Abstract:
Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.
Abstract:
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
Abstract:
Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer.
Abstract:
Retail consumers may hedge the price of volatile commodities such as gasoline via the advance purchase of a policy, which may be represented by a hedge card. The card may be priced to cover uncertainty in the price of the commodity over a defined future period, plus a small profit for the card issuer, optionally plus a pre-paid residual cash value. The card may permit the purchase of a defined amount of the commodity at a price not to exceed a defined ceiling over the defined future period. The card issuer may contact with one or more fuel providers to apportion the risks and benefits of the hedge card. In the alternative, the card issuer may contract with the consumer only, and may rebate commodity purchase amounts in excess of the defined price ceiling directly to the hedge card holder.
Abstract:
A system and method is provided for using a DNS server operating on a wide area network to enable an authorized reception device to receive (or be provided with) restricted content data associated with a particular wide area network address and redefine the domain name associated with a particular wide area network address. In a preferred embodiment of the present invention, an authorization application is adapted to provide the reception device with user-verification data, receive from the reception device verification data, and provide the filtering application with authorization data. The filtering application, which operates similarly to prior art DNS server systems, is further adapted to receive filtered data (i.e., password-required data and/or pseudo-domain-name data) and authorization data in order to provide an IP address of the content server to the reception device via a wide area network, such as the Internet.
Abstract:
A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amounts or betting odds, some combination of the foregoing, or any other useful remuneration. The house retains its edge via the premium. The method may be implemented for play at a physical or virtual card table.
Abstract:
A method and apparatus are provided for gaming based upon an instant-win ticket. The method and apparatus are for use with tickets of the type having a durable substrate carrying a predetermined hidden indicator indicating a prize amount, such as scratch-off lottery tickets. The apparatus includes an electronically controlled payment acceptor to automatically accept fungible payments, such as currency or tokens, from a user. An electronically controlled display, such as a slot-machine style set of rotating cylinders, is adapted to display continuously changing information to the user during game play. A controller is connected to the display and to the payment acceptor. The controller is adapted to control operation of the display and distribution of fungible prizes to a gamer, all in response to a prize amount read from the instant-win ticket. The apparatus includes a ticket-reader connected to the controller. The ticket reader is adapted to read the instant-win ticket and determine the prize amount indicated by the hidden indicator. The apparatus may be used to simulate a slot machine, with prizes determined by a paper ticket.
Abstract:
A method and system for operating a network server to discourage inappropriate use are disclosed. The method provides for altering files on the server in such a way so as essentially not affect acceptable, desired file types in any noticeable way, and to substantially corrupt undesirable file types. The method may be applied to every file copied to or from a memory of the server. In the alternative, the method may be applied only to selected files or types of files on the server. In particular, the files corrupted by altering according to the invention are executable software files and compressed files, that are generally not fault-tolerant. Fault tolerant files, such as uncompressed text and graphics files in common Internet-compatible formats, are not noticeably affected. The network server will therefore no longer be useful for storing or transferring undesirable files, and such use will be discouraged. According to a related embodiment of the invention, a system comprises a server having an application that performs one of the embodiments of the method according to the invention.
Abstract:
A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. Candidate qualities thus determined are included in candidate profiles and used to identify desirable candidates.
Abstract:
A method for filtering content makes use of local filtering agents for end users, and a portal to a network of human reviewing resources. Local filtering agents request content classification for unclassified content. The portal routes requests from local agents to available human reviewing resources. A content classification is provided by the reviewing resources, and may be saved in association with a content identifier for future use. The method permits human review of content within a short period after review is requested. In an embodiment of the invention, a centrally-located switch is provided for controlling filtering levels at one or more user terminals.