Abstract:
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.
Abstract:
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.
Abstract:
A method for anticipating a user's desired information using a PDA device connected to a computer network is provided. This method further comprises maintaining a database of user tendencies within the computer network, receiving sensor data from the user's physical environment via the PDA device, generating query strings using both tendency data and sensor data, retrieving data from external data sources using these generated query strings, organizing the retrieved data info electronic folders, and delivering this organized data to the user via the PDA device. In particular, a data management module anticipates the type of information a user desires by combining real time data taken from a sensor unit within a PDA and data regarding the history of that particular user's tendencies stored within the data management module.
Abstract:
A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services. A merchant computer may receive the identifier and process it to determine whether what is proposed for purchase using the account is a qualified type of good or service. The computer may obtain a list of qualified or unqualified products and compare the list to what is proposed for purchase. In the alternative, the computer may provide instructions to a human operator for the merchant, who may determine whether or not the proposed product is qualified. If the proposed product is deemed qualified for purchase, use of the account may be approved; if otherwise, use of the account may be refused.
Abstract:
A digital medium such as a DVD disk, may contain hidden content and apparent content. When loaded, a main or title menu may appear to provide an apparent link to apparent content and a non-apparent link to non-apparent content. The non-apparent link may require a user to perform a sequence of non-apparent control actions before providing access to the non-apparent content.
Abstract:
A mobile communication device alert signal may be remotely controlled by transmitting an alert control signal to the mobile communication device when the mobile communication device is within a predefined area, the alert control signal to indicate to the mobile communication device to invoke a control procedure for its alert signal.
Abstract:
A computer system is configured to operate in a normal mode and in a reduced power mode. The normal mode utilizes a primary processor, which operates using a primary operating system. When system power is depleted to a defined level, the primary processor is shut down and certain operations are taken over by a low-power, secondary processor that operates using a secondary operating system.
Abstract:
A computer system includes a, server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored file; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums.
Abstract:
A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recorded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verified and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed.
Abstract:
A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering.