Automated monitoring and control of access to content from a source
First Claim
1. A computer-implemented method for providing user access to a body of content from a source, the computer-implemented method comprising:
- providing user access to a body of content from a source, wherein all of the body of content is initially accessible;
measuring a total of the body of content that has been accessed; and
when the total accessed content meets or exceeds a threshold, automatically restricting user access to the remaining content in the body of content that has not previously been accessed.
1 Assignment
0 Petitions
Accused Products
Abstract
A provider of content may provide access to portions of content from a source, but not the source content in its entirety. In some embodiments, one or more access rules or criteria may be implemented that enable users to access portions of the source content up to an allowed limit or threshold (e.g., number or percentage of pages), after which access is prevented to the remaining content that has not previously been accessed. In other embodiments, one or more access rules or criteria may be implemented that enable users to access portions of content of only a certain type (e.g., index, bibliography, introduction, certain chapters, etc.). Unauthorized portions are suppressed or access to them is denied. The content source may be a textual work, an audio work, or a video work of any form. For example, the content may be in electronic form, such as images of pages of content.
-
Citations
75 Claims
-
1. A computer-implemented method for providing user access to a body of content from a source, the computer-implemented method comprising:
-
providing user access to a body of content from a source, wherein all of the body of content is initially accessible;
measuring a total of the body of content that has been accessed; and
when the total accessed content meets or exceeds a threshold, automatically restricting user access to the remaining content in the body of content that has not previously been accessed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer-implemented method for providing access to content from a source, the method comprising:
-
monitoring access to content from the source;
allowing access to a portion of content from the source being monitored if said portion of content satisfies a criteria; and
automatically embargoing a remaining portion of content from the source from access. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A system for providing access to content from a source, the system comprising:
-
a database for storing access rules that govern what content may be accessed from a source; and
a computing device in communication with said database that is operative to;
monitor access to content from the source;
allow access to a portion of the content from the source being monitored if said portion of content satisfies an access rule stored in the database; and
automatically embargo a remaining portion of content from the source from access. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A computer-accessible medium having instructions encoded thereon that provide access to content from a source, and wherein the instructions, when executed by a computing apparatus, cause the computing apparatus to:
-
detect access to content from the source;
allow access to a portion of the content from the source if said portion of content satisfies a criteria; and
automatically restrict access to a remaining portion of the content from the source when access to the remaining portion is detected. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74, 75)
-
Specification