WO2001073667A1 - Method for managing cyber libraries and cyber bookstores on internet - Google Patents

Method for managing cyber libraries and cyber bookstores on internet Download PDF

Info

Publication number
WO2001073667A1
WO2001073667A1 PCT/KR2001/000456 KR0100456W WO0173667A1 WO 2001073667 A1 WO2001073667 A1 WO 2001073667A1 KR 0100456 W KR0100456 W KR 0100456W WO 0173667 A1 WO0173667 A1 WO 0173667A1
Authority
WO
WIPO (PCT)
Prior art keywords
cyber
user
book
management center
library
Prior art date
Application number
PCT/KR2001/000456
Other languages
French (fr)
Inventor
Soo-Chul Lee
Original Assignee
Lee Soo Chul
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lee Soo Chul filed Critical Lee Soo Chul
Priority to AU42844/01A priority Critical patent/AU4284401A/en
Publication of WO2001073667A1 publication Critical patent/WO2001073667A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Abstract

A method for managing cyber libraries and cyber bookstores on the Internet. The method comprises the step (S21 or S61) of connecting a user to a management center through an Internet access tool, the step (S23 or S63) of checking an ID and password of the user to determine whether the user is a member having his or her own cyber library or cyber bookstore on the Internet, the step (S45) of providing cyber books and publications desired by the user to the user's cyber bookstore or cyber library in real time, the step (S35 or S71) of allowing the user to purchase a desired book, which is not present in his or her cyber bookstore or cyber library, from a database of the management center over the Internet and to store the purchased book in his or her cyber bookstore or cyber library.

Description

METHOD FOR MANAGING CYBER LIBRARIES AND CYBER BOOKSTORES ON INTERNET
Technical Field
The present invention relates in general to a method for managing libraries and bookstores on the Internet, and more particularly to a method for managing cyber libraries and cyber bookstores on the Internet, wherein a user such as an individual or organization can create his or her own cyber library or cyber bookstore within a cyber space on the Internet, read or purchase desired cyber books in a cyber bookstore established within a cyber space of a management center or in his or her own cyber library in real time over a communication network to obtain knowledge and information from the desired cyber books, and store information produced by himself or herself to utilize the produced information repeatedly and permanently.
Background Art
In human social life since creation of written characters, books and publications (these will hereinafter be referred to only as "books") have become one of important means for the exchange and transfer of information between persons. Persons purchase and read books in a general manner to obtain a variety of knowledge or information therefrom. Or, persons read or borrow a variety of books from a reading room or library to obtain desired information or knowledge therefrom. Recently, persons unconditionally download or merely read information (files) from electronic books (E-books).
However, a great cost and a large amount of time are required for persons to acquire a variety of books to obtain a variety of knowledge and information therefrom. In other words, a person must go to a bookstore having a desired book in order to purchase the desired book therefrom, or to a reading room or library having the desired book in order to borrow or read the desired book therefrom. This leads to considerable economic and time wastage resulting from the movement to a place where the desired book is present, not even considering a purchasing price of the desired book. In addition, the person camiot read the desired book at a desired time, that is, he or she cannot utilize the desired book in real time.
The contents of an E-book are generally digitized and downloaded to a user's personal computer (PC) or dedicated terminal in a file form. However, this E-book is disadvantageous in that it can be opened only at an initial download place, resulting in a "limitation in movement". Further, the E-book is defenseless against copyright infringement because it is easy to illegally copy the downloaded E-book files and illegally transfer them over the Internet.
Furthermore, provided that the user's system is damaged due to a physical shock or virus, the user will make a demand for the E-book upon an E-book provider to again download or purchase it, resulting in economic loss and inconvenience, thereby making it impossible for the user to create his or her own knowledge information using the E-book, preserve it and utilize it permanently.
Disclosure of the Invention
Therefore, the present invention has been made in view of the above problems, and it is an object of the present invention to provide a method for managing cyber libraries and cyber bookstores on the Internet, wherein a user such as an individual or organization can create his or her own cyber library or cyber bookstore within a cyber space on the Internet, read or purchase desired cyber books in a cyber bookstore established within a cyber space of a management center or in his or her own cyber library in real time over a communication network to obtain knowledge and information from the desired cyber books, and store knowledge or information produced by himself or herself to utilize the produced information repeatedly and permanently at any place or environment able to use Internet networks (including wired and wireless Internet networks), and copyright of cyber books can be certainly protected.
In accordance with one aspect of the present invention, the above and other objects can be accomplished by a provision of a method for managing cyber libraries on the Internet, comprising the steps of a) by a user, gaining access to a management center through an Internet access tool; b) by the management center, checking an identification and password of the user to determine whether the user is a member having his or her own cyber library on the Internet; c) by the management center, providing a cyber book or publication desired by the user to the user's cyber library in real time if it is determined at the step b) that the user is the member; and d) by the user, purchasing a cyber book or publication, which is not present in his or her cyber library, from a database of the management center over the Internet and storing the purchased cyber book or publication in his or her cyber library. Preferably, the database of the management center may store data about cyber books and publications provided from computers of writers and publishing companies, information about members registered in the management center, data about catalogues by countries, languages, sexes and genres of databased cyber books and publications, and data about abstracts and specialists' recommendations of the databased cyber books and publications.
In accordance with another aspect of the present invention, there is provided a method for managing cyber bookstores on the Internet, comprising the steps of a) by a cyber bookstore manager, gaining access to a management center through an Internet access tool; b) by the management center, checking an identification and password of the cyber bookstore manager to determine whether the manager is a member having his or her own cyber bookstore on the Internet; c) by the cyber bookstore manager, providing a cyber book or publication desired by a user to said user's cyber library in real time if it is determined at the step b) that the manager is the member; and d) by the cyber bookstore manager, purchasing a cyber book or publication, which is not present in his or her cyber bookstore, from a database of the management center over the Internet and storing the purchased cyber book or publication in his or her cyber bookstore.
Brief Description of the Drawings
The above and other objects, features and other advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
Fig. 1 is a view showing a communication network architecture of a system for execution of a method for managing cyber libraries on the Internet in accordance with the present invention;
Fig. 2a is a view showing establishments of cyber libraries within a cyber area of a management center by a plurality of users in accordance with the present invention;
Fig. 2b is a view showing establishments of cyber bookstores within the cyber area of the management center by a plurality of cyber bookstore managers in accordance with the present invention;
Fig. 3 is a flowchart illustrating the method for managing cyber libraries on the Internet in accordance with the present invention;
Fig. 4 is a flowchart illustrating in detail the method for managing cyber libraries on the Internet in accordance with the present invention, illustrated in Fig.
3;
Fig. 5 is a flowchart illustrating a method for managing, cyber bookstores on the Internet in accordance with the present invention;
Fig. 6 is a flowchart illustrating the use of cyber bookstores by a user in accordance with the present invention; and
Fig. 7 is a view showing an exemplary construction of the system for execution of the method for managing cyber libraries on the Internet in accordance with the present invention. Best Mode for Carrying Out the Invention
Fig. 1 is a view showing a communication network architecture of a system for execution of a method for managing cyber libraries on the Internet in accordance with the present invention, Fig. 2a is a view showing establishments of cyber libraries within a cyber area of a management center by a plurality of users in accordance with the present invention, and Fig. 3 is a flowchart illustrating the method for managing cyber libraries on the Internet in accordance with the present invention. In order to read a desired book, a specific user first gains access to the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step SI. If the user enters his or her member identification (ID) and password at step S2, then the management center determines at step S3 whether the entered ID and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S3 that the entered ID and password are not the same as those of the registered member information, namely, the user is not a member having his or her own cyber library, then the management center determines at step S4 whether the user wishes to register himself or herself as the member. Upon determining at step S4 that the user wishes to register himself or herself as the member, the management center guides the user to fill out a member registration application sheet at step S5. If the user has filled out the member registration application sheet at step S5, then the management center assigns a member ID to the user at step S6 and establishes a cyber library of the user at step S7. On the other hand, in the case where it is determined at the above step S4 that the user does not wish to register himself or herself as the member, the management center releases the Internet connection to the user at step S8 and then ends its operation.
Also, in the case where it is determined at the above step S3 that the entered ED and password are the same as those of the registered member information, namely, the user is the member, the management center allows the user to search his or her cyber library for the desired book at step Sll. The user searches his or her cyber library for the desired book at step Sl l and determines from the searched result at step S12 whether that book is present in his or her cyber library. If the desired book is determined to be present in the user's cyber library at step SI 2, the user reads it at step S13 and then releases the Internet connection to the management center at step S8.
Notably, the user can read the desired book based on an image or listen to the contents of the book based on voice. For the image-based reading, an image of one cyber book or publication is preferably displayed on the screen of the user's PC. Alternatively, images of a plurality of cyber books or publications may be displayed on the screen of the user's PC at the same time.
On the other hand, in the case where it is determined at the above step S12 that the desired book is not present in the user's cyber library, the user searches the book catalogue in the database of the management center for the desired book at step S14 and then determines from the searched result at step S15 whether that book is present in the book catalogue. If the desired book is determined to be present in the book catalogue in the database at step SI 5, then the management center determines at step SI 6 whether the user wishes to purchase that book. Upon determining at step S16 that the user wishes to purchase the desired book, the management center allows the user to settle his or her account for a purchasing price of that book at step SI 7. If the user settles his or her account for the purchasing price of the desired book at step SI 7, then the management center stores the purchased book in the established cyber library of the user at step S 18 and returns to the above step Sl l to sequentially perform the above steps Sl l, S12 and SI 3, thereby allowing the user to read the desired book in real time.
On the other hand, in the case where it is determined at the above step S15 that the desired book is not present in the book catalogue in the database, the user requests the management center to obtain that book at step SI 9, and then proceeds to the above step S8 to release the Internet connection to the management center. Similarly, in the case where it is determined at the above step S16 that the user does not wish to purchase the desired book, the management center proceeds to the above step S8 to release the Internet connection to the user and end its operation. Also, after establishing the cyber library of the user at the above step S7, the management center returns to the above step S2 to sequentially perform it and the subsequent steps.
Notably, if the user has established his or her cyber library for the first time, there is no book in the cyber library. In this regard, the management center sets some books in its database as basic books and allows the user to select a limited number of books from among the basic books. If the user selects some of the basic books, the management center stores the selected books free of charge in the user's cyber library established for the first time, so as to provide a basic construction of the cyber library. In addition, the established cyber library of the user has the same function as an actual bookcase of the user. In this connection, the user may model the established cyber library in various fashions according to his or her taste or the number of cyber books and publications provided therein like, for example, his or her actual bookcase, in a similar manner to constructing a homepage within the cyber space of the management center on the Internet.
Fig. 4 is a flowchart illustrating in detail the method for managing cyber libraries on the Internet in accordance with the present invention, illustrated in Fig. 3. In order to read a desired book, a specific user first gains access to the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step S21. If the user enters his or her member ID and password at step S22, then the management center determines at step S23 whether the entered ID and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S23 that the entered ID and password are not the same as those of the registered member information, namely, the user is not a member having his or her own cyber library, then the management center determines at step S24 whether the user wishes to register himself or herself as the member. Upon determining at step S24 that the user wishes to register himself or herself as the member, the management center guides the user to fill out a member registration application sheet at step S25. If the user has filled out the member registration application sheet at step S25, then the management center assigns a member ID to the user at step S26, establishes a cyber library of the user at step S27 and proceeds to step S28. On the other hand, in the case where it is determined at the above step S24 that the user does not wish to register himself or herself as the member, the management center releases the Internet connection to the user at step S57 and then ends its operation.
Also, in the case where it is determined at the above step S23 that the entered ID and password are the same as those of the registered member information, namely, the user is the member, the management center allows the user to search his or her cyber library for the desired book at step S28. At this time, the user requests the management center to send information regarding a catalogue of books in his or her cyber library at step S38. If the management center sends the book catalogue information, the user receives the sent book catalogue information and then determines at step S39 whether the desired book is present in the book catalogue information. If the desired book is determined to be present in the book catalogue information at step S39, then the user requests the management center to send information about the style of the desired book at step S40. Subsequently, if the management center sends the book style information, the user receives the sent book style information at step S41, selects a page of the desired book to be read at step S42 and then requests the center to send data about the selected page at step S44.
Then, the user receives text data (or image data) and user information (for example, memos) of the selected page sent from the management center (cyber library server) at step S45 and reads the received page data and information at step S46.
The management center determines at step S47 whether the user desires user information management. Upon determining at step S47 that the user desires the user information management, the management center further determines at step S48 whether the user desires user information registration. If it is determined at step S48 that the user desires user information deletion, the management center proceeds to step S49 to allow the user to select a desired text area of the selected page having user information recorded thereon to be deleted. The user selects the desired text area of the selected page at step S49, requests the management center to delete the user information recorded on the selected text area at step S50, and then releases the Internet connection to the management center at step S57.
In the case where it is determined at the above step S48 that the user desires the user information registration, the management center proceeds to step S51 to allow the user to select a desired user information tool (an underline, fluorescent pen, note, memo or the like). The user selects the desired user information tool at step S51, records new user information using the selected user information tool at step S52, registers the recorded user information in the management center at step S53 and then releases the Internet connection to the center at step S57. In the case where it is determined at the above step S48 that the user desires user information modification, the management center proceeds to step S54 to allow the user to select a desired text area of the selected page having user information recorded thereon to be modified. The user selects the desired text area of the selected page at step S54, modifies the user information recorded on the selected text area at step S55, registers the modified user information in the management center at step S56 and then releases the Internet connection to the center at step S57. On the other hand, in the case where it is determined at the above step S39 that the desired book is not present in the book catalogue information, the user proceeds to the above step S57 to release the Internet connection to the management center. Also, upon determining at the above step S47 that the user does not desire the user information management, the management center returns to the above step S42 to sequentially repeat the above steps S42 to S47.
On the other hand, if the user does not search his or her cyber library for the desired book at the above step S28, the management center proceeds to step S29 to determine whether the user wishes to purchase the desired book. Upon determining at step S29 that the user wishes to purchase the desired book, the management center proceeds to step S30 to allow the user to select a cyber bookstore. The user selects the cyber bookstore at step S30, accesses it at step S31, searches its library for a catalogue of books therein at step S32 and then determines at step S33 whether the desired book is present in the book catalogue.
In the case where it is determined at the above step S33 that the desired book is present in the book catalogue in the library of the selected cyber bookstore, the user proceeds to step S35 to apply for the purchase of the desired book. Then, the user settles his or her account for a purchasing price of the desired book at step S36, adds the purchased book to the catalogue of books in his or her cyber library at step S37 and returns to the above step S28 to sequentially perform it and the subsequent steps.
Upon determining at the above step S29 that the user does not wish to purchase the desired book, the management center proceeds to the "above step S57 to release the Internet connection to the user. In the case where it is determined at the above step S33 that the desired book is not present in the book catalogue in the library of the selected cyber bookstore, the user proceeds to step S34 to request the management center to obtain the desired book, and then returns to the above step S28 to sequentially perform it and the subsequent steps. Fig. 2b is a view showing establishments of cyber bookstores within the cyber area of the management center by a plurality of cyber bookstore managers in accordance with the present invention and Fig. 5 is a flowchart illustrating a method for managing cyber bookstores on the Internet in accordance with the present invention. In order to have a desired book for sale, a specific cyber bookstore manager (referred to hereinafter as an "establisher") first gains access to the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step S61. If the establisher enters his or her member ID and password at step S62, then the management center determines at step S63 whether the entered ED and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S63 that the entered ID and password are not the same as those of the registered member information, namely, the establisher is not a member having his or her own cyber bookstore, then the management center determines at step S64 whether the establisher wishes to register himself or herself as the member. Upon determining at step S64 that the establisher wishes to register himself or herself as the member, the management center guides the establisher to fill out a member registration application sheet at step S65. If the establisher has filled out. the member registration application sheet at step S65, then the management center assigns a member ID to the establisher at step S66, establishes a cyber bookstore of the establisher at step S67 and proceeds to step S68.
On the other hand, in the case where it is determined at the above step S64 that the establisher does not wish to register himself or herself as the member, the management center releases the Internet connection to the establisher at step S74 and then ends its operation.
Also, in the case where it is determined at the above step S63 that the entered ID and password are the same as those of the registered member information, namely, the establisher is the member, the management center allows the establisher to search the book catalogue in the database of the center for the desired book for sale, to be provided in his or her own cyber bookstore, at step S68. The establisher searches the book catalogue in the database for the desired book for sale at step S68 and then determines from the searched result at step S69 whether the desired book is present in the book catalogue. Upon determining at step S69 that the desired book is present in the book catalogue in the database, the establisher purchases a license for the sale of the desired book at step S71 and settles his or her account for a purchasing price of the license at step S72. Subsequently, the establisher adds the desired book to a catalogue of books for sale in his or her cyber bookstore at step S73 and then releases the Internet connection to the management center at step S74.
On the other hand, in the case where it is determined at the above step S69 that the desired book is not present in the book catalogue in the database of the management center, the establisher requests the center to obtain the desired book at step S70, and then proceeds to the above step S74 to release the Internet connection to the management center.
Fig. 6 is a flowchart illustrating a procedure where a specific user enters a specific cyber bookstore established within the cyber space of the management center and reads a desired book in the specific cyber bookstore, according to the present invention. In order to access the specific cyber bookstore and read the desired book therein, the specific user first gains access to the management center over the Internet using a given one of a variety of Internet access tools such as a Web browser, modem, dedicated line, etc. at step S80. If the user enters his or her member ID and password at step S81, then the management center determines at step S82 whether the entered ID and password are the same as those of member information registered in a database of the center where all book associated information, such as a catalogue of books, the contents of books and the like, are registered separately from the member information. If it is determined at step S82 that the entered ID and password are not the same as those of the registered member information, namely, the user is not a member, then the management center determines at step S83 whether the user wishes to register himself or herself as the member. Upon determining at step S83 that the user wishes to register himself or herself as the member, the management center guides the user to fill out a member registration application sheet at step S84. If the user has filled out the member registration application sheet at step S84, then the management center assigns a member ID to the user at step S85. On the other hand, in the case where it is determined at the above step S83 that the user does not wish to register himself or herself as the member, the management center releases the Internet connection to the user at step S91 and then ends its operation. Also, in the case where it is determined at the above step S82 that the entered ID and password are the same as those of the registered member information, namely, the user is the member, the management center allows the user to search a list of cyber bookstores in the database of the center for the specific cyber bookstore expected to have the desired book at step S86. The user searches the cyber bookstore list in the database for the expected cyber bookstore at step S86 and then selects (accesses) the searched cyber bookstore at step S87.
It should be noted that various modifications of cyber bookstores are possible without departing from the scope and spirit of the invention. For example, cyber bookstores may be established according to genres of books, such as literature, art, religion, etc., or countries of origin of books, such as USA, Japan, etc. Alternatively, one cyber bookstore may have books published in two countries.
After performing the above step S87, the user searches the selected cyber bookstore for the desired book at step S88 to determine whether that book is present in the selected cyber bookstore. If it is determined at step S88 that the desired book is present in the selected cyber bookstore, the user reads it at step S89, settles his or her account for a reading fee with a manager of the cyber bookstore at step S90 and then releases the Internet connection to the management center at step S91. Notably, the user can read the desired book based on an image or listen to the contents of the book based on voice. For the image-based reading, an image of one cyber book or publication is preferably displayed on the screen of the user's PC. Alternatively, images of a plurality of cyber books or publications may be displayed on the screen of the user's PC at the same time. On the other hand, in the case where it is determined at the above step S88 that the desired book is not present in the selected cyber bookstore, the user returns to the above step S86 to sequentially repeat the above steps S86 and S87. As a result, the user searches the cyber bookstore list in the database for a different cyber bookstore and then accesses the searched cyber bookstore to read the desired book therein.
Although the preferred embodiment of Fig. 6 has been disclosed to allow the user to read the desired book in the selected cyber bookstore, this invention is not limited thereto. For example, the step of allowing the user to purchase the desired book (the real one) in a conventional manner may be additionally provided before the above step S89, and publishing companies, local bookstores and commodity distribution centers may be linked to the present system in a chain manner. In this case, provided that the user wishes to purchase the desired book in a conventional manner, he or she will select the book purchase step. If the user pays a purchasing price of the desired book to the cyber bookstore manager after applying for the purchase of that book, then the manager instructs a publishing company, local bookstore or commodity distribution center nearest the user's location to deliver the desired book directly to the user.
Further, the user may provide his or her own books and information to the management center to request the center to database them. In this case, the user can store the databased books and information in his or her cyber library, thereby eliminating separate book/information preservation means such as a bookcase, notebook and the like. Therefore, the user can utilize space for the separate book/information preservation means for other purposes.
Fig. 7 is a view showing an exemplary construction of the system for execution of the method for managing cyber libraries on the Internet in accordance with the present invention. As shown in this drawing, a specific user can access the Internet using a personal computer (PC), personal digital assistants (PDA) or Web TV and read a desired book in his or her cyber library in real time at any time or place. Moreover, the user can append notes, memos, bookmarks and the like to the desired book read in his or her cyber library, and a database server can be provided to construct a book associated database (DB) for storing book data, etc., a common DB for storing contents provider (CP) information, writer information, publishing company information, etc., a user DB for storing user information, user library information, memo information, bookmark information, note information, etc., and a transaction DB for storing sale information, lending information, statistical information, etc. Accordingly, the user can read a variety of books and associated information in his or her cyber library in real time.
Industrial Applicability
As apparent from the above description, the present invention provides a method for managing cyber libraries and cyber bookstores on the Internet, wherein a user can in real time read or purchase a desired cyber book or publication in a cyber bookstore or his or her cyber library established within a cyber space on the Internet to obtain knowledge and information from the desired cyber book or publication, resulting in a reduction in cost required in purchasing an actual book or publication. Further, the user can store knowledge information (i.e., a summary or notes) produced by himself or herself in his or her cyber library to manage and utilize the produced knowledge information repeatedly and permanently at any place or environment. Moreover, there is no need for libraries of individuals and organizations and in turn managers thereof, leading to considerable economic savings. Also, the user can search for a desired cyber book or publication with reference to a specialist's recommendation or summary in a search picture displayed on the screen so that he or she can select the desired cyber book conveniently.
Further, writers can provide books to a management center and receive copyright fees therefrom, and publishing companies can provide publications to the management center and receive compensations therefrom, thereby significantly curtailing a publishing cost including print and bookbinding costs, and a commodity distribution cost, eliminating the costs resulting from inventory management and enabling the permanent preservation of publications as cyber books.
Furthermore, a cyber bookstore manager can establish his or her cyber bookstore within the cyber space on the Internet so that he or she can sell books without restrictions in space and location, save stock handling expenses, and have no need to employ sales staff.
Therefore, the present invention has the advantages of reducing imports of paper products and conservation of national forest resources, as well as promoting information management modernization through digitahzation of public and private libraries. Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.

Claims

Claims:
1. A method for managing cyber libraries on the Internet, comprising the steps of: a) by a user, gaining access to a management center through an Internet access tool; b) by said management center, checking an identification and password of the user to determine whether said user is a member having his or her own cyber library on the Internet; c) by said management center, providing a cyber book or publication desired by said user to said user's cyber library in real time if it is determined at said step b) that said user is the member; and d) by said user, purchasing a cyber book or publication, which is not present in his or her cyber library, from a database of said management center over the Internet and storing the purchased cyber book or publication in his or her cyber library.
2. The method as set forth in Claim 1, wherein said database of said management center is adapted to store data about cyber books and publications provided from computers of writers and publishing companies, and information about members registered in said management center.
3. The method as set forth in Claim 2, wherein said database of said management center is further adapted to store data about catalogues by countries, languages, sexes and genres of databased cyber books and publications, and data about abstracts and specialists' recommendations of the databased cyber books and publications.
4. The method as set forth in Claim 1, wherein said step d) includes the step of by said user, settling his or her account for a purchasing price of said cyber book or publication which is not present in his or her cyber library.
5. The method as set forth in Claim 1, further comprising the step of: e) by said management center, determining whether said user wishes to register himself or herself as the member, if it is determined at said step b) that said user is not the member, and then establishing a cyber library of said user if he or she wishes to register himself or herself as the member.
6. The method as set forth in Claim 5, wherein said cyber library is modeled in a fashion depending on the number of cyber books and publications provided therein or a taste of said user.
7. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, based on an image or listening to the contents thereof based on voice.
8. The method as set forth in Claim 7, wherein said image-based reading is conducted through an image of one cyber book or publication displayed on the screen of a computer of said user or images of a plurality of cyber books or publications displayed on the computer screen at the same time.
9. A method for managing cyber bookstores on the Internet, comprising the steps of: a) by a cyber bookstore manager, gaining access to a management center through an Internet access tool; b) by said management center, checking an identification and password of the cyber bookstore manager to determine whether said manager is a member having his or her own cyber bookstore on the Internet; c) by the cyber bookstore manager, providing a cyber book or publication desired by a user to said user's cyber library in real time if it is determined at said step b) that said manager is the member; and d) by said cyber bookstore manager, purchasing a cyber book or publication, which is not present in his or her cyber bookstore, from a database of said management center over the Internet and storing the purchased cyber book or publication in his or her cyber bookstore.
10. The method as set forth in Claim 1, wherein : said user's identification includes a resident registration number of said user ; and said management center determines from said resident registration number whether said user is an adult and then shuts the user off from cyber books and publications for adult only in said user's cyber library if said user is not an adult.
11. The method as set forth in Claim 1, wherein said step d) includes the step of by said user, scrapping the purchased cyber book or publication.
12. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while underlining the read cyber book or publication or appending notes to it to read it conveniently in future.
13. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while appending a bookmark to the read cyber book or publication to read it conveniently in future.
14. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while creating a notebook associated with the read cyber book or publication and storing the created notebook in his or her cyber library to read it conveniently in future.
15. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while listening to music provided from said management center.
16. The method as set forth in Claim 1, wherein said user reads said cyber book or publication provided in real time in his or her cyber library, while making or receiving a telephone call.
PCT/KR2001/000456 2000-03-28 2001-03-22 Method for managing cyber libraries and cyber bookstores on internet WO2001073667A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU42844/01A AU4284401A (en) 2000-03-28 2001-03-22 Method for managing cyber libraries and cyber bookstores on internet

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR2000/15904 2000-03-28
KR1020000015904A KR20010093375A (en) 2000-03-28 2000-03-28 An Administrative Method of Cyber Library and Cyber Bookstore

Publications (1)

Publication Number Publication Date
WO2001073667A1 true WO2001073667A1 (en) 2001-10-04

