摘要:
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is sequentially encrypted with the public keys of servers in the path. Decryption and identification of the next server occurs in a sequential manner in which the path is known only to the sender.
摘要:
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is sequentially encrypted with the public keys of servers in the path. Decryption and identification of the next server occurs in a sequential manner in which the path is known only to the sender.
摘要:
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is sequentially encrypted with the public keys of servers in the path. Decryption and identification of the next server occurs in a sequential manner in which the path is known only to the sender.
摘要:
An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted.
摘要:
The present invention allows an on-line user to specify the name by which that user is known when communicating with other target users, regardless of the name under which the sending user is currently logged-in. The invention also provides a mechanism to block messages from sending parties that are not willing to divulge their real identity.
摘要:
The present invention allows an on-line user to specify the name by which that user is known when communicating with other target users, regardless of the name under which the sending user is currently logged-in. The invention also provides a mechanism to block messages from sending parties that are not willing to divulge their real identity.
摘要:
An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted.
摘要:
Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.
摘要:
Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.
摘要:
An augmented reality (AR) system receives image data from a camera of mobile device. The image data includes images of objects in the field of view of and at least two markers. A repository contains position information for objects and markers that may potentially appear in an image. The AR system receives a confidence level for the markers in the image, and selects the marker with the highest confidence level. The transformation and position of the marker in the image data is used to determine the identity of objects in the field of view. Further, the AR system generates overlaid image data that can be incorporated into the image data and sent back to be displayed on the mobile device. The overlaid image data is positioned according to the position data for the object it is associated with, and the transformation and position data for the selected marker.