Patent application number | Description | Published |
20080209017 | MANAGEMENT OF BANDWIDTH ALLOCATION IN A NETWORK SERVER - A method and system for operating a network server to discourage inappropriate use are disclosed. A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises the steps of receiving a request to transfer a file between the memory and one of the plurality of client devices, removing a packet comprising a defined number of information bits from the file, transferring the packet between the memory and the client device per the request, then pausing for a defined delay period, and repeating the removing, transferring, and pausing steps in order until all of the file has been transferred. Preferably, the method further comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period. The number of information bits in the packet may similarly be initiated, and adjusted during the transfer cycle. The system comprises the server having an application for performing the method according to the invention. | 08-28-2008 |
20080240444 | METHOD OF DISTRIBUTING A DECRYPTION KEY IN FIXED-CONTENT DATA - Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal. | 10-02-2008 |
20080273164 | EYEWEAR WITH PINHOLE APERTURE AND LENS - Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens. Pinhole apertures may have a diameter no greater than about 3 mm, and a diameter/thickness ratio is no less than about 66.7%. | 11-06-2008 |
20080273451 | OPTICALLY-READABLE DISK WITH COPY PROTECTION DEVICE - An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or for when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. | 11-06-2008 |
20080274395 | AUTOMATED COMPOSITE BATTERY - A composite battery capable of adjusting its own power output in response to predetermined signals or lack of predetermined signals is provided. The composite battery has a set of terminals, a battery, a sensing device and a switch, all housed within a casing, which can be in the shape of a conventional battery. The sensor captures signals which upon reaching a certain threshold cause the switch to engage or disengage to selectively provide a load current to an electronic device. The battery may be used in battery-controlled consumer electronics articles, such as toys, to prevent avoidable battery drain or unintended activation when the electronics article is not in use. | 11-06-2008 |
20080275888 | REDIRECTION METHOD FOR ELECTRONIC CONTENT - Electronic content, for example, a web page, is configured by display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. In response to a request for the web page, the second locator is obtained. Access to the second locator may be secured. The second locator may be swapped with the first locator to cause the web browser application to obtain the second content instead of the first content. In the alternative, the second content may be obtained and provided to the web browser instead of, or in addition to, the first content. | 11-06-2008 |
20080275928 | FLEXIBLE DATA STORAGE SYSTEM - Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space. The configured new data file is stored in accordance with the assigned data storage scheme in one or more of the available locations and the locations of the new data file are recorded. | 11-06-2008 |
20080276315 | ANTI-PHISHING FILTER - A method operates to detect personal identifying or account information exchanged in a real-time electronic communication occurring between computer network users, such as electronic chat. A detected personal identifier may be recognized as an attempt on the part of one user to engage in a phishing attack upon another user or to otherwise steal the other user's sensitive personal information. Upon recognizing the communication as an unwarranted attempt to collect such information, the electronic communication may be monitored, and communication of the personal information may be prevented. | 11-06-2008 |
20080282329 | CONTROLLING ACCESS TO NAME SERVICE FOR A DOMAIN NAME SYSTEM - A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet. | 11-13-2008 |
20080282344 | E-MAIL AUTHENTICATION - A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. The system and method may also provide for determining whether an e-mail originates from a forged source. A server receives data relating to an e-mail, including a purported sender and a verification host. The server queries the verification host with information pertaining to the e-mail and requests confirmation that the e-mail originates from the purported sender. The e-mail is determined to originate from a forged source unless the verification host responds that the e-mail originates from the purported sender. | 11-13-2008 |
20080301107 | METHOD AND APPARATUS FOR IMPROVING BANDWIDTH EFFICIENCY IN A COMPUTER NETWORK - A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type. The method comprises monitoring a bandwidth usage of the communication link, and triggering application of the rule set when the bandwidth usage exceeds a threshold amount. The threshold amount is determined relative to the finite bandwidth. The method further comprises distinguishing between the files according to type, and prioritizing transmission of the files according to type and according to the rule set. | 12-04-2008 |
20080309671 | AVATAR EYE CONTROL IN A MULTI-USER ANIMATION ENVIRONMENT - In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. Optionally, user preferences for object characteristics may be factored into determining priority of apparent gaze. Resulting modeled avatars are rendered on client displays to provide more lifelike and interesting avatar depictions with shifting gaze directions. | 12-18-2008 |
20090073817 | OPTICALLY-READABLE DISK WITH COPY PROTECTION DEVICE - An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. The device may include an electro-optical material that is activated by an electrical signal from a controller in response to an input from a sensor responsive to motion of the disk. | 03-19-2009 |
20090083236 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 03-26-2009 |
20090098931 | METHOD AND APPARATUS FOR SLOT-MACHINE GAMING - A gaming apparatus, such as a slot machine, that randomly determines a combination of symbols and pays prizes according to a determined payout table, is used to perform a gaming method similar to conventional slot machine play, but that permits greater interaction with the player. The gaming method provides the player with the option of increasing an amount wagered after at least one of the symbols has been determined. The method additionally provides the player with the option to randomly determine a symbol or symbols a second time, or to force a symbol to be the same as a symbol already determined, optionally at additional cost. The method includes making appropriate adjustments to a payout table, depending on the player's actions during game play. | 04-16-2009 |
20090128567 | MULTI-INSTANCE, MULTI-USER ANIMATION WITH COORDINATED CHAT - Two or more participants provide inputs from a remote location to a central server, which aggregates the inputs to animate participating avatars in a space visible to the remote participants. In parallel, the server collects and distributes text chat data from and to each participant, such as in a chat window, to provide chat capability in parallel to a multi-participant animation. Avatars in the animation may be provided with animation sequences, based on defined character strings or other data detected in the text chat data. Text data provided by each user is used to select animation sequences for an avatar operated by the same user. | 05-21-2009 |
20090150229 | ANTI-COLLUSIVE VOTE WEIGHTING - An anti-collusive vote weighting method and system. Instances of possible vote collusion may be identified based on correlating the vote history of users voting on an information item and weighting the votes in accordance with the correlated voting history. A list of information items may be compiled and ranked by the quantity of voting data received from a plurality of users. The vote histories of two or more users may be correlated to obtain a correlation value associated with the users. A lesser predetermined weight may be applied to the voting data of users having correlation values above a first predetermined value. In addition, a greater predetermined weight may be applied to the voting data of users having correlation values below a second predetermined value. The greater the correlation between vote histories of users, the greater the likelihood that the voters are colluding to vote for the information item. | 06-11-2009 |
20090150418 | GUEST MANAGEMENT IN AN ONLINE MULTI-PLAYER VIRTUAL REALITY GAME - A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment. A memory holds program instructions for determining whether the guest access is associated with a member client. If the guest access request is associated with the member client, then the guest client is allowed to access the virtual reality environment via a guest avatar. The guest avatar's movements in the virtual reality environment are restricted based on a location of a member avatar controlled by the associated member client. For example, the guest avatar may only be permitted to move within an area that is bounded by a perimeter about the member avatar. | 06-11-2009 |
20090164597 | Content Restriction Compliance Using Reverse DNS Lookup - A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided. | 06-25-2009 |
20090171981 | COMPUTER NETWORK STORAGE ENVIRONMENT WITH FILE TRACKING - A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server. In the alternative, the method may be applied only to selected files or types of files on the server. In particular, the files corrupted by altering according to the invention are executable software files and compressed files, that are generally not fault-tolerant. Fault tolerant files, such as uncompressed text and graphics files in common Internet-compatible formats, are not noticeably affected. The network server will therefore no longer be useful for storing or transferring undesirable files, and such use will be discouraged. According to a related embodiment of the invention, a system comprises a server having an application that performs one of the embodiments of the method according to the invention. | 07-02-2009 |
20090197685 | ENTERTAINMENT SYSTEM FOR PERFORMING HUMAN INTELLIGENCE TASKS - A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources. The game engine may present the human intelligence tasks to multiple video game participants as in-game content. The game engine defines and enables game play rules for the in-game content. The game play rules set parameters for the multiple video game participants to perform the human intelligence tasks to achieve desired results. The game engine may award each of the multiple video game participants an improved game score upon successful performance of the human intelligence tasks in accordance with the game play rules. The game engine may measure success by consistency in responses between different participants or trials. | 08-06-2009 |
20090210504 | ERRONEOUS ADDRESSING PREVENTION FOR ELECTRONIC MESSAGING - An electronic mail client includes features for preventing addressing errors in electronic messaging such as those caused by predictive text features. A messaging client tracks addressing parameters including the length of time since each previous addressee has been messaged, the quantity of times selected addressees have been co-addressees on messages, if any, whether the addressees are designated as sensitive and whether the messages contain sensitive subject matter. If a high risk of addressing error is determined, the client delays transmission of the message to permit the user to review the message recipient addresses and correct any erroneous addressees. | 08-20-2009 |
20090249449 | PERSONAL CRITERIA VERIFICATION USING FRACTIONAL INFORMATION - A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user. | 10-01-2009 |
20090265342 | AVOIDING MASKED WEB PAGE CONTENT INDEXING ERRORS FOR SEARCH ENGINES - Multiple non-host client sites provide cached user copies of web pages and/or web content, or summaries thereof, to a server. Obtaining data from non-host sources for indexing purposes avoids masked web page content indexing errors for search engines. The server aggregates, summarizes and indexes the web pages and/or web content in an index of cached content, in conjunction with updating, generating and storing a search index using an indexing agent such as a web crawler or spider. In response to receiving search requests from end users, the search engine uses comparisons between the index of cached content and the index of crawled content to identify potential page masking errors for specific search results and appropriately rank or omit results with a high risk of masking errors in a search result list. | 10-22-2009 |
20090265639 | EVALUATION OF REMOTE USER ATTRIBUTES IN A SOCIAL NETWORKING ENVIRONMENT - A computer host is configured to perform a method for defining user attributes with associated verification values for social networking accounts. The attributes concern the user's personal characteristics or attributes. The host publishes the attribute information to other clients together with interactive objects for soliciting corroboration of the attribute information. The host receives feedback information from other account holders, such as survey response data, concerning the veracity of the attribute information. The host processes the evaluation information and the feedback information to provide a veracity score of each attribute reported for each account holder, or for collections of attributes, by weighing the evaluation information and feedback information by a computed reliability factor for each source from which processed information is obtained. | 10-22-2009 |
20090265661 | MULTI-RESOLUTION THREE-DIMENSIONAL ENVIRONMENT DISPLAY - A computer manages display of objects having different resolution values in a coordinated multi-player game process. One or more servers and client applications operate cooperatively to manage and display various different resolution areas representing output from the unitary game process. The server receives input data from a plurality of clients and outputs game state data to participating clients. One or more objects in the game environment may be designated for display at different resolutions than other objects in the game environment. Alternatively, objects appearing within a defined screen area may be displayed at a different resolution from whatever does not appear within the defined screen area. One or more servers transmit data to the participating client defining different display resolutions for different objects or screen areas. The game environment may be configured with transparent areas to reveal a window of the objects having different display resolution underneath. | 10-22-2009 |
20090292696 | COMPUTER-IMPLEMENTED SEARCH USING RESULT MATCHING - A computer search system compares search results received for searches falling within a defined parameter envelope used for grouping search requests. The parameter envelope may be defined by various parameters, for example, time of search, origin or search request, language, or other non-keyword data associated with each search request, excluding keywords used to define the search. Each new search result (comprising a list of search hits) for incoming search requests is compared to stored search results for search requests within the same parameter envelope. Search results that are found to be similar based on a pre-defined similarity measure are provided as related search results responsive to the incoming search requests. A client-side pseudo-browsing application may control interactions with the search engine, collecting true browsing input from the client and providing pseudo-browsing information to the search engine or other information provider. | 11-26-2009 |
20090295562 | ALERT SIGNAL CONTROL USING RECEIVER VELOCITY - An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system. The alert signal control node determines a most recent-determinable velocity for each receiving device before transmitting a message alert signal. If the velocity exceeds a predetermined threshold, the alert signal may be delayed until the velocity drops below the threshold. The system may be operated as a safety measure to prevent reception of distracting alert signals while driving, thereby silencing messaging devices at appropriate times. | 12-03-2009 |
20090307196 | FORUM SEARCH WITH TIME-DEPENDENT ACTIVITY WEIGHTING - A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time. The search engine prioritizes search results to identify the specified sites or locations in order of activity (among other possible criteria) relative to a defined time. | 12-10-2009 |
20090325138 | VIRTUAL INTERACTIVE CLASSROOM USING GROUPS - An online environment server hosts an event, such as a class period or interactive entertainment event, in a virtual reality process. Clients are divided into groups as they join the process according to defined group and user profiles and current group capacities. A human host, such as a teaching assistant, may also join each group as a moderator or administrator. Each group member interacts in real time with other group members via electronic chat. Recordings of group sessions may be accessed later by non-group members. The group server is configured such that the group moderator or administrator may control classroom data flow for her assigned group, such as pausing an animated stream of instructor or event input into the virtual classroom to allow classroom questions or discussion, causing the stream to be cached at the system level. Then, the moderator may resume play of the instructional sequence. When resuming play after a pause, the system server may automatically speed up play of the animated input stream from a cache while continuing to cache as necessary, until parity is reached with the current input stream for all groups. | 12-31-2009 |
20090328175 | IDENTITY VERIFICATION VIA SELECTION OF SENSIBLE OUTPUT FROM RECORDED DIGITAL DATA - A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. The data sampler may store the data samples and parameter data as shared secret data for use in a future authentication session. During a future authentication session, an authentication device selects test data from the shared secret data to generate sensible output in an authentication process. The authentication process grants access to a controlled resource in response to user input indicating specific knowledge of the shared secret data selected from a presentation of similar sensible outputs. | 12-31-2009 |
20100070859 | MULTI-INSTANCE, MULTI-USER ANIMATION PLATFORMS - A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. The virtual-reality data may be configured to cause remote clients to output an animated display of a corresponding one of the parallel dimensions and avatars therein. | 03-18-2010 |
20100185739 | DIFFERENTIATED SPAM FILTERING FOR MULTIPLEXED MESSAGE RECEIVING DEVICES - More than one message recipient devices are configured to receive electronic messages (e.g., e-mail) addressed to a single electronic address. The recipient devices may be multiplexed. Each device may use independently determined spam filtering parameters, and may therefore receive different mail sets. The filtering parameters may automatically adjust based on the monitored activities of the recipient devices. For example, the respective spam thresholds for the recipient devices may be switched based on the monitored activities of the recipient devices. | 07-22-2010 |
20100205053 | HTTP TRIGGER FOR OUT-OF-PROTOCOL ACTION - A hypertext transfer protocol (HTTP) request is used to actuate a secondary communications protocol (e.g., Short Message Service). A server receiving the request may be configured to take actions not specified by the URL associated with the request in response to the characters encoded in the request, such as accessing a secondary communications protocol. The server parses the request to identify action codes and/or content in the request itself, and takes action based on the code or content value. A token code representing a value or fixed number of uses may be utilized in connection with the techniques disclosed herein. | 08-12-2010 |
20100207781 | SOUND OR RADIATION TRIGGERED LOCATING DEVICE WITH ACTIVITY SENSOR - A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it. The device may also sense events which cause it to disable the sensor, render it less sensitive, or suppress the generation of the location signal. The sensed event is any event, e.g., heat, motion, which indicates that the device is not, in fact, lost. | 08-19-2010 |
20100217842 | REGISTRATION AND USE OF PATTERNS DEFINED BY EXPRESSIONS AS DOMAIN NAMES - A domain name registration service permits registrants to register names that are defined by a pattern-matching expression that may include one or more wildcard values in any portion of the domain or subdomain name. A domain name server utilizes pattern matching with expressions, such as REGEX systems, to parse incoming domain name requests to identify text strings that conform to the domain defined by the registered regular expression. Other components assign economic value to defined patterns and prevent conflicts between registered patterns and domain names. | 08-26-2010 |
20100235234 | METHOD AND SYSTEM FOR TRANSACTING WITH NETWORK TRAFFIC - A system and method for using targeted network traffic as payment-in-kind in exchange for rights to anything that may be connected to a network, such as network-connected computer hardware and copyrighted software or content on such hardware, is disclosed. The method may be adapted for use with almost any product or service which may be tracked over a network. The system and method are for use with transactions between a user of a subject product or service and a provider of the subject product or service desiring to receive traffic to a target in exchange for it. | 09-16-2010 |
20100245062 | TACTILE ALERTING MECHANISM FOR PORTABLE COMMUNICATIONS DEVICE - A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing. The alerting mechanism may be configured as a movable part of a decorative fanciful housing for the communications device. | 09-30-2010 |
20100245617 | AUTOMATED WHITE BALANCING IN DIGITAL PHOTOGRAPHY - A method for improving white balance measurement for digital cameras or the like uses color reference articles for placement within a scene coordinated with a digital camera capable of automatically recognizing the color reference supplied by the article. The reference articles comprise a signaling device (such as an RFID chip, an LED that emits in a specified and unique spectral area, or a watermark) that allows the digital camera to pinpoint the location of the reference article, its color value, size, and other information needed to use the reference article for color balancing. The digital camera receives the signal from the reference article and uses it for white balancing. | 09-30-2010 |
20100250546 | METHOD AND APPARATUS FOR IMPROVING BANDWIDTH EFFICIENCY IN A COMPUTER NETWORK - A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type. The method comprises monitoring a bandwidth usage of the communication link, and triggering application of the rule set when the bandwidth usage exceeds a threshold amount. The threshold amount is determined relative to the finite bandwidth. The method further comprises distinguishing between the files according to type, and prioritizing transmission of the files according to type and according to the rule set. | 09-30-2010 |
20100251344 | CONTROLLING ACCESS TO NAME SERVICE FOR A DOMAIN NAME SYSTEM - A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet. | 09-30-2010 |
20100293621 | METHOD AND APPARATUS FOR IDENTIFYING AND CHARACTERIZING ERRANT ELECTRONIC FILES - A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored fire; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums. | 11-18-2010 |
20100329519 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 12-30-2010 |
20110010462 | MANAGEMENT OF BANDWIDTH ALLOCATION IN A NETWORK SERVER - A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period. | 01-13-2011 |
20110013503 | OPTICALLY-READABLE DISK WITH COPY PROTECTION DEVICE - An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. The device may include an electro-optical material that is activated by an electrical signal from a controller in response to an input from a sensor responsive to motion of the disk. | 01-20-2011 |
20110029302 | METHOD AND SYSTEM FOR CANDIDATE MATCHING - A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. Candidate qualities thus determined are included in candidate profiles and used to identify desirable candidates. | 02-03-2011 |
20110047205 | DISTRIBUTED COMPUTING BY CARRIER-HOSTED AGENT - A method for operating a host layer of a distributed computing system on a wide area network includes attaching an autonomous agent to a client-requested carrier, such as web content. The method includes the steps of receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client via the wide area network. The agent has program instructions configured to execute autonomously on the client node to perform a processing function. The processing function is configured to operate on raw data to produce process data, according to instructions determined by a solution algorithm of the distributed computing system. The method further includes sending the raw data to the client node and receiving the process data from the client node as it is processed by the agent. The host layer may comprise a web server hosting a web site containing consumer-oriented web pages, and the carrier may comprise an HTML page containing user content. The agent may comprise a web page-enabled application embedded in the HTML page, such as a Java™ applet. | 02-24-2011 |
20110047828 | REMOTELY CONTROLLED FOOTWEAR DISRUPTOR - Footwear is integrated with an electronic circuit responsive to a remote control signal to control one or more transducers providing tactile, audible, and/or mechanical outputs that tend to distract the wearer of the footwear or hinder walking and running ability, when activated. The footwear may include a receptacle for storing electrical and/or mechanical energy that is discharged to lock a mechanical disruptor in place or to distort the footwear sole when the transducer is activated. The footwear may include a transducer that vibrates when activated. The transducer may be located in the footwear, and/or in an adjacent article of clothing and held against the wearer's body. | 03-03-2011 |
20110074108 | CARD GAME WITH COMMON CARD REMOVAL - A method of managing a card game, a computer implementation thereof, and a card game kit, according to which a hand of cards is dealt to each of a plurality of players. Each hand includes one or more cards, and each card bears a designated value and suit. A plurality of common cards are dealt into a common card zone, and all players know the designated value and suit of each common card. The players then have the option of placing a wager or withdrawing from the game, after the hands and common cards have been dealt. For those players remaining in the game, at least one common card is removed from the common card zone and wagering or withdrawing continues until a winner is determined based at least in part on remaining cards in the common card zone. | 03-31-2011 |
20110118912 | METHOD AND SYSTEM FOR AVIATION NAVIGATION - A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft. | 05-19-2011 |
20110119342 | MESSAGE FILTERING METHOD - A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering. | 05-19-2011 |
20110170047 | EYEWEAR WITH PINHOLE APERTURE AND LENS - Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens. Pinhole apertures may have a diameter no greater than about 3 mm, and a diameter/thickness ratio no less than about 66.7%. | 07-14-2011 |
20110170401 | OPTICALLY-READABLE DISK WITH COPY PROTECTION DEVICE - An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or for when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. | 07-14-2011 |
20110176404 | OPTICALLY-READABLE DISK WITH COPY PROTECTION DEVICE - An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. The device may include an electro-optical material that is activated by an electrical signal from a controller in response to an input from a sensor responsive to motion of the disk. | 07-21-2011 |
20110208654 | MANAGED PURCHASE ACCOUNT FOR DEFINED COMMODITIES - A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services. A merchant computer may receive the identifier and process it to determine whether what is proposed for purchase using the account is a qualified type of good or service. The computer may obtain a list of qualified or unqualified products and compare the list to what is proposed for purchase. In the alternative, the computer may provide instructions to a human operator for the merchant, who may determine whether or not the proposed product is qualified. If the proposed product is deemed qualified for purchase, use of the account may be approved; if otherwise, use of the account may be refused. | 08-25-2011 |
20110238577 | CONDITIONAL BALANCE MANAGEMENT FOR NON-ISSUER DEBIT INSTRUMENTS - A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., “virtual currency”) for use in an online computer game or the like, after the trigger date. | 09-29-2011 |
20110238912 | FLEXIBLE DATA STORAGE SYSTEM - Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space. The configured new data file is stored in accordance with the assigned data storage scheme in one or more of the available locations and the locations of the new data file are recorded. | 09-29-2011 |
20110246026 | VEHICLE CONSOLE CONTROL SYSTEM - A control system for an interactive vehicle console disables certain interactive functions in response to a signal indicating that the vehicle is in motion, and in addition, permits a passenger to bypass the disablement feature using one or more input devices. An input device may include a transmitter/receiver system that transmits a signal from the passenger seat via the passenger's body to an input device on the vehicle console. A low-frequency electrical signal may be transmitted from a transmitter in the seat cushion to a touchscreen or button on the console, when the passenger touches the screen or button. In response to detecting the low-frequency signal, the console control may enable a feature of the console that it has disabled because of vehicle motion. In other embodiments, the input device may comprise a vision system that determines the source of command input from camera input taken of the driver and passenger. | 10-06-2011 |
20110246625 | MANAGEMENT OF BANDWIDTH ALLOCATION IN A NETWORK SERVER - A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period. | 10-06-2011 |
20110249912 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 10-13-2011 |
20110250974 | SIMULATED GAMING USING PRIOR GAME OUTCOME - A method and apparatus for providing a simulated game of chance uses a predetermined set of outcomes determined by a gaming machine for a game of chance based on a first specified wager amount or amounts per game and a specified total number of games, using a simulator. The predetermined set of outcomes may be determined at the gaming machine more than a specified period of time prior to providing the simulated game. The simulator provides simulated games of chance in response to user input specifying second wager amounts independently of the first wager amount or amounts, in which the results of the simulated games are determined from the predetermined set of outcomes. The simulator adjusts the number of permitted simulated games in response to the second wager amounts and results of the simulated games so that an aggregate outcome of the simulated games corresponds to the predetermined set of outcomes. | 10-13-2011 |
20110256845 | VERIFYING GEOGRAPHICAL LOCATION OF WIDE AREA NETWORK USERS - A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verifies and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed. | 10-20-2011 |
20110269519 | GAMING METHOD - A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amount or betting odds, some combinations of the foregoing, or any other useful remuneration. The house retains its edge via the premium. The method may be implemented for play at a physical or virtual card table. | 11-03-2011 |
20110269532 | GAMING INCORPORATING SOCIAL GROUP FEATURES - A gaming apparatus, method and system enables communication between members of a social group using machines belonging to the system. Members of a social group are thereby enable to share benefits from members' participation or winnings, by altering operation of gaming machines in use by member of the social group. A license to a progressively increasing portion of an audio-video work may be awarded in response to continuing game play by one or more members of the social group. | 11-03-2011 |
20110279768 | EYEWEAR WITH PINHOLE APERTURE AND LENS - Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens. Pinhole apertures may have a diameter no greater than about 3 mm, and a diameter/thickness ratio no less than about 66.7%. | 11-17-2011 |
20110282971 | PERSONAL CRITERIA VERIFICATION USING FRACTIONAL INFORMATION - A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user. | 11-17-2011 |
20110283105 | METHOD OF DISTRIBUTING A DECRYPTION KEY IN FIXED-CONTENT DATA - Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal. | 11-17-2011 |
20110301760 | CREATION AND USE OF VIRTUAL PLACES - An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool. | 12-08-2011 |
20120044365 | REMOTE TELEPRESENCE GAZE DIRECTION - A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device. Video and control streams from multiple live avatars may be aggregated through a host server and allocated via an online interface to multiple prospective remote operators. | 02-23-2012 |
20120059886 | REPLY MESSAGE HANDLING FOR TRANSIENT GROUP - An electronic mail client inserts an identifier into incoming messages based on determining that the incoming message is addressed to more than one addressee (e.g., the message is addressed to an addressee group). The client stores the identifiers and the addresses for the addressee group in a database. The client or other node for outgoing electronic mail analyzes outgoing messages containing the identifier to determine whether or not the outgoing message is addressed to all addresses in the addressee group, and takes an action based on the determination. | 03-08-2012 |
20120123669 | METHOD AND SYSTEM FOR AVIATION NAVIGATION - A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft. | 05-17-2012 |
20120150677 | AUTOMATIC RESUPPLY OF CONSUMABLE COMMODITIES - Methods and systems for facilitating initiation of resupply orders for consumable commodities include using a stand-alone electronic or audio-generating device incorporated into retail product packaging. The stand-alone device is equipped with a rudimentary processor or logic circuit, a memory, and a wireless transmitter. A simple user interface/activation device such as a push button or membrane switch is coupled to the logic circuit or processor. The stand-alone device is incorporated into or with product packaging, and may be configured with a resupply code at or after a point of sale. A user may activate the user interface of the device when the product needs resupplying, causing the resupply code to be transmitted to an access point or terminal that initiates a reorder sequence for the product. | 06-14-2012 |
20120155720 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 06-21-2012 |
20120158877 | E-MAIL AUTHENTICATION - A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. The system and method may also provide for determining whether an e-mail originates from a forged source. A server receives data relating to an e-mail, including a purported sender and a verification host. The server queries the verification host with information pertaining to the e-mail and requests confirmation that the e-mail originates from the purported sender. The e-mail is determined to originate from a forged source unless the verification host responds that the e-mail originates from the purported sender. | 06-21-2012 |
20120173605 | DISTRIBUTED COMPUTING BY CARRIER-HOSTED AGENT - A method for operating a host layer of a distributed computing system on a wide area network includes attaching an agent to a client-requested carrier. The method includes receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client. The agent has program instructions configured to execute on the client node to perform a processing function that operates on raw data to produce process data. The method further includes sending the raw data to the client node and receiving the process data from the client node as it is processed by the agent. The host layer may comprise a web server hosting a web site containing consumer-oriented web pages, and the carrier may comprise an HTML page containing user content. The agent may comprise a web page-enabled application embedded in the HTML page. | 07-05-2012 |
20120185251 | METHOD AND SYSTEM FOR CANDIDATE MATCHING - A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. Candidate qualities thus determined are included in candidate profiles and used to identify desirable candidates. | 07-19-2012 |
20120215886 | MANAGEMENT OF BANDWIDTH ALLOCATION IN A NETWORK SERVER - A server is configured to transfer information to a plurality of client devices in accordance with bandwidth-limiting and bandwidth-adjustment techniques. Bandwidth may be reduced based on an amount of data previously transferred to a client device (e.g., within a prior time period). Bandwidth may also be reduced based on variable input parameters such as file size, data type, server load, network response time, and number of transfer requests from a client device within a prior period of time. In some embodiments, bandwidth may be reduced by inserting delays between portions of data being transmitted. A length of a delay period may be determined based on the various factors above (amount of previous data transfer(s), file size, etc.). Bandwidth to a client device may also be adjusted dynamically. In some embodiments, bandwidth may be increased (rather than decreased). | 08-23-2012 |
20120220369 | GUEST MANAGEMENT IN AN ONLINE MULTI-PLAYER VIRTUAL REALITY GAME - A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment. A memory holds program instructions for determining whether the guest access is associated with a member client. If the guest access request is associated with the member client, then the guest client is allowed to access the virtual reality environment via a guest avatar. The guest avatar's movements in the virtual reality environment are restricted based on a location of a member avatar controlled by the associated member client. For example, the guest avatar may only be permitted to move within an area that is bounded by a perimeter about the member avatar. | 08-30-2012 |
20120233279 | MESSAGE FILTERING METHOD - A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering. | 09-13-2012 |
20120270530 | ALERT SIGNAL CONTROL USING RECEIVER VELOCITY - An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system. The alert signal control node determines a most recent-determinable velocity for each receiving device before transmitting a message alert signal. If the velocity exceeds a predetermined threshold, the alert signal may be delayed until the velocity drops below the threshold. The system may be operated as a safety measure to prevent reception of distracting alert signals while driving, thereby silencing messaging devices at appropriate times. | 10-25-2012 |
20120275284 | OPTICALLY-READABLE ARTICLE WITH ELECTRO-OPTICAL ACCESS CONTROL DEVICE - An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. The device may include an electro-optical material that is activated by an electrical signal from a controller in response to an input from a sensor responsive to motion of the disk. | 11-01-2012 |
20120327085 | AVATAR EYE CONTROL IN A MULTI-USER ANIMATION ENVIRONMENT - In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. Optionally, user preferences for object characteristics may be factored into determining priority of apparent gaze. Resulting modeled avatars are rendered on client displays to provide more lifelike and interesting avatar depictions with shifting gaze directions. | 12-27-2012 |
20120330445 | ENTERTAINMENT SYSTEM FOR PERFORMING HUMAN INTELLIGENCE TASKS - A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. Human intelligence tasks, such as visual discrimination, are thus enabled in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources present the human intelligence tasks to multiple video game participants as in-game content. The game engine defines and enables game play rules for the in-game content. The game play rules set parameters for the multiple video game participants to perform the human intelligence tasks to achieve desired results. The game engine may award each of the multiple video game participants an improved game score upon successful performance of the human intelligence tasks in accordance with the game play rules. The game engine may measure success by consistency in responses between different participants or trials. | 12-27-2012 |
20120331572 | METHOD AND APPARATUS FOR IDENTIFYING AND CHARACTERIZING ERRANT ELECTRONIC FILES - A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored fire; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums. | 12-27-2012 |
20130021338 | MULTI-INSTANCE, MULTI-USER VIRTUAL REALITY SPACES - A mufti-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. The virtual-reality data may be configured to cause remote clients to output an animated display of a corresponding one of the parallel dimensions and avatars therein. | 01-24-2013 |
20130041907 | METHOD AND APPARATUS FOR CONTENT FILTERING - A method for filtering content makes use of local filtering agents for end users, and a portal to a network of human reviewing resources. Local filtering agents request content classification for unclassified content. The portal routes requests from local agents to available human reviewing resources. A content classification is provided by the reviewing resources, and may be saved in association with a content identifier for future use. The method permits human review of content within a short period after review is requested. In an embodiment of the invention, a centrally-located switch is provided for controlling filtering levels at one or more user terminals. | 02-14-2013 |
20130080515 | COMPUTER NETWORK STORAGE ENVIRONMENT WITH FILE TRACKING - A network server may discourage inappropriate use. Files may be altered in such a way as to not noticeably affect acceptable, desired file types, but to substantially corrupt undesirable file types. Every file copied to or from a memory of a server may be affected, or the method may be applied only to selected files or types of files. In particular, files that may be corrupted by alternation include executable software files and compressed files, which may be fault intolerant. Fault tolerant files, which may include text and graphics files, may not be noticeably affected. In some cases, copyrighted files, media files, and/or other files are altered to prevent undesirable distribution. | 03-28-2013 |
20130081117 | PERSONAL CRITERIA VERIFICATION USING FRACTIONAL INFORMATION - A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user. | 03-28-2013 |
20130117396 | MESSAGE FILTERING METHODS AND SYSTEMS - Methods and systems can filter messages, such as electronic mail (email) messages. According to one example, a method reads sender information for an electronic mail message, wherein the sender information comprises a domain name and a first IP address. The method determines a second IP address associated with a web page associated with the domain name. The method compares the first IP address to the second IP address and provides an indication of likelihood that the electronic mail message constitutes spam based on the comparison of the first IP address to the second IP address. | 05-09-2013 |
20130127115 | CARD GAME WITH DEALT CARD DISCLOSURE FEATURE AND KIT - A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round. Those values and suits are then revealed to the players during one or more of the rounds to enable the players to wager or withdraw from the game. | 05-23-2013 |
20130142344 | AUTOMATIC LOCATION-SPECIFIC CONTENT SELECTION FOR PORTABLE INFORMATION RETRIEVAL DEVICES - A method for anticipating a user's desired information using a FDA device connected to a computer network is provided. This method further comprises maintaining a database of user tendencies within the computer network, receiving sensor data from the user's physical environment via the FDA device, generating query strings using both tendency data and sensor data, retrieving data from external data sources using these generated query strings, organizing the retrieved data into electronic folders, and delivering this organized data to the user via the FDA device, In particular, a data management module anticipates the type of information a user desires by combining real time data taken from a sensor unit within a FDA and data regarding the history of that particular user's tendencies stored within the data management module. | 06-06-2013 |
20130166529 | COMPUTER-IMPLEMENTED SEARCH USING RESULT MATCHING - A computer search system compares search results received for searches falling within a defined parameter envelope used for grouping search requests. The parameter envelope may be defined by various parameters, for example, time of search, origin or search request, language, or other non-keyword data associated with each search request, excluding keywords used to define the search. Each new search result (comprising a list of search hits) for incoming search requests is compared to stored search results for search requests within the same parameter envelope. Search results that are found to be similar based on a pre-defined similarity measure are provided as related search results responsive to the incoming search requests. A client-side pseudo-browsing application may control interactions with the search engine, collecting true browsing input from the client and providing pseudo-browsing information to the search engine or other information provider. | 06-27-2013 |
20130176306 | AVATAR EYE CONTROL IN A MULTI-USER ANIMATION ENVIRONMENT - In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. Optionally, user preferences for object characteristics may be factored into determining priority of apparent gaze. Resulting modeled avatars are rendered on client displays to provide more lifelike and interesting avatar depictions with shifting gaze directions. | 07-11-2013 |
20130177248 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 07-11-2013 |
20130236748 | AUTOMATED COMPOSITE BATTERY - A composite battery capable of adjusting its own power output in response to predetermined signals or lack of predetermined signals is provided. The composite battery has a set of terminals, a battery, a sensing device and a switch, all housed within a casing, which can be in the shape of a conventional battery. The sensor captures signals which upon reaching a certain threshold cause the switch to engage or disengage to selectively provide a load current to an electronic device. The battery may be used in battery-controlled consumer electronics articles, such as toys, to prevent avoidable battery drain or unintended activation when the electronics article is not in use. | 09-12-2013 |
20130244620 | ALERT SIGNAL CONTROL USING RECEIVER VELOCITY - An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system. The alert signal control node determines a most recent-determinable velocity for each receiving device before transmitting a message alert signal. If the velocity exceeds a predetermined threshold, the alert signal may be delayed until the velocity drops below the threshold. The system may be operated as a safety measure to prevent reception of distracting alert signals while driving, thereby silencing messaging devices at appropriate times. | 09-19-2013 |
20130254902 | CONTENT RESTRICTION COMPLIANCE USING REVERSE DNS LOOKUP - A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided. | 09-26-2013 |
20130275298 | CONDITIONAL BALANCE MANAGEMENT FOR NON-ISSUER DEBIT INSTRUMENTS - A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., “virtual currency”) for use in an online computer game or the like, after the trigger date. | 10-17-2013 |
20130290737 | METHOD OF DISTRIBUTING A DECRYPTION KEY IN FIXED-CONTENT DATA - Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal. | 10-31-2013 |
20130321144 | SOUND OR RADIATION TRIGGERED LOCATING DEVICE WITH ACTIVITY SENSOR - A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it. The device may also sense events which cause it to disable the sensor, render it less sensitive, or suppress the generation of the location signal. The sensed event is any event, e.g., heat, motion, which indicates that the device is not, in fact, lost. | 12-05-2013 |
20130339228 | TRANSFER OF VIRTUAL OBJECTS BETWEEN APPLICATIONS - The present disclosure provides systems and methods for incentivizing users of one application to try or use another application by, for example, enabling users to transfer virtual objects between applications. These applications may be unrelated. However, the systems disclosed herein are capable of converting the virtual objects that are configured to function with one application so that the virtual objects can be utilized by another application. In some cases, the conversion of the virtual object may be dependent on the market rate for a virtual object and/or the number of users who decide to convert instances of the virtual object. Further, the systems disclosed herein enable users to unlock features of applications based on accomplishments in other applications. | 12-19-2013 |
20130339872 | TRANSLATING USER INTERFACES OF APPLICATIONS - A user interface translation system can provide functionality of translating at least a portion of a user interface of a primary application. The user interface translation system may, for instance, add an overlay interface over a portion of the primary application. The primary application can conduct all the processing tasks. The overlay interface can correspond to user interfaces of well-known applications that users may prefer. In certain embodiments, users can select from a list of overlay interfaces. The user interface translation system can receive user control input from the overlay interface and map the received input to a corresponding command for the primary application. The user interface translation system can also train users to adapt to a change in user interface over a period of time or usage. | 12-19-2013 |
20140013403 | REDIRECTION METHOD FOR ELECTRONIC CONTENT - Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. In response to a request for the web page, the second locator is obtained. Access to the second locator may be secured. The second locator may be swapped with the first locator to cause the web browser application to obtain the second content instead of the first content. In the alternative, the second content may be obtained and provided to the web browser instead of, or in addition to, the first content. | 01-09-2014 |
20140025741 | EVALUATION OF REMOTE USER ATTRIBUTES IN A SOCIAL NETWORKING ENVIRONMENT - A computer host is configured to perform a method for defining user attributes with associated verification values for social networking accounts. The attributes concern the user's personal characteristics or attributes. The host publishes the attribute information to other clients together with interactive objects for soliciting corroboration of the attribute information. The host receives feedback information from other account holders, such as survey response data, concerning the veracity of the attribute information. The host processes the evaluation information and the feedback information to provide a veracity score of each attribute reported for each account holder, or for collections of attributes, by weighing the evaluation information and feedback information by a computed reliability factor for each source from which processed information is obtained. | 01-23-2014 |
20140045554 | TACTILE ALERTING MECHANISM FOR PORTABLE COMMUNICATIONS DEVICE - A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing. The alerting mechanism may be configured as a movable part of a decorative fanciful housing for the communications device. | 02-13-2014 |
20140052778 | METHOD AND APPARATUS FOR MAPPING A SITE ON A WIDE AREA NETWORK - A method and system for organizing and displaying information about Internet Web pages on Web maps are disclosed. Web maps display a summary of the information that a Web page provides access to, in a format that facilitates a rapid assessment of what may be accessed through a Web site's home page, or through any Web page on the Web site. Preferably, Web maps are displayed on a Web page, or within a frame of a Web page, by an Internet browser application. A set of Web maps may be automatically generated by a search engine or directory in response to a user's search request. Alternatively, a user may request that a Web map be produced for a particular Web page of interest. The Web maps are preferably generated by a Web server, or by an application running in the background of a user's computer, so that the user may perform other tasks on the user's computer while the Web maps are being generated. | 02-20-2014 |
20140071127 | MULTI-INSTANCE, MULTI-USER VIRTUAL REALITY SPACES - A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. The virtual-reality data may be configured to cause remote clients to output an animated display of a corresponding one of the parallel dimensions and avatars therein. | 03-13-2014 |
20140078376 | SIMULATED LARGE AERTURE LENS - A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor. The processor then processes the photographic image data using the photogrammetric range data to obtain second photographic data simulating an image captured using a lens set to an aperture size larger than the small aperture size. | 03-20-2014 |
20140080592 | GUEST MANAGEMENT IN AN ONLINE MULTIPLAYER VIRTUAL REALITY GAME - A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment. A memory holds program instructions for determining whether the guest access is associated with a member client. If the guest access request is associated with the member client, then the guest client is allowed to access the virtual reality environment via a guest avatar. The guest avatar's movements in the virtual reality environment are restricted based on a location of a member avatar controlled by the associated member client. For example, the guest avatar may only be permitted to move within an area that is bounded by a perimeter about the member avatar. | 03-20-2014 |
20140120882 | ALERT SIGNAL CONTROL USING MESSAGE PRIORITY - An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDAs. The receiving devices include a function for determining a message priority, prior to providing any audible alert signal indicating that the message is received. If an incoming message has a priority that is lower than a necessary threshold, the function prevents the audible alert signal from being generated at the time the message is received. | 05-01-2014 |
20140141859 | METHOD AND APPARATUS FOR SLOT-MACHINE GAMING - A gaming apparatus, such as a slot machine, that randomly determines a combination of symbols and pays prizes according to a determined payout table, is used to perform a gaming method similar to conventional slot machine play, but that permits greater interaction with the player. The gaming method provides the player with the option of increasing an amount wagered after at least one of the symbols has been determined. The method additionally provides the player with the option to randomly determine a symbol or symbols a second time, or to force a symbol to be the same as a symbol already determined, optionally at additional cost. The method includes making appropriate adjustments to a payout table, depending on the player's actions during game play. | 05-22-2014 |
20140187213 | GLOBAL CONTACT SYNCHRONIZATION - A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request. | 07-03-2014 |
20140188541 | SITUATIONAL AND GLOBAL CONTEXT AWARE CALENDAR, COMMUNICATIONS, AND RELATIONSHIP MANAGEMENT - A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request. | 07-03-2014 |
20140188776 | DECISION MAKING USING ALGORITHMIC OR PROGRAMMATIC ANALYSIS - A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems. The system can then automatically determine an instruction in a first time limit based on the calculated scored and command the executing system to execute the instruction. | 07-03-2014 |
20140189016 | SITUATIONAL AND GLOBAL CONTEXT AWARE CALENDAR, COMMUNICATIONS, AND RELATIONSHIP MANAGEMENT - A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive from at least one environmental data gathering device, data about at least one target participant at a gathering of a plurality of participants, analyze such data to determine at least one observed behavior of said target participant, compare said at least one observed behavior against a dataset of at least one behavior; determine when said at least one behavior exceeds a threshold similarity to at least behavior in said dataset; and communicate, to at least one notification device, said at least one observed behavior. | 07-03-2014 |
20140196133 | COGNITIVE-BASED CAPTCHA SYSTEM - Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. Persistent plugins and tests may be used to continuously verify human users. | 07-10-2014 |
20140199058 | AUTOFOCUS CALIBRATION FOR LONG LENSES - A method for calibrating a focus point for a camera lens may include capturing a reflection of a focus point measuring device that is affixed to the camera. The method may include evaluating a captured image of the reflection to measure a calibration amount for a focus point, and adjusting a focus point of a lens of the camera by the calibration amount. The focus point measuring device may include a substantially planar target surface defining a plane, and a ruled target surface inclined at substantially 45° to the substantially planar target and extending through the plane thereof, marked to indicate respective distances in front of and behind the plane. The device may further include a fixture for holding the substantially planar target surface and the ruled target surface in a defined orientation to the camera, enabling performance of the method. | 07-17-2014 |
20140214505 | RATES OF RECYCLING AND OTHER ENVIRONMENTALLY BENEFICIAL ACTIONS - A system, method, and apparatus is provided that identifies recycling or other environmentally beneficial activities and provides the user with easily understood data about the environmental impact of such activities. The activities are measured and may be used to provide incentives for recycling, such as credits for online applications, positions on a leaderboard, identification of recycling achievements on social networking sites, and financial and other rewards. | 07-31-2014 |
20140215571 | E-MAIL AUTHENTICATION - A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. The system and method may also provide for determining whether an e-mail originates from a forged source. A server receives data relating to an e-mail, including a purported sender and a verification host. The server queries the verification host with information pertaining to the e-mail and requests confirmation that the e-mail originates from the purported sender. The e-mail is determined to originate from a forged source unless the verification host responds that the e-mail originates from the purported sender. | 07-31-2014 |
20140222404 | COMPUTER-IMPLEMENTED PSUEDO-BROWSING - A client-side pseudo-browsing application may control interactions with the search engine, collecting true browsing input from the client and providing pseudo-browsing information to the search engine or other information provider. | 08-07-2014 |
20140240442 | REMOTE TELEPRESENCE SERVER - A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device. Video and control streams from multiple live avatars may be aggregated through a host server and allocated via an online interface to multiple prospective remote operators. | 08-28-2014 |
20140250510 | IDENTITY VERIFICATION VIA SELECTION OF SENSIBLE OUTPUT FROM RECORDED DIGITAL DATA - A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. The data sampler may store the data samples and parameter data as shared secret data for use in a future authentication session. During a future authentication session, an authentication device selects test data from the shared secret data to generate sensible output in an authentication process. The authentication process grants access to a controlled resource in response to user input indicating specific knowledge of the shared secret data selected from a presentation of similar sensible outputs. | 09-04-2014 |
20140270339 | GRAPHIC DATA ALTERATION TO ENHANCE ONLINE PRIVACY - A computer alters at least one recognizable metric or text in a digitally-encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest. | 09-18-2014 |
20140303778 | CREATION AND USE OF VIRTUAL PLACES - An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool. | 10-09-2014 |
20140354638 | MULTI-INSTANCE, MULTI-USER VIRTUAL REALITY SPACES - A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. A common space is modeled in the computer memory configured in relation to the plurality of parallel instances so that an object located inside the common space is visible from viewpoints located inside each of the plurality of parallel instances. Remote clients may output an animated display of a corresponding one of the parallel dimensions and avatars therein. | 12-04-2014 |
20150033152 | MOBILE STATUS UPDATE DISPLAY - A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body. The messages may include user status messages, which are messages posted to the hub by the user, and the user status messages and subscription messages may be displayed on separate ones of the two screens. An apparatus for performing the method may include a processor coupled to a memory holding encoded instructions for performing operations of the method. | 01-29-2015 |
20150039594 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 02-05-2015 |
20150085166 | SIMULATED LARGE APERTURE LENS - A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor. The processor then processes the photographic image data using the photogrammetric range data to obtain second photographic data simulating an image captured using a lens set to an aperture size larger than the small aperture size. | 03-26-2015 |