WO2001073667A1 - Method for managing cyber libraries and cyber bookstores on internet - Google Patents
Method for managing cyber libraries and cyber bookstores on internet Download PDFInfo
- Publication number
- WO2001073667A1 WO2001073667A1 PCT/KR2001/000456 KR0100456W WO0173667A1 WO 2001073667 A1 WO2001073667 A1 WO 2001073667A1 KR 0100456 W KR0100456 W KR 0100456W WO 0173667 A1 WO0173667 A1 WO 0173667A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cyber
- user
- book
- management center
- library
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
Abstract
A method for managing cyber libraries and cyber bookstores on the Internet. The method comprises the step (S21 or S61) of connecting a user to a management center through an Internet access tool, the step (S23 or S63) of checking an ID and password of the user to determine whether the user is a member having his or her own cyber library or cyber bookstore on the Internet, the step (S45) of providing cyber books and publications desired by the user to the user's cyber bookstore or cyber library in real time, the step (S35 or S71) of allowing the user to purchase a desired book, which is not present in his or her cyber bookstore or cyber library, from a database of the management center over the Internet and to store the purchased book in his or her cyber bookstore or cyber library.
Description
METHOD FOR MANAGING CYBER LIBRARIES AND CYBER BOOKSTORES ON INTERNET
Technical Field
The present invention relates in general to a method for managing libraries and bookstores on the Internet, and more particularly to a method for managing cyber libraries and cyber bookstores on the Internet, wherein a user such as an individual or organization can create his or her own cyber library or cyber bookstore within a cyber space on the Internet, read or purchase desired cyber books in a cyber bookstore established within a cyber space of a management center or in his or her own cyber library in real time over a communication network to obtain knowledge and information from the desired cyber books, and store information produced by himself or herself to utilize the produced information repeatedly and permanently.
Background Art
In human social life since creation of written characters, books and publications (these will hereinafter be referred to only as "books") have become one of important means for the exchange and transfer of information between persons. Persons purchase and read books in a general manner to obtain a variety of knowledge or information therefrom. Or, persons read or borrow a variety of books from a reading room or library to obtain desired information or knowledge therefrom. Recently, persons unconditionally download or merely read information (files) from electronic books (E-books).
However, a great cost and a large amount of time are required for persons to acquire a variety of books to obtain a variety of knowledge and information therefrom. In other words, a person must go to a bookstore having a desired book in order to purchase the desired book therefrom, or to a reading room or library
having the desired book in order to borrow or read the desired book therefrom. This leads to considerable economic and time wastage resulting from the movement to a place where the desired book is present, not even considering a purchasing price of the desired book. In addition, the person camiot read the desired book at a desired time, that is, he or she cannot utilize the desired book in real time.
The contents of an E-book are generally digitized and downloaded to a user's personal computer (PC) or dedicated terminal in a file form. However, this E-book is disadvantageous in that it can be opened only at an initial download place, resulting in a "limitation in movement". Further, the E-book is defenseless against copyright infringement because it is easy to illegally copy the downloaded E-book files and illegally transfer them over the Internet.
Furthermore, provided that the user's system is damaged due to a physical shock or virus, the user will make a demand for the E-book upon an E-book provider to again download or purchase it, resulting in economic loss and inconvenience, thereby making it impossible for the user to create his or her own knowledge information using the E-book, preserve it and utilize it permanently.
Disclosure of the Invention
Therefore, the present invention has been made in view of the above problems, and it is an object of the present invention to provide a method for managing cyber libraries and cyber bookstores on the Internet, wherein a user such as an individual or organization can create his or her own cyber library or cyber bookstore within a cyber space on the Internet, read or purchase desired cyber books in a cyber bookstore established within a cyber space of a management center or in his or her own cyber library in real time over a communication network to obtain knowledge and information from the desired cyber books, and store knowledge or information produced by himself or herself to utilize the produced information repeatedly and permanently at any place or environment able to use Internet
networks (including wired and wireless Internet networks), and copyright of cyber books can be certainly protected.
In accordance with one aspect of the present invention, the above and other objects can be accomplished by a provision of a method for managing cyber libraries on the Internet, comprising the steps of a) by a user, gaining access to a management center through an Internet access tool; b) by the management center, checking an identification and password of the user to determine whether the user is a member having his or her own cyber library on the Internet; c) by the management center, providing a cyber book or publication desired by the user to the user's cyber library in real time if it is determined at the step b) that the user is the member; and d) by the user, purchasing a cyber book or publication, which is not present in his or her cyber library, from a database of the management center over the Internet and storing the purchased cyber book or publication in his or her cyber library. Preferably, the database of the management center may store data about cyber books and publications provided from computers of writers and publishing companies, information about members registered in the management center, data about catalogues by countries, languages, sexes and genres of databased cyber books and publications, and data about abstracts and specialists' recommendations of the databased cyber books and publications.
In accordance with another aspect of the present invention, there is provided a method for managing cyber bookstores on the Internet, comprising the steps of a) by a cyber bookstore manager, gaining access to a management center through an Internet access tool; b) by the management center, checking an identification and password of the cyber bookstore manager to determine whether the manager is a member having his or her own cyber bookstore on the Internet; c) by the cyber bookstore manager, providing a cyber book or publication desired by a user to said user's cyber library in real time if it is determined at the step b) that the manager is the member; and d) by the cyber bookstore manager, purchasing a cyber book or publication, which is not present in his or her cyber bookstore, from
a database of the management center over the Internet and storing the purchased cyber book or publication in his or her cyber bookstore.
Brief Description of the Drawings
The above and other objects, features and other advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
Fig. 1 is a view showing a communication network architecture of a system for execution of a method for managing cyber libraries on the Internet in accordance with the present invention;
Fig. 2a is a view showing establishments of cyber libraries within a cyber area of a management center by a plurality of users in accordance with the present invention;
Fig. 2b is a view showing establishments of cyber bookstores within the cyber area of the management center by a plurality of cyber bookstore managers in accordance with the present invention;
Fig. 3 is a flowchart illustrating the method for managing cyber libraries on the Internet in accordance with the present invention;
Fig. 4 is a flowchart illustrating in detail the method for managing cyber libraries on the Internet in accordance with the present invention, illustrated in Fig.
3;
Fig. 5 is a flowchart illustrating a method for managing, cyber bookstores on the Internet in accordance with the present invention;
Fig. 6 is a flowchart illustrating the use of cyber bookstores by a user in accordance with the present invention; and
Fig. 7 is a view showing an exemplary construction of the system for execution of the method for managing cyber libraries on the Internet in accordance with the present invention.
Best Mode for Carrying Out the Invention
Fig. 1 is a view showing a communication network architecture of a system for execution of a method for managing cyber libraries on the Internet in accordance with the present invention, Fig. 2a is a view showing establishments of cyber libraries within a cyber area of a management center by a plurality of users in accordance with the present invention, and Fig. 3 is a flowchart illustrating the method for managing cyber libraries on the Internet in accordance with the present invention. In order to read a desired book, a specific user first gains access to the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step SI. If the user enters his or her member identification (ID) and password at step S2, then the management center determines at step S3 whether the entered ID and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S3 that the entered ID and password are not the same as those of the registered member information, namely, the user is not a member having his or her own cyber library, then the management center determines at step S4 whether the user wishes to register himself or herself as the member. Upon determining at step S4 that the user wishes to register himself or herself as the member, the management center guides the user to fill out a member registration application sheet at step S5. If the user has filled out the member registration application sheet at step S5, then the management center assigns a member ID to the user at step S6 and establishes a cyber library of the user at step S7. On the other hand, in the case where it is determined at the above step S4 that the user does not wish to register himself or herself as the member, the management center releases the Internet connection to the user at step S8 and then ends its operation.
Also, in the case where it is determined at the above step S3 that the entered
ED and password are the same as those of the registered member information, namely, the user is the member, the management center allows the user to search his or her cyber library for the desired book at step Sll. The user searches his or her cyber library for the desired book at step Sl l and determines from the searched result at step S12 whether that book is present in his or her cyber library. If the desired book is determined to be present in the user's cyber library at step SI 2, the user reads it at step S13 and then releases the Internet connection to the management center at step S8.
Notably, the user can read the desired book based on an image or listen to the contents of the book based on voice. For the image-based reading, an image of one cyber book or publication is preferably displayed on the screen of the user's PC. Alternatively, images of a plurality of cyber books or publications may be displayed on the screen of the user's PC at the same time.
On the other hand, in the case where it is determined at the above step S12 that the desired book is not present in the user's cyber library, the user searches the book catalogue in the database of the management center for the desired book at step S14 and then determines from the searched result at step S15 whether that book is present in the book catalogue. If the desired book is determined to be present in the book catalogue in the database at step SI 5, then the management center determines at step SI 6 whether the user wishes to purchase that book. Upon determining at step S16 that the user wishes to purchase the desired book, the management center allows the user to settle his or her account for a purchasing price of that book at step SI 7. If the user settles his or her account for the purchasing price of the desired book at step SI 7, then the management center stores the purchased book in the established cyber library of the user at step S 18 and returns to the above step Sl l to sequentially perform the above steps Sl l, S12 and SI 3, thereby allowing the user to read the desired book in real time.
On the other hand, in the case where it is determined at the above step S15 that the desired book is not present in the book catalogue in the database, the user requests the management center to obtain that book at step SI 9, and then proceeds to
the above step S8 to release the Internet connection to the management center. Similarly, in the case where it is determined at the above step S16 that the user does not wish to purchase the desired book, the management center proceeds to the above step S8 to release the Internet connection to the user and end its operation. Also, after establishing the cyber library of the user at the above step S7, the management center returns to the above step S2 to sequentially perform it and the subsequent steps.
Notably, if the user has established his or her cyber library for the first time, there is no book in the cyber library. In this regard, the management center sets some books in its database as basic books and allows the user to select a limited number of books from among the basic books. If the user selects some of the basic books, the management center stores the selected books free of charge in the user's cyber library established for the first time, so as to provide a basic construction of the cyber library. In addition, the established cyber library of the user has the same function as an actual bookcase of the user. In this connection, the user may model the established cyber library in various fashions according to his or her taste or the number of cyber books and publications provided therein like, for example, his or her actual bookcase, in a similar manner to constructing a homepage within the cyber space of the management center on the Internet.
Fig. 4 is a flowchart illustrating in detail the method for managing cyber libraries on the Internet in accordance with the present invention, illustrated in Fig. 3. In order to read a desired book, a specific user first gains access to the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step S21. If the user enters his or her member ID and password at step S22, then the management center determines at step S23 whether the entered ID and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S23
that the entered ID and password are not the same as those of the registered member information, namely, the user is not a member having his or her own cyber library, then the management center determines at step S24 whether the user wishes to register himself or herself as the member. Upon determining at step S24 that the user wishes to register himself or herself as the member, the management center guides the user to fill out a member registration application sheet at step S25. If the user has filled out the member registration application sheet at step S25, then the management center assigns a member ID to the user at step S26, establishes a cyber library of the user at step S27 and proceeds to step S28. On the other hand, in the case where it is determined at the above step S24 that the user does not wish to register himself or herself as the member, the management center releases the Internet connection to the user at step S57 and then ends its operation.
Also, in the case where it is determined at the above step S23 that the entered ID and password are the same as those of the registered member information, namely, the user is the member, the management center allows the user to search his or her cyber library for the desired book at step S28. At this time, the user requests the management center to send information regarding a catalogue of books in his or her cyber library at step S38. If the management center sends the book catalogue information, the user receives the sent book catalogue information and then determines at step S39 whether the desired book is present in the book catalogue information. If the desired book is determined to be present in the book catalogue information at step S39, then the user requests the management center to send information about the style of the desired book at step S40. Subsequently, if the management center sends the book style information, the user receives the sent book style information at step S41, selects a page of the desired book to be read at step S42 and then requests the center to send data about the selected page at step S44.
Then, the user receives text data (or image data) and user information (for example, memos) of the selected page sent from the management center (cyber
library server) at step S45 and reads the received page data and information at step S46.
The management center determines at step S47 whether the user desires user information management. Upon determining at step S47 that the user desires the user information management, the management center further determines at step S48 whether the user desires user information registration. If it is determined at step S48 that the user desires user information deletion, the management center proceeds to step S49 to allow the user to select a desired text area of the selected page having user information recorded thereon to be deleted. The user selects the desired text area of the selected page at step S49, requests the management center to delete the user information recorded on the selected text area at step S50, and then releases the Internet connection to the management center at step S57.
In the case where it is determined at the above step S48 that the user desires the user information registration, the management center proceeds to step S51 to allow the user to select a desired user information tool (an underline, fluorescent pen, note, memo or the like). The user selects the desired user information tool at step S51, records new user information using the selected user information tool at step S52, registers the recorded user information in the management center at step S53 and then releases the Internet connection to the center at step S57. In the case where it is determined at the above step S48 that the user desires user information modification, the management center proceeds to step S54 to allow the user to select a desired text area of the selected page having user information recorded thereon to be modified. The user selects the desired text area of the selected page at step S54, modifies the user information recorded on the selected text area at step S55, registers the modified user information in the management center at step S56 and then releases the Internet connection to the center at step S57. On the other hand, in the case where it is determined at the above step S39 that the desired book is not present in the book catalogue information, the user proceeds to the above step S57 to release the Internet connection to the management center. Also, upon determining at the above step S47 that the user does not desire
the user information management, the management center returns to the above step S42 to sequentially repeat the above steps S42 to S47.
On the other hand, if the user does not search his or her cyber library for the desired book at the above step S28, the management center proceeds to step S29 to determine whether the user wishes to purchase the desired book. Upon determining at step S29 that the user wishes to purchase the desired book, the management center proceeds to step S30 to allow the user to select a cyber bookstore. The user selects the cyber bookstore at step S30, accesses it at step S31, searches its library for a catalogue of books therein at step S32 and then determines at step S33 whether the desired book is present in the book catalogue.
In the case where it is determined at the above step S33 that the desired book is present in the book catalogue in the library of the selected cyber bookstore, the user proceeds to step S35 to apply for the purchase of the desired book. Then, the user settles his or her account for a purchasing price of the desired book at step S36, adds the purchased book to the catalogue of books in his or her cyber library at step S37 and returns to the above step S28 to sequentially perform it and the subsequent steps.
Upon determining at the above step S29 that the user does not wish to purchase the desired book, the management center proceeds to the "above step S57 to release the Internet connection to the user. In the case where it is determined at the above step S33 that the desired book is not present in the book catalogue in the library of the selected cyber bookstore, the user proceeds to step S34 to request the management center to obtain the desired book, and then returns to the above step S28 to sequentially perform it and the subsequent steps. Fig. 2b is a view showing establishments of cyber bookstores within the cyber area of the management center by a plurality of cyber bookstore managers in accordance with the present invention and Fig. 5 is a flowchart illustrating a method for managing cyber bookstores on the Internet in accordance with the present invention. In order to have a desired book for sale, a specific cyber bookstore manager (referred to hereinafter as an "establisher") first gains access to
the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step S61. If the establisher enters his or her member ID and password at step S62, then the management center determines at step S63 whether the entered ED and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S63 that the entered ID and password are not the same as those of the registered member information, namely, the establisher is not a member having his or her own cyber bookstore, then the management center determines at step S64 whether the establisher wishes to register himself or herself as the member. Upon determining at step S64 that the establisher wishes to register himself or herself as the member, the management center guides the establisher to fill out a member registration application sheet at step S65. If the establisher has filled out. the member registration application sheet at step S65, then the management center assigns a member ID to the establisher at step S66, establishes a cyber bookstore of the establisher at step S67 and proceeds to step S68.
On the other hand, in the case where it is determined at the above step S64 that the establisher does not wish to register himself or herself as the member, the management center releases the Internet connection to the establisher at step S74 and then ends its operation.
Also, in the case where it is determined at the above step S63 that the entered ID and password are the same as those of the registered member information, namely, the establisher is the member, the management center allows the establisher to search the book catalogue in the database of the center for the desired book for sale, to be provided in his or her own cyber bookstore, at step S68. The establisher searches the book catalogue in the database for the desired book for sale at step S68 and then determines from the searched result at step S69 whether the desired book is present in the book catalogue. Upon determining at step S69 that the desired book is present in the book catalogue in the database, the establisher
purchases a license for the sale of the desired book at step S71 and settles his or her account for a purchasing price of the license at step S72. Subsequently, the establisher adds the desired book to a catalogue of books for sale in his or her cyber bookstore at step S73 and then releases the Internet connection to the management center at step S74.
On the other hand, in the case where it is determined at the above step S69 that the desired book is not present in the book catalogue in the database of the management center, the establisher requests the center to obtain the desired book at step S70, and then proceeds to the above step S74 to release the Internet connection to the management center.
Fig. 6 is a flowchart illustrating a procedure where a specific user enters a specific cyber bookstore established within the cyber space of the management center and reads a desired book in the specific cyber bookstore, according to the present invention. In order to access the specific cyber bookstore and read the desired book therein, the specific user first gains access to the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step S80. If the user enters his or her member ID and password at step S81, then the management center determines at step S82 whether the entered ID and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S82 that the entered ID and password are not the same as those of the registered member information, namely, the user is not a member, then the management center determines at step S83 whether the user wishes to register himself or herself as the member. Upon determining at step S83 that the user wishes to register himself or herself as the member, the management center guides the user to fill out a member registration application sheet at step S84. If the user has filled out the member registration application sheet at step S84, then the management center assigns a member ID to the user at step S85.
On the other hand, in the case where it is determined at the above step S83 that the user does not wish to register himself or herself as the member, the management center releases the Internet connection to the user at step S91 and then ends its operation. Also, in the case where it is determined at the above step S82 that the entered ID and password are the same as those of the registered member information, namely, the user is the member, the management center allows the user to search a list of cyber bookstores in the database of the center for the specific cyber bookstore expected to have the desired book at step S86. The user searches the cyber bookstore list in the database for the expected cyber bookstore at step S86 and then selects (accesses) the searched cyber bookstore at step S87.
It should be noted that various modifications of cyber bookstores are possible without departing from the scope and spirit of the invention. For example, cyber bookstores may be established according to genres of books, such as literature, art, religion, etc., or countries of origin of books, such as USA, Japan, etc. Alternatively, one cyber bookstore may have books published in two countries.
After performing the above step S87, the user searches the selected cyber bookstore for the desired book at step S88 to determine whether that book is present in the selected cyber bookstore. If it is determined at step S88 that the desired book is present in the selected cyber bookstore, the user reads it at step S89, settles his or her account for a reading fee with a manager of the cyber bookstore at step S90 and then releases the Internet connection to the management center at step S91. Notably, the user can read the desired book based on an image or listen to the contents of the book based on voice. For the image-based reading, an image of one cyber book or publication is preferably displayed on the screen of the user's PC. Alternatively, images of a plurality of cyber books or publications may be displayed on the screen of the user's PC at the same time. On the other hand, in the case where it is determined at the above step S88
that the desired book is not present in the selected cyber bookstore, the user returns to the above step S86 to sequentially repeat the above steps S86 and S87. As a result, the user searches the cyber bookstore list in the database for a different cyber bookstore and then accesses the searched cyber bookstore to read the desired book therein.
Although the preferred embodiment of Fig. 6 has been disclosed to allow the user to read the desired book in the selected cyber bookstore, this invention is not limited thereto. For example, the step of allowing the user to purchase the desired book (the real one) in a conventional manner may be additionally provided before the above step S89, and publishing companies, local bookstores and commodity distribution centers may be linked to the present system in a chain manner. In this case, provided that the user wishes to purchase the desired book in a conventional manner, he or she will select the book purchase step. If the user pays a purchasing price of the desired book to the cyber bookstore manager after applying for the purchase of that book, then the manager instructs a publishing company, local bookstore or commodity distribution center nearest the user's location to deliver the desired book directly to the user.
Further, the user may provide his or her own books and information to the management center to request the center to database them. In this case, the user can store the databased books and information in his or her cyber library, thereby eliminating separate book/information preservation means such as a bookcase, notebook and the like. Therefore, the user can utilize space for the separate book/information preservation means for other purposes.
Fig. 7 is a view showing an exemplary construction of the system for execution of the method for managing cyber libraries on the Internet in accordance with the present invention. As shown in this drawing, a specific user can access the Internet using a personal computer (PC), personal digital assistants (PDA) or Web TV and read a desired book in his or her cyber library in real time at any time or place. Moreover, the user can append notes, memos, bookmarks and the like to
the desired book read in his or her cyber library, and a database server can be provided to construct a book associated database (DB) for storing book data, etc., a common DB for storing contents provider (CP) information, writer information, publishing company information, etc., a user DB for storing user information, user library information, memo information, bookmark information, note information, etc., and a transaction DB for storing sale information, lending information, statistical information, etc. Accordingly, the user can read a variety of books and associated information in his or her cyber library in real time.
Industrial Applicability
As apparent from the above description, the present invention provides a method for managing cyber libraries and cyber bookstores on the Internet, wherein a user can in real time read or purchase a desired cyber book or publication in a cyber bookstore or his or her cyber library established within a cyber space on the Internet to obtain knowledge and information from the desired cyber book or publication, resulting in a reduction in cost required in purchasing an actual book or publication. Further, the user can store knowledge information (i.e., a summary or notes) produced by himself or herself in his or her cyber library to manage and utilize the produced knowledge information repeatedly and permanently at any place or environment. Moreover, there is no need for libraries of individuals and organizations and in turn managers thereof, leading to considerable economic savings. Also, the user can search for a desired cyber book or publication with reference to a specialist's recommendation or summary in a search picture displayed on the screen so that he or she can select the desired cyber book conveniently.
Further, writers can provide books to a management center and receive copyright fees therefrom, and publishing companies can provide publications to the management center and receive compensations therefrom, thereby significantly curtailing a publishing cost including print and bookbinding costs, and a commodity distribution cost, eliminating the costs resulting from inventory management and
enabling the permanent preservation of publications as cyber books.
Furthermore, a cyber bookstore manager can establish his or her cyber bookstore within the cyber space on the Internet so that he or she can sell books without restrictions in space and location, save stock handling expenses, and have no need to employ sales staff.
Therefore, the present invention has the advantages of reducing imports of paper products and conservation of national forest resources, as well as promoting information management modernization through digitahzation of public and private libraries. Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.
Claims
1. A method for managing cyber libraries on the Internet, comprising the steps of: a) by a user, gaining access to a management center through an Internet access tool; b) by said management center, checking an identification and password of the user to determine whether said user is a member having his or her own cyber library on the Internet; c) by said management center, providing a cyber book or publication desired by said user to said user's cyber library in real time if it is determined at said step b) that said user is the member; and d) by said user, purchasing a cyber book or publication, which is not present in his or her cyber library, from a database of said management center over the Internet and storing the purchased cyber book or publication in his or her cyber library.
2. The method as set forth in Claim 1, wherein said database of said management center is adapted to store data about cyber books and publications provided from computers of writers and publishing companies, and information about members registered in said management center.
3. The method as set forth in Claim 2, wherein said database of said management center is further adapted to store data about catalogues by countries, languages, sexes and genres of databased cyber books and publications, and data about abstracts and specialists' recommendations of the databased cyber books and publications.
4. The method as set forth in Claim 1, wherein said step d) includes the step of by said user, settling his or her account for a purchasing price of said cyber book or publication which is not present in his or her cyber library.
5. The method as set forth in Claim 1, further comprising the step of: e) by said management center, determining whether said user wishes to register himself or herself as the member, if it is determined at said step b) that said user is not the member, and then establishing a cyber library of said user if he or she wishes to register himself or herself as the member.
6. The method as set forth in Claim 5, wherein said cyber library is modeled in a fashion depending on the number of cyber books and publications provided therein or a taste of said user.
7. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, based on an image or listening to the contents thereof based on voice.
8. The method as set forth in Claim 7, wherein said image-based reading is conducted through an image of one cyber book or publication displayed on the screen of a computer of said user or images of a plurality of cyber books or publications displayed on the computer screen at the same time.
9. A method for managing cyber bookstores on the Internet, comprising the steps of: a) by a cyber bookstore manager, gaining access to a management center through an Internet access tool; b) by said management center, checking an identification and password of the cyber bookstore manager to determine whether said manager is a member having his or her own cyber bookstore on the Internet; c) by the cyber bookstore manager, providing a cyber book or publication desired by a user to said user's cyber library in real time if it is determined at said step b) that said manager is the member; and d) by said cyber bookstore manager, purchasing a cyber book or publication, which is not present in his or her cyber bookstore, from a database of said management center over the Internet and storing the purchased cyber book or publication in his or her cyber bookstore.
10. The method as set forth in Claim 1, wherein : said user's identification includes a resident registration number of said user ; and said management center determines from said resident registration number whether said user is an adult and then shuts the user off from cyber books and publications for adult only in said user's cyber library if said user is not an adult.
11. The method as set forth in Claim 1, wherein said step d) includes the step of by said user, scrapping the purchased cyber book or publication.
12. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while underlining the read cyber book or publication or appending notes to it to read it conveniently in future.
13. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while appending a bookmark to the read cyber book or publication to read it conveniently in future.
14. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while creating a notebook associated with the read cyber book or publication and storing the created notebook in his or her cyber library to read it conveniently in future.
15. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while listening to music provided from said management center.
16. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while making or receiving a telephone call.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU42844/01A AU4284401A (en) | 2000-03-28 | 2001-03-22 | Method for managing cyber libraries and cyber bookstores on internet |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR2000/15904 | 2000-03-28 | ||
KR1020000015904A KR20010093375A (en) | 2000-03-28 | 2000-03-28 | An Administrative Method of Cyber Library and Cyber Bookstore |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001073667A1 true WO2001073667A1 (en) | 2001-10-04 |
Family
ID=19659387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2001/000456 WO2001073667A1 (en) | 2000-03-28 | 2001-03-22 | Method for managing cyber libraries and cyber bookstores on internet |
Country Status (3)
Country | Link |
---|---|
KR (1) | KR20010093375A (en) |
AU (1) | AU4284401A (en) |
WO (1) | WO2001073667A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000037005A (en) * | 2000-04-04 | 2000-07-05 | 신영선 | A virtual multimedia individual library system |
KR100407089B1 (en) * | 2000-08-21 | 2003-11-28 | 황승희 | Apparatus and method for realizing real-world books and bookstore through network |
KR20010016129A (en) * | 2000-11-09 | 2001-03-05 | 김연호 | Method for lending electronic book on internet and device using the same |
KR20010099023A (en) * | 2001-08-13 | 2001-11-09 | -- | A Books Managing System of School Using A Internet |
KR20020028054A (en) * | 2002-03-26 | 2002-04-15 | 김중환 | The membership system and business method which leads internet reading guidance and electronic book lending |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998008344A2 (en) * | 1996-08-13 | 1998-02-26 | Softbook Press, Inc. | Method and apparatus for viewing electronic reading materials |
US6014628A (en) * | 1997-11-03 | 2000-01-11 | Exigent International, Inc. | Method and system for tracking any entity through any set of processes utilizing a temporal projection |
US6012890A (en) * | 1996-10-04 | 2000-01-11 | Instabook Corporation | Electronic bookstore vending machine |
US6014666A (en) * | 1997-10-28 | 2000-01-11 | Microsoft Corporation | Declarative and programmatic access control of component-based server applications using roles |
-
2000
- 2000-03-28 KR KR1020000015904A patent/KR20010093375A/en not_active Application Discontinuation
-
2001
- 2001-03-22 AU AU42844/01A patent/AU4284401A/en not_active Abandoned
- 2001-03-22 WO PCT/KR2001/000456 patent/WO2001073667A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998008344A2 (en) * | 1996-08-13 | 1998-02-26 | Softbook Press, Inc. | Method and apparatus for viewing electronic reading materials |
US6012890A (en) * | 1996-10-04 | 2000-01-11 | Instabook Corporation | Electronic bookstore vending machine |
US6014666A (en) * | 1997-10-28 | 2000-01-11 | Microsoft Corporation | Declarative and programmatic access control of component-based server applications using roles |
US6014628A (en) * | 1997-11-03 | 2000-01-11 | Exigent International, Inc. | Method and system for tracking any entity through any set of processes utilizing a temporal projection |
Also Published As
Publication number | Publication date |
---|---|
AU4284401A (en) | 2001-10-08 |
KR20010093375A (en) | 2001-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5074570B2 (en) | How to provide font services | |
Rosenblatt | The Digital object identifier: Solving the dilemma of copyright protection online | |
Cottrell et al. | First‐Mover (Dis) Advantage And Real Options | |
Ahmareen et al. | Book Shala: An android-based application design and implementation of sharing books | |
JP2009205319A (en) | Data processing method for cellphone in electronic book sales system, and the electronic book sales system | |
KR100684247B1 (en) | Information transmitting and receiving method, information transmitting apparatus and information receiving apparatus, in which layout information is used | |
WO2001073667A1 (en) | Method for managing cyber libraries and cyber bookstores on internet | |
JP2002091960A (en) | Word and phrase input system, method and program | |
KR20030014948A (en) | Knowledge sharing and reward system for knowledge information providers through the Internet | |
JP2005025664A (en) | Receipt issue management device, receipt issue management system and program for receipt issue management device | |
KR100891879B1 (en) | The Contents Administration System using Platform | |
KR20020015544A (en) | An electronic contract system and a method thereof on the network | |
JP2002314612A (en) | Server, information providing support system and method, and program | |
JP2009064220A (en) | Method and system for permitting access to web site for disclosing related information of printed matter, only to owner of printed matter | |
JP2011518390A (en) | System and method for providing permanent data records | |
WO2006068387A1 (en) | Method for providing font service on service page and system for executing the method | |
JP2003108879A (en) | Proposal draw-up support system, program and recording medium | |
KR20020083233A (en) | method of funishing the administration information as well as a brand on network | |
Rozental | Utilisation of Optical Fibre in Telecom Australia's Customer Access Network | |
KR20030012547A (en) | A Digital book providing system on internet and A Method of the same | |
Mueller | Museum and Archive Software for the BMW Corporate Archives | |
KR20050029532A (en) | Method and system of on-line legal information and service for members in the entertainment industry | |
DeZelar-Tiedman | Redefining library resources in discovery systems | |
Rao | Electronic books: A new genre of content management | |
JP2013140638A (en) | Phrase input system, method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |