1 |
6,756,879 |
Method and apparatus for securing delivery of goods
|
2001-07-11 |
2004-06-29 |
A method and apparatus for providing security for delivered goods purchased via electronic or telephonic commerce is provided in the form of a digital lock box, and method of operating the lock box in cooperation with senders of goods. This method further comprises generating a owner access code for full access to a secured area, individually dividing this secured area into a plurality of sections after each delivery, generating a delivery access code for access to particular sections of a secured area, forwarding this delivery access code to senders of deliverable goods, and deactivating this delivery access code after the delivery of these goods.. |
2 |
6,763,379 |
System, apparatus and method for presenting and displaying content on a wide area network
|
1999-10-14 |
2004-07-13 |
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. |
3 |
6,826,546 |
Method and system for licensing a copy of a copyright protected work
|
2000-10-26 |
2004-11-30 |
A method and system are provided for facilitating the purchase of a license for a downloaded file of a copyrighted work. In one embodiment, a method for licensing a digital copy of a copyrighted work includes determining an identity of the digital copy by using at least one computer program, calculating a fee for a license for the digital copy by the at least one computer program. The step of calculating includes the step of measuring at least one metric of the digital copy. |
4 |
6,862,610 |
Method and apparatus for verifying the identity of individuals
|
2001-05-08 |
2005-03-01 |
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.. |
5 |
6,895,236 |
Method for verifying geographical location of wide area network users
|
2001-08-23 |
2005-05-17 |
A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recorded, and an access code is generated and recorded. |
6 |
6,922,781 |
Method and apparatus for identifying and characterizing errant electronic files
|
2000-04-29 |
2005-07-26 |
A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. |
7 |
6,978,252 |
Method and system for transacting with network traffic
|
2001-04-18 |
2005-12-20 |
A system and method for using targeted network traffic as payment-in-kind in exchange for rights to anything that may be connected to a network, such as network-connected computer hardware and copyrighted software or content on such hardware, is disclosed. The method may be adapted for use with almost any product or service which may be tracked over a network. The system and method are for use with transactions between a user of a subject product or service and a provider of the subject product or service desiring to receive traffic to a target in exchange for it. |
8 |
7,051,362 |
Method and system for operating a network server to discourage inappropriate use
|
2001-05-16 |
2006-05-23 |
A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server. |
9 |
7,099,956 |
Method and apparatus for conducting domain name service
|
2001-01-31 |
2006-08-29 |
A method for conducting Internet domain name service to users connected to the Internet comprises an automated procedure for transferring Internet domain name service from a domain name owner to a domain name manager. This method further comprises Internet sub-domain name services to prospective buyers based on domain names transferred to the domain name manager. Messages requesting domain name service, including requests from domain name owners to sub-license their particular domain name to prospective sub-domain name buyers and from prospective sub-domain name buyers to license available sub-domain names, are received and responded to by an automated domain name management system. |
10 |
7,200,863 |
System and method for serving content over a wide area network
|
2001-05-16 |
2007-04-03 |
A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet.. |
11 |
7,218,914 |
Method for verifying geographical location of wide area network users
|
2005-05-09 |
2007-05-15 |
A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recorded, and an access code is generated and recorded. |
12 |
7,228,327 |
Method and apparatus for delivering content via information retrieval devices
|
2001-05-08 |
2007-06-05 |
A method for anticipating a user's desired information using a PDA device connected to a computer network is provided. This method further comprises maintaining a database of user tendencies within the computer network, receiving sensor data from the user's physical environment via the PDA device, generating query strings using both tendency data and sensor data, retrieving data from external data sources using these generated query strings, organizing the retrieved data into electronic folders, and delivering this organized data to the user via the PDA device. In particular, a data management module anticipates the type of information a user desires by combining real time data taken from a sensor unit within a PDA and data regarding the history of that particular user's tendencies stored within the data management module.. |
13 |
7,370,110 |
Method and system for operating a network server to discourage inappropriate use
|
2001-04-18 |
2008-05-06 |
A method and system for operating a network server to discourage inappropriate use are disclosed. A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises the steps of receiving a request to transfer a file between the memory and one of the plurality of client devices, removing a packet comprising a defined number of information bits from the file, transferring the packet between the memory and the client device per the request, then pausing for a defined delay period, and repeating the removing, transferring, and pausing steps in order until all of the file has been transferred. |
14 |
7,406,708 |
System and method for serving content over a wide area network
|
2007-03-01 |
2008-07-29 |
A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet.. |
15 |
7,412,514 |
Method and apparatus for improving bandwidth efficiency in a computer network
|
2001-08-17 |
2008-08-12 |
A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type. |
16 |
7,454,498 |
System, apparatus and method for presenting and displaying content on a wide area network
|
2004-07-01 |
2008-11-18 |
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. |
17 |
7,460,737 |
Method and apparatus for photograph finding
|
2005-02-10 |
2008-12-02 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
18 |
7,465,229 |
Slot-machine game with adjusting payout table
|
2003-03-26 |
2008-12-16 |
A gaming apparatus, such as a slot machine, that randomly determines a combination of symbols and pays prizes according to a determined payout table, is used to perform a gaming method similar to conventional slot machine play, but that permits greater interaction with the player. The gaming method provides the player with the option of increasing an amount wagered after at least one of the symbols has been determined. The method additionally provides the player with the option to randomly determine a symbol or symbols a second time, or to force a symbol to be the same as a symbol already determined, optionally at additional cost. |
19 |
7,493,660 |
Computer network storage environment hostile to fault-intolerant electronic file types
|
2006-02-17 |
2009-02-17 |
A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server. |
20 |
7,518,485 |
Electronically controlled lockbox
|
2004-06-08 |
2009-04-14 |
A method and apparatus for providing security for delivered goods purchased via electronic or telephonic commerce is provided in the form of a digital lock box, and method of operating the lock box in cooperation with senders of goods. This method further comprises generating a owner access code for full access to a secured area, individually dividing this secured area into a plurality of sections after each delivery, generating a delivery access code for access to particular sections of a secured area, forwarding this delivery access code to senders of deliverable goods, and deactivating this delivery access code after the delivery of these goods.. |
21 |
7,539,736 |
Remote personal criteria verification method
|
2005-01-04 |
2009-05-26 |
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.. |
22 |
7,546,530 |
Method and apparatus for mapping a site on a wide area network
|
2000-04-14 |
2009-06-09 |
A method and system for organizing and displaying information about Internet Web pages creates Web maps. The Web maps display a summary of the information that a Web page provides access to, in a format that facilitates a rapid assessment of what may be accessed through a Web site's home page, or through any Web page on the Web site. Preferably, Web maps are displayed on a Web page, or within a frame of a Web page, by an Internet browser application. |
23 |
7,734,504 |
Method and system for transacting with network traffic
|
2005-09-01 |
2010-06-08 |
A system and method for using targeted network traffic as payment-in-kind in exchange for rights to anything that may be connected to a network, such as network-connected computer hardware and copyrighted software or content on such hardware, is disclosed. The method may be adapted for use with almost any product or service which may be tracked over a network. The system and method are for use with transactions between a user of a subject product or service and a provider of the subject product or service desiring to receive traffic to a target in exchange for it.. |
24 |
7,734,807 |
Method and apparatus for improving bandwidth efficiency in a computer network
|
2008-08-11 |
2010-06-08 |
A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type. |
25 |
7,744,464 |
Method of managing a card game, a computer implementation thereof, and a card game kit
|
2006-09-19 |
2010-06-29 |
A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round. |
26 |
7,752,251 |
Method, apparatus and system for hosting information exchange groups on a wide area network
|
2000-08-21 |
2010-07-06 |
An method and system for hosting information exchange groups on a wide area network is disclosed, using various tools for promoting topical organization and self-evolution of the information exchange groups, and of a system of information exchange groups. These tools include methods for providing user rating of posts within the exchange group, for rating and ranking users of the exchange group, for rating and ranking links to related information pages and especially to related exchange groups operating according to the methods of the invention, and for continuously updating rating and ranking information. Additionally, methods are provided for users to found exchange groups, to filter information in exchange groups according to specified user preferences, and to protect private information from inadvertent disclosure to other users of the exchange group.. |
