Patent application number | Description | Published |
20080226082 | Systems and methods for secure data backup - Systems and methods are provided for securely backing up data files of a computing system onto a backup device. An encryption key is generated using some identification found on and unique to the computing system. The encryption key is used to encrypt the data which is then stored on the backup device as encrypted backed up data. The encrypted backed up data stored on the backup device can later be accessed, e.g., for data recovery purposes, by once again using the computing system unique identification to generate the encryption key which can then be used to decrypt the encrypted backed up data. In this way, the backed up data remains secure even if the backup device is lost or stolen. | 09-18-2008 |
20080243466 | Systems and methods for converting a media player into a backup device - A data backup system is provided that when coupled to a data source, such as a personal computer, and a media player, such an Apple Computer iPod, the data backup system blocks certain communications between the data source and the media player thus preventing the data source from recognizing the media player as such thereby avoiding the launching of synchronization software for the media player, the data backup system also causing the automatic launching of a backup application stored on the data backup system so that data files can be located on the data source and then backed up to the media player. | 10-02-2008 |
20090030955 | Automated data backup with graceful shutdown for vista-based system - A data backup device including a backup application is plugged into a data source running the Microsoft Windows Vista operating system. The data backup device reports itself as a removable storage device to the Vista OS thus causing the AutoRun functionality of Vista to locate and launch the backup application which performs a backup operation on the data source. Launching the backup application can be via an automated installation and launch process. Should the backup device become unplugged from the data source, the backup application is gracefully shutdown. The backup device including the backup application can be created by downloading a backup package containing the backup application and installing it on a user-specified device. | 01-29-2009 |
20090031298 | System and method for automated installation and/or launch of software - Automated installation and launch of software on a computing system is accomplished by stored program code that determines the computing system configuration, selects a version of the software accordingly, uninstalls any software already installed on the computing system that conflicts with the software to be installed and launched, terminates any process running on the computing system that conflicts with the software to be installed and launched, and suppresses displays on the computing system while installing and launching the software on the computing system. | 01-29-2009 |
20100169560 | Methods for Selectively Copying Data Files to Networked Storage and Devices for Initiating the Same - A data backup system comprises a USB flash drive that includes an emulation component and a flash memory. The emulation component is configured to represent the flash memory as if it were an auto-launch device. Accordingly, a data source, such as a personal computer, will interact with the flash memory as if it were the auto-launch device. As some operating systems are configured to recognize auto-launch devices upon connection and automatically execute applications stored thereon, merely connecting the USB flash drive to a data source running such an operating system will cause a backup application stored by the flash memory to automatically execute on the data source. Here, the backup application is configured to selectively back up data files from the data source to a networked storage such as a server of a commercial service provider. | 07-01-2010 |
20110004459 | Data Backup Devices and Methods for Backing Up Data - A data backup system comprises an emulation component and a storage device having logical storage areas. The emulation component is configured to represent a first logical storage area of the storage device, such as a solid state memory or a disk drive partition, as if it were an auto-launch device. Accordingly, a data source, such as a personal computer, will interact with the first logical storage area as if it were the auto-launch device. As some operating systems are configured to recognize auto-launch devices upon connection and automatically execute applications stored thereon, merely connecting the data backup system to a data source running such an operating system can cause a backup application stored by the first logical storage area to automatically execute on the data source to selectively back up data to a second logical storage area of the storage device. | 01-06-2011 |
20110047128 | Automatic Connection to an Online Service Provider from a Backup System - A software application is provided for a user to select a backed up data file and specify a task to be performed by an online service provider on the selected file. The application automatically connects to the online service provider and uploads the selected file for the online service provider to perform the task. Tasks that can be performed include printing, sharing, viewing, playing and archiving the selected file. Task preferences, user settings and user information can also be specified by the user and uploaded to the online service provider. Automatic connection to the online service provider can be via default setting, selected file type, or specified task. Alternatively, the user can designate which service provider is to perform the task. Payment for the task can be accomplished via bundled credits or by other payment mechanisms. | 02-24-2011 |
20110125980 | Data Backup System Including a Data Protection Component - A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The system comprises storage and a data protection component that includes an application programming interface defining a command set. The system can also comprise a backup application that is configured to use the commands of the command set. The data protection component allows applications that use the commands of the command set, such as the backup application, to access the storage of the system. The data protection component prevents operating systems and applications that do not use the commands of the command set from accessing the storage. The data protection function of the data protection component can optionally be disabled to allow open access to the storage. | 05-26-2011 |
