Abstract:
Methods, systems and devices that provide a therapeutic solution to alleviate the pain and discomfort of phantom limb syndrome are disclosed. The methods and systems of the present invention generally comprise capturing data from recording devices operably coupled to a processor and/or computing device, the recording devices configured to capture data associated with intact portions of a missing limb, one or more intact limbs and/or portions of the environment surrounding the missing limb, identifying the data captured, generating a three-dimensional virtual image of the missing limb and the surrounding environment from the data captured, and displaying the three-dimensional virtual image and the portions of the surrounding environment to the amputee such that the missing limb appears intact. The present invention advantageously provides a therapeutic and more immediate solution to alleviate the pain and discomfort from phantom limb syndrome.
Abstract:
A method for using a wireless receiver may include receiving subscribed messages for a user identified with a user account of a hub, being messages posted by other uses of the hub to which the user has subscribed. The method may include automatically processing the messages to determine content for display on a display device, and displaying the content on the display device. The display device may be configured as two separate screens mounted at separate locations on the user's body. The messages may include user status messages, which are messages posted to the hub by the user, and the user status messages and subscription messages may be displayed on separate ones of the two screens. An apparatus for performing the method may include a processor coupled to a memory holding encoded instructions for performing operations of the method.
Abstract:
A physical, non-human readable representation of a digital key may be in a physical key article. The key article may enable a person to generate a signal representing the digital key from a user interface device in communication with a computer by physical manipulation of the key article. Access to digital content via the computer may be unlocked in response to receiving the signal. In addition, a key may be represented by a pattern of unreadable errors in a computer-readable medium.
Abstract:
An apparatus, method and system facilitate efficient creation of virtual places and provide tools for using the virtual places. The virtual places include a virtual real estate listing, newsworthy place and a virtual box seat. Tools are provided including an automatic declutter tool and a staging tool.
Abstract:
An electronic mail client includes features for preventing addressing errors in electronic messaging such as those caused by predictive text features. A messaging client tracks addressing parameters including the length of time since each previous addressee has been messaged, the quantity of times selected addressees have been co-addressees on messages, if any, whether the addressees are designated as sensitive and whether the messages contain sensitive subject matter. If a high risk of addressing error is determined, the client delays transmission of the message to permit the user to review the message recipient addresses and correct any erroneous addressees.
Abstract:
A camera apparatus includes a photogrammetric range sensor, small aperture lens and a processor configured to carry out a method for simulating a large aperture lens. The method includes capturing a photographic image data of a scene using the camera with the lens set to a small aperture size. Simultaneously or near-simultaneously with capturing the image, the camera captures photogrammetric range data pertaining to depth of objects in a field of view of the camera, using the range sensor. The processor then processes the photographic image data using the photogrammetric range data to obtain second photographic data simulating an image captured using a lens set to an aperture size larger than the small aperture size.
Abstract:
An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDAs. The receiving devices include a function for determining a message priority, prior to providing any audible alert signal indicating that the message is received. If an incoming message has a priority that is lower than a necessary threshold, the function prevents the audible alert signal from being generated at the time the message is received.
Abstract:
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. The data sampler may store the data samples and parameter data as shared secret data for use in a future authentication session. During a future authentication session, an authentication device selects test data from the shared secret data to generate sensible output in an authentication process. The authentication process grants access to a controlled resource in response to user input indicating specific knowledge of the shared secret data selected from a presentation of similar sensible outputs.
Abstract:
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. In response to a request for the web page, the second locator is obtained. Access to the second locator may be secured. The second locator may be swapped with the first locator to cause the web browser application to obtain the second content instead of the first content. In the alternative, the second content may be obtained and provided to the web browser instead of, or in addition to, the first content.
Abstract:
A method operates to detect personal identifying or account information exchanged in a real-time electronic communication occurring between computer network users, such as electronic chat. A detected personal identifier may be recognized as an attempt on the part of one user to engage in a phishing attack upon another user or to otherwise steal the other user's sensitive personal information. Upon recognizing the communication as an unwarranted attempt to collect such information, the electronic communication may be monitored, and communication of the personal information may be prevented.