Computer architecture for managing courseware in a shared use operating environment
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-015/173
G06F-021/10
출원번호
US-0609325
(2003-06-27)
등록번호
US-8676712
(2014-03-18)
발명자
/ 주소
Darago, Vincent S
Jenkins, Christopher
출원인 / 주소
Digital-Vending Services International, LLC
대리인 / 주소
Ogilvie Law Firm
인용정보
피인용 횟수 :
1인용 특허 :
88
초록▼
Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction
Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction content delivery method and system which does not exclude synchronous sharing but is focused on asynchronous sharing. Security means in the architecture provide content property holders with the ability to know how many minutes of use an individual made of licensed material and with increased certainty that their material cannot be used, copied, or sold in usable form unless and until a user site is connected or reconnected to a minute-by-minute counter which is located off the premises of the user. This security link helps protect software and other works which are being sold or licensed to an individual, organization, or entity, and creates income opportunities for owners of such content.
대표청구항▼
1. A method for managing content in a shared use operating environment, the shared use operating environment including a registration server, a content server connectable by a network link to the registration server, and a client workstation connectable by a client-server network communications link
1. A method for managing content in a shared use operating environment, the shared use operating environment including a registration server, a content server connectable by a network link to the registration server, and a client workstation connectable by a client-server network communications link to the content server, the method comprising the steps of: registering a user at the registration server, thereby characterizing the user as a registered user;receiving at the content server a request by the registered user for access to content which contains at least one previously treated critical portion;authenticating the request;serving at least the critical portion over the client-server network communications link for presentation to the registered user at the client workstation;preventing a copy of the critical portion of the content from being created on nonvolatile storage at the client workstation at least in part by disabling caching and other disk writes, andsending another portion of the content to nonvolatile storage at the client workstation. 2. A method for managing content in an operating environment that includes peer-to-peer nodes, the method comprising the steps of: registering users;checking user passwords to prevent unregistered users from receiving content services;receiving at a first peer node a request by a registered user for access to content which contains at least one previously treated critical portion;serving at least the critical portion over a network communications link to a second peer node for presentation to the registered user;preventing a copy of the critical portion of the content from being created on nonvolatile storage at the second peer node, at least in part by disabling caching and other disk writes, andsending another portion of the content to nonvolatile storage at the second peer node. 3. The method of claim 2, wherein the serving step serves digital content that contains at least one musical recording. 4. The method of claim 2, wherein the serving step serves digital content that contains visual images. 5. The method of claim 2, wherein the serving step serves video content. 6. The method of claim 2, wherein the method delivers content by synchronous sharing. 7. The method of claim 6, wherein the method comprises video conferencing. 8. The method of claim 2, wherein the method delivers content in a real-time manner. 9. The method of claim 2, wherein the method delivers content in an interactive manner. 10. The method of claim 2, wherein the critical portion comprises encrypted content. 11. The method of claim 2, wherein the critical portion comprises compressed content. 12. The method of claim 2, wherein the critical portion comprises licensed content. 13. The method of claim 2, wherein the critical portion comprises content that is compressed and encrypted. 14. The method of claim 2, further comprising the step of disabling use of at least a portion of the content after an expected periodic security handshake is not received. 15. The method of claim 2, further comprising the step of downloading at least a non-critical portion of the content to the second peer node at least one hour before the serving step serves the critical portion. 16. The method of claim 2, wherein the method moves content between peer nodes in response to anticipated requests from users. 17. The method of claim 2, wherein the method moves content between peer nodes in response to actual requests from users. 18. The method of claim 2, wherein the method operates in conjunction with a license enforcement software program executing on the second peer node. 19. The method of claim 2, wherein the method tracks content use in order to create records on which invoices are at least partially based. 20. The method of claim 2, wherein the method tracks content location and determines whether content is already resident on the second peer node or near the second peer node. 21. The method of claim 2, wherein only authenticated network users are able to access the content. 22. The method of claim 1, further comprising reserving a particular piece of courseware content for a particular registered user. 23. The method of claim 1, further comprising monitoring the client-server network communications link so that the user pays only for actual use of the content. 24. The method of claim 1, further comprising downloading at least one non-critical portion of the content to the client workstation at least two hours before serving the critical portion. 25. The method of claim 1, further comprising presenting the registered user with an invoice for usage of the content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (88)
Cook Donald A. ; Lukas George ; Lukas Andrew V. ; Padwa David J., Agent based instruction system and method.
Joseph Salesky ; Peter Madams ; John Flower ; Clint Kaul ; Benjamin Wells ; Edward Arthur Ho-Ming Janne, Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability.
Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
Blakely ; III George Robert ; Milman Ivan Matthew ; Sigler Wayne Dube, Configurable password integrity servers for use in a shared resource environment.
Metz Erik Christopher ; Zimmerman ; Jr. Paul Andrew ; Erdely ; Jr. Laszlo ; deSa Colin Joseph ; Hudson ; Jr. Henry G. ; Darr ; Jr. John W., Downloading applications software through a broadcast channel.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Daniels Dan B. (San Diego CA) Olps Darrell M. (Poway CA) Reese Carl G. (San Diego CA) Rahlfs Tom R. (Encinitas CA) Carlton Ronald R. (San Marcos CA), Instructional management system.
Sonnenreich Wes ; Macinta Tim ; Albanesc Jason ; Rines Robert H., Internet based distance learning system for communicating between server and clients wherein clients communicate with ea.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Douglis, Frederick; Kristol, David Morris; Krzyzanowski, Paul; Trotter, John Andrew; Sienicki, James Paul; Schilit, William N., Management of time and expense when communicating between a host and a communication network.
Horvitz Eric, Method and apparatus for display of information prefetching and cache status having variable visual indication based on a period of time since prefetching.
Lambert Mark L. ; van der Rijn Daniel J. G. ; Kemper David J. ; Verkler Jay L., Method and apparatus for storing and delivering documents on the internet.
Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA), Method and system for authenticating access to heterogeneous computing services.
Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
Agraharam Sanjay ; Civanlar Mehmet Reha ; Haskell Barin Geoffry ; Kuthyar Ashok K. ; Markowitz Robert Edward ; Mortenson Robert F. ; Perea Carlos Alberto ; Ramamurthy Ram S. ; Rosen Kenneth H. ; Stun, Multimedia information service access.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
Jacobs Dwayne C. (Austin TX) Wangler James A. (Cedar Park TX), Remote password administration for a computer network among a plurality of nodes sending a password update message to al.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Server entity that provides secure access to its resources through token validation.
Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
McChesney Roderick J. ; Nuyens Gregory B., System and method for determining and manipulating configuration information of servers in a distributed object enviro.
Viavant Steven ; Gleckler Arthur A. ; Wessman Richard R., System and method for negotiating security services and algorithms for communication across a computer network.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., System for on-line service in which gateway computer uses service map which includes loading condition of servers broad.
Raynak Randy W. (Columbus OH) Kushnir Viktor (Columbus OH), System for transferring network connections from first to second program where the first enters an inactive state and re.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.