摘要:
In an embodiment, clients create trade profiles that specify trade criteria. In various embodiments, the trade criteria specify categories of files that are desired, specify files that are desired, or specify files that are available to trade. The clients send the trade profiles to a server, which selects available files that meet the trade criteria of other clients. The server sends a specification of the selected files to the clients. In response, the clients lock their files, which prevents presentation and send the locked files to each other. The clients receive the locked files and unlock them. After expiration of a time period, the clients once again lock the files. In this way, a file may be traded by clients, but only one client may access the file at any one time.
摘要:
An apparatus, program product, and method collect musical preference data from a plurality of digital media players and generate therefrom a “collaborative” playlist of media files. The collaborative playlist may be used, for example, to identify and play back media files that most, if not all, of the users of the digital media players would likely find enjoyable.
摘要:
An apparatus, program product and method that generate a user profile and verify the authorship of a second message against the user profile. As such, messages inconsistent with the user profile, which may be indicative of authorship by another user, may be detected primarily from one side of a communication, generally resulting in safer instant messaging and/or emailing. Additionally, reauthentication and/or blocking capabilities may be utilized to handle messages inconsistent with the user profile.
摘要:
Embodiments of the invention provide techniques for controlling access to digital images based physical and temporal proximity to the image capture event. In one embodiment, an imaging device capturing a digital image broadcasts an invitation to wireless devices in the surrounding area. The wireless devices respond with an acceptance, including the email address (or some other network address) of the device owner. The digital image is made available at a network location with restricted access. Access to the image is controlled with an access list based on the acceptances received by the imaging device.
摘要:
A method, article of manufacture, and apparatus for tracking user interactions comprising receiving a first request associated with a first user, to exchange a communication with a second user about one of a plurality of elements of a web-page, wherein the plurality of elements includes at least one of graphical elements and textual elements; in response to the first request, exchanging a communication between the first user and the second user; capturing the communication; storing an interaction object comprising the communication, wherein storing includes associating the interaction object with the one of the plurality of elements of the web-page; and serving a modified version of the web-page to a third user; wherein the modified version specifies the interaction object being associated with the one of the plurality of elements of the web-page.
摘要:
A media stream aggregation mechanism receives and analyzes multiple media streams and creates an aggregate media stream output based on user preferences. In this manner a media provider that uses the media stream aggregation mechanism potentially may provide a customized presentation to each user based on user preferences. By providing the aggregation of multiple media streams to a user, the user's experience is customized according to user preferences.
摘要:
Embodiments of the invention provide techniques for detecting patterns of abuse in users of a virtual world. The patterns of abuse may be detected by examining records of inappropriate interactions between users. Subsequently, preventative actions may be taken to prevent further abuse. The preventative actions may include blocking access to all or part of the virtual world, blocking interactions with other users, warning other users, or notifying authorities of the behavior of the other user.
摘要:
Embodiments of the invention include a method and apparatus for describing elements within a virtual world to a user of the virtual world. An element may be identified based on a position of an avatar within the virtual world. The avatar is a representation of the user within the virtual world. A tag associated with the element is selected. The tag includes a description of the element. The element is described to the user based on the description.
摘要:
Embodiments of the invention include a method and apparatus for describing elements within a virtual world to a user of the virtual world. An element may be identified based on a position of an avatar within the virtual world. The avatar is a representation of the user within the virtual world. A tag associated with the element is selected. The tag includes a description of the element. The element is described to the user based on the description.
摘要:
Embodiments of the invention provide techniques for protecting a child user from inappropriate interactions within an immersive virtual environment. The inappropriate interactions may be detected by examining characteristics of the interactions between a child and another user (e.g., communications, transactions, etc.), by monitoring physical signs of stress in the child (e.g., based on facial gestures, heart rate, etc.), or by receiving software commands given by the child to signal discomfort in a particular situation. Subsequently, preventative actions may be determined based on a level of severity of the inappropriate interaction. The preventative actions may include notifying the parents of the child, altering the virtual world to end the interaction, or notifying authorities of the behavior of the other user.