Sélection de la langue

Search

Sommaire du brevet 2326098 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Demande de brevet: (11) CA 2326098
(54) Titre français: SYSTEME DE DISTRIBUTION D'INFORMATIONS
(54) Titre anglais: INFORMATION DISTRIBUTION SYSTEM
Statut: Réputée abandonnée et au-delà du délai pour le rétablissement - en attente de la réponse à l’avis de communication rejetée
Données bibliographiques
(51) Classification internationale des brevets (CIB):
  • H04L 9/32 (2006.01)
(72) Inventeurs :
  • SAIGH, MICHAEL M. (Etats-Unis d'Amérique)
(73) Titulaires :
  • DIGEO, INC.
(71) Demandeurs :
  • DIGEO, INC. (Etats-Unis d'Amérique)
(74) Agent: SMART & BIGGAR LP
(74) Co-agent:
(45) Délivré:
(86) Date de dépôt PCT: 1998-10-21
(87) Mise à la disponibilité du public: 1999-09-30
Requête d'examen: 2003-10-09
Licence disponible: S.O.
Cédé au domaine public: S.O.
(25) Langue des documents déposés: Anglais

Traité de coopération en matière de brevets (PCT): Oui
(86) Numéro de la demande PCT: PCT/US1998/022238
(87) Numéro de publication internationale PCT: WO 1999049615
(85) Entrée nationale: 2000-09-26

(30) Données de priorité de la demande:
Numéro de la demande Pays / territoire Date
09/049,321 (Etats-Unis d'Amérique) 1998-03-27
09/175,559 (Etats-Unis d'Amérique) 1998-10-20

Abrégés

Abrégé français

Selon une forme de réalisation de la présente invention, un système de distribution d'informations comprend une banque centrale d'information (100) et une base centrale (104) de données de mouvements qui sont reliées à des systèmes (202) de terminaux de distribution de point de vente. L'information circule entre chaque système de terminal de distribution de point de vente, la banque centrale d'information et la base centrale de données de mouvements par l'intermédiaire d'un réseau de télécommunication tel que le réseau téléphonique, un réseau à satellite ou par tout autre réseau adapté au transfert d'information. Les systèmes de terminaux de distribution de point de vente peuvent se présenter sous diverses formes telles qu'un système de distribution de point d'achat, un système de distribution de location, un sous-système de " banque de livres " (116A), un système de distribution de promotions ou n'importe quelle combinaison de ces systèmes. Les informations échangées au sein du système sont protégées au moyen de plusieurs niveaux de chiffrement et surveillées pour empêcher l'échange non autorisé.


Abrégé anglais


An information distribution system, in accordance with one form of the present
invention, includes a central information bank (100) and a central
transactional data base (104) coupled to point-of-sale delivery systems (202).
Information flows between each point-of-sale delivery system and the central
information bank and central transactional data base via communication network
such as the telephone network, a satellite network, or any other network
suitable for the transfer of information. The point-of-sale delivery systems
may take one of many forms including a point of purchase delivery system, a
point of rental delivery system, a "book bank" (116A) subsystem, a promotional
delivery system, or any combination of such systems. Information exchanged
within the system is controlled using various levels of encryption and is
monitored to prevent unauthorized exchange.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


-37-
CLAIMS
1. Apparatus for facilitating obtaining text of a book, comprising:
a storage device having stored therein text of a plurality of books;
a processor connected to said storage device, said storage device
further having stored therein a program for controlling said processor, said
processor
operative with the program to:
receive a book selection request;
receive a user identification associated with the book selection request;
and
output encrypted text of the selected book utilizing a determined level
of book encryption, conditioned upon validity of the user identification and
book
selection, and upon authorized access to the selected book not being exceeded.
2. Apparatus in accordance with Claim 1 wherein said processor
is further operative with the program to purpose encode the text of the
selected book
so as to limit a purpose for which access by the user to the text is
authorized.
3. Apparatus in accordance with Claim 1 wherein said processor
is further operative with the program to encrypt the text of the selected book
utilizing
an identifier associated with the user.
4. Apparatus in accordance with Claim 1 wherein said determined
level of book encryption is based on at least an economic value of the
selected book..
5. Apparatus in accordance with Claim 1 further comprising at
least one local unit communicatively coupled to said processor, said local
unit
comprising a memory for storing, in electronic form, information transmitted
to said
unit from said processor, and a local unit processor for controlling transfer
of
information stored in said unit to electronic storage media of system users,
said local
unit configured to encrypt the information when the information is to be
transferred to
the electronic storage media, said local unit configured to encrypt the
information
utilizing a determined level of information encryption.

-38-
6. Apparatus in accordance with Claim 5 wherein the information
stored on the user's storage media comprises a personal signature code number
and
serial number.
7. Apparatus in accordance with Claim 5 wherein said determined
level of information encryption is based upon at least an economic value of
the
selected book.
8. Apparatus in accordance with Claim 7 wherein the level of
information encryption is not equal to the level of the book encryption.
9. Apparatus in accordance with Claim 1 wherein said processor
is further operative with the program to determine attempted unauthorized
access to
the output copies of the text of a book.
10. Apparatus in accordance with Claim 1 wherein said processor
is operative with the program to limit a number of copies of the selected book
that are
allowed to be accessed by a group of authorized users without purchasing
additional
copies of the selected book, so that additional copies of the selected book
are not
available to members of the group of users until a copy of the selected book
is
uploaded or recalled.
11. A method for operating a computer to obtain text of a book,
comprising:
inputting into the computer a book selection request;
inputting into the computer a user identification associated with the
book selection request; and
outputting encrypted text of the selected book utilizing a determined
level of book encryption, said outputting being conditioned upon validity of
the user
identification and book selection, and upon authorized access to the selected
book not
being exceeded.

-39-
12. A method in accordance with Claim 11 wherein inputting the
computer a book selection comprises the steps of
selecting at least one of the books in the memory storage; and
selecting the text of at least a portion of each the selected books.
13. A method in accordance with Claim 12 wherein inputting the
computer a book selection further comprises the steps of:
determining if more than one portion is selected; and
if more than one portion is selected, then combining the selected
portions.
14. A method in accordance with Claim 12 further comprising the
step of generating tracking information corresponding to the selected portions
and the
selected books.
15. A method in accordance with Claim 11 further comprising the
step of purpose encoding the outputted text of the selected book so as to
limit a
purpose which access by the user to the text is authorized.
16. A method in accordance with Claim 11 further comprising the
step of determining a level of book encryption.
17. A method in accordance with Claim 16 wherein determining a
level of book encryption comprises the step of selecting at least one of a
plurality of
levels of encryption code.
18. A method in accordance with Claim 11 wherein said outputting
encrypted text of the selected book utilizing a determined level of book
encryption is
further conditioned upon a limit of a number of copies of the selected book
that are
allowed to be accessed by a group of authorized users not being exceeded so
that
additional copies of the selected book are not made available to members of
the group
of users until a copy of the selected book is uploaded or recalled.

-40-
19. A method for operating a processor communicatively coupled
to a network to obtain text of a book, the network being coupled to a memory
storage
having stored therein text of a plurality of books, said method comprising:
determining a book selection request;
inputting into the processor the book selection request;
inputting into the processor a user identification associated with the
book selection request; and
outputting encrypted text of the selected book utilizing a determined
level of encryption, said outputting being conditioned upon validity of the
user
identification and book selection, and upon authorized accesses to the
selected book
not being exceeded.
20. A method in accordance with Claim 19 wherein determining
the book selection request comprises the steps of:
reviewing the books in the memory storage;
selecting the text of at least a portion of at least one of the books in the
memory storage.
21. A method in accordance with Claim 19 wherein determining
the book selection request comprises the steps of:
selecting at least one books in the memory storage;
selecting the text of at least a portion of each selected book in the
memory storage;
combining the selected portions of the selected books.
22. A method in accordance with Claim 21 wherein selecting the
text of at least a portion of each selected book in the memory storage
comprises the
step of selecting the entire book.
23. A method in accordance with Claim 21 wherein selecting the
text of at least a portion of each selected book in the memory storage
comprises the
step of selecting at least one word of each selected book.

-41-
24. A method in accordance with Claim 21 wherein selecting the
text of at least a portion of each selected book in the memory storage
comprises the
step of selecting at least one section of each selected book.
25. A method in accordance with Claim 21 further comprising the
step of generating tracking information corresponding to the selected books in
the
memory storage.
26. A method in accordance with Claim 25 further comprising the
step of generating tracking information corresponding to the selected portions
of the
selected books.
27. A method in accordance with Claim 19 further comprising the
step of purpose encoding the outputted text of the selected book so as to
define a
purpose of use which access by the user to the text is authorized.
28. A method in accordance with Claim 19 further comprising the
step of determining unauthorized access to the encrypted text.
29. A method in accordance with Claim 19 wherein said outputting
encrypted text of the selected book utilizing a determined level of book
encryption is
further conditioned upon a limit of a number of copies of the selected book
that are
allowed to be accessed by a group of authorized users not being exceeded so
that
additional copies of the selected book are not made available to members of
the group
of users until a copy of the selected book is uploaded or recalled.
30. Apparatus for facilitating obtaining text of a book, comprising:
a storage device having stored therein text of a plurality of books;
a processor connected to said storage device, said storage device
further having stored therein a program for controlling said processor, said
processor
operative with the program to:
receive a book selection request;
receive a user identification associated with the book selection request;
and

-42-
dynamically encrypting text of the selected book utilizing a determined
level of encryption if the book selection request and user identification are
valid and
authorized access to the selected book are not exceeded, the dynamic
encryption
performed using a user identifier as the text is outputted.
31. Apparatus in accordance with Claim 30 wherein said apparatus
is communicatively coupled to a communications network.
32. Apparatus in accordance with Claim 30 wherein said processor
is further operative with the program to propose encode the text of the
selected book
so as to limit a purpose which access by the user to the text is authorized.
33. Apparatus in accordance with Claim 30 further comprising at
least one local unit communicatively coupled to said processor, said local
unit
comprising a memory for storing, in electronic form, information transmitted
to said
unit from said processor, and a local unit processor for controlling transfer
of
information stored in said unit to electronic storage media of system users,
said local
unit configured to encrypt the information when the information is to be
transferred to
the electronic storage media, said local unit configured to encrypt the
information
utilizing a determined level of encryption.
34. Apparatus in accordance with Claim 30 wherein said processor
is operative with the program to further condition outputting encrypted text
of the
selected book upon a limit of a number of copies of the selected book that are
allowed
to be accessed by a group of authorized users not being exceeded so that
additional
copies of the selected book are not made available to members of the group of
users
until a copy of the selected book is uploaded or recalled.
35. A method for operating a computer to obtain information,
comprising:
inputting into the computer an information selection request;
inputting into the computer a user identification associated with the
information selection request; and

-43-
outputting encrypted information of the selected information utilizing a
determined level of information encryption, conditioned upon if validity of
the user
identification and information selection, and upon authorized access to the
selected
information not being exceeded.
36. A method in accordance with Claim 35 wherein inputting the
computer an information selection comprises the step of selecting at least one
portion
of information in the memory storage.
37. A method in accordance with Claim 36 wherein inputting the
computer a book selection further comprises the steps of
determining if more than one portion is selected; and
if more than one portion is selected, then combining the selected
portions.
38. A method in accordance with Claim 36 further comprising the
step of generating tracking information corresponding to the selected portions
of
information.
39. A method in accordance with Claim 35 further comprising the
step of purpose encoding the encrypted information so as to limit a purpose
which
access by the user to the information is authorized.
40. A method in accordance with Claim 35 wherein the information
includes at least one of visual, music, software, and video information.
41. A method in accordance with Claim 35 wherein said outputting
the encrypted information of the selected information is further conditioned
upon a
limit of a number of copies of the selected information that are allowed to be
accessed
by a group of authorized users not being exceeded so that additional copies of
the
selected information are not made available to members of the group of users
until a
copy of the selected information is uploaded or recalled.

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 02326098 2000-09-26
WO 99/49615 PCT/US98/ZZ238
-1-
INFORMATION DISTRIBUTION SYSTEM
Field of the Invention
The present invention relates to a system for distributing information in
electronic form and more particularly, relates to a communication network for
transmittal information between a central information bank and a user
interface.
Background of the Invention
With the current information publishing and distribution system,
information usually is delivered as fixed printed images on paper or fixed in
other
media forms such as tapes, diskettes, cartridges, laser disk, or compact disk.
Prior
to and at various points in the delivery process, the information usually is
warehoused. Eventually, the information is delivered to retail outlets
scattered
throughout a distribution territory. Upon receipt of the information, the
retailers
either store the information or display the materials for resale.
The present publishing and distribution system has many disadvantages.
One disadvantage is the amount of time and labor required for preparing,
printing,
producing and distributing information. Another disadvantage of the current
system
is the lack of control over the production quantity of information, i.e., the
number
of copies made and sold. The current distribution system is further
disadvantaged
by the time, work and costs required in publishing and distributing
information
updates.
In an attempt to improve the dissemination of some types of information,
bulletin board networks have been established. Networks, such as Internet,
also
have been or are being established. Known networks generally utilize a
telephone
network or some other network as a communication media and can be accessed
using commercially available software and almost any type of computer. As
presently operated, however, such networks are unsuitable for the distribution
of
proprietary information and information which is intended for limited copying.
The

CA 02326098 2000-09-26
WO 99/49615 PCTIUS98/22238
-2-
free transfer of information using such networks provides little or no
protection for
copyright and proprietary information owners.
Summary of the Invention
The present invention, in one aspect, is an information distribution system
which overcomes disadvantages and shortcomings of the current information
publishing and distribution system. An information distribution system, in
accordance with one form of the present invention, includes a central
information
bank and a central transactional data base coupled to point-of sale delivery
systems.
The central information bank and central transactional data base do not
necessarily
have to be co-located and can be implemented on different, but coupled,
computer
systems. Information flows between each point-of sale delivery system and the
central information bank and central transactional data base via a
communication
network such as the telephone network, a satellite network, or any other
network
suitable for the transfer of information.
More specifically, information obtained from publishers is digitized, i.e.,
converted to an electronic form, to create a master copy in a uniform
electronic
format. Information obtained from publishers in digitized format simply is
converted into the uniform electronic format. The master copies are stored in
the
central information bank.
The central transactional data base performs a record keeping function.
Particularly, the transactional data base records and stores information
related to
each transaction performed at each point-of sale site. Upon request, the
transactional data base transmits sales data to a requesting publisher.
The point-of sale delivery systems may take one of many forms including
a point of purchase delivery system, a point of rental delivery system, a
"book
bank" subsystem, a promotional delivery system, or any combination of such
systems. In the point of purchase delivery system, information is downloaded,
i.e.,
copied, onto a user's storage media for later access by the user. The point of
rental

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-3-
delivery system is similar to the point of purchase system except that in
addition to
downloading information, an automatic erasure time period designation is
downloaded. As explained in more detail hereinafter, the time period
designation
is utilized so that upon expiration of the designated time, the downloaded
information is automatically erased from the user's storage media. The book
bank
subsystem is a sub-network established between authorized users, such as
employees of a corporation. Each user within the sub-network with the proper
authorization, or approval, can access designated information stored within
the sub-
network. Such a configuration enables sharing of information. In the
promotional
delivery system, promotional and other commercial information can be accessed
for
viewing and ordering of products.
A most important element of each point-of sale delivery system is the user
interface, sometimes referred to herein as the "Book Bank". The term Book
Bank,
as used herein, refers to the interface between the network and the user.
Although
the term Book Bank may imply "booktype" material, such term is not so limited.
The material may be of many types such as movies, music, video, images, text,
audio, and computer software material.
The Book Bank is a self service, user interactive information vending
device. Each Book Bank contains a high volume, local memory storage having, a
customized portfolio of the most demanded information products for the
particular
site at which the Book Bank is located. Other information is transferred, via
commercial communication networks (i.e., telephone networks, cable systems,
satellite or cellular system or other similar communication networks), to a
Book
Bank for supplemental, secondary and less demanded purposes. A central
processing unit contained within the Book Bank and coupled to the Book Bank
local memory, storage controls downloading and dynamic encryption of the
information.
In one embodiment, a user may select portions or entire contents of one or
more books. The selected information may then be combined and downloaded to

CA 02326098 2000-09-26
WO 99/49615 PCTNS98/22238
the user's storage device, for example a cartridge. The cartridge, in one
embodiment, includes a unique identification number and a determined amount of
memory for storing the selected information.
Widespread use of the present invention should greatly simplify, and reduce
the costs associated with, the publication and distribution of information.
Particularly, the present architecture reduces the amount of time and
resources
required for the distribution of information. Further, information updates can
easily
be made simply by updating the master copy stored in the central information
bank
and then either writing over the copies stored in each Book Bank with the
updated
master copy or downloading the updated master copy and storing both the old
and
updated versions in each Book Bank. Each Book Bank contains an electronic
index
of the various information titles accessible from the Book Bank. In addition,
the
number of production quantities of a particular work can be readily controlled
using
the central transactional data base to track the number of copies made and
sold,
within the network, for each work.
The present invention also readily enables controlling reproduction of
information and greatly simplifies updating of text, and the dynamic
encryption of
text provides copyright and proprietary information owners sufficient
confidence
in the present network to allow such information to be transmitted on the
network.
grief Description of the Drawings
These and other objects and advantages of the present invention, together
with further features and advantages thereof, will become apparent from the
following detailed specification when read together with the accompanying
drawings, in which:
Fig. 1 illustrates one embodiment of the present information distribution
system architecture;
Fig. 2 illustrates information flow in the system architecture shown in Fig.
1;

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-5-
Fig. 3 is a block diagram illustration of a point of purchase delivery system;
Fig. 4 is a more detailed block diagram illustration of the host fileserver
shown in Fig. 3;
Fig. 5 is a perspective view of a Book Bank embodiment;
Fig. SA is an alternative Book Bank embodiment;
Fig. 6 is a block diagram illustration of the Book Bank circuitry;
Fig. ? is a block diagram illustration of an end user's storage media;
Fig. 8 illustrates the information flow for the point of purchase
configuration;
Fig. 9 is a block diagram illustration of certain elements of a point of
rental
delivery system;
Fig. 10 is a block diagram illustration of certain elements of a Book Bank
subsystem;
Fig. 11 is a block diagram illustration of certain elements of a promotional
delivery system; and
Fig. 12 is a flow chart illustrating the encryption process implemented in
accordance with the present invention; and
Fig. 13 is another Book Bank embodiment.
Detailed Description of the Drawines
The following sections provide a brief overview of the present system and
a detailed description of the system architecture. Following the detailed
architecture description is a detailed description of point of sale delivery
configurations. A detailed description of the various levels of encryption
which
may be used in the present system is then provided.

CA 02326098 2000-09-26
WO 99/49615 PCTNS98/22238
-6-
A. Brief Overview
In accordance with one embodiment of the present invention,
information is distributed from a central information bank to a user's
personalized
storage medium. Information to be so distributed by the present system is
received
from outside sources either electronically, over various communication
networks
(e.g., telephone lines, cable systems, cellular systems or other similar
commercial
communication networks) or from various storage mediums (e.g., magnetic or
electronic disks, cartridges, or tape reels or compact disks, laser disks,
tape
cassettes, etc.), or in hard copy format. If information is received in a hard
copy
format, it is initially converted to a standard digital format (e.g., ASCII
text, DOS
text or other similar standard commercially available text format} by scanning
or
direct transcription. Then the information is digitized, formatted, compressed
and
initially encrypted to form an electronic master copy which is stored in the
central
information bank. The master copy is duplicated electronically and dispatched
electronically through a communication network, such as a telephone or
satellite
network, to a point-of sale delivery system. Book Banks form a part of such a
delivery system, and the electronic copies are retained in the Book Banks for
downloading into a user's personalized storage medium. Initially, a user
selects the
information to be downloaded and a tracking entry is made into a transactional
database to record the transfer. Prior to and during downloading of the copy
on the
user's storage medium, the information is dynamical ly encrypted utilizing a
varying
level of encryption which is dependent upon a variety of variables, for
example, an
economic value of the information. A "dynamic" encryption process is utilized
so
that only the electronic reader associated with the user card used to access
the
information from the Book Bank and download the information to the user
storage
cartridge can be utilized to display the information in an understandable text
format.

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
B. System Architecture
Figure 1 illustrates one embodiment of the present information distribution
system. The system is shown, for illustration purposes only, as being
implemented
across the world. Referring to Figure l, a central information bank 100 is the
central "library," or storage location, for information. Peripheral
information banks
102A-F, coupled to central information bank 100, are libraries, or storage
locations,
for community oriented information. For example, the information stored in
central
information bank 100 accessed most often from the San Francisco bay area
peripheral information bank 102A may not be accessed often from the peripheral
information bank for Rome, Italy 102E. In any event, central information bank
100
is coupled to each peripheral information bank 102A-F to enable sharing of
information. As explained in more detail hereinafter with respect to
peripheral
information bank 102F, each peripheral information bank 102A-F is coupled to
one
or more point-of sale sites.
A central transactional data base 104 coupled to the central information
bank 100 and the peripheral information banks 102A-F, series a central record
keeping function for central information bank 100 and peripheral information
banks
102A-F. Central information bank 100 and central transactional data base 104
preferably, are commercially available main frame computers, such as an IBM
main
frame computer. The particular main frame model selected depends on the amount
of information to be centrally stored in the network, the extent of record
keeping
functions to be performed, and the speed at which transfer and processing of
information is to occur. Importantly, the present invention is not limited to
any one
particular computer to serve as the central information bank and/or the
central
transactional data base.
As shown in Figure 1 is an exploded view of the various couplings between
central information bank 100 and transactional data base 104, peripheral
information bank 102F and various point-of sale delivery sites, particularly,
point
of purchase sites 108A-C, point of rental sites 11 OA-D, promotional sites
112A-D,

CA 02326098 2000-09-26
WO 99149615 PCTIUS98/22238
_g_
and Book Bank subsystem sites 114A-C. Each point of purchase site 108 includes
a point of purchase transactional database, represented by a box, and a user
interface, represented by a circle. As explained above, the user interface is
sometimes referred to herein as the "Book Bank." Specifically, point of
purchase
site 108A contains Book Bank 116A and transactional data base 118A, site 108B
contains Book Bank 116B and transactional data base 118B, and site 108C
contains
Book Bank 116C and transactional data base 118C. Since the central information
bank 100 and peripheral information bank 102F, and specifically peripheral
information bank memory storage unit 106A, also could serve as Book Banks,
such
units are illustrated as circles. Further details regarding Book Banks and
transactional data bases are provided below in Section C.
As illustrated in Figure 1, each point-of sale delivery system, such as
systems 112A, 108A-B, 110A, and 114A-B, may be networked directly to
peripheral information bank 102F, or the point-of sale delivery system, such
as
systems 108C, 1 l OB-D, 112B, 112D and 114B-C, may be networked to the point
of purchase site 108B, which is networked to the peripheral information bank
102F.
Point-of sale delivery system configurations are explained in more detail
below in
Section C. At the level illustrated in Figure 1, however, it is important to
understand that the delivery systems may be integrated into various
combinations,
such as a promotional point of rental system as shown by 1 l OB and 112B, or a
promotional point of purchase system as shown by 108B and 112C or a
combination of a promotional, point of purchase, and point of rental systems
as
shown by 108C, 1 l OD and 112D.
Communication network links between the central information bank 100
central transactional data base 104, peripheral information banks 102A-F, and
point
of sale sites can be made utilizing one or a combination of many commercials
available networks such as telephone, satellite or cable networks or any other
medium suitable for transmitting information in digitized format. Many well
known protocols could be used in connection with the present system. For

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-9-
example, if the Internet is used as the "backbone" network, the well-known
TCP/IP
protocol could be used.
Figure 2 illustrates the flow of information in accordance with the
embodiment of the system architecture illustrated in Figure 1. For ease of
illustration only, peripheral memory storage unit 1 O6A is consolidated into
central
information bank 100, and peripheral transactional data base 106B is
consolidated
into central transactional data base 104. It should be understood, of course,
that
communication links between the peripheral information bank 102F and central
information bank 100 and central transactional data base 104 are provided.
As illustrated by the inputs provided to block 202, a publisher will receive
inventory reports from the central information bank 100 and sales data from
central
transactional data base 104. Based on this and other information the publisher
can
determine whether to place additional information on the network. For ease of
reference such information is sometimes referred to herein as "information
titles"
as shown in block 204. If the information is not present in an electronic
format,
then the information is digitized 206, disposed in an electronic format 208
and then
undergoes electronic authoring 210. The digitized information is then
transmitted
to a data converter 212 for converting the digitized information into a
uniform
format. For example, if the central information bank 104 and central
transactional
database 104 are DOS-based systems, the data converter will convert the
information into a DOS format. If the information titles are in a digitized
format,
the information titles are transmitted directly to data converter 212 for
direct
conversion into the uniform format as illustrated by line 214.
Once the data is in a uniform, digitized format, it undergoes an initial
encryption and compression to both reduce the amount of storage space required
to
store the data and to make the data ready for being transmitted with less risk
of
unauthorized use while being transmitted through a communications network. The
compression is accomplished through the use of one of the commercially
available

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-10-
compression protocols. The initial encryption is performed using one of the
standard available encryption protocols as discussed below in Section D.
Once in uniform, encrypted and digitized form, the information titles are
stored in central information bank 100. An electronic index listing all titles
available and accessible by author, title, subject or ISBN codes is prepared.
As new
information titles are added, the electronic index is updated to include the
new
titles. The information titles may then be downloaded to Book Bank 116A. The
information titles and corresponding electronic index information may, in
addition
to or rather than being stored in central information bank 100, be disposed on
laser
disk masters as illustrated at block 216. Laser disk masters 216 can then be
installed directly into Book Bank 116A.
Prior to downloading desired information titles, the user may access an
electronic index which contains all the information titles available for
downloading
from Book Bank I 16A. Through the electronic index, the user obtains the
listing
for available information titles by author's name, by specific title of the
work, by
ISBN code or by subject matter. Once compiled, a listing of the available
information titles included in the index category selected and the other
necessary
information to allow the user to purchase or rent any information title
contained in
the index category listed is displayed on the video screen. Using the video
listing,
the user selects any title listed thereon and obtains a printout of the
relevant
information through the printer slot 342. Upon proper access by a user, the
information titles may then be downloaded from Book Bank 116A onto a user's
storage media 218.
After downloading of information and corresponding electronic index
information form central information bank 100 or installation of laser masters
216
to Book Bank 116A, inventory reports are generated by Book Bank I 16A and
transmitted to central information bank 100. These inventory reports reflect
the
information titles presently stored in Book Bank 116A. These reports are then
are
sent to publisher 202. Also, a download completion report is sent from Book
Bank

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-11-
116A to transactional data base 118A, sometimes referred to herein as a host
fileserver, which in turn generates a status sales report. The sales report is
transmitted to central transactional data base 104. Transactional data base
104
sends the necessary action instruction back to host fileserver 118A and a
transaction
report to publisher 202 for uses such as accounting and auditing.
For publishers who wish to allow a user to be able to produce a hard printed
copy of a portion of an information title for study purposes, when the
information
titles are being downloaded into the master file, special authorization codes
are
included in the data. The codes accompany the information title to the storage
medium, or cartridge, of the user. The codes limit the particular amount of
the
information title which the user may produce in hard copy. With such coding in
place, the user may print, from the cartridge, the allowable amount of text as
a hard
copy. The cartridge retains information relating to such printing and
restricts
further printing once the limits have been reached. The user determines,
within the
defined limits, or authorized purposes, the portion of the text to be produced
as a
hard copy by using the high lighting features of the reader programming to
make
a selection.
C. Point-of Sale Delivery Svstem Configurations
The point-of sale delivery systems, as previously discussed, are classified
by function. The functions include one or more of the following: ( 1 ) point
of
purchase delivery system, (2) point of rental delivery system, (3) book bank
subsystem, and (4) promotional delivery system. The configurations for each of
these functions are separately discussed in detail below.
1. Point of Purchase Delivery System
A point of purchase system is illustrated in block form in Figure 3. The
point of purchase system is described herein for illustration purposes only as
a
system from which books can be purchased. As pointed out above, however, the

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-12-
system is not limited to books and other media capable of being expressed in
electronic form such as computer software, music and video could be purchased
utilizing the present system.
The point of purchase system illustrated in Figure 3 includes a Book Bank
302 coupled to host fileserver 304. Server 304 is coupled to a customer
service
terminal 306 (of course, there could be more than one terminal) and a
cashier's
station 308A which is further interconnected to other cashier stations 308B-D.
Server 304 also is coupled to an institution network 310 which in turn
connects to
institution terminals 312A-E. Service terminal 306, cashier stations 304A-D
and
institution network 3 I 0 are connected to server 304 via a computer
communication
link such as a commercially available computer networking system such as
CompuServe or Internet. Book Bank 302 and server 304 are connected to central
information bank 100 and central transactional database 104 as hereinbefore
explained with reference to Figs. 1 and 2.
Cashier stations 308A-D are in serial, linear networking connections which
allows the addition and removal of a number of cashier stations at any time.
This
co~guration accommodates extra cashier stations required during rush seasons
or
rush hours and the desire to remove cashier stations for better utilization of
space
after the rush seasons. Customer service terminal 306 has local processing
capabilitythat provides customer services such as personal identification
initiation,
personal identification number changes, processing of complimentary books,
book
refunds, customer information entries and updates. The customer services
terminal
306 can also provide the retail outlet with internal administration and the
management functions, such as the book inventory cards management, the book
list
management, book requests, book reports, financial reports, and E-Mail and
Bulletin Board management.
Referring now to Figure 4, point of purchase fileserver 304 is shown in
more detail. Particularly, server 304 includes a central processing unit (CPU)
316,
a primary power supply 318, an uninterrupted power supply 320 to assure

CA 02326098 2000-09-26
WO 99/49615 PGTNS98/22238
-13-
continuous operation during power failure, and a high density storage 322 that
holds
all the programs and the data bases required for server 304 operation.
Server 304 has four (4) interfaces, i.e., a network interface 324, a
maintenance interface 326, a customer service station interface 328 and a
cashier
station interface 330. CPU 316 transmits instructions to Book Bank 302,
creates
transaction data bases and reports, and processes orders from cashier stations
308A-D and customer service terminals 306A-D.
From network interface 324, server 304 communicates with central
transaction data base 104 for electronic filing of transaction reports and
communicates with Book Bank 302 to give Book Bank 302 downloading
instruction orders and to receive the status reports and the inventory reports
from
Book Bank 302. Server 304 also is coupled, through network interface 324 to a
Book Bank subsystem to receive subsystem reports in order to give instructions
and
orders whenever necessary, as hereinafter discussed. External network systems
such as institutional or corporate network systems with local merchants
terminals,
community bulletin board services and others can also be coupled to the
network
interface 324. The network interface 324 also allows two-way connecting with
interbank networks such as Cirrus, Plus or other similar data transfer
network.
Coupling to merchants' terminals, promotional system provides local merchants
and the local business direct access to update their promotions and coupons.
Maintenance interface 326 enables remote or on-site diagnosis and repair of
server
304.
Customer service station interface 328 provides for communication between
server 304 and customer service terminals 306A-D to handle customer service
transactions. Customer service terminals 306A-D are illustrated as being
coupled
through a data switch 332 to a printer 334. Cashier station interface 330
provides
that cashier stations 308A-D can communicate with server 304.
Figure 5 illustrates one embodiment of Book Bank 302. Book Bank 302
includes a high resolution color graphic display 336 which is a touch screen
device

CA 02326098 2000-09-26
WO 99/49615 PCT/US98I22238
-14-
used to display, for example, instructions, messages, and status reports to
the user,
indexing information and to receive the user's touch screen input selections.
Book
Bank 302 also has a keypad 338 that is for the user to input a personal
identification
as well as other inputs. A magnetic code or other generally accepted card
reader
341, shown as an insertion slot, is provided for customers' transactions with
a bank
card, credit card or some other form of debit card. A bar code reader 340,
shown
as an insertion slot, is provided to allow users to insert cards containing
ISBN codes
for desired information titles for reading by the Book Bank. ISBN codes may
also
be manually inserted by typing the relevant numbered keys on the keypad 338. A
printer slot 342 also is provided to enable the user to access the output of
Book
Bank 302, a printer (not shown in Fig. 5), as hereinafter described, to
retrieve
receipts and transactions reports and ISBN access vouchers. Book Bank 302 also
includes a base member 344 with a cut-out portion 346 to enable a user to
stand
comfortably at keypad 338. Importantly, Book Bank 302 also includes a
cartridge
slot 348 for the user to input a reading cartridge, as explained in detail
hereinafter,
to obtain a copy of the information selected for downloading.
In another embodiment and as shown in Figure SA, the physical
embodiment of Book Bank 302 may be altered . More specifically and in one
embodiment, Book Bank 302 is positioned on a desk 339 using apersonal computer
349, for example those available from IBM Corporation. The user operates Book
Bank 302 as described above with reference to Figure 5 except, the user may
for
example, sit in a chair (not shown). Such a configuration may be used, for
example, in a corporate, dormitory, library, or other similar environment
where the
user may be accessing information for longer periods of time or in a
professional
type environment. In other embodiments, readers 340 and 341 and cartridge slot
348 each may be located within computer 349 or in separate devices which are
electrically coupled to computer 349.
Figure 6 is a block diagram description of Book Bank 302 circuitry.
Particularly, Bonk Bank 302 includes a central processing unit (CPLn 350 which

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-15-
is coupled to display 336, keypad 338; magnetic strip reader 341 and bar code
reader 340. Although CPU 350 is illustrated as one unit, it is contemplated
that
CPU 350 could be a parallel processor or distributed processor arrangement.
Selection of CPU 350 type depends, of course, on the amount of information to
be
processed, the desired speed of processing and costs. CPU 350 also is coupled
to
an automatic teller machine (ATM) module 352 to allow transactions with ATM
cards. CPU 350 is coupled to a media driver 354 which enables users to insert
personalized media for acknowledgment or other functions as hereinafter
discussed:
Book Bank 302 also includes a primary local storage device 356 provided for
the
storage of all information masters selected for loading into Book Bank 302 and
related index information. A secondary storage device 358 is provided to hold
other programs, instructions and transaction related information. A buffer
memory
360 is utilized to speed up downloading in order to accommodate high volume
users during the peak seasons. A printer 362 is provided to print coupons on
demand, receipts and various reports for the users. A power supply 364
provides
power to printer 362. CPU 350, secondary storage device 358 and local storage
356. An uninterrupted power supply 366 coupled to primary power supply 364
assures continuous operation even during power down time.
CPU 350 is coupled to a network interface 368 to provide communication
to central information bank 100, host fileserver 304 or a Book Bank subsystem,
as
hereinafter discussed. CPU 350 also is coupled to a wireless communication
port
370, which in turn is coupled to an antenna 372. Wireless communication port
370
enables compatibility with an alternative communication media in the event
that
such media is required.
Figure 7 illustrates, in block diagram form, the structure for a user's
personalized media storage cartridge 374. As explained hereinafter, a user
inserts
cartridge 374 into cartridge slot 348 for downloading of the information
selected
from Book Bank 302. The downloaded information is stored, in an encrypted
format, on cartridge 3 74 together with relevant basic index information
copied from

CA 02326098 2000-09-26
WO 99/49615 PCf/US98/22238
-16-
the electronic index contained in Book Bank 202 at the time of initial
downloading.
Cartridge 374 is compatible with readers to enable the user to view
information
stored on the cartridge. Cartridge 374 includes reading software 376 which, as
explained in more detail hereinafter, performs sequential encryption and
decryption
of information. Registry correspondence segment 378 also is provided. A book
file
registry 380 is created at the time of downloading information onto cartridge
374.
Encrypted bookfiles 382 together with relevant electronic index information
are
stored on cartridge 374 as well as a non-erasable permanently marked serial
number
384. Cartridge 374 also contains a commercial operating system environment 386
and free disk space 388.
Figure 8 illustrates the user process and component processing which occurs
when a user utilizes the point-of purchase system described above.
Particularly,
once the user enters the site 390, and if the user a first-time patron 392,
the user will
complete a user's application form 394. The user will then take the completed
application and a picture LD. to customer service station 306A, where the user
will
select and input a personal identification number (PIN) and a password 396.
The
customer service clerk will open an account for the customer 398. The user-
selected password is automatically matched with a sequentially created
customer
account number within the central data banks. Using the keypad accompanying
the
cashier station, the clerk types in the name, address and social security
number for
the user. The written application will then be inserted into the printer slot
accompanying the cashier station. While loading the customers' information,
the
central data bank reviews the information to determine if there are any prior
problems with the customer or other discrepancies. When the verification
process
is completed, the designated customer account number for the user is printed
on the
users application. Then, the clerk places, into the card slot, a user
identification
card (for example, a plastic card having dimensions of the standard credit
card and
containing a magnetic strip on the back on which can be placed magnetic coded
information). The card is then embossed with the user's name and account
number

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-17-
and the magnetic strip is encoded with the applicable user codes (account
number,
card number and designated password information). The written application is
then
transmitted to the central data storage center for retention. The user now is
able to
use the issued card to make purchases or to rent the use of information
titles. The
machine used to emboss and encode the cards is a standard commercially
available
machine of the type currently being used in connection with the issuance of a
bank's card, credit cards or debit cards.
In addition to obtaining a personal identification card, a new enrollee
purchases a reader/computer or other acceptable reading device (such as a
special
computerized interface, or an audio or video playback device). Each such
device
is assigned a unique serial number and a special code number. In one
embodiment,
the serial number is contained on a read only memory chip enclosed within the
device. All of the many cartridges which accompany each such reading device is
encoded in such a manner that information recorded on the cartridge can only
be
read by the related reading device. This is accomplished by a simple program
contained within the permanent memory of the device. In one embodiment, if the
special code on the device is not the same as the number which the cartridge
is
seeking, then the cartridge will cause to be displayed in the reading device
the
words "cartridge cannot be read by this device" and to not allow any further
access
to any information contained on the cartridge by the particular reading device
in
question. If the numbers match, further access will be allowed. At the time a
reading device is purchased, the clerk enters the serial number for the device
into
the central data bank through the cashiers station. The central data bank
contains
a list of the serial numbers of all approved reading devices and the
corresponding
special code number. The personal identification card for the customer
purchasing
the reading device is placed by the clerk into an appropriate slot on the
cashier's
station and the magnetic strip on the identification card is encoded with the
applicable serial number for the reading device being purchased. Thereafter,
whenever the user desires to obtain additional cartridges for reading by his
or her

CA 02326098 2000-09-26
WO 99/49615 PCTNS98/22~38
-18-
reading device, the user needs only present his personal identification card
and the
cartridge to be properly coded to the clerk and by inserting the cartridge
into the
cartridge slot and the identification card into the card slot and pressing the
designated button on the cashiers station, the new cartridge will be correctly
encoded to be readable by the user's reading device.
The requirement that reading device codes and cartridge codes match,
before access will be allowed, means that issued cartridges will not be
readily
readable by multiple reading devices. Multiple device reading will require
special
programming and the granting of special allowances, or approved purposes. In
one
embodiment, by purpose encoding the information, a publisher may expand or
limit
access to those users having a proper authorization or defined purpose. For
example, a publisher may purpose encode a portion of a selected book to be
readable by any user, i.e., any purpose encoded. This type of purpose encoding
may
be used on, for example, promotional books or some governmental publications.
Other information may be purpose encoded to limit access to a single user to
only
view the information, i.e., classified material. The requirement reduces the
possibility of unauthorized use of information titles.
In operation, the customer takes the customer identification card to the book
display area for shopping 400. If the customer previously opened an account,
the
customer will not have to go through the above described process and can
proceed
directly to shopping area 400, where the customer will select a book inventory
card
matching his book selection. The book inventory card has the book ISB numbers,
a bar code and information related to the particular information title,
author,
publisher, and edition date printed thereon. The customer brings the selected
book
inventory card to the cashier's station 308A. The cashier magnetically reads
the
codes on the customer's LD. card and scans or manually enters the bar codes on
book inventory cards 402. The customer then makes a proper payment, and the
customer codes and information title bar codes are transmitted to host
fileserver
304. Server 304 searches the existing customer account file to match the

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-19-
identification (i.e., pin and password) and will generate a downloaded book
list file
based on the bar codes from the book inventory cards or as manually loaded.
Server 304 downloads the file to Book Bank 302 which electronically generates
a
portfolio of information titles ready to be downloaded on demand. The user can
then proceed to Book Bank 302 at any later time and insert the identification
card
into the slot 340 of Book Bank 302 and a coded point-of purchase cartridge 374
into Book Bank cartridge slot 348 to identify himself with a personal
identification
number, as illustrated in step 404. The user also enters a password 406 into
the key
pad 338. When Book Bank CPU 350 matches the personal identification number
with a downloaded list portfolio, Book Bank CPU 350 starts downloading the
requested information from local storage 356, through buffer memory 360, to
media
driver 354 which copies the information onto cartridge 374. As part of the
downloading process, the data is dynamically encrypted to make the data
uniquely
readable only by authorized reading devices. The dynamic encrypting is
described
below in Section D. After downloading, the user removes cartridge 374 and then
inserts cartridge 374 into his personal reader/computer to access the
information
acquired. The reader/computers are co~gured for long-term reading
applications.
The reading application software is stored on cartridges with the ability to
read the
applicable software on the cartridges permanently stored within the memory of
the
reader/computers or other authorized reading device.
A user may select portions of selected information to combine and
download. In one embodiment, the user may select at least one book and select
at
least one portion of each selected book. If more than one portion is selected,
where
each portion includes up to the entire selected book, the portions are
combined and
downloaded to user's cartridge 374. For example, for a specific college
course, a
student may be required to download specific chapters from ten different
books.
After selecting the ten books and ten specific chapters of the selected books,
the
selected information is combined, encrypted using the determined level of
protection, and downloaded to the students cartridge 374. Similarly, a user
may

CA 02326098 2000-09-26
WO 99/49615 PCTNS98I22238
-20-
select individual tracks from music information to combine and download the
selected tracks to a single cartridge 374 for playback at a later time.
2. Point of Rental Delivery System
If a user is not interested in obtaining a permanent copy of a particular work
but requires a copy for a period of time, e.g., a semester, the user may
prefer to visit
a point of rental site rather than a point of purchase site. A point of rental
system
is illustrated in Figure 9. The rental system is identical to the point of
purchase
system previously described herein (e.g., includes a host fileserver) except
with
respect to the differences pointed out below. In many instances, a single site
or
Book Bank may serve as a point of purchase system site and a point of rental
system site and a point of delivery system for promotional or commercial
information site or any combination thereof. As shown in Figure 9, the point
of
rental system includes Book Bank user terminal hubs 41 OA-B coupled to
terminals
412A-E, and customer service station 4I4. User terminals 412A-E allow a
customer to do an information title search and index search of the Book Bank
memory and to transmit other information between Book Bank 302 and himself.
Customer service station 414 combines the function of customer service as well
as
the cashier's station. For example, at customer service station 414, a credit
customers' debit card can be credited and the ATM operation can be overridden,
via ATM module 416, if necessary. Information can be printed out from customer
service station 414 via printer 418.
Point of rental storage media 420 is used in the rental system. Point of
rental media 420 is the same as point of purchase media 374 except that media
420
includes an automatic erasure mechanism that erases the information downloaded
after the expiration of a preset time interval. More specifically, when
information
is downloaded from Book Bank 302 onto media 420, Book Bank 302 also
downloads a "time stamp" equal to the time period for which the user has paid
to
retain a copy of the information. The time stamp could take the form of a
value

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-2I-
loaded into a memory location on media 420, which value corresponds to the
rental
time period. During usage, the actual usage time elapsed is subtracted from
the
electronically stamped time period. Once the user has consumed all of the
usage
hours authorized, the information title will self destruct, i.e., be deleted
from media
420. This can be achieved simply by calling a stored program which erases the
information associated with the memory location where the time value is
stored.
For example, when the value of the memory location where the authorized usage
time is stored is zero, the stored erase program would be called upon to erase
the
information associated with the "zero" time usage authorization.
Another method for automatic erasure is for each rental or library cartridge
to contain a real time clock and independent rechargeable power supply. When
the
cartridge is initially encoded for use, the real time clock mechanism is
activated.
As rented information titles are being downloaded, an expiration date is
logged into
the index information for each title. Any time after the real time clock on
the
cartridge reaches the designated expiration date, access to the relevant
information
title is denied. If use of the title is not extended, after the expiration of
an additional
number of days, use of the cartridge will cause a permanent erasure of the
information title from the cartridge memory. With this method, if the real
time
clock falls to operate, the cartridge will become unreadable without repair.
To
repair a defective cartridge, the user need only bring the cartridge together
with his
personal identification card to the nearest service center where the real time
clock
will either be repaired or the relevant information titles will be loaded onto
a
replacement cartridge. The user will be credited for any lost time while the
cartridge was unreadable. A service center could be located, for example, near
each
separate point of delivery site.
The automatic erasure program could be created as an operating system
module or as a separate executable program designed to be "terminate and stay
resident" (TAR}. A module integral with the operating system is preferred
since

CA 02326098 2000-09-26
WO 99/49615 PCT/US98122238
-22-
such a structure ensures that if the operating system is viable, the automatic
erasure
module is viable.
If the user srill needs more time with any particular information titles, the
user may return to the point of rental site and "re-rent" the information.
Alternatively, it is contemplated that the user could renew the rental via a
modem
coupled to the reader.
With respect to the user process for renting information, when a point of
rental patron enters a point of rental site, the user will use a valid ATM
card, bank
card, credit card, or some other debit card and proceed directly to a user
terminal
4I2A-E. Using such a terminal, the user can perform information title
searching
and download an order entry to Book Bank 302. When the download entry is
complete, the user will go to Book Bank 302, insert a rental media, an
identification
card, and a credit card, bank card, or debit card into Book Bank 302 for the
transaction approval. If the transaction is not cleared or if the ATM system
is not
IS working properly, the patron can proceed to the customer service center and
have
the attendant manually override the ATM process, if appropriate. If the user
does
not have a valid ATM credit card or debit card, the user will go to the
customer
service center, pay the service clerk to receive credit on the Book Bank debit
card.
Then the customer may proceed to the user terminal where the user downloads
the
order entry.
After the transaction approval is cleared, the patron inserts point of rental
media 420 into Book Bank media driver 354, has his personal identification
card
scanned and enters a password. The information is dynamically encrypted and
downloaded from Book Bank 302 to media 420 with an electronic stamp of the
number of hours of usage authorized for each information title or an
expiration
date. After the downloading, the user will apply this media on the personal
reader/
computer to access the information on the media.
Typical examples for the point of rental site are libraries {commercial,
education or public access) and book rental shops. The information downloaded

CA 02326098 2000-09-26
WO 99/49615
-23-
PC'T/US98/22238
by the user may be free of charge to the users such as in the case of a
library, or may
incur certain rental fees at a predetermined rate, such as in the case of a
rental shop
or library charging on a per page use basis. Any given point of rental site
may
operate as a traditional library in allowing free use to library members for a
limited
period of time or may operate as a rental shop where fees are collected from
users
in accordance with the period of use allowed.
3. Book Bank Subsystem
A Book Bank subsystem couples to a Book Bank and host fileserver as
described in more detail below. The central element of the subsystem is a Book
Bank which is a modified version of the point-of purchase Book Bank 302. The
subsystem is specifically configured for the collective use by members or the
staff
of a commercial or business entity or a corporation. It delivers and it
recalls
information titles among authorized users within the business or corporate
entity,
and provides the capability of limiting the number of copies of a given work
that
may be distributed to other authorized users. If all of the licensed copies of
any
information titles have been checked out by the staff of an organization, then
no
other users may access the same information title within that particular
subsystem
until one or more of the licensed copies of the particular information is
uploaded
or recalled to the subsystem or additional copies are purchased. In one
embodiment, the information is purpose encoded so as to limit a purpose to
which
access by a user to the information is allowed. For example; a central
corporate
library may allow specific users, i.e., R&D personnel, to selected
information, i.e.,
pending patent applications. All non-R&D personnel users without the proper
purpose, or authorization code, are prevented from accessing the information.
Instead of purchasing the unlimited use of a limited number of copies, a
commercial or business entity may lease the limited use of an unlimited number
of
copies or the use of a specified portion of a given information title. Under
such
circumstances, the commercial or business entity would be charged each time
the

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
subsystem is accessed from a participating work station for the portion of a
specified information titled accessed and for the period of time the access
occurs.
By restrictions encoded on the interface between a participating work station
and
the subsystem, while accessing information from the subsystem, the ability of
the
work station to perform certain operations would be restricted. The restricted
operations would be those related to the duplication or transmission of data
related
to information titles being accessed through the subsystem.
More specifically, and referring to Figure 10, Book Bank subsystem 422
contains a high resolution color graphic display 424 coupled to CPU 426 to
display
the instructions or status of subsystem 422. Subsystem 422 also includes a
keyboard 428 with limited access to the system for keying selections for
operating
certain given functions such as product display. Subsystem 422 has a media
driver
430 for the downloading of information and a local storage 432 which holds a
portfolio of information the business entity has ordered for use. A secondary
storage 434 is also provided to hold all the software programs that control
and
perform the functions of subsystem 422. Subsystem 422 further includes a power
supply 436 and an uninterrupted power supply 438 to assure continuous
operation
during power failure downtime. A printer 440 is provided to print various
reports.
Book Bank subsystem 422 has a network interface 442 that connects
subsystem 422 to Book Bank 302 and host fileserver 304. Network interface 442
also may couple to the corporate or business entity network system 444. With
such
a structure, the corporate entity may transmit or download its own corporate
proprietary information through Book Bank subsystem 422.
Media port extension interface.446 provides access by an adequate number
of media drivers to the desired corporate terminals for corporate network
stations.
Media driver 430 is connected to the terminals or stations by a proprietor
driver
card. The corporate administration can utilize the dynamic encryption and the
dynamic downloading function of Book Bank subsystem 422 to incorporate and
accommodate the corporate proprietary information. The corporate proprietary

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-25-
information may be transmitted to Book Bank subsystem 422 using an encryption
process and then downloaded selectively to the destination port and to the
properly
identified authorized personnel. Book Bank subsystem 422 is not only a
customized corporate library of copyrighted and proprietary information, but
also
is a corporate document security device that encrypts and dispatches the
corporate
documents and the corporate confidential proprietary information in the
corporate
network system. As part of the network interface connection linking each
participating work station to the subsystem and allowing access to encrypted
information, a separate unit, e.g., a memory storage unit restricts certain
operations
which may be performed from the work station so long as the work station has
access to encrypted information from the subsystem. The restrictions limit or
prevent operations related to the duplication or transmission of data.
4. Promotional Delivery System
The promotional system is a point of delivery system for promotional and
commercial information. It distributes promotional and commercial information
in electronic format and users may either view the digitized promotional and
commercial information at the site or download the information to their
personalized media for later viewing. User's call access the promotional and
commercial information including the dynamic viewing electronically of
advertising available discounts, commercials, special promotional events,
software
demos and product catalogs. Users may even shop electronically by manipulating
the promotional and commercial information and placing orders through E-Mail
from a personal reader/computer or by ordering directly from an interactive
promotional Book Bank. The promotional Book Bank has the same structure as
Book Bank 302 for the point-of purchase system.
A promotional system in accordance with the present invention is illustrated
in block diagram form in Figure 11. As in the other point-of sale systems,
Book
Bank 302 is networked to host fileserver 304. The promotional system further

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/Z2238
-26-
includes a number of promotional units 448A-D which electronically display and
promote products. Unit 448A is coupled directly to central transactional data
base
104 and central information bank 100 while units 448B-D are coupled to host
fileserver 304. Unit 448A receives information from merchant terminals 450-A-D
and host fileserver 304, receives information via merchant terminals 450E-G.
More
specifically, host fileserver 304 receives advertising and special offer
updates from
the local businesses, national or regional advertisers, and corporate sponsors
through merchants terminals (MT) 450E-G. The host fileserver 304 is also
networked to a central transaction data base which, in turn, provides a report
to the
publishers, advertisers, accounting, auditing fimns, merchandise vendors, and
others.
The promotional Book Bank allows selective downloading ofpromotional
and commercial information to the user's point of rental media (see discussion
in
Section B, System Architecture, for explanation of such downloading) for the
user's
private review and personal shopping at his convenience. The promotional and
the
commercial information downloaded will self destruct (i.e., automatically
erase) at
the expiration of a pre-determined time interval as explained above with
respect to
point of rental delivery systems. The promotional Book Bank also provides a
user
interactive self service vending feature. The user may order products or
information electronically via the network. Some of the promotional functions
are:
coupons on demand, virtual shopping, catalog sales, demos; subscription
orders,
electronic applications of credit cards, calling cards, or other types of
services.
Some public domain information distributed such as community events, ticket
sales, institutional events or even public bulletins could also be distributed
with the
promotional information as a free or low cost service to the community.
The promotional and the commercial information flow is very similar to the
information flow within the point-of sale delivery system. However, rather
than a
publisher or copyright information owners, the information sources are local

CA 02326098 2000-09-26
WO 99/49615 PCT/US98IZ2238
-27-
businesses, national or regional advertisers, and appropriate sponsors through
advertising agents and other entities.
5: Information Tracking
In one embodiment, for each exchange, or download, of information, a
tracking entry is transmitted, or stored, in an appropriate transactional
database, for
example central transactional database 104, to record movement, or transfer,
of
information from a first location to a second location: By reviewing these
tracking
entries, an information owner may monitor movement of the information and take
appropriate action. For example, a tracking entry may be recorded in
transactional
database 104 each time any information is copied into, removed from, or copied
from, Book Bank 302. Based upon the tracking entries, the information owner
may
charge the receiving or transferring party a fee as defined by the owner of
the
information. The fee charged may be based on a variety of factors including,
but
not limited to, an economic value of the information, use or purpose of the
information, number of users, and the availability from other sources. The
tracking
entries may also include additional data so that the information owner may
determine who transferred the information, the amount of information
transferred,
type of transfer, i.e., rental for specified period of time, and the time of
transfer.
Tracking entries, in one embodiment, are recorded for all transfers, i.e.,
Book Bank
302 to cartridge 374 and central information bank i 00 to Book Bank 302.
Utilizing
these entries, an information owner may also determine the type of information
that
is being transferred, the number of transfers, and the identification of the
information receivers. For example, the information may be used to determine
if
certain promotional materials are being received by targeted users, or to
determine
responses to different information pricing strategies.

CA 02326098 2000-09-26
WO 99/496I5 PCT/US98/22238
-28-
D. Encryption
The above-described point-of sale delivery systems have the capability
of performing dynamic encryption of data as the data is downloaded onto a
user's
storage media. Dynamic encryption refers to the process in which the Book Bank
works together with the storage media to perform a proprietary encryption of
downloaded data. In one embodiment, different levels of encryption are
utilized
based on a series of factors or variables. These variables include, but are
not
limited to, an economic life, a market value, a general availability, a
replacement
cost, time sensitivity, and potential number of users, of the information. For
example, today's TV listings may have a low level, or complexity, of
encryption as
a result of the low market value, low replacement cost, and general
availability from
many sources. Conversely, a mufti-volume legal treatise may, for example, have
a high, or complex, level of encryption as a result of the limited
availability,
replacement cost, and long economic life of the information. Based on the
described factors, a source, i.e., publisher, of information may decide the
appropriate level of encryption for each portion of information from the
initial
transmission to central information bank 100 to a user's cartridge 374. The
level
of information encryption, in any location, i.e., bank 100, may be higher or
lower
than another location, i.e., cartridge 374. More specifically, each time
information
is downloaded, or transmitted, the level of encryption may be independently
altered,
or determined. For example, the level of encryption at central information
bank
100 may be different, i.e., higher or lower, than the level of encryption of a
book
downloaded to a user's cartridge 374.
In addition to dynamic encryption, other encryption may be performed as
illustrated in Figure 12. Figure 12 illustrates a three Level encryption
process. For
example, prior to transmitting information on the network, the data may be
encrypted. This facilitates preventing unauthorized users from accessing the
transmitted information on the network. In addition to the pre-transport
encryption,
the data, may be encrypted prior to being placed in a book bank. Publishers or
other

CA 02326098 2000-09-26
WO 99/496I5 PGT/US98/Z2238
-29-
owners ofthe information may have approval authority over this level
ofencryption
to provide such information owners with satisfaction that the data is
adequately
protected.
Once the data is stored in the book bank, dynamic encryption techniques
may be used when downloading the data onto storage media. The storage media
(Figure 7) includes a proprietary environment for building, reading, viewing
and
processing. The media also has a commercial operating system environment for
processing information files. An information file directory registry forms a
part of
the proprietary application, and a file directory pointer is contained in the
operating
system application.
The dynamic encryption process, in one form, uses the permanent serial
numbers stored in the storage media, the user's personal identification
number, a
personal signature code number, and a password to further encrypt the data
stored
in the book bank as the data is downloaded to a user's storage media. The
personalized variables and codings are combined with various individualized
information file variables to form an individualized data structure for the
data
downloaded to the user's personalized media. As a result, those information
files
are individualized pertaining to the media, the version of software, the
information
file itself, and other variables.
The dynamic encryption assists in reducing the possibility of the
unauthorized use of proprietary or other information by causing all
information
downloaded through the point-of sale delivery system to be readable and
accessible
by a selected number of user readers/computers. Specifically, data storage
medium
accessible from one reader/computer will not be accessible using another
reader/
computer unless such access has been prearranged such as by providing the
other
reader/computer with an identical user identification number and password.
Examples of well-known encryption algorithms which may used in
performing the above described three level encryption include the 28068 Data
Ciphering Processor (DCP). The DCP contains the structure to encrypt and
decrypt

CA 02326098 2000-09-26
WO 99/49615 PCTNS98/22238
-30-
data using National Bureau of Standards encryption algorithms. It may be used
in
a variety of environments including in dedicated controllers, communication
concentrators, terminals and peripheral task processors in general processor
systems. DCP provides a high throughput rate using cipher feedback, electronic
code book or cipher block chain operating modes. The provisions of separate
ports
for key input, clear data and enciphered data enhances security. The host
system
communicates with the DCP using commands entered in the master port or through
auxiliary control lines. Once set up, data can flow through the DCP at high
speeds
because input, output and ciphering activities can be performed concurrently.
In alternative embodiments, encryption and decryption may be performed
in dedicated hardware and/or software functions. For example, each reader and
cartridge 374 may include a dedicated encryption integrated circuit (IC) and a
dedicated decryption IC to maximize the transfer speed of the information. The
level of encryption and decryption may altered by adding additional functions
and
by enabling or disabling the additional levels.
With respect to dynamic encryption, the following describes one of many
methods of dynamic encryption which could be used. Particularly, each
regularly
used alpha or numeric symbol is assigned a corresponding number as illustrated
in
Table 1.
Table 1
symbol A B C D E F G H I J K
~
code 1 2 3 4 5 6 7 8 9 10 11
symbol L M N O P Q R S T U V
code 12 13 14 15 16 17 18 19 20 21 22
symbol W X Y Z 0 1 2 3 4 5 6
code 23 24 25 26 27 28 29 30 31 32 33

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-31-
symbol 7 8 9 , +
, , . - x
code 34 35 36 37 38 39 40 41 42 43 44
The serial number stored on the cartridge would be used to determine how
many slots the code should shift to the left at the start the encrypting. For
example,
if the serial number ended with six, before starting of encryption, the code
would
be shifted to the left by six places. Table 2 illustrates the code table after
the shift.
Table 2
symbolA B C D E F G H I J IC
code 7 8 9 10 11 12 13 14 15 16 17
symbolL M N O P Q R S T U V
code 18 19 20 21 22 23 24 25 26 27 28
symbolW X Y Z 0 1 2 3 4 5 6
code 29 30 31 32 33 34 35 36 37 38 39
symbol7 8 9 . , ; , + _ x
code 40 41 42 43 44 1 2 3 4 45 6
The selected user password then is used to determine after how many
symbols the code should again shift to the left. As an example, if the
password
were ROSE, then using the codes from Table 2, the numeric statement for rose
would be 24212511. When the corresponding numbers are added together until
reaching, a number between 1 and 10, the number reached in our example is 9
[18.9]. So after every 9th letter, the codes would be shifted another 6 spaces
to the

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-32-
left. After the encrypting of 9 letters, the codes would be set as set forth
in Table
3.
Table 3
symbol A B C D E F G H I J IC
code 13 14 15 16 17 18 19 20 21 22 23
symbol L M N O P Q R S T U V
code 24 25 26 27 28 29 30 31 32 33 34
symbol W X Y Z 0 1 2 3 4 5 6
code 35 36 37 38 39 40 41 42 43 44 1
symbol 7 8 9 . , ; . + - x
code 2 3 4 5 6 7 8 9 10 11 12
Because the fact that the encrypting tables are constantly shifting, under
this
simple method, the phrase "My brown dog has fleas." would be encrypted as
follows:
19 31 6 8 24 21 29 20 6
16 27 19 12 20 13 31 18 24
23 19 37 11
Decoding using only Table 1, the coded phrase would read as follows:
S 4 F H X U 2 T F
P 0 S L T M 4 R X
W S . K
Without knowing other information, it would be very difficult to find a
pattern that
would allow one to decode the symbols.
Knowing the placement of the codes relative to the symbols at the start of the
encryption process and the number of symbols between shifts, decoding an

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-33-
encrypted phrase is simply a reversal of the process applying each of the
tables in
reverse.
There are any number of similar methods of dynamic encryption which use a
different manner of determining how encryption codes will vary as one proceeds
through the data to be encrypted. The objective, of course, is to make
decoding
difficult by avoiding obvious patterns associated with conventional language
and
number usage.
E. Tamper Protection
In one embodiment of the present invention, access to the information is
monitored, or recorded, to determine attempted unauthorized access to the
information. If an unauthorized access is recorded, or stored, onto a user's
media,
for example cartridge 374, the next time that user attempts to download
additional
information to cartridge 374, an unauthorized access message may be
transmitted
to notify the appropriate party, for example the cashier. As a result of the
unauthorized access message, the cashier may revoke user's cartridge 374,
notify
the proper authorities, or record an entry into the user's account for future
action.
More specifically and in one embodiment, the unauthorized access is determined
by first reading, or recording, the specific identification data from the
information
requester, or receiver. If the data provided by the information receiver is
determined to not match, i.e., is unequal, predefined values, the unauthorized
access
message is recorded and information exchange is prevented. The data
determination may be completed using known comparison hardware and/or
software functions.
Additionally, the unauthorized access message may be generated if a user
having an incorrect purpose, or authorization code, attempts to access
unauthorized
information. For example, in a corporate environment, if a user attempted to
access
information for which the user did not have the proper authorization code, an
unauthorized access message is generated and may be sent to, for example a
system

CA 02326098 2000-09-26
WO 99/49b15 PCT/US98I12238
-34-
administrator or a security official. Different level of unauthorized access
messages
may also be generated. For example, a high level message may be generated if a
user attempts to decrypt the information stored in various locations within
the
system, for example Book Bank 302 using an unauthorized device. A lower level
message may be generated if a remote user has attempted to access data that is
one
level above that user's authorized level.
F. Other Embodiments
In another embodiment, Book Bank 302 rnay be configured to capture and
exchange real-time information. For example, as a professor presents material
to
students in a classroom, the professor's presentation may be captured and
converted
into copyrighted text and exchanged with remote users. This conversion may be
completed using known voice to text conversion systems using a known computer
system. The professor's presentation may be supplemented with previously
prepared, or concurrently prepared, written text. The text may be digitized
and
properly integrated into the text using known methods. Remote users may
receive
information from the professor's lecture in real-time as the material is
presented or
may receive the information at a later time. Remote users receive only that
information which the remote user is authorized to receive from Book Bank 302
as
described above.
In yet another embodiment Book Bank 302 is configured to receive audio,
video, and/or computer software code. For example and in one embodiment shown
in Figure 13, Book Bank 302 is coupled to a Video Cassette Recorder (VCR) 600,
a stereo system 610 including a cassette recorder/player 620, a Compact Disk
(CD)
player and/or recorder 630, a television 640, and a computer 650. As described
above, authorized information is received from Book Bank 302, and in one
embodiment is stored to a storage device, for example a memory device 660. The
memory device 660 may be a plurality of memory cells, for example Read Access
Ram (RAM), Read Only Memory (ROM), a rotating storage unit, i.e., a hard disk,

CA 02326098 2000-09-26
WO 99/49615 PCT/US98/22238
-35-
a magnetic storage media, i.e., magnetic tape, or other storage media, for
example
an optical storage media. After the remote user has selected the appropriate
information to receive from Book Bank 302, the information is stored in device
660. Device 660 is configured to transfer the stored information to the
selected
playback device, i.e., Video Cassette Recorder (VCR) 600, stereo system 610,
cassette recorder/player 620, CD player/recorder 630, television 640, or
computer
650. For example, in one embodiment, the remote user downloads, or receives,
the
entire contents of a top ten music album. The contents of the album is stored
in
device 660. As described above, the information may be permanently stored or
may
be stored for a fixed period of time or number of uses. After downloading the
information to device 660, the remote user may transfer the information to
stereo
system 610 for listening. In another embodiment, the information may be
transferred to, or through, device 660 to one of the other components, i.e.,
cassette
recorder 620, VCR 610, CD recorder 630, or computer 650. To limit unauthorized
copying or playback, the information may be playback using only those
components, i.e., cassette recorder 620, VCR 610, CD recorder 630, or computer
650, coupled to device 660. For example, the remote user may download a
feature
movie by saving the movie on a tape using VCR 610. The remote user may then
playback the movie as authorized as long as the tape is playback in VCR 610
that
is coupled to device 660. Similarly, the remote user may download a software
program so that the information is stored in device 660 or in a storage media
in
computer 650. Depending upon the authorization code of the software, the
program
may be configured to execute only from computer 650 when computer 650 is
coupled to device 660.
The above described system facilitates controlled and monitored exchange of
information between many types of information owners, distributors, and users.
By
using the described system, a user may obtain many types of authorized
information. The user may, as determined by the information owner, purchase,
rent, or obtain without charge, the authorized information. The information,
in one

CA 02326098 2000-09-26
WO 99/49615 PCT/US98I22Z38
-36-
embodiment, is encrypted using various levels, or complexities, of encryption
to
prevent unauthorized access. The level of encryption depends upon a variety of
factors or variables, for example, the economic life of the information. For
example, Book Bank 302 may include information representing a reference
dictionary and a top ten music album. Information from the reference
dictionary
and the album may have the same or different levels of encryption. In
addition,
students from a determined class may access the reference dictionary
information
without charge as the result of the school purchasing an unlimited use copy of
the
information, however, those same students would be required to purchase any
information downloaded from the album. Additionally, the type of access may
differ for different portions of the information. For example, a first track
of the
album information may be coded so that anyone may download the information
without charge, however, the remaining tracks of the album information may be
coded to require payment to download.
While the present invention has been described with respect to specific
embodiments, many modifications, variations, substitutions, and equivalents
will
be apparent to those skilled in the art. Accordingly, the invention is to be
considered as limited only by the spirit and scope of the appended claims.

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Inactive : CIB expirée 2013-01-01
Inactive : CIB expirée 2012-01-01
Demande non rétablie avant l'échéance 2009-10-21
Le délai pour l'annulation est expiré 2009-10-21
Inactive : CIB enlevée 2008-10-28
Réputée abandonnée - omission de répondre à un avis sur les taxes pour le maintien en état 2008-10-21
Inactive : Approuvée aux fins d'acceptation (AFA) 2008-07-10
Modification reçue - modification volontaire 2008-01-16
Inactive : Dem. de l'examinateur par.30(2) Règles 2007-07-16
Inactive : CIB de MCD 2006-03-12
Inactive : CIB de MCD 2006-03-12
Inactive : CIB de MCD 2006-03-12
Modification reçue - modification volontaire 2004-01-30
Lettre envoyée 2004-01-05
Lettre envoyée 2003-10-30
Requête d'examen reçue 2003-10-09
Exigences pour une requête d'examen - jugée conforme 2003-10-09
Toutes les exigences pour l'examen - jugée conforme 2003-10-09
Inactive : Correspondance - Transfert 2003-09-17
Inactive : Lettre officielle 2003-07-30
Inactive : Transfert individuel 2003-06-10
Modification reçue - modification volontaire 2002-03-12
Lettre envoyée 2001-06-13
Inactive : Transfert individuel 2001-04-27
Inactive : Page couverture publiée 2001-01-11
Inactive : CIB en 1re position 2001-01-09
Lettre envoyée 2001-01-05
Inactive : Notice - Entrée phase nat. - Pas de RE 2001-01-05
Demande reçue - PCT 2001-01-02
Demande publiée (accessible au public) 1999-09-30

Historique d'abandonnement

Date d'abandonnement Raison Date de rétablissement
2008-10-21

Taxes périodiques

Le dernier paiement a été reçu le 2007-09-20

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Historique des taxes

Type de taxes Anniversaire Échéance Date payée
Taxe nationale de base - générale 2000-09-26
TM (demande, 2e anniv.) - générale 02 2000-10-23 2000-09-26
Enregistrement d'un document 2000-09-26
Enregistrement d'un document 2001-04-27
TM (demande, 3e anniv.) - générale 03 2001-10-22 2001-10-19
TM (demande, 4e anniv.) - générale 04 2002-10-21 2002-10-21
Enregistrement d'un document 2003-06-10
Requête d'examen - générale 2003-10-09
TM (demande, 5e anniv.) - générale 05 2003-10-21 2003-10-09
TM (demande, 6e anniv.) - générale 06 2004-10-21 2004-09-16
TM (demande, 7e anniv.) - générale 07 2005-10-21 2005-09-15
TM (demande, 8e anniv.) - générale 08 2006-10-23 2006-08-10
TM (demande, 9e anniv.) - générale 09 2007-10-22 2007-09-20
Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
DIGEO, INC.
Titulaires antérieures au dossier
MICHAEL M. SAIGH
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document. Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(aaaa-mm-jj) 
Nombre de pages   Taille de l'image (Ko) 
Dessin représentatif 2001-01-11 1 14
Description 2000-09-26 36 1 833
Page couverture 2001-01-11 2 71
Abrégé 2000-09-26 1 67
Revendications 2000-09-26 7 292
Dessins 2000-09-26 12 280
Description 2008-01-16 39 1 922
Revendications 2008-01-16 9 314
Dessin représentatif 2008-09-16 1 12
Avis d'entree dans la phase nationale 2001-01-05 1 195
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2001-01-05 1 113
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2001-06-13 1 112
Rappel - requête d'examen 2003-06-25 1 112
Accusé de réception de la requête d'examen 2003-10-30 1 173
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2004-01-05 1 125
Courtoisie - Lettre d'abandon (taxe de maintien en état) 2008-12-16 1 174
PCT 2000-09-26 17 723
Correspondance 2003-07-30 1 16
Taxes 2003-10-09 1 37
Taxes 2001-10-19 1 37
Taxes 2002-10-21 1 39