Abstract:
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. Optionally, user preferences for object characteristics may be factored into determining priority of apparent gaze. Resulting modeled avatars are rendered on client displays to provide more lifelike and interesting avatar depictions with shifting gaze directions.
Abstract:
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. The data sampler may store the data samples and parameter data as shared secret data for use in a future authentication session. During a future authentication session, an authentication device selects test data from the shared secret data to generate sensible output in an authentication process. The authentication process grants access to a controlled resource in response to user input indicating specific knowledge of the shared secret data selected from a presentation of similar sensible outputs.
Abstract:
Duplicate hands are dealt in a remote game of poker or other card game of chance. Simulated cards or game pieces are dealt to players with the order of suits changed for each player. A map is maintained in a computer memory between a reference set of indices corresponding to card suits, and differently-ordered sets of paying suits for dealing in the game. A reference game is maintained at a server computer to track game status according to the reference set of indices. Game play is translated between the reference game and individual playing suits so that players are unaware of the order of suits used for other players.
Abstract:
A method and apparatus for controlling a live avatar include features for directing the live avatar gaze to be consistent with a remote operator's view of the live avatar's surroundings. Indication of gaze direction may be continuously provided to the live avatar using movable optics, for example a heads-up display, or a movable optical prism or lens. Gaze direction or operator commands may be communicated using a haptic device. Video and control streams from multiple live avatars may be aggregated through a host server and allocated via an online interface to multiple prospective remote operators.
Abstract:
An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDAs. The receiving devices include a function for determining a message priority, prior to providing any audible alert signal indicating that the message is received. If an incoming message has a priority that is lower than a necessary threshold, the function prevents the audible alert signal from being generated at the time the message is received.
Abstract:
A computer search system compares search results received for searches falling within a defined parameter envelope used for grouping search requests. The parameter envelope may be defined by various parameters, for example, time of search, origin or search request, language, or other non-keyword data associated with each search request, excluding keywords used to define the search. Each new search result (comprising a list of search hits) for incoming search requests is compared to stored search results for search requests within the same parameter envelope. Search results that are found to be similar based on a pre-defined similarity measure are provided as related search results responsive to the incoming search requests. A client-side pseudo-browsing application may control interactions with the search engine, collecting true browsing input from the client and providing pseudo-browsing information to the search engine or other information provider.
Abstract:
A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verifies and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed.
Abstract:
A composite battery capable of adjusting its own power output in response to predetermined signals or lack of predetermined signals is provided. The composite battery has a set of terminals, a battery, a sensing device and a switch, all housed within a casing, which can be in the shape of a conventional battery. The sensor captures signals which upon reaching a certain threshold cause the switch to engage or disengage to selectively provide a load current to an electronic device. The battery may be used in battery-controlled consumer electronics articles, such as toys, to prevent avoidable battery drain or unintended activation when the electronics article is not in use.
Abstract:
Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal.
Abstract:
A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. Human intelligence tasks, such as visual discrimination, are thus enabled in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources present the human intelligence tasks to multiple video game participants as in-game content. The game engine defines and enables game play rules for the in-game content. The game play rules set parameters for the multiple video game participants to perform the human intelligence tasks to achieve desired results. The game engine may award each of the multiple video game participants an improved game score upon successful performance of the human intelligence tasks in accordance with the game play rules. The game engine may measure success by consistency in responses between different participants or trials.