A large and growing population of users is enjoying entertainment through the consumption of digital media items, such as music, movies, images, electronic books, and so on. The users employ various electronic devices to consume such media items. Among these electronic devices are electronic book (“eBook”) readers, cellular telephones, personal digital assistant (PDA), portable media players, tablet computers, netbooks, and the like.
These electronic devices are often accompanied by one or more accessories. Existing accessories for electronic devices generally contribute to aesthetics and provide protection (e.g., cover or case) or alternatively enhance the functionality of the electronic device (e.g., memory stick or wireless card). Carrying numerous accessories may detract from the portability of a mobile electronic device and the purpose of some accessories may be obscure to users who are not familiar with the functionality included in modern electronic devices.
As the popularity of such devices continues to grow, there is an ongoing need for ways to enhance or improve functionality of these devices through the use of accessories without detracting from the user experience.
The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical components or features.
This disclosure is directed towards an assembly of a dedicated handheld electronic book (“eBook”) reader device and an accessory for that eBook reader device. The eBook reader device is designed to allow users to read or otherwise consume electronic content (e.g., text, graphics, multimedia, and the like), such as that found in eBooks, magazines, RSS feeds, newspapers, and the like.
The accessory is configured to be used with the eBook reader device, and particularly, to enable access to content for the eBook reader device when in use. In the implementations described herein, the accessory is embodied as a cover for the eBook reader device. While the cover protects the device and modifies aesthetics, it is also configured to supply a password or other key to unlock additional content that is otherwise unavailable to the eBook reader device.
While the accessory is described in the context of a cover, it is noted that potentially other types of accessories may be configured to enable access to content for the eBook reader device. Such accessories may include, but are not limited to, a reading light, a stand or support structure, a carrying case, or any other mechanism that is not typically designed or intended to alter or extend functionality of the eBook reader device itself. Accordingly, the discussion of a cover in this disclosure may equally apply to other such types of accessories that may be used in conjunction with the eBook reader device.
Illustrative Architecture
The cover 104 may be physically affixed to the eBook reader device 102 by one or more connectors 108. In the illustrated implementation of
The connectors 108 may further facilitate an electrical connection as well as a physical connection. For example, a connector 108 may carry electrical current for power or signaling. The connector 108 may be a single conductor, providing a single current path, or may contain a plurality of conductors insulated from one another. For example, a top conductive layer may be separated from a bottom conductive layer by an insulator, forming two conductive pathways. Alternately, a non-conductive connector 108, or a connector 108 coated with an insulator, may have a plurality of conductive traces disposed along a surface of the connector 108.
A communicative connection 110 is established between the cover 104 and the eBook reader device 102 when the cover 104 is placed on and physically connected with the eBook reader device 102. The communicative connection 110 may be used to provide a password or other information from the cover 104 to the eBook reader device 102 to enable access to content that would otherwise be unavailable to the device 102, as will be described in more detail below. The connection 110 may be established in any number of ways. In one approach, the connectors 108 may be uniquely shaped (e.g., like a key) so that information is provided to the eBook reader device 102 based upon the physical configuration of the connectors 108. In another approach, the communicative connection 110 may be implemented through an electrical connection created by the connectors 108. In yet another approach, the communicative connection 110 may be established wirelessly between the cover 104 and the device 102.
The architecture 100 further includes a remote service 112 that is accessible by the assembly 106 over a network 114. The remote service 112 is hosted by one or more servers 116(1), 116(2), . . . , 116(S), which collectively have processing and storage capabilities to receive requests from the assembly 106 and to provide content or other services to the assembly. In some implementations, the servers 116(1)-(S) store the digital content items and download those items upon request from the eBook reader device and cover assembly 106. The servers 116(1)-(S) may be embodied in any number of ways, including as a single server, a cluster of servers, a server farm or data center, and so forth, although other server architectures (e.g., mainframe) may also be used. The network 114 is representative of any one or combination of multiple different types of networks, such as the Internet, cable networks, cellular networks, wireless networks, and wired networks. The eBook reader device 102 may be configured with a wireless network interface to facilitate wireless connection with the network 114.
As noted above, the cover 104, when attached to the eBook reader device 102, enables the eBook reader device to access certain content. The cover may be equipped with a password or other key that is used to unlock this content. The content may be stored on the eBook reader 102 and made available upon receipt of the password or other key from the cover 104. Alternatively, the content may be stored at the remote service 112 and downloaded to the eBook reader device 102 over the network 114 when unlocked by the password or other key from the cover 104. These aspects are described below in more detail.
The eBook reader device 102 may be equipped with a cover communication module 204 to receive and process the password, unique identifier, or other data supplied by the content access module 202 of the cover 104. When the eBook reader device 102 is attached to the cover 104, a communicative connection 110 (
In a very basic configuration, the device 102 includes a processing unit 302 composed one of one or more processors, and memory 304. Depending on the configuration of a dedicated eBook reader device 102, the memory 304 is an example of computer storage media and may include volatile and nonvolatile memory. Thus, the memory 304 may include, but is not limited to, RAM, ROM, EEPROM, flash memory, or other memory technology, or any other medium which can be used to store media items or applications and data which can be accessed by the eBook reader device 102.
The memory 304 may be used to store any number of functional components that are executable on the processing unit 302, as well as data and content items that are rendered by the eBook reader device 102. Thus, the memory 304 may store an operating system 306 and an eBook storage database to store one or more content items 308, such as eBooks and audio books. The memory may further include a memory portion designated as an immediate page memory to temporarily store one or more pages of an electronic book. The pages held by the immediate page memory are placed therein a short period before a next page request is expected.
The term “page,” as used herein, refers to a collection of content that is presented at one time in a display of the eBook reader device 102. Thus, a “page” may be understood as a virtual frame of the content, or a visual display window presenting the content to the user. Thus, “pages” as described herein are not fixed permanently, in contrast to the pages of published “hard” books. Instead, pages described herein may be redefined or repaginated when, for example, the user chooses a different font for displaying the content in the first display. In addition to pages, the terms “page views”, “screen views”, and the like are also intended to mean a virtual frame of content.
A user interface module 310 may also be provided in memory 304 and executed on the processing unit 302 to facilitate user operation of the device 102. The UI module 310 may provide menus and other navigational tools to facilitate selection and rendering of the content items 308. The UI module 310 may further include a browser or other application that facilitates access to sites over a network, such as websites or online merchants.
A content presentation application 312 renders the content items 308. The content presentation application 312 may be implemented as various applications depending upon the content items. For instance, the application 312 may be an electronic book reader application for rending electronic books, or an audio player for playing audio books, or a video player for playing video, and so forth.
The cover communication module 204 is also stored in memory 304 and executed on the processing unit 302 to establish a connection with the cover 104. Once the cover 104 is attached or otherwise engaged with the eBook reader device 102, the cover communication module 204 establishes the connection with the cover and attempts to receive the password or other data from the cover 104 to unlock select content items 308 stored on the device, or to download content items from the remote service 112 (
The memory 304 may further store a network communication module 314 to manage communication between the eBook reader device 102 and remote services 112 over the network 114.
The eBook reader device 102 may further include a display 316. In one implementation, the display uses ePaper display technology, which is bi-stable, meaning that it is capable of holding text or other rendered images even when very little or no power is supplied to the display. Some exemplary ePaper-like displays that may be used with the implementations described herein include bi-stable LCDs, MEMS, cholesteric, pigmented electrophoretic, and others. In other implementations, or for other types of devices, the display may be embodied using other technologies, such as LCDs and OLEDs, and may further include a touch screen interface. In some implementations, a touch sensitive mechanism may be included with the display to form a touch-screen display.
The eBook reader device 102 may further be equipped with various input/output (I/O) components 318. Such components may include various user interface controls (e.g., buttons, joystick, keyboard, etc.), audio speaker, connection ports, and so forth.
