Methods of providing computer systems with bundled access to restricted-access databases

ABSTRACT

Methods for of providing computer systems bundled with access to restricted-access databases. In one embodiment, a method includes providing a computer system with an authorized access identifier that allows access to a restricted-access database via a computer communication network; and providing the computer system to a user. The user is not required to pay use fees, or seek out a suitable information supplier, thereby improving user satisfaction and productivity. In an alternate embodiment, a method includes providing an access software program for accessing the restricted-access database. In another embodiment, a method includes generating the restricted-access database. Alternately, the generating of the restricted-access database may include storing educational information on a storage device, or transmitting an approximately real-time audio-visual signal. In another embodiment, a method includes updating the restricted-access database. In yet another embodiment, a method includes receiving an access identifier signal via the communication network, and comparing the access identifier signal with the authorized access identifier. In another embodiment, a method includes receiving a selection signal from the user indicative of a desired information, and transmitting the desired information to the user. In a further embodiment, a method includes obtaining access rights to a restricted-access database from an educational information supplier; and providing a computer system with an access identifier that allows a user to access the restricted-access database via a communication network.

TECHNICAL FIELD

[0001] The present invention relates to methods of providing computersystems having bundled access to restricted-access databases.

BACKGROUND OF THE INVENTION

[0002] Generally speaking, people who are properly trained are moresatisfied and more productive in their work. People from allfields—science, business, engineering, education, social services,etc.—seek training to enhance their existing skills, or to develop newskills. In every field of industry, workforce training is usually a highpriority.

[0003] Computer users typically have a wide variety of computer savvy.Many have technical backgrounds and are familiar with the basics ofcomputer hardware and software. Some are experts who are intimatelyfamiliar with one or more aspects of the computing sciencesEver-increasing numbers of computer users, however, have little or noexperience with, or understanding of, the computer systems they use. Atevery level of experience, people who use computer systems often desiretraining on how to better use their computer systems and relatedcomputer products.

[0004] Traditionally, training occurs within the confines of a classroomin an educational or industrial institution, such as a universitylecture hall or a company training facility. In such “brick and mortar”facilities, students gather at desks to be taught by an instructor. Dueto limited availability of instructors, and limited classroom space,this method of training is conducted on a rigidly maintained schedule,and class sizes are restricted to a limited number of students.Typically, students (or their employers) are charged fees in accordancewith the amount of training provided.

[0005] Efforts have been made to accommodate the growing numbers ofpeople who desire training. For example, class sizes have been expandedby offering televised instruction wherein an instructor's lecture isbroadcast for limited periods at scheduled times over a limitedbroadcast area. Alternately, lectures are recorded on audio-visual mediaand are stored at a facility, such as a public or private library, foraccess by students during scheduled operating hours. The audio-visualmedia may also be sold, allowing the consumer to access a limited amountof educational information at any time.

[0006] More recently, with the increasing availability and popularity ofa global computer communication network (commonly referred to as the“Internet” or the “World Wide Web”), other methods of training,particularly computer science training, have evolved. For example, anumber of suppliers of computer products have developed webpages thatprovide unrestricted-access to information directed to informingconsumers about each supplier's particular computer-related products.Product-specific webpages include those provided by Micron Technology,Inc. indexed at www.micron.com, or by Microsoft Corporation indexed atwww.microsoft.com. or by Intel Corporation at www.intel.com, or byCompaq Computer Corporation at www.compaq.com/smb/.

[0007] Another prior art method of providing computer scienceeducational information via the global computer communication network isdepicted in FIG. 1. In this embodiment, a method 10 includes a consumer11 paying computer system purchase or rental fees 12 to a computersystem supplier 14 which, in return, provides a computer system 16, 20to the consumer 11. The consumer 11 then pays a use fee 22 to aneducational information supplier 24 to access a restricted-accessdatabase of educational information 18. The amount of use fee paid bythe consumer is typically proportional to either the amount ofeducational information accessed, or the period of time the database isaccessed, by the consumer. In exchange for the use fee, the educationalinformation supplier 24 provides a password (and access software ifnecessary) 26 to the consumer 11. The consumer 11 transmits the passwordand accesses the restricted-access educational information databaseusing the computer system 20 via the global computer communicationnetwork (i.e. “online” access).

[0008] Typically, the educational information supplier 24 storeseducational information 28 in the database 18 for access by authorizedconsumers at a later time. Alternately, the educational informationsupplier 24 may provide the educational information 26 in a “real-time”fashion, such as by approximately instantaneous audio-visualtransmissions similar to a television broadcast. Such real-timetransmissions may be routed through the educational information database18, and may be interactive between the consumer 10 and an instructor.The educational information supplier 24 also provides authorizedpassword information 30 to the educational information database 18 topermit or deny access to the database appropriately.

