Processing

Please wait...

Settings

Settings

Goto Application

1. CA2635954 - GENIUS ADAPTIVE DESIGN

Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

[ EN ]
DEMANDE OU BREVET VOLUMINEUX LA PRESENTE PARTIE DE CETTE DEMANDE OU CE BREVET COMPREND
PLUS D'UN TOME.
CECI EST LE TOME 1 DE 5
CONTENANT LES PAGES 1 A 313 NOTE : Pour les tomes additionels, veuillez contacter le Bureau canadien des brevets JUMBO APPLICATIONS/PATENTS THIS SECTION OF THE APPLICATION/PATENT CONTAINS MORE THAN ONE
VOLUME THIS IS VOLUME 1 OF 5
CONTAINING PAGES 1 TO 313 NOTE: For additional volumes, please contact the Canadian Patent Office
NOM DU FICHIER / FILE NAME:
NOTE POUR LE TOME / VOLUME NOTE:
GENIUS ADAPTIVE DESIGN
TABLE OF CONTENTS
FOR REVOLUTIONARY PAT APPLICATION
Did This Application Show Up In Your Patent Search?
Get Updates. View New Embodimerits'. = Visit.LicenseltToday.com (+1) 707-428-5000
Be Careful Not To Miss Its Contents
APPLICATION'S FREE UPDATES: = =
INVENTIONSDIRECTORY/LicenseltToday.Com = '' '
INTERFACEPATENTAPPLICATION/LicenseltToday.Com
F E ATU RE S L I ST I NG /L i ce n s eItTo d ay. Co m
LICENSEAG REEMENT/LicenseltToday.Com
OVERVIEW/LicenseltToday.Com for this and future pat applications. Start Here.
PATEN TATTORN EY S/LicenseItToday.Co m
QUESTIONSANDANSWERS/LicenseltToday.Com
REQUESTANINVENTION/LicenseItToday.Com gives new inventions, or new variations for yours.
TRANSLATIONS/LicenseItToday.Com Translations in 40+ languages coming
More at LicenseltToday.Com
INTRODUCTION SECTION 1:
Introduction Part i: READ FIRST - Then Key Word Search Interesting Inventions
Inside!
Features - short handy version. Read this soon.
Abbreviations - short version
Symbols - short version INTRODUCTION SECTION 2: Read Much Later
Awards We Gave
Continuous Research In Past Decades
Search & Replace
Abbreviations & Symbols In Detail
Figurative Drawings: diagram codes and more
Less Common Features
Miscellaneous: Key words, Details on common features.
COMMON FEATURES: Moderately Described.
COMMON FEATURES: In Greater Detail. Read Later.
Access
Adapting
Analyzer (decides how to get inventions you want)
Artist (creative process)
Behavior Analyzer (adapts to user’s behavior)
Balance *
Basic *
Billing (generates income)
Brain (creative process)
Camera * '
Cartridge (software license upgrade)
Characters *
Compose (creative process)
Content Analyzer
Coordinator
Dance (connects to what can move)
Database
Distancer (brings client to inventions)
Editor (adapts instructions, etc)
Educator (learn to use invention)
Entertainment *
Environmental Protection is important
Exercise *
Experience (improve user’s experience so they spend more)
Game (concepts for non game applications)
Guide
Icon *
Keyboard *
Locator (find about anything)
Mainframe *
Manufacturer Programs
Microphone *
Morning Alarm (can remind about anything tide to invention)
Multi-Media (optional ways to interact with inventions)
Multi-User (can adapt to each user)
Notifier (know what's happening)
Order & Timing (looks at patterns of events)
Outgoing Sound Communicator (optional speakers)
Pets *Predict (inventions future market size)
Prediction Software
Programming * Questions (system asks user what invention characteristics are wanted)
Remote Control
Routing clients to what they seek
Screen
Seek & React (system reacts by giving invention you seek)
Sound Analyzer (voice commands)
Score (measures how well inventions adapt)
Security (catch infringers, etc.)
Sensors
Software
Sound Vision (audio visual option)
Status
Synthesizer (any sounds adapt to user preferences)
Telecommunications (stay connected with inventions)
Therapy (feel better using inventions)
Tilt (joystick)
Time & Date Stamp
Track (know how invention was used)
Users (defining people who use inventions)
Visual Analyzer (adapts based on what it sees)
Virtual Reality (futuristic...)
W5 (invention asks what happened, where, why, when & how)
Walk About (offers variations for portable uses)
Zone (see Locator section).
THE COMMON FEATURES ABOVE HAVE THEIR SUB-FEATURES IN SEPARATE FILES.
The Following Common Features Are Separated Into Multiple Files. Their Files (Sub-Features) Are Organized
Alphabetically Along With The Other Features.
ADAPT:
Introduction & Tailor
Adaptive Inventions
Sub Parts
Expand
Article
Code Sequences for software & DNA
Other Adaptations *
ARTIST:
AR Intro & General
AR IMIS
ARIMI
AR Write
AR Cause
AR Crawl
AR Educ
AR ReadHelp
AR ReadHelp*
AR Dys-Ed
AR Dys-IMI
AR Dys App
Artist Misc*
GAMES Main Sub-Folder.
Includes Sub-Sub-Folders with their files:
Games Intro (file)
GA LIC R: (sub-sub-folder) -Collar Game -Dating Game -Dating Game Details
GA INVENTION & PARTS: -Guide Behavior Modify -Tailor Communication -Tailor Match -UIP Emerge
-Predict Game Functions -Puzzle Maze Guide -Real Life Practice Game -Real Time Interface
-Good Intentions -Health Game -Seek A Reaction Game
-Games from March 2006 -Games Other -Games from 1990's -Invention Game
Game* (file)
GAME PARTS (Features): -UIP Sub-Part Games -Action Points -Parts from our 1990's Games -Artificial Intelligence UIP -Industry's Common Features -RPG Plot List -UIP Big Facets * -UIP Input Games *
Upgrade Other's Games
LOCATORS (GPS):
Introduction 1 G 104 Oceanic Miscellaneous
PS Functions
PS Zone
PS Feature Listings
PS Other
PS Miscellaneous *
PETS (In Addition To Pet Door):
Introduction
Parts
Sub-Parts
Pet Door Notes (read later)
Expand
Patents
INVENTION DIRECTORY: They are listed in the above feature files, and below.
The initial section of each invention may be easier to interpret until one may have read the entire patent application. Start today and explore by your key words.
Inventions In Following End User Categories Were Created Through Our Genius
System: Chemical related for home and business use, locators, motion related, audio, pet adaptations, plastic & mechanical adaptations, telecom, jet lag reduction when lights set by alarm clock, track sea food for your safety, voice & language guide applications, etc. More in Other Files!
I Directory Inventions
J Directory Inventions
G Directory Inventions
E Directory Inventions .
D Directory Inventions
C Directory Inventions
B Directory Inventions
A Directory Inventions DETAILED TABLE OF CONTENTS FOR THE BIGGER SECTIONS ABOVE (CONTENTS FOR SUB-SECTIONS):
The following table lists multiple sections that group different files.
In capital letters are Section names; followed in order of presentation are their file names.
The Game Section is further divided into its sub-sections, then their individual files.
- * We continue to improve the interface to this patent application, while the application itself evolves.
Visit our site for updates to the interface and other matters at www.LicenseItToday.com.
INVENTIONS BY CATEGORY (A Small Portion Of Our Inventions)
CHEMICAL - Ties To Other Classifications:
Introduction
Indicator Patents
Indicators
Parts
For Techies
Chemical in General -7G
MOTION TUTOR:
Introduction
Body Guide
Body *
Claims
Claims *
Other
IMI*
For Techies
Patents
MUSICAL;
9J Compose
Audio D-J
Audio Miscellaneous
Trigger Toy PLASTIC & MECHANICAL: 6G Plastics
General Plastics
Sound Analyzer
Sports using our technology
TELECOMMUNICATIONS:
Cell Phone Notifier
Noise Canceling Assistance
Keep phone ringing until you catch it.
Tools for Consumers using our technology
Toys using our technology
Travel Gadgets
Visual Analyzer
Web: A better way to send information, and prove what was deep inside.
I MISCELLANEOUS:
4G280 Frisbee Adaptation
Audio in General
Cord Length Notifier
Cord Length Research
Invention - Motion Capture
Jet Lag Adjuster
Point of Sale Software "R" List Inventions
Sea Food Poisoning Safety
Voice Analyzer Pronunciation Guide
FIGURATIVE DRAWINGS
ABSTRACT CLAIMS
Independent Claim
Dependent Claims: Interesting ways to search our invention directory in this pat application and updated info at LicenseltToday.com. The Genius Thinking Adaptive Design. Unity of this patent application and its posted invention directory. Access Systems.
Keyword Searching For Your Inventions Can Be A Quick Way To Discover Our
Revolutionary Technologies
Today
For Updates & More Visit LicenseItToday.Com
File: Intro To Pat / Intro6 Section 1
SHORT INTRODUCTION TO PATENT APPLICATION
Updates at LicenseltToday.Com
PLEASE READ!
FOR FIRST TIIvIE READERS: First read this introductory section. Second, locate inventions by a keyword search or its ID number. Third, carefully study table of contents, then read from there.
Common features in each of the inventions view the simplified handy version.
More details are in the main feature file where most abbreviations are spelled out.
First timers might ignore information preceded with a star "*", or dotdash ".". Enjoy the interesting patent application..!
Central Product Description: The central description is laid out first by its name and often preceded by its product number, afterwards its description. Additional information on the invention is explained in the
Branching section. Product ideas can be integrated with other product ideas, or developed separately.
Seeking a specific range of inventions? Now do a keyword search of this pat application. For updates and more information visit www.LicenseltToday.com. Then you can read about how our patent application is laid out.
BRANCHING OUR INVENTIONS
Branching helps explain the likely levels of importance in comprehending the central description. Concepts further down the branching are ideas, which may be merged with the central description, may be in the same or different patent application(s) from the central description's idea(s). There are many ways to branch the links between this pat applications many sections. This introduction covers a good portion of the variants. * Reducing Space: The tree branching system greatly reduces repetitive disclosures. The simple listing for type of branching that the invention branches into: it informs the reader to find that branch section in this and related sources, for the remaining information.
* There are two sections for where the branching system is disclosed: first, the product descriptions; second the separate Features'. Applicable Features' supplement product descriptions.
* Software key word searches for all the data in this and referred to filings are (also) used inlocating related data. Searches include: part names, product numbers, *% other data (particular words or phrases found in central description and mentioned in other parts of our filings, or *patent searches in any (US) patent database).
Use our keywords found in the specifications, and specific keyword sections.
Both product descriptions, and Features, generally branch out in the following network:
BRANCH 1: The first paragraph (if any) in the central description to the invention, or common features shared by our inventions.
BRANCH 2: The additional description excluding the following OTD (Other
Technical Details) (if any).
Branch 1 & 2 make up the central description.
* BRANCH 3: OTD following Branch 1 & 2. Drawn diagrams with their attached descriptions in the same file, but not covered in Branch I or 2. * Later Read Introductory Notes which explains Branches 4, 5, 6, 7, 8, 9, etc.
Our system is more elaborate than a tree's branching. Links (branches) do in many directions, and often link back to the point where the user is in our inventive system. Links start from where ever you are interacting with the interesting system.
GENERAL iNFORMATION
Discover why this application was done differently from traditional filings.
* One of the main purposes of the "Features" is to reduce research, development and manufacturing costs by using similar designs within different electronic product systems. It makes it easier to program, manufacture, market and learn to use the system's more simplified, and repeated features.
" Any one or more features mentioned in a product description might be useful.
The product description includes the central description, the part(s) with their appendices, and the diagram(s).
Priority Goes To US Pat Applications:
Appi # Our Reference # Date Filed (Approx): 60/755291 US2101 Filed Dec 29* or 30, 2006 60/756607 Filed Jan 05, 2006. 60/778313 US2400D. Filed Mar 01, 2006 60/783018 US2404. Filed Mar 15,2006 60/786906 US2410. Filed Mar 28, 2006 60/852794 US2522. Filed Oct 18, 2006
USAAdapts2006-12 Filed Dec 19,2006 Filed electronically
This Appl PCTAdapts2006-12 Filed on Dec 19, 2006 Filed in paper form
The two Dec 2006 patent filings at USPTO (US Pat & Trademark Office) have identical specifications. The applications are identical except for the application forms.
This entire patent application is may be filed with updates within three weeks for national patent application submissions in different patent offices including the European Patent Office.
File: Features Intro / IMI S 5 FEATURES - SHORT HANDY VERSION
This File Gives Basic Idea For Each Feature.
Now Key Word Search Inside, Or Browse By Subject!
ACCESS = Gain access to electronic functions with a correctly keyed in combination, etc.
ADAPT = Another term for Tailoring. See User Information Programming.
ANALYZER = Computer soft.ware analyzes how to handle situation.
AP = Application: How invention can be used.
ARTIST = Allows user to make and edit images.
ASSOCIATE = Associating similarity levels between multiple events or digitized files.
BA = Behavior Analyzer. Analyzes live behavior of people.
BALANCE = Speakers' volume adjusts according to where person sits. System uses central point for two or more people.
BILL = Billing: Charges users by amount and type of usage.
BRAIN = The Computers brain. Combines: "Analyzer", "UIP", etc.
C = Computer. The center of the, system unless otherwise described.
CAMERA / LENS = The system's eye.
CART = Cartridges to be inserted into system. Frequently contains useful software / databases.
CLAP = Clapper. Each combination of claps controls a different function.
Allows user to control invention without touching.
COMMUNICATE = When any two or more people, animals or devices communicate with each other in any way.
COMPOSITION *= Electronic Music Composition: Another variation of product can also be used to create interesting music.
CA / CONTENT ANALYZER = Analyzes the physical, or database contents.
COORDINATOR = Coordinates different Features of system.
CUSTOMIZE = See our Adapt feature.
D = Diagram. This symbol often precedes diagrams.
DANCE *= Body movement generates sounds.
DATE = Internal clock, calendar, clock alarm notifier.
DB = Data Base
DISPLAY / S = Screen.
DISTANCER T'" = Signals whenever any two parts separate or come together.
Signals via radio waves if separation is more or less than programmable distance. See other registered file on distancer for details.
Distancer rM
EDIT = sw (software) edits / screens out data before it reaches the user.
EDUC *= Educational: teaches interesting skills. Replaces human instructor.
EGH = Education Gets Harder T"' Adjusts to user’s proficiency.
ENTERTAIN = Also used as form of entertainment.
ENVIRONMENTAL PROTECTION /E.P. =[ Customizes] EP friendliness
EXERCISE = Also used as form of exercise.
FX = Fax transmissions.
GAME = Also used as an abstract form of a game.
GPS = Global Positioning System.
GUIDE TM = An instructor. Suggests how user might proceed. System guides user so they can better use system. Guide TM INTERACT / INTERACTIVE = System interacts with user.
K = Key in. User manually commands system, keys in command or data, etc.
KN = Invention by Steven K ay s.
LICENSEE = User who uses invention.
LOCATOR * = Shows location.
M / MFH = Mainframe computer hookup option for more complex tasks.
MIC / MICROPHONE = Microphone MM = Multi Media.
MO = Modem MOOD = User's mood.
MORNING = Morning alarm.
MOUSE = Computer mouse.
MP = Manufacturer programs.
MQ = Machine asks user questions to obtain information so system can better serve user.
MULTI-USER = System is specially designed for multiple users.
N = Product. Can also be an invention from S t e v e n K a y s.
NOTIFIER = User is notified on the status of any situation.
ORDER & TIMING / O& T = System reacts to the order and timing of external events.
OSC = Outgoing Sound Communicator. Signals user when a function within the device occurred.
OTD = Other Technical Details. For Techies.
PD = Positioning Device. Portable unit, which broadcasts its location to the
Positioning System.
PR = Program (software)
PREDICT = System predicts what will occur, or what user wants.
PS = Positioning System . Identifies the position of the PD (Positioning
Device) via its airwaves broadcast.
PS-ZONE = System reacts according to the location of element in question.
Positioning System Zone
Q User / System ask each other questions. Helps each better understand each other.
R = Remote Control RC = Receiver REACT = System reacts to occurrence as programmed.
ROUTE / ROUTER = Sys routes User / other (part of) sys to designated point / program. A type of "Editor".
S = Computer screen.
SCORE = The status of situation and or user’s performance.
SENSOR = Sensor. Senses via many means.
S&R / SEEK & REACT = System seeks designated occurrences, which intern causes a reaction which responds accordingly.
SA / SOUND ANALYZER = Analyzes type sound. Not important.
SOUND VISUAL ANALYZER = Converts sounds to visual effects; or conversely converts visual effects to sounds. It's "Visual Analyzer" &"Mic" interprets images into data: words describing what it sees/hears; other codes sys ("brain") can use to process ("brain") images/sounds.
SPEECH = System talks to user.
SP TEL = Speaker telephone.
STATUS = System shows the status of situation.
STEREO = Stereo SW = Software SYNTH = Sound synthesizer.
TAG = A user, or file, or other part is labeled in some manner. Details are covered by the Tracker feature, which relies on Tags.
TAILOR TM = System tailors itself to better function for designated purposes.
This is also called Adapt,
Customize, and 'User Information Programming.'
TDS *= Time Date Stamp.
T / TEL = Telephone.
TGH = Therapy Gets Harder. As user’s ability increases, system matches user’s newer skills.
TILT = Devices are controlled by how the stick is tilted. Each tilt position represents a different function.
TR = Transmission/receiving via airwaves & or wire.
TRACK / TRACKER = Sys tracks or monitors actions of user, or system.
TRAITS = The traits of the user. User Info Programming adjusts inventions to the user’s traits.
U= User. Person or other party licensed to use the features.
UIP T"' += User Information Programm ing . System adapts to user’s unique needs by collecting information about them. Also called: Adapt, Customize, Tailor.
UK = See "K".
UQ = User can ask invention questions.
VIBRATION = Vibration generated by device for specific reasons, eg:entertainment; notifier; form of communication based on type of vibration.
VA TM / VISUAL ANALYZER *= Alerts when camera sees a change in its view. Not important.
VR / VIRTUAL REALITY *= Future use with virtual reality technology possible.
Less important now.
WA = Walk About. Portable unit. Also interacts w(with) user via speakers.
W5 TM =. When / Where / How / Why / What
ZONE = A certain area with defined boundaries. The area is also dealt w/ according to its distance from point of perspective.
Each Feature Is Explained In More Detail Throughout Patent Application
Abbreviations & Symbols - short list
File / Feature Intro / Abb-Sym Short 4
COMMONLY USED ABBREVIATIONS & SYMBOLS
With Simplified Explanations.
Read Expanded & Detailed List In Its Main Section.
ABBREVIATIONS - COMMONLY USED
D' = Figurative Drawing, Diagram.
El' = Electronic / *Electrical
Exists' = The particular function described exists and is designed to compliment the product's other functions.
Fq" = Frequency: transmission frequency via wireless or wire. Eg: digitized electrical signals / codes; infrared; radio frequencies [RF]; sound (for transmission purpose).
IMI' = See Features (Parts) File.
KN' = Invention.
KW' = Key words to find related features in this application, patent database, etc.
Misc' = Miscellaneous
N' = Existing product on market, or confidential invention.
Obvious' = The simple version of what's described may or may not be (fully) patentable.
OP' = Option(s).
OTD' = Other technical details. Read its section later. Or for techies.
PL' /'Plastic' /'PVC' = Productconstructed of PVC / other petroleum by product. "SW" = Software
Sys' = Electronic system.
U = User (s)
Ver'= Version. w' = With.
WO' = Without "Zones" = Designated locations. See "PS-Zones".
SYMBOLS SECTION
The following description is the beginning of a new section describing the product. = The following is the sub-section of the previous section describing the product. *' = This item may be less important to the central over-all product concept.
or '-.' = The same meaning as '*' and '-'. The '.-' is however only used to begin a new section describing the product. is lower in the branching, hence equal to **. Started using'=: instead of'. ' in Aug 96. This is virtually not used, and usage of this form might be an error signifying a period as well. = Etc. Or the previous concepts can be one or more of the examples for the said product idea(s);
This symbol is normally three, yet up to five dots.
When used in the product descriptions it designates the lines between parts of
diagram. The presence of one of these symbols shows the data is an actual diagram; hence no need to write diagram'. '->' & >' are same, and opposite of <-, <. They designate direction of signals, '=' allows one or two way signal transmission (<- and or ->). t' = One of the more important aspects. = This function significantly expands the product idea beyond the basic concept. It might also be too "far out" to be feasible. ( )' or '[ ]' = Shows one or more of the multiple possible examples. One can keep or retain what is in the parentheses.
Includes a limited list of possibilities.
P or '\' = Means And Or'. For example A/B means, A and or B applies to the scenario. = Same as 'I' or '\' except a line is also drawn between the parts when this wavy line symbol is used. information following the colon represents one or more of the possible manifestations.
File: Intro To Pat / List Awards
TOP AWARDS ARE GIVEN TO THE FOLLOWING PEOPLE:
The following people from around the world are awarded high honors for their creative contribution to this patent application. Awards have been given since the 1980's for peoples creative contribution to this patent application. The Award Recipients are for:
T Acevedo
A Akiyama
R Akui
P Akuna
A Alexander
S Atten
A Oyama
S Bazhinev
D Beach
F Bellet
R Bigham
A Bloom
BBock
G Boissiere
A Borg
V Borisovich
C Buhler
B Burns
D Callister
S Canfield
I Chenevey
M Chism
J Conco
H Contrino
A Cook
V Davidenko
B Demars
S Edwards
D Farr
A Fedorov
D Froseth
MFuji
V Galakhov 0 Galianova
S Gaisenyuk
A Giustina
S Golder
S Grinko
E Hauglan
D Heller
C Herlon
R Hollstein
H Kim
B Kornilov
A Kravitz
A Krilov
T Kwon
B Lantum
D Lee
D Lemmon
A Leshenko
V Lenivenko
C Macone
S Manzo
C Mason
J Mezzeera
B Nolta
A Nazarenko
K Nooruddin
F Pavez
A Procopenco
K Ramirez
S Richmond
C Rojoy
I Rubin
M Sanem
E Savage
M Scinto
S Senn
R Simon
B Smith
M Stamos
H Tanabe
K Thompson
O Tsibin
V Villaneueva
R Weiss
B White
H Young
More Awards Are Being Given Next Year
File: Intro To Patent / Continuity of R&D OUR REAL LIFE RESEARCH ON ASPECTS OF THIS APPLICATION SINCE *
Read This Section Much Later
This Also Signifies Our Continuity In Researching This Patent Application. It
Includes Real Life Research in
Applying the Invention Concepts. In the US, Patentable Rights can begin at idea conception, even prior to the patent filing date as required in all other countries except the Philippines.
