Patent application number | Description | Published |
20100299747 | IDENTITY VERIFICATION IN VIRTUAL WORLDS USING ENCODED DATA - An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted. | 11-25-2010 |
20130002717 | POSITIONAL CONTEXT DETERMINATION WITH MULTI MARKER CONFIDENCE RANKING - An augmented reality (AR) system receives image data from a camera of mobile device. The image data includes images of objects in the field of view of and at least two markers. A repository contains position information for objects and markers that may potentially appear in an image. The AR system receives a confidence level for the markers in the image, and selects the marker with the highest confidence level. The transformation and position of the marker in the image data is used to determine the identity of objects in the field of view. Further, the AR system generates overlaid image data that can be incorporated into the image data and sent back to be displayed on the mobile device. The overlaid image data is positioned according to the position data for the object it is associated with, and the transformation and position data for the selected marker. | 01-03-2013 |
20130042302 | COGNITIVE PATTERN RECOGNITION FOR COMPUTER-BASED SECURITY ACCESS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20130042303 | COGNITIVE PATTERN RECOGNITION FOR SECURITY ACCESS IN A FLOW OF TASKS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20130169684 | POSITIONAL CONTEXT DETERMINATION WITH MULTI MARKER CONFIDENCE RANKING - A computer implemented method for augmenting a display image includes receiving image data, the image data including data representing one or more objects, and at least a first marker and a second marker. The method includes receiving a first confidence level for the first marker and a second confidence level for the second marker. The method includes determining a selected marker from the first marker and the second marker. The selected marker is determined according to a highest confidence level of the first confidence level and the second confidence level. The method includes determining a transformation and a positional offset for the selected marker. The method includes generating overlaid display data for the one or more objects in the image data, the one or more objects determined in accordance with the transformation and the positional offset. | 07-04-2013 |
20130311641 | TRAFFIC EVENT DATA SOURCE IDENTIFICATION, DATA COLLECTION AND DATA STORAGE - Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database. | 11-21-2013 |
20150295864 | PREFERRED NAME PRESENTATION IN ONLINE ENVIRONMENTS - The present invention allows an on-line user to specify the name by which that user is known when communicating with other target users, regardless of the name under which the sending user is currently logged-in. The invention also provides a mechanism to block messages from sending parties that are not willing to divulge their real identity. | 10-15-2015 |
20160094611 | MANAGING REQUESTS TO A HIGH UTILIZATION WEBSITE - In an approach to managing requests to a high utilization website, one or more computer processors receive a first resource usage load status from a first server computer. The one or more computer processors receive a request for content on the first server computer from a client. The one or more computer processors determine whether the first resource usage load is above a pre-defined threshold. Responsive to determining the first resource usage load is above the pre-defined threshold, the one or more computer processors create a queue of a plurality of content requesters, wherein the client is one of the plurality of content requesters. The one or more computer processors establish a bidirectional communication channel with the client. | 03-31-2016 |