Abstract:
Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading.
Abstract:
A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., “virtual currency”) for use in an online computer game or the like, after the trigger date.
Abstract:
A method for filtering content makes use of local filtering agents for end users, and a portal to a network of human reviewing resources. Local filtering agents request content classification for unclassified content. The portal routes requests from local agents to available human reviewing resources. A content classification is provided by the reviewing resources, and may be saved in association with a content identifier for future use. The method permits human review of content within a short period after review is requested. In an embodiment of the invention, a centrally-located switch is provided for controlling filtering levels at one or more user terminals.
Abstract:
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. Optionally, user preferences for object characteristics may be factored into determining priority of apparent gaze. Resulting modeled avatars are rendered on client displays to provide more lifelike and interesting avatar depictions with shifting gaze directions.
Abstract:
A guest management method and system for an online multi-player virtual realty environment or social networking site. A network interface receives guest access requests from guest clients and input data from a plurality of remotely-located clients. The input data is operative to control avatars associated with the clients in a modeled virtual reality environment. A memory holds program instructions for determining whether the guest access is associated with a member client. If the guest access request is associated with the member client, then the guest client is allowed to access the virtual reality environment via a guest avatar. The guest avatar's movements in the virtual reality environment are restricted based on a location of a member avatar controlled by the associated member client. For example, the guest avatar may only be permitted to move within an area that is bounded by a perimeter about the member avatar.
Abstract:
A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. Candidate qualities thus determined are included in candidate profiles and used to identify desirable candidates.
Abstract:
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal. In addition, a key may be represented by a pattern of unreadable errors in a computer-readable medium.
Abstract:
A system and method for determining whether an e-mail originates from a sender authorized by an address provider to send the e-mail to an intended recipient's e-mail address. The e-mail identifies an address provider from which the intended recipient's e-mail address was obtained. The e-mail is delivered to the intended recipient only upon verification that the sender is authorized by the address provider to obtain the intended recipient's e-mail address. The system and method may also provide for determining whether an e-mail originates from a forged source. A server receives data relating to an e-mail, including a purported sender and a verification host. The server queries the verification host with information pertaining to the e-mail and requests confirmation that the e-mail originates from the purported sender. The e-mail is determined to originate from a forged source unless the verification host responds that the e-mail originates from the purported sender.
Abstract:
A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft.
Abstract:
Secondary content in encrypted for distribution to client terminals by selecting at least a portion of raw encrypted audio-video data (REAVD) that is provided on a media article as an encryption key, encrypting secondary content using the encryption key, and storing encrypted secondary content at a remotely located host. The media article can then be used for providing access to the encrypted secondary content to client terminals by receiving encrypted secondary content at a client terminal, extracting a decryption key from a media article encoded with REAVD, the decryption key being determined by at least a portion of the REAVD, using the decryption key to decrypt the secondary content, and outputting the decrypted secondary content from the client terminal.