Research Examples:
OVER VIEW: OUR RESEARCH SUBJECT MATTER
Government security in: border check points when entering/exiting buildings to country borders, transportation: access, behavior analyzer.
Adapting to cultural behaviors in Japan, Europe plus Former Soviet Union,
US, Mexico, Canada, etc.
Promoting the business incubator
Researching the functions of: commercial and related (residential real estate), office business centers (executive suites), business incubators (funded by government and/or private sources). Many sources/organizations on the internet: OfficeBusinessCenters.Com,
Technology.Gov, WorldBank.Org, Bio.Org,
Jetro.Go.Jp, *NewEnergyFinance.Com, EmIncubation.Co.UK
Government: ABA for government employees (located regionally and elsewhere); citizens and voters; expressing views publicly and through government channels (for needed improvements and/or problem identification). Problems with self interest of power players that does not on average elevate needed benefits/improvements for the (regional) citizenry.
Environmental Protection: recycling; generating/saving energy. FTrack via
Certain organizations obstruct the development of business incubators. This helped our researching and/or improving the business incubator concept and its process [even if final results didn't appear totally novel.]
Researching the creative thought process. Adapting ideas, features, services to: culturally bound thought patterns (purchase decisions that aren't all economically based [as determined by Xba]). This requires extra tailoring, since the role business economics plays in client thought patterns more easily transcends cultural lines.
How professors (of engineering and the arts), engineers, artists and consumers behaved, in and out of their research behavior patterns.
People's reactions to our confidential invention(s).
Simplicity of interface: how to present matters in simplified edited format.
Which features should be first be explained (in abstract), (so users can be guided to appreciating/using other linked/'associated features/services). Interfaces for: Business Incubator; Selling/Leasing commercial/residential real estate around the world; explaining our inventions; Helping people enhanceJ'analyze their creative thinking process;
Importance of(}ob) labels/titles; Screening applicants [access tests using (Xba)], etc.
Cost effectiveness: -Unity: consolidating needs from multi-users, then tailoring services for their common/average needs saves costs, e.g.: incubator type features. One service becomes tied to other features offered [unity of invention], even due to proximity of client/feature, how one need links to other needs (upon client being guided), familiarity of [human] interface, more..! -Cheaper to research live human actions, than build prototypes. Our inventions are also modeled/'associated with [our business] human/economic transactions [resulting in revenue generation] from the research process / release of future inventions.
Confidential matters explored, a portion are disclosed here.
RELEVANCY TO (BUSINESS INCUBATOR AND/OR TNVENTION) FEATURES:
ACCESS = Police, ADT, Sonitrol and other US based security company services were researched. Behaviors of people correctly accessing building security system, and properly exiting the security azones. Guiding people in the access methods.
Restricting access based on: behavior analyzer (background checks); ×time date stamp; privilege to access designated azones.
Passwords to use devices (copiers). Tracking usage, and associating this with revenues, and generating longer term clients (extended licenses). Cheaper fees per copies made makes clients happier as this is a frequent point of interaction for clients. This makes frequented interactions more affordable, and thereby increases the amount of client satisfaction. Revenues from fixed, less auxiliary services (office space leases) might generate more income. When a feature is less reliable (copiers) consider charging less for it (until the invention feature is improved).
Our pet door foot cleaner tied to people tracking dirt into building because they failed to spend enough time using floor mat.
ADAPT TM = Matching business to business (B2B) services to customer needs, e.g.: phone answering (services); giving access and Xba related services (at the receptionist desk). Reacting to people/companies taking improper advantage of our tailored services.
Communicating with people via alternative behavioral patterns, designed to get designated reactions.
Seeking their interest by offering designated interfaces.
Tackling deception in others: tracking their behavior without their knowledge; educating them and others via the border & timing of my behavior that I don't budge when they think it will be cheaper for me to do what they want. Establishing my consistency in not putting up with fraudulent practices had predicted benefit in having fewer conflicts (infringements).
Making our business and other services more accessible via tailored guidance, e.g. few understood the business incubator's services, nor our methods for increasing the inventive creative abilities in people.
ANALYZER = Giving access: relying on security system data/'tracking to improve access system [by limiting access privileges to parties with improper [access related] behavior.
ARTIST ='BA showing views people have of art. How artists / art creates designated floods, and effects peoples behaviors [as reflected in ABA].
ASSOCIATE TM = Associations clients/employees can make/link with what they see/hear/read [ova, Rsa, editing, Xba]. Which links/'associations led to sales or using of services [use/license services and/or physical space rentals that were adapted by 'W5.
BA = Landlord behavior: how they exchange access for billing income, balanced with risk analysis [based on security (background search, Xba), predicted client [licensee] behavior.
BILL ='Track accessing of features in [monthly] invoicing. Which features were used 'W5, and willingness for clients to pay, regardless of how they associated a costlbenefit ratio.
Some services are so important but people were less willing to pay for them [for Xba showed such were expected rights for their access license].
How different business incubators analyzed /'tracked this situation for greater billing revenue, and client [royalty] income.
Billing software, eg: Excel software.
CAMERA / LENS access, Xba, ova. Security camera research.
CART = Digital flash card [with Rimage] for [color copier / compute].
CLAP = Lights /'access [restriction] features activated. Knowing people are building based on sounds in hallway, etc. With sounds, lights are left on.
COMMUNICATE ='Telephony. Adapted our phone answering service to clients. Our marketing adapted to local behaviors and business styles.
COORDINATOR = Client needs with available services and building facilities.
DANCE *= Which body movements (of receptionist) generate predicted reactions in licensees, eg: greater pleasure (entertainment), curiosity (interest in buying/'accesing other features) to continue the positive experience. Ergonomics (not hurt one's back, or fall).
DB ='Tracking'billable usage. Accessing database to: analyze 'W5 is using features, so we can: increase client satisfaction -> client retention (longer licenses) / greater monthly billings.
DISTANCER TM = Not loosing items. Keeping things where they belong. Tying pens to clipboard. Theft reduction.
ENTERTAIN = 'W5 entertainment generates greater [long term] billing.
ENVIRONMENTAL PROTECTION / E.P. = Electrical consumption by [fixed] devices like lighting, HVAC [heating ventilation and air conditioning], personal computers, electronic gadgets.
Difficulties getting people to recycle their wastes, and having them picked up with a better interface for [tenants]. Tracking, ABA, Access ['W5 for pick ups; shredding documents].
EXERCISE = Devices [tenants] could want. Stairway = built =in tread master [behavioral resistance to walking up a single flight of stairs despite health benefits]. ADA [American
Disabilities Act]. Office gym installation(s).
GAME = Visitors in reception area playing [video / non electronic] frames. 'W5 they are played.
GPS = Who did W5.
GUIDE = Clients learn more available features after they started licensing something. Too much information about available features contradicts inventions desire for simpler interface.
Trusting / learning to use one function, can naturally lead to client's interest/open-ness to learning about other less or [un]related features, eg: [color] copier functions get complicated requiring EGH.
Friendly / Honest interface create synergistic effect in: clients trust more when provider is [user] friendly; user friendliness helps create trust. Tricky behavior [to maximize short term profits] hurts long term billings in many ways, eg: clients speak with each other. Clients analyze / ba the services/invention features.
INTERACTIVE = the more the better. Live versus automated phone attendants.
LICENSEE ( LICENSOR = Client and Landlord behavior [Xba]. How they maximize/minimize, monetary income/expenditures/royalty fees. 45 something is licensed/used. 'W5 licensee/licensors don't act in their best financial interests [due to failure to see all the (linked/'associated) benefits]. What behaviors/perceptions (Xba, associations, editing) cloud/effect judgment (business decision = making analysis).
LOCATOR *= know 'W5 clients (tenants) are: helps connect incoming [screened] telephone callers to our clients. Tracking client quickens the phone connection in terms of: quickening the connection / being able to make the blink (hard to do if the designated person and/or wanted feature can't be found/connected to).
MIC / MICROPHONE = Security system's PVA.
BA of [receptionist on phone] shows what actions create greater billings.
VA is form of access control: can visitor / potential client be trusted?
Predicting future billings [how much they will spend].
MM = Power point. Putting printer onto networks [for those with access].
Simplifying interfaces can also reduce income [fewer people able to access complicated printer network] generates less billings, but less frustrated clients. Frustrated clients might be shorter term.
NOTIFIER = Improper access [usage] tracked by einployees/security systems.
PREDICT = client's [unstated] needs, and length of remaining a client. Study their credit history, and use our behavior analyzer related process.
Q = know ' W 5 questions to ask ROUTE / ROUTER = direct prospective clients to the services we predict they need; or even to other organizations based on their behavior profile.
S&R / SEEK & REACT = how we and/or clients seek and reacts to each other.
SYNTH = which voice tonalities 'W5 had predictable reactions in listeners/users.
T/ TEL = business incubator phone system features recommended by OBCAI
TGH = methods to increase creative thinking (in conceiving inventions) got harder.
TRAITS = of clients.
UQ = common questions & answers
VIBRATION Strack 'W5 people are walking [in building] [for Xba]. What features are used 'W5.
VA tracking business activity /[incubator employees] analyzing client behavior tailor features/services.
W5 TM = usage patterns for billable services
ZONE = Real estate property rights. Greater usage of certain azones in building create a behavior pattern of users; whereby we reacts by adapting ourselves to their needs accordingly, e.g.: location of our services, equipment, etc.
Much More..!
File: Intro To Pat / Search & Replace SEARCH & REPLACE TEXT FOR THE PAT APPLICATIONS VARIATIONS important Simplified & Detailed Versions of this Patent Application CHOOSE THE VERSION NEEDED
For Updates & More Info Visit www.LicenseltToday.com Or call California
Headquarters 1-707-428-5000
This File Shows Search & Replace Features That Can and/or Have Been Conducted
On This Pat Application.
To condense the application while providing instruction, search and replace has been conducted in different manners throughout.
New Paragraphs: -Replace two returns (carriage returns) with a carriage return then a tab.
This results in omitting empty lines between paragraphs (as in the original text version). The indentation starting on the left margin eases readability. This is better than omitting all carriage returns, even if a symbol were used to designate where a new paragraph starts.
Abbreviating Terms in General:
You might convert most of the common words in application.
Choose the 100 to * 10,000+ most commonly used words like "and" converted to "&".
Published patent application should/can have a link to our website that could give the entire content with and/or without abbreviation - as a courtesy. We want people to get easy access to this patent applications contents.
Translating text into other languages. Adapt whats translated
The earlier parts of the patent application use fewer abbreviations. This helps in learning and comprehension.
Files with fewer abbreviations, hence good starting points to learn our system: the Main Features file, Access
Features.
To condense and simplify the required reading of this entire patent application; this pat application, singular terms were often used, while omitting word suffix variations showing plurality, past or present tense, and other grammatical structures. Hence seeing a singular term such as "feature" implies the plural "features" can apply.
Links:
Alternative features can be inserted (by our software) where there are links.
Each feature has links to many other features and their sub-features. These links are shown in various ways.
They include:
Terms in brackets (like such) or [like this].
What follows drawings containing single equal signs [lines between parts in our drawings], or colons can achieve the same purpose. -Empty (open space) in brackets, or after these mentioned equal signs and colons show where specifications can be inserted. Examples are found throughout this application. Remember empty spaces aren't needed to show the link's presence.
Miscellaneous Pointers on Adapting This Text:
Spell out at least the full word, with or without extra words describing the feature. It can be a few extra words to more than a paragraph.
The full description for an invention with its many adaptations might exceed
I,000;000 pages. This HIGHLY
IMPORTANT point naturally is because: -The links made from a feature (step 1) go to many other pages (step 2). The links in step 2 go to many of their pages (step 3). Step 3 links to Step 4, 4 to 5, and so forth. Many ofthe links make a full circle back to the feature in step 1, via divergent paths. The pat applications introduction has details.
Use text editing software like Word for Windows or Apple; online programs; do it in your (readers) head; handwrite changes; etc. Save each variation incase one version is better adapted.
Changes That Have Been Made In Portions Of This Pat Application: Correct and or alter the grammar. Correct miss-spellings. Capitalize Headings: New inventions, and new topics.
Search Strategies:=
Search strategies are not normally included in patent applications. They can be used to seek inventions in this application and/or databases of other patents. While one alternative of this patent application is not disclosing them, we wish to: 1. Show additional examples for how related patents can be found, despite the limited nature of the suggested strategies. This further shows related embodiments to better understand the inventions. 2. Be user friendly, without requiring the user to be creative in conceiving good key words.
See the Abbreviations Section For More Examples. Arrows show what a term can be made into or from. You can reverse the arrows, e.g. "with' -> "wP' in enough to show that "wP' can be expanded into the word "with" w/o (without) having another arrow going the other way. Arrows adapted this section in making it easier for more (not all) people to understand (and contemplate).
Specific Terms That Can or Have Been Edited In This Application: and -> &. & --> and ao->!. ao-*&or. &or - and or
OTD -> Other Techie Details, or Other Technical Details, or For Techies (omit any carriage return after it)
Footnotes --* . For Tech ies
Lengthen: w-->w/. w/ ->with wo --> w/o. w/o -without optional - optional/alternative
U ->User
D: --> Drawing. . D--; Figurative Drawing. . D-> Diagram
Commonly Used Terms: Abbreviations & Expansions used are listed on their same lines:
D, Diagram, Drawing, Figurative Drawing. Often followed by colons.
El, Electronic
Fq, Frequency - the electrical type.
IMI, Feature, Part, and maybe Function
KN, N, Invention. Often followed by colons.
KW, Key words. Often followed by colons.
Nr, Notifier, Alerts
Misc, Miscellaneous
Obvious, Exists
OTD, Other technical details, For Techies, Read later. Often followed by colons.
S W , Software
Sys = Electronic system.
U, User (s), Person
W, W/, With.
WO, W/O, Without
Abbreviated: approximate(ly) -- approx average --> av especially --> esp experiment -- exp laboratory --- lab maximum - max month -> mo negative (ly) - ~ neg positive (ly) - pos separate (ly) -* sep separated -> sepd standard -> std technical(ly) --- tech volume -> vol
Features (Parts) Samples Abbreviated: communicate(s) / communicated / communicating -~ comm computer(ized) -> c coordinate -> coord invention or product -> N or KN notifier / notify / notifie(s/d) --> nr
OTD --+ For Techies (either label reduces confusing non technical people)
Remote Control --s R [not research]
Software --> SW
Sound Analyzer --> SA
Telephone -- Tel
Visual Analyzer =-+ VA
Alter Invention Descriptions (Specifications):
Small --* Adapted Size
Obvious --= Exists?
Fast -> Adapted slow speed
More --> Fewer. Quantity --- Adapted quantity
Optional -i Important (Aspect)
Expensive --> Adapted to fit budget
Exclude --> Include
Seek Sought
Find --> Found * Other Methods:
Labeling the last line of each file, before they are consolidated into an application:
Ends File: = Concludes This File: . Note, all information and functions are found by accessing (with permission) all links tied to what the user wishes.
Zip text (to reduce memory requirements by putting it into a zip file). Zip via manners that change the memory required, with or without text changes.
Replace words to something a person may not understand to: keep out of hands of (children), people not educated in applicable methods, security, etc. Maybe keep the change codes elsewhere. * Free Open Space:
Reducing Empty Lines: Convert all multiple empty lines from 3 on up down to 2 empty lines, eg: convert four carriage returns to two carriage returns, then word downward to three carriage returns into two carriage retums.
Convert two carriage retums into a carriage return followed by a small tab. * Precedes less important material beginning with either * or .- or .-. Have a uniform code. -Reduce two (or more) empty spaces in or between sentences, to (a single space). -In the (original) text, new subjects often start at the left margin, on a new line with a dot, dash, or double dash. --+ A tiny circle might represent where one point or sub-point ends and a new point or sub-point starts. Or a I precedes a dash, and a 2 precedes a double dash. The idea is that the lower the number the further down the chain of broadness.
Replace two empty spaces between words to one space.
Replace empty lines with less space, (but more than whats found between other lines).
Space before new sub-points. Alternatives: --the shown example: paragraph's sub-point is a dot. Dot's sub-point a dash. A dash's sub-point double dashes. Details in intro. --insert a tab (within same line as preceding sentence) --code number for each new sub-point, eg: dot = 1, dash = 2, double dash =
--sentences preceding sub-points may not have periods at their end.
Consider Not Searching & Replacing Designated Sections, e.g.:
Reducing open space in pages with columns, e.g.: tables of contents; lists of people receiving our awards.
Figurative Drawings (diagrams) using linear dots.
Figure Drawings which usually are already very condensed using our special method we claim.
The best way to experience this patent application is imagining how the entire system will operate. A real model is best as inventions and their features can be in one or more clicks (links) away, depending on where in the system you are at the time.
Concludes This Search & Replace Section
File / Feature Intro / Abb-Sym 4
ABBREVIATIONS, SYMBOLS & RARELY USED FEATURES: In Detail ABBREVIATIONS SECTION
B' = This old symbol was changed to 'N'.
Basic Idea' = The full descriptions for each product number. Includes: central description and all its branches.
Branching' = Tree Branching helps explain the likely levels of importance in comprehending the central description.
Central Description' = The written description following each product number's main listing. It is the central part of the branching system. -This excludes the product number's OTD - Other Technical Details section; but includes: aspects with any symbol (except %), and the parts, used in the central description up to one branch.
Code' = See'Parts', or * starts File'.
Creative Shell' = Any additional product features provided by other parties beyond the scope of the basic idea.
D' = Diagram /Telephone*. Eg: DI is diagram #1, D2 is diagram #2. DI and D2, if in the same general section, should normally be related for the same and or separate products.
Dev' = Develop, **development, %developer
Dir" = Directory: of Kays' inventions. The first two spaces of a product number have a letter which shows from which directory the product file is from, eg: I B-050-022004 -> B. Sample letter categories A, B, C, D,
Eg' = the following examples are only one or more of the possible examples.
Same as: '~', etc', '...'
El' = Electronic / *Electrical
Etc' = the previous concepts can be one or more of the examples for the said product idea(s). Is not a complete list. Same as: '~', leg', '...'
Exists' = The particular function described exists and is designed to compliment the product's other functions.
Omission exists' from any description never implies it is a unique feature.
Fq" = Frequency: transmission frequency via wireless or wire. Eg: digitized electrical signals / codes; infrared; radio frequencies [RF]; sound (for transmission purpose).
IMI' = See starts File'.
IOW' = In Other Words. The information might be reworded, with or without new dimensions.
KN' = Mr. Kays' invention. One or more inventions he conceived.
KW' = Key words. Usually used for software key word searches, eg: to locate files related to designated key words. % These key words mentioned might also be used for electronic patent searches of worldwide databases to expand invention (applications).
Letter Category' = See Dir': Directory.
Letter Sub-Category' = The letter category has products from each of its files divided into separate subcategories. Eg: letter category D has letter sub-categories: DE, DG, Dl.
Misc' = Miscellaneous
N' = Existing product on market, and or KN. -definition up to about 1995: product number; one of Steven Kays' aspects of invention; any product preceded by a product number'; product parts are products too; "'Product Specification
Codes Appendix - US Patent
Numbers For Each Code'
Obvious' = This has some chance of being obvious just in its simple form.
Obvious can mean not patentable due to being too similar to other products. The fact that this term was used does not say in any way functions with this statement are more or less likely to be obvious.
OTD' = Other technical details.
OP' / Optional = Option(s). Important: this term is used to help clarify descriptions, and/or offer alternatives.
An optional element does not in itself suggest that if used, it is instead of something else. Each feature/aspect as described is a variation even when such is not mentioned.
Organism = Any live organism, which moves [unless otherwise stated]. Eg:
Humans, mammals [pets, animals kept in captivity or found in wild, birds], birds, *reptiles. %Microorganisms apply if invention can be made to apply to them, considering their small size, eg: amoeba, *bacteria, viruses. Organisms are commonly described in the context of scientifically analyzing them via'ba, or tracking their behavior.
PL' /'Plastic' /'PVC' = Product constructed of PVC / other petroleum by product / (hardened) rubber / %vinyl / *metal / *wood.
Parts File' = Product Specification Part, eg: "distancer", "clapper". Parts
File is the full list of all parts in the
Product Specification Parts' paper.
Product Category' = The type of product from the manufacturer's point of view, eg: cameras, toys.
Product Description' /'N' = The central description of each product number plus all its branches, eg: OTD,
Appendixes, Diagrams.
Product File' = The files within either a letter category, or letter subcategory, eg: 2D, 2DE, 2DG, and 2DI.
Product Number' /'N' = Most product ideas with a central description are preceded by a # eg: 1 B-050-022004. -Each product number designates product idea(s) separate from the remainder of the papers. Product numbers are normally found in a product file with one or more product numbers.
Product Specification Part, Product Specification Code' = Parts: The identical meanings are the parts used in the product descriptions. Each concept in capital letters within this Product
Specifications Parts' file or its appendix, and used in product number's descriptions. The abbreviation IMI' was used to designate the Parts
File, and IMI& the Parts Appendix.
