Electronic bookshelf with multi-user features
First Claim
1. A method for insuring that when a data resource which is located on a web server and is accessible by a plurality of computer users that each have a web browser but is only useable by one computer user at a time has been allocated to a computer user, the data resource will be made available to other computer users under certain conditions, the method comprising:
- first transmitting a temporary identifier to a first computer associated with a first computer user of the plurality of computer users that have the right to access the data resource;
first receiving an initial request for access to the data resource from the first computer associated with the first computer user, said initial request including said temporary identifier;
determining if the data resource is available;
providing, if the data resource is determined to be available, the first computer associated with the first computer user with exclusive access to the data resource for a first predetermined period of time;
second receiving a subsequent request that relates to the data resource from the first computer associated with the first computer user, said subsequent request including said temporary identifier;
second transmitting a reply to said subsequent request if said subsequent request is received within said first predetermined period of time;
releasing the data resource for allocation to any of the plurality of computer users that have the right to access the data resource upon the expiration of said first predetermined period of time if said subsequent request from the first computer associated with the first computer user is the most recent request from the first computer and is not accorded a time that is within a second predetermined period of time, wherein said second predetermined period of time is within said first predetermined period of time and less than said first predetermined period of time; and
renewing, if said subsequent request from the first computer associated with the first computer user is the most recent request from the first computer and is accorded a time that is within said second predetermined period of time, exclusive access of the first computer user to the data resource.
13 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to electronic books that are accessed over a computer network, such as the Internet. One embodiment of the invention relates to a shared electronic book, i.e. a book in which multiple users each have the right to access the book but only one of the users is allowed to actually access the book at a given point in time. Another embodiment of the invention relates to the detection of potentially fraudulent access of an electronic book. Yet a further embodiment of the invention is concerned with preventing electronic copying of an electronic book when the book is provided to users over an intranet that is not under the direct control of the provider of the electronic book.
110 Citations
17 Claims
-
1. A method for insuring that when a data resource which is located on a web server and is accessible by a plurality of computer users that each have a web browser but is only useable by one computer user at a time has been allocated to a computer user, the data resource will be made available to other computer users under certain conditions, the method comprising:
-
first transmitting a temporary identifier to a first computer associated with a first computer user of the plurality of computer users that have the right to access the data resource;
first receiving an initial request for access to the data resource from the first computer associated with the first computer user, said initial request including said temporary identifier;
determining if the data resource is available;
providing, if the data resource is determined to be available, the first computer associated with the first computer user with exclusive access to the data resource for a first predetermined period of time;
second receiving a subsequent request that relates to the data resource from the first computer associated with the first computer user, said subsequent request including said temporary identifier;
second transmitting a reply to said subsequent request if said subsequent request is received within said first predetermined period of time;
releasing the data resource for allocation to any of the plurality of computer users that have the right to access the data resource upon the expiration of said first predetermined period of time if said subsequent request from the first computer associated with the first computer user is the most recent request from the first computer and is not accorded a time that is within a second predetermined period of time, wherein said second predetermined period of time is within said first predetermined period of time and less than said first predetermined period of time; and
renewing, if said subsequent request from the first computer associated with the first computer user is the most recent request from the first computer and is accorded a time that is within said second predetermined period of time, exclusive access of the first computer user to the data resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
said second predetermined period of time starts after the start of said first predetermined period of time and ends when first predetermined period of time ends.
-
-
3. A method, as claimed in claim 1, wherein:
said step of renewing includes renewing the exclusive access of the first computer user to the data resource for a third predetermined period of time if said subsequent request is accorded a time that is within said second predetermined period of time.
-
4. A method, as claimed in claim 1, wherein:
-
said step of renewing includes renewing the exclusive access of the first computer user to the data resource for one or more further predetermined periods of time if a required number of further subsequent requests are accorded times that are within a predetermined extent of one of said further predetermined periods of time; and
releasing the data resource for allocation to any of the plurality of users upon the expiration of one of said further predetermined periods of time if said required number of said further subsequent requests are not accorded times that are within said predetermined extent of said one of said further predetermined periods of time.
-
-
5. A method, as claimed in claim 4, wherein:
said further predetermined periods of time decrease in length as the number of renewals increases.
-
6. A method, as claimed in claim 4, wherein:
the number of said further subsequent requests that must occur within said predetermined extent of said one of said further predetermined periods of time to obtain a renewal increases as the number of renewals increases.
-
7. A method, as claimed in claim 1, wherein:
said step of renewing includes renewing the exclusive access of the first computer user to the data resource for a third predetermined period of time unless a second computer user with a higher priority than said first computer user has been denied access to the data resource during said first predetermined period of time.
-
8. A method, as claimed in claim 1, wherein:
said step of renewing includes renewing the exclusive access of the first computer user to the data resource for a third predetermined period of time unless a predetermined number of other computer users have been denied access to the data resource during said first predetermined period of time.
-
9. A method, as claimed in claim 1, wherein:
-
said second predetermined period of time starts after the start of said first predetermined period of time; and
said step of renewing includes renewing the exclusive access of the first computer user to the data resource for a third predetermined period of time if said subsequent request is accorded a time that is within said second predetermined period of time.
-
-
10. A method, as claimed in claim 1, wherein:
-
said second predetermined period of time starts after the start of said first predetermined period of time and ends when said first predetermined period of time ends; and
said step of second transmitting includes renewing the exclusive access of the first computer user to the data resource for a third predetermined period of time if said subsequent request is accorded a time that is within said second predetermined period of time.
-
-
11. In a system that includes a web server with a data resource, a plurality of user computers that are each associated with users which are authorized to access the data resource and each have a web browser, and an Internet/intranet for communicating information between the web server and the plurality of user computers, a method related to insuring that when the data resource is allocated to one user, the data resource will be made available to other users under certain conditions, the method comprising:
-
first receiving, at the first user computer, a temporary identifier from the web server;
first transmitting, from the first user computer and using a web browser, an initial request for access to the data resource from the first user computer to the web server;
wherein said initial request includes said temporary identifier;
second receiving, at the first user computer and in response to said initial request, exclusive access to the data resource for a first predetermined period of time;
second transmitting, from the first user computer and using the web browser, a subsequent request to the initial request that relates to the data resource from the first user computer to the web server;
wherein said subsequent request includes said temporary identifier;
third receiving, at the first user computer, a reply to said subsequent request if said subsequent request is submitted within said first predetermined period of time;
fourth receiving, at the first user computer, an indication that the data resource has been released for allocation to any of the plurality of user computers if said subsequent request is the most recent request and is not accorded a time that is within a second predetermined period of time, wherein said second predetermined period of time is within said first predetermined period of time and less than said first predetermined period of time; and
fifth receiving, if said subsequent request is the most recent request and is accorded a time that is within said second predetermined period of time, a reply to a further request relating to the data resource that is based upon a renewal of the exclusive access of the first user computer to the data resource. - View Dependent Claims (12)
said renewal of the exclusive access of the first user computer to the data resource is for a third predetermined period of time.
-
-
13. A method for use in insuring that when a data resource that is located on a web server, accessible by a plurality of user computers that each have a web browser, but can only be allocated to one of the plurality of user computers at a time is allocated to a first user computer, the data resource will be made available to other user computers under certain conditions, the method comprising:
-
providing an Internet/intranet for conducting communications between a web server and the plurality of user computers;
wherein said Internet/intranet has a server communication port for communicating with the web server;
wherein said Internet/intranet has a user communication port for communicating with the plurality of user computers;
providing, using said user communication port, a temporary identifier to a first user computer;
first receiving, at said user communication port, an initial request for access to the data resource from the first user computer, said initial request including said temporary identifier;
first transmitting, using said server communication port, said initial request to the web server;
second receiving, at said server communication port and in response to said initial request, an indication that the first user computer has exclusive access to the data resource for a first predetermined period of time;
second transmitting, using said user communication port, said indication to said first user computer;
third receiving, at said user communication port, a subsequent request from the first user computer relating to the data resource, said subsequent request includes said temporary identifier;
third transmitting, using the server communication port, said subsequent request to the web server;
fourth receiving, at said server communication port, a reply to said subsequent request if said subsequent request is accorded a time that is within said first predetermined period of time;
fourth transmitting, using said user communication port, said reply to said first user computer;
fifth receiving, at said server communication port, an indication that the data resource was released for allocation to any of the plurality of computer users upon expiration of said first predetermined period of time, said indication resulting because said subsequent request was the most recent request and was not accorded a time that was within a second predetermined period of time, wherein said second predetermined period of time is within said first predetermined period of time and less than said first predetermined period of time;
fifth transmitting, using said user communication port, said indication to the first user computer sixth receiving, if said subsequent request is the most recent request and is accorded a time that is within said second predetermined period of time, a reply to a further request relating to the data resource that is based upon a renewal of the exclusive access of the first user computer to the data resource. - View Dependent Claims (14)
said step of sixth receiving occurs during a third predetermined period of time that is continuous with said first predetermined period of time and during which no other user computer is allowed to access the data resource.
-
-
15. A method for detecting when an individual'"'"'s authorization to access a data resource, which is being provided by a web server, is being used by a first individual at a first computer and a second individual at a second computer, with at least one of the first and second individuals not being authorized to access the data resource, the method comprising:
-
first receiving, at the web server, a first initial request for access to the data resource that is made by the first individual using the first computer and includes the individual'"'"'s authorization to access the data resource;
first transmitting, from the web server, a first temporary identifier to the first computer associated with the first individual, said first temporary identifier for use by said first computer in subsequent communications with the web server;
second receiving, at the web server, a second initial request for access to the data resource that is made by the second individual using the second computer and also includes the individual'"'"'s authorization to access the data resource;
second transmitting, from the web server, a second temporary identifier to the second computer associated with the second individual, said second temporary identifier for use by the second computer in subsequent communications with the web server;
identifying, in said subsequent communications from the first and second computers that include said first and second temporary identifiers, a pattern in times associated with the first and second temporary identifiers that is indicative of at least one of the first and second individuals not being authorized to access the data resource;
wherein said step of identifying includes defining a first period of time that extends between first and second times that are associated with two consecutive occurrences of said first temporary identifier, defining a third time that is associated with an occurrence of said second temporary identifier, first determining, when said third time occurs between said first and second times, an overlap time period that extends from said third time to said second time, second determining if said overlap time period is less than a predetermined period of time and thereby indicative of an unauthorized access of the data resource, or if said overlap time period is equal to or greater than said predetermined period of time and thereby indicative of an acceptable and possible simultaneous access of the data resource. - View Dependent Claims (16)
said step of determining includes determining if at least a portion of second period of time does not overlap said first period of time.
-
-
17. A method for detecting when an individual'"'"'s authorization to access a data resource, which is being provided by a web server, is being used by a first individual at a first computer and a second individual at a second computer, with at least one of the first and second individuals not being authorized to access the data resource, the method comprising:
-
first receiving, at the web server, a first initial request for access to the data resource that is made by the first individual using the first computer and includes the individual'"'"'s authorization to access the data resource;
first transmitting, from the web server, a first temporary identifier to the first computer associated with the first individual, said first temporary identifier for use by said first computer in subsequent communications with the web server;
second receiving, at the web server, a second initial request for access to the data resource that is made by the second individual using the second computer and also includes the individual'"'"'s authorization to access the data resource;
second transmitting from the web server, a second temporary identifier to the second computer associated with the second individual, said second temporary identifier for use by the second computer in subsequent communications with the web server;
identifying, in said subsequent communications from the first and second computers that include said first and second temporary identifiers, a pattern in times associated with the first and second temporary identifiers that is indicative of at least one of the first and second individuals not being authorized to access the data resource;
wherein said step of identifying comprises first defining a first period of time based upon the times associated with two occurrences of said first temporary identifier, second defining a second period of time based upon the times associated with two of said second temporary identifier, and determining if said second period of time overlaps with said first period of time, wherein said overlap extends for a period of time that is less than a predetermined period of time;
providing said web server with positional information on the first and second computers; and
using said positional information to determine a travel time for an individual to move between the locations of the first and second computers; and
employing said travel time to establish said predetermined period of time.
-
Specification