摘要:
A computer system including a network for obtaining complete information as to the best mode for a first person to communicate with a second person comprising means for sensing the presence of the second person in a given area and the activity in which he is engaged; means for connecting the means for sensing to the network; and means connected to the network for enabling the first person to determine the presence and status of messages in the form of e-mail or voice mail directed to the second person.
摘要:
A system and method for motor vehicle restriction control enables an owner of a motor vehicle to restrict another person's use and operation of the owner's motor vehicle. The system includes a driver identification module identifying a driver operating the motor vehicle and a storage device for storing at least one restriction profile defining for the driver at least one restriction of the operation the motor vehicle. The system farther includes a motor vehicle controlling device for restricting the operation of the motor vehicle according to the at least one restriction in response to the driver identification module identifying the driver.
摘要:
A technique for providing flexible communication device usage attribution is provided. Identification information of a user of a communication device is received from the communication device at a primary service provider. It is determined if the user of the communication device is the owner of the communication device at the primary service provider. Usage information is attributed to an account of the owner on the primary service provider when the user is identified as the owner. Usage information is attributed to an account of the user when the user is not identified as the owner and the user is subscribed to one of the primary service provider and a service provider associated with the primary service provider.
摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
A system and method for enabling communication concurrently over multiple access points and multiple physical media including but not limited to: cellular, network (e.g., Ethernet), broadband wireless, audio communication schemes.
摘要:
A method and system for re-formatting computer files. The method comprises the steps of inputting a data file into a computer, and determining if the data file is compatible with the computer. If the data file is not compatible with the computer, the data file is transmitted over the Internet to a universal server; and the universal server transforms the data file into a format compatible with the computer, and sends the transformed data file back to the computer. Preferably, the universal server identifies the type of file, and transforms the file into a different format of the same type. Also, in a preferred embodiment, a user of the computer identifies user requirements, these requirements are transmitted to the universal server, and the file is reformatted in accordance with the user requirements.
摘要:
This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant, the remote server generates and downloads the same files that are downloaded on the local user computer devices. For example, if a person begins to download a program, the server may also download the same program on a remote backup server. This way, if the user loses this program, it can be retrieved automatically through a provided server on the Internet. If user's files are backed up by regular backup periodically, relevant data that were stored by real time backup servers can be eliminated.
摘要:
A method generates and superposes virtual images to an existing image in order to show special effects. Images are generated depending on the relative position of one or more subjects viewing the existing image. The images are generated in order to see an augmented reality. The subjects are people located near a transparent support such as a screen or a window. These people watch the augmented reality through the screen/window. The virtual objects on the screen are created in such a way as to give a realistic impression for different people watching the same screen/window at the same time, thereby generating virtual images in order to create an augmented reality for one or many viewers watching the same real objects at the same time.
摘要:
A system and method for bringing together potential co-inventors, developing a patent proposal, negotiating for rights in a patent draft, and writing a patent draft. A subscriber list is created and kept in a Subscriber Database. A pool of potential co-inventors is created by a Patent Proposal Server, which stores a patent proposal file. A Patent Proposal Web Server provides a forum for the initial inventor and the pool of potential co-inventors to further develop the patent proposal. The patent proposal becomes a patent draft file on a Patent Draft Server and the pool of potential co-inventors and the initial inventor negotiate for rights in the patent draft by means of a Rights Negotiation Server. The pool of co-inventors and the initial inventor co-write the patent draft by means of a Patent Draft Web Server. A Security System maintains levels of security in the system.
摘要:
A system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society. The system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves, that allows for the self-evolution of the virtual societies.