RM' = Read Me. Notes to better uhderstand. "SW" _ ("Computer") Software
Symbol'=Eg:_,().1.1,, +, 0,...
Sys' = (Related (El)) systems, * system
Ver' = Version. Eg: electronic or mechanical or plastic version.
W' = With. For diagram (figure) purposes, %each "w" also represents a line between what precedes and what follows. W/In = within.
WO' = Without
Written Description' = Embodiments. It is the description of a product number or part in the word form, including all branches. Excludes diagrams.
"Zones" = (Designated) locations as described in part "PS-Zones". Eg: differing zones in which (PS) is located result in differing: effects, causes, processes, etc.
SYMBOLS SECTION = The following description is the beginning of a new section describing the product. = The following is the sub-section of the previous section describing the product.
= Designates information for the reader who has already grasped related ideas without such markings.
This item may be less important to the central over-all product concept.
Realize that the lack of this part does not signify that item is a central idea. This and related parts (-, .--) have no bearing on patentability due to the part in and of itself. This part may immediately follow or precede such a possibly less important aspect. Also included are any of its following subsections represented by Example: if a part's element or section is preceded or followed by *, the applicable are less important. An element may have from one, to a maximum of two * (** is less crucial than *) directly next to it. -The star * following the title of each part applies only when: the part is used in any OTD section (unless otherwise specified, eg by '+' which cancels out *); this type of star does not apply when the part is used in a description other than OTD. "." = begins new main section within a file. Something like a new sub-chapter.
Followed by "-" which are subsets of "." Eg:
Edit: the program adjusts-- Don't confuse "." with ".-", or "...", or a simple period at end of sentence. -Such new main sections may also just begin after having skipped an empty line. Sometimes main sections are strung together via a single dash on left margin between sections.
The same meaning as '*' and ''. The '.' is however only used to begin a new section describing the product. = is lower in the branching, hence equal to **. Started using '-: instead of'.-' in Aug 96. This is virtually not used, and usage of this form might be an error signifying a period as well. = Descriptions following a colon are some of the examples for the inventions description. This symbol is much more important than may appear. Colons often can also be interpreted as separate two sides of diagram.
The colon ":" symbol represents a line from the disclosure preceding it to the disclosure following it. The disclosure following the colon can also be a subset of what precedes the colon. The colon represents what follows as being includes at least the following', 'a plurality of...'. -Additionally, something of an independent patent claim might be interpreted as what precedes the colon; and sub-claims being what follows the colon.
the previous concepts can be one or more of the examples for the said product idea(s). This symbol is normally three, yet up to five dots.
=' '->">'* = When used in the product descriptions it designates the lines between parts of a diagram. The presence of one of these symbols shows the data is an actual diagram; hence no need to write diagram'. '->' & >' are same, and opposite of <-, <. They designate direction of signals, '=' allows one or two way signal transmission (<- and or ->). *'=' if used in Product Specification Parts immediately after the part title in cap's, describes the part referenced. -signals traveling on these lines may go via: wire, wireless, telephony. -also see Intro to Parts' file for detai Is -when '=' lacks a space only on its left side, the symbol can also be read (for ease of reading only), as a comma.
Eg: Activate the switch= then light turns on. -the -> and <- symbols are arrow lines. %* If no conflict, or trouble with the patent application, such symbols can also be replaced with "=".
O' oro' = The following description is a separate product which might also be combined with one or more parts of the remaining description within same product number. These symbols are not in capitals or quotes when used.
or '~' or'@'* = Listed are one or more of the possible types of functions, applications, parts, and or overall product designs. Not a complete list. '@' is rarely used, and if so, before
Mid-1994. 'A' is same as: leg', etc', @'. Those items following'~' are treated as and or' if they are separated by';'. This applies to what follows ":". The 'A' symbol was used until 1995.
+' = Important aspect. One or more of the ideas within the section immediately following the '-{-' symbol may be a central concept for the overall idea. However, lack of this symbol does not signify that the idea is of no central importance. Most places that might be labeled with '-V were not so labeled, hence lack of the '+' has no bearing (except possibly within the context off the surrounding 100 words on the same/consecutively numbered pages).
- if a part in OTD is de-emphasized by a star in this Product Specifications
Parts' paper, the placing of'+' immediately next to the part cancels out such star.
"" = Represents parts. Used this in the 1990's Parts are either in parentheses, or each of the part's letters are sometimes in capitalized letters. If parts are found in the body of the worded description, the part(s) refer to the fully capitalized titles of a part in the Product Specification Parts' paper.
For ease of typing, the parts listed in the Diagrams and or OTD (Other Technical Details) need not be in quote marks or be fully capitalized. The form of the part might change slightly, eg: for grammatical purposes, the part can be in the possessive case.
The part's abbreviations were used until June 1996.
The single' symbol, and the "" symbols have identical meanings.
D1d = This function significantly expands the product idea beyond the basic concept. A subset of the idea may be related to the central product description. Most or all aspects lie outside but near the central product description. Example: if the same part is referred to in different branches of the description, those with a % or * are effected accordingly in that particular branch, but % or * do not effect the same part accordingly in branches without the symbols. Only one % is placed next to an element, hence there is no double %.
( )' or '[ ]' = Shows one or more of the multiple possible examples. One can keep or retain what is in the parentheses. (Used in embodiments / written specifications / diagrams./ how mentioned_function might be put into practice.) +- () include limited list of possibilities. Other elements (may) be placed (additionally) within the (). -Combinations: information in these brackets need not necessarily be read, eg: omitted from description, though they may still be needed in some capacity to enable the invention.
Descriptions with () can be read in many different ways": w/ or w/o information in (); if there are multiple () in description -> can use / ignore one or more bracketed information in each the possible combinations. --Use and or ignore one or more sets of information separated by '()', to read each designated combination. Eg: #1: [a(b) = c (d) ] can be read at least nine ways, such as #2: a= c(d), and or #3: a= d. Each combination is for different invention variations (for alternative uses). The greater the multiple '()' occurrences spread throughout the main embodiment, the number of combinations grows exponentially. The '()' used in the branching' embodiments further increases the overall exponential number of combinations.
-These brackets designed normally to expand the N's description(s). -Information within () are usually a subset of the part, eg: "sensor" = c ("analyzer") = osc: the line is drawn from analyzer to computer ("C"), and lines are drawn from "c" to both "sensor" and "osc". --Data inside '()' need not be a subset, when it's a different / related idea. Eg, stapler (staples): #1, staples could also be nailed in manually without a stapler; #2, staples might be welded for non-connective applications too. % If the issue of'()' being a subset or not [without the option of both], then '()' can be considered a subset (for patent purposes). --D: legs = toy robot (sensor/c ("analyzer" (software))). For (printed) schematic purposes, software is inside analyzer, analyzer inside c, c inside toy robot, sensor inside toy robot - (for purposes of this diagram). Toy robot could have different insides since () are limited possibilities, eg: toy is purely mechanical. -Sometimes the left bracket is keyed in with the accidental omission of the following right bracket, eg: (analyzer) equates with (analyzer.
- When () used after a patent number: these are inventive ideas (new applications) based on KN's and patent's configurations.
f' or '\' = Means And Or'. For example A/B means, A and or B applies to the scenario.
Another example: in a diagram the '/' symbol is used as follows: [part 1/part 2= part 3= part 4]. In the preceding example, part three's diagram goes to part's I and or 2, that is there is the possibility for variations.
Part 3 has a line to part 4. * Details Follow: Example: [part l/part 2= part 3 = part 4/part 5] is the same as a: >3< shape diagram, 1 2 4 5 go around the 3 (in clock wise pattern); and or b: can be split D1: 1=3=4, D2: 2=3=5. (No line is shown between 1& 2. Important: a line is not excluded, and %might be drawn between the two parts if viable.). In isolated places a'\' may have replaced '/'. -Combinations: there are frequently multiple '/' in N descriptions -> use and or ignore one or more sets of information separated by'/', to read each designated combination. Eg: #1: [ a/b = c/d ] can be read at least nine ways, such as #2: a= c/d, and or #3: b = c. Each combination is for different invention variations (for alternative uses). The greater the multiple '/' occurrences spread throughout the main embodiment, the number of combinations grows exponentially. The '/' used in the branching' embodiments further increases the overall exponential number of combinations. --' = Same as '/' or'\' except a line is also drawn between the parts when this wavy line symbol is used. Eg #1: 1-2=3=4/5, lines are between 1&2, 1&3, 2&3, 3&4, 3&5, %maybe 4&5; 1/2 go thru 3 to connectwith 4/5.
The lines between I and 2 are optional, since the '-' symbol could also be a diagonal slash, in another version of the diagram. -see Intro to Product Descriptions' for details -[if this file's symbols doesn transfer between computer software systems: its the upper case of the "' single sub-quote key as found on the Toshiba T1910 notebook computer, while utilizing
WordPerfect software 6.OB for DOS. From 1991 to now (Jan 3,1995) all data entry was on Word Perfect 5.0 for DOS or higher. Since 4.94 the Toshiba T1910 computer was used.
the semi-colon is a break in thought flow (weaker than a period, yet stronger than commas). When there is a diagonal slash in the sentence followed by ';', the semi-colon should normally break the lines in the diagram. See the '/' section.
information following the colon represents one or more of the possible manifestations [%applications for said function(s)]. The symbol is similar to the data following the colon.
Data following ':' are more likely to have the possibility of stepping beyond the bounds of the idea / terms directly preceding the colon, than data directly preceding the '()'. The connected symbols '~: are same as ''.
Sometimes there's information followed by colon, which is then followed by another':' within same sentence, in which case this can mean that data following first colon is a semi-subset of data preceding it, and data following third colon is a semi-subset of data following first colon, or data *preceding first colon.
Old Diagram Symbols: used in material done up to mid-1993. Vertical lines may also be represented by "I", a dot ".", or * "L", etc. The latter shows additional parts that are on the line below and directly to the right of the "L". Sometimes a line of blocks scrolls over to the next line or page.
OLD ABBREVIATIONS SECTION
Introduction: This section covers old abbreviations and symbols, which are mostly discontinued in newer inventions. Older inventions can be those found in sections A, B and C, or which have those letters in their product numbers, e.g. "2A400".
Ad or Adv: advertising
ASAP: As Soon As Possible
Cat: product category, eg: tv; tel
CIS: Former Soviet Union or also called SNG
Dir: directory, eg: 'A Dir' are of first N developed
DM: Direct Mail
F: fax
G: cv, job hunting; grant (from foundation/gov't)
H W: help wanted (advertising); new people needed ll:Innovationlnstitute
L: legal
Pls: please
N: Prod, Product # (usually one conceived by K a y s). Since about 1996 "NK" meansproduct,conceived by K a y s, and "N" means products and inventions in general.
Mk: marketing
Moss: *Moscow
Mu: Musical, music
J: Japan
R: research
Req / RQ: requirements; require
RF: Radio Frequency. * When feasible it includes Infrared transmission and reception. D: device# 1=tr/rc=tr/rc=device#2
SPB: St. Petersburg, Russia
T: Telephone, see' Parts'. Old definition: letter / *mail
TYO: Tokyo
U: you*, newer definition is: user
Ur: your
X: document: for publication, viewed by public 2: Product Idea Development 4: Public relations, articles 8: Check to see who is copying my ideas \: Diagram Parts -And or designating if a line is drawn between parts. See'
Parts' if no line is necessarily' drawn between parts in diagram. See' Parts'
** OLDER VERSION OF PARTS (FROM 1990-1992)
The newer version as in main ' Parts' superimposes the descriptions herein if there happen to be two different definitions for the same Parts.
A = and
AT = game piece communication, each player's piece communicates with each other and the central processing machine via air waves (probably not wire)
AT = and or
AU = for adult level 16 years old & over
B = has buttons (not mentioned if PP); "K"; *"R"
BA/KI/CH=for baby use 0-4 years old / kid 4-8 yrs / child 9-15 yrs
C = use products as helpful exercise companion & or guide, rule setter; "exercise". New version is "Computer", if doubtful about interpretation use "computer".
CS/BU/CL=for consumer / commercial use / client application
D = this is the old definition for "T" (telephony) ( built in (cellular or standard tel))
DA = has internal date, clock, timer needed for sw functioning; "tds"
DD = "S"; built in digital display (eg: LCD), may flip in for compactness .
DS = "S"; machine displays on crt, digital display, or print out (regular or thermal paper)
EP = electronic parts: product operates by use of microchips, processors & the other standard elements for this type electronic product; "C"; "basic"
EL = teaches practical (not necessarily psychological) skill. Definition used from late 1993 is el = electronic. "educ"
ET = new type of entertainment (entertain')
EXT Functions on flat or semi flat surface, table top, this option doesn operate on batteries, or vibration power.
FIN = finishes product option descriptions
GI = game for one person only
G2 = game for two people only
G23 = game for two or more people. G12 = for I or 2 people, G3 = three people only.
GGH = game gets harder. as user’s ability at condition improves or worsens, machine will compensate by: being easier, harder to play (in terms of skill, quickness.._)
HM/OF/SC=for home / office / school or laboratory use
IQ = special version for people with IQ within top 2% of population
JK = for use as humorous fun, an unusual novelty, entertain'*
M = Old definition: machine (product described within product # only). New definition that was applied to new writings as of 3.94: "MFH" [Main Frame Hook-Up]. The old definition is still found in writings made up MA/FE = for use by males / females
ME = memorizes previous input signals in its "C"
MI = The elements of this product are interchangeable with one(s) mentioned and or is based on the basics of the other.
NRL = not real life game, played by interfacing with electronic game and or board.
OD = telecommunication device working via air waves; "T:
PG = programmable by user (by keying into its plastic buttons) and or manufacturer; "pp"; "mp"
PO = built in printer prints out info/data/pictures onto paper, has paper tear edge, thermal or [regular] paper; "printer". "S"; *"fs"
RH = rhythm
RL = real life game, played in or outdoors, requires people moving' in an environment
SD = speaker telephone; new Parts "sp tel"; "T"*
SC = sound communicator: receives ("mic") and or sends ("osc") mechanical sounds, & or human words & or voices
SH = show
VC = person controls sound volume; "osc"
TD = technical descriptions
TO = toy use, entertain'
TK = for use as a fun trick, prank; ' entertain'*
TM = trade marks for product
TSC ="mic" (internal or external) records sounds facilitated by user (onto microchip or possibly tape), and can be played back in entirety or probably in edited or other altered format using built-in synthesizers; "osc"
UR = your
WH = which only when used in TM: separates word order, 1 st, 2nd...
ISL = operation, instructions & marketing in 18 languages: English, Japanese,
Spanish, German, French,
Chinese (Mandarin, Cantonese dialects), Russian, Arabic, Portuguese, Italian,
Greek. Plus the language families of Baltic, Slavic, Germanic, Iranian, Sudanese, Matayo-Polynesian and
Turkish.
OLDER VERSION OF PARTS (Up to 1995 or so)
CH ** = Also for children below the age 16. Newer part.
CM ** = Casing is of sleek quality metal with enamel coating.
CC ** = Creative casing design. -D: .......... Dots (...) are the plastic casing =IIIIIIII=
Colon bars (I) are the product
Boxed shape is too simplified, but to show casing is an outside covering. -OTD: Used up to maybe 1995. Snap on, or screw on pieces can be sculptured around the basic unit as decoration only. Pieces are of colorful plastic and or enameled metal. Pieces can only be snapped on in manners that don't obstruct normal usage of device, or cause danger. Casing might be molded and welded so as not to be changeable. See "Brain".
COLOR ** = -New definition - after Aug 1996: Any 1,000 or more standard colors / inks. +
See "Artist" and "Edit". -Old definition - before 1995: Color of item you touch changes, eg: caused by how changes in temperature effects liquid crystals. One or more of the following may change color: all or part of casing (a strip of liquid crystals), buttons, "display".
CP ** = Sleek quality plastic casing, safeguards against common hazards like: impacts, heat, discoloration, etc.
-D: ......... Dots (...) are the plastic casing 1111111. Colon bars (1) are the product
Boxed shape is too simplified, but to show that plastic casing is an outside covering.
CR ** = Casing of sleek strong and durable rubber, safeguards against common hazards. Similar to "cp".
CRC = Central computer ("C") of "Adaptive System" product number 1 D-010. * * PERIODICAL ABBRE V IATIONS
Intro: References are made to commonly used periodicals worldwide. The inventions developed herein are usually improvement inventions of those published. For diagram purposes: the improved inventions are juxtaposed vies a vis the published products.
DY ='Daily Yomiuri', Tokyo. * Also any includes any differing coverage within publisher's Yomiuri
Shimbun'. Article found in their New Products' section, in published weekly in the daily newspaper.
ES = Edmund Scientific' Sales Catalog. 101 E. Gloucester Pike, Barrington, NJ 08007 USA. Tel +1 609 5478880, Customer Service 609 573-6260, Fax 609 573-6295. Products mentioned in the Edmund Scientific 1995
Catalog are one example which may be incorporated in all or some of the inventions. ** There are occasionally multiple examples of such products in this catalog. Cover of this catalog has 15CIA' printed.
PS ='Popular Science', USA. Don't confuse this with "PS" for positioning system (if in real doubt then presume "PS" stands for "Positioning System".
QMRR = "Quirk's Marketing Research Review". -See "Quirk's Marketing Research Review: Practical Applications in Marketing
Research". Especially Feb 1996
Issue. 8030 Cedar Ave., 4229, Bloomington, MN 55425. Tel 612-854-5101. ISBN: 08937451. Has listings of related softwares, and companies with specialists capable of doing the programming, especially pages 78 to 85. -When QMRR is used in the Software Parts File. Especially see the software product classifications with same / related headings (listing about 10-20 existing softwares). -Definitions of functions used in marketing research softwares: survey (methods, questions, responses, "analysis"), environment, marketing research, customer profiles, (changes in) sales figures (eg: more and less of certain models being sold, tied to other changes in world/market/user) see "Quirk's" listed companies, and marketing research books.
NK ='Nikkei Weekly', Tokyo. -This product idea includes and is an extension of the product described in
Japan's Nikkei Weekly's (part of
Nihon Keizai Shimbun) New Products & Services' section which comprises one full page in most of their issues. -On occasion, an article will include and be an extension for Nikkei Weekly's
Science & Technology' section for said date.
EPO, USPTO and WIPO: Government patent databases linked from www.WlPO.int DTSW ="Directory of Technical Software Suppliers", published by: CAE
Consultants Inc. US Tel +1 914963-3695, Fax 914-376-5011. 41 Travers Ave., Yonkers, NY 10705 USA. This data also available at:
HTTP://www.caeconsultants.com Directory used was "up to date as of 1/1994".
CAE also offers free info on tel to locate suppliers.
Also see the less commonly used features file (was named Features *).
CONCLUDES THIS ABB-SYM FILE: Detailed Abbreviations & Symbol
File: Intro To Pat / Diagram Intro FIGURATIVE DRAWINGS INTRO TO OUR DRAWINGS WRITTEN IN TEXT CODE
Introduction To Finding Figurative Drawings (Drawings) In This Application:
Drawings ARE included in this filing. Most of the existing drawings, however, may not initially appear to be drawings to someone quickly flipping through the patent filing. Drawings are usually strings of parts on a single line; connected by dashes.
This largely covers informal drawings.
Example
Simplified example of computer diagram: USER -+ KEYBOARD --> CPU ---
CUSTOMIZED OUTPUT
Below: version of the above diagram you are more likely to see.
Details -Drawings can be found for each product description in Diagram Set 1, and/or in Diagram Set 2. Drawings are also with printed text. Most product descriptions starting with the "C
Directory" have drawings. -Features (Parts) are usually in "parentheses", and Features (Parts) from 1997 are preceded by an apostrophe.
See the Features (Parts) paper for details:
"=" connects Features (Parts) of diagram. The presence of the "=" signifies that such is a diagram *(clarification of its being a diagram may be made but is not necessary). To ease reading the first time, might be considered commas, especially when there is no space to the left of the symbol as with regular commas. E.g.: Activate the switch= then light turns on.
"/" diagonal slash means and /or'. The easiest way to read the description the first time, is bften to only read the first 'and/or' option, which allows the reader to more easily see the thought flow. * E.g.: Diagram: [part 1/part 2 = part 3 = part 4/part 5] is the same as a: >3< shape diagram; and b: can be split
D1: 1=3=4, D2: 2=3=5, with D1 & D2 being connected at part 3. No line is necessarily used in 1& 2, though a line is not excluded.
"( )" Material in these brackets is optional. The easiest way to read the text the first time is to almost ignore the brackets.
Sample diagram. Following is one ofthe drawings for this patent application: -Diagram: Person = Keyboard = Computer = Printer
* Drawing #1 & Drawing #2 mean two related drawings *(if they are in the same section), e.g.: D1, D2, D3... * Part numbers used in the diagram may also be used inside the related For
Techies or Other Technical Details (OTD) section - Other Technical Details. These diagram part numbers used in
For Techies: show that their
Features (Parts), are connected to that section of the diagram. * The "-" symbol is the same as the diagonal slash, except there is also the option for a line drawn between the two neighboring Features (Parts) separated by this wavy line symbol * The colon ":" symbol represents a line from the disclosure preceding it to the subset disclosure following it. * Each section within the For Techies section is created by semi-colon, separating it from any other material; hence each section is also read as a diagram and/or has its diagram merged with the other sections within the same For Techies . * Often the terms "then" and usually "In turn" are equal to "->" or "=". In other words these worded terms are equated with symbols for the diagram type structure. -As is viable, every part/block in each diagram for every electronic product idea in this filing surrounds the central computer-like device. Each electronic part, has an optional connection with a central computer ("C").
