing unit (CPU) are guaranteed power failure, and a high-density storage 322, memory 322 keeps required all programs and the database of server 304 operations.
Server 304 has four (4) individual interfaces, and promptly network interface 324, maintenance interface 326, customer service station interface 328 and cashier's station interface 330.CPU316 is to stack room 302 transfer instructions, creates transaction data base and report, and handles the stand order of 308A-D and customer service terminal 306A-D from the cashier.
By network interface 324, server 304 communicates with central transaction database 104, so that the electronic filing transaction reporting communicates so that assign download instruction to stack room 302 with stack room 302, and reception is from the status report and the inventory report in stack room 302.As mentioned below, also server 304 is connected to the stack room subsystem and reports, so that assign instruction and order when needed with receiving subsystem by network interface 324.Also can be connected to network interface 324 with having mechanism or company's network system of local retailers's terminal, community's billboard service and other services.Network interface 324 allows and is connected such as the interbank network of Cirrus, Plus or other similar data transport networks is two-way.By being connected to retailer terminal, marketing network can provide direct visit for local retailers and local commerce, to upgrade its distribution and reward voucher.Maintenance interface 326 can long-range or field diagnostic and remediation server 304.
Customer service station interface 328 is provided at communicating by letter between server 304 and the customer service terminal 306A-D, to handle the customer service transaction.To be connected to the mode of printer 334 by exchanges data 332, customer service terminal 306A-D is described.Cashier's station interface 330 provides the cashier the communicating by letter of 308A-D and server 304 of standing.
Fig. 5 represents a kind of execution mode in stack room 302.Stack room 302 comprise a high-resolution cga 336, and this adapter is a touch screen equipment, are used to show for example instruction, message, the report of arrival state of user and index information, and are used to receive user's touch-screen input selection.Stack room 302 also have a keyboard 338, import person identifier and other inputs for the user.The card reader 341 that provides magnetic code or other to accept extensively is represented in the slot mode, uses bank card, credit card or other forms of debit card to conclude the business for the client.Bar code reader 340 is provided, represents,, be used to utilize stack room to read so that allow user's insertion to comprise the card of the ISBN coding of information needed title in the slot mode.Also can be by on keyboard 338, keying in the dependency number keyboard, manual input ISBN coding.Print cup 342 also is provided, so that the output in user capture stack room 302 is as mentioned below, printer (not shown among Fig. 5) is used to retrieve receipt, transaction reporting and ISBN and visits preferential coupon.Stack room 302 also comprise a base assembly 344, and base has a cutting tip 346, stand in comfily before the keyboard 338 to use the user.Importantly, stack room 302 also comprise a cassette tape slot 348, so that as hereinafter describing in detail like that, import a dish reading cassette tape for the user, with the copy of the information that obtains selected download.
In another execution mode shown in Fig. 5 A, can revise the physical embodiments in stack room 302.Or rather, in one embodiment, stack room 302 are positioned on the table 339 that uses personal computer 349, for example can be from the personal computer table of IBM Corporation's acquisition.Except that the user for example can be sitting on the chair (not shown), the user was to operate stack room 302 with reference to mode shown in Figure 5.For example, can for a long time in company, apartment, library or other the similar environment of visit information, perhaps in the environment of professional type, use this configuration the user.In other embodiments, reader 340,341 and cassette tape slot 348 can be positioned at computer 349, perhaps are positioned at the autonomous device that is connected with computer 349 electronics.
Fig. 6 is the block diagram of the circuit in stack room 302.Particularly, stack room 302 comprise a central processing unit (CPU) 350, and CPU links to each other with display 336, keyboard 338, magnetic stripe reader 341 and bar code reader 340.Although the mode with single part is represented CPU350, can imagine that CPU350 can be a parallel processor or distributed frame.Certainly, select the CPU350 of what type to depend on amount of information to be processed, required processing speed and expense.CPU350 can be connected to ATM (ATM) module 352, to allow utilizing atm card to conclude the business.CPU350 can also be connected to media drive 354, the latter makes the user can insert personalized medium and replys or realize hereinafter described other functions.Stack room 302 also comprise a local main storage device 356, are used to store all main information and the relevant index information of selecting to be loaded into stack room 302.Provide auxiliary storage device 358 to keep other programs, instruction and the information relevant with transaction.Utilize buffer storage 360 to quicken to download, so that when peak season, hold a large number of users.Provide printer 362 to print required reward voucher, receipt and the various report of user.Power supply 364 provides power supply to printer 362, CPU350, auxiliary storage device 358 and local storage 356.Uninterrupted power supply 366 is connected to main power source 364, moves continuously when guaranteeing power failure.
As will be explained hereinafter, CPU350 is connected to network interface 368, to provide communication to central information storehouse 100, Hosts file server 304 or stack room subsystem.Also CPU350 is connected to wireless communication port 370, again the latter is connected to antenna 372.When wireless communication port 370 guarantees to need this type of medium and the compatibility of selective communication medium.
Fig. 7 represents the structure of user's individualized medium memory cassette tape 374 with the block diagram form.As mentioned below, the user is inserted into cassette tape 374 in the cassette tape slot 348, so that 302 download selected information from stack room.With encryption format, with the information of downloading, and the relevant base index information that when beginning to download, copies in the electronic index from be included in stack room 302, store on the cassette tape 374.Cassette tape 374 and reader compatibility are so that the user checks canned data on this cassette tape.As hereafter, cassette tape 374 comprises ocr software 376, and it finishes the sequence of information encryption and decryption.Registering communication section 378 is provided simultaneously.Download of information is being created book file registration 380 to cassette tape 374 time.Will be through the book file of encrypting 382, and relevant electronic index, connect the same permanent identification sequence number 384 that can not wipe, store on the cassette tape 374.Cassette tape 374 also comprises commercial operation system environment 386 and free disk space 388.
Fig. 8 explanation when the user utilizes above-mentioned point of purchase system, the user procedures of appearance and assembly processing.Particularly, when the user enters website 390, if this user patronizes 392 first, then the user will finish a user applies table 394.Then, the user carries application and a photo of finishing and arrives customer service station 306A, and the user selects and input people's identification number (PIN) and a password 396 one by one herein.The customer service salesman can hold an account 398 who is used for the client.Automatically the password that the user is selected mates with the customer account number of sequentially creating in central database.By using the keyboard at subsidiary cashier station, the salesman keys in this user's name, address and social security number.The application that to write is inserted in the printing slot at subsidiary cashier station then.When loading customer information, central database is examined this information, to determine whether this client originally had problem or whether discrepancy is arranged.When finishing proof procedure, in user's application, print the customer account number of appointment.Then, the salesman is inserted into customer ID card (for example, having the plastic clip that standard credit card size and its back side comprise the magnetic stripe that can place magnetic code information) in the card slot.Then address name and account number are molded on this card, and utilize suitable subscriber-coded (encrypted message of account number, card number and appointment) that magnetic stripe is encoded.The application that to write is transferred to the centre data storage center so that keep then.The user just can use issuing card to buy or hire out and use message header now.The machine that is used for card is carried out mold pressing and coding is the machine of the current standard commercial type used relevant with bank card, credit card or debit card distribution.
Except that obtaining personal identification card, new intrant also need buy reader/computer or other acceptable arrangement for reading (as special computerized interface, audio or video reproducing device).To above-mentioned each an equipment unique sequence number of distribution and a specific coding numeral.In one embodiment, the read-only storage chip that is encapsulated in the equipment comprises this sequence number.In the following manner, promptly have only relevant devices could read the mode of the information that writes down on its cassette tape, all cassette tapes of subsidiary this type of arrangement for reading are encoded.This is to utilize the simple program that comprises in the permanent memory of this equipment to realize.In one embodiment, if it is digital different that the specific coding on the equipment and cassette tape are being searched, then this cassette tape will be on arrangement for reading display message " this equipment can not be read cassette tape ", and do not allow problematic specific arrangement for reading, further visit any information that comprises on this cassette tape.If the numeral coupling then allows further visit.When buying arrangement for reading, the salesman can stand by the cashier, and the sequence number of this equipment is input in the central database.Central database comprises the tabulation of the sequence number of all permission arrangement for reading, and corresponding specific coding numeral.The salesman will buy the person identifier card of arrangement for reading for the client, put in the suitable slot on the cashier station, and utilize the proper sequence number of the arrangement for reading buying, and the magnetic stripe on the tag card is encoded.After this, whenever the user need obtain additional cassette tape so that when utilizing his or her arrangement for reading to read, this user only needs to submit its person identifier card and the cassette tape of wanting correct coding to the salesman, and by this cassette tape is inserted in the cassette tape slot, tag card is inserted in the card slot, by the designated button on the cashier station, just can be that this user's arrangement for reading is readable then with new cassette tape correct coding.
Before allowing visit, need arrangement for reading coding and cassette tape codes match, the cassette tape that this means distribution can not become numerous arrangement for reading and can read easily.Numerous equipment are read will be needed special programmed process and grant special permission, promptly permit purpose.In one embodiment, by information being carried out purpose coding (purpose code), publisher can expand or limit the visit of the user with proper authorization or institute's definition purpose.For example, it is readable that publisher can be encoded to all users with certain a part of purpose of selected books, i.e. universal coding.For example, the purpose coding that uses this type on books or some government publication can promoted.Other information purposes can be encoded to limiting access, so that have only certain individual consumer to check this information, i.e. grouped data.This need reduce the possibility of unauthorized use message header.
In operation, the client carries its customer ID card, arrives the books viewing area so that buy 400.If the client opens an account before this, then this client need not to carry out said process, and directly arrives shopping zone 400, and the client will select certain and its books to select the books inventory card of coupling in this zone.Be printed on ISBN number of this books, a bar code and information, author, publisher and the version date relevant on the books inventory card with the customizing messages title.The client with selected books inventory cassette tape to the cashier 308A that stands.The cashier utilizes magnetic to read coding on the Customer ID, and the bar code 402 of scanning or manual input books inventory card.Then, the client suitably pays, and encoder client and message header coding transmission are arrived Hosts file server 304.The existing customer account number file of server 304 search to be mating this sign (being PIN and password), and according on the books inventory card or the bar code of manual input, generates the books listing file of downloading.Server 304 downloads to stack room 302 with this document, and latter's electronics generates the message header file that can download when needing.Shown in step 404, the user can arrive stack room 302 in any time after a while, tag card is inserted in the slot 340 in stack room 302, will be inserted in the stack room cassette tape slot 348, identify himself to utilize the personal identification number through the point of purchase cassette tape 374 of coding.This user utilizes keyboard 338 input passwords 406 simultaneously.When stack room CPU350 utilizes the listing file folder coupling personal identification number who downloads, stack room CPU350 is through buffer storage 360, begin and will from local storage 356, information requested download to media drive 354, the latter with this information copy to cassette tape 374.As the part of downloading process, data are carried out dynamic encryption, so that have only the arrangement for reading of mandate just can read these data.In the D part, dynamic encryption is described.After download, the user takes off cassette tape 374, then cassette tape 374 is inserted in his individual reader/computer, to visit the information that needs.This reader/computer is configured to read for a long time application program.This reading application software is stored on the cassette tape, and can be in this reader/computer or other be authorized the memory of arrangement for reading permanent storage, on the cassette tape, but read application software.
The user can select some part of selected information to make up and download.In one embodiment, the user can select at least one books and select at least a portion of each selected books.If selected a more than part, wherein each several part comprises until whole selected books, then can make up these parts and downloads in user's the cassette tape 374.For example, for specific college course, the student may need to download particular chapter from ten different books.After ten particular chapter selecting ten books and selected books, the combination selected information is used the protection level of determining to encrypt, and is downloaded in student's the cassette tape 374.Equally, the user can select each song to make up from music information, and selected song is downloaded in the single cassette tape 374 for resetting after a while.
2. hire out the some delivery system