Family

ID=19659387

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2001/000456 WO2001073667A1 (en) 2000-03-28 2001-03-22 Method for managing cyber libraries and cyber bookstores on internet

Country Status (3)

Country Link
KR (1) KR20010093375A (en)
AU (1) AU4284401A (en)
WO (1) WO2001073667A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000037005A (en) * 2000-04-04 2000-07-05 신영선 A virtual multimedia individual library system
KR100407089B1 (en) * 2000-08-21 2003-11-28 황승희 Apparatus and method for realizing real-world books and bookstore through network
KR20010016129A (en) * 2000-11-09 2001-03-05 김연호 Method for lending electronic book on internet and device using the same
KR20010099023A (en) * 2001-08-13 2001-11-09 -- A Books Managing System of School Using A Internet
KR20020028054A (en) * 2002-03-26 2002-04-15 김중환 The membership system and business method which leads internet reading guidance and electronic book lending

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998008344A2 (en) * 1996-08-13 1998-02-26 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials
US6014628A (en) * 1997-11-03 2000-01-11 Exigent International, Inc. Method and system for tracking any entity through any set of processes utilizing a temporal projection
US6012890A (en) * 1996-10-04 2000-01-11 Instabook Corporation Electronic bookstore vending machine
US6014666A (en) * 1997-10-28 2000-01-11 Microsoft Corporation Declarative and programmatic access control of component-based server applications using roles

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998008344A2 (en) * 1996-08-13 1998-02-26 Softbook Press, Inc. Method and apparatus for viewing electronic reading materials
US6012890A (en) * 1996-10-04 2000-01-11 Instabook Corporation Electronic bookstore vending machine
US6014666A (en) * 1997-10-28 2000-01-11 Microsoft Corporation Declarative and programmatic access control of component-based server applications using roles
US6014628A (en) * 1997-11-03 2000-01-11 Exigent International, Inc. Method and system for tracking any entity through any set of processes utilizing a temporal projection

Also Published As

Publication number Publication date
AU4284401A (en) 2001-10-08
KR20010093375A (en) 2001-10-29

Similar Documents

Publication Publication Date Title
JP5074570B2 (en) How to provide font services
Rosenblatt The Digital object identifier: Solving the dilemma of copyright protection online
Cottrell et al. First‐Mover (Dis) Advantage And Real Options
Ahmareen et al. Book Shala: An android-based application design and implementation of sharing books
JP2009205319A (en) Data processing method for cellphone in electronic book sales system, and the electronic book sales system
KR100684247B1 (en) Information transmitting and receiving method, information transmitting apparatus and information receiving apparatus, in which layout information is used
WO2001073667A1 (en) Method for managing cyber libraries and cyber bookstores on internet
JP2002091960A (en) Word and phrase input system, method and program
KR20030014948A (en) Knowledge sharing and reward system for knowledge information providers through the Internet
JP2005025664A (en) Receipt issue management device, receipt issue management system and program for receipt issue management device
KR100891879B1 (en) The Contents Administration System using Platform
KR20020015544A (en) An electronic contract system and a method thereof on the network
JP2002314612A (en) Server, information providing support system and method, and program
JP2009064220A (en) Method and system for permitting access to web site for disclosing related information of printed matter, only to owner of printed matter
JP2011518390A (en) System and method for providing permanent data records
WO2006068387A1 (en) Method for providing font service on service page and system for executing the method
JP2003108879A (en) Proposal draw-up support system, program and recording medium
KR20020083233A (en) method of funishing the administration information as well as a brand on network
Rozental Utilisation of Optical Fibre in Telecom Australia's Customer Access Network
KR20030012547A (en) A Digital book providing system on internet and A Method of the same
Mueller Museum and Archive Software for the BMW Corporate Archives
KR20050029532A (en) Method and system of on-line legal information and service for members in the entertainment industry
DeZelar-Tiedman Redefining library resources in discovery systems
Rao Electronic books: A new genre of content management
JP2013140638A (en) Phrase input system, method and program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP