Abstract:
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
Abstract:
A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verifies and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed.
Abstract:
A method for conducting Internet domain name service to users connected to the Internet comprises an automated procedure for transferring Internet domain name service from a domain name owner to a domain name manager. This method further comprises Internet sub-domain name services to prospective buyers based on domain names transferred to the domain name manager. Messages requesting domain name service, including requests from domain name owners to sub-license their particular domain name to prospective sub-domain name buyers and from prospective sub-domain name buyers to license available sub-domain names, are received and responded to by an automated domain name management system. This automated domain name management system further comprises an interactive website which includes a database, search engine, and Web server.
Abstract:
Aspects are disclosed for enhancing digital media. In an aspect, a target object in a primary image is identified, and reference images that include the target object are located. The target object is then modified within the primary image according to data derived from analyzing the reference image. In another aspect, a primary file is received, and at least one reference file is referenced to generate enhancement data that facilitates enhancing the primary file from an extrapolation of the reference file. In yet another aspect, media files corresponding to a common event are aggregated, and a desired enhancement of a primary file is identified. Here, the desired enhancement corresponds to a modification of an obstruction included in the primary file. A reference file which includes data associated with the desired enhancement is then referenced, and the obstructed data is modified based on replacement data extrapolated from the reference file.
Abstract:
Extra-protection fins and pads, and methods of making and using extra-protection fins and pads are disclosed. The extra-protection fins and pads of the present invention comprise a first triangular face, a second triangular face attached and/or connected to the first triangular face at an angle thereby forming a front apex and a top apex, wherein the fins are configured such that the front apex catches and/or absorbs the menstrual and/or other vaginal fluids first, and the extra-protection fin fills backwards toward the top apex, thus preventing unwanted, embarrassing and annoying leakage onto clothing or bedding during periods of heavy flow and/or when lying down. The extra-protection fin may also comprise a third triangular face attached and/or connected to the first and second triangular faces, wherein a vertex of the third triangular face contacts and/or is connected to the first and second triangular faces at the top apex.
Abstract:
Body art, such as tattoos, are integrated or extended onto clothing. Clothing patterns may be integrated or extended onto body art, such as temporary tattoos. In one embodiment, a computer analyzes an image of a body with a tattoo and generates an image suitable for application to clothing. When applied to clothing, the image displays the portion of the tattoo that is covered by the clothing, or may extend the appearance of the tattoo from the skin to the adjacent clothing.
Abstract:
Aspects are disclosed for editing a textual input. In an aspect, a series of strings and an edit command are received such that the strings are parsed based on the edit command. A candidate modification of the strings is inferred from a correlation between the edit command and a parsing of the strings, and the candidate modification is then implemented. In another aspect, a textual input comprising a series of strings is displayed and an edit command is received. The edit command is associated with a portion of the strings, and the portion is then edited based on the edit command. In yet another aspect, a series of strings and an edit command are received, and a candidate modification of the series of strings is inferred based on a combination of a trigger portion and an edit portion of the edit command. The candidate modification is then disseminated.
Abstract:
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.
Abstract:
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.
Abstract:
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.