No. Patent Number Patent Name Filing Date Issuance Date Abstract
1 6,756,879 Method and apparatus for securing delivery of goods 2001-07-11 2004-06-29 A method and apparatus for providing security for delivered goods purchased via electronic or telephonic commerce is provided in the form of a digital lock box, and method of operating the lock box in cooperation with senders of goods. This method further comprises generating a owner access code for full access to a secured area, individually dividing this secured area into a plurality of sections after each delivery, generating a delivery access code for access to particular sections of a secured area, forwarding this delivery access code to senders of deliverable goods, and deactivating this delivery access code after the delivery of these goods..
2 6,763,379 System, apparatus and method for presenting and displaying content on a wide area network 1999-10-14 2004-07-13 Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer.
3 6,826,546 Method and system for licensing a copy of a copyright protected work 2000-10-26 2004-11-30 A method and system are provided for facilitating the purchase of a license for a downloaded file of a copyrighted work. In one embodiment, a method for licensing a digital copy of a copyrighted work includes determining an identity of the digital copy by using at least one computer program, calculating a fee for a license for the digital copy by the at least one computer program. The step of calculating includes the step of measuring at least one metric of the digital copy.
4 6,862,610 Method and apparatus for verifying the identity of individuals 2001-05-08 2005-03-01 A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user..
5 6,895,236 Method for verifying geographical location of wide area network users 2001-08-23 2005-05-17 A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recorded, and an access code is generated and recorded.
6 6,922,781 Method and apparatus for identifying and characterizing errant electronic files 2000-04-29 2005-07-26 A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory.
7 6,978,252 Method and system for transacting with network traffic 2001-04-18 2005-12-20 A system and method for using targeted network traffic as payment-in-kind in exchange for rights to anything that may be connected to a network, such as network-connected computer hardware and copyrighted software or content on such hardware, is disclosed. The method may be adapted for use with almost any product or service which may be tracked over a network. The system and method are for use with transactions between a user of a subject product or service and a provider of the subject product or service desiring to receive traffic to a target in exchange for it.
8 7,051,362 Method and system for operating a network server to discourage inappropriate use 2001-05-16 2006-05-23 A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server.
9 7,099,956 Method and apparatus for conducting domain name service 2001-01-31 2006-08-29 A method for conducting Internet domain name service to users connected to the Internet comprises an automated procedure for transferring Internet domain name service from a domain name owner to a domain name manager. This method further comprises Internet sub-domain name services to prospective buyers based on domain names transferred to the domain name manager. Messages requesting domain name service, including requests from domain name owners to sub-license their particular domain name to prospective sub-domain name buyers and from prospective sub-domain name buyers to license available sub-domain names, are received and responded to by an automated domain name management system.
10 7,200,863 System and method for serving content over a wide area network 2001-05-16 2007-04-03 A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet..
11 7,218,914 Method for verifying geographical location of wide area network users 2005-05-09 2007-05-15 A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recorded, and an access code is generated and recorded.
12 7,228,327 Method and apparatus for delivering content via information retrieval devices 2001-05-08 2007-06-05 A method for anticipating a user's desired information using a PDA device connected to a computer network is provided. This method further comprises maintaining a database of user tendencies within the computer network, receiving sensor data from the user's physical environment via the PDA device, generating query strings using both tendency data and sensor data, retrieving data from external data sources using these generated query strings, organizing the retrieved data into electronic folders, and delivering this organized data to the user via the PDA device. In particular, a data management module anticipates the type of information a user desires by combining real time data taken from a sensor unit within a PDA and data regarding the history of that particular user's tendencies stored within the data management module..
13 7,370,110 Method and system for operating a network server to discourage inappropriate use 2001-04-18 2008-05-06 A method and system for operating a network server to discourage inappropriate use are disclosed. A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises the steps of receiving a request to transfer a file between the memory and one of the plurality of client devices, removing a packet comprising a defined number of information bits from the file, transferring the packet between the memory and the client device per the request, then pausing for a defined delay period, and repeating the removing, transferring, and pausing steps in order until all of the file has been transferred.
14 7,406,708 System and method for serving content over a wide area network 2007-03-01 2008-07-29 A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet..
15 7,412,514 Method and apparatus for improving bandwidth efficiency in a computer network 2001-08-17 2008-08-12 A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type.
16 7,454,498 System, apparatus and method for presenting and displaying content on a wide area network 2004-07-01 2008-11-18 Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer.
17 7,460,737 Method and apparatus for photograph finding 2005-02-10 2008-12-02 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
18 7,465,229 Slot-machine game with adjusting payout table 2003-03-26 2008-12-16 A gaming apparatus, such as a slot machine, that randomly determines a combination of symbols and pays prizes according to a determined payout table, is used to perform a gaming method similar to conventional slot machine play, but that permits greater interaction with the player. The gaming method provides the player with the option of increasing an amount wagered after at least one of the symbols has been determined. The method additionally provides the player with the option to randomly determine a symbol or symbols a second time, or to force a symbol to be the same as a symbol already determined, optionally at additional cost.
19 7,493,660 Computer network storage environment hostile to fault-intolerant electronic file types 2006-02-17 2009-02-17 A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server.
20 7,518,485 Electronically controlled lockbox 2004-06-08 2009-04-14 A method and apparatus for providing security for delivered goods purchased via electronic or telephonic commerce is provided in the form of a digital lock box, and method of operating the lock box in cooperation with senders of goods. This method further comprises generating a owner access code for full access to a secured area, individually dividing this secured area into a plurality of sections after each delivery, generating a delivery access code for access to particular sections of a secured area, forwarding this delivery access code to senders of deliverable goods, and deactivating this delivery access code after the delivery of these goods..
21 7,539,736 Remote personal criteria verification method 2005-01-04 2009-05-26 A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user..
22 7,546,530 Method and apparatus for mapping a site on a wide area network 2000-04-14 2009-06-09 A method and system for organizing and displaying information about Internet Web pages creates Web maps. The Web maps display a summary of the information that a Web page provides access to, in a format that facilitates a rapid assessment of what may be accessed through a Web site's home page, or through any Web page on the Web site. Preferably, Web maps are displayed on a Web page, or within a frame of a Web page, by an Internet browser application.
23 7,734,504 Method and system for transacting with network traffic 2005-09-01 2010-06-08 A system and method for using targeted network traffic as payment-in-kind in exchange for rights to anything that may be connected to a network, such as network-connected computer hardware and copyrighted software or content on such hardware, is disclosed. The method may be adapted for use with almost any product or service which may be tracked over a network. The system and method are for use with transactions between a user of a subject product or service and a provider of the subject product or service desiring to receive traffic to a target in exchange for it..
24 7,734,807 Method and apparatus for improving bandwidth efficiency in a computer network 2008-08-11 2010-06-08 A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type.
25 7,744,464 Method of managing a card game, a computer implementation thereof, and a card game kit 2006-09-19 2010-06-29 A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round.
26 7,752,251 Method, apparatus and system for hosting information exchange groups on a wide area network 2000-08-21 2010-07-06 An method and system for hosting information exchange groups on a wide area network is disclosed, using various tools for promoting topical organization and self-evolution of the information exchange groups, and of a system of information exchange groups. These tools include methods for providing user rating of posts within the exchange group, for rating and ranking users of the exchange group, for rating and ranking links to related information pages and especially to related exchange groups operating according to the methods of the invention, and for continuously updating rating and ranking information. Additionally, methods are provided for users to found exchange groups, to filter information in exchange groups according to specified user preferences, and to protect private information from inadvertent disclosure to other users of the exchange group..
27 7,752,656 Controlling access to name service for a domain name system 2008-07-24 2010-07-06 A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet..
28 7,757,298 Method and apparatus for identifying and characterizing errant electronic files 2005-06-03 2010-07-13 A computer system includes a, server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory.
29 7,779,280 Low power mode for portable computer system 2006-09-18 2010-08-17 A computer system is configured to operate in a normal mode and in a reduced power mode. The normal mode utilizes a primary processor, which operates using a primary operating system. When system power is depleted to a defined level, the primary processor is shut down and certain operations are taken over by a low-power, secondary processor that operates using a secondary operating system..
30 7,783,753 Monitoring application for automatically requesting content 2008-11-17 2010-08-24 Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer.
31 7,797,408 Management of bandwidth allocation in a network server 2008-05-02 2010-09-14 A method and system for operating a network server to discourage inappropriate use are disclosed. A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises the steps of receiving a request to transfer a file between the memory and one of the plurality of client devices, removing a packet comprising a defined number of information bits from the file, transferring the packet between the memory and the client device per the request, then pausing for a defined delay period, and repeating the removing, transferring, and pausing steps in order until all of the file has been transferred.
32 7,801,944 Distributed computing using agent embedded in content unrelated to agents processing function 2002-05-20 2010-09-21 A method for operating a host layer of a distributed computing system on a wide area network includes attaching an autonomous agent to a client-requested carrier, such as web content. The method includes the steps of receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client via the wide area network. The agent has program instructions configured to execute autonomously on the client node to perform a processing function.
33 7,803,042 Card game with common card removal 2007-01-17 2010-09-28 A method of managing a card game, a computer implementation thereof, and a card game kit, according to which a hand of cards is dealt to each of a plurality of players. Each hand includes one or more cards, and each card bears a designated value and suit. A plurality of common cards are dealt into a common card zone, and all players know the designated value and suit of each common card.
34 7,804,744 Optically-readable disk with copy protection device 2008-07-03 2010-09-28 An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded.
35 7,813,917 Candidate matching using algorithmic analysis of candidate-authored narrative information 2005-06-22 2010-10-12 A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information.
36 7,835,294 Message filtering method 2004-09-03 2010-11-16 A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering..
37 7,844,141 Method and apparatus for photograph finding 2008-12-01 2010-11-30 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
38 7,874,521 Method and system for aviation navigation 2006-10-17 2011-01-25 A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft..
39 7,914,144 Eyewear with pinhole aperture and lens 2007-05-02 2011-03-29 Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens.
40 7,916,581 Optically-readable disk with copy protection device 2010-09-27 2011-03-29 An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded.
41 7,916,619 Optically-readable disk with copy protection device 2007-05-03 2011-03-29 An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or for when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded..
42 7,929,810 Method and apparatus for photograph finding 2010-09-02 2011-04-19 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
43 7,937,320 Managed purchasing account for defined commodities 2006-11-14 2011-05-03 A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services.
44 7,945,052 Method of distributing a decryption key in fixed-content data 2008-03-31 2011-05-17 Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal..
45 7,958,303 Flexible data storage system 2008-04-28 2011-06-07 Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space.
46 7,966,416 Management of bandwidth allocation in a network server 2010-09-13 2011-06-21 A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period..
47 7,970,378 Verifying geographical location of wide area network users 2007-04-19 2011-06-28 A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded.
48 7,980,934 Gaming method 2006-09-08 2011-07-19 A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amounts or betting odds, some combination of the foregoing, or any other useful remuneration. The house retains its edge via the premium.
49 7,984,987 Eyewear with pinhole aperture and lens 2011-03-28 2011-07-26 Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens.
50 7,996,491 Personal criteria verification using fractional information 2009-05-22 2011-08-09 A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user..
51 8,014,261 Optically-readable disk with copy protection device 2011-03-28 2011-09-06 An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or for when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded..
52 8,015,285 Monitoring application for automatically requesting content 2010-08-18 2011-09-06 Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer.
53 8,015,317 Method, system and computer-readable medium for conducting domain name service 2006-08-28 2011-09-06 A method for conducting Internet domain name service to users connected to the Internet comprises an automated procedure for transferring Internet domain name service from a domain name owner to a domain name manager. This method further comprises Internet sub-domain name services to prospective buyers based on domain names transferred to the domain name manager. Messages requesting domain name service, including requests from domain name owners to sub-license their particular domain name to prospective sub-domain name buyers and from prospective sub-domain name buyers to license available sub-domain names, are received and responded to by an automated domain name management system.
54 8,087,616 Method and system for aviation navigation 2011-01-25 2012-01-03 A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft..
55 8,117,258 Distributed computing by carrier-hosted agent 2010-09-21 2012-02-14 A method for operating a host layer of a distributed computing system on a wide area network includes attaching an autonomous agent to a client-requested carrier, such as web content. The method includes the steps of receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client via the wide area network. The agent has program instructions configured to execute autonomously on the client node to perform a processing function.
56 8,126,971 E-mail authentication 2007-05-07 2012-02-28 A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address.
57 8,150,680 Method and system for candidate matching 2010-10-11 2012-04-03 A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information.
58 8,167,724 Guest management in an online multi-player virtual reality game 2008-12-10 2012-05-01 A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment.
59 8,171,113 Management of bandwidth allocation in a network server 2011-06-15 2012-05-01 A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period..
60 8,194,564 Message filtering method 2010-11-15 2012-06-05 A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering..
61 8,206,222 Entertainment system for performing human intelligence tasks 2009-01-29 2012-06-26 A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources.
62 8,212,661 Alert signal control using receiver velocity 2009-05-22 2012-07-03 An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system.
63 8,223,598 Optically-readable disk with copy protection device 2011-03-28 2012-07-17 An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded.
64 8,259,117 Avatar eye control in a multi-user animation environment 2008-06-18 2012-09-04 In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities.
65 8,261,366 Method and apparatus for identifying and characterizing errant electronic files 2010-07-12 2012-09-04 A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory.
66 8,276,071 Multi-instance, multi-user animation platforms 2009-09-04 2012-09-25 A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars.
67 8,290,948 Method and apparatus for content filtering 2004-06-30 2012-10-16 A method for filtering content makes use of local filtering agents for end users, and a portal to a network of human reviewing resources. Local filtering agents request content classification for unclassified content. The portal routes requests from local agents to available human reviewing resources.
68 8,292,234 Method and system for aviation navigation 2011-12-27 2012-10-23 A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable —radar or radio coverage—area. The system uses a database of —radar or radio coverage—areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a —radar or radio coverage—area in the database meeting the —radar or radio coverage—requirements for the aircraft..
69 8,311,940 Conditional balance management for non-issuer debit instruments 2011-03-29 2012-11-13 A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., “virtual currency”) for use in an online computer game or the like, after the trigger date..