27 |
7,752,656 |
Controlling access to name service for a domain name system
|
2008-07-24 |
2010-07-06 |
A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet.. |
28 |
7,757,298 |
Method and apparatus for identifying and characterizing errant electronic files
|
2005-06-03 |
2010-07-13 |
A computer system includes a, server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. |
29 |
7,779,280 |
Low power mode for portable computer system
|
2006-09-18 |
2010-08-17 |
A computer system is configured to operate in a normal mode and in a reduced power mode. The normal mode utilizes a primary processor, which operates using a primary operating system. When system power is depleted to a defined level, the primary processor is shut down and certain operations are taken over by a low-power, secondary processor that operates using a secondary operating system.. |
30 |
7,783,753 |
Monitoring application for automatically requesting content
|
2008-11-17 |
2010-08-24 |
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. |
31 |
7,797,408 |
Management of bandwidth allocation in a network server
|
2008-05-02 |
2010-09-14 |
A method and system for operating a network server to discourage inappropriate use are disclosed. A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises the steps of receiving a request to transfer a file between the memory and one of the plurality of client devices, removing a packet comprising a defined number of information bits from the file, transferring the packet between the memory and the client device per the request, then pausing for a defined delay period, and repeating the removing, transferring, and pausing steps in order until all of the file has been transferred. |
32 |
7,801,944 |
Distributed computing using agent embedded in content unrelated to agents processing function
|
2002-05-20 |
2010-09-21 |
A method for operating a host layer of a distributed computing system on a wide area network includes attaching an autonomous agent to a client-requested carrier, such as web content. The method includes the steps of receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client via the wide area network. The agent has program instructions configured to execute autonomously on the client node to perform a processing function. |
33 |
7,803,042 |
Card game with common card removal
|
2007-01-17 |
2010-09-28 |
A method of managing a card game, a computer implementation thereof, and a card game kit, according to which a hand of cards is dealt to each of a plurality of players. Each hand includes one or more cards, and each card bears a designated value and suit. A plurality of common cards are dealt into a common card zone, and all players know the designated value and suit of each common card. |
34 |
7,804,744 |
Optically-readable disk with copy protection device
|
2008-07-03 |
2010-09-28 |
An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. |
35 |
7,813,917 |
Candidate matching using algorithmic analysis of candidate-authored narrative information
|
2005-06-22 |
2010-10-12 |
A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. |
36 |
7,835,294 |
Message filtering method
|
2004-09-03 |
2010-11-16 |
A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering.. |
37 |
7,844,141 |
Method and apparatus for photograph finding
|
2008-12-01 |
2010-11-30 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
38 |
7,874,521 |
Method and system for aviation navigation
|
2006-10-17 |
2011-01-25 |
A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft.. |
39 |
7,914,144 |
Eyewear with pinhole aperture and lens
|
2007-05-02 |
2011-03-29 |
Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens. |
40 |
7,916,581 |
Optically-readable disk with copy protection device
|
2010-09-27 |
2011-03-29 |
An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. |
41 |
7,916,619 |
Optically-readable disk with copy protection device
|
2007-05-03 |
2011-03-29 |
An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or for when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded.. |
42 |
7,929,810 |
Method and apparatus for photograph finding
|
2010-09-02 |
2011-04-19 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
43 |
7,937,320 |
Managed purchasing account for defined commodities
|
2006-11-14 |
2011-05-03 |
A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services. |
44 |
7,945,052 |
Method of distributing a decryption key in fixed-content data
|
2008-03-31 |
2011-05-17 |
Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal.. |
45 |
7,958,303 |
Flexible data storage system
|
2008-04-28 |
2011-06-07 |
Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space. |
46 |
7,966,416 |
Management of bandwidth allocation in a network server
|
2010-09-13 |
2011-06-21 |
A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period.. |
47 |
7,970,378 |
Verifying geographical location of wide area network users
|
2007-04-19 |
2011-06-28 |
A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. |
48 |
7,980,934 |
Gaming method
|
2006-09-08 |
2011-07-19 |
A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amounts or betting odds, some combination of the foregoing, or any other useful remuneration. The house retains its edge via the premium. |
49 |
7,984,987 |
Eyewear with pinhole aperture and lens
|
2011-03-28 |
2011-07-26 |
Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens. |
50 |
7,996,491 |
Personal criteria verification using fractional information
|
2009-05-22 |
2011-08-09 |
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.. |
51 |
8,014,261 |
Optically-readable disk with copy protection device
|
2011-03-28 |
2011-09-06 |
An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or for when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded.. |
52 |
8,015,285 |
Monitoring application for automatically requesting content
|
2010-08-18 |
2011-09-06 |
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. |
53 |
8,015,317 |
Method, system and computer-readable medium for conducting domain name service
|
2006-08-28 |
2011-09-06 |
A method for conducting Internet domain name service to users connected to the Internet comprises an automated procedure for transferring Internet domain name service from a domain name owner to a domain name manager. This method further comprises Internet sub-domain name services to prospective buyers based on domain names transferred to the domain name manager. Messages requesting domain name service, including requests from domain name owners to sub-license their particular domain name to prospective sub-domain name buyers and from prospective sub-domain name buyers to license available sub-domain names, are received and responded to by an automated domain name management system. |
54 |
8,087,616 |
Method and system for aviation navigation
|
2011-01-25 |
2012-01-03 |
A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft.. |
55 |
8,117,258 |
Distributed computing by carrier-hosted agent
|
2010-09-21 |
2012-02-14 |
A method for operating a host layer of a distributed computing system on a wide area network includes attaching an autonomous agent to a client-requested carrier, such as web content. The method includes the steps of receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client via the wide area network. The agent has program instructions configured to execute autonomously on the client node to perform a processing function. |
56 |
8,126,971 |
E-mail authentication
|
2007-05-07 |
2012-02-28 |
A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. |
57 |
8,150,680 |
Method and system for candidate matching
|
2010-10-11 |
2012-04-03 |
A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. |
58 |
8,167,724 |
Guest management in an online multi-player virtual reality game
|
2008-12-10 |
2012-05-01 |
A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment. |
59 |
8,171,113 |
Management of bandwidth allocation in a network server
|
2011-06-15 |
2012-05-01 |
A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period.. |
60 |
8,194,564 |
Message filtering method
|
2010-11-15 |
2012-06-05 |
A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering.. |
61 |
8,206,222 |
Entertainment system for performing human intelligence tasks
|
2009-01-29 |
2012-06-26 |
A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources. |
62 |
8,212,661 |
Alert signal control using receiver velocity
|
2009-05-22 |
2012-07-03 |
An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system. |
63 |
8,223,598 |
Optically-readable disk with copy protection device
|
2011-03-28 |
2012-07-17 |
An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. |
64 |
8,259,117 |
Avatar eye control in a multi-user animation environment
|
2008-06-18 |
2012-09-04 |
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. |
65 |
8,261,366 |
Method and apparatus for identifying and characterizing errant electronic files
|
2010-07-12 |
2012-09-04 |
A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. |
66 |
8,276,071 |
Multi-instance, multi-user animation platforms
|
2009-09-04 |
2012-09-25 |
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. |
67 |
8,290,948 |
Method and apparatus for content filtering
|
2004-06-30 |
2012-10-16 |
A method for filtering content makes use of local filtering agents for end users, and a portal to a network of human reviewing resources. Local filtering agents request content classification for unclassified content. The portal routes requests from local agents to available human reviewing resources. |
68 |
8,292,234 |
Method and system for aviation navigation
|
2011-12-27 |
2012-10-23 |
A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable âradar or radio coverageâarea. The system uses a database of âradar or radio coverageâareas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a âradar or radio coverageâarea in the database meeting the âradar or radio coverageârequirements for the aircraft.. |
69 |
8,311,940 |
Conditional balance management for non-issuer debit instruments
|
2011-03-29 |
2012-11-13 |
A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., âvirtual currencyâ) for use in an online computer game or the like, after the trigger date.. |
70 |
8,315,483 |
Method and apparatus for photograph finding
|
2012-02-28 |
2012-11-20 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
71 |
8,316,452 |
Computer network storage environment with file tracking
|
2009-02-12 |
2012-11-20 |
A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server. |
72 |
8,321,202 |
Method and system for candidate matching
|
2012-03-26 |
2012-11-27 |
A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. |
73 |
8,321,531 |
Personal criteria verification using fractional information
|
2011-07-22 |
2012-11-27 |
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.. |
74 |
8,353,768 |
Card game apparatus and method with dealt card disclosure feature
|
2010-06-24 |
2013-01-15 |
A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round. |
75 |
8,363,568 |
Message filtering method
|
2012-05-24 |
2013-01-29 |
A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering.. |
76 |
8,364,773 |
E-mail authentication
|
2012-02-27 |
2013-01-29 |
A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. |
77 |
8,385,691 |
Method and apparatus for photograph finding
|
2011-04-19 |
2013-02-26 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
78 |
8,386,476 |
Computer-implemented search using result matching
|
2009-05-20 |
2013-02-26 |
A computer search system compares search results received for searches falling within a defined parameter envelope used for grouping search requests. The parameter envelope may be defined by various parameters, for example, time of search, origin or search request, language, or other non-keyword data associated with each search request, excluding keywords used to define the search. Each new search result (comprising a list of search hits) for incoming search requests is compared to stored search results for search requests within the same parameter envelope. |
79 |
8,390,630 |
Avatar eye control in a multi-user animation environment
|
2012-09-04 |
2013-03-05 |
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. |
80 |
8,431,263 |
Automated composite battery
|
2007-05-02 |
2013-04-30 |
A composite battery capable of adjusting its own power output in response to predetermined signals or lack of predetermined signals is provided. The composite battery has a set of terminals, a battery, a sensing device and a switch, all housed within a casing, which can be in the shape of a conventional battery. The sensor captures signals which upon reaching a certain threshold cause the switch to engage or disengage to selectively provide a load current to an electronic device. |
81 |
8,441,897 |
Optically-readable article with electro-optical access control device
|
2012-07-13 |
2013-05-14 |
An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. |
82 |
8,443,106 |
Content restriction compliance using reverse DNS lookup
|
2008-12-19 |
2013-05-14 |
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided.. |
83 |
8,446,270 |
Alert signal control using receiver velocity
|
2012-07-02 |
2013-05-21 |
An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system. |
84 |
8,453,219 |
Systems and methods of assessing permissions in virtual worlds
|
2012-08-20 |
2013-05-28 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
85 |
8,463,704 |
Conditional balance management for non-issuer debit instruments
|
2012-11-12 |
2013-06-11 |
A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., âvirtual currencyâ) for use in an online computer game or the like, after the trigger date.. |
86 |
8,473,742 |
Method of distributing a decryption key in fixed-content data
|
2011-05-16 |
2013-06-25 |
Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal.. |
87 |
8,490,004 |
Evaluation of remote user attributes in a social networking environment
|
2009-04-17 |
2013-07-16 |
A computer host is configured to perform a method for defining user attributes with associated verification values for social networking accounts. The attributes concern the user's personal characteristics or attributes. The host publishes the attribute information to other clients together with interactive objects for soliciting corroboration of the attribute information. |
88 |
8,493,386 |
Systems and methods of managed script execution
|
2012-08-20 |
2013-07-23 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
89 |
8,508,356 |
Sound or radiation triggered locating device with activity sensor
|
2010-02-18 |
2013-08-13 |
A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it. |
90 |
8,522,330 |
Systems and methods of managing virtual world avatars
|
2012-08-20 |
2013-08-27 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
91 |
8,533,283 |
Redirection method for electronic content
|
2007-05-03 |
2013-09-10 |
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. |
92 |
8,545,301 |
Remote card game with duplicate hands
|
2007-01-17 |
2013-10-01 |
Duplicate hands are dealt in a remote game of poker or other card game of chance. Simulated cards or game pieces are dealt to players with the order of suits changed for each player. A map is maintained in a computer memory between a reference set of indices corresponding to card suits, and differently-ordered sets of playing suits for dealing in the game. |
93 |
8,558,677 |
Tactile alerting mechanism for portable communications device
|
2010-03-26 |
2013-10-15 |
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing. |
94 |
8,572,158 |
Distributed computing by carrier-hosted agent
|
2012-01-03 |
2013-10-29 |
A method for operating a host layer of a distributed computing system on a wide area network includes attaching an agent to a client-requested carrier. The method includes receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client. The agent has program instructions configured to execute on the client node to perform a processing function that operates on raw data to produce process data. |
95 |
8,572,207 |
Dynamic serving of multidimensional content
|
2012-08-20 |
2013-10-29 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
96 |
8,577,698 |
Retail price hedging
|
2006-10-25 |
2013-11-05 |
Retail consumers may hedge the price of volatile commodities such as gasoline via the advance purchase of a policy, which may be represented by a hedge card. The card may be priced to cover uncertainty in the price of the commodity over a defined future period, plus a small profit for the card issuer, optionally plus a pre-paid residual cash value. The card may permit the purchase of a defined amount of the commodity at a price not to exceed a defined ceiling over the defined future period. |
97 |
8,577,994 |
Management of bandwidth allocation in a network server
|
2012-04-26 |
2013-11-05 |
A server is configured to transfer information to a plurality of client devices in accordance with bandwidth-limiting and bandwidth-adjustment techniques. Bandwidth may be reduced based on an amount of data previously transferred to a client device (e.g., within a prior time period). Bandwidth may also be reduced based on variable input parameters such as file size, data type, server load, network response time, and number of transfer requests from a client device within a prior period of time. |
98 |
8,582,829 |
Online identity verification
|
2011-11-03 |
2013-11-12 |
A method for verifying an identity attribute of a remote user includes providing pose instructions to a remote client from a host during an authentication session. The pose instructions may reference a specific physical token associated with the user, for example a government ID card, credit card, household object or printed or displayed image provided from an authentication host. The host receives an image from the client and may analyze the image to determine if the pose instructions were followed and if the physical token appears in the image. |
99 |
8,589,792 |
Multi-instance, multi-user virtual reality spaces
|
2012-09-24 |
2013-11-19 |
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. |
100 |
8,591,326 |
Guest management in an online multi-player virtual reality game
|
2012-04-30 |
2013-11-26 |
A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment. |
101 |
8,593,565 |
Simulated large aperture lens
|
2012-03-26 |
2013-11-26 |
A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor. |
102 |
8,594,084 |
Network router security method
|
2006-09-11 |
2013-11-26 |
A local network is secured using a router or hub that includes a security switch. During or immediately after initial network configuration, the router or hub records MAC addresses of connected network devices. After initial configuration is completed, the switch is activated. |
103 |
8,608,538 |
Gaming method
|
2011-07-18 |
2013-12-17 |
A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amount or betting odds, some combinations of the foregoing, or any other useful remuneration. The house retains its edge via the premium. |
104 |
8,612,543 |
Personal criteria verification using fractional information
|
2012-11-20 |
2013-12-17 |
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.. |
105 |
8,621,368 |
Systems and methods of virtual world interaction
|
2012-08-20 |
2013-12-31 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
106 |
8,624,718 |
Alert signal control using receiver velocity
|
2013-05-20 |
2014-01-07 |
An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system. |
107 |
8,636,585 |
Method and apparatus for slot-machine gaming
|
2008-12-15 |
2014-01-28 |
A gaming apparatus, such as a slot machine, that randomly determines a combination of symbols and pays prizes according to a determined payout table, is used to perform a gaming method similar to conventional slot machine play, but that permits greater interaction with the player. The gaming method provides the player with the option of increasing an amount wagered after at least one of the symbols has been determined. The method additionally provides the player with the option to randomly determine a symbol or symbols a second time, or to force a symbol to be the same as a symbol already determined, optionally at additional cost. |
108 |
8,667,130 |
Monitoring application for automatically requesting content
|
2011-09-06 |
2014-03-04 |
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. |
109 |
8,671,142 |
Systems and methods of virtual worlds access
|
2012-08-20 |
2014-03-11 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
110 |
8,671,216 |
Method and apparatus for improving bandwidth efficiency in a computer network
|
2010-06-07 |
2014-03-11 |
A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type. |
111 |
8,672,477 |
Eyewear with pinhole aperture and lens
|
2011-07-25 |
2014-03-18 |
Eyewear is equipped with at least one lens and at least one pinhole aperture. Lenses and apertures may be used in place of or in combination with one another, and may be disposed in or on full frame, half frame, wire frame or rimless eyeglasses. The lens may be a corrective lens. |
112 |
8,676,050 |
Autofocus calibration for long lenses
|
2011-12-29 |
2014-03-18 |
A method for calibrating a focus point for a camera lens may include capturing a reflection of a focus point measuring device that is affixed to the camera. The method may include evaluating a captured image of the reflection to measure a calibration amount for a focus point, and adjusting a focus point of a lens of the camera by the calibration amount. The focus point measuring device may include a substantially planar target surface defining a plane, and a ruled target surface inclined at substantially 45° to the substantially planar target and extending through the plane thereof, marked to indicate respective distances in front of and behind the plane. |
113 |
8,676,158 |
Verifying geographical location of wide area network users
|
2011-06-27 |
2014-03-18 |
A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. |
114 |
8,694,493 |
Computer-implemented search using result matching
|
2013-02-25 |
2014-04-08 |
A computer search system compares search results received for searches falling within a defined parameter envelope used for grouping search requests. The parameter envelope may be defined by various parameters, for example, time of search, origin or search request, language, or other non-keyword data associated with each search request, excluding keywords used to define the search. Each new search result (comprising a list of search hits) for incoming search requests is compared to stored search results for search requests within the same parameter envelope. |
115 |
8,694,553 |
Creation and use of virtual places
|
2011-06-07 |
2014-04-08 |
An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool.. |
116 |
8,704,829 |
Avatar eye control in a multi-user animation environment
|
2013-03-04 |
2014-04-22 |
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. |
117 |
8,717,447 |
Remote telepresence gaze direction
|
2011-08-22 |
2014-05-06 |
A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device. |
118 |
8,726,355 |
Identity verification via selection of sensible output from recorded digital data
|
2009-06-24 |
2014-05-13 |
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. |
119 |
8,744,119 |
Graphic data alteration to enhance online privacy
|
2012-01-12 |
2014-06-03 |
A computer alters at least one recognizable metric or text in a digitally-encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.. |
120 |
8,775,396 |
Method and system for searching a wide area network
|
2011-06-06 |
2014-07-08 |
A method and system for searching a wide area network that enables users to find the information they seek more quickly and more easily than prior art search engines are disclosed. Aspects of this disclosure include a process for making use of a user's prior search queries for query definition; a process for similarly making use of prior search queries by other users; a process for expanding and clarifying the meaning of queries; a process for including paid and other preferred results in an overall query result; and a process for using user evaluation data from previous search query results to identify results that should be included or removed from a current result.. |
121 |
8,781,987 |
Decision making using algorithmic or programmatic analysis
|
2013-12-27 |
2014-07-15 |
A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems. |
122 |
8,798,596 |
Global contact synchronization
|
2013-12-27 |
2014-08-05 |
A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request.. |
123 |
8,812,954 |
Multi-instance, multi-user virtual reality spaces
|
2013-11-18 |
2014-08-19 |
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. |
124 |
8,819,365 |
Flexible data storage system
|
2011-06-06 |
2014-08-26 |
Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space. |
125 |
8,825,799 |
Redirection method for electronic content
|
2013-09-09 |
2014-09-02 |
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. |
126 |
8,832,849 |
Computer data object modification based on data types in a networked environment
|
2012-11-19 |
2014-09-09 |
A network server may discourage inappropriate use. Files may be altered in such a way as to not noticeably affect acceptable, desired file types, but to substantially corrupt undesirable file types. Every file copied to or from a memory of a server may be affected, or the method may be applied only to selected files or types of files. |
127 |
8,861,421 |
Mobile status update display
|
2011-11-29 |
2014-10-14 |
A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other users of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body. |
128 |
8,867,798 |
Method and apparatus for photograph finding
|
2013-02-25 |
2014-10-21 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
129 |
8,902,354 |
Simulated large aperture lens
|
2013-11-25 |
2014-12-02 |
A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor. |
130 |
8,924,262 |
Automatic resupply of consumable commodities
|
2011-12-09 |
2014-12-30 |
Methods and systems for facilitating initiation of resupply orders for consumable commodities include using a stand-alone electronic or audio-generating device incorporated into retail product packaging. The stand-alone device is equipped with a rudimentary processor or logic circuit, a memory, and a wireless transmitter. A simple user interface/activation device such as a push button or membrane switch is coupled to the logic circuit or processor. |
131 |
8,947,427 |
Systems and methods of object processing in virtual worlds
|
2012-08-20 |
2015-02-03 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
132 |
8,949,964 |
Security key entry using ancillary input device
|
2011-08-25 |
2015-02-03 |
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal. |
133 |
8,952,797 |
Tactile alerting mechanism for portable communications device
|
2013-10-14 |
2015-02-10 |
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing. |
134 |
8,978,121 |
Cognitive-based CAPTCHA system
|
2014-01-03 |
2015-03-10 |
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. |
135 |
8,984,102 |
Registration and use of patterns defined by expressions as domain names
|
2010-02-22 |
2015-03-17 |
A domain name registration service permits registrants to register names that are defined by a pattern-matching expression that may include one or more wildcard values in any portion of the domain or subdomain name. A domain name server utilizes pattern matching with expressions, such as REGEX systems, to parse incoming domain name requests to identify text strings that conform to the domain defined by the registered regular expression. Other components assign economic value to defined patterns and prevent conflicts between registered patterns and domain names.. |
136 |
9,002,820 |
Forum search with time-dependent activity weighting
|
2009-06-05 |
2015-04-07 |
A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time. |
137 |
9,007,362 |
Adaptable generation of virtual environment frames
|
2012-01-17 |
2015-04-14 |
A virtual environment in generated in a server where at least one object representative of an entity interacts with other objects or attributes of the environment. A desired frame rate for rendering the virtual environment is identified, and compared to a maximum achievable frame rate at a client device. If the maximum achievable frame rate is slower than the desired frame rate, the number of objects displayed within the virtual environment is modified, in accordance with one or more rule sets, until the maximum achievable frame rate is at or near the desired frame rate. |
138 |
9,014,500 |
Digital media enhancement system, method, and apparatus
|
2013-01-08 |
2015-04-21 |
Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image. |
139 |
9,046,994 |
Systems and methods of assessing permissions in virtual worlds
|
2013-05-24 |
2015-06-02 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
140 |
9,049,234 |
HTTP trigger for out-of-protocol action
|
2010-02-03 |
2015-06-02 |
A hypertext transfer protocol (HTTP) request is used to actuate a secondary communications protocol (e.g., Short Message Service). A server receiving the request may be configured to take actions not specified by the URL associated with the request in response to the characters encoded in the request, such as accessing a secondary communications protocol. The server parses the request to identify action codes and/or content in the request itself, and takes action based on the code or content value. |
141 |
9,050,522 |
Card game with dealt card disclosure feature and kit
|
2013-01-14 |
2015-06-09 |
A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round. |
142 |
9,077,679 |
Mobile status update display
|
2014-10-13 |
2015-07-07 |
A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body. |
143 |
9,081,972 |
Method of distributing a decryption key in fixed-content data
|
2013-06-24 |
2015-07-14 |
Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal.. |
144 |
9,087,399 |
Systems and methods of managing virtual world avatars
|
2013-08-26 |
2015-07-21 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
145 |
9,123,157 |
Multi-instance, multi-user virtual reality spaces
|
2014-08-15 |
2015-09-01 |
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. |
146 |
9,135,493 |
Graphic data alteration to enhance online privacy
|
2014-06-02 |
2015-09-15 |
A computer alters at least one recognizable metric or text in a digitally-encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.. |
147 |
9,137,257 |
Anti-phishing filter
|
2007-05-04 |
2015-09-15 |
A method operates to detect personal identifying or account information exchanged in a real-time electronic communication occurring between computer network users, such as electronic chat. A detected personal identifier may be recognized as an attempt on the part of one user to engage in a phishing attack upon another user or to otherwise steal the other user's sensitive personal information. Upon recognizing the communication as an unwarranted attempt to collect such information, the electronic communication may be monitored, and communication of the personal information may be prevented.. |
148 |
9,143,659 |
Clothing and body covering pattern creation machine and method
|
2013-01-08 |
2015-09-22 |
Body art, such as tattoos, are integrated or extended onto clothing. Clothing patterns may be integrated or extended onto body art, such as temporary tattoos. In one embodiment, a computer analyzes an image of a body with a tattoo and generates an image suitable for application to clothing. |
149 |
9,166,974 |
Captcha systems and methods
|
2015-03-06 |
2015-10-20 |
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. |
150 |
9,167,061 |
Gyroscopic alerting mechanism for portable communications device
|
2013-03-29 |
2015-10-20 |
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall. |
151 |
9,192,860 |
Single user multiple presence in multi-user game
|
2011-11-08 |
2015-11-24 |
A method for providing a single user multiple presence implementation may include providing access for a user identified by a user account to a virtual environment hosted by a computer. The method may further include generating multiple avatars for the user account to concurrently coexist and be operative within the virtual environment. The method may further include controlling the multiple avatars at least partly in response to input from the user. |
152 |
9,202,223 |
Method and system for transacting with network traffic
|
2010-05-27 |
2015-12-01 |
A system and method for using targeted network traffic as payment-in-kind in exchange for rights to anything that may be connected to a network, such as network-connected computer hardware and copyrighted software or content on such hardware, is disclosed. The method may be adapted for use with almost any product or service which may be tracked over a network. The system and method are for use with transactions between a user of a subject product or service and a provider of the subject product or service desiring to receive traffic to a target in exchange for it.. |
153 |
9,208,598 |
Avatar eye control in a multi-user animation environment
|
2014-04-21 |
2015-12-08 |
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. |
154 |
9,239,924 |
Identifying and characterizing electronic files using a two-stage calculation
|
2012-09-03 |
2016-01-19 |
A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. |
155 |
9,286,507 |
Online identity verification
|
2013-11-11 |
2016-03-15 |
A method for verifying an identity attribute of a remote user includes providing pose instructions to a remote client from a host during an authentication session. The pose instructions may reference a specific physical token associated with the user, for example a government ID card, credit card, household object or printed or displayed image provided from an authentication host. The host receives an image from the client and may analyze the image to determine if the pose instructions were followed and if the physical token appears in the image. |
156 |
9,288,196 |
Identity verification via selection of sensible output from recorded digital data
|
2014-05-12 |
2016-03-15 |
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. |
157 |
9,311,736 |
Clothing and body covering pattern creation machine and method
|
2015-09-21 |
2016-04-12 |
Body art, such as tattoos, are integrated or extended onto clothing. Clothing patterns may be integrated or extended onto body art, such as temporary tattoos. In one embodiment, a computer analyzes an image of a body with a tattoo and generates an image suitable for application to clothing. |
158 |
9,313,626 |
Alert signal control using message priority
|
2014-01-06 |
2016-04-12 |
An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDAs. The receiving devices include a function for determining a message priority, prior to providing any audible alert signal indicating that the message is received. If an incoming message has a priority that is lower than a necessary threshold, the function prevents the audible alert signal from being generated at the time the message is received.. |
159 |
9,325,891 |
Simulated large aperture lens
|
2014-12-01 |
2016-04-26 |
A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor. |
160 |
9,338,590 |
Global contact synchronization
|
2014-07-31 |
2016-05-10 |
A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request.. |
161 |
9,348,666 |
Translating user interfaces of applications
|
2013-06-17 |
2016-05-24 |
A user interface translation system can provide functionality of translating at least a portion of a user interface of a primary application. The user interface translation system may, for instance, add an overlay interface over a portion of the primary application. The primary application can conduct all the processing tasks. |
162 |
9,374,352 |
Content restriction compliance using reverse DNS lookup
|
2013-05-13 |
2016-06-21 |
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided.. |
163 |
9,384,640 |
Tactile alerting mechanism for portable communications device
|
2015-02-06 |
2016-07-05 |
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing. |
164 |
9,386,022 |
Systems and methods of virtual worlds access
|
2014-03-10 |
2016-07-05 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
165 |
9,397,977 |
Registration and use of patterns defined by expressions as domain names
|
2015-03-16 |
2016-07-19 |
A domain name registration service permits registrants to register names that are defined by a regular expression that may include one or more wildcard values in any portion of the domain or subdomain name. A domain name server utilizes pattern matching with regular expressions, such as REGEX systems, to parse incoming domain name requests to identify text strings that conform to the domain defined by the registered regular expression. Other components assign economic value to defined patterns and prevent conflicts between registered patterns and domain names.. |
166 |
9,405,627 |
Flexible data storage system
|
2014-08-21 |
2016-08-02 |
Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space. |
167 |
9,405,831 |
Avoiding masked web page content indexing errors for search engines
|
2009-04-16 |
2016-08-02 |
Multiple non-host client sites provide cached user copies of web pages and/or web content, or summaries thereof, to a server. Obtaining data from non-host sources for indexing purposes avoids masked web page content indexing errors for search engines. The server aggregates, summarizes and indexes the web pages and/or web content in an index of cached content, in conjunction with updating, generating and storing a search index using an indexing agent such as a web crawler or spider. |
168 |
9,417,428 |
Autofocus calibration for long lenses
|
2014-03-17 |
2016-08-16 |
A method for calibrating a focus point for a camera lens may include capturing a reflection of a focus point measuring device that is affixed to the camera. The method may include evaluating a captured image of the reflection to measure a calibration amount for a focus point, and adjusting a focus point of a lens of the camera by the calibration amount. The focus point measuring device may include a substantially planar target surface defining a plane, and a ruled target surface inclined at substantially 45° to the substantially planar target and extending through the plane thereof, marked to indicate respective distances in front of and behind the plane. |
169 |
9,418,462 |
Digital media enhancement system, method, and apparatus
|
2015-04-20 |
2016-08-16 |
Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image. |
170 |
9,448,886 |
Flexible data storage system
|
2015-09-25 |
2016-09-20 |
Methods and systems for managing and locating available storage space in a system comprising data files stored in a plurality of storage devices and configured in accordance with various data storage schemes (mirroring, striping and parity-striping). A mapping table associated with each of the plurality of storage devices is used to determine the available locations and amount of available space in the storage devices. The data storage schemes for one or more of the stored data files are changed to a basic storage mode when the size of a new data file configured in accordance with an assigned data storage scheme exceeds the amount of available space. |
171 |
9,452,360 |
Multi-instance, multi-user virtual reality spaces
|
2015-08-31 |
2016-09-27 |
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. |
172 |
9,467,436 |
Captcha systems and methods
|
2015-10-19 |
2016-10-11 |
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. |
173 |
9,473,377 |
Forum search with time-dependent activity weighting
|
2015-04-06 |
2016-10-18 |
A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time. |
174 |
9,473,503 |
Systems and methods of object processing in virtual worlds
|
2015-01-30 |
2016-10-18 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
175 |
9,503,545 |
Evaluation of remote user attributes in a social networking environment
|
2013-07-11 |
2016-11-22 |
A computer host is configured to perform a method for defining user attributes with associated verification values for social networking accounts. The attributes concern the user's personal characteristics or attributes. The host publishes the attribute information to other clients together with interactive objects for soliciting corroboration of the attribute information. |
176 |
9,508,180 |
Avatar eye control in a multi-user animation environment
|
2015-12-07 |
2016-11-29 |
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. |
177 |
9,509,699 |
Systems and methods of managed script execution
|
2013-07-22 |
2016-11-29 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
178 |
9,531,724 |
Systems and methods of assessing permissions in virtual worlds
|
2015-06-01 |
2016-12-27 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
179 |
9,537,856 |
Redirection method for electronic content
|
2014-08-29 |
2017-01-03 |
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. |
180 |
9,544,407 |
Gyroscopic alerting mechanism for portable communications device
|
2015-10-19 |
2017-01-10 |
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall. |
181 |
9,560,003 |
Erroneous addressing prevention for electronic messaging
|
2009-02-17 |
2017-01-31 |
An electronic mail client includes features for preventing addressing errors in electronic messaging such as those caused by predictive text features. A messaging client tracks addressing parameters including the length of time since each previous addressee has been messaged, the quantity of times selected addressees have been co-addressees on messages, if any, whether the addressees are designated as sensitive and whether the messages contain sensitive subject matter. If a high risk of addressing error is determined, the client delays transmission of the message to permit the user to review the message recipient addresses and correct any erroneous addressees.. |
182 |
9,579,575 |
Entertainment system for performing human intelligence tasks
|
2012-06-25 |
2017-02-28 |
A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. Human intelligence tasks, such as visual discrimination, are thus enabled in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources present the human intelligence tasks to multiple video game participants as in-game content. |
183 |
9,595,136 |
Creation and use of virtual places
|
2014-04-07 |
2017-03-14 |
An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool.. |
184 |
9,619,486 |
Method and apparatus for photograph finding
|
2014-10-20 |
2017-04-11 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
185 |
9,672,375 |
Security key entry using ancillary input device
|
2015-01-30 |
2017-06-06 |
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal. |
186 |
9,705,838 |
Mobile status update display
|
2015-07-02 |
2017-07-11 |
A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body. |
187 |
9,705,867 |
Content restriction compliance using reverse DNS lookup
|
2015-09-29 |
2017-07-11 |
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided.. |
188 |
9,721,144 |
Graphic data alteration to enhance online privacy
|
2015-09-14 |
2017-08-01 |
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.. |
189 |
9,754,243 |
Providing recommended meeting parameters based on religious or cultural attributes of meeting invitees obtained from social media data
|
2013-09-24 |
2017-09-05 |
A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive non-calendaring related context information, and, based on that context information, to automatically determine one or more parameters of a meeting request.. |
190 |
9,757,281 |
Extra-protection pads and related methods
|
2014-12-19 |
2017-09-12 |
Extra-protection fins and pads, and methods of making and using extra-protection fins and pads are disclosed. The extra-protection fins and pads of the present invention comprise a first triangular face, a second triangular face attached and/or connected to the first triangular face at an angle thereby forming a front apex and a top apex, wherein the fins are configured such that the front apex catches and/or absorbs the menstrual and/or other vaginal fluids first, and the extra-protection fin fills backwards toward the top apex, thus preventing unwanted, embarrassing and annoying leakage onto clothing or bedding during periods of heavy flow and/or when lying down. The extra-protection fin may also comprise a third triangular face attached and/or connected to the first and second triangular faces, wherein a vertex of the third triangular face contacts and/or is connected to the first and second triangular faces at the top apex.. |
191 |
9,786,082 |
Avatar eye control in a multi-user animation environment
|
2016-11-28 |
2017-10-10 |
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. |
192 |
9,843,771 |
Remote telepresence server
|
2014-05-05 |
2017-12-12 |
A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device. |
193 |
9,858,787 |
Sound or radiation triggered locating device with activity sensor
|
2013-08-12 |
2018-01-02 |
A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it. |
194 |
9,860,247 |
CAPTCHA systems and methods
|
2016-10-10 |
2018-01-02 |
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. |
195 |
9,867,961 |
Treatment of phantom limb syndrome and other sequelae of physical injury
|
2015-03-13 |
2018-01-16 |
Methods, systems and devices that provide a therapeutic solution to alleviate the pain and discomfort of phantom limb syndrome are disclosed. The methods and systems of the present invention generally comprise capturing data from recording devices operably coupled to a processor and/or computing device, the recording devices configured to capture data associated with intact portions of a missing limb, one or more intact limbs and/or portions of the environment surrounding the missing limb, identifying the data captured, generating a three-dimensional virtual image of the missing limb and the surrounding environment from the data captured, and displaying the three-dimensional virtual image and the portions of the surrounding environment to the amputee such that the missing limb appears intact. The present invention advantageously provides a therapeutic and more immediate solution to alleviate the pain and discomfort from phantom limb syndrome.. |
196 |
9,889,375 |
Multi-instance, multi-user virtual reality spaces
|
2016-09-26 |
2018-02-13 |
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. |
197 |
9,898,810 |
Digital media enhancement system, method, and apparatus
|
2016-08-15 |
2018-02-20 |
Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image. |
198 |
9,930,043 |
Systems and methods of virtual world interaction
|
2013-12-23 |
2018-03-27 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
199 |
9,937,419 |
Entertainment system for performing human intelligence tasks
|
2017-02-27 |
2018-04-10 |
A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources. |
200 |
9,953,304 |
Situational and global context aware calendar, communications, and relationship management
|
2013-09-20 |
2018-04-24 |
A situational and global context aware calendar, communications, and/or relationship management method and system is disclosed. The system is configured to receive from at least one environmental data gathering device, data about at least one target participant at a gathering of a plurality of participants, analyze such data to determine at least one observed behavior of said target participant, compare said at least one observed behavior against a dataset of at least one behavior; determine when said at least one behavior exceeds a threshold similarity to at least behavior in said dataset; and communicate, to at least one notification device, said at least one observed behavior.. |
201 |
9,959,565 |
Automatic resupply of consumable commodities
|
2014-12-22 |
2018-05-01 |
Methods and systems for facilitating initiation of resupply orders for consumable commodities include using a stand-alone electronic or audio-generating device incorporated into retail product packaging. The stand-alone device is equipped with a rudimentary processor or logic circuit, a memory, and a wireless transmitter. A simple user interface/activation device such as a push button or membrane switch is coupled to the logic circuit or processor. |
202 |
9,977,495 |
Immersive displays
|
2015-04-02 |
2018-05-22 |
A method of providing information for display on a display of an immersive display. The method includes obtaining information utilized for displaying a first image in front of a first eye and a second image in front of a second eye of a user of the immersive display, excluding part of the information to yield adjusted information to occlude or replace first information from a first area of the first image and second information from a second area of a second image when displayed on the immersive display, and providing the adjusted information for displaying the first image absent the first area and the second image absent the second area on the immersive display.. |
203 |
9,996,973 |
Augmented reality objects based on biometric feedback
|
2014-07-25 |
2018-06-12 |
Technologies are generally described for refining virtual objects output within an augmented reality environment. In one example, a method includes determining, by a system comprising a processor, first response data representative of a first response to a first set of object data associated with a simulation of an interaction between a first virtual object and a second virtual object. The method also includes modifying at least one object of the first set of object data to create a second set of object data associated with another simulation of the interaction between the first virtual object and the second virtual object. |
204 |
10,004,431 |
Detecting medical status and cognitive impairment utilizing ambient data
|
2015-03-13 |
2018-06-26 |
Methods and systems for determining the likelihood that a person is impaired, generally comprising gathering ambient data from sensors operably coupled to a primary measuring device (PMD), analyzing and/or identifying the ambient data, querying at least one database to identify baseline data regarding the person, and comparing the ambient data to the baseline data to determine the likelihood that the person is impaired. The methods and systems advantageously detect medical and/or cognitive impairment without the need for specialized devices, examination by specialists, consent of the person being evaluated, and compliance with recommendations to be examined, and may be applied to estimating the level of impairment of a person due to alcohol, drugs, exposure to toxic chemicals, changes to mental status, insufficient sleep, medical problems, changes to blood sugar levels, divided attention, vision changes, hearing changes, use of a mobile device while walking or operating a vehicle, and other factors.. |
205 |
10,009,356 |
Redirection method for electronic content
|
2016-12-29 |
2018-06-26 |
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. |
206 |
10,055,497 |
Method and apparatus for photograph finding
|
2017-04-07 |
2018-08-21 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
207 |
10,104,058 |
Content restriction compliance using reverse DNS lookup
|
2017-07-10 |
2018-10-16 |
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider; and providing the age information of the computer user, in addition to a host name, from a reverse map zone file in response to the request. The personal information may be used by the content provider to select appropriate content for the requesting host, for example for complying with content restrictions. A system of alerting an Internet content provider of the age or other personal information of a computer user is also provided.. |
208 |
10,148,905 |
Digital medium with hidden content
|
2006-10-19 |
2018-12-04 |
A digital medium such as a DVD disk, may contain hidden content and apparent content. When loaded, a main or title menu may appear to provide an apparent link to apparent content and a non-apparent link to non-apparent content. The non-apparent link may require a user to perform a sequence of non-apparent control actions before providing access to the non-apparent content.. |
209 |
10,187,500 |
Gyroscopic alerting mechanism for portable communications device
|
2017-01-10 |
2019-01-22 |
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall. |
210 |
10,198,154 |
Translating user interfaces of applications
|
2016-05-23 |
2019-02-05 |
A user interface translation system can provide functionality of translating at least a portion of a user interface of a primary application. The user interface translation system may, for instance, add an overlay interface over a portion of the primary application. The primary application can conduct all the processing tasks. |
211 |
10,205,876 |
Apparatus for correcting motion blur
|
2016-04-25 |
2019-02-12 |
A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor. |
212 |
10,223,576 |
Graphic data alteration to enhance online privacy
|
2017-07-31 |
2019-03-05 |
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.. |
213 |
10,235,442 |
Method and apparatus for identifying and characterizing errant electronic files
|
2016-01-18 |
2019-03-19 |
A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. |
214 |
10,255,666 |
Digital media enhancement system, method, and apparatus
|
2018-02-17 |
2019-04-09 |
Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image. |
215 |
10,282,958 |
Sound or radiation triggered locating device with activity sensor
|
2017-12-22 |
2019-05-07 |
A portable device is equipped with a signaling circuit that responds to a searching signal (e.g., hand clap, light flash, RF signal, infrared light) generated to locate the portable device when it is misplaced or lost. The device generates a location signal to enable the user to find the device. The location signal may be an audible, light, vibration, or other signal that calls attention to the device to enable the user to find it. |
216 |
10,284,597 |
E-mail authentication
|
2013-01-28 |
2019-05-07 |
A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. |
217 |
10,298,569 |
CAPTCHA systems and methods
|
2017-12-22 |
2019-05-21 |
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. |
218 |
10,298,911 |
Visualization of spatial and other relationships
|
2015-02-05 |
2019-05-21 |
Technologies are generally described for visualizing spatial relationships and other relationships. In one example, a method includes capturing, by a system comprising a processor, a stereoscopic image based on a view area from a reference point determined by the system. The stereoscopic image comprises objects. |
219 |
10,342,463 |
Detecting medical status and cognitive impairment utilizing ambient data
|
2018-06-25 |
2019-07-09 |
Devices for determining the likelihood that a user of a primary monitoring device (âPMDâ) has developed a medical condition, generally comprising sensors coupled to the PMD, wherein the PMD detects changes to sensor readings over time, and wherein the changes indicate a change in the likelihood that a user of the PMD has developed a medical condition. In some embodiments, motion sensors are operably coupled to the PMD, and the PMD monitors and saves data relating to characteristics of motion detected, which are used to determine whether there has been a change in a likelihood that a user is undergoing a medical event. In further embodiments, the PMD comprises cameras, and the PMD monitors and saves data relating to movement of a user's eyes, which is utilized to determine whether there has been a change to a likelihood that the user is currently undergoing a medical event.. |
220 |
10,389,992 |
Immersive display and method of operating immersive display for real-world object alert
|
2015-08-04 |
2019-08-20 |
An immersive display and a method of operating the immersive display to provide information relating to an object. The method includes receiving information from an input device of the immersive display or coupled to the immersive display, detecting an object based on the information received from the input device, and displaying a representation of the object on images displayed on a display of the immersive display such that attributes of the representation distinguish the representation from the images displayed on the display, wherein the representation is displayed at a location on the display that corresponds with a location of the object.. |
221 |
10,394,363 |
Device for physical interaction between remotely located users
|
2016-04-06 |
2019-08-27 |
An electronic device for touch translation includes a body and pins extending therefrom and including couplings to facilitate movement of a first portion relative to a second portion. The pins are controllable to move the first portion relative to the second portion and to control force applied by the pins on an external object. Heads are disposed on the pins, which heads are greater in width than the pins and are movable relative to the pins about respective couplings. |
222 |
10,449,442 |
Entertainment system for performing human intelligence tasks
|
2018-04-09 |
2019-10-22 |
A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources. |
223 |
10,482,658 |
Visualization and control of remote objects
|
2015-03-31 |
2019-11-19 |
Systems, devices and methods for controlling remote devices by modification of visual data prior to presentation to a person in order to make the person's response effectively the same as if the person were responding to data transmitted, processed and acted on instantaneously are disclosed. The systems, devices and methods advantageously minimize or eliminate the risks caused by a human response to data that has been delayed in transmission, processing and presentation. In an embodiment, a person controlling a remote device using an augmented reality interface is able to control the device based on predicted positions of an object at the time action is taken, thereby advantageously compensating for delays in receiving data, acting on such data and transmitting instructions or a response to the remote device.. |
224 |
10,528,129 |
Immersive displays
|
2018-01-11 |
2020-01-07 |
A method of providing information for display on a display of an immersive display. The method includes obtaining information utilized for displaying a first image in front of a first eye and a second image in front of a second eye of a user of the immersive display, excluding part of the information to yield adjusted information to occlude or replace first information from a first area of the first image and second information from a second area of a second image when displayed on the immersive display, and providing the adjusted information for displaying the first image absent the first area and the second image absent the second area on the immersive display.. |
225 |
10,594,846 |
Gyroscopic alerting mechanism for portable communications device
|
2019-01-18 |
2020-03-17 |
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. A gyroscopic mechanism is coupled to a housing of the portable communications device and controlled by a processor. The processor is configured to control a spin velocity of the gyroscopic mechanism based on receiving an alert of an incoming call or message, or detecting a fall. |
226 |
10,701,077 |
System and methods of virtual world interaction
|
2018-03-23 |
2020-06-30 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 30 environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
227 |
10,729,877 |
Treatment of phantom limb syndrome and other sequelae of physical injury
|
2018-01-12 |
2020-08-04 |
Methods, systems and devices that provide a therapeutic solution to alleviate the pain and discomfort of phantom limb syndrome are disclosed. The methods and systems of the present invention generally comprise capturing data from recording devices operably coupled to a processor and/or computing device, the recording devices configured to capture data associated with intact portions of a missing limb, one or more intact limbs and/or portions of the environment surrounding the missing limb, identifying the data captured, generating a three-dimensional virtual image of the missing limb and the surrounding environment from the data captured, and displaying the three-dimensional virtual image and the portions of the surrounding environment to the amputee such that the missing limb appears intact. The present invention advantageously provides a therapeutic and more immediate solution to alleviate the pain and discomfort from phantom limb syndrome.. |
228 |
10,776,430 |
Method and apparatus for photograph finding
|
2018-08-20 |
2020-09-15 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
229 |
10,825,077 |
Automatic resupply of consumable commodities
|
2018-04-27 |
2020-11-03 |
Methods and systems for facilitating initiation of resupply orders for consumable commodities include using a stand-alone electronic or audio-generating device incorporated into retail product packaging. The stand-alone device is equipped with a rudimentary processor or logic circuit, a memory, and a wireless transmitter. A simple user interface/activation device such as a push button or membrane switch is coupled to the logic circuit or processor. |
230 |
10,839,500 |
Digital media enhancement system, method, and apparatus
|
2019-04-08 |
2020-11-17 |
Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image. |
231 |
10,984,594 |
Creation and use of virtual places
|
2017-03-13 |
2021-04-20 |
An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool.. |
232 |
11,052,319 |
Guest management in an online multi-player virtual reality game
|
2019-04-29 |
2021-07-06 |
A guest management method and system for an online multi-player virtual reality environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment. |
233 |
11,058,327 |
Detecting medical status and cognitive impairment utilizing ambient data
|
2019-07-08 |
2021-07-13 |
Devices for determining the likelihood that a user of a primary monitoring device (âPMDâ) has developed a medical condition, generally comprising sensors coupled to the PMD, wherein the PMD detects changes to sensor readings over time, and wherein the changes indicate a change in the likelihood that a user of the PMD has developed a medical condition. In some embodiments, motion sensors are operably coupled to the PMD, and the PMD monitors and saves data relating to characteristics of motion detected, which are used to determine whether there has been a change in a likelihood that a user is undergoing a medical event. In further embodiments, the PMD comprises cameras, and the PMD monitors and saves data relating to movement of a user's eyes, which is utilized to determine whether there has been a change to a likelihood that the user is currently undergoing a medical event.. |
234 |
11,061,971 |
Method and apparatus for photograph finding
|
2020-09-14 |
2021-07-13 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
235 |
11,080,513 |
Video and still image data alteration to enhance privacy
|
2019-03-04 |
2021-08-03 |
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.. |
236 |
11,130,049 |
Entertainment system for performing human intelligence tasks
|
2019-10-21 |
2021-09-28 |
A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources. |
237 |
11,185,785 |
Single user multiple presence in multi-user game
|
2019-10-30 |
2021-11-30 |
A method for providing a single user multiple presence implementation may include providing access for a user identified by a user account to a virtual environment hosted by a computer. The method may further include generating multiple avatars for the user account to concurrently coexist and be operative within the virtual environment. The method may further include controlling the multiple avatars at least partly in response to input from the user. |
238 |
11,351,315 |
Vaporizer improvements
|
2017-08-10 |
2022-06-07 |
Systems, methods and apparatuses for vaporizing all or substantially all plant matter, liquid and/or other material to be vaporized are disclosed. Embodiments of the invention comprise a vaporization chamber sealed except for at least two conduits, heating element, a first conduit coupled to a source of fully or almost fully non-oxygenated gas, a heating element capable of heating the vaporization chamber to a temperature above a combustion temperature, a second conduit configured to transport vaporization gases and vaporized elements out of the vaporization chamber and at least one valve positioned in the second conduit preventing the flow of atmospheric air into the vaporization chamber. In some instances, the first gas substantially clears the vaporization chamber of atmospheric air prior to reaching combustion temperature. |
239 |
11,439,124 |
Use of semantic boards and semantic buttons for training and assisting the expression and understanding of language
|
2021-07-07 |
2022-09-13 |
Devices for providing language-like abilities for dogs. Using polygonal layouts, audible, scent, visible and other cues, the devices provide an efficient and novel ability to communicate with dogs in a granular manner. Devices for capturing and releasing scents are provided. |
240 |
11,445,704 |
Sound button device
|
2022-02-08 |
2022-09-20 |
A sound button devices, systems, and methods for sound buttons capable of emitting sound using less power, greater sound transmissibility, and/or greater resistance to damage and that allow for training both non-humans and humans to communicate more effectively than previously possible In typical embodiments, the sound button may comprise a shell, a switch operably connected to a printed circuit board (âPCBâ), a button cap assembly operably coupled to the shell, the button cap assembly comprising a button cap having at least one recess, the at least one recess having a hole; and a speaker facing toward the button cap, where, when a force is applied to the button cap, the button cap and the speaker move together to actuate the switch, thereby causing the speaker to emit a sound.. |
241 |
11,455,032 |
Immersive displays
|
2020-01-06 |
2022-09-27 |
A method of providing information for display on a display of an immersive display. The method includes obtaining information utilized for displaying a first image in front of a first eye and a second image in front of a second eye of a user of the immersive display, excluding part of the information to yield adjusted information to occlude or replace first information from a first area of the first image and second information from a second area of a second image when displayed on the immersive display, and providing the adjusted information for displaying the first image absent the first area and the second image absent the second area on the immersive display.. |
242 |
11,467,671 |
Device for physical interaction between remotely located users
|
2021-09-15 |
2022-10-11 |
An electronic device for touch translation includes a body, a plurality of pins extending from the body, the pins including couplings to facilitate movement of a first portion relative to a second portion of the pins, the pins being controllable to control movement of the first portion relative to the second portion and to control force applied by the pins on an external object. Sensors cooperating with the pins detect forces externally applied to the pins and a communication subsystem is utilized to communicate over a network, with a remote electronic device. A controller is coupled to the pins, the sensors, and the communication subsystem to, based on detected forces externally applied to the pins, transmit a signal to the remote electronic device for the control of the remote electronic device, and to, based on signals received from the remote electronic device, actuate ones of the pins to control the movement of the first portion relative to the second portion and to control the force applied by the pins on the external object.. |
243 |
11,507,733 |
System and methods of virtual world interaction
|
2020-05-24 |
2022-11-22 |
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term âvirtual worldâ is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.. |
244 |
11,600,108 |
Video and still image data alteration to enhance privacy
|
2021-08-02 |
2023-03-07 |
A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.. |
245 |
11,605,203 |
Creation and use of virtual places
|
2021-03-29 |
2023-03-14 |
An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool.. |
246 |
11,625,441 |
Method and apparatus for photograph finding
|
2021-07-09 |
2023-04-11 |
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. |
247 |
11,638,414 |
Use of semantic boards and semantic buttons for training and assisting the expression and understanding of language
|
2022-09-12 |
2023-05-02 |
Devices for providing language-like abilities for dogs. Using polygonal layouts, audible, scent, visible and other cues, the devices provide an efficient and novel ability to communicate with dogs in a granular manner. Devices for capturing and releasing scents are provided. |
248 |
11,654,257 |
Treatment of phantom limb syndrome and other sequelae of physical injury
|
2020-08-03 |
2023-05-23 |
Methods, systems and devices that provide a therapeutic solution to alleviate the pain and discomfort of phantom limb syndrome are disclosed. The methods and systems of the present invention generally comprise capturing data from recording devices operably coupled to a processor and/or computing device, the recording devices configured to capture data associated with intact portions of a missing limb, one or more intact limbs and/or portions of the environment surrounding the missing limb, identifying the data captured, generating a three-dimensional virtual image of the missing limb and the surrounding environment from the data captured, and displaying the three-dimensional virtual image and the portions of the surrounding environment to the amputee such that the missing limb appears intact. The present invention advantageously provides a therapeutic and more immediate solution to alleviate the pain and discomfort from phantom limb syndrome.. |
249 |
11,658,894 |
Forum search with time-dependent activity weighting
|
2019-11-27 |
2023-05-23 |
A search engine index measures and tracks one or more numeric indicators of activity at different times, including a most current time, in on-line forums and social networking sites. Such indicators may include, for example, a current volume per unit time of messages or data posted to the site, a moving average of such volume, a moving average of current participants over time, a count of current participants, other indication of site activity, or any combination of such indicators. The search engine is responsive to queries seeking forums ranked by activity for a defined time period, including a most current time. |
250 |
11,765,331 |
Immersive display and method of operating immersive display for real-world object alert
|
2022-07-13 |
2023-09-19 |
An immersive display and a method of operating the immersive display to provide information relating to an object. The method includes receiving information from an input device of the immersive display or coupled to the immersive display, detecting an object based on the information received from the input device, and displaying a representation of the object on images displayed on a display of the immersive display such that attributes of the representation distinguish the representation from the images displayed on the display, wherein the representation is displayed at a location on the display that corresponds with a location of the object.. |
251 |
11,822,726 |
Device for physical interaction between remotely located users
|
2022-10-10 |
2023-11-21 |
An electronic device for touch translation includes a body, a plurality of pins extending from the body, the pins including couplings to facilitate movement of a first portion relative to a second portion of the pins, the pins being controllable to control movement of the first portion relative to the second portion and to control force applied by the pins on an external object. Sensors cooperating with the pins detect forces externally applied to the pins and a communication subsystem is utilized to communicate over a network, with a remote electronic device. A controller is coupled to the pins, the sensors, and the communication subsystem to, based on detected forces externally applied to the pins, transmit a signal to the remote electronic device for the control of the remote electronic device, and to, based on signals received from the remote electronic device, actuate ones of the pins to control the movement of the first portion relative to the second portion and to control the force applied by the pins on the external object.. |
252 |
11,931,655 |
Single user multiple presence in multi-user game
|
2021-10-29 |
2024-03-19 |
A method for providing a single user multiple presence implementation may include providing access for a user identified by a user account to a virtual environment hosted by a computer. The method may further include generating multiple avatars for the user account to concurrently coexist and be operative within the virtual environment. The method may further include controlling the multiple avatars at least partly in response to input from the user. |
253 |
12,135,839 |
Device for physical interaction between remotely located users
|
2023-10-16 |
2024-11-05 |
An electronic device for touch translation includes a body and pins extending therefrom and including couplings to facilitate movement of a first portion relative to a second portion. The pins are controllable to more the first portion relative to the second portion and to control force applied by the pins on an external object. Heads are disposed on the pins, which heads are greater in width than the pins and are moveable relative to the pins about respective couplings. Sensors cooperating with the pins detect forces applied to the pins and a communication subsystem communicates over a network, with a remote electronic device. A controller based on detected forces transmits signals to the remote electronic device to control the remote electronic device, and actuates pins to control the relative movement of the portions based on signals received from the remote electronic device. |
254 |
12,208,324 |
Multi-Instance, Multi-User Virtual Reality Spaces
|
2021-06-04 |
2025-01-28 |
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. A common space is modeled in the computer memory configured in relation to the plurality of parallel instances so that an object located inside the common space is visible from viewpoints located inside each of the plurality of parallel instances. Remote clients may output an animated display of a corresponding one of the parallel dimensions and avatars therein. |