摘要:
In a first aspect, a first method of improving security of a network system is provided. The first method includes the steps of (1) providing a plurality of devices coupled via a network, wherein one or more of the devices are adapted to execute at least one client and one or more of the devices are adapted to execute at least one server in a client-server relationship; and (2) employing software, functionality of which is based on client-specific criteria or operational condition criteria of the system, to reduce a number of times a user of a client of the system must provide first authentication data to access data from one or more servers of the system. Numerous other aspects are provided.
摘要:
A client-side search indexing program works transparently and in conjunction with a server based search index. The combined search indexes provide a more accurate and up-to-date image of the Web, customized to the interests of each individual user. The client-side indexer customizes indexing of particular Web pages to the preferences and usage patterns of the user. The user initially installs and configures the client-side indexer on the client. The requested indexes are automatically refreshed and integrated with the main server-side indexes during a search. When the user performs a search, the client-side indexes may be combined with the main server-side index. The combined indexes provide accurate search results for the particular user.
摘要:
Embodiments of the invention provide techniques for commercial transactions for the sale of images carried out over short-range wireless transmissions. In one embodiment, the transaction may be initiated by a vendor (e.g., a professional photographer), who transmits a wireless signal including an offer for sale of an image. A customer wishing to purchase the image responds by sending a wireless signal including an acceptance of the offer. In another embodiment, the transaction may be initiated by a customer, who transmits a wireless signal including a request for an image to be fulfilled by a vendor. A vendor agreeing to supply the image responds by sending a wireless signal including an acceptance of the request. By offering the images to customers who are in close proximity to the image capture, the vendor may increase the likelihood that the images will be purchased.
摘要:
Embodiments of the invention provide techniques for abstracting conversations between avatars within a virtual world. In one embodiment, the user of an avatar observing a conversation between other avatars may be presented with an abstracted version of the conversation. The abstraction may be performed so as to enable the user to determine the general topic or nature of the conversation, without receiving sensitive or detailed information included in the conversation. In one embodiment, the abstraction is performed by substituting words of the conversation with fewer words, or words having a more general meaning. The degree of abstraction performed may be based on a level of trust between the observer and the users engaged in conversation.
摘要:
Embodiments of the invention provide techniques for searching for virtual objects of an immersive virtual environment based on user interactions within the virtual environment. Generally, embodiments provide an attribute index storing data describing attributes of virtual objects, and an interaction index storing data describing user interactions with virtual objects. Search queries may be evaluated using both the attribute index and interactions index. Thus, virtual objects may be searched in terms of object attributes as well as user interactions with the virtual objects.
摘要:
A method, article and apparatus for advertising via a mobile device. A communication request is received from the mobile device that includes a screen for displaying an ad. One more ad selection criteria are then determined. Such criteria may include a visibility of the ad on the screen; a target audience determined on the basis of information provided from the mobile device; and attributes of the determined target audience. The ad selection is based on the visibility of the ad and the attributes of the target audience. Commands may then be initiated to cause the selected ad to be displayed on the screen of the mobile device.
摘要:
Methods and apparatus associate a computed trust level to avatars that interact with one another in a simulated environment. The avatars may represent legitimate users of the virtual world or spammers. System monitoring of each avatar provides ability to recognize potential spammers and create an alternate indication of the spammers. A user index may be used to store data describing attributes of each avatar for analysis using programs stored in memory.
摘要:
Embodiments of the invention include a method and apparatus for describing elements within a virtual world to a user of the virtual world. An element may be identified based on a position of an avatar within the virtual world. The avatar is a representation of the user within the virtual world. A tag associated with the element is selected. The tag includes a description of the element. The element is described to the user based on the description.
摘要:
Embodiments of the invention provide techniques for generating song playlists for use in an immersive virtual environment. Generally, playlists may be generated based on stored music preference data. The music preference data may be generated by storing user interactions with specific songs. The user interactions may be associated with characteristics of the user's situational context within the virtual world. The music preference data may be indexed by song name, and/or by musical properties. Subsequently, the music preference data may be used to generate a playlist adapted to the user's current situation within the virtual world.
摘要:
User privacy is protected by preventing certain unsafe search queries from being associated with the user when saved by a search engine. When an unsafe query is detected, the unsafe query is submitted to a proxy service, and the proxy service submits the query to a search engine preventing the query from being associated with the user. The user receives the search results from the proxy service. Query filtering only allows queries to be submitted directly to the search engine that do not provide personal information or information which may infer an undesirable trend when taken in aggregate with other submitted queries by that user.