Processing

Please wait...

Settings

Settings

Goto Application

1. AU2013200386 - AN ADJUSTABLE PET DOOR

Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

[ EN ]
File Reference: PCTAdapt2006-12
AN ADJUSTABLE PET DOOR
TABLE OF CONTENTS
FOR REVOLUTIONARY PAT APPLICATION
Did This Application Show Up In Your Patent Search?
Get Updates. View New Embodiments.
Visit LicenseltToday.com (+1) 707-428-5000
Be Careful Not To Miss Its Contents
This Is A Copy of PCT Patent Application Files with Us Patent Office On Dec. 20, 2006. PCT Application Form Is At End Of This Entire Pat Application.
APPLICATION'S FREE UPDATES:
INVENTIONSDIRECTORY/LicenseItToday.Com INTERFACEPATENTAPPLICATION/LicenseItToday.Com
.  FEATURESLISTING/LicenseItToday.Com
LICENSEAGREEMENT/LicenseItToday.Com
OVERVIEW/LicenseltToday.Com for this and future pat applications. Start Here. PATENTATTORNEYS/LicenseItToday.Com
QUESTIONSANDANSWERS/LicenseItToday.Com
.  REQUESTANINVENTION/LicenseItToday.Com gives new inventions, or new variations for yours. TRANSLATIONS/LicenseItToday.Com Translations in 40+ languages coming
More at LicenseltToday.Com
INTRODUCTION SECTION 1:
.  Introduction Part 1: READ FIRST - Then Key Word Search Interesting Inventions Inside!
Features - short handy version. Read this soon.
Abbreviations - short version
Symbols - short version
INTRODUCTION SECTION 2: Read Much Later
Awards We Gave
Continuous Research In Past Decades
Search & Replace
Abbreviations & Symbols In Detail
.  Figurative Drawings: diagram codes and more
Less Common Features
Miscellaneous: Key words, Details on common features.
COMMON FEATURES: Moderately Described. 
COMMON FEATURES: In Greater Detail. Read Later. Access
Adapting
Analyzer (decides how to get inventions you want)
Artist (creative process)
Behavior Analyzer (adapts to user's behavior)
Balance *
Basic *
Billing (generates income)
Brain (creative process)
Camera *
Cartridge (software license upgrade)
Characters *
Compose (creative process)
Content Analyzer
Coordinator
Dance (connects to what can move)
Database
Distancer (brings client to inventions)
Editor (adapts instructions, etc)
Educator (learn to use invention)
Entertainment *
Environmental Protection is important
Exercise *
Experience (improve user's experience so they spend more) Game (concepts for non game applications)
Guide
Icon *
Keyboard *
Locator (find about anything)
Mainframe *
Manufacturer Programs
Microphone *
Morning Alarm (can remind about anything tide to invention) Multi-Media (optional ways to interact with inventions) Multi-User (can adapt to each user)
Notifier (know what's happening)
Order & Timing (looks at patterns of events) 
Outgoing Sound Communicator (optional speakers)
Pets *Predict (invention's future market size)
Prediction Software
Programming *
Questions (system asks user what invention characteristics are wanted)
Remote Control
Routing clients to what they seek
Screen
Seek & React (system reacts by giving invention you seek)
Sound Analyzer (voice commands)
Score (measures how well inventions adapt)
Security (catch infringers, etc.)
Sensors
Software
Sound Vision (audio visual option)
Status
Synthesizer (any sounds adapt to user preferences)
Telecommunications (stay connected with inventions)
Therapy (feel better using inventions)
Tilt (joystick)
Time & Date Stamp
Track (know how invention was used)
Users (defining people who use inventions)
Visual Analyzer (adapts based on what it sees)
Virtual Reality (futuristic...)
W5 (invention asks what happened, where, why, when & how)
Walk About (offers variations for portable uses)
Zone (see Locator section).
THE COMMON FEATURES ABOVE HAVE THEIR SUB-FEATURES IN SEPARATE FILES.
The Following Common Features Are Separated Into Multiple Files. Their Files (Sub-Features) Are Organized Alphabetically Along With The Other Features.
ADAPT:
Introduction & Tailor
Adaptive Inventions
Sub Parts
.Expand 
.  Article
.  Code Sequences for software & DNA . Other Adaptations *
ARTIST:
.  AR Intro & General
.  AR IMIS
.  AR IMI
.  AR Write
AR Cause
.  AR Crawl
.  AR Educ
.  AR ReadHelp
.  AR ReadHelp*
* AR Dys-Ed
.  AR Dys-IMI
.  AR Dysl
.  AR Dys2
.  AR Dys App
* Artist Misc*
GAMES Main Sub-Folder. Includes Sub-Sub-Folders
with their files:
* Games Intro (file)
.  GA LIC R: (sub-sub-folder) -Collar Game
-Dating Game
-Dating Game Details
.  GA INVENTION & PARTS: -Guide Behavior Modify
-Tailor Communication
-Tailor Match
-UIP Emerge
.  GA 3
-Predict Game Functions 
-Puzzle Maze Guide
-Real Life Practice Game -Real Time Interface
.  GA 2
-Good Intentions
-Health Game
-Seek A Reaction Game
.  GA l
-Games from March 2006 -Games Other
-Games from 1990's -Invention Game
.  Game* (file)
.  GAME PARTS (Features): -UIP Sub-Part Games -Action Points
-Parts from our 1990's Games -Artificial Intelligence UIP -Industry's Common Features -RPG Plot List
-UIP Big Facets *
-UIP Input Games *
.  Upgrade Other's Games
LOCATORS (GPS):
* Introduction
.  1G104 Oceanic Miscellaneous . PS 1
.  PS2
.  PS Functions
*PS Zone
.  PS Feature Listings
.  PS Other
.  PS Miscellaneous * 
PETS (In Addition To Pet Door):
.  Introduction
.  Parts
.  Sub-Parts
.  Pet Door Notes (read later)
.  Expand
.  Patents
INVENTION DIRECTORY: They are listed in the above feature files, and below. The initial section of each invention may be easier to interpret until one may have read the entire patent application. Start today and explore by your key words.
Inventions In Following End User Categories Were Created Through Our Genius System: Chemical related for home and business use, locators, motion related, audio, pet adaptations, plastic & mechanical adaptations, telecom, jet lag reduction when lights set by alarm clock, track sea food for your safety, voice & language guide applications, etc. More in Other Files!
I Directory Inventions
J Directory Inventions
G Directory Inventions
E Directory Inventions
D Directory Inventions
C Directory Inventions
B Directory Inventions
A Directory Inventions
DETAILED TABLE OF CONTENTS FOR THE BIGGER SECTIONS ABOVE
(CONTENTS FOR SUB-SECTIONS):
The  following table lists multiple sections that group different files. 
In capital letters are Section names; followed in order of presentation are their file names.
.  The Game Section is further divided into its sub-sections, then their individual files.
*  We continue to improve the interface to this patent application, while the application itself evolves. Visit our site for updates to the interface and other matters at www.LicenseItToday.com.
INVENTIONS BY CATEGORY (A Small Portion Of Our Inventions)
CHEMICAL - Ties To Other Classifications:
Introduction
Indicator Patents
Indicators
Parts
.  For Techies
.7GN
.7GQ
.7GR
.  Chemical in General - 7G
MOTION TUTOR:
Introduction
Body Guide
Body *
.  Claims
Claims *
Other
IMI*
For Techies
.  Patents
MUSICAL;
.5EO80 A
.5EO80 B
. 9J Compose
Audio D-J
Audio Miscellaneous
Trigger Toy 
PLASTIC & MECHANICAL:
.  6G Plastics
.  6GE
.  General Plastics
Sound Analyzer
Sports using our technology
TELECOMMUNICATIONS:
.  Cell Phone Notifier
.  Noise Canceling Assistance
.  Keep phone ringing until you catch it.
Tools for Consumers using our technology
Toys using our technology
Travel Gadgets
Visual Analyzer
Web: A better way to send information, and prove what was deep inside.
I MISCELLANEOUS:
.  3E
.  3G
. 4E
. 4G280 Frisbee Adaptation
.5E
.  5G
.  7G
.  9G
.  Audio in General
* Cord Length Notifier
.  Cord Length Research
.  Invention - Motion Capture
.  Jet Lag Adjuster
.  Point of Sale Software 
.  "R" List Inventions
.  Sea Food Poisoning Safety
.  Voice Analyzer Pronunciation Guide
FIGURATIVE DRAWINGS
ABSTRACT
CLAIMS
.  Independent Claim
.  Dependent Claims: Interesting ways to search our invention directory in this pat application and updated info at LicenseItToday.com. The Genius Thinking Adaptive Design. Unity of this patent application and its posted invention directory. Access Systems.
Keyword Searching For Your Inventions Can Be A Quick Way To Discover Our Revolutionary Technologies Today
For Updates & More Visit LicenseItToday.Com
File: Intro To Pat / Intro6 Section 1
SHORT INTRODUCTION TO PATENT APPLICATION
Updates at LicenseItToday.Com
PLEASE READ!
FOR FIRST TIME READERS: First read this introductory section. Second, locate inventions by a keyword search or its ID number. Third, carefully study table of contents, then read from there.
Common features in each of the inventions view the simplified handy version. More details are in the main feature file where most abbreviations are spelled out.
First timers might ignore information preceded with a star "*", or dot dash -" Enjoy the interesting patent application..!
Central Product Description: The central description is laid out first by its name and often preceded by its product number, afterwards its description. Additional information on the invention is explained in the Branching section. Product ideas can be integrated with other product ideas, or developed separately.
Seeking a specific range of inventions? Now do a keyword search of this pat application. For updates and more information visit www.LicenseItToday.com. Then you can read about how our patent application is laid out.
BRANCHING OUR INVENTIONS
Branching helps explain the likely levels of importance in comprehending the central description. Concepts further down the branching are ideas, which may be merged with the central description, may be in the same or different patent application(s) from the central description's idea(s). There are many ways to branch the links between this pat applications many sections. This introduction covers a good portion of the variants.
*  Reducing Space: The tree branching system greatly reduces repetitive disclosures. The simple listing for type of branching that the invention branches into: it informs the reader to find that branch section in this and related sources, for the remaining information.
*  There are two sections for where the branching system is disclosed: first, the product descriptions; second the separate 'Features'. Applicable 'Features' supplement product descriptions.
*  Software key word searches for all the data in this and referred to filings are (also) used in locating related data. Searches include: part names, product numbers, *% other data (particular words or phrases found in central description and mentioned in other parts of our filings, or *patent searches in any (US) patent database). Use our keywords found in the specifications, and specific keyword sections.
Both product descriptions, and Features, generally branch out in the following network:
BRANCH 1: The first paragraph (if any) in the central description to the invention, or common features shared by our inventions.
BRANCH 2: The additional description excluding the following OTD (Other Technical Details) (if any). Branch 1 & 2 make up the central description.
*  BRANCH 3: OTD following Branch 1 & 2. Drawn diagrams with their attached descriptions in the same file, but not covered in Branch 1 or 2. * Later Read Introductory Notes which explains Branches 4, 5, 6, 7, 8, 9, etc.
Our system is more elaborate than a tree's branching. Links (branches) do in many directions, and often link back to the point where the user is in our inventive system. Links start from where ever you are interacting with the interesting system.
GENERAL INFORMATION 
Discover why this application was done differently from traditional filings.
*  One of the main purposes of the "Features" is to reduce research, development and manufacturing costs by using similar designs within different electronic product systems. It makes it easier to program, manufacture, market and learn to use the system's more simplified, and repeated features.
*  Any one or more features mentioned in a product description might be useful. The product description includes the central description, the part(s) with their appendices, and the diagram(s).
Priority Goes To US Pat Applications:
Appl # Our Reference # Date Filed (Approx):
60/755291          US2101 Filed Dec 29* or 30, 2006
60/756607                                                  Filed Jan 05, 2006.
60/778313          US2400D. Filed Mar 01, 2006
60/783018          US2404. Filed Mar 15, 2006
60/786906          US2410. Filed Mar 28, 2006
60/852794          US2522. Filed Oct 18, 2006
USAAdapts2006-12 Filed Dec 19, 2006 Filed electronically
This Appl PCTAdapts2006-12 Filed on Dec 19, 2006 Filed in paper form
The two Dec 2006 patent filings at USPTO (US Pat & Trademark Office) have identical specifications. The applications are identical except for the application forms.
This entire patent application is may be filed with updates within three weeks for national patent application submissions in different patent offices including the European Patent Office.
File: Features Intro / IMI S 5
FEATURES - SHORT HANDY VERSION
This File Gives Basic Idea For Each Feature.
Now Key Word Search Inside, Or Browse By Subject!
ACCESS = Gain access to electronic functions with a correctly keyed in combination, etc.
ADAPT = Another term for Tailoring. See User Information Programming. 
ANALYZER = Computer software analyzes how to handle situation.
AP = Application: How invention can be used.
ARTIST = Allows user to make and edit images.
ASSOCIATE = Associating similarity levels between multiple events or digitized files.
BA = Behavior Analyzer. Analyzes live behavior of people.
BALANCE = Speakers' volume adjusts according to where person sits. System uses central point for two or more people.
BILL = Billing: Charges users by amount and type of usage.
BRAIN = The Computer's brain. Combines: "Analyzer", "UIP", etc.
C = Computer. The center of the system unless otherwise described.
CAMERA / LENS = The system's eye.
CART = Cartridges to be inserted into system. Frequently contains useful software / databases.
CLAP = Clapper. Each combination of claps controls a different function. Allows user to control invention without touching.
COMMUNICATE = When any two or more people, animals or devices communicate with each other in any way.
COMPOSITION * = Electronic Music Composition: Another variation of product can also be used to create interesting music.
CA / CONTENT ANALYZER = Analyzes the physical, or database contents.
COORDINATOR = Coordinates different Features of system.
CUSTOMIZE = See our Adapt feature.
D  =  Diagram.  This symbol often precedes diagrams. 
DANCE * = Body movement generates sounds.
DATE = Internal clock, calendar, clock alarm notifier.
DB = Data Base
DISPLAY / S = Screen.
DISTANCER TM = Signals whenever any two parts separate or come together. Signals via radio waves if separation is more or less than programmable distance. See other registered file on distancer for details. Distancer TM EDIT = sw ('software) edits / screens out data before it reaches the user.
EDUC * = Educational: teaches interesting skills. Replaces human instructor.
EGH = Education Gets Harder TM Adjusts to user's proficiency.
ENTERTAIN = Also used as form of entertainment.
ENVIRONMENTAL PROTECTION / E.P. = ['Customizes] EP friendliness!
EXERCISE = Also used as form of exercise.
FX = Fax transmissions.
GAME = Also used as an abstract form of a game.
GPS = Global Positioning System.
GUIDE TM = An instructor. Suggests how user might proceed. System guides user so they can better use system. Guide TM
INTERACT / INTERACTIVE = System interacts with user.
K = Key in. User manually commands system, keys in command or data, etc.
KN = Invention by Steven K a y s.
LICENSEE = User who uses invention. 
LOCATOR * = Shows location.
M / MFH = Mainframe computer hookup option for more complex tasks.
MIC / MICROPHONE = Microphone
MM = Multi Media.
MO = Modem
MOOD = User's mood.
MORNING = Morning alarm.
MOUSE = Computer mouse.
MP = Manufacturer programs.
MQ = Machine asks user questions to obtain information so system can better serve user.
MULTI-USER = System is specially designed for multiple users.
N = Product. Can also be an invention from S t e v e n K a y s .
NOTIFIER = User is notified on the status of any situation.
ORDER & TIMING / 0 & T = System reacts to the order and timing of external events.
OSC = Outgoing Sound Communicator. Signals user when a function within the device occurred. OTD = Other Technical Details. For Techies.
PD = Positioning Device . Portable unit, which broadcasts its location to the Positioning System. PR = Program (software)
PREDICT = System predicts what will occur, or what user wants. 
PS = Positioning System. Identifies the position of the PD (Positioning Device) via its airwaves broadcast. PS-ZONE = System reacts according to the location of element in question. Positioning System Zone
Q = User / System ask each other questions. Helps each better understand each other.
R = Remote Control
RC = Receiver
REACT = System reacts to occurrence as programmed.
ROUTE / ROUTER = Sys routes User / other (part of) sys to designated point / program. A type of "Editor". S = Computer screen.
SCORE = The status of situation and or user's performance.
SENSOR = Sensor. Senses via many means.
S&R / SEEK & REACT = System seeks designated occurrences, which intern causes a reaction which responds accordingly.
SA / SOUND ANALYZER = Analyzes type sound. Not important.
SOUND VISUAL ANALYZER = Converts sounds to visual effects; or conversely converts visual effects to sounds. It's "Visual Analyzer" & "Mic" interprets images into data: words describing what it sees/hears; other codes sys ("brain") can use to process ("brain") images/sounds.
SPEECH = System talks to user.
SP TEL = Speaker telephone.
STATUS = System shows the status of situation.
STEREO = Stereo
SW = Software 
SYNTH = Sound synthesizer.
TAG = A user, or file, or other part is labeled in some manner. Details are covered by the Tracker feature, which relies on Tags.
TAILOR TM = System tailors itself to better function for designated purposes. This is also called 'Adapt, 'Customize, and 'User Information Programming.
TDS * = Time Date Stamp.
T / TEL = Telephone.
TGH = Therapy Gets Harder. As user's ability increases, system matches user's newer skills.
TILT = Devices are controlled by how the stick is tilted. Each tilt position represents a different function.
TR = Transmission/receiving via airwaves & or wire.
TRACK / TRACKER = Sys tracks or monitors actions of user, or system.
TRAITS = The traits of the user. User Info Programming adjusts inventions to the user's traits.
U = User. Person or other party licensed to use the features.
UIP TM + = User Information Programming . System adapts to user's unique needs by collecting information about them. Also called: 'Adapt, 'Customize, 'Tailor.
UK = See "K".
UQ = User can ask invention questions.
VIBRATION = Vibration generated by device for specific reasons, eg: entertainment; notifier; form of communication based on type of vibration.
VA TM / VISUAL ANALYZER * = Alerts when camera sees a change in its view. Not important.
VR / VIRTUAL REALITY * = Future use with virtual reality technology possible. Less important now. WA = Walk About. Portable unit. Also interacts w (with) user via speakers.
W5 TM = When / Where / How / Why / What
ZONE = A certain area with defined boundaries. The area is also dealt w/ according to its distance from point of perspective.
Each Feature Is Explained In More Detail Throughout Patent Application
Abbreviations & Symbols - short list
File / Feature Intro / Abb-Sym Short 4
COMMONLY USED ABBREVIATIONS & SYMBOLS
With Simplified Explanations.
Read Expanded & Detailed List In Its Main Section.
ABBREVIATIONS - COMMONLY USED
'D' = Figurative Drawing, Diagram.
'El' = Electronic / *Electrical
'Exists'= The particular function described exists and is designed to compliment the product's other functions. 'Fq" = Frequency: transmission frequency via wireless or wire. Eg: digitized electrical signals / codes; infrared; radio frequencies [RF]; sound (for transmission purpose).
'IMI' = See Features (Parts) File.
'KN' = Invention.
'KW' = Key words to find related features in this application, patent database, etc.
'Misc' = Miscellaneous
'N' = Existing product on market, or confidential invention.
'Obvious' = The simple version of what's described may or may not be (fully) patentable.
'OP' = Option(s).
'OTD' = Other technical details. Read its section later. Or for techies.
'PL' /'Plastic' /'PVC' = Product constructed of PVC / other petroleum by product.
"SW" = Software
'Sys' = Electronic system.
'U = User (s)
'Ver'= Version.
'W' = With.
'WO' = Without
"Zones" = Designated locations. See "PS-Zones".
SYMBOLS SECTION
- = The following description is the beginning of a new section describing the product.
-- = The following is the sub-section of the previous section describing the product.
=  This  item may be less important to the central over-all product concept. 
'.-' or '-.' = The same meaning as '*' and '-'. The '.-' is however only used to begin a new section describing the product.
..-'is lower in the branching, hence equal to **. Started using '-.' instead of'.-' in Aug 96. This is virtually not used, and usage of this form might be an error signifying a period as well.
'...'= Etc. Or the previous concepts can be one or more of the examples for the said product idea(s). This symbol is normally three, yet up to five dots.
'=''->''>'* = When used in the product descriptions it designates the lines between parts of a diagram. The presence of one of these symbols shows the data is an actual diagram; hence no need to write 'diagram'. '->' & '>'are same, and opposite of <-, <. They designate direction of signals, '=' allows one or two way signal transmission (<- and or ->).
= One of the more important aspects.
= This function significantly expands the product idea beyond the basic concept. It might also be too "far out" to be feasible.
( )'or' = Shows one or more of the multiple possible examples. One can keep or retain what is in the parentheses.
Includes a limited list of possibilities.
/' or '\' = Means 'And Or'. For example A/B means, A and or B applies to the scenario.
~ = Same as '/' or'\' except a line is also drawn between the parts when this wavy line symbol is used.
':' = information following the colon represents one or more of the possible manifestations.
File: Intro To Pat / List Awards
TOP AWARDS ARE GIVEN TO THE FOLLOWING PEOPLE:
The following people from around the world are awarded high honors for their creative contribution to this patent application. Awards have been given since the 1980's for people's creative contribution to this patent application. The Award Recipients are for:
T Acevedo
A Akiyama
R Akui
P Akuna
A Alexander
S Alten
A Ayama
S  Bazhinev 
D Beach F Bellet R Bigham A Bloom B Bock
G Boissiere A Borg
V Borisovich C Buhler B Burns D Callister S Canfield I Chenevey M Chism J Conca H Contrino A Cook V Davidenko B Demars S Edwards D Farr
A Fedorov D Froseth M Fuji
V Galakhov o Galianova S Gaisenyuk A Giustino S Golder S Grinko E Hauglan D Heller C Herlon R Hollstein H Kim
B Kornilov A Kravitz A Krilov T Kwon B Lantum
D Lee
D Lemmon
A Leshenko
V Lenivenko
C Macone
S Manzo
C Mason
J Mezzeera
B Nolta
A Nazarenko
K Nooruddin
F Pavez
A Procopenco
K Ramirez
S Richmond
C Rojoy
Rubin
M Sanem
E Savage
M Scinto
S Senn
R Simon
B Smith
M Stamos
H Tanabe
K Thompson
o Tsibin
V Villaneueva
R Weiss
B White
H Young
More Awards Are Being Given Next Year
File: Intro To Patent / Continuity of R&D OUR REAL LIFE RESEARCH ON ASPECTS OF THIS APPLICATION SINCE *
Read This Section Much Later
This Also Signifies Our Continuity In Researching This Patent Application. It Includes Real Life Research in Applying the Invention Concepts. In the US, Patentable Rights can begin at idea conception, even prior to the patent filing date as required in all other countries except the Philippines. Research Examples:
OVER VIEW: OUR RESEARCH SUBJECT MATTER
.  Government security in: border check points when entering/exiting buildings to country borders, transportation: 'access, 'behavior analyzer.
Adapting to cultural behaviors in Japan, Europe plus Former Soviet Union, US, Mexico, Canada, etc. Promoting the business incubator
.  Researching the functions of: commercial and related (residential real estate), office business centers (executive suites), business incubators (funded by government and/or private sources). Many sources/organizations on the internet: OfficeBusinessCenters.Com, Technology.Gov, WorldBank.Org, Bio.Org, Jetro.Go.Jp, *NewEnergyFinance.Com, EmIncubation.Co.UK
.  Government: 'BA for government employees (located regionally and elsewhere); citizens and voters; expressing views publicly and through government channels (for needed improvements and/or problem identification). Problems with self interest of power players that does not on average elevate needed benefits/improvements for the (regional) citizenry.
'Environmental Protection: recycling; generating/saving energy. 'Track via 'VA, 'SA, 'BA.
Certain organizations obstruct the development of business incubators. This helped our researching and/or improving the business incubator concept and its process [even if final results didn't appear totally novel.]
.  Researching the creative thought process. 'Adapting ideas, features, services to: culturally bound thought patterns (purchase decisions that aren't all economically based [as determined by 'ba]). This requires extra 'tailoring, since the role business economics plays in client thought patterns more easily transcends cultural lines.
.  How professors (of engineering and the arts), engineers, artists and consumers behaved, in and out of their research behavior patterns.
People's 'reactions to our confidential invention(s).
Simplicity of 'Interface: how to present matters in simplified 'edited format. Which features should be first be explained (in abstract), (so users can be 'guided to appreciating/using other 'linked/'associated features/services). 'Interfaces for: Business Incubator; Selling/Leasing commercial/residential real estate around the world; explaining our inventions; Helping people enhance/'analyze their creative thinking process; Importance of (job) labels/titles; Screening applicants ['access tests using ('ba)], etc.
.  Cost effectiveness:
-Unity: consolidating needs from 'multi-users, then 'tailoring services for their common/average needs saves costs, e.g.: incubator type features. One service becomes tied to other features offered [unity of invention], even due to proximity of client/feature, how one need links to other needs (upon client being 'guided), familiarity of [human] interface, more..!
-Cheaper to research live human actions, than build prototypes. Our inventions are also modeled!'associated with [our business] human/economic transactions [resulting in revenue generation] from the research process / release of future inventions.
.  Confidential matters explored, a portion are disclosed here.
RELEVANCY TO (BUSINESS INCUBATOR AND/OR INVENTION) FEATURES:
ACCESS = Police, ADT, Sonitrol and other US based security company services were researched. Behaviors of people correctly 'accessing building security system, and properly exiting the security 'zones. 'Guiding people in the 'access methods.
.  Restricting 'access based on: 'behavior analyzer (background checks); 'time date stamp; privilege to 'access 'designated 'zones.
.  Passwords to use devices (copiers). 'Tracking usage, and 'associating this with revenues, and generating longer term clients (extended licenses). Cheaper fees per copies made makes clients happier as this is a frequent point of 'interaction for clients. This makes frequented 'interactions more affordable, and thereby increases the amount of client satisfaction. Revenues from fixed, less auxiliary services (office space leases) might generate more income. When a feature is less reliable (copiers) consider charging less for it (until the invention feature is improved). . Our pet door foot cleaner tied to people tracking dirt into building because they failed to spend enough time using floor mat.
ADAPT TM = Matching business to business (B2B) services to customer needs, e.g.: phone answering (services); giving 'access and 'ba related services (at the receptionist desk). 'Reacting to people/companies taking improper advantage of our 'tailored services.
.  Communicating with people via alternative behavioral patterns, designed to get 'designated 'reactions. 'Seeking their interest by offering 'designated 'interfaces.
.  Tackling deception in others: 'tracking their behavior without their knowledge; 'educating them and others via the 'order & timing of my behavior that I won't budge when they think it will be cheaper for me to do what they want. Establishing my consistency in not putting up with fraudulent practices had a 'predicted benefit in having fewer conflicts (infringements).
.  Making our business and other services more 'accessible via 'tailored 'guidance, e.g. few understood the business incubator's services, nor our methods for increasing the inventive creative abilities in people.
ANALYZER = Giving 'access: relying on security system data!'tracking to improve 'access system [by limiting 'access privileges to parties with improper [access related] behavior.
ARTIST = 'BA showing views people have of art. How 'artists / art creates 'designated 'moods, and effects people's behaviors [as reflected in 'BA].
ASSOCIATE TM = Associations clients/employees can make/link with what they see/hear/read ['va, 'sa, 'editing, 'ba]. Which links/'associations led to sales or using of services [use/license services and/or physical space rentals that were 'adapted by 'W5.
BA = Landlord behavior: how they exchange 'access for 'billing income, balanced with risk 'analysis [based on security (background search, 'ba), 'predicted client ['licensee] behavior.
BILL = 'Track 'accessing of features in [monthly] invoicing. Which features were used 'W5, and willingness for clients to pay, regardless of how they 'associated a cost/benefit ratio. Some services are so important but people were less willing to pay for them [for 'ba showed such were expected rights for their 'access 'license]. How different business incubators 'analyzed / 'tracked this situation for greater 'billing revenue, and client ['royalty] income. . Billing 'software, eg: Excel software.
CAMERA / LENS = 'access, 'ba, 'va. Security camera research.
CART = Digital flash card [with 'image] for [color copier / compute].
CLAP = Lights / 'access [restriction] features activated. Knowing people are building based on sounds in hallway, etc. With sounds, lights are left on.
COMMUNICATE = 'Telephony. 'Adapted our phone answering service to clients. Our marketing 'adapted to local behaviors and business styles.
COORDINATOR = Client needs with available services and building facilities.
DANCE * = Which body movements (of receptionist) generate 'predicted 'reactions in 'licensees, eg: greater pleasure ('entertainment), curiosity (interest in buying/'accesing other features) to continue the positive experience. Ergonomics (not hurt one's back, or fall).
DB = 'Tracking 'billable usage. 'Accessing database to: 'analyze 'W5 is using features, so we can: increase client satisfaction -> client retention (longer licenses) / greater monthly 'billings.
DISTANCER TM = Not loosing items. Keeping things where they belong. Tying pens to clipboard. Theft reduction.
ENTERTAIN = 'W5 'entertainment generates greater [long term] 'billing. 
ENVIRONMENTAL PROTECTION / E.P. = Electrical consumption by [fixed] devices like lighting, HVAC [heating ventilation and air conditioning], personal 'computers, electronic 'gadgets.
.  Difficulties getting people to recycle their wastes, and having them picked up with a better 'interface for [tenants]. 'Tracking, 'BA, 'Access ['W5 for pick ups; shredding documents].
EXERCISE = Devices [tenants] could want. Stairway = built in tread master [behavioral resistance to walking up a single flight of stairs despite health benefits]. ADA [American Disabilities Act]. Office gym installation(s).
GAME = Visitors in reception area playing [video / non electronic] 'games. 'W5 they are played.
GPS = Who did W5.
GUIDE = Clients learn more available features after they started 'licensing something. Too much information about available features contradicts invention's desire for simpler 'interface.
.  Trusting / learning to use one function, can naturally lead to client's interest/open-ness to learning about other less or [un]related features, eg: [color] copier functions get complicated requiring 'EGH.
.  Friendly / Honest 'interface create synergistic effect in: clients trust more when provider is [user] friendly; user friendliness helps create trust. Tricky behavior [to maximize short term profits] hurts long term 'billings in many ways, eg: clients speak with each other. Clients 'analyze / 'ba the services/invention features.
INTERACTIVE = the more the better. Live versus automated phone attendants.
LICENSEE / LICENSOR = Client and Landlord behavior ['ba]. How they maximize/minimize, monetary income/expenditures/royalty fees. 'W5 something is licensed/used. 'W5 licensee/licensors don't act in their best financial interests [due to failure to see all the (linked/'associated) benefits]. What behaviors/perceptions ('ba, 'associations, 'editing) cloud/effect judgment (business decision making 'analysis).
LOCATOR * = know 'W5 clients (tenants) are: helps connect incoming [screened] telephone callers to our clients. 'Tracking client quickens the phone 'connection in terms of: quickening the 'connection / being able to make the 'link (hard to do if the designated person and/or wanted feature can't be found/connected to).
MIC / MICROPHONE = Security system's 'VA.
'BA of [receptionist on phone] shows what actions create greater 'billings.
'VA is form of 'access control: can visitor / potential client be trusted? 'Predicting future 'billings [how much they will spend].
MM = Power point. Putting printer onto networks [for those with 'access]. Simplifying 'interfaces can also reduce income [fewer people able to access complicated printer network] generates less 'billings, but less frustrated clients. Frustrated clients might be shorter term.
NOTIFIER = Improper 'access [usage] 'tracked by employees/security systems.
PREDICT = client's [unstated] needs, and length of remaining a client. Study their credit history, and use our 'behavior analyzer related process.
Q = know 'W5 questions to ask
ROUTE / ROUTER = direct prospective clients to the services we 'predict they need; or even to other organizations based on their behavior profile.
S&R / SEEK & REACT = how we and/or clients 'seek and 'react to each other.
SYNTH = which voice tonalities 'W5 had 'predictable 'reactions in listeners/users.
T / TEL = business incubator phone system features recommended by OBCAI
TGH = methods to increase creative thinking (in conceiving inventions) got harder.
TRAITS = of clients.
UQ = common questions & answers
VIBRATION = 'track 'W5 people are walking [in building] [for 'ba]. What features are used 'W5.
VA = 'tracking business activity / [incubator employees] 'analyzing client behavior = 'tailor features/services. W5 TM = usage patterns for 'billable services
ZONE = Real estate property rights. Greater usage of certain 'zones in building create a behavior pattern of users; whereby we 'react by 'adapting ourselves to their needs accordingly, e.g.: location of our services, equipment, etc.
Much More..!
File: Intro To Pat / Search & Replace
SEARCH & REPLACE TEXT FOR THE PAT APPLICATIONS VARIATIONS
Important Simplified & Detailed Versions of this Patent Application
CHOOSE THE VERSION NEEDED
For Updates & More Info Visit www.LicenseItToday.com Or call California Headquarters 1-707-428-5000
This File Shows Search & Replace Features That Can and/or Have Been Conducted On This Pat Application. To condense the application while providing instruction, search and replace has been conducted in different manners throughout.
New Paragraphs:
-Replace two returns (carriage returns) with a carriage return then a tab. This results in omitting empty lines between paragraphs (as in the original text version). The indentation starting on the left margin eases readability.
This is better than omitting all carriage returns, even if a symbol were used to designate where a new paragraph starts.
Abbreviating Terms in General:
.  You might convert most of the common words in application.
.  Choose the 100 to * 10,000+ most commonly used words like "and" converted to '&".
.  Published patent application should/can have a link to our website that could give the entire content with and/or without abbreviation - as a courtesy. We want people to get easy access to this patent applications contents. Translating text into other languages. Adapt whats translated
.  The earlier parts of the patent application use fewer abbreviations. This helps in learning and comprehension. Files with fewer abbreviations, hence good starting points to learn our system: the Main Features file, Access Features.
.  To condense and simplify the required reading of this entire patent application; this pat application, singular terms were often used, while omitting word suffix variations showing plurality, past or present tense, and other grammatical structures. Hence seeing a singular term such as "feature" implies the plural "features" can apply.
Links:
Alternative features can be inserted (by our software) where there are links. Each feature has links to many other features and their sub-features. These links are shown in various ways. They include:
.  Terms in brackets (like such) or [like this].
What follows drawings containing single equal signs [lines between parts in our drawings], or colons can achieve the same purpose.
-Empty (open space) in brackets, or after these mentioned equal signs and colons show where specifications can be inserted. Examples are found throughout this application. Remember empty spaces aren't needed to show the link's presence.
Miscellaneous Pointers on Adapting This Text:
.  Spell out at least the full word, with or without extra words describing the feature. It can be a few extra words to more than a paragraph.
.  The full description for an invention with its many adaptations might exceed 1,000,000 pages. This HIGHLY IMPORTANT point naturally is because:
-The links made from a feature (step 1) go to many other pages (step 2). The links in step 2 go to many of their pages (step 3). Step 3 links to Step 4, 4 to 5, and so forth. Many of the links make a full circle back to the feature in step 1, via divergent paths. The pat applications introduction has details.
.  Use text editing software like Word for Windows or Apple; online programs; do it in your (readers) head; handwrite changes; etc. Save each variation incase one version is better adapted.
Changes That Have Been Made In Portions Of This Pat Application: Correct and or alter the grammar. Correct miss-spellings. Capitalize Headings: New inventions, and new topics.
Search Strategies:
.  Search strategies are not normally included in patent applications. They can be used to seek inventions in this application and/or databases of other patents. While one alternative of this patent application is not disclosing them, we wish to: 1. Show additional examples for how related patents can be found, despite the limited nature of the suggested strategies. This further shows related embodiments to better understand the inventions. 2. Be user friendly, without requiring the user to be creative in conceiving good key words.
See the Abbreviations Section For More Examples. Arrows show what a term can be made into or from. You can reverse the arrows, e.g. "with" -> "w/" in enough to show that "w/" can be expanded into the word "with" w/o (without) having another arrow going the other way. Arrows adapted this section in making it easier for more (not all) people to understand (and contemplate).
Specific Terms That Can or Have Been Edited In This Application:
.and -&. & -> and
ao -> /. ao -> &or. &or -> and or
OTD -> Other Techie Details, or Other Technical Details, or For Techies (omit any carriage return after it) Footnotes -> . For Techies
Lengthen:
w -> w/. w/ -> with
wo -> w/o. w/o -> without
optional -> optional/alternative
U -> User
.  D: -> Drawing. . D -> Figurative Drawing. . D -> Diagram
Commonly Used Terms: Abbreviations & Expansions used are listed on their same lines:
'D, Diagram, Drawing, Figurative Drawing. Often followed by colons.
'El, Electronic
'Fq, Frequency - the electrical type.
'IMI, Feature, Part, and maybe Function
'KN, N, Invention. Often followed by colons.
'KW, Key words. Often followed by colons.
.'Nr, Notifier, Alerts
'Misc, Miscellaneous
'Obvious, Exists
OTD, Other technical details, For Techies, Read later. Often followed by colons.
SW, Software
'Sys  = Electronic system. 
U, User (s), Person
'W, W/, With.
'WO, W/O, Without
Abbreviated:
.  approximate(ly) -> approx
.  average -> av
.  especially -> esp
.  experiment -> exp
* laboratory -> lab
.  maximum -> max
.  month -> mo
.  negative (ly) -> neg
.  positive (ly) -> pos
* separate (ly) -- sep
.  separated -> sepd
.  standard -> std
.  technical(ly) -> tech
.  volume -> vol
Features (Parts) Samples Abbreviated:
.  communicate(s) / communicated / communicating -> comm
.  computer(ized) -> c
.  coordinate -> coord
* invention or product -> N or KN
.  notifier / notify / notifie(s/d) -> nr
.  OTD -> For Techies (either label reduces confusing non technical people) . Remote Control -> R [not research]
.  Software -> SW
* Sound Analyzer -> SA
.  Telephone -> Tel
.  Visual Analyzer -> VA
Alter Invention Descriptions (Specifications):
* Small -> Adapted Size
.  Obvious -> Exists?
.  Fast -> Adapted slow speed
.  More -> Fewer. Quantity -> Adapted quantity
.  Optional -> Important (Aspect) 
.  Expensive -> Adapted to fit budget
.  Exclude -> Include
.  Seek -> Sought
.  Find -> Found
*  Other Methods:
.  Labeling the last line of each file, before they are consolidated into an application:
Ends File: ______ = Concludes This File: __ _. Note, all information and functions are found by accessing (with permission) all links tied to what the user wishes.
.  Zip text (to reduce memory requirements by putting it into a zip file). Zip via manners that change the memory required, with or without text changes.
.  Replace words to something a person may not understand to: keep out of hands of (children), people not educated in applicable methods, security, etc. Maybe keep the change codes elsewhere.
*  Free Open Space:
Reducing Empty Lines: Convert all multiple empty lines from 3 on up down to 2 empty lines, eg: convert four carriage returns to two carriage returns, then word downward to three carriage returns into two carriage returns. Convert two carriage returns into a carriage return followed by a small tab.
*  Precedes less important material beginning with either * or .- or .-. Have a uniform code.
-Reduce two (or more) empty spaces in or between sentences, to (a single space).
-In the (original) text, new subjects often start at the left margin, on a new line with a dot, dash, or double dash. --+ A tiny circle might represent where one point or sub-point ends and a new point or sub-point starts. Or a 1 precedes a dash, and a 2 precedes a double dash. The idea is that the lower the number the further down the chain of broadness.
.  Replace two empty spaces between words to one space.
Replace empty lines with less space, (but more than whats found between other lines).
Space before new sub-points. Alternatives:
--the shown example: paragraph's sub-point is a dot. Dot's sub-point a dash. A dash's sub-point double dashes. Details in intro.
--insert a tab (within same line as preceding sentence)
--code number for each new sub-point, eg: dot = 1, dash = 2, double dash = 3...
--sentences preceding sub-points may not have periods at their end.
Consider Not Searching & Replacing Designated Sections, e.g.:
.  Reducing open space in pages with columns, e.g.: tables of contents; lists of people receiving our awards. Figurative Drawings (diagrams) using linear dots.
Figure Drawings which usually are already very condensed using our special method we claim. 
The best way to experience this patent application is imagining how the entire system will operate. A real model is best as inventions and their features can be in one or more clicks (links) away, depending on where in the system you are at the time.
Concludes This Search & Replace Section
File / Feature Intro / Abb-Sym 4
ABBREVIATIONS, SYMBOLS & RARELY USED FEATURES: In Detail
ABBREVIATIONS SECTION
'B' = This old symbol was changed to 'N'.
'Basic Idea'= The full descriptions for each product number. Includes: central description and all its branches.
'Branching'= Tree Branching helps explain the likely levels of importance in comprehending the central description.
'Central Description' = The written description following each product number's main listing. It is the central part of the branching system.
.-This excludes the product number's OTD - Other Technical Details section; but includes: aspects with any symbol (except %), and the parts, used in the central description up to one branch.
'Code' = See 'Parts', or * 'Parts File'.
'Creative Shell'= Any additional product features provided by other parties beyond the scope of the basic idea.
'D' = Diagram / Telephone*. Eg: DI is diagram #1, D2 is diagram #2. DI and D2, if in the same general section, should normally be related for the same and or separate products.
'Dev' = Develop, **development, %developer
'Dir" = Directory: of Kays' inventions. The first two spaces of a product number have a letter which shows from which directory the product file is from, eg: lB-050-022004 -> B. Sample letter categories A, B, C, D, E...
'Eg' = the following examples are only one or more of the possible examples. Same as: '', 'etc' '
'El'  =  Electronic / *Electrical 
'Etc' = the previous concepts can be one or more of the examples for the said product idea(s). Is not a complete list. Same as: 'A', 'eg',
'Exists'= The particular function described exists and is designed to compliment the product's other functions. Omission of 'exists' from any description never implies it is a unique feature.
'Fq" = Frequency: transmission frequency via wireless or wire. Eg: digitized electrical signals / codes; infrared; radio frequencies [RF]; sound (for transmission purpose).
'IMI'= See 'Parts File'.
'IOW' = In Other Words. The information might be reworded, with or without new dimensions.
'KN' = Mr. Kays' invention. One or more inventions he conceived.
'KW' = Key words. Usually used for software key word searches, eg: to locate files related to designated key words. % These key words mentioned might also be used for electronic patent searches of worldwide databases to expand invention (applications).
'Letter Category' = See 'Dir': Directory.
'Letter Sub-Category' = The letter category has products from each of its files divided into separate sub-categories. Eg: letter category D has letter sub-categories: DE, DG, DI.
'Misc'= Miscellaneous
'N' = Existing product on market, and or KN.
-definition up to about 1995: product number; one of Steven Kays' aspects of invention; any product preceded by a product number'; product parts are products too; * 'Product Specification Codes Appendix - US Patent Numbers For Each Code'
'Obvious' = This has some chance of being obvious just in its simple form. Obvious can mean not patentable due to being too similar to other products. The fact that this term was used does not say in any way functions with this statement are more or less likely to be obvious.
'OTD'  = Other technical details. 
'OP' / Optional = Option(s). Important: this term is used to help clarify descriptions, and/or offer alternatives. An optional element does not in itself suggest that if used, it is instead of something else. Each feature/aspect as described is a variation even when such is not mentioned.
'Organism = Any live organism, which moves [unless otherwise stated]. Eg: Humans, mammals [pets, animals kept in captivity or found in wild, birds], birds, *reptiles. %Microorganisms apply if invention can be made to apply to them, considering their small size, eg: amoeba, *bacteria, viruses. Organisms are commonly described in the context of scientifically analyzing them via 'ba, or for 'tracking their behavior.
'PL' / 'Plastic'/ 'PVC' = Product constructed of PVC / other petroleum by product / (hardened) rubber / %vinyl / *metal / *wood.
'Parts File'= Product Specification Part, eg: "distancer", "clapper". Parts File is the full list of all parts in the 'Product Specification Parts' paper.
'Product Category' = The type of product from the manufacturer's point of view, eg: cameras, toys.
'Product Description' 'N' = The central description of each product number plus all its branches, eg: OTD, Appendixes, Diagrams.
'Product File' = The files within either a letter category, or letter sub-category, eg: 2D, 2DE, 2DG, and 2DI.
'Product Number' 'N' = Most product ideas with a central description are preceded by a # eg: 1B-050-022004. .-Each product number designates product idea(s) separate from the remainder of the papers. Product numbers are normally found in a product file with one or more product numbers.
'Product Specification Part, Product Specification Code' = Parts: The identical meanings are the parts used in the product descriptions. Each concept in capital letters within this 'Product Specifications Parts' file or its appendix, and used in product number's descriptions. The abbreviation 'IMI' was used to designate the Parts File, and IMI& the Parts Appendix.
'RM' = Read Me. Notes to better understand.
"SW" = ("Computer") Software
'Symbol' = Eg: %, -, --, .-, () " ", +, O, ,,
'Sys'  = (Related (El)) systems, * system 
'Ver'= Version. Eg: electronic or mechanical or plastic version.
'W' = With. For diagram (figure) purposes, %each "w" also represents a line between what precedes and what follows. W/In = within.
'WO' = Without
'Written Description'= Embodiments. It is the description of a product number or part in the word form, including all branches. Excludes diagrams.
"Zones" = (Designated) locations as described in part "PS-Zones". Eg: differing zones in which (PS) is located result in differing: effects, causes, processes, etc.
SYMBOLS SECTION
= The following description is the beginning of a new section describing the product.
= The following is the sub-section of the previous section describing the product.
= Designates information for the reader who has already grasped related ideas without such markings. This item may be less important to the central over-all product concept. Realize that the lack of this part does not signify that item is a central idea. This and related parts (.-, .--) have no bearing on patentability due to the part in and of itself. This part may immediately follow or precede such a possibly less important aspect. Also included are any of its following subsections represented by '--'. Example: if a part's element or section is preceded or followed by *, the applicable are less important. An element may have from one, to a maximum of two * (* is less crucial than *) directly next to it.
.-The star * following the title of each part applies only when: the part is used in any OTD section (unless otherwise specified, eg by '+' which cancels out *); this type of star does not apply when the part is used in a description other than OTD.
"." = begins new main section within a file. Something like a new sub-chapter. Followed by "-" which are subsets of "." Eg:
.  Edit: the program adjusts--.-Don't confuse "." with ".-", or . or a simple period at end of sentence.
.-Such new main sections may also just begin after having skipped an empty line. Sometimes main sections are strung together via a single dash on left margin between sections.
.- ' or '-.' = The same meaning as '*' and '-'. The '.-' is however only used to begin a new section describing the product.
..-'is lower in the branching, hence equal to **. Started using '-.' instead of'.-' in Aug 96. This is virtually not used, and usage of this form might be an error signifying a period as well.
= Descriptions following a colon are some of the examples for the invention's description. This symbol is much more important than may appear. Colons often can also be interpreted as separate two sides of diagram. The colon ":" symbol represents a line from the disclosure preceding it to the disclosure following it. The disclosure following the colon can also be a subset of what precedes the colon. The colon represents what follows as being 'includes at least the following', 'a plurality of...'.
-Additionally, something of an independent patent claim might be interpreted as what precedes the colon; and sub claims being what follows the colon.
= the previous concepts can be one or more of the examples for the said product idea(s). This symbol is normally three, yet up to five dots.
'='->''>'* = When used in the product descriptions it designates the lines between parts of a diagram. The presence of one of these symbols shows the data is an actual diagram; hence no need to write 'diagram'. '->' &'>' are same, and opposite of <-, <. They designate direction of signals, '=' allows one or two way signal transmission (<- and or ->). * '=' if used in Product Specification Parts immediately after the part title in cap's, describes the part referenced.
.-signals traveling on these lines may go viaA: wire, wireless, telephony.
-also see 'Intro to Parts' file for details
-when '=' lacks a space only on its left side, the symbol can also be read (for ease of reading only), as a comma. Eg: Activate the switch= then light turns on.
-the -> and <- symbols are arrow lines. %* If no conflict, or trouble with the patent application, such symbols can also be replaced with "=".
'0' or 'o' = The following description is a separate product which might also be combined with one or more parts of the remaining description within same product number. These symbols are not in capitals or quotes when used.
':' or 'A' or '@'* = Listed are one or more of the possible types of functions, applications, parts, and or overall product designs. Not a complete list. '@'is rarely used, and if so, before Mid-1994. 'A' is same as: 'eg', 'etc', '@'. Those items following 'A' are treated as 'and or' if they are separated by ';'. This applies to what follows":". The 'A' symbol was used until 1995.
'+' = Important aspect. One or more of the ideas within the section immediately following the '+' symbol may be a central concept for the overall idea. However, lack of this symbol does not signify that the idea is of no central importance. Most places that might be labeled with '+' were not so labeled, hence lack of the '+' has no bearing (except possibly within the context off the surrounding 100 words on the same/consecutively numbered pages). - if a part in OTD is de-emphasized by a star in this 'Product Specifications Parts' paper, the placing of '+' immediately next to the part cancels out such star.
= Represents parts. Used this in the 1990's Parts are either in parentheses, or each of the part's letters are sometimes in capitalized letters. If parts are found in the body of the worded description, the part(s) refer to the fully capitalized titles of a part in the 'Product Specification Parts' paper. For ease of typing, the parts listed in the Diagrams and or OTD (Other Technical Details) need not be in quote marks or be fully capitalized. The form of the part might change slightly, eg: for grammatical purposes, the part can be in the possessive case. The part's abbreviations were used until June 1996.
= The single' symbol, and the "symbols have identical meanings.
' = This function significantly expands the product idea beyond the basic concept. A subset of the idea may be related to the central product description. Most or all aspects lie outside but near the central product description. Example: if the same part is referred to in different branches of the description, those with a % or * are effected accordingly in that particular branch, but % or * do not effect the same part accordingly in branches without the symbols. Only one % is placed next to an element, hence there is no double %.
( )'or '[ ]' = Shows one or more of the multiple possible examples. One can keep or retain what is in the parentheses.
(Used in embodiments / written specifications / diagrams / how mentioned function might be put into practice.) +- () include limited list of possibilities. Other elements (may) be placed (additionally) within the ().
-Combinations: information in these brackets need not necessarily be read, eg: omitted from description, though they may still be needed in some capacity to enable the invention. Descriptions with () can be read in many different waysA: w/ or w/o information in (); if there are multiple () in description -> can use / ignore one or more bracketed information in each the possible combinations.
--Use and or ignore one or more sets of information separated by '()', to read each designated combination. Eg: #1: a (b) = c (d) ] can be read at least nine ways, such as #2: a = c (d), and or #3: a = d. Each combination is for different invention variations (for alternative uses). The greater the multiple '()' occurrences spread throughout the main embodiment, the number of combinations grows exponentially. The '()' used in the 'branching' embodiments further increases the overall exponential number of combinations.
-These brackets designed normally to expand the N's description(s).
-Information within () are usually a subset of the part, eg: "sensor" = c ("analyzer") = osc: the line is drawn from analyzer to computer ("C"), and lines are drawn from "c" to both "sensor" and "osc". --Data inside '()' need not be a subset, when it's a different / related idea. Eg, stapler (staples): #1, staples could also be nailed in manually without a stapler; #2, staples might be welded for non-connective applications too. % If the issue of '()' being a subset or not [without the option of both], then '()' can be considered a subset (for patent purposes).
.--D: legs = toy robot (sensor/c ("analyzer" (software))). For (printed) schematic purposes, software is inside analyzer, analyzer inside c, c inside toy robot, sensor inside toy robot - (for purposes of this diagram). Toy robot could have different insides since () are limited possibilities, eg: toy is purely mechanical.
.-Sometimes the left bracket is keyed in with the accidental omission of the following right bracket, eg: (analyzer) equates with (analyzer.
-  When () used after a patent number: these are inventive ideas (new applications) based on KN's and patent's configurations.
'/' or '\' = Means 'And Or'. For example A/B means, A and or B applies to the scenario.
Another example: in a diagram the '/' symbol is used as follows: [part 1/part 2 = part 3 = part 4]. In the preceding example, part three's diagram goes to part's 1 and or 2, that is there is the possibility for variations. Part 3 has a line to part 4.
*  Details Follow: Example: [part 1/part 2 = part 3 = part 4/part 5] is the same as a: >3< shape diagram, 1245 go around the 3 (in clock wise pattern); and or b: can be split D1: 1=3=4, D2: 2=3=5. (No line is shown between 1 & 2. Important: a line is not excluded, and %might be drawn between the two parts if viable.). In isolated places a '\' may have replaced '/'.
-Combinations: there are frequently multiple '/' in N descriptions -> use and or ignore one or more sets of information separated by '/', to read each designated combination. Eg: #1: [ a/b = c/d ] can be read at least nine ways, such as #2: a = c/d, and or #3: b = c. Each combination is for different invention variations (for alternative uses). The greater the multiple ' occurrences spread throughout the main embodiment, the number of combinations grows exponentially. The '/' used in the 'branching' embodiments further increases the overall exponential number of combinations.
= Same as '/' or'\' except a line is also drawn between the parts when this wavy line symbol is used. Eg #1: 1-2=3=4/5, lines are between 1&2, 1&3, 2&3, 3&4, 3&5, %maybe 4&5; 1/2 go thru 3 to connect with 4/5. The lines between 1 and 2 are optional, since the '-' symbol could also be a diagonal slash, in another version of the diagram.
-see 'Intro to Product Descriptions' for details
-[if this file's symbols doesn't transfer between computer software systems: its the upper case of the "' single sub quote key as found on the Toshiba T1910 notebook computer, while utilizing WordPerfect software 6.OB for DOS. From 1991 to now (Jan 3, 1995) all data entry was on Word Perfect 5.0 for DOS or higher. Since 4.94 the Toshiba T1910 computer was used.
=the semi-colon is a break in thought flow (weaker than a period, yet stronger than commas). When there is a diagonal slash in the sentence followed by';', the semi-colon should normally break the lines in the diagram. See the '/' section.
':' = information following the colon represents one or more of the possible manifestations [%applications for said function(s)]. The '()' symbol is similar to the data following the colon. Data following ':' are more likely to have the possibility of stepping beyond the bounds of the idea / terms directly preceding the colon, than data directly preceding the '()'. The connected symbols '^:' are same as ':'. Sometimes there's information followed by colon, which is then followed by another ':' within same sentence, in which case this can mean that data following first colon is a semi-subset of data preceding it, and data following third colon is a semi-subset of data following first colon, or data *preceding first colon.
Old Diagram Symbols: used in material done up to mid-1993. Vertical lines may also be represented by "I", a dot .", or * "L", etc. The latter shows additional parts that are on the line below and directly to the right of the "L". Sometimes a line of blocks scrolls over to the next line or page.
OLD ABBREVIATIONS SECTION
Introduction: This section covers old abbreviations and symbols, which are mostly discontinued in newer inventions. Older inventions can be those found in sections A, B and C, or which have those letters in their product numbers, e.g. "2A400".
Ad or Adv: advertising
ASAP: As Soon As Possible
Cat: product category, eg: tv; tel
CIS: Former Soviet Union or also called SNG
Dir: directory, eg: 'A Dir' are of first N developed
DM: Direct Mail
F: fax
G: cv, job hunting; grant (from foundation/gov't)
HW: help wanted (advertising); new people needed
II: I n n o v a t i o n Institute
L: legal
Pls: please
N: Prod, Product # (usually one conceived by K a y s). Since about 1996 "NK" means product conceived by K a y s, and "N" means products and inventions in general.
Mk: marketing
Moss: *Moscow
Mu: Musical, music
J: Japan
R: research
Req / RQ: requirements; require 
RF: Radio Frequency. * When feasible it includes Infrared transmission and reception. D:
device#1 =tr/rc=tr/rc=device#2
SPB: St. Petersburg, Russia
T: Telephone, see ' Parts'. Old definition:
letter / *mail
TYO: Tokyo
U: you*, newer definition is: user
Ur: your
X: document: for publication, viewed by public
2: Product Idea Development
4: Public relations, articles
8: Check to see who is copying my ideas
\:  Diagram Parts - And or designating if a line is drawn between parts. See' Parts'
/:  if no line is 'necessarily' drawn between parts in diagram. See' Parts'
** OLDER VERSION OF PARTS (FROM 1990-1992)
The newer version as in main ' Parts' superimposes the descriptions herein if there happen to be two different definitions for the same Parts.
A = and
AT = game piece communication, each player's piece communicates with each other and the central processing machine via air waves (probably not wire)
AT = and or
AU = for adult level 16 years old & over
B = has buttons (not mentioned if PP); "K"; *"R"
BA/KI/CH=for baby use 0-4 years old / kid 4-8 yrs / child 9-15 yrs
C = use products as helpful exercise companion & or guide, rule setter; "exercise". New version is "Computer", if doubtful about interpretation use "computer".
CS/BU/CL=for consumer / commercial use / client application
D = this is the old definition for "T" (telephony) ( built in (cellular or standard tel))
DA = has internal date, clock, timer needed for sw functioning; "tds"
DD = "S"; built in digital display (eg: LCD), may flip in for compactness
DS = "S"; machine displays on crt, digital display, or print out (regular or thermal paper)
EP = electronic parts: product operates by use of microchips, processors & the other standard elements for this type electronic product; "C"; "basic"
EL = teaches practical (not necessarily psychological) skill. Definition used from late 1993 is el = electronic. "educ"
ET  =   new  type of entertainment ('entertain') 
EXT = Functions on flat or semi flat surface, table top, this option doesn't operate on batteries, or vibration power. FIN = finishes product option descriptions
GI = game for one person only
G2 = game for two people only
G23 = game for two or more people. G12= for 1 or 2 people, G3 = three people only.
GGH = game gets harder. as user's ability at condition improves or worsens, machine will compensate by: being easier, harder to play (in terms of skill, quickness...)
HM/OF/SC=for home / office / school or laboratory use
IQ = special version for people with IQ within top 2% of population
JK = for use as humorous fun, an unusual novelty, 'entertain'*
M = Old definition: machine (product described within product # only). New definition that was applied to new writings as of 3.94: "MFH" [Main Frame Hook-Up]. The old definition is still found in writings made up to 1992. MA/FE = for use by males / females
ME = memorizes previous input signals in its "C"
MI= The elements of this product are interchangeable with one(s) mentioned and or is based on the basics of the other.
NRL = not real life game, played by interfacing with electronic game and or board.
0  = or
OD = telecommunication device working via air waves; "T:
PG = programmable by user (by keying into its plastic buttons) and or manufacturer; "pp"; "mp"
PO = built in printer prints out info/data/pictures onto paper, has paper tear edge, thermal or [regular] paper; "printer"; "S"; *"fs".
RH = rhythm
RL = real life game, played in or outdoors, requires people moving in an environment
SD = speaker telephone; new Parts "sp tel"; "T"*
SC = sound communicator: receives ("mic") and or sends ("osc") mechanical sounds, & or human words & or voices
SH = show
VC = person controls sound volume; "osc"
TD = technical descriptions
TO = toy use, *'entertain'
TK = for use as a fun trick, prank; 'entertain'*
TM = trade marks for product
TSC = "mic" (internal or external) records sounds facilitated by user (onto microchip or possibly tape), and can be played back in entirety or probably in edited or other altered format using built-in synthesizers; "osc"
UR = your
WH= which
=     only  when used in TM: separates word order, 1st, 2nd... 
18L = operation, instructions & marketing in 18 languages: English, Japanese, Spanish, German, French, Chinese (Mandarin, Cantonese dialects), Russian, Arabic, Portuguese, Italian, Greek. Plus the language families of: Baltic, Slavic, Germanic, Iranian, Sudanese, Malayo-Polynesian and Turkish.
OLDER VERSION OF PARTS (Up to 1995 or so)
CH ** = Also for children below the age 16. Newer part.
CM ** = Casing is of sleek quality metal with enamel coating.
CC ** = Creative casing design.
-D: .......... Dots (...) are the plastic casing
.11111111.
Colon bars (I} are the product
.......... Boxed shape is too simplified, but to show
casing is an outside covering.
-OTD: Used up to maybe 1995. Snap on, or screw on pieces can be sculptured around the basic unit as decoration only. Pieces are of colorful plastic and or enameled metal. Pieces can only be snapped on in manners that don't obstruct normal usage of device, or cause danger. Casing might be molded and welded so as not to be changeable. See "Brain".
COLOR ** =
-New definition - after Aug 1996: Any 1,000 or more standard colors / inks. + See "Artist" and "Edit".
-Old definition - before 1995: Color of item you touch changes, eg: caused by how changes in temperature effects liquid crystals. One or more of the following may change color: all or part of casing (a strip of liquid crystals), buttons, "display".
CP ** = Sleek quality plastic casing, safeguards against common hazards like: impacts, heat, discoloration, etc. -D: ......... Dots (...) are the plastic casing
.IIII11 C. olon bars (lI are the product
......... Boxed shape is too simplified, but to show
that plastic casing is an outside covering.
CR ** = Casing of sleek strong and durable rubber, safeguards
against common hazards. Similar to "cp".
CRC = Central computer ("C") of "Adaptive System" product number iD-010.
** PERIODICAL ABBREVIATIONS
Intro: References are made to commonly used periodicals worldwide. The inventions developed herein are usually improvement inventions of those published. For diagram purposes: the improved inventions are juxtaposed vies a vis the published products.
DY ='Daily Yomiuri', Tokyo. * Also any includes any differing coverage within publisher's 'Yomiuri Shimbun'. Article found in their 'New Products' section, in published weekly in the daily newspaper.
ES = 'Edmund Scientific' Sales Catalog. 101 E. Gloucester Pike, Barrington, NJ 08007 USA. Tel +1 609547-8880, Customer Service 609 573-6260, Fax 609573-6295. Products mentioned in the Edmund Scientific 1995 Catalog are one example which may be incorporated in all or some of the inventions. ** There are occasionally multiple examples of such products in this catalog. Cover of this catalog has '15C1A' printed.
PS = 'Popular Science', USA. Don't confuse this with "PS" for positioning system (if in real doubt then presume "PS" stands for "Positioning System".
QMRR = "Quirk's Marketing Research Review".
-See "Quirk's Marketing Research Review: Practical Applications in Marketing Research". Especially Feb 1996 Issue. 8030 Cedar Ave., #229, Bloomington, MN 55425. Tel 612-854-5101. ISBN: 08937451. Has listings of related softwares, and companies with specialists capable of doing the programming, especially pages 78 to 85. -When QMRR is used in the Software Parts File. Especially see the software product classifications with same / related headings (listing about 10-20 existing softwares).
-Definitions of functions used in marketing research softwares: survey (methods, questions, responses, "analysis"), environment, marketing research, customer profiles, (changes in) sales figures (eg: more and less of certain models being sold, tied to other changes in world/market/user) see "Quirk's" listed companies, and marketing research books.
NK = 'Nikkei Weekly', Tokyo.
-This product idea includes and is an extension of the product described in Japan's 'Nikkei Weekly's (part of Nihon Keizai Shimbun) 'New Products & Services' section which comprises one full page in most of their issues. -On occasion, an article will include and be an extension for 'Nikkei Weekly's 'Science & Technology' section for said date.
EPO, USPTO and WIPO: Government patent databases linked from www.WIPO.int
DTSW = "Directory of Technical Software Suppliers", published by: CAE Consultants Inc. US Tel +1914-963 3695, Fax 914-376-5011. 41 Travers Ave., Yonkers, NY 10705 USA. This data also available at: HTTP:bwww.caeconsultants.com Directory used was "up to date as of 1/1994". CAE also offers free info on tel to locate suppliers.
Also see the less commonly used features file (was named Features *).
CONCLUDES THIS ABB-SYM FILE: Detailed Abbreviations & Symbol
File: Intro To Pat / Diagram Intro
FIGURATIVE DRAWINGS
INTRO TO OUR DRAWINGS WRITTEN IN TEXT CODE
Introduction To Finding Figurative Drawings (Drawings) In This Application: Drawings ARE included in this filing. Most of the existing drawings, however, may not initially appear to be drawings to someone quickly flipping through the patent filing. Drawings are usually strings of parts on a single line; connected by dashes. This largely covers informal drawings.
Example
Simplified example of computer diagram: USER -> KEYBOARD -> CPU -> CUSTOMIZED OUTPUT
Below: version of the above diagram you are more likely to see.
Details
-Drawings can be found for each product description in Diagram Set 1, and/or in Diagram Set 2. Drawings are also with printed text. Most product descriptions starting with the "C Directory" have drawings.
-Features (Parts) are usually in "parentheses", and Features (Parts) from 1997 are preceded by an 'apostrophe. See the Features (Parts) paper for details.
= connects Features (Parts) of diagram. The presence of the "=" signifies that such is a diagram *(clarification of its being a diagram may be made but is not necessary). To ease reading the first time, "=" might be considered commas, especially when there is no space to the left of the symbol as with regular commas. E.g.: Activate the switch= then light turns on.
"/" diagonal slash means 'and /or'. The easiest way to read the description the first time, is often to only read the first 'and/or' option, which allows the reader to more easily see the thought flow.
*  E.g.: Diagram: [part 1/part 2 = part 3 = part 4/part 5] is the same as a: >3< shape diagram; and b: can be split D1: 1=3=4, D2: 2=3=5, with DI & D2 being connected at part 3. No line is necessarily used in 1 & 2, though a line is not excluded.
"( )" Material in these brackets is optional. The easiest way to read the text the first time is to almost ignore the brackets.
Sample diagram. Following is one of the drawings for this patent application:
-Diagram: Person = Keyboard = Computer = Printer
*  Drawing #1 & Drawing #2 mean two related drawings *(if they are in the same section), e.g.: DI, D2, D3...
*  Part numbers used in the diagram may also be used inside the related For Techies or Other Technical Details (OTD) section - Other Technical Details. These diagram part numbers used in For Techies: show that their Features (Parts), are connected to that section of the diagram.
*  The "-" symbol is the same as the diagonal slash, except there is also the option for a line drawn between the two neighboring Features (Parts) separated by this wavy line symbol "-".
*  The colon ":" symbol represents a line from the disclosure preceding it to the subset disclosure following it.
*  Each section within the For Techies section is created by semi-colon, separating it from any other material; hence each section is also read as a diagram and/or has its diagram merged with the other sections within the same For Techies .
*  Often the terms "then" and usually "In turn" are equal to "->" or "=". In other words these worded terms are equated with symbols for the diagram type structure.
-As is viable, every part/block in each diagram for every electronic product idea in this filing surrounds the central computer-like device. Each electronic part, has an optional connection with a central computer ("C"). D: each and every electronic part of product idea = "tr"/"rc" = "c" = some other part involved with this product idea
-"C" (Computer) is an optional inclusion for every central description in this filing requiring electronic hardware. As an OPTION, one or more of the multiple 'Features (Parts)' referred to in each such product's or part's description can be connected to this "C". Each 'part' is a separate diagram (as if on a transparency, and they can be appropriately overlaid, intersecting at "C", to see the potentially complex system (there may be some repetition, hence the overlaying might be so that repetitions are overlaid over each other, so such parts/aspects are read once)). "C" is defined in 'Features (Parts) Files'.
-The reader knows printed matter is a diagram when any one or more of the diagram symbols are used. Drawings are often preceded by the capital 'D'.
Diagram Examples: 3 Increasingly Detailed Versions Of Same Computer Invention
Version A: Simplified example of computer diagram:
User -> Keyboard -> CPU -> Desired Output
Version B: Semi detailed rendition of above computer diagram:
User -> Keyboard (user inputs information, data entered into computer in easy step process) -> Computer (software analyzes entered data) = Software edits the simplified inputted information into more abstract forms = Software edits originally inputted diagram into different variations for each customized need = Computer digitally outputs different versions of the originally inputted diagram.
Version C: Complex rendition of above computer diagram:
User (Electronics Design Engineer or Patent Examiner) -> Keyboard (user inputs abbreviated format for what constitutes a diagram of two or more parts and or inputs the desired applications for inventions; data can also be entered into computer without tedious computer mouse) -> CPU (software analyzes entered data) = Software analyzes database of each entered part with its multiple uses also shown in a pattern of branching trees (this database can be the invention tree) = Software converts originally inputted diagram into hundreds of types of drawings depending on the desired application) = Computer digitally outputs 8 million different versions for how invention(s) can be diagramed (constructed):
1)  Newly created digitized files
2)  (Color) printer
3)  Computer screen 
4)  Software demonstrates in near virtual reality how the inventions would function.
5)  Invention is constructed: 1) by clay carving device (cutter controlled by digitized files and other software programs to match the designated diagram); 2) automated software programming system (such as via using the "User Information Programming" software part)
END OF CODE FOR DIAGRAM EXPLANATION SECTION
File: Features Intro / Features *
LESS COMMONLY USED FEATURES: Read Later
Features primarily for inventions linked to files A, B and to some extent C*.
They apply to the united pat application directly/indirectly.
'DATE' = Our digital clock and calendar. It's the timer for our 'Digital Time Stamp.
AIR PAD * = See Remote Control. Rarely used, hence delineated with an asterisk.
ALERTER = See "Notifier"
ALL = See "Basic"
APPLICATION / APPL / AP = Application. One of the alternate ways the inventions can be used. Also called "Apl" - with single letter "p". *Patent Application.
AU ** = Also for adult level 16 years old & over.
BASIC ** = See appendix.
BILL / BILLING = Billing: Charges users by amount and type of usage. Limits billable usage by criteria.
BRAIN = Feature name changed to 'Computer.
DISPLAY = Display Screen. This feature (also viewed as part) was re-titled to "S".
FD-HDD = This feature (also viewed as part) name changed to "Computer".
FLOAT ** = The separate portable device floats in the air via special magnets.
.  The more portable part(s) of system have opposite magnets on each end. A letter 'C' shaped base also has magnets, which attract each of the ends of the piece in space. .2cm to 2cm of air is between the attracting magnets. Portable item is lightweight. Magnets and design are designed to withstand gravity and wind, and wearing down of magnet's forces for minimum five years.
-Drawing: 1+ = 2- = 3 = 4+ = 5-.
-Drawing's Notes: 14 positive magnets; 25 negative magnets; 3 non magnetically conductive (between 1/2/4/5) which is the/part of product; 1 & 5 are each at their individual ends of the 'C' frame; one of the purposes of float is to create an interesting design (entertain); item which floats can be taken out from the "C" frame (used about premise/laid on table); cc.
-"Tilt": controls position / functions% of floating object
-Form of flotation = notifier / other form of communication to user.
-'Track = type flotation.
FX** = Fax capabilities. Also can send and receive via: Internet, modem (see 'mo), other (wireless) electronic mediums for data or text.
-Built in facsimile machine, sending/receiving in different speeds.
-Drawing: data/image = "sensor" = "C" = tr = printer
-For Techies: air pad (sends and receives faxes); cart (how messages are sent and or received); "S"; "C"; uk. -o-C95 Fax machine screens out unwanted messages. See fax on display ("S"), print desired faxes. NTT 29 Mar 93 NK. Drawing: c95=tel-c-remote
.-4E020 Content Date Stamper: Registers and organizes previous occurrences.
LENS = See "Camera / Lens"
MO * = Modem. Modem: connects via tel ("T") with: @ other computers (mainframes), devices.
Drawing: remote/uk/display = c (computer's data) = data converter = tr/rc = data converter = "C" = display/printer/function
-For Techies: access required to begin mo communication; air pad commands mo; character; (data about transaction on) "S"; % entertain; "C"; % communicates with "M"; mouse; mp; notifier (shows mo transaction was or wasn't completed successfully; the information or results achieved from the mo transaction); pp; output transferable to printer; tds (of mo transaction).
.-4E020 Content Date Stamper: Registers and organizes previous occurrences.
MD / MOOD * = The mood of users are induced by system to elicit the 'designated emotional feelings.
.  Read Later: 'Multi-media of system is designed to trigger 'designated reactions in humans or animals. -Diagram: adapt-Database collects information about users = 'analyzer determines which 'multimedia mode best elicits 'designated emotion wanted in u (user) = achieving the desired results: users enjoys or finds system challenging, or more u (user) friendly [having adjusted to user's behavioral pattern]'guide or 'educate is more effective.
-This function has become part of "ENTERTAIN", though "Mood" is a function, which can be separated from, ENTERTAIN.
MOTION SOUNDER TM ** = Makes sound upon movement of device.
.  Makes sound or music when 'sensor of device is agitated in any / 'designated manner [ba of movement].
.  User programs type sound. See product number 5A-1050-042002. "Edit".
Drawing: motion "sensor" = "C" = osc/function/tr
.  US Patents [12.95 bib disk]:
-str: (sound* or music*) adjl5 (motion* or move* or moving)
-US Patents: 5475372 Earthquake detector motion sensitive devices; ++ 5373096 Yamaha's Miburi: musical sound control device responsive to the motion of body portions of a performer [Yamaha later copied KN?].
MOUSE * = Changed to 'Remote Control.
MP = Changed to 'PR [Program].
PI = Changed to UIP.
PP = Changed to 'PR [Program].
PP = Personally Program [Old feature changed to 'PR 9.97]:
Functions are personally programmable by user. User decides which programs to activate, deactivate, alter and or add.
Drawing: uk (programs) / remote ("R") = c (software / cart) = software function (assists user)
-See "Brain".
-"Billing": bills for what / how user programs the sw.
-Access: "Access Controller" or legitimate accessor can alter needed "passwords" for themselves or other users.
PRINTER * = Prints desired information from system.
-External printer 'adapter, card and software for standard printers.
Drawing: c = tr = signal converter = printing mechanism = prints onto material (such as paper)
-For Techies: display ("S") shows software's menus for how user wants document typed; connects to computerized system utilizing "C"; pp; mp; uk; standard dot matrix or laser or color printers with their ink cartridges - basic; *portable printer; cp. C can tr to printer via wire / wireless. What's on "s" or "printer" can be seen on the other in full / similar / like manner, in entirety or part= as "designated" by: uip-tailor, pr, and k.
-Printer=SW=notifier=C: if (w5) printer lacks enough ink of particular color in cartridge before user: tries to print / expands image
RC  * = Receiver. Receives signals from 'tr (transmission). 
RCP ** = Sleek rectangular prism casing (semi-box shaped). Tabletop variants have 4 rubber pieces on bottom corners, gripping counter.
SPEECH * = Included into "OSC". This function can be separated from the other osc (outgoing sound communicator) modes. If "speech" is in system then there is an option for "osc", eg: "speech" -> "C" -> "osc". % See "Brain".
SP TEL = Speaker tel ("T"). Device's microphone ("mic") adjusts volume of incoming sound according to sound source's distance from microphone ("mic"). tr="T"-c=osc
-"Billing": bills for what / how system' picks up.
STEREO = Sound System. Music/Sound source (pre-recorded music, broadcast) = Player (CD, Digital Tape, Cassette Tape, Phonograph, Radio Receiver) = Amplifier = Speakers/Head Phones
Drawing: mic/tr = signal converter = c-recorder = play back = signal converter amplifier = osc (outgoing sound communicator) (speakers)
TOY * = May also function as a toy. For Techies: The process of having an interesting time is new and interesting from the experiential point of view; %interactive; multi-user; notifier; mp; uk, "Brain". "Billing": bills for time used / "accessed".
VC * = Volume control: user pre-selects speaker sound volume.
-Drawing: knob/button = tr = c (controller) = amplifier = osc
VOICE ANALYZER = See "Sound Analyzer".
VIBRATION = Vibration generated by device for specific reasons, eg: "entertainment"; "notifier"; form of communication for: "status", "score", a simple presence or lack of whatever user may need (to know) such as a yes or no - or on or off - or good or bad. See "Access" = "Vibration".
Check The Simple Handy Version Of The Main Features, plus our Abbreviations & Symbols. Kindly visit www.LicenseItToday.com for updates, etc.
File: Features Intro / Feature Synonym
SYNONYMOUS TERMS FOR OUR MAIN FEATURES
(This may be an easier way for non-technical people to
understand features used in our interesting inventions) 
Introduction: Main feature sections are listed alphabetically. Synonymous terms herein sometimes include a tiny fraction of the applicable US Patent Classification numbers.
.  Alternatives & Keywords for ACCESS feature: admission, admittance, approach, avenue, connection, contact, course, door, entrance, entree, entry, introduction, key, open door (slang), passage, path, road, route, way
.  US Patent Classification code for Access: 726.4 Information Security / Authorization
.  Alternatives & Keywords for ADAPTING feature: acclimate, accommodate, accustom, alter, change, come around, comply, conform, familiarize, fashion, fit, habituate, harmonize, make, match, modify, prepare, qualify, readjust, reconcile, remodel, revise, shape, shape up (slang), square, suit, tailor
.  US Patent Classification code for Adapting: 715.789 Data processing: presentation processing of document, operator interface processing / based on usage or user profile
.  Alternatives & Keywords for ALERTER feature: observant, on guard (slang), security, warn, notify, watch, help protect.
.  US Patent Classification for ALERTER: 340.825 Communications: Electrical, subclasses 825 through 825.98 for controlling one or more devices to obtain a plurality of results by transmission of a designated one of plural distinctive control signals over a smaller number of communication lines or channels,
.  Alternatives & Keywords for ANALYZER feature: assay, chew over (slang), confab (slang), consider, estimate, evaluate, figure, figure out, hash (slang), inspect, interpret, investigate, judge, kick around (slang), rehash, resolve, scrutinize, sort out, spell out, study, test, think through
.  US Patent Classification for ANALYZER: 706.14 data processing: artificial intelligence / adaptive system
Alternatives & Keywords for APPLICATION feature: appliance, appositeness, employment, exercise, exercising, function, germaneness, operation, pertinence, play, practice, purpose, relevance, usance, utilization, value
.  Alternatives & Keywords for ART feature: abstraction, designing, illustrating, imitating, modeling, molding, painting, pictorialization, portraying, representation, sculpting, shaping, simulating, sketching, symbolization, composer. US Patent Classification for ART: 382.159 Image Analysis /Trainable classifiers or pattern* recognizers
.  Alternatives & Keywords for ASSOCIATION feature: affiliation, alliance, band, brotherhood, bunch, circle, clan, clique, club, coalition, combination, combo, company, confederacy, confederation, congress, cooperative, corporation, crew, crowd, family, federation, fellowship, fraternity, gang, guild, hookup (slang), league, order, organization, outfit, partnership, pool, rat pack (slang), ring, society, syndicate, tie-in, tie-up, tribe, troops, troupe, union, counterpart, companion likeness, equivalent, equal, copy, reproduction, clone, duplicate, fellow, accessory, accomplice, affiliate, aid, ally, assistant, co-operator, companion, compatriot, comrade, confederate, consort, crony, fellow, friend, helper, partner, peer, sidekick
.  US Patent Classification Code for Association: 706.46 Data processing: Artificial Intelligence / Knowledge representation and reasoning technique
.  Alternatives & Keywords for BEHAVIOR ANALYZER feature: watch, psychology, sociology, anthropology, delivery, demeanor, deportment, ethics, etiquette, expression, form, habits, management, mien, mode, morals, nature, observance, performance, practice, presence, propriety, role, routine behavior, desires, needs, cravings, seek, want. US Patent Classification Code for BEHAVIOR ANALYZER: 706.14 Data Processing, Artificial Intelligence/Adaptive System
.  Alternatives & Keywords for CARTRIDGE feature: diskette, floppy disk, hard disk, hard drive, magnetic drum, magnetic tape, magnetic tape unit, magneto-optic disk, optical disk, primary storage
.  US Patent Classification Code for CARTRIDGE: 706.11 Data Processing Intelligence / Having Particular User Interface
.  Alternatives & Keywords for COMPOSE feature: author, bang out (slang), cast, comp, conceive, contrive, cook up (slang), design, devise, discover, draw up, dream up, fabricate, forge, form, formulate, frame (slang), ghost (slang), ghostwrite, imagine, indite, invent, knock off (slang), knock out (slang), make up, note down, orchestrate, originate, pen, poetize, produce, put down, score, scribble, script, shed ink, time, turn out, whip up (slang), write
.  US Patent Classification Code for COMPOSE: 706.22 Data Processing, Artificial Intelligence / Signal processing (e.g., filter)
Alternatives & Keywords for COMPUTER feature: adding machine, analog, brain (slang), calculator, clone, compatible, data processor, digital, electronic brain (slang), laptop (slang), mainframe, micro (slang), microcomputer, mini (slang), minicomputer, number cruncher (slang), personal computer, thinking machine (slang)
.  Alternatives & Keywords for CONTENT ANALYZER feature: composition, constitution, matter, subject matter, substance
.  US Patent Classification Code for CONTENT ANALYZER: 706.54 Data Processing, Artificial Intelligence / Analogical reasoning system:
Alternatives & Keywords for COORDINATOR feature: accommodate, adjust, agree, attune, combine, conduce, conform, correlate, harmonize, integrate, match, mesh, organize, pool, proportion, pull together, reconcile, reconciliate, regulate, shape up, synchronize, systematize, team up
Alternatives & Keywords for DESIGNATED feature: allocate, allot, appoint, apportion, appropriate, assign, authorize, button down (slang), characterize, charge, choose, commission, connote, constitute, define, delegate, denote, depute, deputize, describe, dictate, earmark (slang), elect, evidence, favor, finger (slang), indicate, individualize, make, mark, mete, name, nominate, opt, peg (slang), pick, pin down, pinpoint, prefer, reserve, select, set apart, set aside, show, single, slot, stipulate, tab (slang), tag (slang), tap (slang)
US Patent Classification Code for DISTANCER: 361.179 Electricity, electrical systems and devices/Proximity or contact:
.  Alternatives & Keywords for EDITOR feature: adapt, alter, amplify, analyze, annotate, arrange, assemble, assign, blue-pencil (slang), censor, check, choose, compile, compose, condense, copy, correct, cut, delete, discard, doctor, draft, emend, excise, feature, fine tune, finish, fly speck (slang), go over, make up, polish, prepare, prescribe, proofread, publish, put together, rearrange, recalibrate, rectify, redact, regulate, rehash, rephrase, report, revise, select, set up, strike out, style, tighten, trim
.  US Patent Classification Code for EDITOR: 715.530 data processing: presentation processing of document, operator interface processing, and screen saver display processing/edit, composition, or storage control:
Alternatives & Keywords for EDUCATION GETS HARDER feature: Gargantuan (slang), ambitious, arduous, backbreaking, bothersome, burdensome, challenging, crucial, demanding, difficult, effortful, exacting, formidable, galling, hard, hard-won, heavy, Herculean, immense, intricate, irritating, labored, laborious, man-sized, not easy, onerous, operose, painful, problem, problematic, prohibitive, rigid, severe, stiff, strenuous, titanic, toilsome, tough, troublesome, trying, unyielding, uphill, upstream, wearisome, abstract, abstruse, baffling, bewildering, complex, confounding, confusing, dark, deep, delicate, enigmatic, enigmatical, entangled, esoteric, hidden, inexplicable, involved, knotty, labyrinthine, loose, meandering, mysterious, mystical, mystifying, nice, obscure, obstinate, paradoxical, perplexing, profound, puzzling, rambling, subtle, tangled, thorny, ticklish, unclear, unfathomable, unintelligible, vex, boorish, dark, fastidious, fractious, fussy, grim, impolite, intractable, irritable, obstreperous, perverse, refractory, rigid, rude, tiresome, unaccommodating, unamenable
Alternatives & Keywords for ENTERTAIN/ENTERTAINMENT feature: amusement, ball, beguilement, delectation, delight, disport, dissipation, distraction, divertissement, enjoyment, entertainment, field day (slang), frivolity, fun, game, gratification, grins (slang), high time (slang), hoopla (slang), laughs (slang), levity, merry-go round (slang), pastime, picnic (slang), play, pleasure, relaxation, relish, sport, whoopee (slang)
Alternatives & Keywords for ENVIRONMENTAL PROTECTION feature: ecology, environmental control, environmental impact analysis, environmental management, environmental monitoring, environmental policy, environmental science, environmentology
Alternatives & Keywords for EXERCISE feature: act, action, activity, calisthenics, constitutional (slang), discharge, discipline, drill, drilling, effort, examination, exercising, exertion, gym, labor, lesson, movement, occupation, operation, performance, problem, pursuit, recitation, schoolwork, study, task, test, theme, toil, training, warm-up, workout
Alternatives & Keywords for GAME feature: competition, contest, match, meeting, round, set, tournament, adventure, amusement, athletics, distraction, diversion, enterprise, festivity, follow-the-leader, frolic, fun, jest, merriment, merrymaking, occupation, pastime, piddly, plan, play, proceeding, pursuit, recreation, romp, scheme, sport, sports, undertaking
Alternatives & Keywords for GPS feature: X, area, bearings, district, environment, fix, geography, ground, locale, locality, location, locus, point, post, reference, region, scene, seat, setting, site, situation, space, spot, stand, station, surroundings, topography, tract, whereabouts
.  Alternatives & Keywords for GUIDE/GUIDANCE feature: adviser, attendant, captain, chaperon, cicerone, conductor, controller, convoy, counselor, criterion, director, docent, escort, example, exemplar, exhibitor, genie, genius, guiding spirit, guru, inspiration, lead, leader, lodestar, master, mentor, model, monitor, paradigm, pathfinder, pattern, pilot, pioneer, rudder, scout, standard, superintendent, teacher, usher, vanguard advice, auspices, conduct, conduction, control, conveyance, counsel, direction, government, help, instruction, intelligence, leadership, management, navigation, supervision, teaching
.  US Patent Classification code for GUIDE: 706.11 data processing - artificial intelligence/http:bwww.uspto.gov/go/classification/uspc706/sched706.htm - C706S011000having particular user interface
Alternatives & Keywords for INTERACT feature: collaborate, combine, connect, contact, cooperate, interface, interplay, interreact, join, merge, mesh, network, reach out, relate, touch, touch base (slang), unite, approach, call, connect, get, interface, reach, speak to, talk, telephone, visit, write
Alternatives & Keywords for LOCATOR feature: come across, come upon, detect, determine, discover, establish, ferret out (slang), get at, happen upon, hit upon, hook (slang), light upon (slang), meet with, nose out, pin down, pinpoint, place, position, read, scare up, search out, smell out, smoke out (slang), spot, station, strike, stumble on, track down, trip over (slang), uncover, unearth, zero in
Alternatives & Keywords for MFH feature: analog, brain, data processor, electronic brain (slang), microcomputer, mini (slang), minicomputer, number cruncher (slang), personal computer, thinking machine (slang)
Alternatives & Keywords for NOTIFIER feature: acquaint, advise, alert, announce, apprise, assert, blazon, brief, broadcast, cable, caution, circulate, clue in, convey, cue, debrief, declare, disclose, disseminate, divulge, enlighten, express, fill in, give, herald, hint, let know, make known, mention, pass out, post, proclaim, promulgate, report, reveal, send word, speak, squeal, state, suggest, talk, teach, tell (what happened), tip off, vent, warn, wire, wise up (slang), write
.  US Patent Classification for NOTIFIER: 340.825 Communications: Electrical, subclasses 825 through 825.98 for controlling one or more devices to obtain a plurality of results by transmission of a designated one of plural distinctive control signals over a smaller number of communication lines or channels,
.  Alternatives & Keywords for ORDER &TIMING feature: pattern, sequence, order (of events), history (which shows patterns of behavior - helps 'predict future).
.  US Patent Classification Code for ORDER & TIMING: 706.14 Data Processing, Artificial Intelligence/Adaptive System
Alternatives & Keywords for OSC feature: accent, din, harmony, intonation, loudness, modulation, music, noise, note, pitch, racket, report, resonance, reverberation, ringing, softness, sonance, sonancy, sonority, sonorousness, static, tenor, tonality, tone, vibration, voice, acquaint, advertise, advise, announce, broadcast, carry, connect, contact, convey, correspond, declare, disclose, discover, disseminate, divulge, enlighten, get across, hint, impart, imply, inform, interact, interface, let on, let out, make known, network (slang), pass on, phone, proclaim, publicize, publish, raise, reach out, relate, report, reveal, ring up, signify, spread, state, suggest, tell, touch base (slang), transfer, transmit, unfold, writ
.  Alternatives & Keywords for PREDICT feature: adumbrate, anticipate, augur, conclude, conjecture, crystal ball, divine, dope, dope out, envision, figure, figure out, forebode, forecast, foresee, forespeak, foretell, guess, infer, judge, portend, presage, presume, prognosticate, prophesy, psych out (slang), read, see coming (slang), size up (slang), soothsay, suppose, surmise
.  US Patent Classification for PREDICT: 706.14 data processing: artificial intelligence / adaptive system
Alternatives & Keywords for PROGRAM feature: design, instructions, line, order, policy, polity, procedure, project, scheme, sequence
Alternatives & Keywords for PS-ZONE feature: area, band, belt, circuit, ground, realm, region, section, sector, segment, sphere, territory, tract
Alternatives & Keywords for QUESTION feature: examination, feeler, inquest, inquiring, inquiry, inquisition, interrogation, interrogatory, investigation, poll, query, questioning, third, third degree (slang), wringer (slang)
Alternatives & Keywords for ROUTE feature: address, conduct, consign, convey, direct, dispatch, escort, forward, guide, lead, pilot, remit, see, send, shepherd, ship, show, steer, transmit
Alternatives & Keywords for SCREEN feature: cathode ray tube, CRT, display, graphics terminal, monitor, screen, VDT, VDU, video display unit, video terminal
Alternatives & Keywords for SCORE feature: account, addition, aggregate, amount, average, count, final count, grade, mark, number, outcome, points, rate, reckoning, record, result, stock, sum, summary, summation, tab, tally Alternatives & Keywords for SEEK feature: be after, bob for, cast about, chase, comb, delve, delve for, dig for, dragnet, explore, fan, ferret out, fish, follow, go after, gun for, hunt, inquire, investigate, look about, look around, mouse, nose, prowl, prowl after, pursue, quest, ransack, root, run after, scout, scratch, search for, search out, smell around, sniff out (slang), track down
.  Alternatives & Keywords for SOUND ANALYZER feature: accent, din, harmony, intonation, loudness, modulation, music, noise, note, pitch, racket, report, resonance, reverberation, ringing, softness, sonance, sonancy, sonority, sonorousness, static, tenor, tonality, tone, vibration, voice, assay, chew over, consider, estimate, evaluate, figure out, hash, inspect, interpret, investigate, judge, sort out, spell out, study
.  US Patent Classification Codes for SA: 701.231 Data Processing: speech signal processing / Recognization
.  Alternatives & Keywords for VA feature: equivalent, facsimile, likeness, match, model, photograph, picture, portrait, similitude, spit, spitting image, mental picture, perception, vision
.  US Patent Classification Codes for Sound Visual Analyzer: 704.235 Speech to image
Alternatives & Keywords for STATUS feature: existing condition, how things stand, no change, parameters, present state of affairs, situation, size of it, standing, state of affairs, status, status in quo, usual, score
Alternatives & Keywords for SYNTHESIZER feature: amalgamate, arrange, blend, harmonize, incorporate, integrate, make whole, manufacture, orchestrate, symphonize, unify, complement, fit, go with, suit, synthesize,
Alternatives & Keywords for TELEPHONY feature: car telephone, cell phone, cell telephone, cellular phone, digital telephone, field telephone, satellite telephone, wireless telephone
Alternatives & Keywords for TAG feature: add, adjoin, affix, annex, append, attach, check, christen, designate, docket, dub, earmark, hold, identify, mark, name, style, tack, tally, tap, term, ticket, title
Alternatives & Keywords for TAILOR feature: custom-built, custom-fit, custom-made, designer, made-to-measure, perfectly fitted, tailored, accommodate, adapt, alter, conform, convert, custom-make, cut, dovetail (slang), fashion, fit, modify, mold, quadrate, reconcile, shape, shape up, square, style, suit, tailor-make
Alternatives & Keywords for THERAPY GETS HARDER feature: analysis, cure, healing, medicine, remedial treatment, remedy, therapeutics, treatment, (slang) See EGH
Alternatives & Keywords for TRACK feature: footmark, footprint, footstep, groove, path, record, trace, tract, trail, tread
Alternatives & Keywords for USER feature: final user, ultimate consumer, client, consumer, customer, end user, patron, prospect, purchaser, representative, shopper, user, vendee
Alternatives & Keywords for USER KEYS IN feature: bat out, beat out, copy, dash off, teletype, touch, touch-type, transcribe, typewrite, write, inscribe, insert, intercalate, interpolate, introduce, list, log, note, post, put in, register, set down, take down
Alternatives & Keywords for ZONE feature: line of demarcation, neutral territory, neutral zone , belt, block, city, county, division, domain, dominion, enclosure, field, locality, neighborhood, parcel, patch, plot, precinct, principality, quarter, section, sector, sphere, state, stretch, territory, township, tract, turf, vicinity, ward
File: Features Intro / IMI Pat
PARTS - WITH RELATED PATENTS:
*  Intro: All patents are US unless otherwise noted. See file "Introductory Notes - Less Important" for help in reading this file.
ACCESS = Gain access to electronic product's controls with a correctly keyed in combination.
-kw: access*, computer*, entry, (gain* or keyless) adj3 (access* or entry), password*, interactiv*
.--toy*, fun, play*, child*, kid*, image*, imaging, create, creating
-str: (achiev* or obtain* or accomplish* or get [or gets or getting] or gain* or keyless) adj3 (access* or entry) -str: password* and (access* or entry). Str: security* and access*. Str: (draw* or create or creating) adj9 (access or accessing)
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry system into car 5319364 507402 = "c" 5450524 5206905
.  Improvement on patents:
-Patent: 5247497 Security systems based on recording unique identifier for subsequent playback. Information provided by U to system when they last entered is played back so U knows if someone else gained access previously. Assignee: Octel [big co].
--improvements:
-U = This N Sys (Patent: 5247497) - C =
ACCESS () / ANALYZER () / EDIT 0 b NR (u nr when (w5) u didn't check to see what their 'unique identifier' (5247497 type input) was during their last session, sys is of no use if u doesn't check, and best if u checks each time) // OSC () / PR () / PS-Zone (sys "tracks" w5 u moved and or what they did (uip, gps)) // Q () / R () / ROUTER () / SCORE (u's previous score or "status" or "TDS" (previous usage) can be a unique identifier this automatation helps the less creative / lazy u) // STATUS () / TDS () / T () / TRACK () / UIP 0
BA = Behavior Analyzer. Analyzes live behavior of people.
.  kw:
-behavior* psycholog*, sociolog*, movement [moves, moving, move]
-animal*,  human*, person*, people* 
-study*, studies, analyz*, monitors, monitoring
.  str: (behavior* psycholog*, sociolog*, movement [moves, moving, move]) and (-animal*, human*, person*, people*) and (study*, studies, analyz*, monitors, monitoring)
-US Patents: 5465115 Video traffic monitor for retail establishements & the like; 5433612 Electronic accountability system - "tracks" u and equipment = "ps-zone" / "track" / "uip" (develops uip-db); 5428392; 5426425 Intelligent locator system = track / ba / ps; 5424745 Detection method and system = track / ba / ps; 5386990; + 5250941 Customer activity monitor / 5245314 Location monitoring system = ps / ps-zone / track / ba.
.  Improvement on US Patent:
5377258 Method and apparatus for an automated and interactive behavioral guidance system: u receives motivational messages (osc) to improve behavioral patterns; includes client db (uip); voice stress "analyzer"; client response required] =
-OTD (Other Technical Details) D: U = This N Sys (BA / 5377258) - C =
ACCESS () / ANALYZER () / EDIT (sys edits out less needed input from: u, uip-db) b NR (penalizes u when u acts poorly (undesirable behavior) = electric shock to body / "entertainment" sys N usage is limited (see KN)) // OSC (penalizes via harsh sounds = synth) // PR () / PS-Zone (u trained where its safe / u is not needed for work, eg: home, coffee room, recreation room, tv room) // Q (to build uip-db = needed by sys to train u) // R () / SCORE (how well u's behavior is altering) // STATUS (of u's behavior) // TDS (w5 u behaved -> builds up UIP DB) // TRACK ! UIP.
BALANCE = Speakers' volume adjusts according to where person sits. System uses central point for two or more people. str: balanc*, audi*, speakers.
++  US Patents: 5287102 "Whenever the pointer islocated between teh leftmost and rightmost icons, the volume is balanced substanially equally between the two speakers" I.B.M. = "Balancer"
TRACKER = Sys tracks or monitors actions of user, or system.
-US Patents for BA / "Track":
5465115 Video traffic monitor for retail establishements & the like; 5433612 Electronic accountability system "tracks" u and equipment = "ps-zone" / "track" / "uip" (develops uip-db); 5428392; 5426425 Intelligent locator system = track / ba / ps; 5424745 Detection method and system = track / ba / ps; 5386990; + 5250941 Customer activity monitor / 5245314 Location monitoring system = ps / ps-zone / track / ba.
.  Improvement on US Patent:
5377258 Method and apparatus for an automated and interactive behavioral guidance system: u receives motivational messages (osc) to improve behavioral patterns; includes client db (uip); voice stress "analyzer"; client response required] =
-OTD (Other Technical Details) D: U = This N Sys (BA / 5377258) - C =
ACCESS () / ANALYZER () / EDIT (sys edits out less needed input from: u, uip-db) // NR (penalizes u when u acts poorly (undesirable behavior) = electric shock to body / "entertainment" sys N usage is limited (see KN)) // OSC (penalizes via harsh sounds = synth) // PR () / PS-Zone (u trained where its safe / u is not needed for work, eg: home, coffee room, recreation room, tv room) b Q (to build uip-db = needed by sys to train u) // R () / SCORE (how well u's behavior is altering) // STATUS (of u's behavior) // TDS (w5 u behaved -> builds up UIP DB) // TRACK // UIP.
END THIS PARTS WITH RELATED PATENTS FILE
File: Features Intro / IMI Tie 2
MANY FEATURES W/ SOME OF THEIR MAIN SUB-FEATURES LISTED
Introduction: Main ways parts can link/tie together.
-How to use this file: Focus more on sub-parts without stars, and sub-parts that help develop the main part [versus how the main part helps other parts, since latter should have the reference under it]
-Parts labeled with *, are hopefully main sub-parts needed to make its main part family function. To reduce confusion, avoid using this file so sub-parts show how the main part helps another part; in other words, sub-parts are listed to help develop main part's sub-parts and possibly reduce repetition between similar main parts.
.-Parts labeled with * are only part of tie-ins with possible stars.
-Purposes of this file: Non-star parts might need merging and better redefinitions. Ignore most of the *labeled sub parts.
MAIN FEATURE FOLLOWED BY SUB-FEATURES STARTS HERE:
ACCESS = brain order & timing nr ('notifier alerts user) q sa track
ANALYZER = coordinator router *order&timing *seek&react
-'Subsets of analyzer: 'coordinator; 'behavior analyzer; 'seek & *react; 'sound analyzer; 'uip (somewhat a type of analyzer); 'visual analyzer.
+  Nature of situation [that isn't completely wired into analyzer] is understood via multiple 'sensors, eg: sound and visual analyzers. See 'sensors.
ARTIST = *character *experience image mm *screen toy va
BEHAVIOR ANALYZER = experience *guide *Multi-User Predict *sa *Seek&React *status tgh *track uip *va
BALANCER = distancer osc ps zone
BILL / BILLING = score status tds track
CAMERA = Visual Analyzer See: Artist
CARTRIDGE =
CHARACTER = *experience image
CLAP = r
COMPOSITION (of sounds) = synth *sa *mic *dance *entertain experience motion-sounder *osc *sensor tilt toy vibration vr *wa
COORDINATOR = analyzer router *guide *seek&react *status *uip- tailor. This is a subset of 'analyzer. 'Sensor = coordinator: 'analyzes multiple sensors to get better understanding of situations.
DANCE = composition *distancer exercise locator motion-sounder zone tilt toy vr wa
DATA BASE = *analyzer *ba predict *sa *score *tds *uip *va
DISTANCER = balancer *dance *game locator motion-sounder ps *sensor.
EDIT = artist *camera *character image *mm *router uip-tailor va
EDUCATION = analyzer *ba guide *mood predict score status tgh uip- tailor
ENTERTAINMENT = *exercise mood *toy *vr
EXERCISE = *ba *dance
EXPERIENCE = entertain
GAME % = artist's-crawl *ba character tilt
GUIDE = analyzer education *interactive *score tgh uip-tailor
INTERACTIVE = *r seek&react sensor uip-tailor
K (Control via keys) = clap dance *interactive R ('remote control's 'analyzer 'adapts to user) tilt *zone LOCATOR = see: distancer
MD / MOOD = BA ('behavior analyzer) entertain experience
MIC = osc sa synth
MODEM =
MORNING = BA ('behavior analyzer) entertain exercise experience interactive nr *osc R ('remote control's 'analyzer 'adapts to user) *score seek&react sensor *tds tgh tilt *zone
MOTION SOUNDER = compose dance distancer *osc vr
MULTI-USER * = BA ('behavior analyzer) *cart *edit
MM / MULTIMEDIA = artist camera composition edit
NOTIFIER = access *interactive score seek&react status track uip- tailor vibration
ORDER & TIMING = access analyzer morning seek&react sound-analyzer score status tds uip visual-analyzer zone. See: Sound Analyzer; Access.
OSC (Outgoing Sound Communicator) = balancer synth
PD (Positioning Device, GPS) = see distancer
PREDICT = *analyzer BA ('behavior analyzer) *coordinator *education *guide *interactive *order&timing *q *route *seek&react *sa *tds uip w5
Q = analyzer *db *education guide *interactive *predict uip
R = access clap *interactive see-k sa tilt *track *uip VA ('visual analyzer 'seeks & 'reacts to designated 'images) *zone
ROUTER = *analyze *ba *coordinator guide *sa *score tel *track uip *va
SCREEN = interactive-k nr replaces-osc*
SCORE = *analyzer ba *bill seek&react status *tds
SEEK & REACT = analyzer ba interactive motion-sounder nr ('notifier alerts user) *order&timing *score sa *status *tds track uip zone
SENSOR = *analyzer mic *motion-sounder *order&timing *predict score 'seek sa status *tds *tilt *track uip vibration va *zone
SOUND ANALYZER = analyzer ba interactive k locator *nr predict score seek&react sensor status STATUS = analyzer bill score sensor tds *uip *zone
SW (Software) = *analyzer *cartridge *coordinator *db *interact *score *status *tds
SYNTHESIZER = *analyzer *ba compose-overlapping *entertain *exper *interactive mic motion-sounder osc *predict sa uip
TEL = *interactive *mic *modem *osc *router *sa
TDS (Time Date Stamp) =
TGH (Therapy Gets Harder) = *analyzer BA ('behavior analyzer) *coordinator education *entertain *game *guide interactive *multi-user *order&timing predict q *router *seek&react status uip
TILT = artist *balancer *composition dance distancer interactive *motion-sounder R ('remote control's 'analyzer 'adapts to user) sensor vibration
TOY = artist *distancer education entertain exercise experience game mood motion-sounder seek&react tgh vr wa TRACKER = access *analyze ba *bill distancer *guide locator multi-user nr ('notifier alerts user) *order&timing ps *predict router score *seek&react sensor sa status tds uip VA ('visual analyzer 'seeks & 'reacts to designated 'images) w5 zone
U (User) % = Systems that can be users in addition to people: access [accessing system part or person] *game multi-user R ('remote control's 'analyzer 'adapts to user) router [what's being routed] sa [what makes the correct sound can use system] tel [accesses system via tel] uip [whatever meets the uip profile, becomes an accessor] UIP (User Information Programming) = UIP-Access, UIP-BA, UIP-Edit, UIP-DB, UIP-Router, UIP-Tailor+, UIP-Track. UIP applies to all IMI.
UIP = UIP-Access, UIP-BA, UIP-Edit, UIP-DB, UIP-Router, UIP- Tailor+, UIP-Track
VIBRATION = *dance *exercise interactive motion-sounder r tilt vr
VISUAL ANALYZER = *analyzer artist camera *guide *interactive mm *predict R ('remote control's 'analyzer 'adapts to user) screen score status
VR % = *balancer dance *distancer *entertain *exercise *interact *locator motion-sounder mm predict r router screen *score *seek&react sensor *sa *synthesizer *tgh tilt toy uip *va wa *zone
WA = *exercise *nr *osc *sa *tel toy vr zone
W5 =
ZONE = access ba balancer dance * distancer *locator *route *score *status tds tracker uip visual-analyzer wa
CONCLUDES FILE ON HOW FEATURES CAN LINK TO MAIN SUB-FEATURES
File: Features Intro / IMI Exist 2
EXISTING PRODUCT EXAMPLES RELATED TO OUR FEATURES IN 1996 * 
Introduction:
-Products listed in this file% exist, and exemplify optional embodiments of the parts as mentioned in descriptions of new inventions.
-Product description can also include new inventive material based upon / correlated with the existing products. * The part heading to which the existing products are tied are part of the "branching system" as described in the main "Introduction to product descriptions". Manufacturers are probably in America unless otherwise mentioned. Any dates directly tied to existing products are probably the date(s) when its product publicity was published. Brief description of each part pre-cedes existing products only to help familiarize reader on general orientation of part.
ACCESS = Gain access to electronic product's controls with a correctly keyed in combination.
-Electronic fence: keeps pets away from underground voltage wire, since dog's collar emits negative signal when dog comes near. Replaces need for common fences. Sold by Alsto's at 800447-0048, and Comtrad Industries 800 704-1121, and Sharper Image. 94-9/95.
--unauthorized people can / can't = gain physical "access".
COMPOSITION * = Electronic Music Composition: Another variation of product can also be used to create interesting music.
-Interactive virtual guitar computer game: If you manage to play along to the songs correctly, you advance to a higher level of music playing. See preset images as you play. Sold via Skymall at 800-424-6255, #63004 '94-95.
NOTIFIER = User is notified on the status of any situation.
-Gadget lights up during earthquakes. Sold by Innovative Electronic Solutions Int'l, VA. SF Chronicle Feb 1, 95, Page Z2.
+--"Track": states if type occurrence occurred within (which) designated area, eg: breaking glass, other break-ins, fire (temperature sensors), chemical accidents/leaks.
-"Notifier" signals when train tracks are blocked: laser lights notice any blockage. Nikkei Weekly - before early '95. Developed via Japan Aviation Electronics Industry Ltd and Eas Japan Railway Co.
-Car owner "notified" when their car is being broken into. Nikkei Weekly - before early '95, under article titled "Crime rise boosts sales of auto anti-theft devices.
-Alarm sounds when "notifier" detects slight changes in air current within car. Sumitomo Metal Mining Co, Japan. Nikkei Weekly - before early '95, under article titled "Crime rise boosts sales of auto anti-theft devices. -"Notifier" seeks changes in infrared radiation (body heat) emitted inside car. Nikkei Weekly - before early '95, under article titled "Crime rise boosts sales of auto anti-theft devices.
-Auto voice dialer alarm: when motion detector ("sensor") activated = predetermined telephone numbers are dialed = receiver hears pre-recorded message, eg: this is John, my home at ----- is being broken into.
Existing Canine Systems:
Introduction: Also applies to parts%: R, Access, Track.
-Stop excess barking by emitting high pitch sound. Sold by Alstos at 800447-0048. '94-9/95. 
-Electronic fence: keeps pets away from underground voltage wire, since dog's collar emits negative signal when dog comes near. Replaces need for common fences. Sold by Alsto's at 800447-0048, and Comtrad Industries 800 704-1121, and Sharper Image. 94-9/95.
-Prerecorded dog barking heard when someone comes near, eg: as detected by motion "sensor". Sold by Sharper Image 6/94, # S1600; and Comtrad Industries 800704-1211.
OSC = Outgoing sound communicator signals user when a function within the device occurred.
-Wireless speakers: pick and go almost anywhere (within home), #45121W & 53111W. Also wireless headphones, #53577W. Sold by Hammacher Schlemmer '94-95. Speakers also from Comtrad Industries and many other manufacturers.
-Device mutes car stereo for incoming and outgoing calls on your cellular phone. Comtrad Industries 800704-1211. --OSC is stopped / volume reduced when certain / important occurrences happen, eg: alarm, bell rings (tel, door, alarm, (cooking) timer).
R = Remote Control
-Datalink Watch: Downloads information from your computer. Store appointments, tel numbers, to-do lists... Made by Timex, USA.
-Wireless computers mouse that is moved in 3-D within room. Manufacturer unknown. (Maybe another co other than Creative Lab.)
-Pass hand in front of stereo activates snooze function (turning off sound). By Magnavox, sold by Wireless at 800 726-8742 #31014'94-95.
-Adjust angle of tv via remote control. Sold by Skymall at 800-424-6255. #63004. '94-95.
-(Video camera)'s controlled by eye movements via its = "sensor". KN: for controlling any other electronically hooked up system. Canon. SF Chronicle Aug 17, 95, page c3, Col. 1.
-Voice Command Remote Control. Trade name: VCR Voice Programmer. Sold via Hammacher Schlemmer 9/94, #53554W. Also sold by Comtrad Industries at 800704-1211.
-Leapfrog: Converts (infrared) remote signal to (radio) frequency. Enables the signals to pass through obstacles. Comtrad Industries 800-704-1211. '94 - early '95. Earlier KN (invention(s)) too?
TRACK = Sys tracks or monitors actions of user, or system.
-Gadget lights up during earthquakes. Sold by Innovative Electronic Solutions Int'l, VA. SF Chronicle Feb 1, 95, Page Z2.
+--"Track": states if type occurrence occurred within (which) designated area, eg: breaking glass, other break-ins, fire (temperature sensors), chemical accidents/leaks.
UIP = User Information Programming. System uses collected information about user to better serve them.
-UIP - T (Telephony): [People kept on telephone hold hear advertisement and other informative recordings (according to caller's UIP profile (their caller ID = database(s)). Caller can also hear recordings during busy signals. Average phone call answered in four rings according to study.
San Jose Mercury News 6.28.94, page lE. Quantum Systems Inc, Ramsey, NJ.]
--callers choose what they hear/get (via on-line/fax) from server's sw ('tailored software) menu.
-Radio Broadcast Data System: 1] U's radio interrupted to give traffic or weather warnings (KN: combine gps = sys). 2] "s" shows messages from stations, eg: song name & artist & advertising & kn-other uip-communication. USA Today, Feb 22, 1993, front page.
END IMI EXIST FILE: See Main Parts File and their Appendixes!
File: Features Intro / IMIT 7
" T " TELEPHONY FEATURE MANY OF ITS SUB-PARTS
Intro: This file includes additional definitions to Parts for products in telephony, communications, interactive multimedia. These definitions are part of (to be merged with) " Main Parts " file. Definitions herein are only minutely more important than Parts file. However, if there is a question (conflict, such as between this file and Parts File) this file's Part take dominance (are the default). For: Telephony, * Electronic Communications, % Remote ("R") Interactive Electronics, % Multimedia, etc.
GENERAL: One, multiple and or all of these telephony Parts can be incorporated into one or more large complex telephony network systems covering multiple locations (integrating different systems). "C" is the center of the merged diagrams and descriptions.
-When "TEL" / "T" / "D" are used in N (Product Numbers) other than those in this file (such as those whose main features may / may not be telephony), it refers first to 'telecommunications' simply, then branching further out into all the telephony Parts contained in this file.
-The following products also apply to A: all types of tel instruments (home, office, professional), multimedia (video, cable, video phone), interactive audio/visual/data (voice mail, toys, entertainment), wireless communication (Mobile, Cellular, PCS (Personal Communication System), %GPS, Walkie Talkies, pagers).
TELECOM PARTS
ACCESS * = Access to tel functions is restrictable: Telephony functions are limited/modulated/controlled/ permitted/"access" according to the type "cart"/"access" put into/"uk" "tel". Examples:
--W5 type calls allowed (to whom; system can request information from user before allowing "access" into desired mode/to desired tel #.
-D: 1User = 2UK-3TR(speaks) = 4TEL-5C = 6TR = 7TEL/8C/9MFH
-7MFH analyzes ACCESS code from CART/PD and intern permits applicable functions/ACCESS.
-3  Remote ("R")
-0-Direction Finders: "GPS" type systems incorporated into mobile tel units. Information is available to user according to his/its location (system acts as tour guide: better than the current system which is restricted to users being kept in the bus; system will guide person as well (where to go next, while person can also use a map from "display"/printed (out)))
-D: tel-pd-c-printer = mfh-live person who gives information\tel-o-C5 Intelligent hotel room key goes beyond old magnetic card keys, has circuit chip. Can be programmed re data pertaining to user, billing, etc. 18 Dec 92 X. Card enables activation of "tel". D: C5=tel/tr=remote
%-o-C78 Device warns user if they forgot to lock up when leaving. Door is blue when locked, red when unlocked. 20 Dec 93. D: C78 = c = "tel". User alerted (via: "tel"/tr/notifier) whenever unauthorized person has entered door (didn't user correct "access")
+5A-700 Incoming/Outgoing Controller: to activate outgoing call feature, first press a special button (once or any number of repeated times in sequence) which lets you get dial tone. Caller must dial the numbers soon thereafter or dial tone is lost and any pressing of other keys on pad are ignored. Additionally, there will be a ring if an incoming call comes and can only be picked up (if handset is off hook) by pressing the same or other special button - this prevents kids/pranksters from answering the phone.
-OTD: requires memory of fewer codes; lets others use your tel too allowing for greater flexibility; can restrict any/all calls (long distance; by area code/specific tel numbers (caller id restricts how certain calls are picked up); incoming and or outgoing calls)
-Parents can't always control their kids from using the tel; hence this is a valuable feature.
-D: tel=c (memory; caller ID recognition & processing) = tel line
*  5A-701 Long Distance Controller: Restricts access to long distance dial out functions via first:
-needing to "uk" "access", eg: wait exactly _ seconds after picking up receiver before beginning dialing / key changeable code prior to dialing, the user's tel instrument or its "mfh" will allow dialing out
+  Offer free telephone instruments which automatically dial into your system. An extra button dials the access tel number automatically. Give free telephones in countries like Japan where they are extremely expensive. Applications: long distance tel communication; information from mfh (weather, news, entertainment); dial into your mother/lover.
-They can also be produced cheaply and given as promotion.
-For people shopping for new phones, let them buy the instrument which comes with a credit for long distance or other services.
-Any other type of t/mm related service available via "tr".
ANSWERING MACHINE = Telephony Answering System.
OTD: ACCESS *(); %ARTIST (make art and leave such as messages; caller's or receiver's systems may: prompt user, offer the hardware/software for doing function); BALANCE *(); BVA (); CID (); %CAMERA (LENS) (); %CART (leave cart as part of U's incoming/outgoing message); CLAP (); %COMPOSITION (make music and leave such as messages; caller's or receiver's systems may: prompt user, offer the hardware/software for doing function); CONFERENCE (); FS (); % GAME (make games (return your moves) and leave such as messages; caller's or receiver's systems may: prompt user, offer the hardware/software for doing function); K (); MFH (); MIC (); MOUSE (); MP (); MULTIMEDIA (); MULTI-USER (for caller / receiver, eg: key in code for type person wanted ("voice mail")); NOTIFIER (); NOTIFYING CALL (); PORTABLE (); PRINTER (); PS; R (); S (); SCORE (); SOUND ANALYZER (); STEREO * (); SYNTH (); TDS *(); TRANSFERRING INTER SYSTEM TELEPHONY (); UIP *(); UK (); VISUAL ANALYZER %(); VOICE MAIL (); VOICE MODULATOR (); VR % (); WA %(). Following are part of the additional possible examples: * 1C-071 Multimedia Answering Machine:
Leave (video) messages for people in your office or home. Also has interactive video feature, whereby user can ask questions and get more information.
-Like a tel answering machine, leave multimedia (audio/visual) messages on another's machine by transferring data via wire or air waves.
-All operations also include standard telephone (audio only) answering system. Outgoing announcement can be received both audibly, or audio/visually on caller's device; receiving device prompts caller with audio and or visual signal to send their a/v signals (though only audio can be accepted as well if caller's system is more limited). -Can work with the cruder current video telephones, and with more sophisticated future models.
Footnotes:
Also acts like a fax receiving machine.
.  -If caller's device doesn't allow visual transmission, or if there is technical failure, system will work just in audio mode
-Additional application: receive video clips at any time of (shows, instructional nature [user can request from manufacturer detailed instructions on how to operate, repair, etc their product])
-Old Footnotes: display ("S"); "C"; pp; mp; uk; date; states the time and date of incoming/outgoing messages automatically; interactive; toy; all; entertainment; "mic"; synth; mfh; bp; alerter; osc; vc; score (number of messages); cart; tel; sp tel; tr; mo; FS; cp; mq; access; character.
-Makes it easier to decide who's message to answer; better way to communicate yourself.
.  5A-5 > o Auto Call Back:
-H-should caller not leave their message, machine can call back number and leave message in answering machine owner's voice stating they wish they left a message.
-May store numbers of everyone who called and who then hang-ups (this is already in existence)
-Also returns crank (obscene) phone calls with special statements recorded by user and or manufacturer -Tells person who has called in any selected past time period, "you have called again and you're not leaving your number, how can I make contact, please leave your message"
-[May or may not be legal]
.  5A-051 H o Beep: this sound should have psychologically arousing effect. Makes listeners feel: happy, or sexual, or excited, meditative and relaxed, soothed, advertisement, humor (laughter can replace beep), animal sound replace beep (maybe record your own animal), and or any other sound giving caller the mood of wanting to leave message/feel friendly/good
4A (before#1) o code each message by (person's name, topic...) then micro chip files for future reference
5A-3 Answering Machine Features: outgoing beep and or sounds and or conversions of outgoing messages - all in frequencies, rhythms scientifically proven to enhance health, feeling of well being, happiness.
-Machines might even state they are such a health product, making callers happier to have called and feeling less put off by the conventional impersonal machines, while they get their healthy and or creative boost.
+Depending on caller's telephone number (via caller ID system), outgoing message is pre-selected for them by user. -Interacts with caller's voice pattern to design psychologically fitting sounds
.  Answering Machine With Outgoing Voice Synthesizer: select the type of outgoing voice wanted with any background sounds, and be other characters in your outgoing messages.
-Recording function of system allows user to record onto cassette tapes, etc for insertion in any other sound-creating device.
?  - Answering Machine with Voice Synthesizer: Alter your outgoing message so it is more appealing. People will like you more { they often think about you objectively when listening to your voice (from a distance), where they have the choice of responding or hanging up.....I
.  Exists: Language selection: press right number key to get instructions in desired language
5A-4 H Answering Machine Game: caller is asked to play game. Game can include any of the following: trivia questions, questions about the person being called; caller must state their preference for whatever asked, eg: favorite color, food, famous person, country, music, musician, etc.
-Answers to multiple choice questions answered by pressing right number on tel key pad; or announced verbally onto machine
-Caller might only get through to live person, or be allowed to leave message if they leave the type answer machine/user wants to hear. Listener can hear in and scream call too. Machine might say the following in response to answers: very good; now you can speak with....; sorry please try again on your next call; don't call back until you ..... ; your answer(s) are being processed; etc.
-questions programmed/installed by user/manufacturer
.  5A-6 H Store certain tel messages in electronics. Can then listen to whenever user wants without interfering with future incoming messages.
-retrieval process: key in request for old stored messages that have already been listened to, then either give date or person's message or ask date or person's messages in memory
. 4C-160-000000 Tel Answer Delay:
If person can't easily get to the tel in time, they can send signal which tells caller "please wait, I am coming to the tel".
The signal can be generated by: voice recognitions system; pressing of button that is connected via wire, or remote ("R") control; use of clap; or all calls are handled with such an announcement when system knows user is at home -caller hears the live voice or recording
*  8B-310 upon entering dwelling or room, device picks up person's distancer and will alert them if/when: 1. they have a message. The scream there could show and or print out message at that time, if the person requests. 2. show their calendar for the day, week... 3. meetings they are scheduled for 4. events that could be of interest to them -the response person receives might indicate level of urgency in communication, eg: less urgent; urgent; very important. Person might be busy with something at that moment.
-marketing: get your messages more quickly and easily; be notified when you have important messages instead of having to wade through less urgent messages often. Helps replace need for secretary.
-categories: door chimers, door tv, answering machines, software, computers, pagers, intercoms......
*  5G: Tel Answering Machine:
Program the time(s) in which incoming calls are to be:
a] call forwarded to designated tel # (10-1lam calls go to tel #1, 4-7pm calls go to tel #2); b] tel answering machine picks up calls automatically (user may or may not be "notified" of incoming call); c] time of week effects type of outgoing message. Also SCORE
-it's inconvenient to have your tel call forwarded to someplace where you aren't; user might forget to reprogram (pp) their TEL from remote ("R") location so this TDS controlled system useful.
End Answering Mach
.  Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details call 415834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. DI, June 16, 1996. D: "answering machine" = wildfire.
ARTIST ** = One or more users can make/design art/[mm shows/programs/games] by interacting with each other / "mfh", via "t" or other "tr". "Mfh" can be programmed via: UIP/PP/MP/CART. D: User's C-User's C = MFH (CART, T).
-OTD (Other Technical Details): ACCESS *(); ANSWERING MACHINE (); BALANCE *(design the sound effects to accompany the U's mm presentation); BVA (each character/visual element in mm presentation responds/speaks with observer/u which interacts, differently according to latter's uip); CID (); CAMERA (LENS) (); CART (); CLAP 0; COMPOSITION ** (); CONFERENCE (); EDUC (); EXERCISE (); FS (); GAME (); K (); MFH (); MIC 0; MOUSE (); MP (); MULTIMEDIA (); MULTI-USER (); NOTIFIER (); NOTIFYING CALL (); PORTABLE 0; PR (mm show could be created using 'author software'(from M/other party)(via tr w another c)); PRINTER 0; PS; R (); S (); SCORE (); SOUND ANALYZER (); STEREO * (); SYNTH (); TDS *(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK (); VISUAL ANALYZER %(); VOICE MAIL (); VOICE MODULATOR (); VR % (); WA %(). Following of this section are part of the additional examples:
BALANCE * = According to PD (GPS) location, tel's speakers and other functions balance accordingly. PS system can use the PD's location to do what it wants according to the software used.
-incoming/outgoing calls transactable based on tel=pd's location.
Eg: users #10 & #40 can only dial certain area and or tel # from room #20.
-D: pd = remote ("R") = mm-c-t = osc
--OTD: uip (studies w5 of user) = mfh
-MM: Visualize user from their different angles according to your position in relation to your video tel. The position of the object effects the audio mode as well (humming instrument shown on left side of S, has speaker(s) towards the left humming louder than other (speakers/%vibrators/%notifiers))
-multiple cameras shooting from different angles
BASIC = Applies to all Telephony products. #1 Any portable unit (handset) used by U is solar powered too. (Just let it sit in sun.)
-D: telephony device (C) = tel line = receiver = signal converter = c = osc / mic = signal converter = tel line = telephony device (c)
BVA = Behavioral Voice Analyzer.
D: BVA = C = T
-OTD: ACCESS *(access is given to those people which exhibit behaviors/voices meeting requirements (what access has on U's UIP in its memory); ARTIST **(); BALANCE *(); CID (); CAMERA (LENS) (the visual effect in mm tr, is altered according to bva/uip of user); CART (each cartA: seeks for different signals in determining U's behavior / has different pr which takes and then processes BVA's signals accordingly); CLAP (); COMPOSITION (); CONFERENCE (); EDUC (); EXERCISE (); FS (); GAME (); K (); MFH (); MIC (); MOUSE (); MP (); MULTIMEDIA 0; MULTI-USER (); NOTIFIER (); NOTIFYING CALL (); PORTABLE (); PR (); PRINTER (); PS; R (); S (; SCORE (); SOUND ANALYZER (); STEREO * (); SYNTH (); TDS *(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK (); VISUAL ANALYZER %(); VOICE MAIL (while u is on hold / being call routed they hear sounds/info tailored to their behavior/uip. One party can designate what other caller gets while they are on hold, eg; according to their behavior/uip/what u wants listener to buy and or do);
VOICE MODULATOR (); VR % (); WA %(). Following of this section are part of the additional examples: G. Voice Actor: System analyzes speakers' behavior (callers/receivers of calls) (via "sound analyzer"). In tern their voices are modulated in order to help achieve desired effects (boostA: sales, work performance, improve rapport, make longer tel calls).
-System modulating sounds responds quickly and is controlled by C (UIP / uk objective of communication), which analyzes sounds and makes determined voice modulations.
G. "Speech" - "Sound Analyzer" (determining speaker's behavioral modes) = UIP.
Applications: if user is lying and which words tie to the lying behavioral mode; boost sales
-OTD:
.-AD: luk(2pp/3mp) / 4**remote(2pp/3mp) / 5**clap (6"speech"/**pp/**mp) / %7[signal(s) tr between other (related) product unit(s) / part(s)] / 8**mfh / 9**mq / 10**uq = 11[tr/rc] = 12+C = 13[tr/rc] = 14+applicable product's description's desired function(s) are controlled / 15**other desired applications / 16**"notifier"(osc) 17**"score" - 18*"display" / 19**"cart" / 20*UIP / 21**"printer".
-D Notes: 1/4/5/6 (helps) control system (turns system on and of / controls other functions)A:
-See Parts& for less crucial details
G. User accesses mfh for desired 'effects' via "tel". EffectsA:
type sounds / music. With UIP system is well able to design the desired sound effects.
5A-880 Voice Analyzer: tells user the behavioral mode speaker was in while leaving message.
-user  can opt to have analysis at command of button(s) 
-D: speaker-tel=mic=c (sound analyzer/UIP)-mfh=osc/notifier.
-tel call is routed in tel system according to caller's profile (UIP, valued customer known via tel#, area code). This function is in earlier N.
5A-910 Voice Analyzer: "display" shows the additional level of voice modulation (inflection) needed to achieve aim. Additional level needed can be based on what the synthesizing equip needs to do, or how the singer with only their natural means needs to make alterations
-aim can be determined viaA: selecting from option in menu; PP; UIP
-ap: good for music education; useful in my computerized musical instructor product too; teaches people how to be more polite (on or off tel); analyzes if speaker is good enough to be hired for job; analysis of speaker useful for developing UIP.
5A-940 Voice Analyzer: recognizes voice's emotion and analyzes the feeling and or behavior of speaker. This is part of a larger product with other features.
5A-800 Voice Recognizer: transmits speaker's words onto scream. -converts into language(s) of listener(s) 4C-090 Call Screener and Director:
Based on the person's behavioral sounds on tel, eg: tone, system directs caller to applicable person (eg: matches caller's psychology with sales rep's (live or machine) voice and behavioral pattern. Boosts sales. Also screens out unwanted calls into the voice mail trap, etc.
-Related to: 5A-880-04200A Voice Analyzer: tells user the behavioral mode speaker was in while speaking, or leaving message on answering machine.
-user can opt to have analysis at command of button(s)
-related to 5A-940
CAMERA (LENS) * = Integrated into the MM T (Video Phone). Both person on other end of tel line, and U can see themselves and the other U.
-D: lens=camera=recorder= tr to S of all connected U
-C34 Remote ("R") Control Video Camera - moves camera into desired angle. 20 Dec 93 X. C34 = "tel" (control via tel)-remote
CART = Can make the C-T system into a completely new product. One or more slots in TEL take one or more different CART. Examples of what CART can do:
-DI: c/mfh/tel = tel line = tr=tel=c-(display/uk/osc/printer/mfh)=cart
-Otherwise, the TEL can become a CART into the systems mentioned below.
--D2: System (product category mentioned below)=c~(display/uk/osc/*printer/*mfhi/*mq/*uq/pp/mp/*uip)=cart (tel/*(radio frequency tr/rc)/*mo) = tel line = c/*mfh/tel
-OTD: the merging/interfacing of category with tel is done either via CART, and or plugging the systems into each other viaA: wire/wireless data tr; a "C" is located both in the "tel" and the category product, each having their softwares compatible/integrating with the other parts of the entire systems.
--Why tel merged w product: The "tel" function serves many possible uses to the category product, one or more of the following may applyA: data from mfh (feedback/uip/database access/memory storage and retrieval); allows control of system from distant location ("remote"); convenience of having a "tel" as well. At designated time TDS, system will communicate the fact via "tel"/tr. "Score" is tr via "tel". Two or more of these systems can "interact" via "tel", with or without assistance of mfh.
--Misc: the C found in each unit/main sub-unit of system allows for software (CART) insertion.
-for *additional details on applications for each category product, see filings showing how these products are utilized.
CID = Caller Identification Systems (Caller ID, Ammie):
-D: Caller's tel = tr their CID = CID recognizer = C-T.
<> 5A-900 In-coming Telephone Sales System: Caller ID determines how call is handled within large tel networks:
Incoming calls to large sales networks are routed according to caller's caller id. Proven to increase sales. Applications include:
1]  Calls are routed to the sales representative handling caller's territory.
2]  While on hold, callers hears news from a radio station broadcasting from their area code; or (product / news) information according to their UIP.
3]  The speaker's voice is slightly modulated, proven to create greater rapport, according to the regional accent from caller's area code/caller's behavior (BVA-Behavioral Voice Analyzer).
4]  Calls from telephone numbers with favorable past customer history are routed to the most effective sales people. Studies show some sales people are more effective with cold call sales while others are more effective selling to established customers, all depending on the sales person's characteristics.
5]  UIP / BVA determines if soft or hard tel skills are needed (for technical support service) and: a] routes calls to people w such skills; b] signals call receiver before call is answered as to type skill needed to interact w caller. 6] According to information being fed into computer ("C") (during telephony interaction) system will better know (possible) responses to be made by human / system.
7]  Less desirable calls are: a] put / kept at the back of the cue of callers waiting on hold; b] given lower quality (sales) personnel. Especially conducive to nationally promoted telephone numbers, where special customers aren't given special numbers.
*Notes: .-speaker's voice is modulated. Eg: callers from southern USA have different sound preferences than northerners. D step 1: caller id=tel. D step 2: speaker=c (voice modulator according to caller id) = modulated voice transmitted over tel line
.-caller identified viaA: area code; caller id (uip (customers history)).
-"caller id" and related concepts can be replaced in this filing's descriptions as any way via which to tag a caller, including their: PIN, customer name (which might be typed in by recipient / caller (when call starts)), area code, % type activity (service/product) desired/being conducted.
*  Psychologically adjust to type caller: Voice synthesized for targeted purposes (Caller's ID / UIP designates type caller). Convert voices into those which create the feelings of: passion, friendliness, energy, intelligence, impatience and the expectation that the listener perform their work well (studies show that speaking to people in certain voice tones tends to create better work results from them)
--  eg: customer service department's synthesizer modulates sounds by volumes, treble, bass (if above a certain range) -OTD: the sound change can be automatic(MP)/PP
-applications:
--C decides type voice frequency desired for particular applications. 1] UIP determines frequency (in sales, the caller ID of customer labels desired frequency); 2] K211-5A-890 - converts typed words into sounds.
*-o-Modulate the sound frequencies of calls to induce both longer calls and more repeat calling. Eg: eliminate some of the unpleasant sound frequencies; synthesize in pleasant sounds. By satisfying both sides of conversation, calls can be increased, developing more favorable attitudes towards the other party and the tel itself.
-also: calls to/from particular regions can be modulated accordingly, eg: calls from norther US (known for sounding rigid) might be given a slight "twang"/other modulations to make the calls appeal more to southerners.
Below is related to above or? Below was dev 3.94:
<> 5A-900? Caller ID determines how call is handled:
-o- Caller ID can be incorporated into PS system too D: PD-Tel (caller id's identifying transmission) = PS (caller id recognizer) = c (analyzes/process/[forwards tel call]/uip]. Example: both the user's location and caller id are used toA: treat this party accordingly / develop uip or score.
OTHER APPLICATIONS FOR 'T (TELEPHONY): CALLER ID = C-TEL = TEL-C:
ACCESS **: caller id acts as one of the forms of an access code.
ARTIST *: multiple artists can make art together (multi-user) in real or step time, via tr/tel line, system recognizes callers and has UIP according to caller's/user's caller id and or access code;
CART *:; CLAP:; COMPOSITION *: multiple composers can make music together (multi-user) in real or step time, via tr/tel line, system recognizes callers and has UIP according to caller's/user's caller id and or access code;
DATA BASE: Matched with caller's ID / their PIN / customer name / other such taggable element. UsesA key word search to locate all applicable data on desired caller / customer. Customer may have multiple tel #'s / PINs. Use national databases too, eg: from Dunn & Bradstreet, telephone number databases (from tel service providers), etc.
DISPLAY ("S"): (shows: caller's tel #, and any other info about person user is speaking with (either user called them / they called user) such as their: address, how their tel number is listed with the tel company / tel book, advertisement by-lines and or descriptions about the other party (as provided via UIP); ENTERTAIN:; FS **: attached to tel in diagram; GAME **:(each participant's caller id acts as one of their possible "access" codes); MFH: (UIP: develops analysis of callers (according to their call's W5)), can be conducted by tel line provider (US Baby Bells));
<> MORNING *: each caller id gets different type of interaction also according to their UIP; PP/MP:; MQ/UQ MULTI-USER*:; NOTIFIER:; OSC:; PD/GPS: C (UIP) analyzes both user's location (pd=tel) with their caller id; PRINTER *:; Remote ("R"):; SCORE:; STEREO:; SYNTH:; TDS *:; TEL:; TGH **:; TOY *:;
<>+ UIP : caller id helps c/mfh identify caller, and hence develop/provide information pertaining to UIP, D: caller's tel = their caller id = tr = tel = c-mfh = uip; UK: via C user can pull up information about a particular tel # / user's name/function and get data on their: history and other UIP information; WA's tel has caller id, D: wa=tel.
<> 5A-900 Related N. In-coming Telephone Sales System: Caller ID
Study customer behavior via (UIP) by merging following dataA: items purchased over tel line, purchases made with their cards (credit cards, other member related cards) in other modes too. This way marketers develop detailed calculations about user / general market: what that person is likely to buy; past, current and future trends.
-in this manner, marketers can pin point potential buyers without inundating them with material they're not likely to buy resulting in excessive advertisement exposure of their brand names and wasted costs; and buyers begin to see such brand names in a more appealing light (that brand fits their lifestyle).
.-this UIP data can be shared between some or many firms, the more sharing the larger & more complex the database system, and more accurate in determining customer characteristics.
o-"sound analyzer" also helps in analyzing caller's behavior to some degree, and this can ad to the UIP's databank of info.
<> 6B-020 Caller ID Screener: Unwanted calls are channelled to the tel answering machine mode. Exists. -Caller ID system gives certain incoming tel calls (based on their tel no) the tel answering machine recording. Caller ID: system will respond to caller's tel number as user programmed:
-tel never rings when you receive calls from unwanted people (always gives a message to those you wish not speak with, so that you don't have to bother picking up tel or checking to see the tel number of caller on display ("S"). lets user pick up tel at other times with less risk of speaking to person they wish to avoid)
-gives different messages to certain tel numbers calling in
-has choice whereby user doesn't even have to hear the message from caller if user wishes to program device such. Eg: caller thinks their speech is being recorded; or device records yet listener needs to use extra keys in order to retrieve these less desirable messages (desired and undesired messages are stored in different places)
-When receiving another call on telephone, radio wave, etc the first, or second incoming call displays its tel number, caller's identification, etc. allowing receiver to choose to answer the call.
-Should call be undesired, receiver may opt to have incoming communication handled by a tel answering machine or related device. Or to keep things simple, any such unanswered call automatically goes to the answering machine. Footnotes: Undesirable messages might automatically be erased after one hour or after user picked up tel, which ever happens later; Parts: all; display ("S"); pp; mp; uk; date; interactive; "mic"; synth; mfh; osc; vc; cart; access.
0-  4C-042-000000 Personalized Outgoing Recording:
Caller ID states whom call is from. If receiver doesn't want to take the call, they can pretend not to be at home but to have created a special message for this caller. The important point is that a beep follows the spontaneous message spoken by user into "mic", so that caller thinks they received a personalized recording only. Even the audio message heard by caller could lose some of its quality to help caller feel they reached a machine.
.-works with 4c-040, 4C-041
-OTD: display ("S"); pp; mp; uk; tds; basic; osc; vc; speech (tells who call is for and from whom); vc; score%; sp tel; cp; uq; pi%; multi-user; notifier.
.<> 8B-170-083001 Advanced Tel ID: Know more about whom you are speaking with. Example: their address and to whom the tel number is listed, etc.
-applies whether other party called you, or you called them. Get more info about party you called without even needing to activate their tel's bell; by just going into database using their tel number
-Receiver's ID: know if tel you are dialing is a cellular/mobile tel and or if it is being call forwarded and or tel number or type tel line to which call is being call forwarded.
-recipients may opt for such information not to be given out
-H [government regulations may not allow all aspects of the idea, depends on the country]
83
-also learn above and the following about the tel number you dialed, or the tel number that dialed you: the name in which the tel is listed, their address, when the tel service started, any major complaints against company, status of the company - such as if it has filed for bankruptcy.
-also learn: how many calls they ever made from that number that day/wk...
-OTD: display ("S"); "C"; pp; mp; uk; tds; basic; au; mfh; speech; vc; score; cart; sp tel; (also identifies tel numbers for modems, and faxes); cp uq; mq; access; uip; multi-user; notifier
A2-310 Tel Regionalizer: caller hears accent and music popular for their region of country, according to tel area code while going through voice mail or on hold. If available employee with that accent will take call (perhaps central number transfers calls to same region of country where employee there takes call).
4C-040-103005 Caller ID Activated Speaker Tel:
System automatically puts calls from special people onto the speaker. Answering machine takes call if user is out or doesn't answer.
-When calls come from certain tel numbers, the speaker tel automatically picks up the call.
.-works with 4C-041, 4C-042
-OTD: display ("S"); pp; mp; uk; date; tds; basic; caller identification system (identifies caller's tel number); "mic"; synth*; portable*; au; bp; osc; balance*; speech*; vc*; score%; cart%; sp tel; cp; pi*; float (hand set floats); multi user (different beeps, etc are emitted depending on which receiver is being called; 4C-041 Ring Identifier - if "multi user" then prior to the speaker activation of caller's voice, there is a coded beep or audio announcement stating for whom call is for; cc*; remote*; notifier.
-user pp tel id of those people (who don't mind speaking via speaker tel)
8B-150-083008 Switch Board's Identifier:
Receptionist receiving call, encodes applicable respondent's tel instrument (who call is for) with code / verbalized recording stating information about the caller, eg:
--caller's nature (client or supplier); level of importance, urgency; length of time they have been on hold; if its a local or long distance call; person and or organization; type personality (nice...). -Receiver of call gets this information on display ("S") of tel; or computer ("C") (can then store such information with or without any additional info put in by receiver (person who speaks with and handles call - saves time keying in info, plus receiver might not be able to key everything in time and or forget after the call, especially if there is another call coming soon thereafter). Receiver can hear or read this information before or during the tel call.
-all this information can be relayed on to third (or any subsequent person) taking call (perhaps prior person wasn't right one to handle situation.
Footnotes:
Display ("S"); "C"; pp; mp; date; all; mfh; score; uq; mq; uip; character.
.-A2-3 10 TEL REGIONALIZER: caller hears accent and music popular for their region of country, according to tel area code while going through voice mail or on hold. If available employee with that accent will take call (perhaps central number transfers calls to same region of country where employee there takes call).
4C-090 Call Screener and Director:
Based on the person's behavioral sounds on tel, eg: tone, system directs caller to applicable person (eg: matches caller's psychology with sales rep's (live or machine) voice and behavioral pattern. Boosts sales. Also screens out unwanted calls into the voice mail trap, etc.
-Related to: 5A-880-04200A Voice Analyzer: tells user the behavioral mode speaker was in while speaking, or leaving message on answering machine.
-user can opt to have analysis at command of button(s)
-related to 5A-940
-Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details call 415834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. D: "CID" = Wildfire.
End of this CID Section
CLAP = D: clap = mm-c-t
COLOR ** = S's COLOR changes according to the frequencies (what "sound analyzer" determines voice/sound to signify (happiness) / UIP.
-D: sound = sound analyzer = C-tel = DISPLAY/TR = C-tel
COMPOSITION ** =
-see my jazz tel idea: user's can make music together simultaneously / in step time. Useful to send data between people to ^: hear their music; for educational uses.
EDUC: teaches tel manners (user's voice is too loud/abrupt = "sound analyzer" = C = "notifier"); 
SCORE Simple version of video tel: option 1. caller transmits still photo of themselves to other TEL; 2. kids can see picture of their mother when they call her at work (such picture is in memory of user's TEL being dialed out from --DI: user = dials = tel # ID system = C = Display ("S") shows picture.
--D2: composition = mm-c-t
CONFERENCE = Conferencing Telephony. Three or more locations/parties communicate with each other. * However these technologies might find applications in two party telephony too.
5G. Telephony Multimedia Conferencing:
Hook up w one or more locations. All parties on one display ("S") / each party on separate display ("S") or portion of display ("S"). Meanwhile parties can interact in unlimited modes: ARTIST *:(); COMPOSITION *:(); ENTERTAIN:(watch films simultaneously, enabling each to talk with each other during movie (if desired); play "games"); FS **:(); MFH:(); MORNING **:(); WA:().
.<> 5G. Conference calls - each speaker sounds like they come from different region.
-manually set the balance for "sp tel" with two or more speakers in one or more rooms
-in conference calling, each caller can sound like they come from different part of room; or even the handset's speaker(s) might create some stereo effect for one ear for conference or other conversations.
-used for standard handsets/"sp tel"
--if more than one speaker is in room, each's PD let's their voice be heard from different region of room for people on other ends of tel communication.
--in multimedia the location of the sound source as viewed on the "display" is related to where the sound sounds like it is coming from.
EDUC = D: educ = mm-c-t.
Hobby Multimedia Tel: System shows user how to do their hobby:
"Multimedia" "display" / "osc" shows/helps user do/learn/watch desired activity (full presentation/UQ).
--UK to "interact" w MFH/cable broadcast. User can select type info/instructions/show from menu/via key words (if food is the hobby: themes, countries, ingredients they like that are used in recipes...).
-system will tell user where to buy/get/mail order needed ingredients; has a separate advertising channel selling food products.
-user can sign up for specific channels; tel can be placed near the type activity of the channel: kitchen, workshop, playroom... -including K206-5A-710 Laser Dialer option.
-type interestsA: cooking; horticulture; crafts & hobbies; psychology; relaxation (how to; programs to help you relax) -D: osc/cart/printer/tel/display/uk=c=mfh=c for bill collection
-OTD: "remote"; (system can even UIP (according to user's pp))); "balance"
EXERCISE: Exercise while communicating via TEL and A:
--system monitors W5 of your exercising and TR it to other caller's (TEL/Teal's C's DISPLAY) & so both can see how each other is doing (checks heart beat, meters walked)
---for patients at home wanting to be monitored by their doctor 
---SCORE
*-D: exercise = c = t
FLOAT ** = Handset / * entire tel, floats.
FS = fs =c-t
GAME:
-interact with partners via TEL/REMOTE. SCORE
--D: player = UK = C-TEL = MFH/C-TEL = UK = player
-o-C1 10 Video games linked to tel. AT&T, Sega. June 93 YD
D: remote/uk/display=c=C 110
INFORMATION RETRIEVAL %:
.<> Electronic dating service: UK info about themselves (UIP/mq). Then it gives user: 'card'; *(list of tel numbers w or wo names/addresses). 'Card' when inserted into special "tel" lets user dial their blind date. User might have limited information about the party they are calling (not know their tel number, letting date call them back) -options: could have self imposed time limit for call, making it easier for receiver; sender can press button letting receiver get their tel number (receiver might/might not know) if they are getting data (their tel#, name..) on caller for some time - receiver can receive this data via: mail, mfh can call them up later and give it audibly/tr info to receiver's c; if receiver is interested, they can uk info about themselves so caller might call them back again.
-Log into mfh to hear parts of desired show/play/film... "Display" (touchscreen) interacts with user giving more information too.
.-tickets could be completely printed on U's sight
MFH "Morning Alarm": see in file other than 5G or 2K
-1C-07A (grew out of & includes 1C-071)
For multimedia computerized tel sales. Potential customer receives such sales campaigns viaA: tel, videophone, entertainment cable. User then touches key / touchscreen to get desired details.
K = D: info +entry (uk/r(*clap)) = [s(mm)-+c-t] = mfh
LOCATOR = User/Monitor(er) can "locate" other's PD/TEL. SCORE
-Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415 834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. DI, June 16, 1996. D: "Locator" = Wildfire.
MFH = Analyzes company's calling characteristics:
Calling  Characteristics Analyzer. 
Tabulates how calls are made according to their W5 (W5 data for analysisA: "sound analyzer" which seeks for certain words & then calculates (mp/pp) accordingly; to where calls were made and from whom and for how long and any other information supplied (by user's UK (tel automatically correlates that call to computer ("C") activity made during the tel verbal/data transaction)).
-Applications: W5 of the company's current activities, which can also be used to better forecast, and make any needed changes. Catching illegitimate users of long distance calls (system can alert investigator (irregularities/strangeness/non-matchings), who can then look into matter further). SCORE.
.-related for this description was developed earlier too
-D: m = mm-c-t
-o-Tel # Database:
of people's and organization's telephone numbers within the country and or most of the world. User can "access"/"uk"=c=mfh for needed A: tel #, addresses, co info such as their products/services.
-useful source of information for my/other's products to compile: UIP / SCORE. Or to determine if "access" is permissible; or develop questions for MQ, or answers for UQ.
-makes contacting people easier, hence increases caller volume
-for letters differing one's own language, system can provide A: an easy automatic conversion / conversion table / touchscreen.
MIC: D: mic = signal converter = recorder-c-t
MOUSE: Use mouse to select the program(s)/tel # wanted/move or edit files. "mouse"/"remote" = "c" = "T"
MP: The volume of user's outgoing call is adjusted according to type tel # they're calling, eg: their grandmother, or tel in country with poor tel lines.
-D: mp = c-t
MULTIMEDIA = Interactive Multimedia.
-D#1: u (%"interactive" u)=k=c-s
-D#2: c="artist" (uk; touchscreen; remote) / t]
*-D#3: "composition" = c (edits viaA: pp/mp (coordinates/combines/synergizes (data/signals))) = tr = display/mfh/other's system (c/tel)/osc/"remote" ("air pad")
-o-Video Phone: user's "tel"/system keeps in its memory information about its user (picture of user(s); graphics (logo); advertising by-line(s).
.--user can select from menu which of these they want tr to other "tel".
-C2 Electronic Blackboard: Participants share documents, images
and presentations. Shared via "tel" lines for simultaneous viewing and editing by distant users. Graphics can be retrieved and put on board from a file or electronically scanned on. Can display ("S") video too. Sept 92? MF (Fuji, Xerox).
-Feel vibrations of music in seat.
Pioneer manufactured this before 1992.
-o-C 116 Cable TV over tel line. AT&T 20 Jan 93
D: display/remote/uk=c-C116 (other entertainment programsA: audio (radio), %interactive.
MULTI-USER = D: multi-user = c-t
NOTIFIER = D: notifier = mm-c-t
-C6 Watch=tel vibrates instead of noisy audio alarm. For deaf, and radio DJ people. Aug 93 X. -notifies when "tel" is ringing. D: c5=tel/tr=remote
-G. Sound level & vibration level instruments: User alerted toA: incoming t call / type of call (caller, nature of call (level of urgency)) viaA: vibration/flashing lights, or other "notifier" modes. Useful for those who are deaf/in recording situations/don't wish to disturb others.
.-if deaf, use one of my other inventions to continue communications.
-Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996.
NOTIFYING CALL = D: Incoming call (CID) = C-T-"Notifier (Display/OSC)"
<> 5G Automatic Outgoing Call:
-o- A TEL call/TR automatically made in certain circumstances,
upon alarm/act/completion of task, sensor makes call. Examples:
-setting timer PP (TDS) whichA: alerts user to needing to make a call / then dials out the call (and activates SP TEL) . Applications:
<> If user hasn't risen from bed such call(s) can be activated. Determination of having risen is in my past inventions: 1] tripping of laser light shows person got out of bed; 2] sensors (for pressure) in bed sense user is still in bed; *3] alarm (located near/very far from bed) wasn't deactivated.
+-call goes to: wake up service (mfh/person) who knows W5 modes of conversation/sounds to wake up person (what/when/how to say what (news station; "good morning, wake up")/why (psychology));
--if someone rings your doorbell, and you're not there, the SP TEL there will TR to user's location
--particular sounds in locations where user isn't located at the time (strange noise), system in tern "notifies" user/police via TEL/beeper/monitorer (police). "Sound Analyzer" is PP/MP for certain sounds (barking dog; breaking glass; setting off particular alarms; fire; water leakage; excessive noise from baby/children; break in and entry)
-D: user=sensor(mic)/uk/remote=c=tel(sp tel)/transmitter (radio)=transmission=rc/tel/person=c-mfh
-OTD: simple/complex operations possible. Simple: activating (answering call/getting line for dialing out). Complex: dialing / making transactions available to any other sophisticated TEL instrument.
3A-W20 Emergency beeper (portable/non portable): if alarm is triggered or any other emergency comes up person's beeper automatically goes on. Code/beeper type (eg: type signal or light or word display ("S") shows nature of problem, for example: three beeps means your grandmother is calling for assistance)
-Application: for hard of hearing people (deaf); parents who want to know of any loud sounds/crashes in bedrooms (device may be designed to ignore loud child frequency voice, or parents may want to know about those screams as well - if they hear the scream as beeper alarms parent will know nature of problem and may decide on choosing to check).
-H-Bruce Dunn stated he knows of device that turns on lights when tel rings
.-8B-350 +? Notifier: if person's mobile tel, tel, pager, warlike talkie, or like transmission-receiving device is calling them and they are away, their watch or other smaller portable device might alert them via sound, light or quiet vibration.
-device might notify them if there are any messages on answering machine or voice mail, and or number of messages. Such notice might take place with or without user's request for such information.
-user might know caller's tel or ID number; then maybe user can let an answering device take a message
OSC: states information about the incoming call via OSC/"notifier" via caller's caller ID^: A] tel #; B] name of caller (system remembers who each tel # belongs to according to a] receiver's system which had such information entered in; b] via tel cob's computer ("C"). C] nature of call according to receptionist/info "uk" in by caller. -Headphones / Hearing aids: WA lets users speak/listen to tel conversations.
-D: t-c(pr) = osc
3A-360 Sounding Telephone: by pressing buttons create sounds that add to the home/office telephone call's creative fun! Great for teenagers and creative adults.
-  Use for prepping up, energizing co-workers, artists, inventors, sales reps, sad, sick or bored people with cheers in background, etc. Get the healthy creative juices flowing.
-  Devices for developing excuses to get off phone. Sounds: door bell (excuse for, "oh i have to go now"); sound of another tel call ringing on second line; sound of click in call waiting; record your own sounds onto micro chip, [eg: mom saying "please come downstairs and help me"; dog/cat barking so as to be walked or fed or let out; fake sounds of tel trouble on the line ..... ]
-  user records own sound effects
-  can initiate in beginning of conversation to gain interesting start to conversation, be someone other than yourself H- Nature sounds: playful monkeys; birds; jungle sounds; rain;
-H- Joke sounds: silly babies; giggly babies; crying babies; short weird sentences of laughter, etc; wild fat lady's voice "well I got to get off the phone now, talk to you later!"' etc.
3A-361 Telephone Ring Announcer: unique sounds: music, church bells, bird sounds, monkeys playing, baby crying, verbal sound of butler stating "tel" or .....
-Key  Words: telephone, decorate =(decorative and or decoration), toy, fun, novelty 
3A-362 Tel Ring Volume Accelerator: each succeeding ring gets louder. Alerts those who might not hear the ring. UP the feature into activation and selects volumes. Sound acceleration might be on only one or each succeeding ring.
-user can select alternative sounds replacing the ring
-continuation of ringing related sound might continue after any answering machine picked up call
4C-041-000000 Ring Identifier: exists
If "multi-users" use same tel line; then according to caller's id #, there will be a different ring when the call comes in. .-eg: person #1 programs their desired tel #'s and when person #2 hears ring for person #1, person #2 either lets person #1 or the answering machine take the call. Caller is unawares of this system.
-OTD: display ("S"); pp; mp; uk; tds; basic; osc; vc; speech (tells who call is for and from whom); vc; score%; sp tel; cp; uq; pi%; multi-user; notifier.
End of this Section of OSC.
PD = D: Pd = sensor = mm-c-t
PORTABLE = Wristwatch dials tel. UsesA: Casio's CMD-10/flip lid watch with small dial pad; Panasonic's wristwatch tel.
-wireless tr activate/deactivates tel ("sp tel"), dials tel #. Sys can also remember certain tel #'s. <> 4A-330 Jewelry Telephone Ring Alerter: Wherever you are in your dwelling, the telephone ringing will activate your jewelry/apparatus notifying you of ringing.
-great if you have friends calling you late at night and you don't want to disturb others
-jewelry can vibrate as an alerter (watch, bracelet, ring, strap/contraption on body)
-alerter notifies: doorbell; other alarms (fire, another person pressing a medical assistance help request button (on "remote") for system; when a fax has arrived (or any other telecommunications data on home/separate line (system will "notify" the type of tr received)); when someone is walking or driving up the driveway/walkway; clock (tds) alarm; when food (in oven/stove (as "notified" by tds) is ready);
--  "notifier" ("display") shows the type of "score" (status) of desired situation (as mp/pp)
-OTD: D: event=signal=c-remote-tel=tel line/tr
ACCESS ** (remote tr special code)
<> BALANCE ** remote-pd = balance; CART *; COMPOSITION *; Display ("S"): (dial by touching/drawing onto touchscreen); ENTERTAIN
EXERCISE ** (monitors user's health "score" (heart beat; blood pressure; diet; calorie usage); FLOAT **; FS **; GAME ** (us as piece in game: remote ("R"), pd); INTERACTIVE %; LOCATOR *; MD *; MFH; "mic"; MO *; MORNING *; MOTION SOUNDER ** (in case of theft, "motion sounder" can be turned off, and if so it can alert incase of theft); MOUSE *; MP; MQ *; MULTI-USER *
NOTIFIER; OSC; PORTABLE *; PP; PRINTER *; SPEECH *; SP TEL
STEREO = remote-c; SYNTH; TDS *; TEL; TGH ** = tel=mfh-c
TOY *; UIP *; UK; UQ *; VC *; WA.
-OTD  #2: For filing dates also see: A2-310 TEL REGIONALIZER 
8B-350 +? Notifier: if person's mobile tel, tel, pager, warlike talkie, or like transmission-receiving device is calling them and they are away, their watch or other smaller portable device might alert them via sound, light or quiet vibration.
-device might notify them if there are any messages on answering machine or voice mail, and or number of messages. Such notice might take place with or without user's request for such information.
-user might know caller's tel or ID number; then maybe user can let an answering device take a message
4A-34 Phony Car Phone: mobile telephone made not to look like phone, minimizing theft potential. Eg: in car made to like its a part of auto; for walking made to look like cosmetic case, flashlight, etc.
Calls follow recipient: Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. DI, June 16, 1996. D: "Portable" = Wildfire.
End This Section Of Portable.
PRINTER: t=c=printer, all in one unit; "portable"; "pd"
PS = D1: pd = sensor = mm-c-t. D2: pdt
.<> 5G: GPS Analyzes users' tel calls:
-tabulate exact location from which call was made: many uses for this
--user (person/his company/other monitorer) gets UIP for his own purposes
--UIP for one or more users. call from PD = GPS's analyzer = MFH = Tel Cox's C. SCORE
---useful information: bill tel calls not by tel area code only but also by the exact location of user; study W5's of users' actions (know where there is more activity in undeveloped areas, maybe land prices will go up there, drug dealers, improving programs in human services/software by better tailoring to actual situation); "sound analyzer" seeks key words = C tabulates/correlates w W5 = UIP.
5G: According to location of user's "PD", the tel/tel answering machine system(s) will respond/function accordingly. Examples:
-If user is out of range/contact not wanted by user/wearer of "GPS's" "tr" (in garden, bathroom, beyond range of tel (mobile)), caller gets corresponding "PP" recording (I'm unavailable now....; please wait a few seconds; ...I'm coming). If user doesn't want to be disturbed, they "uk" resulting in corresponding recording / function (if caller calls from desirable tel # (caller ID) user/system responds according to "pp".
Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. "PS" = Wildfire
R = REMOTE CONTROL. DI: r = mm-c-t. D2: uk=c=tr
-o-C28 Yamaha's Miburi functions: sensors on both wrists, elbows and shoulders. Wrist: controls volume, by turning wrist in - changes vol. [Publicized in July 93]. Make movements to dial tel: one type activity turns tel on/off; another dials/ another adjusts sound modulation/ another memorizes and or recalls memorized tel #'s / another controls the "display" and or C
--D: C28=tel-remote
ROUTER = Incoming TR are routed according to the PR.
-D: incoming call (CID, UIP (given by receptionist/via database of receiver's system)) = t-c-mm
-<> 1C-291-083001 Call Locator:
For people who spend much time in different parts of the office. Tel rings in certain patterns, designating for whom it is and how urgent. Calls for person only ring on tel they are closest to.
Tel Follower: Tel rings for user at the tel closest to person's location.
.-Related to product 1C-290.
-the system is simplified for easy use. For example: tel transfers are limited to particular telephones within office / locality; when incoming call arrives, it may state on display ("S") name or person call is for
-Applications: this system is limited in usage to certain types of offices where people are often away from their desks within a general area. It fits particular office work styles, is not meant for everyone.
+-saves time from having to have someone else get your tel
+-needed person is identified via:
--different tel rings may also apply as to who the call is for, or different short melodies
--importance of call can result in louder ring or other signifier
--speakers might announce whom the call is for....
*--particular flashing lights
*--display on wall or other location near tel
-system can after replace the use of beepers, paging systems
Applications:
-receptionist is told who call is for, then they transfer the call by putting in correct code which automatically transfers call to the section of co where person works; in tern the designated sound, etc is emanated designating who call is for. The applicable person or anyone else can take the call (but it interrupts fewer people if people just got the calls themselves), if call isn't answered, then voice mail records caller's message (existing computerized tel answering system)
+-for office or home: tel only rings in room where person is, not disturbing others. System recognizes person's presence by their transmitter. This transmitter can have many other functions for systems identifying where they are within a dwelling, according to other features in product files A, B, and C.
-Footnotes: remote ("R"); display ("S"); "C"; pp; mp; uk; date; all; "mic"; synth; mfh; alerter; osc; vc; score; tel; sp tel; tr; mo; fs; rpc; uq; access; uip; character; clapper; distancer.
Option: only caller(s) with particular caller id's (according to receiver's / *sender's UIP) will get their calls channeled through this locator system; whereby other callers might go thru normal channels (eg: receptionist -> voice mail/answering machine if user is away from their main location)
3G050 Re(router) for T / C (M, Information Highway): 1] reconnects u back to telephone number extension they were transferred to but later disconnected from. 2] Acts as bookmark in relocating where user was on information highway or M.
S = D: s = mm-c-t
.-3C-370 Smell Telephone:
When the boss speaks with its subordinates, they want the people to be in a state of mind of attention, etc. Emission of certain smells when speaking in certain situations can be desired.
-System may best work within a special telephone network.
-Applications for types of smells being emitted when people are speaking in the following situations, with: clients; accounting; suppliers; mom calls son while she is still at work; etc. Different behaviors are required for each situation.
C100 Goggles contain miniature TV screens. Sony 23 Nov 92 NK
D: uk/remote=c(c100-)tel. Likewise, user cans see/hear who they are speaking with; useful in "VR" too. -user can make/receive calls while in virtual reality experience (the actual software program for VR can be stopped, so call can be made / call conversation can be made while user enjoys/is using the VR for other modes ("entertainment") simultaneously.
--user of VR can be "notified" (hears tel ring) when incoming call comes in.
Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. "route" = wildfire
SCORE * = D: score = c-t
-Cl Tel tallies phone charges, display ("S") shows how much the call costs. before 92 MF. Probably Sony, other manuf now too.
SOUND ANALYZER * = D: mic = signal converter = t-c
-Analyzes mechanical failures and anything else emitting applicable/unique sounds according to a phenomena. Use in remote ("R") locations, transmit via TEL/TR.
-G. Know what user is typing onto their computer ("C") on other end of tel line via "sound analyzer" picking up of signals generated as user types -> UIP. "Sound Analyzer" also studies any/most of the other sounds generated on other side of tr (at other party's location), eg: cooking, background conversations.
-applications: data about other party for the curious; for developing UIP database.
-BVA uses "Sound Analyzer" to help understand the speaker (their behavior profile).
-lR-54 T accepts voice commands. Speak person's name, and system dials person's tel number. [Sharp Corp, 22-22, Nagaike-cho, Abeno-ku, Osaka 545 06-621-1221 NK]
-OTD:
ACCESS **:(via sound analyzer (only certain verbal commands/person's voice permitted); CAMERA:(control camera: eg, lens angle via verbal commands (via tr/t) (for remote ("R") camera)); CART *:(); ENTERTAIN:(); MFH:(); MULTI-USER*:(system recognizes different speakers, and will function differently even if same words are spoken by different people, eg: picks up on their regional accents / male / female voices); NOTIFIER:(); OSC:(); PR:(); R:(); S:(); SCORE:(tds); SYNTH:(); TEL:(tr); UIP *:
STEREO * = D: stereo = mm-c-t
.<> Stereos: Speaker tel is part of vehicle/home/office "stereo" system.
-D: tel (microphone-main unit speakers (handset/stereo's speakers).
-exists?
SYNTH = D: synth = mm-c-t
TDS * = tds = c (pr)-t-mm
TRANSFERRING INTER-SYSTEM TELEPHONY = D: System 1 - C = System 2 - C.
'8B-16 Tel Switcher:
Device transfers an incoming call from mobile tel to a regular tel.
-Purpose: save money. For those who started call on mobile tel. Listener need not know the switch is taking place. transferring method possibilities: have regular tel line dial into the cellular tel line at which time the regular tel line will take over call. The receiving mobile tel must have special feature to allow this.
UIP * = D: uip = c-t
-Information about how those user(s) speaks with/ about himself, is collected (over time). UIP gets info from: "sound analyzer" = develops personality profile in C; what user "uk" = C.
%-o-C1 12 Computer ("C") predicts human error. Input UIP (working conditions of person). System predicts errors they're likely to make. 30 Sept 92 YD.
-Sends warning via "tel". D: C I12=tel/tr=osc (alarm)/notifier
5A-720 monitors number of calls and lengths of conversation between certain departments. A computer ("C") database can show all types of graphs for diverse purposes, eg: which departments might need to move closer to another (during or without any corporate re-structuring), future plans, seeing the values and flows of departments, etc.
UK = D: uk = t-c-mm
-Hand written image input tablets: dial (uk) tel numbers by writing the number onto the tablet.
-Bar Code Readers - Writers: data read/received is TR; C can tell writer W5 to print which bar codes. D: bar code reader/writer = c= tr/tel = c/mfh
-Image scanners: scan tel numbers/codes to get/compile tel numbers. Part of needed info can also be scanned and then matched with other data, eg: scan people's names, and system's memory knows their tel numbers. Hence user can then quickly develop desired tel list for C/"tel".
-Touchscreen for - television, computer ("C") training devices, virtual reality, Intercoms:
User uk (touches desired numbers for contacting other party (via tel) (to get more information, place an order, friendly chat). -C32 Notebook computer ("C") with built in printer ("air pad" OK too, but make sure its built-in). IBM Think Pad 550BJ... Jan 93 release date X. D: C32 = "tel"-remote
-o-C99 Pancake music dial. Each disk controls different sound modulation. Sony. 15 Mar 94 "Brutus", p.24 published in Japan.
D: uk/remote (C99) = tel. (Dial/receive tel calls by rotating the pancake dials (not classic rotary phone dialer with the 10 holes)
<> 5A-710 Laser Keyboard: trip the light for the specific number wanted. Invention has ten lasers (for 0 through 9) -great novelty
-"tel" is one of the applications A: great for wealthy people in kitchen who want to make outgoing call from speaker phone with dirty hands; artists and clay sculptors; scientists and doctors who shouldn't de-sanitize their hands Laser lights may also be directed out into open space (lasers are directed (pp) so user can control functions of any product from their favorite seat wo needing any apparatus (remote). D: Laser transmitters = (person can trip any lights here w the desired 'code') = Laser receivers = sensor = c = control of desired product.
-'code': each laser can be struck like 'Morse code' generating 100 possible type signals from each laser; the combination of codes from each laser can be (for three laser lights 100 times 100 time 100). So the total code (made from 1 or more lasers) makes the desired control, eg: on/off/change modes/etc.
-"osc" (beep: same or different sound according to code/laser) is made each time user: strikes laser / generates recognizable code.
-partial list of products the laser keyboard can control:
Answering machines; etc.
-this product is described in my other files, eg: Parts
-D: laser diode(s) = tel-c = display ("S")
-OTD (tel applications):
ACCESS **; BALANCE **; CART *; CLAP; "Composition" = Laser keyboard (5a-710) = *tel; Display ("S") (shows W5 of what's happening); EDUC** (can reprogram (pp) what each laser represents (for signal generation; EGH *); ENTERTAIN; EXERCISE ** (dial when wet: in sauna, where wet, while on jogging machine); FS **; MD * (osc); MFH; MORNING *; PP/MP; MQ/UQ *; MULTI-USER *; NOTIFIER; OSC; PRINTER *; Remote ("R"); SCORE (length/cost of call; tabulation of UIP); SP TEL; laser dialer (5a-710) = STEREO;
SYNTH; TDS *; TEL; TOY *; UIP *; UK; WA**
5A-930 Get dial tone via "remote"/"clap", then speak person's name user wants called.
-desired tel # can also be "clap" (make bursts of sound, eg: three beeps = the number 3 of tel #)
Voice Activated Key Pad: by making clear monotones in single or multiple bursts their corresponding key act as if pressed on normal key pad. Sounds can be of certain letters to ease memory for people in each language group. For people who can't touch keys:
-scientists, doctors: can't desensitize hands
-artists, ceramic people, rich people cooking in the kitchen and others with dirty hands
-activate  system via foot or elbow triggerable switch 
-system can beep sounds and or lights signifying that the key has been activated {eg: similar to getting a click when pressing a key in far enough} shows system accepts info. Each sound/light response might be different as with tel keypads
3C-010 Speaker telephone (incoming/outgoing calls; dialing (certain claps designate digits of tel number)
3C-120-08300Q Tel Touch Pad:
Press soft pad and the manner in which you pressed it is transmitted to receiver. This allows something closer to physical contact while speaking with your friends. Only popular for open minded cultures
-the surface hands touch is designed to maximize human pleasure, and reduce any feel of moisture.
-if the other person presses, you can press at same point too. This pleasant tension allows the stronger of the two people to force back the other person - just like two hands playing together. -Footnote: mp; all; toy; exercise; cr & cp; tel.
<> see below section for pools--5G Speaker Tel Activated By Other Hands free Means:
-Gen: Activation/Dialing/Deactivation UK/remote" methods:
UK buttons separated/attached to: TEL (tel can be replaced by other communication device (walkie talky, TR) -Foot pedal(s): or use other instrument to UK activating tel line (answering call), dialing, hanging up.
.-A code used to step on pedal represents each of the call activities: activation; each # has different code (dialing might even be done on one or more separate pedals); deactivation of call.
-"remote"
-wall mounted buttons (by bed).
-buttons part of another system / activates other functions: eg: lights, stereo, entertainment.
-<> pool side (those w pools are rich and desire the luxury of being able to stay in pool to handle calls)
--system's sound modulation handles splashing water soA: it reduces their sounds; reduces any conflict in audibility --other: waterproof; portable unit (separate system/part can also go into water
--for use in indoor pools; saunas too
-hobby area (person doing ceramics)
.-kitchen, sauna, garden, auto, garage, industrial/hazard area.
-C: (don't leave computer ("C") to go and answer tel). Option: upon UK C, C might record/tabulate score/UIP of tel conversation. D: UK=C=TEL. Incoming/Outgoing voices might be modulated/interpreted/translated (simultaneously) as desired right on computer's DISPLAY/PRINTER.
-clicking button(s) on pen/watch/PD
-D: user=uk/remote=c=tel/sp tel=tel line
O-the volume of the speaker is controlled by the A: number of bangs/type word spoken at the time the tel is being activated (1 bank is quieter than 3 bangs)
VISUAL ANALYZER % = D: binocular/camera (lens)-recorder = tr = c-mfi-display-uk-remote. -Binoculars: viewed material is TR via radio wave / TEL. User controls ("remote") what is seen (camera angle/focus) from his remote ("R") locations.
VM / VOICE MAIL = D: mm-k-t-c = tr (telephony interaction) = t-c-mm-k
*  5A-870 Call Holding:
Listener requests type music/news they wish to listen (or none at all) during their being on hold
-caller's ID (shows their UIP)/caller's city/country area code can help determine type music they would prefer -if desired, user can program from their tel to have the continuation of what they were hearing/seeing transmitted to them at their location (their tel) upon completion of the tel call; or PP when the TR should be made.
--user can even get the "mfh's" channel (its tel #) so user can 1] re-access 2] contact the vendor who can sell the service for his own co's tel system
2B-250 Verbally input information (into voice mail) which is then automatically routed to receiver either in verbal or written form. Voice mail knows how to route message simply by stating for whom message is for at the prompt. .-Verbally input information which is then automatically routed to receiver either in verbal or written form. Voice mail knows how to route message simply by stating for whom message is for at the prompt.
All the inventions get people more interested in leaving a message, and leaves less of the impersonal feeling. Markets creative adults. Incorporates all standard answering machine functions: date/time stamp...
-  All reasonably available answering machine features can be options for each invention
-  All inventions applicable for tel answering machines too
.-2B-250 Verbally input information which is then automatically routed to receiver either in verbal or written form. Voice mail knows how to route message simply by stating for whom message is for at the prompt.
.-6B-010 = 6B-1 (was 6A-1) if caller leaves message, recipient must return call in order to get message. Recipient who wants friends to feel comfortable will have to call back and hence caller might feel more comfortable leaving message. Recipient might then get caller and speak with them directly if original caller is at their tel. -Touchscreen allows users to select from voice mail menu tr by other party's tel-c. (This is done simultaneously with voice communication (on same tel line)).
End Voice Mail
VOICE MODULATOR = D: sound -> signal converter -> k-c-synth -> signal converter -> tr -> t/osc -Person who knows about voice modulation: Wendy Rocchi 303-488-5713 AT&T (Tu-Fri 0600-1400 MST) -each person might have own voice module because each person speaks differently. Is used by lead singers already. This could also be done on the trunk of the tel line (if user changes locations, then their "access code"/cid might match the needed voice modulations).
-Use vocoder (type of "synth" where person speaks into system), benefits: voice sounds prettier (give voice fuller sound, give some reverb, remove some reverb, make it sound more gravely (sound is broken into bits)). Though more difficult the voice's 'attack' can be modulated too.
--'Filter' (potentiometer and tuned coil) filters out unwanted frequencies
--'Noise Canceler': blocks unwanted frequencies, and or blocks out excessively high decibels.
.-8B-330 According to type application, person's voice is changed accordingly, eg: their voice for announcing plane is ready for boarding, plane is late (frustration, or anger in voice of speaker who is afraid of being attacked with anger from passengers and who in tern is semi hostile in voice as protection - this is bad), etc.
5A-950 Accent Alternator: change your voice to that of person with another dialect of same language +change sexes, sound more domineering, gentle, etc.
A2-720 TEL FREQUENCY RETURNER: caller's fq recorded, then music/sounds in similar fq, stress, happiness, level/type of feeling is heard by caller while they're on hold. Purpose: makes caller feel at one with other party. e m might make alterations to change caller's behavior.
8B-330 According to type application, person's voice is changed accordingly, eg: their voice for announcing plane is ready for boarding, plane is late (frustration, or anger in voice of speaker who is afraid of being attacked with anger from passengers and who in tern is semi hostile in voice as protection - this is bad), etc.
5A-90 (Needs more work) Convert voices into those which create the feelings of: passion, friendliness, energy, intelligence, impatience and the expectation that the listener perform their work well (studies show that speaking to people in certain voice tones tends to create better work results from them)
5A-91 the additional level of voice inflection needed to achieve aim. Additional level needed can be based on what the synthesizing equip needs to do, or how the singer with only their natural means needs to make alteration good for music education
5A-920 Modulate your voice on tel / intercom according to situations wo getting up your own psychological anxiety, eg: 1. up your volume, 2. sound more intense (create anxiety in listener)
-many don't bother to sound upset on tel (form of motivation) because it causes their own stress
for parents tired of telling kids to be quiet. Method #1: press desired button for wanted verbal announcement. Volume buttons - select easily with one touch how loud you want to be heard. UP outgoing statements. Method #2: device makes your voice louder so as to reduce your stress in yelling. Can be worn around neck too, or kept on table.
-different news broadcasts are available according to UIP (tel area code) too
-there may be other N related to this
5A-94 Voice Analyzer: recognizes voice's emotion and analyzes the feeling and or behavior of speaker. This is part of a larger product with other features.
<> Electronic translators: interprets/translates for user over "tel" lines.
-D: user=uk/mic=voice recognition system-clap-electronic translator-display=tel=tr
-Examples:
--uk/speaks desired words/text, then system will print out and or osc to party/c on other end
A2-140 TELEPHONE VOICE MODULATOR: mix w mind corrector, music selector, personalized CD. Too much or too little of certain fq need sound therapy. MFH listens to incoming and your outgoing voice. Get the therapies while you are on hold or when you ask for it or it kicks in (maybe - if you want) when needed based on your outgoing voice, or when co manager deems appropriate. Input personal info to activate. Can also increase feelings of seriousness, quality control, success...
End of Voice Modulator.
VR % = D: VR = mm-c-t 
WA % = D: wa = mm-c-t. G. WA (walkman) which is mobile/cordless tel.
MISC: Octel Communications Corp can be designated developer of additional R&D and manufacturer for any KN Telephony invention. They're in Milpitas, California.
END OF THIS' T SUB-PARTS SECTION
File: Features Intro / IMI * 5
TEL PARTS (FEATURES) *
Intro &: The applications / expanded additions of these Parts are found under the #1: Part's main headings; **#2: how the Part is used in other products and Parts.
ACCESS *A:
ANSWERING MACHINE:
ARTIST ** A:
BALANCE *A:
BVAA:
-The 'Confidencer' telephony product may be placed in "mic" so that U's sounds (voices) are more precisely analyzed. Confidencer helps block out noise generated far from "mic" (street noise, etc).
CIDA:
-CID is not restricted to just the trunk line # when receiving calls from companies (includes the specific # of caller too).
-since multiple people can call from the same tel ("T") # / trunk, highly sophisticated systems use BVA %[& any useful elements from uip] to help determine / decipher who the speaker is (from others using said tel ("T") # / trunk.
CAMERA (LENS)A:
CARTA:
CLAPA:
-manner in which U "claps" (loudness, voice tone, speed of commands (exemplifies IQ / knowledge of system)) effects how system will interpret U's UIP.
COMPOSITION **A:
CONFERENCE:
EDUCA:
-educational programs are tailored to uip. Eg the following are altered in the program: sound quality, graphics, intellectual content (menu choices / order of presentation), length of program. EXERCISEA:
FLOAT  **A: 
FS^:
-converts any MM image onto: paper, * stored electronic medium
GAME^:
INFORMATION SUPPLIERA: presentation utilizes EDUC modes
KA:
LOCATOR:
MFHA:
-stores (complex) data / programs. Eg: EDUC, "information supplier", BVA PR, uip
MICA: Connectable to vocoder
MOUSE;
MPA:
MULTIMEDIA:
MULTI-USERA:
NOTIFIERA:
NOTIFYING CALLA:
PDA:
PORTABLE:
PRA:
PRINTER:
PSA:
RA:
ROUTERA:
SA:
SCORE:
SOUND ANALYZER:
STEREO *A:
SYNTHA:
TDS *A:
TRANSFERRING INTER-SYSTEM TELEPHONY:
UIP *A:
-speed in which users k needed digits (as requested by voice mail / for extension #s) helps determine u's behavior. EgA: fast smooth entry is intelligence / familiarity w co or system, slow k being the opposite; uneven flow of entry is being unsure.
-Incoming calls on major networks are tagged according to Caller ID. The program routes calls according to information tabulated on the caller. Diverse applications, when properly utilized, are proven to boost company profits.
Sales Telephony (UIP)
Nationally advertised telephone sales numbers automatically route more valuable calls to appropriate sales people.
-Programming's many options let incoming calls to be tagged as needed. Examples:
-The caller's telephone number is matched against telephone numbers of past callers, or databases describing most telephone numbers nationwide such as by company size. Preferred callers are routed to staff with better sales skills, who may also be better trained in the caller's type needs. -Northern Telecom already routes calls in Canada to bilinguals according to the caller's region. In the US we can match calls coming from particular regions such as California or the South, with staff conversant in the caller's dialects and mental outlook. This is proven to facilitate rapport.
Tech Support Telephony (UIP)
Calls from customers with a history buying upgrades of the software are routed to better trained staff. Calls from difficult customers, or regions like New York are routed to staff with "hard phone skills". Verbal and data communication may also be routed according to the user's registration number, keyed in the beginning. Difficult callers can also be kept at the end of the waiting que longer.
-Results from extensive research on Telephony User Information Programming is available. Other systems developed by Steven Kays are being used by the Baby Bells and NTT.
UK^:
VISUAL ANALYZER %^:
VOICE MAIL:
VOICE MODULATORA:
VR %A:
WA  %A:
Telephony Q:
DID: direct in dial telephone number
Dead Air: no music while on hold
VOCODER: (type of "synth" where person speaks into system), benefits: voice sounds prettier (give voice fuller sound, give some reverb, remove some reverb, make it sound more gravely (sound is broken into bits)). Though more difficult the voice's 'attack' can be modulated too.
FILER: (potentiometer and tuned coil) filters out unwanted frequencies. But by itself will make voice sound like something is missing. This is part of vocoder.
NOISE CANCELER: blocks unwanted frequencies, and or blocks out excessively high decibels.
Lingo Q:
-caller:
-receiver: 
-while on hold
--put on hold
-call routing, according to: CID; system's database on CID; routing call within office during same call
CONCLUDES THIS FILE: FEATURES INTRO / IMI * 5 FILE
MAIN FEATURES File: Features Intro / IMI 26
Dec 2006 Version
OUR MAIN FEATURES FILE
For Updates & More Visit www.LicenseItToday.com. Tel (+1) 707-428-5000.
Introduction: This important file explains our features to a moderate level. Later more details can be read in our main features file. Features can also be viewed as parts or functions. * Later see table of contents for older and less used features.
THE FEATURES:
ACCESS = Gain access via a wide range of means to our electronic inventions. Methods include giving passwords, or having one's fingerprint analyzed. Like the word "access" suggests, it offers forms of Access include: Passwords, admission, having a license to use or produce an invention, connecting, contact. Having a license. Even visual scans of fingerprints, could be considered. For details on this and most of our other features, kindly visit the detailed features section listed in the table of contents.
ADAPTING TM = Invention determines what is needed, and then automatically 'adapts itself. A common example is when it 'adapts to the user's needs. It can also be called Tailoring or User Information Programming. Details in UIP below. Then more info in the detailed features section.
ANALYZER = An important feature. Like the word "analyzer" suggests, it thinks about what is needed, and reacts. In other words it is a system that attempts to match the human brain in making decisions. Decisions are made from a choice of preprogrammed possible 'reactions. It makes the needed analysis as designed. Using fuzzy logic, it takes on the needed functions of software, as would be needed to handle the applicable tasks called for. . For Techies: Forms of Analysis: estimate, 'predict, figure out, inspect, interpret, investigate, judge, resolve, scrutinize, %test, think through [the menu options], dissect, divide, audit,
canvas, formulate, [try to connect] 'associations [between digitized files representing real life matters], explore. See our Artificial Intelligence related files.
ANIMAL * = Inventions adapted for pets in a wide range of ways. 
Read Later: Things our features can do for animals including pets: 'Analyze them, and their 'behavior. 'Track them. Their 'behavior modified via: communicating with them; 'interacting; 'educating them; keep animal away from certain zones. See our folders for: pet inventions, 'behavior analyzers, 'tracking devices, etc.
ART / ARTIST = Optional software can alter images. Tailor pictures to your taste. A useful multi-media tool. Can automatically edit images as programmed, or system can help 'guide user in altering images. System's 'Visual analyzer with wide powers, determines the characteristics of the image to be altered. Later read more details in the detailed features section.
ASSOCIATION / ASSOCIATE / ASSOCIATED / MATCH =
Like a human brain, it makes associations between multiple situations. A form of artificial intelligence relying on fuzzy logic. Look at it like a clever system that can find commonalities and connections between any two or more things. How do you use the terms in your vocabulary? That can be how we also define this useful features.
.  READ Later: Functions like how a human or *animal draws associations between multiple things, people, actions, characteristics [experienced by five senses ('sensor)].
.  Associative Memories [Al]: Example steps: At Home: 1. Owner's dog barks too loud or too long while owner is home, while UIP system and dog are at home. 2. adapt draws auto-associative memory, by matching what its 'sound analyzer hears. 3. adapt (UIP) slightly punishes dog. Out in Public: 1. System 'senses it's outside the home. 2. adapt (UIP)'s 'sound analyzer determines some dog has barked. 3. Via hetero-associative memory it realizes there's a dog. 4. Via associative memory it determines it's the owner's dog. 5. adapt (UIP) responds to owner's dog barking differently than when at home.
BA / BEHAVIOR ANALYZER / *BVA = Behavior Analyzer. This important feature uses multiple means in determining the behavior of who or what it is kindly observing. This information is available to the system that wishes to 'adapt a function for the user's tastes. See the detailed features section.
BALANCE / BALANCER TM = Inventive way in which audio speakers balance their volumes so you feel you're still in the middle (sweet spot) as you move around.
C = See "Computer"
CAMERA / LENS = The system's electronic eye and visual recorder.
Read Later: 'Tracks and 'analyzes changes in its visual fields. It's 'visual analyzer feeds information to: 'behavior analyzer; 'notifier; other' analyzers; activator of function when 'designated [visual] occurrence has happened. Lens adjusts itself to best capture visual activity, e.g.: for distance, 'tracking moving object.
CART / CARTRIDGE = Just imagine a cartridge that gives needed functions just by popping it into an invention. It can be software and or an automatic license.
For Techies: Any of our electronic invention numbers / functions are [also] [un]pluggable. Connect/unconnected/activate an invention as needed. 'Cartridges are a [type of] 'node in the unity of inventions' system. Cartridges can be inserted/connected into the [invention's] [sub] system. Can contain useful software / databases / features.
-'Customization: Use cartridges 'customized to the 'designated function; and or the 'cartridge has the 'customizing features built in. Can require 'access [passwords / licensing privileges to activate].
CHARACTER * = Animated graphics used in software.
Read Later: Characters portray: "moods", personalities, facial expressions, facial / body movement. See: + "Edits" "Images"; See "S" for other details. A 'game 'entity [normally not a live person themselves in flesh].
CHARACTERISTIC = Facets that differentiate something. How do you use the word "characteristic"? Read Later: The distinguishing traits or marks [from other 'inventions, 'game entity traits], idiosyncratic traits are more distinguishable, what comprises the 'entity's or 'invention's character, feature, disposition, unique ['mood, 'editing, form of 'education or 'guidance.
CLAP * = Clapper. Activate electronic features by your making sounds. Each combination of sounds from hand claps or verbal sounds/speech controls a different function.
.  Read Later: Allows user to control invention without touching. E.g.: via clapping or verbal commands -> mic -> sound recognition system -> c (computer - in center of system) -> activates function. Also: voice recognition recognizes human speech (follows spoken word's commands).
COMMUNICATE = Imagine people and or electronic inventions communicating with each other. Read Later: When any two or more people, other organisms, and or devices communicate with each other in any way. Modes of communication include: 'OSC (outgoing sound communicator) might speak words to a human, Electronic 'Transmissions, Signals, Something experienced by any of a person's or animal's five sensed (sounds or flashing light - see Pet-Communicate sub-part), 'Notifier, etc. Normally some 'reaction is expected in the counterpart of the communication, as there could be a purpose to communicating.
COMPOSE = What sounds might you like to compose? Or would you like an invention that has learned your tastes, to then synthesize something for your tastes? Do you prefer having more or less than normal levels of bass or treble? It can even talk to you like a favorite actor. Electronic Music Composition: The product can also be used to create interesting music or sounds.
+ COMPUTER / C = Computer. Central processing unit of this system and its inventions.
CONTENT ANALYZER /CA=
System determines the nature of a substance. Think of a substance you would like to have analyzed for its contents. Remember the world has a wide variety of ways to analyze just about any type of contents. They range from X-Rays to soil test equipment. They also include our Sound Analyzers (SA) and Visual Analyzers (VA). Also: our Smell Analyzers, Motion Analyzers and *Taste Analyzers.
.  READ Later Rest of this Central Description: 1] Physical content 'analyzer: CAT Scanners, X-Rays, Scales*. 2] Database content 'analyzer: Types of 'databases analyzed include: ba-db (database); track-db (database). adapt (UIP) DB development is a type of 'Content Analyzer. Applications: develop adaptation (UIP)-db (database) or adapt (UIP)-tailor.
COORDINATOR = This feature coordinates different parts and aspects inside the electronic system. Human beings naturally coordinate themselves, like their eyes, posture, hands and brain as they read about interesting inventions herein. Feature examples: 1. If a music synthesizer's volume goes up, it may refrain from allowing the bass to get too strong, to avoid damaging the speakers. 2. Windows close automatically when it gets cold, but if a flowerpot or something is accidentally left on the windowsill below where the window is coming down; the window will only close far enough as not to cause damage. 3. It determines which functions are more valuable for the person, and 'tailors accordingly.
CUSTOMIZE = Same as 'Tailor, 'Adapt, and 'adapt (UIP) (User Information Programming). The terms 'Adapt and 'Tailor are better than 'Customize. The latter is used as the term can shorten the text descriptions, because they require fewer accompanying words, e.g. "customize" is shorter than "adapt to the user" or "tailors it for...". Don't get stuck on the word "customize", stick with the "Adapt" concept.
D TM = Figurative Drawing. See the Figurative Drawing file that explains the easy codes
used in our drawings. Drawings were frequently called Diagrams up to 2006.
Read Later: The term Diagram: May also be represented by "dia" or "diag" or "diagram". Also see "Tel" part. * Telephony is the old and rarely used abbreviation for "D". The old definition for D was telephony. [Since "D" for diagram is easily verifiable due to context, e.g.: it normally was followed by a colon and then diagram with parts lined together with the "=" symbol.] Please see "T" for the definition of telephony.
DANCE * = Things are triggered by how you move your body. A motion sensor interprets how you move. Imagine having sensors on your body's appendages; then a computer could see what was moved.
.  Read Later: Sensor 'guides user in proper body movement for physical therapy, or for learning golf swings, etc. Movement of body / device% generates sounds. Includes Yamaha's Miburi, which copies KN.
DB = Database. Stores needed information: as short or long-term memory files. Database is important in the systems' 'analysis functions.
DESIGNATED = What has been selected. Refers to a scenario falling within a specified range. It's used much like the definition of "designate" in any dictionary.
-Examples:
-- 'Seek & react uses 'designate to 'seek some occurrence or state of being within a [pre] defined parameter. 
-"Access" allows designated passwords
-"Behavior analyzer": designated behavioral profiles
-"Education": system seeks designated information user needs to study (from internet).
-"Visual analyzer" seeks certain images
.-The software 'program's parameters need element(s) within bounds of designated characteristics.
-Diagram: input - electronic signals ->c (computer)- (designation criteria analyzer) = next step: after designation criteria are met following action can occur.
DIAGRAM = See "D" for Figurative Drawing.
DISTANCER TM = Signals or system responds whenever any two or more parts: separate or touch or alters in certain algorithmic domains of time or space. 'Notifies when certain algorithmic functions have been met, eg: separated by certain distance; for longer than specific time spans. See +Positioning System, and +PS-Zone.
EDIT / EDITOR = Alters text and graphics as desired. Can be done automatically as programmed. Sample alterations: insertions or omissions; highlighting; rearranging.
.  Read Later:
-Benefits of 'Editing: 'Tailors data; Helps 'artist and 'education process.
-Toggle Multiple Cut and Pastes. Cut and paste the memory of several different elements, without memory loss after a pasting. Toggle between pasting/activating multiple elements. Toggling controlled by 'edit, 'educate, ADAPT (UIP) Tailoring. A separate function controllable by human user.
EDUC / EDUCATION / EDUCATE = Teaches the user what is designated. Can teach user how to utilize and benefit from features. Software based training.
.  Read Later: Educational: also used as optional learning program or experience. Teaches skills (via separate software tutorial mode). Overlaps 'Guide functions.
-Educational: can also be used as a learning program or experience. Teaches skills (software has tutorial mode). (Helps) replace human instructor. 'EGH [Educational Gets Harder] is subset of "Educ".
EGH * = Education Gets Harder. Compensates users for their improved performance. System remembers user's performance and makes itself more or less challenging accordingly. See 'TGH (Therapy Gets Harder) and 'Education files for details.
ENTERTAIN / ENTERTAINMENT * = Users can also derives pleasure from invention.
ENVIRONMENTAL PROTECTION / E.P. = Our system hopeful can monitor itself and or the environment. It may adjust itself for greater EP. Analyzer uses sensors to determine what's happening. It 'seeks and reacts to designated situations.
EXERCISE ** = 'Guides and allows user to use invention in a novel way for exercise and good health. Also might function as helpful companion, guide, or rule setter in physical exercise. 'Score's person's movements. . Read Later: Also might function as helpful companion, guide, or rule setter in physical exercise. Drawing: 1 -> 2 -> 3
-For Techies [OTD (Other Technical Details)]: u (user) moves from body posture/point I to 2 while user is interacting with product both in 1 and 2; 3 person continues exercise (123456...); system is good for person moving about in at least a minor fashion, though not necessarily requiring strenuous physical activity.
-"Billing": bills. *See: Access' Features for Motion and BA (Behavior Analyzer) (behavior analyzer): type motion= matches needed behavioral profile to gain "access".
-Type motions ("scored" (via "sensors")): "Dance"; Vibration (KN); PS-Zone; Access' "Motion"; How object (made (by u) to "Float".
EXPERIENCE = Person experiences part or all of system by their physical senses. The joy of the experience is one of the invention's many benefits.
GAME = Common definition of game. Videogames. Arcade, computer, electronic, mobile and wireless gaming. Also potentially playable on [mobile and wireless] computers, NintendoTM, PlaystationTM, XboxTM, and or our 'designated invention [hardware]. Inventions have additional 'game related functions. See our many game invention variations in the games folder.
GPS / PS (Positioning System) = Global Positioning System. Studies any movement of one or more objects/parts in relation to any physical or time grid. Movement is correlated with other databases. See 'PS (Positioning System).
.  Read Later: Receive 'guidance for what you do and where you go. For example, our GPS Controlled Headlights: 'notifies what's coming up, eg; curve in road. Tells users which way to turn. Or communicate any information as programmed. Light/sound/vibration can be emitted in any way [to driver/passenger(s)/back seat drivers].
GUIDE TM / GUIDANCE = Acts as the user's personalized guide. Helps users learn how to use the invention, by 'tailoring the guidance to the user's interests. Helps users in way they will better understand, especially in areas they need more help.
.  READ Later:
-Examples: 1] Suggest how best to use system to match user's particular requirements, traits or preferences. 2] 'Educates how to use system. 3] Knows when and how to prompt person so they can better use and or learn system. . 'Tailors itself to user's unique needs: each user and situation or task is different.
-Suggests how users might proceed [when stuck or having other trouble (with system)].
-System guides / prompts users for when / how (w5 (what, where, why, when and how)) they can be "educated".
ICON = An image on a computer screen. It represents one or more features that can be activated when clicked.
IMAGE = A graphical depiction on a 'screen. 'Artist and 'edit can alter 'images. 'Icon is a type of image.
INTERACT / INTERACTIVE / INTERACTION % = Interactivity. Interactive system.
How system responds to person. Useful interface offers multiple ways to utilize invention's features.
.  READ Later Rest of this Central Description: System's advanced alternatives can approach virtual reality. 'Tailors itself to better interface with user(s) so as to: be easier, or more exciting to use, or better help accomplish user's desired task.
.  Interactive modes of Activation: Activates a signal via one of the following methods without touching a button. User activates via remote mode, eg: user makes vocal sound, clapper, activates a distancer), touches a computer screen.
.  Interface covers: How person and system interface 'seek and react to each other, focusing on the system's functions. Manner in which user interfaces with system. How system "reacts" to "user" / how "user" "reacts" to system.
K = Keyboard. Person inputs any type of information via whatever electronic means. This feature (also viewed as part) can be replaced with 'Remote Control part.
*  "Interactive" Images: for computers or interactive screens: Can use "interactive" keys or icons (on 'screen).
KN = One of our inventions in this or previous patent filings conceived by Mr. K a y s.
*  Invention shows that we have the same or similar invention. invention is a subset of N (one of our inventions). N = Inventions in this or earlier filing, and or other's inventions and non-patentable products.
LICENSE / LICENSEE / LICENSOR = Having 'access to 'designated features.
*  'Billing: User/'Licensee is normally 'billed for payment, based on 'access related criteria. Payment [can be considered 'Royalty]. 'Tracks licensee [usage level (in 'designated 'zones/market regions)].
LOCATOR / LOCATE * = Locate what you seek, and it can be found. Uses GPS and other positioning systems to identify where something is based on its tag.
.  READ Later: Shows object's location (or person its attached to): Correlates an object's location in relation to that of other set objects, eg: other 'positioning devices, (fixed) location 'sensors. Shows location. System's receiver (A) identifies the location of its related electronic devices (B) which can be separated.
M / MFH = Mainframe computer is connected to system.
MATCH: See "Associate"
MIC / MICROPHONE = Microphone records sounds onto microchip or tape. Such sounds can be studied by 'sound analyzer and used as 'designated.
-Microphone adjusts itself to the direction and distance and type sound, to maximize record ability. 
MORNING * = Morning alarm system. Be notified in creative ways.
Also functions as a creative morning alarm.
.  Read Later: Uniquely wakens up the user such as via morning alarm, next can require them to act in some manner to bring them to full wakefulness, eg: by requiring some intricate task [on their personal computer] to deactivate alarm. A common piece of hardware for the software is the popular P.C. Can alert one at any time, and might require a novel way to deactivate in a special 'order & timing. Drawing: tds/uk/remote =c (computer)= alarm.
MQ * = System asks person questions, enabling itself to be better adjusted to person's needs. Is an instructorial 'guide)for user; with help menus. MQ's analyzer studies behavior of user so as to better enable itself to gain information 'designated as being helpful for user interface. This is a sub-feature of the 'Adapt feature.
MM / MULTI-MEDIA = Exciting audiovisual effects. Great for the invention's interface. Enhances the user's experience of the invention's many features. Sounds, graphics, typeface and other images are 'tailored to interest the user.
MULTI-USER = Invention adapts differently to each user, which is why it's called Multi-User. Each user can achieve a different benefit and experience, as those features, which are needed, will be offered differently on an as needed basis.
.  READ Later Rest of this Central Description: System is programmed to differentiate between multiple (u) users, and 'tailor itself to each different user's needs. Each u (user / person) is differentiated from others via their: physical characteristics, 'BA (Behavior Analyzer), 'access code.
N = Inventions in this or earlier filing; and or other's inventions and non-patentable products.
NOTIFIER / NR= User is notified when something happens. They are alerted to the occurrence of any designated event. Determines the nature and degree of urgency, and how best to alert the user.
.  READ Later Rest of this Central Description: U (user) is nr (notified) via: sounds, lights, information on computer display, vibration (of device touching body).
-'Tailor or users 'designate what: occurrences cause the 'notifier to 'react, and 'W5 (what, where, why, when and how) are notified.
ORDER & TIMING / O&T TM = It analyzes patterns in the order for how events occur. Different patterns are interpreted separately from other patterns. For example a slow beat of drums differs from a fast beat. Each pattern triggers a different event. The world of events is filled with such patterns. These patterns along with what the system may pick up by way of its available sensors help it analyze what is happening, so it can react accordingly.
OSC TM = Outgoing Sound Communicator. Audio function. System's speakers communicate with users in words or sounds. System tailors its communication to the user's listening abilities and preferences, e.g. offers higher volume when the Sound Analyzer determines there is background noise.
OTD * = Other Technical Details. What can maybe be read later. Usually for those interested in the technological aspects. This term is simply a header used for the parts. "For Techies" can be the same as "OTD". Later read more about it in the introduction.
PD TM = Positioning Device. The element whose location is being identified. GPS is one way to track positioning. Portable unit(s), which broadcasts their location to PS (Positioning System). See: PS.
PORTABLE * = Portable. The separate portable version can be half the weight, and twice as compact, and shock resistant as non-portable variations. Can be used as a Walk About invention.
For Techies: Drawing: c (computer) = battery = protective casing around product = handle
.  'WA strap: use the product while walking about, since the strap will hold itself in place on user's: upper leg, upper, lower arm, waist (use by just turning head down), necklace, or shoulder strap; bp. 5E090 Wireless terminals connect to central system.
PREDICT TM / PREDICTION = Software predicts what will happen or how user will act. Its analysis of past action patterns, allows it to project future likely patterns. The more information it has about past patterns the better it will predict. Anticipating likely future occurences better enables the adaptive system to manage future situations.
READ Later:
In other words, likely occurrences, or behavior of others are anticipated, better enabling system to respond to or handle predicted situations.
-For example feature can predict: 1. what type of 'guidance user needs to become better 'educated with the feature's abilities. 2. Profitability from licensed inventions. 3. Ability for this patent application to maybe stop an infringer from using our ideas, e.g.: this application might show ten, one hundred, a thousand or more examples for how we describe our invention in our link structure.
-Prediction works via 'analyzing: 'order & timing; behavior; adapt-db (database); ('scored) +patterns; other algorithms.
.  Prediction algorithm: Step 1] collects historical information. Step 2] identifies (past) patterns, especially searching for parameters as 'designated. Step 3] determines present and or future (known) events or parameters. Step 4] Fills in the missing elements of step 3 with multiple predictions for each slot. Step 5] each filled in anticipated scenario from step 4 is 'analyzed and 'scored for the likelihood of its occurrence (as in steps 2). Step 6] each prediction is 'scored for likelihood. Step 7] prediction may opt to use the prediction(s) with highest 'score(s). 8] Designated functions are altered accordingly.
.  Likely behavior of others (in real life) is anticipated, better enabling designer of (kn) system to make their system respond to or handle predicted situations.
PR / PROGRAM = Program: User and or manufacturer program the product's computer software.
PS % = Positioning System. A general term covering many of our features. It uses 'Locators to identify something's position. Locators rely on a 'positioning device like a mobile GPS unit to read where something is located. Then this information can be sent wirelessly to the greater positioning system.
PS-ZONE TM / ZONE = Studies moving things within a zone. Permission to use an invention can be zone restricted. For example one may have 'licensing rights for a wireless invention in Munich and Silicon Valley's Palo Alto.
Read Later: 'Analyzes the 'location of 'positioning devices, especially in terms of when and what (w5 (what, where, why, when and how)) they are doing in the 'designated zones. Limits or allows 'access to 'designated functions according to the zone of user and or what's attached to the 'positioning device.
Q / QUESTION / QUESTIONNAIRE = System asks questions to get needed information. System asking person questions better enables adapting it to the user's needs. User can ask system questions, such as via a software help menu.
READ Later:
.User / System asks questions to each other. See U (user asks system questions) & mq (manufacturer asks user questions to adapt it) functions for details.
R = Remote Control. User can control the system either via remote control, or keyboard.
REACT / REACTION = Subset of "Seeks & Reacts".
REMOTE = See "R".
ROUTE / ROUTER = Imagine a phone call getting routed through an international phone network. Users can also be routed within a system so they can access its desired features. Packets of data are sent where designated within the system.
Read Later: Software Routing Method. System analyzes user's needs and routes them to the designated points, eg: on information highway, or to designated files or programs within system.
S / SCREEN = Display Screen. There is a touchscreen variant too.
Read Later: Machine displays data on display ("S") screen. Display screen may also be "interactive" touchscreen (screen can function as keyboard "uk").
SCORE / SCORES / SCORING = Imagine a soccer or tennis game. The software keeps score. It scores just about any event that can be quantified. Example scores: 1. Users can score how well an invention adapted for their needs. 2. The system can score the likely chance that a user is actually hacking into the system based on their behavior profile. More.
Read Later: Invention can score numerical quantifications of a product; user's performance; or 'status of situation. Definition overlaps function of "Status". System reacts according to how good a score is, for example it may consider something with a high score more important.
SEEK / SOUGHT = Subset of "Seek & React"
SEEK & REACTS / S&R = System seeks designated occurrences, which intern triggers an automatic reaction. There are two steps: First the software seeks a designated occurrence, then it responds accordingly. It's like having a friendly butler to handle matters as things come up.
SENSOR(S) = Uses any available sensor to determine what has or is happening. Sensors can 'score for the presence of certain chemicals. The motion sensor catches movement in the area. Thermometers and other meteorological equipment are also sensors. Many more sensors exist.
SA / SOUND ANALYZER / SR / SOUND RECOGNIZER = Imagine having your ears in remote locations. And imagine your ears could interpret what happened for you while you are away. This is what the sound analyzer does. There are many benefits, for example: the system can react to an event based on what sounds it hears, such as turning on the lights when it hears your hands clap.
Read Later;
.  In other words it 'Analyzes sound. Database memorizes tens of thousands of possible sounds. Analyzes type sound by frequency, volume and or direction and distance of sound source. Type sound generates a feature that initiates corresponding function.
.  Tagged Cascade Effect 7J08: System hones in on a frequency (sound), then cancels other sounds making tagged sound clearer. System 'reacts when the 'tagged action occurs. Hones in on anything effecting man's five senses. 'content analyzer, 'edit, 'seek & react, 'tailor, 'visual analyzer.
SEARCH & REPLACE* = Imagine a text editor's search and replace feature. More specific examples include: 1. A child reading a storybook online has their favorite color green inserted into the text to replace red, when descriptions of toys and other inventions come up; 2. Features in this system driven by software, can have its code edited; resulting in its being better adapted to the user's needs.
Read Later: Aspects of database or other software elements are altered.
.  People who happen to have dyslexia can have text 'edited so it is easier for them to read. Each person probably has different reading difficulties such as with specific characters. So system adapts accordingly. Kindly see our Search & Replace file that was in the introduction.
.  'Edit or 'Tailor alters how sections of computer, DNA or chemical code are 'Searched & Replaced. The suggested formula is 'tailored to the designated need.
SOUND VISUAL ANALYZER / SOUND VISUAL RECONGINZER %* = Imagine a laser beam bouncing on a screen based on the music's rhythms. It converts sounds to visual effects. Or conversely it can convert visual effects to sounds.
STATUS = Would you like an automated attended to tell you the status of a current situation? It is cheaper than hiring a live person. The feature determines the status of something based on what scores have come in. For example: This invention can see if a factory in Viet Nam is infringing on its inventions and to what degree by scoring the volume of its exports. Export figures can be obtained from customs houses in Europe, or even from investigators in the local country.
SW = Software Program(s). This can control what features are offered to the user, and how they are adapted. One can 'license software that is inserted like a cartridge.
SYNTH / SYNTHESIZER = Sound synthesizer. Received sounds are altered. "PP" & or "MP" selects the synthesizing program and how it processes sounds; microphone ("mic"). Sounds like music and verbal communication are "adapted to listeners based on their hearing preferences. Useful feature in composing music, etc.
T / TEL = Telecommunications in its various forms are available. Mobile phones (called "cell phones" in the US). Telephones, Internet. System and its features can stay connected wirelessly or via fixed lines.
TAG = Would you like to know what is happening to something when you are away? Tag it, and have it tracked wirelessly by your system. Details in the 'Track feature file.
TAILOR TM = See the 'Adapt feature, and discover how our inventions will tailor themselves to they adapt to the user's needs.
TDS = Time Date Stamp. Program memorizes, labels, and identifies timing of desired occurrences. It registers what happened.
TGH / Therapy Gets Harder * = Use can be psychologically therapeutic. Therapy machine helping people. Also, compensates for user's state of mind and or current personal info, and or condition, based on: what user keys in, are how well they scored in the previous physical therapy session.
TILT TM ='Remote Control Joystick. Otherwise confidential.
TR = Transmission: sending / receiving via: air waves / wire.
Read Later: Eg: radio waves, infrared light, copper/optical cable, tel line (whether wireless/wire). Drawing: * electronic product/feature = transmitter/receiver = transmitter/receiver = * electronic product/part. "Billing": bills for time used / "accessed", eg: like tel bill. This 'TR feature can also be referred to by the term 'communication(s)' when used in the electronic context. 'TR is a needed component, eg: for 4E020 Registrar. The equal sign "= " in our drawings (diagrams) shows where the transmission 'links can be.
TRACK / TRACKER = Tracking System. Tracks. System 'tags then tracks designated: person, file, and type activity. Can develop adapt-Database on what it is designed to monitor / study as studied element changes or moves. Software driven. Example: an intelligent monitor that tracks what files a person accessed in a computer; or other types of activity done by person. GPS follows where and how a person or vehicle travels on planet. Tracks a person as they try to gain "access", and what they do after.
TRAITS = Characteristics. Usually used as characteristics of a user, especially their preferences. What they want a system to do for them. See User Information Programming (adapt) on how it tailors systems to the traits of the users and or situations.
U = See User
UIP = See Adapt
UK TM = User Keys In Information. This combines the U (user) with the K (keyboard) feature. Or just call this feature "K" or "R" (remote control) as a user is needed to use either access method.
U / USER = User can be a person using the system. Sometimes another invention connects to our system, in which case the outside (less central to the overall design) can be considered a user as well. Usually it is the entity licensed to use the inventions and their features.
VA / VISUAL ANALYZER / VISUAL RECOGNIZER. The camera can analyze what is seen. Its interpretation of the image is sent to the automated system that can react according to what has been seen.
.  Read Later: Studies image thru its 'camera. "Analyzes" images. System determines what images are present, then system responds to images as programmed. It's 'tailored to 'track 'designated 'images. Visually 'Seek 'Designated 'Images. A visual version of the Tagged Cascade Effect 7J08 invention.
VR **% = Virtual Realty. Future use with virtual reality technology possible. User puts on goggles and or gloves and or body suits that let them virtually experience what a situation feels like.
WA = Walk About Portable version of the invention. Communicates wirelessly with rest of system and/or other systems. User 'interacts with it also as a portable way to 'access desired features (in main system). Can have optional headphones.
W5 TM (WHAT, WHERE, WHY, WHEN AND HOW) = What are the five most commonly asked basic questions in the world? This feature asks 1. What happened. 2. Where did it occur. 3. Why did it happen? 4. When? 5. How?
ZONE TM = See PS-Zone.
FOR MORE INFO ON FEATURES SEE:
Table of Contents. Files with more details on the features include: Features Appendix (often includes important but less central specifications and diagrams), plus many files devoted specifically to each feature. Then follow the optional links to other parts of this and connected patent applications. For updates and other information visit our site www.LicenseItToday.com
© CONCLUDES CENTRAL SECTION OF THE FEATURES / PARTS FILE
SECTION FOR COMMON FEATURES IN GREATER DETAIL READ THESE CENTRAL DESCRIPTIONS LATER
File: Access \ Introduction
ACCESS FEATURE
Access's Table of Contents:
Introduction
.  Behavior Analyzer for Access. Files: BA+, BA, BA-Auto, BA-SC, BA-Tailor, BA-IMI, BA-Pat, BA*. Common Features
Images Needed for Gaining Access
Patents and Keywords
Miscellaneous : Access *
Gain access to electronic product's function with the correct password or creative input. Use Our Masterminded Patent Application To Improve Your Security Control Ideas! Learn about our quick and easy licenses. Call (+1) 707-428-5000 www.LicenseItToday.com
There are many ways of giving access. Jump in and read how.
Forms of Access include: Passwords, admission, ability to approach / 'interact, connection, contact, introduction greater levels need greater passwords, permit, intrude, infiltrate, license, seize magic words for entry, correct password / keyword, abracadabra, secret sign ['image]. Permission to: achieve, buy, catch, collect, earn, gain, get, have, promote, secure, take, win [a 'game], recognition, parlay, pick [from menu], succeed to do something,
Any action a user can make and which is picked up by a sensor and intern converted to signals, such as: standing one meter from a heat sensor for 10 seconds, or blinking one's left eye twice.
-Any occurrence can become an access procedure, whether in life form; or life form that effects a "sensor"; or electronically generated occurrence. Eg: any "R" or "K" or "Artist" invention is also utilized for generating (in unique a manner) signals, which are subsequently interpreted as passwords. Examples of ways listed in Access' Features (Parts).
-(The term Passwords includes: Accessor's Changeable / Common Behavior Profiles)
+p--The untrained illicit observer may not realize there are actual signal occurring functions designed to gain "access", and even if it was noted, it may be difficult to log such actions by accessor short of having a motion camera. Required actions from accessor especially focus on those less readily capable by observers and hackers. Examples: body movement or behavior or work actions that may seem somewhat ordinary or which don't catch special attention. Password procedures may seem as slightly quirky behavior by observers, but possibly special notice wouldn't be made if the procedures are camouflaged - see "Hide Access Procedure".
-The largest Features (Parts) of "access" (as of 9.96) were analysis of images drawn, and analyzing behavior of accessor. Details of most access Features expound therein as well.
-"Morning alarm" introduction: This is only one of the many applications for "access". "Morning alarms" are systems created to uniquely waken up the users, and then to require them to acting some manner to bring them to full wakefulness, eg: by doing some intricate task on their personal computer. If necessary, "Morning alarm" can be ignored only to better understand the general natures of "access".
3C292 Magical Building Blocks: Each combination has designated results. See 3CE file.
-A 1-290-121001 Finger Print Reader: Analyzes a person's behavior by their fingerprint. Also matches couples with compatible fingerprints. Related to existing "C" systems based on horoscope, blood type. Similar products exist at least in idea form, see "Popular Science" new products section for an issue in '94 - 4/96.
* The UIP (user information programming) of user can change from data collected via "tracking" sys. % "Camera" = "Track", % "Sensor" = "Track". Tracking by "C" originated signals (eg: what u (user) is doing on el (electronic) sys (u=k=c)) is favored tracking mode, and cheaper to produce.
.-"Router": locates then= retrieves needed data= for this part.
ACCESS For Medical, & Biological Research:
**  = Gain access to electronic product's controls with a correctly keyed in combination.
Each subject (patient/element being studied/user (human/animal/virus/%bacteria/%plant)) has a separate code. -Each subject has its own way of triggering the code. Examples:
-human keys in code
-characteristics of subject are determined (via sensors / uip), these characteristics hence trigger one or more applicable codes.
--Drawing #1: 1 characteristic (changes / identifies identity of subject) = 2 sensor = tr (transmits) (transmits) = 3 analyzer (uip) = c (memory).
--Drawing #2: DI = tr (transmits) (transmits) = signals (electrical / commands to control or change (electronic) device which is designed to = effect / alter the subject = 4 change(s) in subject = sensed via (D1) sensor = D1.
4: characteristic, egA = (physical state or change (chemical, color, temperature / type and or quantity of viruses present)).
4  = function of viruses:A speed of multiplying / deactivation / movement (speed / where to and from) /
4  = characteristic of larger organism subject hosting smaller virus subject(s)
4  = chemical state of subject (larger host / viruses) A: Ph / blood contents / temperature / sweat contents
This and other password generations can be utilized for training
animals. Invention can cross borders of language, culture, age, intelligence, physical handicap, and sometimes even (mammalian/farm/pet) animals.
2B090 Sound Art: Convert sounds into interesting (two dimensional) shapes and colors. Program how a sound is converted into an infinite array of possible graphics. Images also dance live to the user's tune of sound generated.
-correct moving image= access: u (user) is able to see how their sounds are generating the required ('images), allowing better sound control. Visual representation of sounds is easier for U (user) to gauge and make any needed corrections.
-see 2B090 for details.
.  PATENTS: key word search of US abstracts 1.74-1.97 www.qpat:
-(sound music) and (interact dance convert alter move) and (image picture color)
Al-540 Touch Card: Matches people's finger prints with their credit and identification cards. -Checks the right person is using their card by matching fingerprints. Applications: credit cards, ID card systems. -Can take fingerprints of those registered with (inter)national agencies, then you might also type a code, which helps "C", find your fingerprint more readily and as a safety precaution too. It accepts those who are sending their payments in time.
-use when using credit cards or other cards or other situations/products
-eye in machine can ask person to put their finger there and compares print with its memory.
File: Access \ Ac-BA +
COMPUTER HACKER BEHAVIORAL ANALYZER & TRACKER
This file covers ac-ba ('Access - 'Behavior feature) elements labeled with "+", then edited from there.
Abstract: The unique Hacking Behavior Analyzer catches hackers. It 'analyzes how a hacker's behavior deviates from what's expected from the legitimate password holder. This software invention is a defense against internal and external infiltrators with the [correct] ['access requirements (passwords)].
When issued, each password is scored for the level of security clearance permitted in each subject category. The built-in flexibility of the software saves security's man hours by occasionally allowing minor transgression into designated files deemed slightly sensitive and of possible use to the legitimate password. Hackers are flagged ['tagged] and so 'notified to the security system when the user accesses information [well] out of their password's normally permitted usage. The level of permitted flexibility to transgress is built into the password. It can be the live or automated security guard that determines how to handlel'react such a flagged password user.
Passwords later associated with minor deviant behavior (by the password user) result in a lowering of the password's security clearance. More serious deviation results in revocation until the password holder can pass diverse tests to authenticate themselves.
'Customization: Greater 'tracking is made upon user's whose 'scores suggest they're more likely to be illegitimate. System can 'react by offering traps that suggest user is getting information they need - as system 'tailors what they are fed. Links can be made to other 'tailored [patent applications] inventions/features. Manner in which our features 'interact with [illegitimate] user is designed to: 'tailor user's needs / entrapment / 'tracking. -Data user gets/transfers is 'tagged [so that it continues to be 'tailored to the user / what is perceived as the user's belief for what the [stolen] 'accessed feature possesses. This data can become legally authorized software like virus [which leaves a trail] that can hopefully later be deactivated if/when time is right [hacker apprehended along with their accomplices]. This patent application need have no mercy for deceitful entrepreneurs.
Additional examples of deviant behaviors of password users include:
-the password's behavior (user utilizing specific password) in non sensitive areas is found to be deviant (very difficult for outside infiltrators to hide). In other words, the behavior pattern does not match up with their past behavior patterns.
-Caller ID doesn't recognize caller's location.
-Outside infiltrators may wish to reduce their risk of the system noticing a simultaneous use of the same password. They may seek access at odd hours. Hence unusual access times when the correct user is usually not on the system, drop the password's score for legitimate usage patterns. In other words the number of "suspicious points" is accumulated by this behavior.
-System scores hundreds of other subtle deviant behaviors.
Hacker Behavior Analyzer can be compatible with numerous existing security systems, to both protect valuable information, and free security personnel for their less automatable tasks. The hacker's inability to necessarily know that a required behavior pattern exists, let alone function within its intricate patterns, makes this patent pending software an essential safe guard.
End File: Ac-Ba +
File: Access \ Ac-Ba
"ACCESS - BEHAVIORAL ANALYZER"
Introduction: System determines user's identity by their personality profile, in other words their pattern of behavior on an electronic device such as a computer can be analyzed. System replaces a human sentry, which can permit access and determine if user's behavior is appropriate. Also uses fuzzy logic.
Learn about our quick and easy licenses to access inventions for your use. Call (+1) 707-428-5000 www.LicenseItToday.com
The 'Behavior Analyzer Function: The software can automatically block information from the accessor. The differing behavior profile of each accessor, results in a scoring for how pertinent sensitive files are to the accessor, enabling the system to block information deemed less pertinent.
The Sensitivity Rating Function analyzes the system's files according to how it was initially categorized by security personnel. Files are categorized by subject, level of sensitivity, etc. This automatized screening system can also analyze contents via: key word analysis, and how the information is being utilized such as by whom and for what purposes. The Sensitivity Rating Function tracks changes in the file's content or usage to automatically determine if an increase or decrease in the level of security is needed.
+ Do: Take material from UIP.
The task at hand previously required excessive man hours. However, since no automated system is perfect, any of the system's security features can be programmed much like before, or overridden by the designated system operator.
Values:
+-makes the access sys more mysterious for hackers. More hurdles.
-Requires considerably more knowledge about: legitimate holder of password, how company operates. Hacker must also play act well above and beyond what they would normally prefer doing by pretending to use password legitimately. Limits the scope of potential hackers to those closer to understanding both the correct behaviors and access' scoring system. Yet none of the above is good enough if scoring system is tight enough.
+-potentially less cumbersome or annoying for legitimate users. Fewer access entry hurdles have to be consciously driven by user to continue access, if sys monitors their behavior.
+-Employers can more readily disguise their wish to limit access of (previously) legitimate accessors by stating: sys down failure, or the "ba" sys didn't work properly (due to incorrect uip=db).
+  Censorship: Limit what accessors can read or "interact" with, eg: parents limiting the "entertainment" and "games" children experience, by their subject content. Other types of "restrictors":
--By limiting sensitive material to area accessor is interested= accessor becomes less suspicious that material they view has been "edited" for them: Eg, customers, investigators, stockholders and journalists seeking to study organization's materials: cut out subjects that are sensitive / what journalist via their password may "seek".
++ Inversely:
Manner in which uip-tailor functions can also be a form of access control, in that functions and material not presented are also a form of uip-tailoring. ba ('behavior analyzer) can either "seek" what accessor Needs or is permitted To View; both being similar.
-In other words: access=ba can "seek" / "edit" information for accessor. This is a form of UIP-Tailor. Saves user's time.
-Also uses internet's sw ('software) that "seeks" "designated" news / other material that appears later on www. -BA knows what accessor wants to "experience" W5 = uip-tailor.
-See: "artist's" "cut & paste"; "edit"; "seek"; key word "seeking"; ++"uip-tailor".
. "Education": correct behavior taught to accessor= thereafter such (correct) behavior required. Needed "education" determined by accessor's behavior.
.--Morning alarm: "designated" "reactions" from u (user) are "educated"= so in future u: more readily responds to alarm (in positive manner); teaches them new skills.
.  Tamper Alert: System "seeks" unusual / unauthorized (re) programming of sw. MP.
.--morning alarm: legitimate user can't readily deactivate alarm so they can continue sleeping. Eg: reprogramming not allowed during wake up time period.
.  Multi-User: Each accessor has differing access procedures, and safety protocols, and "access' ba".
--morning alarm: each user required to deactivate alarm in their own uip-tailored way.
OSC (outgoing sound communicator) is used to elicit "designated" responses (behavior) from "accessor".
Additional Applications: See *"Game". Likely hackers= trigger (closer) monitoring= from "tracker".
+ Learning from behavior of previous hackers: The system protected by "access" is statistically more likely to get future hacking behavior= related in style to previous hacker activity.
-The behavior of previous hackers= is watched more carefully by "track". In other words: score is tighter for such behavior / "routing"= if its seen again.
How "Artist's Writing Instrument" is used = access-ba. deactivate morning alarm:
Material that is deemed restricted (for "designated" password) can't be: copied, transferred, printed, *viewed, *"experienced"= wo (without) higher level authority.
A computer system's table of contents has sensitive information blocked from "designated" accessors. 'Behavioral characteristics and or 'user's security clearance 'score can be integrated with a [private co's or credit rating agency or government] data base of people:
-employer helps determine safety in issuing security clearance to 'designated users.
-employer's info shared with the data base service can:
--help determine employer's and database's 'analyzer in determining the 'user's new/changed security rating score. --help data base bureau's data bank, like Dunn & Bradstreet which sells credit info, but also collects it from the same clients.
Spell Checker: the same people often make identical spelling errors. Helps determine if correct party is the accessor.
The language interface requested by user can also be useful in matching the correct user. Eg: A French accessor's password states their language of preference; and a 'notification will be made should a 'Spanish or 'Russian interface ever be made [and then actually utilized [for 5 minutes - need to maybe give allowance for the curiosity seeker]].
Issue is there are two Features to KN, one scoring accessors, the other scoring the information.
3E061 Motion Tutor: 'Guides users to improve their movements, eg: the correct level of movement gains 'access. System assumes user's movements will either change or improve over time.
END AC-BA FILE
File: Access \ Ac-BA-Auto
FILE AC-BA-AUTO
6B240 Driver Identity System: driver with key can only activate car if their body weight matches car's memory. Owner programs car for one or more driver weight settings, or changes in weight.
-integrates with any other 'sensor or related 'password function needed to activate a device/vehicle. EG: 'va, 'sa, finger print sensor.
-'notifies U (user) of weight gain/*loss; motivating them into better health. Uip/Bad/increased/any weight/health condition might have device suggest user walk (more) (to [nearby] destinations instead of driving).
.-physical dimensions (eg: body weight on driver's seat matches car's "C" memory): uip, access.
-"PR": 1] Car owner can easily program a change should they wish to add or delete a driver. Eg: stop allowing your son to use car during school hours (access = timing device).
*-  should driver's weight be changing and edge closer to the set permissible parameter, a warning sound and or "S" or light goes on to notify them of a needed change.
*  changes  can also be made via keying in special difficult to crack secret code 
.-The system measures driver via one or more of the following: approximate weight range, and or general physical appearance (eye, hair, skin color, height while sitting, etc) match car's "C". "Visual Analyzer"
.-if weight is the measuring device, it will limit the degree to which a person can experiment by adding additional weights. That is the weight can't keep going up a little at a time with the ignition then starting. Real driver(s) must be in normal sitting position to activate car, thereafter their weight change by moving, etc does not effect car's ignition system.
--should u gain or lose weight, they'll need bypass password / key to reconfigure ("pr") their new weight or other changed physical feature.
.-security is designed for up to 20 or more
drivers.
*  For Techies: All; "S"; "C"; pp; mp; uk; user behavior; alerter; osc; va; cart; access; uip.
-access = human breath "analyzer" (each person's breath possibly being different). Exists: can't activate car if alcohol on breath. US Patents: 5519260 using driver's license number.
6G241 GPS Tracker: 'analyzes travel patterns, and 'reacts accordingly. 'Designated patterns can be good/bad/other. Vehicle/device is deactivated in 'designated 'zones / w5 criteria. [details of this feature in 'zones]. -Only certain u/passwords can enter 'designated 'zones. Applications: car rentals; employee use of vehicles/devices. CONCLUDES FILE AC-BA-AUTO
File: Access \ Ac-BA-SC
+ "ACCESS' BA = SCORE"
Introduction: All accessible 'multi-media have a 'score rating. Media are
Desired files and functions (type behavior needed to deactivate "morning alarm"). Their scores must match the scores of Accessors if access is to be granted. Any number of criteria can be used to develop a score, with more or less or no weight given to possible criteria. Bad behavior can be similar to what access controller thinks is that of a hacker, hence a lower score is given.
How 'multi-media is 'scored:
-Multi-Media = what user wants or needs, namely: desired files and or
(kn) functions.
-Media's level of sensitivity to: hackers (damage to company); inconvenience: loss of access due to= access controller's distrust= resulting in inconvenience; number of people who need information (the greater the number the wider the score tolerance?)
-Pertinence to accessor and or their department and or their function (for certain time frame, or via usage of certain password).
-Media's usage: media's frequency of usage by (all / "designated") passwords. The greater the level of importance or
applicability= maybe the less strict scoring sys would be. UIP-Tailor.
-"Coordinator": the score for one form of media (when its changed) can effect the score of other related media. -Sophistication: eg, a secretary's password accessing PhD level material is cause for suspect.
-"Morning alarm's "Notification" system: its level of pertinence to user's needs. Eg: how effective is it in waking user, based on user's uip-db (ba).
How accessors are 'scored:
-Time spent: the (percent of) time accessor might be utilizing certain files and or subject groups. Are they under utilizing something= in which case maybe a hacker is simply going for what they want. Are they over utilizing something? Hours of operation (after accessor's normal working hours)?
-"Routing": are accessor's steps through sys normal?
.-"track" and "score" "analyzes" accessor's behavior.
-Normality of user defined: 1] Based on user's previous history, with greater weight placed on more recent activity. 2] What other legitimate accessors are doing; maybe less important. 3] UIP-DB of user's behavior created by user! sys / "questionnaire" / "access controller". 4] Employee job function's domains.
-Accessor's "Caller ID". Is their originating telephone number in system's records? Accessor required to have caller ID active if they seek access.
+-Peculiarities of user's hardware: special (secret) Configurations in sw ('software) or hardware better label accessor correctly. Accessors (are required to) have "tags" on their hardware /
software.
-H: invention "Sensors" = Analyze = match (behavioral / bodily) profile of accessor. See other Features of "Access".
-Typing pattern on keyboard - See invention in A or B directory.
+--How "R" is utilized, eg: way joystick is moved.
.-Sys "analyzes" why accessor is doing W5= then conclusions are analyzed by access controller.
-Lie detectors, and (ba) "questionnaires" accessor must answer
correctly.
+-Accessor's activities outside password realm: sys not only "analyzes" what accessor is doing within (its / main) accessed system. BA (behavior analyzer) also "tracks": other "accessed" systems; W5 accessor does what they do
+?--system must connect ("coordinate") accessor's functions when they are on / off (main) access system. Eg: other "track" systems are connected, and these log when accessor enters / leaves office / computer room; (digitized) reports / results they submit, sys/supervisor analyzes if they are pertinent and or have reasonable quality (something harder for a hacker to do)
+-Accessor's history prior to gaining (any type of) access to said system. Their: criminal record, behavior as somewhat determinable by their curriculum vitae; facial analyzers %; intuitive reports written by others at work place (about their
behavior / deviance / potential to hack).
-Accessor's errors: the more frequently accessor attempts access into files where accessor's legitimacy is concerned, the lower the accessor's score becomes. The greater the breach, the greater their drop in score. Eg: system allows three errors a day, maxing at five consecutive days.
-How accessor "reacts" (to system's "prompts" / "questions") 
.-"EGH" (Education Gets Harder): Is accessor's learning curve normal? Based on media user "interacted" with previously. Eg: the portions of tutorial programs accessed should normally not go from very sophisticated, then months later to less sophisticated too often.
-"Morning alarm": user's wakefulness before* and after the alarm; their behavior- as matched against the notification mode.
Subject group "designation": Media is scored also by its type of subject category. Also, accessor is scored for how likely they're a hacker by the subject matter they address.
-How often does the accessor access material in our outside their permitted subject area? For material which can be "tagged" under multiple subject categories, how important is the actual subject category in the material - this would be measured by the frequency of the "designated" terms used in classifying the
material's category.
.  In other words: Frequency of "designated" key words (found via saw's search function) of files, or functions (their labels, command codes, instructions, "q").
-Accessor is assigned a list of key words, these and their related words (found via saw's thesaurus) can be used in scoring.
-The system may (not) seek a limited frequency of these terms used in the material (files) accessor "seeks"= and uses.
.  The one or more "tags" assigned to each set of data (within a file), file, directory, group of directories, other groupings: web sights, particular "mainframe" computers. Multiple labels give a value representing different scoring systems, each scoring system is applicable for same file. In other words, each file
can be rated differently according to what rating system is used.
.  How material was used: Who / W5 used the files -> "edits" the label= of said files; updating of files can "edit" the file's label(s); if hackers accessed material previously, or "access controller" determines a higher / lower security rating is needed.
-"Morning alarm": it's levels of: effectiveness, "entertainment", "education", user friendliness.
+ Subject categories that may have tighter scores:
-finances; company's planning department (new products, future trends); anything that can financially help hacker, and or hurt owner of system being protected by access; file on the access system, eg: information on how hackers are caught; information risking the organization or country's or world's peace; information on criminal behavior (of potential hackers), eg: police records; any other information commonly protected as stated in encryption software articles and patents.
-"Morning alarm": those with more difficulty in waking.
Composite factors: W5 composite of factors used in determining
"accessibility":
-Any one or multiple factors determine= "access": one or multiple scores; the type score most applicable carries greater weight; system "merges" multiple "scores".
-Fuzzy logic: when accessor does not quite meet the needed scoreof file or system: The "access controller" can be stricter; or for better user friendliness, more flexible. All dependant on one or multiple variables.
-type (deviant) behavior(s)= "results" in= "designated" scoring system(s). Eg: sys "analyzes" 7 positive, 3 deviant behaviors=scoring system for the 3 negative behavior "tags"= goes into operation.
+  different scoring systems applicable (Irrespective of accessor's behavior). Diverse screening systems can be an additional safe guard, since accessor may not know the "order & timing" of the access system's requirements at any moment. What can trigger differing scoring systems: time of day, month, year; stock prices; excess number of accessors logged into system (a way to reduce congestion); accessor behavior; legitimate accessor's behavior ("group behavior"), eg: their "order & timing" or subject matter or w/ (with) that they are "interacting"; type "hints" or "prompts" used; at the mercy of (human) access controller.
--Roulette: random process= w/ (with) almost no detectable pattern for selecting= the scoring or other access protocol.
-Example: u accesses two out of three files, which match his "score" and the third file is beyond his range by 30%= sys may permit access. Reasoning behind this: the score matching of other files helps determine legitimacy of accessor; system can narrow the level of tolerance for deviant scores for each file if other factors are taken into account as well.
-Composite of factors especially useful when: access is during same session (as the behavior being analyzed), * or near each other, * or when accessor is known to be at facility / work site / "access" gateway. Known via: "track", having "accessed" into building.
-Compares UIP-DB of accessor with= "scores" of what's accessed.
. Multiple scoring systems operating within same system.
-Differing external factors. Examples: If hackers are a higher percentage of accessors after working hours, scoring system becomes stricter then; There's some crisis in the organization or system; System is overloaded with accessors, hence needs to limit access to those with highest seniority or scores.
-Hacker is thought to (possibly) be in system. The perceived interests of the hacker (eg: via the subjects they seek)= analyzed= "designated" scoring system enacted.
-Something like a computer virus is thought to be in system. This virus needs an anti-viral or related sw ('software) program.
.-"Designated" scoring / screening system enacted according to circumstances. "Seek & React".
-"Morning alarm": requires different access mode for morning wake up applications.
Changes in "Score" of accessor (one who (seeks to) gain access:
+  System can automatically (slowly) alter accessor's type score. In other words: as user's behavior changes= the needed behavior profile to gain access changes slowly over time.
--In other words [third re-explanation]: Due to the inconvenience in needing to have access controller frequently alter user's password= as accessor's functions change= uip="analyzer" can (automatically) "edit" the accessor's "score".
.-Scores tied to accessor's password(s) changes with their natural changes in the work place (as their job / company! economy changes). UIP-Tailor.
.-one or more scoring criteria can be utilized. Criteria can change by the password / accessor's (changed) behavior. If one criteria isn't suitable W5= then another is (automatically)
adopted. 
Negative accumulated scoring shortens lifetime of password:
+  passwords can have limited active life= measured by amount password was used while there was a (semi) negative score for the accessor / material they accessed.
+--also measured by: calendar or usage time; "group behavior"; suspicion that hackers have penetrated (in past); other scoring criteria.
.-User must keep password alive by just activating (part of) password if they aren't using; after disuse, access controller
needs to be "interacted" with= reactivate ("edited") password. Unwatched / unused passwords more prone to hacking (without notice by sys or accessor), eg: "scores" can be changed by hacker, legitimate hacker may not note unusual activity on their password account.
Miscellaneous:
-when needed= accessor's functions can have differing passwords, better allowing sys to permit user's behavior, which may alter from accessor's normal role.
-DI: accessor's (changeable) "score" = k (keyboard entry) = c (computer) (access sw) / "Correlator" (compares scores of accessor w= file "sought") = material (file).
-D2: accessor = [password w= score / cart] = access controller = c (compares scores ("coordinates")) = elements (to be) accessed.
-can have one or multiple password(s) "designated" for applicable functions.
-can only utilize passwords a maximum or minimum number of times = tds (time date stamper) / Score (of (type) usage).
-Irregular usage? Sudden excessive usage= might drop the score.
.-files can be "tagged" / "designated" by: 1] actual files; 2] directories; 3] subject groupings.
+-(Access') scoring system also scores itself for: ability to keep out hackers; user friendliness; how good it's uip tailoring; user happiness. Also uses "questionnaires" answered by accessors in determining final scores; these ask accessors their: intuitive suspicion; user friendliness; how to alter scoring; W5 of scoring needs adjustment. System "merges" / "analyzes" answers (w/ (human) access controller).
-System sorts through different factors to= "designate" which are better / worse / applicable for lowering or raising score.
Drawing: [ "Access" = "BA" = "Score" ] =
"ANALYZER" = Compares scores of password over time.
"CHANGE ACCESS PROCESS" =
.-One of the causes are when sys questions legitimacy of accessor= serving as excuse for user to go through (security checks and) process of getting new password (=via automation).
-"Morning alarm": new interesting ways of waking each day, versus repetitive actions.
"GAME" = *Scores accessor's performance. "Morning alarm":
"HIDE ACCESS PROCESS" = *1] Fact that "scoring" system is in operation. 2] "Questionnaire".
"HINT" = Hints to accessor that their behavior might need alteration to get / maintain access. "Prompts" suggests: alternative files, W5 for behavioral functions. "Morning alarm": when user stalls
"MOOD" = Accessor's level of: (happy) "entertainment". Their "mood" is 
used as score. Mood determined via: key word searches of what accessor inputted / *"experienced". "Morning alarm": uplifts user's mood.
"MOTION" = Level of motion's deviance from the best path / %"route"= is
scored.
-Deviance types / levels. Too: big or small; fast or slow;irregularity (of: speed, shape).
-"Morning alarm": requires user's physical action, eg: run treadmill, physically get out of bed.
"NOTIFIER" = The degree of urgency= as measured by score= results in different type of signal generated from notifier.
-"Morning alarm": user is jolted more greatly when: they're exceeding the time limits to act; that day is "designated" as more important.
"ORDER & TIMING" =
-Timing: scores are given to different time parameters / durations.
-Order: The ordering of events comprises a string of blocks.
Placement of blocks can be measured by the block(s) preceding and following / the *number in place as measured from the front or back.
-"Morning alarm": creates the "designated" "mood", eg: jarring "mood" created by OSC (outgoing sound communicator) to awaken user from sleepiness= followed by more civil requirements if user has actually arisen, so they're also mentally more awake.
"PROMPT" = User's score / their uip-db much determines type of prompt they'll get.
"PS-ZONE" =
-bulls' eye: Like concentric circles, the closer to the bulls eye representing the best location, the higher the score. -beehive: different sporadic spots might be the best locations.
.--in which case the central cells have highest ratings, the neighbor cells may have 50% of the best cell's rating, the next tier out having 25%, and next out zero, and next out, minus 10%, and so forth. Different central cells can have differing scores.
-outer ring donut: higher scores for "designated" distance from centrally measured point.
-altitude: measured in mm or km
-angle: eg: 45 degrees from centrally measured point. This can be combined with "designated" distance. -depth: must be below or covered by something (of designated substance / thickness; or be covered and of certain distance from the covering). Eg: "seeking" buried material.
-multiple zones: two or more "designated" zones must be active / activated / occupied: simultaneously / in designated "order & timing" (path accessor physically walks).
--each "k" (key) can represent a zone. The "order & timing" of their being activated= creates a pattern. "Key" is a very broad area of applications. See: "compose", "route", "track".
"QUESTION" = "MQ". "Morning alarm": creates "mood" / "entertainment" to awak OF = ACCESSOR'S ACTIONS: What Influence Improvement:
Accessor is working with material versus stealing:
-Hackers want to take material, and are often less interested in doing other things beyond sabotage: Is action simple stealing? If accessor is "editing" material, they're more likely to be legitimate.
-Is material being shared w/ other password holders, if so W5? Sharing can be form of "interaction" / "editing". -Accessor is bringing in (legitimate (pertinent, virus free, non-sabotage type material) and "merging" information w/ system's db.
-accessor erases or junks all / part of files accessed. To reduce detection, they might simply download material= then "cut & paste" what is wanted on their system?
-accessor re-accesses same portion of file again (if they didn't save or transfer it earlier).
.  Psycho-Sociologically normal: Form of user "interacting" w= other accessors (is (sociologically) normal): -One employee (leader) accesses= then followed later by others (subordinates).
-(Most of the) mistakes accessor makes are of a less intelligent nature that smart hackers wouldn't make, eg: guessing at publicly known software functions until they get it right.
--BA can't "correlate" any abnormal patterns of accessor= with its (uip) db ('database) of abnormal behavior. Eg: unsteadiness in using mouse /joystick ("tilt").
-accessor "interacts" with (answers)= behavioral "questionnaires" / "educational" (tests). Especially when accessor's score drops. Subject material also "seeks" from accessor= information about their identity= which ties with= access controller's uip-db of legitimate accessor.
-miscellaneous: (frivolous) material sought by accessor= isn't of type sought by the more mentally ill. -"Morning alarm": form of user's actions w/ computer system, or other co-workers is normal= otherwise implies not functioning at "designated" levels. System might be more tolerant during other parts of day if "morning alarm" is the main desired function.
.  Legitimate accessors (helping) catch hackers:
Different people are learning from each other, possibly implying the parties really know each other; its also hoped that
legitimate parties in the "interaction" have other (intuitive) ways of sensing hackers= that "access" might otherwise not have. Eg: One password human user= "educates" another accessor= while they're on the system, as evidenced by "track".
-system "prompts" accessors to "interact"= in manner the legitimate accessors / access= can catch hackers. Legitimate
hackers might be "educated" in catching hackers (w/o risking (too much of) how "access" functions.
-If legitimate accessor is suspicious of another accessor: Confidentially anyone can "tag" potential hackers= resulting in: their lower "score" / system "tracking" such entity more cautiously / access controller confronting accessor directly /
cutting off access (if access has other reasons to believe the human suspicion could be correct).
-"Morning alarm": co-workers "score" other user's functioning. Eg: tardiness, speed of action.
.  Miscellaneous good behavioral characteristics:
Accessor's frivolous activity: Accessor is "drawing", or playing computer "games" (when they should be working), or accessing portions of internet outside access' domain. Its important system finds accessors being frivolous since hackers are on a serious mission or afraid to get caught wasting time doing such. Other activity by accessor would in most likelihood not be what a hacker would (risk) "seeking" or doing:
-Accessing  of information that is (readily) public knowledge. 
-"location" of accessor is from good "zone", eg: good postal code or prefix of tel number, or where there is less crime, or fewer college students (more apt to be hackers?)
-good interpretations (via "analyzer") of behaviors= receive a positive "tag" / "score".
What Elements Influence Worsening of Scores
Worse score is anything that is opposite or *different from desirable behavior.
-Asking the system to do or give something that is not possible (w/ or w/o the best password)= can be indicative. Hackers might be less able to gain "access" to "educational" material on how to use system= since: such instructions require (additional) access procedures; access to such might be suspect.
-(communications / access) software used by accessor is different from: what is standard / know / assigned (to employees).
-difficulty in pinning down who accessor might really be: eg: their caller ID doesn't match up; their behavior doesn't match password.
-accessor is running a (large) "bill" payable by owner of accessed system.
-accessor uses protection to help hide accessor's true identity, eg: accesses via strange tel numbers, or from outside office.
-takes psychiatric related drugs
-when material is transferred to or accessor "interacts" w password which: is w/ (with) lower score; outside company; or to unknown location; or sys doesn't know what happened to material.
-when accessor seeks to "interact" w= other accessors= who don't choose to respond / *"interact" in full manner (as requested by initiator).
-accessor doesn't care about negative effects of their actions: they mess up files (they've accessed).
-Hours: if accessor rarely comes to work before 9 am but as can be usual stays occasionally until 10 pm= score is tighter on access at 8:30 am then at 10 pm.
-material accessed was questionably for accessor= then sys= can't "track"= material any longer.
-"Track": material movement is "tracked" via: identifying "tags" "hidden" in material; keyword searches (for "designated" aspects of material (less likely to be subsequently "edited" by accessor)). E-Mail (between password holders).
-Loss of traceability drops accessor's score.
+  Accessors might be instructed / required to keep data w/in system. Trying to bypass this rule is very bad (without permission from access controller).
Miscellaneous Good & Bad Behaviors:
Accessor's behavior outside the system= which "access" is protecting / carefully monitoring:
-Does accessor give indications they are hacking another company's system (as well)= as determined via "track". -Other DB: Criminal records; accessor's school or university records.
.  Accessor's importation from outside domain protected by (main) access:
-files or software from outside domain protected by access.
-connecting to other systems or ("interactive") products.
.  "Multimedia": Sys seeks unusual behavioral elements of user in following parameters: How accessor (re) programs sw; types of mm options u selects, eg: color and "osc" option selections.
.  "Entertainment": Accessor must make access (gate point) happy to "designated" level.
-Methods: "Game": letting opponent win; stating correct words; "drawing" "entertaining" "images"; "interacting" w/ (with) "interactive images" in "designated" manner. Interaction can occur at entertainment's 'Electronic Meeting Place'.
.  "Interactive": Sys "analyzes" for unusual "interactive" behavior from "user".
"K" / "R" = User "interacts" via = "Access' BA"
"Locator" / "PS-Zone" / "Portable" / "PD": User's unusual or un-programmed locations are used in "scoring" if "accessor" is permitted continued usage of system.
--See KN (invention) (pre-1996?), especially PS-Zone.
.  What accessor "interacts" with or has outside of the main system:
-What's on accessor's computer: System "analyzes" (all) the files of accessor's computer, whether accessor does or doesn't choose to permit them to be accessed by access controller. These other files helps develop uip-db of accessor.
-What accessor does on world wide web: web sights accessed / *created; type E-mail sent and received.
-is accessor receiving tel / fax / other telephony (at work) (of nature not related to sensitive material)? "Tracks" incoming/outgoing calls based on: CID of other parties; key word analysis studies word content.
.  Grammar or spelling checked: System compares the accessor's language proficiency (tested earlier) with= their actual ability on system. Eg: checks if accessor is or isn't a native speaker of the language used, hackers might more likely be native speakers using a non-native speaker's password.
.  Familiarity of system= to accessor: The more familiar the better. Eg: Accessor's behavioral speed in gaining access. Hackers are more likely to be unfamiliar with non -publicly available facets of the access process or related software.
-"Morning alarm": lack of familiarity is sign of not being fully functional.
.  Exists: "Tracking" of airline passengers based on their behavior profiles, eg their: country of birth, travel history. Consider comments about how terrorists can outsmart the system.
1G22 Reward Generator: Reward Generated By Usage Level.
END ACCESS BEHAVIOR SCORE SUB-PART
File: Access \ Ac-BA-Tailor
FILE ACCESS-BA = ADAPTION (CUSTOMIZATION):
*  Intro: Below is copied and improved from UIP section of the file IMI&8 before the document was upgraded. 'Tailor is also called User Information Programming, 'Adapt, or 'Customize.
For Techies: Drawing: data input = analyzer = memory (M, cart, recognizes multi-user) = analyzer = data output = function.
.-5A-810-042003 Advisor: compiles and analyzes user's information.
-For Techies: fd-hdd; both pp and mp program how they want the system to collect, retrieve and analyze the data in database; uk; tds (when and how elements occurred); educ%; M%; score (score information can be processed for the UIP database; and UIP can help generate desired scores); cart('software cartridge) (for additional data for the database; and or software's for processing the database); uq (pi database is used to help generate answers about, eg: about user's past preferences and or activities); mp (the database and or software can help prompt questions, eg: to expand the database, guide the user in the right question if the system first gets the right information); access (limits access to sensitive information within all or part of the database to people with the right password).
-Article in "Scientific American", p.64, April 1995. Article title: "Machines that learn from hints". Its about: Machine learning improves significantly by taking advantage of information available from intelligent hints; discusses the algorithm process in general terms; gives differing examples, eg: computers judging how much credit to give to credit card applications based on other similar people's past histories.
-UIP formerly titled "Pi".
-For Techies Part #1: Electronic device obtains information about the user by one or more of the following: remembering user's previous performance, eg: their abilities and or difficulties on this, or related devices (which transmit uip data to other units via wire, or %wireless); asking questions from user, or "M"; user takes one or more test(s), the type and quantity are determined by the desired application of product; another person or device (M) gives information about user; etc. Device recognizes more than one user by multi-user, eg: their codes used to gain access into device. Personal information is stored in memory and used by device to more intelligently tailor itself to user's particular needs. The manner in which invention tailors itself to user's needs can alter according to: small or big changes in uip database, pp.
-FOR TECHIES Part #2: D (UIP) =
"Billing"; User can take their cart (their personalized uip for all identical or related products) from machine to machine, eg: % existing card used to both activate and select desired preferences in car stereo systems; different cart ('cartidge for software) effects user's uip differently with the correlated changes in functions; type "character" changes according to uip (if a display ("S") is used); date; uip data can be viewed on display ("S") and or printed out; uip is used to increase the user satisfaction quotient, eg: entertain, (Apossibly by: way in which function operates, sounds, lights, words are used to better create the type of electronic effect uip indicates is more likely to increase user's positive reaction to using product [test studies are conducted to see the reactions of people in test case studies of 50 - 1000 people]); "C"; % uip can support interactive (by giving the additional data needed to better tailor invention to user; % data obtained for uip's memory from microphone ("mic") (voice recognizer); mouse; mp; multi-user; uip's database guides system's functions (determines the type, manner, timing, whether or not to notify, mq, osc, synth; pp; uip database influences printer's print out parameters, score, speech, vc, manner in which it functions as a semi-toy, it prompts - accepts - processes uq; tds; uk. Data is also obtained viaA: "uk", "cart", "tel", "mo", scanner; UIP can be programmed/understood with the help of: psychologists, sociologists, marketing experts; U's city (tel area code/zip code) / caller id / location based on pd effect how system interfaces w/ (with) U.
-Drawing: data input/output=tr/arc=c
-o-C85 Electronic translator speaks out desired words/phrases. Fuji/Xerox 29 Aug 92 NK. Drawing: C85="tel" %-o-C 112 Computer predicts human error. Input UIP (working conditions of person). System predicts errors they're likely to make. 30 Sept 92 YD.
-utilizes fuzzy logic
-Sys analyzes u's actions -> database (behavior). Eg, Ubiquitous computing: u carries (tiny) "c" that communicate with other "c" embedded in: appliances, t, cars, walls, K a y s 'N. Eg: Xerox's Park Tab, and other products mentioned in "Popular Science" Feb 95 from p.47.
2D-021 Sys reacts to external products according to w5 they are: 
Eg: Incoming-Call Identifier - Screener / External Element Identifier.
Calls from desired tel numbers have a different ring. Hereby caller knows whether to pick up the call or not. -(Designating different type connections / (incoming) calls related to another of our ideas?): sys responds differently depending on which other N/sys/existing product wants to "interact" with it.
--sys knows identity of other part/sys via its: "access" / code / tel # / uip (behavioral characteristics of N, or U: how it moves / functions / responds (to stimuli from central "C" or "M") / visual analyzer / sound analyzer.
-If user walks over to device, the caller's tel number and or name... appears on screen ("S").
-Drawing: Central Product / Sys = c (computer) = sensor / analyzer / uip analyzer / caller ID sys part = tr/arc = External Product / Sys.
-For Techies: ACCESS *; BVA; CID ; CAMERA (LENS) ; CART (type uip or senses or data sought); CLAP; INFORMATION RETRIEVAL; K (keyboard); M; MIC; MOUSE; MP; MULTI-USER; NOTIFIER (when desired contact has been made with part or organism); pr (software program) ; PS (location of external product is a determining factor in deciding if any/type connection/contact is to be made); R (remote control) ; ROUTER (routes external product by their type nature); S (screen) (shows status); *SCORE ; SOUND ANALYZER; tds (time date stamper) *; TRANSFERRING INTER-SYSTEM TELEPHONY; UIP *; UK (user at keyboard); VISUAL ANALYZER %; VOICE MAIL.
-A sensor that connects to u (human body, eg: finger wrap; animal*) to read electromagnetic signals generated by the skin. Proprietary software interprets those signals and translates them into actions. Being researched by company: Other 90% Technologies Inc., Sausalito - See Wall St. Journal 1995 (maybe 6.95) article titled: Mind Games: Soon You'll Be zapping Bad Guys Without Lifting a Finger. Finger wrap version will sell for $100-$200. -4E020 Content Date Stamper: Registers and organizes previous occurrences.
-See "Brain".
%  US Pat # pertaining to helping U (user) develop new N, eg: for "D" directory KN: 5153830 Method and apparatus for providing assistance with respect to the development, selection and evaluation of ideas and concepts.
-US Pat No's: search str in Bib 9.94: (adapt or adapts) and user*: 5324021%; 5208898 Adaptive knowledge inference method and system; 5313532% Recognition of patterns in images; 5212821% Machine-based learning system; 5092354% Cosmetic kit: make-up; 4700295 Forecasts bank traffic and scheduling work; 5321626 battery performance / forecasting system; inventory control: 5237496 & 5287267 & 5128861; 5136502 "analyzing" health care liabilities; agricultural forecast 4837146; compatibility forecasting 4711632; 4197854 patient danger forecasting; game playing involving forecasting 3473802.
--search str: 1] (adjust or adjusts) and user* - barely skimmed; 2] forecast (did only Bib 6.94 disk).
UIP-Tailor and UIP-Suggest:
UIP-Tailor = SW: For: (automatically) suggesting how sys can better tailor itself to u's needs / helps get product ideas / helping User brainstorm.
.  Introduction to formulae generation systems:
Software used in developing / analyzing / evaluating formulae for food, chemistry, indicators, etc.
-uip of desired function is matched= w/ (with) uip of differing elements / ingredients / chemicals / food elements = resulting in formulae of ingredients that may (best) achieve desired goal.
--the characteristics of goal are tied= via uip = to characteristics of available / known ingredients or * (KN) sys.
+  Important Features: UIP-Tailor, 7G050, PR, Track-Analyze (analyzes for what is best to track = db), Brainstorming SW, 2E010203040 50 Recipe Softwares.
. General Examples:
1]  develop an nr ('notifier) for desired application = alerting presence of salts / acids / hazardous elements = in/for: liquids / powders / surface contact.
2]  Other applications for 7G050.
3]  SW ('software) sys may simply help u by offering suggested possibilities: formulae / equipment / sources of information (reference material, on-line sources) / type experiments.
4]  UIP-Tailor = UIP-DB: adjusts to u's needs. Gives ideas to U (user) = from which U (user) can choose = then sys reacts accordingly by offering such tailored functions.
-Example: u using information highway software often requires more than two minutes before u requires M (mainframe computer) to act = resulting in SW ('software) asking u if they still want to stay connected = frustrating u by requiring them to respond to such petty questions. It may also be problematic for u to locate where in the software they should go to stop such prompts, but if sys were to offer such a suggestion as, would you like the default mode to give you 10 minutes before such prompt (after sys has determined ("status") 80 percent of the past 50 interactions between u and mfh (mainframe hookup) were at least 10 minutes w/o (without) activity).
--Result: sys tailors itself to u, by first giving u a choice in matter - maybe u wouldn't want the change to occur w/o (without) their acknowledgement. Manufacturer determines to what degree uip-tailor will suggest or bypass former and simply alter itself to u's need.
5]  Constitution needed in plastic resins / metals / product casing ("cm", "cp") or Features, for = tolerating designated levels of: stretching, bending, pulling = within designated environments of varying (extreme): temperatures, light, abuse, excessive wear, time period of element's use (age of N). 7G050 related.
6]  Patent search strategy for idea suggestion generation sys: software* and (formulae* or recipe* or ingredient*) 7] Pharmaceutical: developing ingredients for drugs; ideas for research.
-KN: medical prognosis sys that studies all the characteristics of illness in determining type of illness = 2E suggests possible medications.
-Suggesting possible combinations for drug to solve designated illness / problem: file for each aspect in situation (uip-db) matched w/ (with) = files of existing / potential future drugs or chemicals.
8]  Brainstorming: Software simultaneously designed to help researchers increase their (sociologically, psychologically related) creativity: KN
9]  Nutritional recipe generators based on needs.
Indicator Examples: 7G050
1] Indicator type Suggester: Researcher anticipates they will be coming into contact w/ (with) 7G050 related: diverse (hazardous) chemicals / harsh environments -> Those chemicals / environments are keyed into computer -> c (computer) "analyzes" for type indicators that may nr ('notify) more than one of these (unrelated) chemicals / environments [sw tries to find indicators that can be compatible in seeking diverse chemicals / environments] -> suggestions are made to u -> u may next need to do additional research via: this same SW ('software) / other references sources / do experiments testing out the sw's hypotheses / stated facts.
2] Body protection device Suggester: Researcher keys in that they will be working with three differing chemicals (of differing acidity) -> SW ('software) suggests which 7G050 type gloves to use for all / each situation! occurrence / type activity (eg: working with sharp objects in such liquids requires thicker gloves) -> Designated gloves can be identified by glove's manufacturer / model number / generic type. Sys may also suggest other protective gear used in hazardous situations, eg: aprons, body suits, masks, goggles, gas masks, shoes, (replaceable) filters for HVAC [Heating, Ventilation, Air Conditioning sys].
-sw used on case by case, day by day basis, or planning future long term projects, or + designing new research laboratories, eg: type surfaces (paints, flooring, counter top materials, air filters....).
3] UIP: Characteristics of u (user) are "analyzed" -> sys makes suggestion: User will be having likely designated occurrences (outlined in 7G050) = SW ('software) suggests: types of protection (protective gear); methods of (cautious) research (protocols) already determined to be safe via reference manuals on the subject or SW ('software) (db).
"PR": SW ('software) (re)programs itself = as controlled by UIP; programmer can help guide / control sw. . FOR TECHIES Drawing: User = This N (invention) Sys (sw suggesting formulae) - c (computer) = ACCESS; ANALYZER; BILL; cart('software cartridge); EDIT; EDUC; MULTI-USER; pr (software program) ; Q (asks questions) ; ROUTER; +SCORE (given to each aspect = attached to each element of: goal & potential ingredients); SENSOR (7G050); STATUS ; tds (time date stamper) (scores time delay in getting nr ('notifier) effect); TRACK (history of previous (chemical/food) experiments conducted by: u, organizational body, db, m); User (researcher, student = "educ"); UIP .
D (Drawing) Overview - How Features might fit:
For Techies: Drawing: User / Other (KN) Sys = This N (invention) Sys (software used in developing / analyzing / evaluating formulae for food, chemistry, etc.) - c (computer) =
.  PS (positioning system) - R (remote control) - Tilt:
Zones - Monitoring:
Zones - Utilization:
Access: u (user) needs to usually continue to develop formulae that match those u (user) developed w/ (with) sys before. Villains w/o (without) most proper knowledge can be noticed (nr). Access allows for normal percentages of cases w/ (with) negative results (caused by human error).
-4E020 Registrar:
-4E030 Image Input Access Sys:
+  Indicators: 7G: hazards, novelties, el (electronic) monitoring of events: formulae for developing needed indicators developed.
Technical:
How files in db ('database) = match / compare up w/ (with) / relate / score w/ (with) = data provided to begin search by: u (user) / another sys. Steps in Examples:
Salt Avoidance Recipe Generator Steps:
Suggestions on replacing salt in bean soup:
1]  User may normally prefer the saltiness taste to equate at 0.5% of soup volume to be real salt.
2]  This preferred percentage is determined via: what u (user) K (keyboard) / nr ('notifier) placed in soup. 
3]  User K (keyboard) 2 liters of soup will be made, and lists volumes of ingredients making up 2 liters *(both before combining, then after coming (and evaporation) - though latter can somewhat be calculated by sys). Example: 1 liter water, .4 liter kidney beans, .3 liter potato.
4]  User lets system to recommend other ingredients (if no real salt were actually to be used).
5]  System's db ('database) "analyzes"/shows (s/printer) other non salt ingredients shown to statistically satisfy a large percentage of population (in u's zone) who are on salt restrictive diets. "Score" for each of those ingredients on salt replacement value. 6] Those ingredients that came up in previous step are next "scored" for their compatibility w/ existing ingredients u already (fairly) decided to keep in soup. Each food ingredient in db ('database) has many sub-files, each sub-file being the type application / situation / type food such ingredient may be used in = and the corresponding "score". Example: carrots get high score for soups in general, yet a higher score in sub-sub-file: western vegetable or meat soups, but lower score in sub-sub-file in Japanese miso bean type soup.
7]  The differing "scores" are= "coordinated" / "analyzed" -> suggested ingredients are grouped into differing sets / files of ingredients. Compatibility of ingredients with each other in designated sets (including ingredients required by u) based on db ('database) of past statistical taste studies for how such combinations (may) satisfied people. 8] S (screen) / Printer shows = Suggested recipes = to U. The order in which they are shown might be those w/ (with) higher "scores" for the set, or by other means, eg: cost, "score" for how all the ingredients are commonly available in u's zone's supermarkets, uip - db ('database) for what u (user) liked in the past, etc.
. Indicator Development Idea Generator Steps: SW ('software) will suggest what u (user) can use / do / replace / alter in their (research) plan / strategy / process.
1] All type materials in situation are entered into= computer, eg: type hazardous materials (acid, pH level, 7G050 chemicals listed). Eg: type + gloves, type + containers holding chemicals, + acids and where they are, where acids might spill, environmental effects (temperature, time span (in which acids will be in contact), other circumstances. 2] The files for characteristics for each of these elements is either known by sys (uip-db). If the db ('database) exists it was compiled by: "analysis" of research material, surveys of chemists %, developed by u (user) (or their company) for future applications (by other researchers of the company).
-Each element has different files, according to the circumstance of its usage. "Analyzer" determines which sub-files are applicable via, eg: label of file, % key word search, "status"*, uip.
3]  Files are matched. Examples: only 2% of glove/container types are suitable for working with acids = next SW ('software) determines three best gloves/containers for said acid, listing best first.
4]  If u (user) is unable/unwilling to make changes in glove / container, sys can suggest differing acids, or time period during which work should be completed.
5]  If all suggestions by u are good, sys can "score" what u planned to do / still give other better / good but worse options / precautions (whether using products or not, and if so, how they should be used) = S/Printer.
6]  While research is taking place = "sensor" = "analyzer" = NR: when sys determines there is or could be (based on score) a situation needing special attention (danger, loss of money, inability for u to get desired results).
Large Diagram Begins Here: The following 'Diagram Insert #1' is for the large diagram below it, titled:'D #1'. The For Techies: D below 'D #1' is a subset of the latter. All Features converge in the central computer in 'D #1'.
'Diagram Insert #1':  For +D-#1 
Type suggestions made by sys to achieve needs stated by u (user) (so suggested future N (invention) or sys functions as needed in future situation / environment and able to handle designated occurrences as envisioned by sys / u. Suggestions are made by sys: for one or more of following: nr ('notifier) type - 7G050. Protective gear type suggested: against (chemical 7G050) hazards. PVC Resin / metal constitution. Formulae: pharmaceutical, food recipes, pvc resins.Other Formulae. Likely scenarios:
--how to prepare for: fire and other natural disaster drills / preparedness.
--accidents: (chemical) accidents; vehicle; building (collapse);
-Desired effects: any (el) %KN, any (el) %N, as prescribed by UIP-Tailor
*
-iJ010 Body Movement NR: how sys can adapt to different: sized people / applications.
-2E010 203040 50 Recipe Softwares:
-3E020 GPS Record Keeper: what records might want to be kept, which zones are important, drawing boundaries between zones (based on uip of situation).
-3E060 Interactive Morning Alarm: what Q (asks questions) sys should ask = matched w/ (with) uip of u (user) / what u has to do later that day [sys puts u into mood for predicted occurrences/work]
-3E061 Body Motion Instructor:
-3E150 "PS-Zone": which zones are important, drawing boundaries between zones (based on uip of situation). -3E151 GPS Circumstance correlator and Controller: which zones are important, drawing boundaries between zones (based on uip of situation).
-3E 180 GPS Locator: suggests where to begin looking or what needs to be found and how.
-3E190 GPS Billing Systems: which zones are important, drawing boundaries between zones (based on uip of situation).
-3E040 & 41 Tel Noise Canceler: what environmental sounds might be semi-canceled (at the risk of impairing listener on other end from part of speaker's natural voice).
-3E210 Indoor GPS Extender: where/ how extender could be used/ placed.
-4E010 Alternator: which activities offer greater battery power build up
-4E030 Image Input Access Sys: what images sys may use to trigger designated functions (access).
-5E020 Magic Wand:
-3G010 Tel Ring Delayer:
-4G190 Insulated Scoring Ball: how to play / develop new "games".
-4G200 Fruit Encapsulator: how to adjust itself to cut in ideal manner. Other methods for peeling, cutting, processing, cooking, canning the foods.
-5G061 Dyslexia SW: how u (user) may wean himself off the software; how sw ('software) may help u (user) -eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer.
-5G070 Speed Reading SW: how u may wean himself off the software; how sw ('software) may help u -eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer.
Drawing #1:
For Techies: Drawing: User = (+ See: 'Diagram Insert #1') - c (computer) = 
ACCESS: Access restriction strategies suggested: db ('database) of past hacker / villain activity = matched w/ (with) = db ('database) of known / existing / available remedies or traps = suggested "access" control strategies = [security manager's suggestions = K (keyboard) = access - analyzer - sys]: sys analyzes any input from security mgr during the multiple steps via which sw ('software) w= mgr together brainstorm for strategies.
ANALYZER; BILL; CART ('software cartridge); EDIT; EDUC; MULTI-USER; NR ('notifier); PR; PS Zone; Q (asks questions); ROUTER; SCORE; SENSOR; SOUND ANALYZER; STATUS; tds (time date stamper); T (tel); TILT; TRACK; UIP; VISUAL ANALYZER; VR*; WA (walk about).
UIP-Tailor & UIP-Suggest: see suggestion sw ('software) (being) developed from 2E files.
+ Five senses are altered to match user's tastes: Senses: images (see "edit"); sounds (see sa); "vibration"; odor releasers (see smell "analyzer" details mixed throughout files; *taste (see A dir KN)
+ "Game" application: UIP Game Effect "Editor": User is requested to experience different effects like sounds and type images. The U's response is "scored" and intern the game's effects are tailored to get a more desirable response from the players. Each game's aspects have multiple "editable" choices, and sys utilizes those best matching player's preferences.
-images: see "edit" = images; colors; textures of skin or objects; size
-sounds: sys "synthesizes" sounds (in its memory); sa scores sounds.
-"scoring": to match u's tastes: human body "sensors" are placed on player (skin) to gauge reaction levels; u (user) personally K (keyboard) in their (multiple choice) preference of effects.
-What's scored: user's "mood" reactions "scored" / "analyzed": pleasure; excitement; passion; fear; relaxation (between episodes, type of break for player, so they don't over exert and tire= in tern playing game longer). -How sys utilizes player's preferences: User asked which of 12 effects elicits greatest: passion. Then when passionate encounters occur in game, that "edited"" synth" version is utilized.
-User generated effects: players can program / create / record (mic) sound effects into the game itself. -Related to A or B* dir KN (invention) where games are sold via vending machines and tailored to buyers.
. "Synthesized" music / sounds altered.
End of ACCESS-BA = UIP
File: Access \ Ac-BAIMI
COMMON FEATURES FOR ACCESS'S BEHAVIOR ANALYZER: FILE AC-BA-IMI
"ANALYZER"% = System "analyzes" the (criminal / access related) behavior
characteristics of "accessor". Methods include "analysis" via:
uip; "analyzer"; *"access"; frequencies of user's voice ("sa"),
eg: voice lie detectors. Cheaper systems can simply seek high
frequencies representing stress.
-sa: "mic" -> "analyzer" (system analyzes person's voice) ->
system responds according to PR (software program) / *U's control.
-Drawing: Voice = "Sound Analyzer" ("mic" = sound to signal converter)
/  **M = c (computer) = function (application) / osc 
.  "Coordinates" between different behavioral characteristics (of
accessor).
-Coordinator - Score: Score: sys coordinates/juggles different
Features/files behaviors according to "accessor's" "score" = *
coordinator-importance / coordinator/corrector; the score of
occurrence influences how coordinator coordinates that occurrence
w= designated protocols/sw of sys.
"ARTIST" = (Method in which) images generated = BA.
See: Artist's image analysis systems. Manner in which images
are generated / something is "edited" = is unique like finger
prints= as determined via ba. The level and types of narrow
scoring on "drawing" is unlimited.
-"Character" = "Image": 1] Designed to portray "designated"
mood. 2] Accessor= selects a "character"= which is connected
with= diverse characteristics: behaviors; levels of access;
moods.
-"Morning alarm": create required "images" in "designated"
"order & timing".
"BEHAVIOR ANALYZER" IN GENERAL =
+  SEE LARGE FILE TITLED C:\K\BA
-User's Behavior includes. Their: feel, style, commonality of
actions over time, rhythm of movement, preferred movements, and
thought patterns (as "analyzed" by their key words).
-"Morning alarm's" "Work motivator".
"CHANGE ACCESS PROCESS" =
(Behavioral) parameters for gaining access can be changed /
"edited" (according to w5 / uip (how accessor behaved, eg: they
were determined to be a hacker) / creating additional hurdles).
-These parameters change (gradually) as uip "analyzes" accessor's
(work) functions are changing accordingly.
+  "Score": Access procedures= become more or less strict / are
altered= according to accessor's= behavior.
-'Customizes by [giving greater/lesser tolerance for deviation from expected behavior / 'access requirements of user].
"EDIT" = BA=UIP-Tailor determines what ("entertainment") u (user) (subject)
should experience. The type experience "designated"= is designed
to fit (uip-tailor) accessor= via use of "edit".
-H: "edited" "images"= entices hacker= into "trap". Material
most  compelling to hacker is more likely to pull them in. 
-form accessor= selects material to be "edited"= studied by ba.
%  data "edited" for "morning" application.
"GAME" = Games: How user plays computer games: where in game player
takes their character, like to the secret cave or by touching
highest apple on third tree. See "Game"="Access".
--How a user plays a game determines access: 1] sys studies u's
moves via = uip, eg: u (user) prefers using rook in chess game, and u
might accentuate their playing styles accordingly (if access
denied). 2] access provided if/when u wins/loses game (in /
within designated number of moves. 3] U's (designated) piece
arrives at designated square / point / stage in "game".
-"morning alarm": play game correctly or to win and deactivate
alarm.
+ "GROUP BEHAVIOR" = How accessors behave within the context of
their organization. The greater the positive level of their
"interaction" with fellow members (seen by their password /
"track")= the better the accessors' scores. System judges for
normal behavioral modes (based on organization's / department's /
employee's history or "program"). Large systems are
representatives of major sociological "interactive" systems:
access-ba must seek out the dangerous deviants (much like how
people intuitively judge other's honesty in real life outside a
computer system).
Examples:
-each password is labeled w: seniority; their relationship with
other employees and degree and type of importance / closeness to
each other; newness to company (hackers more likely to be new
infiltrators). Every accessor is tied to: password, their
history, and normal behavioral profiles. See access=score.
What accessor does w/ what was accessed:
To whom do they transfer the files? Does accessor have traits
that can be harmful or the opposite? The traits of accessor
include both group and non-group oriented behaviors.
"Morning alarm's" "Work motivator": requires "designated" group
behavior.
"HIDE ACCESS PROCESS" = + Hacker that knows about "access-ba" and avoids its "traps". What hacker may attempt doing= and how access can try to deal
with them anyway:
-steering  free of files that it knows definitely will set off 
"nr". Hacker may want such files but stays with safer files.
-blends in activity that makes hacker appear more normal, eg:
accesses files "designated" for the password they're using.
-see "Trap's" mirror section.
-this is a difficult area, and one which requires closer
analysis, and or may be "routed" to the human version of access
controller for closer inspection.
"HINT" =
-UIP-Tailor: what passwords are / when (w5) they should be
entered.
-Helping accessors w/ (with) scores only a little out of line: "Prompts"
u to alter their behavior= if ba= finds accessor's score is
improper.
-"Morning Alarm": what actions user requires.
"MANEUVER" = How accessor: "motions"; "merges"; + "routes" himself through system or main access process; functions as scored by= "order and
timing"; "repeat".
-each facet of maneuvering= has a different "score"= later merged
with accessor's= other scores.
-movement patterns needed for: "r", "draws"%
"MERGE" = Scores that are mergeable:
-those tabulated over time (w preferential weight given to the
latter).
-one or more scores= generated via any method= are merged.
-other accessors in "group behavior"= to which accessor is
"tagged". If other accessor's behaviors are changing= each
accessor's scoring system can change accordingly, eg: via the
averaging of this and or other group's scores.
Miscellaneous:
-material accessor "merges"= W5 -> score
-examples of what's mergeable. Accessor's: "artist", "group
behavior", "mood", "motion", ps-zone, "scientific signals",
"sensor", "track", "visual analyzer", "uip-db", W5 of accessor's
other behaviors.
-Manner in which files are merged= based on= ba.
"MOOD" =
Sys matches its characteristics with that of what it determines
user's behavior is like.
"Hint":  the mood created gives cues / "prompts" for u (user) to 
answer "questions" (needed to help determine accessor's
authenticity).
.-This is an example of a subset of "Mood". And this "mood" is a
subset of "Access"" = "BA", which is a subset of "Access".
-Manner of hints are "editable" (according to "order* & timing"
as guide / accessor's behavior).
OSC (outgoing sound communicator) = ("Prompt"): System's OSC (outgoing sound communicator) matches / mimics the user's
voice so as to solicit the desired response (emotion/feel
rapport/make them want to act in certain manner (purchasing /
work productivity, behavioral modification). Psychologists
established which type of voice / sound frequencies are most apt
to achieve the desired effect according to: circumstances (UIP /
U's state of mind (at a particular time)). *TDS: osc's sound
modulation might be effected by the time of the day (U may need
more energizing in early A.M.).
.-In similar manner, sys generates a "mood"= matching user's
behavioral profile.
.H "Trap": hacker is made to believe they are a legitimate
accessor via many methods including "mood", "hint".
. "Designating" what is best "mood": develop uip=db of
accessor's behavior.
. Creating the desired "mood": "Edit" (effects the visual
appearance / wording utilized); See "osc" above.
-%  odor release = smell analyzer; vibration emitted = vibration
analyzer.
. Drawing: Accessor's (behavior) = c (computer) (designated mood generated for
accessor according to: u's behavior / below Features) - Access =
W5 b CHANGE ACCESS PROCESS // HIDE ACCESS PROCESS //
HINT // NOTIFIER // ORDER & TIMING (how "edited" material
is shown to accessor) // PROMPT // SCORE.
"MORNING ALARM" = Manner in which user does access process= deactivates the morning alarm. + See: "Morning". Has much information.
.-"Morning alarm" introduction: This is only one of the many
applications for "access". "Morning alarms" are systems created
to uniquely waken up the users, and then to require them to act
in some manner to bring them to full wakefulness. If necessary,
"Morning alarm" can be ignored only to better understand the
general  natures of "access". 
"MOTION" = Human movement about premises:
.  Parking lot outside working hours:
-"visual analyzer" / [motion]'sensor = "tracks" license plate numbers.
-hackers might park elsewhere and walk to premises. Hence sys is
more suspicious when someone enters building= w/o (without) triggering
entrance "sensor"= signifying accessor= drove onto parking lot=
thru "sensor" gateway. The number of cars in lot should match
number of people / users in building / on system.
-see KN: sys "tracking" employees whereabouts (in a building)
. Motion / Vibration: Access' "Motion": type motion= matches
needed behavioral profile. Form of User causing "vibration".
-"Motion Sounder": "sensor" "seeks" unusual (body) movement.
"ORDER & TIMING" = the "order and or timing" in which the user utilized different software programs is 'tracked.
"PS-ZONE" = Score judges= point of access= by u.
"QUESTION" = "MQ". UIP generated questions:
-System "prompts" "accessor" to "react" to questions or
occurrences.
-Occurrences - General: Without knowledge= accessor might not
recognize / know the presence of "occurrence", and or= what the
needed "reaction"= by accessor is.
-Type occurrences = Any sw ('software) change / potential "prompt" that
accessor should keep their eye out for.
--Eg: any "interactive image" creatable by "artist" / "artist's"
"edit"; any occurrence= that can be "sought" by= "seek & react";
any text or "image" that directs / "hints" accessor to: another
"location" in "c" (sw, file) / physical "location".
-"Questions" posed to "accessor":
User is required to answer questions about their history, or what
and why they accessed system previously.
.  Sys generates questions which require correct (near correct)
responses to gain / maintain access. Randomly selected
authentication challenges.
-DB uses file of questions= chosen at random= then "seeks"=
correct "reaction" (answer).
--Exists: access system that shows what accessor previously did.
.-Drawing: Questions come from sys studying u (user) = creating / delineating
information in question / true-false statements = which u must
respond to. 
.  "Morning alarm's" "Work motivator": requires "order & timing" of computer work by user.
.  Answers are 'customized.
"REPEAT" = One of the many manners of judging if accessor is who
they claim to be. Files accessor accesses and or the * order in
which they're accessed is normally repeated.
"SCIENTIFIC SIGNALS" = Body signals of accessor studied= and
matched w/ (with) accessor's earlier signals.
"SENSOR" = Body Movement: way u (user) moves its body / objects on "s" or in hand = access "analyzes" its uip-db to see if there is a match. Other
movements: drawing, walking around.
"SMELL ANALYZER" =
"SOUND ANALYZER" = Voice command systems judge people's stress levels= lowering score for: higher stressed / lieing behavior,
since this can signify presence of hacker.
-system takes into account: differences in stress levels for
male and female voices (password shows sex); deadlines accessors
must meet; accessor's general level of stress is compared w=
stress level at time of access.
"TEL" =
"TRACK" =
1]  U's behavior monitored to see if their behavior matches
system's profile of their behavior: uip-db.
2]  Identifying villains: Similar to immunological Anti-body
recognizer. Commonalities of villains "analyzed" -> uip-db of
villain; next time someone tries to gain access w/ (with) designated
degree of common characteristics (from previous episodes) sys
hones in on them. 3A205 Tampered Alert. Villain usually is
unawares they've been identified by sys.
3]  Sys monitors U's activities. Hidden (computerized) codes:
embedded in stolen data: easier to "track" where these codes go;
eases court prosecution. 2E251 Intelligent Monitor
[Sys "tracks"="analyzes" u's behavior] = ba ('behavior analyzer) = Conclusions (Score) utilized by "analyzer" / UIP-DB.
. Miscellaneous:
-information used to monitor and determine who user is and W5
they are doing.
. "Track": System identifies via a third party's list of
potentially bad people. This list includes those who are 
suspected, indicted or convicted of: any crime, hacking,
deception, etc. The main "access-ba" system can also funnel
information about accessors to this 3rd party list. This system
is quite certainly illegal as of this time.
"TRANSMITTER" = Magnetic Device
"VISUAL ANALYZER" = fingerprints; face; pictures.
"UIP" = Learning about Accessor: Info learned about User is fed into UIP.
Existing UIP data may be: considered more or less important than
the BVA's analysis (at that time of U's interfacing) according to
PR. System may adjust to U's fluctuating moods. Also see:
"Questions"; ba; sa; uip=db; "track".
-results from behavior "analyzed" are compared to a reference
level (for applicable access=ba function / uip). Eg: US Pat
5461231
"UIP-DB" = "Score": "seeks" what elements needed= for
compilation= then organizes data in usable form= for UIP-Tailor.
--Notes: Seeks: via "questionnaires", "ba", "track".
Organization of db's files: collected information on user can be
inserted into one or multiple files according to which files can
use the information. Then UIP-Tailor seeks which files they need
to better tailor. Or more work can be required for UIP-Tailor to
find the needed information. Example: "Access' BA's Score" - db
compiles data to show how accessor is rated= intern if accessor's
changing rating stays good= uip-tailor / "access controller"
permit access.
-if system determines this user's usage of a sophisticated
electronic system matched their normal behavioral profile, by
utilization of certain (confidential) files or functions and not
others.
-see Access' BA's "Question".
. People User knows: u (user) reads or hears voices / information =
then u responds accordingly = and if correctly u (user) has access.
Examples:
-_User must recognize designated voices (such as their co-worker's or mother's) and only respond to their commands. After
such voices, questions must be answered to the satisfaction as if
they were being critiqued by said voice. Hackers may not know
which is the correct voice, nor attach the voice with the needed
answers.  These voices may not have tags such as boss or wife. 
--u hears three voices, and one is their wife's/co-worker's = u
selects the familiar voice and access continues. Voice induces u
to work harder or have better moral (tgh) / induces humor, eg:
says 'work harder', 'get to it', 'make lots of money honey...',
'you lazy bum'.
-- "order & timing" of such people's actions need to be made
correctly.
-_accessor might not know what sys will ask him. Sys may have
received input from others (knowing accessor) w/o (without) accessor's
knowledge (about their input). Such information might not be
made available to anyone except under designated circumstances
such as time (w5). See "Hide".
"UIP-TAILOR" = Manner of use / access controls product: correct behavior not
only permits access= but it can control products as well. This
is a merging of the fields of access and R. Results in= uip-tailor adjusts to accessor's behavior.
"W5" = Access at right time: designated temperature, weather,
certain news in mass media, when another "designated" u (user) also has
"access".
End of Access - Behavior Analyzer Features
File: Access \ Ac-BAPAT
ACCESS BEHAVIOR ANALYZER RELATED PATENTS
This section is a copy of what was sent to files: Ac-ba, educ, score, ba. 9/1996
-Pat search strategy: (behavior* or psycholog*) and (software* or computer* or %program*)
DI:
BA / Access=BA / Educ (ba) / Score (ba) / Track / *Game =
US Patents:
-4571682 System and method for skill enhancement and behaviior modification = "education" / "ba" -Miscellaneous *: 3944796 5533093 4569526="game"=4666160 5349539 5493185 5473537="scientific signals" 5111413 5485600 48182345434788=gps5524176 5260867 = c (computer) used by accessor
-4751642 "Interactive" sports simulations (vr) system with physiological "sensing" ("scientific signals") and psychological conditioning ("mood" / motivation / "educating")
-4796194 Real world modeling and control process = seeks deviant behaviior on factory floor
+  5123045 Comprehensive "software" protection "system". Patent works with I/O behavior.
-5507649 = "images" are "designated" to= match accessor's behavior. Eg: children receive different images from adults.
5483112 / 5377258 = Method and apparatus for an automated and interactive behavioral "guidance" system: "interacts"= w/ (with) user via= T (tel) / mfh (mainframe hookup) / r; "educ"; uip-db; "questionnare"; sa (patent's voice stress analyzer); requires user's "reaction"; access' password = patent's PIN; "Trap": motivating hackers -this patent number mentioned elsewhere in KN (invention) filing.
.  DI: ["Access" = "BA"] - 5377258 =
"ACCESSOR" b "ANALYZER" // "ARTIST" // "BEHAVIORAL ANALYZER" // "CHANGE ACCESS PROCESS" // "EDIT" // "GROUP BEHAVIOR" (how employees "interact" w/ (with) each other / system) // "HIDE ACCESS PROCESS" // "HINT" // "KEYS" // "LIGHT SENSOR" // "MERGE" // "MOOD" (motivating accessors) // "MOTION" // "MANEOUVER" // "NOTIFIER" // "ORDER & TIMING" (patent's mention of time duration) // "PROMPT" // "PS-ZONE" // "QUESTIONARRE" // "REPEAT" // "SCIENTIFIC SIGNALS" // "SCORE" // "SEEK & REACT" // "SENSOR" // "SMELL ANALYZER" // "SOUND ANALYZER" // "TEL" // "TRACK" // "VISUAL ANALYZER" // "UIP" // "UIP=DB" // "W5".
5515270 Technique for correlating purchasing behavior of a consumer to advertisements:
.  How functions described in abstract of patent are replaced with KN (invention) Features:
-buyer behavior can be replaced with: how accessor functions in other manners described
-advertisements and promotions consumer has been exposed to can be replaced with: "promts"; "hints"; "guidance"%; material accessor was exposed to or "interacted" with (on system);
-monitored replaced with: "track"; "analyzed"; "ba"
-montitored together replaced with: "merge"
-readable record: uip-db
-subsequent behavior replaced w: "track"; "order & timing"%
-consumer = "accessor"
-information combined to analyze*: uip-db; "analyze"
-cash register: "billing"
-consumer* inserts this record: "cart" / password / uip-db
-promotion type classified: ba ('behavior analyzer) of advertisement; organized by subject; uip-db
-only portion fo collected data needs to be analyzed: portions are "tagged"
Search Strategy: (score or scoring or scores or measur*) and (behavior* or psycholog* or personalit*)
Scoring of behaviors / Predicting behaviors (for uip-db) / "Track":
-4971561 Apparatus and method for learning about the relationships and ...
-5424945 System for evaluating a psychological effect of a document
*  4481593
File: Access \ Ac-BA *
File: ACCESS-BEAHAVIOR ANALYZER *
Repetitive information: Any (set of signals) "analyzed" by "BA" from which ba arrives at a conclusion can achieve "access". The conclusion from ba acts as a type of gate - one must do something or act in some manner to gain "access". This is a very broad area.
-Example: "BA" determines if u / viewer had good/undesirable behavior (w/in parameters of system's ba of u) -> level of access afforded matches accordingly. Eg: limits kids watching excessive TV (violence).
Patent search str (strategy). Abstract 1974-7/96: (password* or access*) not accesso* and (behavior* or personality) .
-str: (behavior* or psych* or personalit*) and (software* or computer* or access or accesses or accessing or password or security or guard*)
-US Patents: 4854877 5343871 5465729 5470235-Child behavior improvement system 5250946 4741320 4013294="game" 5469506 4533244.
-Pat search strategy: (behavior* or psycholog*) and (access or accesses or accessing or password*) and (software* or program* or computer* or electr*)
Existing systems used to analyze a person's psychological profile can be utilized, requiring similarly correct responses.
Any "designated" signals generated by accessor's behavior = "access" / nr / track. Manner in which any passwords are triggered = needed passwords = can be generated or altered according to: UIP or BA.
OTHER: * Each accessor has differing hurdles to pass= and gain access. Needed passwords (are uip-tailored) to each accessor= better helping accessor remember password(s).
.-"Changing Passwords": Needed passwords may need to be altered ("edited") each time in different manner within the profiles of accessor's = ba.
Below is altered version of IMI24's "BA" Section. Adapted to Access = BA:
*  Introduction: most of the original IM120's BA was moved to Access' BA's Parts Section.
*  Product's "access" functions +might be (slightly) altered according to U's determined (via: BVA/UIP) behavior. *-The OSC's sound quality (might be) is so excellent / similar in vocal characteristics to u/listener it sounds like the real person speaking to U. The sounds also have such color, they: make the U's ears feel like they can visualize the speaker / function (whether there is or isn't an S).
--Sys "analyzes" type (sound, behavioral) files targeted person better matches = then communicates w them to create maximum psychological impact (sales, "mood") as determined via "analyzer" / K / pr. D: mic = bva / uip = c = osc.
.  For techies: D: Organism being studied (human, *animal, other) = This N Sys (BA) - C =
ACCESS (sys upon "access" monitors (2E251) organism); ANALYZER (); AP=Access (% scientific, % psychological, % medical, % business research projects); BRAIN (); C (); CAMERA (2E251 Intelligent Monitor="track"); CART (sw, db, differing cart for type organism or ap); EDUC (); GPS (); K (); M (db, brain); MIC (sound analyzer); *MO (); *MOUSE (); MQ (); MULTI-USER (differing "accessors" (u), organisms being studied); NR (w5 required parameters have/haven't* been met (via "score" = "analyzer")); OSC (); PR ; PS (); Q (); R (); SCORE (); SENSOR (motion); SOUND ANALYZER (); SOUND VISUAL ANALYZER* 0; * SPEECH (); STATUS (); SYNTH ("analyzes" for sounds that better influence organisms (per pr/u/k)); TDS (); T* (); U (researcher / * organism being studied); UIP (uip of organism / *u (studies/tests objectivity of researchers)); UQ (); VISUAL ANALYZER (); VR* (); WA (use outdoors).
-Sub-Parts: BA-UIP; BA-BVA; BA-Tag: tags (then tracks) designated people according to certain profiles.
Other: * "Router": locates then= retrieves needed data= for this part. A code (access, el 'water mark') encoded in sw/data* limits how sys / program can be: utilized (to operate device) / "edited" / copied. See: "Access", "Edit". "Bill"
.  Drawing #1: Improvement on US Patent: "Accessor" = [5377258 Method and apparatus for an automated and interactive behavioral guidance system: "trap"; "hint"; u receives motivational messages (osc) to improve behavioral patterns; includes client db (uip); voice stress "analyzer"; client response required] =
=C =
=  ACCESS () / ANALYZER () / EDIT = "Seek & React" = (sys edits out less needed input from: determination if accessor is legitimate) b NR (penalizes u when u acts poorly (undesirable behavior) = electric shock to body / "entertainment" sys N usage is limited (see KN)) // OSC (penalizes via harsh sounds = synth) // PR () / PS-Zone (u trained where its safe / u is not needed for work, eg: home, coffee room, recreation room, tv room) // Q (to build uip-db = needed by sys to train u) // R () / SCORE (how well u's (user's) behavior is altering) // STATUS (of u's behavior) // TDS (w5 u behaved -> builds up UIP-DB) // TRACK () / UIP (.
.  [UIP = DB collection] / "Question" to determine authenticity =
Example of source that "analyzes" behavior: "Who do you think you are?", a CD-Rom published by Harper Collins Interactive. Also read its book version and bibliography, and speak with the developers of this and related books (as found in Library of Congress or Bowker's "Books in Print" subject section) for type formats depended on each KN application.
+  "REMOTE": Manner of User's usage of "remote" control device is a pattern that falls within or out of "designated" behavioral patterns. The pattern of movement might be "educated" to user, and or "ba" may pick up on u's (fairly) unique movements, like analyzing a person's movement to generate their signature.
+  Correct utilization of "Remote" -> "Password". See "Remote" part's details.
.  Examples:
-"Tilt" (joystick); "Dance". Laser switch, Clapper, Interactive Projected Display, Remote Control Mouse, etc. -Each squeeze generates signals to control device. Eg: 4G010
-See 3C-290 Bouncy: How object is played with.
-Activate, deactivate any electronic device and or control its operations without touching the main unit (unit's buttons).
Interactive Lock: Correct dialogue activates lock. Applications: students pass test before being able to activate desired systems like tv's and stereos; different and changing information can be required from special people seeking access into premises. 3A-891-042005
Magic Air Pen: Remote pen's movements are transmitted to computer. Make strokes in the air or on any flat surface. Each different stroke creates a different signal. (PD) 3A-790-042004
-Camera "Sensor": Changes in what's seen can represent changes in behavior or other (needed / likely) occurrences. % Light Sensor: Senses changes in light measured by: presence or lack of light, or more precisely the amount of light; frequency of light, eg: color; duration and or time in which light was generated.
Breath Sensor: Blow your breath into sensor in desire combinations. Works with smell sensor, not allowing eg: garlic or alcohol breaths; or can only be activated if system can differentiate between different people, eg: chewing certain type of gum or food. Judges also for pressure from mouth and or wind speed.
Laser Switch: Activate any function by only blocking the switch's laser light with your finger. 3A-751-042003 5A 460-042004 5A-710
The term -media- is for files or desired functions.
Below is altered version of IMI&10's "BA" Section. Adapted to Access = BA:
D2: "Analyzes" = W5 of Accessor's Actions =
1]  4A09 Behavior Analyzer: (future product) Judges region ['GPS] of speaker, and maybe social stature - all based on word choice, accent (sa), etc. Can seek all the possible questions to behavior and type psychology of speaker currently able to be done by human ear (as in over "T" conversation).
2]  5A1090 Sounds & Music & Verbalized Words and Creature Sounds "Analyzer": it observes changes in behavior according to such being emitted by "accessor" and or caused by what accessor is doing (to (any) system). "Sa". 3] 5A1 100 Smell Analyzer: observes changes in behavior upon emissions of any smell (smoke, flowers, sex smells, etc) or matter being studied.
4]  5A1110 Sight Analyzer: what does "accessor" see and how they respond to visions from displays, pictures. "Images" created via= "edit".
5]  Manner of changes in accessor's keyboard behavior = access:
A 1-320 Activity Identification Software: senses fingers on keyboard and blips if you aren't writing. It senses when you are lacking in creativity, clarity, confidence by manner of key stroke rhythms. Mix with Therapy Machine, Taro Machine.
-"Tilt": controls sys' functions. If "tilt" not used (correctly) it nr too.
6]  A3-13 EMOTION WATCHER: tells you how unrelaxed you are by how: product (ball, top, doll, coin, etc) spins in container, on CRT. Can output words, suggestions, slogans. Checks p by: u touching a pad measuring your temp; sensing stress in voice (product exists) whenever speaking (and hence operates whenever machine's on).
7]  A2-170 HANDWRITING ANALYZER: sw studies what p writes onto special display ("S") or paper (then read via optical reader).
8%]  This aspect repeats other information:
A2-610 BEHAVIOR SCALER: like "mainframe" detecting if person is lying by stress... in voice, detect how: a] sexual another person feels. Even try it on yourself to see it works. Know if you should pursue another for a hot date.
b] reliable and or constant and or organized and or committed and or ability to follow o lead
9]  R132-1 Behavior - Medical Symptom Analyzer: System correlates patient's behavioral with their medical symptoms. Patient's graph for changing emotional state is matched with body symptom graphs, giving researchers additional needed analysis. Invention is the software's merging of data.
10]  R132-1-5 Biofeedback - Body function analyzer: User can look at their medical analyzers and see how they are/were performing (psychologically) intern user gets to know themselves better, intern user is better able to (intuitively) psych themselves up in the desirable manner. Use with sporting equipment. Portable version with wireless transmission. Also can develop database of user's physical profile.
Notes for D2 Diagram's above parts: This focuses primarily on the type of behavior access-ba= analyzes= accessor as exhibiting (in response to any stimuli= created by sys). The person or other entity mentioned is the "accessor". The desired functions of accessor are what is controlled by access. These parts were copied and altered from IMI&9 in 9.96. See full description of these parts in IMJ&'s BA.
Access = Fingerprint: Al-290 Finger Print Reader: Analyzes a person's behavior by their finger print. Also matches couples with compatible finger prints. Related to existing "C" systems based on horoscope, blood type. -finger Match(ing): dating service matching behavioral types associated with genetic finger printing. Genetic Finger Match(ing)
If security lacks the funds, they can pretend to have such a hacker behavior analyzer by giving out false cues to [all] users, eg: occasionally asking 'designated questions, according to user's behavior; although such information is not [always] [fully] analyzed.
END AC-BA*
File: Access \ Ac-Features
ACCESS FEATURES - File: Ac-Features
Examples for Access features organized by category.
"ACCESS CONTROLLER" = "Access"' Gate Controller is notified about the good or unusual status of any accessor's functions. The form of notification is via "notifier", eg: an alert signal. Any one of multiple people or systems can be notified via one of multiple modes. What decides the type access permitted. This can be a (fairly) automatic algorithm and or human officer who (helps) "designate" the level of access permitted. The "Access Controller" function sat or with the gateway point (where access is or can be given or denied).
.-Access controller can be: (senior) employee; security guard(works on computer and * physical entrance way to building or system); police; government intelligence system or employee; anti-hacker entity; one who controls "tracking" system (against hackers).
-Automatic mode drawing (diagram): locks all / part of the files / system to "designated" (multi) user; triggers "nr" > (human) access controller.
-Drawing: Accessor -> Access' gate (Access' controller = k / (ba)analyzer/"score") = Electronic system that can be accessed.
. System checks how good it is itself: Access=BA: analyzes=access controller because: it may be fraudulent / dysfunctional/ a poor screener of hackers / causing excessive problems for legitimate accessors. -BA analyzes the score access=ba gets in: catching hackers; being inconvenient for legitimate accessors.
"ACCESSOR" = Accessor. One who seeks to gain access.
-Legitimate user with privilege for accessing system; or the opposite can be a criminal, namely a computer hacker. . User: Anyone trying to utilize a function or feature of (electronic) device or system. See library and patent literatureon: encryption, passwords, security control (of el systems). This anyone can be:
.  Person: One with required security or usage clearance; "Bill": one who has credit line; employee; friend; family (over certain age); one who has won usage credits (via "game" or "bill"); owner of system.
-A person with / lacking needed skill / training / password can(inadvertently) (not) cause damage, including: use of medical equipment, other expensive or dangerous machinery (in chemical laboratories), damaging other's research test results.
.  Animal: Keeping animals in and or out (at "designated" times). Eg: training animals to behave in certain ways by= having 'ba determine desired behavior= and if so= allowing access. See: KN's animal "tracking" and "analyzing" systems; systems to motivate and or control organism's behaviors.
.  Another electronic system: "Computer" on WWW; "M". A system or KN utilized to gain access. The other system may be designed to work in conjunction w/ another system that requires access procedures in order for them to "interact", eg: computers on a network.
.  Hacker: they're unwanted, but may try disguising selves as a legitimate user. Spies: they may seek sensitive or confidential information. Their usage might cause greater wear & tear on system. One who seeks to sabotage the: system itself, another system tied to system they try hacking, or sabotaging something or someone not tied to system but can be attacked after getting something (information or function) from hacked system. It's a person who is or should be incarcerated. Someone posing as someone else; hence sys' access "analyzer" needs to be very good /cautious / meticulous / detailed in its access procedure requirements. Another system can be utilized to hack. -Anyone who can't correctly (re)create password is probably a hacker= hence probably treated like one. System(s) may consider allowing accessor to subsequently prove they aren't a hacker via generating correct passwords.
.  "Access = BA" identifies not only hackers but (similarly) also any "designated" type of:-incompetent employees / mentally ill people / terrorists /legitimate accessors who (might be too curious wondering beyond their "designated" "locations" on sys) / access controller ("tracks" W5 it monitors= punishes), since it can't always be trusted either. -Determines such type accessors based on their: performance or work results "score"; errors they make; psychotic behavior; keyword searches.
Drawing #1: Accessor = Seeking Access to utilize / control / "program"/ "edit" - C: Access functions: ARTIST 0 b BEHAVIORAL ANALYZER () / INFRA-RED SENSOR () / KEYS () / LIGHT SENSOR () / MERGE 0 // MOTION () / MANEUVER // PS-ZONE () / REPEAT () / SCIENTIFIC SIGNALS () / SMELLANALYZER () / SOUND ANALYZER () / TEL () / TRANSMITTER () /VISUAL ANALYZER () / W5 () / CHANGE ACCESS PROCESS () / HIDEACCESS PROCESS () / HINT () / NOTIFIER () / ORDER & TIMING ()/ PROMPT () / SCORE ().
. Drawing #2: Accessor = Seeking Access to utilize / control / "program"/ "edit" - C: BILL* (); CART (retrieve info from cart); EDIT (); EDUC (); MULTI-USER (); NR (); OSC (); PR 0; PS-Zone (); Q 0; RO; ROUTER (); SCORE (); SENSOR (); SOUND ANALYZER (); STATUS (); TDS 0; T (); TRACK 0; UIP 0; VISUAL ANALYZER; VR (); WA ().
"ARTIST" = Method in which images generated permit "access".+ See main "Artist" section, especially it's "access" sub-section.
.3D-010 Tilt Alarm: Tilt alarm in correct position to deactivate. Required angles can change daily, requiring user to discover the right position by looking at optional display which shows angle at which device needs to be deactivate.
-Applications: deactivate morning alarms, burglar alarms, gain entry, or lock or unlock anything else practical. -Drawing: alarm = [activator/deactivator] = "tilt" -For Techies: "Access" (failure to deactivate alarm / turn on System(s) correctly -> alerts security personnel).6.96-Like 5A480 Laser Lock, both require designated motions. -play "game's" joystick (tilt) to win game, hence gain "access" or other desired function.
+  Required motions: Generating the path / algorithm / image of actions. Eg: they can be those u made at some previous task within narrow time parameter, eg: how they controlled a vehicle; joystick from earlier "game" they played; replicating (joystick)motion made by character seen on "S" (nearby).
--if the actions are not made or repeated, accessor can generate a (moving) picture / "image" of the scenario. Or, simply k /generating the SW (Software) codes for the scenario in the correct "order &timing". These codes mentioned are those generated after the accessor correctly hurdled the obstacles to gaining access.
-pat search strategy: (tilt*) and (password* or activate* or access*).
.  R45 'Dynamic Signature Verification': Write in your password. System identifies user's handwriting style too. [Communication Intelligence Corp, Redwood Shores, CA / Riley Design Associates, San Mateo, CA 4.94 PS] . For Techies: ACCESS: (also permits access with (additional) one or more of followingA: visual analyzer (user's face, finger print), other" access" modes, (in tern serving as additional test barriers to entry)); ARTIST:(behavioral analyzer studies images made); CAMERA:(); CART:(); K:(stylus; r*); MFH:(database for visual and behavioral analyzers); MULTI-USER:(); NOTIFIER:(status, score, alerts when access denied); OSC:(); PR:(); PRINTER*:(); Q*:(); S:(); SCORE**:(tds); UIP:()
4C210 "Artist" Access: Duplicates 4E030 Image Input Access, but this is older KN #, hence kept for priority date.<I (signature analysis aspect is 1, excludes pictures), 3 or 4>User must electronically draw needed picture to deactivate alarm ;or draw picture onto paper and have scanner check if image is near enough to the needed picture (machine is the final judge)-display can show the picture needed to be created--system's judge compensates for differences from needed and actually submitted text (given by human). --very similar to 4E030-may be any text (signature) can be given by person, system just analyzes it for: complexity; and or how well the brain is alert(by using database with psychological analyzer), etc.
-sys judges for uip (calligraphy analysis) = "analyzing" ('visual analyzer) identity-similar and compatible w/ "Sound Lock" Invention in C Directory, 4C190Smell Lock. Existing Invention which analyzes finger prints / eye's iris for "access"
.-patentability?: signature analysis by computer exists, thumbprint analysis*
.  [o-Sys displays an image, u must draw as closely as possible. I fits within right parameters, System(s) analyzes user is fine physically. Eg: they are in space, and oxygen deprivation is judged. Or draw picture fast enough - KN, within certain time pattern.
--for drunk drivers. If drunk, user can't type combination quickly enough to enter car.
-Above (for this sub-section) mostly from Mark Rossi Mar 1995,703-739-0220.]
Drawing: System(s) prompts u = u responds (writes/draws/"artist") =sensitive pad = analyzer = access. Changeable password elements. "Order & Timing" of: image generation. Correct "artist" functions deactivate "Morning alarm".
"CHANGE PASSWORDS" = + For added security, system requires differing passwords for user. These newly needed passwords are those that accessor knows or can guess, but difficult for hackers to determine. Subset of "Generate Passwords".
-Value in changing passwords: u may not force themselves to change their password on a timely basis; keeps out: hackers, those who may have copied or illegitimately gained passwords otherwise, users who have expired or exceeded their "access" privileges; makes accessors appreciate more highly: need for security, value in accessing. --.May require accessor be more on their toes / alert / kept up to date (on business or sys) since changes in passwords can be related to what and how and w5 accessor does their work - hence newly generated passwords can be uip tailor related.
-Methods of gaining access change according to any (random /"designated") criteria, making additional hurdles, eg: should an illicit person gain the password. Altering responses to access' questions based on cue when such alterations should be made. -"Hint" / Cue determines how passwords are to be altered. Eg: 1]if u receives tel call (from machine) stating word 'Apple' = u (user) knows variation version #35 of password is used until = next such incoming tel call. 2] uip generated cues based on: what u did earlier, their history / hobbies / what u should know based on their work. If statement is correct / of certain topic designated variation of password is valid. -Other cues: day or week or month; weather (yesterday's high temperature reading); stock quote for particular company; type music played (listen for second word in song (which could even be one of needed passwords)); + pat 5442342 User inputs wrong answers based on cues, eg: days of week. 8.95 Hughes pat awarded.
-Patents: 5365587 self-modifying access code for altering capabilities.
+  Camouflaging passwords accessor entered / How system alters passwords: -Drawing: How u/sys = changes/"edits" inputted password(s).
.  See "edit": any text / signals entered (kn, "artist", password)into system can be altered as "designated". Examples: -reverse the signature or images drawn. See "access=artist".
-Altering typed or spoken responses: "edit"-Reverse the order / "order & timing".
-skip sections: first/middle/last digit(s)/words/sections.
-speak in different tone = "va"-utilize "synth" to alter inputted sounds-respond in different languages (with different meaning, or(near) identical translation).
-Combination / Order altered. Eg: changes typed password while substituting flashing lights for inaudible sound, and doubles waiting time between typing password and touchless access process.
-Fingerprint of different fingers / people. One or multiple people enter their prints / other images in altering "order &timing".
.  Multi-step Alteration - Scrambler: system's hw (hardware) or sw(automatically) alters inputted passwords after entry. Password only effective after altered as designated (within designated time / w5):
-Makes harder for those w/o (without) this scrambler (accessing System(s) from remote location). -Alteration made more complexicated: each u's passwords scrambled differently; + password= entered into sys/k= shows up on s/printer/etc= as being different ("edited") from what was entered. Purpose: fool onlookers / hackers (who see history of accessor's activities namely what passwords they entered).
-altered differently in different circumstances (w5 of password entry): minimizes ability for hacker to get code for how password was altered. Multiple step alteration: System(s) alters, then re-alters password numbers of times prior to concluding altering process.
.-Access needed to change or do anything. Eg: password "edit": Alteration mode has barriers to access from hackers, eg: can't access from remote location; has minimized points of access from anywhere. Presence of alterator hidden.
-Pat search strategy - USPTO Bib disk -6/96: ((change* or changing or alter*) near9 (access* or accesses* or accessing or password* or verif*)) and (computer* or electr* or software*) not alternative-User must meet one or more differing (creative) criteria prior to gaining access. Each criteria can change, eg: being are requirement / duration of criteria's activity / which u of several should meet which criteria(s) / rhythm in which criteria is met. Any one of the criteria's can be the controlling factor for other criteria.
-"Edit": u's signals may need altering as "designated". Such editing may be w/in System(s) or "cart" (carried by User (as a key)).+ Causes of change in needed passwords: "ba" "scores" accessor's behavior (during accessed session) as falling out of (their)typical usage patterns. System "prompts" accessor during this/later access procedure for differing password.
-"Access" = "Visual analyzer": need to change "designated" aspect of image. Eg: third line from left of right index finger needs to be erased or otherwise "edited": to achieve 95thdesired function.
.  "Access Controller" or legitimate accessor can alter needed" passwords" for themselves or other users. Limitations may include: Accessor can't alter passwords for those his senior (w/higher access privileges); other accessors can override initial change of password via: additional more powerful passwords /after "designated" time period or other criteria.
.  "Morning alarm": different tasks required each (part of) day=make it both more challenging / uip-tailored to user's needs or situation.
"GENERATE PASSWORDS" = System(s) generates password / access instructions / type hints. See "Change Passwords".
-sys studies uip-db / behavior (ba) and gives password more readily remembered and difficult for others to guess. --examples: "maneuver": "route" u walks from their private office to access point must be redrawn by u to gain access: a]'from' location can change, hence System(s) "tracks" u (where ever they're (in building)).
-Pat 5398285 generating passwords using public key cryptography.
.  One or Multiple sources generate password: If any one System(s) /person is incorrect / uncooperative = access denied. The order in which parties cooperate may be essential. Option: the effect each source has on password generation is geometric, eg: it puts a twist / alters / "edits" / re-"pr" what sources before / after enter = to create password. Things that cause "change password" can also be used to "generate passwords".
-Size of password generating devices: 1] might be large enough so as not to escape detection by building's entrance security guards and scanners. *2] small enough so u can hide it from others apt to steal it.
-Drawing: accessor = uip - score - analyzer = access - c.
-Destructibility of password generating device: difficult to dismantle / upon dismantling designed inoperable thereafter. Reasons: limits hacking / dismantling for theft or study of parts. "NR" activated by destruction.
-UIP / BA = utilized / "analyzed" to= "generate password"(changes). 
+  Passwords System(s) generates (usually) easy for accessors to remember and hard for others to guess. Hopefully replaces need to write down password or process. But the passwords if they are needed to be written down, are those that can more readily be written down in abbreviated or other disguised way so others who find it can't readily understand / utilize the information. Eg, laser lock requires hand motion in hexagon. User writes word laser inside a hexagon.
--sys may keep passwords in such manner as well= with a decoder down the line to possibly interpret w5 necessary. +--uip-tailor chooses easy to remember passwords for accessor's human memory.
--Nature of behavioral process accessing is such that it can be easier to remember than other types of locks, eg Laser lock: move hand in shape of hexagon = blocking multiple laser lights in designated order.
.  Changeable password elements. "Order & Timing" of: how passwords are generated.
"HIDE ACCESS PROCESS" = Makes it more difficult for unwanted people to either: know an access procedure is being utilized, and or for them to document it. See: "generating passwords" and how generation process kept secret; "changing passwords": camouflaging passwords.+ Hackers may not realize accessor is accessing: -Examples: When accessor: "Maneuvers": hackers may not realize what accessor is doing is actually accessing. Reason - access process doesn't look like access process. "Motion"; "ps-zone"; "repeat"; "ba"; "artist"; Touchless passwords: smell; motion; transmitter from u; Order &Timing: Mix password entry process with non access modes, eg: multiple access procedures interspersed with more normal activity, eg: maintain connection to System(s) for maximum 3 minutes until all 4 passwords entered. Repeating Past Patterns To Gain Access: Less likely u will write down password.
-US Pat: 54997421 Protects confidentiality of passwords.
-Need a password to get your password. Upon entry (by u or sys)to this "c" file, u must know w5 to find disguised password(s)designated for differing functions.
-password entered by u differs from what shown on "S": Differentiating factors include: slightly altered picture; showing letters typed by finger to be one key away, eg: u typed'2' but "s" shows '3'. Additionally, the password transmitted from u's point may first get scrambled to be what showed up on "s". Later down the password access process, System(s) can rescramble password to: originally typed / other code. "Edit". See "Changing Passwords"-* 6B790 Barrier hides hands keying password: put hand into compartment or glove from which they can key in codes (eg: one per finger) in order to keep codes confidential. For cash machines requiring: personal identification numbers; entry into house, office, etc.
-depending on applications and quality of technology, system can" hand cuff" one hand of an individual who was attempting an illegal activity; held until police come (system calls for police) and releases person upon correct code by police and or other source. Discourages hackers and others attempting illegal activities. Replaces needs for guards saving thousands of dollars per location.
-hand cuffing may be illegal-cash machines are probably used by most people in the wealthy countries-the handcuffing might occur, and then simultaneously the majority of the machine's exposed parts might have its strong screen come down. There might not be enough time for the handcuffed person to think about grabbing a weapon to strike the computer ("C"), since they'll be in shock about their hand being trapped and will focus on getting their hand out. Just the presence of this on some machines can greatly reduce cash machine theft.
-obvious? can also catch villains by emitting red ink onto them(washable)-Pat search strategy - USPTO Bib disk -6/96: (hide or hides or hiding or hidden) nearly 1 (camouflag* or access*or accesses* or accessing or password* or verif*) and (computer*or electr* or software*)-Certain files can be kept closed or virtually unreadable (even to system's chief operator) except when an "access" criteria has been met, eg: time in future. Examples of such files: those used to generate future passwords; information about legitimate accessor's such as those needed to analyze if their behavior matches.+ "Sensors" can't be easily replaced:" Sensors" that sense / "track" access procedures can have their own methods to keep hackers from getting their own related sensors to gain access. Eg: the correct "sensors" can have additional needed codes transmitted w/ accessor's created signals; or correct sensors can encrypt / "edit" the codes generated by accessor.
Hiding Presence of Password From Accessor:+ Passwords can be something even "accessor's" are unaware of. Passwords can be something they may habitually be doing anyway. By not giving them the password, "hide" is strengthened. -Such password generations= need to study (ba)= accessor's.
-Example passwords: -- subjects they commonly access or are authorized to access=access' caution "analyzer" is triggered when behavior is out of the ordinary.
--typing in one's name--accessor's location: ps-zone--typing style / rhythm / speed. See typing style analyzer KN. --normal "order & timing" of accessor's actions.
--finger print: u thinks they simply need to press button (and warm it up)--sa: accessor thinks System(s) needs to be verbally controlled (without realizing voice must be of "designated" people's).
-other benefits: makes users feel more comfortable in not necessarily needing passwords (they must remember or even know were required).+ "Hint": System(s) can ask u questions w/o accessor realizing correct answers are the password.
.  Passwords can't be transferred out of computer: system= "keyword" search= "seeks" access process digits= then blocks / nr when= such is being "transmitted" (via modem). . Drawing: Accessor's (behavior) (presence of password hidden from accessor's knowledge) = C ("Analyzes" if correct parameters were met) - Access = ARTIST () / BEHAVIORAL ANALYZER () / INFRA-RED SENSOR () / MERGE () / MOTION () / MANEUVER () / PS-ZONE () / REPEAT ()/ SCIENTIFIC SIGNALS () / SMELL ANALYZER () b SOUND ANALYZER // TEL () / TRANSMITTER () // VISUAL ANALYZER () / W5 () //HIDE ACCESS PROCESS () // HINT () // NOTIFIER () / ORDER &TIMING () / PROMPT () / SCORE ().
"HINT" = what passwords are / when (w5) they should be entered. -Sys hints what passwords are / when (w5) they should be entered. US Pat 5425102 Password hints; 5345549 Multimedia based security systems give cue based on strong personal recall ability. *5454091-(accessor receives / requests hint) = (for) need password= to get hints for= subsequently needed passwords(s).
.  Manner of hints are "editable" (according to "order* & timing" as guide).+ How System(s) determines how to "hint" = "uip-tailor": see:" generating passwords", and other access sections; what accessor previously (see "repeat") used to develop questions for 'accessor to answer to gain access; access' ba's hint.
-"Morning alarm":
"INFRA-RED SENSOR" / Heat "Sensor" = Infra-red Sensor: Senses body heat of User and or any number of people required (nearby). Limits ability of hackers to pretend to be at access point. Infrared: body heat / light. -movement(s) of people must be in designated pattern. See" artist's" image generation mode for "access".
.  US patents: + 5406261 Computer security apparatus: accessorizes wireless infrared transmitter.
.  pat search strategy of USPTO bib disk -6/96: infrared* and(access* or accesses* or password*)-Any signals generated by accessor's (infra-red related) behavior= "access". Changeable password elements. "Order & Timing" of: emissions.+ Indoor / outdoor weather meters must "score" weather at" designated" levels, eg: room thermometer would limit hacker during non working hours when temperatures might be less controlled.+ "Designated" objects: shapes / size / type of heat emitting elements: appendage: accessor's right index finger / hand; pet(dog) in vicinity; any other four legged creature; (cold blooded)animals seeking to access water gate (keeping out human scuba divers seeking (natural resources)); (sun) light reflector; heat emitting objects (heat from power generated source or solar power); pens / pencils / computer stylus / "R"; 101 insect scrawling in jar (in random fashion / collected at or * moving toward food source); their temperature can be above / below (via cooling agent) room temperature w/in "designated" parameters.
--password generation objects: create objects via clay, plastic molding... Insert any needed temperature effecting agents (into slot).
-BA / Motion "analyzer": studies W5 objects are presented: in moving manner; "laser lock" type motions. -"Drawing" "images": "artist's"= "images" generated on "interactive" s by finger / other object. Use of finger nail or other room temperature objects (won't) access (according to W5).
--"sensor" seeks image drawn via: heat / pressure "sensors" on tablet; laser movement "sensor" - see "laser lock". -infra-red / (sun) light = "sensors": way in which light shines into room needed to gain access. Eg: light angle(s); level of warmth emitted from light (above room temperature); what is lighted W5.
-- "order & timing": light must have occurred over set duration prior to access-"Morning alarm": user's body movement= getting out of bed /doing "designated" task.
"KEYS" = R113 <*origin date?>Intelligent hotel room key goes beyond old magnetic card keys, has circuit chip. Can be programmed re data pertaining to user, billing, etc. 18 Dec 92 X.
-For Techies: ACCESS **:; CAMERA: is activated at check in/out point; CART*:; CLAP: for additional codes (to gain "access"); Display("S"): touch-screen (uk for access); %GAME **:; "M":; PP/MP:; MQ/UQ *:; MULTI USER*:; NOTIFIER:; OSC:; PRINTER *:; REMOTE("R") ("R"):; SCORE:; TDS *: time of each action; TEL:; UIP*:; UK.
-Keys: metallic key; magnetic entry card; "cart" (w needed software / passwords, pat 5475839); other standard! bank(combination) locks. 9G190 "Cart" only functions when the sensor on it receives correct stimuli, eg: fingerprint of designated persons; "access".
+  Cart is a key for access. Enter whatever changeable codes desired into the cart. Cart can be a microchip placed into a(metallic / magnetic strip) key; whereby cart's codes are needed to gain access, as well as other characteristics of the key. The key portion can be any type of possible or KN type key or %access procedure's object (triggering hard object). Cart might be invisible, eg: key can get copied but won't function; it could be buried or hidden by material by which key is composed. --Repeated explanation: cart also acts like a key to sys' lock: eg: (reprogrammable) card key (w/ password code). cart - key =access. Cart can be microchip built into "key". -"Cart" = "Access's" "Infra-Red" Object (Key).
-"Access": need (recent) fingerprint / bar code = scanner /"sensor" / "camera" [for reading images] = "analyzer" UIP-DB = Lock (U is given or denied "access").
.  Drawing: Accessor's ("Cart" / Object (whose movement or presence triggers "sensor" / behavior) () = C ("Analyzes" if correct(movement) parameters were met) - Access =ARTIST (its movement) b BEHAVIORAL ANALYZER () / INFRA-REDSENSOR () / LIGHT SENSOR () / MOTION () / MANEUVER () / PS-ZONE 0 // REPEAT () / %SCIENTIFIC SIGNALS () / SMELL ANALYZER(object emits odors) // SOUND ANALYZER () / VISUAL ANALYZER(studies shape of object or shape of its movement paths) // W5(moved) // CHANGE ACCESS PROCESS () / HIDE ACCESS PROCESS () //HINT () / NOTIFIER // ORDER & TIMING ! PROMPT (when to insert key) // SCORE (key used to generate correct score, eg: key ="tilt"). Changeable password elements. "Order & Timing": which "keys"/ "carts" were utilized.
"LASER" = +p <3> 5A480 Laser Lock: Activated by tripping laser lights in designated patterns. See KN's Laser Harp & Tel as signal generators.
-Safer from others learning the combination person is keying in. Multiple lasers activated in designated order by u making motion of certain shapes.*-Eg: run finger through light back and forth three times, wait three seconds, then run them two times more, wait three seconds [or longer - can have variable minimum waiting times, with flexible maximum waiting times] then easily { quickly} swing back and forth twelve times.*-system locks for certain duration without allowing any access if attempted entrance code is [wrong] or very different from correct code. Helping to eliminate illegal entry.*-applications: put on back of any electronic device (computer, door handle of car, of specially designed door handle of building*-electronic guard/lock device*-has multiple lasers to increase complexity of cracking codes*-Easy to change combination. .
-this function like most other User Behavior Process Functions is such that it can be difficult for casual outside observer to see combination being programmed in, as with other combination locks.
-doesn't require security cards, keys, etc which can be lost or stolen.
-upon gaining access, user has choice of not requiring combination for re-entry (if their combination) allows them this privilege. Useful with car and building doors.
.-lock activation, deactivation feature can be turned on when motion sensor senses an oncoming person (eg: infra-red sensor in combination with sensors for changes in vibration, sound, camera image).
-4C020 (sound lock) = 5A-480 (laser lock's old KN #)--the remote control device to unlock car door exists, yet may not stop this patent.
For Techies: #1: +access; access: each type access (made) -> database ->uip; access = r (tr/rc fq); artist: manner in which Frequency to (gain)access is tr is done in artistic / creative manner: "compose" sounds / lights / other Frequency - %(sys's (behavioral) "analyzer"(helps) determine entity (trying to gain access), according to type creative work, eg: similar to determining real composers /painters by characteristics in their work; balance: u must create/ hear sounds in certain (non perfect) balance; access=bva (sys seeks certain audio Frequency / words / rhythms / decibels); c=access; camera: visual analyzer (determines u (via uip / matching current lens' input w/ database of u)); cart: c(cart)=access; cart=(magnetic) card / SW (Software) (w u's encrypted codes); clap; date: access only possible w/in certain times / different times require differing methods for gaining access; display: System(s) offers u one or more choices for u's selection from larger menu -> correct selection by u -> access; *educ: u learns skills while learning access methods: answers to history / math / science / security /organization's (protocol) questions; gps: access only possible w/ in limited geographical zones / when u (their portable gps)traveled a limited (path / zone / manner / bar) to the access(check in) point; k=access, manner in which elements typed(speed, rhythm, stop and goes); locator: System(s) finds/follows/studies u according to u's whereabouts based on what "access" (codes/modes) u used/uses, eg: u is in north wing of building because access check points are passed to get in or out of wing; or user is in sw's 40th database, and in tern uip on u is developed accordingly.
-Exists: IR? for controlling locks, probably via ultra-sound too(well known).
-M = "ACCESS" (4C-020):M's database matches needed data / code / process / etc before "access" permitted. artist=access=m. balance=access=m. bva=access=m. c=access=m. camera=access=m. cart=c=access=m. clap=access=m. composition=access=m. date=access=m. display=access=m. distancer=access=m. educ=access=m. gps=access=m. k=access=m. mic=access=m. mo=access=m. mp=access=m. mq=access=m. multi-user=access=m. notifier=access=m. *osc=access=m. pd/locator/pp/pr/ps/r/score/sensor/soundanalyzer/speech/status/*synth/tds/t*/uip/uq/visual-analyzer =Access = MFH. -MIC = ACCESS (4C-020): ACCESS / ARTIST (control images via" speech")/ BVA (certain u's voices and or vocal patterns, eg: sing particular tune) / C / CART (sound database, sw)/ CLAP /COMPOSITION / DATE (w5 of incoming sound)/ S / DISTANCER (u must be at certain distance from "mic" to activate access. Space from u to = "sensor" (thermal / distancer / vibration sensor / other sensor's judging presence of user (s)) = "analyzer" -c)/ EDUC / K(control "mic") / M (sound database; sound analyzer) / MIC / MO /MOUSE / MP / MQ / MULTI-USER / NOTIFIER / OSC / PP / Q / R / RC /SCORE / SENSOR / + SOUND ANALYZER: sound database; u's sound=sound analyzer=access (analyzer)=controls designated function (open gates; permits u full or partial function w/in some designated System(s) (sw) / SPEECH / SP TEL / STATUS / STEREO /SYNTH / TDS / T / TR / User / UIP / UK / UQ / VISUAL ANALYZER / VR *= MIC Light Sensor: Senses changes in light measured by: presence or lack of light, or more precisely the amount of light; frequency of light, eg: color; duration and or time in which light was generated. -Flashing lights. Drawing: access point = alters in designated patterns / colors = from el light "tr" = c-r = u. Morse code.
.  pat search strategy of USPTO bib disk -6/96: (laser* or light*) and (access* or accesses* or password*)-light / laser may need to be of "designated" distance: if two or more light frequencies are used, System(s) knows distance of light source, or may know via other "sensor" / methods (where access renters password at remote location (ps zone)).
-Any signals generated by accessor's (laser /light) related)behavior = "access":. Changeable password elements. "Order & Timing" of: which laser lights are tripped / activated / deactivated / altered (its light bent) / w5.
"MANEUVER" = Maneuvering through any of the needed steps / stages necessary to conclude access process. The "order & *timing" process are the essentials, what's actually keyed in at "designated" points being the subset. Maneuvering through images / computer screens and programs: U maneuvers through images on computer's screen, going into deeper layers until they've selected designated image which is the password. The manner of u's moving cursor through the jungle of images, and avoidance of traps permits access.
Sample "routing" style required of "accessor":1] click on icon of flower -> u moves an animated character over to third flower to smell it -> u opens bee hive -> u directs bee to 8th flower for pollination -> resulting see planted in planter box #10,303 -> character clicks on 75th apple from tree of planted seed -> further "access" hurdles -> "access" provided.2] click on 'deactivate music box' -> however music box opens ->u plays 29th song -> song plays while its wording shown -> u must click on designated word / phrase / melody (at right time) ->further hurdles -> further "access" hurdles -> "access" provided
+Style of computer's response / terrain in which u must maneuver can be different / changed according to w5 / "multi-user":
+-u must know / intuit how to respond / behave.
+-uip: System(s) knows enough about designated correct u to adjust /make hints / design path for maneuvering= so u knows how to maneuver through barriers. Based on uip-tailor, similar to" generating passwords"=uip-tailor).+ differences between correct and incorrect maneuvering can be minor or major, eg: flower smelled is still the 3rd one but changes from red to pink (while other flowers changed from pink to red), resulting in confusion for hacker, eg: changing of designated software codes.
Miscellaneous: "maneuvering" is a quick process ("mouse" around)
+  "Change Access Procedure" = Adding on additional steps:
.-scenery / type maneuvering change constantly. Example of "Change Access Process", and generating passwords. +-As in semi "game" / "entertaining" "interaction": each subsequent access attempt requires the correct addition to the previously known steps.
+--What new step(s) may be:
---  Errors might be tolerated in each new stage added onto previously known maneuvering; but next access attempt requires unto "repeat" previously learned "access procedures". Or may be accessor decides what each next stage will be, and simply needs to remember (example of accessor being the password generator (in "change access process"). ---Sys "hints"= allowing accessor= five attempts at intuiting correct access procedure.
--- "Repeating" what u did or experienced in past= tied to correct choice(s).
--see: access' repeating section; "artist's" "draw"; "track" ="repeat"; "track" - "ba" = generating "hints" for u's subsequent steps.
-external events: time of year; events in world or organization.
.  "VR": manner in which u moves -> access. See KN (maybe under "vr").
+  "Crawler": Automatic maneuvering system: Something is designed to trigger the maneuvering process (in event its too cumbersome for accessor). Examples: a software pr activated by u; cart; clicking of designated icon (only available at designated locations / times). See "artist's" "crawler": this has a function of its own (can be triggered by u/sys).
.-Password needed to activate the automatic maneuvering. User may need to maneuver part of the course = type of password, then =automatic maneuvering process.
-  "Order & timing": User must created designated images ("artist")in sequence.
-Sequence here is defined as the manner in which each: 1]step/stroke in image generation is implemented; 2] sequence in which (total / partial) images are inputted / released by u.
.  pat search strategy of USPTO bib disk -6/96: (move or movement or moving or moves or maneuver*) near5 (access* or accesses* or password*)-Any signals generated by accessor's maneuvering behavior ="access".
.  Changeable password elements. "Order & Timing" of: how accessor must "maneuver"+ See "maneuvering" via "game's" character. Manner in which accessor acts is the needed pattern for gaining" access". -See "Artist" = "Maneuver".
-U= needs to know= where to find what "prompt" seeks= (to have "merged")= for "access". Where or how to look (for other element(s) needing to be merged: how to "maneuver" / play "game" / which files to check.
"MERGE" =
+p Need to merge any multiple files. Namely, accessor merges two or more elements in designated "order & timing".
-Accessor may need to match (icon or file) (w "mouse" via dragging across s) any (past occurring and recorded event's filed signals / element / file / text with something else: Examples:-Voices: multiple voices somehow related (by birth, work);typical functions or responses said voice or person would make, or how they would respond to any real / imagined scenario(something like a "game" playing).
.-the synergy from a merging = "access" / "artist's" "crawler".
.-the order subset of "order & timing" can be a form of merging.
.  Changeable password elements. "Order & Timing" of: what is "merged" w5.
-see: "Artist's" "Merge"; "Artist's" "Synergy"%
Drawing: "Merging" of Access procedures = C ("Analyzes" if correct parameters were met) - Access (Offered! Denied) = ARTIST () / BEHAVIORAL ANALYZER () / INFRA-RED SENSOR () / KEYS () / LIGHT SENSOR () / MERGE () / MOTION () / MANEUVER b PS-ZONE () / REPEAT () / SCIENTIFIC SIGNALS () / SMELL ANALYZER () / SOUND ANALYZER () / TEL (transmits signals of password procedures / CID! "merge" w/ other passwords) //TRANSMITTER () / VISUAL ANALYZER () / W5 () / % CHANGE ACCESSPROCESS ()!! HIDE ACCESS PROCESS () / HINT () / NOTIFIER //ORDER & TIMING // PROMPT o // SCORE ().
"MOTION" = Manner of accessor's movement gains access. Motions include: "exercise", "distancer", "ps zone", "dance"+, "vibration" analyzers. this overlaps: Access' BA: type motion= matches needed behavioral profile.
"NOTIFIER" = + "Access"="Notifier" is a subset of "Seek & React": Legitimate/ Illicit users of (kn) System(s) cause a "reaction". Reactions include: turning system off / on; punishing u (denying them future access for set time duration or other via other w5 "reaction" mode).
-Notifier functions as an alarm or the "reaction" itself is a notifier (catching the attention (of security (personnel)). -See KN's Tamper Alert: "Nr" activated when anything has been illegally accessed.
-Accessor= generates password / "access" / behavioral pattern(s)=permit "designated" "access" / "designated" "nr". "ORDER & TIMING" = When; Time duration: What; in what order access process' methods were enacted. Pauses in enactment.
.  6B370: Press keys designated length of time per key:+-"access": must press key designated length of time. --or activate code (on and off w/ designated number of pressings. Can expand to include: certain time each pressing should be made with needed pause time between pressing).
+  User must know w5 to enter designated data, w/ or w/o (without) prompts. Entering data in designated rhythm. --Eg: hold key 1.5 seconds and wait 3.1 seconds between keystrokes. The order of KN access modes alters each month[multiple access procedures].
.-Multiple Access Procedures: User required to use one or more access "kn" procedures.
.-Accessors required to respond quickly: Illegitimate accessor SW (Software) difficulty in reading / locating "prompt" -> respond to c sw's prompts fast enough can't gain access, this makes it more difficult for computer hackers to gain access when/where (w5*)they are less initiated into sys' functions; those trying to gain access (then failing on initial trials) are more closely tagged(2E251 Intelligent monitor) during any subsequent access attempts they may attempt. 5G070 Speed Reading Software.
-Patents: 5451934 time delay features * 6B370 Measures time(s) door chime / k was pressed. Signifies frequency, etc of those who are not that close who sought contactor entry. -system additionally might register all times door was opened if U Pr. Each type of door entry signifies different type person.
-applications: "Track": was person or employee honest about what occurred, record keeping, security, evidence (eg: when something was delivered, when employees came and or left, etc )-limits u access by amount or type. "Access" restricted to time(s) of day/year possibly in combination with other hurdles.
-Accessor= generates "order & timing" related behavioral pattern(s)= permit "designated" "access".
-Other elements determining timing of access: Gravity from moon or planets (see astrologers); astrological charts designating which days are good / bad for any criteria (accessor, company, love). "Designated" hours, days (birth dates of known people).
-See: 'Sound analyzer's ='order & timing.
"PROMPT" = What prompts U: to begin access procedure. "Hint" issue-set of "Prompt".
-any required type signals (from u or sys). Such signals can be "access" signals (which simply need to be "repeated" / "edited" again). -Drawing: prompt= accessor generates behavioral pattern(s)= permit" designated" "access". -may need "access" to get to (next) needed "prompt"= then enter access.+ prompts can be disguised: to look like something other than a prompt, eg: egg / "crawler" / "game" (for "maneuvering") labeled number five= inside SW (Software) window number three.
-activate prompt= then it is ready to= accept password.
-"Morning alarm": clues user= should they not know how to "react" or function.
"PS-ZONE" = "PS-Zone" 3E150: u must be in limited localities to gainaccess. US Pat search strategy: location* near (access* or accesses*or accessing or password*)
-US Pat: 5243652 Location-sensitive remote database access control.
-Accessor= generates "motion" / ps-zone behavioral pattern(s)=permit "designated" "access". Changeable password elements. "Order & Timing" of: which zones are entered / activatable w5.
"REPEAT" = <+> Access via Repeating Past Patterns:+ 1] Repeated action: User repeats an action they committed earlier. -Required motions: can be those u made at some previous task within narrow time parameter, eg: how they controlled a vehicle; joystick from earlier "game" they played; replicating (joystick)motion made by character seen on "S" (nearby).
-U hears something they said during last ("c") session, repeated back to them when they next gain access. This existing System(s) shows if there was tampering.
+2] Copying: User sees something and uses it as a cue for the needed access process. Examples:-Password is shown on "s", u simply must reverse its order, or ignore last and first three digits.* Pat search str (strategy): access* and (repeat* or repetitive). Nothing-comprehensible found.
+  Patent: 5247497 Security systems based on recording unique identifier for subsequent playback. Information provided by User to system when they last entered is played back so User knows if someone else gained access previously. Assignee: Octel [big co].
--improvements:
-U = This Invention System(s) (Patent: 5247497) - C = ACCESS () / ANALYZER () / EDIT () / NR (u nr when (w5) u didn't check to see what their 'unique identifier' (5247497 type input) was during their last session, System(s) is of no use if u doesn't check, and best if u checks each time) b OSC () / PR () / PS-Zone (sys "tracks" w5 u moved and or what they did(uip, gps) -> plays back this information when u re-accesses sys) // Q () / R () // ROUTER () / SCORE (u's previous score or "status" or "TDS" (previous usage) can be a unique identifier(password) - this automation helps the less creative / lazy u) // STATUS () / TDS () / T () / TRACK () / UIP ().
-Pat search strategy - USPTO Bib disk -6/96: (repeating* or repeat*) near (access* or accesses* or accessing or password*)Accessor= generates repeated behavioral pattern(s)= permit" designated" "access".
.  Changeable password elements. "Order & Timing" of: how accessor should "repeat" aspects of previous activity (w5)"Morning alarm": do it to deactivate alarm.
"SCIENTIFIC SIGNALS" = Body signals. Body signals: System(s) gauges bodily signals unique to individual. Examples: body's natural electrically generated signals; skin chemistry; heart beat pattern; heart beat speed (u works on treadmill to get heart to designated speed = and u sees their rate on "s" and when achieve, it requests access at this time.
-Drawing: u = sensor = medical "score" "analyzer" = access.
-Pat search strategy - USPTO Bib disk -6/96: (signal* near body) and (access* or accesses* or accessing or password*).
-Accessor= generates scientific pattern(s) = permit "designated" access".
-Animal / Organism monitoring KN must "sense" designated criteria= access (for animal).
.  Changeable password elements. "Order & Timing" of: scientificsignals. "Morning alarm": body signals must imply (full) wakefulness. User is up to psych up themselves to then= alter their body signals.
"SCORE" =Limits amount of access. Eg: kids can't watch TV over 10hours/week on week nights.
-6B 370 Measures time(s) door chime was pressed.
-Scores w5 of person's hacking activity to better enable court prosecutor's request for stiffer sentencing.
-UIP: 1] Studies if u's actual behavior matches how System(s) thinks u would behave. 2] Identifies then "tracks" villains. 3]"Analyzes" contents and restricts accordingly, eg: limiting programs for children.
-"Edit": Limits functions available based on u's "status" /"score".
-9G220 Channel Scanner Skips Stations Having Commercials:(access/uip determines what (w5) u needs to view (access),communications/data that can selected include: t, mo data, a/v material, db, m access, usage of r functions. System(s) blocks: commercials, aspects of data (which are coded as restricted to certain access coded u)-"Bill" Accessor= generates "score" pattern(s)= permit "designated" "access" / nr.
-"Track": system records who gained access (w5). Each person[or department] has different code. "track" = ba = access.
-criteria #A, K: correct rhythm of typing necessary; criteria #B: correct password needed; criteria #C: (entry) data must be tr by the second of three people. Access sys's = "analyzer" = randomly determines which of the three A/B/C allows access (on a month by month basis for a u by u basis) -> access procedure for isolated situation: 2nd u k password (w/o regard to rhythm) -> 2nd u types letters in certain rhythm.
"SENSOR - MISCELLANEOUS / CHEMICAL" = Chemical "Analyzing" systems / "sensors" / probers% that sense the presence of any designated object w/ "designated" chemical constitution. Eg: salt; gold; water; any chemical "Smell Sensor" senses; any chemical compound(s) given in designated "order &timing".
+  Liquid or solid chemical produced by company and competing w/similar chemicals sold by others. Eg: bring your Coca Cola but not Pepsi into exhibit at carnival and get free entry. Needs good applications if patentable.
+  Applications: -Particular sports shoes (with unique: colors, or chemical constitutions on portion of shoe). -Particular sauces: eg, Kikkoman's but not other brands of soy sauce or other Asian sauces.
-Labels on products w/ designated chemicals. Labels attached to product. Eg: Floppy disks; "cart". -Passwords can be built into part of product. Only users of legitimate brands gain "access". Each product (model number) may have designated passwords.
-Number of "accesses" might be limited. There would be some counter / "score" / wearing off (of chemical) per usage (for access).
-Additional Applications for giving preferred treatment to user's of one's products: Access to (free): water; soda dispensers; physical access to permit entry into a gated area or building or zone= w/ desired products / services; "stereo"; "osc"; information; kn function; or anything else that can be limited /quantified / restricted to certain people (such as via "access").
-at end or (running) race, only those w/ Nike tennis shoes can get free Coca Cola, and with this soda, they get access to next function.
-Electronic system only functions when fed or given such label supplies or parts. This may fringe on U.S. laws, hence discounts or other preferences can apply.
-Presence of correct protective clothing, eg: gloves required. See KN's 7G forms of shielded protection, counter tops, proper containers, etc.
-Other valuable applications should exist!-Those w/ or w/o excessive radiation prohibited access.
-7G Indicators KN: any chemical that can be "sought" via "indicator"= qualifies as a triggering agent for= "access". -Exists: bar code readers for "billing"; magnetic strips on flat keys for "access" and credit cards; microchips built into keys for "access", eg: on Cadillac cars.
-Patentability: System(s) "seeks" elements not commonly "sought" after for "access"; access process doesn't usually require carrying of an extra object, eg: key (since the presence of (main) element is enough to gain "access"). Changeable password elements. "Order & Timing" of: which chemicals are needed.
This is a subset of: Access' "Sensor Miscellaneous", and KN's7G Chemical Indicators = "Seek & React".
"SMELL ANALYZER" = +p 4C190 Smell Lock: Unlocks only in presence of certain smell, eg; wearing of cologne. If person's special cologne recipe is secret, this will be a difficult lock to break, and it will be difficult to even detect that a smell lock is the type of lock being used. User might wear colognes unrecognizable to human noses, in tern fooling observers seeking a way to gain illegal access into any electronic system, eg: computers, walkways, safes. Smell lock couples with additional safety measures, eg: passwords.
+p-some smells are not detectable to human nose, hence wearing such smells, which are noticeable by "sensor", increases security. Smells can be masked by combining w/ other smells (perfumes) not(always) needed for "access". .-similar and compatible w/ "Sound Lock" Invention in C Directory, 4C21OArtist Access.
-uses existing smell technology-Drawing: perfume -> chemical "sensor" = analyzer = access.
-Smells generated from: particular candles (scent from wick /elements in wax); cologne / perfume; hair spray; other cosmetics; insect repellant; body odor (advanced System(s) identifies each u's unique body odor); lack of certain odors (having just taken shower); weather conditions (smells just after rain), hence "access" limited to weather conditions (or weather conditions require differing access process).
-different combinations of access processes required for differing days / situations / type access desired. -Hazardous situations: access might only be / also be offered only at times of hazardous chemical release (such as to escape through controlled doorways). eg: chemical spill / radioactive release where (air) sensor picks up on it. Reasons: u doesn't have time to fumble with passwords. Cautions built against those seeking go gain access by inducing disasters, eg: accessor is photographed / not allowed out until security clearance.
-Smell "Analyzer". See 4C190 Smell Lock: Unlocks only in presence of certain smell, eg; wearing of cologne. -Pat search strategy - USPTO Bib disk -6/96: (smell* or odor* or cologne* or perfume*) and (access* or accesses* or accessing or password*)-Accessor= generates smell pattern(s)= permit "designated" "access".
-user must blow (via mouth or fan or natural wind) air / cologne in designated "order & timing". This patterning process might tolerate drafts or odors in between the blowing / transmission times (due to less controllable air flows).
-Needed "changes for access process" can be: using more / less cologne *; mixing cologne's; not wearing cologne at "designated" times (w5 access is desired).
-Smell types. Particular kinds of: flowers; foods; spices; mildew or rot from certain elements; ink (fluids); elements kept in capsules and (plugged into "sensor"= resulting in less loss of odor for subsequent usage); minute odors from woods, plastics, metals, stones; liquids (w/ other elements); wax; other chemicals; hazardous chemicals (those mentioned in KN's file 7G).
-Smell can be replaced w/ particular types of weather: humidity; atmospheric pressure; level of ionization; pollution; altitude; longitude; latitude.
Changeable password elements. "Order & Timing" of: w5 odorsare dispensed.
Odor may only be released when the previous access procedure was conducted= intern this odor triggers "order & timing's subsequent needed password.
-Punishment: wrong access procedure can release an odor whichcauses: system shut down / inability to re-attempt access (W5)(during set duration) / nr / unbearable odor, eg: skunk's.
-This an other password generations can be utilized for training animals.
--Eg: animal's actions cause an odor= animal then gets food. Poor behavior from animal causes wrong odor and no food or electric shock or piercing sound. * Not important! "Morning alarm": are body odors slightly different in morning? If so this can be utilized to determine wakefulness. Applicable to animals being researched? "SOUND ANALYZER" = Synthesizer: Password is the setting needed to alter u's synthesizer: need "synth" set in designated ways to make sounds audible / comprehensible to (human) ear.
+  5A500 Sound Lock: Activate lock by emitting special inaudible sounds from tiny pocket device. +-Key attached to the sound transmitter.
+-sounds may be inaudible to human ear, lock opens. Helps prevent people or other's monitoring systems from knowing a sound lock is being utilized. Access' "Hide". The audible / easily recordable portion of sound might not be the sound needed to gainaccess, misleading hackers, while the presence of this sound functions to let accessor know the sound mode was activated (w/in certain time period from when important sound was transmitted by 'osc).
--there are frequencies which cannot be easily recorded by equipment (illegal copies of sounds for unlocking). Its more difficult to copy and or know about copying if the transmitter sends sound in frequencies not audible by human ear-the volume might be set at certain level, to further complicate accurate copying / needed access procedures. -changeable password elements. "Order & Timing" of designated: sounds; pauses; volume; pitch; bass; w5 sounds emitted.
-others nearby may not know how the lock is opened, adding tosecurity.
-4E020 Content & Date Verifier: of (any said) occurrences, eg:"tracks" occurrences; "analyzes" occurrences (for uip)"Speech": voice recognizing System(s) seeks certain sounds "sa".
-Patents: 5450524 Password verification system based on a difference of scores ("scores") of type sounds (SA); 5499318audible uttering and timing of uttering.
-type sound(s). Different: regional accents; languages; person's voice; any other sound distinguishable from other sounds such as by their frequency, duration, pattern, volume, pitch, distance from microphone.
-Pat search strategy - USPTO Bib disk -6/96: (verbal* or sound* or music* or audi* or voice) near15 (access*or accesses* or accessing or password*).-US Patents: 5517558 Voice-controlled account access. 5426450Hands-free hardware keyboard. 550303 Accessing information
-AT&T 5335313 Voice-actuated, speaker-dependent control system for hospital bed. 5309504.
-sounds can be used to create "artist's" images -> gain "access": Manner of sound generation (by u) determines type image. Accessor= generates sound pattern(s)= permit "designated" "access".
.  Changeable password elements. "Order & Timing" of: w5 sounds are emitted.
-"Morning alarm": UIP-DB stores the sound types of user when they are wakeful = this database compared against= those vocal sounds emitted by user in morning. User needs to bring themselves to wakefulness = to reach the "designated" "mood" in user's voice= as "analyzed" by "sound analyzer".
"TEL" = also see file: Parts-Telecommunications for further explanations parts codes used. Eg: for telephony, information highway related applications of "access".
.  "CID": can only gain access from designate tel numbers. If caller not from designated tel #: User designated as suspicious. Access is limited, eg: by time parameters; subject matter; additional passwords needed. System(s) calls back u on the tel # u should be calling from, and expects a busy signal. Access may select not to even answer! respond fully to calls from unknown tel numbers.
-Pat 5280581 System(s) calls back accessor.% Misc: 3E040 3E041 Telephone Noise Canceler: (sound sources identified by their tr (access/uip code transmitted) are processed/handled differently as pr; system better hones into/away sounds w/ or w/o such tagging transmitters)-3G010 T Ring Delayer: (only for calls coming from
particular CID)-4E020 Registered Electronic Media Communication: (1](registered) material is "analyzed" for uip/key words and this analyzed material is then = tagged (uip) = intern such tagging helps in matching whatever (u who is being evaluated (for their access/uip) w/ the (registered) material. 2] "Analysis" helps control/guide the 2E251 Intelligent Monitor.)-"Morning alarm": user's port connects to "mainframe" computer. "TRANSMITTER" = Transmitter from u (as u walks by "sensor");Magnetic Device.
.  R127 [ Commuter's train ticket credit card: circuit emits frequency read by device in ticket gate. JR (Japan Railway) ]. Also copied to "Access", "PS", "Score", "Track".
.  Magnetic Device: The presence of a magnet touching, or not touching within a few mm or cm, activates and or deactivates. Differing type magnets or other devices emitting other electrical forces give different commands according to the activator. An activator may have the ability to transmit one or more different type signals. Accessor must exert designated strength, eg: type magnet and or distance they're placed from" sensor's" magnet. Changing distance ("distancer") creates needed patterns = Access' "order & timing".
.-copied from IMI&8 "R" part.
-Accessor's (portable) magnet / object may also need to meet following parameters by having/being: a size (fits into slot);include a microchip with built in password; (standard) key; attached to another kn (invention) password generating device. "Transmitter"= Accessor's "Key".
-Drawing: similar or opposite magnets = "sensor" = "scores" degree of pulling or pushing = access. -Radiation: radiation needed to gain access. Values: such key can't easily get taken out of building! area since it needs to be housed in a large enough lead container readily noticed, plus security at entrance checks / scans all packages / people.
--Drawing: mild radiation = Geiger counter "sensor" = access.
-Pat search strategy - USPTO Bib disk -6/96: magnet* near9 (access* or accesses* or accessing or password* orverif*) and (computer* or electr* or software*)4C020 Transmission Lock: * <1 (good argument), 1, 4, 4> Activate lock via any type of transmission. The exact frequency and the combinations of on and off activate the desired functions. Combinations can lock or unlock, turn on lights, call security. Example frequencies: light, sound, or any other airwave.
-activation via vibration(s) - the level of vibration (impact /movement) and or the code determine "access". The 'code' is determined by: time period of each vibration mode / time period between each mode / level of vibration intensity / number and type of modes / in combination with other factors, eg: other "fq"(sound/light) / key / combination / password / other "access" entry factor. -the more different factors, the more difficult to gain entry /crack the code (for "access") / "access".
-(instead of magnetic...) any frequencies which cannot be easily recorded by equipment (illegal copies of sounds for unlocking) -its more difficult to copy and or know about copying if the transmitter sends sound in frequencies not audible by human ear-the volume might be set at certain level, to further complicate accurate copying-transmission can be of any other electromagnetic airwaves Laser Lock: Activated by tripping laser lights. <3> 2] 4C020 <- 5A 480-042004. Laser lock details found in "access" main file.
-Accessor= generates transmitter signal pattern(s)= permit" designated" "access".
Changeable password elements. "Order & Timing" of: w5transmissions are transmitted. 
"TRAP" = + "Maneuver" = "Traps" (Punishment for having wrong password): Trap types: images beckoning ("prompts") accessors yet results in: -deactivation of desired function. This part in this way might not be used. -gives enough information / acts (almost) like how the hacker may think System(s) should work.+ Booby Traps: fools "accessor" into believing they gained access: initial password typed in (whether correct or not)results in System(s) stating /implying such was correct answer:-yet u trips up on some later step (while falsely thinking they have one of the correct passwords).
-sys "tracks" (compiles enough information on hacker) to punish them: identify hacker (who or where they are / W5 they access);"notify" security; ba on hacker to better catch them upon any subsequent attempts they may commit in hacking.+ "Bluffing" - leading accessors on: some sensitive information may need to be given to continue fooling hacker into believing they've not been identified as a hacker. Depending on the level of access system's sophistication= the "designation" between sensitive and non-sensitive and "trapping" information given=will better allow access System(s) to accomplish its aims: "trap" accessor; stop reattempts at hacking.
-Files used for "bluffing": "designated" files need to be triggered to open when hackers are deemed present. These files must be accessible in a realistic manner, eg: u keys in (again)(same) password. Files for "bluffing" may be altered from the real ones via: "editing" / search and replace / manual alteration.
--they hopefully don't contain (enough) information for accessor to figure out how to (W5): gain access and not be considered a hacker; learn about "bluffing's" presence / characteristics; commit sabotage against anyone or thing, even if its not sensitive to owner of the system being hacked.
-keeping hacker from thinking they're being led on: any foolish(password) action by accessor can't necessarily be tolerated.
.  Types of "trapping" information or elements given to accessor: tel numbers for accessors to call= which have CID (requirement to gain access)= then identify hacker; other sources or places hacker can visit (by "computer" w/ their CID) (on WWW).
-sw (with computer viruses (that might best be deactivated by controller of access gate way), hacker contacting this human controller can give way to identifying who hacker is (if hacker is unaware the virus is actually a booby trap). Accessed system/ Virus can have information / contact points to disable it.
-hacker's system is labeled for all future "interfacing" with other computers, so other systems know hacker's system was once used by a hacker.
--Eg: 1] hacker's CID tel number is registered in <black list>tel number db. This is an example of how booby trapping occurs w/o (without) hacker's awareness. 2] portion of SW (Software) or hw is (permanently /secretly) "edited". Such as portions used for helping computer System(s) to: identify itself; gain access; use modem; "interact" with new data / SW (Software) (on internet / m).Misc: identifying -> "tracking" = hackers / nr / "trapping" hackers.
-value: fear of (further) punishment helps ward off hacker's subsequent hacking attempts; legitimate u w/o correct access procedure are (more) forced to speak w/ their supervisors (before damage is done in some manner (releasing of sensitive information; damage to system or what it is effecting (by incorrect usage)).+ Hacker's or their colleagues' subsequent attempts at hacking:-"track" = "ba" are more on the look out for similar accessors again. Chances are likely hacker's have some common behavioral pattern (UIP)= that is common in each access (attempt).
--if UIP-DB on hacker's behavior is lacking= System(s) may continue to allow hacker to be fooled into believing they're gaining access=while UIP builds up its db on hacker(s).Other "traps" and punishments: Any other known way of "restricting" / punishing human hackers / equipment used by hackers, w/ or w/o hacker's knowledge. -See patent database: Key Words - (password* or access or accesses or accessing) and (track* or punish* or trap* or fool*).+ Building a better defense against hackers: UIP on likely hackers: develops db=ba (what behaviors to seek)against future (different) hackers. Learns what is more sensitive and sought after by hackers, intern requiring extra defenses. In other words: Access' "analyzer" identifying weaknesses in their defenses (so System(s) can (automatically) repair itself).
.  Drawing: "Trap" = C ("Booby Traps" appear in below listed parts /below parts are used to beckon hackers / the parts are uip-tailored to beckon hackers) - Access =ARTIST () / BEHAVIORAL ANALYZER () / INFRA-RED SENSOR (// KEYS () / LIGHT SENSOR () / MERGE () / MOTION () / MANEUVER // PS-ZONE () / REPEAT (// SCIENTIFIC SIGNALS () / SMELLANALYZER () / SOUND ANALYZER () / TEL () / TRANSMITTER () //VISUAL ANALYZER () / CHANGE ACCESS PROCESS () / HIDE ACCESSPROCESS 0 // HINT () / NOTIFIER () / ORDER & TIMING () /PROMPT () / SCORE (Accessor made to believe they had a high enough score or "status").
"BA": level of crime or damage conducted by hacker= according to("analyzer")= results in a corresponding level of punishment= to hacker. Mirror: accessor is (partially) allowed to see themselves as access controller sees them. System= next analyzes how accessor changes its behavior / access process. Those changes are more carefully "analyzed" for what accessor might be trying to camouflage about themselves, eg: their bad traits= that system is trying to "track".
.  "Tracking" hacker= after they've been identified:-"Tags" are placed in the material hacker downloads. As this material is moved ("routed") around (their / main system / WWW)="track" follows it= to: others collaborating w/ hacker / hacker's whereabouts / better understand hacker's behavior. "Guides"= "hackers"= into their "designated"= "trap". Morning Alarm: if user turns off system / deactivates alarm * in/on-authorized manner= punishments can include: loss of files /other functions alarm System(s) is tied to. See information on other ways user is punished I motivated= so they get into and stay in a state of wakefulness.
"VISUAL ANALYZER" = fingerprints; face; pictures. This part is very related to: Access' "artist", and "image" input for gaining access.+ Eye blinking: pattern of blinking -> codes. Possibly only for unique eyes of each person (iris). Blinks Morse codes. Another example of body movement gaining access.
--needed eye color can be achieved by wearing colored contact lenses.+ Accessor must wear/present particular (coordinated) colors for access (entry, usage). Other "artist's" "image" examples: company logo emblazoned on attire; picture ID clipped on shirt. These are examples of needed "images" / visual "coordination" needed for access via va.
-see "Artist's" R24-1 Image Coordinating Software-Fingerprints. Also: Different genetic fingerprints = typed /scanned in; photographs (faces, bar codes, scenery). Lines also from: palm and any other body part. -"Visual Analyzer" for externally shown 3-dimensional objects: U's unique face; any picture or object they = show "camera". Objects might need to be turned / angled up to 360 degrees (at designated speed, such as by putting it on a speed set turntable).
-"Visual Analyzer" for images on flat / 3-D surface: -Image generation: ("Printer") prints a different image each time, based on its changing password creation System(s) = images scanned = c = access. --Multiple sources generating password: User might also be asked to make all / part of the image generation, so image's output effected by the symbiotic help of each source. The geometric effect SW (Software) may have on each source's input on each other causes a result nearly incomprehensible from what any one source entered -increasing difficulty in identifying each source's input.
---Drawing: each source (c (password generator sw) / u) = enters images/ data / SW (Software) / etc = "analyzer" = c integrates inputted elements -alters according to source(s) / c integrator = final password developed (double checked for accuracy / functionality / security clearances) -> password given / printed / stated / tr to other.
-Previously generated / used passwords need designated alteration("editing") for subsequent access.
-Images include: bar codes; abstract designs / paintings; single or multi-color; coloring in shades / solid blocks or (tiny) dots as in periodicals' full color printings.R174 Computer ("C") checks person's fingerprint before allowing" access" 2 Aug 93 NK-moved to "access" 6.96R195 Fingerprint operated entry system. 25 Jan 93 NK-moved to "access" 6.962E251 Remote Controlled Camera: (sys monitors people according to their access/uip (code)).5G061 Dyslexia Software: (speed at which info given determinedly u's access: either u gets info faster (inhibits uninitiated computer hackers) / SW (Software) slows down when c/security guards need more time to "analyze" the "access" level of u (who is being questioned (by c); 5G070 Speed Reading Software)--form in which u sends / receives. Pat search strategy - USPTO Bib disk -6/96: (photo* or finger* or (bar near2 cod) or image* or imaging* or vision* or visual* or pictur* or (bar near2 code)) near9 (access*or accesses* or accessing or password* or verif*) and (computer*or electr* or software*)Accessor= generates image pattern(s)= permit "designated" "access". Changeable password elements. "Order & Timing" of: w5 images given.
.  see: + "Visual analyzer", and "Artist" = "VA". Other "artist's" "images" needed for gaining access:. any product of nature with its visual characteristics. System(s) can require characteristic common to the species or scientific category of product, eg: any cat's hand or piece of gold, or be more particular eg: front right paw of specific cat, or 22 carat gold in "designated" shape. Seeks: color, texture, (overall)weight) of objects. Access requirements alter according to reasonable criteria, eg: plants change their condition (dormancy)at certain times of year; hands are colder in winter (eg: for infra-red "sensor"); % since there are no Oak trees in Hawaii, leaves must be flown in and hence will lose some of their color in the interim. Objects can be placed in certain manner by (non- visual analyzer) "sensor". Examples: -people: any body part.
-animals: any body part.
-plants: any body part: leaves (their veins, outer shape, color(changes by time of year access sought), branches* organisms: any type cell or "scientific signal" they generate.
-chemicals: needed formulae: percentages of differing chemicals/ (total) quantity of any parts. Access = chemical content"analyzer".
"W5" = Access at right time: designated temperature, weather, certain news in mass media, when another "designated" u also has "access". See Access's "Order & Timing" subset.
-Accessor= generates W5 behavioral pattern(s)= permit" designated" "access".
CONCLUDES THIS ACCESS-IMI FILE (Parts)
File: Access \ Ac-Image 
File: Ac-Image. Image Input Access System.
. $$$P 4E-030 Image Input "Access" System:
The user or one who wishes to gain access into a system must make certain pictures to gain access. The accessor must create an image with a computer mouse, or via other means; which must match the diagram in the computer's memory. This image acts like a password.
-The system has a designated tolerance for images that differ from the one in its memory; the accessor may draw the picture in a somewhat different manner each time. This form of tolerance can for example seek a square or triangle of any approximate size.
-The 'image permits 'access to any privilege described in the "access" part.
.  Applications include: (de)activate alarm; additional verification of u (user) (person trying to gain access (via matching images / uip-ba (signature analysis N))); slows down u (user) whom sys suspects are hackers / villains; gain access intoA: entry way; use of product (c, some el (electronic) sys); use of game; higher levels of usage within sys; banking: electronic funds transfer; gaining access into building or C.
. Image types needed for access:
-straight lines connected at angles; (u)closed shapes drawn with lines, eg: circles, triangles, squares, rectangles, pentagons, hexagrams, polygrams...; (lines of) dots at designated locations (on S).
-the type 'image required often will be those for which the 'system's 'analyzer can build a reasonable tolerance for differentiation [should such 'images be inputted by the accessor's hand and not via other means like a picture, thumbprint, etc].
-make similar or related or unique picture, system may give (prompts) ideas for picture, eg: ones which instill the idea of waking up like running to catch bus.
-type diagram examples: additional add on elements are made to previous diagrams - to better assist user in remembering needed diagrams; diagrams can be from sets of things such as vehicles (first car, next bus, next airplane), or shapes of provinces or states, or words (middle names of one's family); zig zag lines, eg: spider's web or child's drawings (required length of (straight) lines with certain angles needed at points lines bend / intersect. +-Altering type images / methods / mannerisms needed to gain access, in order to avoid hackers getting a non changing password type image or method. Sys determines (from hacker's point of view) haphazardly w5 needed images are changed (according to circumstances).
--For Techies: Drawing: User = This N (invention) Sys (what helps in the determination ("analyzer") for type images needed = % type images given (entered); type prompts and or other challenges can be more difficult to hack / crack depending on, eg: circumstances (see Features following) / perceived security risk (type u (user) / type application sought by U)) - c (computer) =
ACCESS ; AP (type application of N); ARTIST (if "artist" type N (invention) is connected to main N; u's drawing ability (uip, score)); ba ('behavior analyzer) ; CART (entered into sys by u); EDIT (analyzing inputted images by u); EDUC (if sys needs to teach u); K (keyboard) (if only keyboard is available/functioning, then available images are reduced; or entire sys can shut down in this case due to higher security risks); MOUSE & R (remote control) & K (keyboard) & Tilt & T-bandwidth (type mouse being used, its limitations being taken into account); MULTI USER; PR (software program) ; ROUTER (where on information highway / web u (user) came in from); SCORE (u's previous performance); SPEECH (sound analyzer); STATUS ; tds (time date stamper) (occurrence of past / current activity of u); TILT ; TRACK; User (who they are); UIP ; UQ (type questions u asked / errors they made, helps create a perceived security risk of U).
+-3D: User may need to enter / create / respond to 3-D images (onto "interactive" "S"). "VR".
--user may need to 'interact with the 3D image, such as knowing where in the 3D maze or terrain the "secret door" or "key" or that day's password is located.
---accessor may need the first password to get into the terrain.
---too many errors in seeking to locate access in this terrain invalidate that user's first password.
-Color: the color shown on S (screen) may change, even though the color code used (via K) is the same. Purpose: fool hackers sharing information with each other of getting data from their notes which mention which colors are used/needed/responded to / altered W5.
-Size: simply change size w (with) (most) other aspects of image remaining the same.
-U / Sys may know / suggest when (w5) needed images are to be changed.
-Drawing: u (user) = K (keyboard) = visual analyzer = access (analyzer, score (security risk)).
. Prompting may simply help u remember nature of desired image, w/o (without) giving all data on the images.
.-U knows additional 1] subject matter and or 2] manner in which depicted subject is to be drawn. Eg: prompt states 'citrus'= u (user) via #1 recalls its an orange (not the tree or leaf), via #2 that the image should be drawn with thin or thick lines (caused by pressure level / manner of stylus/R (5E020)) and whether the fruit should be filled in with shading / various colors or just the outline to be drawn.
-Prompts: For Techies: Drawing: User = This N (invention) Sys (type prompts given u determined via) - c (computer) =
ACCESS; ANALYZER; CART ('software cartridge); EDUC; mfh (mainframe hookup); MULTI-USER; PR (software program) ; PS-Zone ; Q (asks questions) ; SCORE (u previous performance / prompts during previous sessions); %SOUND ANALYZER; STATUS ; TDS (time of day, length or level of security clearance for designated type access/task); UIP; VISUAL ANALYZER.
-Perhaps only the entity seeking "access" knows what to write (clues/prompts may help a computer hacker).
-very similar to 4C210
-compliments other "access" featuresA: u's finger print or eye ball image scanning->c (correlates against memory); cart; password; 'transmitter worn by u (user) (user) (seeking entrance).
-use system to "score" u's behavior/ability: uip; bva (this is part of bva); u's ability for specific tasks, roughly replicating any existing psychological/*sociological testing system (on paper) which studies u's behavior; "visual analyzer".
--done via help of: "visual analyzer" (of images made by u to gain access, or during work session on C), "uip-ba". -DI: u=(stylus/finger)=s (touch screen)=c-access = osc/printer/m/cart
-copied to better N (invention) file 1.95
-For Techies: access; "morning": deactivates alarm upon u's correct input (level of similarity controlled by pr). .-uses any existing electronic "analyzers" which analyze human signatures / images. Also see listed patent numbers. US Patent office is working on a visual analyzing system for their patent database.
.PATENTS: 
-Patent search strategy: #1: securit* and (signature* or draw or draws or drawing or (image* near5 creat*)). #2: (security or (gain adj access) and password*
KW: access
-US Patent Numbers: 5319797 5222138 4903991 4908861 4991205 + 5111512 Method for signature verification - 1992 patent. Access is given with correct signature.
4850018  4869946 4758718 4799258 48166534851937 4876717 4326098 4023139
-especially patents listed / related to "visual analyzer" and "access"; and to some degree "ba" versus patents of other Features for this KN.
Claims include: helps solve the problem that people's signatures are often commonly available.
-the needed diagrams can change over time and or after designated number of usages.
+  Generating images via: "C" "mouse"; 5E020; c (computer) input tablet using stylus or finger or other stick; "Artist"; R; % "Sound to Visual Converter"; manner in which one walks about near the motion "sensor" = "access". -UIP / BA: these are also used in determining whether access is permitted. Sys "analyzes" past and current images generated by User and studies them via UIP-BA or US Pat No 5111512 in judging how close / dissimilar the recently entered images / signals are from needed criterion.
+ "Artist": all the (existing) diverse ways one can input / alter / "edit" the images / drawings, which were generated / started by person (u, one seeking "access") or sys (via its prompts) can be utilized.
-Additional examples:
-Patent search for this "artist" sub-section: (artist* or draw* or (creat* near3 image*) or (creat* near3 picture*)). KW: create can be replaced w: alter, design, edit, make, develop)
. For Techies: Drawing: User = This N (invention) Sys ("Access" gained / effected / "analyzed" based on functions for any of following) - c (computer) =
-iJ010 Body Movement NR:
-3E150 PS-Zone:
-3G010 T (tel) Ring Delayer: ("analyzes" w5 u (user) answers the tel, eg: if u is often not answering for some time, then maybe u is somewhere too far from where they should be, or is busy w (with) something else, or is poor employee (lazy))
-4E010 Alternator: (sys must have designated level of)
-5E020 Remote Control Stick: (generates images, eg: abstract versions of C=stylus)
-5G061 Dyslexia SW:
-7G050 PVC Notifiers: (presence of certain chemicals (also) needed for "access")
.-7G052 Flexed Level Notifier:
.  For Techies: Drawing: User / Other Sys = This N Sys (Access: (Type) input to gain access) - c (computer) = PS - R (remote control) - Tilt:
Remote Control
PS
Access
SW 
Exercise
Analyzers
Indicators
-Sensors: hazards, novelties, monitoring of events: designated chemical needs to be: inserted / placed into/onto sys; causing nr ('notifier) to change.
3E152 Positional Image Generator: Changes in position of moving objects are registered by system which intern generates an image or "track" for said changes -> when such images match "access's" criteria, "access" is granted. In other words their pattern of movement via zones / tilt generates a pattern as perceived by "sensor" -> C. Moving or stationary images are generated by location of elements in subject that can generate signals in "Visual Analyzer".
-position of each element generated by: 1] light / color / heat generated from portion / all of targeted object. / 2] tr (transmits) (transmitters (on surface / appendages / inside) targeted object. / 3] "distancer". / 4] locator: KN (invention) finds objects.
-Drawing: signals coming from (moving/stationary) object(s) = "analyzer" = image generator / "track" (score, intelligent monitor 2E251, uip-db development).
-this part is similar to many other sub-Features.
Password/"score" needed so= image generation is in= desired color= to gain access.
-1C310 Software Multi-color Adventure Pen: The device decides when to change color into another matching color. In pen or software format.
US Patent Search Str:
(access or accesses or accessing) and/adjl5 ((gain adj9 access*) or enter* or password* or secur* or protect or authoriz *
-US Patents: 5491752 Increases difficulty of password guessing attacks.
--Pat search str: Worked w/ US Pat Database 'Bib' 4.96 Disk.
. Encrypted: encrypted with state of the art.
-u's activities: access processes, files, etc.
-password systems / pr, or the fact that one exists.
-Miscellaneous: "Track", "Score", "UIP" (uip-db)
-password itself encrypted = and only decrypted by access point's "analyzer" = to determine if access permitted.
+ See "Artist" image generating modes: any of these can create the necessary image(s) / processes to gain "access".
US Pat 5486122 Autonomous wearable computing device and method of artistic expression using "game": Educational devices using process-oriented educational methods are disclosed to prepare children for keyboarding. The device include sets of gloves and indicia applied to fingers of gloves to provide pictorial representations of the keyboard.
Accessor selects "images" that are "edited" as "designated"; or "edits" them= then gains "access".
-Same "edited" form can't be used more than twice in a row.
-"images" undergo ongoing "editing"= accessor needs to know at 
which point in the evolutionary process= access is viable.
. Hypervideo (exists): users click on (moving) images!'icons, and get 'routed video clips / information ('tailored to their needs). Object Tracking software (exists) make (moving) images clickable.
--Access applications: user must know in what chain or 'order & timing, in which they need to click images, as [they] 'route themselves in the program to gain access. Clickable 'images can change [in 'tailored fashion], eg: user only clicks on what they recognize, eg: faces of people / objects they are [intimately] familiar with, or which have some [semi] -logical reason to be clicked on, eg: story line [based on user's 'ba].
END File: Ac-Image
File: Access \ Ac-Pat Sch&
ACCESS PATENTS AND PATENT SEARCHES
Key words for patent search strategies: access*, computer*, entry, (gain* or keyless) adj3 (access* or entry), password*, interactiv*
.--toy*, fun, play*, child*, kid*, image*, imaging, create, creating
-str: (achiev* or obtain* or accomplish* or get [or gets or getting] or gain* or keyless) adj3 (access* or entry) -str: password* and (access* or entry)
-str: security* and access*
-str: (draw* or create or creating) adj9 (access or accessing)
-US Patent 5368308: Stream of recorded sounds broken into segments then re-ordered = needed to gain "access".
12.95 Bib Disk US Patents = Access: Search strategy on USPTO's Bibliography CD dated 9.94: password - many related N, only scanned the list, eg: 5323465 Access control; 5289540 Computer file protection system; 5276314 Identity verification system resistant to compromise by observation of it use; 5206905; 5115508; 5111185%; 5097506.
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry system into car 5319364 507402= "c" 5450524 5206905
Improvement on patents:
Sub-Parts:
-Access-Restrict: Different u have differing levels of access to full range of information / functions = (based on their password).
.-Access-Track: follows target upon entering (mode) (until which time the one accessing is deemed a low security risk.
-Imi  Part 'Burglar, is subset of 'Access. 
Pat search str: password* US Pat Numbers about sys generating passwords (pat search str: password adjl5 generat*): 5513263 5509070 5491752 5469564 +5442342 5428349 5416840 5365574
-+  Main at search strategy for all of "Access": (access* or accesses* or accessing or password* or verif*) and (computer* or electr* or software*)
File: Access \ Ac-Pa
ACCESS PATENTS AND PATENT SEARCHES
-kw (key words for search): access*, computer*, entry, (gain* or keyless) adj3 (access* or entry), password*, interactiv*
.--toy*, fun, play*, child*, kid*, image*, imaging, create, creating
-str: (achiev* or obtain* or accomplish* or get [or gets or getting] or gain* or keyless) adj3 (access* or entry) -str: password* and (access* or entry)
-str: security* and access*
-str: (draw* or create or creating) adj9 (access or accessing)
-US Patent 5368308: Stream of recorded sounds broken into segments then re-ordered = needed to gain "access".
12.95 Bib Disk US Patents = Access:
-Search strategy on USPTO's Bibliography CD dated 9.94: password - many related N, only scanned the list, eg: 5323465 Access control; 5289540 Computer file protection system; 5276314 Identity verification system resistant to compromise by observation of it use; 5206905; 5115508; 5111185%; 5097506.
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry system into car 5319364 507402 = "c" 5450524 5206905
.  Improvement on patents:
.  Sub-Features: Access-Restrict: Different u (user) have differing levels of access to full range of information / functions = (based on their password). * Access-Track: follows target upon entering (mode) (until which time the one accessing is deemed a low security risk. Imi Part 'Burglar, is subset of 'Access.
Pat search str: password*
-US Pat Numbers about sys generating passwords (pat search str: password adji5 generat*): 5513263 5509070 5491752 5469564 +5442342 5428349 5416840 5365574
+  Main at search strategy for all of "Access": (access* or accesses* or accessing or password* or verif*) and (computer* or electr* or software*)
File: Access \ Ac&
ACCESS' Miscellaneous Information: File k\ac&
Miscellaneous forms of actions permitting "access":
-Forms of motion by U. See KN's Yamaha Miburi and related KN.
-Form of User causing "vibration".
-Way  something is assembled or taken apart: 3A205 Tamperer Alert. Rubrics cube. 
-Motion access procedures: Correct movement of hand or joystick. Motion type #1 -> motion type #2.... -> access. See KN's Miburi from Yamaha and related KN.
-Vibration Sensor: Senses vibration, eg: if person is walking or sitting on sensor; or senses vibration signals coming from elsewhere.
Miscellaneous: includes known (c) systems which restrict "access" of people / other systems to: use, work w (with) particular el (electronic) N.
General Diagram for "Access":
. Dl: 1 UK (user at keyboard) = 2 C ('computer) = 3 tr (transmits) = 4 M15 function. Dl's For Techies: Details:
+1:  Passwording: gain access via keying in alpha-numeric combination; key insertion; via remote ("R", password tr (transmits) from R); fingerprints, passwords, key cards, uip, another C ('computer) (their sw), clap*
25: access can be changed via pp, mp, cart, u (user) with higher (overriding access, eg: supervisor, C ('computer) sys itself); character; 24 tds (time date stamper) (scores w5: when, *how, *what, %why, who gained "access" into system - [may also be used for uip [database], 4E020 Content & Date Verifier]; 25 "S"; 23 %distancer activates/deactivates lock; 123 access lock can be a physical (lock & key) / (programmable C ('computer) chip) card key / software barrier = (who can "access" 4E020 Content & Date Verifier / 2E251 Intelligent Monitor); 245 "C", 4E020 Content & Date Verifier, 2E251 Intelligent Monitor; 245 %interactive (activates/deactivates access, 2E251). 13: signals for activation/deactivation of access can be received and or activated via: microphone ("mic") (sound signals activate/deactivate access/2E25 1); tel ("T"); mo; tr; %fs (correct image eg: signature); remote ("R").
2:  *tilt (2E251 activated by N's movement); *distancer (eg: clapper); 245 mp; 24 mq (machine asks user questions) (prior to activation/deactivation; for uip database upgrade); 24 multi-user (individual requires own password or other activator/deactivator to gain access); 245* notifier (who, what, when, %where, why gained access, and or is using system); 25 OSC (outgoing sound communicator) (if password or other activator / deactivator effected desired function, eg: gained access); 24 * uip (access draws on pi's database to mq (machine asks user questions) prior to allowing user access to user; 24 questions for access change according to user's uip (mq an action user made on system in one of [important] previous activities); 24 pp; 24%score (2E251).
2  the necessity for the access feature is normally trivial, but assists in marketing, and helps organize differences between multi-user; uip.
1  the type code used in the password (a series of sounds, lights, letter or number combinations, etc) activates and or deactivates the corresponding function reserved for individuals equipped with the password.
24tds of user's past access is used develop his uip. Excessive or insufficient usage can exclude him the uses from some/all functions, trigger "notifier", and inform the user's supervisor via tel ("T"), mo, e-mail.
24 the type of uq can consequently (according to system's uip, mp, pp) affect/control the type of password/manner needed to activate/deactivate; 5 speaker.
.  For Techies: drawing This invention Part (Access) =
-E020 Remote Control Stick with Switch: (functions of any R (remote control) controlled by access/uip) -5EO80 System self analyzes best synthesis for acoustics of room/hall: (matches uip/access of u; u (user) may not hear/read certain OSC (outgoing sound communicator) (sounds/data))
-5E090 Wireless Music Band: (access limits usage of certain portable el (electronic) N) -7G050 & 7G051 PVC Perforation Alerter & 7G052 Flexed Level Notifier: (type access determines: type of pvc needed (for extra/less protection: to save money/trouble); which types of occurrences (chemical contact, perforations) need nr ('notifier) to u/sys/monitor)
.  "ACCESS": (4E030 Image Input Access Sys):
For Techies: D: User = This invention Sys (access: such actions (gain) "access") - C ('computer)
-iJOlO Body Movement NR; Yamaha Miburi.
-iJ080 Ice NR: 7G (colors must change) = visual analyzer (c) = access
-2E010 203040 50 Recipe Softwares: u (user) must request / read via sw ('software) certain recipes = (track) = gains access
-3E010 Mobile Tel Location Notifier: nr ('notifier) functions only for those w (with) "access"; u must be in designated zone (at certain radius) prior to "access"
-3E020 GPS Record Keeper:
-3E150 "PS-Zone":
-3E210 Indoor GPS Extender:
-4E030 Image Input Access Sys:
-5E020 Magic Wand: KN
-3G010 Tel Ring Delayer: KN
-3E060 Interactive Morning Alarm: KN: answer / ask right Q (asks questions) = access
-3E061 Body Motion Instructor: "educ" teaches u (user) how to move = future access.
-4E020 Registrar: uip of u (user) must match db ('database) = then access
-5G061 Dyslexia SW: "edit" changes according to u's type access
-5G070 Speed Reading SW: u's reading speed must match = speed designated by = access.
See 'Sound analyzer for: R54-1 Voice Recognizer Differentiates Between Multiple Speakers ACCESS = Passing of tests 'scored for level of accuracy.
-Forms of access: Access is achieved when the system 'receives the right electronic signals such as: in the correct 'order & timing, and duration of correct signal types.
--License: having a proper license for which royalties paid are up to date. Not exceeding the terms (limits) of the license, per the license agreement. License rights include: geographical territories ('zones); usage of 'designated 'Features, 'functions, and 'inventions; time periods; licensee's proper behavior (as observed by 'tracker and 'behavior analyzer). More details of our license agreement on our posted website, or *those commonly used for intellectual property.
-'frequency signals from: 'remote control device.
-other correct human or machine generated actions: that can be picked up electronically by 'sensors for:
--sound (of user's or animal's or device's unique voice or sound). Differing sounds from such sources permit differing types of access.
--visual  images (for finger prints, eye's retina, other body elements). Images studied by 'visual analyzer. 
--temperature: of human appendage such as finger or palm, or other [heated or cooled] device, or room temperature w/in 'designated range.
Changing Access Levels Granted to Users:
-analyzer: stops access upon suspicious activity. Eg: computer hacking - attempted access into files or functions for which system has not offered access.
-'score and 'uip alter access level, when (behavior patterns) of user are in/out of 'designated (behavioral) patterns. -Access granted to all or portions of functions available: W5: each 'multi-user has own time frame (TDS) to gain access. Differing desired functions can have their own access time/type parameters.
-forms of access can periodically be fully or partially changed.
.  Differing 'scores: The type of 'score achieved functions as the gateway to 'designated functions associated with such 'score.
-What type 'scores offer: Time length of access, or quality of function. Higher 'scores can activate more or fewer functions. Differing 'scores can activate 'designated functions with no one possible 'score allowing access to accessible functions.
.  Notifier activated if system gives a high 'score chance that accessor is illegitimate.
-*  Diagram: user = access = computer = results for user
--"Explicit Knowledge": Documented info 'accessible at any time by anyone with or without a password". This is left available as 'system in 'programmed.
.-From *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
End of File: Ac&
File: Adapt / Intro & Tailor
INTRODUCTION - ADAPTING INVENTIONS TO PERCIEVED NEEDS
Also Called - User Information Programming
Adapt Table Of Contents For Multiple Files
Introduction & Tailor
Adaptive Inventions
Sub Parts
.  Expand
Link
Article
Patents
Code Sequences for software & DNA
.  Other Adaptations *
Learn that it is quicker and easier to license from us, than trying to circumvent this revolutionary patent application. This application has so many ways of adapting. Call (+1) 707-428-5000 www.LicenseItToday.com.
Adaptation tailors a system's features for the unique needs of specific users. The entire patent application shows examples and related information.
ADAPT = User Information Programming TM. Also called Tailoring TM, or Adapting
adapt 'adapts the system to the situation. A common example is how it tailors itself to the user's unique needs. System uses stored information about the user, which it then customizes its functions. Improves product performance. In other words, it self optimizes its functions, to tailor itself to the situation at hand. It is often an invention's optional bonus feature. adapt is a central theme found in our inventions!
-adapt is a form of 'adaptive Interface: The electronic interface automatically and dynamically 'adapts to the needs and competence of the user.
-Adaptive functions include how adapt can: acclimate, accommodate, accustom, alter, change, comply, conform, revise / harmonize / familiarize with user's needs, tailor, attune, coordinate and integrate matters for user's greater benefit, adjust, collect and adopt info about what's to be tailored.
-Includes: Player Information Programming TM and Player Modeling TM for video games.
Adaptation Process Is Open Minded:
.  The 100,000+ invention variations made it able satisfy a wider range of needs than nearly all other related patent applications.
.  Ties with main inventor's conceiving 1987's best selling book "Closing of the American Mind" about higher academia stifles creative thinking. Despite the fact that this may historically be the world's largest patent application with extensive support for its claims, we expect to be challenged by the patent system, just like the main inventor was at some of the world's top universities.
A more polished and refined version of this application is coming forth.
The work stems from top inventors including our Eastern Europe's largest known electronic research program in 1990's, plus his research into methods for increasing people's creative intelligence.
Tailor / UIP-Tailor
This Patent Application Gives Thousands Of Examples For 'Tailor
System tailors its functions to the unique needs of specific users. Each user can have their unique profile stored in UIP-Database, which includes their: needs, preferences, and behavioral traits. Tailor then matches the database, with a menu of function choices.
.  Integrates and Often Overlaps These Part Functions: 'Edit, 'Educate, 'EGH (Educ Gets Harder), 'Guide, 'Interact, 'Predict, 'Seek & React, 'TGH (Therapy Gets Harder), 'UIP-Emergence (2G180), 'UIP Tailor.
Tailor titled 'UIP-Tailor, as it's a subset of 'UIP.
-tailors sys for "designated" users. Matches characteristics of user's db= w characteristics db covering all/some of sys [abilities of sys]. Sys / U* "analyzes" for best ways to tailor sys for u = then selects best/better options = u may select better options and brainstorm further on subject w sys / sys automatically implements its tailoring (wo "editing" from u / other sys). Extensive examples in KN files.
-Access' BA also selects what users want:
access=ba can "seek" / "edit" information for accessor. This is a form of UIP-Tailor. Saves user's time. 
--also uses internet's sw that "seeks" "designated" news / other material that appears later on WWW.
--BA knows what accessor wants to "experience" W5 = uip-tailor.
--See: "artist's" "cut & paste"; "edit"; "seek"; key word "seeking"; "uip-tailor". + "Predict" which is a subset of UIP Tailor. "Guide": "Game's" "Guide" which guides player according to player's UIP-DB.
-See File 2E - Idea Generation Software in directory "I" - effective pre 12.96.
.- 'Edit or 'Tailor alters how sections of computer code are 'Searched & Replaced.
Tailor-Simultaneous: Time related [and 'tailored] events [if not simultaneous] and how they can be 'tailored. Each function/benefit being 'tailored can take into account the traits for traits from the other elements [being 'tailored]. [Don't] create [some/much] synergy between each ['tailorable] trait.
Examples:
-Effects in 'Entertainment, 'Games, Etc: Simultaneously tailored effects reflect the traits of the other effects. E.G. While opening a shipped invention in a wooden case, smell some fresh wood while hearing the box cranked open. The toy robot popping out 'interacts with the box as it makes the rest of the way out, like the 'traits of a butterfly coming free from its cocoon. A/V effects from car races. Mother's A/V 'reaction to baby crying or wetting diapers. See 'Game Parts section for 'Effects.
-Multi-Users: Functions benefiting one 'multi-user, can be compromised to help others: Features [[address the lowest common denominator (for 80%)] of the users (so they can better understand [and be 'educated]). -Environment: it reflects 'mood of 'entertainment.
-it causes 'reactions: Ambient light or darkness having an effect on 'reaction from virtual objects.
File: Adapt / Adapt Inventions
ADAPTIVE INVENTIONS OPTIONAL WAYS FOR USING ADAPTATION IN OUR INVENTIONS.
*  5A810* Advisor: compiles user's information: birth date and time (astrology); takes picture of palm (or asks user to identify type lines they have on palm or computer); taro cards (more optional).
*  For the hobbyists into Numerology: numerology (takes the important numbers in person's life, eg: drivers license number, "T" numbers, address number, etc and sees the significance in them, eg: "8" means strength and "1" or "10" mean beginning. All the numbers in a tel number are added together, then the multiple digit final number is treated like a multiple digit numbers whereby all the digits are again added together, for example - tel number 222-2222 = 14 = 5) Numerology has been popular with mankind since ancient times.
-device can be in non-vending type machine too, for home use: people can consult it each day for decision making. -marketing: the(simultaneous) use of multiple measuring systems ('analyzing user info) could be argued in advertising as being more efficient.
-system can give equal weight to each method of 'predicting future and 'analyzing person's current and past situation(s). And or, user or manufacturer may give greater weight to some modes than others. Naturally, system must learn to compensate for times one method gives conflicting/opposite advice/'predictions/'guiding/suggestions of another 'analyzer/user (info programming) - but in such cases, system might simply give no comment on area the two methods analyzed.
*  Voice Recognizing Vending Machine: 
Function #1: user states/'keys in what and or how [w5] they want something provided, eg: temperature of food or beverage served
Function #2: recognizes particular person using device, and [doesn't let others it doesn't recognize use the machine] adapts accordingly.
.  Other: Also for vending machines. *4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" / "analyzes" occurrences (for uip (db improvement), intelligent monitor 2E251)
-"Entertainment" / Program (sw) Screener: 9G-220: sys screens/selects (such/designated unwanted/wanted occurrences/modes%/programs%)
-'Guides / *'Educates users [for how to improve their 'game skills/functions/'scores].
R53 Computer Tailoring: Computer interacts with users at a level corresponding to their level of computer expertise. ['egh]. System also adjusts by: adapting to strengths/weakness/interests in different subjects/type of computer applications [it deems user is more interested in]. Users select from [three] different levels of operating instructions. Relates to products from Fujitsu Ltd, 1060-1, Marunouchi, Chiyoda-ku, Tokyo 10003-3216-3211 NK] -uses R52, eg: R52-1 + UIP
access **:(); artist *:(); camera:(); cart *:(); composition *:(); entertain:(); "m":(); morning **:(); multi-user*:(); notifier:(); osc:(); pr:(); printer *:(); ps:(); q *:(); r:(); s:(); score:(tds); synth:(); tel:(tr); uip:(); wa:().
-any el kn sys = "interacts" w/ = according to u's level of expertise (in using product / field of knowledge, eg: medicine, art, other application for product).
-'tailors 'game/'game entities skills to 'game [main] entity's skills.
R122 (User) Error 'Prediction: Compares 'database
-Computer ("C") 'predicts human error. [Studies user's UIP first.] 15B: Computerized typewriter gives verbal warnings when user is about to erase something from memory. [ Related to: 15A: Central Research Institute of Electric Power Industry, 30 Sept 92 YD; 15B* Toshiba 7 Feb 93 YD]
.  For Techies: ACCESS **:(); %ARTIST:(); CAMERA:("visual analyzer" (notifies) unusual movements)/studies movement behavior for UIP; CART *:(); CLAP:(); %COMPOSITION *:(); Display ("S"):(); "M":(); MORNING *:(); PD:(develop uip); PP/MP:(); MQ/UQ *:(); MULTI-USER*:(user/observer (analyzing for other's potential mishaps)); NOTIFIER:(); OSC:(); PRINTER *:(); REMOTE ("R"):(); SCORE:(); TDS *:(); TEL:(); UIP *:(; UK:(); WA:().
-used also in: 'heuristic [A.I.] ['predictions] 'analysis.
-'scores chances of error in how 'predictor may be wrong [in how a 'game entity will act/be weak].
* A9-01 AFTER LIFE SOFTWARE: 'Entertainment.
Before a person dies, they can deeply analyze themselves in terms of how they would respond to their children's, spouses, former employees, etc questions. The intelligent computer will be able to make rough estimates as to how the person might have answered.
o has a clock in which the person being copied can leave certain statements, reminders (eg: take care of your health, stop drinking too much, keep studying, etc), new aspects to their will, etc. Keeps user plugged in and curious. o rich people would be willing to put their money into this because: they can't take their money with them, want to leave an impression (the desire in most of us), want to care for their loved ones, its novel, its the next best thing to being with the loved one after death.
-More details in IM125 file.
3J010: Tailored Reading: Suggested information is given to User (user) in forms of: world wide web / internet / America On-line / Compuserve / cable entertainment and or information (Viacom [company]).
3J020: Ads / Descriptions / Behaviors / Communications of User (user) are analyzed and sys matches User (user) with what Sys thinks User (user) (may) want: (Classified) Ad insertions made by User (user) = analyzed = sys suggests one of following which matches User:
-existing services / companies
-direct mail lists; contacts who may buy and or use services / products offered by U.
-shows competing ads (from other companies)
-D: compares ("analyzes") key words of User (user) (its ads / co / product / service descriptions) w/ = ads/services/co descriptions (in db / business directory / on-line services).
-can focus (only) on material that is "registered" (KN)
-Sys finds specialists for activities U (user) is engaged in and for which U (user) may be less qualified. Sys studies work history / test "scores" of employees from U (user) and = matches with curriculum vitae of others outside U's company. Sys "scores" importance of function and if its worth bother of getting outside expertise. Sys offers contact information on outside experts. Sys might be offered free by service / sw company (that makes money only on experts utilized). This serves as a back-up for management who knows their employees may be too afraid to hire outside experts in the event that the outsiders are better and can take away jobs from insiders.
3JO30: Targeting Ads:
UIP of audience compiled = then ads only go to those w/in designated UIP guideline.
-Mediums: on-line, WWW, printed publications, cable entertainment (television ads).
-"Access" of different viewers using same/*similar system can be different intern, ads targeted will differ. "Access" code may come from the password to activate sys (cable tv / on-line) and or remote control device and or UIP generated by sys w5 (when, how) U (user) accesses program / sys.
-Similar systems are probably known.
3J040: Life Form Matcher:
Characteristics of environment are matched with the ideal growing conditions of each plant or other organism in the database. Environment's characteristics are inputted by U (user) (from known information) / sys analyzes characteristics.
-(Plant) Characteristics of environment include: (average) daily temperature fluctuations / humidity / precipitation / soil moisture (retention) / type soil (nutrients, problematic elements, eg: poor Ph, undesirable chemicals) / air or water pollution / light levels / depth of soil / common (insects / bacterial / viral pests) / (legal availability of) insecticides / etc . Covers each minute of year.
-D: uip of plant db = matched w/ = uip of location = "score" shows how well matches are made = a percentage of 0% to highest score of 100% is shown / chart / bar graph / printed explanations.
-shows ideal age of plants for moving / transplanting.
-any (other) life form can replace plant, eg: animals, insects, micro-organisms. In which case other functions are (also important): cages / food needed or given.
-Cost versus benefit "analyzer": benefit and cost value proportions for different types of foods given / how valuable the life form is (to reduce costs, cutting corners which can be poor for plant or other life form, might be worth it). -how to maximize productivity: harvesting of plants or organisms or maximizing (healthy) reproduction (offspring).
3J050: Life Form Doctor: Adjustment Suggester:
-related to Life Form Matcher - above KN.
-when organisms are already in the environment / U (user) wants designated organisms = sys suggests how environment can be altered to improve growth or health.
-"analyzes" solutions to illnesses / diseases that have or may hit organisms. Eg: stopping epidemic; software doctor. -suggested activities for organism: exercises for unhealthy humans or mammals; changed diet; medication; temperature; light levels; other therapies.
--(disease's / situation's / environment's) characteristics = analyzed /k = uip = suggestions.
--uses related / KN '(medical) diagnosis' / "analyzing" systems (sw).
-sys "tracks" changes in organism / environment = "nr" / makes suggestions (on needed changes (from earlier suggestions, eg: more medication, chemicals, light)).
+ 3J060: Formula Adjuster: System adjusts formulas based on User Information Programming. Applications include: food recipes, clothing styles for (human) clothing 'tailors. (residential) architecture, etc. . Applications:
-Recipes: System can also adjust for multiple people, by picking food formulas that can best average most people's tastes. Non essential ingredients area adjusted, eg: for omlettes there can be more or less cheese, but the egg isn't adjusted.
--Food provider matches U (user) with other db (via Dialog (co)) that helps food provider determine uip on u. -Pizza Delivery: if user previously ordered pepperoni on pizza, and next they want sausage instead, chances are U (user) prefers the spicier variety of sausage and or other pizza ingredients (eg: more red pepper, oregano, pepper....). Or, U (user) fills out uip type of questionnaire. Questions include: favorite ingredients, foods, questions in other (UIP) KN. Large tour groups can have their people fill out questionnaires = future food providers provide (ala cart's) targeting average tastes of group's UIP.
-Restaurant Guide Company's Service: U (user) (customers) fill out questionnaire. SW matches = U (user) w/= restaurant's whose ingredient / style (ambiance, type furnishings) UIP matches = U. Or, the middle-man restaurant guide company = suggests how restaurant alter recipe / menu for U (user) = via U's "access" (card number U (user) shows when ordering).
-KN uses "CID" - Caller ID to know what pizza User previously ordered (Exists). Other functions are improvement of this.
-Region of client calling in (known by first three digits of local tel number) shows up on caller ID; then system determines regional tastes and or lifestyles.
-Image' based software systems (which 'tailor color matching for the user, such as suggested home decoration colors, fabrics and furniture designs.
.  System is a form of UIP Database collection/tailoring. Diagram: UIP of User (customer) = used by sys to suggest = alterations to (main) menu's recipe.
+  3J070: Sound Adjuster: KN? See music or SA file. 
Each musical piece to be played has UIP "score" which can be matched with the UIP of desired mood. Examples: 1] co stock going up, so build on the momentum and play Tsaichovsky's 1812 overture. 2] It's Friday and employees are less serious, so play classical versus pop music. 3] People are semi-brain dead, so play Bach which is cerebral and creatively more inspiring (according to questionnaires - see KN).
-Applications: office background music; music while people are on telephone hold; public areas: train stations, restaurants, hotel lobby's or rooms.
-D: UIP of situation (system "analyzes" / person k data in) = UIP of situation/environment determined = C = matches UIP of situation w/ UIP of Music (from music db) = controller = selects which (pre-recorded / to be composed (see KN composition N) musical pieces are played and in what order (order has effect as any Disk Jockey knows = this effect matches UIP-targeted objective) = "stereo" / osc.
%-selected visual images (also) displayed on "S" = match U's UIP. See KN.
%-suggested attire worn by employees match = designated situation: customers / type work (hazards, 7G KN).
3J080: UIP Time Correlator:
Matches which occurrences (emanating from U's sys, w5) get greater (desired) effects and when. In tern sys adjusts itself by putting out more of the elements (applications, functions, effects, results, information, osc) during the better times.
Applications:
-when to play designated music / show designated visuals on S. Above KN. Example: when which music has greater effect on productivity (as measured by average typing speeds of all employees hooded into M).
-when to place which ads to targeted audiences. Above KN.
+ 3J090: Personality Profile Matching:
Sys gives each user tasks and or questions. Based upon response, system gets better understanding of each user/'game player!'entity than more standardized (multiple choice) questions.
.  Things measured:
-creativity (see KN paper "Inter-cultural Engineering").
-manner of expressing oneself:
-temperament: anger; stress level (how much stimuli a person can take / likes) -> resulting in one of many possible behavioral reactions (such as how User will predictably act / react in designated circumstances).
-see: "score"; UIP
-percent of time User spends doing different tasks (especially those that are connected to an electronic "tracking" sys), eg: cruising info highway for girls; data processing; computer games; sending / reading electronically transmitted letters / data; financial.
-uses any current / future (electronic / sw) behavioral analyzing system / process.
-human controller of sys k what they desire from sys = sys decides what needs to be measured to achieve this goal = sys determines what data is needed (via human or M psychologist) / gets data via any means (UIP, M) = UIP Analyzer = output: suggestions
Applications:
-how User  is predicted to act / react in designated circumstances. 
-developing UIP in sys to better interface w/ u.
-suggesting how one person can better communicate with / work with / sell to / teach: designated User / customers / (work) associates / students.
-becomes a db (database) for UIP.
-see UIP; *pr; KN (using UIP); other 3J file UIP SW inventions
-dating service
-matching User (job prospects) with new work openings / tasks: getting those who can do the job best; matching skills and personal needs/characteristics of person with task/job
-avoid problems: poor matches of people; reducing risks (not allowing people w/ poor skills or behavioral patterns to (take on risky tasks, eg: chemical handling, make important business decisions if they appear to be drug addicts or emotionally unstable, air pilot selection).
-sw for increasing creativity: see KN's Inter Cultural Engineering paper.
-conflict resolution: sys suggests how to better speak with antagonists; how to present constructive proposals, eg: should it be more emotional or intellectual, or is there a greater need for trust in one or more of the parties.
.  UIP - how its developed:
-"scores" are developed per User / group of users (company / dept) / task / (geographical) region / interest / application (of program or data) = "analyzer" = output.
-see UIP
.  How SW responds:
-it thinks of all the possible results for each action proposed by the sw, eg: like computerized chess games with Gary Kasparov fighting IBM's computer in Feb 1996.
4J030 Experience your future personality: System studies your current personality and guesses/'predicts approximately what they/'game players will be like in the future. UIP, BA, SW.
-hear what you'll sound like
-visualize what you'll look like
-understand how your personality will change
-guess how others will respond to you differently according to how you change and the world changes
-guess how you'll be living your life differently. Considers: living at home (appliances, chores, entertainment); "interacting" (electronically) with = family; work (electronic modernization, automization); etc.
-D: +db (uip, data compiled from experts in predicting future (worldly) changes) / sa / tds (tracks how User changes over time - during / before User started using sys) / "visual analyzer" / analyzer+ = c-osc = u.
.  Database of worldly known knowledge available from specialists for understanding User now and estimating likely corresponding changes:
--Voice & Visual appearance (face, body) / Behavior of U: physical and behavioral doctors and audiologists are used to create db; they're consulted for how mankind (of designated existing behavioral / medical / genetic / family characteristics; ba) change over time. "track".
--Where world is headed. + Future products/inventions: see KN+. Futurologists also consulted for current and future characteristics (*ba, *analyzer) in int'l: economics, business, politics, laws, culture, family relationships, etc.
-How sw thinks: Different db = are compared ("analyzed") = w/ User (their uip-db). -> This in tern creates a set of parameters (how User is expected to be in future). -> Next: How world will react to the changing User / How User will react to changing world. [In other words: SW "analyzes" concurrently how different changing factors influence each other, and how they are effected in tern effects how they effect other elements. This is sw algorithm] .-Example: John's a United Parcel Service delivery man in year #1. By year #10 he'll use his back less due to estimated future technological changes (people deliver fewer products / automization of delivery), hence less likely he'll suffer from back aches and live longer due to his more positive outlook on life. Due to John's other characteristics (his inventiveness as measured by "ba's" personality/creativity test) he'll in future have more energy to invent new ideas (rather than be tired from exhaustive work, draining his creative thinking ability). In tern John will desire to buy more new products for his home, and or then get a new job dealing with a more creative sphere (eg: advertising (John has right personality for this). John likely to get married and have 2.5 kids (2.1 of which will go to college in the same country), 1.2 of which will stay within 100 km of John's home when John is 65 years old... John has less stress (than 80% of others in year #20 because he's more adaptive to technological progress in society, this giving him a better income (bigger house, more products, less into family values...)...
-Idea generation sw used. Including, KN: 2E0102E0202E0302E040 2E050, "analyzer".
Patents: 5410634 Self-optimizing method and machine.
See 7J07 Shopping assistance: suggests what user may want to buy. A shopping agent. Useful on places like EBay.com and Amazon.com
Keeping personal identity confidential: UIP's database can have restricted 'access (only for the user). Some portions of the UIP can be made public, eg: for a search engine or remotely related (marketing / info matching) system. User's accessing public/private networks/search engines can 'designate certain sections/files of their UIP database for (limited) public use (as applicable to the needed function).
Tailoring Pop Up 'Interfaces: the type and manner of pop up relates to uip. Software interface matches user's needs.
Following Developed While Focusing On Game Aspect Inventions:
Paste Then Tailor: Build up UIP-Database by pasting from other sources what one finds.
Find digitized/digitizable material, then copy and paste into UIP-Database. User/System searches/'seeks elements that [don't] appeal to them/others/'designated applications. Seeking can be for UIP [narrow parameters] types of: colors, objects, 'inventions, people, terrains, events [historically based] [and their video clips].
-'seek can find what's liked via any searchable method: browsers [google.com] how they are today and tomorrow; 'image and audio searches via 'audio recognizer and 'visual recognizer.
-Applications: UIP for one or multiple entities; creating a menu for data one/system can select from when in UIP Input mode; %creating audio/visual stories from assembled pieces.
File: Adapt / Adapt Sub Parts
ADAPT'S FEATURES
Sub-Features For Adapt With Specific Benefits 
UIP-BA / Behavior Analyzer: Studies the behavior of users. System reacts accordingly. Concludes with a behavior profile of target, then can 'react accordingly. UIP-BA or BA can also be synonymous with UIP [in other words, interchange BA for UIP often is OK].
-Behavior Analyzer 'reacts to situation:
--System adapts to user / their mood'. Different 'moods of user (help influence) result in different command codes in controlling system.
-- 'Tailors itself to user's 'behavior.
--System determines the behavior / 'mood of speaker, then 'reacts as 'designated. The behavior of the user= is determined via the 'sound analyzer. Different behaviors result in differing 'reactions.
-saves time for human or less efficient computer studying.
-can process much in given time
-occurs automatically
-U / customer can over-ride sw; and or reprogram UIP sw
-sw also operates on any (common) foundations, eg: Windows 95, windows, DOS, Unisys, MAC, others and their future versions.
+ UIP-DB: Database system compiles the needed database which includes characteristics of: user(s), environment, other connected systems, and system(s) hosting UIP.
--The development and or utilization of database on u's characteristics: identifies/develops differences between users (multi-user) intern allowing sys to better tailor itself (UIP-Tailor). UIP-Tailor uses the UIP-DB. Examples: "Access' BA", "Track", "Artist": preferred ways u likes "images" "edited". Extensive examples in KN files.
--SW (Software) Diagram: "seeks" what elements needed= for compilation= then organizes data (via fuzzy logic) into usable form= for UIP-Tailor. ---Notes: Seeks: via "questionnaires", "ba", "track". Organization of DB's files: collected information on user can be inserted into one or multiple files according to which files can use the information. Then UIP-Tailor seeks which files they need to better tailor. Or more work can be required for UIP Tailor to find the needed information. Example: "Access' BA's Score" --db compiles data to show how accessor is rated= intern if 'accessor's changing rating stays good= uip-tailor / "access controller" permit access.
--See 'Content Analyzer's Database Analyzer which overlaps UIP-DB.
-  Embed UIP in a browser: where it can be gathered, and made [partly] available [to those with 'access].
UIP-Edit: System edits material according to user's needs or characteristics. Edited material includes: text, (portions of) images, (portions of) sound tracks, computer code, etc.
--Omits material to match user's DB (database); UIP-Tailor - alters text, (*"entertainment") of material (9G220). "Edit". *"Router" is a subset of "Edit". See 'Artist.
.  Hypervideo (exists): users click on (moving) images!'icons, and get 'routed video clips / information ('tailored to their needs). Object Tracking software (exists) make (moving) images clickable. UIP Applications: tailors itself to user by providing 'designated images/info via proper w5.
UIP-Gets-Harder: The type of access into a system adjusts according to the user's situation. EG: access to info related to another project user is working on in the system might be required for more classified information. There could be three levels of system access clearance for a user: Level One: all data available; Level Two: access requires UIP-Access' approval. Level Three: No access allowed.
-User's characteristics (signals, UIP) "analyzed" to: determine whether to allow: "Access" (entry, level/type usage permitted u). Parts To See: +"Access', BA".
-'Games: proper actions achieves points, more 'lives.
-- 'Tracked method of playing 'game correctly is a needed password [for any type 'access into real world ('invention)]. Winning might not be via obvious manner of what looks like getting the most points [way to keep hackers from figuring out how to play/lose game to gain access]. 'Game tailored for player so no two 'game identical, and the 'tailoring is such that only legitimate player may know how to play/'react/answer uip-database's question, eg: pet your dog or cat, sitting near 99 other cats and dogs; then 'interact with pet to do 1, 2, 3 steps...
+ UIP-Guide / 'Guide: UIP knows how to best show user what they need.
-Guides user to gain more benefit from the available functions. 'Tailors itself to come close in replacing one on one tutoring and help: focusing on the needs for specific user(s), versus generalized forms of help. See 'Guide.
UIP Input: System 'analyzes user's behavior/tastes, then files it for future reference to 'tailor itself. User or any person inputs their traits, desires. Also see file once called "UIP Input *Ga"
UIP-Link: UIP LINK = Optional ways of dealing with situation when a function isn't working OK. Compensates by suggesting alternative functions and pathways. See UIP-Link File.
UIP-Match Making:
-Invention connects and 'scores the uip characteristics for two or more entities (users, companies.
-Exists?: web interface suggests what's the best product at close location to user. System then makes the (tel) connection. From French inventor with patent pending invention.
-Our invention matches the characteristics of the user's tastes with available products, services, styles, and other 'designated characteristics.
-Providers can also access (user's / other co's) uip db, to target clients / other designated parties.
-Computers (with their hardware and software characteristics) might seek proper matching with other electronic hardware and or software. Applications: 1. 'scoring compatibility between one or more softwares and or hardwares. Improves current compatibility checkers; such as by the 'score system gives to the compatibility of 'designated aspects (uip shows/guides) of the matches. 2. 'notifies when (non)compatibility (appears) may / does occur (for 'designated aspects or functions) (of the sw/hw).
-Drawing: u (uip database) = (internet) connection = computer / ISP = uip database of user/provider/what's needed (by user).
UIP-MQ = Machine Asks Questions to user:
Machine asks user questions to obtain information so system can better serve user. Answers used to develop "UIP DB".
--Drawing: sensor/analyzer/software analyzer = tr = c = display/prompts user allowing them to respond (via uk) (if they wish). OTD: ASample Situations: personal information; information on game participants and environmental elements; prompts user for needed information; etc. One use can be for system to better function by adapting to user's needs and or tastes. This feature can also store more information about the user for the "pi" database. Product's self analysis: Asystem asks user questions about any mechanical failures.
--See "Brain"; "Access' BA". "Edit": determines type questions.
-Asks user if characteristic(s) discovered by UIP Info Input are correct [via (window) menu (with visual examples)] UIP-Router: Via (software), user is directed to the designated programs or functions.
-- "Routes" u to applicable programs based on UIP.
UIP Seeks Reaction: UIP knows "what buttons to push in another, to get the desired reaction." Inn other words: UIP hones in on an entity's or invention's characteristics 'predicted to elicit the 'designated 'reaction. See 2G330.
++ UIP-Tailor: See Tailor Sub-Part file. And how it's amply demonstrated throughout pateent application.
UIP-Track *: System recognizes and is less apt to lose person/user being tracked. UIP-Track differs the target from the environment by user's characteristics. EG: existing computer camera' follows person in room based on facial recognition.
-- "Tracks" u by following signals = characteristics of person; Intelligent Monitor 2E251; "access"; "visual analyzer"; "sound analyzer". Tracks user for UIP-Database's compilation of info.
UIP-VA: VISUAL ANALYZER: Search for designated images, which is edited' as programmed. System learns/tailors' itself to know what images they should: track, edit', locate for user; eg: though user doesn't consciously know exactly what they are shopping for online, system learns the user prefers designated characteristics based on what user: bought or offered through the machine's question (UIP-MQ) process.
-"analyzer" / user = (automatically) assigns desired uip-based code of characteristics to designated image(s) = such codes are utilized by (CAD) to manipulate/process/edit the images tied to the codes = results in outputted images/text/suggestions/technical data as u requested/wants (uip) = these outputted data (can) have codes of characteristics = so such output can be altered (like requested earlier).
CONCLUDES THIS ADAPT SUB-PARTS FILE
File: Adapt / Adapat Expand
EXPANDING ON USER INFORMATION PROGRAMMING BROADENING UIP - OVER VIEW: EXPLORING MORE OPTIONS FOR ADAPTING INVENTIONS.
Imagine about any type of product, real or imaginary. Everyone has different needs. What are they, and how can a conceptual product be tailored?
INPUTS: Whose Info/Needs are used/tailored to benefit the user and or others. 'Databases (that system compiles) about user's characteristics:
-User:
(typical) individuals who get products to better do what they want, by allowing system(s) to receive info about their 'behaviors, needs, etc. Common aspect UIP.
-Friends:
Entities who associate with / know user: providing their views of user / desires from user
-Environment:
culture (culturally bound thought patters, like communicating, or matching preferable interfaces matched to particular mentalities); (natural) terrain; weather (road conditions);
--automated systems giving info for (user's) system to adapt / utilize with situation, and or the environment tied to the situation.
-Institutional / Authorities:
school, government, law enforcement, safety officials
-Employers: work functions tailored for employee (employee's interest to discover new things about their work, improves comprehension, focus, productivity, Q&A (quality and assurance).
-Parents
-Health professionals / systems:
'sensors 'guide user for health improvement, eg: see our motion tutor 'guide, related to existing golf swing instructor relying on RFID (PS).
-User Themselves:
person, group or company giving / receiving ('ba related) data.
-Marketers/businesses
-System to System Interaction:
Characteristics of alien/other products / systems / software: UIP receives their (characteristic) input via digital (packet attached to alien product; or UIP 'analyzes alien product and related info to develop a UIP 'information base.
-Robotic / Virtual Reality:
Robots who learn how to interact with people/users/systems for the latter's' benefits and or robot's. Robot can take on all (UIP related) (behavior) characteristics of a (designated) human. How one robotic/vr system interacts with other (similar) model.
-'Analyzers: 'Content Analyzer; 'Sound Analyzer; 'Visual Analyzer; 'Scoring; 'Sensors
-'Seek & React: the seek aspect, allows the benefits aspects.
-'Tag
BENEFITS / Purposes of Tailoring: goals; matches user's needs:
-Buy / use more something: user better gets what they want (qualified matching); increases sales; reduces shopping / marketing time/energy/costs.
-'Guiding / 'Educating users: 'guides users where user and or others (employers/marketers/parents) want them to go/experience/interface
-'Editing:
-'React: Automated Responses; Responding to emergencies; 'Access.
-Nurtures better (personal/business) relationships
-'Entertainment: another way UIP can "hit the sweet spot" of the user.
-'Games
-'GPS
-'Interact
-'Predict
-'OSC:  'synthesizer 
-TGH and EGH
File: Adapt / Adapt Article
Adaptive Technology Article: Mixes info from others with inventor' s.
Adaptive Technology (is also used for handicapped enabled hardware/software) and Intuitive Computing.
Adapt (UIP) Examples: 1. Black & White - Computer 'game. Uses an Al (Artificial Intelligence) to make the game more interesting. The Al can be trained to perform actions based/'tailored on user's goals/tastes. 2. Expanding upon Microsoft Office - The microsoft office assistant 'analyzes how the user is 'interacting with the office software. If the user is randomly pressing keys and buttons it will offer assistance. If the user starts writing a letter it will offer help formatting the letter. 3. Technology is not where it needs to be to provide a truely adaptive experience. Most designers focus on making the software intuitive for the end user and offer tools to manually 'tailor the application to the users taste.
INTUITIVE COMPUTING (UIP)
Intuitive computing is much of what User Information Programming does. With intuitive computing users collaborate their activities with an intelligent digital assistant that models the user [via 'behavior analyzer]. It suggests or carries out actions it 'predicts will satisfy that intent. Intuitive computing systems can be 'tagged and 'tracked to individual users, travel with them, and analyze' their needs. They can actively monitor the physical environment; learn from past experience; seek out and utilize distributed information and computational resources; use innovative algorithms to compute the most promising courses of action in the face of complex, incomplete, or contradictory inputs; and employ powerful yet natural spoken language and graphical interfaces.
The term "intuitive" ['predict] applies both to user intuition regarding system behavior and to two forms of system "intuition": inference/prediction of user intent, and selection of promising actions to satisfy that intent. They're mutually supportive, in the sense that the modeling and support of user intent makes systems dramatically easier to use, allowing them to interact with human beings in a way that more satisfyingly resembles the ways in which human beings act alone, and or with others and the environment.
Though it may employ resources spread across the Internet, an intuitive computing system can have an interactive locus that can also travel with the user or mobile invention, much like today's PDAs. It can, however, have multiple physical components, some embedded in personal wear or even the body. Using multi-sensory (sensor's) input, including sound (SA) and vision (VA), the system can monitor the physical environment and the user's focus of attention. It can then combine this environmental information with past experience, commonsense knowledge, and task-specific knowledge to drive a sophisticated model of user intent and feasibility, allowing it to resolve ambiguous requests, to propose appropriate actions, and to anticipate future needs.
It manages an unlimited variety of tasks. It can augment human memory, answer questions, and gather and organize information for upcoming activities. It can notify' users, educate' and guide' them. Both proactively and on demand, it can negotiate with systems associated with other human beings, with organizations, and with objects in the surrounding environment. As a servant, it's available when needed; and can be ignored by the user. While intuitive computing tasks can be short-term and highly constrained, others can be much more open-ended, and capable of consuming arbitrary amounts of computational and other resources. The algorithms to perform these tasks can also employ: both heuristic and traditionally rigorous techniques, with the choice among them driven by intrinsic problem complexity, resource availability, and the nature (completeness, consistency, accuracy) of the input data. Challenging functions include: choosing the most promising actions in the absence of complete knowledge of external state and consequences, balancing resource requirements against quality of results, allocating available resources among competing goals and obligations, managing and mining large amounts of current and past sensory information (from databases' (compiled by UIP)), and selecting the order of access' to outside information sources.
In an internetworked world (where the parts are highly interconnected in unlimitedly potential ways), an intuitive computing system can communicate extensively with other invention parts, and information sources around the Internet. For cost efficiency, e.g. battery preservation, and saving computing power (in an invention part), it can offload expensive computations when feasible. It can offload to nearby servers whenever possible. When resources are plentiful, the system can speculatively gather and organize information in anticipation of future needs. When resources are scarce, it can use its knowledge of user focus and its model of user intent, to allocate what resources it has to the tasks its computations determine can best (most likely) meet user needs.
Diagram: Data collection (database, tracking)/ UIP (intuitive computing) = service provided = user. INVENTION'S CHALLENGES
Artificial Intelligence, Natural Language, and Knowledge Representation:
planning for the future based on uncertain or incomplete knowledge; natural language understanding for multiple speakers (users') in noisy environments; modeling of intent in general contexts; knowledge acquisition and representation (collecting information for UIP's database'); learning and inference; intelligent agency: deciding what to do and how to do it (W5), balancing conflicting goals and obligations against each other, and against available resources; integration of symbolic and spatial knowledge bases (databases').
-Computer Vision (VA'), Robotics, and Virtual Reality (VR'):
object recognition in general environments; recognition of spatial location/context and user/human activity; connection of visual perception to primitives useful in natural language and planning; tracking' and exploitation of user attention and focus; real-time integration of augmented reality with vision and eye tracking
Computer Systems:
generation of secure mobile components with embedded resource (computation, communication, data, energy) and quality of service (response time, throughput, accuracy) requirements; application partitioning and relocation mechanisms; optimization techniques to distribute these components to maximize performance and minimize cost; compile (time) prediction' and run-time monitoring of data access' patterns for locality optimization and usage prediction'; attention- and intention-driven scheduling and dynamic component offloading; naming (tracking'), discovery, and routing' for wide-area agents and resources, using peer-to-peer and mobile ad hoc techniques; high performance, low-energy processing and communications for mobile platforms
Theory of Computation:
algorithmic task decomposition and flexible serialization/ parallelization; anticipatory computing via exact and approximation algorithms, and stochastic modeling of human/machine behavior and environments; approximation algorithms (including progressive approximations); complexity studies to clarify the demarcation line between exactly solvable subtasks and those to be approached approximately or heuristically; computing with uncertainty (regarding input, environments, and payoffs); cryptographic security (access'); data mining (of
database')/warehousing/classification/clustering; 
query-order theory to improve information access' patterns.
Following is a list of the patents ordered by how relevant they seemed to be to UIP. So far I haven't found anything enough like it. I put Is by the patents that seemed to be fairly similar, 2s by the ones that had some theme in common and 8s or 9s by the ones that seemed like they MIGHT have a little to do with certain aspects of it, but possible little to no relevancy. Here's what I did: I started out by searching by keywords and trying to read each patent that seemed similar to try to tell how close it was to yours, then following the links on those patents to "references cited" (other patents) but that seemed to take too long, and skipped around too much. I ended up searching by keywords then browsing to weed out the ones that didn't fit (like human protease inhibitor stuff) and ordering the ones that seemed to relate. I was going to go through and read over the ones that seemed to match better and give a percentage of how much they matched, and follow the reference links inside the patent to determine if any of those were relevant as well.
The following patent numbers are just from a preliminary search of "database" AND "tailor". It came up with over 2,300 hits, and I've finished weeding out and ordering the most relevant patents. I was going to read them over and give a better idea of just how much they relate or if some of them didn't fit as well as I thought at first glance etc. Other search combinations came up with over 30,000 hits. So this seemed like the best one to start with.
CONCLUDES THIS UIP ARTICLE FILE
File: Adapt / Adapt Sequences
ADAPTING THE SEQUENCES OF SOMETHING LIKE:
ADAPTATIVE CODE SEQUENCES IN SOFTWARE, DNA, ETC.
CLAIM:
OUR SYSTEM ALSO ADAPTS TO NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER BIOLOGICAL MOLECULAR STRUCTURES:
Adapting to the need for tackling germs on a case by case basis. Adapter 'guides user by giving them a chemical formulae designed to neutralize dangers from specific germs and their sequences. For example the bacteria (P.gingivalis). Chemical indicators notify if and when items placed into the solution have been cleaned enough. The same features used to adapt the situation with this sequence apply to electronic software codes as well.
.  More details on chemical sequences throughout the application including, our chemical indicators, 'content analyzers, etc.
ADAPTING TO NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER BIOLOGICAL MOLECULAR STRUCTURES:
.  'Content Analyzer: it 'seeks and 'reacts to 'designated situations including: chemical combinations, and/or behavioral traits (see 'behavior analyzer).
-Can 'Seek: changes in situation and/or 'designated circumstances (compositions [at certain temperatures and/or quantities (percent of solution)].
.  'Notifies user/('reaction) system 'W5 triggering event occurs.
.  Set combination of chemicals/solutions is required to 'access / trigger an event. A form of password is achieved when the correct nucleotides and/or amino acids are found in 'designated [percentage of solution] / other criteria. . Engineer nucleotides and/or amino acids so they 'adapt to needed circumstances! Components of a nucleotides and/or amino acids, and or an entire nucleotides and/or amino acids chain can be [automatically] altered!'edited to 'adapt.
-(Video) 'Game: 'Adapting nucleotides and/or amino acids can be a strategy game.
CHEMICAL ELEMENT CAN BE A ALTERNATIVE FEATURES:
Each (known) nucleotides and/or amino acid sequences has the option/alternative of being one of this pat application's features (inventions) (based on characteristics from being synergized with something else such as other (parts of) nucleotides and/or amino acid sequences.
-As with any part of this pat application, the stronger the knowledge with other sections of this pate application, the easier it will be to understand/use its features.
-'Software is used to 'analyze / 'coordinate nucleotides and/or amino acid sequences [based on what the 'content analyzer's 'guidance/'reaction].
-Shrink or expand nucleotides and/or amino acid sequences and their inventive features in this pat application. . Benefits from altering ['editing] nucleotides and/or amino acid sequences include:
-Bioengineered medicines and/or foods. Non organic/natural life/chemical forms can be 'tracked so they are properly used. EG: place 'tags in/near the nucleotides and/or amino acid sequences.
.  'Interactive molecules can function like features [synergizing] each other. Common features [also for non] nucleotides and/or amino acid sequences like 'access also have [purely] chemical / nucleotides and/or amino acid sequences (whose characteristics are 'sought and 'reacted to) features, e.g.:
-A correct sequence is needed to trigger/gain 'access/'notify = in order to achieve the 'designated (chemical) 'reaction.
-(Auto) safety air bags (any anti infringer method in application) can be instituted [quickly]: Figurative drawing: --(Infringing) event occurs = person / system identifies [via sentence structure 'analysis] event = 'analyzer ['editor] 'adapts to event by = (activating) its links that are 'associated (with possible infringement 'predicted) = (user) files patent application (with system's help) = patent granted = ['predicted] infringer is stopped (this protects the operator of this system (functioning like an air bag)).
FIGURATIVE DRAWING (diagram) of nucleotides and/or amino acid sequence example:
.  Drawing #1:
1  User's Need Determined -> 2 'Keyboard Input -> 3 'Computer's 'Analyzer -> 4 Changes the constitution (sequence) (to adapt) -> 5 Container holding nucleotides and/or amino acid sequences.
--Notes on above diagram:
--- 1: what a user or system needs 'adapted; their needs can be 'scored / 'tracked for changes to the (sequences) in nucleotides and/or amino acid sequences.
---2:  'remote control / 'reaction controls what #3 does. 
---3:  adapts situation / nucleotides and/or amino acid sequences
---4:  altered nucleotides and/or amino acid sequences (based on how sequences are/were 'edited) (by 'adaptation). ---5: can be moved (carefully) via ('WA) in the research laboratory. Any accidents / spills are monitored!'tracked by 'sensors, with 'notifications made when needed.
.  Drawing #2:
'Designated need (determined by 'keyboard input / 'sensor's 'analyzer) -> 'computer = mechanical (arms) device moves/combines/alters the nucleotides and/or amino acids (along with chemicals that can change their 'feature / characteristics / 'character / (%video game) 'agent features).
BRIDGING NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER BIOLOGICAL MOLECULAR STRUCTURES:
Adapt available resources like software codes or chemicals to achieve adapted results.
Splicing and or connecting chemicals and/or (our) software code has many similarities (and we 'predict more so in future).
.  Achieving 'adapted sequences / software codes = can be done by having an 'analyzer output a formulae / 'guidance for how this sequence can be created 'W5.
SEQUENCE CODE WRITTEN BY OUR (CHEMICAL/ELECTRONIC) 'BEHAVIOR ANALYZER, 'ACCESS, 'CONTENT ANALYZER & OTHER FEATURES:
'Adapt 'designates a need = then 'guides the technician / automated 'editing software programming device = to write up a sequence / software 'program 'adapt 'predicts will achieve the need to 'Access through the body's brain membrane needed medicines. Steps:
1.  'Analyzer instructs molecule #1 = to mix with molecule #2 and #3 = creating chemical #1 & #2 = which has the characteristics of getting through the brain membrane. #1 is a chemical 'behavior analyzer that can find #2 and #3. The latter can't gain 'access to the brain without the other (#2 and #3). But #2 & #3 can't find each other as they lack the 'behavior analyzer themselves, but their 'sensors are good enough to determine a #1 when they are close enough.
2.  As only chemicals #2 and #3 are needed in the brain, and #1 must be removed for #2 & #3 to function as desired; chemical #4 is later released at the right time and situation ['w5] by the 'analyzer = to dislodge #1 already behind the brain barrier. The medical problem (need to change the brain characteristics causing brain problems, eg; epilepsy or cancer) was solved via this adaptation. As each person/situation is different, the prescription/'guidance adapted to all the circumstances, eg: other drugs person is taking, their age, weight, and/or what might (not) cause ill feelings (nausea).
OUR SEQUENCES & TABLES:
Our feature lists function as our creative tables.
Features show sequences (chain of events / diagrams) that can represent chemical features.
Our system is easier (for lay people) to understand compared to the traditional format in which sequences are currently required by patent offices.
EXISTING US PATENTS:
6,974,706 Application of biosensors for diagnosis ['analysis] and treatment ['adpatation] of disease. The subject invention also provides a method for screening ['access] those analytes/biomarkers ['tags] likely to be present in exhaled breath.
20020007249 Personal computer breath 'analyzer for health-related behavior modification ['behavior analyzer] and method (Doesn't mention amino acids, but relates to above patent - 6,974,706)
7,129,554 Nanosensors:
Electrical devices comprised of nanoscopic wires are described, along with methods of their manufacture and use. The nanoscopic wires can be nanotubes, preferably single-walled carbon nanotubes. They can be arranged in crossbar arrays using chemically patterned surfaces for direction, via chemical vapor deposition.
-Our features: 'sensors, arrangements mentioned can be in an 'adapted fashion.
7,062,092  System, method, and computer 'software product for gain adjustment ('adaptation) in ([biological] microarray) scanner ('analyzer).
PHENOLPHTHALEIN - A Ph Chemical 'Notifier (Indicator):
Turns pink ph becomes above 10.
When doing a titration phenolphthalein could be used. Measure the concentration of a solution (its acidity) to 'predict how fast it will eat through an (un)known or little known substance. Phenolphthalein can be used as a device to 'score that acidity, with this info one can determine an additional way of knowing what the substance it is eating away at ('content analyzer). Characteristics of a substance include how fast an acid of certain formulae will eat away at something (a prescribed number of millimeters).
Killing microorganisms - Harmful to humans/animals, eg: Bacteria (P.gingivalis).
'Adapted system 'seeks and/or 'guides (user) with its generated formulae to achieve the desired acidity or base 'associated with a chemical that kills ('seeks & 'reacts) (specific) bugs:
.  Bacteria (P.gingivalis) its sequence: tcc aat gaa ttt get cct att ttc gaa tga aat ttt tcc aat ttt cct tga.
2: Inserted into chemical formulae designed to kill it e.g. citric acid at a concentration of 0.1 normal. This results in formulae going clear (hence it is safe(r).
--When ('w5) Hydrogen Peroxide / *Sodium hydroxide solution which is base enough (to show pink from 'indicator), user knows that it is a good solution to place the bacteria element into, e.g. dentures.
.  'Visual analyzer determines from an indicator that a chemical solution's 'status has 'scored high enough to be 'adapted to the need for killing the 'designated ('tagged) bug.
Entire patent application ([can] with its explanations) be one or more sequences and/or software codes. There are well over one million possible combinations we wish to submit to the patent office however, current patent office regulations would require us to spend well over US$12,000,000.00 just in per page filing fees. Traditional sequence filers are exempt from paying $12 per page after the first 430 pages (first 30 pages free, plus 400 extra per page fees). Hence readers need to read our condensed version herein. It could be more condensed but we put in the extra years and page fees to assist with comprehension. The information needed is linked to from this patent application.
Adapt's Sequencing system can use: 'Content analyzers, plus 'Order & Timing. They apply to how elements from atoms up to complex molecules and (software for) electronic features are organized. Even the proper placement and order of the features can involve sequencing.
CONCLUDES THIS ADAPTATIVE SEQUENCING SECTION
File: Adapt / Adapt *
ADAPT *
(Maybe Less Important Specifications. For Techies.)
2D-021 SYSTEM REACTS TO EXTERNAL PRODUCTS according where (w5) they are:
Eg: Incoming-Call Identifier - Screener / External Element Identifier.
Calls from desired tel numbers have a different ring. Hereby caller knows whether to pick up the call or not. -(Designating different type connections / (incoming) calls related to another of our ideas?): sys responds differently depending on which other N/sys/existing product wants to "interact" with it.
--sys knows identity of other part/sys via its: "access" / code / tel # / uip (behavioral characteristics of N, or U: how it moves / functions / responds (to stimuli from central "C" or "M") / visual analyzer / sound analyzer.
-If user walks over to device, the caller's tel number and or name... appears on screen ("S").
-D: Central Product / Sys = C = sensor / analyzer / uip analyzer / caller ID sys part = tr/rc = External Product / Sys. -OTD: ACCESS *(); BVA (); CID (); CAMERA (LENS) (); CART (type uip or senses or data sought); CLAP (); INFORMATION RETRIEVAL (); K (); M (); MIC (); MOUSE (); MP (); MULTI-USER (); NOTIFIER (when desired contact has been made with part or organism); PR (); PS (location of external product is a determining factor in deciding if any/type connection/contact is to be made); R (); ROUTER (routes external product by their type nature); S (shows status); *SCORE (); SOUND ANALYZER (); TDS *();
TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK (); VISUAL ANALYZER %(); VOICE MAIL ().
-A sensor that connects to u (human body, eg: finger wrap; animal*) to read electromagnetic signals generated by the skin. Proprietary software interprets those signals and translates them into actions. Being researched by company: Other 90% Technologies Inc., Sausalito - See Wall St. Journal 1995 (maybe 6.95) article titled: Mind Games: Soon You'll Be zapping Bad Guys Without Lifting a Finger. Finger wrap version will sell for $100-$200. -4E020 Content Date Stamper: Registers and organizes previous occurrences.
-See "Brain".
%  US Pat # pertaining to helping u develop new N, eg: for "D" directory KN: 5153830 Method and apparatus for providing assistance with respect to the development, selection and evaluation of ideas and concepts.
-US Pat No's: search str in Bib 9.94: (adapt or adapts) and user*: 5324021%; 5208898 Adaptive knowledge inference method and system; 5313532% Recognition of patterns in images; 5212821% Machine-based learning system; 5092354% Cosmetic kit: make-up; 4700295 Forecasts bank traffic and scheduling work; 5321626 battery performance / forecasting system; inventory control: 5237496 & 5287267 & 5128861; 5136502 "analyzing" health care liabilities; agricultural forecast 4837146; compatibility forecasting 4711632; 4197854 patient danger forecasting; game playing involving forecasting 3473802.
--search str: 1] (adjust or adjusts) and user* - barely skimmed; 2] forecast (did only Bib 6.94 disk).
.  'Tailor and 'Guide: 'Tailor = SW: For: (automatically) suggesting how sys can better tailor itself to u's needs / helps get product ideas / helping U brainstorm.
Introduction to formulae generation systems: Software used in developing / analyzing / evaluating formulae for food, chemistry, indicators, etc.
-uip of desired function is matched= w uip of differing elements / ingredients / chemicals / food elements = resulting in formulae of ingredients that may (best) achieve desired goal.
--the characteristics of goal are tied= via uip = to characteristics of available / known ingredients or * (KN) sys. + Important parts: UIP-Tailor, 7G050, PR, Track-Analyze (analyzes for what is best to track = db), Brainstorming SW, 2E01020 30 4050 Recipe Softwares.
.  General Examples:
1]  develop an nr for desired application = alerting presence of salts / acids / hazardous elements = in/for: liquids / powders / surface contact. 2] Other applications for 7G050. 3] SW sys may simply help u by offering suggested possibilities: formulae / equipment / sources of information (reference material, on-line sources) / type experiments. 4] UIP-Tailor = UIP-DB: adjusts to u's needs. Gives ideas to u = from which u can choose = then sys reacts accordingly by offering such tailored functions.
-Example: u using information highway software often requires more than two minutes before u requires M (mainframe computer) to act = resulting in sw asking u if they still want to stay connected = frustrating u by requiring them to respond to such petty questions. It may also be problematic for u to locate where in the software they should go to stop such prompts, but if sys were to offer such a suggestion as, would you like the default mode to give you 10 minutes before such prompt (after sys has determined ("status") 80 percent of the past 50 interactions between u and m were at least 10 minutes wo activity).
--Result: sys tailors itself to u, by first giving u a choice in matter - maybe u wouldn't want the change to occur wo their acknowledgement. Manufacturer determines to what degree uip-tailor will suggest or bypass former and simply alter itself to u's need.
5]  Constitution needed in plastic resins / metals / product casing ("cm", "cp") or parts, for = tolerating designated levels of: stretching, bending, pulling = within designated environments of varying (extreme): temperatures, light, abuse, excessive wear, time period of element's use (age of N). 7G050 related.
6]  Patent search strategy for idea suggestion generation sys: software* and (formulae* or recipe* or ingredient*) 7] Pharmaceutical: developing ingredients for drugs; ideas for research.
-KN: medical prognosis sys that studies all the characteristics of illness in determining type of illness = 2E suggests possible medications.
-Suggesting possible combinations for drug to solve designated illness / problem: file for each aspect in situation (uip-db) matched w = files of existing / potential future drugs or chemicals.
8]  Brainstorming: Software simultaneously designed to help researchers increase their (sociologically, psychologically related) creativity: KN
9]  Nutritional recipe generators based on needs.
Indicator Examples: 7G050
1]  Indicator type 'Guide [also called 'suggester']: Researcher anticipates they will be coming into contact w 7G050 related: diverse (hazardous) chemicals / harsh environments -> Those chemicals / environments are keyed into computer -> C "analyzes" for type indicators that may nr more than one of these (unrelated) chemicals / environments [sw tries to find indicators that can be compatible in seeking diverse chemicals / environments] -> suggestions are made to u -> u may next need to do additional research via: this same sw / other references sources / do experiments testing out the sw's hypotheses / stated facts.
2]  Body protection device suggester: Researcher keys in that they will be working with three differing chemicals (of differing acidity) -> sw suggests which 7G050 type gloves to use for all / each situation / occurrence / type activity (eg: working with sharp objects in such liquids requires thicker gloves) -> Designated gloves can be identified by glove's manufacturer / model number / generic type. Sys may also suggest other protective gear used in hazardous situations, eg: aprons, body suits, masks, goggles, gas masks, shoes, (replaceable) filters for HVAC [Heating, Ventilation, Air Conditioning sys].
-sw used on case by case, day by day basis, or planning future long term projects, or + designing new research laboratories, eg: type surfaces (paints, flooring, counter top materials, air filters....).
3]  UIP: Characteristics of u are "analyzed" -> sys makes suggestion: U will be having likely designated occurrences (outlined in 7G050) = sw suggests: types of protection (protective gear); methods of (cautious) research (protocols) already determined to be safe via reference manuals on the subject or sw (db).
-"PR": sw (re)programs itself = as controlled by UIP; programmer can help guide / control sw.
.  For Techies: U = This N Sys (sw suggesting formulae) - C =
ACCESS (); ANALYZER (); BILL (); CART (); EDIT (); EDUC (); MULTI-USER (); PR (); Q (); ROUTER (); +SCORE (given to each aspect = attached to each element of: goal & potential ingredients); SENSOR (7G050); STATUS (); TDS (scores time delay in getting NR effect); TRACK (history of previous (chemical/food) experiments conducted by: u, organizational body, db, m); U (researcher, student = "educ"); UIP (
.  D Overview - How parts might fit:
.For Techies: U / Other (KN) Sys = This N Sys (software used in developing / analyzing / evaluating formulae for food, chemistry, etc.) - C =
.  For Techies: PS - R - Tilt; Zones - Monitoring; Zones - Utilization; Access: u needs to usually continue to develop formulae that match those u developed w sys before. Villains wo most proper knowledge can be noticed (nr). Access allows for normal percentages of cases w negative results (caused by human error). 4E020 Registrar. 4E030 Image. Input Access Sys.
+  Indicators: 7G: hazards, novelties, el monitoring of events: formulae for developing needed indicators developed. . Technical: How files in db = match / compare up w / relate / score w = data provided to begin search by: u / another sys.
.  Salt Avoidance Recipe Generator Steps: Suggestions on replacing salt in bean soup:
1]  User may normally prefer the saltiness taste to equate at 0.5% of soup volume to be real salt.
2]  This preferred percentage is determined via: what u k / nr placed in soup. 
3]  U k 2 liters of soup will be made, and lists volumes of ingredients making up 2 liters *(both before combining, then after coming (and evaporation) - though latter can somewhat be calculated by sys). Example: 1 liter water, .4 liter kidney beans, .3 liter potato.
4]  U lets system to recommend other ingredients (if no real salt were actually to be used).
5]  System's db "analyzes"/shows (s/printer) other non salt ingredients shown to statistically satisfy a large percentage of population (in u's zone) who are on salt restrictive diets. "Score" for each of those ingredients on salt replacement value. 6] Those ingredients that came up in previous step are next "scored" for their compatibility w/ existing ingredients u already (fairly) decided to keep in soup. Each food ingredient in db has many sub-files, each sub-file being the type application / situation / type food such ingredient may be used in = and the corresponding "score". Example: carrots get high score for soups in general, yet a higher score in sub-sub-file: western vegetable or meat soups, but lower score in sub-sub-file in Japanese miso bean type soup.
7]  The differing "scores" are= "coordinated" / "analyzed" -> suggested ingredients are grouped into differing sets / files of ingredients. Compatibility of ingredients with each other in designated sets (including ingredients required by u) based on db of past statistical taste studies for how such combinations (may) satisfied people.
8]  S / Printer shows = Suggested recipes = to U. The order in which they are shown might be those w higher "scores" for the set, or by other means, eg: cost, "score" for how all the ingredients are commonly available in u's zone's supermarkets, uip - db for what u liked in the past, etc.
.  Indicator Development Idea Generator Steps: SW will suggest what u can use / do / replace / alter in their (research) plan / strategy / process.
1]  All type materials in situation are entered into= computer, eg: type hazardous materials (acid, pH level, 7G050 chemicals listed). Eg: type + gloves, type + containers holding chemicals, + acids and where they are, where acids might spill, environmental effects (temperature, time span (in which acids will be in contact), other circumstances. 2] The files for characteristics for each of these elements is either known by sys (uip-db). If the db exists it was compiled by: "analysis" of research material, surveys of chemists %, developed by u (or their company) for future applications (by other researchers of the company).
-Each element has different files, according to the circumstance of its usage. "Analyzer" determines which sub-files are applicable via, eg: label of file, % key word search, "status"*, uip.
3]  Files are matched. Examples: only 2% of glove/container types are suitable for working with acids = next sw determines three best gloves/containers for said acid, listing best first.
4]  If u is unable/unwilling to make changes in glove / container, sys can suggest differing acids, or time period during which work should be completed.
5]  If all suggestions by u are good, sys can "score" what u planned to do / still give other better / good but worse options / precautions (whether using products or not, and if so, how they should be used) = S/Printer.
6]  While research is taking place = "sensor" = "analyzer" = NR: when sys determines there is or could be (based on score) a situation needing special attention (danger, loss of money, inability for u to get desired results).
Large Diagram Begins Here: The following 'Diagram Insert #1' is for the large diagram below it, titled:'D-#1'. The OTD D below 'D #1' is a subset of the latter. All parts converge in the central computer in 'D #1'.
.'Diagram  Insert #1':  For +D-# 1 
Type suggestions made by sys to achieve needs stated by u (so suggested future N or sys functions as needed in future situation / environment and able to handle designated occurrences as envisioned by sys / u. Suggestions are made by sys: for one or more of following: NR type - 7G050. Protective gear type suggested: against (chemical 7G050) hazards. PVC Resin / metal constitution. Formulas: pharmaceutical, food recipes, pvc resins. Other Formulas.
-Likely scenarios: how to prepare for: fire and other natural disaster drills / preparedness. Accidents: (chemical) accidents; vehicle; building (collapse). Desired effects: any (el) %KN, any (el) %N, as prescribed by UIP-Tailor.
*  OTHER: iJOlO Body Movement Notifier: how sys can adapt to different: sized people / applications. 2E01020 30 40 50 Recipe Softwares: 3E020 GPS Record Keeper: what records might want to be kept, which zones are important, drawing boundaries between zones (based on uip of situation). 3E060 Interactive Morning Alarm: what q sys should ask = matched w uip of u / what u has to do later that day [sys puts u into mood for predicted occurrences/work]. 3E061 Body Motion Instructor. 3E150 "PS-Zone": which zones are important, drawing boundaries between zones (based on uip of situation). 3E151 GPS Circumstance Correlator and Controller: which zones are important, drawing boundaries between zones (based on uip of situation). 3E180 GPS Locator: suggests where to begin looking or what needs to be found and how. 3E190 GPS Billing Systems: which zones are important, drawing boundaries between zones (based on uip of situation). 3E040 & 41 Tel Noise Canceler: what environmental sounds might be semi-canceled (at the risk of impairing listener on other end from part of speaker's natural voice). 3E210 Indoor GPS Extender: where/ how extender could be used/ placed. 4E010 Alternator: which activities offer greater battery power build up. 4E030 Image Input Access Sys: what images sys may use to trigger designated functions (access). 5E020 Magic Wand. 3G010 Tel Ring Delayer. 4G190 Insulated Scoring Ball: how to play / develop new "games". 4G200 Fruit Encapsulator: how to adjust itself to cut in ideal manner. Other methods for peeling, cutting, processing, cooking, canning the foods. 5G061 Dyslexia SW: how u may wean himself off the software; how sw may help u -eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer. 5G070 Speed Reading SW: how u may wean himself off the software; how sw may help u -eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer.
D #1: U = (+ See: 'Diagram Insert #1') - C =
ACCESS: Access restriction strategies suggested: db of past hacker / villain activity = matched w = db of known / existing / available remedies or traps = suggested "access" control strategies = [security manager's suggestions = k = access - analyzer - sys]: sys analyzes any input from security mgr during the multiple steps via which sw w= mgr together brainstorm for strategies. ANALYZER (); BILL (); CART (); EDIT (); EDUC (); MULTI-USER (); NR (); PR 0; PS-Zone (); Q (); ROUTER (); SCORE (); SENSOR (); SOUND ANALYZER (); STATUS 0; TDS (); T 0; TILT (); TRACK (); UIP (); VISUAL ANALYZER (); VR* (); WA 0.
OTHER: UIP-Tailor & UIP-Suggest: see suggestion sw (being) developed from 2E files.
+  Five senses are altered to match user's tastes: 
.  Senses: images (see "edit"); sounds (see sa); "vibration"; odor releasers (see smell "analyzer" details mixed throughout files; *taste (see A dir KN). "Synthesized" music / sounds altered. Related to A or B* dir KN where games are sold via vending machines and tailored to buyers.
+  "Game" application: UIP Game Effect "Editor": U is requested to experience different effects like sounds and type images. The U's response is "scored" and intern the game's effects are tailored to get a more desirable response from the players. Each game's aspects has multiple "editable" choices, and sys utilizes those best matching player's preferences.
-images: see "edit" = images; colors; textures of skin or objects; size
-sounds: sys "synthesizes" sounds (in its memory); sa scores sounds.
-"scoring": to match u's tastes: human body "sensors" are placed on player (skin) to gauge reaction levels; u personally k in their (multiple choice) preference of effects.
-What's scored: user's "mood" reactions "scored" / "analyzed": pleasure; excitement; passion; fear; relaxation (between episodes, type of break for player, so they don't over exert and tire= in tern playing game longer). -How sys utilizes player's preferences: User asked which of 12 effects elicits greatest: passion. Then when passionate encounters occur in game, that "edited"" synth" version is utilized.
-User generated effects: players can program / create / record (mic) sound effects into the game itself.
3E061 Motion Tutor: 'Guides users to improve their movements according to the user's needs.
Diagram #1: ["Tracker" / "analyzes" = U's behavior / db (description of U)] = C (sw = develops sw / programs which are tailored to (u)) = (desired/desirable) function(s).
-Developing UIP: UIP (of U / other element being matched) compiled from any source including: questionnaires (answered by U / service providers); monitoring organizations (Dunn & Bradstreet, TRW); any KN monitoring / "tracking" / "scoring" system(s); UIP.
D (Diagram): data input = analyzer = memory (M, cart, recognizes multi-user) = analyzer = data output = function .-5A-810-042003 Advisor: compiles and analyzes user's information.
-OTD: fd-hdd; both pp and mp program how they want the system to collect, retrieve and analyze the data in database; uk; tds (when and how elements occurred); educ%; M%; score (score information can be processed for the UIP database; and UIP can help generate desired scores); cart (for additional data for the database; and or software for processing the database); uq (pi database is used to help generate answers about, eg: about user's past preferences and or activities); mp (the database and or software can help prompt questions, eg: to expand the database, guide the user in the right question if the system first gets the right information); access (limits access to sensitive information within all or part of the database to people with the right password).
-Article in "Scientific American", p.64, April 1995. Article title: "Machines that learn from hints". Its about: Machine learning improves significantly by taking advantage of information available from intelligent hints; discusses the algorithm process in general terms; gives differing examples, eg: computers judging how much credit to give to credit card applications based on other similar people's past histories.
-UIP formerly titled "Pi". 
-U or Computer (Administrator) can select which UIP mode will be used / desired.
-Brainmaker 2 - (Professional version), p.76. [Existing N functions: Gives PC human abilities such as finding patters in your data and learning from the past.]: UIP-track.
.  For Techies: Part #1: Electronic device obtains information about the user by one or more of the following: remembering user's previous performance, eg: their abilities and or difficulties on this, or related devices (which transmit uip data to other units via wire, or %wireless); asking questions from user, or "M"; user takes one or more test(s), the type and quantity are determined by the desired application of product; another person or device (M) gives information about user; etc. Device recognizes more than one user by multi-user, eg: their codes used to gain access into device. Personal information is stored in memory and used by device to more intelligently tailor itself to user's particular needs. The manner in which invention tailors itself to user's needs can alter according to: small or big changes in uip database, pp.
.  For Techies: Part #2: D (UIP) =
"Billing"; User can take their cart (their personalized uip for all identical or related products) from machine to machine, eg: % existing card used to both activate and select desired preferences in car stereo systems; different cart effects user's uip differently with the correlated changes in functions; type "character" changes according to uip (if a display ("S") is used); date; uip data can be viewed on display ("S") and or printed out; uip is used to increase the user satisfaction quotient, eg: entertain, (Apossibly by: way in which function operates, sounds, lights, words are used to better create the type of electronic effect uip indicates is more likely to increase user's positive reaction to using product [test studies are conducted to see the reactions of people in test case studies of 50 - 1000 people]); "C"; % uip can support interactive (by giving the additional data needed to better tailor invention to user; % data obtained for uip's memory from microphone ("mic") (voice recognizer); mouse; mp; multi-user; uip's database guides system's functions (determines the type, manner, timing, whether or not to notify, mq, osc, synth; pp; uip database influences printer's print out parameters, score, speech, vc, manner in which it functions as a semi-toy, it prompts - accepts - processes uq; tds; uk. Data is also obtained viaA: "uk", "cart", "tel", "mo", scanner; UIP can be programmed/understood with the help of: psychologists, sociologists, marketing experts; U's city (tel area code/zip code) / caller id / location based on pd effect how system interfaces w U.
.  For Techies: D: data input/output=tr/rc=c. C85 Electronic translator speaks out desired words/phrases. Fuji/Xerox 29 Aug 92 NK. D: C85="tel". %-o-C112 Computer predicts human error. Input UIP (working conditions of person). System predicts errors they're likely to make. 30 Sept 92 YD.
-utilizes fuzzy logic
-UIP was formerly titled PI (Personal Information).
-Sys analyzes u's actions -> database (behavior). Eg, Ubiquitous computing: u carries (tiny) "c" that communicate with other "c" embedded in: appliances, t, cars, walls, Kays' N. Eg: Xerox's Parc Tab, and other products mentioned in "Popular Science" Feb 95 from p.47.
-Marketing Enhancement Systems: UIP suggests / 'guides users to alternative products or services 'system judges may suit (part of) their needs.
-Publications Related: 
"Collaborative Filtering": comparing people's 'behavior and preferences with those of other people ('users) who match a similar profile to 'predict what additional info might be relevant to that person. From *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
-"Datamining": open-ended queries of customer data and other info sources; and to automate the process of 'predictive models of consumer 'behavior.
-  ? "Dialogue Marketing": adjusts info delivered to the customer based on real-time interaction between the customer and the co. 'Predictive modeling and datamining techniques to enable a more 'tailored "dialogue" with 'users (customers) in (real) time.
.-Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999.
-"Experience Communities": Aggregated pools of knowledge based on the collective experience of many people ('users).
.-Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
-"Flex Pricing": 'System 'tailors prices to demand and supply (automatically).
.-Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
+  "Predictive Modeling" From *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999 -"Preemptive Marketing": 'Tailors marketing, eg: Eliminates future consumer decision points that might lead to loss of business.
.-Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
-"Pullcasting": 'User 'tailors which information or features they receive / or are able to utilize; but also creates such content / features / services.
.-Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
-"Relationship Age": 'Systems communicate with 'users for [free] exchange of info/data to better perform 'tailoring functions.
.-Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
-"The Shadow You": Electronic re-creation of the essence ('behavior profile) of a 'user's behavior. The 'database on 'user(s) for (purposes of 'tailoring).
.-Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
Search Key Words For Searches On Related Patents Include: "data base", adjust, tailor(s), tailored, adjust(s/ing/ed/ment(s)), alter(s/ing/ed), "(system/software/invention) learns", "self learning". What search strategies, and other terms?
TAILOR FEATURES - SOTTO N
4J030 FUTURE LIFE - FIND MISSING PEOPLE:
This may be helpful in finding missing children or fugitives. There already exists age progression art which predicts what someone would look like after a certain period, but what about what they sound like, act like, etc.? This can enhance such an age progression description. 'Tracks, 'Predicts.
6B-590 COLOR CODE - READING PRODUCT LABELS:
This can be used for reading food/drug labels. Suppose I need something that is sugar free, for example. I could read the entire label to see if it contained sugar or not, or there could be a color associated with this; I program my scanner to check if the label has this color and, if it does, know that it fits this criteria. 'Visual analyzer, 'bar code reader, 'score.
3J070: AUDIO ADJUSTER - FITNESS:
This can be used for exercise classes or individual exercise sessions. If you have ever taken an aerobics class, you know that the instructor uses different music for warm up, high intensity and then cool down stages of the class. Suppose a device automatically sensed whether a group or person needed to increase heart rate, slow down, needed a change of pace, etc. and used music tailored for these situations. 'Entertainment, 'Guide, 'Exercise.
MISCELLANEOUS:
.  Check Forgery: Have a pen that a bank issues with a checkbook. If a check amount is suspiciously large, or the check is suspicious for any other reason, the bank can check and see if it was signed with the accompanying pen or not; if not, it was probably stolen; they can call the customer and see if, in fact, it was his signature or not.
.  Scientific Use: Scientists may be able to use this to identify chemical compounds by seeing if they are exactly the same color as some known compound.
.  Agriculture: A plant is a certain color when ripe. Perhaps the scanner can determine when it is ripe, as well as when it is diseased. Plants that are not a ripe, healthy color will trigger the scanner.
.  Education: Like the fitness example, the device could tell is a student or class was tired, nervous, distracted, etc. and play music that was appropriate for their needs. It can be used for both classes and when studying at home. Relies on: motion 'sensor, 'behavior analyzer.
.  Insomnia/drowsiness: Perhaps this device could play 'tailored music that enables people to sleep more soundly when they are sleeping, the feel wide awake when they get up.
.  Addictions: Like the above example, perhaps this device can lower cravings for nicotine, caffeine, alcohol or sleeping pills by enabling people to feel more wide awake or relaxed as need be via 'tailored: music/sounds, 'exercise, 'entertainment, 'education.
System tailors its functions to the unique needs of specific users. Each user can have their unique profile stored in adapt-Database, which includes their: needs, preferences, and behavioral traits. Tailor then matches the database, with a menu of function choices. The function chosen is the one that best meets the user's preferences.
-adapt-Input develops the adapt-Database by: 1. 'analyzing user behavior, 2. Allowing user to input their preferences, 3. Linking to other databases with user's preferences.
-Integrates: 'Edit, 'Educate, 'EGH (Educ Gets Harder), 'Guide, 'Interact, 'Predict, 'Seek & React, 'TGH (Therapy Gets Harder), 'adapt-Emergence (2G180), 'adapt Tailor.
-Tagged Cascade Effect 7J08: System hones in on a frequency (sound), then cancels other sounds making tagged sound clearer. System 'reacts when the 'tagged action occurs. Hones in on anything effecting man's five senses. 'content analyzer, 'edit, 'seek & react, 'sound recognizer, 'tailor, 'visual analyzer.
-See many huge adapt files..!
CONCLUDES THIS ADAPT* FILE
CONCLUDES THIS ADAPT CENTRAL DESCRIPTION SECTION
File: Features Intro / Analyzer
ANALYZER
Like the word "analyzer" suggests, it attempts to match the human brain in making decisions. Decisions are made from a choice of preprogrammed possible 'reactions. Using fuzzy logic, it takes on the needed functions of software, as would be needed to handle the applicable tasks called for.
System tries to think like a human brain (where (w5) feasible), sys (system) tries to know its limitations. Uses the best knowledge in the field. 'Analyzer 'customizes itself. Uses the best knowledge in the field (from 'sensors, UIP, etc).
Figurative Drawings
D1: 1 signals -> 2 data from particular input (item being analyzed) -> 3 put into file(s)1 = 4 tr/rc = 5 c (6 existing files ) = 7 matched/8 compared w 9 inputted files = 10 similarities and 11 differences noted = 12 type/level of differences 13 determined/14 "analyzed" = 15 conclusion made = 16 signal = 17 action made by 18 sys / 19 s or printer shows conclusion.
-DI Notes: 1: optional part of data flow; sounds = 2 sound analyzer; lights; body movement = (2 sensors); visions = visual analyzer. 2: communication w other el products; c. 3: sw; different files are pre. or automatically labeled according to type situation according to circumstances/occurrences (1). 6: files developed earlier by manufacturer (mp), or u's pr. 7 & 8: similarities/differences noted/analyzed via: key words/paragraphs%, visual analyzer, SW ('software) number crunching. 9: data from 1, 2, 3, 4, 5. 13 & 14: sw analysis. 15: SW ('software) analysis. 16: computer code labels the type situation sw has determined to be the case, eg: favorable, unfavorable, and or what action is needed to be taken (due to the "status" of situation).
-D2: input -> c (analyzer (sw)) -> results / function (altered according to how sys may want to adapt according to determination(s)/conclusions made by analyzer).
-D3: Read Later D C (SW Analyzer) =
ACCESS (determines w5 can access into any given sys (c, m, any portion thereof, eg: particular files or software programs/features)/ BILL / CART (differing SW ('software) for type analysis needed)/ COMPOSITION / DATE / S / EDUC (sw determines u's level of sophistication (w sys/sw) = intern simplifies/complexities the SW ('software) interface (and available functions / steps needed to achieve desired aim (via pr/k)))/ K ('keyboard) / LOCATOR / M (uses M's database(s) for (additional) information from which to (better) determine analysis)/ MQ (sys asks (intelligent) questions to better collect needed data for better analysis; development of uip)/ MULTI-USER (analyzes (tasks/things/occurrence) differently according to type/uip of u; development of uip)/ NOTIFIER (u alerted when analyzer determines u (user) (may) need to know (status))/ OSC / PR (how analyzer is to function / what its to seek and how process information / for w5)/ PS (determines location of object(s), processes information accordingly (as pr))/ Q (decides what questions to ask u (user) according to circumstances, eg: what u (user) wants or is doing (w5), u's status*)/ *R / SCORE (new scores matched with earlier developed files for analysis; creates new files for new scores, development of uip)/ SENSOR (compares files for inputted signals w (with) what is wanted/needed/expected/is standard/has historically occurred before (uip/m/database))/ SOUND ANALYZER (compares inputted sounds w previously stored sound files)/ SPEECH (sound analyzer)/ STATUS / SYNTH (sys synth (automatically) according to: pr/uip/u's k)/ TDS (effects score, development of uip)/ T (telephony sw applications)/ UIP (compares files)/ VISUAL ANALYZER (compares files, 2E251 Intelligent Monitor)/ VR* (compares files).
-in some (simpler) circumstances, the analyzer functions wo software, eg: simple turning on/off according to situation.
.  % Read Later This N Part:
-2E251 Intelligent Monitor: ; 3E040 3E041
-3G010 T Ring Delayer:
-5E080 System self analyzes best synthesis for acoustics of room/hall:
-7G050 7G051 PVC Change Alerter: ; 7G052 related kn.
-9G220 Channel Scanner Skips certain stations...
-"Analyzer" and how it matches and compares files and determines conclusions also explained in UIP (UIP-Tailor, UIP-Suggestion).
Fuzzy logic. AP = Applications: the related product applications, and specifications, for the listed application(s) are obvious.
-4E020 Registrar.
.-"Router": locates then= retrieves needed data= for this part.
-"Bill"
-Related existing SW ('software) from "TDSW":
Brainmaker 2 - (Professional version), p.76. [Existing N functions: Gives PC human abilities such as finding patters in your data and learning from the past.]: UIP, "track".
-ProTEM - Business Process Improvement.
Takes on the functions of software as would be needed to handle the applicable tasks called for by invention disclosure.
*  ANALYZER - READ LATER SECTION MAYBE =
Diagram 1: 1 signals -> 2 data from particular input (item being analyzed) -> 3 data put into file(s) = 4 tr/rc = 5 c (6 existing files ) = 7 older files are = 8 matched and compared w (with) 9 newer inputted files = 10 similarities and 11 differences between files noted = 12 type/level of differences 13 determined/14 "analyzed" = 15 conclusion made = 16 signal = 17 function/action made by 18 sys (system) / 19 s or printer or notifier shows conclusion.
--Diagram l's Notes: 1: optional part of data flow; sounds = 2 sound analyzer; lights; body movement = (2 sensors); visions = visual analyzer. 2: communication w other el products; c. 3: sw; different files are pre. or automatically labeled according to type situation according to circumstances/occurrences (1). 6: files developed earlier by manufacturer (mp), or u's pr. 7 & 8: similarities/differences noted/analyzed via: key words/paragraphs%, visual analyzer, SW ('software) number crunching. 9: data from 1, 2, 3, 4, 5. 13 & 14: sw analysis. 15: SW ('software) analysis. 16: computer code labels the type situation sw has determined to be the case, eg: favorable, unfavorable, and or what action is needed to be taken (due to the "status" of situation).
.  drawing 2: input -> c (analyzer (sw)) -> results / function (altered according to how sys may want to adapt according to determination(s)/conclusions made by analyzer).
.  drawing 3: C (SW Analyzer) = ACCESS (determines W5 (what, where, when, why and how) can access into any given sys (system) (c, m, any portion thereof, eg: particular files or software programs/features)/ BILL / CART (differing sw for type analysis needed)/ /COMPOSITION / DATE / S / EDUC (sw determines u's level of sophistication (w sys/sw) = intern simplifies/complexities the SW ('software) interface (and available functions / steps needed to achieve desired aim (via pr/k)))/ K / LOCATOR / M (uses M's database(s) for (additional) information from which to (better) determine analysis)/ MQ (sys asks (intelligent) questions to better collect needed data for better analysis; development of UIP)/ MULTI-USER (analyzes (tasks/things/occurrence) differently according to type/uip of u; development of uip)/ NOTIFIER (u alerted when analyzer determines u (user) (may) need to know (status))/ OSC / PR (how analyzer is to function / what its to seek
and how process information / for w5)/ PS (determines location of object(s), processes information accordingly (as pr))/ Q (decides what questions to ask u according to circumstances, eg: what u (user) wants or is doing (w5), u's status*)/ *R / SCORE (new scores matched with earlier developed files for analysis; creates new files for new scores, development of uip)/ SENSOR (compares files for inputted signals w (with) what is wanted/needed/expected/is standard/has historically occurred before (uip/m/database))/ SOUND ANALYZER (compares inputted sounds w (with) previously stored sound files)/ SPEECH (sound analyzer)/ STATUS / SYNTH (sys synth (automatically) according to: pr/uip/u's k)/ TDS (effects score, development of uip)/ T ('tel) (telephony sw applications)/ UIP (compares files)/ VISUAL ANALYZER (compares files, 2E251 Intelligent Monitor)/ VR* (compares files).
-in some (simpler) circumstances, the analyzer functions wo software, eg: simple turning on/off according to situation
END OF THIS 'ANALYZER FILE
File: Art\Ar Intro & General
ART FEATURE
Table of Contents for Artist Section:
AR Intro & General
AR IMIS AR IMI
.  AR Write
.  AR Cause
.  AR Crawl
.  AR Educ
.  AR Merge
.  AR ReadHelp
.  AR ReadHelp*
.  AR Dys-Ed
.  AR Dys-IMI
AR Dysl
.  AR Dys2
.  AR Dys App
.  Artist Misc*
Use Our Masterminded Patent Application To Improve Your Artistic and Editing Ideas! Learn about our quick and easy licenses. Call (+1) 707-428-5000 www.LicenseItToday.com
Tailor pictures to your taste. System's 'Visual analyzer with wide powers, determines the characteristics of the image to be altered.
For Techies: 'Edit pictures. User alters pictures or text. System alters images for user (in 'tailored form). Functions: accentuates images; automatically 'edits as programmed (so as to best 'tailor itself); improves visibility, readability, excitement, user's interest in (multi media) presentation; images are made to 'interact w/ (with) user or other images on screen; 'cut & paste software function; user 'draws images; 'visual analyzer studies 'images created by user or other source.
The Following Are Electronic Art Generation Elements:
-#1 OTD: D =
*5A- 110-042003 Master Artist: make masterpieces similar to the masterpieces or choose your own. Select painting desired, and electronic device will help guide user in any one of many methods. Incorporate different parts via selections and or drawing.
*5A-120-042006 Camera Editor: Take photographs, which you can then edit on the related computer system {camera and editing aspects can be on same or different pieces of equipment }.
*5A-130-042004 Color Sticks For Computer Drawing Pad: Simplifies computer graphics system for children. Child inserts plastic piece for the desired color.
*3A- 110 Antenna Art
3A-580 Air Pad
*"Sound Analyzer", and "Sound-Vision": used to convert sounds into visions.
*"Composition": sound effect composition might work in parallel or in synergy with "Artist" 
*"Remote"
3A-790 Magic Air Pen
*5A-620 Virtual Reality Invention Laboratory.
"Bill"
-OTD #2: display; fd-hdd; pp; mp; uk; mouse; toy; basic; printer; M%; osc; speech; md; cart (image creating software options); cp; uq (eg: how to operate software); mq (eg: how user wants to generate their art); UIP (system generates graphics according to past images user preferred; such user preference can be inferred with some margin of error based on the graphic editors selected earlier and or the types of images user made in the past - this "pi" system might be an optional mode, and valuable considering that it might be too complex for some users to select the graphic image editors that he might like most); character; motion sounder% (activates images according to how a device is moved, while simultaneously making a sound corresponding to the type motion); multi-user; cc; notifier; tilt (graphic image editor is effected by how the part and or device is tilted); air pad.
-El meeting place:
Improvement on US Patent 5347306: "C" - Animated electronic meeting place for: business / "education" / "interactive" meetings / "games" / "entertainment" =
ACCESS (needed for each participant (u) to join) b ANALYZER (how / w5 sys functions as desired (according to uip-tailor/pr/k)) // EDIT (actions/statements/responses from u) // NR (when u is asked to respond or should notice designated occurrence(s)) // OSC (verbal communication) // PR (how each u "interacts" w/ each other / sys) // Q (answered differently according to u) // R (u's control / communication device) // ROUTER (each participant / their communications, routed differently to others = according to: who (u) the sending / receiving u are / w5 of situation) // SCORE (of each u) // STATUS (of: each u / their actions) // TDS () / T (how each u "interacts" w: other u / m) // TRACK (progress/changes of each u) // [ UIP / "Multi-user" = (each u = experiences / handles sys differently = according to u's unique uip-tailored sw) ] // "artist" // "composition" // "educ": each u = "interacts" = learns from or teaches other = u (in different manner = uip) // "cart" // "M".
Introduction: Each / Most Artist KN also have a sw version - D: U = mouse / r / k = c - image generating sw = s / printer / [tr = another c] / access.
Fidelity Catalogue's Product Improvements: Many Non-electronic
*  See catalog for details on existing products: The catalog containing Fidelity's products was received on Dec 31, 1994. It's cover has black marble background with pictures of taxi, and appliqu6 film system. Catalog dated "Winter 1995".
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725]
Portable Drawing Board: Sliding guides; corner clamps. 
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p.3]
Rotary Cutters: cuts pads, foam, etc.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p.3]
Clip Compass: draws circles by gripping (any) writing instrument.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p.9]
Electric Eraser: for lead / ink.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p12]
Tracing / Overlay papers.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p.13]
Waterproof paper: Use in copiers.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p. 13, 14]
Non Reproducible Blue Grid (Paper).
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p.14]
"Access"
Graphic Arts (Masking) Tape
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800326-7555 Fax 800842-2725; p.15]
3C292 "Images" of Magical Building Blocks: Each combination has designated results.
Person generates and edit images. It can be compatible with existing multimedia ("MM") hardware and or software. -D: 1 uk = 2 base ("C") = 3 tr = 4 "S"/5 function/6 M
-OTD: 2 access; 1 air pad; 12567cart; 1245cc; 4character; 4color; 2%composition; 2date; 4images are "displayed", stored in 2memory, 234 projected onto walls (via color lights), converted into printed pictures and or 5cinema or 5video; educ; %egh; entertain; 2fd-hdd; 124float; 5fs (send/receive images in black & white/color = separate computer/e-mail/fs/special computer=printer located in other location; game; 23%gps; 2interactive; md; 12microphone=4=5/speaker/osc/play back/stereo; 4mo; 25%morning (user must generate specific images to deactivate the alarm: generate similar / related / unique image. System may inspire ideas for image(s), eg: one which evokes the idea of waking up, like running to catch bus; 1 mouse; 2mp; 2mq; 2multi-user; 5**notifier; 5*osc; 26pi; 1245portable; 2pp; 5printer; 124rcp; remote; 2score; 5speach; 2tds tgh; toy; lvc; 5visual analyzer; 5 vr (create images desired for your virtual reality experience before / during use, eg: have a virtual reality-type experience painting. This can inspire individual creativity); 25 camera takes pictures, allowing user to memorize and modify, eg: size, color, slicing, adding shapes; 26 user needs visual ideas, so they uk: w5 of situation requiring a visual piece / uip of person & or co & or situation; %wa.
-See "Brain": sys adapts images for u.
-OTD: U = "Artist" Sys - C
ACCESS (limits functions, each movement of r / r stick 5E020 is interpreted ("analyzed") according to password); OSC (each "Ra's movement can tie in w corresponding type sound); PR (u designates which movements of "R" represent which type of marks/functions 5E020); Q (U asks how they can draw differently / program their R differently (from what's stated in N description)); S (interactive touch screen; color monitor); %SCORE (drawing aptitude); (Motion) SENSOR (of R/%U); TDS (); UIP (DB: image data bank); %VISUAL ANALYZER (). .-"Router": locates then= retrieves needed data= for this part, eg: images (from image data bank (db) (on m)). -A code (access, el 'water mark') encoded in sw/data* limits how sys / program can be: utilized (to operate device) / "edited" / copied. See: "Access", "Edit".
-"Bill"
END THIS ART FILE
ARTIST - SUB-FEATURES SIMPLIFIED:
"COLOR" = Any color(s). Any "edited" colors match.
"CRAWLER" = Externally controlled image creating mode crawls across screen.
"CRAWLER'S VIRUS" = Crawler attacks other's functions. "Game's" opponent player's functions represented visually. Crawler "edits" opponent's functions inturn effecting their abilities.
"CUT & PASTE" = Standard computer terminology plus more.
"DRAW"  =  Create image. 
"EDIT" = Alters images in complex algorithms. Eg: "crawl"; makes colors or shapes compatible; "cut & paste".
"GUIDE" = Suggests how user might proceded in creating images.
"IMAGE" = Picture.
"INTERACTIVE IMAGES"
"MULTI-COLORER" = Same as crawler except user controls how crawler moves.
"MULTI-USER" = Each user "edits" each other's "images".
"SW" = ("Artist") software; program.
"WRITING INSTRUMENT" = Mouse, stylus, "tilt".
File: Art \ Ar-IMI
ARTIST - COMMON FUNCTIONS FOR EACH ARTIST KN:
Intro: Each "artist" function theme below includes different
variations detailed in the grouping of related "artist"
inventions.
"ANALYZER" =
Sys has a mind of its own. How it will automatically: "Edit",
"Draw", "Crawl". "Designating" "images" for labeling /
"coordinating".
%  "Tracks" / "Scores" the "artist" occurrences / functions.
"BEHAVIOR ANALYZER" =
US Patent: 5507649 = "images" are "designated" to= match
accessor's behavior. Eg: children receive different images from
adults.
*  "COLOR" = Any color(s).
.-Color Selector: (Printed) guide shows numerical code for
numerous colors. Software version too.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On 
File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; all of p. 4, p. 5, top p. 6]
--each numerical code used by "color" = "analyzer" for: color "coordinating" or other "editing"; "mood" and ba (how each color effects viewers).
-"colors" are changeable / refillable: (Refillable) Ink Marker Systems.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p. 6, 7, 8, 10]
.  Access: Hurdles to gain "access": type color(s) used W5.
"COORDINATOR" =
Any "edited" colors / images match. Modes of coordinating colors and images are similar.
Color Coordination:
Color choice process (for "Crawler"):
+  Colors compatible: The colors used blend (well - as pr), eg: green matches / blends with blue, creating blue-green in between; red and blue blend to make purple...
+--the manner of color changes pre-"analyze" how colors blend together
--The colors used blend well, eg: yellow blends with blue, creating green in between; red and blue blend to make purple... --the order of color changes consider how colors coordinate and blend together
-device uses single colors, and or blends desired colors as user selects.
+  Compatibility of colors may imply that: they are of a related subject, function, u, application. "Coordinator" "designates" colors accordingly.
+--'Character's 'image portrays (compatibility / type) of subject matter. See: 'Guide's = 'Character.
+  How colors selected: 1] sys= "analyzes" color compatibility charts. 2] Second color utilized has color pigments that are the same / similar / compatible w (with) first color and compatible with second color. Applies to three or more colors too= whereby all colors added into other colors must be compatible w (with) every other
color. 3] UIP tailoring according to: u's or customer's tastes;
target audience's behavioral parameters. 4] See "designator".
+-Style of outputted coordinated colors = uip= depends on
"designated" color desires. Applications: greater or lesser
color coordination or contrast (to catch people's attention or
create relaxed "mood" for "entertainment" or "educ" or "tgh").
Image Coordinator:
Imaging Compatibility: changes made to be (non) coordinating.
Sys "edits"/"cuts & pastes"; adjusts/coordinates existing/future
sizes of shapes w (with) colors (to give desired / ["crawler" generated] appearance). R24-1 Image Coordinating Software.
++  R24-1 Image Coordinating Software:
"Analyzes" for compatible colors / image texture / shapes / color
intensity.
Analyzes and rates how well chosen colors are coordinated.
Generates compatible colors in output modes of "multi-colorer"
and "crawler". Applications: analyzing photographs, graphic art
software (limited color choices influenced by type printer or
compatible software).
-"edits" non-compatible colors/shapes -> eg: colors/shapes become
compatible algorythmicly:
--#1  changing designated colors/shapes. Designated colors:
those least compatible; using u's uip color preference chart,
omitting colors closer to disliked spectrum (all together);
colors needed to effect desirable results via "ba" / "uip", eg:
uses yellow or red to catch people's attention (in emergency /
for "nr").
--#2  changing all colors/shapes -> eg: bringing them closer in
line compatibility wise -> by adding / omitting coloring agents.
.-ARTIST:(system will select color(s) according to colors to
which it must 1 match / [2: pr (program) / uip = SW ('software) knows w5 to color coordinate, then does so (automatically)].
.-user selects one or more colors, then sw offers (available)
choices of compatible colors.
.-C SW D: color determinator (sensor, sensor = lens, color's "c"
codes)  = "analyzer" = s / printer 
-OTD D: This N Sys (image coordinator) =
ACCESS (person must wear particular (coordinated) colors for
access (entry, usage)) - copied to "access" 7.96; ANALYZER;
+ARTIST (sys fills in colors (after certain areas are done; adjusts/coordinates existing/future sizes of shapes w (with) colors (to
give desired appearance as defined by graphic arts schools);
CAMERA (inputting of images ("cut & paste")-> processed ("edited"
by this sys); CART (type coordinating sw); COMPOSITION ((automatically) merges graphic w audio composition); S
EDUC (learn coordination, art, read up on past painters;
guides/teaches u (user) if/when/w5 (colors) match); M (sophisticated
sw, colors, coordinating analyzers); MULTI-USER (how each u
likes their sw); pr (program) ; SCORE (how well coordinated: color, shapes, texture (2D or 3D*)); SENSOR (for colors); **SOUND ANALYZER; STATUS (sys judges its ability to do the
necessary/requested task /judges what it did; shows numeric
possibility of error); UIP; +VISUAL ANALYZER.
-2E251 Intelligent Monitor: uses sys (system) to better notice w5 sys (system) is studying/following.
.-R numbering Sys: because this KN has an extra digit (R24-1),
its strictly a KN and doesn't include existing N, yet the R24 of
R24-1 relates to existing N which is remotely tied to R24-1.
-image's texture, defined: comprised of many/small/big dots of
single/multi-color; substance image looks like (fabric, stone,
shiny (metallic, plastic), rough (wood), cardboard, paper, (live)
vegetable matter.
-5G061 Dyslexia Software.
-sw's ("guide") icons can be "edited" between different shapes:
squared / rounded (circle/oval) / triangular (perimeters) w
"color" w/in changed as "designated".
+  "access": u's "cart"/sw= must have designated shapes/colors= to
gain "access". In other words: shapes in= pr= of u (user) must have
correct "image" parameters for= "access". Patentable?
--level of u's sw= "analyzed" for compatibility= level of
"access" given determined by closeness of compatibility.
--accessors aware of this sys= may change their type images=
within range of image that gave them some access.
R24 Paint mixer makes ranges of colors. 
.-[Rock Paint Co 3-1-47 Himejima, Nishi-Yodogawa-ku, Osaka 555
06473  1551 15 Feb 92 NK]
-D: cart ('cartridge) - c - container for different elements for painting = mixer = paint transfers to dispenser = dispenser
(brush/spray/**drops paint/inserts paint into containers user can
remove and use as (fresh) paint) = paints surface = surface.
-paints different shapes, textures, thicknesses of paint, etc.
according to programming (pr) / user instructions.
-system analyzes the texture/surface onto which it will paint,
and in tern determines the best chemical mix to (stick and stay
on for desired period of time) and thickness and number of coats needed. surface analyzer (scrapes surface = tests in its lab;
"camera" = "visual analyzer"; user "k" type surface and any other information (whether indoor / outdoor; temperature parameters
year round...)
-OTD:
ACCESS **:(ranges of colors possible restricted as well as any access); CAMERA:(studies (existing color of environment) to determine best color to mix); CART *:(pr; inks; paints;
chemicals; scents [mix w (with) paint]); COMPOSITION *:(automatically paints according to signals from sound analyzer - D: sound =
sound analyzer = R-24 = painted surface); ENTERTAIN:; MFH:;
MULTI-USER*:; NOTIFIER:; OSC:; PR:; Color PRINTER
*:;  PS:; Q *:; R:; S:; SCORE:(tds); SYNTH:;
TEL:(tr); UIP *:(color combination according to uip of target audience/user and or according to desired effect (according to
uip of target audience, eg: maybe best color to increase
productivity in blue jean factory workers in Thailand are light burgundy painted walls)); WA:.
3C-210 Color Selector: (older KN?)
-Point device at anything, and its colors are altered or
dissected, eg: something green can be divided into yellow and
blue; or changed altogether, eg: to white, pink or brown...
.  (D) Drawing: "Artist" (Color Coordinator or Selector) / Artist's "Edit" R24-1 Image Coordinating Software/ (Colored) "Image" output = C ((Color) "Analyzer") =
"CRAWLER" (effects manner of coordinated color output) b "CUT & PASTE" (each section can have colors coordinated differently, in
other words the method and style outputted differ according to
the section (all visible simultaneously on same s)) / "DRAW"
(manner of drawing triggers differing "color"
generating/coordinating modes) b "EDIT" (how coordinated) //
"GUIDE" / "IMAGE" // "MULTI-COLORER" // "MULTI-USER"
//  "SW" // "WRITING INSTRUMENT".
.  Hurdles to gain "access". W5: Manner in which following are
coordinated: images; user's behavior ("ba"); colors; shapes; W5
u accessed sys.
+  Sizing / Color / Shaping%: "Edited" as needed for
compatibility. Eg: size of tree doesn't exceed house size by
two, and its fruit is double the size of door's front door knob.
Sys can alter shape of tree and or its fruit in differing
fashion. *D: "cuts & pastes"= then "edits" accordingly.
End "Coordinator" = "Artist"
+  "CRAWLER" = Externally controlled image creating mode crawls
across screen. Also functions like an organism crawling across
images leaving altered visual effects in its wake. Differs from
multi-colorer whose movement is controlled by u.
-%crawler can be in form of cart / SW ('software) (inserted into function!
mode / sys (system) / sw / c) / icon or "interactive image".
-D Algorithms: previous image's characteristics (f 1) X crawler
(f2) -> f3 X any other variables (time, additional input given
crawler (by u)) -> synergized function (f4) -> altered image(s) -> time pause -> last image can be re-"edited" (into something new
/ repeating related algorithm)
--each 'f = function: has hidden codes. These codes are hidden
in that they don't (necessarily) relate exactly to the image
shown; but influence: subsequent "crawler"-type events.
.  Read Later (D) Drawing: u (user) = This "Artist" System - C ('computer) =
COLOR (chooses what colors appear when and how (w5)) // DRAW
(crawler itself decides how it will draw / "edit" / GUIDE (u may
"guide" crawler. Though crawler may choose to ignore requests
from u.) // MULTI-COLORER (what crawler does too) // MULTI-USER
(each crawler can be considered a u (user) in this circumstance=
resulting  in each crawler "editing" images each crawler 
generated, or each crawler can alter other (living) crawlers) b
WRITING INSTRUMENT (crawler takes form of any writing
instrument).
-See additions to "Crawler". Was in file: k\ar\IMI& in 7.96.
.  Hurdles to gain "access". W5 Crawler is utilized via one or
more of following:
-U attaches their key or other related element to the correct
crawler which takes them through the hurdles, though u (user) may be
required to take "designated" actions controlling crawler and or
anything in its environs W5.
-Crawler must be reprogrammed as "designated"= then taken on (one
of) the path routes it's designed for according (according to
type application / access desired).
-W5 how u (user) controls or reacts or creates crawler (virus*) in any
manner: "game", "artist", "access" = "order & timing"+,
"crawler"="cart".
-see "game", "game" = "crawl"
-"crawler" knows W5 (what, where, when, why and how) to get u (user) to desired point of access, saving u from keying in unnecessary strokes / information. Like an
electronic bookmark: u selects which bookmark they want crawler
to take them to.
+  "CRAWLER'S VIRUS" = Crawler attacks other's functions.
"Game's" opponent player's functions represented visually.
Crawler "edits" opponent's functions intern effecting their
abilities.
-An algorithmic function that alters function of whatever its
designed to attack/effect; Virus is a subset of 'Crawler'.
-Also functions like crawler however the altered results also
include functionings correlated to the attacked images.
-See "Crawler".
*  Read Later (D) Drawing: u (user) = This "Artist" System Changes the abilities of other
player's abilities in below manners - C ('computer) =
GUIDE (how they can control their players/crawlers) // MULTI-USER
// SW ((partially) disables their ("artist") sw) // WRITING
INSTRUMENT (what it can/can't do). 
.  "Access": How attacks hackers: Crawler seeks (via "analyzer")
W5 hackers are present in sys= attacks / disables hacker's: sys
or (sw) portion thereof that technically allows u access, eg:
erases needed SW ('software) codes for pr (program) to get into sys during that or future attempts at access.
"CUT & PASTE" = Standard computer terminology plus more.
Cut out spaces into which images inserted: these images are:
drawn in / previously drawn images / "camera's" photos / other
(downloaded) images; fragment cutting / pasting shows up
(randomly) over (pr) sequence of time.
+  VA ('visual analyzer) seeks "designated" images= then "cuts & pastes"= as "designated" (by "edit"). SW's search and replace.
Applications:
-creating collages;
+  compiling images w associated text of needed subject matter:
Asian feature faces; (portions of) password icons (w "designated"
function).
-"entertainment".
+  sys gives user a menu of images to choose from= to "cut &
paste" as u (user) desires.
.-Puzzle "Game": cut & paste omits sections of image / screen =
u must guess what's missing.
.  Read Later D: u (user) = "Artist" (System's "Cut & Paste") - C - What is "Cut & Pastable" =
COLOR (colors but not necessarily the shapes or text) ! CRAWLER
b EDIT // GUIDE // SW // WRITING INSTRUMENT.
-"score" shows W5 / how often elements were used / viewed / "cut
& pasted" before by "designated" u (user) for designated applications.
+  "Artist" automatically jazzes up what's cut & pasted: select
"edit" mode.
+  Any function can be labeled w/ an "image": Anything
representable as an "image" is cut & pastable. Any KN (invention) function (shown on its s). Eg: U requests VA ('visual analyzer) to seek= then "edit"= all icons with features (parts) which are over 80% green, blue and or blue-green.
What's cut & pastable (w or wo "image" (parts) / other elements):
any KN part, eg: "score"; desired uip elements (desired
functions, portions of db influencing what uip determines as
being desirable functions); parts (visual presentation or
function) of icons.
-"Artist" / KN Function type gained or lost: "draw", "edit",
"writing instrument" ability.
.  Hurdles to gain "access". W5: "Merge" = "Artist's" = "Cut &
Paste".
-Lines where "cut & paste" cut determined by: how sw shows where
images start and end as "designated". Eg: VA ('visual analyzer) seeks: faces (wo hair or background), precut (blocked) images are cut in entirety.
"DESIGNATOR" =
Colors, shapes or other images are utilized or "edited" to
achieve "designated" result. System automatically determines via
any kn "designation" criteria what needs to stand out / be
"edited". Results in greater help to u: "nr"; what needs
attention; "status"; intuitively user may know what "designated"
changes mean, saving time from having to read text, look up
meaning or have s cluttered. "Editing" mode selects: color,
"coordinator's" (compatibility level), "crawl".
-form of Seek & "React": Though nothing may need monitoring or "tracking", or be occurring by accident or chance; sys (system) or u (user) wants "images" / (corresponding) %functions altered as "designated".
.  Patentability issues: how designation works automatically
coupled w (with) the benefits.
.  Need for "designated" result determined by: "nr"; "uip";
"score"; "tds": shows deadline coming up; "analyzer"; "sensor" is
triggered; creating designated "moods" for: "entertainment", 
"educ", "tgh", "mm".
Applications:
What needs "designation":
-designing anything (house or N plans): certain colors/shapes
are needed (to catch attention) wo creating an overall unpleasant shape/color/other (how u would use N= determined via ba) coordinated scheme; this coordination is such that the important colors stand out to the degree desired as well.
.--Eg: have orange [stop] button while rest of product is in
white or grey, but not dark burgundy (burying the orange). -(automatically) gives same / related colors/images to each type
of function (sw icon). Results in u's eye being more readily
able to classify "images".
-- "designates" color according to "score" of function color is
tied to.
-"nr": gives "designated" changes to: catch attention. Eg: red
is most serious crisis in department A, while lighter shades
(pinks) are less serious in same department. Orange and lighter shades for department B of company.
.--"Nr" induced changes may only be temporary or in effect until problem solved.
+  Who did / is / needs to do what, why, where, when and or how
(on sys): ("game") Who and W5 (was in ps-zone)
-influences "mood" generation: according to W5.
-Chemical indicators: SW ('software) shows "status", "nr", w5 -"CID" / Text / "C" file names or icons: Know w5 / "score" of value about subject / caller.
-Shows if something doesn't belong where it is. Eg: customer's
file in wrong sw directory; wrong chemical utilized= causing possible hazard / 7G indicators.
-number of times someone "accessed" (which sections) of sys and W5.
-how well material u (user) is seeking / reading / experiencing= matches their UIP. For seeing titles of internet articles. "Score"
occurs via key word / subject matching as w/ Yahoo sw.
-M / DB: "designated" u browses world wide web, and he or sys "scores" value of sights (creating bookmarks of "designated
colors") for others / themselves in future "access" of such
sights. Magellan internet sw's rating system.
-- "Scored" data used accordingly for developing UIP-DB. Colors
let others quickly see how well sights were rated (by previous
person / sys).
--material "routed" to pertinent subject category files= on U's c
/db.
.  VA ('visual analyzer) seeks -> "reacts":
-"cuts & pastes": va seeks "designated" "images"= then: "edits"
as "designated". Example: va seeks thru db ('database) for "images" of
masks= "cuts & pastes" the masks found= onto pumpkins= then
changes and "coordinates" coloring into shades of orange and
black for Halloween =
.--Next ->*: u (user) can next select preferred newly generated
"images"= and: print them (onto stickers) / use them for labels
for icons or "crawlers" or "game" characters.
-Designated images attract characters / small "images" which look
different according to what character is there for:
--Labels subject: va seeks negative "images"= then places
"game"=character "image"= next to negative image. This nr
character is different according to what it is nr /
"designating". * Eg: Character is a: dog when labeling security
or "access" issues; baby when labeling toys or thing for babies;
red stop sign when labeling most important cautions.
--Character represents additional information of interest= as
pertaining to what images character is near or pointing to.
--designated images altered otherwise: to get attention, eg:
circled / color or size changed.
-"Sound to Visual Converter" - Old KN. Eg: bar codes conver
-"Routes" designated images to: files organized by: subject
category, "score", "status", "uip"; u (user) needing image (according to
uip).
--(sys seeks and tr (transmits) designated (uip-tailor, "visual analyzer")
images)
-SCORE (how closely each image (sys can "analyze") comes within
desired image's paradigm) -> sys (system) "reacts" w/: greater or lesser
"editing".
-Image db ('database) Searcher: VA ('visual analyzer) scans db ('database) / world wide web for "designated" images ("routes" it and any attached text / page /
web sight text / other images) to= "designated" file.
.  D: "Artist" / "Image" output = C ("Analyzer" seeks following
(according to W5 (what, where, when, why and how) criteria)->) = "COORDINATOR" (what is or isn't (poorly) compatible) b "CRAWLER" // "CRAWLER'S VIRUS" // What was "CUT & PASTED" (according
to W5) // "DESIGNATOR" (what / W5 altered according to
"designator" / "edit") // "IMAGE" // What was created by
"MULTI-COLORER" (according to W5) // "MULTI-USER" // "SW"
//  "SYNERGY" ->
-> "Reacts" as "designated": "Edits" / Alters information or
codes or images.
.  (D) Drawing: S' "Images" / W5 / "Score" / u (user) / What part is/was (not) in operation =
Artist's "Designator" - C =
ACCESS; ANALYZER; BILL; CART; EDIT; EDUC;
MULTI-USER; NR; OSC; PR; PS-Zone; Q; R
;  ROUTER; SCORE; SENSOR; SOUNDANALYZER;
STATUS; TDS; T ('tel); TILT; TRACK; U; UIP;
VISUAL ANALYZER; VR*; WA ('walk about).
Misc:
.-Functions automatically, or u given menu of best choices
("guidance"), and or occurs while u (user) "draws". Related to:
"edit", "coordinator".
.  "Access" = "Designated" images:
-Hurdles to gain "access". W5 needed "access' passwords its
images are created (password generation): "Designator" creates
the needed password (or image representing password)= according
to "designated" uses u needs.
-Attacking hackers: Hackers' password images / sys are attacked
("edited") as "designated". sys (system) may also stop / make difficult
for hacker's computer to subsequently gain access via: making it
difficult for them to (re) create needed images for gaining
access.
-- "VA" / "BA" "analyzes" how potential hacker's images 
(passwords) differ from "designated" criteria.
-Each application (according to W5) needs differing "designated"
images (passwords).
"DRAW" = Create image.
Paint; move computer mouse to draw image; "tilt"; brush on;
selecting and utilizing "color"; * normally excludes taking
picture via camera; %'crawl'; %"camera" takes pictures (then sys
"edits"); color sticks utilized; multi-colorer; (sw) pen or
brush; paint; rub (finger on "interactive" screen); "dance"; move
"R" in fashion to create / *"edit" image.
.  Read Later D: u (user) = This "Artist" System: "Draw" - C =
COLOR b CRAWLER (what crawler does) / EDIT ("artist" =
"edits"= what was drawn) // GUIDE (helps u (user) draw) // MULTI-COLORER (way of "drawing") // MULTI-USER // SW (determines how u's use
of "writing instrument" comes out) // WRITING INSTRUMENT (tool
for drawing).
.  Hurdles to gain "access". W5: the needed shapes / colors are
drawn; at what speeds images are being drawn (mouse's (average)
speed) or time (duration) from start to complete.
"EDIT" / "EDITING" / "EDITION" =
Alters images in complex algorithms. Examples: "crawl"; makes
colors or shapes compatible; "cut & paste".
-Edit modes: "Cut & Paste" (sw, algorithmic function); % any
change in function or effect can be controlled by u (user) / "crawler" I
other non-user controlled modes. "Multi-colorer".
-D: U (artist) -> "mouse" -> c ("edit") -> image output.
=
*  5A120 Camera "Editor": Take photographs which you can then
edit on the related "C" system.
-camera takes a picture which is shown on "C" system. This gives
spark to the artist (studies show a majority of "semi-artists" 
are more inspired when they have such a scene to work with - it
is more difficult to create art from nothing)
-  add animated characters (user can find it easier to create them
if they choose from 1. existing characters, 2. faces, bodies,
hair colors, etc then "stick and paste" on "C". Characters can
even be moving.
-characters can communicate in written or "osc" form
7.96
+  "Visual analyzer":
+-  Seeks and alters "designated" images: seeks designated images
/  aspects thereof -> they are altered ("edited") as designated ->
output: altered image(s).
--seeks "images" via: "camera"; "db" of "images" (in m / c).
-Camera's images are alterable as in "Guide": 5A1 10 Master
Artist.
-"access": u (user) must "edit" images in "designated" manner.
Read Later D: u (user) = "edit" System - C ('computer) =
COLOR (how colors altered) b CRAWLER // GUIDE (suggests how
u may edit) // MULTI-COLORER (u may edit the pr (program) controlling how "colors" are outputted) // MULTI-USER (each u edits each other's
images (in their own fashion or via own crawler)) // SW (controls
edit).
R57 "My Magic Diary" creates drawings from preprogrammed images
to store along with phone numbers. Helps user remember people.
[Casio, PS ('positioning system) 10.93]
-OTD:
ACCESS**:; BA;
CAMERA:(take digital picture of targeted person, and insert with
"k" info about person); CART*:(database; sw); COMPOSITION **:(vocalized recording: user's info/music matching each person);
ENTERTAIN:; K:; MFH:(uip->behavioral analyzer);
MORNING:((at alarm time) see pictures/images of people/events/etc
(for things to do for that day; can be part of massive training
program for many people); MULTI-USER*:; NOTIFIER:(alarm
calendar: functions like "morning" at other times too); OSC:;
PR:; PRINTER*:; PS ('positioning system) (see R58-10); Q*:; S:; SCORE:(# times user contacted such person; tds); SYNTH:; TEL:(tr;
automatically dials tel number (when user places system by tel's
receiver / system connected to tel via tr (wire))); UIP*:;
WA:.
R57-1 Facial Image Generator: User selects adjective words to
alter type face on software. Merges multiple characteristics.
Characteristic selection process requires less screen space.
Example, user selects: nose (big); hair (blond); sense of humor;
fat; intelligent; intern creating single preprogrammed image
including all factors. u (user) saved from having to see all possible
facial choices first. From Casio: "My Magic Diary" creates
drawings from limited preprogrammed images to store along with
phone numbers. Helps user remember people.
-facial images can be generated in connection to any type of
image / information.
-ARTIST:(user's keying in their view of person's uip (personality
traits) effects facial images createdA: cut and pasteable
elements effected; entire face can alter; eg: user says devilish->the first choices for eyes are narrow / strange ones; or sloppy/poor hygiene->slightly messy appearance (hair, clothing)).
-characteristics to use for behavioral selection listed in
personal ads (seeking lovers), as found in newspapers world-wide,
eg: height (tall, short), face shape (long, wide...), eyes
(big...), dishonest, devilish, body build type, age, thickness of
eyebrows or nose or lips or biceps...
-D: K ('keyboard) = SW ('software) menu = selected choices merged = displays image (face)
=  image merged with: tel / address / written description of
person / notes / *uip / *access
-utilizes 57-2
-D: This N (invention) Sys (facial image generator) =
ACCESS / ANALYZER / ARTIST / BVA ((t) voice -> bva = this n
draws face (typical possible images from such voices, also
utilizes any uip available, eg: via caller ID) = uip/m)/ C /
CAMERA (stores -> converts images (when behavior of person (is
expected to change))/ CART (how alter images)/ CLAP (control
sys)/ S / EDUC (learn relationship between facial images with
behavior types: studies confirm relationships, though this is not
politically correct, eg: people who are overweight, or slur their
words are less likely to control themselves)/ M (database of 
potential images matched with all available information on
targeted person, uip)/ MIC (voice analyzer)/ MQ / MULTI-USER
/  NOTIFIER (when trouble is expected (from person being
watched/studied), eg: they look like they are about to act in
desirable/undesirable manner. uip = nr)/ osc ('outgoing sound communicator) / PR (artist)/ Q (menu of choices, how to use)/ R ('remote control) / SCORE (likelihood images generated (more by sys than u) are correct, based on
database/analyzer (of past experience related systems had with
such trials and errors, and as studied, concluded upon, then
inputted into c (by humans/c))/ *SENSOR / SOUND ANALYZER (t,
mic).
-type face generated= corresponds w/ "designated" subject matter
or "mood".
6B 180 Photo Paints: draw onto pictures (color or black and
white) with colors of your choice. Do while camera is in still
motion, then with mouse or pen draw and or move around pieces.
Involves taking of picture before and or after (memory required)
-developed pictures can receive wanted colors by applying special
inks right on top of special or standard prints.
-developed pictures entered into computer ("C") for future
editing
-add color onto black and white photos
-replace all of certain colors with desired color
-SW version of: Correction Tape Dispenser: can be typed /
written on. "Cut & Paste" on the tape.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; p.9]
-"Restricter": some "images" are pr (program) to be (fully) "editable"
while others aren't (at all).
-"Edition" = image after having been "edited".
End "Edit" = "Artist"
EDUCATE= 
Guides users to draw better.
*  3E061 Motion Tutor: Guides users to improve their drawing movements, eg: guides how their arms move.
+  "GUIDE" / "GUIDANCE" = Art Instructor. Suggests how user might proceed in generating "images". Useful for large sector of population.
Fill in colors in designated locations. System guides / prompts u for when / how (w5) they can create art.
Subset of: "Educ".
-Answer's user's "Questions", so u (user) may better achieve "designated" desires.
Instructs u (user) how to learn use of each "artist" system element.
Read Later (D) Drawing: U = This "Artist"="Guide" - C = COLOR (color choices / how colors are "edited") b CRAWLER (how its controlled within crawler's limitations or temperament) // DRAW (how to draw (within "designated" desires)) // EDIT (how utilize edit) ! MULTI-COLORER // MULTI-USER / SW (controls "guide") // WRITING INSTRUMENT.
=
5A 110 Master Artist: make master pieces similar to masterpieces. Select painting desired, and electronic device
will help guide user in any one of many methods. Incorporate different parts via selections and or drawing.
Guiding methods:
.-outlines each color area, remaining left blank, allowing user
to ad their color choice(s) and different shades. User might
select from suggested choices, the first choice made then influences the option available subsequently (color coordination) -outline drawer: when making the outlines, the mouse or joystick is completely restricted, or gets a bit more difficult to
maneuver when it goes a bit far off required lines - hence guides artist. And or, a light goes on showing level at which they are on course, eg a green and red light, and maybe even a yellow
light. "C" or user may designate which lines they are attempting
to draw so "C" knows how to help guide it
-abstract art and related: make wild brush marks, and only those
that fall within the programmed parameters make it into the art
piece. Eg: ink is like metallic powder which only sticks to
where the magnetic areas are found
.  Guidance: tgh, educ.
S"Restricter": "Guides" u (user) with restricter. Form of difficulty
in maneuvering is one form of guidance.
.  Technical: artist can see their creations directly being made
onto screen or paper. Later printer might transfer screen image
to printer. Prints in color; black and white (with different
shades of black)
-H-Non Electronic version: mechanical device might guide the pen/brush/pencil/etc. w/ or without artist's hand actually being used at time. Artist selects colors. Writing instrument can be
stable while paper moves, or visa versa
-"tilt": controls sys' functions, its r = paint brush.
-Filling in colors (for "Crawler"): "Coordinator".
--develops/colors (preexisting) shapes (as in filling up a
coloring book): 2D / 3D / circles / squares / dots / balls /
prisms / dots -> changing into 2D or 3D images.
--5A110 Master Artist:
+  UIP = "Guide": sys (system) suggests forms of art generation. Sys knows UIP data via: "va" past "images" u created; menu of preferences chosen by u: "image" types ("colors", shapes,
*sizes, type "coordination" (compatibility).
--.  D: "Image" output = C ("Guide" / UIP-"analyzer"-"va" / asks
U Q / u's art generation "ba") =
"COORDINATOR" b "CRAWLER" // "CRAWLER'S VIRUS" // "CUT & PASTE" // "DESIGNATOR" // "DRAW" // "EDIT" //
"GUIDE" // "IMAGE" // "MULTI-COLORER" // "MULTI-USER" // "SW" // "SYNERGY" // "WRITING INSTRUMENT".
.  Hurdles to gain "access".
-Sys teaches u (user) how to develop / use password (images).
-Hacker "reaction": upon sys (system) "analyzing" presence of hacker, it will (suggest) a "guidance" tutorial that gives (partially)
correct / incorrect information to trick hacker.
Art Instructor: "coordinator" = good art / "images".
-see KN's: Music instructor %; + Dyslexia's Writing Instructor;
+  "Educ".
"IMAGE" = Picture and or its colors.
Graphic(s); something drawn (by u); % sw icon; line(s) / dots!
other graphic fragments ((made to) compris(ing) more complex
image). Images can be made "interactive" for touch screens.
Chief definition excludes text, but can be made to include text depending on embodiment of invention.
-Comprised of "colors" / shapes that can be= "edited".
*  Read Later D: u (user) = "image" - C ('computer) =
COLOR b CRAWLER // DRAW // EDIT // GUIDE //
MULTI-COLORER // MULTI-USER // SW (forms/stores/edits images) ! WRITING INSTRUMENT.
"INTERACTIVE IMAGES" =
+  "Interactive" "Images" for computers or interactive screens: u
/  sys can create "interactive" touch screens w/ its needed
"images". Generated images (icons) have functions triggered
according to how they are touched / activated. Interactive
images can be made for and utilized by any KN's S, and control "designated" functions. For ID-010 Adaptive Design System.
Each "interactive"="image" is like a key or key stroke w/in "K"
or "R". Design and or control any product's functions by pr
interactive image's functions / image (how it looks and feels).
Programming interactive images simplified: Process becomes more of an "entertaining" designing process. u (user) (who may not be programmer) can generate interactive images by "drawing"
("cutting & pasting" subset images= representing features (parts) of entire function scenario).
UIP: Menu of function options based on UIP-DB. Manner in which functions are carried out effected by UIP-Tailor.
"NR" / "Score" / "Status" : Are built into interactive images or corresponding images. Their differing / changing values=
represented by "designated" "images".
Image types: Multi-faceted icons comprise numerous (unfoldable)
parts each being a representation. "Designated" images=
represent correlated functions. Shaped in icons or other images
commonly shown on (touch) screens= for representing: functions / directory and files (text, "image", pr) / data / web sights.
--Other images as used by: Microsoft, Lotus, IBM, Apple,
Borlund, Octel, AT&T, "Billing" (banking) institutions,
Surveillance and access control ("Access", and "Track") related
companies; "MM" companies. Other companies and research
laboratories in and or dealing with: ACCESS ; ANALYZER;
BILL; cart ('cartridge) ; EDIT; EDUC ; NR ; OSC ; pr (program)
PS-Zone; Q; R; ROUTER; SCORE; SENSOR;
SOUND ANALYZER; STATUS; TDS; T; TILT; TRACK
;  UIP; VISUAL ANALYZER; VR; WA ('walk about).
-Icons are two / three / four / five+ dimensional. "Designated"
parts can only unfold / be present (seen / functional) when icon
or part is manipulated: turned / moved (to another ps-zone w/in
sw (file)); be handled according to any ("access") W5 criteria.
"Interactive Image" Synonymous Terms:
-Icon = "interactive image" or "K" or "R". Icon / its parts tie
to= "designated" functions.
-Function = What u (user) / sys (system) desires (to happen). Functions are tied to icons.
.  Futuristic: Three dimensional "images"= move hand / instrument
to (nearly) touch the interactive image. Eg: "interact" with
front / side / back of image= each side having different "r"
characteristics. Also: for simpler "interactive" touch screens.
Applications: 
D: u (user) / "Designated" functions = ("interactive images") - C =
.  ACCESS: Need special icons: U (re-creates / needs) (uip-tailored / specially designed) interactive images. Only u knows
how to alter these icons. Icons (and non "interactive images)
can only be activated / created / "accessed" w: right hw / SW ('software) /
cart / access.
.  BILL: design icons "designated" to the billing structure / type
client /uip-client.
.  CART: u knows which cart ('cartridge) is being used by corresponding
"edited" icons. Carts can change icons / have or activate needed
icons.
+  "image" = "access'" password.
"Interactive Images" = click on image then ->:
-get definition / explanations / answers to "Questions" /
"Educational" session.
-osc states related information
-information given in "designated" language
"MERGE" =
By combining multiple elements= system integrates / syngerizes
them= creating a new "image" (barely) distinguishable from the
original elements. Elements include: "images" and or their
parts or functions.
-System "analyzes" for a compromising where the middle of a road
is taken. A type of balance between different directions, eg: if
three files are merged, it takes 33% from each, giving preference
to those elements causing the least conflict or poor
compatibility with the other two files.
*  (D) Drawing: "Artist" / Altered "Image" output = C ("Merge") =
"COORDINATOR" b "CRAWLER" / "CRAWLER'S VIRUS" / %"CUT
& PASTE" //  "DESIGNATOR" (what's designated is altered by the 
merge function / designator functions as a form of "merge"
function) / "DRAW" / "EDIT" / "GUIDE" / "IMAGE"
/  "INTERACTIVE IMAGES" / "MULTI-COLORER" / "MULTI-USER"
/ "SW" / "SYNERGY" / "WRITING INSTRUMENT".
+  "MULTI-COLORER" = Same as crawler except user controls how
crawler moves.
-U has no/minimal control over output of color/images, but u
controls where the output is made (where pen/mouse is moved).
Differs from crawler which moves on its own.
+-see "Crawler" for all its functions with potential for u (user) to
control where "writing instrument" flows its ink(s).
.  Read Later D: U = This "Artist"="Multi-colorer" - C ('computer) =
COLOR b CRAWLER // DRAW (color output = multi-colorer) //
EDIT // GUIDE // MULTI-USER // SW // WRITING
INSTRUMENT (color output = multi-colorer).
.-functions in any sw/hw "writing instrument".
.  Hurdles to gain "access". W5:
-U's Multi-color (a type "crawler") needs to function according
to "designated" criteria.
-(Nearby / Sys) observers of accessor see / "analyze" function of
u's multi-color= "react" W5 (what, where, when, why and how) u has: exceeded "access" / been determined as a hacker (due to wrong colors being emitted W5).
"MULTI-USER" = Group "interactive" art generation. Each user
"edits" each other's "images". See "game". Each party generates
own art whereby they can ad [or delete] portions of other's
"images" (simultaneously).
.  6B030 Multiple Artist: Done on same or connected computers.
-Teachers, editors, and people down the creative production line
can make future changes as well
-Done via: modem, tel ("T") (regular or cellular), etc.
-Each separate person's contribution may be tagged by: different
color, or can be separated by any user (just single person's work
might be brought up onto display ("S"), or a person's
contribution may also be separated by the time or time period in 
which it was entered. Can also be separated according to type of
item entered, eg: explain what was keyed in then have it delete
all material afterwards, etc.
.  Read Later D: u (user) = This "Artist" System - C =
COLOR b CRAWLER // DRAW // EDIT // GUIDE (guides
each u to "interact" / preserve (sections of) other's "images")
/  MULTI-COLORER // MULTI-USER / SW ('software).
+  Same sys can uip-tailor same icon for different users:
("interactive") "images" apply to all / "designated" I "multi-users". "Designated" functions of interactive images apply. Eg:
same basic icon has five variations for each u= w differing
visual representation / function. U can pr (program) icon to be so
differentiated.
.-each u's needed (image) passwords differ.
"REASONS TO DRAW" = Miscellaneous.
+  Gain "access".
+  "interactive images"
-Generate desired "images".
-"game" function (of player; to win): Creating images such as
those of characters and tools. Create those images most likely
to help player win, eg: biggest, brightest, placed in
"designated" location (ps-zone) (in relation to environment's
factors (enemy's attacking / defending points or modes).
-"educ"* (improve drawing / sw abilities);
-"tgh" (creative therapy): % "Access": correct u's "reaction"=
ba determines u= is a legitimate user.
-increase u's creativity: see Intercultural Engineering paper,
and referrals to the paper.
-make art
-"ba"
-"MM": other multimedia
-utilize for applications in: "entertainment", "osc" mixed w/
images, "tgh", other KN (invention) utilizing (changeable) "images".
*  Other: help sys' uip better understand u (user) being studied ("ba");
create needed images/designs/image of kn; % compose: designs made
are interpreted into sounds ("visual to sound converter"). (KN)
product's design: external casing; images used in its sw. 
-"Entertain" (artist playing).
-Dyslexia Software 5G061.
-Any sw's needed imaging, eg: 'User "interface"'; icons;
.  "Status": u's status= correlates w= how "images" they see= are
shown on "screen".
--Types of status "designated": length of u's usage of system;
level of "access"; subject material u (user) is viewing/"interacting" w.
--Values in showing status: shows people ("nr") who walk by u's status= such as for u's level of access; "Educ": shows
instructors their student's "status" / "scores"; motivates u to
do better= and get= better "scores" (from "educ" / "game" pr).
++--The changing image represent the status of the user. In
other words, the Image Effects U's Behavior: (Subtle)
differences in altered images influence u. Eg: they work harder
to get better images due to its scoring; u (user) is more cautious (instinctively when colors are more yellow, red or orange).
Color change = "nr". UIP influences "editing"= eliciting better "response" from U / %sys (image -> va -> "response").
-- "Access": level of u's access "scored" by type "images"
appearing (on S / stored on files after they've been accessed).
.--"VA" treats u/sys w (with) "designated" images differently. Sys can treat u differently by their status or score, but via "va" is
simply another algorithmic method.
"RESTRICTER" =
+  2D100 Movement Restricter: Writing instrument movement controlled (via magnets or pr): Different levels of resistance
and ease in drawing can facilitate creative inspiration for
abstract art.
-D: pen (magnet) = writing surface = magnets (below surface)
-crawler virus infects writing instrument: 'crawler's' virus=
having "accessed"= writing instrument= effects how instrument alters/creates images. The crawler / its virus function like the
magnets in effecting how writing instruments moves / writes /
functions in other aspects.
+  When (W5) pen movement ability changed: u (user) (in "game") goes up a hill or other difficult terrain; tds: time is running out;
battery running out; "game": player was weakened by opponent; ("nr" for) "c" or sys (system) slowing down; type text or pr or color or image or UIP related material; "drawing" "designated" types of art such as one's signature may require a one to one ratio.
--when multiple factors influencing movement occur (simultaneously) pen controlled by: averaged power, lowest or highest influencing factor(s).
+  Type effects: like "multi-colorer"= pen's movement's
"reaction"= has (unpredictable) resulting ("images"). U can pr
the preferred ratio between movement and interpretation. Different "colors" emitted according to: the interpretation ratio
/  w5.
.-sw / hardware (mechanical / el) versions (unattached to pc
"c").
.  Construction of writing instrument: "Mouse": the ball's
stickiness changes (by break touching ball w differing degrees of pressure (like car's breaks).
-physical movement by user is altered according to program. -different pens (operable simultaneously ("multi-user")) have movement interpreted differently.
-ratio between physical movement of pen w (with) how its interpreted: ratio between (u's) moving pen= w how it translates on S has algorithm.
.--Eg: standard can be move Icm and S interprets at Imm movement, while slow down can have 1cm physical movement and .2mm S movement, or pen can be empowered to show on S as moving Imm to 2cm.
p+ 4J050 Mouse Restricter:
Ease in moving mouse is restricted as a guidance system. Mouse's movements are harder to maneuver when it enters into undesirable area.
.  Hurdles to gain "access". W5 "Restricter" (can) function: -Passwords may alter how "restricter" "restricts"= (changing what can be accessed W5).
-Results / function of "restricter" determine W5 can be
"accessed". 
"STATUS" =
+  "Edition" shows status of situation: type subject matter / nr
/  "routing" shown by how images are "edited". Value: requires
less text explanation cluttering screen. See: IMI's "Score",
"Status".
.  Examples of what "editions" represent:
-amount of shadow shows how much additional information in db is
available on the "interactive image"; color shows subject;
multiple colors like blue and green or blue-green (mixed) show a
combination of status' eg: subjects.
-direction of shadow can show on which side or area (of s) u (user) can
find: applicable information, icons, files.
-possible functions of "interactive image".
.  "Status" (D) Drawing: "Artist" / "Image" output / "Status" (of "artist"
feature / how icon interpreted by (u)) = C =
"COORDINATOR" b "CRAWLER" // "CRAWLER'S VIRUS" // "CUT
& PASTE" // "DESIGNATOR" // "DRAW" // "EDIT" //
"GUIDE" // "IMAGE" // "INTERACTIVE IMAGES" // "MULTI-COLORER" // "MULTI-USER" // "SW" // "SYNERGY"!!
"WRITING INSTRUMENT".
"Status" D: U = / "Screen" / "status" (Anything that can be
"designated" by these functions can have a corresponding
"edition"; W5 part is being used)- C ('computer) =
ACCESS (W5 is accessing); ANALYZER; BILL (if function is
being billed and at what rate (w5)); CART (which cart is used);
EDIT; EDUC (what information can be learned (*W5)); MULTI-USER (who's using system W5); + NR (what needs attention w5);
OSC* ; pr (program) (w5 can be programmed); PS-Zone ; Q ; R ('remote control);
ROUTER; +SCORE; SENSOR; SOUND ANALYZER; STATUS
;  TDS; T; TILT; TRACK; UIP; VISUAL
ANALYZER;  VR. 
"SW" = ("Artist") software; program.
"sw"; "pr"; "cart"; "editing" program; %'crawl'; % 'crawler's'
virus; %multi-colorer.
.  Read Later D: u (user) = C ('computer) = SW Controls / "Guides" =
COLOR b CRAWLER // DRAW // EDIT // GUIDE //
MULTI-COLORER // MULTI-USER / SW ('software) / WRITING INSTRUMENT.
-"designated" "sw" = "cart" / "access".
"SYNERGY" =
Synergistic effects of "Artist" parts:
Multiple parts can work together to create results different from
what would be created had they functioned (more) alone. Eg:
Writing instruments:
-Movement Restricter. Restricts: (automatic) edit mode by:
slowing down / reducing available editable options, eg:
"coordinator", "crawler", "cut & paste".
-Multi-colorer: W5 (what, where, when, why and how) u (user) "cuts & pastes" determines resulting "color" / how images are "coordinated".
-Crawler: "cuts & pastes" / "coordinates" along its wake.
-Color sticks: insert into any writing instrument or edit mode.
Stick becomes primary or secondary... color (in color
coordination schemes). Effects colors in newly created "cut &
pasted" images.
*  Bouncy: controls how edit functions.
-"synergy" = "access"
"TILT" = See "Writing Instrument".
Each angle of "tilt" correlates w (with) associated functions: type
color; thickness or darkness of color.
"USER" = Artist; drawer; user; tilt = "writing instrument".
%  person being effected/shown created images; % u being analyzed
by "ba"; % u (user) trying to gain "access"; % observer (of images
(being created)).
-see "tilt" = "access".
+  Magic pen: KN. Can "draw" while in bed, bathtub, etc.
+--shocks from moving automobile are not transferred to "writing
instrument" / "mouse"= "sensors" judge "vibration" level from 
outside sys= and compensate when interpreting / "sensing" how
"writing instrument" is "drawn".
"VISUAL ANALYZER" =
(With the absence of correlated codes) "VA" analyzes "images"
(created by "artist")= and "reacts" as "designated".
-Values: can save the need to write / generate additional codes
(for what color is / stands for) - this saves human labor time in
entering or creating the information, and space on computer,
assuming the "image" / "color" are already there anyway.
+-Patentability issues: when color or images represent
something= the VA ('visual analyzer) is another (though less efficient) way of sys' knowing / tabulating ("artist's generations) wo the codes.
+--"Access": Additionally this may serve as an "access"
hinderance for hackers wo the codes nor "designated" "va". A new
way to store c data.
--suggests what subjects are missing via "va": subjects labeled
by "images".
-see "VA" = "Access"
"WRITING INSTRUMENT" = Mouse, stylus, "tilt".
"Mouse"; "R"; (El) pen or brush; "Computer's" cursor; %
"Crawler"; "Tilt".
=
5A130 Color Sticks For Computer Drawing Pad: Simplifies "C"
graphics system for children. Child inserts plastic piece for
the desired color.
-Insert one of many colored crayon shaped plastic pieces
activating the desired color.
-select the color stick you want, insert a third of the way into
the slot, and move around this joy stick to create the shapes you
want. For a different color, select another fun stick!
*-use many colors in your picture
*-can print out pictures
*-base of device has other programmable functions
-design with joy stick also [joy stick might take color
"inserts"]
--system  identifies the type stick via: small differences in 
shape at the connection point; or light, electrical, etc
frequency emitted at the time it is plugged in.
O-one stick might have ability to create several or all colors.
the color selector might be from a key board, or switches on the
joy stick. This is simpler, yet maybe removed from the saleable
idea of one color has one stick.
-OTD: "S"; "C"; pp; mp; uk; mouse; interactive%; educ; toy;
basic; entertain; exercise of creative skills; portable; sst;
printer; "M"; bp; sp; alerter; osc; egh; score; tgh; md; cart
(colors, graphic possibilities, how movements can be interpreted
and altered, etc); cp; uq; pi%; character; clap.
%-"Tilt": differing parts mentioned can also act like a r
-"cart": item one might insert for getting additional colors /
"artist" functions.
.  Manual version of "Writing Instrument" (for "Crawler"):
-the ink flow-through parts of device can be: switched /
replaced. This helps if a pure alternative color is wanted
quickly; wear and tear; for cleaning...
-this has both mechanical and or electronic versions
Read Later (D) Drawing: U = "writing instrument" - C =
COLOR b CRAWLER // DRAW // EDIT // GUIDE //
MULTI-COLORER // MULTI-USER / SW.
=
.  Ink flow for sw / manual versions:
+  ink (looks like it) flows out through one/multiple sources (simultaneously). Changes in color happens (gradually).
+  ink flows out through (one) source. Changes in color can
happen gradually/abruptly. Point of flowing out on SW ('software) version is represented by an image: cursor / pen / brush / spray
(can/nozzle) / finger / *tail / computer mouse [fully depicted on
s] / (rolling) ball / animated character (from its writing
instrument)
-*  can have two or more ink heads working simultaneously, each
with own or separate "brain" that decides when and how colors
change. This allows creating of interesting rainbows. Colors
can change at same or different times.
--each  side of pen has different color at one time 
-can have image of two or more ink heads working simultaneously, each with own or separate "brain" that decides when and how colors change. This allows creating of interesting rainbows. Colors can change at same or different times.
=
+3C-290 Bouncy:
How object is played with triggers corresponding signals. Multiple "sensors" are activatable simultaneously according to the extent of pressure and or area(s) of object were manipulated. -How manipulated: Roll it. Buttons / Joystick ("Tilt"): press or rotate or bend or twist. All these actions trigger art
creation. In multiple shapes and sizes, eg: ball, rectangular prism, cube. Squeeze or twist: triggering signals according to what tiny "sensor(s)" where simultaneously activated (under the cushioning. Drop or throw: different levels of impact create corresponding signals.
-Interpretation of manipulations: Differing (simultaneous)
signal generations W5= corresponding result. Consecutive triggering of (same) sensors such as via bouncing can have differing effects (from subsequent near time triggers).
-SW Versions: Bouncy object is on s= u (user) manipulates it= w "writing instrument".
--(standard) mouse: activates bouncy to behave (automatically) upon u triggering desired behavior's icon. Bouncy can function like a "crawler".
-"Game": move character by manipulating bouncy (shaped as doll). -Patentability issues: Similar to: "VR", remote control of robots. Maybe applications and unique signal creating modes are the patentability issues.
-like a puppet bouncy can be used to control any "R" listed control function. Examples: move a 3D doll.
.-Device transmits via wire or air waves
-Insert different items, eg: plastic sticks, and move about when inserted.
-D: Manipulate any object's "sensors"= in any way= and its resulting signals= are interpreted as "designated".
.-related to 5A-130; reference to this KN made in "R".
(related description probably included earlier).
.--According to type item inserted, different graphics created.
Receiving device identifies the inserted items by their: bar
codes, "C" magnetic tape, shape... People can buy such
additional pieces separately from the main unit.
--Insertions might also have software inside it, or come with a separate software disk insertible into main unit
.-Ap: graphics generation, toy, acts also as standard "C" mouse; paper weight; decorative piece; can be in shape of interesting objects: doll, animal, creative machine, car, plane...
-OTD: new type of Rubics cube; game; is "R" control device which also activates other household appliances and entertainment systems; "R"; "S"; "C"; pp; mp; uk; mouse; date; tds;
interactive; educ; toy; all; game; entertainment; portable;
printer; "M"; can be a small "C" by itself, with own "S"; bp;
osc; vc; score; tgh; egh; md; cart; cp; uq; mq; access (for the
fun of it); uip; character.
%  3C-310-083009 Disk Art:
Spinning disk lets user dab on colors to create wonderful art
color shows.
-Done manually with real ink
-on "C" using mouse to dab the color.
--can also have spinning object (two or three dimensional) that
get ink as they spin around. The three dimensional objects might also spin on their own access - like planets in universe.
--can have all (non spinning) types of movements creating colors -computer version lets people merge colors too...
OTD: "S"; "C"; mp; pp; mouse; toy; printer; "M"; score; egh; character.
-sw version.
-disk can start and stop at pr (program) times/speeds= enabling u to dab paint= so there's less than complete circle painted (like
dashes).
-'crawler' stays motionless altering image on disk= while disk= moves.
=
*  R39- 10 Finger Art: press fingers along screen to generate
desired effect (images; commands (touch control screen): certain sections of screen can be for commands, other sections for other purposes: "s", touching to create images, etc)
-bring up past images, then edit/alter via standard graphic
modes^: cut and paste; in/decrease size(s)
-D: user = touches/keys in = s = c = printer/*osc/desired
function
-OTD:
ARTIST:; CAMERA:; CART*:; COMPOSITION * ENTERTAIN:; K:(r*); MFH:; MORNING**:; MULTI-USER*:;
NOTIFIER:; OSC:; PR:; PRINTER*:; PS:; Q*:;
S:; SCORE:(tds); SYNTH:; TEL:(tr); UIP*:; WA:.
-SW version of: Revolving Receptacle: holds everything, eg:
pens. U clicks= via "mouse"= desired writing instrument /
"editing" mode.
[Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601 Int'l Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; p. 9]
.  Hurdles to gain "access". W5 "Writing instrument" (can)
function = "access".
Additional ways to play artist:
-"Restricter": electric cord of actual 3D tool can be
represented by how far tool can reach around on S (as
"designated" / so as not to negatively effect certain (important) elements. Tools wo cords are more mobile / w (with) fewer "restrictions".
+  Vacuums / Fans: Clean up unwanted (loose lying) scraps / elements w= vacuums. p77, 63. Especially for sub-images that aren't firmly fixed w/in larger image. Eg: va determines that
loose leaves or paper or dirt on lawn can be blown away or sucked up wo damaging rest of image, and results in rest of (lawn) below becoming visible. (Then sucked up images can be: collected / "merged" for "cutting & pasting" elsewhere.
+  wheel barrow / pick up trucks = "cut and paste" (taking and dumping)= then u (user) must "edit" from there in more careful manner. p68. Paths traveled may leave interesting marks / "trackable"
mark so u knows what was "cut & pasted" W5 (by age of track
marks). 
-textile clothing / helmets (worn by "character" = *"game")
protects them from: colors / "images" / "crawlers" (going astray
(hence lose fewer points)).
-heaters: makes (semi) frozen "images" / "crawlers" more mobile
/  functional (up to its full ("access") abilities). p77
-screws / nails: the stronger the longer / W5 images are "*cut &
+pastable".
-concrete mixers: pour into (3D) molds created previously by U=
making new "images". p79
-thermometers: shows "status" / "score" of images. p83
-tape measures / calculators: size of images (for
"coordinator"). p83
-(metal) detectors = va's seeker: seeks "designated" images.
-engines: power of tool associated w (with) type engine used. p88
+  Brush: "sensors"= on image input tablet (kn)= s brush strokes.
%  Also: brush may have material (chemicals / electro charging
elements / small hard objects / tough bristles / wire) whose
presence is more readily sensed by "sensor".
File: Art \ Ar-Write
ART-WRITE PART:
Software for teaching dyslexics and young writers how to write.
.  Image input writing tablet:
-What user writes is represented on the "screen" after it was quickly "edited".
-in other words: as u writes certain letters= ocr (optical character recognition) automatically "edits" "designated" characters. Enables writer to better read their material / see how dyslexics will read their material.
+  Writing instructor:
Teaches people to write correctly. Alerts for dyslexic or poor handwriting. Saves from having to pay teachers to read material for corrections.
.-D: u (user) = "writing instrument" (stylus = image input tablet) = VA ('visual analyzer) (optical character recognition) / "guide" = nr: whenever u (user) writes a non-standard letter, word, %phrase.
-D: "Artist" / "Image" output = C ('computer) ("Visual Analyzer"/Optical character recognition / Dyslexic sw) = + "COORDINATOR" (compares past w= present (written/read) errors -> UIP-Tailor / "guide") b "DESIGNATOR" // "DRAW" (writing "images") // "EDIT" (what's written= is "edited") // "IMAGE" // "INTERACTIVE IMAGES" b %"MULTI-COLORER" // "MULTI-USER" (has different "educ" program) / "SW" // "WRITING INSTRUMENT".
-UIP-Tailor: System tailors itself in teaching student to write according to their poor abilities. In other words: this system "visually analyzes" student's errors= then develops UIP-DB= for UIP-Tailor, so SW ('software) tailors itself to user.
-BA: handwriting "analyzer": [KN from A, B or C Dir] -> gives behavioral prognosis (possibly related to reading/writing problems).
-Type handwriting taught in any language. For learning: non-dyslexic writing; good calligraphy;
-See: + "Artist's" "Guide", "Artist's" "Restrictor".
.  Other troubles sw teaches:
.-left hand writers who need to make their writing look as if it were from the right hand.
+  NR: Software shows how letters should have been written by superimposing the correct form in an alternative color over what was written.
--In other words: How sys (shows needed) correct(sions): in a different color= sys semi super imposes where the pen should have gone= while showing what was "drawn".
.-poor handwriting style defined as: if u presses too hard or too lightly (in uneven manner) = nr W5 (what, where, when, why and how) was done incorrectly; written letters too big/small/unevenly written; illegible (though VA ('visual analyzer) might be able to read); too quickly written (hence illegible).
-NR prompts slow writers / readers to go faster. "Score" beeps when u (user) is too slow. Rewards user when their writing is good via positive "mood" in forms of: osc, text.
US Patent Search Strategies:
-str: (software* or program*) and (teach* or educat* or learn* or instruct*) and (write* or writing* or draw* or paint*).
*US Patents: 4138719 4972496 5365598
-5486122  Autonomous wearable computing device and method of artistic expression using "game": Educational devices using process-oriented educational methods are disclosed to prepare children for 'interactive/'adaptive keyboarding. The device includes sets of gloves and indicia applied to fingers of gloves to provide pictorial representations of the keyboard.
File: Art \ Ar-Cause
PART: ART - CAUSE
What Is "Designated" As Needing "Editing" & Why:
Miscellaneous things that are "edited": 
+  Numbering: Some numbers dyslexics may have trouble with: number (digits, eg: 3 versus 8, 2 versus 7, 6 versus 9, 5 versus 6, 1 versus 11. .--Eg: left portion of 8 would be bolder than right side, and likewised for bottom of 2, and bottom left of 6; the digits of 11 would be seperated a bit more than usual and maybe each digit is made to look slightly different. Commas might be boldened, coupled with greater spacing between each set of three digits. -Time pieces: clock's time face: digital or dial [mark shows/reminds u, which side is right and left, * which top and bottom], numbers are "edited", or not used at all.
--Other alterations: shapes of face or dial; their colors or textures. Make easy for children and dyslexics and sight impared. Each hour can have different shade in background. See KN's smell clock in 5J.
+  Color blind: helps teach color blind people to better identify between colors. Examples: text versus background colors are those giving reader difficulty; "games"/exercises test/remind u that red lights at stop lights are above the yellow, with green on the bottom; street stop signs are shown in colors other than red, so as to be more effected by their shape, and common locations on corners.
--degrees of shaded differences (as experienced by color blind subject) are altered (over time).
UIP [User Information Programming]: System identifies what needs 'altering after having "analyzed" user's previous behavior pattern, such as their errors on computer. This is an example of what portions of software that may be too difficult to develop for its earlier release versions.
-"Edit" / "Route" locates certain terms of special interest to user based on UIP = intern sys will highlight such chapters (w/in text's menu) / paragraphs / sentences / words / letters / image(s).
-system decides (based on uip) which words are important for u, eg: "cherry tree" is marked in cherry red while remaining text is all one other single color (white, or grey, etc.), because reader operates an orchard or likes cherries.
+  User selects words they need help with: U develops file(s) comprised of text they have special problems with (above and beyond how their sw handles images). Eg: common word processing sw has ability for u to include new words for their spell checker, but this file is used as a seeker= then edits.
"Education": Difficult images are used more frequently= giving reader more training and experience. Via sw's thesaurus= words are replaced with other similar words (even if it can be slightly awkward). Alternatively, difficult images are replaced with easier images (if user is being over whelmed).
"Designating" which words need "editing":
System decides what needs altering to help each user according to their own problems. Software searches for designated letters/words (according to UIP / PP), then alters targeted "images" accordingly.
-UIP: if system determines u is making certain mistakes it will "edit" "images" as "designated".
--  Examples for how sys determines u's difficulties / "score": sw's spell check shows they incorrectly replace certain letters such as <Better> becomes <Detter> (when they type = K); UIP questionnaire / sw test: determines type problems U has.
-. Speed reading sw (KN) shows reader is slower at certain points which are what are (already "designated" as likely dyslexic) problems.
-Possibly all difficult letters throughout text may not get edited to ease the dyslexic's reading ability. Only elements highlighted for whatever reason have chance of getting additional contrasting / highlighting for the dyslexic.
END MAIN PART OF ART-CAUSE
File: Art \ Ar-Crawl
ART'S "CRAWLER" FEATURE
+  <4, 4, 4, 3 $(if hw n)> AR5-1C310 Software Multi-colorer:
Device decides when to change color. Multiple triggers cause the automatic color changes. Screen color changes can also signify status of situation, eg: level of access' security clearance. One's "entertainment" abilities change according to external criteria: game's characters; "composing"; "tgh".
-In pen or "artist" software versions.
+  Causes: Externally generated causes for color changing:
-"Score": U's "score" correlates w color mode. Type scores: "game"; grade given to their (previous) "educ" examination.
--U's score color enables other players to know U's "status" which can include additional powers / "game's" character's abilities. Game characters of differing colors can gain or lose a notch in their color hierarchy if they are able to touch each other, eg: lower color gains a notch while higher drops a notch or dies.
-"Access": u's access status correlates w color (on "s"). -whether u is a customer / employee / vendor / student. Their level of value: height in organization / volumes sold or bought.
-Punishment: sys punishes hackers by changing color accordingly for designated time thereafter hacker's computer is turned on. % Also applies to c of hacker in distant location. Poor "scores".
-Danger levels: eg: yellow is more used when u is dealing w dangerous (u's location w/in "c" is where chemical / research accidents are more prone); sensitivity of information (level of secrets have corresponding color codes). -Subject matter: of db; type sw utilized.
-D: U = This N Sys (causes for color changing) - C =
ACCESS () / EDIT (type editing mode used by u/sys) b NR (type of nr = type color shown) // PS-Zone (zone of applicable people/elements) // *Q (type q u asks) // R (whether r is or isn't being used / of if activated) // ROUTER (how something is being routed) // SCORE () / STATUS () / TDS (timing of occurrence results in corresponding color) // T (whether "T" is/was used: if info was obtained from internet) // TRACK (type activity of tracked person/object/element/process) // UIP (whether activated or not / if uip was used to achieve current scenario (q, information). 'Customizes the 'artistic features.).
-user programs or manufacturer programs the time interval between each color (interval can be in: writing time, time ink is sticking out ready to be used, amount of ink used, etc.); or decided by random (with a minimum and maximum period for each color)
-time pr (date): user programs or manufacturer programs the time interval between each color (interval can be in: writing time, time ink is sticking out ready to be used, amount of ink used, etc.); or decided by random (with a minimum and maximum period for each color)
.  Subject matter: different types of information / db / functions have corresponding colors. Quickly lets u and onlookers know that general nature of subject matter. "S" can have multiple colors, each section/color designating differing subject.
-identity of communicator: person / company / department / country / male or female / age / level of seniority or influence or value.
-suggestions for u: System "analyzes" possible interest (uip) for u to "route" himself into other subject matter, eg: additional ideas that are related to what u is working on; u should type more quickly (see KN: u's typing speed "analyzer" and= "nr"); time left for user to use system ("tds").
-know the day / time of day by the color.
-"game": winning/losing points results in changing of abilities/colors.
Effect (color) changes have / (Color) changes signify:
.  "Game": Functions change.
characters' weapons / weapons' type emissions change color and function accordingly. Each play / their character needs to adjust to the changes (quickly), requiring agility. Player can has one or more characters. Examples: 1] Attacking Mode: red bullets kill then-> bullets change to blue and can only name other players -> requiring shooters to change their shooting and overall play/movement/offensive/defensive patterns accordingly; each player may have differing colors, changing at different times. If color changes occur wo prompting, player might avoid being far from defensive cover while they're in offensive (red bullet) mode.
-other attacking modes onto other characters/players: (temporarily): immobilizing others; changing their allegiances to attacker; activating (booby) traps; activating dormant attackers helping player.
2]  PS-Zone - type barriers change: what it protects against; changing distance attacker needs to be from target to attack; location of barriers; buffer surrounding character where ever it is (though buffer might not be effective in designated zones (ps-zones). (Attacking) powers of characters change in designated zones. Color of zone can change. Character or their weapons change color resulting in= effect each zone has on it.
3]  Character's movement modes:
=
.  "Entertainment" D: U = This N Sys (Effect externally controlled changes have on designated functions) - C = ARTIST () b BALANCER (degree to which sounds are from left or right side) // CAMERA (direction camera is pointing) // CART (each cart has differing pr to effect changes) // COMPOSITION / DANCE = (u's ability to compose altered, eg: each k / sw icon changes its sound generating abilities) // DB-UIP = (sys brings up data as designated, eg: names of famous people; points in history of world or u; related facts) // + EDIT (u watches= sys alter images) // EXERCISE () // GAME () // MD / MOOD () // MOTION SOUNDER () // MULTI-USER * MM / MULTIMEDIA () // NOTIFIER () // OSC ( // PS () // R () // SCORE () // STATUS () // SYNTH () // TGH ( // TILT () // TOY () // UIP () // WA 0.
.  Image selector: "va"/"camera" brings up images on s for u. Images (periodically) flash up (inspiring u's creativity; giving related ideas). Examples:
-u is drawing (many) circular objects while in the "artists's" advertising idea writing sw program= then sw selects related images= eg: bubbles, balls, balloons, lady painting balls, girl in polka dotted dresses (with balls flashing)... -u drawing any images= then sys scans u's room in random fashion= showing images onto s.
"Edit". U ("interacts" w / "entertained" by) = sys alter images/sounds/(flashing) lights/other effects via:
-u/sys pulls down 'scroll' over / clicks on image= which is subsequently altered according to designated pr. -all or portions (always) changing
-how designated element(s) or portions are altered by: color; changing size of all/separate pieces/sections of screen; replacing portions; switching portions; slicing (merging slices w slicings from other images); empty gaps created (allowing u to insert images / draw within).
-synth: changes according to uip preferred synthesizing mode(s).
+  Crawlers:
-'crawler' alters image as it moves across image.
Image altering point moves about image in forms of: scrollers;
-shapes of crawlers: big/small dots/blocks/other shapes; donuts; broom type images/icons;
-how crawler moves: packmen (from late 1970's video games); falling / sliding objects/snow; toy vehicle's track marks; trucks dumping images at designated location(s); snake; any other mammal/reptile/bird/fish/insect/micro organism/other moving organism; how plant grows (excessively); shadows or prints made by anything (KN image (generator)); "tilt"; "dance"
-Influence original image has on subsequently= altered image(s): crawler extracts designated elements from original image, eg: changes circular elements to polygrams, blues to greens, dots to larger blobs, changes only shell / perimeter / center of original images.
--both crawler's function and characteristic of image feeding into crawler both independently / simultaneously / synergistically= effect altering process.
-Crawlers merging:
--one crawler can= crawl upon= another crawler resulting in:
a newly generated crawler / merging of all or some of crawler functions (to an exponential power) / canceling out of any touched/untouched crawler
--like magnets they can +tend (via fuzzy logic) to attract / repel each other (in terms of chances they'll merge / touch). Other aspects effect abilities / chances of crawlers to "interact": type pr / u's moving around sw / moving of crawler (by sys / u).
-Computer viruses: 'crawlers' crawl throughout designated pr / digital images / s, on designated computers / systems (of targeted systems). Examples:
---used in "games": attacking opponents' territories/functions/crawlers/attacking abilities/drawing abilities. Eg: a] player #1's crawler goes across / penetrates / destroys player #3's wall ("access" point) allowing player #1/#2 to more readily enter ("access") = intern doing designated damage (limited by crawler's functions). b] knock out opponent's "game's" computer system's designated functions. c] means of mobility (moving about pr / cursor): drawing / movement of crawler / speed of "game".
--- "Access": 'crawler viruses' may: crack passwords; lock out those w correct passwords by accessing and in process change password against former legitimate users
---Box holding virus: player can open pandora's box for corresponding desired virus, though virus can attack opener if opening player isn't cautious or if opener has bad luck (due to crawler's being controlled by external circumstances). Crawler might have abilities to open these pandora boxes and be negatively effected as well. ---crawler is shown in color / osc mode how virus effects target, eg: targeted computer turns red (shuts down), or turns blue (slows down / limited functioning abilities).
---crawler can also function like other existing (harmful) viruses (but in playful "game" mode). Patent search str: virus* and (imag* or pictur* or visual*) and (computer* or software* or electr*) not (blood* or cell* or organ* or medic* or liv* or life)
--Used only under legal circumstances! Use this patent application filing as additional grounds to punish malicious computer hackers!
-Crawler D: U = This N Sys (each type 'crawler' (and its variable functions) controls / is controlled by) - C = CAMERA ((panning lens) sends images to screen) b CART () / COMPOSITION () / DANCE () / EDIT () / GAME (crawler effects game functions, eg: attack modes / how player's territory designated or protected) // MOTION SOUNDER (sounding device alters according to crawler) // MULTI-USER (each u generates/receives different type crawler) // MM / MULTIMEDIA () / NOTIFIER (how it notifies) // OSC (how it sounds) // PS-Zone (each zone effected differently according to type crawler and in what mode its in) // R () / SCORE () / STATUS 0 // SYNTH () / TILT () / TOY () / UIP () // WA ().
-pen / other writing instrument: functions like 'crawler'
Was 1C-311:
"C" version: The color of commands automatically changes color without prompting. This can be fun and valuable for the artist that likes making spontaneous, abstract art. It ads a new dimension to the making of art.
.-Can develop sw images of many types (to draw), eg: ball point, felt tip, lead for mechanical pencil, chalk, pastel, certain types of existing durable paint-like brushes, etc
Misc:
-*  NR: user is notified when color changes via: a light, click of mechanical parts, or sound; or sees color change on s.
.-manual version also: too expensive since market wants lower priced unit.
.-This can be fun and valuable for the artist that likes making spontaneous, abstract art. It ads a new dimension to the making of art.
.-Can be electronic device which changes the color of ink (ball point, felt tip
--*  lead for mechanical pencil, chalk, pastel
*-certain types of existing durable paint-like brushes
-related to: 1C-311 
-*  user is notified when color changes via: a light, click of mechanical parts, or sound
.-user can also request when a color is to change
.-device uses single colors, and or blends desired colors as user selects
.  DI: SW Version D: 1 u -> 2 c (cart) = 3 sw = 4 pen / 5 altering images / printer / m / uip = 6 ink / 7 creating images.
.  D2: SW (Software=C) D2: 1C310 Software Multi-colorer =
+ACCESS ()/ +ARTIST ()/ CAMERA (c imports (and alters) images from (attached) camera / digital data of images on disk or via tr (from m/cart/sw))/ +CART (sw: imaging abilities; database of images)/ *COMPOSITION (images (created) -> converted to sounds (osc). Sounds (created/imported via tr or cart) -> converted to images. Images/sounds can be altered at any step in the flow processes.)/ DATE (tags files; date is one of the elements that influences sw's analyzer (w5 colors change (automatically)))/ S ("interactive" touch screen; c=s=sw adjusts to type s in usage, eg: better visibility)/ EDUC (increases creativity; see paper titled "Intercultural Engineering" and other material on increasing creativity; helps u loosen up (their creativity); helps user try new things / helps user feel experimental / helps user let go / lets user enjoy surprises; helps u try to control their thought process less; merging of sw/graphic modes. Creates an interesting 'transcending beyond the predictable' mode sparking creativity.)/ K (control sys/pen)/ M ((image) database)/ MIC ()/ MO ()/ MOUSE (pen)/ MQ ()/ MULTI-USER (preferred style (uip) of u lets sw better tailor to each's preferences)/ NOTIFIER (pr amount of time before color changes or other occupance happens; if quality of work may be of poor quality and or difficulty in printing out; lacks enough ink of particular color in cartridge before u: tries to print / expands image)/ OSC (nr)/ PR (artistic style, eg: u prefers water color / oil / Rembrandt / classic / collage / abstract mode(s))/ Q (help menu)/ R (pen: while in bathtub/car)/ *SCORE (quality of art = visual analyzer; for test purposes; for psychological testing or uip)/ SENSOR (level of pen's (stylus, pressure on key pad (k)) pressure)/ SOUND ANALYZER ()/ SPEECH ()/ STATUS (# images (in database/completed))/ *SYNTH ()/ TDS ()/ U (artist, observer%)/ UIP (data collection; personalization)/ VISUAL ANALYZER ()/ VR* (draw while in vr mode)/ W5 (uip; personalization of sys (uip)).
-Footnotes: display ("S"); "C"; pp; mp; uk; interactive; each color when used triggers a different sound, blended colors blend the sounds; educ; toy; all; entertainment; art exercise; portable; bp; vc; egh; score; tgh; md; cart (colors, sounds, functions...); cp; uq; character; according to type sound the color generated changes.
US Patents - 12.95 bib disk:
-str: (pen or pens or pencil*) and ink* and color*
%  US Pat: 54120215411344 5376958 5368405 5352051 5306092 3552867
-str USPTO's WWW 1977-6/96: (image* or pictur* or color*) and (software* or computer*) and (chang* or random*) and (draw* or paint* or brush* or gam*) not (data or document* or simulat*)
-Image(s) that can change color(s). All or designated parts of: drawings / "camera's" pictures / text. Sys can effect colors on all of or part of: "s", printings from "printer", data transferred to: floppy disk / another "c" or "m".
.  Writing instrument:
-width(s) changeable for: 'crawler'; what is being drawn/changed. -US Pat 5325110 Multi-control point tool for computer drawing.
.  Benefits from changing colors:
-others (co-workers) know the level of access given u, hence easier to catch hackers w excessive access.
.  The color change triggering effect also causes following occurrences:
-"OSC": diverse sounds. Different sounds connect to differing triggering factors.
+"Crawler": "Cut & pasted" element becomes a "Crawler": Alters what or W5 it touches or "interact(ed)" w. -This is one method for creating "crawlers". U selects from menu of possible crawlers= cuts & pastes= then may "edit" "crawler"= to function as desired (by u).
END - PART: ART'S "CRAWLER"
File: Art \ Ar-Educ
TEACHING PEOPLE TO READ (NEW VOCABULARIES)
File ar-educ
Software for teaching the young to read: Helps guide readers into more and more difficult text. The purpose being a gradual introduction to more complex text, saving the teacher's time. (Patent searches on application for young children not conducted.). Also see "Education", and Encapsulation, and Speed reading.
Our software scores the user's perfomance, and adjusts itself to the user's improved reading skills they've picked up by using the software. For example, it will stop accentuating certain new words the reader has learned.
+  Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house adjacents the word 'house'. Picture can be same size as (large size) text; or number next to word matches number next to picture elsewhere on screen or printed material.
-system learns number of times user has come across such words (on the sys).
.--system or human teacher allots # times of viewing text balanced with complexity of word.
-Weaning: After designated occurrences of said word / concept, pictures may no longer appear (weaning reader off assistance).
D:  (Young) reader = "Artist" / "Image" output = C ("Analyzer") = 
"COORDINATOR" () / "CUT & PASTE" () / "DESIGNATOR" () / "DRAW" ()/ "EDIT" () //+ "EDUC" // "GUIDE" () / "IMAGE" () / "INTERACTIVE IMAGES" () / "MULTI-USER" ()/ "SW" () / "SYNERGY" // "WRITING INSTRUMENT" 0.
Pat search strategy:
-kw: dictionary, word's defintion
-str: (software* or program*) and ((definition* or learn* or educat* or teach*) near9 and read*)
US Patents: Programmable question and answer device 4118876 *; 4579533 Method of teaching a subject including use of a dictionary +; 5180307 5218537 3999307
5421731 Method for teaching reading and spelling
4083120 4138719
File: Art \ Ar ReadHelp Intro
PART: ART'S READING HELP SOFTWARE
5G061 Reading Assistance Software: This file is a subset of the file titled: "Artist - Edit". <3, 3, 4-pat-sw-version, 1.5-mk, 3>
General Information:
+  New words receive special "editing" attention:
-What's designated: Sys seeks words which are "designated" according to: subject; newness (to u, field of study (new idea)); difficulty u has had in past occurrences as "analyzed" by (test's) "score"; what u or his supervisors determine he should learn / "interact" with (for more experience, "educating" himself (in its multiple uses and contexts)). What "educ" / "router" / "mood" / nr: "analyzes" needs learning / attention.
-Wean user off this editing after they've seen word designated number of times. The more characters in word / type subject determines number of times u reads it in "edited" form, w/ eye catching modes diminishing each time they've read or written it.
-However, the level of special attention can be varied, or non-existent.
-User can at any time point click on the problematic word or "encapsulated" paragraph and view corresponding picture. In such case, the sys (might) continue to show picture for such word certain # times more.
-this learning to read application is simply an example of how sys tags (UIP-db, matches) certain material (words), next "edits"/alters it accordingly. SW search and replace.
-.sw has (invisible on s) slot in which image can appear / change.
-click on image to get: osc verbalizing what picture or text represent; video program; any other system triggering one of u's five bodily senses (see kn).
+  Teaching the young to read: 
Text has applicable images next to certain words. Eg: picture for house adjacents the word 'house'. Picture can be same size as (large size) text; or number next to word matches number next to picture elsewhere on screen or printed material.
-system learns number of times user has come across such words (on the sys).
.--system or human teacher allots # times of viewing text balanced with complexity of word.
-Weaning: After designated occurrences of said word / concept, pictures may no longer appear (weaning reader off assistance).
Weaning:
Weaning User off of the reading assistance system. Like learning to bike first with training wheels, then they slowly removing the extra help.
-the accentuating modes of designated text, might be reduced over time. This reduction can apply to all / most difficult words.
-- "Designated" words w/ good "scores" showing reader doesn't have (much) trouble can be weaned more quickly. -weaning off process is controlled: automatically or by u / by guardian (doctor) or teacher or uip*.
-if user is having a bad day [difficulty reading], they can alter the degree / type of differentiation sys makes for (previously / newly) designated text / other problems.
-(In normal text) images might be boldened or underlined, herein the same can be done, with additional changes to its shadows, etc. Replaces other "editing" modes.
.  Sporadic Changes. Problematic letters are sporadically designated differently from remaining letters/words/text. Examples: every third problematic letter so handled; special handling handled via random (sw) process. -same type problem might be designated differently in different times/situations. Eg: confusions between letters b and d can be green versus red; and at other times white versus black.
-TDS: differing days problematic letters are represented in differing colors. Value: user doesn't expect difficult letters to always be so represented, eg: for reading newspaper, etc. where such 'assistance baggage' may not exist. --sys helps wean u off of the assistance sw.
-helping wean u off of this n: any difficult letters/words might simply have differing typeface or color, so there are two modes, normal appearance and second appearance which isn't different vis a vis the other difficult letters/words. Helps u to be extra careful when coming upon potential problem.
-the window size [via which text is read] can be made as small or big as desired, while any of other features can show up within this window on S. 5G060.
Exists:
Dyslexic's Software: All it does is highlight one word or sentence at a time. If reader has trouble, it will verbally (osc) announce it. Existing product called: Click-Reader from CAST for US$20.
-if word is in larger print (headline)/italics, it will read material in louder voice.
-Click-Reader: Reading template for any text and pictures. Includes customizable auditory supports for decoding, visual tracking, and organization.
-manufactured by: CAST - Center for Applied Special Technologies. 508-531-8555. 39 Cross St., Peabody, MA 01960.
.-Related patent: US Patent No 4875432: color on "score" board changes when the score is tied in (volleyball) "game".
-(The level of "score" / "status" effects the type of color change found on S / Nr of any product / sys; eg: 7G)
Software showing nature of situation simply by way it's edited, saving screen space from excessive text. -Also see the seperate file + "Artist's" "Status".
-Nature of problems represented in how images altered: type of dyslexic or young reader's problem shown by type "edition".
"Score":
-"Educ": system can have timer and or other electronic analyses for how user's reading skills are improving, eg: ability to read or write correctly; speed of reading.
-- system may force/suggest user to speed up reading / increase window size when their "score" improves. -How "scores": when u deemed (not) to have made error= sys= nr.
US Patents: Search Strategy: dyslexi*. Up to 8.96. Searched db via key word of full patent text.
Understanding user's problems.
D: "Scoring" -> UIP DB Development - UIP-Tailors SW= for reader. What's scored and (W5): "Scoring" levels / types of user's (eye / cognitive /reading) difficulties; "BA"; "educ's" "score"; "status". Related patents follow: 4556069 RE34015. 4706686 4421122 4408616 4407299 5474081 4528989 4706686 4889422 2838681 3842822 5067806 3952728
-Following are comparatively maybe less pertinent:
4216781  5048947 5331969 3893450 4030211 4735498
4102564  4211018 5260196
Teaching methods:
Ways of "editing" / helping (+dyslexic) readers: "Educ" / "EGH" / "TGH". Related US patents follow:
4379699  4979902 536093? 5336093 5543867 3906644 4007273 4764973 5114346 4123853 4090311
4770635 5366377 4354843 4643679 4747682 3955564 4007548 4708567 4961640 5328373 5451163 4940346 3828316-Character adressing in a word oriented computer system.
-Following are comparatively maybe less pertinent:
4136361  4661074 5145377 5312257 5421729 4351831 4346085 4346084 4479241 4456598 4430330 4636494 5253799 44980805315668 4021611 4089126 4498869 5360438 5302132 5387104 4592731
END MAIN PART OF ART'S READING HELP SOFTWARE 
LESS PERTINENT INFO TO UNDERSTANDING INVENTION
Introduction: Search and Replace / "Edit":
-User programs (pr) how software will make the desired alterations (nr).
-Software searches then alters particular words causing problems.
-'Editing is 'customized.
There is a plastic version of this electronic software driven invention. This plastic version can be of plastic, or its functions represented in software as well. Details:
Software/Plastic versions of Guiding window 5G060:
-Examples: see just one or more letters, words, sentences, paragraphs at a time.
-window can have clear and or changeable colored see through plastic. Certain colors backgrounds can enhance reading and or increase comfort
-certain shapes and or letters in the cut-out areas can be shown, if helpful. Eg: user has trouble differentiating between "b" and "d", so the top of cut out (blank) area has one or more "b" letters and the bottom has one or more "d" letters. User can refer to them whenever they need to better remember their distinctions.
*-construction of plastic and or cardboard. Square's window size created by adjust from one to three of the sides.
System Analyzes Reader's Speed Via:
-eyeball "analyzer": watch eye movement, each movement represents: a letter, syllable, word, word group; mathematically calculates via (triangular) configuration what eye is seeing, via its position to the shown text (s). -reader hits key as they progress by: *letter, word, sentence, paragraph*.
-user scrolls text
Patents & Patentability:
Software signal processing is the patentable issue to some degree.
-Simple version (Mechanical): placed over printed text. Can scan by hand over written text by hand or el. By hand version less patentable?
.-Pat Search: need to check the modem capabilities of devices available for assisting the partially sighted to read.
PATENT SEARCH Strategy & some related US patent numbers:
5G061 Dyslexia Software: (). Str: dyslexia* or dyslexic*
-Str APS 69' to 6.92: dyslexia or dyslexic:
--US Pat No's: +538880 Shows material little at a time? so reader moves eyes minimally.
--83'-86': + 4379699 improves reading efficiency, increases light contrast. However my invention changes color in respect of adjacent letters. Whereas the existing patent increases intensity of letters vis a vis the environment.
--+  4979902 Dyslexia reading device 1990: restricts field of vision. However this may not stop my sw version of vision restriction. 5421729 Color coded catalog and sales method %; 5420653 Method and apparatus for amelioration of visual stress and dyslexia *.
Miscellaneous:
-new sw codes are used for "edited" "images". Both the sending and receiving ends may have abbreviated forms of interpreting these differently altered "images" to speed transmission via: modem; cart.
-sw version: info given electronically: scanned / on-line / cart (floppy disks, cd) -> sw converts text -> s / printer. -Software uses simple version (5G060) too. Combine with product 5G070.
-this invention number was cut out from and a subset of 5G060, then changed to 5G061 in 7.95.
-Software version too. D: sw = c = display (desired effects and 2D (or 3D) images). Has same and more functions than the mechanical version.
Diagram of plastic version:
-DI: flat (on electronic) version:
..             1
The graphics printed onto the card is on the outer perimeter. The inner perimeter is the see thru area. The bars across the middle show a possible position at which the window is partially closed with colored opaque material (can maybe still readily read thru it). The sliding door (comes from the bottom).
-colors used in the opaque shutter / any window (1) cover; plus the colors for the outer perimeter can be chosen by psychologists/dyslexia experts/u, according to the color(s) (combinations) that show best results / preferred by u.
Second related diagram:
-D 2: ............
:b d
::1: :
:.
Notes: The diagram has big square, with smaller square within - labeled 1. 1=cut out window; letters b & d are printed onto outer (non-cut) area, above/below/to side of (reading) window.
.-Epilepsy and Parkinson's have similar symptoms to Dyslexia. Hence these products mentioned as helping any one of these problems can be applied to helping the other illnesses. Eg: via altering the way in which they focus their minds.
OTD D: This N Sys (dyslectic's sw) - C =
ACCESS ("behavior analyzer" studies (reading behavior) intern: only allows those w (dyslectic/unusual) reading style to gain access); ANALYZER (sys adjusts its modifications according to u's needs/behaviors/uip/pr); CART (reading text, sw, multi-media effects, uip, access); EDUC (improves reading, study habits, speed reading); M (text, uip, access*); MULTI-USER (each u's differing reading needs met); NOTIFIER (when reader not reading fast enough / as needed); OSC (); PR (how alter text); Q (); S (); SCORE (speed, tests memory retention of read material); SENSOR (u's reading speed); STATUS (); SYNTH (adjust osc according to: uip, behavioral analyzer, pr, text); TDS (reading speed, score); T (mo); UIP (sys studies reader's (reading) style, eg: speed, comprehension = offering better training / assistance programs (sw)); VISUAL ANALYZER (reader's eye movements).
OTD D2: This N Sys () ~ C =
ACCESS (password shows needed sw / current uip and score of u); ANALYZER (tailoring uip to how data best presented); ARTIST (); BALANCE (osc adjusts sounds according to u's uip for any type hearing problem/needed assistance, eg: sound always louder in u's left ear); CAMERA (scanner); CART (art, tutorial sw); EDUC (tgh); K (joy stick); M (uip db); MO (); MOUSE (); MQ (); MULTI-USER (); NR (); OSC (); PR (); PS (); Q (); R (); SCORE (studies level of situation (dyslectic problem, u's interest in material, marketability of material) via: asking (dyslectic) u questions to determine: memory retention, speed of reading), uses existing dyslectic / reading tests (sw)); SPEECH (); STATUS (compares u's scores over time, graphs u's improvement curve; analyzer = suggests future types of actions/sw u can use to better achieve desired aims); TDS (); U (dyslectic, general target audience of non impaired people); UIP (reading / personal (interest) habits); UQ (.
0  - System tutors artists in improving their image making:
-D: Artist = Analyzer = C = U (human artist). U draws onto C / material scanned by C / cart (of art work) / tr from other C = C = sought after parameters (as pr) are selected = compared w parameters of tutorial sw (pr) = score/analyzer = suggestions made = visual examples / written commentary / score sheet / suggested books to read (selected via matching of book's UIP w artist's uip (at that scoring time)).
-This an old KN?
-similar to music instructor, yet this is more on the visual mode.
.  Circumstances of developing this invention include: Mr. W.S., Sr. is interested in the subject and has a large electronic manufacturing plant. The SW version grew out of the hardware product version. Inventor is healthy and not dyslexic.
'Track:  u's  position in material (text) "tracked" (via sys similar to Speed Reading SW: 5G070) 
'Customize (UIP-Tailor): Sys converts text / "entertainment" / sw so its material is converted / processed according to uip. Eg: scan [digital] newspaper and be better able to read the text; get periodicals/letters from e-mail then convert; better play video "games".
%  Virtual Reality: VR: walk around and have all elements converted as wanted. "Camera" = "visual analyzer" = converts as programmed.
*  Shapes are altered. Image shape "editing-ar":
readers w difficulty seeing / *reading particular shapes, eg: polygons are "edited" into curved shapes (circles). -in event there are both readable and difficult shapes in same screen / file= sw converts only difficult shapes into ones compatible w= existing shapes.
--details in "Artist's" IMI sub-section "Edit". Within "Edit" see sub-section 'Image Coordinating SW".
OTD D: U = "Artist" - 5G061 Dyslexia SW (designated images of functions/"guide"/wording) "edited" for dyslexic) - C =
COLOR (adjusts coloring to reader's preferences) b CRAWLER () / DRAW () / EDIT () / GUIDE () / %MULTI USER () / SW () / WRITING INSTRUMENT (stylus inputted words -> optical character recognition sw -> digitizes text into letters -> "edits" as "designated").
.-text used in diverse type softwares are altered as well: word processing, spread sheets, CAD, telephony sw, sw utilized in (simple) LCD (s) for = any n/kn.
.-Following is somewhat repeated information: SW causes sections of "screen" to have greater contrast / differential (image) elements based on: uip, pr, kw. Certain words, images, words pertaining to nr are specially and automatically give special graphic attention (as in this 5G061) when special attention could be of use. Examples:
%  See "Synth" for adapting sounds for those with auditory problems. Sounds are altered in manners akin to how visual text is "edited".
What can be "Edited":
-"routing": when u moves to different file/sw sys recalls what u was last experiencing/reading (uip-db, kw) and helps save u's time by accentuating materials in next file that may match u's interest (in any manner). Examples: U was reading about eye surgery in Chicago, then opens file of telephone numbers, menus/tel #'s pertaining to eye surgery are accentuated, then those #'s in Chicago are accentuated even more (more bold or brighter lettering or are highlighted). Naturally sys doesn't know all possible interests in u, and only saves u's eye scanning time, since u may read highlighted material first thinking that has greater chance of being what he wants.
-converts certain words into other languages, eg: the Japanese are often upset that English words (written in katakana) are replacing theirs, in which case such English terms are changed to Japanese (kanji or hiragana) text. -wording showing up on "entertainment" programs: films, television, sw, "games".
-vision apparatus (electronic goggles / binoculars*): U able to read text they see in real world while: driving, walking. VR*.
-SW: text converted for programmer, while they are doing programming text. Eg: authoring language sw has their text / commands / prompts / etc. converted (for easier readability).
-anything that can be represented, eg: "status", "score", "notifier" is edited. Eg: type problem, level of seriousness. -reader's speed (speed reading sw kn). "Scores" speed.
-type text or "entertainment", eg: only certain material in "entertainment" mode is edited.
The user controls how this software works. Examples: U (user) controls the level of contrast/added on 'assistance baggage' accorded (problematic) words / text. Eg: contrast level of b versus d versus all other letters.
Other ways text appears and or is transmittable:
All written text is made available to users via e-mail, conversion of printed matter via scanner, disks. SW functions w/ special hardware or home personal computers. (Large) color monitors would help, but aren't required. Works with all languages, including Japanese, Chinese, Arabic, other European languages.
Making the same "edited" text easy or less unusual to read for non-dyslexics:
-shadows created by letters can be such that the light source for right half comes from right, and left side has own light source= resulting in right side having shadows going to left side. Letters chosen (by writer) simply need to have letters like "b" on right side (of s) and "d" on left side. Dyslexics accustomed to the shadow form of "editing" will more quickly.
Glasses or Contacts:
-same text read without eye wear by regular readers, shows up as normal text. Eye wear changes images. Allows different type readers to view same text. "Multi-user": those w differing (degrees of) problems.
-Specially colored eye contact lenses might be used for color blind / dyslexic people to help alleviate their problems. Research needed. D: contact lens = ). U = eye = ) = viewing area [altered by lens]. Or change color of: "C" "S"; eye glasses; shades over eye glasses; light bulb; colored surface surrounding the "C" "S" (since this color contrast may effect different people differently such as men who get squirmy whenever they see red or green due to their being color blind.
%  Readers may have lenses which also allow u to see fairly normally objects not on s, so u need not wear special anything just for s viewing. Unlikely to work. See eye doctor.
+  User carries something like a compass which tells them at all times which side is left which is right, however this can also be done simply by carrying a card (printed on both sides) and viable as long as reader knows what is the top and bottom of card. Some dyslexics forget their left from right sides. Use this idea w sys. Standard compass useful too.
-D: "Visual analyzer": optical character reader / some character recognition = once designated text/images are recognized (via uip-db) = then make assignment of alteration to designated text via: color / typeface / etc = CRT Display (S) / (Color) printer.
.-sw rejects repair - if character can't be read by machine - sys will highlight that text.
-System only shows user what they want to see. In other words: "visual analyzer" (only / especially) shows u images / data what u (most) wants. S = gives preference to the images to the degree their "score" is higher.
.  UIP-KW:
Certain words/letters are altered in their color in terms of:
.-what word represents, eg: word cherry is shown in red, while 'over ripe' cherry can have a darker hue. Over ripe cherries of certain varieties / from certain parts of world might have a purplish hue as well.
.-uip-analyzer determines via (color) db the appropriate color(s), sounds (osc, recorded sounds), etc = which match the letter, word, paragraph, page, chapter.
-applicable images can be inserted near the designated terms / concepts, so images are on same page or near designated words. -Designation for which terms receive images determined via: u's request (k); sw; application of program (uip).
.-Designation/selection/creation of applicable images via: "image analyzer" = "artist" = uip.
-Applications: same text / "entertainment" for differing audiences, kids/adults can be "edited" to match their uip. Images, colors, even the text itself (9G220 Channel Skipping, "editor") can be altered as well.
User / "edited" (instruction/nr) "image" output = This N Sys (dyslexic conversion sw) - C =
ACCESS (); ANALYZER (); BILL (); CART 0; EDIT (); EDUC 0; MULTI-USER ("edited" differently for each u); NR 0; OSC (); PR (); PS-Zone 0; Q (; R (); ROUTER 0; SCORE (); SENSOR (); SOUND ANALYZER 0; STATUS (); TDS (); T 0; TILT (); TRACK (); UIP (.
Additional Applications:
.  Key boards' lettering. "K". The "edited" keyboard can be via: changing the "image" on each key; the key board is represented on the "screen" (shows what and how (w5) user is typing / "drawing".
-- "Computer's" (plastic) keyboard (k) (ink) can also have their letters altered and or they might be on the "Screen". Either letters painted onto k / key pad is an interactive screen / each key has a small (LCD) screen which is programmable.
.  "Game": players have to guess which letterings are incorrectly "edited". Incorrect "editing": mirror images (as a dyslexic may interpret what they view wo assistance). "Score" according to number of times player catches mistakes in what they see.
.  Additional uses of multiple colors: Differing color(s) helps (re)train people/u who are: color blind; sight impaired; reading impaired (in some other manner); have eye sight problems; have eye to cerebral cognition difficulties (physical or psychological impairments).
.  Labeling what's important: "Artist's" = "Designator": labels what needs most attention (via va) = w a tag.
*  System reads out what user is reading.
OSC = "image": each letter read / typed makes "designated" sounds.
--Sys knows letter*/word/line/paragraph u is reading at moment. In tern, sys will read out those words (that cause reader problems via pr/uip).
-see related existing patent mentioned in this Dyslexia filing.
%  lettering in four dimension can be any one or more features in addition to the three dimensional "editing".
*  Braille: sight impaired readers suffering from some type of related confusion - those words / letters can have other factors better distinguishing themselves, eg: higher or thicker bumps or have additional bump(s) nearby specially alerting u/reader (nr).
%  Material being read can be experienced in a wide array of ways: Different letters / words / images have differing corresponding: sounds / smells / tastes / audio modes (osc, "speech").
-as reader reads / experiences material, the other modes may help user.
-just use your imagination!
Makes users more interested in reading and in computers in general.
File: Art \ Ar-Dys-Ed
PART: ART'S "EDITING" MODES
Introduction: since people with dyslexia need new ways to have the images inputted into their brain, system alters images in most effective manner according to user's preferences, or other needs. Following are only limited possible examples:
+  Letters portrayed in three dimension:
-each letter can be shown in three dimension, eg: the letter "b" has light shed on it from the left, and "d" has light shown from the right (or opposite lighting). The other form in which 3-D takes place is to show the sides of the letters, as if they were wooden blocks.
--Shadows or sides also shown from: top or bottom, or front or back, or other angles. 
.-shades or sides: can be of different colors as "designated" according to: which letters / words / type problem of reader. U can "program" how shades appear, like any other "artist" element. .--Size of shades / angle of shading can be increased / decreased for changing emphasis.