Abstract:
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.
Abstract:
A method and apparatus for providing a simulated game of chance uses a predetermined set of outcomes determined by a gaming machine for a game of chance based on a first specified wager amount or amounts per game and a specified total number of games, using a simulator. The predetermined set of outcomes may be determined at the gaming machine more than a specified period of time prior to providing the simulated game. The simulator provides simulated games of chance in response to user input specifying second wager amounts independently of the first wager amount or amounts, in which the results of the simulated games are determined from the predetermined set of outcomes. The simulator adjusts the number of permitted simulated games in response to the second wager amounts and results of the simulated games so that an aggregate outcome of the simulated games corresponds to the predetermined set of outcomes.
Abstract:
A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period.
Abstract:
A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services. A merchant computer may receive the identifier and process it to determine whether what is proposed for purchase using the account is a qualified type of good or service. The computer may obtain a list of qualified or unqualified products and compare the list to what is proposed for purchase. In the alternative, the computer may provide instructions to a human operator for the merchant, who may determine whether or not the proposed product is qualified. If the proposed product is deemed qualified for purchase, use of the account may be approved; if otherwise, use of the account may be refused.
Abstract:
An optically-readable disk includes a device that disrupts readability of the disk when the disk is spun at an angular velocity substantially greater than required to play the disk in its intended playing device, or when a defined integral of velocity and time is exceeded. The device may include a fluid container that disperses a data-disruptive fluid. The device may include a membrane or layer that is disrupted when the disk is rotated above a defined angular velocity, or when a defined integral of velocity and time is exceeded. The device may include an electro-optical material that is activated by an electrical signal from a controller in response to an input from a sensor responsive to motion of the disk.
Abstract:
A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amounts or betting odds, some combination of the foregoing, or any other useful remuneration. The house retains its edge via the premium. The method may be implemented for play at a physical or virtual card table.
Abstract:
A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft.
Abstract:
A method of managing a card game, a computer implementation thereof, and a card game kit are disclosed. In the method, a plurality of cards are dealt in one or more rounds to a plurality of players, each player receiving one or more cards in each round, with each card bearing a designated value and suit. The values and suits of the cards dealt are recorded in each round. Those values and suits are then revealed to the players during one or more of the rounds to enable the players to wager or withdraw from the game.
Abstract:
A portable communications device, such as a mobile phone, includes a novel tactile alerting mechanism capable of alerting the user of an incoming communication or other event. In some embodiments, a mechanical actuator causes a rod or lever to pulsate, rotate, or protrude out of a static housing for the communications device. In other embodiments, a pneumatic actuator inflates a bladder that protrudes out of the housing. The alerting mechanism may be configured as a movable part of a decorative fanciful housing for the communications device.
Abstract:
A method and system for operating a network server to discourage inappropriate use are disclosed. A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises the steps of receiving a request to transfer a file between the memory and one of the plurality of client devices, removing a packet comprising a defined number of information bits from the file, transferring the packet between the memory and the client device per the request, then pausing for a defined delay period, and repeating the removing, transferring, and pausing steps in order until all of the file has been transferred. Preferably, the method further comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period. The number of information bits in the packet may similarly be initiated, and adjusted during the transfer cycle. The system comprises the server having an application for performing the method according to the invention.