US20180241708A1 - Controlling whether incoming information is blocked - Google Patents
Controlling whether incoming information is blocked Download PDFInfo
- Publication number
- US20180241708A1 US20180241708A1 US15/898,623 US201815898623A US2018241708A1 US 20180241708 A1 US20180241708 A1 US 20180241708A1 US 201815898623 A US201815898623 A US 201815898623A US 2018241708 A1 US2018241708 A1 US 2018241708A1
- Authority
- US
- United States
- Prior art keywords
- user
- information
- filter
- computing device
- hand
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H04L51/12—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G06F17/30867—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
Definitions
- U.S. patent application Ser. No. 09/835,077 is also a continuation-in-part of U.S. patent application Ser. No. 09/825,159, filed Apr. 2, 2001 and entitled “Thematic Response to a Computer User's Context, Such as by a Wearable Personal Computer” (now U.S. Pat. No. 7,076,737), which claims the benefit of provisional U.S. Patent Application No. 60/193,999, filed Apr. 2, 2000 and entitled “Obtaining and Using Contextual Data for Selected Tasks or Scenarios, Such as for a Wearable Personal Computer”.
- U.S. patent application Ser. No. 09/835,077 is also a continuation-in-part of U.S. patent application Ser. No. 09/824,900, filed Apr. 2, 2001 and entitled “Soliciting Information Based on a Computer User's Context” (now U.S. Pat. No. 6,968,333), which claims the benefit of provisional U.S. Patent Application No. 60/194,000, filed Apr. 2, 2000 and entitled “Soliciting Product Information Based on the User's Context”, and provisional U.S. Patent Application No. 60/194,758, filed Apr. 2, 2000 and entitled “Creating Portals Based on the User's Context”.
- U.S. patent application Ser. No. 09/835,077 also claims the benefit of provisional U.S. Patent Application No. 60/196,625, filed Apr. 12, 2000 and entitled “Enhanced Gaming with Wearable Computers”, and of provisional U.S. Patent Application No. 60/240,694, filed Oct. 16, 2000 and entitled “Method for Synchronizing Computer Generated Images with Real World Images”.
- the present invention relates generally to computer-supported filtering of information, and more particularly to presentation of filtered information (such as unsolicited advertisements) to a computer user based on the user's current context.
- computers become increasingly powerful and ubiquitous, users increasingly employ their computers for a broad variety of tasks. For example, in addition to traditional activities such as running word processing and database applications, users increasingly rely on their computers as an integral part of their daily lives. Programs to schedule activities, generate reminders, and provide rapid communication capabilities are becoming increasingly popular. Moreover, computers are increasingly present during virtually all of a person's daily activities. For example, hand-held computer organizers (e.g., PDAs) are more common, and communication devices such as portable phones are increasingly incorporating computer capabilities. Thus, users may be presented with output information from one or more computers at any time.
- PDAs personal digital assistants
- Advertisers are particularly interested in reaching computer users as such users often represent desirable target markets. Advertisers would like to provide advertisements to various computer and communication devices that are relevant to the users. Other groups in addition to advertisers may also want to disseminate information to computer users.
- One possible solution is to simply ignore some or all available information, such as unsolicited information that is received. This solution is not always possible, however, and is often difficult and inconvenient. For example, it is difficult to ignore an audio message of moderate volume, especially when those messages are specifically designed to be difficult to ignore (e.g., by compressing the dynamic range so that the average volume is higher). Plus, rejecting all information robs the user of potentially important information in which the user may be interested.
- Another solution is to select a set of information sources from which information (solicited and/or unsolicited) is permitted.
- This exclusionary practice is not fully desirable because the user loses access to potentially desirable information from a source that may not be on the acceptable source list.
- the user's ability to give continuous attention to multiple, or even a single information source is limited. This is especially true if the user is to remain “in task” and not be distracted by inappropriate information.
- Junk mail filters used by conventional email programs attempt to filter unwanted bulk mailings by using keywords or user enumeration. These filters have the drawback in that the user must manually update desired or undesired sources to account for new sources.
- Users may not mind receiving even unsolicited information (e.g., advertisements) if the information is received at a convenient time and made available in a non-intrusive manner. Much of this timing and convenience is dictated by the user's current context.
- the user's context can either limit or enhance their ability and desire to receive and process information.
- the context may simply dictate that the user is not interested or able to review any information.
- Such registration can be facilitated by adding visual clues to the relevant environment, such as patterns of dots on a circuit board containing the wire.
- visual clues such as patterns of dots on a circuit board containing the wire.
- Another difficulty in managing the overlay of virtual information onto the real world involves presenting and formatting computer interactions controls without detracting from the user's experiencing of the real world.
- FIG. 1 illustrates a system in which messages are pushed from multiple information sources to multiple clients over a network.
- FIG. 2 illustrates one exemplary implementation of a client, which is embodied as a wearable computer.
- FIG. 3 illustrates an architecture implemented at the client to filter incoming messages according to the user's context.
- FIG. 4 illustrates a composite filter consisting of a hierarchy of filters for filtering incoming messages.
- FIG. 5 is a flow diagram of a process for filtering incoming messages and deciding when to present the messages based on the user's context.
- FIG. 6 illustrates a message distribution system in which an intermediary entity matches messages to intended users and distributes the messages on behalf of information sources.
- FIG. 7 is a block diagram illustrating an architecture for augmenting reality by presenting appropriate information based on a user's context.
- FIG. 8 is a block diagram illustrating additional details of the architecture for augmenting reality.
- FIG. 9 is a block diagram illustrating an architecture for enhancing gaming environments by providing appropriate information and functionality based on a user's context.
- FIG. 10 is a flow diagram of an embodiment of a Gaming routine.
- FIG. 11 is a flow diagram of an embodiment of an Augmented Reality routine.
- This disclosure pertains to techniques for filtering received information based on the user's current context in order to determine whether the information is appropriate for presentation to the user.
- the received information is unsolicited information, such as advertisements.
- an explicit, dynamic, extensible software model of a user's context such as one that represents their desires, needs, physical condition, surrounding environment, computing capabilities, and data receiving capabilities, information that is appropriate for the user can be determined.
- additional determinations are made as to how, when and/or where such appropriate information should be presented, and the information can then be presented in the appropriate determined manner.
- context information In order to use context information about the user to make appropriate determinations, such context information must be received or generated.
- various environmental aspects e.g., mental, physical, computing, data, etc.
- a current context of the user is modeled.
- such information is received from other sources that perform the monitoring and/or the modeling.
- context information can be represented in various forms, such as with a variety of context attributes (or “condition variables”) that each model a single aspect of the context (e.g., ambient temperature, current latitude, or current user task).
- context attributes are used that each have a name and at least one value, and can additionally have other properties such as uncertainty, units and timestamp.
- the context information When the context information is available, it can then be used to define a set of one or more filters to be selectively applied to incoming information, such as messages. Each filter can have different filter criteria, and a composite of multiple filters can also be used. Since the user's context is typically non-static and continually evolving, the set of filters currently in use can be updated as the context changes.
- Information that satisfies the filter criteria of the current filters is determined to be currently appropriate for presentation, although current presentation of such information may not be appropriate (e.g., current sports news may be appropriate information for a particular user, but presentation of such information may not be appropriate while the user is driving or in a business meeting).
- information that is determined to be appropriate based on the current filters is then evaluated to determine whether it should be presented to the user immediately or instead stored for later presentation.
- determinations can be made such as where (e.g., on what device) and how (e.g., via which user senses or with what degree of prominence) the information should be presented.
- the user's context can be used in making the determinations of when, where and how to present the content.
- FIG. 1 shows a system 100 in which multiple information sources 102 ( 1 ), 102 ( 2 ), . . . 102 (N) transmit information over one or more networks 104 to multiple clients 106 ( 1 ), 106 ( 2 ), . . . 106 (M).
- Information that is unsolicited by the clients is said to be “pushed” from the information sources 102 to the clients 106 , while information that is solicited or requested is said to be “pulled” by the clients.
- the information sources 102 may be implemented in a number of ways, such as a host server at a Website, an email service, a paging service, a financial quote service, a cellular communications host, a radio transmission unit, and the like.
- an information source as represented by source 102 ( 1 ), may include a content store 110 to store the information and a content server 112 to serve the content to the clients 106 .
- the information communicated from the information sources may be in any data type (e.g., text, graphics, audio, software executables, video, etc.) and contain essentially any type of subject matter.
- Examples of possible information that may be pushed to the clients include streaming media, safety bulletins, future or current event announcements, environment status (weather, traffic), local vicinity status (elevator wait time), object status (where is my bus?), executable code, object descriptors (any computer-compatible enumeration or description of sensors or peripheral devices).
- the information may be in the form of unsolicited advertisements pushed to the clients 106 from advertisers.
- the network 104 is representative of many different network types, including public networks (e.g., the Internet) and proprietary networks.
- the network may be implemented using wireless technologies (e.g., RF, microwave, cellular, etc.), wire-based technologies (e.g., cable, fiber optic, wire, etc.), or any combination. Any one of many diverse protocols and formats may be used to package data and transmit it from the source 102 to the client 106 .
- the clients 106 may be implemented in a variety of ways, including as computers, portable digital assistants (PDAs), communication devices, and the like.
- the clients are equipped with conventional mechanisms to receive the information from the network 104 , such as ports, network cards, receivers, modems, and so on. As described in greater detail below, in some embodiments some or all of the clients may be wearable computers.
- Each client in the illustrated embodiment is equipped with a Condition-Dependent Output Supplier (CDOS) system 120 that monitors the user and the user's environment and that creates and maintains a model (not shown) of the user's context (or “condition”).
- CDOS Condition-Dependent Output Supplier
- the CDOS system receives various input information, including explicit user input, sensed user information, and sensed environment information.
- one or more sensors 122 provide data to the CDOS system pertaining to the user's environment.
- Each client 106 is also equipped with a context-based information filtering system 124 that utilizes one or more filters 126 to selectively pass/block information from the information sources 102 based on the user's present context.
- the context-based information filtering system 124 may allow certain received information, such as important messages from a spouse or family member, to pass through while concurrently blocking other information.
- the information determined to be appropriate may then be presented immediately or instead stored for delayed presentation.
- FIG. 2 illustrates one suitable implementation of client 106 as a body-mounted wearable computer worn by a user 202 .
- the computer 106 includes a variety of body-worn input devices, such as a microphone 210 , a hand-held flat panel display 212 with character recognition capabilities, and various other user input devices 214 .
- Examples of other types of input devices with which a user can supply information to the computer 106 include speech recognition devices, traditional qwerty keyboards, chording keyboards, half qwerty keyboards, dual forearm keyboards, chest mounted keyboards, handwriting recognition and digital ink devices, a mouse, a track pad, a digital stylus, a finger or glove device to capture user movement, pupil tracking devices, a gyropoint, a trackball, a voice grid device, digital cameras (still and motion), and so forth.
- the computer 106 also has a variety of body-worn output devices, including the hand-held flat panel display 212 , an earpiece speaker 216 , and a head-mounted display in the form of an eyeglass-mounted display 218 .
- Other output devices 220 may also be incorporated into the computer 106 , such as a tactile display, other tactile output devices, an olfactory output device, and the like.
- the computer I 06 may also be equipped with one or more various body-worn user sensor devices 222 .
- sensors can provide information about the current physiological state of the user and about current user activities. Examples of such sensors include thermometers, sphygmometers, heart rate sensors, shiver response sensors, skin galvanometry sensors, eyelid blink sensors, pupil dilation detection sensors, EEG and EKG sensors, sensors to detect brow furrowing, blood sugar monitors, etc.
- sensors elsewhere in the near environment can provide information about the user, such as motion detector sensors (e.g., whether the user is present and is moving), badge readers, still and video cameras (including low light, infra-red, and x-ray), remote microphones, etc. These sensors can be both passive (i.e., detecting information generated external to the sensor, such as a heart beat) and active (i.e., generating a signal to obtain information, such as sonar or x-rays).
- the computer 106 may also be equipped with various environment sensor devices 224 that sense conditions of the environment surrounding the user.
- devices such as microphones or motion sensors may be able to detect whether there are other people near the user and whether the user is interacting with those people.
- Sensors can also detect environmental conditions that may affect the user, such as air thermometers or Geiger counters.
- Sensors either body-mounted or remote, can also provide information related to a wide variety of user and environment factors including location, orientation, speed, direction, distance, and proximity to other locations (e.g., GPS and differential GPS devices, orientation tracking devices, gyroscopes, altimeters, accelerometers, anemometers, pedometers, compasses, laser or optical range finders, depth gauges, sonar, etc.).
- Identity and informational sensors e.g., bar code readers, biometric scanners, laser scanners, OCR, badge readers, etc.
- remote sensors e.g., home or car alarm systems, remote camera, national weather service web page, a baby monitor, traffic sensors, etc.
- the computer 106 further includes a central computing unit 230 .
- the various inputs, outputs, and sensors are connected to the central computing unit 230 via one or more data communications interfaces 232 that may be implemented using wire-based technologies (e.g., wires, coax, fiber optic, etc.) or wireless technologies (e.g., RF, etc.).
- a receiver 234 is designed to receive incoming messages from the network 104 and to pass them to the central computing unit 230 via the data communications interfaces 232 .
- the receiver 234 may be implemented in a number of ways, including as an RF receiver, a microwave receiver, a satellite receiver, a network card, a wireless network card, a modem, and so forth.
- the central computing unit 230 includes a central processing unit (CPU) 240 , a memory 242 , and a storage device 244 .
- the memory 242 may be implemented using both volatile and non-volatile memory, such as RAM, ROM, Flash, EEPROM, disk, and so forth.
- the storage device 244 is typically implemented using non-volatile permanent memory, such as ROM, EEPROM, diskette, memory cards, and the like.
- One or more application programs 246 can be optionally stored in memory 242 and executed by the CPU 240 . These application programs generate information that may be presented to the user via one or more of the output devices.
- a CDOS system 120 is shown stored in memory 242 and executing on the processing unit 240 .
- the CDOS system 120 monitors the user and the user's environment, and creates and maintains an updated model of the current context of the user. As the user moves through different environments, the CDOS system receives various input information including explicit user input, sensed user information, and sensed environment information. The CDOS system updates the current model of the user condition, and presents output information to the user via appropriate output devices.
- a more detailed explanation of the CDOS system 120 may be found in U.S. patent application Ser. No. 09/216,193 (now U.S. Pat. No. 6,466,232), and a more detailed discussion of context attributes (or condition variables) may be found in U.S. patent application Ser. No. 09/724,902 (now U.S. Pat. No. 7,231,439).
- the context-based information filtering system 124 is also shown stored in memory 242 and executing on the processing unit 240 . It utilizes data from the modeled user context (e.g., via the CDOS system 120 ) to selectively filter information according to the user's current environment in order to determine whether the information is appropriate for presentation.
- the filtering system 124 employs one or more filters 126 to filter the information.
- the filters may be pre-constructed and stored for subsequent utilization when conditions warrant their particular use, or alternatively the filtering system 124 may construct the filters dynamically as the user's context evolves.
- each filter is stored as a distinct data structure (optionally with associated logic), while in other embodiments filters can be provided as logic based on the current context, such as one or more interacting rules provided by the filtering system or CDOS system.
- the body-mounted computer 106 may be connected to one or more networks through wired or wireless communication technologies (e.g., wireless RF, a cellular phone or modem, infrared, physical cable, a docking station, etc.).
- wired or wireless communication technologies e.g., wireless RF, a cellular phone or modem, infrared, physical cable, a docking station, etc.
- the body-mounted computer of a user could make use of output devices in a smart room, such as a television and stereo when the user is at home, if the body-mounted computer can transmit information to those devices via a wireless medium or if a cabled or docking mechanism is available to transmit the information.
- kiosks or other information devices can be installed at various locations (e.g., in airports or at tourist spots) to transmit relevant (and typically, unsolicited) information to body-mounted computers within the range of the information device.
- the body-mounted computer 106 is merely one example of a suitable client computer. There are many other implementations of client computing devices that may be used to implement the context-based information filtering system.
- client computing devices that may be used to implement the context-based information filtering system.
- the computer 106 is illustrated in FIG. 2 as containing various computing and storage resources and associated I/O devices, in other embodiments a computer 106 may act as a thin client device that receives some or all of its computing and/or storage capabilities from a remote server. Such a thin client device could consist only of one or more I/O devices coupled with a communications mechanism with which to interact with the remote server.
- computer systems 106 are merely illustrative and are not intended to limit the scope of the present invention. Such computer systems may be connected to other devices that are not illustrated, including through one or more networks such as the Internet or via the World Wide Web (WWW).
- WWW World Wide Web
- the functionality provided by the illustrated components may in some embodiments be combined in fewer components or distributed in additional components.
- the functionality of some of the illustrated components may not be provided and/or other additional functionality may be available.
- a “client” or “server” computing device may comprise any combination of hardware or software that can interact, including computers, network devices, internet appliances, PDAs, wireless phones, pagers, electronic organizers, television-based systems and various other consumer products that include inter-communication capabilities. Accordingly, the present invention may be practiced with other computer system configurations.
- FIG. 3 illustrates one exemplary architecture 300 in which the context-based information filtering system 124 may be implemented.
- the architecture includes several functional components that filter information (e.g., unsolicited information such as advertisements) based on the user's context before allowing that information to be presented to the user.
- filter information e.g., unsolicited information such as advertisements
- incoming messages are received at a Receiver 234 from a communications network.
- the Receiver is a hardware device, while in other embodiments the Receiver could be an application program such as a Web browser.
- Messages can also be computer generated (e.g., from an application program), either remotely or locally. While the illustrated embodiment discusses the analysis of incoming messages, other information that is less structured than messages can also be filtered in a similar manner, such as ambient conversations or visual information of an objectionable nature.
- the context-based information filtering system 124 applies one or more filters 126 to incoming messages 302 .
- the filters 126 may be designed and stored as separate from the filtering system or instead integrated within the system. Moreover, the filters may reside at the client or instead be remote from the client, such as in the distributed system described below with respect to FIG. 6 .
- Individual filters may be static in that they are pre-configured for particular usage and stored in the client's computer memory for retrieval by the filtering system 124 . Alternatively, individual filters may be generated dynamically by the filtering system 124 as user conditions dictate, such as by applying logic associated with the filtering system or the CDOS system.
- the filtering system 124 may generate a temporary filter that blocks all but the highest important incoming messages.
- a temporary filter may not be stored as a distinct data structure, but instead reflect processing logic/functionality provided by one of the components.
- the filters are designed with two competing goals in mind: (1) precision-receiving only messages that are appropriate to the desire, situation and needs of the user, and (2) completeness-making sure that nothing of interest is missed.
- the filters 126 can also be general or very specific. For example, one filter may be configured to accept advertisements from soft-drink advertisers, while another filter may be configured to block diet soft-drink advertisements. More specifically, a filter may accept advertisements for a specific cola, but prevent advertisements from a competitive cola product. Thus, if the user only drinks Coca-Cola® brand cola, an advertiser may pay for access to users who never purchase a Pepsi-Cola® brand cola and those constraints could be configured into a specific filter.
- That filter may also specify an incentive level that an advertiser of a Pepsi-Cola® brand product may need to pay or otherwise provide in order to purchase the privilege of presenting a Pepsi-Cola® brand advertisement to the user who typically only drinks Coca-Cola® brand cola.
- the incentive level may even be variable for different users.
- the advertising company may provide coupons to the user or pay the user for simply viewing the advertisement.
- Messages that survive the filters 126 are either presented to the user at that time or stored in the client computer for delayed presentation. This is represented by accepted message 304 that has survived the filters 124 and is being forwarded for the user's attention.
- the illustrated embodiment of the context-based information filtering system 124 includes a characterization module 310 that attempts to characterize the user's current context and apply the appropriate filters 126 to the incoming messages 302 received at receiver 234 .
- the characterization module 310 also provides information about the user's current context that facilitates the determination of whether the acceptable message(s) should be stored or presented immediately to the user. Whether the messages received at receiver 234 are first passed to the characterization module 310 or to the filters 126 is a matter of design choice. The messages may be first passed to the characterization module 310 and then subjected to the various filters 126 (as shown in FIG. 3 ). Alternatively, the filters selected by the filtering system may intercept and filter the messages before they are passed onto the characterization module 310 .
- the context-based information filtering system 124 can be configured to characterize and filter any information that is analyzable by a computing device. The precision of the filtering is in part determined by how much information about the information is available. At a minimum, the system can use characteristics that can be inferred from the information itself, such as message characteristics for received messages. Examples of such message characteristics include the following:
- message-characterizing information includes the following:
- the information source may add any additional kind of characterizing metadata to the messages, and such metadata can be used to determine message appropriateness.
- metadata include the following:
- the characterization module 310 characterizes the user's context based on information received from a user context module 312 .
- Information pertaining to the user's environment is captured and passed to the user context module 312 for analysis.
- the user context module 312 creates, maintains, and updates one or more models pertaining to the user's context that integrate multiple areas of a human's computerized environments, such as physical, mental, computing, and data.
- the user context module 312 gathers information on (1) the user's physical environment from module 314 , (2) the user's mental environment from module 316 , (3) the user's computing environment from module 318 , and (4) the user's data environment from module 320 .
- Various sensors 322 e.g., environment sensors 224 , user sensors 222 , etc. monitor the environment parameters and provide data to the modules 314 - 320 .
- the physical environment module 314 generates information pertaining to the user's present location (e.g., geographical, relative to a structure such as a building, etc.), the current time, and surrounding objects within a perceivable proximity that may interfere or distract the user from focusing attention on the incoming messages.
- Other possible information related to the physical environs include people, user's body state, or anything that can be externally sensed by computer-connected transducers or inferred by examining other parts of the context model.
- a user with a wearable computer may be traversing through a structure that is very dark and cold and that requires full visual and auditory senses on the surrounding objects within the structure. While in this state, the user most likely does not want to receive an advertisement for a sale on sunglasses.
- the mental environment module 316 generates information pertaining to the user's likely intentions, their preferences, and their level and quality of attention. Other information may include mood, topic of conversation, or any self-characterization that is meaningful to the user, provided by an observer, or inferred by examining other parts of the context model. For instance, the mental environment module 316 may use data from a pupil tracking sensor or head orientation sensor to identify a direction or object on which the user is focused. If the user appears to be focused on administrative items presented on a heads-up display, then the user context module 312 might determine that it is safe to present a message. Another example is to use preference metrics programmed by the user to differentiate among the urgency of certain incoming messages. For instance, the user might specify that all messages from his family are highly important, whereas all messages from a book retailer are marked with the lowest level of importance. Filters could then filter messages based on these defined importance levels.
- the computing environment module 318 generates information pertaining to the computing capabilities of the client, including available I/O devices (e.g., keyboards, buttons, microphones, cursor controllers (such as rolling, pointing, pressing, bending, turning, twisting, switching, rubbing, zipping controllers), displays, speakers, pressure devices, etc.), connectivity (e.g., amount of bandwidth, security level, cost, strength, protocol, quality, media type, schedule, etc.), processing capabilities, available storage space, and anything else that the local and remote computing environment can self-characterize.
- the data environment 320 generates information pertaining to the data and software resources on the client computer, including the communication resources, applications, operating system, and data.
- the user context module 312 takes the information generated by the environment modules 314 - 320 and generates a cohesive set of user conditions based on one or more context models.
- the model(s) can be broad, dynamic, explicit, and capable of being understood by arbitrary software modules.
- the set of conditions are provided to the characterization module 310 which is able to comprehend those conditions.
- the architecture could support a dictionary that may be accessed by any module wanting to understand the meaning of a specific attribute or condition produced by the models.
- the characterization module 310 uses the conditions to identify a set of one or more filters to apply to the incoming messages 302 .
- the set of filters is dynamic and can be changed as the user's conditions change. New filters are added or created, while others are dropped as the user's context evolves.
- each filter could specify a set of one or more context model attributes, and include for each of the specified attributes one or more possible values for the attribute. Such a filter would be selected as matching the current modeled context (and thus used to apply to incoming messages) only if all the specified attributes have current values in the modeled context that are one of their possible values.
- each specified attribute could includes an indication of whether it is required, and in such embodiments the filter can still match the current context even if the current values for non-required attributes do not match the specified possible values. Filters could also specify inter-attribute logic.
- multiple themes can also be defined for a user and used to present appropriate information and functionality.
- filters used to analyze incoming messages or other information can each be associated with one or more defined themes, and the filters selected for current use can be one or more of the filters that are associated with one or more of the themes that are determined to match the current context.
- the filters 126 each specify criteria to be matched against the content in the incoming messages 302 .
- the messages are selectively allowed or blocked depending on whether the content matches the filter criteria.
- the messages themselves may be constructed with only the content (e.g., product or service information in an advertisement), and if so the filter or characterization module parses the message for key content to match against the filter criteria.
- the message may be a text or radio message that touts a particular product, and the filter or characterization module could parse the message using a text parser or a speech recognition module to identify the product name, type, cost, and so forth.
- the information source may supply metadata to aid the filtering and thus avoid the parsing of the messages.
- the source-provided metadata can further describe the most appropriate use of the message by characterizing the intended or preferred message recipient's by including target context attribute value ranges.
- the message contents or metadata is then compared to the filter criteria of the currently selected filters.
- the filters can act as a proxy for the user's current situation and preferences in order to determine whether messages are appropriate, and thus should be blocked or kept.
- the characterization module 310 may further examine the context data to determine whether to save the messages for later or pass them onto the user immediately. Message filtering can thereby be accurately and generally based on context parameters that model and evaluate whether messages are appropriate under a set of circumstances.
- the characterization module 310 may utilize various characterization models to implement the filter comparisons.
- One way to characterize messages is to assign a numeric value to a set of message attributes and then compare that numeric value to a table of minimum necessary values or combination of values in order to determine whether a particular message is suitable under the circumstances.
- An example set of message attributes includes the following:
- the user context module 312 determines whether the user is thirsty based on various environment data and physiological state information. For example, the user's temperature, the surrounding temperature and humidity, and the user's past behaviors can all be used to determine whether the user is thirsty. In addition, other context information can also be employed to determine whether the advertisement is appropriate for presentation (e.g., an indicated or learned preference that the user does not want to receive advertisements while they are exercising).
- the various relevant context information is passed to the characterization module 310 , which then applies one or more filters suitable for controlling whether a cooling drink advertisement should be presented to the user at this current time.
- the filtering system 124 may delay presentation of an acceptable message that matches the filter criteria until a filter 124 or the characterization module 310 determines that the user context matches the presentation requirements of the message.
- the user's current context suggests that the user is not able to give attention to incoming messages. For instance, the user is driving a car and is not able to view the message at this particular time.
- the user receives an incoming message that is of interest to the user (e.g., a one-time sale on travel tickets to a desired destination).
- the filters and characterization module allow the message to successfully be received, but the user's context determines that the message cannot be displayed yet.
- the filtering system 124 accepts the message, but delays presentation until the user's context has changed (e.g., stopped driving) and the user is in a better condition to receive the advertisement.
- the context finally changes or when the user specifically notifies the characterization module to present the message, the user can experience the message without interruption or distraction.
- the filtering system 124 may employ a multi-tier filtering process using a hierarchy of multiple filters.
- the filters may be directed to different sets or categories of messages, with the collection of filters effectively finding a subset of messages acceptable to each of the filters.
- the characterization module can construct a filter composite as conditions warrant to effectively and dynamically produce unique filters as the user's context dictates.
- filters could additionally specify inter-filter information that assists in determinations of whether two or filters are compatible.
- inter-filter information could indicate a directional relationship, such as one filter providing an output indication that is used as input as another filter, or merely that two filters are not inconsistent (e.g., a first filter that prohibits advertisements about specified products would be inconsistent with a second filter that indicates a desire to receive advertisements about those same specified products).
- information about categories or groups of filters, and/or of hierarchical relationships between filters could also be used when dynamically generating multi-tier filters. For example, if a first filter selects a group of information as appropriate that is a proper subset of the group of information selected by a second filter (e.g., a second filter that selects any drink advertisement as appropriate and a first filter that selects only diet soda drink advertisements as appropriate), use of the second filter in conjunction with the first filter would be redundant—this type of inter-filter relationship may be ascertainable based on a hierarchical relationship between the filters.
- a second filter e.g., a second filter that selects any drink advertisement as appropriate and a first filter that selects only diet soda drink advertisements as appropriate
- FIG. 4 illustrates a filter composite 400 that is made up of four filters 402 , 404 , 406 , and 408 .
- the first filter 402 might specify generic characteristics of suitable messages, such as the product/service characteristics for advertisements.
- the second filter 404 might specify user characteristics and preferences. For instance, the user might only want to receive advertisements while running errands.
- the third filter 406 might describe certain user situations in which messages are appropriate. In this example, the user might only want to see or hear advertisements for products when proximally near a store.
- the fourth filter 408 might pertain to the client computer capabilities. For instance, the client may be a communication device that can only receive text messages, as opposed to graphical or video messages. A message satisfying all the filter criteria of the filter composite 400 is then stored and/or presented to the user.
- FIG. 5 shows an example process 500 for filtering messages according to a user's context.
- the process 500 may be implemented in software, or in a combination of hardware and software.
- the operations illustrated as blocks in FIG. 5 may represent computer-executable instructions that, when executed, direct the system to
- messages e.g., unsolicited messages
- the context-based information filtering system 124 selects one or more filters 126 to apply to the incoming messages.
- the characterization module 310 of the filtering system 124 is frequently updating the set of filter(s) 126 to use for incoming messages according to the environment conditions of the user.
- the current set of filter(s) 126 is applied to the messages (block 506 ).
- the characterization module 310 determines whether the messages match the filter criteria. If the messages fail to match the criteria (i.e., the “No” branch from block 508 ), the messages are discarded (block 510 ), or could instead be stored for later consideration (e.g., explicit user review or more detailed automated processing). Alternatively, if the messages match the criteria (i.e., the “Yes” branch from block 508 ), the characterization module 310 evaluates the user's current context to decide whether the user should currently experience the acceptable messages (block 512 ).
- the characterization module 310 determines, based on this evaluation of the user's context, whether to currently present the message. If the user context indicates that it is appropriate to present the message to the user (e.g., the user an agreeable state to review the messages), the characterization module 310 forwards the message(s) for immediate presentation (block 516 ). Presentation may be in the form of displaying a text message, rendering a graphical or video message, playing an audio message, releasing an aroma of a olfactory-enabled message, and the like.
- the characterization module 310 stores the message(s) for later presentation (block 518 ). When messages are stored, the characterization module 310 can continue to monitor the user context for any changes that might allow presentation of the stored messages. The characterization module can also in some embodiments provide notification to the user to inform them that one or more messages are available for presentation (e.g., an indicator shown on the display or a subtle background sound that is played), thus allowing the user to explicitly select the messages for presentation when the user desires.
- the content may be presented to the user.
- Content may be displayed, audibly played, released as an odor, output as a tactile feedback, and the like.
- the choice of a suitable presentation mechanism may be determined based on the user's context. That is, after the content passes the filters and is determined to be presentable at this moment to the user, the characterization module 310 might still further decide how best to present the information. For example, a user who is preoccupied watching objects or their surroundings may not wish to see any messages, but might be inclined to listen to them. Thus, the characterization module might determine to play any audio messages that might be ready for presentation. In other situations, the user might be more inclined to see the information on a display or watch a monochrome.
- FIG. 6 illustrates an exemplary message distribution system 600 in which an intermediary entity 602 acts as a distributor of messages on behalf of an information source.
- This system 600 is particularly suited for the commercial advertising market in which the information sources consist of advertisers 604 that are attempting to locate users who might be interested in their products and services.
- the system 600 supports a revenue model for deriving revenue based on the service provided by the entity 602 .
- the revenue model includes a variety of possible fees for different levels of service.
- the entity 602 performs services related to matching messages from information sources with suitable users who might be interested in the messages.
- the entity 602 maintains a registry 610 of interest-rules that are collected and maintained on behalf of individual users. The rules are correlated with the users to represent, for a given user, a composite of the user's desires, preferences, past behaviors, presentation surfaces capabilities, user demographics, and so forth.
- the entity 602 also maintains a message store 612 to store messages (e.g., advertisements) received from the advertisers.
- a match module 614 compares the messages in the message store 612 to the interest rules in registry 610 to identify users who might be interested in selected messages.
- Each client 620 is equipped with an interest module 622 that generates rules indicating which items may be of interest.
- the interest module 622 creates these rules based on specific user-defined preferences 624 and traits/characteristics gathered by the characterization module 310 .
- the client 620 occasionally submits the rules for that user to the entity 602 for storage in the registry 610 .
- advertisers When advertisers look for interested consumers, they can send their advertisement (optionally with metadata) to the entity 602 .
- the advertiser may be asked to pay a subscription or handling fee to the entity for access to likely consumers, and in some embodiments the intermediary entity provides a payment module to facilitate the exchange of payment between the intermediary, the clients, and the information sources.
- the entity 602 stores the received advertisement in the message store 612 , and then invokes the match module 614 to compare the advertisement with the rules in the interest-rule registry 610 . If there is a match, this indicates that a particular user might be interested in the advertisement. There may be a fee associated with matching the message to various users based on their interest rules.
- the entity 602 delivers the message to the user's client 620 .
- the client-side characterization module (not shown in FIG. 6 ) then determines, based on the user context, whether to present the message or store it for later presentation.
- the filter mechanism could rely on the intermediary to provide information that is appropriate to the current context, while in other embodiments the filter mechanism could perform additional processing using current filters to determine whether to accept delivered messages. If the message is presented to the user, the advertiser may be asked to compensate the user and/or the entity 602 . If the advertiser sells something to the user, the advertiser may be asked to provide an additional fee to the entity 602 for locating a buyer.
- the entity 602 may be configured to perform other services that are beneficial to the users.
- the entity 602 may act, for example, as a trusted agent that examines messages submitted from the information sources to determine whether the messages adhere to acceptable standards of message characterization.
- the entity could be responsible for evaluating message format, structure, content, metadata, and the like to determine conformance with desired standards.
- the entity 602 can certify messages as being in compliance with these standards for the benefit of the user filters. Additionally, the entity could certify and verify information sources, to facilitate swift examination of messages from certified sources.
- Certified messages or messages from certified sources may be issued a secure certificate to indicate to the user filters that the message metadata can be trusted to accurately characterize the message, and to ensure that the filter will recognize the certificate's meaning.
- the message filter can respond to the secure certificate by automatically assigning a higher confidence rating to the message.
- the interest rules for the user can be generated in a variety of ways.
- One example technique for generating such interest rules is described in greater detail in U.S. patent application Ser. No. 09/824,900, filed Apr. 2, 2001 and entitled “Soliciting Information Based On A Computer User's Context” (now U.S. Pat. No. 6,968,333).
- other techniques for generating themes and theme-related information are described in greater detail in U.S. patent application Ser. No. 09/825,159, filed Apr. 2, 2001 and entitled “Thematic Response To A Computer User's Context, Such As By A Wearable Personal Computer” (now U.S. Pat. No. 7,076,737).
- Similar techniques to those disclosed for generating user interest rules and theme-related information can also be used to allow users to create and modify filters for use in analyzing received information.
- such sources could also supply filters to be distributed to users via the intermediary entity or instead directly to users.
- filters could be distributed as part of a business model, such as by selling the filters to users.
- the filters could be distributed for the convenience or benefit of the information sources (e.g., a product/service provider or related advertiser providing a filter that selects as appropriate only those advertisements that are for those products or services), and in some embodiments the information sources could compensate the users for accepting and/or using the provided filters.
- filters could also be provided to users based on a group to which the user belongs (e.g., filters distributed by an employer to all employees or to employees meeting specified criteria) and/or based on a geographic location of the user.
- filters are associated with themes (and are thus one type of theme-related information for those themes), and can be distributed in conjunction with the distribution of those themes.
- users can explicitly indicate appropriate filters. For example, in response to receiving information that was determined by automatically selected filters to be appropriate, the user could indicate that the information was instead inappropriate (or was presented in an inappropriate manner). The user could also indicate that one or more of the automatically selected filters should not have been selected and/or that another filter that was not selected should have been selected. In this way the user can explicitly adjust the information that is determined to be appropriate.
- the system can use automated learning techniques to enhance future selections and use of filters.
- a filtering system can be continually customized to a particular user, thus enhancing the usefulness of the filtering. Additional details about the use of such automated learning techniques are provided in U.S. patent application Ser. No. 09/825,152, filed Apr. 2, 2001 and entitled “Contextual Responses Based On Automated Learning Techniques” (now U.S. Pat. No. 6,842,877), which is a continuation-in-part of U.S. patent application Ser. No. 09/216,193 (now U.S. Pat. No.
- context information can more generally be used in some embodiments to control the sharing of a user's context or other computer-controlled information with other users and/or computing devices.
- Such sharing of information can be conceptualized as the filtering of outgoing information (rather than incoming information), and arbitrary groups of context attributes can be specified as constraints on the sharing. For example, based on the user's modeled location, physical activity, presence of particular other people or objects nearby, and emotional state, it may be determined that certain groups of user context information will be made available to people in the user's family, that other groups of user context information and other stored information will be made available to co-workers, and that no one other than the user may have access to yet other groups of information.
- information sharing filters will be defined and used in a similar manner to that described above for received information filters.
- existing mechanisms for grouping or using groups of context attributes can be extended to include information sharing filter information, such as defined themes or received information filters.
- tiers of information sharing can be selected in various ways.
- One example of tiers of information include information that is available to the user themselves, to other users in one or more groups or categories to which the user belongs, to users in other groups or categories to which the user does not belong but has a defined relationship, and to everyone.
- tiers can be expanded or contracted in various situations—for example, as noted above, a user may belong to many groups (e.g., family, club, work, etc.) that each have different permission schemes.
- the other groups can include competitors, whether individuals or teams, and additional tiers could be added, such as for non-player spectators or for game creators/administrators.
- other groups may include partners, suppliers, customers, etc.
- Such permission tiers can also be used when receiving information from others that are employing such information sharing filters, such as to receive team information from other members of your team in a multi-player game setting, whether the information is aggregated (e.g., by a third party, such as a team leader) or specific to each of the other members.
- Permission information can also be specified in various ways. Since a context attribute can be shared as a data item, permission information related to that context attribute can be specified with an explicit characterization of permission and/or an associated permission algorithm (e.g., as an extended property of that context attribute), or the value of the context attribute can instead be treated as any other information that potentially may be distributed. In particular, any such information can be characterized with one or more properties (e.g., based on the information content or other related information) as to who/what/when/where/how/why that information can be shared. For example, it may be desirable to have all context information and other information that is related to my current and historic physical health be characterized as being available to medical professionals providing assistance during a medical emergency. In addition, in some embodiments a user may not have authority to examine and/or modify the permission scheme or information associated with their context attributes or other information. An example of this may be in an institutional setting where the system is provided for a purpose that is controlled by the institution.
- techniques for determining various details of the user's current context e.g., the physical location of the user in the real world and the user's current mood
- interacting with the user in various ways based on that context information could be provided directly by gaming applications designed to implement the techniques, while in other embodiments the techniques could be added to existing games by an external component (e.g., provided by a third-party).
- gaming applications can be enhanced is by augmenting the user's reality (i.e., integrating computer-provided information into a user's perception of their physical reality) via the 110 devices of the user's computer.
- the enhanced 110 device functionality that is typically available on wearable computing devices is one reason that such wearable devices can in some situations provide enhanced functionality not available to standard computing devices that lack the I/O device functionality.
- the ability to augment reality in this manner provides various benefits in both gaming and non-gaming applications.
- the game-related information (and thus the corresponding gameplay) can be layered on top of real life, and the game player's perceptions can be enhanced by the wearable computer.
- the real world can be brought into the game in various ways. For example, virtual objects can be made visible to the player (objects, scenes, matte painting, etc.) but not to other nearby non-players.
- avatars can similarly be presented, and such avatars can additionally react to the user's context (e.g., presentation of an avatar can be based on the player's physiological state, such as displaying an avatar in a different manner if the user is startled or afraid).
- presentation of an avatar can be based on the player's physiological state, such as displaying an avatar in a different manner if the user is startled or afraid.
- An avatar representing a player can also be modified based on the context of the player, such as making the avatar more visible if the person is scared or if the person or avatar is moving too fast.
- enhanced gaming (or non-gaming) functionality using augmented reality include displaying virtual information, such as virtual footprints that reveal the passage of a person through an area so as to allow tracking/trailing someone in the game or in real life or to allow the user to retrace their own path.
- virtual graffiti tags i.e., computer-generated markings visible only to participants in the gaming system
- can be displayed, providing a variety of possible games and uses e.g., playing ‘Tag’, or playing a virtual ‘Go’ game played in any agreed boundary, such as by using city blocks as a playing game and seeing the Go pieces from an above-city view, etc.
- an entertainment or training application can use a log of a route of a well-informed person as a guide to others, and information such as the guide's comments or recommendations to supplemental information can also be presented (e.g., as iconographic controls within the route, or as audio information when the location is achieved).
- Information such as the guide's comments or recommendations to supplemental information can also be presented (e.g., as iconographic controls within the route, or as audio information when the location is achieved).
- Individuals and institutions can use individual or aggregates of individual paths to determine used routes, which can assist in identifying areas of interest and congestion.
- a “Public Scrapbook” can be created over time.
- a user can easily determine if they have been somewhere before (e.g., to avoid being lost or to find a way through complex terrain).
- the ability of the computing devices of the various players to communicate also provides enhanced functionality.
- distributed observations can be provided by a system of connected players, such as by augmenting a player's senses with information from teammates or allowing a player to hack into other team's members and experience their environments.
- Remote tele-presence sensing can also be provided, such as providing a view to a user of a lookout in a tower.
- dynamic aggregation of players can be used to determine if there are enough people available to play a game at a given moment, either locally or worldwide depending on the nature of the game.
- the use of context information about such other players allows for the choosing of opponents and team members based on the capabilities, interests, or other arbitrary characteristics of the players.
- games rules e.g., defaults
- augmented reality allows games to react to real world events, such as by determining player positions in the game via the physical location of the user (e.g., via available locating devices such as GPS, EGPS, etc.).
- the context attributes that are used to characterize a user's virtual world could be based on the context attributes from the physical world—thus, a computer-generated person or object shown in an augmented reality context could have the same characteristics as a real person.
- One application of such attribute mapping would be the control of a digital representation of a user by basing its appearance in part on the user's context model, thus allowing the digital representation to respond to changes in the user's physical world.
- the corresponding avatar's strength or speed could similarly be reduced, or an avatar's posture could change along with that of the user.
- a context attribute such as user fatigue can be measured in various ways (e.g., the speed of user movement, stooping, speech slurring, etc.)
- other game-provided functionality can also be altered in response to changes in a user's context.
- the capabilities provided to a user could be varied based on the skill level of the user.
- games can be dynamically optimized during play based on the changing user context (e.g., changing skill level or tendencies of the player that are learned by the game), whether automatically by the game or by a game organizer.
- Games can also react to or incorporate the real word in other ways.
- users' movements can be incorporated fully into the game, and are not limited to the constraints of a specialized input device such as a Dataglove or a device that senses hand movements immediately proximate to the device (e.g., via analysis of video image from a camera that can see a user's arm movements, or via motion sensing devices on various limbs of the user).
- Tracking and using such movements allows fighting games to include more than just hand-eye coordination, and can allow simulated use and movement of virtual weapons (e.g., guns and sabers) or virtual body parts (e.g., playing karate against the computer).
- virtual weapons e.g., guns and sabers
- virtual body parts e.g., playing karate against the computer.
- augmented reality allows the gaming experience to impact the real world in various ways. For example, if a user is wearing a goggle display device or a computer-controlled brace on a limb, the player's vision could be occluded or the use of the limb restricted based on events that occur in the game.
- output devices such as goggle display devices and earpiece speakers/noise-canceling devices, the presence or appearance of a player can be altered for other players.
- new senses can be generated and supplied to the player, and existing senses can be enhanced or remapped.
- a “Hide & Seek” game is more challenging if the players have infrared or night-vision capabilities, and sonar allows a user to see behind themselves.
- augmented hearing or sight can provide new abilities to a user, or information (e.g., a ringing sound) could be generated to represent an entirely new sense (e.g., the ability to sense the nearby presence of Evil).
- an “Assassin” game could be played by any group of people with wearable computing devices at any time (e.g., strangers at an airport dynamically identify each other as interested in playing and then begin playing using virtual weapons).
- player appearance can be altered with appropriate output devices, and additional information can be provided via linked gaming computing devices (e.g., an Assassin is within 100 yards).
- Team Fortress could similarly be played in the real world, allowing real-time collaboration between players, as could “Virtual Tennis” between two players anywhere in the world.
- “Rally” a scavenger hunt using player context (e.g., current location) to generate clues, and virtual gambling that is constantly available (whether individual or group games) are other examples.
- new capabilities could be provided, such as an ability to plant virtual sensors that detect other game players or to plant virtual landmines that reveal players when triggered (e.g., visually augmenting the revealed player's presentation and/or providing location and other context information about the player to other players).
- sensors could be provided in physical devices, such as a Bluetooth-enabled golf ball that assists users in recovering lost balls.
- various mental user context information can be detected (e.g., via choices signaled by Hz on-screen-frequency-selection and/or via biofeedback), games could react to such information.
- FIG. 9 is a block diagram illustrating an architecture for enhancing gaming environments by providing appropriate information and functionality based on a user's context. As is shown, various components execute in memory of a user's gaming computing device, including one or more game applications 938 . Various optional game enhancement components 941 - 949 are also illustrated, although those skilled in the art will appreciate that in alternate embodiments only some of the components may be present. In addition, in other embodiments the game applications themselves will incorporate the desired enhancement functionalities. While the illustrated embodiment also shows a received information filtering component 934 , information sharing component 936 , and context modeler component 932 executing in memory, in other embodiments some or all of these components may not be present. The information filtering and sharing components, as well as various of the game enhancement components, can communicate with various other computing devices as illustrated.
- FIG. 10 is a flow diagram of an embodiment of a Gaming routine.
- the routine provides various enhanced gaming functionality by using context information of the user, as is illustrated and is described elsewhere.
- context information can provide a variety of types of game enhancements.
- relevant types of context information include the following:
- attribute permission schemes that indicate the scope of information to be shared. Attributes can also characterize or identify the different groups of users to which the permission scopes will apply. For instances, different group scopes can include the following: the player (they might be able to see all of their attributes, or instead some may be hidden or provide false information during some games), the player's team (they made be able to see some/all of their teammates, and aggregate team attributes), the game's organizers and officials (they could see all players attributes, for example), the game's commentators (they could see some/all team and player attributes), and the game's audience (they could see some/all team and player attributes).
- context information can indicate when and how to map electromagnetic spectrum frequencies to human perceivable frequencies (UV, IR), sound, pressure, etc.
- Each spectrum frequency could additionally be mapped in a variety of ways. For example, with respect to sound, the mapping could provide example functionalities as indicated in the following list:
- a computing device could provide additional sound-related functionalities, such as triggering notifications or functionality when certain conditions are met (e.g., when siren occurs the audio is lowered, a SID monitor, detect when engine sound deviates from normal, a dangerous volume monitor, etc.). Sounds could also be automatically identified, such as by identifying a human speaker based on voice, a fire truck or police car, friendly versus enemy fire, etc. Sounds can additionally be characterized in various ways, such as to determine whether the gun fire is aimed in my direction, whether the fire truck is coming toward me, whether that bird call was from a real bird, how far away was that twig snap, etc.
- Augmenting reality is not limited to adding or transforming indicated, measured or inferred data—instead, it can also include the blocking of real-world stimuli.
- the portion of a transparent display through which the radiation is passing can be made opaque, thereby protecting the user's eyes.
- audio noise canceling algorithms can be used to protect hearing.
- the system can also obscure undesirable options, such as sub-optimal routes when driving at high speed in an unconstrained terrain (like desert). For workers who are be visually distracted by their environment (e.g., by people in adjoining cubicles), non-work related stimuli could be obscured.
- computer controls can be hidden based on the context as an alternate way to give prominence to something in the real world (i.e., by obscuring less relevant information).
- the system could eliminate incorrect choices over time to assist a user in identifying the correct choices and judging their mastery of the task.
- a temporary or permanent loss of perception can be provided during a game (e.g., when a player has been successfully attacked).
- it is not just senses that can be modified, but also physical capabilities or cognitive ability (e.g., there can be less game or context information or computing capabilities made available in order to simulate the loss of personal or equipment function).
- FIG. 11 is a flow diagram of an embodiment of an Augmented Reality routine.
- the routine augments real world information available to a user with virtual information based on the user's context, as is illustrated and is described elsewhere.
- augmented reality involves presenting virtual information in conjunction with real world information that is available to the user.
- existing technology is often unable to dynamically integrate virtual images with the real world without hardware clues.
- Maintaining the overlaying, or visual mapping, of virtual objects on top of real-world objects is known as registration.
- registration is superimposing a virtual image of a wire over the real-world view of the wire, and having that virtual wire remain properly associated with the real wire while the user's head may be moving.
- Technology can perform this by adding visual clues to the hardware, such as dots on the circuit board containing the wire.
- Another example of the difficulty in managing the overlay of virtual info onto the real world is the difficulty formatting computer controls without conflict with viewing the real world.
- some embodiments of the invention include a context-aware system that models the user, and uses this model to present virtual information on a display in a way that it corresponds to and enhances the user's view of the real world.
- the system displays information to the user in visual layers.
- a constellation layer that displays constellations in the sky based on the portion of the real-world sky that the user is viewing. As the user's view of the night sky changes, the system shifts the displayed virtual constellation information with the visible stars. This embodiment is also able to calculate and display the constellation layer during the day based on the user's location and view of the sky.
- This constellation information can be organized in a virtual layer that provides the user ease-of-use controls, including the ability to activate or deactivate the display of constellation information as a layer of information.
- the system groups various categories of computer-presented information related to the commonality of the information.
- the user chooses the groups. These groups are presented to the user as visual layers, and these layers of grouped information can be visually controlled (e.g., turned off, or visually enhanced, reduced) by controlling the transparency of the layer.
- Another embodiment presents information about nearby objects to the user in a manner that is synchronized with the real world surroundings.
- This information can be displayed in a variety of ways using this layering invention of mapping virtual information with the real-world view.
- One example involves enhancing the display of ATMs to a user, such as via a layer showing streets and ATM locations or a layer that displays ATMs near the user. Once the user has found an ATM, the system could turn off the layer automatically, or instead (e.g., based on the user's configuration of the behavior) could simply allow the user to turn off the layer.
- Another embodiment displays a layer of information, on top of the real-world view, that shows information representing the path the user traveled between different points of interest.
- Possible visual clues or “bread crumbs” could be any kind of visual image, like a dashed line, dots or footprints, to represent the route the user traveled.
- One example involves a user searching a parking garage for a lost car. If the user cannot remember where the car is parked and is searching the parking garage, the system can trace the search-route and help the user avoid searching the same locations by displaying that route.
- the user could turn on that layer of information and follow the virtual trail as it displays the information to the user in real-time, thus leading the user directly back to the parked vehicle.
- This information could also be displayed as a bird's-eye view, such as by showing the path of the user relative to a map of the garage.
- Another embodiment displays route information as a bird's-eye view by showing a path relative to a map.
- This information is presented in overlaid, transparent, layers of information, and can include streets, hotels and other similar information related to a trip.
- the labeling and selection of a particular layer can be provided to the user in a variety of methods.
- One example provides labeled tabs, such as those on hanging folders, that can be selected by the user.
- the system can accomplish the presenting of virtual information on top of real-world information by various means.
- Three main embodiments include tracking head positions, tracking eye positions, and real world pattern recognition.
- the system can also use a combination of these aspects to obtain sufficient information.
- the head positions can be tracked by a variety of means. Three of these are inertial sensors mounted on the user's head, strain gauges, and environmental tracking of the person. Inertial sensors worn by the user can provide information to the system and help it determine the real-world view of the user.
- An example of inertial sensors include jewelry that detects the turns of a user's head. Strain gauges (e.g., embedded in a hat or the neck of clothing) measure two axes: left and right, and up and down.
- the environment can also provide information to the system regarding the user's head and focus, such as via pattern-matching information of the user's head. This can occur from a camera watching head movements, like in a kiosk or other such booth, or any camera that can provide information about the user.
- Environmental sensors can also perform triangulation based on one or more beacons transmitting information about the user's head and eyes.
- the sensors of a room or a car can similarly triangulate information about the user and present that information to the system for further use in determining the user's view of the real-world.
- the reverse mechanism also works in which the environment broadcasts information about location (or distance from one the sensors in the environment), such that the system in that embodiment of the invention can perform the calculations without needing to broadcast information about the user.
- the user's system can also track the eye positions of the user for use in determining the user's view of the real world, which can be used by the system to integrate the presentation of virtual information with the user's view of the real world.
- Another embodiment involves the system performing pattern recognition of the real world.
- the system's software dynamically detects the user's view of the real world and incorporates that information when the system determines where to display the virtual objects such that they remain integrated while the user moves about the real world.
- augmented reality systems are typically designed as tools to show to the user, in an enhanced way, spatial relationships between the virtual computer-generated world and the real world. They are not designed as new means to experience the world where the computer is simultaneously experiencing the world with the user and supplementing the user's experience with information the computer holds or determines and manifesting behavior in a fashion that is integrated with the user's experience of reality. Thus, what is missing in such existing systems is that they do not incorporate an extensible context model of the user. Utilizing a context model allows more complete integration—basing augmented reality on context awareness allows the interaction to become more appropriate and the content dynamically adapts appropriately.
- context information as part of an augmented reality system allows the integration of virtual information with real world information in such a manner that the computer does not merely activate output devices that can be directly perceived by the user, but instead the computer-generated information is shown in meaningful relationship to the perception of real-world information.
- a computer-generated name tag to be augmented reality in the sense it is used in this disclosure, it would need to appear to the user to be shown associated with the appropriate person.
- some embodiments include some or all of the following components in order to provide augmented reality that is enhanced with context information.
- FIG. 7 is a block diagram illustrating an architecture for augmenting reality by presenting appropriate information based on a user's context. Various information is illustrated, as is described in greater detail below.
- the user maintains a bi-directional dialog with the computing environment via input and output devices, such as via gestures and utterances that are intended to convey intention to the computer, and generates context data that can include not only the gestures and utterances but also measurements, observations, narrations, third-party commentary, etc.
- FIG. 8 is a block diagram illustrating additional details of the architecture for augmenting reality, with the focus being on primary data flow rather than control information.
- the Presentation Logic component illustrated in FIG. 8 is a block diagram illustrating additional details of the architecture for augmenting reality, with the focus being on primary data flow rather than control information.
- Format Logic 811 (optionally determines the appearance of the computer-generated data), Integration Logic 812 (determines how to meaningfully combine/integrate the content with the user's point of view of the perceived world), Content Logic 813 (determines what virtual content (e.g., computer-generation information) is appropriate to present to the user given their current circumstances, such as based on a specific task), and Environment Logic 814 (determines the spatial relationship of objects in the environment, including the user's body).
- Format Logic 811 optionally determines the appearance of the computer-generated data
- Integration Logic 812 determines how to meaningfully combine/integrate the content with the user's point of view of the perceived world
- Content Logic 813 determines what virtual content (e.g., computer-generation information) is appropriate to present to the user given their current circumstances, such as based on a specific task)
- Environment Logic 814 determinees the spatial relationship of objects in the environment, including the user's body).
- a periperipericons in the illustrated embodiments is an iconic visual control that is only displayed in the periphery of the user's position. They do not distract the user from their task, while conveying limited information. They typically do not include text, as users generally do not have sufficient visual acuity to distinguish sufficient detail in the periphery of their vision.
- Adapts augmented reality presentation based on context information can optionally retrieve appropriate context information so that it is available.
- context information For example, the purpose of the potential computer-generated content, and the circumstances of the user. It can also take into account hierarchical and overlapping priorities, such as from multiple themes that each match the current context.
- An example of logic used in this step includes:
- Virtual Objects for presentation can include image content (text, controls, pictures, avatars, objects, landscapes, personality, etc.) and appearance.
- this component is not used if the desired computer-generated data is presented directly to the Integration Logic 812 . This is typically not possible for an arbitrary number of tasks, however. Even if tasks are coordinating between themselves on which data is most appropriate to display, a general shared mechanism for them to communicate is needed and the data must take into account the user's context, which requires communications with the user's context model.
- An example of logic used in this step includes:
- ⁇ Provides spatial relationships of user and environment objects, and physical characteristics of user and environment objects (e.g., location, mass, motion, texture, appearance, sound, smell, temperature, etc.).
- a datastore of context attributes whether user's private datastore or a shared context model.
- a simple implementation could be pairs of two values; Rule and Action. Rules could be potential user locations, and Actions would be what the computer should do if the location is reached.
- This component can interact with and make use of any software application program that programmatically communicates with a publicly known interface commands, such as Microsoft Office, Valve HalfLife, and various Internet browsers.
- an explicit, extensible, dynamic software model of a user's physical, mental, data, and computer environment In the illustrated embodiment, an explicit, extensible, dynamic software model of a user's physical, mental, data, and computer environment.
- the system can coordinate logic with other tasks.
- most software applications are capable of initiating and receiving instructions with other software programs, including different levels of operating systems.
- Models may be of users, groups of users, or other types of context models (e.g., object, location, process, etc.).
- Most software applications are capable of initiating and receiving instructions with other software programs, including different levels of operating systems.
- the disclosed augmented reality techniques can be used in a variety of scenarios, including the following non-exhaustive list: navigation/routing, conference calls, vehicle operation, role playing games, tours, theme parks, hazard warnings, etc. Examples of uses includes the following.
- an augmented reality tour of a physical attraction can be easily created with this system by creating a database of attraction records.
- Each record can contain real-world characterization information (e.g., location, hours of operation, possible and optimal routes) and user-filtered interest characterizations (e.g., type of attraction, amount of time required, recommendations of trusted reviewers, supplemental details on attraction or attraction elements, etc.).
- the database data can be made available to an interpretive engine, which by making use of the user's context model's location attributes can determine which attraction the user is closest to and can provide an indication of such without the user's explicit request.
- routines discussed above may be provided in alternate ways, such as being split among more routines or consolidated into less routines.
- illustrated routines may provide more or less functionality than is described, such as when other illustrated routines instead lack or include such functionality respectively, or when the amount of functionality that is provided is altered.
- data structures discussed above may be structured in different manners, such as by having a single data structure split into multiple data structures or by having multiple data structures consolidated into a single data structure.
- illustrated data structures may store more or less information than is described, such as when other illustrated data structures instead lack or include such information respectively, or when the amount or types of information that is stored is altered.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- Finance (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 14/486,777, filed Sep. 15, 2014 and entitled “Automated Selection of Appropriate Information Based on a Computer User's Content” (now U.S. Pat. No. 9,906,474), which is a continuation of U.S. patent application Ser. No. 12/165,377, filed Jun. 30, 2008 and entitled “Automated Selection of Appropriate Information Based on a Computer User's Content” (now U.S. Pat. No. 9,183,306), which is a continuation of U.S. patent application Ser. No. 11/435,326, filed May 16, 2006 and entitled “Automated Selection of Appropriate Information Based on a Computer User's Content” (now U.S. Pat. No. 7,395,507), which is a continuation of U.S. patent application Ser. No. 09/835,077, filed Apr. 12, 2001 and entitled “Automated Selection of Appropriate Information Based on a Computer User's Content” (now U.S. Pat. No. 7,073,129), which is a continuation-in-part of U.S. patent application Ser. No. 09/216,193, filed Dec. 18, 1998 and entitled “Method and System for Controlling Presentation of Information to a User Based on the User's Condition” (now U.S. Pat. No. 6,466,232).
- U.S. patent application Ser. No. 09/835,077 is also a continuation-in-part of U.S. patent application Ser. No. 09/464,659, filed Dec. 15, 1999 and entitled “Storing and Recalling Information to Augment Human Memories” (now U.S. Pat. No. 6,513,046).
- U.S. patent application Ser. No. 09/835,077 is also a continuation-in-part of U.S. patent application Ser. No. 09/825,159, filed Apr. 2, 2001 and entitled “Thematic Response to a Computer User's Context, Such as by a Wearable Personal Computer” (now U.S. Pat. No. 7,076,737), which claims the benefit of provisional U.S. Patent Application No. 60/193,999, filed Apr. 2, 2000 and entitled “Obtaining and Using Contextual Data for Selected Tasks or Scenarios, Such as for a Wearable Personal Computer”.
- U.S. patent application Ser. No. 09/835,077 is also a continuation-in-part of U.S. patent application Ser. No. 09/824,900, filed Apr. 2, 2001 and entitled “Soliciting Information Based on a Computer User's Context” (now U.S. Pat. No. 6,968,333), which claims the benefit of provisional U.S. Patent Application No. 60/194,000, filed Apr. 2, 2000 and entitled “Soliciting Product Information Based on the User's Context”, and provisional U.S. Patent Application No. 60/194,758, filed Apr. 2, 2000 and entitled “Creating Portals Based on the User's Context”.
- U.S. patent application Ser. No. 09/835,077 also claims the benefit of provisional U.S. Patent Application No. 60/196,625, filed Apr. 12, 2000 and entitled “Enhanced Gaming with Wearable Computers”, and of provisional U.S. Patent Application No. 60/240,694, filed Oct. 16, 2000 and entitled “Method for Synchronizing Computer Generated Images with Real World Images”.
- U.S. patent application Ser. Nos. 14/486,777, 12/165,377, 09/216,193, 09/464,659, 09/825,159, and 09/824,900 and provisional U.S. Patent Application Nos. 60/193,999, 60/194,000, 60/194,758, 60/196,625, and 60/240,694 are hereby incorporated by reference in their entireties.
- The present invention relates generally to computer-supported filtering of information, and more particularly to presentation of filtered information (such as unsolicited advertisements) to a computer user based on the user's current context.
- As computers become increasingly powerful and ubiquitous, users increasingly employ their computers for a broad variety of tasks. For example, in addition to traditional activities such as running word processing and database applications, users increasingly rely on their computers as an integral part of their daily lives. Programs to schedule activities, generate reminders, and provide rapid communication capabilities are becoming increasingly popular. Moreover, computers are increasingly present during virtually all of a person's daily activities. For example, hand-held computer organizers (e.g., PDAs) are more common, and communication devices such as portable phones are increasingly incorporating computer capabilities. Thus, users may be presented with output information from one or more computers at any time.
- Accompanying the increasing use and portability of computers is an increasing desire to provide information to users through wireless and other communication channels. Advertisers are particularly interested in reaching computer users as such users often represent desirable target markets. Advertisers would like to provide advertisements to various computer and communication devices that are relevant to the users. Other groups in addition to advertisers may also want to disseminate information to computer users.
- With the convergence of computerization, wireless capabilities, digitalization, and ease of dissemination, the amount of potential information that may be bombarded on individual users may prove too overwhelming. The sheer volume of information may prevent or discourage computer users from making any effort to examine the information and find what is immediately desirable or necessary. However, simply reducing the amount of information, or the number of information sources, is not an appropriate solution because the user loses access to information of potential interest.
- In general, current solutions for selecting incoming information fail because they do not address the dynamic, immediate, and arbitrary desires and needs of a user. The solutions cannot be easily modified, extended, or shared by the user.
- One possible solution is to simply ignore some or all available information, such as unsolicited information that is received. This solution is not always possible, however, and is often difficult and inconvenient. For example, it is difficult to ignore an audio message of moderate volume, especially when those messages are specifically designed to be difficult to ignore (e.g., by compressing the dynamic range so that the average volume is higher). Plus, rejecting all information robs the user of potentially important information in which the user may be interested.
- Another solution is to select a set of information sources from which information (solicited and/or unsolicited) is permitted. This exclusionary practice is not fully desirable because the user loses access to potentially desirable information from a source that may not be on the acceptable source list. Also, even with a small number of information sources, the user's ability to give continuous attention to multiple, or even a single information source, is limited. This is especially true if the user is to remain “in task” and not be distracted by inappropriate information. Junk mail filters used by conventional email programs attempt to filter unwanted bulk mailings by using keywords or user enumeration. These filters have the drawback in that the user must manually update desired or undesired sources to account for new sources.
- Another drawback of conventional solutions is that the solutions are based on the underlying assumption that the user is stationary and in a static context, such as sitting at a desktop computer or sitting in front of a web-enabled television. The solutions do not take into account that the user's context may be dynamic and changing or evolving over time. Thus, the present-day solutions for filtering digital information are not easily ported to the portable computing environment such as portable computing devices, PDAs, communications devices, and wearable computing devices.
- Users, on the other hand, may not mind receiving even unsolicited information (e.g., advertisements) if the information is received at a convenient time and made available in a non-intrusive manner. Much of this timing and convenience is dictated by the user's current context. The user's context can either limit or enhance their ability and desire to receive and process information. When the user is not interested in receiving a message, or the user is unable to receive a specific message because they are too busy, or the user is unable to accept a specific message due to the user's present environment or situation (such as the user's current information presentation system configuration), the context may simply dictate that the user is not interested or able to review any information.
- Accordingly, there is a need for improved techniques that enable received information, including unsolicited information, to be received and presented in a timely and relevant manner to the computer user. Such techniques would be desirable for the user because the user will be made aware of potentially relevant information and beneficial for the information provider (such as an advertiser) because the user may not be as apt to simply ignore or discard the information. Instead, the user may want to experience (e.g. see, hear, smell, etc.) the advertisement when the user's context is suitable for reviewing the advertisement.
- In addition to the general need for improved techniques to select appropriate information and present it in an appropriate manner, there are various specialized environments or situations which harbor additional problems or constraints. For example, existing computer games don't provide a complete gaming environment that reflects the user's detailed context, such as can be maintained or modeled by the user's characterization module. Thus, there is a need for computer games to provide enhanced functionality by using such modeled context information, such as to select appropriate game-related information or functionality based on the user's context and to present it in an appropriate manner.
- In addition, in the area of computer-based augmented reality, there is a need for improved techniques to select appropriate information and present it in an appropriate manner. In particular, current technology is unable to dynamically augment reality by integrating virtual information (such as images, sounds, and other related information) with real world information (e.g., visible objects and audible sounds) without hardware clues. Maintaining an overlay, or visual mapping, of virtual objects on top of real-world objects is known as registration. For example, in an industrial setting an example of registration may involve superimposing a virtual image of a wire over the real-world view of the wire, and having that virtual wire remain properly associated with the real wire while the user's head is moving. Such registration can be facilitated by adding visual clues to the relevant environment, such as patterns of dots on a circuit board containing the wire. However, the need for such visual cues severely limits the usability of augmented reality. Another difficulty in managing the overlay of virtual information onto the real world involves presenting and formatting computer interactions controls without detracting from the user's experiencing of the real world.
-
FIG. 1 illustrates a system in which messages are pushed from multiple information sources to multiple clients over a network. -
FIG. 2 illustrates one exemplary implementation of a client, which is embodied as a wearable computer. -
FIG. 3 illustrates an architecture implemented at the client to filter incoming messages according to the user's context. -
FIG. 4 illustrates a composite filter consisting of a hierarchy of filters for filtering incoming messages. -
FIG. 5 is a flow diagram of a process for filtering incoming messages and deciding when to present the messages based on the user's context. -
FIG. 6 illustrates a message distribution system in which an intermediary entity matches messages to intended users and distributes the messages on behalf of information sources. -
FIG. 7 is a block diagram illustrating an architecture for augmenting reality by presenting appropriate information based on a user's context. -
FIG. 8 is a block diagram illustrating additional details of the architecture for augmenting reality. -
FIG. 9 is a block diagram illustrating an architecture for enhancing gaming environments by providing appropriate information and functionality based on a user's context. -
FIG. 10 is a flow diagram of an embodiment of a Gaming routine. -
FIG. 11 is a flow diagram of an embodiment of an Augmented Reality routine. - This disclosure pertains to techniques for filtering received information based on the user's current context in order to determine whether the information is appropriate for presentation to the user. In some embodiments, the received information is unsolicited information, such as advertisements. Using an explicit, dynamic, extensible software model of a user's context, such as one that represents their desires, needs, physical condition, surrounding environment, computing capabilities, and data receiving capabilities, information that is appropriate for the user can be determined. In some embodiments, additional determinations are made as to how, when and/or where such appropriate information should be presented, and the information can then be presented in the appropriate determined manner.
- In order to use context information about the user to make appropriate determinations, such context information must be received or generated. In some embodiments, various environmental aspects (e.g., mental, physical, computing, data, etc.) are monitored, and a current context of the user is modeled. In other embodiments, such information is received from other sources that perform the monitoring and/or the modeling. Such context information can be represented in various forms, such as with a variety of context attributes (or “condition variables”) that each model a single aspect of the context (e.g., ambient temperature, current latitude, or current user task). In some embodiments, context attributes are used that each have a name and at least one value, and can additionally have other properties such as uncertainty, units and timestamp.
- When the context information is available, it can then be used to define a set of one or more filters to be selectively applied to incoming information, such as messages. Each filter can have different filter criteria, and a composite of multiple filters can also be used. Since the user's context is typically non-static and continually evolving, the set of filters currently in use can be updated as the context changes.
- Information that satisfies the filter criteria of the current filters is determined to be currently appropriate for presentation, although current presentation of such information may not be appropriate (e.g., current sports news may be appropriate information for a particular user, but presentation of such information may not be appropriate while the user is driving or in a business meeting). Thus, in some embodiments, information that is determined to be appropriate based on the current filters is then evaluated to determine whether it should be presented to the user immediately or instead stored for later presentation. In addition, determinations can be made such as where (e.g., on what device) and how (e.g., via which user senses or with what degree of prominence) the information should be presented. As with selection of filters, the user's context can be used in making the determinations of when, where and how to present the content.
- Exemplary System
-
FIG. 1 shows asystem 100 in which multiple information sources 102(1), 102(2), . . . 102(N) transmit information over one ormore networks 104 to multiple clients 106(1), 106(2), . . . 106(M). Information that is unsolicited by the clients is said to be “pushed” from theinformation sources 102 to theclients 106, while information that is solicited or requested is said to be “pulled” by the clients. While it is particularly important to analyze unsolicited information for appropriateness before presentation (since the client or user to whom the information is being pushed has typically not previously indicated any level of interest in the information), it can also be beneficial to analyze solicited information for appropriateness since the actual information that is received may be different than what the user thought they were requesting and/or since it may still be useful to determine an appropriate manner (e.g., when, where and how) in which to present the information. While most of the techniques described below are generally applicable to both solicited and unsolicited information, some disclosed techniques emphasize the analyzing of unsolicited information. Conversely, additional techniques that focus primarily on active requesting of information from sources and corresponding analyzing of such information can be found in U.S. patent application Ser. No. 09/824,900, filed Apr. 2, 2001 and entitled “Soliciting Information Based On A Computer User's Context” (now U.S. Pat. No. 6,968,333). - The information sources 102 may be implemented in a number of ways, such as a host server at a Website, an email service, a paging service, a financial quote service, a cellular communications host, a radio transmission unit, and the like. As one exemplary implementation, an information source, as represented by source 102(1), may include a
content store 110 to store the information and acontent server 112 to serve the content to theclients 106. The information communicated from the information sources may be in any data type (e.g., text, graphics, audio, software executables, video, etc.) and contain essentially any type of subject matter. Examples of possible information that may be pushed to the clients include streaming media, safety bulletins, future or current event announcements, environment status (weather, traffic), local vicinity status (elevator wait time), object status (where is my bus?), executable code, object descriptors (any computer-compatible enumeration or description of sensors or peripheral devices). As one particular example, the information may be in the form of unsolicited advertisements pushed to theclients 106 from advertisers. - The
network 104 is representative of many different network types, including public networks (e.g., the Internet) and proprietary networks. The network may be implemented using wireless technologies (e.g., RF, microwave, cellular, etc.), wire-based technologies (e.g., cable, fiber optic, wire, etc.), or any combination. Any one of many diverse protocols and formats may be used to package data and transmit it from thesource 102 to theclient 106. - The
clients 106 may be implemented in a variety of ways, including as computers, portable digital assistants (PDAs), communication devices, and the like. The clients are equipped with conventional mechanisms to receive the information from thenetwork 104, such as ports, network cards, receivers, modems, and so on. As described in greater detail below, in some embodiments some or all of the clients may be wearable computers. - Each client in the illustrated embodiment, as represented by client 106(1), is equipped with a Condition-Dependent Output Supplier (CDOS)
system 120 that monitors the user and the user's environment and that creates and maintains a model (not shown) of the user's context (or “condition”). As the user moves about in different environments, the CDOS system receives various input information, including explicit user input, sensed user information, and sensed environment information. In the illustrated embodiment, one ormore sensors 122 provide data to the CDOS system pertaining to the user's environment. - Each
client 106 is also equipped with a context-basedinformation filtering system 124 that utilizes one ormore filters 126 to selectively pass/block information from theinformation sources 102 based on the user's present context. Depending on many factors of the user's current context, the context-basedinformation filtering system 124 may allow certain received information, such as important messages from a spouse or family member, to pass through while concurrently blocking other information. Depending on the user's context, the information determined to be appropriate may then be presented immediately or instead stored for delayed presentation. - Exemplary Client
-
FIG. 2 illustrates one suitable implementation ofclient 106 as a body-mounted wearable computer worn by auser 202. Thecomputer 106 includes a variety of body-worn input devices, such as amicrophone 210, a hand-heldflat panel display 212 with character recognition capabilities, and various otheruser input devices 214. Examples of other types of input devices with which a user can supply information to thecomputer 106 include speech recognition devices, traditional qwerty keyboards, chording keyboards, half qwerty keyboards, dual forearm keyboards, chest mounted keyboards, handwriting recognition and digital ink devices, a mouse, a track pad, a digital stylus, a finger or glove device to capture user movement, pupil tracking devices, a gyropoint, a trackball, a voice grid device, digital cameras (still and motion), and so forth. - The
computer 106 also has a variety of body-worn output devices, including the hand-heldflat panel display 212, anearpiece speaker 216, and a head-mounted display in the form of an eyeglass-mounteddisplay 218.Other output devices 220 may also be incorporated into thecomputer 106, such as a tactile display, other tactile output devices, an olfactory output device, and the like. - The computer I06 may also be equipped with one or more various body-worn
user sensor devices 222. For example, a variety of sensors can provide information about the current physiological state of the user and about current user activities. Examples of such sensors include thermometers, sphygmometers, heart rate sensors, shiver response sensors, skin galvanometry sensors, eyelid blink sensors, pupil dilation detection sensors, EEG and EKG sensors, sensors to detect brow furrowing, blood sugar monitors, etc. In addition, sensors elsewhere in the near environment can provide information about the user, such as motion detector sensors (e.g., whether the user is present and is moving), badge readers, still and video cameras (including low light, infra-red, and x-ray), remote microphones, etc. These sensors can be both passive (i.e., detecting information generated external to the sensor, such as a heart beat) and active (i.e., generating a signal to obtain information, such as sonar or x-rays). - The
computer 106 may also be equipped with variousenvironment sensor devices 224 that sense conditions of the environment surrounding the user. For example, devices such as microphones or motion sensors may be able to detect whether there are other people near the user and whether the user is interacting with those people. Sensors can also detect environmental conditions that may affect the user, such as air thermometers or Geiger counters. Sensors, either body-mounted or remote, can also provide information related to a wide variety of user and environment factors including location, orientation, speed, direction, distance, and proximity to other locations (e.g., GPS and differential GPS devices, orientation tracking devices, gyroscopes, altimeters, accelerometers, anemometers, pedometers, compasses, laser or optical range finders, depth gauges, sonar, etc.). Identity and informational sensors (e.g., bar code readers, biometric scanners, laser scanners, OCR, badge readers, etc.) and remote sensors (e.g., home or car alarm systems, remote camera, national weather service web page, a baby monitor, traffic sensors, etc.) can also provide relevant environment information. - The
computer 106 further includes acentral computing unit 230. The various inputs, outputs, and sensors are connected to thecentral computing unit 230 via one or moredata communications interfaces 232 that may be implemented using wire-based technologies (e.g., wires, coax, fiber optic, etc.) or wireless technologies (e.g., RF, etc.). Areceiver 234 is designed to receive incoming messages from thenetwork 104 and to pass them to thecentral computing unit 230 via the data communications interfaces 232. Thereceiver 234 may be implemented in a number of ways, including as an RF receiver, a microwave receiver, a satellite receiver, a network card, a wireless network card, a modem, and so forth. - The
central computing unit 230 includes a central processing unit (CPU) 240, amemory 242, and astorage device 244. Thememory 242 may be implemented using both volatile and non-volatile memory, such as RAM, ROM, Flash, EEPROM, disk, and so forth. Thestorage device 244 is typically implemented using non-volatile permanent memory, such as ROM, EEPROM, diskette, memory cards, and the like. - One or more application programs 246 can be optionally stored in
memory 242 and executed by theCPU 240. These application programs generate information that may be presented to the user via one or more of the output devices. - In the illustrated implementation, a
CDOS system 120 is shown stored inmemory 242 and executing on theprocessing unit 240. TheCDOS system 120 monitors the user and the user's environment, and creates and maintains an updated model of the current context of the user. As the user moves through different environments, the CDOS system receives various input information including explicit user input, sensed user information, and sensed environment information. The CDOS system updates the current model of the user condition, and presents output information to the user via appropriate output devices. A more detailed explanation of theCDOS system 120 may be found in U.S. patent application Ser. No. 09/216,193 (now U.S. Pat. No. 6,466,232), and a more detailed discussion of context attributes (or condition variables) may be found in U.S. patent application Ser. No. 09/724,902 (now U.S. Pat. No. 7,231,439). - The context-based
information filtering system 124 is also shown stored inmemory 242 and executing on theprocessing unit 240. It utilizes data from the modeled user context (e.g., via the CDOS system 120) to selectively filter information according to the user's current environment in order to determine whether the information is appropriate for presentation. Thefiltering system 124 employs one ormore filters 126 to filter the information. The filters may be pre-constructed and stored for subsequent utilization when conditions warrant their particular use, or alternatively thefiltering system 124 may construct the filters dynamically as the user's context evolves. In addition, in some embodiments each filter is stored as a distinct data structure (optionally with associated logic), while in other embodiments filters can be provided as logic based on the current context, such as one or more interacting rules provided by the filtering system or CDOS system. - The body-mounted
computer 106 may be connected to one or more networks through wired or wireless communication technologies (e.g., wireless RF, a cellular phone or modem, infrared, physical cable, a docking station, etc.). For example, the body-mounted computer of a user could make use of output devices in a smart room, such as a television and stereo when the user is at home, if the body-mounted computer can transmit information to those devices via a wireless medium or if a cabled or docking mechanism is available to transmit the information. Alternately, kiosks or other information devices can be installed at various locations (e.g., in airports or at tourist spots) to transmit relevant (and typically, unsolicited) information to body-mounted computers within the range of the information device. - It is noted that the body-mounted
computer 106 is merely one example of a suitable client computer. There are many other implementations of client computing devices that may be used to implement the context-based information filtering system. In addition, while thecomputer 106 is illustrated inFIG. 2 as containing various computing and storage resources and associated I/O devices, in other embodiments acomputer 106 may act as a thin client device that receives some or all of its computing and/or storage capabilities from a remote server. Such a thin client device could consist only of one or more I/O devices coupled with a communications mechanism with which to interact with the remote server. - Thus, those skilled in the art will appreciate that
computer systems 106 are merely illustrative and are not intended to limit the scope of the present invention. Such computer systems may be connected to other devices that are not illustrated, including through one or more networks such as the Internet or via the World Wide Web (WWW). In addition, the functionality provided by the illustrated components may in some embodiments be combined in fewer components or distributed in additional components. Similarly, in some embodiments the functionality of some of the illustrated components may not be provided and/or other additional functionality may be available. - Those skilled in the art will also appreciate that, while items (e.g., filters and software components) are illustrated as being stored in memory while being used, these items or portions of them can be transferred between memory and other storage devices for purposes of memory management and data integrity. Similarly, items illustrated as being present on storage while being used can instead be present in memory and transferred between storage and memory. Alternately, in other embodiments some or all of the software modules may execute in memory on another device. Some or all of the described components or data structures may also be stored (e.g., as instructions or structured data) on a computer-readable medium (e.g., a hard disk, a memory, a network, or a portable article to be read by an appropriate drive), and can be transmitted as generated data signals (e.g., as part of a carrier wave) on a variety of computer-readable transmission mediums (e.g., wireless-based and wired/cable-based mediums). In addition, a “client” or “server” computing device may comprise any combination of hardware or software that can interact, including computers, network devices, internet appliances, PDAs, wireless phones, pagers, electronic organizers, television-based systems and various other consumer products that include inter-communication capabilities. Accordingly, the present invention may be practiced with other computer system configurations.
- Context-Based Information Filtering System
-
FIG. 3 illustrates oneexemplary architecture 300 in which the context-basedinformation filtering system 124 may be implemented. The architecture includes several functional components that filter information (e.g., unsolicited information such as advertisements) based on the user's context before allowing that information to be presented to the user. - According to
architecture 300, incoming messages are received at aReceiver 234 from a communications network. In some embodiments, the Receiver is a hardware device, while in other embodiments the Receiver could be an application program such as a Web browser. There are a wide variety of messages originating from a number of different sources, including directed messages like telephone and fax calls, email messages, instant messaging, broadcast messages like TV and radio, multicast or streaming messages, etc. Messages can also be computer generated (e.g., from an application program), either remotely or locally. While the illustrated embodiment discusses the analysis of incoming messages, other information that is less structured than messages can also be filtered in a similar manner, such as ambient conversations or visual information of an objectionable nature. - The context-based
information filtering system 124 applies one ormore filters 126 toincoming messages 302. Thefilters 126 may be designed and stored as separate from the filtering system or instead integrated within the system. Moreover, the filters may reside at the client or instead be remote from the client, such as in the distributed system described below with respect toFIG. 6 . Individual filters may be static in that they are pre-configured for particular usage and stored in the client's computer memory for retrieval by thefiltering system 124. Alternatively, individual filters may be generated dynamically by thefiltering system 124 as user conditions dictate, such as by applying logic associated with the filtering system or the CDOS system. For instance, if the user is currently sleeping and the computer system detects the user is in a sleep state, thefiltering system 124 may generate a temporary filter that blocks all but the highest important incoming messages. Those skilled in the art will appreciate that such a temporary filter may not be stored as a distinct data structure, but instead reflect processing logic/functionality provided by one of the components. - The filters are designed with two competing goals in mind: (1) precision-receiving only messages that are appropriate to the desire, situation and needs of the user, and (2) completeness-making sure that nothing of interest is missed. The
filters 126 can also be general or very specific. For example, one filter may be configured to accept advertisements from soft-drink advertisers, while another filter may be configured to block diet soft-drink advertisements. More specifically, a filter may accept advertisements for a specific cola, but prevent advertisements from a competitive cola product. Thus, if the user only drinks Coca-Cola® brand cola, an advertiser may pay for access to users who never purchase a Pepsi-Cola® brand cola and those constraints could be configured into a specific filter. That filter may also specify an incentive level that an advertiser of a Pepsi-Cola® brand product may need to pay or otherwise provide in order to purchase the privilege of presenting a Pepsi-Cola® brand advertisement to the user who typically only drinks Coca-Cola® brand cola. The incentive level may even be variable for different users. As a way to purchase that privilege, the advertising company may provide coupons to the user or pay the user for simply viewing the advertisement. - Messages that survive the
filters 126 are either presented to the user at that time or stored in the client computer for delayed presentation. This is represented by acceptedmessage 304 that has survived thefilters 124 and is being forwarded for the user's attention. - The illustrated embodiment of the context-based
information filtering system 124 includes acharacterization module 310 that attempts to characterize the user's current context and apply theappropriate filters 126 to theincoming messages 302 received atreceiver 234. Thecharacterization module 310 also provides information about the user's current context that facilitates the determination of whether the acceptable message(s) should be stored or presented immediately to the user. Whether the messages received atreceiver 234 are first passed to thecharacterization module 310 or to thefilters 126 is a matter of design choice. The messages may be first passed to thecharacterization module 310 and then subjected to the various filters 126 (as shown inFIG. 3 ). Alternatively, the filters selected by the filtering system may intercept and filter the messages before they are passed onto thecharacterization module 310. - The context-based
information filtering system 124 can be configured to characterize and filter any information that is analyzable by a computing device. The precision of the filtering is in part determined by how much information about the information is available. At a minimum, the system can use characteristics that can be inferred from the information itself, such as message characteristics for received messages. Examples of such message characteristics include the following: -
- source—a type or instance of carrier, media, channel or network path;
- destination—address used to reach the user (e.g., a user typically has multiple address, phone numbers, etc.);
- content of the message (parsable or described in metadata);
- data format type;
- arrival time;
- size; and/or
- previous messages-inference based on examination of log of actions on similar messages.
- In addition, many message formats explicitly include message-characterizing information, which can provide additional filtering criteria. Examples of message-characterizing information includes the following:
-
- title;
- originator identification (e.g., email author);
- origination date & time;
- routing (e.g., email often shows path through network routers);
- priority;
- sensitivity—security levels and permissions;
- encryption type;
- file format—might be indicated by filename extension;
- language—may include preferred or required font or font type;
- other recipients (e.g., email cc field); and/or
- required software.
- Moreover, the information source may add any additional kind of characterizing metadata to the messages, and such metadata can be used to determine message appropriateness. Examples of such metadata include the following:
-
- offer characteristics—a solicitation for goods or services can include an explicit description of the offer, such as specific product attributes like size, color, materials, cost, availability, warranty, external reviews, etc. with adequate detail, messages can be presented to the user corresponding with a narrowly defined user context;
- sender characteristics—their context can include arbitrary attributes (mood, location, who they are in presence of);
- certification—a trusted indication that the offer characteristics are dependable and accurate; and/or
- recommendations—outside agencies can offer opm 10 ns on what information may be appropriate to a particular type of user or situation.
- In the illustrated embodiment, the
characterization module 310 characterizes the user's context based on information received from auser context module 312. Information pertaining to the user's environment is captured and passed to theuser context module 312 for analysis. Theuser context module 312 creates, maintains, and updates one or more models pertaining to the user's context that integrate multiple areas of a human's computerized environments, such as physical, mental, computing, and data. In the illustrated implementation, theuser context module 312 gathers information on (1) the user's physical environment frommodule 314, (2) the user's mental environment frommodule 316, (3) the user's computing environment frommodule 318, and (4) the user's data environment frommodule 320. Various sensors 322 (e.g.,environment sensors 224,user sensors 222, etc.) monitor the environment parameters and provide data to the modules 314-320. - The
physical environment module 314 generates information pertaining to the user's present location (e.g., geographical, relative to a structure such as a building, etc.), the current time, and surrounding objects within a perceivable proximity that may interfere or distract the user from focusing attention on the incoming messages. Other possible information related to the physical environs include people, user's body state, or anything that can be externally sensed by computer-connected transducers or inferred by examining other parts of the context model. As an example, a user with a wearable computer may be traversing through a structure that is very dark and cold and that requires full visual and auditory senses on the surrounding objects within the structure. While in this state, the user most likely does not want to receive an advertisement for a sale on sunglasses. - The
mental environment module 316 generates information pertaining to the user's likely intentions, their preferences, and their level and quality of attention. Other information may include mood, topic of conversation, or any self-characterization that is meaningful to the user, provided by an observer, or inferred by examining other parts of the context model. For instance, themental environment module 316 may use data from a pupil tracking sensor or head orientation sensor to identify a direction or object on which the user is focused. If the user appears to be focused on administrative items presented on a heads-up display, then theuser context module 312 might determine that it is safe to present a message. Another example is to use preference metrics programmed by the user to differentiate among the urgency of certain incoming messages. For instance, the user might specify that all messages from his family are highly important, whereas all messages from a book retailer are marked with the lowest level of importance. Filters could then filter messages based on these defined importance levels. - The
computing environment module 318 generates information pertaining to the computing capabilities of the client, including available I/O devices (e.g., keyboards, buttons, microphones, cursor controllers (such as rolling, pointing, pressing, bending, turning, twisting, switching, rubbing, zipping controllers), displays, speakers, pressure devices, etc.), connectivity (e.g., amount of bandwidth, security level, cost, strength, protocol, quality, media type, schedule, etc.), processing capabilities, available storage space, and anything else that the local and remote computing environment can self-characterize. Thedata environment 320 generates information pertaining to the data and software resources on the client computer, including the communication resources, applications, operating system, and data. - The
user context module 312 takes the information generated by the environment modules 314-320 and generates a cohesive set of user conditions based on one or more context models. The model(s) can be broad, dynamic, explicit, and capable of being understood by arbitrary software modules. Here, the set of conditions are provided to thecharacterization module 310 which is able to comprehend those conditions. Alternatively, the architecture could support a dictionary that may be accessed by any module wanting to understand the meaning of a specific attribute or condition produced by the models. - The
characterization module 310 uses the conditions to identify a set of one or more filters to apply to theincoming messages 302. The set of filters is dynamic and can be changed as the user's conditions change. New filters are added or created, while others are dropped as the user's context evolves. For example, in some embodiments each filter could specify a set of one or more context model attributes, and include for each of the specified attributes one or more possible values for the attribute. Such a filter would be selected as matching the current modeled context (and thus used to apply to incoming messages) only if all the specified attributes have current values in the modeled context that are one of their possible values. Alternately, each specified attribute could includes an indication of whether it is required, and in such embodiments the filter can still match the current context even if the current values for non-required attributes do not match the specified possible values. Filters could also specify inter-attribute logic. - As described in greater detail in U.S. patent application Ser. No. 09/825,159, filed Apr. 2, 2001 and entitled “Thematic Response To A Computer User's Context, Such As By A Wearable Personal Computer” (now U.S. Pat. No. 7,076,737), multiple themes can also be defined for a user and used to present appropriate information and functionality. In some embodiments, filters used to analyze incoming messages or other information can each be associated with one or more defined themes, and the filters selected for current use can be one or more of the filters that are associated with one or more of the themes that are determined to match the current context.
- In one implementation, the
filters 126 each specify criteria to be matched against the content in theincoming messages 302. The messages are selectively allowed or blocked depending on whether the content matches the filter criteria. The messages themselves may be constructed with only the content (e.g., product or service information in an advertisement), and if so the filter or characterization module parses the message for key content to match against the filter criteria. As an example, the message may be a text or radio message that touts a particular product, and the filter or characterization module could parse the message using a text parser or a speech recognition module to identify the product name, type, cost, and so forth. - Alternatively, the information source may supply metadata to aid the filtering and thus avoid the parsing of the messages. In addition, the source-provided metadata can further describe the most appropriate use of the message by characterizing the intended or preferred message recipient's by including target context attribute value ranges. Those skilled in the art will appreciate that in some embodiments the use of such source-provided information may be limited to sources and/or messages that are trusted (e.g., on the basis of being certified by an independent third-party) and/or the system could take additional steps to verify the accuracy of the source-provided information.
- The message contents or metadata (from the parser or the source) is then compared to the filter criteria of the currently selected filters. In this way, the filters can act as a proxy for the user's current situation and preferences in order to determine whether messages are appropriate, and thus should be blocked or kept. The
characterization module 310 may further examine the context data to determine whether to save the messages for later or pass them onto the user immediately. Message filtering can thereby be accurately and generally based on context parameters that model and evaluate whether messages are appropriate under a set of circumstances. - The
characterization module 310 may utilize various characterization models to implement the filter comparisons. One way to characterize messages is to assign a numeric value to a set of message attributes and then compare that numeric value to a table of minimum necessary values or combination of values in order to determine whether a particular message is suitable under the circumstances. An example set of message attributes includes the following: -
- Message Desirability/Appropriateness—This attribute examines whether message conforms to enumerated or inferred criteria in the filters. For example, a filter might present only the high-priority messages from work-related contacts when the user's context model indicates that they are not working. As another example, the user may specify types of message as desired, such as any information on a particular product or tickets to a concert. These explicitly stipulated characteristics could be used to present only solicitations for the specified product or tickets. Such criteria may also be inferred, such as whether the user's sex, height, or weight has a bearing on a piece of clothing he/she might be interested in purchasing. Also, the characterization module may indicate past preferences regarding purchase decisions, like brand of product, store from which the product was purchased before, and so forth.
- Message Need—This attribute helps determine that a message should be presented even though there is no corresponding interest characterization. For example, a message concerning the safety of a product, or a hazard to the safety and health of the user may be deemed appropriate to present.
- Urgency—This attribute assists in determining whether messages should be presented immediately, or after some delay.
- Sensitivity & Required Privacy
- User's Available Attention
- Consider the following examples of how the
filtering system 124 might operate. Suppose an unsolicited advertisement for a cooling drink is received at the client. Theuser context module 312, either in response to the advertisement or as a part of separate processing, determines whether the user is thirsty based on various environment data and physiological state information. For example, the user's temperature, the surrounding temperature and humidity, and the user's past behaviors can all be used to determine whether the user is thirsty. In addition, other context information can also be employed to determine whether the advertisement is appropriate for presentation (e.g., an indicated or learned preference that the user does not want to receive advertisements while they are exercising). The various relevant context information is passed to thecharacterization module 310, which then applies one or more filters suitable for controlling whether a cooling drink advertisement should be presented to the user at this current time. - As another example, the
filtering system 124 may delay presentation of an acceptable message that matches the filter criteria until afilter 124 or thecharacterization module 310 determines that the user context matches the presentation requirements of the message. Suppose the user's current context suggests that the user is not able to give attention to incoming messages. For instance, the user is driving a car and is not able to view the message at this particular time. Now, suppose that the user receives an incoming message that is of interest to the user (e.g., a one-time sale on travel tickets to a desired destination). The filters and characterization module allow the message to successfully be received, but the user's context determines that the message cannot be displayed yet. Accordingly, thefiltering system 124 accepts the message, but delays presentation until the user's context has changed (e.g., stopped driving) and the user is in a better condition to receive the advertisement. When the context finally changes or when the user specifically notifies the characterization module to present the message, the user can experience the message without interruption or distraction. - As another example, the
filtering system 124 may employ a multi-tier filtering process using a hierarchy of multiple filters. The filters may be directed to different sets or categories of messages, with the collection of filters effectively finding a subset of messages acceptable to each of the filters. The characterization module can construct a filter composite as conditions warrant to effectively and dynamically produce unique filters as the user's context dictates. - Such construction of multi-tier filters could be performed in a variety of ways. For example, in addition to specifying information (e.g., context attributes) that indicates whether a filter matches the current context, in some embodiments filters could additionally specify inter-filter information that assists in determinations of whether two or filters are compatible. Such inter-filter information could indicate a directional relationship, such as one filter providing an output indication that is used as input as another filter, or merely that two filters are not inconsistent (e.g., a first filter that prohibits advertisements about specified products would be inconsistent with a second filter that indicates a desire to receive advertisements about those same specified products).
- In addition, information about categories or groups of filters, and/or of hierarchical relationships between filters, could also be used when dynamically generating multi-tier filters. For example, if a first filter selects a group of information as appropriate that is a proper subset of the group of information selected by a second filter (e.g., a second filter that selects any drink advertisement as appropriate and a first filter that selects only diet soda drink advertisements as appropriate), use of the second filter in conjunction with the first filter would be redundant—this type of inter-filter relationship may be ascertainable based on a hierarchical relationship between the filters. Similarly, in order to determine filters that are compatible, it may be appropriate in some embodiments to select only filters that are members of a common group or category, or to instead select only filters that are each from a distinct group of category. Examples and uses of hierarchies, groups and categories are discussed in greater detail in U.S. patent application Ser. No. 09/825,159, filed Apr. 2, 2001 and entitled “Thematic Response To A Computer User's Context, Such As By A Wearable Personal Computer” (now U.S. Pat. No. 7,076,737), and such information can similarly be applied to filters.
-
FIG. 4 illustrates afilter composite 400 that is made up of fourfilters first filter 402 might specify generic characteristics of suitable messages, such as the product/service characteristics for advertisements. Thesecond filter 404 might specify user characteristics and preferences. For instance, the user might only want to receive advertisements while running errands. Thethird filter 406 might describe certain user situations in which messages are appropriate. In this example, the user might only want to see or hear advertisements for products when proximally near a store. Thefourth filter 408 might pertain to the client computer capabilities. For instance, the client may be a communication device that can only receive text messages, as opposed to graphical or video messages. A message satisfying all the filter criteria of thefilter composite 400 is then stored and/or presented to the user. - Message Filtering Process
-
FIG. 5 shows anexample process 500 for filtering messages according to a user's context. Theprocess 500 may be implemented in software, or in a combination of hardware and software. As such, the operations illustrated as blocks inFIG. 5 may represent computer-executable instructions that, when executed, direct the system to - display virtual information and the real world in a certain manner.
- At
block 502, messages (e.g., unsolicited messages) 302 are received at theclient 106 from the information sources 102. Atblock 504, the context-basedinformation filtering system 124 selects one ormore filters 126 to apply to the incoming messages. Thecharacterization module 310 of thefiltering system 124 is frequently updating the set of filter(s) 126 to use for incoming messages according to the environment conditions of the user. As the messages are received, the current set of filter(s) 126 is applied to the messages (block 506). - At
block 508, thecharacterization module 310 determines whether the messages match the filter criteria. If the messages fail to match the criteria (i.e., the “No” branch from block 508), the messages are discarded (block 510), or could instead be stored for later consideration (e.g., explicit user review or more detailed automated processing). Alternatively, if the messages match the criteria (i.e., the “Yes” branch from block 508), thecharacterization module 310 evaluates the user's current context to decide whether the user should currently experience the acceptable messages (block 512). - At
block 514, thecharacterization module 310 determines, based on this evaluation of the user's context, whether to currently present the message. If the user context indicates that it is appropriate to present the message to the user (e.g., the user an agreeable state to review the messages), thecharacterization module 310 forwards the message(s) for immediate presentation (block 516). Presentation may be in the form of displaying a text message, rendering a graphical or video message, playing an audio message, releasing an aroma of a olfactory-enabled message, and the like. - If the user context indicates that it is not appropriate to currently present the message (i.e., the “No” branch from block 514), the
characterization module 310 stores the message(s) for later presentation (block 518). When messages are stored, thecharacterization module 310 can continue to monitor the user context for any changes that might allow presentation of the stored messages. The characterization module can also in some embodiments provide notification to the user to inform them that one or more messages are available for presentation (e.g., an indicator shown on the display or a subtle background sound that is played), thus allowing the user to explicitly select the messages for presentation when the user desires. - There are a number of ways that the content may be presented to the user. Content may be displayed, audibly played, released as an odor, output as a tactile feedback, and the like. Additionally, the choice of a suitable presentation mechanism may be determined based on the user's context. That is, after the content passes the filters and is determined to be presentable at this moment to the user, the
characterization module 310 might still further decide how best to present the information. For example, a user who is preoccupied watching objects or their surroundings may not wish to see any messages, but might be inclined to listen to them. Thus, the characterization module might determine to play any audio messages that might be ready for presentation. In other situations, the user might be more inclined to see the information on a display or watch a monochrome. - Message Distribution System with Intermediary
-
FIG. 6 illustrates an exemplarymessage distribution system 600 in which anintermediary entity 602 acts as a distributor of messages on behalf of an information source. Thissystem 600 is particularly suited for the commercial advertising market in which the information sources consist ofadvertisers 604 that are attempting to locate users who might be interested in their products and services. Thesystem 600 supports a revenue model for deriving revenue based on the service provided by theentity 602. The revenue model includes a variety of possible fees for different levels of service. - The
entity 602 performs services related to matching messages from information sources with suitable users who might be interested in the messages. Theentity 602 maintains aregistry 610 of interest-rules that are collected and maintained on behalf of individual users. The rules are correlated with the users to represent, for a given user, a composite of the user's desires, preferences, past behaviors, presentation surfaces capabilities, user demographics, and so forth. Theentity 602 also maintains amessage store 612 to store messages (e.g., advertisements) received from the advertisers. Amatch module 614 compares the messages in themessage store 612 to the interest rules inregistry 610 to identify users who might be interested in selected messages. - Each
client 620 is equipped with aninterest module 622 that generates rules indicating which items may be of interest. Theinterest module 622 creates these rules based on specific user-definedpreferences 624 and traits/characteristics gathered by thecharacterization module 310. Theclient 620 occasionally submits the rules for that user to theentity 602 for storage in theregistry 610. - When advertisers look for interested consumers, they can send their advertisement (optionally with metadata) to the
entity 602. The advertiser may be asked to pay a subscription or handling fee to the entity for access to likely consumers, and in some embodiments the intermediary entity provides a payment module to facilitate the exchange of payment between the intermediary, the clients, and the information sources. Theentity 602 stores the received advertisement in themessage store 612, and then invokes thematch module 614 to compare the advertisement with the rules in the interest-rule registry 610. If there is a match, this indicates that a particular user might be interested in the advertisement. There may be a fee associated with matching the message to various users based on their interest rules. - When a message is determined to be potentially of interest to the user, the
entity 602 delivers the message to the user'sclient 620. The client-side characterization module (not shown inFIG. 6 ) then determines, based on the user context, whether to present the message or store it for later presentation. In some embodiments, the filter mechanism could rely on the intermediary to provide information that is appropriate to the current context, while in other embodiments the filter mechanism could perform additional processing using current filters to determine whether to accept delivered messages. If the message is presented to the user, the advertiser may be asked to compensate the user and/or theentity 602. If the advertiser sells something to the user, the advertiser may be asked to provide an additional fee to theentity 602 for locating a buyer. - The
entity 602 may be configured to perform other services that are beneficial to the users. Theentity 602 may act, for example, as a trusted agent that examines messages submitted from the information sources to determine whether the messages adhere to acceptable standards of message characterization. The entity could be responsible for evaluating message format, structure, content, metadata, and the like to determine conformance with desired standards. As a trusted agent, theentity 602 can certify messages as being in compliance with these standards for the benefit of the user filters. Additionally, the entity could certify and verify information sources, to facilitate swift examination of messages from certified sources. Certified messages or messages from certified sources may be issued a secure certificate to indicate to the user filters that the message metadata can be trusted to accurately characterize the message, and to ensure that the filter will recognize the certificate's meaning. The message filter can respond to the secure certificate by automatically assigning a higher confidence rating to the message. - The interest rules for the user can be generated in a variety of ways. One example technique for generating such interest rules is described in greater detail in U.S. patent application Ser. No. 09/824,900, filed Apr. 2, 2001 and entitled “Soliciting Information Based On A Computer User's Context” (now U.S. Pat. No. 6,968,333). In addition, other techniques for generating themes and theme-related information are described in greater detail in U.S. patent application Ser. No. 09/825,159, filed Apr. 2, 2001 and entitled “Thematic Response To A Computer User's Context, Such As By A Wearable Personal Computer” (now U.S. Pat. No. 7,076,737). Similar techniques to those disclosed for generating user interest rules and theme-related information, either in combination or separately, can also be used to allow users to create and modify filters for use in analyzing received information.
- In addition, in the same manner that advertisers or other information sources can provide messages or other information that may be of interest to users, such sources could also supply filters to be distributed to users via the intermediary entity or instead directly to users. In some situations such filters could be distributed as part of a business model, such as by selling the filters to users. In other situations the filters could be distributed for the convenience or benefit of the information sources (e.g., a product/service provider or related advertiser providing a filter that selects as appropriate only those advertisements that are for those products or services), and in some embodiments the information sources could compensate the users for accepting and/or using the provided filters. Such filters could also be provided to users based on a group to which the user belongs (e.g., filters distributed by an employer to all employees or to employees meeting specified criteria) and/or based on a geographic location of the user. In some embodiments, filters are associated with themes (and are thus one type of theme-related information for those themes), and can be distributed in conjunction with the distribution of those themes.
- In addition to (or instead of) automated selection of filters, in some embodiments users can explicitly indicate appropriate filters. For example, in response to receiving information that was determined by automatically selected filters to be appropriate, the user could indicate that the information was instead inappropriate (or was presented in an inappropriate manner). The user could also indicate that one or more of the automatically selected filters should not have been selected and/or that another filter that was not selected should have been selected. In this way the user can explicitly adjust the information that is determined to be appropriate.
- Moreover, in embodiments in which the user provides explicit indications of appropriateness (whether by selecting filters or by indicating that filters and/or presented information is appropriate or inappropriate), the system can use automated learning techniques to enhance future selections and use of filters. In this manner, a filtering system can be continually customized to a particular user, thus enhancing the usefulness of the filtering. Additional details about the use of such automated learning techniques are provided in U.S. patent application Ser. No. 09/825,152, filed Apr. 2, 2001 and entitled “Contextual Responses Based On Automated Learning Techniques” (now U.S. Pat. No. 6,842,877), which is a continuation-in-part of U.S. patent application Ser. No. 09/216,193 (now U.S. Pat. No. 6,466,232), of U.S. patent application Ser. No. 09/464,659 (now U.S. Pat. No. 6,513,046), and of U.S. patent application Ser. No. 09/724,902 (now U.S. Pat. No. 7,231,439), and which claims the benefit of provisional U.S. Patent Application No. 60/193,999 and of provisional U.S. Patent Application No. 60/194,123. Each of these applications is hereby incorporated by reference in their entirety.
- In addition to using modeled context information to select filters or dynamically generate filtering capabilities, such context information can more generally be used in some embodiments to control the sharing of a user's context or other computer-controlled information with other users and/or computing devices. Such sharing of information can be conceptualized as the filtering of outgoing information (rather than incoming information), and arbitrary groups of context attributes can be specified as constraints on the sharing. For example, based on the user's modeled location, physical activity, presence of particular other people or objects nearby, and emotional state, it may be determined that certain groups of user context information will be made available to people in the user's family, that other groups of user context information and other stored information will be made available to co-workers, and that no one other than the user may have access to yet other groups of information. In particular, in some embodiments information sharing filters will be defined and used in a similar manner to that described above for received information filters. Alternately, existing mechanisms for grouping or using groups of context attributes can be extended to include information sharing filter information, such as defined themes or received information filters.
- There can be multiple tiers of information sharing (or “permission”) characterization, and such tiers can be selected in various ways. One example of tiers of information include information that is available to the user themselves, to other users in one or more groups or categories to which the user belongs, to users in other groups or categories to which the user does not belong but has a defined relationship, and to everyone. Those skilled in the art will appreciate that these tiers can be expanded or contracted in various situations—for example, as noted above, a user may belong to many groups (e.g., family, club, work, etc.) that each have different permission schemes. Similarly, in a specific group of applications such as multi-player games, the other groups can include competitors, whether individuals or teams, and additional tiers could be added, such as for non-player spectators or for game creators/administrators. In a business setting, other groups may include partners, suppliers, customers, etc. Such permission tiers can also be used when receiving information from others that are employing such information sharing filters, such as to receive team information from other members of your team in a multi-player game setting, whether the information is aggregated (e.g., by a third party, such as a team leader) or specific to each of the other members.
- Permission information can also be specified in various ways. Since a context attribute can be shared as a data item, permission information related to that context attribute can be specified with an explicit characterization of permission and/or an associated permission algorithm (e.g., as an extended property of that context attribute), or the value of the context attribute can instead be treated as any other information that potentially may be distributed. In particular, any such information can be characterized with one or more properties (e.g., based on the information content or other related information) as to who/what/when/where/how/why that information can be shared. For example, it may be desirable to have all context information and other information that is related to my current and historic physical health be characterized as being available to medical professionals providing assistance during a medical emergency. In addition, in some embodiments a user may not have authority to examine and/or modify the permission scheme or information associated with their context attributes or other information. An example of this may be in an institutional setting where the system is provided for a purpose that is controlled by the institution.
- In addition to the general applicability of the disclosed techniques for selecting appropriate information, various specific uses of the previously disclosed techniques and other related techniques follows. For example, computer gaming environments provide situations where modeled user context information can be used to significantly enhance the gaming experience, such as by selecting appropriate game-related information or functionality based on the user's context and presenting it in an appropriate manner. When some or all of the game participants use wearable computers, even greater enhancements are available, as discussed in greater detail below.
- Thus, in some embodiments techniques for determining various details of the user's current context (e.g., the physical location of the user in the real world and the user's current mood) and interacting with the user in various ways based on that context information. In some embodiments, such techniques could be provided directly by gaming applications designed to implement the techniques, while in other embodiments the techniques could be added to existing games by an external component (e.g., provided by a third-party).
- One way that gaming applications can be enhanced is by augmenting the user's reality (i.e., integrating computer-provided information into a user's perception of their physical reality) via the 110 devices of the user's computer. The enhanced 110 device functionality that is typically available on wearable computing devices is one reason that such wearable devices can in some situations provide enhanced functionality not available to standard computing devices that lack the I/O device functionality.
- The ability to augment reality in this manner provides various benefits in both gaming and non-gaming applications. For example, in gaming applications the game-related information (and thus the corresponding gameplay) can be layered on top of real life, and the game player's perceptions can be enhanced by the wearable computer. In a similar manner, the real world can be brought into the game in various ways. For example, virtual objects can be made visible to the player (objects, scenes, matte painting, etc.) but not to other nearby non-players. In addition, avatars (whether real, computer-generated players, or opponents) can similarly be presented, and such avatars can additionally react to the user's context (e.g., presentation of an avatar can be based on the player's physiological state, such as displaying an avatar in a different manner if the user is startled or afraid). An avatar representing a player can also be modified based on the context of the player, such as making the avatar more visible if the person is scared or if the person or avatar is moving too fast.
- Other examples of enhanced gaming (or non-gaming) functionality using augmented reality include displaying virtual information, such as virtual footprints that reveal the passage of a person through an area so as to allow tracking/trailing someone in the game or in real life or to allow the user to retrace their own path. In a similar manner, virtual graffiti tags (i.e., computer-generated markings visible only to participants in the gaming system) can be displayed, providing a variety of possible games and uses (e.g., playing ‘Tag’, or playing a virtual ‘Go’ game played in any agreed boundary, such as by using city blocks as a playing game and seeing the Go pieces from an above-city view, etc.)
- While there are existing examples of presenting a visible logging of where someone or thing has been on a representation of terrain, only very limited information is typically conveyed. By providing a system where arbitrary information can be associated with the logging, the user can enjoy the benefit of richer and more appropriate information that is presented in an optimal manner. For example, the display of the virtual footprints can be overlaid on the user's vision of the real world in the same location as the actual steps were taken. Other functionality can also be provided, such as varying footprint visibility based on the user's context (e.g., the skill of the prey and/or tracker, or having footprints that fade over time). Alternately, an entertainment or training application can use a log of a route of a well-informed person as a guide to others, and information such as the guide's comments or recommendations to supplemental information can also be presented (e.g., as iconographic controls within the route, or as audio information when the location is achieved). Individuals and institutions can use individual or aggregates of individual paths to determine used routes, which can assist in identifying areas of interest and congestion. By allowing such a log of locations and routes to be public, a “Public Scrapbook” can be created over time. In addition, by being able to see a route overlaid on the view of the physical world, a user can easily determine if they have been somewhere before (e.g., to avoid being lost or to find a way through complex terrain).
- The ability of the computing devices of the various players to communicate also provides enhanced functionality. For example, distributed observations can be provided by a system of connected players, such as by augmenting a player's senses with information from teammates or allowing a player to hack into other team's members and experience their environments. Remote tele-presence sensing can also be provided, such as providing a view to a user of a lookout in a tower. In addition, dynamic aggregation of players can be used to determine if there are enough people available to play a game at a given moment, either locally or worldwide depending on the nature of the game. The use of context information about such other players allows for the choosing of opponents and team members based on the capabilities, interests, or other arbitrary characteristics of the players. In addition, games rules (e.g., defaults) can be modified based on communications between players (or by selecting a group of players with common interests).
- Thus, as noted above, augmented reality allows games to react to real world events, such as by determining player positions in the game via the physical location of the user (e.g., via available locating devices such as GPS, EGPS, etc.). More generally, the context attributes that are used to characterize a user's virtual world could be based on the context attributes from the physical world—thus, a computer-generated person or object shown in an augmented reality context could have the same characteristics as a real person. One application of such attribute mapping would be the control of a digital representation of a user by basing its appearance in part on the user's context model, thus allowing the digital representation to respond to changes in the user's physical world. For example, in response to a user becoming fatigued in the real world, the corresponding avatar's strength or speed could similarly be reduced, or an avatar's posture could change along with that of the user. A context attribute such as user fatigue can be measured in various ways (e.g., the speed of user movement, stooping, speech slurring, etc.) In addition to basing an avatar's appearance and capabilities on those of its corresponding user, other game-provided functionality can also be altered in response to changes in a user's context. For example, the capabilities provided to a user could be varied based on the skill level of the user. In addition, games can be dynamically optimized during play based on the changing user context (e.g., changing skill level or tendencies of the player that are learned by the game), whether automatically by the game or by a game organizer.
- Games can also react to or incorporate the real word in other ways. For example, users' movements can be incorporated fully into the game, and are not limited to the constraints of a specialized input device such as a Dataglove or a device that senses hand movements immediately proximate to the device (e.g., via analysis of video image from a camera that can see a user's arm movements, or via motion sensing devices on various limbs of the user). Tracking and using such movements allows fighting games to include more than just hand-eye coordination, and can allow simulated use and movement of virtual weapons (e.g., guns and sabers) or virtual body parts (e.g., playing karate against the computer).
- In a similar manner, augmented reality allows the gaming experience to impact the real world in various ways. For example, if a user is wearing a goggle display device or a computer-controlled brace on a limb, the player's vision could be occluded or the use of the limb restricted based on events that occur in the game. In addition, using output devices such as goggle display devices and earpiece speakers/noise-canceling devices, the presence or appearance of a player can be altered for other players. Moreover, new senses can be generated and supplied to the player, and existing senses can be enhanced or remapped. For example, a “Hide & Seek” game is more challenging if the players have infrared or night-vision capabilities, and sonar allows a user to see behind themselves. Similarly, augmented hearing or sight can provide new abilities to a user, or information (e.g., a ringing sound) could be generated to represent an entirely new sense (e.g., the ability to sense the nearby presence of Evil).
- Such enhancement capabilities can benefit a wide variety of currently available games, and can additionally make possible new games. For example, an “Assassin” game could be played by any group of people with wearable computing devices at any time (e.g., strangers at an airport dynamically identify each other as interested in playing and then begin playing using virtual weapons). As noted above, player appearance can be altered with appropriate output devices, and additional information can be provided via linked gaming computing devices (e.g., an Assassin is within 100 yards). “Team Fortress” could similarly be played in the real world, allowing real-time collaboration between players, as could “Virtual Tennis” between two players anywhere in the world. Similarly, “Rally”, a scavenger hunt using player context (e.g., current location) to generate clues, and virtual gambling that is constantly available (whether individual or group games) are other examples.
- In addition, new capabilities could be provided, such as an ability to plant virtual sensors that detect other game players or to plant virtual landmines that reveal players when triggered (e.g., visually augmenting the revealed player's presentation and/or providing location and other context information about the player to other players). In addition, sensors could be provided in physical devices, such as a Bluetooth-enabled golf ball that assists users in recovering lost balls. Moreover, if various mental user context information can be detected (e.g., via choices signaled by Hz on-screen-frequency-selection and/or via biofeedback), games could react to such information. In addition, a variety of types of interesting information (both context attribute information and other information) could be provided to external audiences (or to team members or competitors) in a similar manner to cameras in NASCAR autos. This allows observation of games that are currently unobservable, such as “Half-Life” or various other games viewed with a wearable computing device. By providing relevant information to a game organized/manager, that person can opportunistically manage on-going games.
-
FIG. 9 is a block diagram illustrating an architecture for enhancing gaming environments by providing appropriate information and functionality based on a user's context. As is shown, various components execute in memory of a user's gaming computing device, including one ormore game applications 938. Various optional game enhancement components 941-949 are also illustrated, although those skilled in the art will appreciate that in alternate embodiments only some of the components may be present. In addition, in other embodiments the game applications themselves will incorporate the desired enhancement functionalities. While the illustrated embodiment also shows a receivedinformation filtering component 934,information sharing component 936, andcontext modeler component 932 executing in memory, in other embodiments some or all of these components may not be present. The information filtering and sharing components, as well as various of the game enhancement components, can communicate with various other computing devices as illustrated. -
FIG. 10 is a flow diagram of an embodiment of a Gaming routine. The routine provides various enhanced gaming functionality by using context information of the user, as is illustrated and is described elsewhere. - As noted above, the use of various context information can provide a variety of types of game enhancements. Examples of relevant types of context information include the following:
- Physical Characteristics
-
- Fatigue—if the player is tired, this can be used to change the capabilities of their game character by making it slower.
- Dexterity someone with limited physical skills may be programmatically associated with characters of reduced skill, thereby giving a realistic expression to their capability. Conversely, their input device responses may instead be enhanced, thus giving them opportunities to compete on a more equal and satisfying basis.
- Location—where a player currently is, or will be. This can be used for games that involve the real world, such as geo-caching, or games that require access to physical facilities. This is also useful for games and competitions that are races through physical locations.
- Availability—when a player can play, for how long. Also, how much they are willing to pay or risk.
- Payment—indication that player or group has paid entrance fee or dues.
- Insurance—indication that player or group has necessary insurance.
- Mental Characteristics
-
- Skill—a player's or teams' skill (e.g., based on self-characterization, automated handicapping system, 3rd party rating, etc.) can be used to match them with appropriate adversaries. This can also be used by a spectator to choose what matches to watch.
- Memberships—enumeration of which organizations or groups a player belongs to. This can include certifications by gaming, safety or other organizations.
- Familiarity—in contrast to Skill, which relates to proficiency, Familiarity provides an indication of a potential player's ability to play the game. For example, are they familiar with the rules of the game?
- Interest—a player can indicate, or have stored an indication of, the characteristics of games that they are interested in joining, observing, officiating, reviewing, buying, or selling.
- Current & Past Scores—a log of an individual's or teams' performance can be maintained and shared.
- Age—useful in determining appropriateness of game content. Since game environments can dynamically respond to changes in aggregate player characteristics, this attribute can be used to determine when it is appropriate to change the content from child to adult. For example, later in the evenings, after children stop playing, more adult language and themes can be employed. Alternately, when a family is simultaneously playing the same game, provide a more limited or different set of content to the children than is provided to the parents.
- Roles—Role playing games often have game characters that have persistence over multiple game sessions. Attributes characterizing the game roles, including character names, experience, and skills, can be shared.
- Language—which language(s) the player speaks
- Risk—indication of how much risk, physical or monetary, the player is willing to experience.
- Platform Capability
-
- I/O Devices—to what devices does the player have access, and what are their capabilities? For example, can the player use a head-mounted display that supports the superimposition of color computer-generated images over their view of the real world?
- Processing—how fast is the player's computer (CPU, RAM, video cache, etc.)
- Game Capability—an enumeration of games, or levels of games, can be explicitly enumerated
- Storage—how much mass storage is available for games
- Software—what software is available
- Data Capability
-
- Connectivity—what is the bandwidth and speed (sometimes called “ping time”) of the computer platform's network connections
- Security—what protocols are supported
- Various group characteristic information can also be provided and used, such as attribute permission schemes that indicate the scope of information to be shared. Attributes can also characterize or identify the different groups of users to which the permission scopes will apply. For instances, different group scopes can include the following: the player (they might be able to see all of their attributes, or instead some may be hidden or provide false information during some games), the player's team (they made be able to see some/all of their teammates, and aggregate team attributes), the game's organizers and officials (they could see all players attributes, for example), the game's commentators (they could see some/all team and player attributes), and the game's audience (they could see some/all team and player attributes).
- The disclosed techniques for selecting and presenting appropriate information can be used in some embodiments to modify the normal operation of the user's senses in various ways. Moreover, there are many examples of sensory enhancements that can benefit from a general model of user context. For example, context information can indicate when and how to map electromagnetic spectrum frequencies to human perceivable frequencies (UV, IR), sound, pressure, etc. Each spectrum frequency could additionally be mapped in a variety of ways. For example, with respect to sound, the mapping could provide example functionalities as indicated in the following list:
-
- greater frequency sensitivity
- greater volume sensitivity and/or volume normalization (e.g., increase low and suppress high frequencies, or increase the compressed dynamic range such that the average sound is greater even though the peak volumes do not change)
- selective frequency suppression (e.g., low rumbles while in engine room)
- noise cancellation (not just fixed, but user-selective in type and degree)
- mapping of senses (e.g., proximity to objects is translated into sounds, a VU meter, determining the tempo of the music, etc.)
- Moreover, a computing device could provide additional sound-related functionalities, such as triggering notifications or functionality when certain conditions are met (e.g., when siren occurs the audio is lowered, a SID monitor, detect when engine sound deviates from normal, a dangerous volume monitor, etc.). Sounds could also be automatically identified, such as by identifying a human speaker based on voice, a fire truck or police car, friendly versus enemy fire, etc. Sounds can additionally be characterized in various ways, such as to determine whether the gun fire is aimed in my direction, whether the fire truck is coming toward me, whether that bird call was from a real bird, how far away was that twig snap, etc.
- Augmenting reality (e.g., with computer-generated images, sounds, smells, sensations, etc.) is not limited to adding or transforming indicated, measured or inferred data—instead, it can also include the blocking of real-world stimuli. For example, when light of a potentially hazardous amplitude or frequency is detected, the portion of a transparent display through which the radiation is passing can be made opaque, thereby protecting the user's eyes. Similarly, audio noise canceling algorithms can be used to protect hearing. The system can also obscure undesirable options, such as sub-optimal routes when driving at high speed in an unconstrained terrain (like desert). For workers who are be visually distracted by their environment (e.g., by people in adjoining cubicles), non-work related stimuli could be obscured. In addition, computer controls can be hidden based on the context as an alternate way to give prominence to something in the real world (i.e., by obscuring less relevant information). For training purposes, the system could eliminate incorrect choices over time to assist a user in identifying the correct choices and judging their mastery of the task. For entertainment purposes, a temporary or permanent loss of perception can be provided during a game (e.g., when a player has been successfully attacked). Moreover, it is not just senses that can be modified, but also physical capabilities or cognitive ability (e.g., there can be less game or context information or computing capabilities made available in order to simulate the loss of personal or equipment function).
-
FIG. 11 is a flow diagram of an embodiment of an Augmented Reality routine. The routine augments real world information available to a user with virtual information based on the user's context, as is illustrated and is described elsewhere. - As described above, augmented reality involves presenting virtual information in conjunction with real world information that is available to the user. However, existing technology is often unable to dynamically integrate virtual images with the real world without hardware clues. Maintaining the overlaying, or visual mapping, of virtual objects on top of real-world objects is known as registration. One example of registration is superimposing a virtual image of a wire over the real-world view of the wire, and having that virtual wire remain properly associated with the real wire while the user's head may be moving. Technology can perform this by adding visual clues to the hardware, such as dots on the circuit board containing the wire. Another example of the difficulty in managing the overlay of virtual info onto the real world is the difficulty formatting computer controls without conflict with viewing the real world.
- While registration functionality is difficult to provide using existing technology, the use of current context information about the user can greatly facilitate the providing of registration without the use of hardware cues. Thus, some embodiments of the invention include a context-aware system that models the user, and uses this model to present virtual information on a display in a way that it corresponds to and enhances the user's view of the real world.
- In one embodiment, the system displays information to the user in visual layers. One example of this is a constellation layer that displays constellations in the sky based on the portion of the real-world sky that the user is viewing. As the user's view of the night sky changes, the system shifts the displayed virtual constellation information with the visible stars. This embodiment is also able to calculate and display the constellation layer during the day based on the user's location and view of the sky. This constellation information can be organized in a virtual layer that provides the user ease-of-use controls, including the ability to activate or deactivate the display of constellation information as a layer of information.
- In a further embodiment, the system groups various categories of computer-presented information related to the commonality of the information. In some embodiments, the user chooses the groups. These groups are presented to the user as visual layers, and these layers of grouped information can be visually controlled (e.g., turned off, or visually enhanced, reduced) by controlling the transparency of the layer.
- Another embodiment presents information about nearby objects to the user in a manner that is synchronized with the real world surroundings. This information can be displayed in a variety of ways using this layering invention of mapping virtual information with the real-world view. One example involves enhancing the display of ATMs to a user, such as via a layer showing streets and ATM locations or a layer that displays ATMs near the user. Once the user has found an ATM, the system could turn off the layer automatically, or instead (e.g., based on the user's configuration of the behavior) could simply allow the user to turn off the layer.
- Another embodiment displays a layer of information, on top of the real-world view, that shows information representing the path the user traveled between different points of interest. Possible visual clues (or “bread crumbs”) could be any kind of visual image, like a dashed line, dots or footprints, to represent the route the user traveled. One example involves a user searching a parking garage for a lost car. If the user cannot remember where the car is parked and is searching the parking garage, the system can trace the search-route and help the user avoid searching the same locations by displaying that route. In a related situation, if the bread-crumb trail was activated when the user parked the car, the user could turn on that layer of information and follow the virtual trail as it displays the information to the user in real-time, thus leading the user directly back to the parked vehicle. This information could also be displayed as a bird's-eye view, such as by showing the path of the user relative to a map of the garage.
- Another embodiment displays route information as a bird's-eye view by showing a path relative to a map. This information is presented in overlaid, transparent, layers of information, and can include streets, hotels and other similar information related to a trip.
- The labeling and selection of a particular layer can be provided to the user in a variety of methods. One example provides labeled tabs, such as those on hanging folders, that can be selected by the user.
- The system can accomplish the presenting of virtual information on top of real-world information by various means. Three main embodiments include tracking head positions, tracking eye positions, and real world pattern recognition. The system can also use a combination of these aspects to obtain sufficient information.
- The head positions can be tracked by a variety of means. Three of these are inertial sensors mounted on the user's head, strain gauges, and environmental tracking of the person. Inertial sensors worn by the user can provide information to the system and help it determine the real-world view of the user. An example of inertial sensors include jewelry that detects the turns of a user's head. Strain gauges (e.g., embedded in a hat or the neck of clothing) measure two axes: left and right, and up and down. The environment can also provide information to the system regarding the user's head and focus, such as via pattern-matching information of the user's head. This can occur from a camera watching head movements, like in a kiosk or other such booth, or any camera that can provide information about the user. Environmental sensors can also perform triangulation based on one or more beacons transmitting information about the user's head and eyes. The sensors of a room or a car can similarly triangulate information about the user and present that information to the system for further use in determining the user's view of the real-world. In addition, the reverse mechanism also works in which the environment broadcasts information about location (or distance from one the sensors in the environment), such that the system in that embodiment of the invention can perform the calculations without needing to broadcast information about the user.
- The user's system can also track the eye positions of the user for use in determining the user's view of the real world, which can be used by the system to integrate the presentation of virtual information with the user's view of the real world.
- Another embodiment involves the system performing pattern recognition of the real world. In this embodiment, the system's software dynamically detects the user's view of the real world and incorporates that information when the system determines where to display the virtual objects such that they remain integrated while the user moves about the real world.
- Existing augmented reality systems are typically designed as tools to show to the user, in an enhanced way, spatial relationships between the virtual computer-generated world and the real world. They are not designed as new means to experience the world where the computer is simultaneously experiencing the world with the user and supplementing the user's experience with information the computer holds or determines and manifesting behavior in a fashion that is integrated with the user's experience of reality. Thus, what is missing in such existing systems is that they do not incorporate an extensible context model of the user. Utilizing a context model allows more complete integration—basing augmented reality on context awareness allows the interaction to become more appropriate and the content dynamically adapts appropriately.
- Thus, using context information as part of an augmented reality system allows the integration of virtual information with real world information in such a manner that the computer does not merely activate output devices that can be directly perceived by the user, but instead the computer-generated information is shown in meaningful relationship to the perception of real-world information. For example, for a computer-generated name tag to be augmented reality in the sense it is used in this disclosure, it would need to appear to the user to be shown associated with the appropriate person.
- Therefore, some embodiments include some or all of the following components in order to provide augmented reality that is enhanced with context information.
-
- An explicit, extensible, dynamic, scalable, efficient software model of the relationship between a user's body and an arbitrarily complex representation of the user's immediate vicinity.
- Abstraction of the context model from sensors—thus, allowing an arbitrary and dynamic set of data to be used in the context model without destabilizing the system
- Determination of what content is appropriate given their real world circumstances and needs
- Logically integrating the virtual and real content from the user's point of view.
- Determination of how to best present the virtual information
- Several determinations are made as part of the disclosed augmented reality system. First, what computer generated information is appropriate given the user's current context? For example, showing an image of an arrow toward North, or showing directions to the Doctor's office. Second, what is the user's current context? For example, the user may be currently heading and looking South. Alternately, the user is in a car with another passenger and can take the carpool lane, the appointment is 2 miles away but isn't for 20 minutes; and there are errands at the drugstore that can be accomplished along the way. Third, how can the appropriate information be presented so that it is meaningfully integrated into the user's perception of their world? For example, a small arrow can be displayed at the bottom of the screen pointing down. Alternately, directions can be provided that include use of carpool lanes and times that are reflective of speedier passage, with the amended directions and route drawn onto the road and the drugstore indicated as an interim destination.
-
FIG. 7 is a block diagram illustrating an architecture for augmenting reality by presenting appropriate information based on a user's context. Various information is illustrated, as is described in greater detail below. -
User 770 - Can include any person or animal that can perceive stimulus from both the real world and computer-generated.
- The user maintains a bi-directional dialog with the computing environment via input and output devices, such as via gestures and utterances that are intended to convey intention to the computer, and generates context data that can include not only the gestures and utterances but also measurements, observations, narrations, third-party commentary, etc.
- Local I/
O Devices 760 - Can include any directly perceived output devices—an example IS any video display that creates photons that are received by human eyes.
- Can include any directly manipulated input devices—an example IS a keyboard or camera w/gesture recognition software.
-
Computing Environment 700 - Can include any hardware platform or platforms, local or remote.
- Provides general computer capabilities; data functions (generation, reception, processing, storage), communications, etc.
-
Presentation Logic 710 - Determines what content is appropriate for the user's current and anticipated contexts based on current or anticipated physical relationship between the user's body and their environment.
- Further can include logic that determines how to integrate from a user's first person point of view and how to communicate the integrated virtual information to the output devices for presentation.
- While the Presentation Logic component can be implemented in a wide variety of ways so that it provides the necessary data structures and logic, a simple architecture is described with respect to
FIG. 8 .FIG. 8 is a block diagram illustrating additional details of the architecture for augmenting reality, with the focus being on primary data flow rather than control information. The Presentation Logic component illustrated inFIG. 8 includes several sub-components, including Format Logic 811 (optionally determines the appearance of the computer-generated data), Integration Logic 812 (determines how to meaningfully combine/integrate the content with the user's point of view of the perceived world), Content Logic 813 (determines what virtual content (e.g., computer-generation information) is appropriate to present to the user given their current circumstances, such as based on a specific task), and Environment Logic 814 (determines the spatial relationship of objects in the environment, including the user's body). -
Format Logic 811 - Responsible for presentation of virtual content, and can be implemented in various ways. An example of logic used in this step is as follows:
-
IF DisplayScheme = UnobstructedView IF NOT Hazard IF AmbientLight = HIGH IF NewMessageOflnterest = TRU E THEN BlinkNewMessagePeripericon
A peripericons in the illustrated embodiments is an iconic visual control that is only displayed in the periphery of the user's position. They do not distract the user from their task, while conveying limited information. They typically do not include text, as users generally do not have sufficient visual acuity to distinguish sufficient detail in the periphery of their vision. -
Integration Logic 812 - Adapts augmented reality presentation based on context information, and can optionally retrieve appropriate context information so that it is available. Considers the purpose of the potential computer-generated content, and the circumstances of the user. It can also take into account hierarchical and overlapping priorities, such as from multiple themes that each match the current context. An example of logic used in this step includes:
-
IF CurrentVideoDisplayDevice = VideoDisplayTypeHeadStabilized IF UserHeadPosition moves THEN IF AnticipatedUserHeadPosition =UserHeadPosition THEN Use AnticipatedVirtuallmagePosition ELSE Use RecalculateVirtuallmagePosition -
Content Logic 813 - Provides various Virtual Objects for presentation that can include image content (text, controls, pictures, avatars, objects, landscapes, personality, etc.) and appearance. In some embodiments this component is not used if the desired computer-generated data is presented directly to the
Integration Logic 812. This is typically not possible for an arbitrary number of tasks, however. Even if tasks are coordinating between themselves on which data is most appropriate to display, a general shared mechanism for them to communicate is needed and the data must take into account the user's context, which requires communications with the user's context model. An example of logic used in this step includes: -
IF PossibleUserPostion = ProximityToHazard THEN DisplayHazardlndication, TellGameAboutHazard IF CurrentUserMotion or AnticipatedUserMotion = ProximityToHazard THEN DisplayProminantHazardlndication, TellGameAboutHazard IF CurrentUserMotion = CloseProximityToHazard THEN DisplayOnlyProminantHazardindication, TellGameAboutHazard IF Hazard AND Emergency AND HighPriorityMessages = FALSE IF Theme = Work I F ShowlDTags is TRUE IF PersonRecogn izedOrlndicated = VISIBLE THEN DisplayNameTag
In some embodiments, the virtual objects are modeled using context information as if they were objects in the physical world. -
Environment Logic 814 - Provides spatial relationships of user and environment objects, and physical characteristics of user and environment objects (e.g., location, mass, motion, texture, appearance, sound, smell, temperature, etc.). Can be implemented in various ways, such as using a datastore of context attributes (whether user's private datastore or a shared context model). Can provide logic via rule/action pairs maintained in the module or provided by as a service by a separate module, such as by a remote server service.
-
Task Logic 720 - Can include software programs that generate user choices with feedback related to a purpose or goal. A simple implementation could be pairs of two values; Rule and Action. Rules could be potential user locations, and Actions would be what the computer should do if the location is reached. This component can interact with and make use of any software application program that programmatically communicates with a publicly known interface commands, such as Microsoft Office, Valve HalfLife, and various Internet browsers.
-
User Context Model 730 - In the illustrated embodiment, an explicit, extensible, dynamic software model of a user's physical, mental, data, and computer environment.
- Coordinating
Tasks 740 - Optionally, the system can coordinate logic with other tasks. For example, most software applications are capable of initiating and receiving instructions with other software programs, including different levels of operating systems.
-
Shared Context 750 - Optionally, the system can coordinate logic with other context models. Models may be of users, groups of users, or other types of context models (e.g., object, location, process, etc.). Most software applications are capable of initiating and receiving instructions with other software programs, including different levels of operating systems.
- The disclosed augmented reality techniques can be used in a variety of scenarios, including the following non-exhaustive list: navigation/routing, conference calls, vehicle operation, role playing games, tours, theme parks, hazard warnings, etc. Examples of uses includes the following.
-
- Gaming: Multi-user applications are enhanced by the ability of gaming systems to receive abstracted descriptions from multiple users. This decreases the required connectivity bandwidth between players, and simplifies game creation by allowing standardized inter-game user context and action interfaces
- Touring: A user drives down the street, turns their head, and can see the URL or descriptive information associated with the real-world image.
- Military: By incorporating what is typically called “Situational Awareness” with first-person point of view displays, valuable information can be presented to the soldier (e.g., indications of friends and foes, indications of hazardous and safe areas and situations, etc.).
- Surveyors: Longitude/latitude, plot boundaries, and other useful marks can be superimposed on the landscape.
- Emergency Crews: Police officers can be presented with task-related information without explicit commands on their part.
- Operating a Vehicle: The system can detect which car a user is driving. Perhaps the user has two cars; a sports car and a large van. They usually drive a sports car, but are currently driving the van. As they approach a curve in the road at a velocity that would be safe in the sports car, but is unsafe in the van, an indication of this situation can be displayed to the user in such a way so as not to excessively distract them and therefore cause a hazard. If they continue to approach the curve at an unsafe speed, the prominence and/or choice of output device can be modified to emphasize the hazard.
- Navigation: Integrated into the user's first person point of view is information useful in determining where they are, and how to follow their current route.
- As another example, an augmented reality tour of a physical attraction (such as a town hall or theme park) can be easily created with this system by creating a database of attraction records. Each record can contain real-world characterization information (e.g., location, hours of operation, possible and optimal routes) and user-filtered interest characterizations (e.g., type of attraction, amount of time required, recommendations of trusted reviewers, supplemental details on attraction or attraction elements, etc.). The database data can be made available to an interpretive engine, which by making use of the user's context model's location attributes can determine which attraction the user is closest to and can provide an indication of such without the user's explicit request. This represents a great simplification, since the creation of additional tour applications only requires the collection of new attraction information and the recording of it in a database. Not only can the interpretive engine be reused, but arbitrary changes in the user's context, including the availability of input/output devices, can be disregarded when creating additional tours.
- Those skilled in the art will also appreciate that in some embodiments the functionality provided by the routines discussed above may be provided in alternate ways, such as being split among more routines or consolidated into less routines. Similarly, in some embodiments illustrated routines may provide more or less functionality than is described, such as when other illustrated routines instead lack or include such functionality respectively, or when the amount of functionality that is provided is altered. Those skilled in the art will also appreciate that the data structures discussed above may be structured in different manners, such as by having a single data structure split into multiple data structures or by having multiple data structures consolidated into a single data structure. Similarly, in some embodiments illustrated data structures may store more or less information than is described, such as when other illustrated data structures instead lack or include such information respectively, or when the amount or types of information that is stored is altered.
- From the foregoing it will be appreciated that, although specific embodiments have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims. In addition, while certain aspects of the invention are presented below in certain claim forms, the inventors contemplate the various aspects of the invention in any available claim form. For example, while only one some aspects of the invention may currently be recited as being embodied in a computer-readable medium, other aspects may likewise be so embodied. Accordingly, the inventors reserve the right to add additional claims after filing the application to pursue such additional claim forms for other aspects of the invention.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/898,623 US20180241708A1 (en) | 1998-12-18 | 2018-02-18 | Controlling whether incoming information is blocked |
Applications Claiming Priority (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/216,193 US6466232B1 (en) | 1998-12-18 | 1998-12-18 | Method and system for controlling presentation of information to a user based on the user's condition |
US09/464,659 US6513046B1 (en) | 1999-12-15 | 1999-12-15 | Storing and recalling information to augment human memories |
US19475800P | 2000-04-02 | 2000-04-02 | |
US19400000P | 2000-04-02 | 2000-04-02 | |
US19399900P | 2000-04-02 | 2000-04-02 | |
US19662500P | 2000-04-12 | 2000-04-12 | |
US24069400P | 2000-10-16 | 2000-10-16 | |
US09/824,900 US6968333B2 (en) | 2000-04-02 | 2001-04-02 | Soliciting information based on a computer user's context |
US09/825,159 US7076737B2 (en) | 1998-12-18 | 2001-04-02 | Thematic response to a computer user's context, such as by a wearable personal computer |
US09/835,077 US7073129B1 (en) | 1998-12-18 | 2001-04-12 | Automated selection of appropriate information based on a computer user's context |
US11/435,326 US7395507B2 (en) | 1998-12-18 | 2006-05-16 | Automated selection of appropriate information based on a computer user's context |
US12/165,377 US9183306B2 (en) | 1998-12-18 | 2008-06-30 | Automated selection of appropriate information based on a computer user's context |
US14/486,777 US9906474B2 (en) | 1998-12-18 | 2014-09-15 | Automated selection of appropriate information based on a computer user's context |
US15/898,623 US20180241708A1 (en) | 1998-12-18 | 2018-02-18 | Controlling whether incoming information is blocked |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/486,777 Continuation US9906474B2 (en) | 1998-12-18 | 2014-09-15 | Automated selection of appropriate information based on a computer user's context |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180241708A1 true US20180241708A1 (en) | 2018-08-23 |
Family
ID=40222296
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/165,377 Expired - Fee Related US9183306B2 (en) | 1998-12-18 | 2008-06-30 | Automated selection of appropriate information based on a computer user's context |
US14/486,777 Expired - Fee Related US9906474B2 (en) | 1998-12-18 | 2014-09-15 | Automated selection of appropriate information based on a computer user's context |
US15/898,623 Abandoned US20180241708A1 (en) | 1998-12-18 | 2018-02-18 | Controlling whether incoming information is blocked |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/165,377 Expired - Fee Related US9183306B2 (en) | 1998-12-18 | 2008-06-30 | Automated selection of appropriate information based on a computer user's context |
US14/486,777 Expired - Fee Related US9906474B2 (en) | 1998-12-18 | 2014-09-15 | Automated selection of appropriate information based on a computer user's context |
Country Status (1)
Country | Link |
---|---|
US (3) | US9183306B2 (en) |
Families Citing this family (176)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7779015B2 (en) * | 1998-12-18 | 2010-08-17 | Microsoft Corporation | Logging and analyzing context attributes |
US8181113B2 (en) | 1998-12-18 | 2012-05-15 | Microsoft Corporation | Mediating conflicts in computer users context data |
US7231439B1 (en) * | 2000-04-02 | 2007-06-12 | Tangis Corporation | Dynamically swapping modules for determining a computer user's context |
US7046263B1 (en) | 1998-12-18 | 2006-05-16 | Tangis Corporation | Requesting computer user's context data |
US6791580B1 (en) * | 1998-12-18 | 2004-09-14 | Tangis Corporation | Supplying notifications related to supply and consumption of user context data |
US7225229B1 (en) | 1998-12-18 | 2007-05-29 | Tangis Corporation | Automated pushing of computer user's context data to clients |
US6801223B1 (en) * | 1998-12-18 | 2004-10-05 | Tangis Corporation | Managing interactions between computer users' context models |
US6920616B1 (en) | 1998-12-18 | 2005-07-19 | Tangis Corporation | Interface for exchanging context data |
US8225214B2 (en) | 1998-12-18 | 2012-07-17 | Microsoft Corporation | Supplying enhanced computer user's context data |
US6513046B1 (en) * | 1999-12-15 | 2003-01-28 | Tangis Corporation | Storing and recalling information to augment human memories |
US6842877B2 (en) | 1998-12-18 | 2005-01-11 | Tangis Corporation | Contextual responses based on automated learning techniques |
US7596606B2 (en) * | 1999-03-11 | 2009-09-29 | Codignotto John D | Message publishing system for publishing messages from identified, authorized senders |
US6714967B1 (en) * | 1999-07-30 | 2004-03-30 | Microsoft Corporation | Integration of a computer-based message priority system with mobile electronic devices |
US6622160B1 (en) * | 1999-07-30 | 2003-09-16 | Microsoft Corporation | Methods for routing items for communications based on a measure of criticality |
US7194681B1 (en) * | 1999-07-30 | 2007-03-20 | Microsoft Corporation | Method for automatically assigning priorities to documents and messages |
AU2001249768A1 (en) * | 2000-04-02 | 2001-10-15 | Tangis Corporation | Soliciting information based on a computer user's context |
US7464153B1 (en) * | 2000-04-02 | 2008-12-09 | Microsoft Corporation | Generating and supplying user context data |
GB2386724A (en) * | 2000-10-16 | 2003-09-24 | Tangis Corp | Dynamically determining appropriate computer interfaces |
US20020054130A1 (en) * | 2000-10-16 | 2002-05-09 | Abbott Kenneth H. | Dynamically displaying current status of tasks |
US20080221793A1 (en) * | 2003-01-24 | 2008-09-11 | Shotspotteer, Inc. | Systems and methods of tracking and/or avoiding harm to certain devices or humans |
GB0703974D0 (en) * | 2007-03-01 | 2007-04-11 | Sony Comp Entertainment Europe | Entertainment device |
US7990387B2 (en) * | 2007-08-16 | 2011-08-02 | International Business Machines Corporation | Method and apparatus for spawning projected avatars in a virtual universe |
US8345049B2 (en) * | 2007-08-16 | 2013-01-01 | International Business Machine Corporation | Method and apparatus for predicting avatar movement in a virtual universe |
US9003304B2 (en) * | 2007-08-16 | 2015-04-07 | International Business Machines Corporation | Method and apparatus for moving an avatar in a virtual universe |
US8127235B2 (en) | 2007-11-30 | 2012-02-28 | International Business Machines Corporation | Automatic increasing of capacity of a virtual space in a virtual world |
US20090164919A1 (en) | 2007-12-24 | 2009-06-25 | Cary Lee Bates | Generating data for managing encounters in a virtual world environment |
US8170222B2 (en) * | 2008-04-18 | 2012-05-01 | Sony Mobile Communications Ab | Augmented reality enhanced audio |
US8671349B2 (en) * | 2008-05-15 | 2014-03-11 | International Business Machines Corporation | Virtual universe teleportation suggestion service |
US20100030804A1 (en) * | 2008-07-31 | 2010-02-04 | International Business Machines Corporation | Synchronization of Locations in Real and Virtual Worlds |
US8487772B1 (en) | 2008-12-14 | 2013-07-16 | Brian William Higgins | System and method for communicating information |
US20120046995A1 (en) * | 2009-04-29 | 2012-02-23 | Waldeck Technology, Llc | Anonymous crowd comparison |
KR101285474B1 (en) * | 2009-06-16 | 2013-07-12 | 인텔 코오퍼레이션 | Camera applications in a handheld device |
KR20100138700A (en) * | 2009-06-25 | 2010-12-31 | 삼성전자주식회사 | Virtual World Processing Unit and Methods |
US8018943B1 (en) * | 2009-07-31 | 2011-09-13 | Anue Systems, Inc. | Automatic filter overlap processing and related systems and methods |
US8934495B1 (en) | 2009-07-31 | 2015-01-13 | Anue Systems, Inc. | Filtering path view graphical user interfaces and related systems and methods |
US8098677B1 (en) | 2009-07-31 | 2012-01-17 | Anue Systems, Inc. | Superset packet forwarding for overlapping filters and related systems and methods |
US20120206335A1 (en) * | 2010-02-28 | 2012-08-16 | Osterhout Group, Inc. | Ar glasses with event, sensor, and user action based direct control of external devices with feedback |
US9128281B2 (en) | 2010-09-14 | 2015-09-08 | Microsoft Technology Licensing, Llc | Eyepiece with uniformly illuminated reflective display |
EP2539759A1 (en) * | 2010-02-28 | 2013-01-02 | Osterhout Group, Inc. | Local advertising content on an interactive head-mounted eyepiece |
US8467133B2 (en) | 2010-02-28 | 2013-06-18 | Osterhout Group, Inc. | See-through display with an optical assembly including a wedge-shaped illumination system |
US8477425B2 (en) | 2010-02-28 | 2013-07-02 | Osterhout Group, Inc. | See-through near-eye display glasses including a partially reflective, partially transmitting optical element |
US8472120B2 (en) | 2010-02-28 | 2013-06-25 | Osterhout Group, Inc. | See-through near-eye display glasses with a small scale image source |
US9759917B2 (en) | 2010-02-28 | 2017-09-12 | Microsoft Technology Licensing, Llc | AR glasses with event and sensor triggered AR eyepiece interface to external devices |
US20150309316A1 (en) | 2011-04-06 | 2015-10-29 | Microsoft Technology Licensing, Llc | Ar glasses with predictive control of external device based on event input |
US9223134B2 (en) | 2010-02-28 | 2015-12-29 | Microsoft Technology Licensing, Llc | Optical imperfections in a light transmissive illumination system for see-through near-eye display glasses |
US8488246B2 (en) | 2010-02-28 | 2013-07-16 | Osterhout Group, Inc. | See-through near-eye display glasses including a curved polarizing film in the image source, a partially reflective, partially transmitting optical element and an optically flat film |
US20110214082A1 (en) * | 2010-02-28 | 2011-09-01 | Osterhout Group, Inc. | Projection triggering through an external marker in an augmented reality eyepiece |
US9285589B2 (en) | 2010-02-28 | 2016-03-15 | Microsoft Technology Licensing, Llc | AR glasses with event and sensor triggered control of AR eyepiece applications |
US9229227B2 (en) | 2010-02-28 | 2016-01-05 | Microsoft Technology Licensing, Llc | See-through near-eye display glasses with a light transmissive wedge shaped illumination system |
US8482859B2 (en) | 2010-02-28 | 2013-07-09 | Osterhout Group, Inc. | See-through near-eye display glasses wherein image light is transmitted to and reflected from an optically flat film |
US9134534B2 (en) | 2010-02-28 | 2015-09-15 | Microsoft Technology Licensing, Llc | See-through near-eye display glasses including a modular image source |
US9097891B2 (en) | 2010-02-28 | 2015-08-04 | Microsoft Technology Licensing, Llc | See-through near-eye display glasses including an auto-brightness control for the display brightness based on the brightness in the environment |
US9129295B2 (en) | 2010-02-28 | 2015-09-08 | Microsoft Technology Licensing, Llc | See-through near-eye display glasses with a fast response photochromic film system for quick transition from dark to clear |
US9097890B2 (en) | 2010-02-28 | 2015-08-04 | Microsoft Technology Licensing, Llc | Grating in a light transmissive illumination system for see-through near-eye display glasses |
US10180572B2 (en) | 2010-02-28 | 2019-01-15 | Microsoft Technology Licensing, Llc | AR glasses with event and user action control of external applications |
US9091851B2 (en) | 2010-02-28 | 2015-07-28 | Microsoft Technology Licensing, Llc | Light control in head mounted displays |
US9366862B2 (en) | 2010-02-28 | 2016-06-14 | Microsoft Technology Licensing, Llc | System and method for delivering content to a group of see-through near eye display eyepieces |
US9341843B2 (en) | 2010-02-28 | 2016-05-17 | Microsoft Technology Licensing, Llc | See-through near-eye display glasses with a small scale image source |
US20120249797A1 (en) | 2010-02-28 | 2012-10-04 | Osterhout Group, Inc. | Head-worn adaptive display |
US9182596B2 (en) | 2010-02-28 | 2015-11-10 | Microsoft Technology Licensing, Llc | See-through near-eye display glasses with the optical assembly including absorptive polarizers or anti-reflective coatings to reduce stray light |
US9323844B2 (en) | 2010-06-11 | 2016-04-26 | Doat Media Ltd. | System and methods thereof for enhancing a user's search experience |
US9529918B2 (en) | 2010-06-11 | 2016-12-27 | Doat Media Ltd. | System and methods thereof for downloading applications via a communication network |
US20170024477A1 (en) * | 2010-06-11 | 2017-01-26 | Doat Media Ltd. | Server and method for providing content items based on executions of applications |
US10713312B2 (en) | 2010-06-11 | 2020-07-14 | Doat Media Ltd. | System and method for context-launching of applications |
US9910866B2 (en) * | 2010-06-30 | 2018-03-06 | Nokia Technologies Oy | Methods, apparatuses and computer program products for automatically generating suggested information layers in augmented reality |
US9079494B2 (en) | 2010-07-01 | 2015-07-14 | Mill Mountain Capital, LLC | Systems, devices and methods for vehicles |
WO2012020409A1 (en) * | 2010-08-09 | 2012-02-16 | Metal Compass Ltd. | Mobile gaming platform system and method |
KR101690955B1 (en) * | 2010-10-04 | 2016-12-29 | 삼성전자주식회사 | Method for generating and reproducing moving image data by using augmented reality and photographing apparatus using the same |
CN101976191A (en) * | 2010-10-15 | 2011-02-16 | 无敌科技(西安)有限公司 | Method and device for changing user interface theme along with outside change |
US20120109868A1 (en) * | 2010-11-01 | 2012-05-03 | Microsoft Corporation | Real-Time Adaptive Output |
US20130218999A1 (en) * | 2010-12-01 | 2013-08-22 | John Martin | Electronic message response and remediation system and method |
US9589254B2 (en) | 2010-12-08 | 2017-03-07 | Microsoft Technology Licensing, Llc | Using e-mail message characteristics for prioritization |
US20120150772A1 (en) * | 2010-12-10 | 2012-06-14 | Microsoft Corporation | Social Newsfeed Triage |
US20130275513A1 (en) * | 2011-01-01 | 2013-10-17 | Valeriy Borovyk | Wireless ad-hoc network facilitating social interactions among plurality of users |
JP2012155655A (en) * | 2011-01-28 | 2012-08-16 | Sony Corp | Information processing device, notification method, and program |
CN102130914B (en) * | 2011-03-10 | 2014-07-09 | 中国电信股份有限公司 | Method and device for pushing multimedia file |
US8810598B2 (en) | 2011-04-08 | 2014-08-19 | Nant Holdings Ip, Llc | Interference based augmented reality hosting platforms |
JP5872183B2 (en) * | 2011-04-08 | 2016-03-01 | 株式会社ユニバーサルエンターテインメント | Information processing system, preference visualization system, censorship system, and preference visualization method |
KR101829254B1 (en) * | 2011-05-23 | 2018-02-19 | 삼성전자 주식회사 | Operating Method For Personnel Social Information And System supporting the same |
US8190749B1 (en) * | 2011-07-12 | 2012-05-29 | Google Inc. | Systems and methods for accessing an interaction state between multiple devices |
US8832233B1 (en) * | 2011-07-20 | 2014-09-09 | Google Inc. | Experience sharing for conveying communication status |
US20130054316A1 (en) * | 2011-08-22 | 2013-02-28 | Microsoft Corporation | Managing presentation of commercial communications including electronic mail and advertisements |
US9285871B2 (en) * | 2011-09-30 | 2016-03-15 | Microsoft Technology Licensing, Llc | Personal audio/visual system for providing an adaptable augmented reality environment |
US9389677B2 (en) | 2011-10-24 | 2016-07-12 | Kenleigh C. Hobby | Smart helmet |
US8752963B2 (en) | 2011-11-04 | 2014-06-17 | Microsoft Corporation | See-through display brightness control |
WO2013078345A1 (en) | 2011-11-21 | 2013-05-30 | Nant Holdings Ip, Llc | Subscription bill service, systems and methods |
US20130145276A1 (en) * | 2011-12-01 | 2013-06-06 | Nokia Corporation | Methods and apparatus for enabling context-aware and personalized web content browsing experience |
US9219768B2 (en) | 2011-12-06 | 2015-12-22 | Kenleigh C. Hobby | Virtual presence model |
US9256862B2 (en) | 2012-02-10 | 2016-02-09 | International Business Machines Corporation | Multi-tiered approach to E-mail prioritization |
US9152953B2 (en) | 2012-02-10 | 2015-10-06 | International Business Machines Corporation | Multi-tiered approach to E-mail prioritization |
CN103312734A (en) * | 2012-03-08 | 2013-09-18 | 中兴通讯股份有限公司 | Wallpaper pushing method and device |
KR101964914B1 (en) * | 2012-05-10 | 2019-04-03 | 삼성전자주식회사 | Method for performing auto naming for content and apparatus having auto naming function for content, and computer readable recording medium thereof |
US20140058679A1 (en) * | 2012-08-23 | 2014-02-27 | Apple Inc. | Wake Status Detection for Suppression and Initiation of Notifications |
TWI528823B (en) * | 2012-08-28 | 2016-04-01 | 緯創資通股份有限公司 | Device and method for displaying and adjusting image information |
US10713846B2 (en) | 2012-10-05 | 2020-07-14 | Elwha Llc | Systems and methods for sharing augmentation data |
US10180715B2 (en) | 2012-10-05 | 2019-01-15 | Elwha Llc | Correlating user reaction with at least an aspect associated with an augmentation of an augmented view |
US10269179B2 (en) | 2012-10-05 | 2019-04-23 | Elwha Llc | Displaying second augmentations that are based on registered first augmentations |
US20140143328A1 (en) * | 2012-11-20 | 2014-05-22 | Motorola Solutions, Inc. | Systems and methods for context triggered updates between mobile devices |
US9728008B2 (en) * | 2012-12-10 | 2017-08-08 | Nant Holdings Ip, Llc | Interaction analysis systems and methods |
US10397162B2 (en) * | 2012-12-14 | 2019-08-27 | Facebook, Inc. | Sending notifications to members of social group in a social networking system |
EP2936791B1 (en) * | 2012-12-21 | 2017-01-04 | Dolby Laboratories Licensing Corporation | Audio burst collision resolution |
US10649619B2 (en) * | 2013-02-21 | 2020-05-12 | Oath Inc. | System and method of using context in selecting a response to user device interaction |
US10025486B2 (en) | 2013-03-15 | 2018-07-17 | Elwha Llc | Cross-reality select, drag, and drop for augmented reality systems |
US10109075B2 (en) | 2013-03-15 | 2018-10-23 | Elwha Llc | Temporal element restoration in augmented reality systems |
US9639964B2 (en) | 2013-03-15 | 2017-05-02 | Elwha Llc | Dynamically preserving scene elements in augmented reality systems |
US20140298195A1 (en) * | 2013-04-01 | 2014-10-02 | Harman International Industries, Incorporated | Presence-aware information system |
US10262462B2 (en) | 2014-04-18 | 2019-04-16 | Magic Leap, Inc. | Systems and methods for augmented and virtual reality |
JP5786900B2 (en) * | 2013-06-13 | 2015-09-30 | 横河電機株式会社 | Information display device and information display method |
WO2015009273A1 (en) * | 2013-07-15 | 2015-01-22 | Nokia Corporation | Method and apparatus for filtering of a notification |
US9197643B2 (en) | 2013-07-22 | 2015-11-24 | Bank Of America Corporation | Application and permission integration |
US9575721B2 (en) | 2013-07-25 | 2017-02-21 | Lg Electronics Inc. | Head mounted display and method of controlling therefor |
US10110535B1 (en) | 2013-08-06 | 2018-10-23 | Google Llc | Methods for paid placement of promotional e-mail messages |
US9027106B2 (en) * | 2013-08-14 | 2015-05-05 | Bank Of America Corporation | Organizational attribution of user devices |
KR102108066B1 (en) * | 2013-09-02 | 2020-05-08 | 엘지전자 주식회사 | Head mounted display device and method for controlling the same |
US9582516B2 (en) | 2013-10-17 | 2017-02-28 | Nant Holdings Ip, Llc | Wide area augmented reality location-based services |
US9996529B2 (en) | 2013-11-26 | 2018-06-12 | Oracle International Corporation | Method and system for generating dynamic themes for social data |
US10002187B2 (en) | 2013-11-26 | 2018-06-19 | Oracle International Corporation | Method and system for performing topic creation for social data |
US10482480B2 (en) * | 2014-02-19 | 2019-11-19 | Enlighted, Inc. | Occupancy interaction detection |
WO2015133657A1 (en) * | 2014-03-03 | 2015-09-11 | Lg Electronics Inc. | Terminal and method for controlling the same |
US9537805B2 (en) | 2014-03-27 | 2017-01-03 | Dropbox, Inc. | Activation of dynamic filter generation for message management systems through gesture-based input |
US9197590B2 (en) * | 2014-03-27 | 2015-11-24 | Dropbox, Inc. | Dynamic filter generation for message management systems |
JP6298538B2 (en) | 2014-03-27 | 2018-03-20 | ドロップボックス, インコーポレイテッド | Enabling dynamic filter generation for message management systems via gesture-based input |
US9467385B2 (en) | 2014-05-29 | 2016-10-11 | Anue Systems, Inc. | Cloud-based network tool optimizers for server cloud networks |
US10282696B1 (en) * | 2014-06-06 | 2019-05-07 | Amazon Technologies, Inc. | Augmented reality enhanced interaction system |
US9781044B2 (en) | 2014-07-16 | 2017-10-03 | Anue Systems, Inc. | Automated discovery and forwarding of relevant network traffic with respect to newly connected network tools for network tool optimizers |
US20180227735A1 (en) | 2014-08-25 | 2018-08-09 | Phyziio, Inc. | Proximity-Based Attribution of Rewards |
US9386401B2 (en) * | 2014-08-25 | 2016-07-05 | Steven K. Gold | Proximity-based sensing, communicating, and processing of user physiologic information |
US10146878B2 (en) * | 2014-09-26 | 2018-12-04 | Oracle International Corporation | Method and system for creating filters for social data topic creation |
US10050847B2 (en) | 2014-09-30 | 2018-08-14 | Keysight Technologies Singapore (Holdings) Pte Ltd | Selective scanning of network packet traffic using cloud-based virtual machine tool platforms |
WO2016115716A1 (en) * | 2015-01-23 | 2016-07-28 | 华为技术有限公司 | Voice playing method and voice playing device |
US20160259419A1 (en) * | 2015-03-05 | 2016-09-08 | Harman International Industries, Inc | Techniques for controlling devices based on user proximity |
US9819632B2 (en) * | 2015-04-30 | 2017-11-14 | Larry Scott Marso | System and method for remotely directed filtering and sorting of near real-time audio or video messages |
US20160344669A1 (en) * | 2015-05-20 | 2016-11-24 | Ryan Bonham | Managing government messages |
US9992134B2 (en) | 2015-05-27 | 2018-06-05 | Keysight Technologies Singapore (Holdings) Pte Ltd | Systems and methods to forward packets not passed by criteria-based filters in packet forwarding systems |
CN104905803B (en) * | 2015-07-01 | 2018-03-27 | 京东方科技集团股份有限公司 | Wearable electronic and its mood monitoring method |
US10616351B2 (en) * | 2015-09-09 | 2020-04-07 | Facebook, Inc. | Determining accuracy of characteristics asserted to a social networking system by a user |
US10116528B2 (en) | 2015-10-02 | 2018-10-30 | Keysight Technologies Singapore (Holdings) Ptd Ltd | Direct network traffic monitoring within VM platforms in virtual processing environments |
US10652112B2 (en) | 2015-10-02 | 2020-05-12 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Network traffic pre-classification within VM platforms in virtual processing environments |
US20170097827A1 (en) * | 2015-10-06 | 2017-04-06 | Microsoft Technology Licensing, Llc | Role-specific device behavior |
US10142212B2 (en) | 2015-10-26 | 2018-11-27 | Keysight Technologies Singapore (Holdings) Pte Ltd | On demand packet traffic monitoring for network packet communications within virtual processing environments |
US10768772B2 (en) * | 2015-11-19 | 2020-09-08 | Microsoft Technology Licensing, Llc | Context-aware recommendations of relevant presentation content displayed in mixed environments |
US11443343B2 (en) | 2015-12-15 | 2022-09-13 | International Business Machines Corporation | Removal of irrelevant electronic messages |
WO2017106072A2 (en) | 2015-12-17 | 2017-06-22 | Technicolor Usa, Inc. | Personalized presentation enhancement using augmented reality |
US20170185650A1 (en) * | 2015-12-24 | 2017-06-29 | Intel Corporation | Contextual based notification management system for wearable devices |
JP6832061B2 (en) * | 2015-12-29 | 2021-02-24 | 株式会社バンダイナムコエンターテインメント | Game equipment and programs |
US20170272435A1 (en) | 2016-03-15 | 2017-09-21 | Global Tel*Link Corp. | Controlled environment secure media streaming system |
US10198034B2 (en) * | 2016-04-29 | 2019-02-05 | The Badger Crew LLC | Wearable electronic badge |
US9838853B1 (en) * | 2016-06-02 | 2017-12-05 | International Business Machines Corporation | Cognitive scheduling of text message availability |
US11137884B2 (en) | 2016-06-14 | 2021-10-05 | International Business Machines Corporation | Modifying an appearance of a GUI to improve GUI usability |
JP6440910B2 (en) * | 2016-07-29 | 2018-12-19 | 三菱電機株式会社 | Display device, display control device, and display control method |
US10746559B2 (en) | 2016-08-15 | 2020-08-18 | International Business Machines Corporation | Dynamic route guidance based on real-time data |
US10553030B2 (en) * | 2016-09-30 | 2020-02-04 | The Charles Stark Draper Laboratory, Inc. | Method and apparatus for improving mixed reality situational awareness |
US11115359B2 (en) * | 2016-11-03 | 2021-09-07 | Samsung Electronics Co., Ltd. | Method and apparatus for importance filtering a plurality of messages |
US10044819B2 (en) | 2017-01-04 | 2018-08-07 | International Business Machines Corporation | Network delivery system |
US10140274B2 (en) * | 2017-01-30 | 2018-11-27 | International Business Machines Corporation | Automated message modification based on user context |
US10191462B2 (en) | 2017-06-06 | 2019-01-29 | International Business Machines Corporation | Vehicle electronic receptionist for communications management |
US10015546B1 (en) | 2017-07-27 | 2018-07-03 | Global Tel*Link Corp. | System and method for audio visual content creation and publishing within a controlled environment |
US10405007B2 (en) | 2017-07-27 | 2019-09-03 | Global Tel*Link Corporation | Systems and methods for a video sharing service within controlled environments |
US10122825B1 (en) | 2017-07-27 | 2018-11-06 | Global Tel*Link Corporation | Systems and methods for providing a visual content gallery within a controlled environment |
US11263399B2 (en) * | 2017-07-31 | 2022-03-01 | Apple Inc. | Correcting input based on user context |
US11213754B2 (en) | 2017-08-10 | 2022-01-04 | Global Tel*Link Corporation | Video game center for a controlled environment facility |
JP6917844B2 (en) * | 2017-09-20 | 2021-08-11 | 株式会社東芝 | Work support system, work support method and work support program |
GB2566734A (en) * | 2017-09-25 | 2019-03-27 | Red Frog Digital Ltd | Wearable device, system and method |
US10616165B2 (en) | 2017-10-19 | 2020-04-07 | International Business Machines Corporation | Enabling wearables to cognitively alter notifications and improve sleep cycles |
WO2019078387A1 (en) * | 2017-10-20 | 2019-04-25 | 대구대학교 산학협력단 | Apparatus and method for recommending advertisement on basis of content |
US10891419B2 (en) * | 2017-10-27 | 2021-01-12 | International Business Machines Corporation | Displaying electronic text-based messages according to their typographic features |
CN108055189A (en) * | 2017-10-30 | 2018-05-18 | 努比亚技术有限公司 | A kind of message treatment method, terminal and computer readable storage medium |
US11153326B2 (en) | 2018-02-12 | 2021-10-19 | Fmr Llc | Secure distribution and sharing of meeting content |
US10620981B2 (en) | 2018-03-09 | 2020-04-14 | Bank Of America Corporation | Network error detection using virtual reality display devices |
US10693823B2 (en) | 2018-09-13 | 2020-06-23 | International Business Machines Corporation | Dynamic message content filter |
US11330094B2 (en) * | 2019-03-29 | 2022-05-10 | Snap Inc. | Eyewear with customizable notifications |
GB2582830A (en) * | 2019-04-05 | 2020-10-07 | Numbereight Tech Ltd | Sensor hierarchy for context inference |
CN110267303B (en) * | 2019-04-22 | 2021-01-01 | 北京邮电大学 | A method and device for pushing information |
CN112015852A (en) * | 2019-05-31 | 2020-12-01 | 微软技术许可有限责任公司 | Provide a response in a session about an event |
US11558335B2 (en) | 2020-09-23 | 2023-01-17 | International Business Machines Corporation | Generative notification management mechanism via risk score computation |
WO2022133125A1 (en) | 2020-12-16 | 2022-06-23 | Truleo, Inc. | Audio analysis of body worn camera |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5918158A (en) * | 1996-07-24 | 1999-06-29 | Lucent Technologies Inc. | Two-way wireless messaging system |
US5987606A (en) * | 1997-03-19 | 1999-11-16 | Bascom Global Internet Services, Inc. | Method and system for content filtering information retrieved from an internet computer network |
US6047327A (en) * | 1996-02-16 | 2000-04-04 | Intel Corporation | System for distributing electronic information to a targeted group of users |
US6101531A (en) * | 1995-12-19 | 2000-08-08 | Motorola, Inc. | System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client |
US6922786B1 (en) * | 2000-10-31 | 2005-07-26 | Nortel Networks Limited | Real-time media communications over firewalls using a control protocol |
Family Cites Families (365)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5129136A (en) | 1974-09-05 | 1976-03-12 | Minolta Camera Kk | |
US3973251A (en) | 1975-04-25 | 1976-08-03 | Stephans J Larry | Timing device for exercise program with signalling means |
US4283712A (en) | 1976-12-22 | 1981-08-11 | Goody Roy W | Portable exercise totalizer |
US4569026A (en) | 1979-02-05 | 1986-02-04 | Best Robert M | TV Movies that talk back |
US4458331A (en) | 1981-10-09 | 1984-07-03 | International Business Machines Corporation | Interactive display terminal with alternating data processing and text processing sessions with text processing status line operable during data processing session |
US6041365A (en) | 1985-10-29 | 2000-03-21 | Kleinerman; Aurel | Apparatus and method for high performance remote application gateway servers |
US5227614A (en) | 1986-08-15 | 1993-07-13 | Norand Corporation | Core computer processor module, and peripheral shell module assembled to form a pocket size data capture unit |
US4970683A (en) | 1986-08-26 | 1990-11-13 | Heads Up Technologies, Inc. | Computerized checklist with predetermined sequences of sublists which automatically returns to skipped checklists |
US4815030A (en) | 1986-09-03 | 1989-03-21 | Wang Laboratories, Inc. | Multitask subscription data retrieval system |
GB8719572D0 (en) | 1987-08-19 | 1987-09-23 | Krebs M S | Sigscan text retrieval system |
US4973952A (en) | 1987-09-21 | 1990-11-27 | Information Resources, Inc. | Shopping cart display system |
US4916441A (en) | 1988-09-19 | 1990-04-10 | Clinicom Incorporated | Portable handheld terminal |
US5201034A (en) | 1988-09-30 | 1993-04-06 | Hitachi Ltd. | Interactive intelligent interface |
US4905163A (en) | 1988-10-03 | 1990-02-27 | Minnesota Mining & Manufacturing Company | Intelligent optical navigator dynamic information presentation and navigation system |
US5133075A (en) | 1988-12-19 | 1992-07-21 | Hewlett-Packard Company | Method of monitoring changes in attribute values of object in an object-oriented database |
US4901096A (en) | 1988-12-30 | 1990-02-13 | Lemelson Jerome H | Camera apparatus and method |
US5146221A (en) | 1989-01-13 | 1992-09-08 | Stac, Inc. | Data compression apparatus and method |
WO1990008361A1 (en) | 1989-01-13 | 1990-07-26 | The Scott Fetzer Company | Apparatus and method for controlling and monitoring the exercise session for remotely located patients |
US5349678A (en) | 1991-08-21 | 1994-09-20 | Norand Corporation | Versatile RF data capture system |
JP2938104B2 (en) | 1989-11-08 | 1999-08-23 | 株式会社日立製作所 | Shared resource management method and information processing system |
WO1991007826A1 (en) | 1989-11-22 | 1991-05-30 | Russell David C | Computer control system |
US5278946A (en) | 1989-12-04 | 1994-01-11 | Hitachi, Ltd. | Method of presenting multimedia data in a desired form by comparing and replacing a user template model with analogous portions of a system |
US5032083A (en) | 1989-12-08 | 1991-07-16 | Augmentech, Inc. | Computerized vocational task guidance system |
US5251294A (en) | 1990-02-07 | 1993-10-05 | Abelow Daniel H | Accessing, assembling, and using bodies of information |
JP2554381B2 (en) | 1990-03-30 | 1996-11-13 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Programming support device |
US5214757A (en) | 1990-08-07 | 1993-05-25 | Georesearch, Inc. | Interactive automated mapping system |
US6568595B1 (en) | 1994-08-17 | 2003-05-27 | Metrologic Instruments, Inc. | System and method for carrying out electronic-commerce transactions using web documents embodying electronic-commerce enabling applets automatically launched and executed in response to reading url-encoded symbols pointing thereto |
US5327529A (en) | 1990-09-24 | 1994-07-05 | Geoworks | Process of designing user's interfaces for application programs |
US5267147A (en) | 1990-10-19 | 1993-11-30 | Heads Up Technologies, Inc. | Portable checklist system |
US5586218A (en) | 1991-03-04 | 1996-12-17 | Inference Corporation | Autonomous learning and reasoning agent |
US5317568A (en) | 1991-04-11 | 1994-05-31 | Galileo International Partnership | Method and apparatus for managing and facilitating communications in a distributed hetergeneous network |
US5630157A (en) | 1991-06-13 | 1997-05-13 | International Business Machines Corporation | Computer organization for multiple and out-of-order execution of condition code testing and setting instructions |
US5781913A (en) | 1991-07-18 | 1998-07-14 | Felsenstein; Lee | Wearable hypermedium system |
US5592664A (en) | 1991-07-29 | 1997-01-07 | Borland International Inc. | Database server system with methods for alerting clients of occurrence of database server events of interest to the clients |
US5237684A (en) | 1991-08-12 | 1993-08-17 | International Business Machines Corporation | Customized and versatile event monitor within event management services of a computer system |
US5208449A (en) | 1991-09-09 | 1993-05-04 | Psc, Inc. | Portable transaction terminal |
US5454074A (en) | 1991-09-18 | 1995-09-26 | The Boeing Company | Electronic checklist system |
US6418424B1 (en) | 1991-12-23 | 2002-07-09 | Steven M. Hoffberg | Ergonomic man-machine interface incorporating adaptive pattern recognition based control system |
US6850252B1 (en) | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
WO1993014454A1 (en) | 1992-01-10 | 1993-07-22 | Foster-Miller, Inc. | A sensory integrated data interface |
US5337413A (en) | 1992-02-06 | 1994-08-09 | Tandem Computers Incorporated | Environment monitoring system for standard interface bus computer systems |
US5481667A (en) | 1992-02-13 | 1996-01-02 | Microsoft Corporation | Method and system for instructing a user of a computer system how to perform application program tasks |
US5349654A (en) | 1992-02-20 | 1994-09-20 | The Boeing Company | Fault tolerant data exchange unit |
JPH05260188A (en) | 1992-03-13 | 1993-10-08 | Matsushita Electric Ind Co Ltd | Telephone equipment with incoming control function |
US5388198A (en) | 1992-04-16 | 1995-02-07 | Symantec Corporation | Proactive presentation of automating features to a computer user |
US5285398A (en) | 1992-05-15 | 1994-02-08 | Mobila Technology Inc. | Flexible wearable computer |
US5491651A (en) | 1992-05-15 | 1996-02-13 | Key, Idea Development | Flexible wearable computer |
US5535323A (en) | 1992-06-29 | 1996-07-09 | Digital Equipment Corporation | Method of and system for displaying context sensitive and application independent help information |
JP2597802B2 (en) | 1992-08-04 | 1997-04-09 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Method for controlling an image capture device, image capture device and user interface |
US5339395A (en) | 1992-09-17 | 1994-08-16 | Delco Electronics Corporation | Interface circuit for interfacing a peripheral device with a microprocessor operating in either a synchronous or an asynchronous mode |
US5513646A (en) | 1992-11-09 | 1996-05-07 | I Am Fine, Inc. | Personal security monitoring system and method |
US5601435A (en) | 1994-11-04 | 1997-02-11 | Intercare | Method and apparatus for interactively monitoring a physiological condition and for interactively providing health related information |
US5879163A (en) | 1996-06-24 | 1999-03-09 | Health Hero Network, Inc. | On-line health education and feedback system using motivational driver profile coding and automated content fulfillment |
US5335276A (en) | 1992-12-16 | 1994-08-02 | Texas Instruments Incorporated | Communication system and methods for enhanced information transfer |
US5769085A (en) * | 1993-01-06 | 1998-06-23 | Mitsubishi Jidosha Kogyo Kabushiki Kaisha | Apparatus for detecting awareness of a vehicle driver and method thereof |
US5720001A (en) | 1993-04-16 | 1998-02-17 | Compaq Computer Corporation | Questionless case-based knowledge base and a method for constructing the same |
JPH06332786A (en) * | 1993-05-25 | 1994-12-02 | Fujitsu Ltd | Data processing system with complex objects |
TW359781B (en) | 1993-05-25 | 1999-06-01 | Casio Computer Co Ltd | Animal image display controlling devices and method thereof |
US5398021A (en) | 1993-07-19 | 1995-03-14 | Motorola, Inc. | Reliable information service message delivery system |
GB9315448D0 (en) | 1993-07-26 | 1993-09-08 | Rank Xerox Ltd | Recording and retrieval of information relevant to the activities of a user |
US5910765A (en) | 1993-11-02 | 1999-06-08 | Advanced Optical Controls, Inc. | Sensor module |
KR100324989B1 (en) | 1993-11-08 | 2002-06-24 | 마츠시타 덴끼 산교 가부시키가이샤 | Input display integrated information processing device |
US5416730A (en) | 1993-11-19 | 1995-05-16 | Appcon Technologies, Inc. | Arm mounted computer |
US5806079A (en) | 1993-11-19 | 1998-09-08 | Smartpatents, Inc. | System, method, and computer program product for using intelligent notes to organize, link, and manipulate disparate data objects |
US5555376A (en) | 1993-12-03 | 1996-09-10 | Xerox Corporation | Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request |
US5493692A (en) * | 1993-12-03 | 1996-02-20 | Xerox Corporation | Selective delivery of electronic messages in a multiple computer system based on context and environment of a user |
US5812865A (en) * | 1993-12-03 | 1998-09-22 | Xerox Corporation | Specifying and establishing communication data paths between particular media devices in multiple media device computing systems based on context of a user or users |
US5572401A (en) | 1993-12-13 | 1996-11-05 | Key Idea Development L.L.C. | Wearable personal computer system having flexible battery forming casing of the system |
CA2179523A1 (en) | 1993-12-23 | 1995-06-29 | David A. Boulton | Method and apparatus for implementing user feedback |
US5513342A (en) | 1993-12-28 | 1996-04-30 | International Business Machines Corporation | Display window layout system that automatically accommodates changes in display resolution, font size and national language |
US5566069A (en) | 1994-03-07 | 1996-10-15 | Monsanto Company | Computer network for collecting and analyzing agronomic data |
US5470233A (en) | 1994-03-17 | 1995-11-28 | Arkenstone, Inc. | System and method for tracking a pedestrian |
US5522026A (en) | 1994-03-18 | 1996-05-28 | The Boeing Company | System for creating a single electronic checklist in response to multiple faults |
US5642129A (en) | 1994-03-23 | 1997-06-24 | Kopin Corporation | Color sequential display panels |
US5738102A (en) | 1994-03-31 | 1998-04-14 | Lemelson; Jerome H. | Patient monitoring system |
US5566337A (en) | 1994-05-13 | 1996-10-15 | Apple Computer, Inc. | Method and apparatus for distributing events in an operating system |
US5646629A (en) | 1994-05-16 | 1997-07-08 | Trimble Navigation Limited | Memory cartridge for a handheld electronic video game |
WO1995031773A1 (en) | 1994-05-16 | 1995-11-23 | Apple Computer, Inc. | Switching between appearance/behavior themes in graphical user interfaces |
US5704366A (en) | 1994-05-23 | 1998-01-06 | Enact Health Management Systems | System for monitoring and reporting medical measurements |
CA2193803C (en) | 1994-06-22 | 2004-12-07 | Bruce G. Molloy | A system and method for representing and retrieving knowledge in an adaptive cognitive network |
US6321158B1 (en) | 1994-06-24 | 2001-11-20 | Delorme Publishing Company | Integrated routing/mapping information |
US6023683A (en) | 1994-08-10 | 2000-02-08 | Fisher Scientific Company | Electronic sourcing system and method |
US6002994A (en) | 1994-09-09 | 1999-12-14 | Lane; Stephen S. | Method of user monitoring of physiological and non-physiological measurements |
US5559520A (en) | 1994-09-26 | 1996-09-24 | Lucent Technologies Inc. | Wireless information system for acquiring location related information |
EP0712075A3 (en) | 1994-11-08 | 1997-10-22 | Canon Kk | Information processing system which understands information and acts accordingly and method therefor |
US6539336B1 (en) | 1996-12-12 | 2003-03-25 | Phatrat Technologies, Inc. | Sport monitoring system for determining airtime, speed, power absorbed and other factors such as drop distance |
US6460036B1 (en) | 1994-11-29 | 2002-10-01 | Pinpoint Incorporated | System and method for providing customized electronic newspapers and target advertisements |
US6571279B1 (en) | 1997-12-05 | 2003-05-27 | Pinpoint Incorporated | Location enhanced information delivery system |
US5758257A (en) | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
DE69531599T2 (en) * | 1994-12-20 | 2004-06-24 | Sun Microsystems, Inc., Mountain View | Method and device for finding and obtaining personalized information |
US5659746A (en) | 1994-12-30 | 1997-08-19 | Aegis Star Corporation | Method for storing and retrieving digital data transmissions |
US5553609A (en) | 1995-02-09 | 1996-09-10 | Visiting Nurse Service, Inc. | Intelligent remote visual monitoring system for home health care service |
US6157982A (en) | 1995-02-22 | 2000-12-05 | Deo; Vinay | System and method for remotely managing memory in a portable information device from an external computer |
US5959611A (en) | 1995-03-06 | 1999-09-28 | Carnegie Mellon University | Portable computer system with ergonomic input device |
JP4309480B2 (en) | 1995-03-07 | 2009-08-05 | 株式会社東芝 | Information processing device |
US5745110A (en) | 1995-03-10 | 1998-04-28 | Microsoft Corporation | Method and apparatus for arranging and displaying task schedule information in a calendar view format |
US5710884A (en) | 1995-03-29 | 1998-01-20 | Intel Corporation | System for automatically updating personal profile server with updates to additional user information gathered from monitoring user's electronic consuming habits generated on computer during use |
US5689708A (en) | 1995-03-31 | 1997-11-18 | Showcase Corporation | Client/server computer systems having control of client-based application programs, and application-program control means therefor |
US5963914A (en) * | 1995-04-17 | 1999-10-05 | Skinner; Gary R. | Network time and work tracker |
US5911132A (en) | 1995-04-26 | 1999-06-08 | Lucent Technologies Inc. | Method using central epidemiological database |
US5832296A (en) | 1995-04-26 | 1998-11-03 | Interval Research Corp. | Wearable context sensitive user interface for interacting with plurality of electronic devices of interest to the user |
US5642303A (en) | 1995-05-05 | 1997-06-24 | Apple Computer, Inc. | Time and location based computing |
US5873070A (en) | 1995-06-07 | 1999-02-16 | Norand Corporation | Data collection system |
US6006251A (en) | 1995-07-11 | 1999-12-21 | Hitachi, Ltd. | Service providing system for providing services suitable to an end user request based on characteristics of a request, attributes of a service and operating conditions of a processor |
WO1997003434A1 (en) | 1995-07-12 | 1997-01-30 | Virtual I/O, Inc. | Ultra portable computer |
JP3729918B2 (en) | 1995-07-19 | 2005-12-21 | 株式会社東芝 | Multimodal dialogue apparatus and dialogue method |
US5715451A (en) | 1995-07-20 | 1998-02-03 | Spacelabs Medical, Inc. | Method and system for constructing formulae for processing medical data |
US5826253A (en) | 1995-07-26 | 1998-10-20 | Borland International, Inc. | Database system with methodology for notifying clients of any additions, deletions, or modifications occurring at the database server which affect validity of a range of data records cached in local memory buffers of clients |
US5942986A (en) | 1995-08-09 | 1999-08-24 | Cedars-Sinai Medical Center | System and method for automatic critical event notification |
US5963940A (en) | 1995-08-16 | 1999-10-05 | Syracuse University | Natural language information retrieval system and method |
EP0759591B1 (en) | 1995-08-18 | 2003-01-08 | International Business Machines Corporation | Event management service |
CA2179337C (en) | 1995-08-22 | 2000-11-14 | Thomas F. Laporta | Network-based migrating user agents for personal communication services |
US5726688A (en) | 1995-09-29 | 1998-03-10 | Ncr Corporation | Predictive, adaptive computer interface |
US6131067A (en) | 1995-10-09 | 2000-10-10 | Snaptrack, Inc. | Client-server based remote locator device |
US5701894A (en) | 1995-11-09 | 1997-12-30 | Del Mar Avionics | Modular physiological computer-recorder |
US6127990A (en) | 1995-11-28 | 2000-10-03 | Vega Vista, Inc. | Wearable display and methods for controlling same |
US6088689A (en) | 1995-11-29 | 2000-07-11 | Hynomics Corporation | Multiple-agent hybrid control architecture for intelligent real-time control of distributed nonlinear processes |
US5726660A (en) | 1995-12-01 | 1998-03-10 | Purdy; Peter K. | Personal data collection and reporting system |
US6122960A (en) | 1995-12-12 | 2000-09-26 | Acceleron Technologies, Llc. | System and method for measuring movement of objects |
US5899963A (en) | 1995-12-12 | 1999-05-04 | Acceleron Technologies, Llc | System and method for measuring movement of objects |
US6421700B1 (en) | 1995-12-22 | 2002-07-16 | Xerox Corporation | Method and system for work process support using independent system and user states |
US5752019A (en) | 1995-12-22 | 1998-05-12 | International Business Machines Corporation | System and method for confirmationally-flexible molecular identification |
US5787279A (en) | 1995-12-22 | 1998-07-28 | International Business Machines Corporation | System and method for conformationally-flexible molecular recognition |
AU1566597A (en) | 1995-12-27 | 1997-08-11 | Gary B. Robinson | Automated collaborative filtering in world wide web advertising |
US5740037A (en) | 1996-01-22 | 1998-04-14 | Hughes Aircraft Company | Graphical user interface system for manportable applications |
US6092725A (en) | 1997-01-24 | 2000-07-25 | Symbol Technologies, Inc. | Statistical sampling security methodology for self-scanning checkout system |
JP3216514B2 (en) | 1996-01-31 | 2001-10-09 | 株式会社デンソー | Information service equipment |
WO1997034388A2 (en) | 1996-03-12 | 1997-09-18 | Compuserve Incorporated | System for developing user interface themes |
US5910799A (en) | 1996-04-09 | 1999-06-08 | International Business Machines Corporation | Location motion sensitive user interface |
US5794235A (en) | 1996-04-12 | 1998-08-11 | International Business Machines Corporation | System and method for dynamic retrieval of relevant information by monitoring active data streams |
US5971580A (en) | 1996-04-17 | 1999-10-26 | Raytheon Company | Tactical awareness monitoring and direct response system |
US5848396A (en) | 1996-04-26 | 1998-12-08 | Freedom Of Information, Inc. | Method and apparatus for determining behavioral profile of a computer user |
US5790974A (en) | 1996-04-29 | 1998-08-04 | Sun Microsystems, Inc. | Portable calendaring device having perceptual agent managing calendar entries |
US5920852A (en) | 1996-04-30 | 1999-07-06 | Grannet Corporation | Large memory storage and retrieval (LAMSTAR) network |
US6047301A (en) | 1996-05-24 | 2000-04-04 | International Business Machines Corporation | Wearable computer |
US6014638A (en) | 1996-05-29 | 2000-01-11 | America Online, Inc. | System for customizing computer displays in accordance with user preferences |
US5913214A (en) | 1996-05-30 | 1999-06-15 | Massachusetts Inst Technology | Data extraction from world wide web pages |
US5717747A (en) | 1996-05-31 | 1998-02-10 | Lucent Technologies Inc. | Arrangement for facilitating plug-and-play call features |
US5945988A (en) | 1996-06-06 | 1999-08-31 | Intel Corporation | Method and apparatus for automatically determining and dynamically updating user preferences in an entertainment system |
US5966533A (en) | 1996-06-11 | 1999-10-12 | Excite, Inc. | Method and system for dynamically synthesizing a computer program by differentially resolving atoms based on user context data |
JPH09330336A (en) | 1996-06-11 | 1997-12-22 | Sony Corp | Information processor |
US5831594A (en) | 1996-06-25 | 1998-11-03 | Sun Microsystems, Inc. | Method and apparatus for eyetrack derived backtrack |
US6035104A (en) | 1996-06-28 | 2000-03-07 | Data Link Systems Corp. | Method and apparatus for managing electronic documents by alerting a subscriber at a destination other than the primary destination |
US6148067A (en) | 1996-07-02 | 2000-11-14 | At&T Corp. | Anonymous voice communication |
FI102923B (en) | 1996-08-08 | 1999-03-15 | Nokia Mobile Phones Ltd | Information printing system, procedure for printing information and terminals for printing information |
US5689619A (en) | 1996-08-09 | 1997-11-18 | The United States Of America As Represented By The Secretary Of The Army | Eyetracker control of heads-up displays |
US5832500A (en) | 1996-08-09 | 1998-11-03 | Digital Equipment Corporation | Method for searching an index |
US5719743A (en) | 1996-08-15 | 1998-02-17 | Xybernaut Corporation | Torso worn computer which can stand alone |
JP3688822B2 (en) | 1996-09-03 | 2005-08-31 | 株式会社東芝 | Electronic medical record system |
US6837436B2 (en) | 1996-09-05 | 2005-01-04 | Symbol Technologies, Inc. | Consumer interactive shopping system |
US7040541B2 (en) | 1996-09-05 | 2006-05-09 | Symbol Technologies, Inc. | Portable shopping and order fulfillment system |
US5930501A (en) | 1996-09-20 | 1999-07-27 | Neil; John M. | Pictorial user interface for establishing time of day and geographical or environmental context on a computer display or other monitor |
US5924074A (en) | 1996-09-27 | 1999-07-13 | Azron Incorporated | Electronic medical records system |
US5974572A (en) | 1996-10-15 | 1999-10-26 | Mercury Interactive Corporation | Software system and methods for generating a load test using a server access log |
US5938721A (en) | 1996-10-24 | 1999-08-17 | Trimble Navigation Limited | Position based personal digital assistant |
US6002982A (en) | 1996-11-01 | 1999-12-14 | Fry; William R. | Sports computer with GPS receiver and performance tracking capabilities |
US5818446A (en) | 1996-11-18 | 1998-10-06 | International Business Machines Corporation | System for changing user interfaces based on display data content |
US5902347A (en) | 1996-11-19 | 1999-05-11 | American Navigation Systems, Inc. | Hand-held GPS-mapping device |
US6035264A (en) * | 1996-11-26 | 2000-03-07 | Global Maintech, Inc. | Electronic control system and method for externally controlling process in a computer system with a script language |
US6012152A (en) | 1996-11-27 | 2000-01-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Software fault management system |
US6198394B1 (en) | 1996-12-05 | 2001-03-06 | Stephen C. Jacobsen | System for remote monitoring of personnel |
US5905492A (en) | 1996-12-06 | 1999-05-18 | Microsoft Corporation | Dynamically updating themes for an operating system shell |
US5966126A (en) | 1996-12-23 | 1999-10-12 | Szabo; Andrew J. | Graphic user interface for database system |
FI106990B (en) | 1996-12-31 | 2001-05-15 | Nokia Mobile Phones Ltd | A method of transmitting information to a user |
US6076166A (en) | 1997-01-17 | 2000-06-13 | Philips Electronics North America Corporation | Personalizing hospital intranet web sites |
US5798733A (en) | 1997-01-21 | 1998-08-25 | Northrop Grumman Corporation | Interactive position guidance apparatus and method for guiding a user to reach a predetermined target position |
US6122657A (en) * | 1997-02-04 | 2000-09-19 | Networks Associates, Inc. | Internet computer system with methods for dynamic filtering of hypertext tags and content |
US6128663A (en) * | 1997-02-11 | 2000-10-03 | Invention Depot, Inc. | Method and apparatus for customization of information content provided to a requestor over a network using demographic information yet the user remains anonymous to the server |
US6098065A (en) | 1997-02-13 | 2000-08-01 | Nortel Networks Corporation | Associative search engine |
US5977968A (en) | 1997-03-14 | 1999-11-02 | Mindmeld Multimedia Inc. | Graphical user interface to communicate attitude or emotion to a computer program |
US6704785B1 (en) | 1997-03-17 | 2004-03-09 | Vitria Technology, Inc. | Event driven communication system |
US5913030A (en) | 1997-03-18 | 1999-06-15 | International Business Machines Corporation | Method and system for client/server communications with user information revealed as a function of willingness to reveal and whether the information is required |
US5796952A (en) | 1997-03-21 | 1998-08-18 | Dot Com Development, Inc. | Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database |
US6546005B1 (en) | 1997-03-25 | 2003-04-08 | At&T Corp. | Active user registry |
US6289316B1 (en) | 1997-03-25 | 2001-09-11 | International Business Machines Corporation | Progress notes model in a clinical information system |
JPH10326289A (en) | 1997-03-28 | 1998-12-08 | Nippon Telegr & Teleph Corp <Ntt> | Method for providing information and system therefor and storage medium for storing the same program |
US6041331A (en) | 1997-04-01 | 2000-03-21 | Manning And Napier Information Services, Llc | Automatic extraction and graphic visualization system and method |
US6272507B1 (en) | 1997-04-09 | 2001-08-07 | Xerox Corporation | System for ranking search results from a collection of documents using spreading activation techniques |
EP0976246A1 (en) | 1997-04-14 | 2000-02-02 | Thomson Consumer Electronics, Inc. | A system for processing and decoding mpeg compatible data and internet information |
WO1998047084A1 (en) | 1997-04-17 | 1998-10-22 | Sharp Kabushiki Kaisha | A method and system for object-based video description and linking |
US5937160A (en) | 1997-05-01 | 1999-08-10 | Reedy Creek Technologies, Inc. | Systems, methods and computer program products for updating hypertext documents via electronic mail |
US6023729A (en) | 1997-05-05 | 2000-02-08 | Mpath Interactive, Inc. | Method and apparatus for match making |
US6453334B1 (en) | 1997-06-16 | 2002-09-17 | Streamtheory, Inc. | Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching |
US6092101A (en) * | 1997-06-16 | 2000-07-18 | Digital Equipment Corporation | Method for filtering mail messages for a plurality of client computers connected to a mail service system |
US5991687A (en) | 1997-07-02 | 1999-11-23 | Case Corporation | System and method for communicating information related to a geographical area |
US6108665A (en) | 1997-07-03 | 2000-08-22 | The Psychological Corporation | System and method for optimizing behaviorial health care collection |
US6094625A (en) | 1997-07-03 | 2000-07-25 | Trimble Navigation Limited | Augmented vision for survey work and machine control |
US6081814A (en) | 1997-07-07 | 2000-06-27 | Novell, Inc. | Document reference environment manager |
US6442549B1 (en) | 1997-07-25 | 2002-08-27 | Eric Schneider | Method, product, and apparatus for processing reusable information |
JP3714378B2 (en) | 1997-07-31 | 2005-11-09 | セイコーエプソン株式会社 | Device setup support device, device setup support method, and medium recording device setup support program |
US6111893A (en) | 1997-07-31 | 2000-08-29 | Cisco Technology, Inc. | Universal protocol conversion |
US6141011A (en) | 1997-08-04 | 2000-10-31 | Starfish Software, Inc. | User interface methodology supporting light data entry for microprocessor device having limited user input |
US6409086B1 (en) | 1997-08-08 | 2002-06-25 | Symbol Technolgies, Inc. | Terminal locking system |
US5974262A (en) | 1997-08-15 | 1999-10-26 | Fuller Research Corporation | System for generating output based on involuntary and voluntary user input without providing output information to induce user to alter involuntary input |
US6199102B1 (en) * | 1997-08-26 | 2001-03-06 | Christopher Alan Cobb | Method and system for filtering electronic messages |
US6263268B1 (en) | 1997-08-26 | 2001-07-17 | Transcontech Corporation | System and method for providing mobile automotive telemetry |
JPH1184486A (en) | 1997-09-09 | 1999-03-26 | Olympus Optical Co Ltd | Camera |
JPH1196099A (en) | 1997-09-19 | 1999-04-09 | Hitachi Ltd | Service providing system |
US6070167A (en) | 1997-09-29 | 2000-05-30 | Sharp Laboratories Of America, Inc. | Hierarchical method and system for object-based audiovisual descriptive tagging of images for information retrieval, editing, and manipulation |
JP3922482B2 (en) | 1997-10-14 | 2007-05-30 | ソニー株式会社 | Information processing apparatus and method |
AU9692098A (en) | 1997-10-10 | 1999-05-03 | Interval Research Corporation | Methods and systems for providing human/computer interfaces |
US6236768B1 (en) | 1997-10-14 | 2001-05-22 | Massachusetts Institute Of Technology | Method and apparatus for automated, context-dependent retrieval of information |
US6061660A (en) * | 1997-10-20 | 2000-05-09 | York Eggleston | System and method for incentive programs and award fulfillment |
US6157922A (en) | 1997-10-24 | 2000-12-05 | Trilogy Development Group, Inc. | Method and apparatus for transparent backtracking |
US6067084A (en) | 1997-10-29 | 2000-05-23 | International Business Machines Corporation | Configuring microphones in an audio interface |
US5999943A (en) | 1997-10-31 | 1999-12-07 | Oracle Corporation | Lob locators |
US6061610A (en) * | 1997-10-31 | 2000-05-09 | Nissan Technical Center North America, Inc. | Method and apparatus for determining workload of motor vehicle driver |
WO1999025152A2 (en) | 1997-11-07 | 1999-05-20 | Via, Inc. | Interactive devices and methods |
US5953718A (en) | 1997-11-12 | 1999-09-14 | Oracle Corporation | Research mode for a knowledge base search and retrieval system |
US6236978B1 (en) | 1997-11-14 | 2001-05-22 | New York University | System and method for dynamic profiling of users in one-to-one applications |
US6134532A (en) | 1997-11-14 | 2000-10-17 | Aptex Software, Inc. | System and method for optimal adaptive matching of users to most relevant entity and information in real-time |
US6405264B1 (en) | 1997-12-18 | 2002-06-11 | Sun Microsystems, Inc. | Marshaling and unmarshaling framework for supporting filters in a distributed object system |
US6122348A (en) | 1997-12-22 | 2000-09-19 | Nortel Networks Corporation | System and method for managing incoming communication events using multiple media options |
US6427142B1 (en) | 1998-01-06 | 2002-07-30 | Chi Systems, Inc. | Intelligent agent workbench |
US5999932A (en) * | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing |
US6195622B1 (en) | 1998-01-15 | 2001-02-27 | Microsoft Corporation | Methods and apparatus for building attribute transition probability models for use in pre-fetching resources |
US6031455A (en) | 1998-02-09 | 2000-02-29 | Motorola, Inc. | Method and apparatus for monitoring environmental conditions in a communication system |
US6044415A (en) | 1998-02-27 | 2000-03-28 | Intel Corporation | System for transferring I/O data between an I/O device and an application program's memory in accordance with a request directly over a virtual connection |
US6314384B1 (en) | 1998-03-04 | 2001-11-06 | Gerald E. Goetz | Medication management apparatus |
JPH11272689A (en) | 1998-03-19 | 1999-10-08 | Seiko Epson Corp | Information search processing method and apparatus, and recording medium storing information search processing program |
US6185534B1 (en) | 1998-03-23 | 2001-02-06 | Microsoft Corporation | Modeling emotion and personality in a computer user interface |
US6003082A (en) | 1998-04-22 | 1999-12-14 | International Business Machines Corporation | Selective internet request caching and execution system |
JPH11306002A (en) | 1998-04-23 | 1999-11-05 | Fujitsu Ltd | Editing system for GUI environment and method for editing GUI environment |
US6215405B1 (en) | 1998-04-23 | 2001-04-10 | Digital Security Controls Ltd. | Programmable temperature sensor for security system |
US6155960A (en) | 1998-05-01 | 2000-12-05 | Roberts; Donald | Training dummy assembly in human form |
US6105063A (en) | 1998-05-05 | 2000-08-15 | International Business Machines Corp. | Client-server system for maintaining application preferences in a hierarchical data structure according to user and user group or terminal and terminal group contexts |
US6188399B1 (en) | 1998-05-08 | 2001-02-13 | Apple Computer, Inc. | Multiple theme engine graphical user interface architecture |
US6625135B1 (en) | 1998-05-11 | 2003-09-23 | Cargenie Mellon University | Method and apparatus for incorporating environmental information for mobile communications |
US7010501B1 (en) | 1998-05-29 | 2006-03-07 | Symbol Technologies, Inc. | Personal shopping system |
US6640214B1 (en) | 1999-01-16 | 2003-10-28 | Symbol Technologies, Inc. | Portable electronic terminal and data processing system |
US6405159B2 (en) | 1998-06-03 | 2002-06-11 | Sbc Technology Resources, Inc. | Method for categorizing, describing and modeling types of system users |
US6526035B1 (en) | 1998-06-09 | 2003-02-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for identifying the source of a digital signal |
WO1999066394A1 (en) | 1998-06-17 | 1999-12-23 | Microsoft Corporation | Method for adapting user interface elements based on historical usage |
US6256633B1 (en) | 1998-06-25 | 2001-07-03 | U.S. Philips Corporation | Context-based and user-profile driven information retrieval |
US6446109B2 (en) | 1998-06-29 | 2002-09-03 | Sun Microsystems, Inc. | Application computing environment |
US6169976B1 (en) | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6490579B1 (en) | 1998-07-16 | 2002-12-03 | Perot Systems Corporation | Search engine system and method utilizing context of heterogeneous information resources |
US6305007B1 (en) | 1998-07-24 | 2001-10-16 | Computer Associates Think, Inc. | Object property meta model emulator for legacy data structures |
US6262720B1 (en) | 1998-07-24 | 2001-07-17 | The Boeing Company | Electronic checklist system with checklist inhibiting |
US6311162B1 (en) | 1998-07-25 | 2001-10-30 | Ernst F. Reichwein | Interactive symptomatic recording system and methods |
US6363377B1 (en) | 1998-07-30 | 2002-03-26 | Sarnoff Corporation | Search data processor |
US6230111B1 (en) | 1998-08-06 | 2001-05-08 | Yamaha Hatsudoki Kabushiki Kaisha | Control system for controlling object using pseudo-emotions and pseudo-personality generated in the object |
US7010603B2 (en) | 1998-08-17 | 2006-03-07 | Openwave Systems Inc. | Method and apparatus for controlling network connections based on destination locations |
US6442620B1 (en) | 1998-08-17 | 2002-08-27 | Microsoft Corporation | Environment extensibility and automatic services for component applications using contexts, policies and activators |
US7769620B1 (en) | 1998-09-01 | 2010-08-03 | Dennis Fernandez | Adaptive direct transaction for networked client group |
US6629133B1 (en) | 1998-09-11 | 2003-09-30 | Lv Partners, L.P. | Interactive doll |
US6321279B1 (en) | 1998-09-14 | 2001-11-20 | Compaq Computer Corporation | System for implementing intelligent I/O processing in a multi-processor system by redirecting I/O messages to a target central processor selected from the multi-processor system |
US6507845B1 (en) | 1998-09-14 | 2003-01-14 | International Business Machines Corporation | Method and software for supporting improved awareness of and collaboration among users involved in a task |
US6563430B1 (en) | 1998-12-11 | 2003-05-13 | Koninklijke Philips Electronics N.V. | Remote control device with location dependent interface |
US6324569B1 (en) * | 1998-09-23 | 2001-11-27 | John W. L. Ogilvie | Self-removing email verified or designated as such by a message distributor for the convenience of a recipient |
US6487552B1 (en) | 1998-10-05 | 2002-11-26 | Oracle Corporation | Database fine-grained access control |
US6643684B1 (en) | 1998-10-08 | 2003-11-04 | International Business Machines Corporation | Sender- specified delivery customization |
US6218958B1 (en) | 1998-10-08 | 2001-04-17 | International Business Machines Corporation | Integrated touch-skin notification system for wearable computing devices |
US6546425B1 (en) | 1998-10-09 | 2003-04-08 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US6112246A (en) | 1998-10-22 | 2000-08-29 | Horbal; Mark T. | System and method for accessing information from a remote device and providing the information to a client workstation |
US6446076B1 (en) * | 1998-11-12 | 2002-09-03 | Accenture Llp. | Voice interactive web-based agent system responsive to a user location for prioritizing and formatting information |
US6738975B1 (en) | 1998-11-18 | 2004-05-18 | Software Ag, Inc. | Extensible distributed enterprise application integration system |
US6263317B1 (en) | 1998-12-01 | 2001-07-17 | Fogdog, Inc. | Web sales channel conflict resolution system |
US6438618B1 (en) | 1998-12-16 | 2002-08-20 | Intel Corporation | Method and device for filtering events in an event notification service |
US7143093B1 (en) | 1998-12-17 | 2006-11-28 | Webmethods, Inc. | Enterprise computer system |
US6801223B1 (en) | 1998-12-18 | 2004-10-05 | Tangis Corporation | Managing interactions between computer users' context models |
US7080322B2 (en) | 1998-12-18 | 2006-07-18 | Tangis Corporation | Thematic response to a computer user's context, such as by a wearable personal computer |
US6513046B1 (en) | 1999-12-15 | 2003-01-28 | Tangis Corporation | Storing and recalling information to augment human memories |
US6812937B1 (en) | 1998-12-18 | 2004-11-02 | Tangis Corporation | Supplying enhanced computer user's context data |
US6791580B1 (en) | 1998-12-18 | 2004-09-14 | Tangis Corporation | Supplying notifications related to supply and consumption of user context data |
US7076737B2 (en) | 1998-12-18 | 2006-07-11 | Tangis Corporation | Thematic response to a computer user's context, such as by a wearable personal computer |
US7046263B1 (en) | 1998-12-18 | 2006-05-16 | Tangis Corporation | Requesting computer user's context data |
US8181113B2 (en) | 1998-12-18 | 2012-05-15 | Microsoft Corporation | Mediating conflicts in computer users context data |
US6920616B1 (en) | 1998-12-18 | 2005-07-19 | Tangis Corporation | Interface for exchanging context data |
US7107539B2 (en) | 1998-12-18 | 2006-09-12 | Tangis Corporation | Thematic response to a computer user's context, such as by a wearable personal computer |
US6466232B1 (en) | 1998-12-18 | 2002-10-15 | Tangis Corporation | Method and system for controlling presentation of information to a user based on the user's condition |
US6747675B1 (en) | 1998-12-18 | 2004-06-08 | Tangis Corporation | Mediating conflicts in computer user's context data |
US7055101B2 (en) | 1998-12-18 | 2006-05-30 | Tangis Corporation | Thematic response to a computer user's context, such as by a wearable personal computer |
US6842877B2 (en) | 1998-12-18 | 2005-01-11 | Tangis Corporation | Contextual responses based on automated learning techniques |
US7779015B2 (en) | 1998-12-18 | 2010-08-17 | Microsoft Corporation | Logging and analyzing context attributes |
US7225229B1 (en) | 1998-12-18 | 2007-05-29 | Tangis Corporation | Automated pushing of computer user's context data to clients |
US7231439B1 (en) | 2000-04-02 | 2007-06-12 | Tangis Corporation | Dynamically swapping modules for determining a computer user's context |
US6349307B1 (en) | 1998-12-28 | 2002-02-19 | U.S. Philips Corporation | Cooperative topical servers with automatic prefiltering and routing |
US6385589B1 (en) | 1998-12-30 | 2002-05-07 | Pharmacia Corporation | System for monitoring and managing the health care of a patient population |
US6718332B1 (en) | 1999-01-04 | 2004-04-06 | Cisco Technology, Inc. | Seamless importation of data |
US6282517B1 (en) | 1999-01-14 | 2001-08-28 | Autobytel.Com, Inc. | Real time communication of purchase requests |
US6442589B1 (en) * | 1999-01-14 | 2002-08-27 | Fujitsu Limited | Method and system for sorting and forwarding electronic messages and other data |
US6430531B1 (en) | 1999-02-04 | 2002-08-06 | Soliloquy, Inc. | Bilateral speech system |
US6292796B1 (en) | 1999-02-23 | 2001-09-18 | Clinical Focus, Inc. | Method and apparatus for improving access to literature |
US6462759B1 (en) | 1999-02-25 | 2002-10-08 | International Business Machines Corporation | Adaptive computer display screen window |
US6294953B1 (en) | 1999-02-26 | 2001-09-25 | Axcess, Inc. | High sensitivity demodulator for a radio tag and method |
US6317718B1 (en) | 1999-02-26 | 2001-11-13 | Accenture Properties (2) B.V. | System, method and article of manufacture for location-based filtering for shopping agent in the physical world |
US6356905B1 (en) | 1999-03-05 | 2002-03-12 | Accenture Llp | System, method and article of manufacture for mobile communication utilizing an interface support framework |
US6199099B1 (en) | 1999-03-05 | 2001-03-06 | Ac Properties B.V. | System, method and article of manufacture for a mobile communication network utilizing a distributed communication network |
US6401085B1 (en) | 1999-03-05 | 2002-06-04 | Accenture Llp | Mobile communication and computing system and method |
US6353823B1 (en) | 1999-03-08 | 2002-03-05 | Intel Corporation | Method and system for using associative metadata |
JP4299911B2 (en) | 1999-03-24 | 2009-07-22 | 株式会社東芝 | Information transfer system |
US6507567B1 (en) | 1999-04-09 | 2003-01-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Efficient handling of connections in a mobile communications network |
US6636831B1 (en) | 1999-04-09 | 2003-10-21 | Inroad, Inc. | System and process for voice-controlled information retrieval |
US6289513B1 (en) | 1999-06-01 | 2001-09-11 | Isaac Bentwich | Interactive application generation and text processing |
US7103806B1 (en) | 1999-06-04 | 2006-09-05 | Microsoft Corporation | System for performing context-sensitive decisions about ideal communication modalities considering information about channel reliability |
US6484200B1 (en) | 1999-06-11 | 2002-11-19 | Sun Microsystems, Inc. | Distinguished name scoping system for event filtering |
WO2001001366A2 (en) | 1999-06-25 | 2001-01-04 | Telemonitor, Inc. | Smart remote monitoring system and method |
US7000187B2 (en) | 1999-07-01 | 2006-02-14 | Cisco Technology, Inc. | Method and apparatus for software technical support and training |
US6529723B1 (en) | 1999-07-06 | 2003-03-04 | Televoke, Inc. | Automated user notification system |
US6301609B1 (en) * | 1999-07-07 | 2001-10-09 | Lucent Technologies Inc. | Assignable associate priorities for user-definable instant messaging buddy groups |
JP4174923B2 (en) | 1999-07-23 | 2008-11-05 | コニカミノルタホールディングス株式会社 | Wearable camera |
US20010030664A1 (en) | 1999-08-16 | 2001-10-18 | Shulman Leo A. | Method and apparatus for configuring icon interactivity |
TW455769B (en) | 1999-08-18 | 2001-09-21 | Jian Huei Jiuan | Eye-protection method and apparatus set up for monitor screen |
US6885734B1 (en) | 1999-09-13 | 2005-04-26 | Microstrategy, Incorporated | System and method for the creation and automatic deployment of personalized, dynamic and interactive inbound and outbound voice services, with real-time interactive voice database queries |
US6519552B1 (en) | 1999-09-15 | 2003-02-11 | Xerox Corporation | Systems and methods for a hybrid diagnostic approach of real time diagnosis of electronic systems |
GB2354847A (en) | 1999-09-28 | 2001-04-04 | Ibm | Publish/subscribe data processing with subscription points for customised message processing |
US6353398B1 (en) | 1999-10-22 | 2002-03-05 | Himanshu S. Amin | System for dynamically pushing information to a user utilizing global positioning system |
US6714977B1 (en) | 1999-10-27 | 2004-03-30 | Netbotz, Inc. | Method and system for monitoring computer networks and equipment |
US6829639B1 (en) | 1999-11-15 | 2004-12-07 | Netvision, Inc. | Method and system for intelligent global event notification and control within a distributed computing environment |
US6704722B2 (en) | 1999-11-17 | 2004-03-09 | Xerox Corporation | Systems and methods for performing crawl searches and index searches |
US7613695B1 (en) | 1999-12-06 | 2009-11-03 | Reed Elsevier Inc. | Relationship management system that provides an indication of users having a relationship with a specified contact |
US6834208B2 (en) | 1999-12-30 | 2004-12-21 | Microsoft Corporation | Method and apparatus for providing distributed control of a home automation and control system |
US6652283B1 (en) | 1999-12-30 | 2003-11-25 | Cerego, Llc | System apparatus and method for maximizing effectiveness and efficiency of learning retaining and retrieving knowledge and skills |
US6546554B1 (en) | 2000-01-21 | 2003-04-08 | Sun Microsystems, Inc. | Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer |
US6542889B1 (en) | 2000-01-28 | 2003-04-01 | International Business Machines Corporation | Methods and apparatus for similarity text search based on conceptual indexing |
US6868525B1 (en) | 2000-02-01 | 2005-03-15 | Alberti Anemometer Llc | Computer graphic display visualization system and method |
SE0000385D0 (en) | 2000-02-07 | 2000-02-07 | Om Technology Ab | A trading system |
US20020105537A1 (en) | 2000-02-14 | 2002-08-08 | Julian Orbanes | Method and apparatus for organizing hierarchical plates in virtual space |
US6899539B1 (en) | 2000-02-17 | 2005-05-31 | Exponent, Inc. | Infantry wearable information and weapon system |
US6615197B1 (en) | 2000-03-13 | 2003-09-02 | Songhai Chai | Brain programmer for increasing human information processing capacity |
WO2001071572A2 (en) | 2000-03-22 | 2001-09-27 | Sidestep, Inc. | Method and apparatus for dynamic information connection engine |
AU2001249768A1 (en) | 2000-04-02 | 2001-10-15 | Tangis Corporation | Soliciting information based on a computer user's context |
US7464153B1 (en) | 2000-04-02 | 2008-12-09 | Microsoft Corporation | Generating and supplying user context data |
AU2001253161A1 (en) | 2000-04-04 | 2001-10-15 | Stick Networks, Inc. | Method and apparatus for scheduling presentation of digital content on a personal communication device |
US6327535B1 (en) | 2000-04-05 | 2001-12-04 | Microsoft Corporation | Location beaconing methods and systems |
US6616613B1 (en) * | 2000-04-27 | 2003-09-09 | Vitalsines International, Inc. | Physiological signal monitoring system |
US7051079B2 (en) | 2000-05-16 | 2006-05-23 | Fuji Photo Film Co., Ltd. | Information intermediary apparatus, information management apparatus, and information communication system |
US6712615B2 (en) | 2000-05-22 | 2004-03-30 | Rolf John Martin | High-precision cognitive performance test battery suitable for internet and non-internet use |
US20020191034A1 (en) | 2000-06-28 | 2002-12-19 | Sowizral Henry A. | Size conditioned visibility search system and method |
US6477117B1 (en) | 2000-06-30 | 2002-11-05 | International Business Machines Corporation | Alarm interface for a smart watch |
US6707476B1 (en) | 2000-07-05 | 2004-03-16 | Ge Medical Systems Information Technologies, Inc. | Automatic layout selection for information monitoring system |
US6738759B1 (en) | 2000-07-07 | 2004-05-18 | Infoglide Corporation, Inc. | System and method for performing similarity searching using pointer optimization |
EP1182541A3 (en) | 2000-08-22 | 2005-11-30 | Siemens Aktiengesellschaft | System and method for combined use of different display/apparatus types with system controlled context dependant information representation |
US7392486B1 (en) | 2000-09-19 | 2008-06-24 | Honeywell International Inc. | Method and apparatus for automatic display and removal of required synoptic pages in a checklist context |
US6795806B1 (en) | 2000-09-20 | 2004-09-21 | International Business Machines Corporation | Method for enhancing dictation and command discrimination |
US20020054130A1 (en) | 2000-10-16 | 2002-05-09 | Abbott Kenneth H. | Dynamically displaying current status of tasks |
US20020044152A1 (en) | 2000-10-16 | 2002-04-18 | Abbott Kenneth H. | Dynamic integration of computer generated and real world images |
GB2386724A (en) | 2000-10-16 | 2003-09-24 | Tangis Corp | Dynamically determining appropriate computer interfaces |
US6704812B2 (en) | 2000-11-30 | 2004-03-09 | International Business Machines Corporation | Transparent and dynamic management of redundant physical paths to peripheral devices |
US20020082730A1 (en) | 2000-12-21 | 2002-06-27 | Microsoft Corporation | Universal media player |
US7110764B1 (en) | 2000-12-21 | 2006-09-19 | Cisco Technology, Inc. | Mobility manager in a wireless IP core network |
US6811538B2 (en) * | 2000-12-29 | 2004-11-02 | Ares Medical, Inc. | Sleep apnea risk evaluation |
US20020159770A1 (en) | 2001-04-30 | 2002-10-31 | Moultrie Ferrell C. | Game camera |
EP1410228B1 (en) | 2001-06-22 | 2016-03-23 | Wonderware Corporation | Remotely monitoring / diagnosing distributed components of a supervisory process control and manufacturing information application from a central location |
US20030208113A1 (en) * | 2001-07-18 | 2003-11-06 | Mault James R | Closed loop glycemic index system |
GB2378338A (en) | 2001-07-31 | 2003-02-05 | Hewlett Packard Co | Automatic identification of features of interest within a video signal |
WO2003019325A2 (en) | 2001-08-31 | 2003-03-06 | Kent Ridge Digital Labs | Time-based media navigation system |
US7283992B2 (en) | 2001-11-30 | 2007-10-16 | Microsoft Corporation | Media agent to suggest contextually related media content |
US6766245B2 (en) | 2002-03-14 | 2004-07-20 | Microsoft Corporation | Landmark-based location of users |
US7395221B2 (en) | 2002-05-09 | 2008-07-01 | International Business Machines Corporation | Intelligent free-time search |
US7987491B2 (en) | 2002-05-10 | 2011-07-26 | Richard Reisman | Method and apparatus for browsing using alternative linkbases |
US20040133600A1 (en) | 2002-07-19 | 2004-07-08 | Homer Gregg S. | Rechargeable media distribution and play system |
US7124125B2 (en) | 2002-11-01 | 2006-10-17 | Loudeye Corp. | System and method for providing media samples on-line in response to media related searches on the internet |
USD494584S1 (en) | 2002-12-05 | 2004-08-17 | Symbol Technologies, Inc. | Mobile companion |
AU2004208274B2 (en) | 2003-01-28 | 2007-09-06 | Samsung Electronics Co., Ltd. | Method and system for managing media file database |
US20040267812A1 (en) | 2003-06-26 | 2004-12-30 | Microsoft Corporation | Media platform |
US7162473B2 (en) | 2003-06-26 | 2007-01-09 | Microsoft Corporation | Method and system for usage analyzer that determines user accessed sources, indexes data subsets, and associated metadata, processing implicit queries based on potential interest to users |
US7836010B2 (en) | 2003-07-30 | 2010-11-16 | Northwestern University | Method and system for assessing relevant properties of work contexts for use by information services |
US20050193017A1 (en) | 2004-02-19 | 2005-09-01 | Han-Gyoo Kim | Portable multimedia player/recorder that accesses data contents from and writes to networked device |
US7561200B2 (en) | 2004-07-26 | 2009-07-14 | Csi Technology, Inc. | Apparatus and method for automation of imaging and dynamic signal analyses |
US7260453B2 (en) | 2005-01-06 | 2007-08-21 | The Boeing Company | Checklist error mitigation system |
US20060259494A1 (en) | 2005-05-13 | 2006-11-16 | Microsoft Corporation | System and method for simultaneous search service and email search |
US7627565B2 (en) | 2006-01-31 | 2009-12-01 | Northwestern University | Organizing context-sensitive search results |
US10331708B2 (en) | 2007-06-29 | 2019-06-25 | Microsoft Technology Licensing, Llc | Dynamic awareness involving location |
-
2008
- 2008-06-30 US US12/165,377 patent/US9183306B2/en not_active Expired - Fee Related
-
2014
- 2014-09-15 US US14/486,777 patent/US9906474B2/en not_active Expired - Fee Related
-
2018
- 2018-02-18 US US15/898,623 patent/US20180241708A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6101531A (en) * | 1995-12-19 | 2000-08-08 | Motorola, Inc. | System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client |
US6047327A (en) * | 1996-02-16 | 2000-04-04 | Intel Corporation | System for distributing electronic information to a targeted group of users |
US5918158A (en) * | 1996-07-24 | 1999-06-29 | Lucent Technologies Inc. | Two-way wireless messaging system |
US5987606A (en) * | 1997-03-19 | 1999-11-16 | Bascom Global Internet Services, Inc. | Method and system for content filtering information retrieved from an internet computer network |
US6922786B1 (en) * | 2000-10-31 | 2005-07-26 | Nortel Networks Limited | Real-time media communications over firewalls using a control protocol |
Also Published As
Publication number | Publication date |
---|---|
US9183306B2 (en) | 2015-11-10 |
US9906474B2 (en) | 2018-02-27 |
US20150106467A1 (en) | 2015-04-16 |
US20090013052A1 (en) | 2009-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9906474B2 (en) | Automated selection of appropriate information based on a computer user's context | |
US7073129B1 (en) | Automated selection of appropriate information based on a computer user's context | |
US11539657B2 (en) | Contextually-based automatic grouped content recommendations to users of a social networking system | |
US11957486B2 (en) | Systems, methods, and apparatus for enhanced headsets | |
US12147612B2 (en) | Systems, methods, and apparatus for enhanced presentation remotes | |
US11665284B2 (en) | Systems, methods, and apparatus for virtual meetings | |
US10554870B2 (en) | Wearable apparatus and methods for processing image data | |
US11804039B2 (en) | Systems, methods, and apparatus for enhanced cameras | |
US20230308303A1 (en) | Systems, methods, and apparatus for meeting management | |
US20210342020A1 (en) | Systems, methods, and apparatus for enhanced peripherals | |
US8924250B2 (en) | Advertising in virtual environments based on crowd statistics | |
US20200004291A1 (en) | Wearable apparatus and methods for processing audio signals | |
US20170024682A1 (en) | Remote travel service | |
WO2020246127A1 (en) | Incentive granting system, incentive granting device, incentive granting method, and incentive management program in virtual reality space | |
WO2009151775A1 (en) | System and method for development of interpersonal communication | |
EP3792914A2 (en) | Wearable apparatus and methods for processing audio signals | |
JP2024140478A (en) | PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING SYSTEM | |
Gupta | Study and Proposal of Wearable Computer Applications | |
Minocha et al. | APPLICATIONS OF WEARABLE COMPUTERS FOR IMPROVING QUALITY OF LIFE IN INDIAN METRO CITIES |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:044962/0817 Effective date: 20141014 Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TANGIS CORPORATION;REEL/FRAME:044962/0806 Effective date: 20070306 Owner name: TANGIS CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROBARTS, JAMES O.;NEWELL, DAN;ABBOTT, KENNETH H.;SIGNING DATES FROM 20010516 TO 20010518;REEL/FRAME:045359/0196 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |