Patent application number | Description | Published |
20080307388 | Visual Interface To Represent Scripted Behaviors - Systems and methods for visually representing scripted behaviors are provided. A system is disclosed that includes an authoring program executable on a computing device and configured to display a visual scripting interface. The visual scripting interface may be configured to display a plurality of user-selectable graphical building blocks. Each graphical building block may represent a respective component of a script, and may be spatially arrangable within the visual scripting interface to visually represent a script for a target scripted object. Input selectors may be provided on the graphical building blocks to enable users to input script information, and status indicators and messages may also be displayed on the graphical building blocks to inform users whether script information has been properly inputted. Propagation tools may be provided to enable users to successively add new graphical building blocks to build a tree that represents a script sentence. | 12-11-2008 |
20090293116 | Accessing Protected Content In A Rights-Management Architecture - A digital rights management system for the distribution, protection and use of electronic content. The system includes a client architecture which receives content, where the content is preferably protected by encryption and may include a license and individualization features. Content is protected at several levels, including: no protection; source-sealed; individually-sealed (or “inscribed”); source-signed; and fully-individualized (or “owner exclusive”). The client also includes and/or receives components which permit the access and protection of the encrypted content, as well as components that allow content to be provided to the client in a form that is individualized for the client. In some cases, access to the content will be governed by a rights construct defined in the license bound to the content. The client components include an object which accesses encrypted content, an object that parses the license and enforces the rights in the license, an object which obtains protection software and data that is individualized for the client and/or the persona operating the client, and a script of instructions that provides individualization information to a distributor of content so that the content may be individualized for the client and/or its operating persona. Content is generally protected by encrypting it with a key and then sealing the key into the content in a way that binds it to the meta-data associated with the content. In some instances, the key may also be encrypted in such a way as to be accessible only by the use of individualized protection software installed on the client, thereby binding use of the content to a particular client or set of clients. | 11-26-2009 |
20110113334 | EXPERIENCE STREAMS FOR RICH INTERACTIVE NARRATIVES - “Experience Streams” (ESs) are used by a “rich interactive narrative” (RIN) data model as basic building blocks that are combined in a variety of ways to enable or construct a large number of RIN scenarios for presenting interactive narratives to the user. In general various ES types contain all the information required to define and populate a particular RIN, as well as the information (in the form of a series of navigable states) that charts an animated and interactive course through each RIN. In other words, combinations of various ES provide a scripted path through a RIN environment, as well as various UI controls and/or toolbars that enable user interaction with the interactive narrative provided by each RIN. Example ESs include, but are not limited, content browser experience streams, zoomable media experience streams, relationship graph experience streams, player-controls/toolbar experience streams, etc. | 05-12-2011 |
20110239005 | Secure Repository With Layers Of Tamper Resistance And System And Method For Providing Same - A secure repository individualized for a hardware environment and a method and system for providing the same. The secure repository includes a hidden cryptographic key and code that applies the key without requiring access to a copy of the key. The code that implements the secure repository is generated in a manner that is at least partly based on a hardware ID associated with the hardware environment in which the secure repository is to be installed, and may also be based on a random number. Cryptographic functions implemented by the secure repository include decryption of encrypted information and validation of cryptographically signed information. The secure repository may be coupled to an application program, which uses cryptographic services provided by the secure repository, by way of a decoupling interface that provides a common communication and authentication interface for diverse types of secure repositories. The decoupling interface may take the form of a single application programmer interface (API) usable with multiple dynamically linkable libraries. | 09-29-2011 |
20130046744 | SOCIAL KNOWLEDGEBASE - The instant application discloses, among other things, ways to allow people to obtain information from sources that their friends may trust, and to cross-validate sources so that confidence may be increased. | 02-21-2013 |
20130047061 | Collaborative Content Publishing - Disclosed are, among other things, techniques to allow collaborative content publishing with high quality design for users who may or may not have extensive design experience. Flexible formatting may allow many sources of content to be easily used to produce publications with high visual appeal. | 02-21-2013 |
20140095322 | Advertising Management - Disclosed are, among other things, techniques to allow advertising management, providing a framework to share ad revenue between authors, publishers, hosts, or other stakeholders of content, and enforcing rules for advertisements. | 04-03-2014 |
20140095975 | MULTIPLE ASPECT-RATIO DESIGN - The instant application discloses, among other things, techniques to allow publications suitable for varying aspect ratios and resolutions to be designed and stored, with an appropriate design selected at the time the publication is displayed. | 04-03-2014 |
20140095986 | Baseline Alignment - The instant application discloses, among other things, techniques to allow baseline alignment. Aligning baselines across columns may improve readability and aesthetics. Baseline alignment may include having lines of body text, images, titles, or other elements have a common lower horizontal guideline. | 04-03-2014 |