[0009] Using the computer system 20, the consumer 11 transmits theirauthorized password 32 over a communication link (e.g. the globalcomputer communication network) to gain online access to therestricted-access educational information database 18. The consumer 11then chooses which educational information they wish to receive, andtransmits selection information 34 to the restricted-access educationalinformation database 18. The database then transmits the selectededucational information 36 to the consumer's computer system 20. Theforegoing method 10 (or variations thereof) is used, for example, byeducational information supplier Ziff-Davis, Inc. as described in partat www.ziffdavis.com/education_index.htm.

[0010] The prior art methods have several disadvantages. For example, inaddition to the purchase fees paid by the consumer for the computingsystem 20, the consumer must also pay the use fee for access to therestricted-access educational information database 18, leading toconsumer dissatisfaction. Typically, the pay structure of the prior arttraining methods requires that the user/trainee pay fees in directproportion to the amount of training received, which deters may usersfrom pursuing training despite its availability.

[0011] Although a limited amount of information is available on annon-fee basis via the webpages of computer product suppliers, thecontent of these sources is characteristically oriented towardmarketing, advertising, and basic trouble-shooting of the supplier'scomputer products. These sources generally do not provide comprehensiveeducational information, nor do they provide interactive “real-time”training presently available on a restricted-access, pay-per-view basis.The adage “you get what you pay for” strongly applies to the prior artmethods.

[0012] Furthermore, existing methods necessitate that, after purchasinga computer system, the consumer who desires on-line training must seekout an educational information provider. Because consumers are typicallyuninformed of the quality and availability of educational informationsuppliers, consumer frustration and dissatisfaction is increased. Also,the educational information provided by the educational informationsupplier may not be compatible with the user's computer system,resulting in additional loss of productivity, expense, and frustrationfor the user.

SUMMARY OF THE INVENTION

[0013] The present invention is directed toward methods of providingcomputer systems with bundled access to restricted-access databases. Inone embodiment, a method in accordance with the invention includesproviding a computer system with an authorized access identifier thatallows access to a restricted-access educational information databasevia a computer communication network; and providing the computer systemto a user. The user is not required to pay use fees, or seek out asuitable educational information supplier. In this way, the user isimmediately and conveniently included into a community of students andinstructors in an online university environment, enhancing the user'sknowledge, productivity, and satisfaction.

[0014] In an alternate embodiment, a method includes providing an accesssoftware program for accessing the restricted-access database via thecommunication network. The access software program resides on the user'scomputer system and communicates with a database software program thatresides on the restricted-access database.

[0015] In another embodiment, a method includes generating therestricted-access database. Alternately, the generating of therestricted-access database may include storing educational informationon a storage device, or transmitting an approximately real-timeaudio-visual signal. In another embodiment, a method includes updatingthe restricted-access database.

[0016] In yet another embodiment, a method includes receiving an accessidentifier signal via the communication network, and comparing theaccess identifier signal with the authorized access identifier. These“access control” steps may be performed by the restricted-accessdatabase, or independently therefrom. In another embodiment, a methodincludes receiving a selection signal from the user indicative of adesired information, and transmitting the desired information to theuser. Similarly, these “information management” steps may be performedby the restricted-access database, or independently therefrom.

[0017] In still another embodiment, a method includes providing acomputer system with an authorized access identifier; providing rightsto access a restricted-access database of information accessible via acommunication network using the authorized access identifier; receivingan identifier input signal via the communication network; comparing theidentifier input signal with the authorized access identifier; allowingaccess to the restricted-access database when the identifier inputsignal matches the authorized access identifier; receiving a selectionsignal indicating a desired data; and transmitting the desired data viathe communication network.

[0018] In a further embodiment, a method includes obtaining accessrights to a restricted-access educational information database from aneducational information supplier; and providing a computer system withan access identifier that allows a user to access the restricted-accesseducational information database via a communication network. In anotherembodiment, a method includes informing the educational informationsupplier of the authorized access identifier. In yet another embodiment,a method includes providing a consideration to the educationalinformation supplier for the access rights.

BRIEF DESCRIPTION OF THE DRAWINGS

[0019]FIG. 1 is a schematic representation of a prior art method ofproviding a computer system and separately providing access to arestricted-access educational information database.

[0020]FIG. 2 is a schematic representation of an embodiment of a methodof providing a computer system with bundled access to arestricted-access educational information database in accordance withthe present invention.

[0021]FIG. 3 is a flowchart representation of the method of FIG. 2.

[0022]FIG. 4 is a schematic representation of an embodiment of anarchitecture of the computer system of FIG. 2.

[0023]FIG. 5 is a flowchart representation of an embodiment of an accesssoftware routine of the access software of FIG. 4.

[0024]FIG. 6 is a flowchart representation of an embodiment of arestricted-access database software routine of FIG. 2.

[0025]FIG. 7 is a schematic representation of an embodiment of adatabase structure of the restricted-access educational informationdatabase of FIG. 2.

[0026]FIG. 8 is a schematic representation of an alternate embodiment ofa method of providing a computer system with bundled access to arestricted-access educational information database.

DETAILED DESCRIPTION OF THE INVENTION

[0027] The following description is generally directed toward methods ofproviding computer systems with bundled access to restricted-accessdatabases. Many specific details of certain embodiments of the inventionare set forth in the following description and in FIGS. 2-8 to provide athorough understanding of such embodiments. One skilled in the art,however, will understand that the present invention may have additionalembodiments, or that the present invention may be practiced withoutseveral of the details described in the following description.

[0028]FIG. 2 is a schematic representation of an embodiment of a method100 of providing a computer system with bundled access to arestricted-access educational information database in accordance withthe present invention. FIG. 3 is a flowchart representation of themethod 100 of FIG. 2. In this embodiment, the method 100 includes acomputer system supplier obtaining access rights 140 to arestricted-access educational information database from an educationalinformation supplier. The access rights may be obtained in a variety ofways, including, for example, by exchanging a payment or otherconsideration for the access rights.

[0029] A user 111 then pays a purchase or rental fee 12 to the computersystem supplier 114. In return, the computer system supplier provides acomputer system 120 having an access identifier that allows the user toaccess the restricted-access database of educational information 116.The computer system supplier 114 then notifies the educationalinformation supplier of the access identifier 142 that has been providedto the user 111 along with the computer system 120. The educationalinformation supplier 24 adds the access identifier to a list ofauthorized access identifiers 130, thereby allowing the user 111 toaccess the restricted-access educational information database 118.

[0030] In an alternate embodiment, the educational information supplier24 could provide one or more access identifiers to the computer systemsupplier 114 that have been pre-authorized to access therestricted-access database 118. For example, the educational informationsupplier 24 could add a quantity of access identifiers to the list ofauthorized access identifiers 130, and then sell the quantity of accessidentifiers to the computer system supplier 114 for a purchase fee. Thecomputer system supplier 114 could then provide the computer system withone of the authorized access identifiers to the user 111, and the user111 would have the desired access to the restricted-access educationalinformation database 118.

[0031] As shown in FIG. 3A, the educational information supplierinitially creates the restricted-access educational information database118 prior to the user 111 purchasing the computer system. Theeducational information supplier 24 then periodically updates therestricted-access educational information database 28. In alternateembodiments, the restricted-access database may be updated by otherentities, such as, for example, by the computer system supplier 114. Theupdating of the restricted-access database may be accomplished, forexample, in “real-time” fashion, such as by approximately instantaneousaudio-visual transmissions, preferably for interactive learning by theuser. Alternately, the restricted-access database need not be updated atall.

[0032] In operation, the user requests access to the restricted-accessdatabase 118 by using the computer system 120 to transmit the accessidentifier 132 to the restricted-access educational information database18 over a communication network. The communication network may be anytype of communication network suitable for sending and receivingdigitized signals, such a telephone line, an RF or microwave link, orthe Internet. The restricted access database 118 receives the accessidentifier and compares it with a list of authorized access identifiers117 (see FIG. 3B). If the user's access identifier is not authorized,the restricted-access database 118 notifies the user that the accessidentifier is not authorized and request re-transmission of the accessidentifier, or simply terminates the connection 119.

[0033] If the user's access identifier is authorized, therestricted-access database 118 transmits a menu of available educationalinformation to the user. The user 111 then chooses which educationalinformation they wish to receive, and transmits a selection signal 34 tothe restricted-access database 118. The restricted-access database 118transmits the selected educational information 36 to the user's computersystem 120. The restricted-access database 118 then inquires whether theuser is finished training 37, and if not, the menu of availableeducational information is retransmitted to the user's computer system33, and the remaining steps of the method are repeated. If the user isfinished training, the session is terminated 38.

[0034] Although the foregoing embodiment specifies that the steps ofreceiving the access identifier from the user 132 and comparing theuser's access identifier with the list of authorized access identifiers117 are performed by the restricted-access database, these steps couldeasily be performed independently from the restricted-access database.For example, these “access control” steps could be performed by theeducational information supplier 24, or by the computer system supplier114. Similarly, the “information management” steps of transmitting themenu of available educational information to the user 33, receiving theuser's selection signal 34, and transmitting the selected educationalinformation to the user 36 could also be performed independently fromthe restricted-access database. For example, these informationmanagement steps could be performed by the educational informationsupplier 24 who simply retrieves the selected educational informationfrom the restricted-access database 118 in response to the user'sselection signal.

[0035] The methods described above advantageously provide the computersystem 120 having bundled access to the restricted-access educationalinformation database 118, allowing the user immediate, automatic accessto a free, comprehensive, ongoing university or training curriculumcontained in the restricted-access database. The user is not required toseek out a suitable educational information provider, or pay use feesfor the training received. Because training is quickly and efficientlyprovided, the user may easily acquire the desired training, therebyincreasing the user's productivity and satisfaction.

[0036] Another advantage of the foregoing methods is that they provideusers with training convenience. Having access to on-line trainingbundled with the user's computer system provides enhanced conveniencethrough randomly accessible information, flexible class times, andself-paced tutorials. This “virtual classroom” environment enables theuser to train wherever the user's computer system with bundled access islocated, including from a stationary personal computer or portablenotebook computer. Due to the computer system's bundled access to therestricted-access database, the methods permit the user to login at anytime using the computer system, to read assignments, post questions, andexchange ideas with instructors or fellow students. In this way, theuser is immediately and conveniently included into a community ofstudents and instructors in an online university environment, enhancingthe user's knowledge and satisfaction.

[0037]FIG. 4 is a schematic representation of an architecture of anembodiment of the computer system 120 of FIG. 2. In this embodiment, thecomputer system 120 includes a display device 150 and a keyboard 152operatively coupled to a computing platform 154. The computing system120 may also include an audio-visual input device 156 operativelycoupled to the computing platform 154, preferably for inputtingaudio-visual signals from the user 111 for interactive learningoperations. The computing platform 154 shown in FIG. 4 includes a CPU(i.e. Central Processing Unit) 158 operatively coupled to a ROM (i.e.Read-Only Memory) device 160, and also operatively coupled to a RAM(i.e. Random-Access Memory) device 162. Finally, the computing platform154 includes a mass storage device 163, such as a disk drive, containingsoftware and an access software program 164, and an access identifier166. Alternatively, the access software program 164 and the accessidentifier 166 may be stored in the ROM 160.

[0038] One may note that some of the elements of the embodiment of thecomputing system 120 shown in FIG. 4 may be eliminated or combined. Forexample, the audio-visual input device 156 may be eliminated,particularly if the user 111 does not desire interactive learningcapability. Alternately, the keyboard 152 may be eliminated if the user111 chooses to input all information using the audio-visual input device156. The display device 150 and keyboard 152 may be eliminated if, forexample, the user 111 chooses to use compatible components from anothersystem or computer system supplier. Also, the configuration of thecomputer platform 154 may be altered in a wide variety of ways, such as,for example, by elimination of the access software 164.

[0039] It is also apparent that the access identifier 166 may beprovided in the computing system 120 in different ways. For example, theaccess identifier 166 may include an alpha-numeric character string(i.e. a password) pre-installed within the ROM 160 of the computingplatform 154 as depicted in FIG. 4. Alternately, the access identifier166 may simply be provided to the user 111 on a printed card for inputby the user 111 when prompted by the restricted-access database 118.Furthermore, the access identifier 166 may be hardware specific, such asa serial number of the CPU 158 (e.g. the serial number on an IntelPentium III processor), thereby allowing the user to access therestricted-access database 118 only from the computing platform 154purchased from the computer system supplier 120.

[0040]FIG. 5 is a flowchart representation of an embodiment of an accesssoftware routine 200 of the access software 164 of FIG. 4. In general,the access software routine 200 performs a number of processing steps,each of which is well within the knowledge and understanding of personsof ordinary skill in the art of writing computer programs. Furthermore,the access software routine 200 depicted on FIG. 5 represents onepossible embodiment, and many different alternative routines areconceivable that can operate to perform the desired steps and functionsdescribed below.

[0041] The access software routine 200 begins by transmitting a connectsignal 202 to the restricted-access educational information database.The access software routine 200 then receives and displays a logininquiry 204 from the restricted-access database. In response, the accesssoftware routine 200 transmits the access identifier to therestricted-access educational information database 206. The accessidentifier may be input in a variety of ways, including, for example, bybeing read from storage from the ROM of the computer system andtransmitted automatically by the CPU, or by input by the user.

[0042] Access to the restricted-access database is either allowed ordenied 208 based on a comparison between the access identifier and alist of authorized access identifiers. In this embodiment, thecomparison is performed by a database software routine operating on aremote computer where the restricted-access database is stored(described below). If access is not allowed, the access software routine200 either (1) repeats the steps of receiving and displaying the logininquiry 204, and transmitting the access identifier to therestricted-access database 206, or (2) the connection with therestricted-access database is simply terminated 210, such as, forexample, if the user has unsuccessfully attempted to access the databasean excessive number of times 209 (shown in FIG. 5A).

[0043] If access to the restricted-access database is allowed, theaccess software routine 200 receives and displays a menu of availableeducational information 212 from the restricted-access database. Theaccess software routine 200 then transmits a selection signal 214 inputby the user to the restricted-access database representing the user'schoice of the available educational information. In the embodiment shownin FIG. 5, the software routine 200 then determines whether the user hasselected an interactive mode of learning 216. Alternately, thisdetermination could be performed, for example, by the restricted-accessdatabase, and then communicated to the access software routine 200.

[0044] If the user's selection signal indicates that the user has notselected the interactive learning mode, the access software routine 200receives and displays the selected educational information 218. Then,the access software routine 200 determines whether user training iscomplete 220, such as by receiving a prompt from the restricted-accessdatabase and monitoring the user's response thereto. If user training iscomplete, the operation of the access software routine 200 is terminated222. If not, the software routine 200 returns to the step of receivingand displaying the menu of available educational information 212 fromthe restricted-access database, as shown in FIG. 5. The access softwareroutine 200 is then repeated from that point until the user training iscomplete and operation of the routine is terminated 222.

[0045] If the user's selection signal represents the interactivelearning mode, the access software routine 200 receives and displays theselected educational information interactively 224 as shown in FIG. 5B.The access software routine 200 determines whether the user has anyquestions or comments 226, and if so, transmits a user's questions orcomments signal 228 to the restricted-access database. The steps ofinteractively receiving and displaying educational information (i.e. aresponse to the user's question or comment) 224, determining whether theuser has any additional questions or comments 226, and if so,transmitting the additional questions or comments signal 228, are thenrepeated indefinitely until the user has no more questions or comments.

[0046] The access software routine 200 then determines whether theinteractive learning mode is complete 230, and if not, returns to thestep of interactively receiving and displaying educational 224, andcontinues the routine from that point, as shown in FIG. 5. If theinteractive mode of learning is complete 230, then the access softwareroutine 200 proceeds to the step of determining whether the entiretraining session is complete 220, and continues from that point in themanner specified above.

[0047]FIG. 6 is a flowchart representation of an embodiment of arestricted-access database software routine 300 of FIG. 2. As with theaccess software routine 200 described above, the database softwareroutine 300 performs processing steps, each of which is well within theknowledge and understanding of persons of ordinary skill in the art ofwriting computer programs. Also, the database software routine 300depicted on FIG. 6 represents one possible embodiment, and manydifferent alternative routines are conceivable that operate to performthe steps and functions described below.

[0048] The database software routine 300 begins by receiving a connectsignal 302 from the user 111 requesting access to the restricted-accessdatabase 118. The database software routine 300 then transmits the logininquiry to the user 304. Next, the database software routine 300receives the access identifier transmitted by the user 306, and comparesthe user's access identifier with a list of access identifiers 307authorized to access the restricted-access database 118. In theembodiment of the database software routine 300 shown in FIG. 6, theauthorized access list 118 b is generated and maintained by theeducational information supplier 24. The authorized access list 118 bmay, however, be generated and maintained in numerous ways, including,for example, by the computer system supplier 114, or by a third party,or by a combination thereof.

[0049] Based on the foregoing comparison 307, the database softwareroutine 300 determines whether access to the restricted-access databaseis either allowed or denied 308. If access is not allowed, the databasesoftware routine 300 either (1) repeats the steps of transmitting thelogin inquiry to the user 304, receiving the access identifiertransmitted by the user 306, and comparing the user's access identifierwith a list of access identifiers 307, or (2) the connection with therestricted-access database is simply terminated 310, such as, forexample, if the user has unsuccessfully attempted to access the databasean excessive number of times 309 (shown in FIG. 6A).

[0050] If access to the restricted-access database is allowed, thedatabase software routine 300 transmits to the user a menu ofeducational information 312 available from the restricted-accessdatabase. The database software routine 300 then receives the selectionsignal from the user 314 representing the user's choice of the availableeducational information. The database software routine 300 thendetermines whether the user has selected an interactive mode of learning316. As described above, this determination could be performed by theuser's access software routine 200 and then communicated to the databasesoftware routine 300.

[0051] In the event that the user has not selected the interactivelearning mode, the database software routine 300 accesses theuser-selected educational information from the educational informationdatabase 118 and transmits this information to the user 318. In theembodiment shown in FIG. 6, the educational information database 118 isdepicted as being generated and maintained by the educationalinformation supplier 24. As with the authorized access list 118 b (whichmay be a portion of the database 118) the educational informationdatabase 118 may be generated and maintained in a variety of ways. Forexample, the database might initially be generated by the educationalinformation supplier 24, but then may be maintained and updated by thecomputer system supplier 114, or by one or more third parties, or by anycombination thereof. Furthermore, the educational information database118 need not be a mere static collection of information, but rather, maypreferably be a dynamic assembly of the latest information in the fieldof computer sciences, or any other field (art, science, business,engineering, education, social services, etc.), and may include text andgraphics information, and interactive and non-interactive audio-visualtransmissions.

[0052] As further shown in FIG. 6, the database software routine 300next determines whether user training is complete 320. Thisdetermination may be made in a variety of ways, including, for example,by sending an inquiry to the user and monitoring a response thereto, orsimply by receiving a quit signal from the access software routine 200.If user training is complete, the connection between the databasesoftware routine 300 and the user's access software routine 200 isterminated 322. If user training is not complete, the database softwareroutine 300 returns to the step of transmitting the menu of availableeducational information to the user 312. As shown in FIG. 6, thedatabase software routine 300 is then repeated from that point untiluser training is complete and connection is terminated 322.

[0053] In the event that the user has selected the interactive learningmode, the database software routine 300 accesses a user-selectedinteractive signal 323 and transmits the signal to the user 324.Although the interactive signal 323 is shown in FIG. 6 as being relayedthrough the educational information database 118, it is possible thatthe interactive signal 323 may be accessed by the database softwareroutine 300 from a variety of sources, such as, for example, directlyfrom the educational information supplier 24 or the computer systemsupplier 114.

[0054] In the interactive mode of learning, the database softwareroutine 300 determines whether the user has any questions or comments326, and if so, receives the user's questions or comments signal 328,and relays the questions or comments signal to a source of theinteractive signal 323 (i.e. an instructor) for a response. The databasesoftware routine 300 then returns to the step of accessing theuser-selected interactive signal 323 and transmitting the signal, whichpreferably includes a response (if any) to the user's question orcomment, to the user 324. The database software routine 300 thendetermines whether the user has any additional questions or comments326, and if so, transmits the additional questions or comments signal328 to the source of the interactive signal. As shown in FIG. 6, thesesteps are repeated indefinitely until the user has no more questions orcomments.

[0055] The database software routine 300 then determines whether theinteractive learning mode is complete 330, and if not, returns to thestep of accessing and transmitting the user-selected interactive signal324, and continues the routine from that point. As shown in FIG. 6, ifthe interactive mode of learning is complete, then the database softwareroutine 300 returns to the step of determining whether the entiretraining session is complete 320, and continues from that point in themanner specified above.

[0056]FIG. 7 is a schematic representation of an embodiment of adatabase structure 400 of the restricted-access educational informationdatabase 118 of FIG. 2. The database structure 400 shown on FIG. 7represents one of many possible embodiments that operate to perform thedesired data-storage functions described below. In general, databasestructures are a well-known technology and are within the knowledge andunderstanding of persons of ordinary skill in the art.

[0057] The database structure 400 of the restricted-access database 118includes a user data section 410 and an educational data section 420.The user data section 410 includes the list of authorized accessidentifiers 118 b that is used by the database software routine 300 topermit or deny access to the restricted-access database 118. The userdata section 410 also includes a previous access history section 412that stores user-related metrics such as prior access dates, accessperiods, sites accessed, or other desired data. These data may be usedfor numerous purposes, including, for example, to allow the user toresume a self-paced tutorial. Alternately, the previous access historysection 412 may be eliminated from the database structure 400, or thedata may be stored independently. For example, previous access datamight be stored on the user's computer system 120 and communicated withthe restricted-access database 118 as data files (i.e. so-called“cookies”) via the communication network.

[0058] The educational data section 420 contains one or more topicsections 422 into which educational information is categorized. Eachtopic section 422 has one or more site sections 424 that containspecific educational information relevant to each topic section 422. Thesite sections 424 include one or more pages 426 of educationalinformation. The pages 426 may comprise alpha-numeric character data oraudio-visual data, and preferably include audio-visual data that arereceived and transmitted in approximately real-time to the user'sdisplay device.

[0059] In operation, the database software routine 300 accesses the listof authorized access identifiers 118 b to determine whether the user isauthorized to access the educational data section 420. A monitoringroutine (not shown) may be used to check the user's previous accesshistory 412 and to make relevant determinations, such as, for example,whether the user has been interrupted and wishes to resume training at apreviously-accessed site section 424. After the user has been allowedaccess to the restricted-access database 118, the database softwareroutine 300 reads the topic sections 422 of the educational data section420 and, as shown in FIG. 6, transmits the menu of available educationalinformation 312 to the user. Upon receipt of the user's selection signal314, the database software routine 300 accesses the user-selected sitesection 424 and transmits the pages 426 of educational information tothe user.

[0060] The above-described methods of providing the computer system 120having bundled access to the restricted-access educational informationdatabase 118 have several advantages over the prior art. For example,the foregoing methods eliminate the need for the user to haphazardlyseek out and “test drive” educational information providers that may ormay not provide educational information compatible with the user'scomputer system. These actions are eliminated because appropriatearrangements can be made ahead of time between computer system suppliersand educational information suppliers to provide the computer systemwith bundled access to educational information that is both relevant to,and compatible with, the user's computer system. The computer systemhaving bundled access to the restricted-access database of educationalinformation (including computer training and any other type ofeducational information) thereby enables the user to have on-line accessto training in an efficient, cost-effective manner. In turn, usersatisfaction is improved, and user productivity with the computer systemis enhanced.

[0061] The user's access to on-line training is also improved becausethe additional use fees paid by the consumer to the educationalinformation provider are eliminated. In the method 100 of the invention,the user simply pays a purchase fee to the computer system supplier, andaccess to the restricted-access educational information database isgranted. User efficiency, satisfaction, and productivity are therebyimproved.

[0062] In one embodiment of the method, the user is granted permanent,unlimited access to the database. In alternate embodiments, the user'sfree access may be limited to a specified period of time (e.g. one yearof free access), or to a specified amount of access time (e.g. onehundred hours of free access), or to a specified amount of educationaldata (e.g. access only to designated topics in the database structure).For such alternate embodiments, the bundled automatic free-of-chargeaccess to the restricted-access database is initially included withinthe purchase fee, and continued access is provided on a flat-feearrangement.

[0063] The above-described methods provide comprehensive, ongoinguniversity or training curriculum, preferably designed to empower theuser to better leverage technology into their lives and businesspursuits, by providing a computer system having bundled access to arestricted-access educational information database. The user is notrequired to pay a separate use fees for the right to access thisrestricted-access training information, and having the access rightsbundled with the computer system improves efficiency of the trainingsystem for both the user and, in some cases, the user's employer.

[0064]FIG. 8 is a schematic representation of an alternate embodiment ofa method 500 of providing a computer system 120 with bundled access to arestricted-access educational information database 218. Generallyspeaking, the steps of this method are similar to the above-describedembodiment, except that the computer supplier 114 pays a purchase fee240 to the educational information supplier 24, and in return, theeducational information supplier 24 provides the restricted-accesseducational information database 218 to the computer system supplier114.

[0065] After the computer system 120 is sold to the user 111, thecomputer system supplier 114 updates the list of authorized accessidentifiers 230 contained in the restricted-access database 218. Thecomputer system supplier 114 also maintains and supplements therestricted-access database 228 to keep it up-to-date and useful for theuser 111. The operations of the access software routine 200 (FIG. 5),the database software routine 300 (FIG. 6), and the database structure400 (FIG. 7) are virtually unchanged, except that in FIG. 6, thecomputer system supplier 114 supplements the authorized access list andthe restricted-access database rather than the educational informationsupplier 24.

[0066] The method 500 shown in FIG. 8 advantageously eliminates thecontinued involvement of the educational information supplier 24. Afterthe initial payment 240 is made, and the initial restricted-accessdatabase 218 is provided 540 to the computer system supplier 114, theeducational information supplier 24 is not involved in maintaining theauthorized access identifier list 118 b or the restricted-accessdatabase 118. Improved efficiency is achieved because the computersystem supplier 114 directly updates the authorized access identifierlist as the computer systems are sold.

[0067] In another alternate embodiment, the educational informationsupplier is completely eliminated from the process by having thecomputer system supplier 114 generate the original database rather thanpurchase it. This embodiment could result, for example, when thecomputer system supplier 114 develops its own restricted-accessdatabase, or when the computer system supplier 114 purchases (or mergeswith) the educational information supplier 24 (or vice versa) to createa single entity. The elimination of the educational information supplier24 is transparent to the user 111.

[0068] Another advantage of the method 500 shown in FIG. 8 is that thecomputer system supplier 114 controls the educational content of therestricted-access database 118. This allows the computer system supplier114 to tailor and optimize the content of the educational information tobetter match the supplier's products and systems, and to add the latestinformation to the restricted-access database 118 without waiting forthe educational information supplier 24 to take action.

[0069] The embodiments described in the foregoing discussion aredescribed in terms of providing computer systems having bundled accessto restricted-access databases of “educational information,” andpreferably to “computer sciences” educational information. The methodsof the invention, however, should not be construed as being limited onlyto computer-related educational information, nor should the methods ofthe invention be construed as being limited only to databases of“educational information.”

[0070] Where the methods of the invention are used to provide access torestricted-access databases of educational information, the educationalinformation may concern any imaginable field, including art, science,business, engineering, education, social services, and computers.Furthermore, the methods of the invention may be utilized to provideaccess to any type of restricted-access database of information,including those that are not “educational,” such as, for example, creditinformation, property records, tax records, legal system archives,government archives, etc. Although in some sense, any type ofinformation could be considered to be educational, the methods of theinvention should be recognized as being applicable to providing computersystems having bundled access to restricted-access databases of any andall types of information.

[0071] The detailed descriptions of the above embodiments are notexhaustive descriptions of all embodiments contemplated by the inventorsto be within the scope of the invention. Indeed, persons skilled in theart will recognize that certain elements of the above-describedembodiments may variously be combined or eliminated to create furtherembodiments, and such further embodiments fall within the scope andteachings of the invention. It will also be apparent to those ofordinary skill in the art that the above-described embodiments may becombined in whole or in part with prior art methods to create additionalembodiments within the scope and teachings of the invention.

[0072] Thus, although specific embodiments of, and examples for, theinvention are described herein for illustrative purposes, variousequivalent modifications are possible within the scope of the invention,as those skilled in the relevant art will recognize. The teachingsprovided herein of the invention can be applied to other methods ofproviding computer systems having bundled access to restricted-accessdatabases, and not just to the methods described above and shown in thefigures. In general, in the following claims, the terms used should notbe construed to limit the invention to the specific embodimentsdisclosed in the specification and the claims, but should be construedto include all methods of providing computer systems that operate underthe claims to include bundled access to restricted-access databases.Accordingly, the invention is not limited by the foregoing disclosure,but instead its scope is to be determined by the following claims.

1. A method of providing a computer user with access to arestricted-access database, comprising: providing a computer system withan authorized access identifier that allows access to therestricted-access database via a communication network; and providingthe computer system to a user.
 2. The method of claim 1, furthercomprising providing an access software program for accessing therestricted-access database via the communication network.
 3. The methodof claim 1, further comprising obtaining the restricted-access databasefrom an educational information supplier.
 4. The method of claim 1,further comprising generating the restricted-access database.
 5. Themethod of claim 4 wherein generating the restricted-access databasecomprises storing educational information on a storage device.
 6. Themethod of claim 4 wherein generating the restricted-access databasecomprises transmitting an approximately real-time audio-visual signal.7. The method of claim 1, further comprising updating therestricted-access database.
 8. The method of claim 1, further comprisingreceiving an access identifier signal via the communication network, andcomparing the access identifier signal with the authorized accessidentifier.
 9. The method of claim 1, further comprising receiving aselection signal from the user indicative of a desired information, andtransmitting the desired information to the user.
 10. A method ofproviding access to educational data in a restricted-access educationalinformation database, comprising: providing a computer system with anauthorized access identifier; providing rights to access arestricted-access database of educational information accessible via acommunication network using the authorized access identifier; receivingan identifier input signal via the communication network; comparing theidentifier input signal with the authorized access identifier; allowingaccess to the restricted-access educational information database whenthe identifier input signal matches the authorized access identifier;receiving a selection signal indicating a desired educational data; andtransmitting the desired educational data via the communication network.11. The method of claim 10, further comprising providing an accesssoftware program for accessing the restricted-access educationalinformation database via the communication network.
 12. The method ofclaim 10, further comprising obtaining the restricted-access educationalinformation database from an educational information supplier.
 13. Themethod of claim 10, further comprising generating the restricted-accesseducational information database.
 14. The method of claim 10, furthercomprising updating the restricted-access educational informationdatabase.
 15. The method of claim 10 wherein the educational informationin the restricted-access database is limited to information about thecomputer system.
 16. The method of claim 10 wherein the educationalinformation in the restricted-access database is limited to informationabout a particular supplier's product.
 17. A method of providing acomputer user with access to a restricted-access database, comprising:obtaining access rights to the restricted-access database from aninformation supplier; and providing the computer system with an accessidentifier that allows the user to access the restricted-access databasevia a communication network.
 18. The method of claim 17, furthercomprising informing the information supplier of the authorized accessidentifier.
 19. The method of claim 17, further comprising providing aconsideration to the information supplier for the access rights.
 20. Themethod of claim 17, further comprising providing an access softwareprogram for accessing the restricted-access database.
 21. The method ofclaim 17, further comprising supplementing the restricted-accessdatabase.
 22. The method of claim 21 wherein supplementing therestricted-access database comprises transmitting an approximatelyreal-time audio-visual signal.