US20040088333A1 - Apparatus method and system for tracking information access - Google Patents

Apparatus method and system for tracking information access Download PDF

Info

Publication number
US20040088333A1
US20040088333A1 US10/470,352 US47035203A US2004088333A1 US 20040088333 A1 US20040088333 A1 US 20040088333A1 US 47035203 A US47035203 A US 47035203A US 2004088333 A1 US2004088333 A1 US 2004088333A1
Authority
US
United States
Prior art keywords
information
upuni
entity
access
validation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/470,352
Inventor
David Sidman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Content Directions Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=32176836&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20040088333(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Individual filed Critical Individual
Priority to US10/470,352 priority Critical patent/US20040088333A1/en
Priority claimed from PCT/US2002/002476 external-priority patent/WO2002059724A2/en
Assigned to CONTENT DIRECTIONS, INC. reassignment CONTENT DIRECTIONS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SIDMAN, DAVID
Publication of US20040088333A1 publication Critical patent/US20040088333A1/en
Priority to US12/760,357 priority patent/US8156151B2/en
Priority to US13/935,709 priority patent/US20150039442A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • 60/279,792 for “Apparatus, Method and System For Directory Quality Assurance” filed on Mar. 29, 2001 (attorney docket number 4188-4004); (5) Ser. No. 60/303,768 for “Apparatus, Method, and System for Accessing Digital Rights Management Information” filed on Jul. 10, 2001 (attorney docket number 4188-4005); (6) Ser. No. 60/328,275 for “Apparatus, Method and System For Accessing Digital Rights Management Information” filed on Oct. 9, 2001 (attorney docket number 4188-4005US1); (7) Ser. No. 60/267,875 for “Apparatus, Method, and System for Accessing Information” filed on Feb.
  • the present invention relates generally to an apparatus, method and system to track information access across a communications network. More particularly, the disclosed invention relates to an apparatus, method and system to facilitate the association of people, content, and digital rights to streamline the tracking of users accessing information.
  • Networks are commonly thought to consist of the interconnection and interoperation of clients, peers, servers, and intermediary nodes in a graph topology.
  • server refers generally to a computer, other device, software, or combination thereof that processes and responds to the requests of remote users across a communications network. Servers serve their information to requesting “clients.”
  • clients A computer, other device, software, or combination thereof that facilitates, processes information and requests, and/or furthers the passage of information from a source user to a destination user is commonly referred to as a “node.”
  • Networks are generally thought to facilitate the transfer of information from source points to destinations.
  • TCP/IP Transmission Control Protocol-Internet Protocol
  • TCP/IP Transmission Control Protocol-Internet Protocol
  • DoD Department of Defense
  • TCP/IP was developed by a Department of Defense (DoD) research project to interconnect networks made by various and varying network vendors as a foundation for a network of networks, i.e., the Internet.
  • DoD Department of Defense
  • the development of TCP/IP was in part driven by a requirement by the DoD to have a network that will continue to operate even if damaged during battle, thus allowing for information to be routed around damaged portions of the communications network to destination addresses. Of course, if the source or destination address location itself is rendered inoperable, such delivery will not be possible.
  • the Internet is a packet-switched network and thus, information on the Internet is broken up into pieces, called packets, and transmitted in packet form.
  • the packets contain IP addressing information called headers, which are used by routers to facilitate the delivery of the packets from a source to a destination across intermediary nodes on the Internet. Upon arrival at the destination, the packets are reassembled to form the original message, and any missing packets are requested again.
  • IP component of the protocol is responsible for routing packets of information based on a four byte addressing mechanism; the address is written as four numbers separated by dots, each number ranging from 0 to 255, e.g., “123.255.0.123”. IP addresses are assigned by Internet authorities and registration agencies, and are unique.
  • the TCP portion of the protocol is used for verifying that packets of information are correctly received by the destination computer from the source, and if not, to retransmit corrupt packets.
  • Other transmission control protocols are also commonly used that do not guarantee delivery, such as User Datagram Protocol (UDP).
  • UDP User Datagram Protocol
  • the web is the manifestation and result of a synergetic interoperation between user interfaces (e.g., web browsers), servers, distributed information, protocols, and specifications.
  • Web browsers were designed to facilitate navigation and access to information
  • information servers were designed to facilitate provision of information.
  • web browsers and information servers are disposed in communication with one another through a communications network.
  • Information. Servers function to serve information to users that typically access the information by way of web browsers.
  • information servers typically provide information to users employing web browsers for navigating and accessing information on the web.
  • Microsoft's Internet Explorer and Netscape Navigator are examples of web browsers.
  • navigation user interface devices such as WebTV have also been implemented to facilitate web navigation.
  • Microsoft's Information Server and Apache are examples of information servers.
  • URLs are an address that is typically embodied as a hyperlink in a web page or is typed into a web browser.
  • URLs for a given resource refer only to a location for that resource.
  • the reference to the location is achieved through the use of an unresolved IP address in conjunction with a directory path and file name; e.g., “http://www.aWebSite.com/aFolder/aFile.html”.
  • the URL directs the browser to connect to the computer named “www” in the domain “aWebSite.com,” and to request the file named “aFile.html” stored in directory “aFolder” at that computer.
  • the Corporation for National Research Initiatives has created and implemented a new means of naming and locating information, called the Handle System.
  • the Handle System is designed to improve upon the current use of URLs.
  • the Handle System introduces a level of indirection to locating and distributing information over the Internet.
  • the Handle System is a general-purpose system for naming resources. Instead of being assigned a URL based on a particular resource's current network location, a resource may be assigned a Universal Name Identifier.
  • a UNI is a form of Universal Resource Identifier (URI).
  • URIs include both UNIs and URLs.
  • a UNI unlike a URL, serves and shall be regarded henceforth as a name for the resource that is persistent regardless of changes in the resource's location or other attributes.
  • URN Universal Resource Name
  • URN Universal Resource Name
  • a Handle is a type of URN.
  • a Digital Object Identifier (DOI) is a type of Handle.
  • various forms of UNIs include Handles, URNs, DOIs, and/or the like. The various terms and/or forms of UNIs will be used interchangeably throughout this document, and may be assumed to be interchangeable unless stated otherwise.
  • a Handle is a unique name, which is registered with the Handle System along with the current network location of the named resource. This location information commonly takes the form of a URL.
  • One common type of Handle is known as a Digital Object Identifier (DOI). Handles may be then distributed to users in lieu of a URL, and superficially appear to function similarly to a hyperlink.
  • DOI Digital Object Identifier
  • Handle When a user encounters a Handle, the user may select or enter the Handle much like a URL hyperlink, so long as the user's web browser is capable of making Handle requests. Such an encounter triggers an automated process to look up a resource's current location.
  • the current location of the resource is associated with the resource's Handle in a directory made available by the Handle System, which in turn directs the user to the resource's current location.
  • the Handle System directory entry can be updated, thereby assuring a persistent association between a Handle and the resource it identifies.
  • An analogy can be made to the physical world: knowing only a URL for a given resource is akin to knowing only a person's street address, and not her name.
  • the Handle System allows resources to be permanently named by way of a Handle, and it allows the current network location of resources to be looked up based on that name in a Handle System directory.
  • DRM Digital Rights Management
  • Digital Rights Management involves the description, layering, analysis, valuation, trading, and monitoring of an owner's property rights to an asset.
  • DRM covers the management of the digital rights to the physical manifestation of a work (e.g., a textbook) or the digital manifestation of a work (e.g., a web page).
  • DRM also covers the management of an asset whether the asset has a tangible or an intangible value.
  • Current DRM systems include languages for describing the terms and conditions for use of an asset, tracking asset usage by enforcing controlled environments or encoded asset manifestations, and closed architectures for the overall management of the digital rights.
  • Current DRM systems rely upon location-based identifiers such as the URL.
  • DOIs Digital Object Identifiers
  • IP addresses and other location-based addressing schemes.
  • DOIs enable access to information over a communications network by providing a persistent identifier for information that may be regularly relocated.
  • DOIs overcome the limitations of network addressing schemes limited to addressing locations by providing a mechanism to associate identifiers with information through an added level of indirection instead of associating identifiers with locations
  • DOIs provide a mechanism that allows for the association of an identifier with information instead of a location
  • DOIs in and of themselves do not provide for the access of multiple and/or varying instances of a piece of information in various locations, formats, or the access and/or tracking of various services associated with a given piece of information, based on various contexts of use.
  • a method for using at least one computer to effect access to information.
  • the method comprises: collecting information regarding an entity (entity information); generating an unique, persistent, and universal name identifier (UPUNI); storing the collected entity information in a database record in a database; generating validation information; transmitting validation information to access devices of the entity, which is represented by the entity information, (EREI; i.e. Entity Represented by Entity Information); transmitting validation information to the UPUNI registration agency; storing the generated validation information in a database record in a database; and registering a resolvable association between an UPUNI and reference to related information.
  • entity information entity information
  • UPUNI universal name identifier
  • a method for using at least one computer to effect access to information.
  • the method comprises: determining if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information; determining if the desired information is inaccessible; determining if there exists an UPUNI that represents the entity (E-UPUNI); generating the E-UPUNI, if the entity is un-represented by an UPUNI; resolving the entity device to the desired information's UPUNI (DI-UPUNI); providing entity verification information; verifying the entity's identity and access rights to the desired content with the provided entity verification information (entity verification); and providing access credentials, if the entity's identity and access rights to the desired content are verified.
  • E-UPUNI UPUNI
  • a memory storing a data structure has associated data types, including: a data type to store an unique, persistent, and universal name identifier (UPUNI) associated with information an entity desires (desired information) to access (DI-UPUNI); and a data type to store an UPUNI associated with an entity (E-UPUNI).
  • UPUNI unique, persistent, and universal name identifier
  • FIG. 1 illustrates one example embodiment incorporated into a DOI Access Tracker (DOIAT) controller
  • FIGS. 2 and 3 illustrate URL addressing across a communications network with moving information
  • FIG. 4 illustrates accessing of information through DOIs
  • FIGS. 5 and 6 provide an overview of a Handle
  • FIGS. 7 and 8 provide an overview of the resolution mechanism for allowing users to access desired information
  • FIG. 9 provides an overview of an exemplary sequence of actions that a user performs to access information using DOIs
  • FIG. 10 provides a more complete overview of an exemplary sequence of actions that users perform to access content information
  • FIG. 11 illustrates an exemplary mechanism for accessing information over a communications network
  • FIG. 12 provides an overview of another embodiment of exemplary mechanisms for retrieving information over a communications network
  • FIG. 13 provides an overview of an exemplary DOI system
  • FIG. 14 depicts a data flow diagram for a personal DOI registration system for tracking information access
  • FIG. 15 depicts a logic flow diagram for a personal DOI registration system for tracking information access
  • FIG. 16 depicts a public key infrastructure authentication for content access system for tracking information access
  • FIG. 17 depicts a logic flow diagram for a public key infrastructure for content access for information tracking.
  • FIG. 1 illustrates one non-limiting example embodiment incorporated into a Digital Object Identifier Access Tracker (DOIAT) controller 101 .
  • DOIAT controller 101 may serve to register, resolve, process, store, update, and validate Handles and any associated information, and/or the like.
  • the DOIAT controller 101 may be connected to and/or communicate with entities such as, but not limited to: one or more users from user input devices 111 ; peripheral devices 112 ; and/or a communications network 113 .
  • the DOIAT controller may even be connected to and/or communicate with a cryptographic processor device 128 .
  • a typical DOIAT controller 101 may be based on common computer systems that may comprise, but are not limited to, components such as: a computer systemization 102 connected to memory 129 .
  • a computer systemization 102 may comprise a clock 130 , central processing unit (CPU) 103 , a read only memory (ROM), a random access memory (RAM), and/or an interface bus 107 , and conventionally, although not necessarily, are all interconnected and/or communicating through a system bus 104 .
  • the system clock typically has a crystal oscillator and provides a base signal.
  • the clock is typically coupled to the system bus and various means that will increase or decrease the base operating frequency for other components interconnected in the computer systemization.
  • the clock and various components in a computer systemization drive signals embodying information throughout the system. Such transmission and reception of signals embodying information throughout a computer systemization may be commonly referred to as communications.
  • communicative signals may further be transmitted, received, and the cause of return and/or reply signal communications beyond the instant computer systemization to: communications networks, input devices, other computer systemizations, peripheral devices, and/or the like.
  • a cryptographic processor 126 may similarly be connected to the system bus.
  • any of the above components may be connected directly to one another, connected to the CPU, and/or organized in numerous variations employed as exemplified by various computer systems.
  • the CPU comprises at least one high-speed data processor adequate to execute program modules for executing user and/or system-generated requests.
  • the CPU may be a microprocessor such as the Intel Pentium Processor and/or the like.
  • the CPU interacts with memory through signal passing through conductive conduits to execute stored program code according to conventional data processing techniques. Such signal passing facilitates communication within the DOIAT controller and beyond through various interfaces.
  • Interface bus(ses) 107 may accept, connect, and/or communicate to a number of interface adapters, conventionally although not necessarily in the form of adapter cards, such as but not limited to: input output interfaces (I/O) 108 , storage interfaces 109 , network interfaces 110 , and/or the like.
  • cryptographic processor interfaces 127 similarly may be connected to the interface bus.
  • the interface bus provides for the communications of interface adapters with one another as well as with other components of the computer systemization.
  • Interface adapters are adapted for a compatible interface bus.
  • Interface adapters conventionally connect to the interface bus via a slot architecture.
  • Conventional slot architectures may be employed, such as, but not limited to: Accelerated Graphics Port (AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (PCI), Personal Computer Memory Card International Association (PCMCIA), and/or the like.
  • AGP Accelerated Graphics Port
  • E Extended) Industry Standard Architecture
  • MCA Micro Channel Architecture
  • PCI Peripheral Component Interconnect
  • PCMCIA Personal Computer Memory Card International Association
  • Storage interfaces 109 may accept, communicate, and/or connect to a number of storage devices such as, but not limited to: storage devices 114 , removable disc devices, and/or the like.
  • Storage interfaces may employ connection protocols such as, but not limited to: (Ultra) Advanced Technology Attachment (Packet Interface) ((Ultra) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, fiber channel, Small Computer Systems Interface (SCSI), Universal Serial Bus (USB), and/or the like.
  • connection protocols such as, but not limited to: (Ultra) Advanced Technology Attachment (Packet Interface) ((Ultra) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, fiber channel, Small Computer Systems Interface (SCSI), Universal Serial Bus (USB), and/or the like.
  • Network interfaces 110 may accept, communicate, and/or connect to a communications network 113 .
  • Network interfaces may employ connection protocols such as, but not limited to: direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), Token Ring, wireless connection such as IEEE 802.11b, and/or the like.
  • a communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g., employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like.
  • a network interface may be regarded as a specialized form of an input output interface.
  • I/O 108 may accept, communicate, and/or connect to user input devices 111 , peripheral devices 112 , cryptographic processor devices 128 , and/or the like.
  • I/O may employ connection protocols such as, but not limited to: Apple Desktop Bus (ADB); Apple Desktop Connector (ADC); audio: analog, digital, monaural, RCA, stereo, and/or the like; IEEE 1394; infrared; joystick; keyboard; midi; optical; PC AT; PS/2; parallel; radio; serial; USB; video interface: BNC, composite, digital, RCA, S-Video, VGA, and/or the like; wireless; and/or the like.
  • ADB Apple Desktop Bus
  • ADC Apple Desktop Connector
  • audio analog, digital, monaural, RCA, stereo, and/or the like
  • IEEE 1394 infrared
  • joystick keyboard
  • midi optical
  • PC AT PC AT
  • PS/2 parallel
  • radio serial
  • USB USB
  • video interface BNC, composite, digital, RCA, S-Video,
  • a common output device is a video display, which typically comprises a CRT or LCD based monitor with an interface (e.g., VGA circuitry and cable) that accepts signals from a video interface.
  • the video interface composites information generated by a computer systemization and generates video signals based on the composited information.
  • the video interface provides the composited video information through a video connection interface that accepts a video display interface (e.g., a VGA connector accepting a VGA display cable).
  • User input devices 111 may be card readers, dongles, finger print readers, gloves, graphics pads, joysticks, keyboards, mouse (mice), trackballs, trackpads, retina readers, and/or the like.
  • Peripheral devices 112 may be connected and/or communicate with or to I/O and/or with or to other facilities of the like such as network interfaces, storage interfaces, and/or the like). Peripheral devices may be cameras, dongles (for copy protection, ensuring secure transactions as a digital signature, and/or the like), external processors (for added functionality), goggles, microphones, monitors, network interfaces, printers, scanners, storage devices, visors, and/or the like.
  • Cryptographic units such as, but not limited to, microcontrollers, processors 126 , interfaces 127 , and/or devices 128 may be attached, and/or communicate with the DOIAT controller.
  • a MC68HC16 microcontroller commonly manufactured by Motorola Inc., may be used for and/or within cryptographic units. Equivalent microcontrollers and/or processors may also be used.
  • the MC68HC16 microcontroller utilizes a 16-bit multiply-and-accumulate instruction in the 16 MHz configuration and requires less than one second to perform a 512-bit RSA private key operation.
  • Cryptographic units support the authentication of communications from interacting agents, as well as allowing for anonymous transactions.
  • Cryptographic units may also be configured as part of CPU.
  • Other commercially available specialized cryptographic processors include VLSI Technology's 33 MHz 6868 or Semaphore Communications' 40 MHz Roadrunner 284.
  • a storage device 114 may be any conventional computer system storage. Storage devices may be a fixed hard disk drive, and/or other devices of the like. However, it is to be understood that a DOIAT controller and/or a computer systemization may employ various forms of memory 129 .
  • a computer systemization may be configured wherein the functionality of on-chip CPU memory (e.g., registers), RAM, ROM, and any other storage devices are provided by a paper punch tape or paper punch card mechanism; of course such an embodiment is not preferred and would result in an extremely slow rate of operation.
  • memory 129 will include ROM, RAM, and a storage device 114 .
  • any mechanization and/or embodiment allowing a processor to affect the storage and/or retrieval of information is regarded as memory 129 .
  • a computer systemization generally requires and makes use of memory.
  • memory is a fungible technology and resource, thus, any number of memory embodiments may be employed in lieu of or in concert with one another.
  • the storage devices 114 may contain a collection of program and/or database modules and/or data such as, but not limited to: an operating system module 115 (operating system); an information server module 116 (information server); a user interface module 117 (user interface); a web browser module 118 (web browser); databases 119 ; a cryptographic server module 120 (cryptographic server); DOI Access Tracker (DOIAT) module 125 ; and/or the like (i.e., collectively a module collection). These modules may be stored and accessed from the storage devices and/or from storage devices accessible through an interface bus.
  • non-conventional software modules such as those in the module collection, typically and preferably, are stored in a local storage device 114 , they may also be loaded and/or stored in memory such as: peripheral devices, RAM, remote storage facilities through a communications network, ROM, various forms of memory, and/or the like.
  • the operating system module 115 is executable program code facilitating the operation of a DOIAT controller.
  • the operating system facilitates access of I/O, network interfaces, peripheral devices, storage devices, and/or the like.
  • the operating system preferably is a conventional product such as Apple Macintosh OS X Server, AT&T Plan 9 , Microsoft Windows NT Server, Unix, and/or the like operating systems.
  • the operating system is highly fault tolerant, scalable, and secure.
  • An operating system may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Conventionally, the operating system communicates with other program modules, user interfaces, and/or the like.
  • the operating system may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • the operating system once executed by the CPU, may enable the interaction with communications networks, data, I/O, peripheral devices, program modules, memory, user input devices, and/or the like.
  • the operating system provides communications protocols that allow the DOIAT controller to communicate with other entities through a communications network 113 .
  • Various communication protocols may be used by the DOIAT controller as a subcarrier transport mechanism for interacting with the Handle System, such as, but not limited to: multicast, TCP/IP, UDP, unicast, and/or the like.
  • An information server module 116 is stored program code that is executed by the CPU.
  • the information server may be a conventional Internet information server such as, but not limited to, Microsoft's Internet Information Server and/or the Apache Software Foundation's Apache.
  • the information server allows for the execution of program modules through facilities such as C++, Java, JavaScript, ActiveX, Common Gateway Interface (CGI) scripts, Active Server Page (ASP), and/or the like.
  • the information server supports secure communications protocols such as, but not limited to, File Transfer Protocol (FTP); HyperText Transfer Protocol (HTTP); Secure Hypertext Transfer Protocol (HTTPS), Secure Socket Layer (SSL), and/or the like.
  • an information server provides results in the form of web pages to web browsers, and allows for the manipulated generation of the web pages through interaction with other program modules.
  • the information server resolves requests for information at specified locations on a DOIAT controller based on the remainder of the HTTP request.
  • a request such as http://123.124.125.126/myInformation.html might have the IP portion of the request “123.124.125.126” resolved by a DNS server to an information server at that IP address; that information server might in turn further parse the http request for the “/myInformation.html” portion of the request and resolve it to a location in memory containing the information “myInformation.html.”
  • An information server may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the information server communicates with operating systems, other program modules, user interfaces, web browsers, and/or the like.
  • An information server may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • a user interface module 117 is stored program code that is executed by the CPU.
  • the user interface is a conventional graphic user interface as provided by, with, and/or atop operating systems and/or operating environments such as Apple Macintosh OS, e.g., Aqua, Microsoft Windows (NT), Unix X Windows (KDE, Gnome, and/or the like), and/or the like.
  • the user interface may allow for the display, execution, interaction, manipulation, and/or operation of program modules and/or system facilities through textual and/or graphical facilities.
  • the user interface provides a facility through which users may affect, interact, and/or operate a computer system.
  • a user interface may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the user interface communicates with operating systems, other program modules, and/or the like.
  • the user interface may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • a web browser module 118 is stored program code that is executed by the CPU.
  • the web browser is a conventional hypertext viewing application such as Microsoft Internet Explorer or Netscape Navigator (preferably with 128 bit encryption by way of HTTPS, SSL, and/or the like).
  • Some web browsers allow for the execution of program modules through facilities such as Java, JavaScript, ActiveX, and/or the like.
  • web browsers are handle-enabled by way of a browser plug-in software such as the Handle System plug-in available from www.cnri.org.
  • handle support is integrated into the web browser.
  • Web browsers and like information access tools may be integrated into PDAs, cellular telephones, and/or other mobile devices.
  • a DOIAT database module 119 may be embodied in a database that is stored program code that is executed by the CPU and its stored data; the stored program code portion configuring the CPU to process the stored data.
  • the database is a conventional, fault tolerant, relational, scalable, secure database such as Oracle or Sybase.
  • Relational databases are an extension of a flat file. Relational databases consist of a series of related tables. The tables are interconnected via a key field. Use of the key field allows the combination of the tables by indexing against the key field; i.e., the key fields act as dimensional pivot points for combining information from various tables. Relationships generally identify links maintained between tables by matching primary keys. Primary keys represent fields that uniquely identify the rows of a table in a relational database. More precisely, they uniquely identify rows of a table on the “one” side of a one-to-many relationship.
  • the DOIAT database may be implemented using various standard data-structures, such as an array, hash, (linked) list, struct, table, and/or the like. Such data-structures may be stored in memory and/or in (structured) files. If the DOIAT database is implemented as a data-structure, the use of the DOIAT database may be integrated into another module such as the DOIAT module. Databases may be consolidated and/or distributed in countless variations through standard data processing techniques. Portions of databases, e.g., tables, may be exported and/or imported and thus decentralized and/or integrated.
  • the database module 119 includes tables such as but not limited to a UNI (e.g., Handle, DOI and/or other UNIs) table 119 a , URL table 119 b , metadata table 119 c , multiple resolution table 119 d , a personal (DOI information) table 119 e , and/or the like. All the tables may be related by (enhanced) DOI key field entries as they are unique. In an alternative embodiment, these tables have been decentralized into their own databases and their respective database controllers (i.e., individual database controllers for each of the above tables). Of course, employing standard data processing techniques, one may further distribute the databases over several computer systemizations and/or storage devices. Similarly, configurations of the decentralized database controllers may be varied by consolidating and/or distributing the various database modules 119 a - e .
  • the DOIAT may be configured to keep track of user requests and various transactions tracking via database controllers.
  • a DOIAT database may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the DOIAT database communicates with a DOIAT module, other program modules, and/or the like. The database may contain, retain, and provide information regarding other nodes and data.
  • the cryptographic module allows conventional cryptographic techniques such as, but not limited to: digital certificates (e.g., X.509 authentication framework), digital signatures, dual signatures, enveloping, password access protection, public key management, and/or the like.
  • digital certificates e.g., X.509 authentication framework
  • digital signatures e.g., digital signatures
  • dual signatures enveloping
  • password access protection e.g., password access protection
  • public key management e.g., password management, and/or the like.
  • the cryptographic module will facilitate numerous (encryption and/or decryption) security protocols such as, but not limited to: checksum, Data Encryption Standard (DES), Elliptical Curve Encryption (ECC), International Data Encryption Algorithm (IDEA), Message Digest 5 (MD5, which is a one way hash function), passwords, RC5 (Rivest Cipher), Rijndael, RSA (which is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman), Secure Hash Algorithm (SHA), Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (HTTPS), and/or the like.
  • DES Data Encryption Standard
  • ECC Elliptical Curve Encryption
  • IDEA International Data Encryption Algorithm
  • MD5 Message Digest 5
  • RC5 Raster Cipher
  • Rijndael Rijndael
  • RSA which
  • the cryptographic module facilitates the process of “security authorization” whereby access to a resource is inhibited by a security protocol wherein the cryptographic module effects authorized access to the secured resource.
  • a cryptographic module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like.
  • the cryptographic module supports encryption schemes allowing for the secure transmission of information across a communications network to enable a DOIAT module to engage in secure transactions if so desired by users.
  • the cryptographic module facilitates the secure accessing of resources on DOIAT and facilitates the access of secured resources on remote systems; i.e., it may act as a client and/or server of secured resources.
  • the cryptographic module communicates with information servers, operating systems, other program modules, and/or the like.
  • the cryptographic module may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • IAMRS Information Access Multiple Resolution Server
  • An IAMRS module 125 is stored program code that is executed by the CPU.
  • the DOIAT affects accessing, obtaining and the provision of information, and/or the like between nodes on a communications network.
  • the IAMRS has the ability to resolve UNIs to multiple instantiations.
  • the IAMRS acts as a lookup facility to create, maintain, and update associations between a given piece of information, its DOI, and its current locations.
  • the IAMRS coordinates with the DOIAT database to identify nodes that may be useful for improving data transfer for requested information, for resolving to various formats of the requesting information, providing an enhanced mechanism to create queries regarding the information, and/or the like.
  • An IAMRS enabling access of information between nodes may be developed by employing standard development tools such as, but not limited to: C++, shell scripts, Java, Javascript, SQL commands, web application server extensions, Apache modules, Perl scripts, binary executables, and/or other mapping tools, and/or the like.
  • the IAMRS server employs a cryptographic server to encrypt and decrypt communications.
  • the IAMRS may service requests, update association information for UNIs, and much more.
  • a DOIAT module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the IAMRS module communicates with a DOIAT database, operating systems, other program modules, and/or the like.
  • the IAMRS may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • DOI Access Tracker DOIAT
  • a DOIAT module 135 is stored program code that is executed by the CPU. Generally, the DOIAT registers personal DOIs (FIGS. 14 and 15), tracks/enables access to content (FIGS. 16 and 17), and obtains and provides information between nodes on a communications network, and/or the like.
  • the DOIAT is a DOI enabled client and/or server that enables access, tracking, and verifying users, use, and content across a communications network based on DOIs.
  • the DOIAT may include a rights database 119 e that is keyed to DOIs 119 a . This database and/or data-structure maintains associations between users, digital rights, and content.
  • the DOIAT may add the ability to validate content via an IARS.
  • the DOIAT may operate in a stand alone mode separate from the IARS.
  • the DOIAT may be used to embedd DOI values into content referenced by the DOI so that the content may be validated.
  • the DOIAT coordinates with the DOIAT database to track and/or limit access to content accesssed by users.
  • a DOIAT enabling access of information between nodes maybe be developed by employing standard development tools such as, but not limited to: C++, shell scripts, Java, Javascript, SQL commands, web application server extensions, Apache modules, Perl scripts, binary executables, and/or other mapping tools, and/or the like.
  • the DOIAT employs a cryptographic server to encrypt and decrypt communications.
  • the DOIAT may catalog content, service requests, redirect requests, and much more.
  • a DOIAT module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the DOIAT module communicates internally and with other peers across a communications network with: a DOIAT database, an IAMRS module, operating systems, other program modules, and/or the like.
  • the DOIAT may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • any of the DOIAT node controller components and/or functionalities may be combined, consolidated, and/or distributed in any number of ways to facilitate development and/or deployment.
  • the module collection may be combined in any number of ways to facilitate deployment and/or development. To accomplish this, one must simply integrate the components into a common code base or in a facility that can dynamically load the components on demand in an integrated fashion.
  • the module collection may be consolidated and/or distributed in countless variations through standard data processing and/or development techniques. Multiple instances of any one of the program modules in the program module collection may be instantiated on a single node, and/or across numerous nodes to improve performance through load balancing data processing techniques. Furthermore, single instances may also be distributed across multiple controllers and/or storage devices; e.g., databases.
  • the preferred DOIAT controller configuration will depend on the context of system deployment. Factors such as, but not limited to, the capacity and/or location of the underlying hardware resources may affect deployment requirements and configuration. Regardless of if the configuration results in more consolidated and/or integrated program modules, results in a more distributed series of program modules, and/or results in some combination between a consolidated and/or distributed configuration, communication of data may be communicated, obtained, and/or provided. Instances of modules (from the module collection) consolidated into a common code base from the program module collection may communicate, obtain, and/or provide data. This may be accomplished through standard data processing techniques such as, but not limited to: data referencing (e.g., pointers), internal messaging, object instance variable communication, shared memory space, variable passing, and/or the like (intra-application communication).
  • data referencing e.g., pointers
  • internal messaging e.g., object instance variable communication, shared memory space, variable passing, and/or the like
  • module collection components are discrete, separate, and/or external to one another, then communicating, obtaining, and/or providing data with and/or to other module components may be accomplished through standard data processing techniques such as, but not limited to: Application Program Interfaces (API) information passage; (distributed) Component Object Model ((D)COM), (Distributed) Object Linking And Embedding ((D)OLE), and/or the like), Common Object Request Broker Architecture (CORBA), process pipes, shared files, and/or the like (inter-application communication).
  • API Application Program Interfaces
  • DCOM Component Object Model
  • CORBA Common Object Request Broker Architecture
  • process pipes shared files, and/or the like
  • inter-application communication Messages sent between discrete module components for inter-application communication or within memory spaces of a singular module for intra-application communication may be facilitated through the creation and parsing of a grammar.
  • a grammar may be developed by using standard development tools such as lex, yacc, and/or the like, which allow for grammar generation and parsing functionality, which in turn may form the basis of communication messages within and between modules. Again, the preferable embodiment will depend upon the context of system deployment.
  • IP addresses Users access communications networks through addresses. Addresses represent locations. Users traverse locations in a communications network hoping to find information.
  • a common communications addressing scheme employs the IP address.
  • the IP address may be likened to the real world by analogy to a street address.
  • the IP address itself is a sequence of numbers, e.g., 209.54.94.99, and commonly has an associated name, e.g., www.contentdirections.com.
  • a distributed database registry maintains the associated pairs of names and IP addresses and serves to resolve associated names into corresponding IP addresses. This allows people to remember and use names, e.g., www.report.com, instead of being forced to memorize and use a series of numbers, e.g., 209.54.94.99.
  • DNS Domain Name Servers
  • IP addresses It is common for IP addresses to be embodied as Universal Resource Locators (URLs) that append even more navigation information into an address. Users may employ software to access information stored at URLs through the use of HTTP. An example is when a user specifies “http://www.report.com /reports/1999/IncomeStatement.html” in a web browser. Typically this further navigation information, i.e., “/reports/1999/IncomeStatement.html,” provides a specific storage location within a computer server. This further navigation location may be likened to a real world address more specific than a street address that includes information such as a company name, department, and room number.
  • URLs Universal Resource Locators
  • An Information Server is a means for facilitating communications between a communication network and the computer server at a particular IP address.
  • Commercial examples of an Information Server include Apache.
  • An Information Server may be likened to a mail department for a business that further routes correspondence to appropriate locations within the business.