70 8,315,483 Method and apparatus for photograph finding 2012-02-28 2012-11-20 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
71 8,316,452 Computer network storage environment with file tracking 2009-02-12 2012-11-20 A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server.
72 8,321,202 Method and system for candidate matching 2012-03-26 2012-11-27 A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information.
73 8,321,531 Personal criteria verification using fractional information 2011-07-22 2012-11-27 A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user..
74 8,353,768 Card game apparatus and method with dealt card disclosure feature 2010-06-24 2013-01-15 A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round.
75 8,363,568 Message filtering method 2012-05-24 2013-01-29 A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering..
76 8,364,773 E-mail authentication 2012-02-27 2013-01-29 A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address.
77 8,385,691 Method and apparatus for photograph finding 2011-04-19 2013-02-26 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
78 8,386,476 Computer-implemented search using result matching 2009-05-20 2013-02-26 A computer search system compares search results received for searches falling within a defined parameter envelope used for grouping search requests. The parameter envelope may be defined by various parameters, for example, time of search, origin or search request, language, or other non-keyword data associated with each search request, excluding keywords used to define the search. Each new search result (comprising a list of search hits) for incoming search requests is compared to stored search results for search requests within the same parameter envelope.
79 8,390,630 Avatar eye control in a multi-user animation environment 2012-09-04 2013-03-05 In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities.
80 8,431,263 Automated composite battery 2007-05-02 2013-04-30 A composite battery capable of adjusting its own power output in response to predetermined signals or lack of predetermined signals is provided. The composite battery has a set of terminals, a battery, a sensing device and a switch, all housed within a casing, which can be in the shape of a conventional battery. The sensor captures signals which upon reaching a certain threshold cause the switch to engage or disengage to selectively provide a load current to an electronic device.
81 8,441,897 Optically-readable article with electro-optical access control device 2012-07-13 2013-05-14 An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded.
82 8,443,106 Content restriction compliance using reverse DNS lookup 2008-12-19 2013-05-14 A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided..
83 8,446,270 Alert signal control using receiver velocity 2012-07-02 2013-05-21 An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system.
84 8,453,219 Systems and methods of assessing permissions in virtual worlds 2012-08-20 2013-05-28 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
85 8,463,704 Conditional balance management for non-issuer debit instruments 2012-11-12 2013-06-11 A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., “virtual currency”) for use in an online computer game or the like, after the trigger date..
86 8,473,742 Method of distributing a decryption key in fixed-content data 2011-05-16 2013-06-25 Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal..
87 8,490,004 Evaluation of remote user attributes in a social networking environment 2009-04-17 2013-07-16 A computer host is configured to perform a method for defining user attributes with associated verification values for social networking accounts. The attributes concern the user's personal characteristics or attributes. The host publishes the attribute information to other clients together with interactive objects for soliciting corroboration of the attribute information.
88 8,493,386 Systems and methods of managed script execution 2012-08-20 2013-07-23 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
89 8,508,356 Sound or radiation triggered locating device with activity sensor 2010-02-18 2013-08-13 A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it.
90 8,522,330 Systems and methods of managing virtual world avatars 2012-08-20 2013-08-27 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
91 8,533,283 Redirection method for electronic content 2007-05-03 2013-09-10 Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure.
92 8,545,301 Remote card game with duplicate hands 2007-01-17 2013-10-01 Duplicate hands are dealt in a remote game of poker or other card game of chance. Simulated cards or game pieces are dealt to players with the order of suits changed for each player. A map is maintained in a computer memory between a reference set of indices corresponding to card suits, and differently-ordered sets of playing suits for dealing in the game.
93 8,558,677 Tactile alerting mechanism for portable communications device 2010-03-26 2013-10-15 A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing.
94 8,572,158 Distributed computing by carrier-hosted agent 2012-01-03 2013-10-29 A method for operating a host layer of a distributed computing system on a wide area network includes attaching an agent to a client-requested carrier. The method includes receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client. The agent has program instructions configured to execute on the client node to perform a processing function that operates on raw data to produce process data.
95 8,572,207 Dynamic serving of multidimensional content 2012-08-20 2013-10-29 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
96 8,577,698 Retail price hedging 2006-10-25 2013-11-05 Retail consumers may hedge the price of volatile commodities such as gasoline via the advance purchase of a policy, which may be represented by a hedge card. The card may be priced to cover uncertainty in the price of the commodity over a defined future period, plus a small profit for the card issuer, optionally plus a pre-paid residual cash value. The card may permit the purchase of a defined amount of the commodity at a price not to exceed a defined ceiling over the defined future period.
97 8,577,994 Management of bandwidth allocation in a network server 2012-04-26 2013-11-05 A server is configured to transfer information to a plurality of client devices in accordance with bandwidth-limiting and bandwidth-adjustment techniques. Bandwidth may be reduced based on an amount of data previously transferred to a client device (e.g., within a prior time period). Bandwidth may also be reduced based on variable input parameters such as file size, data type, server load, network response time, and number of transfer requests from a client device within a prior period of time.
98 8,582,829 Online identity verification 2011-11-03 2013-11-12 A method for verifying an identity attribute of a remote user includes providing pose instructions to a remote client from a host during an authentication session. The pose instructions may reference a specific physical token associated with the user, for example a government ID card, credit card, household object or printed or displayed image provided from an authentication host. The host receives an image from the client and may analyze the image to determine if the pose instructions were followed and if the physical token appears in the image.
99 8,589,792 Multi-instance, multi-user virtual reality spaces 2012-09-24 2013-11-19 A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars.
100 8,591,326 Guest management in an online multi-player virtual reality game 2012-04-30 2013-11-26 A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment.
101 8,593,565 Simulated large aperture lens 2012-03-26 2013-11-26 A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor.
102 8,594,084 Network router security method 2006-09-11 2013-11-26 A local network is secured using a router or hub that includes a security switch. During or immediately after initial network configuration, the router or hub records MAC addresses of connected network devices. After initial configuration is completed, the switch is activated.
103 8,608,538 Gaming method 2011-07-18 2013-12-17 A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amount or betting odds, some combinations of the foregoing, or any other useful remuneration. The house retains its edge via the premium.
104 8,612,543 Personal criteria verification using fractional information 2012-11-20 2013-12-17 A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user..
105 8,621,368 Systems and methods of virtual world interaction 2012-08-20 2013-12-31 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
106 8,624,718 Alert signal control using receiver velocity 2013-05-20 2014-01-07 An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system.
107 8,636,585 Method and apparatus for slot-machine gaming 2008-12-15 2014-01-28 A gaming apparatus, such as a slot machine, that randomly determines a combination of symbols and pays prizes according to a determined payout table, is used to perform a gaming method similar to conventional slot machine play, but that permits greater interaction with the player. The gaming method provides the player with the option of increasing an amount wagered after at least one of the symbols has been determined. The method additionally provides the player with the option to randomly determine a symbol or symbols a second time, or to force a symbol to be the same as a symbol already determined, optionally at additional cost.
108 8,667,130 Monitoring application for automatically requesting content 2011-09-06 2014-03-04 Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer.
109 8,671,142 Systems and methods of virtual worlds access 2012-08-20 2014-03-11 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
110 8,671,216 Method and apparatus for improving bandwidth efficiency in a computer network 2010-06-07 2014-03-11 A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type.
111 8,672,477 Eyewear with pinhole aperture and lens 2011-07-25 2014-03-18 Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens.
112 8,676,050 Autofocus calibration for long lenses 2011-12-29 2014-03-18 A method for calibrating a focus point for a camera lens may include capturing a reflection of a focus point measuring device that is affixed to the camera. The method may include evaluating a captured image of the reflection to measure a calibration amount for a focus point, and adjusting a focus point of a lens of the camera by the calibration amount. The focus point measuring device may include a substantially planar target surface defining a plane, and a ruled target surface inclined at substantially 45° to the substantially planar target and extending through the plane thereof, marked to indicate respective distances in front of and behind the plane.
113 8,676,158 Verifying geographical location of wide area network users 2011-06-27 2014-03-18 A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded.
114 8,694,493 Computer-implemented search using result matching 2013-02-25 2014-04-08 A computer search system compares search results received for searches falling within a defined parameter envelope used for grouping search requests. The parameter envelope may be defined by various parameters, for example, time of search, origin or search request, language, or other non-keyword data associated with each search request, excluding keywords used to define the search. Each new search result (comprising a list of search hits) for incoming search requests is compared to stored search results for search requests within the same parameter envelope.
115 8,694,553 Creation and use of virtual places 2011-06-07 2014-04-08 An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool..
116 8,704,829 Avatar eye control in a multi-user animation environment 2013-03-04 2014-04-22 In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities.
117 8,717,447 Remote telepresence gaze direction 2011-08-22 2014-05-06 A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device.
118 8,726,355 Identity verification via selection of sensible output from recorded digital data 2009-06-24 2014-05-13 A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample.
119 8,744,119 Graphic data alteration to enhance online privacy 2012-01-12 2014-06-03 A computer alters at least one recognizable metric or text in a digitally-encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest..
120 8,775,396 Method and system for searching a wide area network 2011-06-06 2014-07-08 A method and system for searching a wide area network that enables users to find the information they seek more quickly and more easily than prior art search engines are disclosed. Aspects of this disclosure include a process for making use of a user's prior search queries for query definition; a process for similarly making use of prior search queries by other users; a process for expanding and clarifying the meaning of queries; a process for including paid and other preferred results in an overall query result; and a process for using user evaluation data from previous search query results to identify results that should be included or removed from a current result..
121 8,781,987 Decision making using algorithmic or programmatic analysis 2013-12-27 2014-07-15 A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems.
122 8,798,596 Global contact synchronization 2013-12-27 2014-08-05 A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request..
123 8,812,954 Multi-instance, multi-user virtual reality spaces 2013-11-18 2014-08-19 A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars.
124 8,819,365 Flexible data storage system 2011-06-06 2014-08-26 Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space.
125 8,825,799 Redirection method for electronic content 2013-09-09 2014-09-02 Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure.
126 8,832,849 Computer data object modification based on data types in a networked environment 2012-11-19 2014-09-09 A network server may discourage inappropriate use. Files may be altered in such a way as to not noticeably affect acceptable, desired file types, but to substantially corrupt undesirable file types. Every file copied to or from a memory of a server may be affected, or the method may be applied only to selected files or types of files.
127 8,861,421 Mobile status update display 2011-11-29 2014-10-14 A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other users of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body.
128 8,867,798 Method and apparatus for photograph finding 2013-02-25 2014-10-21 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
129 8,902,354 Simulated large aperture lens 2013-11-25 2014-12-02 A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor.
130 8,924,262 Automatic resupply of consumable commodities 2011-12-09 2014-12-30 Methods and systems for facilitating initiation of resupply orders for consumable commodities include using a stand-alone electronic or audio-generating device incorporated into retail product packaging. The stand-alone device is equipped with a rudimentary processor or logic circuit, a memory, and a wireless transmitter. A simple user interface/activation device such as a push button or membrane switch is coupled to the logic circuit or processor.
131 8,947,427 Systems and methods of object processing in virtual worlds 2012-08-20 2015-02-03 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
132 8,949,964 Security key entry using ancillary input device 2011-08-25 2015-02-03 A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal.
133 8,952,797 Tactile alerting mechanism for portable communications device 2013-10-14 2015-02-10 A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing.
134 8,978,121 Cognitive-based CAPTCHA system 2014-01-03 2015-03-10 Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing.
135 8,984,102 Registration and use of patterns defined by expressions as domain names 2010-02-22 2015-03-17 A domain name registration service permits registrants to register names that are defined by a pattern-matching expression that may include one or more wildcard values in any portion of the domain or subdomain name. A domain name server utilizes pattern matching with expressions, such as REGEX systems, to parse incoming domain name requests to identify text strings that conform to the domain defined by the registered regular expression. Other components assign economic value to defined patterns and prevent conflicts between registered patterns and domain names..
136 9,002,820 Forum search with time-dependent activity weighting 2009-06-05 2015-04-07 A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time.
137 9,007,362 Adaptable generation of virtual environment frames 2012-01-17 2015-04-14 A virtual environment in generated in a server where at least one object representative of an entity interacts with other objects or attributes of the environment. A desired frame rate for rendering the virtual environment is identified, and compared to a maximum achievable frame rate at a client device. If the maximum achievable frame rate is slower than the desired frame rate, the number of objects displayed within the virtual environment is modified, in accordance with one or more rule sets, until the maximum achievable frame rate is at or near the desired frame rate.
138 9,014,500 Digital media enhancement system, method, and apparatus 2013-01-08 2015-04-21 Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image.
139 9,046,994 Systems and methods of assessing permissions in virtual worlds 2013-05-24 2015-06-02 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
140 9,049,234 HTTP trigger for out-of-protocol action 2010-02-03 2015-06-02 A hypertext transfer protocol (HTTP) request is used to actuate a secondary communications protocol (e.g., Short Message Service). A server receiving the request may be configured to take actions not specified by the URL associated with the request in response to the characters encoded in the request, such as accessing a secondary communications protocol. The server parses the request to identify action codes and/or content in the request itself, and takes action based on the code or content value.
141 9,050,522 Card game with dealt card disclosure feature and kit 2013-01-14 2015-06-09 A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round.
142 9,077,679 Mobile status update display 2014-10-13 2015-07-07 A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body.
143 9,081,972 Method of distributing a decryption key in fixed-content data 2013-06-24 2015-07-14 Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal..
144 9,087,399 Systems and methods of managing virtual world avatars 2013-08-26 2015-07-21 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
145 9,123,157 Multi-instance, multi-user virtual reality spaces 2014-08-15 2015-09-01 A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars.
146 9,135,493 Graphic data alteration to enhance online privacy 2014-06-02 2015-09-15 A computer alters at least one recognizable metric or text in a digitally-encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest..
147 9,137,257 Anti-phishing filter 2007-05-04 2015-09-15 A method operates to detect personal identifying or account information exchanged in a real-time electronic communication occurring between computer network users, such as electronic chat. A detected personal identifier may be recognized as an attempt on the part of one user to engage in a phishing attack upon another user or to otherwise steal the other user's sensitive personal information. Upon recognizing the communication as an unwarranted attempt to collect such information, the electronic communication may be monitored, and communication of the personal information may be prevented..
148 9,143,659 Clothing and body covering pattern creation machine and method 2013-01-08 2015-09-22 Body art, such as tattoos, are integrated or extended onto clothing. Clothing patterns may be integrated or extended onto body art, such as temporary tattoos. In one embodiment, a computer analyzes an image of a body with a tattoo and generates an image suitable for application to clothing.
149 9,166,974 Captcha systems and methods 2015-03-06 2015-10-20 Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing.
150 9,167,061 Gyroscopic alerting mechanism for portable communications device 2013-03-29 2015-10-20 A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall.
151 9,192,860 Single user multiple presence in multi-user game 2011-11-08 2015-11-24 A method for providing a single user multiple presence implementation may include providing access for a user identified by a user account to a virtual environment hosted by a computer. The method may further include generating multiple avatars for the user account to concurrently coexist and be operative within the virtual environment. The method may further include controlling the multiple avatars at least partly in response to input from the user.
152 9,202,223 Method and system for transacting with network traffic 2010-05-27 2015-12-01 A system and method for using targeted network traffic as payment-in-kind in exchange for rights to anything that may be connected to a network, such as network-connected computer hardware and copyrighted software or content on such hardware, is disclosed. The method may be adapted for use with almost any product or service which may be tracked over a network. The system and method are for use with transactions between a user of a subject product or service and a provider of the subject product or service desiring to receive traffic to a target in exchange for it..
153 9,208,598 Avatar eye control in a multi-user animation environment 2014-04-21 2015-12-08 In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities.
154 9,239,924 Identifying and characterizing electronic files using a two-stage calculation 2012-09-03 2016-01-19 A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory.
155 9,286,507 Online identity verification 2013-11-11 2016-03-15 A method for verifying an identity attribute of a remote user includes providing pose instructions to a remote client from a host during an authentication session. The pose instructions may reference a specific physical token associated with the user, for example a government ID card, credit card, household object or printed or displayed image provided from an authentication host. The host receives an image from the client and may analyze the image to determine if the pose instructions were followed and if the physical token appears in the image.
156 9,288,196 Identity verification via selection of sensible output from recorded digital data 2014-05-12 2016-03-15 A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample.
157 9,311,736 Clothing and body covering pattern creation machine and method 2015-09-21 2016-04-12 Body art, such as tattoos, are integrated or extended onto clothing. Clothing patterns may be integrated or extended onto body art, such as temporary tattoos. In one embodiment, a computer analyzes an image of a body with a tattoo and generates an image suitable for application to clothing.
158 9,313,626 Alert signal control using message priority 2014-01-06 2016-04-12 An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDAs. The receiving devices include a function for determining a message priority, prior to providing any audible alert signal indicating that the message is received. If an incoming message has a priority that is lower than a necessary threshold, the function prevents the audible alert signal from being generated at the time the message is received..
159 9,325,891 Simulated large aperture lens 2014-12-01 2016-04-26 A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor.
160 9,338,590 Global contact synchronization 2014-07-31 2016-05-10 A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request..
161 9,348,666 Translating user interfaces of applications 2013-06-17 2016-05-24 A user interface translation system can provide functionality of translating at least a portion of a user interface of a primary application. The user interface translation system may, for instance, add an overlay interface over a portion of the primary application. The primary application can conduct all the processing tasks.
162 9,374,352 Content restriction compliance using reverse DNS lookup 2013-05-13 2016-06-21 A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided..
163 9,384,640 Tactile alerting mechanism for portable communications device 2015-02-06 2016-07-05 A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing.
164 9,386,022 Systems and methods of virtual worlds access 2014-03-10 2016-07-05 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
165 9,397,977 Registration and use of patterns defined by expressions as domain names 2015-03-16 2016-07-19 A domain name registration service permits registrants to register names that are defined by a regular expression that may include one or more wildcard values in any portion of the domain or subdomain name. A domain name server utilizes pattern matching with regular expressions, such as REGEX systems, to parse incoming domain name requests to identify text strings that conform to the domain defined by the registered regular expression. Other components assign economic value to defined patterns and prevent conflicts between registered patterns and domain names..
166 9,405,627 Flexible data storage system 2014-08-21 2016-08-02 Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space.
167 9,405,831 Avoiding masked web page content indexing errors for search engines 2009-04-16 2016-08-02 Multiple non-host client sites provide cached user copies of web pages and/or web content, or summaries thereof, to a server. Obtaining data from non-host sources for indexing purposes avoids masked web page content indexing errors for search engines. The server aggregates, summarizes and indexes the web pages and/or web content in an index of cached content, in conjunction with updating, generating and storing a search index using an indexing agent such as a web crawler or spider.
168 9,417,428 Autofocus calibration for long lenses 2014-03-17 2016-08-16 A method for calibrating a focus point for a camera lens may include capturing a reflection of a focus point measuring device that is affixed to the camera. The method may include evaluating a captured image of the reflection to measure a calibration amount for a focus point, and adjusting a focus point of a lens of the camera by the calibration amount. The focus point measuring device may include a substantially planar target surface defining a plane, and a ruled target surface inclined at substantially 45° to the substantially planar target and extending through the plane thereof, marked to indicate respective distances in front of and behind the plane.
169 9,418,462 Digital media enhancement system, method, and apparatus 2015-04-20 2016-08-16 Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image.
170 9,448,886 Flexible data storage system 2015-09-25 2016-09-20 Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space.
171 9,452,360 Multi-instance, multi-user virtual reality spaces 2015-08-31 2016-09-27 A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars.
172 9,467,436 Captcha systems and methods 2015-10-19 2016-10-11 Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing.
173 9,473,377 Forum search with time-dependent activity weighting 2015-04-06 2016-10-18 A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time.
174 9,473,503 Systems and methods of object processing in virtual worlds 2015-01-30 2016-10-18 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
175 9,503,545 Evaluation of remote user attributes in a social networking environment 2013-07-11 2016-11-22 A computer host is configured to perform a method for defining user attributes with associated verification values for social networking accounts. The attributes concern the user's personal characteristics or attributes. The host publishes the attribute information to other clients together with interactive objects for soliciting corroboration of the attribute information.
176 9,508,180 Avatar eye control in a multi-user animation environment 2015-12-07 2016-11-29 In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities.
177 9,509,699 Systems and methods of managed script execution 2013-07-22 2016-11-29 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
178 9,531,724 Systems and methods of assessing permissions in virtual worlds 2015-06-01 2016-12-27 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
179 9,537,856 Redirection method for electronic content 2014-08-29 2017-01-03 Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure.
180 9,544,407 Gyroscopic alerting mechanism for portable communications device 2015-10-19 2017-01-10 A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall.
181 9,560,003 Erroneous addressing prevention for electronic messaging 2009-02-17 2017-01-31 An electronic mail client includes features for preventing addressing errors in electronic messaging such as those caused by predictive text features. A messaging client tracks addressing parameters including the length of time since each previous addressee has been messaged, the quantity of times selected addressees have been co-addressees on messages, if any, whether the addressees are designated as sensitive and whether the messages contain sensitive subject matter. If a high risk of addressing error is determined, the client delays transmission of the message to permit the user to review the message recipient addresses and correct any erroneous addressees..
182 9,579,575 Entertainment system for performing human intelligence tasks 2012-06-25 2017-02-28 A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. Human intelligence tasks, such as visual discrimination, are thus enabled in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources present the human intelligence tasks to multiple video game participants as in-game content.
183 9,595,136 Creation and use of virtual places 2014-04-07 2017-03-14 An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool..
184 9,619,486 Method and apparatus for photograph finding 2014-10-20 2017-04-11 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
185 9,672,375 Security key entry using ancillary input device 2015-01-30 2017-06-06 A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal.
186 9,705,838 Mobile status update display 2015-07-02 2017-07-11 A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body.
187 9,705,867 Content restriction compliance using reverse DNS lookup 2015-09-29 2017-07-11 A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided..
188 9,721,144 Graphic data alteration to enhance online privacy 2015-09-14 2017-08-01 A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest..
189 9,754,243 Providing recommended meeting parameters based on religious or cultural attributes of meeting invitees obtained from social media data 2013-09-24 2017-09-05 A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request..
190 9,757,281 Extra-protection pads and related methods 2014-12-19 2017-09-12 Extra-protection fins and pads, and methods of making and using extra-protection fins and pads are disclosed. The extra-protection fins and pads of the present invention comprise a first triangular face, a second triangular face attached and/or connected to the first triangular face at an angle thereby forming a front apex and a top apex, wherein the fins are configured such that the front apex catches and/or absorbs the menstrual and/or other vaginal fluids first, and the extra-protection fin fills backwards toward the top apex, thus preventing unwanted, embarrassing and annoying leakage onto clothing or bedding during periods of heavy flow and/or when lying down. The extra-protection fin may also comprise a third triangular face attached and/or connected to the first and second triangular faces, wherein a vertex of the third triangular face contacts and/or is connected to the first and second triangular faces at the top apex..
191 9,786,082 Avatar eye control in a multi-user animation environment 2016-11-28 2017-10-10 In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities.
192 9,843,771 Remote telepresence server 2014-05-05 2017-12-12 A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device.
193 9,858,787 Sound or radiation triggered locating device with activity sensor 2013-08-12 2018-01-02 A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it.
194 9,860,247 CAPTCHA systems and methods 2016-10-10 2018-01-02 Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing.
195 9,867,961 Treatment of phantom limb syndrome and other sequelae of physical injury 2015-03-13 2018-01-16 Methods, systems and devices that provide a therapeutic solution to alleviate the pain and discomfort of phantom limb syndrome are disclosed. The methods and systems of the present invention generally comprise capturing data from recording devices operably coupled to a processor and/or computing device, the recording devices configured to capture data associated with intact portions of a missing limb, one or more intact limbs and/or portions of the environment surrounding the missing limb, identifying the data captured, generating a three-dimensional virtual image of the missing limb and the surrounding environment from the data captured, and displaying the three-dimensional virtual image and the portions of the surrounding environment to the amputee such that the missing limb appears intact. The present invention advantageously provides a therapeutic and more immediate solution to alleviate the pain and discomfort from phantom limb syndrome..
196 9,889,375 Multi-instance, multi-user virtual reality spaces 2016-09-26 2018-02-13 A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars.
197 9,898,810 Digital media enhancement system, method, and apparatus 2016-08-15 2018-02-20 Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image.
198 9,930,043 Systems and methods of virtual world interaction 2013-12-23 2018-03-27 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
199 9,937,419 Entertainment system for performing human intelligence tasks 2017-02-27 2018-04-10 A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources.
200 9,953,304 Situational and global context aware calendar, communications, and relationship management 2013-09-20 2018-04-24 A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive from at least one environmental data gathering device, data about at least one target participant at a gathering of a plurality of participants, analyze such data to determine at least one observed behavior of said target participant, compare said at least one observed behavior against a dataset of at least one behavior; determine when said at least one behavior exceeds a threshold similarity to at least behavior in said dataset; and communicate, to at least one notification device, said at least one observed behavior..
201 9,959,565 Automatic resupply of consumable commodities 2014-12-22 2018-05-01 Methods and systems for facilitating initiation of resupply orders for consumable commodities include using a stand-alone electronic or audio-generating device incorporated into retail product packaging. The stand-alone device is equipped with a rudimentary processor or logic circuit, a memory, and a wireless transmitter. A simple user interface/activation device such as a push button or membrane switch is coupled to the logic circuit or processor.
202 9,977,495 Immersive displays 2015-04-02 2018-05-22 A method of providing information for display on a display of an immersive display. The method includes obtaining information utilized for displaying a first image in front of a first eye and a second image in front of a second eye of a user of the immersive display, excluding part of the information to yield adjusted information to occlude or replace first information from a first area of the first image and second information from a second area of a second image when displayed on the immersive display, and providing the adjusted information for displaying the first image absent the first area and the second image absent the second area on the immersive display..
203 9,996,973 Augmented reality objects based on biometric feedback 2014-07-25 2018-06-12 Technologies are generally described for refining virtual objects output within an augmented reality environment. In one example, a method includes determining, by a system comprising a processor, first response data representative of a first response to a first set of object data associated with a simulation of an interaction between a first virtual object and a second virtual object. The method also includes modifying at least one object of the first set of object data to create a second set of object data associated with another simulation of the interaction between the first virtual object and the second virtual object.
204 10,004,431 Detecting medical status and cognitive impairment utilizing ambient data 2015-03-13 2018-06-26 Methods and systems for determining the likelihood that a person is impaired, generally comprising gathering ambient data from sensors operably coupled to a primary measuring device (PMD), analyzing and/or identifying the ambient data, querying at least one database to identify baseline data regarding the person, and comparing the ambient data to the baseline data to determine the likelihood that the person is impaired. The methods and systems advantageously detect medical and/or cognitive impairment without the need for specialized devices, examination by specialists, consent of the person being evaluated, and compliance with recommendations to be examined, and may be applied to estimating the level of impairment of a person due to alcohol, drugs, exposure to toxic chemicals, changes to mental status, insufficient sleep, medical problems, changes to blood sugar levels, divided attention, vision changes, hearing changes, use of a mobile device while walking or operating a vehicle, and other factors..
205 10,009,356 Redirection method for electronic content 2016-12-29 2018-06-26 Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure.
206 10,055,497 Method and apparatus for photograph finding 2017-04-07 2018-08-21 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
207 10,104,058 Content restriction compliance using reverse DNS lookup 2017-07-10 2018-10-16 A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided..
208 10,148,905 Digital medium with hidden content 2006-10-19 2018-12-04 A digital medium such as a DVD disk, may contain hidden content and apparent content. When loaded, a main or title menu may appear to provide an apparent link to apparent content and a non-apparent link to non-apparent content. The non-apparent link may require a user to perform a sequence of non-apparent control actions before providing access to the non-apparent content..
209 10,187,500 Gyroscopic alerting mechanism for portable communications device 2017-01-10 2019-01-22 A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall.
210 10,198,154 Translating user interfaces of applications 2016-05-23 2019-02-05 A user interface translation system can provide functionality of translating at least a portion of a user interface of a primary application. The user interface translation system may, for instance, add an overlay interface over a portion of the primary application. The primary application can conduct all the processing tasks.
211 10,205,876 Apparatus for correcting motion blur 2016-04-25 2019-02-12 A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor.
212 10,223,576 Graphic data alteration to enhance online privacy 2017-07-31 2019-03-05 A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest..
213 10,235,442 Method and apparatus for identifying and characterizing errant electronic files 2016-01-18 2019-03-19 A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory.
214 10,255,666 Digital media enhancement system, method, and apparatus 2018-02-17 2019-04-09 Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image.
215 10,282,958 Sound or radiation triggered locating device with activity sensor 2017-12-22 2019-05-07 A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it.
216 10,284,597 E-mail authentication 2013-01-28 2019-05-07 A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address.
217 10,298,569 CAPTCHA systems and methods 2017-12-22 2019-05-21 Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing.
218 10,298,911 Visualization of spatial and other relationships 2015-02-05 2019-05-21 Technologies are generally described for visualizing spatial relationships and other relationships. In one example, a method includes capturing, by a system comprising a processor, a stereoscopic image based on a view area from a reference point determined by the system. The stereoscopic image comprises objects.
219 10,342,463 Detecting medical status and cognitive impairment utilizing ambient data 2018-06-25 2019-07-09 Devices for determining the likelihood that a user of a primary monitoring device (“PMD”) has developed a medical condition, generally comprising sensors coupled to the PMD, wherein the PMD detects changes to sensor readings over time, and wherein the changes indicate a change in the likelihood that a user of the PMD has developed a medical condition. In some embodiments, motion sensors are operably coupled to the PMD, and the PMD monitors and saves data relating to characteristics of motion detected, which are used to determine whether there has been a change in a likelihood that a user is undergoing a medical event. In further embodiments, the PMD comprises cameras, and the PMD monitors and saves data relating to movement of a user's eyes, which is utilized to determine whether there has been a change to a likelihood that the user is currently undergoing a medical event..
220 10,389,992 Immersive display and method of operating immersive display for real-world object alert 2015-08-04 2019-08-20 An immersive display and a method of operating the immersive display to provide information relating to an object. The method includes receiving information from an input device of the immersive display or coupled to the immersive display, detecting an object based on the information received from the input device, and displaying a representation of the object on images displayed on a display of the immersive display such that attributes of the representation distinguish the representation from the images displayed on the display, wherein the representation is displayed at a location on the display that corresponds with a location of the object..
221 10,394,363 Device for physical interaction between remotely located users 2016-04-06 2019-08-27 An electronic device for touch translation includes a body and pins extending therefrom and including couplings to facilitate movement of a first portion relative to a second portion. The pins are controllable to move the first portion relative to the second portion and to control force applied by the pins on an external object. Heads are disposed on the pins, which heads are greater in width than the pins and are movable relative to the pins about respective couplings.
222 10,449,442 Entertainment system for performing human intelligence tasks 2018-04-09 2019-10-22 A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources.
223 10,482,658 Visualization and control of remote objects 2015-03-31 2019-11-19 Systems, devices and methods for controlling remote devices by modification of visual data prior to presentation to a person in order to make the person's response effectively the same as if the person were responding to data transmitted, processed and acted on instantaneously are disclosed. The systems, devices and methods advantageously minimize or eliminate the risks caused by a human response to data that has been delayed in transmission, processing and presentation. In an embodiment, a person controlling a remote device using an augmented reality interface is able to control the device based on predicted positions of an object at the time action is taken, thereby advantageously compensating for delays in receiving data, acting on such data and transmitting instructions or a response to the remote device..
224 10,528,129 Immersive displays 2018-01-11 2020-01-07 A method of providing information for display on a display of an immersive display. The method includes obtaining information utilized for displaying a first image in front of a first eye and a second image in front of a second eye of a user of the immersive display, excluding part of the information to yield adjusted information to occlude or replace first information from a first area of the first image and second information from a second area of a second image when displayed on the immersive display, and providing the adjusted information for displaying the first image absent the first area and the second image absent the second area on the immersive display..
225 10,594,846 Gyroscopic alerting mechanism for portable communications device 2019-01-18 2020-03-17 A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall.
226 10,701,077 System and methods of virtual world interaction 2018-03-23 2020-06-30 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 30 environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
227 10,729,877 Treatment of phantom limb syndrome and other sequelae of physical injury 2018-01-12 2020-08-04 Methods, systems and devices that provide a therapeutic solution to alleviate the pain and discomfort of phantom limb syndrome are disclosed. The methods and systems of the present invention generally comprise capturing data from recording devices operably coupled to a processor and/or computing device, the recording devices configured to capture data associated with intact portions of a missing limb, one or more intact limbs and/or portions of the environment surrounding the missing limb, identifying the data captured, generating a three-dimensional virtual image of the missing limb and the surrounding environment from the data captured, and displaying the three-dimensional virtual image and the portions of the surrounding environment to the amputee such that the missing limb appears intact. The present invention advantageously provides a therapeutic and more immediate solution to alleviate the pain and discomfort from phantom limb syndrome..
228 10,776,430 Method and apparatus for photograph finding 2018-08-20 2020-09-15 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
229 10,825,077 Automatic resupply of consumable commodities 2018-04-27 2020-11-03 Methods and systems for facilitating initiation of resupply orders for consumable commodities include using a stand-alone electronic or audio-generating device incorporated into retail product packaging. The stand-alone device is equipped with a rudimentary processor or logic circuit, a memory, and a wireless transmitter. A simple user interface/activation device such as a push button or membrane switch is coupled to the logic circuit or processor.
230 10,839,500 Digital media enhancement system, method, and apparatus 2019-04-08 2020-11-17 Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image.
231 10,984,594 Creation and use of virtual places 2017-03-13 2021-04-20 An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool..
232 11,052,319 Guest management in an online multi-player virtual reality game 2019-04-29 2021-07-06 A guest management method and system for an online multi-player virtual reality environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment.
233 11,058,327 Detecting medical status and cognitive impairment utilizing ambient data 2019-07-08 2021-07-13 Devices for determining the likelihood that a user of a primary monitoring device (“PMD”) has developed a medical condition, generally comprising sensors coupled to the PMD, wherein the PMD detects changes to sensor readings over time, and wherein the changes indicate a change in the likelihood that a user of the PMD has developed a medical condition. In some embodiments, motion sensors are operably coupled to the PMD, and the PMD monitors and saves data relating to characteristics of motion detected, which are used to determine whether there has been a change in a likelihood that a user is undergoing a medical event. In further embodiments, the PMD comprises cameras, and the PMD monitors and saves data relating to movement of a user's eyes, which is utilized to determine whether there has been a change to a likelihood that the user is currently undergoing a medical event..
234 11,061,971 Method and apparatus for photograph finding 2020-09-14 2021-07-13 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
235 11,080,513 Video and still image data alteration to enhance privacy 2019-03-04 2021-08-03 A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest..
236 11,130,049 Entertainment system for performing human intelligence tasks 2019-10-21 2021-09-28 A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources.
237 11,185,785 Single user multiple presence in multi-user game 2019-10-30 2021-11-30 A method for providing a single user multiple presence implementation may include providing access for a user identified by a user account to a virtual environment hosted by a computer. The method may further include generating multiple avatars for the user account to concurrently coexist and be operative within the virtual environment. The method may further include controlling the multiple avatars at least partly in response to input from the user.
238 11,351,315 Vaporizer improvements 2017-08-10 2022-06-07 Systems, methods and apparatuses for vaporizing all or substantially all plant matter, liquid and/or other material to be vaporized are disclosed. Embodiments of the invention comprise a vaporization chamber sealed except for at least two conduits, heating element, a first conduit coupled to a source of fully or almost fully non-oxygenated gas, a heating element capable of heating the vaporization chamber to a temperature above a combustion temperature, a second conduit configured to transport vaporization gases and vaporized elements out of the vaporization chamber and at least one valve positioned in the second conduit preventing the flow of atmospheric air into the vaporization chamber. In some instances, the first gas substantially clears the vaporization chamber of atmospheric air prior to reaching combustion temperature.
239 11,439,124 Use of semantic boards and semantic buttons for training and assisting the expression and understanding of language 2021-07-07 2022-09-13 Devices for providing language-like abilities for dogs. Using polygonal layouts, audible, scent, visible and other cues, the devices provide an efficient and novel ability to communicate with dogs in a granular manner. Devices for capturing and releasing scents are provided.
240 11,445,704 Sound button device 2022-02-08 2022-09-20 A sound button devices, systems, and methods for sound buttons capable of emitting sound using less power, greater sound transmissibility, and/or greater resistance to damage and that allow for training both non-humans and humans to communicate more effectively than previously possible In typical embodiments, the sound button may comprise a shell, a switch operably connected to a printed circuit board (“PCB”), a button cap assembly operably coupled to the shell, the button cap assembly comprising a button cap having at least one recess, the at least one recess having a hole; and a speaker facing toward the button cap, where, when a force is applied to the button cap, the button cap and the speaker move together to actuate the switch, thereby causing the speaker to emit a sound..
241 11,455,032 Immersive displays 2020-01-06 2022-09-27 A method of providing information for display on a display of an immersive display. The method includes obtaining information utilized for displaying a first image in front of a first eye and a second image in front of a second eye of a user of the immersive display, excluding part of the information to yield adjusted information to occlude or replace first information from a first area of the first image and second information from a second area of a second image when displayed on the immersive display, and providing the adjusted information for displaying the first image absent the first area and the second image absent the second area on the immersive display..
242 11,467,671 Device for physical interaction between remotely located users 2021-09-15 2022-10-11 An electronic device for touch translation includes a body, a plurality of pins extending from the body, the pins including couplings to facilitate movement of a first portion relative to a second portion of the pins, the pins being controllable to control movement of the first portion relative to the second portion and to control force applied by the pins on an external object. Sensors cooperating with the pins detect forces externally applied to the pins and a communication subsystem is utilized to communicate over a network, with a remote electronic device. A controller is coupled to the pins, the sensors, and the communication subsystem to, based on detected forces externally applied to the pins, transmit a signal to the remote electronic device for the control of the remote electronic device, and to, based on signals received from the remote electronic device, actuate ones of the pins to control the movement of the first portion relative to the second portion and to control the force applied by the pins on the external object..
243 11,507,733 System and methods of virtual world interaction 2020-05-24 2022-11-22 Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds..
244 11,600,108 Video and still image data alteration to enhance privacy 2021-08-02 2023-03-07 A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest..
245 11,605,203 Creation and use of virtual places 2021-03-29 2023-03-14 An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool..
246 11,625,441 Method and apparatus for photograph finding 2021-07-09 2023-04-11 Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed.
247 11,638,414 Use of semantic boards and semantic buttons for training and assisting the expression and understanding of language 2022-09-12 2023-05-02 Devices for providing language-like abilities for dogs. Using polygonal layouts, audible, scent, visible and other cues, the devices provide an efficient and novel ability to communicate with dogs in a granular manner. Devices for capturing and releasing scents are provided.
248 11,654,257 Treatment of phantom limb syndrome and other sequelae of physical injury 2020-08-03 2023-05-23 Methods, systems and devices that provide a therapeutic solution to alleviate the pain and discomfort of phantom limb syndrome are disclosed. The methods and systems of the present invention generally comprise capturing data from recording devices operably coupled to a processor and/or computing device, the recording devices configured to capture data associated with intact portions of a missing limb, one or more intact limbs and/or portions of the environment surrounding the missing limb, identifying the data captured, generating a three-dimensional virtual image of the missing limb and the surrounding environment from the data captured, and displaying the three-dimensional virtual image and the portions of the surrounding environment to the amputee such that the missing limb appears intact. The present invention advantageously provides a therapeutic and more immediate solution to alleviate the pain and discomfort from phantom limb syndrome..
249 11,658,894 Forum search with time-dependent activity weighting 2019-11-27 2023-05-23 A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time.
250 11,765,331 Immersive display and method of operating immersive display for real-world object alert 2022-07-13 2023-09-19 An immersive display and a method of operating the immersive display to provide information relating to an object. The method includes receiving information from an input device of the immersive display or coupled to the immersive display, detecting an object based on the information received from the input device, and displaying a representation of the object on images displayed on a display of the immersive display such that attributes of the representation distinguish the representation from the images displayed on the display, wherein the representation is displayed at a location on the display that corresponds with a location of the object..
251 11,822,726 Device for physical interaction between remotely located users 2022-10-10 2023-11-21 An electronic device for touch translation includes a body, a plurality of pins extending from the body, the pins including couplings to facilitate movement of a first portion relative to a second portion of the pins, the pins being controllable to control movement of the first portion relative to the second portion and to control force applied by the pins on an external object. Sensors cooperating with the pins detect forces externally applied to the pins and a communication subsystem is utilized to communicate over a network, with a remote electronic device. A controller is coupled to the pins, the sensors, and the communication subsystem to, based on detected forces externally applied to the pins, transmit a signal to the remote electronic device for the control of the remote electronic device, and to, based on signals received from the remote electronic device, actuate ones of the pins to control the movement of the first portion relative to the second portion and to control the force applied by the pins on the external object..
252 11,931,655 Single user multiple presence in multi-user game 2021-10-29 2024-03-19 A method for providing a single user multiple presence implementation may include providing access for a user identified by a user account to a virtual environment hosted by a computer. The method may further include generating multiple avatars for the user account to concurrently coexist and be operative within the virtual environment. The method may further include controlling the multiple avatars at least partly in response to input from the user.
253 12,135,839 Device for physical interaction between remotely located users 2023-10-16 2024-11-05 An electronic device for touch translation includes a body and pins extending therefrom and including couplings to facilitate movement of a first portion relative to a second portion. The pins are controllable to more the first portion relative to the second portion and to control force applied by the pins on an external object. Heads are disposed on the pins, which heads are greater in width than the pins and are moveable relative to the pins about respective couplings. Sensors cooperating with the pins detect forces applied to the pins and a communication subsystem communicates over a network, with a remote electronic device. A controller based on detected forces transmits signals to the remote electronic device to control the remote electronic device, and actuates pins to control the relative movement of the portions based on signals received from the remote electronic device.
254 12,208,324 Multi-Instance, Multi-User Virtual Reality Spaces 2021-06-04 2025-01-28 A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. A common space is modeled in the computer memory configured in relation to the plurality of parallel instances so that an object located inside the common space is visible from viewpoints located inside each of the plurality of parallel instances. Remote clients may output an animated display of a corresponding one of the parallel dimensions and avatars therein.