Abstract:
The present invention allows an on-line user to specify the name by which that user is known when communicating with other target users, regardless of the name under which the sending user is currently logged-in. The invention also provides a mechanism to block messages from sending parties that are not willing to divulge their real identity.
Abstract:
Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.
Abstract:
An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted.
Abstract:
Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed.
Abstract:
An augmented reality (AR) system receives image data from a camera of mobile device. The image data includes images of objects in the field of view of and at least two markers. A repository contains position information for objects and markers that may potentially appear in an image. The AR system receives a confidence level for the markers in the image, and selects the marker with the highest confidence level. The transformation and position of the marker in the image data is used to determine the identity of objects in the field of view. Further, the AR system generates overlaid image data that can be incorporated into the image data and sent back to be displayed on the mobile device. The overlaid image data is positioned according to the position data for the object it is associated with, and the transformation and position data for the selected marker.
Abstract:
Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database.
Abstract:
An augmented reality (AR) system receives image data from a camera of mobile device. The image data includes images of objects in the field of view of and at least two markers. A repository contains position information for objects and markers that may potentially appear in an image. The AR system receives a confidence level for the markers in the image, and selects the marker with the highest confidence level. The transformation and position of the marker in the image data is used to determine the identity of objects in the field of view. Further, the AR system generates overlaid image data that can be incorporated into the image data and sent back to be displayed on the mobile device. The overlaid image data is positioned according to the position data for the object it is associated with, and the transformation and position data for the selected marker.
Abstract:
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is sequentially encrypted with the public keys of servers in the path. Decryption and identification of the next server occurs in a sequential manner in which the path is known only to the sender.
Abstract:
Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database.
Abstract:
A system and method provides secure channels for communication in a virtual universe by employing a packet interception layer for incoming and outgoing data packets. A data path is defined and is sequentially encrypted with the public keys of servers in the path. Decryption and identification of the next server occurs in a sequential manner in which the path is known only to the sender.