If the user is not interested in the persistent copy that obtains particular work, and need the copy of certain period, as the copy in certain term, then this user may more wish the visit taxi point website rather than the point of purchase.Fig. 9 represents to hire out dot system.Except that below the difference pointed out, the point of purchase system of rental system and the above-mentioned explanation of this paper identical (as, comprise a Hosts file server).In many examples, the dot system website can and be hired out as point of purchase system website in single-site or stack room, and the payment dot system that is used to promote or business information website or its combination in any.As shown in Figure 9, hire out dot system and comprise the stack room user terminal hub 410A-B that is connected to terminal 412A-E, and customer service website 414.User terminal 412A-E allows the user that the stack room memory is carried out message header search and indexed search, and transmits other information between stack room 302 and it.Customer service website 414 associating customer service functions and cashier station.For example, at customer service website 414, credit client's debit card can be bought on credit, and if necessary, by atm module 416, can refuse the ATM operation.By printer 418, can be from the customer service station 414 type informations.
In rental system, use and hire out some storage medium 420.Except that medium 420 comprised automatic deleting mechanism, it was identical with point of purchase medium 374 to hire out some medium 420, and wherein deleting mechanism is deleted the information of downloading after preset time expires at interval automatically.Or rather, when downloading to medium 420 on from stack room 302 information, one " time stamp " also downloaded in stack room 302, and this time stamp equals the prepaid period that is used for hiring out the copy of this information of user.This time stamp is taked following form, i.e. form that is loaded into the value of certain memory location on the medium 420, and this value is corresponding to hiring out the period.In use, from the period of electronic representation, deduct time used.In case the user has consumed all time of licensing, this message header is destroyed the oneself, promptly from medium 420 deletions.Only need call a program stored, just can realize this operation, wherein program stored deletion and the relevant information in memory location that is worth memory time.For example, when the value of licensing the memory location of time when storage equals 0, will call program stored and delete and license the information of time for " 0 ".
Another kind of auto-deleted method is, each is hired out or stack room (library) cassette tape comprises independently rechargable power supplies of a real-time clock and.When encoding for use to cassette tape at first, activate real-time clock mechanism.When downloading the message header of hiring out, a date of expiry is registered in the index information of a title.Any time after the date of expiry of the arrival of the real-time clock on cassette tape appointment, the message header that denied access is relevant.If do not prolong the use of title, then after arriving some days of date of expiry, use cassette tape can be from the memory of cassette tape this message header of permanent delet.Utilize the method, if real-time clock can not move, then do not repair, this cassette tape will become unreadable.Repair the cassette tape of inefficacy, the user only need carry cassette tape and snap into together with its person identifier and reach nearest service centre, and in service centre or repair real-time clock, perhaps title is loaded into and substitutes in the cassette tape for information about.And with cassette tape not readable during the loss time return this user.For example, service centre can be positioned at the place of paying the some website near each.
Can be in the mode of operating system module, or be designed to " terminal is resident " (TSR) can independent executive program mode, create automatic delete program.Preferably adopt and the integrated module of operating system, this is that operating system can be moved because this structure can be guaranteed, removing module just can move automatically.
For any specific message header, if the user still needs more time, then this user turns back to the taxi point, " hires out " this information then again.As selection, can imagine that this user can upgrade taxi by the modulator-demodulator that is connected to reader.
As for the user procedures that is used for rental information, when a taxi point client enters taxi point website, the user will use effective atm card, bank card, credit card or other debit card, and directly arrive user terminal 412A-E.By using this Terminal Type, the user can carry out the message header search, and will order downloads to stack room 302.When the carrier strip order is finished instantly, this user will arrive stack room 302, will hire out medium, tag card, credit card, bank card or debit card and be inserted in the stack room 302, carry out transaction approval.If can not remove transaction, perhaps ATM system cisco unity malfunction, then client can arrive Customer Service Center, please waiter refuse ATM by hand and handle, if applicable.If the user does not have effective ATM credit or debit card, then this user will arrive Customer Service Center, pay so that charge to the credit side of stack room debit card to waiter.The client can arrive user terminal then, downloads and orders clauses and subclauses.
After removing trading approving, client will hire out medium 420 and be inserted in the stack room media drive 354, scan its person identifier card and input password.Information is carried out dynamic encryption, and 302 download to medium 420 from stack room, wherein this information has the time of licensing number of each message header or the electronics time stamp of date of expiry.After download, the user will use this medium on individual reader/computer, to visit the information on this medium.
The typical case that is used to hire out a website is library's (commercial, education or public visit) and books taxi shop.The information of user's download can be free, as the library, also can collect some with set price and go out rental, uses to the basis with every page and charges as hiring out shop or library.All specify a taxi point website to run in the mode of traditional libraries, wherein allow the member of library freely to use in certain finite time section, also can run in the mode of hiring out the shop, wherein charge to the user according to the life cycle that allows.
3. stack room subsystem
Shown in following detailed description, the stack room subsystem is connected to the Hosts file server with stack room.The central module of subsystem is stack room, and these stack room are the revisions in point of purchase stack room 302.This subsystem is member or commercial entity or company clerk collective use particular arrangement.In its authorized user in commerce or corporate entity, pay and the call back message title, and the copy number purpose ability of the appointment works that restriction can issue to other unauthorized users is provided.If certain in-house office worker has checked all permission copies of all message headers, then other users can not visit the same message header in the particular subsystem, until subsystem is uploaded or recalled to a of customizing messages or several parts of permission copies, perhaps bought till the additional copies.In one embodiment, information is carried out the purpose coding, thus the purpose of this information of restricting user access.For example, the central library of company can allow the special user, and as the research staff, selection information is as the pending application application.Stoping does not have suitable purpose or authorizes all non-research staff of coding to visit this information.
The limited use of the unrestricted copy of number can be leased by commercial entity, or uses the specific part of appointed information title, rather than buys the unlimited use of the restricted copy of number.In this kind situation, when commercial entity visits this subsystem from participating in work station, all can charge to the customizing messages title division of visit, and the access-hours charge to occurring.Utilization is in the restriction that participates in encoding on the interface between work station and the subsystem, during from the subsystem visit information, can the restraint of labour station carries out the ability of some operation.Restriction is operating as and relates to following data and duplicate operation with transfer of data, promptly relates to from the data of subsystem visit information title and duplicating and transfer of data.