  • FIGS. 2 and 3 illustrate that IP addressing mechanisms do not maintain an association with information as it moves across a communications networks.
  • Web page links generally employ HTTP, which in turn relies on IP addressing.
  • URL links simply point to a location on a communication network and are not necessarily associated with any specific information. For example, a URL link referencing www.news.com will have different information associated between the URL and the information made available at the www.news.com location as information at the location is updated daily. In many instances, locations themselves may disappear as companies move information, move their operations, go out of business, etc.
  • a report entitled “Company Sales for 1999” 222 existing at a location www.report.com/1999/Report.html 208 may be moved to www.reportarchives.com/1999/Old-report.html 310 , e.g., because the information was sold from one entity to another, archived, or for many other reasons.
  • the report at www.report.com/1999/Report.html 208 may have had 5 million web pages and URL links referencing the location 244 , and when users attempt to access the information they may well receive a “404 File not found” error 309 because that location no longer exists and/or no longer contains the desired information.
  • the error results because the DNSs were designed to always resolve users' requests to a location and because DNSs are not designed to maintain an association between URLs and a specific instantiation of information.
  • FIG. 2 depicts a web page 201 , a user entered address 202 , a document 203 , and a memory device 204 all employing URLs and consequently IP addressing in an attempt to reference a piece of information (the report “Company Sales for 1999”) 222 . Then in FIG. 2, the information 222 is moved from its original location 208 (for example at www.report.com/1999/Report.html) to a new location 310 of FIG. 2 (for example www.report.com/1999/Archives.html).
  • FIG. 2 depicts a web page 201 , a user entered address 202 , a document 203 , and a memory device 204 all employing URLs and consequently IP addressing in an attempt to reference a piece of information (the report “Company Sales for 1999”) 222 . Then in FIG. 2, the information 222 is moved from its original location 208 (for example at www.report.com/1999/Report.html) to a new location 310 of
  • the DOI system needs to be able to resolve what the user of the DOI wants to access.
  • the technology that is used to manage the resolution of DOIs is better known as the “Handle System,” and will be described in more detail below.
  • THE DOI HANDBOOK provides a general overview of basic DOIs. In a nutshell, the Handle System includes an open set of protocols, a namespace, and an implementation of the protocols.
  • the protocols enable a distributed computer system to store Handles (such as DOIs) of digital content and resolve those Handles into the information necessary to locate and access the content, to locate and access information related to the content, or to locate and access (i.e., provide an interface to) services associated with the content.
  • This associated information can be changed as needed to reflect the current state of the identified content without changing the DOI, thus allowing the name of the item to persist over changes of location and other state information.
  • the Handle System provides a general-purpose, distributed global naming service for the reliable management of information and services on networks over long periods of time.
  • source may comprise any identifiable content, source, information, services, transactions, and work of authorship, including articles, books, intangible objects, music albums, people, tangible physical objects, and/or the like further including selected discrete portions and/or combinations thereof.
  • the accessible information may be a URL to an application that initiates a service, a transaction, provides a selection mechanism, and/or the like.
  • the DOI may even be associated with information identifying a human being such as a social security number, telephone number, and/or the like.
  • the DOI may be associated with software modules, programming “objects,” or any other network-based resource.
  • DOI can be used to represent most anything including the online representation of physical products (e.g., items currently identified by UPC or bar codes).
  • DOIs could resolve to the manufacturer's catalog page describing or offering the product, or even, in a multiple-resolution scenario, offer all services related to the object such as where to go to get the item repaired; where to find replacement parts; what the new or replacement product is; what kinds of pricing or leasing options are available, etc.
  • DOIs include: representing different modules of software that may operate in distributed fashion across a communications network; telephone numbers for Voice-over-IP technology; gene sequences; medical records and/or other permanent records (DOIs will be especially useful with permanent records protected via encryption and/or other method that might invoke a certificate or decryption key); and/or the like.
  • Another example embodiment for a DOI is to represent the permanent location of a temporary and/or dynamic value such as, but not limited to a current stock quote; current bid and offer prices (for stocks and/or any other kind of auction and/or exchange); a company's current annual report (versus different DOIs for different prior-year annual reports); and/or the like.
  • DOIs Digital Object Identifiers
  • DOIs are associated with (i.e., are names for) information itself.
  • DOIs are instances of “Handles” and operate within the framework of the “Handle system.”
  • a DOI allows for access to persistently associated information.
  • the DOI is a string of characters followed by a separator further followed by a string of characters, e.g., 10.1065/abc123def.
  • DOIs are names for information, which can be used to look up that information's location and other attributes, as well as related services. It is envisioned that information may be any information as well as any computer-readable files, including e-books, music files, video files, electronic journals, software, smaller portions and/or combinations of any of the aforementioned content as well. It should be noted that since the electronic content will be made available over a communications network, hereinafter this application refers to such available information as being published on a communications network.
  • a DOI is a permanent and persistent identifier given to a piece of information made available on a communications network and registered in an electronic form, so that even if the location (i.e., URL), format, ownership, etc. of the content or associated data changes, users will be able to access the associated data.
  • DOIs, or Handles may be distributed to users in lieu of a URL.
  • a user may access information associated with a particular DOI by selecting or entering the DOI in a Handle-enabled web browser much like a URL hyperlink.
  • Many types of browsers may be enabled by way of browser plug-in software such as the Handle System plug-in available from www.cnri.org.
  • Such an attempt to access DOI associated information triggers an automated process to look up a resource's current location.
  • the current location of the resource is associated with the resource's DOI in a centrally managed directory made available by the Handle System, which in turn directs the user (i.e., the user's web browser) to the resource's current location. This direction is often accomplished by returning a current URL associated with the selected DOI and corresponding information.
  • FIG. 4 illustrates the access of information through DOIs in contrast to FIGS. 2 and 3 above.
  • the information (report of “Company Sales for 1999) 222 is given a DOI through a registration process.
  • users reference 444 the information using the DOI through web pages 401 , typed entry in a web browser 402 , documents 403 , devices 404 , barcodes 406 , and/or the like.
  • users engage the DOI links 444 they are resolved in a centralized DOI directory 411 and the requesting users are given a URL link 244 to the information's 222 initial location (www.report.com/1999/Report.html) 208 .
  • the publisher of the information 410 Upon the information being moved 434 from its initial location (www.report.com/1999/Report.html) 208 to a new location (www.report.com/1999/Archives.html) 310 , the publisher of the information 410 would inform the DOI centralized directory 445 of the new location for the information by sending an updated URL 245 referencing the new location. Thereafter, if users 401 - 404 attempt to access the information through the DOI links 444 , the DOI directory will properly provide the new location 310 by way of the updated URL 245 .
  • DOIs may not only be used to identify information, but also smaller portions thereof.
  • DOI system it is possible for a book to have one DOI, while each of its chapters would have other unique DOIs to identify them; furthermore, each figure in the book may have yet other unique DOIs to identify them.
  • DOI system it is possible to identify information with variable granularity as desired by the content publishers.
  • the present disclosure provides a mechanism for employing DOIs to empower all kinds of agents in the world of electronic publishing to automate the sale of digital content (and the licensing of rights to that content) across the Internet in an efficient manner, since each piece of saleable content would have associated with it a globally unique DOI, which could be used as a product identification code in transactions between agents.
  • the Handle System employs a pre-determined set of policies for efficient and user-friendly utilization thereof, some of which of which are listed below.
  • the use of the Handle System for DOI resolution should ideally be free to users, with the costs of operation of the system possibly borne by the publishers. All DOIs are to be registered with a global DOI registry. Registrants are responsible for the maintenance of state data and metadata relating to DOIs that they have registered.
  • the syntax of the DOI follows a standardized syntax. In use, the DOI will be an opaque string (dumb number). DOI registration agencies will manage the assignment of DOIs, their registration and the declaration of the metadata associated with them.
  • FIGS. 5 and 6 provide a schematic view of a Handle 600 .
  • a Handle 600 has two components, the prefix 501 and the suffix 602 .
  • the prefix 501 and the suffix 502 are separated by a forward slash 507 .
  • the Handle 500 may incorporate any printable characters from almost every major language written or used today.
  • the DOI registration agency will award a unique prefix 501 to a publisher.
  • the registration agency may put the responsibility on these publishers for ensuring that the suffix 502 assigned is unique as well. This may be achieved with a registration tool running on the user's client computer system. In another embodiment, the registration agency will ensure that the suffix 502 is unique by applying various suffix generation algorithms as discussed throughout this disclosure.
  • the Registration Agency and the Handle System administrators will both verify uniqueness of any new Handle before depositing it in the Handle System.
  • the Registration Agency deposits DOI records with the Handle System.
  • the Handle System in turn services DOI resolution requests through a DOI directory.
  • the prefix 501 itself has two components separated by a prefix separator 506 , which is a period.
  • the first part of the Handle prefix is the Handle type 504 .
  • the second part of the Handle prefix is the Handle creator 505 .
  • the Handle type 504 identifies what type of Handle system is being used. When the Handle type 504 starts with a “10” the Handle is distinguished as being a DOI as opposed to any other implementation type of the Handle System.
  • the next element of the prefix, separated by a period, is the Handle creator 505 , which is a number (or string of characters) that is assigned to an organization that wishes to register DOIs.
  • these two elements 504 and 505 form the unique publisher prefix portion of the DOI.
  • a publishing company for example, might have a single DOI prefix 501 , or might have a different one for each of its journals, or one for each of its imprints.
  • a prefix 501 may be a simple numeric string, the scope of the Handle System is not limited thereby.
  • a prefix 501 may also utilize alphabetical characters or any other characters.
  • the suffix 502 is a unique string of alphanumeric characters, which, in conjunction with a particular prefix 501 , uniquely identifies a piece of information. It should be appreciated that the combination of the prefix 501 for a publisher and the unique suffix 502 provided by the publisher avoids the need for the centralized allocation of DOI numbers.
  • the suffix 502 may be any alphanumeric string that the publisher chooses, so long as it is unique among all suffixes registered in conjunction with the publisher's prefix.
  • FIG. 6 provides a view of another embodiment of the DOI 600 , in which a textbook's ISBN number serves as the suffix 602 . Consequently, where it is convenient, the publisher of the underlying content may choose to select as the suffix 602 any other identification code accorded to the original piece of content.
  • FIG. 5 further illustrates an enhanced DOI 510 grammar.
  • an enhancement to the DOI grammar is embodied as an enhanced prefix 511 .
  • the enhanced prefix 511 is comprised of an enhancement grammar target 517 and enhancement separator 514 , which is an “@” symbol, but it is understood any other character may be designated as the enhancement separator.
  • the enhancement grammar target 517 may itself be any string of characters other than the enhancement separator 514 .
  • the enhancement grammar target 517 may be employed for the purpose of having the DOI 500 resolve to multiple versions of a specified information as will be described in greater detail throughout this disclosure.
  • the enhancement grammar target 517 may itself be further comprised of an enhancement grammar verb 512 and enhancement grammar target object 513 separated by an enhancement target separator 516 , e.g., a period.
  • the enhancement target separator 516 may be designated as any character(s).
  • the enhancement grammar verb 512 acts as a modifier to select amongst a plurality of multiple resolution targets for a DOI
  • the enhancement grammar target object 513 is a value passed to the target object and/or a Handle system resolution server for further action.
  • a DOI 500 is merely an identification number that does not necessarily convey any information about its associated information.
  • the present invention provides for the use of metadata, which is descriptive data about the identified information. While metadata may be any data-structure that is associated with a DOI, according to one embodiment, the metadata will be comprised of a few basic fields that can accurately and succinctly identify the published information.
  • the metadata will comprise an identifier associated with the entity from a legacy identifier scheme such as the International Standard Book Number (ISBN) for a book, title of the published content, type of content being published (such as book, music, video, etc.), whether the content is original or a derivation, a primary author of the content, the role of the primary author in creating the content, the name of the publisher, and/or the like.
  • ISBN International Standard Book Number
  • the metadata will comprise an identifier associated with the entity from a legacy identifier scheme such as the International Standard Book Number (ISBN) for a book, title of the published content, type of content being published (such as book, music, video, etc.), whether the content is original or a derivation, a primary author of the content, the role of the primary author in creating the content, the name of the publisher, and/or the like.
  • ISBN International Standard Book Number
  • the DOI system envisions the use of different metadata for different types of content.
  • Metadata will be made available to any user of the DOI system to enable them to find the basic description of the entity that any particular DOI identifies. This basic description will allow the user to understand some basic things about the entity that published the content or the content itself.
  • the metadata allows for the recognition of the information identified by the DOI 500 as well as its unambiguous specification.
  • the metadata will also allow for the interaction between the information and other contents in the network (and with metadata about those entities).
  • FIGS. 7 and 8 provide an overview of the resolution mechanism for allowing users to access the desired information by merely providing the DOI to the DOI Handle system.
  • Resolution in the present context includes the submitting of an identifier to a network service and receiving in return one or more pieces of current information related to the identifier.
  • the user uses her web browser 700 client to point to content identified by a particular DOI 710 .
  • This DOI 710 has only one URL associated with it, and must resolve to that URL.
  • the user is directed to URL 720 , where the desired content lies.
  • this mechanism allows the location of the information to be changed while maintaining the name of the entity as an actionable identifier. If the publisher changes the location of the content, the publisher must merely update the DOI's entry in the Handle System database to ensure that the existing DOI 710 points to the new location of the content. As a result, while the location of the content has changed, the DOI remains the same and users are able to access the content from its new location by using the existing DOI.
  • FIG. 8 provides an overview of a DOI system where users may use a DOI for resolving a request for one piece of content, out of a plurality of available identical copies of the same piece of content that are identified by the same DOI, as well as the location of data about the piece of content, and services associated with the content (such as purchasing the content).
  • the user uses the web browser 800 and provides the necessary DOI 830 .
  • the DOI 830 may be structured to describe the type of service desired 835 .
  • the DOI system is able to resolve the particular piece of content 840 that the user desires to access.
  • FIG. 9 provides an overview of the sequence of actions that a user performs to access information, in accordance with the present invention.
  • the user launches the browser client 900 on a computing device 905 , such as personal computer, personal digital assistant (PDA), and/or the like.
  • the user engages the browser 900 to make a DOI query.
  • the DOI query is forwarded to the DOI Directory Server 910 over a communications network.
  • the system of the DOI Directory Server 910 examines the DOI against the entries stored therein and forwards the appropriate URL to the browser 900 on the user's computer 900 , in a manner that is invisible to the user.
  • the browser is pointed to the desired content on a server with the appropriate publisher information 920 .
  • the publisher 920 forwards the desired information to the user, which may be accessed in the browser client 900 .
  • FIG. 10 provides a more complete view of the sequence of actions that a user performs to access content information, as shown in FIG. 9.
  • the user launches the browser client 1000 on a computing device 1005 .
  • the user engages the browser 1000 to make a DOI query.
  • the DOI query is forwarded to the DOI Directory Server 1010 over the communications network.
  • the system of the DOI Directory Server 1010 examines the DOI against the entries stored therein. As a result of the checking of the DOI against the entries stored in the DOI Directory Server 1010 , the DOI Directory Server 1010 determines where the DOI must lead the user 1025 .
  • the appropriate URL for the content is automatically forwarded to the user's browser 1000 , without any intermediate intervention or action by the user.
  • the browser 1000 is pointed to the appropriate publisher 1020 whose server is addressed by the underlying URL.
  • the URL is used by the publisher's server 1020 to determine the exact location for content desired by the user, and the publisher's server 1020 forwards the appropriate content 1030 to the user.
  • FIG. 11 provides an overview of some of the exemplary mechanisms for accessing information over a communications network by resolving a DOI to obtain the URL where the desired content is located, in accordance with the present invention.
  • the user may directly provide the DOI and the DOI system retrieves and forwards the appropriate content to the user by simply linking to the appropriate URL.
  • the user may provide information related to some of the fields included in the metadata, whereupon a DOI lookup service identifies the appropriate DOI, which in turn may be resolved to the desired content's location.
  • a search engine 11010 may be provided to a user.
  • the search engine is offered and disposed in communication with the registration agency's DOI and metadata database.
  • a search engine such as www.google.com may be adapted to submit queries to the registration agency's databases.
  • the user searches for the appropriate DOI by providing some identifying information to the search engine 11010 .
  • the search engine 11010 uses the identifying information provided and searches a database of metadata to retrieve the DOI associated with the provided metadata information.
  • the user conducting the search may be presented with returned DOIs from the metadata database and/or URLs resolved from said returned DOIs.
  • the retrieved DOI is sent to the DOI directory 11011 , which resolves the URL wherein the desired content is located by a publisher 11040 .
  • the user's browser is pointed to the appropriate content 11060 .
  • the user may provide the DOI 11015 in the address window 11020 of a browser 11025 .
  • the DOI 11015 may contain the address of a proxy server for the DOI directory 11011 , which in FIG. 11 is “dx.doi.org.”
  • the browser is pointed to the DOI directory 11011 located at dx.doi.org, which resolves the URL at which the desired content is located by a publisher 11040 and points the user's browser thereto.
  • the DOI may be embedded in a document or some form of information 11030 , whereupon clicking the DOI directs the user to the appropriate DOI directory 11011 , which determines the URL at which the desired content is located and points the user's browser thereto.
  • the DOI may be provided on a memory 11040 , such as a CD-ROM or a floppy disk, whereupon the memory may automatically, or upon being activated, direct the user to the appropriate DOI directory 11011 , which resolves the URL at which the desired content is located and points the user's browser thereto.
  • a memory 11040 such as a CD-ROM or a floppy disk
  • the DOI may be provided in printed form to a user, who enters the DOI manually as above or by way of optical and/or mechanical peripheral input device.
  • FIG. 12 provides an overview of another embodiment of the exemplary mechanisms for retrieving information over a communications network, whereupon the DOI system resolves a DOI to obtain the URL where the desired information is located.
  • a plurality of DOI directories 1210 exist as a distributed DOI directory and form a Handle System 1200 .
  • the distributed DOI directory acts and responds to requests as if it were a singular directory 11011 . Otherwise resolutions take place similarly as in FIG. 11.
  • FIG. 13 provides an overview of an exemplary DOI system, in accordance with the present invention, wherein the publishers, the DOI registration service and the Handle System collaborate together to create an efficient DOI system.
  • the prefix holder 1355 may submit information to a DOI registration service 1300 comprising a DOI 1342 and associated metadata 1366 .
  • the prefix holder who has already been assigned a unique prefix 501 requests that a suffix 502 be assigned to a piece of content 1366 .
  • the registration service 1300 is responsible for parsing and/or reformatting the user's streams of submitted information 1342 , 1366 for subsequent deposit in a Handle system 1350 and/or metadata database 1310 .
  • the content 1366 may comprise any information and work of authorship, including articles, books, music albums, or selected discrete portions thereof.
  • the publisher 1342 collects metadata for the content 1366 .
  • the metadata may comprise the content's DOI 500 , a DOI genre, an identifier, title, type, origination, primary agent, agent's role, and/or the like. It may also comprise listings of associated services having to do with the identified piece of content offered by various parties, such as the locations of web pages where a piece of content may be purchased online.
  • the DOI 500 and the metadata are transmitted to the DOI registration service 1300 .
  • the DOI registration service 1300 maintains a database of DOIs 500 , metadata of all the registered content 1366 , as well as the URL at which the content 1366 is located.
  • the DOI registration service 1300 forwards the metadata to a metadata database 1310 , 119 c of FIG. 1, which may or may not be integrally maintained by the DOI registration service 1300 .
  • the DOI registration service 1300 may use the collected metadata for providing it to other data services 1320 or for providing value added resources 1330 to the users.
  • the DOI registration service 1300 sends the appropriate DOI Handle data to the Handle System 1350 , which may comprise a plurality of DOI Directory Servers 1341 .
  • FIG. 14 depicts a data flow diagram for a personal DOI registration system for tracking information access.
  • a user 1401 may employ a client and/or peer for accessing information.
  • the user is disposed in communication with a registration agency 1402 , e.g., DOIAT 101 .
  • the handle system registration agency (hereinafter “registration agency”) 1402 in turn is disposed in communication with a user metadata database (hereinafter “MDDB”) 1403 .
  • MDDB user metadata database
  • the registration agency 1402 is also disposed in communication with a handle system 1404 .
  • the personal DOI registration system allows a user to register a DOI that is to be associated with the user's person, the user's device representing his or her person, and/or the like. Registration of a DOI to represent one's person may be achieved in several ways, such as, but not limited to: obtaining personal information regarding all individual and saving it to a record in a personal DOI database 119 e of FIG. 1 and having the registered DOI resolve to said database record; obtaining personal information regarding an individual and saving it to a record in an MDDB, and/or the like.
  • the personal information may include, but is not limited to such fields as: Name of Individual, Address, Telephone Number, Social Security Number, Representative Hardware Device, Reference to Representative Hardware Device, Credit Information, Medical Information, Company Account Information, Custom Records, and/or the like. It should be noted that the above fields may store actual values or DOIs, e.g., the Reference to Representative Hardware Device may be either an IP address or a DOI.
  • a representative hardware device may be any device that may communicate over a communications network.
  • An individual may have several DOIs registered representing his/her person, or alternatively maintain a single universal DOI representing him/herself
  • a DOI representing a person will be created by an entity other than the individual, e.g., a corporation, while in other deployments entities may make use of a DOI and accompanying personal information maintained by the individual him/herself.
  • the facility of obtaining personal DOI information and storing it may be handled by a tertiary facility, e.g., a personal information database warehouse facility, that then engages and registers and obtains a referencing DOI for each personal record.
  • FIG. 15 depicts a logic flow diagram for a personal DOI registration system for tracking information access.
  • a registration agency e.g., an Information Access Registration Server (IARS)
  • IARS Information Access Registration Server
  • the user may contact the registration agency by web, telephone, and/or the like 1501 .
  • the registration agency Upon contacting the registration agency 1501 , the registration agency provides a mechanism to collect personal information with regard to the user 1502 .
  • the registration agency provides a web form allowing the user to enter personal information for subsequent entry of a database record that will be associated with a registered DOI.
  • the personal information includes a desired user name and password, billing information, address, transaction information (as already discussed above), and/or the like.
  • the registration agency Upon obtaining the user's personal information 1502 , the registration agency generates a public and private encryption key pair for the user 1503 . Any number of encryption techniques may be employed as already discussed in FIG. 1. Upon generating a public/private key pair for the user 1503 , the registration agency will securely transmit the private key to the user across a communications network and then destroy that private key 1505 . The private key securely may be transmitted by employing secure transfer protocols such as, but not limited to, https, SSL, digital certificates, and/or the like. In an alternative embodiment, the user's client/peer includes a facility to produce the public and private encryption key pair locally 1504 .
  • the registration delegates generation of the keys to a tertiary server with a cryptographic server suited for such key production.
  • the registration agency may request that the user generate a private key pair 1504 .
  • the user may submit the public key to the handle system 1506 .
  • the registration system creates a record in the handle system representing the user, i.e., the personal DOI information, and including the public key that was generated 1503 , 1507 and/or submitted 1506 .
  • a user's identity and key are associated with the user's person and/or user's representative device.
  • the personal information that was collected earlier is added to the metadata database keyed under the DOI that was generated to represent the user 1508 .
  • the user is informed of the new personal DOI representing the user's person 1509 .
  • FIG. 16 depicts a public key infrastructure authentication for a content access system to track information access.
  • a user “X” 1601 may attempt to engage and/or access a piece of content “A” 1602 .
  • Content may be stored on a local storage device and/or like form of memory.
  • the content itself contains a DOI 1602 a .
  • the user's client/peer Upon engaging and/or accessing the content, the user's client/peer will interpret the DOI from the content and generate an access request based on the content DOI with the handle system 1603 .
  • the user's client can so engage the handle system by simply reading the DOI tag 1602 a along with the rest of the accessed content.
  • the user's client is designed to parse and respond to discerned DOI tags by requesting a DOI resolution of any identified DOI tags.
  • Current media players may be augmented with such DOI response facilities through plug-ins, patches, and/or the like.
  • Windows Explorer, Microsoft Internet Explorer, Netscape Navigator, Windows Media Player, WinAmp, MusicMatch, and/or the like have published APIs and plug-in facilities allowing for such DOI resolution facilities to be integrated within.
  • the handle system Upon obtaining the DOI access request, the handle system will redirect the user's client to the rights clearinghouse responsible for managing digital rights for the accessed content 1604 , e.g., DOIAT 101 of FIG. 1.
  • the user's client will provide various items to the rights clearinghouse 1604 to enable access to the content 1602 by way of a clear-rights message.
  • user X's client will supply the rights clearinghouse 1604 with: a DOI for content “A” (which may be obtained either from the content itself), and a DOI associated with user X (and/or, optionally, a digital certificate to the rights clearinghouse 1604 ).
  • the rights clearinghouse 1604 maintains a storage device that contains a database and/or data-structure (hereinafter “rights DB”) 1605 associating content 1607 with user rights 1606 .
  • This association may be embodied in standard data structures such as, but not limited to: a (linked value paired) list, table(s), struct, and/or the like.
  • the content table 1607 may store records of DOIs for content keyed to the user table 1606 or vice versa. Both the content table 1607 and user table 1606 store DOIs representing content and users, respectively. Either the content or user tables may be key fields as they are both guaranteed to contain unique values through registration with the handle system.
  • the rights clearinghouse may use the user's DOI, which was sent by and represents the user, to request a public key associated from the handle system 1603 .
  • the clearinghouse 1604 makes this request employing an enhanced DOI grammar and multiple-resolution, e.g., get.publicEncryptionKey@DOI.
  • the handle system 1603 returns the public encryption key to the clearinghouse 1604 based on the user's DOI 1601 .
  • the handle system 1603 will redirect the clearinghouse 1604 to obtain the public encryption key associated with the user's DOI from a tertiary source housing users' public encryption keys.
  • Obtaining the user's public key allows the clearinghouse to determine the identity of the user, and send information securely back only to the intended/authorized user. In one non-limiting alternative embodiment, this may be achieved by the rights clearinghouse using the obtained public key to decrypt the digital certificate that was optionally provided by the user.
  • the decrypted digital certificate may include a password, or other verification information that may required for further action by the rights clearinghouse for added security purposes.
  • the clearinghouse 1604 may query its rights DB 1605 based on information supplied by the user in its clear-rights message.
  • the user supplied user DOI and content DOI may be used by the rights clearinghouse 1604 to query the rights DB 1605 to further determine if a given user has rights for a given item of content. For example, if user X supplies the rights clearinghouse 1604 with a content DOI “A” and the user's DOI “X,” then the rights clearinghouse will identify that user X does have certain rights for content A in the rights DB 1605 . When a user is found to have rights in an item of content, the rights clearinghouse will retrieve access/decryption materials from the rights DB 1605 to enable the user to make use of and/or access the requested content 1602 . This may be achieved by simply reading a Rights_Access field from the appropriate field resulting from the rights DB query.
  • the rights clearinghouse 1604 may then encrypt the access/decryption materials for the requested content, e.g., content “A,” with the user's, e.g., X's, associated public encryption key that was retrieved by resolution of the user's DOI.
  • the rights clearinghouse 1604 may then use the user's DOI and engage the handle system 1603 to resolve to the user's location, e.g., IP address.
  • the access/decryption materials for the requested content are forwarded to the user's client 1601 .
  • Using the user's DOI at the clearinghouse 1604 for resolution further ensures that the appropriate user is provided with the access/decryption materials.
  • the access/decryption materials sent by the clearinghouse 1604 are themselves encrypted with the user's public key associated with the user's DOI, then the user's client 1601 may use the user's private key to decrypt the access/decryption materials. Thereafter, the access/decryption materials may be used by the user's client(s) to engage and/or otherwise access the accessed content 1602 .
  • records in the content table 1607 may be modified with an entry indicating the content was accessed/used (including the time of use by a particular user), and similarly that records in the user table 1607 may be modified with an entry indicating the user accessed/used content (including the time of use).
  • Such tracking of use allows for aggregating use reports, tracking the amount of use by user, by content item, by time, and/or other such attributes.
  • FIG. 17 depicts a logic flow diagram for a public key infrastructure for content access for information tracking.
  • a user accesses content 1701 .
  • the user may access and/or open up content by employing a peer, a client, an application, and/or the like.
  • the Public Key Infrastructure (PKI) authentication system determines if the content has an embedded DOI 1702 . If the content does not have an embedded DOI 1702 , then the peer provides access to the content 1704 . If the content does have an embedded DOI 1702 , then the PKI authentication system determines if the content is encrypted 1703 .
  • PKI Public Key Infrastructure
  • the PKI authentication system determines if a personal DOI exists on the user's key ring that is accessible by way of the user's system 1705 .
  • a key ring may simply hold a singular and/or a plurality of validation and/or authentication mechanisms such as, but not limited to: passwords, digital certificates, (personal) DOIs, and/or the like.
  • a key ring may be embodied in a simple file, in a cookie, in an encrypted file and/or the like.
  • the PKI authentication system determines if the user has a DOI representing his or her person 1706 . This may be determined by querying a metadata database based on the user's personal information and examining if personal DOIs result. If the user has no personal DOI representing his or her person, then a personal DOI registration process is initiated 1707 as discussed above in FIG. 15. If a person does have a DOI representing his or her person 1706 , then the user is prompted for their personal DOI 1708 . Any number of mechanisms may be employed to obtain the person's personal DOI such as a text entry field 1708 .
  • the PKI authentication system Upon prompting and obtaining a user's personal DOI 1708 , the PKI authentication system issues a request for a redirect based on the requested content's DOI 1709 . Alternatively, if the user's personal DOI was available on a key ring 1705 , the PKI authentication system will issue a request for content based on the person's DOI thereafter 1709 .
  • the PKI authentication system Upon issuing an access request for content based on a content DOI 1709 , the PKI authentication system obtains a redirect from the handle system identifying an appropriate clearinghouse that will supply access/decrypt materials (i.e., access credentials) to the user's client that will enable access to the accessed content 1710 .
  • access credentials are materials enabling access to the content such as, but not limited to: access codes, decryption keys, digital certificates, DOIs, passwords, and/or the like.
  • the user's client Upon being redirected by the handle system 1710 , the user's client will contact the rights clearinghouse 1711 . Upon contacting the rights clearinghouse 1711 , the rights clearinghouse will verify the user's identify and access rights 1712 .
  • the rights clearinghouse may verify the user's identity because the client provided the rights clearinghouse with client verification information 1712 .
  • Client verification information comprises the user's personal DOI, the DOI representing the desired content to be accessed; and client verification information may also include: a digital certificate, passwords, access codes, encryption keys, DOI verification information, and/or the like.
  • enhanced DOI grammar may be used to reference the client verification information; e.g., validate.key 1 @ClientPersonalDOI, decrypt.key 2 @DesiredContentDOI, etc.
  • the rights clearinghouse may use the client's DOI to resolve to verification information via the Handle System and use that information to either decrypt verification information provided by the client, compare to verification information provided by the client, and/or the like.
  • the rights clearinghouse may determine if the client has rights to access the desired content. This may be achieved in a number of ways such as, but not limited to: resolving the content DOI to see if there is an entry showing the user has rights to use the content, resolving the client DOI to see if there is an entry to unlock the desired content, simply querying a rights access database for the client's entry, and/or the like.
  • the rights clearinghouse Upon verifying the user's identity and access rights 1712 , the rights clearinghouse provides access credentials to the user's client 1713 .
  • the user's client may decrypt and/or access the desired content by employing the access credentials that were received from the rights clearinghouse.
  • security information such as access credentials, validation information, verification information, and/or the like may also be registered with a DOI in the handle system.
  • a DOI may be assigned to a digital certificate, a decryption key, or even a password.
  • an enhanced DOI access request e.g., get.publicEncryptionKey@DOI, may return the DOI for a public decryption key instead of a URL to the public decryption key or the public decryption key itself.
  • such chained referencing of security information may be used to enhance security.
  • Such a security system moves the actual security information itself, e.g., encryption keys, periodically from server to server as a security measure.
  • the chained referencing and employment of DOIs for the security information prevents all the programs and systems that reference the security information, e.g., keys, from suddenly “breaking” because the URLs or location addresses have changed.
  • such chained referencing may be applied to to an authentication record (within the handle system) itself. The chained referencing permits the creator or owner of the authentication record itself to create their own multiple-resolution options associated with that DOI.
  • Example resolution options associated with the authentication record itself may include, but are not limited to: returning a value of a public key; returning additional information (e.g., metadata) about the owner of security information (e.g., a key); returning additional information (e.g., metadata) about the security information itself (e.g., when it was created, under what terms, with what level of security clearance, etc.).

Abstract

An apparatus, method and system to track information access over a communications network. The present disclosure teaches how to associate access credentials with content accesser in a global and persistent manner. Both content and people are registered with a Digital Object Identifier (DOI) handle system (1603). Furthermore, security and other information such as certificates, personal records, encryption keys, and all other objects involved in such transactions may also be registered with a DOI in the handle system and/or may be associated with another DOI as one of the multiple-resolution pointers contained in a DOI record. A right clearinghouse (1604) then maintains a rights database associated content rights with content accessers by DOIs. The association of people, i.e., content accessers, with digital object identifiers further ensures that content and accessers may be mapped in a manner allowing for the secure tracking of content access.

Description

    RELATED APPLICATIONS
  • The instant application hereby claims priority to the following US provisional patent applications: (1) Ser. No. 60/264,333 for “Reference Linking with DOIs” filed on Jan. 25, 2001 (attorney docket number 4188-4001); (2) Ser. No. 60/268,766 for “Apparatus, Method, and System for Multiple Resolution Affecting Information Access” filed on Feb. 14, 2001 (attorney docket number 4188-4002); (3) Ser. No. 60/276,459 for “Apparatus, Method, and System for Registration Effecting Information Access” filed on Mar. 16, 2001 (attorney docket number 4188-4003); (4) Ser. No. 60/279,792 for “Apparatus, Method and System For Directory Quality Assurance” filed on Mar. 29, 2001 (attorney docket number 4188-4004); (5) Ser. No. 60/303,768 for “Apparatus, Method, and System for Accessing Digital Rights Management Information” filed on Jul. 10, 2001 (attorney docket number 4188-4005); (6) Ser. No. 60/328,275 for “Apparatus, Method and System For Accessing Digital Rights Management Information” filed on Oct. 9, 2001 (attorney docket number 4188-4005US1); (7) Ser. No. 60/267,875 for “Apparatus, Method, and System for Accessing Information” filed on Feb. 8, 2001 (attorney docket number 4188-4006); (8) Ser. No. 60/267,899 for “Provisional filing for Apparatus, Method, and System for Accessing Information” filed on Feb. 9, 2001 (attorney docket number 4188-4007); (9) Ser. No. 60/270,473 for “Business Value and Implementation Considerations For The DOI” filed on Feb. 21, 2001 (attorney docket number 4188-4008); (10) Ser. No. 60/328,274 for “Apparatus, Method And System For Effecting Information Access In A Peer Environment” filed on Oct. 9, 2001 (attorney docket number 4188-4010); (11) Ser. No. 60/328,270 for “Apparatus, Method and System For Tracking Information Access” filed on Oct. 9, 2001 (attorney docket number 4188-4011); each of these applications being herein incorporated by reference. [0001]
  • The instant application, also, hereby incorporates by reference the following Patent Cooperation Treaty applications: (12) for an “Apparatus, Method and System For Multiple Resolution Affecting Information Access” (attorney docket number 4188-4002PC), which was filed on Jan. 25, 2002 in the name of David Sidman; (13) for an “Apparatus, Method and System For Registration Effecting Information Access” (attorney docket number 4188-4003PC), which was filed on Jan. 25, 2002 in the name of David Sidman; (14) for an “Apparatus, Method and System For Directory Quality Assurance” (attorney docket number 4188-4004PC), which was filed on Jan. 25, 2002 in the name of David Sidman; (15) Apparatus, Method and System For Accessing Digital Rights Management Information” (attorney docket number 4188-4005PC1), which was filed on Jan. 25, 2002 in the name of David Sidman; (16) for an “Apparatus, Method and System For Effecting Information Access in a Peer Environment,” (attorney docket number 4188-4010PC), which was filed on Jan. 25, 2002 in the name of David Sidman.[0002]
  • FIELD
  • The present invention relates generally to an apparatus, method and system to track information access across a communications network. More particularly, the disclosed invention relates to an apparatus, method and system to facilitate the association of people, content, and digital rights to streamline the tracking of users accessing information. [0003]
  • BACKGROUND Internet
  • As Internet usage increases, the amount of information available on the Internet also increases. The information that exists on the Internet is of many different types, including documents in many formats such as: computer software, databases, discussion lists, electronic journals, library catalogues, online information services, mailing lists, news groups, streaming media, and the like. Fortunately, much of the information on the Internet can be accessed through the World-Wide Web using a web browser to interact with the network in a user-friendly way. [0004]
  • Networks
  • Networks are commonly thought to consist of the interconnection and interoperation of clients, peers, servers, and intermediary nodes in a graph topology. It should be noted that the term “server” as used herein refers generally to a computer, other device, software, or combination thereof that processes and responds to the requests of remote users across a communications network. Servers serve their information to requesting “clients.” A computer, other device, software, or combination thereof that facilitates, processes information and requests, and/or furthers the passage of information from a source user to a destination user is commonly referred to as a “node.” Networks are generally thought to facilitate the transfer of information from source points to destinations. [0005]
  • Transmission Control Protocol-Internet Protocol (TCP/IP)
  • The proliferation and expansion of computer systems, databases, and networks of computers has been facilitated by an interconnection of such systems and networks in an extraterritorial communications network commonly referred to as the Internet. The Internet has developed and largely employs the Transmission Control Protocol-Internet Protocol (TCP/IP). TCP/IP was developed by a Department of Defense (DoD) research project to interconnect networks made by various and varying network vendors as a foundation for a network of networks, i.e., the Internet. The development of TCP/IP was in part driven by a requirement by the DoD to have a network that will continue to operate even if damaged during battle, thus allowing for information to be routed around damaged portions of the communications network to destination addresses. Of course, if the source or destination address location itself is rendered inoperable, such delivery will not be possible. [0006]
  • The Internet is a packet-switched network and thus, information on the Internet is broken up into pieces, called packets, and transmitted in packet form. The packets contain IP addressing information called headers, which are used by routers to facilitate the delivery of the packets from a source to a destination across intermediary nodes on the Internet. Upon arrival at the destination, the packets are reassembled to form the original message, and any missing packets are requested again. [0007]
  • The IP component of the protocol is responsible for routing packets of information based on a four byte addressing mechanism; the address is written as four numbers separated by dots, each number ranging from 0 to 255, e.g., “123.255.0.123”. IP addresses are assigned by Internet authorities and registration agencies, and are unique. [0008]
  • The TCP portion of the protocol is used for verifying that packets of information are correctly received by the destination computer from the source, and if not, to retransmit corrupt packets. Other transmission control protocols are also commonly used that do not guarantee delivery, such as User Datagram Protocol (UDP). [0009]
  • World Wide Web
  • The proliferation and expansion of the Internet, and particularly the World Wide Web (the web), have resulted in a vast and diverse collection of information. Various user interfaces that facilitate the interaction of users with information technology systems (i.e., people using computers) are currently in use. An information navigation interface called WorldWideWeb.app (the web) was developed in late 1990. Subsequently, information navigation interfaces such as web browsers have become widely available on almost every computer operating system platform. [0010]
  • Generally, the web is the manifestation and result of a synergetic interoperation between user interfaces (e.g., web browsers), servers, distributed information, protocols, and specifications. Web browsers were designed to facilitate navigation and access to information, while information servers were designed to facilitate provision of information. Typically, web browsers and information servers are disposed in communication with one another through a communications network. Information. Servers function to serve information to users that typically access the information by way of web browsers. As such, information servers typically provide information to users employing web browsers for navigating and accessing information on the web. Microsoft's Internet Explorer and Netscape Navigator are examples of web browsers. In addition, navigation user interface devices such as WebTV have also been implemented to facilitate web navigation. Microsoft's Information Server and Apache are examples of information servers. [0011]
  • Universal Resource Locator (URL)
  • The expansion of the web has resulted in an enormous quantity of information, which is accessible through the use of Universal Resource Locators (URLs). An URL is an address that is typically embodied as a hyperlink in a web page or is typed into a web browser. URLs for a given resource (most commonly a file located on a remote computer) refer only to a location for that resource. Typically, the reference to the location is achieved through the use of an unresolved IP address in conjunction with a directory path and file name; e.g., “http://www.aWebSite.com/aFolder/aFile.html”. In this example, the URL directs the browser to connect to the computer named “www” in the domain “aWebSite.com,” and to request the file named “aFile.html” stored in directory “aFolder” at that computer. [0012]
  • Universal Name Identifier (UNI)
  • The Corporation for National Research Initiatives has created and implemented a new means of naming and locating information, called the Handle System. The Handle System is designed to improve upon the current use of URLs. [0013]
  • The Handle System introduces a level of indirection to locating and distributing information over the Internet. The Handle System is a general-purpose system for naming resources. Instead of being assigned a URL based on a particular resource's current network location, a resource may be assigned a Universal Name Identifier. A UNI is a form of Universal Resource Identifier (URI). URIs include both UNIs and URLs. A UNI, unlike a URL, serves and shall be regarded henceforth as a name for the resource that is persistent regardless of changes in the resource's location or other attributes. In turn, a Universal Resource Name (URN) is a type of UNI (i.e., a UNI subsumes the concept of a URN). Furthermore, a Handle is a type of URN. And a Digital Object Identifier (DOI) is a type of Handle. Thus, various forms of UNIs include Handles, URNs, DOIs, and/or the like. The various terms and/or forms of UNIs will be used interchangeably throughout this document, and may be assumed to be interchangeable unless stated otherwise. A Handle is a unique name, which is registered with the Handle System along with the current network location of the named resource. This location information commonly takes the form of a URL. One common type of Handle is known as a Digital Object Identifier (DOI). Handles may be then distributed to users in lieu of a URL, and superficially appear to function similarly to a hyperlink. When a user encounters a Handle, the user may select or enter the Handle much like a URL hyperlink, so long as the user's web browser is capable of making Handle requests. Such an encounter triggers an automated process to look up a resource's current location. The current location of the resource is associated with the resource's Handle in a directory made available by the Handle System, which in turn directs the user to the resource's current location. Unlike with a URL, if the resource moves, the Handle System directory entry can be updated, thereby assuring a persistent association between a Handle and the resource it identifies. An analogy can be made to the physical world: knowing only a URL for a given resource is akin to knowing only a person's street address, and not her name. If she were to move across town, it would be very difficult to locate her without knowing her name. The Handle System allows resources to be permanently named by way of a Handle, and it allows the current network location of resources to be looked up based on that name in a Handle System directory. [0014]
  • Digital Rights Management (DRM)
  • Digital Rights Management (DRM) involves the description, layering, analysis, valuation, trading, and monitoring of an owner's property rights to an asset. DRM covers the management of the digital rights to the physical manifestation of a work (e.g., a textbook) or the digital manifestation of a work (e.g., a web page). DRM also covers the management of an asset whether the asset has a tangible or an intangible value. Current DRM systems include languages for describing the terms and conditions for use of an asset, tracking asset usage by enforcing controlled environments or encoded asset manifestations, and closed architectures for the overall management of the digital rights. Current DRM systems rely upon location-based identifiers such as the URL. [0015]
  • SUMMARY
  • Digital Object Identifiers (DOIs) overcome many of the shortcomings of IP addresses and other location-based addressing schemes. DOIs enable access to information over a communications network by providing a persistent identifier for information that may be regularly relocated. DOIs overcome the limitations of network addressing schemes limited to addressing locations by providing a mechanism to associate identifiers with information through an added level of indirection instead of associating identifiers with locations [0016]
  • Although DOIs provide a mechanism that allows for the association of an identifier with information instead of a location, DOIs in and of themselves do not provide for the access of multiple and/or varying instances of a piece of information in various locations, formats, or the access and/or tracking of various services associated with a given piece of information, based on various contexts of use. [0017]
  • In one embodiment of the present invention, a method is taught for using at least one computer to effect access to information. The method comprises: collecting information regarding an entity (entity information); generating an unique, persistent, and universal name identifier (UPUNI); storing the collected entity information in a database record in a database; generating validation information; transmitting validation information to access devices of the entity, which is represented by the entity information, (EREI; i.e. Entity Represented by Entity Information); transmitting validation information to the UPUNI registration agency; storing the generated validation information in a database record in a database; and registering a resolvable association between an UPUNI and reference to related information. [0018]
  • In another embodiment of the present invention, a method is taught for using at least one computer to effect access to information. The method comprises: determining if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information; determining if the desired information is inaccessible; determining if there exists an UPUNI that represents the entity (E-UPUNI); generating the E-UPUNI, if the entity is un-represented by an UPUNI; resolving the entity device to the desired information's UPUNI (DI-UPUNI); providing entity verification information; verifying the entity's identity and access rights to the desired content with the provided entity verification information (entity verification); and providing access credentials, if the entity's identity and access rights to the desired content are verified. [0019]
  • In another embodiment of the present invention, a memory storing a data structure is taught. The data structure has associated data types, including: a data type to store an unique, persistent, and universal name identifier (UPUNI) associated with information an entity desires (desired information) to access (DI-UPUNI); and a data type to store an UPUNI associated with an entity (E-UPUNI). [0020]
  • The above advantages and features are of representative embodiments only, and are not exhaustive and/or exclusive. They are presented only to assist in understanding the invention. It should be understood that they are not representative of all the inventions defined by the claims, to be considered limitations on the invention as defined by the claims, or limitations on equivalents to the claims. For instance, some of these advantages may be mutually contradictory, in that they cannot be simultaneously present in a single embodiment. Similarly, some advantages are applicable to one aspect of the invention, and inapplicable to others. Furthermore, certain aspects of the claimed invention have not been discussed herein. However, no inference should be drawn regarding those discussed herein relative to those not discussed herein other than for purposes of space and reducing repetition. Thus, this summary of features and advantages should not be considered dispositive in determining equivalence. Additional features and advantages of the invention will become apparent in the following description, from the drawings, and from the claims.[0021]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings illustrate certain embodiments of the disclosure. [0022]
  • FIG. 1 illustrates one example embodiment incorporated into a DOI Access Tracker (DOIAT) controller; [0023]
  • FIGS. 2 and 3 illustrate URL addressing across a communications network with moving information; [0024]
  • FIG. 4 illustrates accessing of information through DOIs; [0025]
  • FIGS. 5 and 6 provide an overview of a Handle; [0026]
  • FIGS. 7 and 8 provide an overview of the resolution mechanism for allowing users to access desired information; [0027]
  • FIG. 9 provides an overview of an exemplary sequence of actions that a user performs to access information using DOIs; [0028]
  • FIG. 10 provides a more complete overview of an exemplary sequence of actions that users perform to access content information; [0029]
  • FIG. 11 illustrates an exemplary mechanism for accessing information over a communications network; [0030]
  • FIG. 12 provides an overview of another embodiment of exemplary mechanisms for retrieving information over a communications network; [0031]
  • FIG. 13 provides an overview of an exemplary DOI system; [0032]
  • FIG. 14 depicts a data flow diagram for a personal DOI registration system for tracking information access; [0033]
  • FIG. 15 depicts a logic flow diagram for a personal DOI registration system for tracking information access; [0034]
  • FIG. 16 depicts a public key infrastructure authentication for content access system for tracking information access; [0035]
  • FIG. 17 depicts a logic flow diagram for a public key infrastructure for content access for information tracking. [0036]
  • DETAILED DESCRIPTION Digital Object Identifier Access Tracker Controller
  • FIG. 1 illustrates one non-limiting example embodiment incorporated into a Digital Object Identifier Access Tracker (DOIAT) [0037] controller 101. In this embodiment, the DOIAT controller 101 may serve to register, resolve, process, store, update, and validate Handles and any associated information, and/or the like.
  • In one embodiment, the [0038] DOIAT controller 101 may be connected to and/or communicate with entities such as, but not limited to: one or more users from user input devices 111; peripheral devices 112; and/or a communications network 113. The DOIAT controller may even be connected to and/or communicate with a cryptographic processor device 128.
  • A [0039] typical DOIAT controller 101 may be based on common computer systems that may comprise, but are not limited to, components such as: a computer systemization 102 connected to memory 129.
  • Computer Systemization [0040]
  • A [0041] computer systemization 102 may comprise a clock 130, central processing unit (CPU) 103, a read only memory (ROM), a random access memory (RAM), and/or an interface bus 107, and conventionally, although not necessarily, are all interconnected and/or communicating through a system bus 104. The system clock typically has a crystal oscillator and provides a base signal. The clock is typically coupled to the system bus and various means that will increase or decrease the base operating frequency for other components interconnected in the computer systemization. The clock and various components in a computer systemization drive signals embodying information throughout the system. Such transmission and reception of signals embodying information throughout a computer systemization may be commonly referred to as communications. These communicative signals may further be transmitted, received, and the cause of return and/or reply signal communications beyond the instant computer systemization to: communications networks, input devices, other computer systemizations, peripheral devices, and/or the like. Optionally, a cryptographic processor 126 may similarly be connected to the system bus. Of course, any of the above components may be connected directly to one another, connected to the CPU, and/or organized in numerous variations employed as exemplified by various computer systems.
  • The CPU comprises at least one high-speed data processor adequate to execute program modules for executing user and/or system-generated requests. The CPU may be a microprocessor such as the Intel Pentium Processor and/or the like. The CPU interacts with memory through signal passing through conductive conduits to execute stored program code according to conventional data processing techniques. Such signal passing facilitates communication within the DOIAT controller and beyond through various interfaces. [0042]
  • Interface Adapters [0043]
  • Interface bus(ses) [0044] 107 may accept, connect, and/or communicate to a number of interface adapters, conventionally although not necessarily in the form of adapter cards, such as but not limited to: input output interfaces (I/O) 108, storage interfaces 109, network interfaces 110, and/or the like. Optionally, cryptographic processor interfaces 127 similarly may be connected to the interface bus. The interface bus provides for the communications of interface adapters with one another as well as with other components of the computer systemization. Interface adapters are adapted for a compatible interface bus. Interface adapters conventionally connect to the interface bus via a slot architecture. Conventional slot architectures may be employed, such as, but not limited to: Accelerated Graphics Port (AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (PCI), Personal Computer Memory Card International Association (PCMCIA), and/or the like.
  • Storage interfaces [0045] 109 may accept, communicate, and/or connect to a number of storage devices such as, but not limited to: storage devices 114, removable disc devices, and/or the like. Storage interfaces may employ connection protocols such as, but not limited to: (Ultra) Advanced Technology Attachment (Packet Interface) ((Ultra) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, fiber channel, Small Computer Systems Interface (SCSI), Universal Serial Bus (USB), and/or the like.
  • Network interfaces [0046] 110 may accept, communicate, and/or connect to a communications network 113. Network interfaces may employ connection protocols such as, but not limited to: direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), Token Ring, wireless connection such as IEEE 802.11b, and/or the like. A communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g., employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like. A network interface may be regarded as a specialized form of an input output interface.
  • Input Output interfaces (I/O) [0047] 108 may accept, communicate, and/or connect to user input devices 111, peripheral devices 112, cryptographic processor devices 128, and/or the like. I/O may employ connection protocols such as, but not limited to: Apple Desktop Bus (ADB); Apple Desktop Connector (ADC); audio: analog, digital, monaural, RCA, stereo, and/or the like; IEEE 1394; infrared; joystick; keyboard; midi; optical; PC AT; PS/2; parallel; radio; serial; USB; video interface: BNC, composite, digital, RCA, S-Video, VGA, and/or the like; wireless; and/or the like. A common output device is a video display, which typically comprises a CRT or LCD based monitor with an interface (e.g., VGA circuitry and cable) that accepts signals from a video interface. The video interface composites information generated by a computer systemization and generates video signals based on the composited information. Typically, the video interface provides the composited video information through a video connection interface that accepts a video display interface (e.g., a VGA connector accepting a VGA display cable).
  • [0048] User input devices 111 may be card readers, dongles, finger print readers, gloves, graphics pads, joysticks, keyboards, mouse (mice), trackballs, trackpads, retina readers, and/or the like.
  • [0049] Peripheral devices 112 may be connected and/or communicate with or to I/O and/or with or to other facilities of the like such as network interfaces, storage interfaces, and/or the like). Peripheral devices may be cameras, dongles (for copy protection, ensuring secure transactions as a digital signature, and/or the like), external processors (for added functionality), goggles, microphones, monitors, network interfaces, printers, scanners, storage devices, visors, and/or the like.
  • Cryptographic units such as, but not limited to, microcontrollers, [0050] processors 126, interfaces 127, and/or devices 128 may be attached, and/or communicate with the DOIAT controller. A MC68HC16 microcontroller, commonly manufactured by Motorola Inc., may be used for and/or within cryptographic units. Equivalent microcontrollers and/or processors may also be used. The MC68HC16 microcontroller utilizes a 16-bit multiply-and-accumulate instruction in the 16 MHz configuration and requires less than one second to perform a 512-bit RSA private key operation. Cryptographic units support the authentication of communications from interacting agents, as well as allowing for anonymous transactions. Cryptographic units may also be configured as part of CPU. Other commercially available specialized cryptographic processors include VLSI Technology's 33 MHz 6868 or Semaphore Communications' 40 MHz Roadrunner 284.
  • Memory [0051]
  • A [0052] storage device 114 may be any conventional computer system storage. Storage devices may be a fixed hard disk drive, and/or other devices of the like. However, it is to be understood that a DOIAT controller and/or a computer systemization may employ various forms of memory 129. For example, a computer systemization may be configured wherein the functionality of on-chip CPU memory (e.g., registers), RAM, ROM, and any other storage devices are provided by a paper punch tape or paper punch card mechanism; of course such an embodiment is not preferred and would result in an extremely slow rate of operation. In a typical configuration, memory 129 will include ROM, RAM, and a storage device 114. Generally, any mechanization and/or embodiment allowing a processor to affect the storage and/or retrieval of information is regarded as memory 129. Thus, a computer systemization generally requires and makes use of memory. However, memory is a fungible technology and resource, thus, any number of memory embodiments may be employed in lieu of or in concert with one another.
  • Module Collection [0053]
  • The [0054] storage devices 114 may contain a collection of program and/or database modules and/or data such as, but not limited to: an operating system module 115 (operating system); an information server module 116 (information server); a user interface module 117 (user interface); a web browser module 118 (web browser); databases 119; a cryptographic server module 120 (cryptographic server); DOI Access Tracker (DOIAT) module 125; and/or the like (i.e., collectively a module collection). These modules may be stored and accessed from the storage devices and/or from storage devices accessible through an interface bus. Although non-conventional software modules such as those in the module collection, typically and preferably, are stored in a local storage device 114, they may also be loaded and/or stored in memory such as: peripheral devices, RAM, remote storage facilities through a communications network, ROM, various forms of memory, and/or the like.
  • Operating System [0055]
  • The [0056] operating system module 115 is executable program code facilitating the operation of a DOIAT controller. Typically, the operating system facilitates access of I/O, network interfaces, peripheral devices, storage devices, and/or the like. The operating system preferably is a conventional product such as Apple Macintosh OS X Server, AT&T Plan 9, Microsoft Windows NT Server, Unix, and/or the like operating systems. Preferably, the operating system is highly fault tolerant, scalable, and secure. An operating system may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Conventionally, the operating system communicates with other program modules, user interfaces, and/or the like. For example, the operating system may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses. The operating system, once executed by the CPU, may enable the interaction with communications networks, data, I/O, peripheral devices, program modules, memory, user input devices, and/or the like. Preferably, the operating system provides communications protocols that allow the DOIAT controller to communicate with other entities through a communications network 113. Various communication protocols may be used by the DOIAT controller as a subcarrier transport mechanism for interacting with the Handle System, such as, but not limited to: multicast, TCP/IP, UDP, unicast, and/or the like.
  • Information Server [0057]
  • An [0058] information server module 116 is stored program code that is executed by the CPU. The information server may be a conventional Internet information server such as, but not limited to, Microsoft's Internet Information Server and/or the Apache Software Foundation's Apache. Preferably, the information server allows for the execution of program modules through facilities such as C++, Java, JavaScript, ActiveX, Common Gateway Interface (CGI) scripts, Active Server Page (ASP), and/or the like. Preferably the information server supports secure communications protocols such as, but not limited to, File Transfer Protocol (FTP); HyperText Transfer Protocol (HTTP); Secure Hypertext Transfer Protocol (HTTPS), Secure Socket Layer (SSL), and/or the like. Conventionally, an information server provides results in the form of web pages to web browsers, and allows for the manipulated generation of the web pages through interaction with other program modules. After a DNS resolution portion of an HTTP request is resolved to a particular information server, the information server resolves requests for information at specified locations on a DOIAT controller based on the remainder of the HTTP request. For example, a request such as http://123.124.125.126/myInformation.html might have the IP portion of the request “123.124.125.126” resolved by a DNS server to an information server at that IP address; that information server might in turn further parse the http request for the “/myInformation.html” portion of the request and resolve it to a location in memory containing the information “myInformation.html.” An information server may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the information server communicates with operating systems, other program modules, user interfaces, web browsers, and/or the like. An information server may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • User Interface [0059]
  • A [0060] user interface module 117 is stored program code that is executed by the CPU. Preferably, the user interface is a conventional graphic user interface as provided by, with, and/or atop operating systems and/or operating environments such as Apple Macintosh OS, e.g., Aqua, Microsoft Windows (NT), Unix X Windows (KDE, Gnome, and/or the like), and/or the like. The user interface may allow for the display, execution, interaction, manipulation, and/or operation of program modules and/or system facilities through textual and/or graphical facilities. The user interface provides a facility through which users may affect, interact, and/or operate a computer system. A user interface may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the user interface communicates with operating systems, other program modules, and/or the like. The user interface may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • Web Browser [0061]
  • A [0062] web browser module 118 is stored program code that is executed by the CPU. Preferably, the web browser is a conventional hypertext viewing application such as Microsoft Internet Explorer or Netscape Navigator (preferably with 128 bit encryption by way of HTTPS, SSL, and/or the like). Some web browsers allow for the execution of program modules through facilities such as Java, JavaScript, ActiveX, and/or the like. In one embodiment web browsers are handle-enabled by way of a browser plug-in software such as the Handle System plug-in available from www.cnri.org. In an alternative embodiment handle support is integrated into the web browser. Web browsers and like information access tools may be integrated into PDAs, cellular telephones, and/or other mobile devices. A web browser may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the web browser communicates with information servers, operating systems, integrated program modules (e.g., plug-ins), and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses. Of course, in place of a web browser and information server, a combined application may be developed to perform similar functions of both. The combined application would similarly affect the obtaining and the provision of information to users, user agents, and/or the like from DOIAT enabled nodes. The combined application may be nugatory on systems employing standard web browsers. Such a combined module could be configured to communicate directly with the DOIAT without an intermediary information server to further enhance security.
  • DOIAT Database [0063]
  • A [0064] DOIAT database module 119 may be embodied in a database that is stored program code that is executed by the CPU and its stored data; the stored program code portion configuring the CPU to process the stored data. Preferably, the database is a conventional, fault tolerant, relational, scalable, secure database such as Oracle or Sybase. Relational databases are an extension of a flat file. Relational databases consist of a series of related tables. The tables are interconnected via a key field. Use of the key field allows the combination of the tables by indexing against the key field; i.e., the key fields act as dimensional pivot points for combining information from various tables. Relationships generally identify links maintained between tables by matching primary keys. Primary keys represent fields that uniquely identify the rows of a table in a relational database. More precisely, they uniquely identify rows of a table on the “one” side of a one-to-many relationship.
  • Alternatively, the DOIAT database may be implemented using various standard data-structures, such as an array, hash, (linked) list, struct, table, and/or the like. Such data-structures may be stored in memory and/or in (structured) files. If the DOIAT database is implemented as a data-structure, the use of the DOIAT database may be integrated into another module such as the DOIAT module. Databases may be consolidated and/or distributed in countless variations through standard data processing techniques. Portions of databases, e.g., tables, may be exported and/or imported and thus decentralized and/or integrated. In one non-limiting example embodiment, the [0065] database module 119 includes tables such as but not limited to a UNI (e.g., Handle, DOI and/or other UNIs) table 119 a, URL table 119 b, metadata table 119 c, multiple resolution table 119 d, a personal (DOI information) table 119 e, and/or the like. All the tables may be related by (enhanced) DOI key field entries as they are unique. In an alternative embodiment, these tables have been decentralized into their own databases and their respective database controllers (i.e., individual database controllers for each of the above tables). Of course, employing standard data processing techniques, one may further distribute the databases over several computer systemizations and/or storage devices. Similarly, configurations of the decentralized database controllers may be varied by consolidating and/or distributing the various database modules 119 a-e. The DOIAT may be configured to keep track of user requests and various transactions tracking via database controllers.
  • A DOIAT database may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the DOIAT database communicates with a DOIAT module, other program modules, and/or the like. The database may contain, retain, and provide information regarding other nodes and data. [0066]
  • Cryptographic Server [0067]
  • A [0068] cryptographic server module 120 is stored program code that is executed by the CPU 103, cryptographic processor 126, cryptographic processor interface 127, cryptographic processor device 128, and/or the like. Preferably, cryptographic processor interfaces will allow for expedition of encryption and/or decryption requests by the cryptographic module; however, the cryptographic module, alternatively, may run on a conventional CPU. Preferably, the cryptographic module allows for the encryption and/or decryption of provided data. Preferably, the cryptographic module allows for both symmetric and asymmetric (e.g., Pretty Good Protection (PGP)) encryption and/or decryption. Preferably, the cryptographic module allows conventional cryptographic techniques such as, but not limited to: digital certificates (e.g., X.509 authentication framework), digital signatures, dual signatures, enveloping, password access protection, public key management, and/or the like. Preferably, the cryptographic module will facilitate numerous (encryption and/or decryption) security protocols such as, but not limited to: checksum, Data Encryption Standard (DES), Elliptical Curve Encryption (ECC), International Data Encryption Algorithm (IDEA), Message Digest 5 (MD5, which is a one way hash function), passwords, RC5 (Rivest Cipher), Rijndael, RSA (which is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman), Secure Hash Algorithm (SHA), Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (HTTPS), and/or the like. The cryptographic module facilitates the process of “security authorization” whereby access to a resource is inhibited by a security protocol wherein the cryptographic module effects authorized access to the secured resource. A cryptographic module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Preferably, the cryptographic module supports encryption schemes allowing for the secure transmission of information across a communications network to enable a DOIAT module to engage in secure transactions if so desired by users. The cryptographic module facilitates the secure accessing of resources on DOIAT and facilitates the access of secured resources on remote systems; i.e., it may act as a client and/or server of secured resources. Most frequently, the cryptographic module communicates with information servers, operating systems, other program modules, and/or the like. The cryptographic module may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • Information Access Multiple Resolution Server (IAMRS) [0069]
  • An [0070] IAMRS module 125 is stored program code that is executed by the CPU. Generally, the DOIAT affects accessing, obtaining and the provision of information, and/or the like between nodes on a communications network. The IAMRS has the ability to resolve UNIs to multiple instantiations. Generally, the IAMRS acts as a lookup facility to create, maintain, and update associations between a given piece of information, its DOI, and its current locations. The IAMRS coordinates with the DOIAT database to identify nodes that may be useful for improving data transfer for requested information, for resolving to various formats of the requesting information, providing an enhanced mechanism to create queries regarding the information, and/or the like. An IAMRS enabling access of information between nodes may be developed by employing standard development tools such as, but not limited to: C++, shell scripts, Java, Javascript, SQL commands, web application server extensions, Apache modules, Perl scripts, binary executables, and/or other mapping tools, and/or the like. In one non-limiting example embodiment, the IAMRS server employs a cryptographic server to encrypt and decrypt communications. The IAMRS may service requests, update association information for UNIs, and much more. A DOIAT module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the IAMRS module communicates with a DOIAT database, operating systems, other program modules, and/or the like. The IAMRS may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • DOI Access Tracker (DOIAT) [0071]
  • A [0072] DOIAT module 135 is stored program code that is executed by the CPU. Generally, the DOIAT registers personal DOIs (FIGS. 14 and 15), tracks/enables access to content (FIGS. 16 and 17), and obtains and provides information between nodes on a communications network, and/or the like. The DOIAT is a DOI enabled client and/or server that enables access, tracking, and verifying users, use, and content across a communications network based on DOIs. In one non-limiting example embodiment, the DOIAT may include a rights database 119 e that is keyed to DOIs 119 a. This database and/or data-structure maintains associations between users, digital rights, and content. The DOIAT may add the ability to validate content via an IARS. Alternatively, the DOIAT may operate in a stand alone mode separate from the IARS. In either embodiment, the DOIAT may be used to embedd DOI values into content referenced by the DOI so that the content may be validated. The DOIAT coordinates with the DOIAT database to track and/or limit access to content accesssed by users. A DOIAT enabling access of information between nodes maybe be developed by employing standard development tools such as, but not limited to: C++, shell scripts, Java, Javascript, SQL commands, web application server extensions, Apache modules, Perl scripts, binary executables, and/or other mapping tools, and/or the like. In one non-limiting example embodiment, the DOIAT employs a cryptographic server to encrypt and decrypt communications. The DOIAT may catalog content, service requests, redirect requests, and much more. A DOIAT module may communicate to and/or with other modules in a module collection, including itself, and/or facilities of the like. Most frequently, the DOIAT module communicates internally and with other peers across a communications network with: a DOIAT database, an IAMRS module, operating systems, other program modules, and/or the like. The DOIAT may contain, communicate, generate, obtain, and/or provide program module, system, user, and/or data communications, requests, and/or responses.
  • Distributed DOIAT [0073]
  • The functionality of any of the DOIAT node controller components and/or functionalities may be combined, consolidated, and/or distributed in any number of ways to facilitate development and/or deployment. Similarly, the module collection may be combined in any number of ways to facilitate deployment and/or development. To accomplish this, one must simply integrate the components into a common code base or in a facility that can dynamically load the components on demand in an integrated fashion. [0074]
  • The module collection may be consolidated and/or distributed in countless variations through standard data processing and/or development techniques. Multiple instances of any one of the program modules in the program module collection may be instantiated on a single node, and/or across numerous nodes to improve performance through load balancing data processing techniques. Furthermore, single instances may also be distributed across multiple controllers and/or storage devices; e.g., databases. [0075]
  • All program module instances and controllers working in concert may do so through standard data processing communication techniques. [0076]
  • The preferred DOIAT controller configuration will depend on the context of system deployment. Factors such as, but not limited to, the capacity and/or location of the underlying hardware resources may affect deployment requirements and configuration. Regardless of if the configuration results in more consolidated and/or integrated program modules, results in a more distributed series of program modules, and/or results in some combination between a consolidated and/or distributed configuration, communication of data may be communicated, obtained, and/or provided. Instances of modules (from the module collection) consolidated into a common code base from the program module collection may communicate, obtain, and/or provide data. This may be accomplished through standard data processing techniques such as, but not limited to: data referencing (e.g., pointers), internal messaging, object instance variable communication, shared memory space, variable passing, and/or the like (intra-application communication). [0077]
  • If module collection components are discrete, separate, and/or external to one another, then communicating, obtaining, and/or providing data with and/or to other module components may be accomplished through standard data processing techniques such as, but not limited to: Application Program Interfaces (API) information passage; (distributed) Component Object Model ((D)COM), (Distributed) Object Linking And Embedding ((D)OLE), and/or the like), Common Object Request Broker Architecture (CORBA), process pipes, shared files, and/or the like (inter-application communication). Messages sent between discrete module components for inter-application communication or within memory spaces of a singular module for intra-application communication may be facilitated through the creation and parsing of a grammar. A grammar may be developed by using standard development tools such as lex, yacc, and/or the like, which allow for grammar generation and parsing functionality, which in turn may form the basis of communication messages within and between modules. Again, the preferable embodiment will depend upon the context of system deployment. [0078]
  • Finally, it is to be understood that the logical and/or topological structure of any combination of the module collection and/or the present invention as described in the figures and throughout are not limited to a fixed execution order and/or arrangement, but rather, any disclosed order is exemplary and all functional equivalents, regardless of order, are contemplated by the disclosure. Furthermore, it is to be understood that such structures are not limited to serial execution, but rather, any number of threads, processes, services, servers, and/or the like that may execute asynchronously, simultaneously, synchronously, and/or the like are contemplated by the disclosure. [0079]
  • IP Addressing
  • Users access communications networks through addresses. Addresses represent locations. Users traverse locations in a communications network hoping to find information. A common communications addressing scheme employs the IP address. The IP address may be likened to the real world by analogy to a street address. The IP address itself is a sequence of numbers, e.g., 209.54.94.99, and commonly has an associated name, e.g., www.contentdirections.com. A distributed database registry maintains the associated pairs of names and IP addresses and serves to resolve associated names into corresponding IP addresses. This allows people to remember and use names, e.g., www.report.com, instead of being forced to memorize and use a series of numbers, e.g., 209.54.94.99. These distributed databases assisting in the name resolution of IP addresses are commonly referred to as Domain Name Servers (DNS). [0080]
  • It is common for IP addresses to be embodied as Universal Resource Locators (URLs) that append even more navigation information into an address. Users may employ software to access information stored at URLs through the use of HTTP. An example is when a user specifies “http://www.report.com /reports/1999/IncomeStatement.html” in a web browser. Typically this further navigation information, i.e., “/reports/1999/IncomeStatement.html,” provides a specific storage location within a computer server. This further navigation location may be likened to a real world address more specific than a street address that includes information such as a company name, department, and room number. This further navigation location is typically not Handled or resolved by DNSs, but instead by an information server at the resolved IP address. For example, an information server at the resolved address of 123.123.123.123 for www.report.com would interpret and return information at a local location of “/reports/1999/IncomeStatement.html” within the server. An Information Server is a means for facilitating communications between a communication network and the computer server at a particular IP address. Commercial examples of an Information Server include Apache. An Information Server may be likened to a mail department for a business that further routes correspondence to appropriate locations within the business. [0081]
  • FIGS. 2 and 3 illustrate that IP addressing mechanisms do not maintain an association with information as it moves across a communications networks. Web page links generally employ HTTP, which in turn relies on IP addressing. Thus, URL links simply point to a location on a communication network and are not necessarily associated with any specific information. For example, a URL link referencing www.news.com will have different information associated between the URL and the information made available at the www.news.com location as information at the location is updated daily. In many instances, locations themselves may disappear as companies move information, move their operations, go out of business, etc. [0082]
  • For example, a report entitled “Company Sales for 1999” [0083] 222 existing at a location www.report.com/1999/Report.html 208 may be moved to www.reportarchives.com/1999/Old-report.html 310, e.g., because the information was sold from one entity to another, archived, or for many other reasons. The report at www.report.com/1999/Report.html 208 may have had 5 million web pages and URL links referencing the location 244, and when users attempt to access the information they may well receive a “404 File not found” error 309 because that location no longer exists and/or no longer contains the desired information. The error results because the DNSs were designed to always resolve users' requests to a location and because DNSs are not designed to maintain an association between URLs and a specific instantiation of information.
  • FIG. 2 depicts a [0084] web page 201, a user entered address 202, a document 203, and a memory device 204 all employing URLs and consequently IP addressing in an attempt to reference a piece of information (the report “Company Sales for 1999”) 222. Then in FIG. 2, the information 222 is moved from its original location 208 (for example at www.report.com/1999/Report.html) to a new location 310 of FIG. 2 (for example www.report.com/1999/Archives.html). In FIG. 3, this results in breaking 301-304 all the URLs 244 referencing the location and produces the dreaded “404 file not found” error 309 for all users and URLs making reference to the location (www.report.com/1999/Report.html) 208.
  • Handle System
  • Once a piece of information has been assigned a DOI and has been made available, the DOI system needs to be able to resolve what the user of the DOI wants to access. The technology that is used to manage the resolution of DOIs is better known as the “Handle System,” and will be described in more detail below. THE DOI HANDBOOK provides a general overview of basic DOIs. In a nutshell, the Handle System includes an open set of protocols, a namespace, and an implementation of the protocols. The protocols enable a distributed computer system to store Handles (such as DOIs) of digital content and resolve those Handles into the information necessary to locate and access the content, to locate and access information related to the content, or to locate and access (i.e., provide an interface to) services associated with the content. This associated information can be changed as needed to reflect the current state of the identified content without changing the DOI, thus allowing the name of the item to persist over changes of location and other state information. Combined with a centrally administered DOI registration agency, the Handle System provides a general-purpose, distributed global naming service for the reliable management of information and services on networks over long periods of time. It is important to note that throughout the present disclosure that “source,” “content” and/or “information” made accessible through the DOI system may comprise any identifiable content, source, information, services, transactions, and work of authorship, including articles, books, intangible objects, music albums, people, tangible physical objects, and/or the like further including selected discrete portions and/or combinations thereof. The accessible information may be a URL to an application that initiates a service, a transaction, provides a selection mechanism, and/or the like. In one non-limiting example, the DOI may even be associated with information identifying a human being such as a social security number, telephone number, and/or the like. In another non-limiting example, the DOI may be associated with software modules, programming “objects,” or any other network-based resource. Furthermore, a DOI can be used to represent most anything including the online representation of physical products (e.g., items currently identified by UPC or bar codes). In such an example, DOIs could resolve to the manufacturer's catalog page describing or offering the product, or even, in a multiple-resolution scenario, offer all services related to the object such as where to go to get the item repaired; where to find replacement parts; what the new or replacement product is; what kinds of pricing or leasing options are available, etc. Other example embodiments implementing DOIs include: representing different modules of software that may operate in distributed fashion across a communications network; telephone numbers for Voice-over-IP technology; gene sequences; medical records and/or other permanent records (DOIs will be especially useful with permanent records protected via encryption and/or other method that might invoke a certificate or decryption key); and/or the like. Another example embodiment for a DOI is to represent the permanent location of a temporary and/or dynamic value such as, but not limited to a current stock quote; current bid and offer prices (for stocks and/or any other kind of auction and/or exchange); a company's current annual report (versus different DOIs for different prior-year annual reports); and/or the like. [0085]
  • Users may access information through Digital Object Identifiers (DOIs). DOIs are associated with (i.e., are names for) information itself. DOIs are instances of “Handles” and operate within the framework of the “Handle system.” A DOI allows for access to persistently associated information. The DOI is a string of characters followed by a separator further followed by a string of characters, e.g., 10.1065/abc123def. It should be noted and re-emphasized that although the present disclosure may make mention of specific sub-types of UNIs such as “URNs,” “DOIs” and “Handles,” the present disclosure applies equally well to the more generic types of UNIs, and as such, the present disclosure should be regarded as applying to UNIs in general where any UNI sub-type is mentioned, unless stated otherwise. Furthermore, although the Handle System, DOIs, and their supporting technologies and conventions, which are in use today, are a contemplated forum for the present invention, it should be noted that it is contemplated that the present invention may be applied to other forums based upon current and yet to be conceived conventions and systems. [0086]
  • DOIs [0087]
  • Users employing DOIs to access information know they will resolve and access only associated information. In contrast to URLs that reference locations, DOIs are names for information, which can be used to look up that information's location and other attributes, as well as related services. It is envisioned that information may be any information as well as any computer-readable files, including e-books, music files, video files, electronic journals, software, smaller portions and/or combinations of any of the aforementioned content as well. It should be noted that since the electronic content will be made available over a communications network, hereinafter this application refers to such available information as being published on a communications network. [0088]
  • A DOI is a permanent and persistent identifier given to a piece of information made available on a communications network and registered in an electronic form, so that even if the location (i.e., URL), format, ownership, etc. of the content or associated data changes, users will be able to access the associated data. DOIs, or Handles, may be distributed to users in lieu of a URL. A user may access information associated with a particular DOI by selecting or entering the DOI in a Handle-enabled web browser much like a URL hyperlink. Many types of browsers may be enabled by way of browser plug-in software such as the Handle System plug-in available from www.cnri.org. Such an attempt to access DOI associated information triggers an automated process to look up a resource's current location. The current location of the resource is associated with the resource's DOI in a centrally managed directory made available by the Handle System, which in turn directs the user (i.e., the user's web browser) to the resource's current location. This direction is often accomplished by returning a current URL associated with the selected DOI and corresponding information. [0089]
  • FIG. 4 illustrates the access of information through DOIs in contrast to FIGS. 2 and 3 above. Initially, the information (report of “Company Sales for 1999) [0090] 222 is given a DOI through a registration process. Instead of employing URLs, users reference 444 the information using the DOI through web pages 401, typed entry in a web browser 402, documents 403, devices 404, barcodes 406, and/or the like. When users engage the DOI links 444, they are resolved in a centralized DOI directory 411 and the requesting users are given a URL link 244 to the information's 222 initial location (www.report.com/1999/Report.html) 208. Upon the information being moved 434 from its initial location (www.report.com/1999/Report.html) 208 to a new location (www.report.com/1999/Archives.html) 310, the publisher of the information 410 would inform the DOI centralized directory 445 of the new location for the information by sending an updated URL 245 referencing the new location. Thereafter, if users 401-404 attempt to access the information through the DOI links 444, the DOI directory will properly provide the new location 310 by way of the updated URL 245.
  • As noted above, DOIs may not only be used to identify information, but also smaller portions thereof. For example, according to the DOI system, it is possible for a book to have one DOI, while each of its chapters would have other unique DOIs to identify them; furthermore, each figure in the book may have yet other unique DOIs to identify them. In other words, according to the DOI system, it is possible to identify information with variable granularity as desired by the content publishers. Furthermore, it is envisioned that just as Universal Product Codes (commonly expressed as ‘bar-codes’ on consumer products) allow, for example, a supermarket's cash registers, inventory computers, financial systems, and distributors to automate the supply chain in the physical world, the present disclosure provides a mechanism for employing DOIs to empower all kinds of agents in the world of electronic publishing to automate the sale of digital content (and the licensing of rights to that content) across the Internet in an efficient manner, since each piece of saleable content would have associated with it a globally unique DOI, which could be used as a product identification code in transactions between agents. [0091]
  • Handle Structure
  • The Handle System employs a pre-determined set of policies for efficient and user-friendly utilization thereof, some of which of which are listed below. The use of the Handle System for DOI resolution should ideally be free to users, with the costs of operation of the system possibly borne by the publishers. All DOIs are to be registered with a global DOI registry. Registrants are responsible for the maintenance of state data and metadata relating to DOIs that they have registered. The syntax of the DOI follows a standardized syntax. In use, the DOI will be an opaque string (dumb number). DOI registration agencies will manage the assignment of DOIs, their registration and the declaration of the metadata associated with them. [0092]
  • FIGS. 5 and 6 provide a schematic view of a [0093] Handle 600. A Handle 600 has two components, the prefix 501 and the suffix 602. The prefix 501 and the suffix 502 are separated by a forward slash 507. The Handle 500 may incorporate any printable characters from almost every major language written or used today. There is no specified limitation on the length of either the prefix 501 or the suffix 502. As a result, it is envisioned that there are an almost infinite number of Handles available. It is important to ensure that the combination of the prefix 501 and the suffix 502 is unique for supporting the integrity of the Handle System. Thus, the DOI registration agency will award a unique prefix 501 to a publisher. In one embodiment, the registration agency may put the responsibility on these publishers for ensuring that the suffix 502 assigned is unique as well. This may be achieved with a registration tool running on the user's client computer system. In another embodiment, the registration agency will ensure that the suffix 502 is unique by applying various suffix generation algorithms as discussed throughout this disclosure. The Registration Agency and the Handle System administrators will both verify uniqueness of any new Handle before depositing it in the Handle System. The Registration Agency deposits DOI records with the Handle System. The Handle System in turn services DOI resolution requests through a DOI directory.
  • The [0094] prefix 501 itself has two components separated by a prefix separator 506, which is a period. The first part of the Handle prefix is the Handle type 504. The second part of the Handle prefix is the Handle creator 505. The Handle type 504 identifies what type of Handle system is being used. When the Handle type 504 starts with a “10” the Handle is distinguished as being a DOI as opposed to any other implementation type of the Handle System. The next element of the prefix, separated by a period, is the Handle creator 505, which is a number (or string of characters) that is assigned to an organization that wishes to register DOIs. Together, these two elements 504 and 505 form the unique publisher prefix portion of the DOI. There is no limitation placed on the number of Handle (or specifically DOI) prefixes that any organization may choose to apply for. As a result, a publishing company, for example, might have a single DOI prefix 501, or might have a different one for each of its journals, or one for each of its imprints. While generally a prefix 501 may be a simple numeric string, the scope of the Handle System is not limited thereby. Thus, a prefix 501 may also utilize alphabetical characters or any other characters.
  • The [0095] suffix 502 is a unique string of alphanumeric characters, which, in conjunction with a particular prefix 501, uniquely identifies a piece of information. It should be appreciated that the combination of the prefix 501 for a publisher and the unique suffix 502 provided by the publisher avoids the need for the centralized allocation of DOI numbers. The suffix 502 may be any alphanumeric string that the publisher chooses, so long as it is unique among all suffixes registered in conjunction with the publisher's prefix.
  • FIG. 6 provides a view of another embodiment of the [0096] DOI 600, in which a textbook's ISBN number serves as the suffix 602. Consequently, where it is convenient, the publisher of the underlying content may choose to select as the suffix 602 any other identification code accorded to the original piece of content.
  • Enhanced DOI [0097]
  • FIG. 5 further illustrates an [0098] enhanced DOI 510 grammar. One non-limiting example embodiment of an enhancement to the DOI grammar is embodied as an enhanced prefix 511. However, it is fully contemplated that an alternative and/or complimentary enhanced suffix (not illustrated) may be similarly appended to the DOI 500. The enhanced prefix 511 is comprised of an enhancement grammar target 517 and enhancement separator 514, which is an “@” symbol, but it is understood any other character may be designated as the enhancement separator. The enhancement grammar target 517 may itself be any string of characters other than the enhancement separator 514. The enhancement grammar target 517 may be employed for the purpose of having the DOI 500 resolve to multiple versions of a specified information as will be described in greater detail throughout this disclosure. In a further enhanced embodiment, the enhancement grammar target 517 may itself be further comprised of an enhancement grammar verb 512 and enhancement grammar target object 513 separated by an enhancement target separator 516, e.g., a period. Of course the enhancement target separator 516 may be designated as any character(s). In one example embodiment, the enhancement grammar verb 512 acts as a modifier to select amongst a plurality of multiple resolution targets for a DOI, and the enhancement grammar target object 513 is a value passed to the target object and/or a Handle system resolution server for further action.
  • Handle System Metadata
  • A [0099] DOI 500 is merely an identification number that does not necessarily convey any information about its associated information. As a result, it is desirable to supplement the DOI with additional information regarding the addressed information to enable users to perform efficient and user-friendly searches for retrieving the desired content over a communications network. To allow easy identification of information, the present invention provides for the use of metadata, which is descriptive data about the identified information. While metadata may be any data-structure that is associated with a DOI, according to one embodiment, the metadata will be comprised of a few basic fields that can accurately and succinctly identify the published information. According to this embodiment, the metadata will comprise an identifier associated with the entity from a legacy identifier scheme such as the International Standard Book Number (ISBN) for a book, title of the published content, type of content being published (such as book, music, video, etc.), whether the content is original or a derivation, a primary author of the content, the role of the primary author in creating the content, the name of the publisher, and/or the like. As different types of content may require different metadata for describing it, one aspect of the DOI system envisions the use of different metadata for different types of content.
  • According to one example embodiment, metadata will be made available to any user of the DOI system to enable them to find the basic description of the entity that any particular DOI identifies. This basic description will allow the user to understand some basic things about the entity that published the content or the content itself. [0100]
  • As a result, to find out what information the DOI identifies, it is desirable to resolve it, and then review associated metadata because the DOI links the metadata with the content it identifies and with other metadata about the same or related content. In one embodiment, the metadata allows for the recognition of the information identified by the [0101] DOI 500 as well as its unambiguous specification. The metadata will also allow for the interaction between the information and other contents in the network (and with metadata about those entities).
  • DOI Information Access
  • FIGS. 7 and 8 provide an overview of the resolution mechanism for allowing users to access the desired information by merely providing the DOI to the DOI Handle system. Resolution in the present context includes the submitting of an identifier to a network service and receiving in return one or more pieces of current information related to the identifier. According to one embodiment of the DOI system, shown in FIG. 7, the user uses her web browser [0102] 700 client to point to content identified by a particular DOI 710. This DOI 710 has only one URL associated with it, and must resolve to that URL. As a result, when the user makes a request for underlying content identified by a particular DOI 710, the user is directed to URL 720, where the desired content lies.
  • As such, this mechanism allows the location of the information to be changed while maintaining the name of the entity as an actionable identifier. If the publisher changes the location of the content, the publisher must merely update the DOI's entry in the Handle System database to ensure that the existing [0103] DOI 710 points to the new location of the content. As a result, while the location of the content has changed, the DOI remains the same and users are able to access the content from its new location by using the existing DOI.
  • FIG. 8 provides an overview of a DOI system where users may use a DOI for resolving a request for one piece of content, out of a plurality of available identical copies of the same piece of content that are identified by the same DOI, as well as the location of data about the piece of content, and services associated with the content (such as purchasing the content). Thus, the user uses the web browser [0104] 800 and provides the necessary DOI 830. The DOI 830 may be structured to describe the type of service desired 835. As a result, the DOI system is able to resolve the particular piece of content 840 that the user desires to access.
  • FIG. 9 provides an overview of the sequence of actions that a user performs to access information, in accordance with the present invention. Initially, the user launches the [0105] browser client 900 on a computing device 905, such as personal computer, personal digital assistant (PDA), and/or the like. The user engages the browser 900 to make a DOI query. The DOI query is forwarded to the DOI Directory Server 910 over a communications network. The system of the DOI Directory Server 910 examines the DOI against the entries stored therein and forwards the appropriate URL to the browser 900 on the user's computer 900, in a manner that is invisible to the user. As a result, the browser is pointed to the desired content on a server with the appropriate publisher information 920. Finally, upon receipt of the request from the user's browser, the publisher 920 forwards the desired information to the user, which may be accessed in the browser client 900.
  • FIG. 10 provides a more complete view of the sequence of actions that a user performs to access content information, as shown in FIG. 9. As noted above, the user launches the [0106] browser client 1000 on a computing device 1005. The user engages the browser 1000 to make a DOI query. The DOI query is forwarded to the DOI Directory Server 1010 over the communications network. The system of the DOI Directory Server 1010 examines the DOI against the entries stored therein. As a result of the checking of the DOI against the entries stored in the DOI Directory Server 1010, the DOI Directory Server 1010 determines where the DOI must lead the user 1025. The appropriate URL for the content is automatically forwarded to the user's browser 1000, without any intermediate intervention or action by the user. As a result, the browser 1000 is pointed to the appropriate publisher 1020 whose server is addressed by the underlying URL. The URL is used by the publisher's server 1020 to determine the exact location for content desired by the user, and the publisher's server 1020 forwards the appropriate content 1030 to the user.
  • FIG. 11 provides an overview of some of the exemplary mechanisms for accessing information over a communications network by resolving a DOI to obtain the URL where the desired content is located, in accordance with the present invention. According to one embodiment, the user may directly provide the DOI and the DOI system retrieves and forwards the appropriate content to the user by simply linking to the appropriate URL. According to another embodiment, the user may provide information related to some of the fields included in the metadata, whereupon a DOI lookup service identifies the appropriate DOI, which in turn may be resolved to the desired content's location. As shown in FIG. 11, according to one embodiment, a [0107] search engine 11010 may be provided to a user. In one embodiment, the search engine is offered and disposed in communication with the registration agency's DOI and metadata database. In an alternative embodiment, a search engine such as www.google.com may be adapted to submit queries to the registration agency's databases. The user searches for the appropriate DOI by providing some identifying information to the search engine 11010. The search engine 11010 uses the identifying information provided and searches a database of metadata to retrieve the DOI associated with the provided metadata information. Thus the user conducting the search may be presented with returned DOIs from the metadata database and/or URLs resolved from said returned DOIs. The retrieved DOI is sent to the DOI directory 11011, which resolves the URL wherein the desired content is located by a publisher 11040. Finally, the user's browser is pointed to the appropriate content 11060.
  • According to another embodiment, the user may provide the [0108] DOI 11015 in the address window 11020 of a browser 11025. If the user's web browser is not capable of natively processing DOIs, then the DOI 11015 may contain the address of a proxy server for the DOI directory 11011, which in FIG. 11 is “dx.doi.org.” As a result, the browser is pointed to the DOI directory 11011 located at dx.doi.org, which resolves the URL at which the desired content is located by a publisher 11040 and points the user's browser thereto.
  • According to another embodiment, the DOI may be embedded in a document or some form of [0109] information 11030, whereupon clicking the DOI directs the user to the appropriate DOI directory 11011, which determines the URL at which the desired content is located and points the user's browser thereto.
  • According to another embodiment, the DOI may be provided on a [0110] memory 11040, such as a CD-ROM or a floppy disk, whereupon the memory may automatically, or upon being activated, direct the user to the appropriate DOI directory 11011, which resolves the URL at which the desired content is located and points the user's browser thereto.
  • According to yet another embodiment, the DOI may be provided in printed form to a user, who enters the DOI manually as above or by way of optical and/or mechanical peripheral input device. [0111]
  • FIG. 12 provides an overview of another embodiment of the exemplary mechanisms for retrieving information over a communications network, whereupon the DOI system resolves a DOI to obtain the URL where the desired information is located. According to this embodiment, a plurality of [0112] DOI directories 1210 exist as a distributed DOI directory and form a Handle System 1200. In one embodiment, the distributed DOI directory acts and responds to requests as if it were a singular directory 11011. Otherwise resolutions take place similarly as in FIG. 11.
  • FIG. 13 provides an overview of an exemplary DOI system, in accordance with the present invention, wherein the publishers, the DOI registration service and the Handle System collaborate together to create an efficient DOI system. The [0113] prefix holder 1355 may submit information to a DOI registration service 1300 comprising a DOI 1342 and associated metadata 1366. The prefix holder who has already been assigned a unique prefix 501, requests that a suffix 502 be assigned to a piece of content 1366. The registration service 1300 is responsible for parsing and/or reformatting the user's streams of submitted information 1342, 1366 for subsequent deposit in a Handle system 1350 and/or metadata database 1310. As noted above, the scope of the content that can be addressed using a DOI is unlimited. As a result, the content 1366 may comprise any information and work of authorship, including articles, books, music albums, or selected discrete portions thereof. In addition to providing a DOI 500, the publisher 1342 collects metadata for the content 1366. The metadata may comprise the content's DOI 500, a DOI genre, an identifier, title, type, origination, primary agent, agent's role, and/or the like. It may also comprise listings of associated services having to do with the identified piece of content offered by various parties, such as the locations of web pages where a piece of content may be purchased online.
  • Once the [0114] publisher 1342 has assigned the suffix 502 to the content 1366 and collected the necessary metadata, the DOI 500 and the metadata are transmitted to the DOI registration service 1300. The DOI registration service 1300 maintains a database of DOIs 500, metadata of all the registered content 1366, as well as the URL at which the content 1366 is located. According to the present invention, the DOI registration service 1300 forwards the metadata to a metadata database 1310, 119 c of FIG. 1, which may or may not be integrally maintained by the DOI registration service 1300.
  • The [0115] DOI registration service 1300 may use the collected metadata for providing it to other data services 1320 or for providing value added resources 1330 to the users. In addition, the DOI registration service 1300 sends the appropriate DOI Handle data to the Handle System 1350, which may comprise a plurality of DOI Directory Servers 1341.
  • Personal DOI Registration System Data Flow
  • FIG. 14 depicts a data flow diagram for a personal DOI registration system for tracking information access. A user [0116] 1401 may employ a client and/or peer for accessing information. The user is disposed in communication with a registration agency 1402, e.g., DOIAT 101. The handle system registration agency (hereinafter “registration agency”) 1402 in turn is disposed in communication with a user metadata database (hereinafter “MDDB”) 1403. The registration agency 1402 is also disposed in communication with a handle system 1404.
  • The personal DOI registration system allows a user to register a DOI that is to be associated with the user's person, the user's device representing his or her person, and/or the like. Registration of a DOI to represent one's person may be achieved in several ways, such as, but not limited to: obtaining personal information regarding all individual and saving it to a record in a [0117] personal DOI database 119 e of FIG. 1 and having the registered DOI resolve to said database record; obtaining personal information regarding an individual and saving it to a record in an MDDB, and/or the like.
  • The personal information may include, but is not limited to such fields as: Name of Individual, Address, Telephone Number, Social Security Number, Representative Hardware Device, Reference to Representative Hardware Device, Credit Information, Medical Information, Company Account Information, Custom Records, and/or the like. It should be noted that the above fields may store actual values or DOIs, e.g., the Reference to Representative Hardware Device may be either an IP address or a DOI. A representative hardware device may be any device that may communicate over a communications network. An individual may have several DOIs registered representing his/her person, or alternatively maintain a single universal DOI representing him/herself In some deployments, a DOI representing a person will be created by an entity other than the individual, e.g., a corporation, while in other deployments entities may make use of a DOI and accompanying personal information maintained by the individual him/herself. In an alternative embodiment, the facility of obtaining personal DOI information and storing it may be handled by a tertiary facility, e.g., a personal information database warehouse facility, that then engages and registers and obtains a referencing DOI for each personal record. [0118]
  • Personal DOI Registration System Logic Flow
  • FIG. 15 depicts a logic flow diagram for a personal DOI registration system for tracking information access. Initially, a user contacts a registration agency, e.g., an Information Access Registration Server (IARS), for registering DOIs associated with information. The user may contact the registration agency by web, telephone, and/or the like [0119] 1501. Upon contacting the registration agency 1501, the registration agency provides a mechanism to collect personal information with regard to the user 1502. In one non-limiting example embodiment, the registration agency provides a web form allowing the user to enter personal information for subsequent entry of a database record that will be associated with a registered DOI. In one non-limiting example embodiment, the personal information includes a desired user name and password, billing information, address, transaction information (as already discussed above), and/or the like.
  • Upon obtaining the user's [0120] personal information 1502, the registration agency generates a public and private encryption key pair for the user 1503. Any number of encryption techniques may be employed as already discussed in FIG. 1. Upon generating a public/private key pair for the user 1503, the registration agency will securely transmit the private key to the user across a communications network and then destroy that private key 1505. The private key securely may be transmitted by employing secure transfer protocols such as, but not limited to, https, SSL, digital certificates, and/or the like. In an alternative embodiment, the user's client/peer includes a facility to produce the public and private encryption key pair locally 1504. In yet another embodiment, the registration delegates generation of the keys to a tertiary server with a cryptographic server suited for such key production. Thus in the alternative, upon the registration agency collecting personal information 1502, the registration agency may request that the user generate a private key pair 1504. The user may submit the public key to the handle system 1506. Upon securely transmitting the private key to the user 1505, the registration system creates a record in the handle system representing the user, i.e., the personal DOI information, and including the public key that was generated 1503, 1507 and/or submitted 1506. Thus, a user's identity and key are associated with the user's person and/or user's representative device. Upon creating a handle record to resolve a DOI with a user 1507, the personal information that was collected earlier is added to the metadata database keyed under the DOI that was generated to represent the user 1508. Upon having his or her personal information added to the metadata database 1508, the user is informed of the new personal DOI representing the user's person 1509.
  • Public Key Infrastructure Authentication For Content Access System Data Flow
  • FIG. 16 depicts a public key infrastructure authentication for a content access system to track information access. In one non-limiting example embodiment, a user “X” [0121] 1601 may attempt to engage and/or access a piece of content “A” 1602. Content may be stored on a local storage device and/or like form of memory. The content itself contains a DOI 1602 a. Upon engaging and/or accessing the content, the user's client/peer will interpret the DOI from the content and generate an access request based on the content DOI with the handle system 1603. The user's client can so engage the handle system by simply reading the DOI tag 1602 a along with the rest of the accessed content. The user's client is designed to parse and respond to discerned DOI tags by requesting a DOI resolution of any identified DOI tags. Current media players may be augmented with such DOI response facilities through plug-ins, patches, and/or the like. For example, Windows Explorer, Microsoft Internet Explorer, Netscape Navigator, Windows Media Player, WinAmp, MusicMatch, and/or the like have published APIs and plug-in facilities allowing for such DOI resolution facilities to be integrated within.
  • Upon obtaining the DOI access request, the handle system will redirect the user's client to the rights clearinghouse responsible for managing digital rights for the accessed [0122] content 1604, e.g., DOIAT 101 of FIG. 1. In one non-limiting example embodiment, the user's client will provide various items to the rights clearinghouse 1604 to enable access to the content 1602 by way of a clear-rights message. For example, user X's client will supply the rights clearinghouse 1604 with: a DOI for content “A” (which may be obtained either from the content itself), and a DOI associated with user X (and/or, optionally, a digital certificate to the rights clearinghouse 1604). The rights clearinghouse 1604 maintains a storage device that contains a database and/or data-structure (hereinafter “rights DB”) 1605 associating content 1607 with user rights 1606. This association may be embodied in standard data structures such as, but not limited to: a (linked value paired) list, table(s), struct, and/or the like. The content table 1607 may store records of DOIs for content keyed to the user table 1606 or vice versa. Both the content table 1607 and user table 1606 store DOIs representing content and users, respectively. Either the content or user tables may be key fields as they are both guaranteed to contain unique values through registration with the handle system.
  • The rights clearinghouse may use the user's DOI, which was sent by and represents the user, to request a public key associated from the [0123] handle system 1603. In one non-limiting alternative embodiment, the clearinghouse 1604 makes this request employing an enhanced DOI grammar and multiple-resolution, e.g., get.publicEncryptionKey@DOI. The handle system 1603 returns the public encryption key to the clearinghouse 1604 based on the user's DOI 1601. Alternatively, the handle system 1603 will redirect the clearinghouse 1604 to obtain the public encryption key associated with the user's DOI from a tertiary source housing users' public encryption keys.
  • Obtaining the user's public key allows the clearinghouse to determine the identity of the user, and send information securely back only to the intended/authorized user. In one non-limiting alternative embodiment, this may be achieved by the rights clearinghouse using the obtained public key to decrypt the digital certificate that was optionally provided by the user. The decrypted digital certificate may include a password, or other verification information that may required for further action by the rights clearinghouse for added security purposes. Upon verifying the user's identity if at all, the [0124] clearinghouse 1604 may query its rights DB 1605 based on information supplied by the user in its clear-rights message. Namely, the user supplied user DOI and content DOI may be used by the rights clearinghouse 1604 to query the rights DB 1605 to further determine if a given user has rights for a given item of content. For example, if user X supplies the rights clearinghouse 1604 with a content DOI “A” and the user's DOI “X,” then the rights clearinghouse will identify that user X does have certain rights for content A in the rights DB 1605. When a user is found to have rights in an item of content, the rights clearinghouse will retrieve access/decryption materials from the rights DB 1605 to enable the user to make use of and/or access the requested content 1602. This may be achieved by simply reading a Rights_Access field from the appropriate field resulting from the rights DB query.
  • Optionally, the [0125] rights clearinghouse 1604 may then encrypt the access/decryption materials for the requested content, e.g., content “A,” with the user's, e.g., X's, associated public encryption key that was retrieved by resolution of the user's DOI. The rights clearinghouse 1604 may then use the user's DOI and engage the handle system 1603 to resolve to the user's location, e.g., IP address. Upon resolving to the user's location by way of the user's DOI, the access/decryption materials for the requested content are forwarded to the user's client 1601. Using the user's DOI at the clearinghouse 1604 for resolution further ensures that the appropriate user is provided with the access/decryption materials. Optionally, if the access/decryption materials sent by the clearinghouse 1604 are themselves encrypted with the user's public key associated with the user's DOI, then the user's client 1601 may use the user's private key to decrypt the access/decryption materials. Thereafter, the access/decryption materials may be used by the user's client(s) to engage and/or otherwise access the accessed content 1602.
  • It should be noted that records in the content table [0126] 1607 may be modified with an entry indicating the content was accessed/used (including the time of use by a particular user), and similarly that records in the user table 1607 may be modified with an entry indicating the user accessed/used content (including the time of use). Such tracking of use allows for aggregating use reports, tracking the amount of use by user, by content item, by time, and/or other such attributes.
  • Public Key Infrastructure Authentication For Content Access System Logic Flow
  • FIG. 17 depicts a logic flow diagram for a public key infrastructure for content access for information tracking. In one non-limiting example embodiment, a user accesses [0127] content 1701. The user may access and/or open up content by employing a peer, a client, an application, and/or the like. Upon the user accessing the content 1701, the Public Key Infrastructure (PKI) authentication system determines if the content has an embedded DOI 1702. If the content does not have an embedded DOI 1702, then the peer provides access to the content 1704. If the content does have an embedded DOI 1702, then the PKI authentication system determines if the content is encrypted 1703. If the content is not encrypted 1703, then the PKI authentication system provides access to the content 1704. If the content is encrypted 1703, then the PKI authentication system determines if a personal DOI exists on the user's key ring that is accessible by way of the user's system 1705. A key ring may simply hold a singular and/or a plurality of validation and/or authentication mechanisms such as, but not limited to: passwords, digital certificates, (personal) DOIs, and/or the like. A key ring may be embodied in a simple file, in a cookie, in an encrypted file and/or the like.
  • If no DOI representing the user's person is found on a [0128] key ring 1705, then the PKI authentication system determines if the user has a DOI representing his or her person 1706. This may be determined by querying a metadata database based on the user's personal information and examining if personal DOIs result. If the user has no personal DOI representing his or her person, then a personal DOI registration process is initiated 1707 as discussed above in FIG. 15. If a person does have a DOI representing his or her person 1706, then the user is prompted for their personal DOI 1708. Any number of mechanisms may be employed to obtain the person's personal DOI such as a text entry field 1708. Upon prompting and obtaining a user's personal DOI 1708, the PKI authentication system issues a request for a redirect based on the requested content's DOI 1709. Alternatively, if the user's personal DOI was available on a key ring 1705, the PKI authentication system will issue a request for content based on the person's DOI thereafter 1709.
  • Upon issuing an access request for content based on a [0129] content DOI 1709, the PKI authentication system obtains a redirect from the handle system identifying an appropriate clearinghouse that will supply access/decrypt materials (i.e., access credentials) to the user's client that will enable access to the accessed content 1710. In one non-limiting example embodiment, access credentials are materials enabling access to the content such as, but not limited to: access codes, decryption keys, digital certificates, DOIs, passwords, and/or the like. Upon being redirected by the handle system 1710, the user's client will contact the rights clearinghouse 1711. Upon contacting the rights clearinghouse 1711, the rights clearinghouse will verify the user's identify and access rights 1712. The rights clearinghouse may verify the user's identity because the client provided the rights clearinghouse with client verification information 1712. Client verification information comprises the user's personal DOI, the DOI representing the desired content to be accessed; and client verification information may also include: a digital certificate, passwords, access codes, encryption keys, DOI verification information, and/or the like. It should be noted that enhanced DOI grammar may be used to reference the client verification information; e.g., validate.key1@ClientPersonalDOI, decrypt.key2@DesiredContentDOI, etc. The rights clearinghouse may use the client's DOI to resolve to verification information via the Handle System and use that information to either decrypt verification information provided by the client, compare to verification information provided by the client, and/or the like. Upon successfully determining that the client is who he/she/it claims to be, then the rights clearinghouse may determine if the client has rights to access the desired content. This may be achieved in a number of ways such as, but not limited to: resolving the content DOI to see if there is an entry showing the user has rights to use the content, resolving the client DOI to see if there is an entry to unlock the desired content, simply querying a rights access database for the client's entry, and/or the like. Upon verifying the user's identity and access rights 1712, the rights clearinghouse provides access credentials to the user's client 1713. Upon obtaining access credentials from the rights clearinghouse 1713, the user's client may decrypt and/or access the desired content by employing the access credentials that were received from the rights clearinghouse.
  • Chained Referencing of Security Information [0130]
  • It should be noted that security information such as access credentials, validation information, verification information, and/or the like may also be registered with a DOI in the handle system. For example, a DOI may be assigned to a digital certificate, a decryption key, or even a password. Thus, not only may a DOI be the source of validation and access requests, but it may also be the target of such requests. In this “chained referencing” manner, an enhanced DOI access request, e.g., get.publicEncryptionKey@DOI, may return the DOI for a public decryption key instead of a URL to the public decryption key or the public decryption key itself. [0131]
  • In one non-limiting example embodiment, such chained referencing of security information may be used to enhance security. Such a security system moves the actual security information itself, e.g., encryption keys, periodically from server to server as a security measure. The chained referencing and employment of DOIs for the security information prevents all the programs and systems that reference the security information, e.g., keys, from suddenly “breaking” because the URLs or location addresses have changed. In another example embodiment, such chained referencing may be applied to to an authentication record (within the handle system) itself. The chained referencing permits the creator or owner of the authentication record itself to create their own multiple-resolution options associated with that DOI. Example resolution options associated with the authentication record itself may include, but are not limited to: returning a value of a public key; returning additional information (e.g., metadata) about the owner of security information (e.g., a key); returning additional information (e.g., metadata) about the security information itself (e.g., when it was created, under what terms, with what level of security clearance, etc.). [0132]
  • It should be understood that the above description is only representative of illustrative embodiments. For the convenience of the reader, the above descriptions have focused on a representative sample of all possible embodiments, a sample that teaches the principles of the invention. The description has not attempted to exhaustively enumerate all possible variations. That alternate embodiments may not have been presented for a specific portion of the invention or that further undescribed alternate embodiments may be available for a portion is not to be considered a disclaimer of those alternate embodiments. It will be appreciated that many of those undescribed embodiments incorporate the same principles of the invention and others are equivalent. Thus, it is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented without departing from the scope and spirit of the invention. [0133]

Claims (352)

What is claimed is:
1. A method of using at least one computer to effect access to information, comprising:
collecting information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
generating an unique, persistent, and universal name identifier (UPUNI) for the EREI;
storing the collected entity information in a database record in a database, wherein the database record storing the collected entity information is keyed by the generated UPUNI, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
generating validation information for the EREI;
transmitting validation information to an access device of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
deleting the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information;
transmitting validation information to the UPUNI-REG, if another device generated the validation information;
storing the generated validation information in a database record in a database, wherein the database record storing the generated validation information is keyed by the generated UPUNI, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
registering a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein the reference to related information is entered in a database record keyed by the generated UPUNI, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information, wherein in the entity information is related information, and wherein the validation information is related information.
2. A method of using at least one computer to effect access to information, comprising:
effecting collection of information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
effecting generation of an unique, persistent, and universal name identifier (UPUNI);
effecting storage of the collected entity information in a database record in a database;
effecting generation of validation information;
effecting transmission of validation information to access devices of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
effecting transmission of validation information to the UPUNI-REG, if the another device generated the validation information;
effecting storage of the generated validation information in a database record in a database;
effecting registration of a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein in the entity information is related information, and wherein the validation information is related information.
3. The method of claim 1, wherein entity information value fields may include: name of entity, address, telephone number, access device, reference to access device, social security number, credit information, medical information, company account information, custom fields, custom records.
4. The method of claim 1, wherein the entity information value fields include UPUNI information.
5. The method of claim 1, wherein the entity information is an UPUNI that resolves to other validation information.
6. The method of claim 1, wherein the UPUNI is generated for the EREI.
7. The method of claim 1, wherein the UPUNI is generated for the related information.
8. The method of claim 1, wherein the database record storing the collected entity information is keyed by the generated UPUNI.
9. The method of claim 1, wherein the database storing the collected entity information holds UPUNI and entity information (EI-UPUNI-DB).
10. The method of claim 1, wherein the database storing the collected entity information is a metadata database (MDDB).
11. The method of claim 1, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
12. The method of claim 1, wherein the entity information is stored in an UPUNI-RES.
13. The method of claim 1, wherein the entity information is stored in an UPUNI-REG.
14. The method of claim 1, wherein the database record storing the generated validation information is keyed by the generated UPUNI.
15. The method of claim 1, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
16. The method of claim 1, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
17. The method of claim 1, wherein the validation information is an UPUNI that resolves to other validation information.
18. The method of claim 1, wherein an UPUNI-REG generates the validation information.
19. The method of claim 1, wherein an UPUNI-REG requests that another device generate the validation information.
20. The method of claim 19, wherein the other devices are access devices of the ERIE.
21. The method of claim 1, wherein a transmission is secure.
22. The method of claim 1, wherein a transmission of the validation information is limited to a private key of a generated private and public encryption key pair.
23. The method of claim 1, wherein a transmission of the validation information is limited to a public key of a generated private and public encryption key pair.
24. The method of claim 1, further comprising:
effecting deletion of the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information.
25. The method of claim 24, wherein the deleted validation information is limited to a private key of a generated private and public encryption key pair.
26. The method of claim 1, wherein the database storing the generated validation information holds UPUNI and validation information (VI-UPUNI-DB).
27. The method of claim 1, wherein the database storing the generated validation information is a metadata database (MDDB).
28. The method of claim 1, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
29. The method of claim 1, wherein the validation information is stored in an UPUNI-RES.
30. The method of claim 1, wherein the validation information is stored in an UPUNI-REG.
31. The method of claim 1, wherein the UPUNI registration of the reference to related information is effected by an UPUNI-REG.
32. The method of claim 1, wherein the reference to related information may be a location address.
33. The method of claim 1, wherein the reference to related information may be an UPUNI.
34. The method of claim 1, wherein the reference to related information may be a pointer.
35. The method of claim 1, wherein the reference to related information is entered in a database record keyed by the generated UPUNI.
36. The method of claim 1, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information.
37. The method of claim 1, wherein as a consequence of the registration, the entity is represented by the UPUNI (E-UPUNI).
38. The method of claim 1, wherein the registered UPUNI references the related information.
39. The method of claim 1, wherein as a consequence of the registration, the UPUNI, EREI, related information, and references to related information, are interrelated components (associated information).
40. The method of claim 39, wherein the interrelatedness of the associated information allows for the identification of any component of the associated information from any other components of the associated information.
41. The method of claim 39, wherein the UPUNI is generated for the associated information.
42. The method of claim 39, wherein an UPUNI may be registered to reference the verification information.
43. The method of claim 39, wherein an enhanced UPUNI grammar is used for the associated information.
44. The method of claim 39, wherein the associated information is an UPUNI that resolves to other associated information.
45. The method of claim 1, wherein an UPUNI may be registered to reference the validation information.
46. The method of claim 1, wherein an enhanced UPUNI grammar is used for the related information.
47. The method of claim 1, wherein the UPUNI is unique in the UPUNI-RES.
48. A method of using at least one computer to effect access to information, comprising:
determining if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
accessing the desired information, if the UPUNI is absent from the desired information;
determining if the desired information is inaccessible, wherein the desired information is inaccessible because the desired information is protected;
determining if there exists an UPUNI that represents the entity (E-UPUNI);
effecting the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
effecting resolution of the entity device to the desired information's UPUNI (DI-UPUNI), if an E-UPUNI exists, wherein the DI-UPUNI resolution directs the entity device to a rights clearinghouse;
sending entity verification information, wherein the E-UPUNI is entity verification information, wherein the DI-UPUNI is entity verification information, wherein the entity verification information is sent to the rights clearinghouse by the entity device;
effecting verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification), wherein the rights clearinghouse verifies the entity verification information;
receiving access credentials, if the entity's identity and access rights to the desired content are verified, wherein the access credentials are received by the entity device from the rights clearinghouse;
applying the received access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible;
accessing of the desired information, if the desired information is accessible.
49. A method of using at least one computer to effect access to information, comprising:
effecting determination of if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
effecting determination of if the desired information is inaccessible;
effecting determination of if there exists an UPUNI that represents the entity (E-UPUNI);
effecting the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
effecting the resolution of the entity device to the desired information's UPUNI (DI-UPUNI);
effecting the provision of entity verification information;
effecting verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification);
effecting provision of access credentials, if the entity's identity and access rights to the desired content are verified.
50. The method of claim 49, further comprising:
effecting the access of the desired information, if the UPUNI is absent from the desired information.
51. The method of claim 49, wherein the desired information is inaccessible because the desired information is protected.
52. The method of claim 51, wherein the desired information is protected with encryption.
53. The method of claim 49, wherein the desired information is an UPUNI that resolves to other desired information.
54. The method of claim 49, wherein the entity device resolves to the DI-UPUNI, only if an E-UPUNI exists.
55. The method of claim 49, wherein the DI-UPUNI resolution directs the entity device to an access tracking system (ATS).
56. The method of claim 49, wherein the DI-UPUNI resolution directs the entity to a rights clearinghouse.
57. The method of claim 49, wherein the E-UPUNI is entity verification information.
58. The method of claim 49, wherein the DI-UPUNI is entity verification information.
59. The method of claim 49, wherein a digital certificate of the entity is entity verification information.
60. The method of claim 49, wherein a password of the entity is entity verification information.
61. The method of claim 49, wherein an access code of the entity is entity verification information.
62. The method of claim 49, wherein the verification information is an UPUNI that resolves to other verification information.
63. The method of claim 49, wherein the entity verification information is provided to an access tracking system (ATS).
64. The method of claim 49, wherein the entity verification information is provided to a rights clearinghouse.
65. The method of claim 49, wherein an access tracking system (ATS) verifies the entity verification information.
66. The method of claim 49, wherein a rights clearinghouse verifies the entity verification information.
67. The method of claim 49, wherein entity verification is achieved employing UPUNI resolution.
68. The method of claim 49, wherein an enhanced UPUNI grammar is employed for entity verification.
69. The method of claim 49, wherein the access credentials are provided to the entity device.
70. The method of claim 49, wherein a rights clearinghouse provides the access credentials.
71. The method of claim 49, wherein an access tracking system (ATS) provides the access credentials.
72. The method of claim 49, wherein access codes are access credentials.
73. The method of claim 49, wherein decryption keys are access credentials.
74. The method of claim 49, wherein digital certificates are access credentials.
75. The method of claim 49, wherein UPUNIs are access credentials.
76. The method of claim 49, wherein passwords are access credentials.
77. The method of claim 49, wherein the access credentials are an UPUNI that resolves to other access credentials.
78. The method of claim 49, wherein an enhanced UPUNI grammar is employed for applying access credentials.
79. The method of claim 49, further comprising:
effecting application of the provided access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible.
80. The method of claim 49, further comprising:
effecting the access of the desired information, if the desired information is accessible.
81. The method of claim 49, wherein an UPUNI may be registered to reference the access credentials.
82. The method of claim 49, wherein an UPUNI may be registered to reference the verification information.
83. A memory for access by a program module to be executed on a processor, comprising:
a data structure stored in the memory, the data structure having interrelated data types, including,
a data type to store an unique, persistent, and universal name identifier (UPUNI) associated with information an entity desires (desired information) to access (DI-UPUNI);
a data type to store an UPUNI associated with an entity (E-UPUNI).
84. The memory of claim 83, further comprising:
a data type to store validation information, wherein the validation information was generated for the entity represented by entity information (EREI), wherein the validation information is associated with the E-UPUNI.
85. The memory of claim 84, wherein the data type to store validation information may store an UPUNI that resolves to other validation information.
86. A system for using at least one computer to effect access to information, comprising:
means to collect information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
means to generate an unique, persistent, and universal name identifier (UPUNI) for the EREI;
means to store the collected entity information in a database record in a database, wherein the database record storing the collected entity information is keyed by the generated UPUNI, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
means to generate validation information for the EREI;
means to transmit validation information to an access device of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
means to delete the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information;
means to transmit validation information to the UPUNI-REG, if another device generated the validation information;
means to store the generated validation information in a database record in a database, wherein the database record storing the generated validation information is keyed by the generated UPUNI, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
means to register a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein the reference to related information is entered in a database record keyed by the generated UPUNI, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information, wherein in the entity information is related information, and wherein the validation information is related information.
87. A system for using at least one computer to effect access to information, comprising:
means to effect collection of information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
means to effect generation of an unique, persistent, and universal name identifier (UPUNI);
means to effect storage of the collected entity information in a database record in a database;
means to effect generation of validation information;
means to effect transmission of validation information to access devices of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
means to effect transmission of validation information to the UPUNI-REG, if the another device generated the validation information;
means to effect storage of the generated validation information in a database record in a database;
means to effect registration of a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein in the entity information is related information, and wherein the validation information is related information.
88. The system of claim 87, wherein entity information value fields may include: name of entity, address, telephone number, access device, reference to access device, social security number, credit information, medical information, company account information, custom fields, custom records.
89. The system of claim 87, wherein the entity information value fields include UPUNI information.
90. The system of claim 87, wherein the entity information is an UPUNI that resolves to other validation information.
91. The system of claim 87, wherein the UPUNI is generated for the EREI.
92. The system of claim 87, wherein the UPUNI is generated for the related information.
93. The system of claim 87, wherein the database record storing the collected entity information is keyed by the generated UPUNI.
94. The system of claim 87, wherein the database storing the collected entity information holds UPUNI and entity information (EI-UPUNI-DB).
95. The system of claim 87, wherein the database storing the collected entity information is a metadata database (MDDB).
96. The system of claim 87, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
97. The system of claim 87, wherein the entity information is stored in an UPUNI-RES.
98. The system of claim 87, wherein the entity information is stored in an UPUNI-REG.
99. The system of claim 87, wherein the database record storing the generated validation information is keyed by the generated UPUNI.
100. The system of claim 87, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
101. The system of claim 87, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
102. The system of claim 87, wherein the validation information is an UPUNI that resolves to other validation information.
103. The system of claim 87, wherein an UPUNI-REG generates the validation information.
104. The system of claim 87, wherein an UPUNI-REG requests that another device generate the validation information.
105. The system of claim 104, wherein the other devices are access devices of the ERIE.
106. The system of claim 87, wherein a transmission is secure.
107. The system of claim 87, wherein a transmission of the validation information is limited to a private key of a generated private and public encryption key pair.
108. The system of claim 87, wherein a transmission of the validation information is limited to a public key of a generated private and public encryption key pair.
109. The system of claim 87, further comprising:
means to effect deletion of the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information.
110. The system of claim 109, wherein the deleted validation information is limited to a private key of a generated private and public encryption key pair.
111. The system of claim 87, wherein the database storing the generated validation information holds UPUNI and validation information (VI-UPUNI-DB).
112. The system of claim 87, wherein the database storing the generated validation information is a metadata database (MDDB).
113. The system of claim 87, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
114. The system of claim 87, wherein the validation information is stored in an UPUNI-RES.
115. The system of claim 87, wherein the validation information is stored in an UPUNI-REG.
116. The system of claim 87, wherein the UPUNI registration of the reference to related information is effected by an UPUNI-REG.
117. The system of claim 87, wherein the reference to related information may be a location address.
118. The system of claim 87, wherein the reference to related information may be an UPUNI.
119. The system of claim 87, wherein the reference to related information may be a pointer.
120. The system of claim 87, wherein the reference to related information is entered in a database record keyed by the generated UPUNI.
121. The system of claim 87, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information.
122. The system of claim 87, wherein as a consequence of the registration, the entity is represented by the UPUNI (E-UPUNI).
123. The system of claim 87, wherein the registered UPUNI references the related information.
124. The system of claim 87, wherein as a consequence of the registration, the UPUNI, EREI, related information, and references to related information, are interrelated components (associated information).
125. The system of claim 124, wherein the interrelatedness of the associated information allows for the identification of any component of the associated information from any other components of the associated information.
126. The system of claim 124, wherein the UPUNI is generated for the associated information.
127. The system of claim 124, wherein an UPUNI may be registered to reference the verification information.
128. The system of claim 124, wherein an enhanced UPUNI grammar is used for the associated information.
129. The system of claim 124, wherein the associated information is an UPUNI that resolves to other associated information.
130. The system of claim 87, wherein an UPUNI may be registered to reference the validation information.
131. The system of claim 87, wherein an enhanced UPUNI grammar is used for the related information.
132. The system of claim 87, wherein the UPUNI is unique in the UPUNI-RES.
133. A system for using at least one computer to effect access to information, comprising:
means to determine if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
means to access the desired information, if the UPUNI is absent from the desired information;
means to determine if the desired information is inaccessible, wherein the desired information is inaccessible because the desired information is protected;
means to determine if there exists an UPUNI that represents the entity (E-UPUNI);
means to effect the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
means to effect resolution of the entity device to the desired information's UPUNI (DI-UPUNI), if an E-UPUNI exists, wherein the DI-UPUNI resolution directs the entity device to a rights clearinghouse;
means to send entity verification information, wherein the E-UPUNI is entity verification information, wherein the DI-UPUNI is entity verification information, wherein the entity verification information is sent to the rights clearinghouse by the entity device;
means to effect verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification), wherein the rights clearinghouse verifies the entity verification information;
means to receive access credentials, if the entity's identity and access rights to the desired content are verified, wherein the access credentials are received by the entity device from the rights clearinghouse;
means to apply the received access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible;
means to access of the desired information, if the desired information is accessible.
134. A system for using at least one computer to effect access to information, comprising:
means to effect determination of if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
means to effect determination of if the desired information is inaccessible;
means to effect determination of if there exists an UPUNI that represents the entity (E-UPUNI);
means to effect the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
means to effect the resolution of the entity device to the desired information's UPUNI (DI-UPUNI);
means to effect the provision of entity verification information;
means to effect verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification);
means to effect provision of access credentials, if the entity's identity and access rights to the desired content are verified.
135. The system of claim 134, further comprising:
means to effect the access of the desired information, if the UPUNI is absent from the desired information.
136. The system of claim 134, wherein the desired information is inaccessible because the desired information is protected.
137. The system of claim 136, wherein the desired information is protected with encryption.
138. The system of claim 134, wherein the desired information is an UPUNI that resolves to other desired information.
139. The system of claim 134, wherein the entity device resolves to the DI-UPUNI, only if an E-UPUNI exists.
140. The system of claim 134, wherein the DI-UPUNI resolution directs the entity device to an access tracking system (ATS).
141. The system of claim 134, wherein the DI-UPUNI resolution directs the entity to a rights clearinghouse.
142. The system of claim 134, wherein the E-UPUNI is entity verification information.
143. The system of claim 134, wherein the DI-UPUNI is entity verification information.
144. The system of claim 134, wherein a digital certificate of the entity is entity verification information.
145. The system of claim 134, wherein a password of the entity is entity verification information.
146. The system of claim 134, wherein an access code of the entity is entity verification information.
147. The system of claim 134, wherein the verification information is an UPUNI that resolves to other verification information.
148. The system of claim 134, wherein the entity verification information is provided to an access tracking system (ATS).
149. The system of claim 134, wherein the entity verification information is provided to a rights clearinghouse.
150. The system of claim 134, wherein an access tracking system (ATS) verifies the entity verification information.
151. The system of claim 134, wherein a rights clearinghouse verifies the entity verification information.
152. The system of claim 134, wherein entity verification is achieved employing UPUNI resolution.
153. The system of claim 134, wherein an enhanced UPUNI grammar is employed for entity verification.
154. The system of claim 134, wherein the access credentials are provided to the entity device.
155. The system of claim 134, wherein a rights clearinghouse provides the access credentials.
156. The system of claim 134, wherein an access tracking system (ATS) provides the access credentials.
157. The system of claim 134, wherein access codes are access credentials.
158. The system of claim 134, wherein decryption keys are access credentials.
159. The system of claim 134, wherein digital certificates are access credentials.
160. The system of claim 134, wherein UPUNIs are access credentials.
161. The system of claim 134, wherein passwords are access credentials.
162. The system of claim 134, wherein the access credentials are an UPUNI that resolves to other access credentials.
163. The system of claim 134, wherein an enhanced UPUNI grammar is employed for applying access credentials.
164. The system of claim 134, further comprising:
means to effect application of the provided access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible.
165. The system of claim 134, further comprising:
means to effect the access of the desired information, if the desired information is accessible.
166. The system of claim 134, wherein an UPUNI may be registered to reference the access credentials.
167. The system of claim 134, wherein an UPUNI may be registered to reference the verification information
168. A program stored on a medium readable by a processor, the program, comprising:
a module to collect information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
a module to generate an unique, persistent, and universal name identifier (UPUNI) for the EREI;
a module to store the collected entity information in a database record in a database, wherein the database record storing the collected entity information is keyed by the generated UPUNI, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
a module to generate validation information for the EREI;
a module to transmit validation information to an access device of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
a module to delete the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information;
a module to transmit validation information to the UPUNI-REG, if another device generated the validation information;
a module to store the generated validation information in a database record in a database, wherein the database record storing the generated validation information is keyed by the generated UPUNI, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
a module to register a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein the reference to related information is entered in a database record keyed by the generated UPUNI, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information, wherein in the entity information is related information, and wherein the validation information is related information.
169. A program stored on a medium readable by a processor, the program, comprising:
a module to effect collection of information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
a module to effect generation of an unique, persistent, and universal name identifier (UPUNI);
a module to effect storage of the collected entity information in a database record in a database;
a module to effect generation of validation information;
a module to effect transmission of validation information to access devices of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
a module to effect transmission of validation information to the UPUNI-REG, if the another device generated the validation information;
a module to effect storage of the generated validation information in a database record in a database;
a module to effect registration of a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein in the entity information is related information, and wherein the validation information is related information.
170. The medium of claim 169, wherein entity information value fields may include: name of entity, address, telephone number, access device, reference to access device, social security number, credit information, medical information, company account information, custom fields, custom records.
171. The medium of claim 169, wherein the entity information value fields include UPUNI information.
172. The medium of claim 169, wherein the entity information is an UPUNI that resolves to other validation information.
173. The medium of claim 169, wherein the UPUNI is generated for the EREI.
174. The medium of claim 169, wherein the UPUNI is generated for the related information.
175. The medium of claim 169, wherein the database record storing the collected entity information is keyed by the generated UPUNI.
176. The medium of claim 169, wherein the database storing the collected entity information holds UPUNI and entity information (EI-UPUNI-DB).
177. The medium of claim 169, wherein the database storing the collected entity information is a metadata database (MDDB).
178. The medium of claim 169, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
179. The medium of claim 169, wherein the entity information is stored in an UPUNI-RES.
180. The medium of claim 169, wherein the entity information is stored in an UPUNI-REG.
181. The medium of claim 169, wherein the database record storing the generated validation information is keyed by the generated UPUNI.
182. The medium of claim 169, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
183. The medium of claim 169, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
184. The medium of claim 169, wherein the validation information is an UPUNI that resolves to other validation information.
185. The medium of claim 169, wherein an UPUNI-REG generates the validation information.
186. The medium of claim 169, wherein an UPUNI-REG requests that another device generate the validation information.
187. The medium of claim 186, wherein the other devices are access devices of the ERIE.
188. The medium of claim 169, wherein a transmission is secure.
189. The medium of claim 169, wherein a transmission of the validation information is limited to a private key of a generated private and public encryption key pair.
190. The medium of claim 169, wherein a transmission of the validation information is limited to a public key of a generated private and public encryption key pair.
191. The medium of claim 169, further comprising:
a module to effect deletion of the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information.
192. The medium of claim 191, wherein the deleted validation information is limited to a private key of a generated private and public encryption key pair.
193. The medium of claim 169, wherein the database storing the generated validation information holds UPUNI and validation information (VI-UPUNI-DB).
194. The medium of claim 169, wherein the database storing the generated validation information is a metadata database (MDDB).
195. The medium of claim 169, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
196. The medium of claim 169, wherein the validation information is stored in an UPUNI-RES.
197. The medium of claim 169, wherein the validation information is stored in an UPUNI-REG.
198. The medium of claim 169, wherein the UPUNI registration of the reference to related information is effected by an UPUNI-REG.
199. The medium of claim 169, wherein the reference to related information may be a location address.
200. The medium of claim 169, wherein the reference to related information may be an UPUNI.
201. The medium of claim 169, wherein the reference to related information may be a pointer.
202. The medium of claim 169, wherein the reference to related information is entered in a database record keyed by the generated UPUNI.
203. The medium of claim 169, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information.
204. The medium of claim 169, wherein as a consequence of the registration, the entity is represented by the UPUNI (E-UPUNI).
205. The medium of claim 169, wherein the registered UPUNI references the related information.
206. The medium of claim 169, wherein as a consequence of the registration, the UPUNI, EREI, related information, and references to related information, are interrelated components (associated information).
207. The medium of claim 206, wherein the interrelatedness of the associated information allows for the identification of any component of the associated information from any other components of the associated information.
208. The medium of claim 206, wherein the UPUNI is generated for the associated information.
209. The medium of claim 206, wherein an UPUNI may be registered to reference the verification information.
210. The medium of claim 206, wherein an enhanced UPUNI grammar is used for the associated information.
211. The medium of claim 206, wherein the associated information is an UPUNI that resolves to other associated information.
212. The medium of claim 169, wherein an UPUNI may be registered to reference the validation information.
213. The medium of claim 169, wherein an enhanced UPUNI grammar is used for the related information.
214. The medium of claim 169, wherein the UPUNI is unique in the UPUNI-RES.
215. A program stored on a medium readable by a processor, the program, comprising:
a module to determine if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
a module to access the desired information, if the UPUNI is absent from the desired information;
a module to determine if the desired information is inaccessible, wherein the desired information is inaccessible because the desired information is protected;
a module to determine if there exists an UPUNI that represents the entity (E-UPUNI);
a module to effect the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
a module to effect resolution of the entity device to the desired information's UPUNI (DI-UPUNI), if an E-UPUNI exists, wherein the DI-UPUNI resolution directs the entity device to a rights clearinghouse;
a module to send entity verification information, wherein the E-UPUNI is entity verification information, wherein the DI-UPUNI is entity verification information, wherein the entity verification information is sent to the rights clearinghouse by the entity device;
a module to effect verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification), wherein the rights clearinghouse verifies the entity verification information;
a module to receive access credentials, if the entity's identity and access rights to the desired content are verified, wherein the access credentials are received by the entity device from the rights clearinghouse;
a module to apply the received access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible;
a module to access of the desired information, if the desired information is accessible.
216. A program stored on a medium readable by a processor, the program, comprising:
a module to effect determination of if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
a module to effect determination of if the desired information is inaccessible;
a module to effect determination of if there exists an UPUNI that represents the entity (E-UPUNI);
a module to effect the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
a module to effect the resolution of the entity device to the desired information's UPUNI (DI-UPUNI);
a module to effect the provision of entity verification information;
a module to effect verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification);
a module to effect provision of access credentials, if the entity's identity and access rights to the desired content are verified.
217. The medium of claim 216, further comprising:
a module to effect the access of the desired information, if the UPUNI is absent from the desired information.
218. The medium of claim 216, wherein the desired information is inaccessible because the desired information is protected.
219. The medium of claim 218, wherein the desired information is protected with encryption.
220. The medium of claim 216, wherein the desired information is an UPUNI that resolves to other desired information.
221. The medium of claim 216, wherein the entity device resolves to the DI-UPUNI, only if an E-UPUNI exists.
222. The medium of claim 216, wherein the DI-UPUNI resolution directs the entity device to an access tracking system (ATS).
223. The medium of claim 216, wherein the DI-UPUNI resolution directs the entity to a rights clearinghouse.
224. The medium of claim 216, wherein the E-UPUNI is entity verification information.
225. The medium of claim 216, wherein the DI-UPUNI is entity verification information.
226. The medium of claim 216, wherein a digital certificate of the entity is entity verification information.
227. The medium of claim 216, wherein a password of the entity is entity verification information.
228. The medium of claim 216, wherein an access code of the entity is entity verification information.
229. The medium of claim 216, wherein the verification information is an UPUNI that resolves to other verification information.
230. The medium of claim 216, wherein the entity verification information is provided to an access tracking system (ATS).
231. The medium of claim 216, wherein the entity verification information is provided to a rights clearinghouse.
232. The medium of claim 216, wherein an access tracking system (ATS) verifies the entity verification information.
233. The medium of claim 216, wherein a rights clearinghouse verifies the entity verification information.
234. The medium of claim 216, wherein entity verification is achieved employing UPUNI resolution.
235. The medium of claim 216, wherein an enhanced UPUNI grammar is employed for entity verification.
236. The medium of claim 216, wherein the access credentials are provided to the entity device.
237. The medium of claim 216, wherein a rights clearinghouse provides the access credentials.
238. The medium of claim 216, wherein an access tracking system (ATS) provides the access credentials.
239. The medium of claim 216, wherein access codes are access credentials.
240. The medium of claim 216, wherein decryption keys are access credentials.
241. The medium of claim 216, wherein digital certificates are access credentials.
242. The medium of claim 216, wherein UPUNIs are access credentials.
243. The medium of claim 216, wherein passwords are access credentials.
244. The medium of claim 216, wherein the access credentials are an UPUNI that resolves to other access credentials.
245. The medium of claim 216, wherein an enhanced UPUNI grammar is employed for applying access credentials.
246. The medium of claim 216, further comprising:
a module to effect application of the provided access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible.
247. The medium of claim 216, further comprising:
a module to effect the access of the desired information, if the desired information is accessible.
248. The medium of claim 216, wherein an UPUNI may be registered to reference the access credentials.
249. The medium of claim 216, wherein an UPUNI may be registered to reference the verification information.
250. An apparatus, comprising:
a processor;
a memory, communicatively connected to the processor;
a program, stored in the memory, including,
a module to collect information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
a module to generate an unique, persistent, and universal name identifier (UPUNI) for the EREI;
a module to store the collected entity information in a database record in a database, wherein the database record storing the collected entity information is keyed by the generated UPUNI, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
a module to generate validation information for the EREI;
a module to transmit validation information to an access device of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
a module to delete the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information;
a module to transmit validation information to the UPUNI-REG, if another device generated the validation information;
a module to store the generated validation information in a database record in a database, wherein the database record storing the generated validation information is keyed by the generated UPUNI, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment;
a module to register a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein the reference to related information is entered in a database record keyed by the generated UPUNI, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information, wherein in the entity information is related information, and wherein the validation information is related information.
251. An apparatus, comprising:
a processor;
a memory, communicatively connected to the processor;
a program, stored in the memory, including,
a module to effect collection of information regarding an entity (entity information), wherein the entity is represented by the entity information (EREI);
a module to effect generation of an unique, persistent, and universal name identifier (UPUNI);
a module to effect storage of the collected entity information in a database record in a database;
a module to effect generation of validation information;
a module to effect transmission of validation information to access devices of the EREI, if an UPUNI registration agency (UPUNI-REG) generated the validation information;
a module to effect transmission of validation information to the UPUNI-REG, if the another device generated the validation information;
a module to effect storage of the generated validation information in a database record in a database;
a module to effect registration of a resolvable association between an UPUNI and reference to related information, wherein registration is effected in a database to associate and resolve UPUNIs and references to related information (UPUNI-RES), wherein in the entity information is related information, and wherein the validation information is related information.
252. The apparatus of claim 251, wherein entity information value fields may include: name of entity, address, telephone number, access device, reference to access device, social security number, credit information, medical information, company account information, custom fields, custom records.
253. The apparatus of claim 251, wherein the entity information value fields include UPUNI information.
254. The apparatus of claim 251, wherein the entity information is an UPUNI that resolves to other validation information.
255. The apparatus of claim 251, wherein the UPUNI is generated for the EREI.
256. The apparatus of claim 251, wherein the UPUNI is generated for the related information.
257. The apparatus of claim 251, wherein the database record storing the collected entity information is keyed by the generated UPUNI.
258. The apparatus of claim 251, wherein the database storing the collected entity information holds UPUNI and entity information (EI-UPUNI-DB).
259. The apparatus of claim 251, wherein the database storing the collected entity information is a metadata database (MDDB).
260. The apparatus of claim 251, wherein the storage of the entity information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
261. The apparatus of claim 251, wherein the entity information is stored in an UPUNI-RES.
262. The apparatus of claim 251, wherein the entity information is stored in an UPUNI-REG.
263. The apparatus of claim 251, wherein the database record storing the generated validation information is keyed by the generated UPUNI.
264. The apparatus of claim 251, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
265. The apparatus of claim 251, wherein the validation information may include: public and private encryption keys, digital certificates, passwords.
266. The apparatus of claim 251, wherein the validation information is an UPUNI that resolves to other validation information.
267. The apparatus of claim 251, wherein an UPUNI-REG generates the validation information.
268. The apparatus of claim 251, wherein an UPUNI-REG requests that another device generate the validation information.
269. The apparatus of claim 268, wherein the other devices are access devices of the ERIE.
270. The apparatus of claim 251, wherein a transmission is secure.
271. The apparatus of claim 251, wherein a transmission of the validation information is limited to a private key of a generated private and public encryption key pair.
272. The apparatus of claim 251, wherein a transmission of the validation information is limited to a public key of a generated private and public encryption key pair.
273. The apparatus of claim 251, further comprising:
a module to effect deletion of the validation information from the UPUNI-REG upon transmitting the validation information, if the UPUNI-REG generated the validation information.
274. The apparatus of claim 273, wherein the deleted validation information is limited to a private key of a generated private and public encryption key pair.
275. The apparatus of claim 251, wherein the database storing the generated validation information holds UPUNI and validation information (VI-UPUNI-DB).
276. The apparatus of claim 251, wherein the database storing the generated validation information is a metadata database (MDDB).
277. The apparatus of claim 251, wherein the storage of the validation information occurs before effecting registration of the UPUNI in one phase of a multi-phase registration commitment.
278. The apparatus of claim 251, wherein the validation information is stored in an UPUNI-RES.
279. The apparatus of claim 251, wherein the validation information is stored in an UPUNI-REG.
280. The apparatus of claim 251, wherein the UPUNI registration of the reference to related information is effected by an UPUNI-REG.
281. The apparatus of claim 251, wherein the reference to related information may be a location address.
282. The apparatus of claim 251, wherein the reference to related information may be an UPUNI.
283. The apparatus of claim 251, wherein the reference to related information may be a pointer.
284. The apparatus of claim 251, wherein the reference to related information is entered in a database record keyed by the generated UPUNI.
285. The apparatus of claim 251, wherein the registration of the UPUNI in the UPUNI-RES is a phase of a multi-phase registration commitment that occurs after effecting the storage of the related information.
286. The apparatus of claim 251, wherein as a consequence of the registration, the entity is represented by the UPUNI (E-UPUNI).
287. The apparatus of claim 251, wherein the registered UPUNI references the related information.
288. The apparatus of claim 251, wherein as a consequence of the registration, the UPUNI, EREI, related information, and references to related information, are interrelated components (associated information).
289. The apparatus of claim 288, wherein the interrelatedness of the associated information allows for the identification of any component of the associated information from any other components of the associated information.
290. The apparatus of claim 288, wherein the UPUNI is generated for the associated information.
291. The apparatus of claim 288, wherein an UPUNI may be registered to reference the verification information.
292. The apparatus of claim 288, wherein an enhanced UPUNI grammar is used for the associated information.
293. The apparatus of claim 288, wherein the associated information is an UPUNI that resolves to other associated information.
294. The apparatus of claim 288, wherein an UPUNI may be registered to reference the validation information.
295. The apparatus of claim 288, wherein an enhanced UPUNI grammar is used for the related information.
296. The apparatus of claim 288, wherein the UPUNI is unique in the UPUNI-RES.
297. An apparatus, comprising:
a processor;
a memory, communicatively connected to the processor;
a program, stored in the memory, including,
a module to determine if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
a module to access the desired information, if the UPUNI is absent from the desired information;
a module to determine if the desired information is inaccessible, wherein the desired information is inaccessible because the desired information is protected;
a module to determine if there exists an UPUNI that represents the entity (E-UPUNI);
a module to effect the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
a module to effect resolution of the entity device to the desired information's UPUNI (DI-UPUNI), if an E-UPUNI exists, wherein the DI-UPUNI resolution directs the entity device to a rights clearinghouse;
a module to send entity verification information, wherein the E-UPUNI is entity verification information, wherein the DI-UPUNI is entity verification information, wherein the entity verification information is sent to the rights clearinghouse by the entity device;
a module to effect verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification), wherein the rights clearinghouse verifies the entity verification information;
a module to receive access credentials, if the entity's identity and access rights to the desired content are verified, wherein the access credentials are received by the entity device from the rights clearinghouse;
a module to apply the received access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible;
a module to access of the desired information, if the desired information is accessible.
298. An apparatus, comprising:
a processor;
a memory, communicatively connected to the processor;
a program, stored in the memory, including,
a module to effect determination of if information an entity desires to access (desired information) on the entity's access device (entity device) has an unique, persistent, and universal name identifier (UPUNI) embedded within the desired information;
a module to effect determination of if the desired information is inaccessible;
a module to effect determination of if there exists an UPUNI that represents the entity (E-UPUNI);
a module to effect the generation of the E-UPUNI, if the entity is un-represented by an UPUNI;
a module to effect the resolution of the entity device to the desired information's UPUNI (DI-UPUNI);
a module to effect the provision of entity verification information;
a module to effect verification of the entity's identity and access rights to the desired content with the provided entity verification information (entity verification);
a module to effect provision of access credentials, if the entity's identity and access rights to the desired content are verified.
299. The apparatus of claim 298, further comprising:
a module to effect the access of the desired information, if the UPUNI is absent from the desired information.
300. The apparatus of claim 298, wherein the desired information is inaccessible because the desired information is protected.
301. The apparatus of claim 300, wherein the desired information is protected with encryption.
302. The apparatus of claim 298, wherein the desired information is an UPUNI that resolves to other desired information.
303. The apparatus of claim 298, wherein the entity device resolves to the DI-UPUNI, only if an E-UPUNI exists.
304. The apparatus of claim 298, wherein the DI-UPUNI resolution directs the entity device to an access tracking system (ATS).
305. The apparatus of claim 298, wherein the DI-UPUNI resolution directs the entity to a rights clearinghouse.
306. The apparatus of claim 298, wherein the E-UPUNI is entity verification information.
307. The apparatus of claim 298, wherein the DI-UPUNI is entity verification information.
308. The apparatus of claim 298, wherein a digital certificate of the entity is entity verification information.
309. The apparatus of claim 298, wherein a password of the entity is entity verification information.
310. The apparatus of claim 298, wherein an access code of the entity is entity verification information.
311. The apparatus of claim 298, wherein the verification information is an UPUNI that resolves to other verification information.
312. The apparatus of claim 298, wherein the entity verification information is provided to an access tracking system (ATS).
313. The apparatus of claim 298, wherein the entity verification information is provided to a rights clearinghouse.
314. The apparatus of claim 298, wherein an access tracking system (ATS) verifies the entity verification information.
315. The apparatus of claim 298, wherein a rights clearinghouse verifies the entity verification information.
316. The apparatus of claim 298, wherein entity verification is achieved employing UPUNI resolution.
317. The apparatus of claim 298, wherein an enhanced UPUNI grammar is employed for entity verification.
318. The apparatus of claim 298, wherein the access credentials are provided to the entity device.
319. The apparatus of claim 298, wherein a rights clearinghouse provides the access credentials.
320. The apparatus of claim 298, wherein an access tracking system (ATS) provides the access credentials.
321. The apparatus of claim 298, wherein access codes are access credentials.
322. The apparatus of claim 298, wherein decryption keys are access credentials.
323. The apparatus of claim 298, wherein digital certificates are access credentials.
324. The apparatus of claim 298, wherein UPUNIs are access credentials.
325. The apparatus of claim 298, wherein passwords are access credentials.
326. The apparatus of claim 298, wherein the access credentials are an UPUNI that resolves to other access credentials.
327. The apparatus of claim 298, wherein an enhanced UPUNI grammar is employed for applying access credentials.
328. The apparatus of claim 298, further comprising:
a module to effect application of the provided access credentials upon the desired information, which is initially in an inaccessible state, to make the desired information accessible.
329. The apparatus of claim 298, further comprising:
a module to effect the access of the desired information, if the desired information is accessible.
330. The apparatus of claim 298, wherein an UPUNI may be registered to reference the access credentials.
331. The apparatus of claim 298, wherein an UPUNI may be registered to reference the verification information.
332. A method to effect access to information, comprising:
storing an unique, persistent, and universal name identifier (UPUNI) that represents an entity (E-UPUNI) in a memory device;
reading the E-UPUNI from the memory device;
effecting the resolution of the read E-UPUNI to related information representing the entity.
333. The method of claim 332, wherein the memory device is an identification device.
334. The method of claim 333, wherein the identification device is an identification card.
335. The method of claim 332, wherein the entity is a person.
336. A system to effect access to information, comprising:
means to store an unique, persistent, and universal name identifier (UPUNI) that represents an entity (E-UPUNI) in a memory device;
means to read the E-UPUNI from the memory device;
means to effect the resolution of the read E-UPUNI to related information representing the entity.
337. The system of claim 336, wherein the memory device is an identification device.
338. The system of claim 337, wherein the identification device is an identification card.
339. The system of claim 336, wherein the entity is a person.
340. A program stored on a medium readable by a processor, the program, comprising:
a module to store an unique, persistent, and universal name identifier (UPUNI) that represents an entity (E-UPUNI) in a memory device;
a module to read the E-UPUNI from the memory device;
a module to effect the resolution of the read E-UPUNI to related information representing the entity.
341. The medium of claim 340, wherein the memory device is an identification device.
342. The medium of claim 341, wherein the identification device is an identification card.
343. The medium of claim 340, wherein the entity is a person.
344. An apparatus to identify an entity, comprising:
a memory, disposed for communication with a processor;
a base form encasing the memory;
a data-structure stored in the memory, including,
a field to store an unique, persistent, and universal name identifier (UPUNI) that represents an entity (E-UPUNI);
345. The apparatus of claim 344, wherein the entity is a smartcard chip.
346. The apparatus of claim 344, wherein the memory is a magnetic strip.
347. The apparatus of claim 344, wherein the base form has the dimensions of a credit card.
348. The apparatus of claim 344, wherein the entity is a person.
349. An apparatus to identify an entity, comprising:
a processor;
a memory, communicatively connected to the processor;
a program, stored in the memory, including,
a module to store an unique, persistent, and universal name identifier (UPUNI) that represents an entity (E-UPUNI) in a memory device;
a module to read the E-UPUNI from the memory device;
a module to effect the resolution of the read E-UPUNI to related information representing the entity.
350. The apparatus of claim 349, wherein the memory device is an identification device.
351. The apparatus of claim 350, wherein the identification device is an identification card.
352. The apparatus of claim 349, wherein the entity is a person.
US10/470,352 2001-01-25 2002-01-25 Apparatus method and system for tracking information access Abandoned US20040088333A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/470,352 US20040088333A1 (en) 2002-01-25 2002-01-25 Apparatus method and system for tracking information access
US12/760,357 US8156151B2 (en) 2001-01-25 2010-04-14 Apparatus, method and system for tracking information access
US13/935,709 US20150039442A1 (en) 2001-01-25 2013-07-05 Multiple-Resolution, Information-Engineered, Self-Improving Advertising and Information Access Apparatuses, Methods and Systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/470,352 US20040088333A1 (en) 2002-01-25 2002-01-25 Apparatus method and system for tracking information access
PCT/US2002/002476 WO2002059724A2 (en) 2001-01-25 2002-01-25 Apparatus, method and system for tracking information access

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2002/002476 A-371-Of-International WO2002059724A2 (en) 2001-01-25 2002-01-25 Apparatus, method and system for tracking information access
US201213657809A Continuation 2001-01-25 2012-10-22

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/760,357 Continuation US8156151B2 (en) 2001-01-25 2010-04-14 Apparatus, method and system for tracking information access

Publications (1)

Publication Number Publication Date
US20040088333A1 true US20040088333A1 (en) 2004-05-06

Family

ID=32176836

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/470,352 Abandoned US20040088333A1 (en) 2001-01-25 2002-01-25 Apparatus method and system for tracking information access
US12/760,357 Expired - Lifetime US8156151B2 (en) 2001-01-25 2010-04-14 Apparatus, method and system for tracking information access

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/760,357 Expired - Lifetime US8156151B2 (en) 2001-01-25 2010-04-14 Apparatus, method and system for tracking information access

Country Status (1)

Country Link
US (2) US20040088333A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217267A1 (en) * 2002-05-16 2003-11-20 Kindberg Timothy P.J.G. Authenticating a web hyperlink associated with a physical object
US20060069644A1 (en) * 2004-09-30 2006-03-30 Nokia Corporation Method, device and computer program product for activating the right of use of at least one secured content item
US20060106898A1 (en) * 2004-11-17 2006-05-18 Frondozo Rhea R Method, system, and program for storing and using metadata in multiple storage locations
US20060229979A1 (en) * 2001-09-03 2006-10-12 Michihiro Sato Issuing machine and issuing system
US20070234432A1 (en) * 2006-03-29 2007-10-04 Samsung Electronics Co., Ltd. Method and apparatus for local domain management using device with local authority module
US20070299844A1 (en) * 2006-06-25 2007-12-27 Pepper Timothy C Method and apparatus for obtaining information based on user's access rights
US20090150236A1 (en) * 2007-12-10 2009-06-11 Rhapline, Inc. Digital asset management system and method
US20100244429A1 (en) * 2001-09-03 2010-09-30 Michihiro Sato Issuing machine and issuing system
US20100250269A1 (en) * 2007-09-10 2010-09-30 Rappaport Theodore S Clearinghouse System and Method for Determining Availability of Carrier-Based Services and Enhancing the Quality, Operation and Accessibility of Carrier-Based Networks
US20110125652A1 (en) * 2001-09-03 2011-05-26 Michihiro Sato Issuing machine and issuing system for public-offering a financing instrument on-line
US20120210404A1 (en) * 2011-02-14 2012-08-16 Nokia Corporation Seamless Wi-Fi Subscription Remediation
US8670946B2 (en) 2010-09-28 2014-03-11 Landis+Gyr Innovations, Inc. Utility device management
US20140223113A1 (en) * 2011-07-18 2014-08-07 Ted A. Hadley Selector syncronized with movement of data in memory
US9445139B2 (en) 2010-10-05 2016-09-13 Microsoft Technology Licensing, Llc Authenticated content discovery
WO2018170321A1 (en) * 2017-03-15 2018-09-20 Exari Group, Inc. Machine evaluation of contract terms
US11620110B1 (en) * 2022-06-07 2023-04-04 Snowflake Inc. Registration of multiple user defined functions
US11930045B1 (en) 2023-04-28 2024-03-12 Snowflake Inc. Secure network access from sandboxed applications

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7818740B2 (en) * 2006-05-05 2010-10-19 Microsoft Corporation Techniques to perform gradual upgrades
GB2502750A (en) 2011-03-22 2013-12-04 Nant Holdings Ip Llc Healthcare Management objects
GB201109414D0 (en) 2011-06-03 2011-07-20 Micromass Ltd Diathermy -ionisation technique
US10177967B2 (en) * 2013-03-15 2019-01-08 Jesse Lakes Redirection service resource locator mechanism
WO2016142681A1 (en) 2015-03-06 2016-09-15 Micromass Uk Limited Spectrometric analysis of microbes
EP3265819B1 (en) 2015-03-06 2020-10-14 Micromass UK Limited Chemically guided ambient ionisation mass spectrometry
CN107636794B (en) 2015-03-06 2020-02-28 英国质谱公司 Liquid trap or separator for electrosurgical applications
EP3264989B1 (en) 2015-03-06 2023-12-20 Micromass UK Limited Spectrometric analysis
EP4174906A1 (en) 2015-03-06 2023-05-03 Micromass UK Limited Improved ionisation of gaseous samples
EP3671216A1 (en) 2015-03-06 2020-06-24 Micromass UK Limited Imaging guided ambient ionisation mass spectrometry
CN108700590B (en) 2015-03-06 2021-03-02 英国质谱公司 Cell population analysis
EP3265822B1 (en) 2015-03-06 2021-04-28 Micromass UK Limited Tissue analysis by mass spectrometry or ion mobility spectrometry
US10777397B2 (en) 2015-03-06 2020-09-15 Micromass Uk Limited Inlet instrumentation for ion analyser coupled to rapid evaporative ionisation mass spectrometry (“REIMS”) device
EP3265823B1 (en) 2015-03-06 2020-05-06 Micromass UK Limited Ambient ionization mass spectrometry imaging platform for direct mapping from bulk tissue
DE202016008460U1 (en) 2015-03-06 2018-01-22 Micromass Uk Limited Cell population analysis
GB2552430B (en) 2015-03-06 2022-05-11 Micromass Ltd Collision surface for improved ionisation
EP3800657A1 (en) 2015-03-06 2021-04-07 Micromass UK Limited Desorption electrospray ionisation mass spectrometry ("desi-ms") and desorption electroflow focusing ionisation ("deffi-ms") analysis of biological samples on swabs
CA2977906A1 (en) 2015-03-06 2016-09-15 Micromass Uk Limited In vivo endoscopic tissue identification tool
GB201517195D0 (en) 2015-09-29 2015-11-11 Micromass Ltd Capacitively coupled reims technique and optically transparent counter electrode
WO2017178833A1 (en) 2016-04-14 2017-10-19 Micromass Uk Limited Spectrometric analysis of plants
US10509921B2 (en) 2017-05-31 2019-12-17 Intuit Inc. System for managing transactional data
US10866963B2 (en) 2017-12-28 2020-12-15 Dropbox, Inc. File system authentication

Citations (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5021968A (en) * 1987-01-13 1991-06-04 Robertson-Ceco Corporation Graphics-based wire-cable management system
US5288981A (en) * 1991-10-25 1994-02-22 Allsafe Company, Inc. Method and apparatus for encoding machine readable serial encryptedmagnetic data
US5334824A (en) * 1991-09-19 1994-08-02 Martinez Jerry R Method and apparatus for validating credit information during home delivery of order
US5347791A (en) * 1992-11-05 1994-09-20 Fmc Corporation Computer controlled horizontal wrapper
US5592408A (en) * 1994-01-03 1997-01-07 Security People, Inc. Identification card and access control device
US5629981A (en) * 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5694604A (en) * 1982-09-28 1997-12-02 Reiffin; Martin G. Preemptive multithreading computer system with clock activated interrupt
US5717925A (en) * 1993-10-08 1998-02-10 International Business Machines Corporation Information catalog system with object-dependent functionality
US5765874A (en) * 1995-05-09 1998-06-16 Custom Creative Insights Corporation Method for mass customization of printed materials
US5768388A (en) * 1996-03-01 1998-06-16 Goldwasser; Shafi Time delayed key escrow
US5774552A (en) * 1995-12-13 1998-06-30 Ncr Corporation Method and apparatus for retrieving X.509 certificates from an X.500 directory
US5805800A (en) * 1995-11-07 1998-09-08 Fujitsu Limited Apparatus and method for controlling storage medium using security capabilities
US5832508A (en) * 1996-09-18 1998-11-03 Sybase, Inc. Method for deallocating a log in database systems
US5835735A (en) * 1995-03-03 1998-11-10 Eastman Kodak Company Method for negotiating software compatibility
US5857102A (en) * 1995-03-14 1999-01-05 Sun Microsystems, Inc. System and method for determining and manipulating configuration information of servers in a distributed object environment
US5884271A (en) * 1994-06-20 1999-03-16 Pitroda; Satyan G. Device, system and methods of conducting paperless transactions
US5889993A (en) * 1996-10-15 1999-03-30 The Regents Of The University Of California Predictive event tracking method
US5930363A (en) * 1995-03-17 1999-07-27 Transmo Limited Card charging systems
US5991876A (en) * 1996-04-01 1999-11-23 Copyright Clearance Center, Inc. Electronic rights management and authorization system
US5999095A (en) * 1995-05-19 1999-12-07 Slc Technologies, Inc. Electronic security system
US6006242A (en) * 1996-04-05 1999-12-21 Bankers Systems, Inc. Apparatus and method for dynamically creating a document
US6014628A (en) * 1997-11-03 2000-01-11 Exigent International, Inc. Method and system for tracking any entity through any set of processes utilizing a temporal projection
US6061708A (en) * 1997-05-31 2000-05-09 International Business Machines Corporation System and method for supporting mixed-phase transactions in an object-oriented environment
US6068127A (en) * 1998-04-07 2000-05-30 Hunter; Anthony L. Container carrier, base and advertising/promotional transport
US6073140A (en) * 1997-07-29 2000-06-06 Acxiom Corporation Method and system for the creation, enhancement and update of remote data using persistent keys
US6111506A (en) * 1996-10-15 2000-08-29 Iris Corporation Berhad Method of making an improved security identification document including contactless communication insert unit
US6269373B1 (en) * 1999-02-26 2001-07-31 International Business Machines Corporation Method and system for persisting beans as container-managed fields
US6325284B1 (en) * 1998-12-30 2001-12-04 Walker Digital, Llc Device and method for promoting the selection and use of a credit card
US6343361B1 (en) * 1998-11-13 2002-01-29 Tsunami Security, Inc. Dynamic challenge-response authentication and verification of identity of party sending or receiving electronic communication
US20020018476A1 (en) * 2000-05-02 2002-02-14 Roy Radhika R. System and method for inter-domain mobility management
US20020029279A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for proofing identities using a certificate authority
US6356915B1 (en) * 1999-02-22 2002-03-12 Starbase Corp. Installable file system having virtual file system drive, virtual device driver, and virtual disks
US6370534B1 (en) * 1999-06-01 2002-04-09 Pliant Technologies, Inc. Blocking techniques for data storage
US6760746B1 (en) * 1999-09-01 2004-07-06 Eric Schneider Method, product, and apparatus for processing a data request
US6996538B2 (en) * 2000-03-07 2006-02-07 Unisone Corporation Inventory control system and methods
US20060269061A1 (en) * 2001-01-11 2006-11-30 Cardinalcommerce Corporation Mobile device and method for dispensing authentication codes
US7188136B1 (en) * 1999-04-20 2007-03-06 Hitachi, Ltd. Method of and an apparatus for distributing information, a method of and an apparatus for receiving information, a system for distributing information, and a program product for conducting information distribution

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6076733A (en) 1993-11-24 2000-06-20 Metrologic Instruments, Inc. Web-based system and method for enabling a viewer to access and display HTML-encoded documents located on the world wide web (WWW) by reading URL-encoded bar code symbols printed on a web-based information resource guide
US5721943A (en) 1993-10-14 1998-02-24 International Business Machines Corporation Negotiable locks for concurrent access of control data by multiple programs
US6135646A (en) * 1993-10-22 2000-10-24 Corporation For National Research Initiatives System for uniquely and persistently identifying, managing, and tracking digital objects
US5918214A (en) * 1996-10-25 1999-06-29 Ipf, Inc. System and method for finding product and service related information on the internet
US5950173A (en) * 1996-10-25 1999-09-07 Ipf, Inc. System and method for delivering consumer product related information to consumers within retail environments using internet-based information servers and sales agents
US5608900A (en) 1994-06-21 1997-03-04 Internationl Business Machines Corp. Generation and storage of connections between objects in a computer network
US5715403A (en) 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
WO1997043717A1 (en) 1996-05-13 1997-11-20 Corporation For National Research Initiatives Identifying, managing, accessing, and tracking digital objects and associated rights and payments
US6154777A (en) 1996-07-01 2000-11-28 Sun Microsystems, Inc. System for context-dependent name resolution
US5839088A (en) 1996-08-22 1998-11-17 Go2 Software, Inc. Geographic location referencing system and method
US6233684B1 (en) 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US5895471A (en) 1997-07-11 1999-04-20 Unwired Planet, Inc. Providing a directory of frequently used hyperlinks on a remote server
US6078888A (en) 1997-07-16 2000-06-20 Gilbarco Inc. Cryptography security for remote dispenser transactions
US5974453A (en) 1997-10-08 1999-10-26 Intel Corporation Method and apparatus for translating a static identifier including a telephone number into a dynamically assigned network address
US6138225A (en) 1997-12-24 2000-10-24 Intel Corporation Address translation system having first and second translation look aside buffers
US6151624A (en) * 1998-02-03 2000-11-21 Realnames Corporation Navigating network resources based on metadata
US6154738A (en) * 1998-03-27 2000-11-28 Call; Charles Gainor Methods and apparatus for disseminating product information via the internet using universal product codes
US7756892B2 (en) 2000-05-02 2010-07-13 Digimarc Corporation Using embedded data with file sharing
US6519700B1 (en) 1998-10-23 2003-02-11 Contentguard Holdings, Inc. Self-protecting documents
US6944776B1 (en) 1999-04-12 2005-09-13 Microsoft Corporation System and method for data rights management
US6885748B1 (en) 1999-10-23 2005-04-26 Contentguard Holdings, Inc. System and method for protection of digital works
IL132915A (en) 1999-11-14 2004-05-12 Networks Assoc Tech Inc Method for secure function execution by calling address validation
US6807550B1 (en) 1999-12-01 2004-10-19 Microsoft Corporation Methods and systems for providing random access to structured media content
US6760767B1 (en) 1999-12-02 2004-07-06 General Electric Company Communication connectivity verification and reporting system and method of use
US6748448B1 (en) 1999-12-13 2004-06-08 International Business Machines Corporation High performance internet storage access scheme
JP2001211157A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Secret key registering method, secret key register secret key issuing method, cipher communication method, cipher communication system and recording medium
US6959326B1 (en) 2000-08-24 2005-10-25 International Business Machines Corporation Method, system, and program for gathering indexable metadata on content at a data repository
US6512837B1 (en) 2000-10-11 2003-01-28 Digimarc Corporation Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration
US7072982B2 (en) 2000-11-22 2006-07-04 Microsoft Corporation Universal naming scheme for peer to peer resources
US6694471B1 (en) 2000-12-27 2004-02-17 Cisco Technology, Inc. System and method for periodic retransmission of messages
WO2002057917A2 (en) 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform

Patent Citations (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5694604A (en) * 1982-09-28 1997-12-02 Reiffin; Martin G. Preemptive multithreading computer system with clock activated interrupt
US5021968A (en) * 1987-01-13 1991-06-04 Robertson-Ceco Corporation Graphics-based wire-cable management system
US5334824A (en) * 1991-09-19 1994-08-02 Martinez Jerry R Method and apparatus for validating credit information during home delivery of order
US5288981A (en) * 1991-10-25 1994-02-22 Allsafe Company, Inc. Method and apparatus for encoding machine readable serial encryptedmagnetic data
US5347791A (en) * 1992-11-05 1994-09-20 Fmc Corporation Computer controlled horizontal wrapper
US5717925A (en) * 1993-10-08 1998-02-10 International Business Machines Corporation Information catalog system with object-dependent functionality
US5592408A (en) * 1994-01-03 1997-01-07 Security People, Inc. Identification card and access control device
US5884271A (en) * 1994-06-20 1999-03-16 Pitroda; Satyan G. Device, system and methods of conducting paperless transactions
US5629981A (en) * 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5835735A (en) * 1995-03-03 1998-11-10 Eastman Kodak Company Method for negotiating software compatibility
US5857102A (en) * 1995-03-14 1999-01-05 Sun Microsystems, Inc. System and method for determining and manipulating configuration information of servers in a distributed object environment
US5930363A (en) * 1995-03-17 1999-07-27 Transmo Limited Card charging systems
US5765874A (en) * 1995-05-09 1998-06-16 Custom Creative Insights Corporation Method for mass customization of printed materials
US5999095A (en) * 1995-05-19 1999-12-07 Slc Technologies, Inc. Electronic security system
US5805800A (en) * 1995-11-07 1998-09-08 Fujitsu Limited Apparatus and method for controlling storage medium using security capabilities
US5774552A (en) * 1995-12-13 1998-06-30 Ncr Corporation Method and apparatus for retrieving X.509 certificates from an X.500 directory
US5768388A (en) * 1996-03-01 1998-06-16 Goldwasser; Shafi Time delayed key escrow
US5991876A (en) * 1996-04-01 1999-11-23 Copyright Clearance Center, Inc. Electronic rights management and authorization system
US6006242A (en) * 1996-04-05 1999-12-21 Bankers Systems, Inc. Apparatus and method for dynamically creating a document
US5832508A (en) * 1996-09-18 1998-11-03 Sybase, Inc. Method for deallocating a log in database systems
US6111506A (en) * 1996-10-15 2000-08-29 Iris Corporation Berhad Method of making an improved security identification document including contactless communication insert unit
US5889993A (en) * 1996-10-15 1999-03-30 The Regents Of The University Of California Predictive event tracking method
US6061708A (en) * 1997-05-31 2000-05-09 International Business Machines Corporation System and method for supporting mixed-phase transactions in an object-oriented environment
US6073140A (en) * 1997-07-29 2000-06-06 Acxiom Corporation Method and system for the creation, enhancement and update of remote data using persistent keys
US6014628A (en) * 1997-11-03 2000-01-11 Exigent International, Inc. Method and system for tracking any entity through any set of processes utilizing a temporal projection
US6068127A (en) * 1998-04-07 2000-05-30 Hunter; Anthony L. Container carrier, base and advertising/promotional transport
US6343361B1 (en) * 1998-11-13 2002-01-29 Tsunami Security, Inc. Dynamic challenge-response authentication and verification of identity of party sending or receiving electronic communication
US6325284B1 (en) * 1998-12-30 2001-12-04 Walker Digital, Llc Device and method for promoting the selection and use of a credit card
US6356915B1 (en) * 1999-02-22 2002-03-12 Starbase Corp. Installable file system having virtual file system drive, virtual device driver, and virtual disks
US6269373B1 (en) * 1999-02-26 2001-07-31 International Business Machines Corporation Method and system for persisting beans as container-managed fields
US7188136B1 (en) * 1999-04-20 2007-03-06 Hitachi, Ltd. Method of and an apparatus for distributing information, a method of and an apparatus for receiving information, a system for distributing information, and a program product for conducting information distribution
US6370534B1 (en) * 1999-06-01 2002-04-09 Pliant Technologies, Inc. Blocking techniques for data storage
US6760746B1 (en) * 1999-09-01 2004-07-06 Eric Schneider Method, product, and apparatus for processing a data request
US6996538B2 (en) * 2000-03-07 2006-02-07 Unisone Corporation Inventory control system and methods
US20020029279A1 (en) * 2000-03-17 2002-03-07 Campbell Leo J. Methods and systems for proofing identities using a certificate authority
US20020018476A1 (en) * 2000-05-02 2002-02-14 Roy Radhika R. System and method for inter-domain mobility management
US20060269061A1 (en) * 2001-01-11 2006-11-30 Cardinalcommerce Corporation Mobile device and method for dispensing authentication codes

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8296212B2 (en) 2001-08-22 2012-10-23 Michihiro Sato Issuing machine and issuing system
US20060229979A1 (en) * 2001-09-03 2006-10-12 Michihiro Sato Issuing machine and issuing system
US20100244429A1 (en) * 2001-09-03 2010-09-30 Michihiro Sato Issuing machine and issuing system
US8255312B2 (en) 2001-09-03 2012-08-28 Michihiro Sato Issuing machine and issuing system
US8103580B2 (en) 2001-09-03 2012-01-24 Michihiro Sato Issuing machine and issuing system for public-offering a financing instrument on-line
US8024249B2 (en) * 2001-09-03 2011-09-20 Michihiro Sato Issuing machine and issuing system
US8275691B2 (en) 2001-09-03 2012-09-25 Michihiro Sato Issuing machine and issuing system
US20110125652A1 (en) * 2001-09-03 2011-05-26 Michihiro Sato Issuing machine and issuing system for public-offering a financing instrument on-line
US20030217267A1 (en) * 2002-05-16 2003-11-20 Kindberg Timothy P.J.G. Authenticating a web hyperlink associated with a physical object
WO2006035111A1 (en) * 2004-09-30 2006-04-06 Nokia Corporation Method, device and computer program product for activating the right of use of at least one secured content item
US20060069644A1 (en) * 2004-09-30 2006-03-30 Nokia Corporation Method, device and computer program product for activating the right of use of at least one secured content item
US7580894B2 (en) * 2004-09-30 2009-08-25 Nokia Corporation Method, device and computer program product for activating the right of use at least one secured content item
US7444360B2 (en) * 2004-11-17 2008-10-28 International Business Machines Corporation Method, system, and program for storing and using metadata in multiple storage locations
US20060106898A1 (en) * 2004-11-17 2006-05-18 Frondozo Rhea R Method, system, and program for storing and using metadata in multiple storage locations
US8001104B2 (en) 2004-11-17 2011-08-16 International Business Machines Corporation Method, system and program for storing and using metadata in multiple storage locations
US20070234432A1 (en) * 2006-03-29 2007-10-04 Samsung Electronics Co., Ltd. Method and apparatus for local domain management using device with local authority module
US7793105B2 (en) * 2006-03-29 2010-09-07 Samsung Electronics, Co., Ltd. Method and apparatus for local domain management using device with local authority module
US20070299844A1 (en) * 2006-06-25 2007-12-27 Pepper Timothy C Method and apparatus for obtaining information based on user's access rights
US20120244835A1 (en) * 2007-09-10 2012-09-27 Rappaport Theodore S Clearinghouse System, Method, and Process for Inventorying and Acquiring Infrastructure, Monitoring and Controlling Network Performance for Enhancement, and Providing Localized Content in Communication Networks
US8725700B2 (en) 2007-09-10 2014-05-13 Theodore S. Rappaport Clearinghouse systems and methods for collecting or providing quality or performance data for enhanced availability of wireless communications
US20100299274A1 (en) * 2007-09-10 2010-11-25 Rappaport Theodore S Clearinghouse System and Method for Carriers, Advertisers, and Content Providers of Carrier-Based Networks
US20100250268A1 (en) * 2007-09-10 2010-09-30 Rappaport Theodore S Clearinghouse System and Method for Enhancing the Quality, Operation and Accessibility of Carrier-Based Networks
US20100250269A1 (en) * 2007-09-10 2010-09-30 Rappaport Theodore S Clearinghouse System and Method for Determining Availability of Carrier-Based Services and Enhancing the Quality, Operation and Accessibility of Carrier-Based Networks
US8489546B2 (en) 2007-09-10 2013-07-16 Theodore S. Rappaport Clearinghouse systems and methods for collecting or providing quality, service, or asset information pertaining to wireless communications
US8515925B2 (en) * 2007-09-10 2013-08-20 Theodore S. Rappaport Clearinghouse system, method, and process for inventorying and acquiring infrastructure, monitoring and controlling network performance for enhancement, and providing localized content in communication networks
US8572117B2 (en) 2007-09-10 2013-10-29 Theodore S. Rappaport Clearinghouse system and method for gaining access to use properties for carrier-based services
US20090150236A1 (en) * 2007-12-10 2009-06-11 Rhapline, Inc. Digital asset management system and method
US8670946B2 (en) 2010-09-28 2014-03-11 Landis+Gyr Innovations, Inc. Utility device management
US11012729B2 (en) * 2010-10-05 2021-05-18 Microsoft Technology Licensing, Llc Authenticated content discovery
US11451843B2 (en) * 2010-10-05 2022-09-20 Microsoft Technology Licensing, Llc Authenticated content discovery
US9445139B2 (en) 2010-10-05 2016-09-13 Microsoft Technology Licensing, Llc Authenticated content discovery
US10306281B2 (en) 2010-10-05 2019-05-28 Microsoft Technology Licensing, Llc Authenticated content discovery
US9787683B2 (en) * 2011-02-14 2017-10-10 Nokia Technologies Oy Seamless wi-fi subscription remediation
US9325566B2 (en) * 2011-02-14 2016-04-26 Nokia Technologies Oy Seamless Wi-Fi subscription remediation
US20160197928A1 (en) * 2011-02-14 2016-07-07 Nokia Technologies Oy Seamless Wi-Fi Subscription Remediation
US20120210404A1 (en) * 2011-02-14 2012-08-16 Nokia Corporation Seamless Wi-Fi Subscription Remediation
US9418026B2 (en) 2011-07-18 2016-08-16 Hewlett Packard Enterprise Development Lp Transition between states in a processor
US9483422B2 (en) 2011-07-18 2016-11-01 Hewlett Packard Enterprise Development Lp Access to memory region including confidential information
US9465755B2 (en) 2011-07-18 2016-10-11 Hewlett Packard Enterprise Development Lp Security parameter zeroization
US20140223113A1 (en) * 2011-07-18 2014-08-07 Ted A. Hadley Selector syncronized with movement of data in memory
US9418027B2 (en) 2011-07-18 2016-08-16 Hewlett Packard Enterprise Development Lp Secure boot information with validation control data specifying a validation technique
WO2018170321A1 (en) * 2017-03-15 2018-09-20 Exari Group, Inc. Machine evaluation of contract terms
US11416956B2 (en) 2017-03-15 2022-08-16 Coupa Software Incorporated Machine evaluation of contract terms
US11861751B2 (en) 2017-03-15 2024-01-02 Coupa Software Incorporated Machine evaluation of contract terms
US11620110B1 (en) * 2022-06-07 2023-04-04 Snowflake Inc. Registration of multiple user defined functions
US11755291B1 (en) 2022-06-07 2023-09-12 Snowflake Inc. Registration of multiple user defined functions
US11930045B1 (en) 2023-04-28 2024-03-12 Snowflake Inc. Secure network access from sandboxed applications

Also Published As

Publication number Publication date
US20100211552A1 (en) 2010-08-19
US8156151B2 (en) 2012-04-10

Similar Documents

Publication Publication Date Title
US8156151B2 (en) Apparatus, method and system for tracking information access
US20110113034A1 (en) Apparatus, method and system for effecting information access in a peer environment
WO2002059724A2 (en) Apparatus, method and system for tracking information access
US20150178340A1 (en) Apparatus, Method and System for Registration Effecting Information Access
US20100174746A1 (en) Apparatus, Method and System for Multiple Resolution Affecting Information Access
US20040148503A1 (en) Apparatus, method, and system for accessing digital rights management information

Legal Events

Date Code Title Description
AS Assignment

Owner name: CONTENT DIRECTIONS, INC., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SIDMAN, DAVID;REEL/FRAME:014288/0412

Effective date: 20030714

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION