Access control for interactive learning system
First Claim
1. A method of controlling access to a language learning computer facility, the method comprising:
- permitting a user to interact with the computer facility through a computer node of a network, the user interaction comprising language learning responses submitted to the computer facility through the computer node;
performing a user authentication process to determine if the permitted user interaction is authorized; and
determining whether the permitted user interaction should be continued, if the user is determined not to be authorized;
wherein the user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information extracted from the user'"'"'s language learning responses.
4 Assignments
0 Petitions
Accused Products
Abstract
A technique to control access to computer network resources at a computer facility permits a user to interact with the computer facility through a computer node of a network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, and a user authentication process is performed to determine if the permitted user interaction is authorized. The user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user'"'"'s language learning responses. In this way, user authentication occurs without intruding into the utilization of the computer facility.
-
Citations
38 Claims
-
1. A method of controlling access to a language learning computer facility, the method comprising:
-
permitting a user to interact with the computer facility through a computer node of a network, the user interaction comprising language learning responses submitted to the computer facility through the computer node;
performing a user authentication process to determine if the permitted user interaction is authorized; and
determining whether the permitted user interaction should be continued, if the user is determined not to be authorized;
wherein the user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information extracted from the user'"'"'s language learning responses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 18, 19, 20)
-
-
16. A method of accessing language learning data at a network computer facility, the method comprising:
-
detecting that a user at a node of the network is utilizing a microphone to provide speech input at a computer node of the network;
providing the user with limited access to a predetermined number of language learning data modules at the computer facility;
receiving a selection by the user for additional data modules that are available and are associated with a payment amount for access;
providing the user with access to the selected data modules in response to receipt of the associated payment amount.
-
-
17. A method of selling controlled network access from a local computer to a remote computer, the method comprising:
-
selling an item that is used by a local computer user in responding to a program of spoken language instruction comprising a plurality of data modules, wherein the item is associated with an access permit to allow the user to select a predetermined number of the spoken language instruction data modules;
receiving a user request from the local computer for access to a selection of the predetermined number of data modules of the spoken language instruction program and granting access to the user-selected data modules.
-
-
21. A method of selling a program of spoken language skills instruction modules at a remote computer that is accessed from a local computer, the method comprising:
-
selling a microphone apparatus and permitting the local computer to access a predetermined number of program modules of the spoken language skills instruction at the remote computer, wherein the predetermined number is associated with the sold microphone apparatus;
receiving a user request from the local computer for access to a selection of the predetermined number of data modules of the spoken language instruction program and granting access to the user-selected data modules;
receiving a user request from the local computer for access to additional program modules of the spoken language instruction program, wherein the user request includes a payment authorization for the additional program modules; and
permitting the requesting user to have access to the paid-for additional modules of the spoken language instruction program.
-
-
22. A microphone apparatus for use with a user computer, the microphone apparatus comprising:
-
a microphone transducer that converts speech input to an electrical signal and provides the electrical signal to the user computer over a channel;
a code generator that produces a code output and communicates with the user computer over the channel. - View Dependent Claims (23, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
24. A computer apparatus at a server node of a network, controlling access to a computer facility of the network, the computer apparatus comprising:
-
a network communication interface that permits communication with a user at a client node of the network; and
a Speaker Recognition processor that permits the user to interact with the computer facility through a computer node of the network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, further that the Speaker Recognition processor performs a user authentication process to determine if the permitted user interaction is authorized and determines whether the permitted user interaction should be continued, if the user is determined not to be authorized; and
wherein the user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user'"'"'s language learning responses.
-
Specification