Or rather, with reference to Figure 10, stack room subsystem 422 is a high-resolution color graphics adapter 424 that is connected to CPU426, with the instruction and the state of display subsystem 422.Subsystem 422 also comprise one can limited access system keyboard 428, be used to key in the selection of some appointed function of execution such as product showing.Subsystem 422 also has a media drive 430, is used for download message and a local storage 432, and the latter keeps the file of institute of commercial entity purchase order information for use.Provide additional storage 434, with all software programs of the function of retentive control and executive subsystem 422.Subsystem 422 also comprises power supply 436 and uninterrupted power supply 438, moves continuously when guaranteeing power failure.Provide printer 440 to print various report.
Stack room subsystem 422 has network interface 442, and the latter is connected to stack room 302 and Hosts file server 304 with subsystem 422.Also network interface 442 is connected to company or commercial entity's network system 444.Utilize this kind structure, corporate entity can or download its distinctive company Proprietary Information by 422 transmission of stack room subsystem.
Media port expansion interface 446 utilizes the media drive of right quantity, and the visit to the required company terminal of company's site is provided.By proprietary driver card, media drive 430 is connected to terminal or website.Company management person can use the dynamic encryption and the dynamic download function of stack room subsystem 422, so that incorporate and hold the Proprietary Information of company into.Can use ciphering process that the Proprietary Information of company is transferred to stack room subsystem 422, download to the authorized person of destination interface and correct identification then selectively.Stack room subsystem 422 is not only a company library customization, that have copyright and Proprietary Information, also is company's document security equipment, and it encrypts and distribute the secret Proprietary Information of company's document and company in company's network.Be connected to subsystem, and allow the individual components of the part that the network interface of visit enciphered message connects as each being participated in work station, memory member for example, some operation that restriction can be carried out from work station, thus work station can be visited enciphered message from subsystem.Above-mentioned restriction limits or stops and relates to that data are duplicated or the operation of transfer of data.
4. distribution delivery system
Marketing network is used for the payment dot system of promotional information and business information.It is promoted and business information with electronic format distribution, user or check digitized distribution and business information at website, perhaps with this download of information to its personalized medium in order to checking after a while.The user asks visit to be promoted and business information, and wherein this information comprises advertisement available discount, commerce, special sales promotion, software demonstration and the catalogue of dynamically checking in the electronics mode.By handle promoting and business information, utilize Email to order from individual reader/computer then, perhaps directly promote stack room and order, user even can carry out electronic business transaction from interactive mode.The structure of promoting stack room is identical with the stack room structure of point of purchase system.
Figure 11 represents according to marketing network of the present invention in the block diagram mode.As in other point of sales systems, stack room 302 are connected to Hosts file server 304.Marketing network also comprises the distribution parts 448A-D that many electronics show and promote the sale of products.Directly parts 448A is connected to central transaction database 104 and central information storehouse 100, and parts 448B-D is connected to Hosts file server 304.Parts 448A receives information from retailer terminal 450A-D and Hosts file server 304 reception information by retailer terminal 450E-G.Or rather, Hosts file server 304 is by retailer terminal (MT) 450E-G, from local commercial, the whole nation or the renewal that receives advertisement there and provide especially of regional advertiser and sponsor of company.Simultaneously Hosts file server 304 is networked to central transaction database, the latter provides report to publisher, advertiser, record keeping, Auditing firm, commodity production merchant and other staff again.
The distribution stack room allow to promote the taxi medium (referring to the argumentation in the B part, system architecture is to illustrate this type of download) that selectively downloads to the user with business information, check and purchase at the convenient time for user individual.As above with reference to hire out the explanation of some delivery system like that, when expiring at interval at the fixed time, the distribution of download and business information are destroyed the oneself (promptly automatic the deletion).Promote the self-service sale function that stack room also provide a kind of user interactions.The user can pass through network electronic order products or information.Some promotes function: reward voucher, virtual shopping, catalogue sales, demonstration, the subscription that needs ordered, the service of electronic application credit card, trading card or other kinds.Also can issue some public sphere information to community under with the situation of promotional information as free or low-cost service, as community activity, ticket thing sell, mechanism's activity even bulletin.
Distribution and business information stream are very similar with the information flow in the delivery system of point of sale.Yet information source is local commercial, the whole nation or regional advertiser, via the suitable sponsor of advertisement agency and other entities, rather than the owner of publisher or copyright information.
5. information trace technology
In one embodiment, for each time exchange or the download of information, with following the tracks of the clauses and subclauses transmission or storing suitable transaction data base into, in central transaction database 104, so that recorded information moving or transmitting from the primary importance to the second place.By checking above-mentioned tracking clauses and subclauses, what the information owner can monitor message moves, and takes appropriate measures.For example, whenever with information copy when the stack room 302, from stack room 302 during deletion information, or from stack room 302 during copy information, all clauses and subclauses followed the tracks of in one of record in transaction data base 104.Follow the tracks of clauses and subclauses according to these, the information owner can collect the charges to recipient or sender according to the standard of his definition.Charge can include but not limited to based on following various factors, the economic worth of information, the use of information or purpose, number of users, and the availability of other information sources.Follow the tracks of clauses and subclauses and can also comprise additional data, thereby the owner of information can determine that who have transmitted this information, the amount of information of transmission, transmission type (for example, hiring out the time period of appointment), and delivery time.In one embodiment, write down the tracking clauses and subclauses of all transmission, comprise stack room 302 to cassette tape 374 and central information storehouse 100 to stack room 302 transmission clauses and subclauses.By using these clauses and subclauses, the owner of information can also determine the information type that transmitted to transmit number of times, and information receiver's identity.For example, can use this information to determine whether the targeted customer has received some promotional material, perhaps determine reflection different information price strategies.
D. encrypt
In the time of on downloading data to user's storage medium, above-mentioned point of sale delivery system can carry out dynamic encryption to these data.Dynamic encryption refers to that stack room work with storage medium, with the process that institute's data download is carried out proprietary encryption.In one embodiment, according to a succession of factor or variable, use the encryption of different stage.These variablees include but not limited to, the economic life of information, market value, general availability, alternative costs, time sensitivity and potential user's number.For example, current list of television programmes has the encryption than low level (being lower complexity), and its reason is that market value is lower, alternative costs are lower, and from the general availability of many information sources.On the contrary, the law of a multireel is discussed the encryption level with higher (promptly complicated), and this is because the limited availability of this information, alternative costs and long economic life.According to above-mentioned factor, the information source of information (being publisher) can determine, is transferred to the suitable encryption level of each several part information of user's cassette tape 374 at first from center information bank 100.The information encryption rank of a certain position (as storehouse 100) can be higher or lower than the encryption level of another location (as cassette tape 374).Or rather, download at every turn or during transmission information, can independently change or definite encryption level.For example, the encryption level in central information storehouse 100, can with the encryption level different (promptly being higher or lower than the encryption level of books) of the books of the cassette tape 374 that downloads to the user.
Except that dynamic encryption, can carry out other encryptions by mode shown in Figure 12.Figure 12 represents three rank ciphering process.For example, can data be encrypted with before message transmission is to the network.This is easy to stop the information of unauthorized user access transport to the network.Except that before transmission, encrypting, can also before putting into stack room, encrypt data.Other owners of publisher or information can have permissions to this other encryption of level, so that the owner of information provides the enough data protections that make its satisfaction for this reason.
In case storage in stack room, just can be used the dynamic encryption technology when these data are downloaded to storage medium.Storage medium (Fig. 7) comprises that is used to a proprietary environment that makes up, reads, checks and handle.This medium also has the commercial operation system that is used for the process information file.The registration of message file catalogue constitutes a part of specific application, and the operating system application program comprises a file pointer.
When downloading data to user's storage medium, the dynamic encryption process is used the permanent sequence number of storing on this storage medium, this user's personal identification number, idiographic Code Number and password with certain form, with the further data encryption to storing in the stack room.Personalized variable and coding and various personnalit message file variable are made up, download to the individuation data structure of the data on the user personalization medium with formation.Therefore, above-mentioned message file is the personalization files that is fit to this medium, software version, message file itself and its dependent variable.
By making all information of downloading via point of sales system, become the readable and addressable information of selected user reader/calculating plane No., dynamic encryption helps to reduce the possibility of unauthorized use Proprietary Information or other information.Particularly, can be from the data storage medium of certain reader/computer access, can not use another reader/computer access, unless, presetted this type of visit by identical customer identification number and password is provided for other reader/computers.
For example, operable known algorithm comprises Z8068 data encryption processor (DCP) in above-mentioned three ranks are encrypted.This DCP comprises the cryptographic algorithm of using State Standard Bureau (NBS) is carried out encryption and decryption to data structure.Can use it in various environment, above-mentioned environment comprises the peripheral task processor in nonshared control unit, communication concentrator, terminal and the general processor.By the feedback that accesses to your password, code book or cypher block chaining operational mode, DCP provides high-throughput.The separate port, non-encrypted data and the enciphered data that are used for the key input have strengthened fail safe.Host computer system is used in the order of master port input or by the assist control line, communicates by letter with DCP.In case install, data can pass through DCP at a high speed, this be owing to can the executed in parallel input, output and cryptographic operation.
In another embodiment, can in specialized hardware and/or software function, carry out encryption and decryption.For example, each reader and cassette tape 374 can comprise a dedicated encrypted integrated circuit (IC) and a special-purpose deciphering IC, so that the arrival of the transfer rate of information is the highest.By adding additional function and, can changing the encryption and decryption rank by enabling or forbid additional level.
For dynamic encryption, a kind of method in operable numerous dynamic encrypting method is described hereinafter.Particularly, as shown in table 1, each letter and number symbol that often uses is assigned corresponding number.
Table 1
Symbol ?A ?B ?C ?D ?E ?F ?G ?H ?I ?J ?K
Coding ?1 ?2 ?3 ?4 ?5 ?6 ?7 ?8 ?9 ?10 ?11
Symbol ?L ?M ?N ?O ?P ?Q ?R ?S ?T ?U ?V
Coding ?12 ?13 ?14 ?15 ?16 ?17 ?18 ?19 ?20 ?21 ?22
Symbol ?W ?X ?Y ?Z ?0 ?1 ?2 ?3 ?4 ?5 ?6
Coding ?23 ?24 ?25 ?26 ?27 ?28 ?29 ?30 ?31 ?32 ?33
Symbol ?7 ?8 ?9 ??. ?, ?; ??: ?+ ?-
Coding ?34 ?35 ?36 ?37 ?38 ?39 ?40 ?41 ?42 ?43 ?44
With using the sequence number of storing on the cassette tape, determine the figure place that when beginning to encrypt, coding is moved to left.For example, if sequence number ends up with 6, then before beginning encryption, coding will move to left 6.Coding after the table 2 expression displacement.
Table 2
Symbol ?A ?B ?C ?D ?E ?F ?G ?H ?I ?J ?K
Coding ?7 ?8 ?9 ?10 ?11 ?12 ?13 ?14 ?15 ?16 ?17
Symbol ?L ?M ?N ?O ?P ?Q ?R ?S ?T ?U ?V
Coding ?18 ?19 ?20 ?21 ?22 ?23 ?24 ?25 ?26 ?27 ?28
Symbol ?W ?X ?Y ?Z ?0 ?1 ?2 ?3 ?4 ?5 ?6
Coding ?29 ?30 ?31 ?32 ?33 ?34 ?35 ?36 ?37 ?38 ?39
Symbol ?7 ?8 ?9 ?. ?, ?; ?: ?+ ?-
Coding ?40 ?41 ?42 ?43 ?44 ?1 ?2 ?3 ?4 ?5 ?6
Use selected user cipher to determine the symbolic number that this coding should move to left once more then.As an example, suppose that password is ROSE, then use the coding in the table 2, the numeral expression formula of rose will be 24212511.When each corresponding numeral that adds up during until the number that arrives between 1 and 10, in our example, this numeral arrives 9[18.9].Therefore, behind each the 9th letter, coding will move to left 6 once more.After 9 letters were encrypted, coding was with as shown in table 3.
Table 3
Symbol ?A ?B ?C ?D ?E ?F ?G ?H ?I ?J ?K
Coding ?13 ?14 ?15 ?16 ?17 ?18 ?19 ?20 ?21 ?22 ?23
Symbol ?L ?M ?N ?O ?P ?Q ?R ?S ?T ?U ?V
Coding ?24 ?25 ?26 ?27 ?28 ?29 ?30 ?31 ?32 ?33 ?34
Symbol ?W ?X ?Y ?Z ?0 ?1 ?2 ?3 ?4 ?5 ?6
Coding ?35 ?36 ?37 ?38 ?39 ?40 ?41 ?42 ?43 ?44 ?1
Symbol ?7 ?8 ?9 ?. ?, ?; ?: ?+ ?-
Coding ?2 ?3 ?4 ?5 ?6 ?7 ?8 ?9 ?10 ?11?? ?12
Because black list continues the fact of displacement, under above-mentioned straightforward procedure, will encrypt phrase " My brown dog has fleas. " by following mode:
19?31?6??8??24?21?29?20?6
16?27?19?12?20?13?31?18?24
23?19?37?11
Only use table 1 is decoded, and will pronounce through the phrase of coding:
S?4?F?H?X?U?2?T?F
P?0?S?L?T?M?4?R?X
W?S.K
If do not know other information, then be difficult to the pattern that discovery can be deciphered symbol.
Understand when ciphering process begins and encode with respect to the replacement of symbol, and the symbolic number between the displacement, decipher and encrypt phrase just with each reverse procedure showing of reversed sequence application.
Dynamic encrypting method like the numerous species is arranged, when each method uses different modes to determine scrambled by the needs ciphered data, the variation pattern of scrambled.Certainly, its objective is, increase the decoding difficulty by avoiding using relevant obvious pattern with conventional language and numeral.
E. distort protection
In one embodiment of the invention, monitor or record to the visit of information, attempt information is carried out unauthorized access determining.If on user's medium (as cassette tape 374), write down or stored a unauthorized access, then when this user attempts to download to additional information on the cassette tape 374 next time, will transmit unauthorized access message to notify corresponding group, as the cashier.As the result of unauthorized access message, the cashier can recall user's cassette tape 374, notice appropriate managerial mechanism, and perhaps clauses and subclauses of record are operated in order to taking in the future in user account number.Or rather, in one embodiment, at first by reading or determine information requester or recipient's specific identifier data by record.Do not match (promptly being not equal to predetermined value) if determine data and predetermined value that the information receiver provides, then write down unauthorized access message, and stop information exchange.Can use well-known relatively hardware and/or software function to realize data judging.
In addition, if having wrong purpose or authorize the user of coding to attempt to visit unauthorized information, then generate unauthorized access message.For example, in company's environment, do not possess the proper authorization information encoded, then generate a unauthorized access message, and send to the personnel such as system manager or security officer if certain user attempts to visit this user.Can generate the unauthorized access message of different stage.For example,, the interior diverse location canned data of this system (for example stack room 302) is decrypted, then generates a high-level message if certain user attempts to use unauthorized device.If certain long-distance user attempts the data above this user's authority levels, then generate a level messages.
F. other execution modes
In another embodiment, stack room 302 can be configured to catch and exchange real time information.For example, when professor in the classroom when the student introduces data, can catch professor's introduction, be converted into text and exchange with the long-distance user with copyright.Can utilize well-known computer system, use known speech conversion system to finish above-mentioned conversion.Can utilize written text previous preparation or current preparation to replenish professor's introduction.Can use all perception methods that this text is carried out digitlization, and correctly be integrated in the text.When introducing data, the long-distance user can receive the information of teaching in the lecture notes with real-time method, or receives information in certain time after a while.As mentioned above, the long-distance user can only receive following information, the information of promptly authorizing the long-distance user to receive from stack room 302.
In addition, in another embodiment, stack room 302 can be configured to receive audio frequency, video, and/or computer software code.For example, in execution mode shown in Figure 13, stack room 302 are connected to video tape recorder (VCR) 600, comprise the stereophonic sound system 610 of cassette recorder/phonograph 620, CD (CD) player and/or register 630, TV 640 and computer 650.As mentioned above, 302 receive authorization message from stack room, and are stored to storage medium with certain execution mode, as memory device 660.Memory device 660 can have many memory cell, as random-access memory (ram), and read-only memory (ROM), the rotation memory unit such as hard disk, the magnetic-based storage media such as tape, or other storage mediums are as optical storage medium.Behind the adequate information of having selected to receive the long-distance user from stack room 302, with this information stores in equipment 660.Equipment 660 is configured to canned data is sent to selected reproducing device, as video tape recorder (VCR) 600, and stereophonic sound system 610, cassette recorder/phonograph 620, CD Player/register 630, TV 640 or computer 650.For example, in one embodiment, the long-distance user downloads or receives all the elements of top ten's music disc.With the content stores of disc in equipment 660.As mentioned above, can permanent storage or store this information in the mode of set time section or access times.After the equipment 660, the long-distance user can be sent to this information stereophonic sound system 610 so that listen to download of information.In another embodiment, this information can be sent in the equipment 660, or be sent to one of other assemblies, as cassette recorder 620, VCR610, CD register 630 or computer 650 by equipment 660.In order to limit authoritative copy or playback, can only use following assembly, cassette recorder 620, VCR610, CD register 630 or the computer 650 that promptly is connected to equipment 660 this information of resetting.For example, by using VCR610 the film lengthy motion picture is kept on the video tape, the long-distance user can download lengthy motion picture.Then, as long as reset this video tape on the VCR610 that is connected to equipment 660, the long-distance user just can be with authorization this film of resetting.Equally, the long-distance user can download software program, thereby with this information stores in equipment 660 or on the storage medium in the computer 650.Depend on the mandate coding of this software, can be, only when computer 650 is connected to equipment 660, just carry out by computer 650 with this application configuration.
Said system helps to control and monitors information exchange between various types of information owners, publisher and user.By using said system, the user can obtain the authorization message of many types.This user can according to information owner regulation like that, buy, hire out or the information of freely obtaining the authorization.In one embodiment, use the cryptographic algorithm enciphered message of various ranks (being complexity), to stop unauthorized access.Encryption level depends on various factors or variable, as the economic life of information.For example, stack room 302 can comprise the information of expression reference character dictionary and top ten's music disc.Information in reference character dictionary and the disc can have identical or different encryption level.In addition, specify the student in the class can free access reference character dictionary information, this be because its school has bought the unlimited use copy of this information, yet, may need these students to buy the information of from this disc, downloading.In addition, the different piece of information can have different access types.For example, first song in the album information can be encoded to, but all these information of free download are per capita downloaded and the residue song of album information is encoded to need to pay.
Although with reference to specific implementations the present invention has been described, for those of skill in the art, many changes, change, replacement and equivalent will be conspicuous.Therefore, should think that the present invention is only limited in the essence and scope of appended claims book.

Claims (36)

1. device that helps to obtain the text of books, this device comprises:
A memory device that stores the text of numerous books on it;
A processor that is connected to described memory device, described memory device also store the program that is used to control described processor thereon, and described processor moves with this program, select request so that receive books;
Receive with these books and select the relevant user ID of request; And
If user ID and books are selected effectively, then utilize the books encryption level of determining to export the encryption text of selected books.
2. the device of claim 1, wherein said processor also moves with this program, so that the text of selected books is carried out the purpose coding, thereby the restriction authorized user is to the visit purpose of text.
3. the device of claim 1, wherein said processor also moves with this program, so that utilize and the text encryption of this subscriber-related identifier to selected books.
4. the device of claim 1, wherein said books are encrypted deciding grade and level really not based on the economic worth of at least one selected books.
5. the device of claim 1, comprise that also at least one is connected to the local parts of described processor communicatedly, described local parts comprise a memory and a local parts processor, wherein memory is used for being transferred to from described processor with the electronic format storage information of described parts, local parts processor is used for control described parts canned data is sent in the electronic storage medium of system user, described local parts are when being configured to that information is sent to electronic storage medium, this information is encrypted, and described local component configuration is encrypted information for utilizing the information encryption rank of determining.
6. the device of claim 5, wherein canned data comprises idiographic Code Number and sequence number on the user medium storage.
7. the device of claim 5, wherein said information encryption are defined the level not really based on the economic worth of at least one selected books.
8. the device of claim 7, wherein the rank of information encryption and the books rank of encrypting is different.
9. the device of claim 1, wherein said processor also moves with this program, so that determine to attempt the unauthorized access that the output copy to the text of the book carries out.
10. method that is used for the operational computations machine with the text that obtains books, this method comprises:
Select request to be input in the computer books;
To select the relevant user ID of request to be input in the computer with these books; And
If user ID and books are selected effectively, then utilize the books encryption level of determining to export the encryption text of selected books.
11. the method for claim 10, wherein the step that the books selection is input in the computer is further comprising the steps of:
At least a books in the selection memory; And
Select at least a portion text of each selected books.
12. claim 11 method, wherein the step that the books selection is input in the computer is further comprising the steps of:
Determine whether to have selected a more than part; And
If selected a more than part, then make up selected portion.
13. the method for claim 11 is further comprising the steps of, i.e. generation and selected portion and the corresponding trace information of selected books.
14. the method for claim 10 is further comprising the steps of, promptly the output text to selected books carries out the purpose coding, thereby the restriction authorized user is to the visit purpose of text.
15. the method for claim 10 is further comprising the steps of, promptly determines the rank that books are encrypted.
16. the method for claim 15 determines that wherein the rank of books encryption is further comprising the steps of, promptly comforms and adds to select in the code rank at least a encryption level.
17. one kind is connected to network so that obtain the method for the text of books with being used for operation communication, this network is connected to the memory of the text that wherein stores numerous books, and described method comprises:
Determine books selection request;
Select request to be input in the processor books;
To select the relevant user ID of request to be input in the processor with these books; And
If user ID and books are selected effectively, then utilize the encryption level of determining to export the encryption text of selected books.
18. the method for claim 17 determines that wherein the step of books selection request is further comprising the steps of:
Check the books in the memory;
Select at least a portion text of at least one books in this memory.
19. the method for claim 17 determines that wherein the step of books selection request is further comprising the steps of:
Select at least one books in this memory;
Select at least a portion text of each selected books in this memory;
Make up the selected portion of selected books.
20. the method for claim 19 wherein selects the step of at least a portion text of each selected books in this memory may further comprise the steps, and selects whole books.
21. the method for claim 19 wherein selects the step of at least a portion text of each selected books in this memory may further comprise the steps, and selects at least one word of each selected books.
22. the method for claim 19 wherein selects the step of at least a portion text of each selected books in this memory may further comprise the steps, and selects at least one joint of each selected books.
23. the method for claim 19 is further comprising the steps of, the corresponding trace information of selected books in generation and this memory.
24. the method for claim 23 is further comprising the steps of, generates the corresponding trace information of selected portion with selected books.
25. the method for claim 17 is further comprising the steps of, and the output text of selected books is carried out the purpose coding, thereby the definition authorized user is to the visit purpose of text.
26. the method for claim 17 is further comprising the steps of, determines encrypting the unauthorized access of text.
27. a device that helps to obtain the text of books comprises:
A memory device that stores the text of numerous books on it;
A processor that is connected to described memory device, described memory device also store the program that is used to control described processor thereon, and described processor moves with this program, select request so that receive books;
Receive with these books and select the relevant user ID of request; And
If books are selected and user ID is effective, then utilize the text of the selected books of determining of encryption level dynamic encryption, when the output text, use user identifier to carry out dynamic encryption.
28. the device of claim 27 wherein is connected to communication network communicatedly with described device.
29. the device of claim 27, wherein said processor also moves with this program, so that the text of selected books is carried out the purpose coding, thereby the restriction authorized user is to the visit purpose of text.
30. the device of claim 27, comprise that also at least one is connected to the local parts of described processor communicatedly, described local parts comprise a memory and a local parts processor, wherein memory is transferred to the information of described parts from described processor with the electronic format storage, local parts processor control is sent to canned data in the described parts in the electronic storage medium of system user, described local parts are when being configured to that information is sent to electronic storage medium, this information is encrypted, and described local component configuration is encrypted information for utilizing the encryption level of determining.
31. a method that is used for the operational computations machine with acquired information, this method comprises:
The Information Selection request is input in the computer;
The user ID relevant with this Information Selection request is input in the computer; And
If user ID and Information Selection are effective, then utilize the enciphered message of the information encryption rank output selected information of determining.
32. the method for claim 31, wherein the step that Information Selection is input in the computer is further comprising the steps of, at least a portion information in the selection memory.
33. the method for claim 32, wherein the step that the books selection is input in the computer is further comprising the steps of:
Determine whether to have selected a more than part; And
If selected a more than part, then make up selected portion.
34. the method for claim 32 is further comprising the steps of, generates the corresponding trace information of selected portion with information.
35. the method for claim 31 is further comprising the steps of, and enciphered message is carried out the purpose coding, thereby the restriction authorized user is to the visit purpose of this information.
36. the method for claim 31, wherein this information comprises at least a visual, music, software and video information.
CN98813996.0A 1998-03-27 1998-10-21 Information distribution system Pending CN1292960A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US4932198A 1998-03-27 1998-03-27
US09/049,321 1998-03-27
US17555998A 1998-10-20 1998-10-20
US09/175,559 1998-10-20

Publications (1)

Publication Number Publication Date
CN1292960A true CN1292960A (en) 2001-04-25

Family

ID=26727066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN98813996.0A Pending CN1292960A (en) 1998-03-27 1998-10-21 Information distribution system

Country Status (5)

Country Link
EP (1) EP1074113A4 (en)
CN (1) CN1292960A (en)
AU (1) AU1109499A (en)
CA (1) CA2326098A1 (en)
WO (1) WO1999049615A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100356723C (en) * 2001-08-27 2007-12-19 索尼株式会社 Information providing system, information providing apparatus and method, and information processing apparatus and method
CN101505312B (en) * 2008-12-24 2012-06-06 福州博远无线网络科技有限公司 Method for reading photographic book on demand combining server and mobile device

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US7774220B2 (en) * 1999-11-29 2010-08-10 The Strategic Coach Inc. Project management system for aiding users in attaining goals
AU4166601A (en) * 2000-02-23 2001-09-03 Ipdn Corp Methods and devices for storing, distributing, and accessing intellectual property in digital form
KR20000037085A (en) * 2000-04-07 2000-07-05 이상훈 Method to provide On-Line lending service
KR20000049851A (en) * 2000-05-03 2000-08-05 최강석 A system for lending and purchasing a video tape, and mehtod thereof on the internet
FR2810759A1 (en) * 2000-06-26 2001-12-28 Radoslaw Galka Method for purchasing and distributing digital goods, comprises secure encoded communication over a communication system between a users smartcard and terminal and a furnisher's server
KR20020004398A (en) * 2000-07-05 2002-01-16 김운일 Method and system for lending image media using internet
KR20020006372A (en) * 2000-07-12 2002-01-19 배인천 Electronic business using a member store and method thereof
US6895503B2 (en) 2001-05-31 2005-05-17 Contentguard Holdings, Inc. Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US6876984B2 (en) 2001-05-31 2005-04-05 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
KR20010079197A (en) * 2001-06-21 2001-08-22 조병철 Method for providing lending service using a network and computer-readable recording medium on which a program relating thereto is recorded
JP2004133502A (en) * 2002-10-08 2004-04-30 Matsushita Electric Ind Co Ltd Data distribution system, device or method for the system and recording medium or program for the system
KR20040048153A (en) * 2002-12-02 2004-06-07 주식회사 웰소프트 Lending system for apartment based on network and method thereof
US11354614B2 (en) 2009-09-16 2022-06-07 The Strategic Coach Systems and methods for providing information relating to professional growth

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2659896B2 (en) * 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
JPH0855164A (en) * 1994-08-10 1996-02-27 Fujitsu Ltd Software distribution system, repeating device, and user terminal device
SE504085C2 (en) * 1995-02-01 1996-11-04 Greg Benson Methods and systems for managing data objects in accordance with predetermined conditions for users
US5694469A (en) * 1995-11-17 1997-12-02 Le Rue; Charles Method and system for disseminating stored programs and data
US5708709A (en) * 1995-12-08 1998-01-13 Sun Microsystems, Inc. System and method for managing try-and-buy usage of application programs
US5956034A (en) * 1996-08-13 1999-09-21 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100356723C (en) * 2001-08-27 2007-12-19 索尼株式会社 Information providing system, information providing apparatus and method, and information processing apparatus and method
CN101505312B (en) * 2008-12-24 2012-06-06 福州博远无线网络科技有限公司 Method for reading photographic book on demand combining server and mobile device

Also Published As

Publication number Publication date
WO1999049615A1 (en) 1999-09-30
EP1074113A1 (en) 2001-02-07
AU1109499A (en) 1999-10-18
EP1074113A4 (en) 2002-04-03
CA2326098A1 (en) 1999-09-30

Similar Documents

Publication Publication Date Title
US5734823A (en) Systems and apparatus for electronic communication and storage of information
US6633877B1 (en) Method and apparatus for delivery of selected electronic works and for controlling reproduction of the same
CN1171166C (en) Content distribution method and apparatus
US8626668B2 (en) Individualized digital media delivery systems
CN102422300B (en) Based on the enhancing product function of user ID
US10217181B2 (en) Digital watermarking systems and methods
CN1191643A (en) System and method for access control for data storage media
CN1366647A (en) Methods and devices for storing, distributing and accessing intellectual property in digital form
CN1292960A (en) Information distribution system
US20010001854A1 (en) Printed medium activated interactive communication
US20100127013A1 (en) Dvd kiosks
JP2007226778A (en) Printed medium activated interactive communication of multimedia information, including advertising
US8949156B2 (en) Digital rights content services architecture
CN1592907A (en) System and methods providing secure delivery of licenses and content
US20120197688A1 (en) Systems and Methods for Verifying Ownership of Printed Matter
CN1360269A (en) Digital information license fee calculating method and system, and medium for recording its processing program
CN100515064C (en) Flexible content distribution method and apparatus
JP2004509393A (en) Method and system for connecting electronic information to a print medium to respond to a request using an optical sign and an optical finder
KR20210000156A (en) E-book sales and management system
KR100342400B1 (en) Electronic publication system and method for selling and managing electronic publication
JP3576534B2 (en) Digital content utilization system, server, user terminal, store side server, digital content utilization method, program and recording medium
Dittmann et al. Conditional and user specific access to services and resources using annotation watermarks
JP2003141210A (en) Electronic publication system
JP2006048159A (en) Information providing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1036709

Country of ref document: HK