One or more communication interfaces 320 are provided to facilitate communication with external, remote computing sources over various networks, such as network 114, or with other local devices, or with the cover 104. Content (e.g., eBooks, magazines, audio books, etc.), as well as program modules, may be transferred to the eBook reader device 102 via the communication interfaces(s) 320. The communication interface(s) 320 support both wired and wireless connection to various networks, such as cellular networks, radio, WiFi networks, short range networks (e.g., Bluetooth), IR, and so forth. The communication connection(s) 320 support both wired and wireless communications with various types of networks (e.g., network 114), including the Internet. For example, the eBook reader device 102 may be equipped with a radio frequency transceiver to facilitate wireless communication over a wireless network. The device may further include a communication connection that facilitates communication with other devices via, for example, Bluetooth, radio frequency, or infrared connection(s).
The eBook reader device 102 also includes a battery and power control unit 322. The power control unit operatively controls an amount of power, or electrical energy, consumed by the eBook reader device. Actively controlling the amount of power consumed by the reader device may achieve more efficient use of electrical energy stored by the battery. The processor 302 may supply computing resources to the power control unit 322, which may further include a clock/timer for accurate control of power consumed by the eBook reader device 102.
The eBook reader device 102 may have additional features or functionality. For example, the eBook reader device 102 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. The additional data storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
Also shown in
In another implementation, the content unlocked by the password provided by the cover 104 may be stored on the cover itself. As shown in
The cover memory 332 may additionally include, in some implementations, one or more content items 336. The content items 336 are available to the eBook reader device 102 only when the cover 104—and thus the memory 332 containing the content items 336—is communicatively coupled to the eBook reader device 102. In this implementation, the cover 104 may enable access to content without the use of a password 334 by providing the content items 336 directly to the eBook reader device. To ensure that the content items 336 remain tied to the cover 104, the content access module 202 and/or the cover communication module 204 may allow the eBook reader device 102 to view the content items 336, but may prevent copying or saving the content items 336 onto the device 102.
In certain implementations, the connectors 108 function as a key and the physical shape of the connectors 108, rather than an electronic signal, provides information which may be interpreted as a password by the cover communication module 204. In this implementation, the content access module 202 represents the physical key-like shape of the connectors 108 and the information embodied by that shape. Thus, the communicative connection 110 is the physical connection between the cover 104 and the eBook reader device 102 because the act of placing the cover 104 (key) onto the eBook reader device 102 (lock) conveys information necessary to enable access to the content.
Various instructions, methods and techniques described herein may be considered in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. for performing particular tasks or implement particular abstract data types. These program modules and the like may be executed as native code or may be downloaded and executed, such as in a virtual machine or other just-in-time compilation execution environment. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments. An implementation of these modules and techniques may be stored on or transmitted across some form of computer readable media.
Illustrative Usage Scenarios
The eBook reader device 102 may be thought of as a metaphor for a printed book. Changing the content in the “book” by changing the cover 104 extends the metaphor. When cover art is added to the cover 104, and that art corresponds to the content unlocked by the cover 104, it may be possible to judge an eBook by its cover 104! The cover art readily conveys to the user what content is available by placing that cover 104 on the eBook reader device 102. Changing out different covers 104(A), 104(B), 104(C) on the eBook reader device 102 may be easier for some users to understand and implement than other, arguably more difficult, methods of accessing additional content, such as downloading content from a password-protected website.
In another scenario, covers 104(A), 104(B), 104(C), may be available at various locations such as libraries, coffee shops, airport lounges, and the like. Each of the covers 104(A), 104(B), 104(C), may enable access to location-specific information. For example, a cover available in the seat-back pocket of an airplane may provide access to safety information for that airplane, information similar to an in-flight magazine, or complimentary content items available during flight. Location-specific covers may be branded with the identity of the location. For instance, the cover available in the seat-back pocket may be printed with a logo or color scheme associated with the airline carrier.
In another usage scenario, a family may share a single eBook reader device 102. Each member of the family may have a cover 104(A), 104(B), 104(C), that enables access to content of interest to him or her. Additional benefit provided by the cover 104 in this usage scenario is that other members of the family will be able to readily recognize who was last using the eBook reader device 102 by the cover 104. Extending this scenario further, the different family covers may provide access to different content, such as child-appropriate content for children, teenage-appropriate content for teenagers, and a broader range of content for adults.
In a further illustrative usage scenario, a university could distribute eBook reader devices 102 to its students. The eBook reader devices 102 may have the entire contents of the university bookstore pre-loaded into the memory of the eBook reader devices 102. The default setting may be for the pre-loaded contents to be locked and inaccessible until a cover 104 is attached. Each student may have an individualized cover 104, possibly encoded with a unique identifier, such as a student identification number, that unlocks electronic textbooks corresponding to the courses for which that student is registered. For example, the student may place one cover 104(C) on the eBook reader device 102 when he or she needs to access a textbook, and may place a different cover 104(B) on the eBook reader device 102 when he or she wishes to read a novel.
As discussed above, the communicative connection between the cover 104 and the eBook reader device 102 may take many forms. Covers 104 designed around different types of technology may use different mechanisms of communicating with the eBook reader device 102. For example, cover 104(A) may form a communicative connection 402(A) with the eBook reader device 102 by a RFID signal. However, cover 104(B) may use electrically conductive connectors (e.g., connectors 108) to form a communicative connection 402(B) with the same eBook reader device 102.
In one possible usage scenario, a library provides eBook reader devices 102(A), 102(B), and 102(C) for public use and users may supply their own covers to access additional content. In addition to enabling access to additional content, a personalized cover 104 may also supply customization settings that modify the user interface of the eBook reader device 102 as will be discussed in detail below.
One type of additional content may be periodic content, such as a newspaper subscription, Book-of-the-Month membership, or the like. For example, a newspaper publisher may sell a cover 104 that provides access to that newspaper's content by enabling an eBook reader device 102 to access that content from the newspaper's online service 112 over a network 114. By simply placing a cover 104 on an eBook reader device 102, it becomes possible to read today's newspaper. Desirability of this type of “high-value” content may make the cover 104 as important as the eBook reader device 102.
Illustrative Processes
At 602, a unique identifier is received from an accessory. The accessory may be the cover 104. The unique identifier may be a password, such as the password 334 shown in
At 604, the unique identifier is correlated to a content. The content may be stored as one or more content items 308 in the memory 304 of the eBook reader device 102. In one implementation, the content may be an electronic document, such as an eBook. In other implementations, the content may be available at remote locations, such as the service 112 accessible over the network 114. Content accessible over the network 114 may be retrieved in an on-demand fashion.
The correlation of the unique identifier to the content may be performed by the cover communication module 204. In other implementations, the correlation may be performed by the service 114, which supplies the results of that correlation back to the eBook reader device 102.
At 606, access to the content is provided on the eBook reader device 102 based on the unique identifier. Access may be implemented by many mechanisms, such as unlocking pre-loaded content, downloading new content, and the like. Regardless of the mechanism, once access to the content is provided, a user of the eBook reader device 102 may view the content. In some implementations, access to the content is provided only so long as the accessory, such as cover 104, is attached to the eBook reader device 102.
At 702, a communicative connection between the eBook reader device 102 and the cover 104 is recognized. The communicative connection may be the communicative connection 110 shown in
At 704, the content is provided to the eBook reader device 102 from the memory 332 of the cover 104 (
At 710, the eBook reader device that is presenting the document to the user is prevented from saving or otherwise copying the document. As shown in
In another implementation, the content may be in the form of a customization setting 712 for the eBook reader device, as represented by the sub-process 712-714 as part of operation 704. The customization setting may alter a user interface of the eBook reader device 102 such as by changing menus, favorites, default languages, look-and-feel of the user interface, and so forth. The customization settings allow any compatible eBook reader device 102 to be customized or personalized when a user places his or her cover 104 on the eBook reader device 102.
At 714, the customization settings are applied and the eBook reader device 102 is customized accordingly. In some implementations, the customization settings are accessibility settings. Accessibility settings may also change aspects of the user interface such as text size, text contrast, audio volume, and the like to improve usability of the eBook reader device for users with low vision, color blindness, or another disability.
At 802, a password is received from a cover 104 of an eBook reader device 102. The password may be provided by a memory of the cover 102, an RFID tag embedded in the cover 102, a shape of connectors 108 attaching the cover 102 to the eBook reader device 104, or the like.
At 804, the password is correlated with an access privilege. In some implementations, the correlation may be performed by the cover communication module 204 of the eBook reader device 102. In other implementations, the correlation may be performed by a service 112 available on the network 114.
At 806, the access privilege may be optionally configured by an administrator. In this implementation, the content made available by the cover 102 are not fixed, but rather are determined by a configurable access privilege. The access privilege may simply be a list of accessible documents to which documents may be added or removed. In other implementations, the access privilege may establish rules or principles by which a given document can be evaluated to decide whether or not it is unlocked by the cover 104. The administrator may be a user of the eBook reader device 102 with greater privileges than other users of the eBook reader device 102 (e.g., an original purchaser of the eBook reader device, a librarian, a corporate information technology professional). In other implementations, the administrator may interact with the cover 104 via the network 114. For example, a remote administrator may change the access privileges assigned to the password provided by the cover 104.
At 808, access to content is provided based on the access privilege. Placing a cover 104 on the eBook reader device 102 generally unlocks or enables access to more content than would be available without the cover 104, as represented by sub-process 810-812. However, the cover 104 may also block content or make content inaccessible, as represented by sub-process 814-816.
At 810, the access privilege unlocks content. The unlocked content may be provided by the cover 104, the eBook reader device 102, and/or a remote service 112 via the network 114. At 812, access to the unlocked content is provided to the eBook reader device 102 for presentation to a user.
At 814, the access privilege may alternatively block certain content. In this implementation, placing the cover 104 on the eBook reader device 102 limits, rather than expands, the available content. For example, a parent may wish to limit a child's access to documents stored on the eBook reader device 102. The access privilege could be tied to an age-based ratings system so that documents with certain ratings are unavailable when the child's cover 104 is placed on the eBook reader device 102. The parent may have administrator-level access to the eBook reader device 102 and may change the access privileges associated with the child's cover 104 as the child becomes older and different content becomes appropriate.
At 816, access is provided to content other than the blocked content. In some implementations, the other content may include content which is unlocked by the cover 104. Returning to the example of a cover 104 for a child, the child may be incentivized to place the eBook reader device 102 into his or her cover 104 because that cover 104 enables access to children's stories. Additionally, that same cover 104 may block access to eBooks intended for adult readers. Thus, the sub-process flows of acts 810-812 and of acts 814-816 may occur in parallel. In short, the cover 104 may simultaneously unlock some content and block other content.
Conclusion
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as illustrative forms of implementing the claims.
Number | Name | Date | Kind |
---|---|---|---|
5956048 | Gaston | Sep 1999 | A |
6493734 | Sachs et al. | Dec 2002 | B1 |
6851822 | Herrera | Feb 2005 | B2 |
6876295 | Lewis | Apr 2005 | B1 |
6931538 | Sawaguchi | Aug 2005 | B1 |
7006116 | Meyers et al. | Feb 2006 | B1 |
7065557 | Sowden et al. | Jun 2006 | B2 |
7298851 | Hendricks et al. | Nov 2007 | B1 |
7570164 | Chakraborty et al. | Aug 2009 | B2 |
7748634 | Zehr et al. | Jul 2010 | B1 |
7797549 | Main et al. | Sep 2010 | B2 |
7916175 | Yamakita | Mar 2011 | B2 |
7965873 | Goto | Jun 2011 | B2 |
8047670 | Patrick et al. | Nov 2011 | B2 |
8169447 | Bhogal et al. | May 2012 | B2 |
8186843 | Mish et al. | May 2012 | B2 |
20020087555 | Murata | Jul 2002 | A1 |
20020152215 | Clark et al. | Oct 2002 | A1 |
20020158601 | Kuo et al. | Oct 2002 | A1 |
20020177330 | Haffenden et al. | Nov 2002 | A1 |
20030069812 | Yuen et al. | Apr 2003 | A1 |
20030073326 | MacLaren et al. | Apr 2003 | A1 |
20030093312 | Ukita et al. | May 2003 | A1 |
20030100346 | Kostiainen | May 2003 | A1 |
20030135748 | Yamada et al. | Jul 2003 | A1 |
20030236102 | Kawai et al. | Dec 2003 | A1 |
20040059923 | ShamRao | Mar 2004 | A1 |
20040180657 | Yaqub et al. | Sep 2004 | A1 |
20040194133 | Ikeda et al. | Sep 2004 | A1 |
20040218451 | Said et al. | Nov 2004 | A1 |
20050026643 | White et al. | Feb 2005 | A1 |
20050138392 | Johnson et al. | Jun 2005 | A1 |
20050198208 | Nystrom | Sep 2005 | A1 |
20050227729 | Nakayama | Oct 2005 | A1 |
20050264540 | Niwa | Dec 2005 | A1 |
20060148454 | Welch | Jul 2006 | A1 |
20060149727 | Viitaharju | Jul 2006 | A1 |
20060194181 | Rosenberg | Aug 2006 | A1 |
20060279412 | Holland et al. | Dec 2006 | A1 |
20070088747 | Cheng et al. | Apr 2007 | A1 |
20070257799 | Bauchot et al. | Nov 2007 | A1 |
20080048837 | Montgomery et al. | Feb 2008 | A1 |
20080120312 | Reed et al. | May 2008 | A1 |
20080164304 | Narasimhan et al. | Jul 2008 | A1 |
20080168073 | Siegel et al. | Jul 2008 | A1 |
20080243991 | Ryan et al. | Oct 2008 | A1 |
20080268415 | Kwong | Oct 2008 | A1 |
20080298083 | Watson et al. | Dec 2008 | A1 |
20090095804 | Agevik et al. | Apr 2009 | A1 |
20090134973 | Sandler et al. | May 2009 | A1 |
20090150553 | Collart et al. | Jun 2009 | A1 |
20090204663 | Patwari | Aug 2009 | A1 |
20090219271 | Bandel et al. | Sep 2009 | A1 |
20090254762 | Priel et al. | Oct 2009 | A1 |
20090292643 | Wu | Nov 2009 | A1 |
20100010914 | Park | Jan 2010 | A1 |
20100036934 | Bruster | Feb 2010 | A1 |
20100052863 | Renfro et al. | Mar 2010 | A1 |
20100141689 | Johnson | Jun 2010 | A1 |
20100149739 | Mish et al. | Jun 2010 | A1 |
20100181450 | Hulick et al. | Jul 2010 | A1 |
20100251358 | Kobayashi et al. | Sep 2010 | A1 |
20100283690 | Artigue et al. | Nov 2010 | A1 |
20110187505 | Faith et al. | Aug 2011 | A1 |
20110307823 | Wu | Dec 2011 | A1 |
20120031786 | Mish et al. | Feb 2012 | A1 |
20120139693 | Zucker et al. | Jun 2012 | A1 |
20120194322 | Batra | Aug 2012 | A1 |
20130208414 | Moser | Aug 2013 | A1 |
20140323053 | Yamaoka et al. | Oct 2014 | A1 |
20150070329 | Bouchard | Mar 2015 | A1 |
Entry |
---|
Wikipedia—Universal Serial Bus, Dec. 5, 2008. |
Office action for U.S. Appl. No. 12/720,275, mailed on Jul. 8, 2013, Leblang, “Securing Content Using a Wireless Authentication Factor”, 18 pages. |
Final Office Action for U.S. Appl. No. 12/720,275, mailed on Jan. 29, 2014, Jonathan A. Leblang, “Securing Content Using a Wireless Authentication Factor”, 12 pages. |