최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0305719 (1999-05-05) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 309 인용 특허 : 92 |
A system is disclosed that provides a goal based learning system utilizing a rule based expert training system to provide a cognitive educational experience. The system provides the user with a simulated environment that presents a training opportunity to understand and solve optimally. The techniqu
A system is disclosed that provides a goal based learning system utilizing a rule based expert training system to provide a cognitive educational experience. The system provides the user with a simulated environment that presents a training opportunity to understand and solve optimally. The technique establishes a collaborative training session, including the steps of establishing a network connection between a plurality of users, selecting a mode for the network connection between the plurality of users, establishing a network connection mode between the plurality of users, and synchronizing the mode between the plurality of users. Modes of operation include application sharing, whiteboarding, media sharing, newsgroup information sharing, chatroom initiation and discussion group initiation.
A system is disclosed that provides a goal based learning system utilizing a rule based expert training system to provide a cognitive educational experience. The system provides the user with a simulated environment that presents a training opportunity to understand and solve optimally. The techniqu
A system is disclosed that provides a goal based learning system utilizing a rule based expert training system to provide a cognitive educational experience. The system provides the user with a simulated environment that presents a training opportunity to understand and solve optimally. The technique establishes a collaborative training session, including the steps of establishing a network connection between a plurality of users, selecting a mode for the network connection between the plurality of users, establishing a network connection mode between the plurality of users, and synchronizing the mode between the plurality of users. Modes of operation include application sharing, whiteboarding, media sharing, newsgroup information sharing, chatroom initiation and discussion group initiation. on of permission to decrypt at least part of the content; and receiving from a clearing house a content decrypting key which has been encrypted with an end user system encrypting key, so that when content decrypting key is decrypted with the a end user system decrypting key corresponding to the end user system encrypting key, the content decrypting key is no longer encrypted and is usable for decrypting at least part of the encrypted content stored on the computer readable medium, wherein the decrypting of the encrypted content is performed in a tamper-resistant environment for deterring unauthorized access to the content decrypting key. 2. The method according to claim 1, further comprising the step of: rendering at least part of the encrypted content by decrypting the encrypted content with the decrypting key. 3. The method according to claim 1, wherein the step of decrypting further comprises: decrypting at least part of the encrypted content as permitted; reencrypting the decrypted content utilizing a unique local decrypting key; storing the content in a library; and decrypting at least part of the content from the library using the unique local decrypting key. 4. The method according to claim 3, wherein the steps of decrypting and reencrypting is performed in a tamper-resistance environment for deterring unauthorized access to the decrypting key. 5. A method to receive encrypted digital content on an end user system for rendering the content, the method on the end user system comprising the steps of: receiving from a computer readable medium, metadata which has previously associated with encrypted content, wherein the computer readable medium is coupled to an end user system; selecting from the metadata the encrypted content to decrypt; receiving, from the computer readable medium, a content decrypting key for decrypting at least part of the encrypted content, wherein the content decrypting key has been encrypted with an encrypting key from a clearing house; transferring, from the end user system, an end user system encrypting key and the content decrypting key, which is encrypted, to the clearing house for authentication of permission to decrypt at least part of the content; receiving from the clearing house, the content decrypting key which has been decrypted by the clearing house and reencrypted by the clearing house with the end user system encrypting key; and rendering at least part of the encrypted content by decrypting the content decrypting key using an end user system decrypting key corresponding to the end user system encrypting key so as to permit access to the content decrypting key which is now decrypted and is usable for decrypting at least part of the encrypted content. 6. The method according to claim 5, wherein the step of receiving from a computer readable medium includes receiving metadata stored as part of a promotional package on one of a CD and DVD containing non-encrypted content. 7. The method according to claim 5, wherein the step of rendering further comprises rendering at least part of the encrypted content comprising a plurality of distinct titles whereby each distinct title is decrypted with a unique decrypting key. 8. The method according to claim 5, further comprising the step of transmitting credit information to an authorization authority. 9. A computer readable medium for delivering encrypted digital content to a system for rendering the content, the computer readable medium comprising programming instructions which execute on the end user system for: reading from a computer readable medium metadata which has previously associated with encrypted content, wherein the computer readable medium is coupled to the end user system; selecting from the metadata the encrypted content to decrypt; establishing a secure transmission between the end user system and an authorization authority for decrypting the content; transferring, from the end user system, an end user
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.