20110191769 | Automated Network Backup Device and Method - Automatically backing up one or more computers across a network to a backup device coupled to the network through one of the computers connected to the network. In one embodiment, a user connects the backup device to a first network connected computer which triggers the launch, installation, setup and configuration of the associated software on the first computer thereby performing a backup operation of data from the first computer to the backup device. The user then connects the backup device to a second network connected computer which triggers the launch, installation, setup and configuration of the associated software on the second computer thereby performing a backup operation of data from the second computer to the backup device. Furthermore, the associated software installed on the second computer triggers communication with and a backup of data from the first computer across the network through the second computer to the backup device. | 08-04-2011 |
20110246983 | Wireless Network Backup Device and Method - A system and method is provided for automatically backing up one or more computers to a wireless backup device either across a pre-existing wireless network if one is in use by the one or more computers or across a newly formed wireless network if a pre-existing wireless network is not in use by the one or more computers. The backup operation is performed by a software application provided by the wireless backup device which application can be launched, installed and configured on the one or more computers automatically and without user input via an initial hardwired connection between the wireless backup device and the one or more computers. | 10-06-2011 |
20110314035 | Creation, Transfer and Use of a Portable Data Map Using Metadata - A portable data map of a data source is created using metadata obtained from the data source. The created data map represents the entire data set of the data source and can be carried on a mobile device without having to carry the entire data set and thus requiring much less storage space. A user of the mobile device can navigate this data map and view the file/folder hierarchy of the data source even when the mobile device is off line or not currently in communication with the data source. Once a user has made a selection the actual file(s) can be downloaded to the mobile device. | 12-22-2011 |
20120015730 | Sensor Error Reduction in Mobile Device Based Interactive Multiplayer Augmented Reality Gaming Through Use of One or More Game Conventions - Interactive multiplayer augmented reality game play is enhanced in a mobile device used in such game play by establishing a virtual world coordinate system based on one or more game conventions and by reducing device sensor error before, during or after game play using one or more such game conventions. | 01-19-2012 |
20120032877 | Motion Driven Gestures For Customization In Augmented Reality Applications - A motion-driven user interface for mobile device-based augmented reality applications is described which provides a user with the ability to execute user interface input commands by physically manipulating the mobile device in space. The mobile device uses embedded sensors to identify the type and extent of the manipulation which cause execution of a corresponding user interface input command which can vary depending upon the operating context of the mobile device. | 02-09-2012 |
20120036485 | Motion Driven User Interface - A motion driven user interface for a mobile device is described which provides a user with the ability to cause execution of user interface input commands by physically moving the mobile device in space. The mobile device uses embedded sensors to identify its motion which causes execution of a corresponding user interface input command. Further, the command to be executed can vary depending upon the operating context of the mobile device. | 02-09-2012 |
20120047110 | System and Method for Automatic Data Defragmentation When Restoring a Disk - A method is described to restore backed-up data to a data source such that the data are automatically defragmented. Defragmentation is accomplished during the restore operation by identifying data blocks belonging to discrete data files and copying those data blocks to the target data source such that all data blocks for any given file are written to contiguous sectors on the target data source. | 02-23-2012 |
20120088586 | LINKABLE AND EXTENSIBLE VIRTUAL CHARACTERS - A method is provided of virtual gameplay with linked characters in a game environment. In an interactive game environment, a request is received to link a first player character with a second character. If it is determined that the first player character is qualified to be linked with the second character, a link is created between the first player character and the second character. The actions of the linked characters are then monitored in the game environment, and statistics are stored for at least the first player character. At least one statistic of the second character can be automatically increased or decreased as a function of at least one of the stored statistics. | 04-12-2012 |
20120115605 | SYSTEMS AND METHODS FOR INVERSE FRANCHISING OF VIRTUAL CHARACTERS - The invention provides a method of providing virtual gameplay with a virtual character in a game environment. A character customization facility is provided within the game environment in which a player can set or select starting attributes for a virtual character, and set or select a graphical avatar of the virtual character. Related gameplay statistics and accumulated gameplay property are stored for the virtual character. The player selects which elements of the starting attributes, the graphical avatar, the gameplay statistics and the gameplay property should be signature elements transferrable with the virtual character beyond the first game in the game environment. Supported signature elements are carried over to a second game. | 05-10-2012 |
20120157197 | SYSTEMS AND METHODS OF CHANGING STORYLINE BASED ON PLAYER LOCATION - A method is provided for enabling virtual gameplay with a character in a game environment. A game environment is provided in which a player can play a game via a character. The player's geographic location is detected and stored. In response to the detected geographic location, a storyline is retrieved for the character to interact with. The retrieved storyline is related to the geographic location of the player. | 06-21-2012 |
20120231891 | SYSTEMS AND METHODS OF VIRTUAL GOODS TRADING USING RATINGS TO ASCRIBE VALUE TO VIRTUAL GOODS - A method is provided for trading virtual goods. A game environment is provided in which a first player can acquire or develop a virtual good. This virtual good has a starting value. At least one rating of the virtual good is received from a second player via the game environment. The starting value is automatically increased or decreased as a function of the at least one rating of the virtual good. The virtual good is then made available for purchase at the new value. A system for trading virtual goods is also provided. | 09-13-2012 |
20120274585 | SYSTEMS AND METHODS OF MULTI-TOUCH INTERACTION WITH VIRTUAL OBJECTS - A method is provided for enabling user interaction with virtual objects in a virtual world using a touchscreen device. A touch input within or across a region of the display is detected from the touchscreen device. After determining that the touch input exceeds a predetermined threshold, and further determining whether the touch input is of a single touch or multi-touch type based on a number of contacts detected in the touch input, a multi-touch type input is interpreted as a multi-touch attract or repel command with respect to a virtual object displayed on the display. The virtual object is then visibly moved or changed on the display in response. | 11-01-2012 |
20120276997 | SYSTEMS AND METHODS OF IMPORTING VIRTUAL OBJECTS USING BARCODES - A method is provided for enabling virtual gameplay. A game environment is provided in which a player can play a game via a character. When the player scans a barcode from a real world object, a virtual object is retrieved based on the barcode input. The player's character can then own or interact with the virtual object in the game environment. | 11-01-2012 |
20130064426 | EFFICIENT SYSTEM AND METHOD FOR BODY PART DETECTION AND TRACKING - A method is provided for detecting a body part in a video stream from a mobile device. A video stream of a human subject is received from a camera connected to the mobile device. The video stream has frames. A first frame of the video stream is identified for processing. This first frame is then partitioned into observation windows, each observation window having pixels. In each observation window, non-skin-toned pixels are eliminated; and the remaining pixels are compared to determine a degree of entropy of the pixels in the observation window. In any observation window having a degree of entropy above a predetermined threshold, a bounded area is made around the region of high entropy pixels. The consistency of the entropy is analyzed in the bounded area. If the bounded area has inconsistently high entropy, a body part is determined to be detected at that bounded area. | 03-14-2013 |
20130079140 | GESTURES TO ENCAPSULATE INTENT - A method is provided for enabling gameplay with a character in a game environment on a mobile device. In the game environment, a player can play a game via a character. When there is an expectation of action from the character in the game, a touch gesture input is received on the mobile device. The fidelity of the touch gesture input is calculated with reference to an optimal gesture in a reference gesture table. If the fidelity is within a predefined range associated with the optimal gesture, the touch gesture input is matched to the optimal gesture and an associated game script is called wherein the character would be shown as having successfully completed the expectation. | 03-28-2013 |
20140004948 | Systems and Method for Capture and Use of Player Emotive State in Gameplay | 01-02-2014 |
20140057720 | System and Method for Capture and Use of Player Vital Signs in Gameplay - A computer-implemented method is provided for enabling virtual gameplay with a virtual character on a computing device. The player can access at least one video game and interact with the video game via a virtual character. The computing device detects or receives and stores at least one vital sign of the player. This vital sign is used to retrieve a storyline for the virtual character to interact with, which is related to the at least one vital sign. | 02-27-2014 |
20140141889 | Systems and Methods for Capture and Use of Local Elements in Gameplay - A computer-implemented method is provided for enabling virtual gameplay. Access is provided to at least one video game in which a player is able to interact with the video game according to a storyline. A player location is detected and stored. A local element is retrieved from a database based on the player location and the local element is correlated to a local element script actuatable in the video game. This local element script is retrieved and actuated in the video game to supplement or replace the video game's storyline. | 05-22-2014 |
20140313904 | System and Method of Device Based Cached Rules - A method is provided for self-care based customer care for users of devices. A device agent is provided for the device. The device agent is executable on the device and is programmed for gathering information from the device in the form of a device profile and running a diagnosis of the device. The diagnosis process refers to a set of rules stored locally on the device, and aspects of the device profile are reviewed against conditions in these rules. The profile gathering and diagnosis steps are programmed to be triggered and occur on the device. | 10-23-2014 |
20140342808 | System and Method of Using PCs as NPCs - A computer-implemented method of virtual gameplay is provided. In a video game in which a player can create a player character for interaction in the video game, the player is allowed to play in the video game using the player character via at least one player character script. When the player exits the video game, the player character is allowed to at least temporarily become a non-player character in the game by selectively causing the player character to assume at least one non-player character script, such that the player character has automatic, non-player directed interactions in the video game wherein the player character takes on the behaviour of a non-player character. When the player returns to the video game, the player character is allowed to resume play in the video game according to the player character script. | 11-20-2014 |