D: each and every electronic part of product idea ="tr"/"rc" = "c" = some other part involved with this product idea -"C" (Computer) is an optional inclusion for every central description in this filing requiring electronic hardware. As an OPTION, one or more of the multiple Features (Parts)' referred to in each such product's or part's description can be connected to this "C". Each apart' is a separate diagram (as if on a transparency, and they can be appropriately overlaid, intersecting at "C", to see the potentially complex system (there may be some repetition, hence the overlaying might be so that repetitions are overlaid over each other, so such parts/aspects are read once)). "C" is defined in Features (Parts) Files'.
-The reader knows printed matter is a diagram when any one or more of the diagram symbols are used.
Drawings are often preceded by the capital ' D'.
Diagram Examples: 3 Increasingly Detailed Versions Of Same Computer Invention
Version A: Simplified example of computer diagram:
User -> Keyboard -> CPU -> Desired Output
Version B: Semi detailed rendition of above computer diagram:
User -> Keyboard (user inputs information, data entered into computer in easy step process) -> Computer (software analyzes entered data) = Software edits the simplified inputted information into more abstract forms =
Software edits originally inputted diagram into different variations for each customized need = Computer digitally outputs different versions of the originally inputted diagram.
Version C: Complex rendition of above computer diagram:
User (Electronics Design Engineer or Patent Examiner) -> Keyboard (user inputs abbreviated format for what constitutes a diagram of two or more parts and or inputs the desired applications for inventions; data can also be entered into computer without tedious computer mouse) -> CPU (software analyzes entered data) = Software analyzes database of each entered part with its mu Itiple uses also shown in a pattern of branching trees (this database can be the invention tree) = Software converts originally inputted diagram into hundreds of types of drawings depending on the desired application) = Computer digitally outputs 8 million different versions for how invention(s) can be diagramed (constructed): 1) Newly created digitized files 2) (Color) printer 3) Computer screen 4) Software demonstrates in near virtual reality how the inventions would function. 5) Invention is constructed: 1) by clay carving device (cutter controlled by digitized files and other software programs to match the designated diagram); 2) automated software programming system (such as via using the "User Information Programming" software part)
END OF CODE FOR DIAGRAM EXPLANATION SECTION
File: Features Intro / Features *
LESS COMMONLY USED FEATURES: Read Later
Features primarily for inventions (inked to files A, B and to some extent C*.
They apply to the united pat application directly/indirectly.
DATE' = Our digital clock and calendar. It's the timer for our Digital Time
Stamp.
AIR PAD *= See Remote Control. Rarely used, hence delineated with an asterisk.
ALERTER = See "Notifier"
ALL = See "Basic"
APPLICATION / APPL / AP = Application. One of the alternate ways the inventions can be used. Also called "Api" - with single letter "p". *Patent Application.
AU ** = Also for adult level 16 years old & over.
BASIC ** = See appendix.
BILL / BILLING = Billing: Charges users by amount and type of usage. Limits billable usage by criteria.
BRATN = Feature name changed to Computer.
DISPLAY = Display Screen. This feature (also viewed as part) was re-titled to
FD-HDD = This feature (also viewed as part) name changed to "Computer".
FLOAT ** = The separate portable device floats in the air via special magnets.
The more portable part(s) of system have opposite rnagnets on each end. A letter 'C' shaped base also has magnets, which attract each of the ends of the piece in space. .2cm to 2cm of air is between the attracting magnets. Portable item is lightweight. Magnets and design are designed to withstand gravity and wind, and wearing down of magnet's forces for minimum five years. -Drawing: 1+ = 2- = 3= 4+ = 5-. -Drawing's Notes: 14 positive magnets; 25 negative magnets; 3 non magnetically conductive (between 1/2/4/5) which is the/part of product; 1& 5 are each at their individual ends of the
C' frame; one of the purposes of float is to create an interesting design (entertain); item which floats can be taken out from the "C" frame (used about premise/laid on table); cc. -"Tilt": controls position I functions% of floating object -Form of flotation = notifier / other form of communication to user.
Track = type flotation.
FX** = Fax capabilities. Also can send and receive via: Internet, modem (see mo), other (wireless) electronic mediums for data or text. -Built in facsimile machine, sending/receiving in different speeds. -Drawing: data/image = "sensor" = "C" = tr = printer -For Techies: air pad (sends and receives faxes); cart (how messages are sent and or received); "S"; "C"; uk. -o-C95 Fax machine screens out unwanted messages. See fax on display ("S"), print desired faxes. NTT 29 Mar 93 NK. Drawing: c95=tel-c-remote -4E020 Content Date Stamper: Registers and organizes previous occurrences.
LENS = See "Camera / Lens"
MO *= Modem. Modem: connects via tel ("T") with: @ other computers (mainframes), devices.
Drawing: remote/uk/display = c (computer's data) = data converter = tr/rc = data converter ="C" display/printer/function -For Techies: access required to begin mo communication; air pad commands mo; character; (data about transaction on) "S"; % entertain; "C"; % communicates with "M"; mouse; mp; notifier (shows mo transaction was or isn't completed successfully; the information or results achieved from the mo transaction); pp; output transferable to printer; tds (of mo transaction). -4E020 Content Date Stamper: Registers and organizes previous occurrences.
MD / MOOD * = The mood of users are induced by system to elicit the designated emotional feelings.
Read Later: Multi-media of system is designed to trigger designated reactions in humans or animals. -Diagram: adapt-Database collects information about users analyzer determines which multimedia mode best elicits designated emotion wanted in u (user) = achieving the desired results: users enjoys or finds system challenging, or more u (user) friendly [having adjusted to user’s behavioral pattern] guide or educate is more effective. -This function has become part of "ENTERTAIN", though "Mood" is a function, which can be separated from,
ENTERTAIN.
MOTION SOUNDER T"' ** = Makes sound upon movement of device.
Makes sound or music when sensor of device is agitated in any /'designated manner [ba of movement].
User programs type sound. See product number 5A-1050-042002. "Edit".
Drawing: motion "sensor" = "C" = osc/function/tr
US Patents [12.95 bib disk]: -str: (sound* or music*) adj 15 (motion* or move* or moving)
-US Patents: 5475372 Earthquake detector motion sensitive devices; ++ 5373096
Yamaha's Miburi: musical sound control device responsive to the motion of body portions of a performer [Yamaha later copied KN?].
MOUSE * = Changed to Remote Control.
MP = Changed to SPR [Program].
PI = Changed to UIP.
PP = Changed to SPR [Program].
PP = Personally Program [Old feature changed to SPR 9.97]:
Functions are personally programmable by user. User decides which programs to activate, deactivate, alter and or add.
Drawing: uk (programs) / remote ("R") = c(software / cart) = software function (assists user) -See "Brain". -"Billing": bills for what / how user programs the sw. -Access: "Access Controller" or legitimate accessor can alter needed "passwords" for themselves or other users.
PRINTER * = Prints desired information from system. -External printer adapter, card and software for standard printers.
Drawing: c = tr = signal converter = printing mechanism = prints onto material (such as paper) -For Techies: display ("S") shows software's menus for how user wants document typed; connects to computerized system utilizing "C"; pp; mp; uk; standard dot matrix or laser or color printers with their ink cartridges - basic; *portable printer; cp. C can tr to printer via wire / wireless. What's on "s" or "printer" can be seen on the other in full / similar / like manner, in entirety or part= as "designated" by: uip-tailor, pr, and k. -Printer=SW=notifier=C: if (w5) printer lacks enough ink of particular color in cartridge before user: tries to print / expands image RC *= Receiver. Receives signals from Str (transmission).
RCP ** = Sleek rectangular prism casing (semi-box shaped). Tabletop variants have 4 rubber pieces on bottom corners, gripping counter.
SPEECH *= Included into "OSC". This function can be separated from the other osc (outgoing sound communicator) modes. If "speech" is in system then there is an option for "osc", eg: "speech" -> "C" -> "osc". % See "Brain".
SP TEL = Speaker tel ("T"). Device's microphone ("mic") adjusts volume of incoming sound according to sound source's distance from microphone ("mic"). tr="T"-c=osc -"Billing": bills for what / how system' picks up.
STEREO = Sound System. Music/Sound source (pre-recorded music, broadcast) =
Player (CD, Digital Tape,
Cassette Tape, Phonograph, Radio Receiver) = Amplifier = Speakers/I-Iead
Phones
Drawing: mic/tr = signal converter = c-recorder = play back = signal converter amplifier = osc (outgoing sound communicator) (speakers)
TOY *= May also function as a toy. For Techies: The process of having an interesting time is new and interesting from the experiential point of view; %interactive; multi-user; notifier; mp; uk, "Brain". "Billing": bills for time used / "accessed".
VC *= Volume control: user pre-selects speaker sound volume. -Drawing: knob/button = tr = c (controller) = amplifier = osc
VOICE ANALYZER = See "Sound Analyzer".
VIBRATION = Vibration generated by device for specific reasons, eg: "entertainment"; "notifier"; form of communication for: "status", "score", a simple presence or lack of whatever user may need (to know) such as a yes or no - or on or off- or good or bad. See "Access" ="Vibration".
Check The Simple Handy Version Of The Main Features, plus our Abbreviations &
Symbols. Kindly visit www.LicenseltToday.com for updates, etc.
File: Features Intro / Feature Synonym SYNONYMOUS TERMS FOR OUR MAIN FEATURES (This may be an easier way for non-technical people to understand features used in our interesting inventions)
Introduction: Main feature sections are listed alphabetically. Synonymous terms herein sometimes include a tiny fraction of the applicable US Patent Classification numbers.
Alternatives & Keywords for ACCESS feature: admission, admittance, approach, avenue, connection, contact, course, door, entrance, entree, entry, introduction, key, open door (slang), passage, path, road, route, way US Patent Classification code for Access: 726.4 Information Security /
Authorization
Alternatives & Keywords for ADAPTING feature: acclimate, accommodate, accustom, alter, change, come around, comply, conform, familiarize, fashion, fit, habituate, harmonize, make, match, modify, prepare, qualify, readjust, reconcile, remodel, revise, shape, shape up (slang), square, suit, tailor
US Patent Classification code for Adapting: 715.789 Data processing: presentation processing of document, operator interface processing / based on usage or user profile
Alternatives & Keywords for ALERTER feature: observant, on guard (slang), security, warn, notify, watch, help protect.
US Patent Classification for ALERTER: 340.825 Communications: Electrical, subclasses 825 through 825.98 for controlling one or more devices to obtain a plurality of results by transmission of a designated one of plural distinctive control signals over a smaller number of communication lines or channels,
Alternatives & Keywords for ANALYZER feature: assay, chew over (slang), confab (slang), consider, estimate, evaluate, figure, figure out, hash (slang), inspect, interpret, investigate, judge, kick around (slang), rehash, resolve, scrutinize, sort out, spell out, study, test, think through
US Patent Classification for ANALYZER: 706.14 data processing: artificial intelligence / adaptive system .
Alternatives & Keywords for APPLICATION feature: appliance, appositeness, employment, exercise, exercising, function, germaneness, operation, pertinence, play, practice, purpose, relevance, usance, utilization, value
Altematives & Keywords for ART feature: abstraction, designing, illustrating, imitating, modeling, molding, painting, pictorialization, portraying, representation, sculpting, shaping, simulating, sketching, symbolization,. composer. US Patent Classification for ART: 382.159 Image Analysis /Trainable classifiers or pattern* recognizers
Alternatives & Keywords for ASSOCIATION feature: affiliation, alliance, band, brotherhood, bunch, circle, clan, clique, club, coalition, combination, combo, company, confederacy, confederation, congress, cooperative, corporation, crew, crowd, family, federation, fellowship, fraternity, gang, guild, hookup (slang), league, order, organization, outfit, partnership, pool, rat pack (slang), ring, society, syndicate, tie-in, tie-up, tribe, troops, troupe, union, counterpart, companion likeness, equivalent, equal, copy, reproduction, clone, duplicate, fellow, accessory, accomplice, affiliate, aid, ally, assistant, co-operator, companion, compatriot, comrade, confederate, consort, crony, fellow, friend, helper, partner, peer, sidekick US Patent Classification Code for Association: 706.46 Data processing:
Artificial Intelligence / Knowledge representation and reasoning technique
Alternatives & Keywords for BEHAVIOR ANALYZER feature: watch, psychology, sociology, anthropology, delivery, demeanor, deportment, ethics, etiquette, expression, form, habits, management, mien, mode, morals, nature, observance, performance, practice, presence, propriety, role, routine behavior, desires, needs, cravings, seek, want. US Patent Classification Code for BEHAVIOR
ANALYZER: 706.14 Data
Processing, Artificial Intelligence/Adaptive System
Alternatives & Keywords for CARTRIDGE feature: diskette, floppy disk, hard disk, hard drive, magnetic drum, magnetic tape, magnetic tape unit, magneto-optic disk, optical disk, primary storage
US Patent Classification Code for CARTRIDGE: 706.11 Data Processing
Intelligence / Having Particular
User Interface
Alternatives & Keywords for COMPOSE feature: author, bang out (slang), cast, comp, conceive, contrive, cook up (slang), design, devise, discover, draw up, dream up, fabricate, forge, form, formulate, frame (slang), ghost (slang), ghostwrite, imagine, indite, invent, knock off (slang), knock out (slang), make up, note down, orchestrate, originate, pen, poetize, produce, put down, score, scribble, script, shed ink, time, turn out, whip up (slang), write
US Patent Classification Code for COMPOSE: 706.22 Data Processing,
Artificial Intelligence / Signal processing (e.g., filter)
Alternatives & Keywords for COMPUTER feature: adding machine, analog, brain (slang), calculator, clone, compatible, data processor, digital, electronic brain (slang), laptop (slang), mainframe, micro (slang), microcomputer, mini (slang), minicomputer, number cruncher (slang), personal computer, thinking machine (slang)
Alternatives & Keywords for CONTENT ANALYZER feature: composition, constitution, matter, subject matter, substance
US Patent Classification Code for CONTENT ANALYZER: 706.54 Data Processing,
Artificial Intelligence /
Analogical reasoning system:.
Alternatives & Keywords for COORDINATOR feature: accommodate, adjust, agree, attune, combine, conduce, conform, correlate, harmonize, integrate, match, mesh, organize, pool, proportion, pull together, reconcile, reconciliate, regulate, shape up, synchronize, systematize, team up
Alternatives & Keywords for DESIGNATED feature: allocate, allot, appoint, apportion, appropriate, assign, authorize, button down (slang), characterize, charge, choose, commission, connote, constitute, define, delegate, denote, depute, deputize, describe, dictate, earmark (slang), elect, evidence, favor, finger (slang), indicate, individualize, make, mark, mete, name, nominate, opt, peg (slang), pick, pin down, pinpoint, prefer, reserve, select, set apart, set aside, show, single, slot, stipulate, tab (slang), tag (slang), tap (slang)
US Patent Classification Code for DISTANCER: 361.179 Electricity, electrical systems and devices/Proximity or contact:
Alternatives & Keywords for EDITOR feature: adapt, alter, amplify, analyze, annotate, arrange, assemble, assign, blue-pencil (slang), censor, check, choose, compile, compose, condense, copy, correct, cut, delete, discard, doctor, draft, emend, excise, feature, fine tune, finish, fly speck (slang), go over, make up, polish, prepare, prescribe, proofread, publish, put together, rearrange, recalibrate, rectify, redact, regulate, rehash, rephrase, report, revise, select, set up, strike out, style, tighten, trim
US Patent Classification Code for EDITOR: 715.530 data processing: presentation processing of document, operator interface processing, and screen saver display processing/edit, composition, or storage control:
Altematives & Keywords for EDUCATION GETS HARDER feature: Gargantuan (slang), ambitious, arduous, backbreaking,bothersome, burdensome, challenging, crucial, demanding, difficult, effortful, exacting, formidable, galling, hard, hard-won, heavy, Herculean, immense, intricate, irritating, labored, laborious, mansized, not easy, onerous, operose, painful, problem, problematic, prohibitive, rigid, severe, stiff, strenuous, titanic, toilsome, tough, troublesome, trying, unyielding, uphill, upstream, wearisome, abstract, abstruse, baffling, bewildering, complex, confounding, confusing, dark, deep, delicate, enigmatic, enigmatical, entangled, esoteric, hidden, inexplicable, involved, knotty, labyrinthine, loose, meandering, mysterious, mystical, mystifying, nice, obscure, obstinate, paradoxical, perplexing, profound, puzzling, rambling, subtle, tangled, thoray, ticklish, unclear, unfathomable, unintelligible, vex, boorish, dark, fastidious, fractious,fussy, grim, impolite, intractable, irritable, obstreperous, perverse, refractory, rigid, rude, tiresome, unaccommodating, unamenable
Alternatives & Keywords for ENTERTAIN/ENTERTAINMENT feature: amusement, ball, beguilement, delectation, delight, disport, dissipation, distraction, divertissement, enjoyment, entertainment, field day (slang), frivolity, fun, game, gratification, grins (slang), high time (slang), hoopla (slang), laughs (slang), levity, merrygo-round (slang), pastime, picnic (slang), play, pleasure, relaxation, relish, sport, whoopee (slang)
Alternatives & Keywords for ENVIRONMENTAL PROTECTION feature: ecology, environmental control, environmental impact analysis, environmental management, environmental monitoring, environmental policy, environmental science, environmentology .
Alternatives & Keywords for EXERCISE feature: act, action, activity, calisthenics, constitutional (slang), discharge, discipline, drill, drilling, effort, examination, exercising, exertion, gym, labor, lesson, movement, occupation, operation, performance, problem, pursuit, recitation, schoolwork, study, task, test, theme, toil, training, warm-up, workout
Alternatives & Keywords for GAME feature: competition, contest, match, meeting, round, set, tournament, adventure, amusement, athletics, distraction, diversion, enterprise, festivity, follow-the-leader, frolic, fun, jest, merriment, merrymaking, occupation, pastime, piddly, plan, play, proceeding, pursuit, recreation, romp, scheme, sport, sports, undertaking
Alternatives & Keywords for GPS feature: X, area, bearings, district, environment, fix, geography, ground, locale, locality, location, locus, point, post, reference, region, scene, seat, setting, site, situation, space, spot, stand, station, surroundings, topography, tract, whereabouts
Alternatives & Keywords for GUIDE/GUIDANCE feature: adviser, attendant, captain, chaperon, cicerone, conductor, controller, convoy, counselor, criterion, director, docent, escort, example, exemplar, exhibitor, genie, genius, guiding spirit, guru, inspiration, lead, leader, lodestar, master, mentor, model, monitor, paradigm, pathfinder, pattern, pilot, pioneer, rudder, scout, standard, superintendent, teacher, usher, vanguard advice, auspices, conduct, conduction, control, conveyance, counsel, direction, government, help, instruction, intelligence, leadership, management, navigation, supervision, teaching
US Patent Classification code for GUIDE: 706.11 data processing - artificial intelligence/http://www.uspto.gov/go/classification/uspc706/sched706.htm -
C706S011000having particular user interface
Alternatives & Keywords for INTERACT feature: collaborate, combine, connect, contact, cooperate, interface, interplay, interreact, join, merge, mesh, network, reach out, relate, touch, touch base (slang), unite, approach, call, connect, get, interface, reach, speak to, talk, telephone, visit, write
Alternatives & Keywords for LOCATOR feature: come across, come upon, detect, determine, discover, establish, ferret out (slang), get at, happen upon, hit upon, hook (slang), light upon (slang), meet with, nose out, pin down, pinpoint, place, position, read, scare up, search out, smell out, smoke out (slang), spot, station, strike, stumble on, track down, trip over (slang), uncover, unearth, zero in
Alternatives & Keywords for MFH feature: analog, brain, data processor, electronic brain (slang), microcomputer, mini (slang), minicomputer, number cruncher (slang), personal computer, thinking machine (slang)
Alternatives & Keywords for NOTIFIER feature: acquaint, advise, alert, announce, apprise, assert, blazon, brief, broadcast, cable, caution, circulate, clue in, convey, cue, debrief, declare, disclose, disseminate, divulge, enlighten, express, fill in, give, herald, hint, let know, make known, mention, pass out, post, proclaim, promulgate, report, reveal; send word, speak, squeal, state, suggest, talk, teach, tell (what happened), tip off, vent, warn, wire, wise up (slang), write
US Patent Classification for NOTIFIER: 340.825 Communications: Electrical, subclasses 825 through 825.98 for controlling one or more devices to obtain a plurality of results by transmission of a designated one of plural distinctive control signals over a smaller number of communication lines or channels,
Alternatives & Keywords for ORDER &TIMING feature: pattern, sequence, order (of events), history (which shows patterns ofbehavior- helps predict future).
US Patent Classification Code for ORDER & T[MING: 706.14 Data Processing,
Artificial
Intelligence/Adaptive System
Alternatives & Keywords for OSC feature: accent, din, harmony, intonation, loudness, modulation, music, noise, note, pitch, racket, report, resonance, reverberation, ringing, softness, sonance, sonancy, sonority, sonorousness, static, tenor, tonality, tone, vibration, voice, acquaint, advertise, advise, announce, broadcast, carry, connect, contact, convey, correspond, declare, disclose, discover, disseminate, divulge, enlighten, get across, hint, impart, imply, inform, interact, interface, let on, let out, make known, network (slang), pass on, phone, proclaim, publicize, publish, raise, reach out, relate, report, reveal, ring up, signify, spread, state, suggest, tell, touch base (slang), transfer, transmit, unfold, writ
Alternatives & Keywords for PREDICT feature: adumbrate, anticipate, augur, conclude, conjecture,=crystal ball, divine, dope, dope out, envision, figure, figure out, forebode, forecast, foresee, forespeak, foretell, guess, infer, judge, portend, presage, presume, prognosticate, prophesy, psych out (slang), read, see coming (slang), size up (slang), soothsay, suppose, surmise
US Patent Classification for PREDICT: 706.14 data processing: artificial intelligence / adaptive system
Alternatives & Keywords for PROGRAM feature: design, instructions, line, order, policy, polity, procedure, project, scheme, sequence
Alternatives & Keywords for PS-ZONE feature: area, band, belt, circuit, ground, realm, region, section, sector, segment, sphere, territory, tract
Alternatives & Keywords for QUESTION feature: examination, feeler, inquest, inquiring, inquiry, inquisition, interrogation, interrogatory, investigation, poll, query, questioning, third, third degree (slang), wringer (slang)
Alternatives & Keywords for ROUTE feature: address, conduct, consign, convey, direct, dispatch, escort, forward, guide, lead, pilot, remit, see, send, shepherd, ship, show, steer, transmit
Alternatives & Keywords for SCREEN feature: cathode ray tube, CRT, display, graphics terminal, monitor, screen, VDT, VDU, video display unit, video terminal
Alternatives & Keywords for SCORE feature: account, addition, aggregate, amount, average, count, final count, grade, mark, number, outcome, points, rate, reckoning, record, result, stock, sum, summary, summation, tab, tally
Alternatives & Keywords for SEEK feature: be after, bob for, cast about, chase, comb, delve, delve for, dig for, dragnet, explore, fan, ferret out, fish, follow, go after, gun for, hunt, inquire, investigate, look about, look around, mouse, nose, prowl, prowl after, pursue, quest, ransack, root, run after, scout, scratch, search for, search out, smell around, sniff out (slang), track down
Altematives & Keywords for SOUND ANALYZER feature: accent, din, harmony, intonation, loudness, modulation, music, noise, note, pitch, racket, report, resonance, reverberation, ringing, softness, sonance, sonancy, sonority, sonorousness, static, tenor, tonality, tone, vibration, voice, assay, chew over, consider, estimate, evaluate, figure out, hash, inspect, interpret, investigate, judge, sort out, spell out, study
US Patent Classification Codes for SA: 701.231 Data Processing: speech signal processing / Recognization
Alternatives & Keywords for VA feature: equivalent, facsimile, likeness, match, model, photograph, picture, portrait, similitude, spit, spitting image, mental picture, perception, vision
US Patent Classification Codes for Sound Visual Analyzer: 704.235 Speech to image
Alternatives & Keywords for STATUS feature: existing condition, how things stand, no change, parameters, present state of affairs, situation, size of it, standing, state of affairs, status, status in quo, usual, score
Alternatives & Keywords for SYNTHESIZER feature: amalgamate, arrange, blend, harmonize, incorporate, integrate, make whole, manufacture, orchestrate, symphonize, unify, complement, fit, go with, suit, synthesize,
Alternatives & Keywords for TELEPHONY feature: car telephone, cell phone, cell telephone, cellular phone, digital telephone, field telephone, satellite telephone, wireless telephone
Alternatives & Keywords for TAG feature: add, adjoin, affix, annex, append, attach, check, christen, designate, docket, dub, earmark, hold, identify, mark, name, style, tack, tally, tap, term, ticket, title
Alternatives & Keywords for TAILOR feature: custom-built, custom-fit, custommade, designer, made-tomeasure, perfectly fitted, tailored, accommodate, adapt, alter, conform, convert, custom-make, cut, dovetail (slang), fashion, fit, modify, mold, quadrate, reconcile, shape, shape up, square, style, suit, tailor-make
Alternatives & Keywords for THERAPY GETS HARDER feature: analysis, cure, healing, medicine, remedial treatment, remedy, therapeutics, treatment, (slang) See EGH
Alternatives & Keywords for TRACK feature: footmark, footprint, footstep, groove, path, record, trace, tract, trail, tread
Alternatives & Keywords for USER feature: final user, ultimate consumer, client, consumer, customer, end user, patron, prospect, purchaser, representative, shopper, user, vendee
Alternatives & Keywords for USER KEYS IN feature: bat out, beat out, copy, dash off, teletype, touch, touchtype, transcribe, typewrite, write, inscribe, insert, intercalate, interpolate, introduce, list, log, note, post, put in, register, set down, take down
Alternatives & Keywords for ZONE feature: line of demarcation, neutral territory, neutral zone , belt, block, city, county, division, domain, dominion, enclosure, field, locality, neighborhood, parcel, patch, plot, precinct, principality, quarter, section, sector, sphere, state, stretch, territory, township, tract, turf, vicinity, ward
File: Features Intro / IMI Pat
PARTS - WITH RELATED PATENTS:
* Intro: All patents are US unless otherwise noted. See file "Introductory
Notes - Less Important" for help in reading this file.
ACCESS = Gain access to electronic product's controls with a correctly keyed in combination. -kw: access*, computer*, entry, (gain* or keyless) adj3 (access* or entry), password*, interactiv* --toy*, fun, play*, child*, kid*, image*, imaging, create, creating -str: (achiev* or obtain* or accomplish* or get [or gets or getting] or gain* or keyless) adj3 (access* or entry) -str: password* and (access* or entry). Str: security* and access*. Str: (draw* or create or creating) adj9 (access or accessing)
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry system into car 5319364 507402 = "c" 5450524 5206905
Improvement on patents: -Patent: 5247497 Security systems based on recording unique identifier for subsequent playback. Information provided by U to system when they last entered is played back so U knows if someone else gained access previously. Assignee: Octel [big co]. --improvements: -U = This N Sys (Patent: 5247497) - C
ACCESS () 1/ ANALYZER () I/ EDIT Q// NR (u nr when (w5) u didn't check to see what their'unique identifier' (5247497 type input) was during their last session, sys is of no use if u doesn check, and best if u checks each time) // OSC () // PR () // PS-Zone (sys "tracks" w5 u moved and or what they did (uip, gps))
Q () // R() // ROUTER () // SCORE (ups previous score or "status" or "TDS" (previous usage) can be a unique identifier - this automatation helps the less creative /-lazy u) //
STATUS TDS () // T()
TRACK () // UIP 0.
BA = Behavior Analyzer. Analyzes live behavior of people.
-behavior* psycholog*, sociolog*, movement [moves, moving, move] -animal*, human*, person*, people* -study*, studies, analyz*, monitors, monitoring str: (behavior* psycholog*, sociolog*, movement [moves, moving, move]) and (animal*, human*, person*, people*) and (study*, studies, analyz*, monitors, monitoring) -US Patents: 5465115 Video traffic monitor for retail establishements & the like; 5433612 Electronic accountability system - "tracks" u and equipment = "ps-zone" / "track" / "uip" (develops uip-db); 5428392; 5426425 Intelligent locator system = track / ba / ps; 5424745 Detection method and system = track / ba / ps; 5386990; + 5250941 Customer activity monitor / 5245314 Location monitoring system = ps / ps-zone / track /
Improvement on US Patent: 5377258 Method and apparatus for an automated and interactive behavioral guidance system: u receives motivational messages (osc) to improve behavioral patterns; includes client db (uip); voice stress "analyzer"; client response required] -OTD (Other Technical Details) D: U= This N Sys (BA / 5377258) -C=
ACCESS () II ANALYZER () // EDIT (sys edits out less needed input from: u, uipdb) // NR (penalizes u when u acts poorly (undesirable behavior) = electric shock to body / "entertainment" sys N usage is limited (see
KN)) Il OSC (penalizes via harsh sounds = synth) // PR () // PS-Zone (u trained where its safe / u is not needed for work, eg: home, coffee room, recreation room, tv room) 1/ Q (to build uip-db = needed by sys to train u) R () // SCORE (how well ups behavior is altering) // STATUS (of ups behavior) // TDS (w5 u behaved -> builds up UIP-DB) I/ TRACK // UIP.
BALANCE = Speakers' volume adjusts according to where person sits. System uses central point for two or more people. str: balanc*, audi*, speakers. +-j- US Patents: 5287102 "Whenever the pointer islocated between teh leftmost and rightmost icons, the volume is balanced substanially equally between the two speakers" I.B.M. = "Balancer"
TRACKER = Sys tracks or monitors actions of user, or system. -US Patents for BA / "Track": 5465115 Video traffic monitor for retail establishements & the like; 5433612
Electronic accountability system
- "tracks" u and equipment = "ps-zone" / "track" / "uip" (develops uip-db); 5428392; 5426425 Intelligent locator system = track / ba / ps; 5424745 Detection method and system = track / ba / ps; 5386990; + 5250941
Customer activity monitor / 5245314 Location monitoring system = ps / ps-zone / track / ba.
Improvement on US Patent:
5377258 Method and apparatus for an automated and interactive behavioral guidance system: u receives motivational messages (osc) to improve behavioral patterns; includes client db (uip); voice stress "analyzer"; client response required]
-OTD (Other Technical Details) D: U = This N Sys (BA / 5377258) - C
ACCESS () // ANALYZER () // EDIT (sys edits out less needed input from: u, uipdb) // NR (penalizes u when u acts poorly (undesirable behavior) = electric shock to body / "entertainment" sys N usage is limited (see
KN)) // OSC (penalizes via harsh sounds = synth) /I PR () // PS-Zone (u trained where its safe / u is not needed for work, eg: home, coffee room, recreation room, tv room) // Q (to build uip-db = needed by sys to train u) // RO // SCORE (how well ups behavior is altering) // STATUS (of ups behavior) II TDS (w5 u behaved -> builds up UIP-DB) // TRACK // UIP.
END THIS PARTS WITH RELATED PATENTS FILE
File: Features Intro / IMI Tie 2 MANY FEATURES W/ SOME OF THEIR MAIN SUB-FEATURES LISTED
Introduction: Main ways parts can link/tie together. -How to use this file: Focus more on sub-parts without stars, and sub-parts that help develop the main part [versus how the main part helps other parts, since latter should have the reference under it]
-Parts labeled with *, are hopefully main sub-parts needed to make its main part family function. To reduce confusion, avoid using this file so sub-parts show how the main part helps another part; in other words, subparts are listed to help develop main part's sub-parts and possibly reduce repetition between similar main parts. -Parts labeled with * are only part of tie-ins with possible stars. -Purposes of this file: Non-star parts might need merging and better redefinitions. Ignore most of the *labeled sub-parts.
MAIN FEATURE FOLLOWED BY SUB-FEATURES STARTS HERE:
ACCESS = brain order & timing nr (notifier alerts user) q sa track
ANALYZER = coordinator router *order&timing *seek&react
Subsets of analyzer: coordinator; behavior analyzer; seek & *react; sound analyzer; 'uip (somewhat a type of analyzer); visual analyzer. -{- Nature of situation [that isn't completely wired into analyzer] is understood via multiple sensors, eg: sound and visual analyzers. See sensors.
ARTIST =*character *experience image mm *screen toy va
BEHAVIOR ANALYZER = experience *guide *Multi-User Predict *sa *Seek&React *status tgh *track uip *va
BALANCER= distancer osc ps zone
BILL / BILLING = score status tds track
CAMERA = Visual Analyzer See: Artist
CARTRIDGE =
CHARACTER = *experience image
CLAP = r
COMPOSITION (of sounds) = synth *sa *mic *dance *entertain experience motionsounder *osc *sensor tilt toy vibration vr *wa
COORDINATOR = analyzer router *guide *seek&react *status *uip- tailor. This is a subset analyzer.
Sensor = coordinator: analyzes multiple sensors to get better understanding of situations.
DANCE = composition *distancer exercise locator motion-sounder zone tilt toy
DATA BASE = *analyzer *ba predict *sa *score *ids *uip *va
DISTANCER = balancer *dance *game locator motion-sounder ps *sensor.
EDIT = artist *camera *character image *mm *router uip-tailor va
EDUCATION = analyzer *ba guide *mood predict score status tgh uip- tailor
ENTERTAINMENT = *exercise mood *toy *vr
EXERCISE = *ba *dance
EXPERIENCE = entertain
GAME % = artists-crawl *ba character tilt GUIDE = analyzer education *interactive *score tgh uip-tailor
INTERACTIVE = *r seek&react sensor uip-tailor
K (Control via keys) = clap dance *interactive R (remote control's analyzer adapts to user) tilt *zone
LOCATOR = see: distancer
MD / MOOD = BA (behavior analyzer) entertain experience
MIC = osc sa synth
MODEM =
MORNING = BA (behavior analyzer) entertain exercise experience interactive nr *osc R (remote control's analyzer adapts to user) *score seek&react sensor *ids tgh tilt *zone
MOTION SOUNDER = compose dance distancer *osc vr
MULTI-USER * = BA (behavior analyzer) *cart *edit
MM / MULTIMEDIA = artist camera composition edit
NOTIFIER = access *interactive score seek&react status track uip- tailor vibration
ORDER & TIMING = access analyzer morning seek&react sound-analyzer score status tds uip visual-analyzer zone. See: Sound Analyzer; Access.
OSC (Outgoing Sound Communicator) = balancer synth
PD (Positioning Device, GPS) = see distancer
PREDICT = *analyzer BA (behavior analyzer) *coordinator *education *guide * interactive *order&timing *q *route *seek&react *sa *ids uip w5
Q = analyzer *db *education guide *interactive *predict uip
R = access clap *interactive see-k sa tilt *track *uip VA (visual analyzer seeks reacts to designated images) *zone
ROUTER = *analyze *ba *coordinator guide *sa *score tel *track uip *va
SCREEN = interactive-k nr replaces-osc*
SCORE = *analyzer ba *bill seek&react status *ids
SEEK & REACT = analyzer ba interactive motion-sounder nr (notifier alerts user) *order&timing *score sa *status *ids track uip zone
SENSOR = *analyzer mic *motion-sounder *order&timing *predict score seek sa status *ids *tilt *track uip vibration va *zone
SOUND ANALYZER = analyzer ba interactive k locator *nr predict score seek&react sensor status
STATUS = analyzer bill score sensor tds *uip *zone
SW (Software) = *analyzer *cartridge *coordinator *db *interact *score *status *ids
SYNTHESIZER = *analyzer *ba compose-overlapping *entertain *exper *interactive mic motionsounder osc *predict sa uip
TEL = *interactive *mic *modem *osc *router *sa
TDS (Time Date Stamp) _
TGH (Therapy Gets Harder) =*analyzer BA (behavior analyzer) *coordinator education *entertain *game *guide interactive *multi-user *order&timing predict q *router *seek&react status uip
TILT = artist *balancer *composition dance distancer interactive *motionsounder R(remote control's analyzer adapts to user) sensor vibration
TOY = artist *distancer education entertain exercise experience game mood motion-sounder seek&react tgh vr TRACKER = access *analyze ba *bill distancer *guide locator multi-user nr (notifier alerts user) *order&timing ps *predict router score *seek&react sensor sa status tds uip VA (visual analyzer seeks & reacts to designated images) w5 zone
U (User) % = Systems that can be users in addition to people: access (accessing system part or personl *game multi-user R(remote control's analyzer adapts to user) router [what's being routed] sa [what makes the correct sound can use system] tel [accesses system via tel] uip [whatever meets the uip profile, becomes an accessor]
UIP (User Information Programming) = UIP-Access, UIP-BA, UIP-Edit, UIP-DB, UIPRouter, UIPTailor+, UIP-Track. UIP applies to all IMI.
UIP = UIP-Access, UIP-BA, UIP-Edit, UIP-DB, UIP-Router, UIP- Tailor+, UIPTrack
VIBRATION =*dance *exercise interactive motion-sounder r tilt vr
V ISUAL ANALYZER = *analyzer artist camera *guide * interactive mm *predict R (remote control's analyzer adapts to user) screen score status
VR % = *balancer dance *distancer *entertain *exercise *interact *locator motion-sounder mm predict r router screen *score *seek&react sensor *sa *synthesizer *tgh tilt toy uip *va wa *zone
WA = *exercise *nr *osc *sa *tel toy vr zone ZONE = access ba balancer dance * distancer *locator *route *score *status tds tracker uip visual-analyzer wa
CONCLUDES FILE ON HOW FEATURES CAN LINK TO MAIN SUB-FEATURES
File: Features Intro / IMI Exist 2
EXISTING PRODUCT EXAMPLES RELATED TO OUR FEATURES IN 1996 *
Introduction: -Products listed in this file% exist, and exemplify optional embodiments of the parts as mentioned in descriptions of new inventions. -Product description can also include new inventive material based upon / correlated with the existing products.
* The part heading to which the existing products are tied are part of the "branching system" as described in the main "Introduction to product descriptions". Manufacturers are probably in
America unless otherwise mentioned. Any dates directly tied to existing products are probably the date(s) when its product publicity was published. Brief description of each part pre-cedes existing products only to help familiarize reader on general orientation of part.
ACCESS = Gain access to electronic product's controls with a correctly keyed in combination. -Electronic fence: keeps pets away from underground voltage wire, since dog's collar emits negative signal when dog comes near. Replaces need for common fences. Sold by Alsto's at 800 447-0048, and Contrad
Industries 800 704-1121, and Sharper Image. 94-9/95. --unauthorized people can / can't = gain physical "access".
COMPOSITION *= Electronic Music Composition: Another variation of product can also be used to create interesting music. -Interactive virtual guitar computer game: If you manage to play along to the songs correctly, you advance to a higher level of music playing. See preset images as you play. Sold via Skymall at 800-424-6255, #63004'94-
NOTIFIER = User is notified on the status of any situation. -Gadget lights up during earthquakes. Sold by Innovative Electronic Solutions
Intel, VA. SF Chronicle Feb 1,
+--"Track": states if type occurrence occurred within (which) designated area, eg: breaking glass, other breakins, fire (temperature sensors), chemical accidents/leaks.
-"Notifier" signals when train tracks are blocked: laser lights notice any blockage. Nikkei Weekly - before early 95. Developed via Japan Aviation Electronics Industry Ltd and Eas'Japan
Railway Co. -Car owner "notified" when their car is being broken into. Nikkei Weekly - before early '95, under article titled "Crime rise boosts sales of auto anti-theft devices. -Alarm sounds when "notifier" detects slight changes in air current within car. Sumitomo Metal Mining Co,
Japan. Nikkei Weekly - before early '95, under article titled "Crime rise boosts sales of auto anti-theft devices. -"Notifier" seeks changes in infrared radiation (body heat) emitted inside car. Nikkei Weekly - before early'95, under article titled "Crime rise boosts sales of auto anti-theft devices. -Auto voice dialer alarm: when motion detector ("sensor") activated = predetermined telephone numbers are dialed = receiver hears pre-recorded message, eg: this is John, my home at ---- is being broken into.
Existing Canine Systems:
Introduction: Also applies to parts%: R, Access, Track. -Stop excess barking by emitting high pitch sound. Sold by Alstos at 800 4470048.'94-9/95.
-Electronic fence: keeps pets away from underground voltage wire, since dog's collar emits negative signal when dog comes near. Replaces need for common fences. Sold by Alsto's at 800 447-0048, and Contrad
Industries 800 704-1121, and Sharper Image. 94-9/95. -Prerecorded dog barking heard when someone comes near, eg: as detected by motion "sensor". Sold by
Sharper Image 6/94, # S1600; and Contrad Industries 800 704-1211.
OSC = Outgoing sound communicator signals user when a function within the device occurred. -Wireless speakers: pick and go almost anywhere (within home), #45121W & 53111
W. Also wireless headphones, #53577W. Sold by Hammacher Schlemmer '94295. Speakers also from
Contrad Industries and many other manufacturers. -Device mutes car stereo for incoming and outgoing calls on your cellular phone. Contrad Industries 800 704-
--OSC is stopped / volume reduced when certain / important occurrences happen, eg: alarm, bell rings (tel, door, alarm, (cooking) timer).
R = Remote Control -Datalink Watch: Downloads information from your computer. Store appointments, tel numbers, to-do lists...
Made by Timex, USA. -Wireless computers mouse that is moved in 3-D within room. Manufacturer unknown. (Maybe another co other than Creative Lab.) -Pass hand in front of stereo activates snooze function (turning off sound).
By Magnavox, sold by Wireless at 800-726-8742 #31014'94-95. -Adjust angle of tv via remote control. Sold by Skymall at 800-424-6255. #63004. '94-95. -(Video camera)'s controlled by eye movements via its = "sensor". KN: for controlling any other electronically hooked up system. Canon. SF Chronicle Aug 17, 95, page c3, Col. 1. -Voice Command Remote Control. Trade name: VCR Voice Programmer. Sold via
Hammacher Schlemmer 9/94, #53554W. Also sold by Contrad Industries at 800 704-1211. -Leapfrog: Converts (infrared) remote signal to (radio) frequency. Enables the signals to pass through obstacles. Contrad Industries 800-704-1211. '94 - early '95. Earlier KN (invention(s)) too?
TRACK = Sys tracks or monitors actions of user, or system. -Gadget lights up during earthquakes. Sold by Innovative Electronic Solutions
Int'(, VA. SF Chronicle Feb 1,
+--"Track": states if type occurrence occurred within (which) designated area, eg: breaking glass, other breakins, fire (temperature sensors), chemical accidents/leaks.
UIP = User Information Programming. System uses collected information about user to better serve them.
-UIP - T (Telephony): [People kept on telephone hold hear advertisement and other informative recordings (according to callers UIP profile (their caller ID = database(s)). Caller can also hear recordings during busy signals. Average phone call answered in four rings according to study.
San Jose Mercury News 6.28.94, page 1 E. Quantum Systems Inc, Ramsey, NJ.] --callers choose what they hear/get (via on-line/fax) from server's sw (tailored software) menu. -Radio Broadcast Data System: 1] U's radio interrupted to give traffic or weather warnings (KN: combine gps = sys). 2] "s" shows messages from stations, eg: song name & artist & advertising & kn-other uipcommunication. USA Today, Feb 22, 1993, front page.
END IMI EXIST FILE: See Main Parts File and their Appendixes!
File: Features Intro / IMIT 7
" T" TELEPHONY FEATURE MANY OF ITS SUB-PARTS
Intro: This file includes additional definitions to Parts for products in telephony, communications, interactive multimedia. These definitions are part of (to be merged with) " Main Parts " file. Definitions herein are only minutely more important than Parts file. However, if there is a question (conflict, such as between this file and
Parts File) this file's Part take dominance (are the default). For: Telephony, * Electronic Communications, %
Remote ("R") Interactive Electronics, % Multimedia, etc.
GENERAL: One, multiple and or all of these telephony Parts can be incorporated into one or more large complex telephony network systems covering multiple locations (integrating different systems). "C" is the center of the merged diagrams and descriptions. -When "TEL" /"T" / "D" are used in N (Product Numbers) other than those in this file (such as those whose main features may / may not be telephony), it refers first to telecommunications' simply, then branching further out into all the telephony Parts contained in this file. -The following products also apply to ~: all types of tel instruments (home, office, professional), multimedia (video, cable, video phone), interactive audio/visual/data (voice mail, toys, entertainment), wireless communication (Mobile, Cellular, PCS (Personal Communication System), %GPS,
Walkie Talkies, pagers).
TELECOM PARTS ACCESS *= Access to tel functions is restrictable: Telephony functions are iimited/modulated/controlled/ permitted/"access" according to the type "cart"/"access" put into/"uk" "tel".
Examples: --W5 type calls allowed (to whom; system can request information from user before allowing "access" into desired mode/to desired tel #.
-D: 1 User = 2UK-3TR(speaks) = 4TEL-5C = 6TR = 7TEL/SC/9MFH -7MFH analyzes ACCESS code from CART/PD and intern permits applicable functions/ACCESS. -3 Remote ("R") -0-Direction Finders: "GPS" type systems incorporated into mobile tel units.
Information is available to user according to his/its location (system acts as tour guide: better than the current system which is restricted to users being kept in the bus; system will guide person as well (where to go next, while person can also use a map from "display"/printed (out)))
-D: tel-pd-c-printer = mfh-live person who gives information\tel-o-C5
Intelligent hotel room key goes beyond old magnetic card keys, has circuit chip. Can be programmed re data pertaining to user, billing, etc. 18 Dec 92
X. Card enables activation of "tel". D: C5=tel/tr=remote %-o-C78 Device warns user if they forgot to lock up when leaving. Door is blue when locked, red when unlocked. 20 Dec 93. D: C78 = c = "tel". User alerted (via: "tel"/tr/notifier) whenever unauthorized person has entered door (didn't user correct "access") +5A-700 [ncoming/Outgoing Controller: to activate outgoing call feature, first press a special button (once or any number of repeated times in sequence) which lets you get dial tone. Caller must dial the numbers soon thereafter or dial tone is lost and any pressing of other keys on pad are ignored. Additionally, there will be a ring if an incoming call comes and can only be picked up (if handset is off hook) by pressing the 'same or other special button - this prevents kids/pranksters from answering the phone. -OTD: requires memory of fewer codes; lets others use your tel too allowing for greater flexibility; can restrict any/all calls (long distance; by area code/specific tel numbers (caller id restricts how certain calls are picked up); incoming and or outgoing calls) -Parents can't always control their kids from using the tel; hence this is a valuable feature. -D: tel=c (memory; caller ID recognition & processing) = tel line * 5A-701 Long Distance Controller: Restricts access to long distance dial out functions via first: -needing to "uk" "access", eg: wait exactly _ seconds after picking up receiver before beginning dialing / key changeable code prior to dialing, the user’s tel instrument or its "mfh" will allow dialing out + Offer free telephone instruments which automatically dial into your system.
An extra button dials the access tel number automatically. Give free telephones in countries like Japan where they are extremely expensive.
Applications: long distance tel communication; information from mfh (weather, news, entertainment); dial into your mother/lover. -They can also be produced cheaply and given as promotion. -For people shopping for new phones, let them buy the instrument which comes with a credit for long distance or other services. -Any other type ofdmm related service available via "tr".
ANSWERING MACHINE = Telephony Answering System.
OTD: ACCESS *(); %ARTIST (make art and leave such as messages; callers or receiver's systems may: prompt user, offer the hardware/software for doing function); BALANCE *(); BVA (); CID (); %CAMERA (LENS) (); %CART (leave cart as part of U's incoming/outgoing message); CLAP (); %COMPOSITION (make music and leave such as messages; callers or receiver's systems may: prompt user, offer the hardware/software for doing function); CONFERENCE (); FS (); % GAME (make games (return your moves) and leave such as messages; callers or receiver's systems may: prompt user, offer the hardware/software for doing function); K(); MFH (); MIC O; MOUSE (); MP O; M ULTIMEDIA O; MULTI-USER (for caller / receiver, eg: key in code for type person wanted ("voice mail")); NOTIFIER ()'; NOTIFYING CALL ();
PORTABLE (); PRINTER (); PS; R(); S(); SCORE (); SOUND ANALYZER (); STEREO *(); SYNTH (); TDS *(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK (); VISUAL
ANALYZER %(); VOICE MAIL (); VOICE MODULATOR (); VR %(); WA %(). Following are part of the additional possible examples: * I C-071 Multimedia Answering Machine:
Leave (video) messages for people in your office or home. Also has interactive video feature, whereby user can ask questions and get more information. -Like a tel answering machine, leave multimedia (audio/visual) messages on another's machine by transferring data via wire or air waves. -All operations also include standard telephone (audio only) answering system.
Outgoing announcement can be received both audibly, or audio/visually on callers device; receiving device prompts caller with audio and or visual signal to send their a/v signals (though only audio can be accepted as well if callers system is more limited). -Can work with the cruder current video telephones, and with more sophisticated future models.
Footnotes:
Also acts like a fax receiving machine. -If callers device doesn allow visual transmission, or if there is technical failure, system will work just in audio mode
Additional application: receive video clips at any time of (shows, instructional nature [user can request from manufacturer detailed instructions on how to operate, repair, etc their product]) -Old Footnotes: display ("S"); "C"; pp; mp; uk; date; states the time and date of incoming/outgoing messages automatically; interactive; toy; all; entertainment; "mic"; synth; mfh; bp; alerter; osc; vc; score (number of messages); cart; tel; sp tel; tr; mo; FS; cp; mq; access; character. -Makes it easier to decide who's message to answer; better way to communicate yourself. 5A-5 > o Auto Call Back: -H-should caller not leave their message, machine can call back number and leave message in answering machine owner's voice stating they wish they left a message. -May store numbers of everyone who called and who then hang-ups (this is already in existence) -Also returns crank (obscene) phone calls with special statements recorded by user and or manufacturer
-Tells person who has called in any selected past time period, "you have called again and you're not leaving your number, how can I make contact, please leave your message" -[May or may not be legal]
5A-05I H o Beep: this sound should have psychologically arousing effect.
Makes listeners feel: happy, or sexual, or excited, meditative and relaxed, soothed, advertisement, humor (laughter can replace beep), animal sound replace beep (maybe record your own animal), and or any other sound giving caller the mood of wanting to leave message/feel friendly/good 4A (before#l) o code each message by (person's name, topic...) then micro chip files for future reference 5A-3 Answering Machine Features: outgoing beep and or sounds and or conversions of outgoing messages all in frequencies, rhythms scientifically proven to enhance health, feeling of well being, happiness. -Machines might even state they are such a health product, making callers happier to have called and feeling less put off by the conventional impersonal machines, while they get their healthy and or creative boost. +Depending on callers telephone number (via caller ID system), outgoing message is pre-selected for them by user. -Interacts with callers voice pattern to design psychologically fitting sounds
Answering Machine With Outgoing Voice Synthesizer: select the type of outgoing voice wanted with any background sounds, and be other characters in your outgoing messages. -Recording function of system allows user to record onto cassette tapes, etc for insertion in any other soundcreating device. ?- Answering Machine with Voice Synthesizer: Alter your outgoing message so it is more appealing. People will like you more (they often think about you objectively when listening to your voice (from a distance), where they have the choice of responding or hanging up.....}
Exists: Language selection: press right number key to get instructions in desired language 5A-4 H Answering Machine Game: caller is asked to play game. Game can include any of the following: trivia questions, questions about the person being called; caller must state their preference for whatever asked, eg: favorite color, food, famous person, country, music, musician, etc. -Answers to multiple choice questions answered by pressing right number on tel key pad; or announced verbally onto machine -Caller might only get through to live person, or be allowed to leave message if they leave the type answer machine/user wants to hear. Listener can hear in and scream call too. Machine might say the following in response to answers: very good; now you can speak with....; sorry please try again on your next call; don't call back until you .....; your answer(s) are being processed; etc. -questions programmed/installed by user/manufacturer 5A-6 H Store certain tel messages in electronics. Can then listen to whenever user wants without interfering with future incoming messages.
-retrieval process: key in request for old stored messages that have already been listened to, then either give date or person's message or ask date or person's messages in memory 4C-160-000000 Tel Answer Delay:
If person can't easily get to the tel in time, they can send signal which tells caller "please wait, I am coming to the tel".
The signal can be generated by: voice recognitions system; pressing of button that is connected via wire, or remote ("R") control; use of clap; or all calls are handled with such an announcement when system knows user is at home -caller hears the live voice or recording * 8B-310 upon entering dwelling or room, device picks up person's distancer and will alert them if/when: I. they have a message. The scream there could show and or print out message at that time, if the person requests. 2. show their calendar for the day, week... 3. meetings they are scheduled for 4. events that could be of interest to them -the response person receives might indicate level of urgency in communication, eg: less urgent; urgent; very important. Person might be busy with something at that moment. -marketing: get your messages more quickly and easily; be notified when you have important messages instead of having to wade through less urgent messages often. Helps replace need for secretary. -categories: door chimers, door tv, answering machines, software, computers, pagers, intercoms...... * 5G: Tel Answering Machine:
Program the time(s) in which incoming calls are to be: a] call forwarded to designated tel #(i 0-11am calls go to tel #1, 4-7pm calls go to tel #2); b] tel answering machine picks up calls automatically (user may or may not be "notified" of incoming call); c) time of week effects type of outgoing message. Also SCORE -it's inconvenient to have your tel call forwarded to someplace where you aren't; user might forget to reprogram (pp) their TEL from remote ("R") location so this TDS controlled system useful.
End Answering Mach
Voice.mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere.
For details call 415 534-9453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. D: "answering machine" = wildfire.
ARTIST ** = One or more users can make/design art/[mm shows/programs/games] by interacting with each other /"mfh", via "t" or other "tr". "Mth" can be programmed via:
UIP/PP/MP/CART. D: User's C-User's C
MFH (CART, T). -OTD (Other Technical Detaiis): ACCESS *(); ANSWERING MACHINE (); BALANCE *(design the sound effects to accompany the U's mm presentation); BVA (each character/visual element in mm presentation responds/speaks with observer/u which interacts, differently according to latter uip); CID (); CAMERA (LENS) O; CART O; CLAP Q; COMPOSITION ** O; CONFERENCE O; EDUC O; EXERCISE O;
GAME (); K(); MFH (); MIC (); MOUSE (); MP 0; MULTIMEDIA (); MULTI-USER 0;
NOTIFIER ();
NOTIFYING CALL (); PORTABLE Q; PR (mm show could be created using ' author software'(from M/other party)(via tr w another c)); PRINTER Q; PS; R(); S(); SCORE (); SOUND ANALYZER (); STEREO *();
SYNTH (); TDS *(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK ();
VISUAL
ANALYZER %(); VOICE MAIL O; VOICE MODULATOR O; VR 10 (); WA %(). Following of this section are part of the additional examples:
BALANCE * = According to PD (GPS) location, tel's speakers and other functions balance accordingly. PS system can use the PD's location to do what it wants according to the software used. -incoming/outgoing calls transactable based on tel=pd's location.
Eg: users #10 & #40 can only dial certain area and or tel # from room #20. -D: pd = remote ("R") = mm-c-t = osc --OTD: uip (studies w5 of user) = mfh -MM: Visualize user from their different angles according to your position in relation to your video tel. The position of the object effects the audio mode as well (humming instrument shown on left side of S, has speaker(s) towards the left humming louder than other (speakers/%vibrators/ fonotifiers)) -multiple cameras shooting from different angles
BASIC = Applies to all Telephony products. #1 Any portable unit (handset) used by U is solar powered too. (Just let it sit in sun.) -D: telephony device (C) = tel line = receiver = signal converter = c= osc / mic = signal converter = tel line = telephony device (c)
BVA = Behavioral Voice Analyzer.
D:BVA=C=T -OTD: ACCESS *(access is given to those people which exhibit behaviors/voices meeting requirements (what access has on U's UIP in its memory); ARTIST **(); BALANCE *(); CID (); CAMERA (LENS) (the visual effect in mm tr, is altered according to bva/uip of user); CART (each carts: seeks for different signals in determining U's behavior / has different pr which takes and then processes
BVA's signals accordingly); CLAP 0; COMPOSITION O; CONFERENCE O; EDUC O; EXERCISE O; FS Q; GAME O; K n; MFH 0;
MIC (); MOUSE (); MP 0; MULTIMEDIA (); MULTI-USER (); NOTIFIER (); NOTIFYING CALL
PORTABLE (); PR (); PRINTER (); PS; R(); S(); SCORE 0; SOUND ANALYZER ();
STEREO *();
SYNTH (); TDS *U; TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK Q;
VISUAL
ANALYZER %(); VOICE MAIL (while u is on hold / being call routed they hear sounds/info tailored to their behavior/uip. One party can designate what other caller gets while they are on hold, eg; according to their behavior/uip/what u wants listener to buy and or do); VOICE MODULATOR (); VR %
Following of this section are part of the additional examples:
G. Voice Actor: System analyzes speakers' behavior (callers/receivers of calls) (via "sound analyzer"). In tern their voices are modulated in order to help achieve desired effects (boost: sales, work performance, improve rapport,. make longer tel calls).
-System modulating sounds responds quickly and is controlled by C (UIP / uk objective of communication), which analyzes sounds and makes determined voice modulations.
G. "Speech" -"Sound Analyzer" (determ ining speaker's behavioral modes) = UIP.
Applications: if user is lying and which words tie to the lying behavioral mode; boost sales -OTD:
D: 1 uk(2pp/3mp) / 4**remote(2pp/3mp) / 5**clap (6 "speech"/* *pp/* *mp) /%7[signal(s) tr between other (related) product unit(s) / part(s)] / 8**mfh ! 9**mq / 10**uq = 11 [tr/rc] = 12+C = 13[tr/rc] = 14+applicable product's description's desired function(s) are controlled / 15**other desired applications / 16**"notifier"(osc) 17**"score" - 18*"display" / 19**"cart" / 20*UIP /21 **"printer". -D Notes: 1/4/5/6 (helps) control system (turns system on and of / controls other functions)~: -See Parts& for less crucial details
G. User accesses mth for desired effects' via "tel". Effects: type sounds / music. With UIP system is well able to design the desired sound effects. 5A-880 Voice Analyzer: tells user the behavioral mode speaker was in while leaving message. -user can opt to have analysis at command of button(s) -D: speaker-tel=mic=c(sound analyzer/UIP)-mfh=osc/notifier. -tel call is routed in tel system according to callers profile (UIP, valued customer known via tel#, area code).
This function is in earlier N. 5A-910 Voice Analyzer: "display" shows the additional level of voice modulation (inflection) needed to achieve aim. Additional level needed can be based on what the synthesizing equip needs to do, or how the singer with only their natural means needs to make alterations -aim can be determined via: selecting from option in menu; PP; UIP -ap: good for music education; useful in my computerized musical instructor product too; teaches people how to be more polite (on or off tel); analyzes if speaker is good enough to be hired for job; analysis of speaker useful for developing UIP. 5A-940 Voice Analyzer: recognizes voice's emotion and analyzes the feeling and or behavior of speaker. This is part of a larger product with other features. 5A-800 Voice Recognizer: transmits speaker's words onto scream. -converts into language(s) of listener(s) 4C-090 Call Screener and Director:
Based on the person's behavioral sounds on tel, eg: tone, system directs caller to applicable person (eg: matches callers psychology with sales rep's (live or machine) voice and behavioral pattern. Boosts sales. Also screens out unwanted calls into the voice mail trap, etc.
-Related to: 5A-880-04200A Voice Analyzer: tells user the behavioral mode speaker was in while speaking, or leaving message on answering machine. -user can opt to have analysis at command of button(s) -related to 5A-940 CAMERA (LENS) *= Integrated into the MM T (Video Phone). Both person on other end of tel line, and U can see themselves and the other U. -D: lens=camera=recorder= tr to S of all connected U -C34 Remote ("R") Control Video Camera - moves camera into desired angle. 20
Dec 93 X. C34 ="tel" (control via tel)-remote
CART = Can make the C-T system into a completely new product. One or more slots in TEL take one or more different CART. Examples of what CART can do: -Dl : c/mth/tel = tel line = tr=tel=c--(display/uk/osc/printer/mth)=cart -Otherwise, the TEL can become a CART into the systems mentioned below. --D2: System (product category mentioned below)=c-(display/uk/osc/*printer/*mfh/*mq/*uq/pp/mp/*uip)=cart(tel/*(radio frequency tr/rc)/*mo) = tel line = c/*mth/tel -OTD: the merging/interfacing of category with tel is done either via CART, and or plugging the systems into each other via: wire/wireless data tr; a "C" is located both in the "tel" and the category product, each having their softwares compatible/integrating with the other parts of the entire systems. --Why tel merged w product: The "tel" function serves many possible uses to the category product, one or more of the following may applying: data from mfh (feedback/uip/database access/memory storage and retrieval); allows control of system from distant location ("remote"); convenience of having a "tel" as well. At designated time TDS, system will communicate the fact via "tel"ltr. "Score" is tr via "tel". Two or more of these systems can "interact" via "tel", with or without assistance of mfh. --Misc: the C found in each unitlmain sub-unit of system allows for software (CART) insertion. -for *additional details on applications for each category product, see filings showing how these products are utilized.
CID = Caller Identification Systems (Caller ID, Ammie): -D: Caller's tel = tr their CID = CID recognizer = C-T.
Q 5A-900 In-coming Telephone Sales System: Caller ID determines how call is handled within large tel networks:
Incoming calls to large sales networks are routed according to callers caller id. Proven to increase sales.
Applications include;
I] Calls are routed to the sales representative handling callers territory. 2) While on hold, callers hears news from a radio station broadcasting from their area code; or (product / news) information according to their UIP. 3] The speaker's voice is slightly modulated, proven to create greater rapport, according to the regional accent from callers area code/caller's behavior (BVA-Behavioral Voice Analyzer). 4] Calls from telephone numbers with favorable past customer history are routed to the most effective sales people. Studies show some sales people are more effective with cold call sales while others are more effective selling to established customers, all depending on the sales person's characteristics. 5] UIP / BVA determines if soft or hard tel skills are needed (for technical support service) and: a] routes calls to people w such skills; b] signals call receiver before call is answered as to type skill needed to interact w caller. 6] According to information being fed into computer ("C") (during telephony interaction) system will better know (possible) responses to be made by human / system. 7] Less desirable calls are: a] put / kept at the back of the cue of callers waiting on hold; b] given lower quality (sales) personnel. Especially conducive to nationally promoted telephone numbers, where special customers aren't given special numbers. *Notes: .-speaker's voice is modulated. Eg: callers from southern USA have different sound preferences than northerners. D step 1: caller id=tel. D step 2: speaker=c (voice modulator according to caller id) = modulated voice transmitted over tel line -caller identified via: area code; caller=id (uip (customers history)). -"caller id" and related concepts can be replaced in this filing's descriptions as any way via which to tag a caller, including their: PIN, customer name (which might be typed in by recipient / caller (when call starts)), area code, % type activity (service/product) desired/being conducted. * Psychologically adjust to type caller,: Voice synthesized for targeted purposes (Caller's ID / UIP designates type caller). Convert voices into those which create the feelings of: passion, friendliness, energy, intelligence, impatience and the expectation that the listener perform their work well (studies show that speaking to people in certain voice tones tends to create better work results from them) -- eg: customer service department's synthesizer modulates sounds by volumes, treble, bass (if above a certain range) -OTD: the sound change can be automatic(MP)/PP -applications:
--C decides type voice frequency desired for particular applications. 1] UIP determines frequency (in sales, the caller ID of customer labels desired frequency); 2] IC21 1-5A-890 - converts typed words into sounds. *-o-Modulate the sound frequencies of calls to induce both longer calls and more repeat calling. Eg: eliminate some of the unpleasant sound frequencies; synthesize in pleasant sounds. By satisfying both sides of conversation, calls can be increased, developing more favorable attitudes towards the other party and the tel itself. -also: calls to/from particular regions can be modulated accordingly, eg: calls from norther US (known for sounding rigid) might be given a slight "twang"/other modulations to make the calls appeal more to southerners.
Below is related to above or? Below was dev 3.94: 0 5A-900? Caller ID determines how call is handled: -o- Caller ID can be incorporated into PS system too D: PD-Tel (caller id's identifying transmission) = PS (caller id recognizer) = c(analyzes/process/(forwards tel call]/uip]. Example: both the user’s location and caller id are used top: treat this party accordingly / develop uip or score.
OTHER APPLICATIONS FOR 'T (TELEPHONY): CALLER ID = C-TEL = TEL-C:
ACCESS **: caller id acts as one of the forms of an access code.
ARTIST *: multiple artists can make art together (multi-user) in real or step time, via tr/tel line, system recognizes callers and has UIP according to caller's/user's caller id and or access code;
CART *:; CLAP:; COMPOSITION *: multiple composers can make music together (multi-user) in real or step time, via tr/tel line, system recognizes callers and has UIP according to caller's/user's caller id and or access code;
DATA BASE: Matched with callers ID / their PIN / customer name / other such taggable element. Uses key word search to locate all applicable data on desired caller / customer.
Customer may have multiple tel #'s /
PINs. Use national databases too, eg: from Dunn & Bradstreet, telephone number databases (from tel service providers), etc.
DISPLAY ("S"): (shows: callers tel #, and any other info about person user is speaking with (either user called them / they called user) such as their: address, how their tel number is listed with the tel company / tel book, advertisement by-lines and or descriptions about the other party (as provided via UIP); ENTERTAM:; FS **: attached to tel in diagram; GAME **:(each participant's caller id acts as one of their possible "access" codes);
MFH: (UIP: develops analysis of callers (according to their call's W5)), can be conducted by tel line provider a MORNING *: each caller id gets different type of interaction also according to their UIP; PP/MP:; MQ/UQ *:; IVIULTi-USER*:; NOTIFIER:; OSC:; PD/GPS: C(UIP) analyzes both user’s location (pd=tel) with their caller id; PRINTER *:; Remote ("R"):; SCORE:; STEREO:; SYNTH:; TDS *:; TEL:;
TGH **:; TOY *:; 4-+- UIP : caller id helps c/mfh identify caller, and hence develop/provide information pertaining to UIP, D: callers tel = their caller id = tr = tel = c-mfh = uip; UK: via C user can pull up information about a particular tel #/ user’s name/function and get data on their: history and other UIP information; WA's tel has caller id, D:
a 5A-900 Related N. In-coming Telephone Sales System: Caller ID
Study customer behavior via (UIP) by merging following data’: items purchased over tel line, purchases made with their cards (credit cards, other member related cards) in other modes too. This way marketers develop detailed calculations about user / general market: what that person is likely to buy; past, current and future trends. -in this manner, marketers can pin ajoint potential buyers without inundating them with material there not likely to buy resulting in excessive advertisement exposure of=their brand names and wasted costs; and buyers begin to see such brand names in a more appealing light (that brand fits their lifestyle). -this UIP data can be shared between some or many firms, the more sharing the larger & more complex the database system, and more accurate in determining customer characteristics. o-"sound analyzer" also helps in analyzing callers behavior to some degree, and this can ad to the UIP's databank of info. 0 6B-020 Caller ID Screener: Unwanted calls are channelled to the tel answering machine mode. Exists. -Caller ID system gives certain incoming tel calls (based on their tel no) the tel answering machine recording.
Caller ID: system will respond to callers tel number as user programmed: -tel never rings when you receive calls from unwanted people (always gives a message to those you wish not speak with, so that you don't have to bother picking up tel or checking to see the tel number of caller on display ("S"). lets user pick up tel at other times with less risk of speaking to person they wish to avoid) -gives different messages to certain tel numbers calling in -has choice whereby user doesn even have to hear the message from caller if user wishes to program device such. Eg: caller thinks their speech is being recorded; or device records yet listener needs to use extra keys in order to retrieve these less desirable messages (desired and undesired messages are stored in different places) -When receiving another call on telephone, radio wave, etc the first, or second incoming call displays its tel number, callers identification, etc. allowing receiver to choose to answer the call. -Should call be undesired, receiver may opt to have incoming communication handled by a tel answering machine or related device. Or to keep things simple, any such unanswered call automatically goes to the answering machine.
Footnotes: Undesirable messages might automatically be erased after one hour or after user picked up tel, which ever happens later; Parts: all; display ("S"); pp; mp; uk; date; interactive; "mic"; synth; m#h; osc; vc; cart; access. 0- 4C-042-000000 Personalized Outgoing Recording:
Caller ID states whom call i's from. If receiver doesn want to take the call, they can pretend not to be at home but to have created a special message for this caller. The important point is that a beep follows the spontaneous message spoken by user into "mic", so that caller thinks they received a personalized recording only. Even the audio message heard by caller could lose some of its quality to help caller feel they reached a machine. -works with 4c-040, 4C-041 -OTD: display ("S"); pp; mp; uk; tds; basic; osc; vc; speech (tells who call is for and from whom); vc; score%; sp tel; cp; uq; pi%; multi-user; notifier. <>8B-170-083001 Advanced Tel ID: Know more about whom you are speaking with.
Example; their address and to whom the tel number is listed, etc. -applies whether other party called you, or you called them. Get more info about party you called without even needing to activate their tel's bel l; by just going into database using their tel number -Receiver's ID: know if tel you are dialing is *a cellular/mobile tel and or if it is being call forwarded and or tel number or type tel line to which call is being call forwarded. -recipients may opt for such information not to be given out -H [government regulations may not allow all aspects of the idea, depends on the country]
-also learn above and the following about the tel number you dialed, or the tel number that dialed you: the name in which the tel is listed, their address, when the tel service started, any major complaints against company, status of the company - such as if it has filed for bankruptcy. -also learn: how many calls they ever made from that number that day/wk... -OTD: display ("S"); "C"; pp; mp; uk; tds; basic; au; mfh; speech; vc; score; cart; sp tel; (also identifies tel numbers for modems, and faxes); cp uq; mq; access; uip; multi-user; notifier
A2-3 ] 0 Tel Regionalizer: caller hears accent and music popular for their region of country, according to tel area code while going through voice mail or on hold. If available employee with that accent will take call (perhaps central number transfers calls to same region of country where employee there takes call). 4C-040-103005 Caller ID Activated Speaker Tel:
System automatically puts calls from special people onto the speaker.
Answering machine takes call if user is out or doesn answer. -When calls come from certain tel numbers, the speaker tel automatically picks up the call. -works with 4C-041, 4C-042 -OTD: display ("S"); pp; mp; uk; date; tds; basic; caller identification system (identifies callers tel number); "mic"; synth*; portable*; au; bp; osc; balance*; speech*; vc*; score%; cart%; sp tel; cp; pi*; float (hand set floats); multi-user (different beeps, etc are emitted depending on which receiver is being called; 4C-041 Ring
Identifier - if "multi-user" then prior to the speaker activation of callers voice, there is a coded beep or audio announcement stating for whom call is for; cc*; remote*; notifier.
-user pp tel id of those people (who don't mind speaking via speaker tel) 8B-150-083008 Switch Board's Identifier:
Receptionist receiving call, encodes applicable respondent's tel instrument (who call is for) with code / verbalized recording stating information about the caller, eg: --callers nature (client or supplier); level of importance, urgency; length of time they have been on hold; if its a local or long distance call; person and or organization; type personality (nice...). -Receiver of call gets this information on display ("S") of tel; or computer ("C") (can then store such information with or without any additional info put in by receiver (person who speaks with and handles call - saves time keying in info, plus receiver might not be able to key everything in time and or forget after the call, especially if there is another call coming soon thereafter). Receiver can hear or read this information before or during the tel call. -all this information can be relayed on to third (or any subsequent person) taking call (perhaps prior person isn't right one to handle situation.
Footnotes:
Display ("S"); "C"; pp; mp; date; all; mfh; score; uq; mq; uip; character. -A2-310 TEL REGIONALIZER: caller hears accent and music popular for their region of country, according to tel area code while going through voice mail or on hold. If available employee with that accent will take call (perhaps central number transfers calls to same region of country where employee there takes call). 4C-090 Call Screener and Director:
Based on the person's behavioral sounds on tel, eg: tone, system directs caller to applicable person (eg: matches callers psychology with sales rep's (live or machine) voice and behavioral pattenn. Boosts sales. Also screens out unwanted calls into the voice mail trap, etc. -Related to: 5A-880-04200A Voice Analyzer: tells user the behavioral mode speaker was in while speaking, or leaving message on answering machine.. -user can opt to have analysis at command of button(s) -related to 5A-940 -Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details call 415 834-9453, or 800
WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. D: "CID" =
Wildfire.
End of this CID Section
CLAP = D: clap = mm-c-t
COLOR ** = S's COLOR changes according to the frequencies (what "sound analyzer" determines voice/sound to signify (happiness) / UIP. -D: sound = sound analyzer = C-tel = DISPLAY/TR = C-tel
COMPOSITION ** = -see my jazz tel idea: user’s can make music together simultaneously / in step time. Useful to send data between people to ~: hear their music; for educational uses.
EDUC: teaches tel manners (user’s voice is too loud/abrupt = "sound analyzer" = C = "notifier");
SCORE Simple version of video tel: option 1. caller transmits still photo of themselves to other TEL; 2. kids can see picture of their mother when they call her at work (such picture is in memory of user’s TEL being dialed out from --DI: user = dials = tel # ID system = C = Display ("S") shows picture. --D2: composition = mm-c-t CONFERENCE = Conferencing Telephony. Three or more locations/parties communicate with each other. *
However these technologies might find applications in two party telephony too. 5G. Telephony Multimedia Conferencing:
Hook up w one or more locations. All parties on one display ("S") / each party on separate display ("S") or portion ofdisplay ("S"). Meanwhile parties can interact in unlimited modes:
ARTIST *:(); COMPOSITION *:(); ENTERTAIN:(watch films simultaneously, enabling each to talk with each other during movie (if desired); play "games"); FS **:(); MFH:(); MORNING **:(); WA:().
Q 5G. Conference calls - each speaker sounds like they come from different region. -manually set the balance for "sp tel" with two or more speakers in one or more rooms -in conference calling, each caller can sound like they come from different part of room; or even the handset's speaker(s) might create some stereo effect for one ear for conference or other conversations. -used for standard handsets/"sp tel" --if more than one speaker is in room, each's PD let's their voice be heard from different region of room for people on other ends of tel communication. --in multimedia the location of the sound source as viewed on the "display" is related to where the sound sounds like it is coming from.
EDUC = D: educ = mm-c-t.
Hobby Multimedia Tel: System shows user how to do their hobby: "Multimedia" "display" /"osc" shows/helps user do/learn/watch desired activity (full presentation/UQ).
--UK to "interact" w MFH/cable broadcast. User can select type info/instructions/show from menu/via key words (if food is the hobby: themes, countries, ingredients they like that are used in recipes...). -system will tell user where to buy/get/maii order needed ingredients; has a separate advertising channel selling food products. -user can sign up for specific channels; tel can be placed near the type activity of the channel: kitchen, workshop, playroom... -including K206-5A-710 Laser Dialer option. -type interests": cooking; horticulture; crafts & hobbies; psychology; relaxation (how to; programs to help you relax) -D: osc/cart/printer/tel/display/uk=c=mih=c for bill collection -OTD: "remote"; (system can even UIP (according to user’s pp))); "balance"
EXERCISE: Exercise while communicating via TEL and ~: --system monitors W5 of your exercising and TR it to other callers (TEL/Teal's C's DISPLAY) & so both can see how each other is doing (checks heart beat, meters walked) ---for patients at home wanting to be monitored by their doctor ---SCORE *-D: exercise = c = t FLOAT **= Handset /* entire tel, floats.
GAME: -interact with partners via TEL/REMOTE. SCORE --D: player = UK = C-TEL = MF141C TEL = UK = player -o-C1 ] 0 Video games linked to tel. AT&T, Sega. June 93 YD
D: remote/uk/display=c=Cl 10 INFORMATION RETRIEVAL %:
Q Electronic dating service: UK info about themselves (UIP/mq). Then it gives user: 'card'; *(list of tel numbers w or wo names/addresses). vCard' when inserted into special "tel" lets user dial their blind date. User might have limited information about the party they are calling (not know their tel number, letting date call them back) -options: could have self imposed time limit for call, making it easier for receiver; sender can press button letting receiver get their tel number (receiver might/might not know) if they are getting data (their te]#, name..) on caller for some time - receiver can receive this data via: mail, mth can call them up later and give it audibly/tr info to receiver's c; if receiver is interested, they can uk info about themselves so caller might call them back again.
-Log into mfh to hear parts of desired show/play/film... "Display" (touchscreen) interacts with user giving more information too. -tickets could be completely printed on U's sight
MFH "Morning Alarm": see in file other than 5G or 2K
- I C-07A (grew out of & includes I C-071)
For multimedia computerized tel sales. Potential customer receives such sales campaigns via: tel, videophone, entertainment cable. User then touches key / touchscreen to get desired details.
K = D: info +entry (uk/r(*clap)) = [s(mm)-=-+c-t] = mth LOCATOR = User/1Vlonitor(er) can "locate" other's PD/TEL. SCORE -Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415 8349453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. D: "Locator" = Wildfire.
MFH = Analyzes company's calling characteristics:
Calling Characteristics Analyzer.
Tabulates how calls are made according to their W5 (W5 data for analysis: "sound analyzer" which seeks for certain words & then calculates (mp/pp) accordingly; to where calls were made and from whom and for how long and any other information supplied (by user’s UK (tel automatically correlates that call to computer ("C") activity made during the tel verbal/data transaction)). -Applications: W5 of the company's current activities, which can also be used to better forecast, and make any needed changes. Catching illegitimate users of long distance calls (system can alert investigator (irregularities/strangeness/non-matchings), who can then look into matter further). SCORE. -related for this description was developed earlier too -D: m = mm-=c--t -o-Tel # Database: of peoples and organization's telephone numbers within the country and or most of the world. User can "access"/"uk"=c=mfh for needed ~: tel #, addresses, co info such as their products/services. -useful source of information for my/other's products to compile: UIP / SCORE.
Or to detennine if "access" is permissible; or develop questions for MQ, or answers for UQ. -makes contacting people easier, hence increases caller volume -for letters differing one's own language, system can provide ~: an easy automatic conversion / conversion table / touchscreen.
MIC: D: mic = signal converter = recorder-c-t MOUSE: Use mouse to select the program(s)/tel # wanted/move or edit files. "mouse"/"remote" ="c" ="t"
MP: The volume of user’s outgoing call is adjusted according to type tel # there calling, eg: their grandmother, or tel in country with poor tel lines.
MULTIMEDIA = Interactive Multimedia. -D#1: u ( So"interactive" u)=k=c-s -D#2: c="artist" (uk; touchscreen; remote) / t] *-D#3: "composition" = c (edits via: pp/mp (coordinates/combines/synergizes (data/signals))) = tr = display/mfh/other's system (c/tel)/osc/"remote" ("air pad") -o-Video Phone: user’s "tel"/system keeps in its memory information about its user (picture of user(s); graphics (logo); advertising by-line(s). --user can select from menu which of these they want tr to other "tel". -C2 Electronic Blackboard: Participants share documents, images and presentations. Shared via "tel" lines for simultaneous viewing and editing by distant users. Graphics can be retrieved and put on board from a file or electronically scanned on. Can display ("S") video too. Sept 92? MF (Fuji, Xerox). -Feel vibrations of music in seat.
Pioneer manufactured this before 1992. -o-C116 Cable TV over tel line. AT&T 20 Jan 93
D: display/remote/uk=c-Cl 16 (other entertainment programs: audio (radio), %interactive.
MULTI-USER = D: multi-user = c-t NOTIFIER = D: notifier = mm-c-t -C6 Watch=tel vibrates instead of noisy audio alarm. For deaf, and radio DJ people. Aug 93 X. -notifies when "tel" is ringing. D: c5=tel/tr=remote -G. Sound level & vibration level instruments: User alerted top: incoming t call / type of call (caller, nature of call (level of urgency)) via: vibration/flashing lights, or other "notifier" modes. Useful for those who are deaf/in recording situations/don't wish to disturb others. if deaf, use one of my other inventions to continue communications.
-Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415 8349453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996.
NOTIFYING CALL = D: Incoming call (CID) = C-T-"Notifier (Display/OSC)" 0 5G Automatic Outgoing Call: -o- A TEL call/TR automatically made in certain circumstances, upon alarm/actfcompletion of task, sensor makes call. Examples: -setting timer PP (TDS) which: alerts user to needing to make a call / then dials out the call (and activates SP
TEL)
Applications: o If user haven't risen from bed such call(s) can be activated. Determination of having risen is in my past inventions: 1] tripping of laser light shows person got out of bed; 2] sensors (for pressure) in bed sense user is still in bed; *3] alarm (located near/very far from bed) isn't deactivated. +-call goes to: wake up service (mth/person) who knows W5 modes of conversation/sounds to wake up person (what/when/how to say what (news station; "good morning, wake up")/why (psychology)); --if someone rings your doorbell, and you're not there, the SP TEL there will
TR to user’s location --particular sounds in locations where user isn't located at the time (strange noise), system in tern "notifies" user/police via TEL/beeper/monitorer (police). "Sound Analyzer" is PP/MP for certain sounds (barking dog; breaking glass; setting off particular alarms; fire; water leakage; excessive noise from baby/children; break in and entry) -D: user=sensor(mic)/uk/remote=c=te1(sp tel)/transmitter (radio)=transmission=rc/tel/person=c-mfh -OTD: simple/complex operations possible. Simple: activating (answering call/getting line for dialing out).
Complex: dialing / making transactions available to any other sophisticated
TEL instrument. 3A-W20 Emergency beeper (portable/non portable): if alarm is triggered or any other emergency comes up person's beeper automatically goes on. Code/beeper type (eg: type signal or light or word display ("S") shows nature of problem, for example: three beeps means your grandmother is calling for assistance) -Application: for hard of hearing people (deaf); parents who want to know of any loud sounds/crashes in bedrooms (device may be designed to ignore loud child frequency voice, or parents may want to know about those screams as well - if they hear the scream as beeper alarms parent will know nature of problem and may decide on choosing to check). -H-Bruce Dunn stated he knows of device that turns on lights when tel rings 8B-350 +? Notifier: if person's mobile tel, tel, pager, warlike talkie, or like transmission-receiving device is calling them and they are away, their watch or other smaller portable device might alert them via sound, light or quiet vibration.
-device might notify them if there are any messages on answering machine or voice mail, and or number of messages. Such notice might take place with or without user’s request for such information. -user might know callers tel or ID number; then maybe user can let an answering device take a message
OSC: states information about the incoming call via OSC/"notifier" via callers caller IDs: A] tel #; B] name of caller (system remembers who each tel # belongs to according to a] receiver's system which had such information entered in; b] via tel cob's computer ("C"). C] nature of call according to receptionist/info "uk" in by caller. -Headphones / Hearing aids: WA lets users speak/listen to tel conversations. -D: t-c(pr) = osc 3A-360 Sounding Telephone: by pressing buttons create sounds that add to the home/office telephone call's creative fun! Great for teenagers and creative adults.
- Use for prepping up, energizing co-workers, artists, inventors, sales reps, sad, sick or bored people with cheers in background, etc. Get the healthy creative juices flowing.
- Devices for developing excuses to get off phone. Sounds: door bell (excuse for, "oh i have to go now"); sound of another tel call ringing on second line; sound of click in call waiting; record your own sounds onto micro chip, [eg: mom saying "please come downstairs and help me"; dog/cat barking so as to be walked or fed or let out; fake sounds of tel trouble on the l ine .....]
- user records own sound effects
- can initiate in beginning of conversation to gain interesting start to conversation, be somebne other than yourself
H- Nature sounds: playful monkeys; birds; jungle sounds; rain; -H- Joke sounds: silly babies; giggly babies; crying babies; short weird sentences of laughter, etc; wild fat lady's voice "well I got to get off the phone now, talk to you later!"' etc. 3A-361 Telephone Ring Announcer: unique sounds: music, church bells, bird sounds, monkeys playing, baby crying, verbal sound of butler stating "tel" or ..... ' -Key Words: telephone, decorate =(decorative and or decoration), toy, fun, novelty 3A-362 Tel Ring Volume Accelerator: each succeeding ring gets louder. Alerts those who might not hear the ring. UP the feature into activation and selects volumes. Sound acceleration might be on only one or each succeeding ring. -user can select alternative sounds replacing the ring -continuation of ringing related sound might continue after any answering machine picked up call 4C-041-000000 Ring Identifier: exists
Lf "multi-users" use same tel line; then according to callers id #, there will be a different ring when the call comes in.
-eg: person #1 programs their desired tel #'s and when person #2 hears ring for person #1, person #2 either lets person #1 or the answering machine take the call. Caller is unawares of this system. -OTD: display ("S"); pp; mp; uk; tds; basic; osc; vc; speech (tells who call is for and from whom); vc; score%; sp tel; cp; uq; pi%; multi-user; notifier.
End of this Section of OSC.
PD = D: Pd = sensor = mm-c-t PORTABLE = Wristwatch dials tel. Uses: Casio's CMD-10/flip lid watch with small dial pad; Panasonic's wristwatch tel. -wireless tr activate/deactivates tel ("sp tel"), dials tel #. Sys can also remember certain tel #'s. a 4A-330
Jewelry Telephone Ring Alerter: Wherever you are in your dwelling, the telephone ringing will activate your jewelry/apparatus notifying you of ringing. -great if you have friends calling you late at night and you don't want to disturb others -jewelry can vibrate as an alerter (watch, bracelet, ring, strap/contraption on body) -alerter notifies: doorbell; other alarms (fire, another person pressing a medical assistance help request button (on "remote") for system; when a fax has arrived (or any other telecommunications data on home/separate line (system will "notify" the type of tr received)); when someone is walking or driving up the driveway/walkway; clock (tds) alarm; when food (in oven/stove (as "notified" by tds) is ready); --"notifier" ("display") shows the type of "score" (status) of desired situation (as mp/pp) -OTD: D: event=signal=c--remote-tel=tel line/tr
ACCESS ** (remote tr special code) o BALANCE ** remote-pd = balance; CART *; COMPOSITION *; Display ("S"): (dial
touching/drawing onto touchscreen); ENTERTAIN
EXERCISE (monitors user’s health "score" (heart beat; blood pressure; diet; calorie usage); FLOAT **; FS **; GAME ** (us as piece in game: remote ("R"), pd); INTERACTIVE %; LOCATOR *;
MD *; MFH; "mic"; MO *; MORNING *; MOTION SOUNDER ** (in case of theft, "motion sounder" can be turned off, and if so it can alert incase of theft); MOUSE *; MP; MQ *; MULTI-USER *
NOTIFIER; OSC; PORTABLE *; PP; PRINTER *; SPEECH *; SP TEL
STEREO = remote-c; SYNTH; TDS *; TEL; TGH ** = tel=mfh-c
TOY *; UIP *; UK; UQ *; VC *; WA. -OTD #2: For filing dates also see: A2-310 TEL REGIONALIZER 8B-350 +? Notifier: if person's mobile tel, tel, pager, warlike talkie, or like transmission-receiving device is calling them and they are away, their watch or other smaller portable device might alert them via sound, light or quiet vibration. -device might notify them if there are any messages on answering machine or voice mail, and or number of messages. Such notice might take place with or without user’s request for such information.
-user might know callers tel or ID number; then maybe user can let an answering device take a message 4A-34 Phony Car Phone: mobile telephone made not to look like phone, minimizing theft potential. Eg: in car made to like its a part of auto; for walking made to look like cosmetic case, flashlight, etc.
Calls follow recipient: Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415 834-9453, or 800 WILDFIRE. See article in SF Chronicle, p. DI, June 16, 1996. D: "Portable" = Wildfire.
End This Section Of Portable.
PRINTER: t=c=printer, all in one unit; "portable"; "pd"
PS = D I: pd = sensor = mm-c-t. D2: pd-t
Q 5G: GPS Analyzes users' tel calls: -tabulate exact location from which call was made: many uses for th is --user (person/his company/other monitorer) gets UIP for his own purposes --UIP for one or more users. call from PD = GPSs analyzer = MFH = Tel Cox's
C. SCORE ---useful information: bill tel calls not by tel area code only but also by the exact location of user; study W5's of users' actions (know where there is more activity in undeveloped areas, maybe land prices will go up there, drug dealers, improving programs in human services/software by better tailoring to actual situation); "sound analyzer" seeks key words = C tabulates/correlates w W5 = UIP. 5G: According to location of user’s "PD", the tel/tel answering machine system(s) will respond/function accordingly. Examples: -If user is out of range/contact not wanted by user/wearer of "GPS's" "tr" (in garden, bathroom, beyond range of tel (mobile)), caller gets corresponding "PP" recording (Imm unavailable now....; please wait a few seconds; ...Imm coming). If user doesn want to be disturbed, they "uk" resulting in corresponding recording./ function (if caller calls from desirable tel # (caller ID) user/system responds according to
Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415 8349453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. "PS" = Wildfire
R = REMOTE CONTROL. D 1: r= mm-c-t. D2: uk=c=tr -o-C28 Yamaha's Miburi functions: sensors on both wrists, elbows and shoulders. Wrist: controls volume, by turning wrist in - changes vol. [Publicized in July 93]. Make movements to dial tel: one type activity turns tel on/off; another dials/ another adjusts sound modulation/ another memorizes and or recalls memorized tel #'s / another controls the "display" and or C --D: C28=tel-remote ROUTER = Incoming TR are routed according to the PR. -D: incoming call (CID, UIP (given by receptionist/via database of receiver's system)) = t-c-mm -0 1C-291-08300I Call Locator:
For people who spend much time in different parts of the office. Tel rings in certain patterns, designating for whom it is and how urgent. Calls for person only ring on tel they are closest
Tel Follower: Tel rings for user at the tel closest to person's location. -Related to product I C-290. -the system is simplified for easy use. For example: tel transfers are limited to particular telephones within office / locality; when incoming call arrives, it may state on display ("S") name or person call is for -Applications: this system is limited in usage to certain types of offices where people are often away from their desks within a general area. It fits particular office work styles, is not meant for everyone. +-saves time from having to have someone else get your tel +-needed person is identified via: --different tel rings may also apply as to who the call is for, or different short melodies --importance of call can result in louder ring or other signifier --speakers might announce whom the call is for.... *--particular flashing lights *--display on wall or other location near tel -system can after replace the use of beepers, paging systems
Applications: -receptionist is told who call is for, then they transfer the call by putting in correct code which automatically transfers call to the section of co where person works; in tern the designated sound, etc is emanated designating who call is for. The applicable person or anyone else can take the call (but it interrupts fewer people if people just got the calls themselves), if call isn't answered, then voice mail records callers message (existing computerized tel answering system) +-for office or home: tel only rings in room where person is, not disturbing others. System recognizes person's presence by their transmitter. This transmitter can have many other functions for systems identifying where they are within a dwelling, according to other features in product files A, B, and C. -Footnotes: remote ("R")a = display ("S"); = "C"; = pp; = mp; = uk; = date; = all; = "mic"; = synth; = mflha = alertera = osc; = vc; = score; = tel;
sp tel; tr; mo; fs; rpc; uq; access; uip; character; clapper; distancer.
Option: only caller(s) with particular caller id's (according to receiver's /*sender's UIP) will get their calls channeled through this locator system; whereby other callers might go thru normal channels (eg: receptionist -> voice mail/answering machine if user is away from their main location)
3G050 Re(router) for T / C (M, Information Highway): 1] reconnects u back to telephone number extension they were transferred to but later disconnected from. 2] Acts as bookmark in relocating where user was on information highway or M.
S = D: s = mm-c-t -3C-370 Smell Telephone:
When the boss speaks with its subordinates, they want the people to be in a state of mind of attention, etc.
Emission of certain smells when speaking in certain situations can be desired. -System may best work within a special telephone network. -Applications for types of smells being emitted when people are speaking in the following situations, with: clients; accounting; suppliers; morn calls son while she is still at work; etc. Different behaviors are required for each situation.
C100 Goggles contain miniature TV screens. Sony 23 Nov 92 NK
D: uk/remote=c(c100)-tel. Likewise, user cans see/hear who they are speaking with; useful in "VR" too. -user can make/receive calls while in virtual reality experience (the actual software program for VR can be stopped, so call= can be made / call conversation can be made while user enjoys/is using the VR for other modes ("entertainment") simultaneously. --user of VR can be "notified" (hears tel ring) when incoming call comes in.
Voice mail and virtual secretary: identifies important incoming calls and either takes a message or patches call to recipient whether they are on the phone or at another phone elsewhere. For details on wildfire call 415 8349453, or 800 WILDFIRE. See article in SF Chronicle, p. D1, June 16, 1996. "route" = wildfire SCORE * = D: score = c-t -Cl Tel tallies phone charges, display ("S") shows how much the call costs, before 92 MF. Probably Sony, other manuf now too.
SOUND ANALYZER *= D: mic = signal converter = t-c -Analyzes mechanical failures and anything else emitting applicable/unique sounds according to a phenomena.
Use in remote ("R") locations, transmit via TEL/TR. -G. Know what user is typing onto their computer ("C") on other end of tel line via "sound analyzer" picking up of signals generated as user types -> UIP. "Sound Analyzer" also studies any/most of the other sounds generated on other side of tr (at other parry's location), eg: cooking, background conversations. -applications: data about other party for the curious; for developing UIP database. -BVA uses "Sound Analyzer" to help understand the speaker (their behavior profile). -1 R-54 T accepts voice commands. Speak person's name, and system dials person's tel number. [Sharp Corp, 22-22, Nagaike-cho, Abeno-ku, Osaka 545 06-621-1221 NK] -OTD:
ACCESS **:(via sound analyzer (only certain verbal commands/person's voice permitted); CAMERA:(control camera: eg, lens angle via verbal commands (viatr/t) (for remote ("R") camera)); CART *:(); ENTERTAIN:();
MFH:(); MULTI-USER*:(system recognizes different speakers, and will function differently even if same words are spoken by different people, eg: picks up on their regional accents / male / female voices);
NOTIFIER:(); OSC:(); PR:(); R:(); S:(); SCORE:(tds); SYNTH:(); TEL:(tr); UIP
STEREO * = D: stereo = mm-c-t o Stereos: Speaker tel is part of veh icle/home/office "stereo" system. -D: tel (microphone-main unit speakers (handset/stereo's speakers). -exists?
SYNTH = D: synth = mm-c-t
TDS tds = c (pr)-t-mm
TRANSFERRING INTER-SYSTEM TELEPHONY = D: System 1- C System 2- C. 8B-16 Tel Switcher:
Device transfers an incoming call from mobile tel to a regular tel. -Purpose: save money. For those who started call on mobile tel. Listener need not know the switch is taking place. transferring method possibilities: have regular tel line dial into the cellular tel line at which time the regular tel line will take over call; The receiving mobile tel must have special feature to allow this.
UIP D: uip = c--t -Information about how those user(s) speaks with/ about himseif, is collected (over time). UIP gets info from: "sound analyzer" = develops personality profile in C; what user "uk" = C. oo-o-C=112 Computer ("C") predicts human error. Input UIP (working conditions of person). System predicts errors there likely to make. 30 Sept 92 YD. -Sends warning via "tel". D: C112=tel/tr=osc (alarm)/notifier 5A-720 monitors number of calls and lengths of conversation between certain departments. A computer ("C") database can show all types of graphs for diverse purposes, eg: which departments might need to move closer to another (during or without any corporate re-structuring), future plans, seeing the values and flows of departments, etc.
UK = D: uk = t-c-mm -Hand written image input tablets: dial (uk) tel numbers by writing the number onto the tablet.
-Bar Code Readers - Writers: data read/received is TR; C can tell writer W5 to print which bar codes. D: bar code reader/writer = c= tr/tel = c/mfh
-Image scanners: scan tel numbers/codes to get/compile tel numbers. Part of needed info can also be scanned and then matched with other data, eg: scan peoples names, and system's memory knows their tel numbers.
Hence user can then quickly develop desired tel list for C!"tel". -Touchscreen for - television, computer ("C") training devices, virtual reality, Intercoms:
User uk (touches desired numbers for contacting other party (via tel) (to get more information, place an order, friendly chat). -C32 Notebook computer ("C") with built in printer ("air pad"
OK too, but make sure its built in). IBM Think Pad 550BJ... Jan 93 release date X. D: C32 ="tel"-remote -o-C99 Pancake music dial. Each disk controls different sound modulation.
Sony. 15 Mar 94 "Brutus", p.24 published in Japan.
D: uk/remote (C99) = tel. (Dial/receive tel calls by rotating the pancake dials (not classic rotary phone dialer with the 10 holes) a 5A-710 Laser Keyboard: trip the light for the specific number wanted.
Invention has ten lasers (for 0 through 9) -great novelty -"tel" is one of the applications ~: great for wealthy people in kitchen who want to make outgoing. call from speaker phone with dirty hands; artists and clay sculptors; scientists and doctors who couldn't de-sanitize their hands
Laser lights may also be directed out into open space (lasers are directed (pp) so user can control functions of any product from their favorite seat wo needing any apparatus (remote). D:
Laser transmitters =(person can trip any lights here w the desired tcode') = Laser receivers = sensor = c = control of desired product. code': each laser can be struck like Morse code' generating 100 possible type signals from each laser; the combination of codes from each laser can be (for three laser lights 100 times 100 time 100). So the total code (made from 1 or more lasers) makes the desired control, eg: on/off/change modes/etc. -"osc" (beep: same or different sound according to code/laser) is made each time user: strikes laser / generates recognizable code. -partial list of products the laser keyboard can control:
Answering machines; etc. -this product is described in my other files, eg: Parts -D: laser diode(s) = tel-c = display ("S") -OTD (tel applications):
ACCESS **; BALANCE **; CART *; CLAP; "Composition" = Laser keyboard (5a-710) =*tel; Display ("S") (shows W5 of what's happening); EDUC** (can reprogram (pp) what each laser represents (for signal generation; EGH *); ENTERTAIN; EXERCISE ** (dial when wet: in sauna, where wet, while on jogging machine); FS **; MD *(osc); MFH; MORNING *; PP/MP; MQ/UQ *; MULTI-USER *;
NOTIFIER;
OSC; PRINTER *; Remote ("R"); SCORE (length/cost of call; tabulation of UIP);
SP TEL; laser dialer (5a710) = STEREO; SYNTH; TDS *; TEL; TOY *; UIP UK; WA** 5A-930 Get dial tone via "remote"/"clap", then speak person's name user wants called. -desired tel # can also be "clap" (make bursts of sound, eg: three beeps = the number 3 of tel #)
Voice Activated Key Pad: by making clear monotones in single or multiple bursts their corresponding key act as if pressed on normal key pad. Sounds can be of certain letters to ease memory for people in each language group. For people who can't touch keys: -scientists, doctors: can't desensitize hands -artists, ceramic people, rich people cooking in the kitchen and others with dirty hands -activate system via foot or elbow triggerable switch -system can beep sounds and or lights signifying that the key has been activated {eg: similar to getting a click when pressing a key in far enough} shows system accepts info. Each sound/light response might be different as with tel keypads 3C-010 Speaker telephone (incoming/outgoing calls; dialing (certain claps designate digits of tel number) 3C-120-08300Q Tel Touch Pad:
Press soft pad and the manner in which you pressed it is transmitted to receiver. This allows something closer to physical contact while speaking with your friends. Only popular for open minded cultures -the surface hands touch is designed to maximize human pleasure, and reduce any feel of moisture. -if the other person presses, you can press .at same point too. This pleasant tension allows the stronger of the two people to force back the other person - just like two hands playing together. -Footnote: mp; all; toy; exercise; cr & cp; tel. v see below section for pools--5G Speaker Tel Activated By Other Hands free Means: -Gen: Activation/Dialing/Deactivation UK/"remote" methods:
UK buttons separated/attached to: TEL (tel can be replaced by other communication device (walkie talky, TR) -Foot pedal(s): or use other instrument to UK activating tel line (answering call), dialing, hanging up. code used to step on pedal represents each of the call activities: activation; each # has different code (dialing might even be done on one or more separate pedals); deactivation of call. -"remote" -wall mounted buttons (by bed). -buttons part of another system / activates other functions: eg: lights, stereo, entertainment. -o pool side (those w pools are rich and desire the luxury of being able to stay in pool to handle calls) --system's sound modulation handles splashing water sol: it reduces their sounds; reduces any conflict in audibility --other: waterproof; portable unit (separate system/part can also go into water --for use in indoor pools; saunas too -hobby area (person doing ceramics)
-kitchen, sauna, garden, auto, garage, industrial/hazard area. -C: (don't leave computer ("C") to go and answer tel). Option: upon UK C, C might record/tabulate score/UIP of tel conversation. D: UK=C=TEL. Incoming/Outgoing voices might be modulated/interpreted/translated (simultaneously) as desired right on computer's DISPLAY/PRINTER. -clicking button(s) on pen/watch/PD
-D: user=uk/remote=c=te1/sp tel=tel line 0-the volume of the speaker is controlled by the A. number of bangs/type word spoken at the time the tel is being activated (1 bank is quieter than 3 bangs)
VISUAL ANALYZER % = D: binocular/camera (lens)-recorder = tr = c-mfh--displayuk-remote. -Binoculars: viewed material is TR via radio wave / TEL. User controls ("remote") what is seen (camera angle/focus) from his remote ("R") locations=.
VM / VOICE MAIL = D: mm-k-t-c = tr (telephony interaction) = t-c-mm-k * 5A-870 Call Holding:
Listener requests type music/news they wish to listen (or none at all) during their being on hold -callers ID (shows their UIP)/caller's city/country area code can help determine type music they would prefer -if desired, user can program from their tel to have the continuation of what they were hearing/seeing transmitted to them at their location (their tel) upon completion of the tel call; or PP when the TR should be made. --user can even get the "mfh's" channel (its tel #) so user can 1] re-access 2] contact the vendor who can sell the service for his own cos tel system 2B-250 Verbally input information (into voice mail) which is then automatically routed to receiver either in verbal or written form. Voice mail knows how to route message simply by stating for whom message is for at the prompt. -Verbally input information which is then automatically routed to receiver either in verbal or written form.
Voice mail knows how to route message simply by stating for whom message is for at the prompt.
All the inventions get people more interested in leaving a message, and leaves less of the impersonal feeling.
Markets creative adults. Incorporates all standard answering machine functions: date/time stamp...
- All reasonably available answering machine features can be options for each invention
- All inventions applicable for tel answering machines too -2B-250 Verbally input information which is then automatically routed to receiver either in verbal or written form. Voice mail knows how to route message simply by stating for whom message is for at the prompt. -6B-010 = 6B-1 (was 6A-1) if cal ler leaves message, recipient must return call in order to get message.
Recipient who wants friends to feel comfortable will have to call back and hence caller might feel more comfortable leaving message. Recipient might then get caller and speak with them directly if original caller is at their tel. -Touchscreen allows users to select from voice mail menu tr by other party's tel-c. (This is done simultaneously with voice communication (on same tel line)).
End Voice Mail VOICE MODULATOR = D: sound -> signal converter -> k-c-synth -> signal converter -> tr -~ t/osc -Person who knows about voice modulation: Wendy Rocchi 303-488-5713 AT&T (TuFri 0600-1400 MST) -each person might have own voice module because each person speaks differently. Is used by lead singers already. This could also be done on the trunk of the tel line (if user changes locations, then their "access code"/cid might match the needed voice modulations). -Use vocoder (type of "synth" where person speaks into system), benefits: voice sounds prettier (give voice fuller sound, give some reverb, remove some reverb, make it sound more gravely (sound is broken into bits)).
Though more difficult the voice's attack'can be modulated too. --' Filter' (potentiometer and tuned coil) filters out unwanted frequencies --+Noise Canceler': blocks unwanted frequencies, and or blocks out excessively high decibels. -SB-330 According to type application, person's voice is changed accordingly, eg: their voice for announcing plane is ready for boarding, plane is late (frustration, or anger in voice of speaker who is afraid of being attacked with anger from passengers and who in tern is semi hostile in voice as protection - this is bad), etc. 5A-950 Accent Alternator: change your voice to that of person with another dialect of same language +change sexes, sound more domineering, gentle, etc.
A2-720 TEL FREQUENCY RETURNER: callers fq recorded, then music/sounds in similar fq, stress, happiness, level/type of feeling is heard by caller while there on hold.
Purpose: makes caller feel at one with other party. e m might make alterations to change callers behavior. 8B-330 According to type application, person's voice is changed accordingly, eg: their voice for announcing plane is ready for boarding, plane is late (frustration, or anger in voice of speaker who is afraid of being attacked with anger from passengers and who in tern is semi hostile in voice as protection - this is bad), etc. 5A-90 (Needs more work) Convert voices into those which create the feelings of: passion, friendliness, energy, intelligence, impatience and the expectation that the listener perform their work well (studies show that speaking to people in certain voice tones tends to create better work results from them) 5A-91 the additional level of voice inflection needed to achieve aim.
Additional level needed can be based on what the synthesizing equip needs to do, or how the singer with only their natural means needs to make alteration good for music education 5A-920 Modulate your voice on tel / intercom according to situations wo getting up your own psychological anxiety, eg: 1. up your volume, 2. sound more intense (create anxiety in listener) -many don't bother to sound upset on tel (form of motivation) because it causes their own stress for parents tired of telling kids to be quiet. Method #1: press desired button for wanted verbal announcement.
Volume buttons - select easily with one touch how loud you want to be heard.
UP outgoing statements.
Method #2: device makes your voice louder so as to reduce your stress in yelling. Can be worn around neck too, or kept on table. -different news broadcasts are available according to UIP (tel area code) too -there may be other N related to this 5A-94 Voice Analyzer: recognizes voice's emotion and analyzes the feeling and or behavior of speaker. This is part of a larger product with other features. o Electronic translators: interprets/translates for user over "tel" lines. -D: user=uk/mic=voice recognition system-clap-electronic translatordisplay=tel=tr -Examples: --uk/speaks desired words/text, then system will print out and or osc to party/c on other end
A2-140 TELEPHONE VOICE MODULATOR: mix w mind corrector, music selector, personalized CD. Too much or too little of certain fq need sound therapy. MFH listens to incoming and your outgoing voice. Get the therapies while you are on hold or when you ask for it or it kicks in (maybe - if you want) when needed based on your outgoing voice, or when co manager deems appropriate. Input personal info to activate. Can also increase feelings of seriousness, quality control, success...
End of Voice Modulator.
VR %= D: VR = mm-c-t WA % = D: wa = mm-c-t. G. WA (walkman) which is mobile/cordless tel.
MISC: Octel Communications Corp can be designated developer of additional R&D and manufacturer for any
KN Telephony invention. There in Milpitas, California.
END OF THIS ' T SUB-PARTS SECTION
File: Features Intro / IMI * 5 TEL PARTS (FEATURES) *
Intro &: The applications / expanded additions of these Parts are found under the #1: Part's main headings; **#2: how the Part is used in other products and Parts.
ACCESS *1:
ANSWERING MACHINE:
ARTIST ** ~:
BALANCE *1:
BVA: -The Confidence' telephony product may be placed in "mic" so that U's sounds (voices) are more precisely analyzed. Confidencer helps block out noise generated far from "mic" (street noise, etc).
CID: -CID is not restricted to just the trunk line # when receiving calls from companies (includes the specific # of caller too). -since multiple people can call from the same tel ("T") # / trunk, highly sophisticated systems use BVA %[& any useful elements from uip] to help determine / decipher who the speaker is (from others using said tel ("T") # / trunk.
CAMERA (LENS)~:
CARTO:
CLAP~: -manner in which U "claps" (loudness, voice tone, speed of commands (exemplifies IQ / knowledge of system)) effects how system will interpret U's UIP.
COMPOSITION **~:
CONFERENCE:
EDUC~: -educational programs are tailored to uip. Eg the following are altered in the program: sound quality, graphics, intellectual content (menu choices / order of presentation), length of program. EXERCISE:
FLOAT **~:
-converts any MM image onto: paper, * stored electronic medium
GAMES:
INFORMATION SUPPLIER: presentation utilizes EDUC modes
= 30 LOCATOR:
MFH*: -stores (complex) data / programs. Eg: EDUC, "information supplier", BVA PR, uip
MIC: Connectable to vocoder
MOuSE~;
MULTIMEDIA:
MULTI-USER:
NOTIFIER:
NOTIFYING CALLS:
PORTABLE:
PRINTER:
ROUTER:
SCORE:
SOUND ANALYZER:
STEREO *1:
SYNTH:
TDS *1:
TRANSFERRING INTER-SYSTEM TELEPHONY:
-speed in which users k needed digits (as requested by voice mail / for extension #s) helps determine ups behavior. Egg: fast smooth entry is intelligence / familiarity w co or system slow k being the opposite; uneven flow of entry is being unsure. -Incoming calls on major networks are tagged according to Caller ID. The program routes calls according to information tabulated on the caller. Diverse applications, when properly utilized, are proven to boost company profits.
Sales Telephony (UIP)
Nationally advertised telephone sales numbers automatically route more valuable calls to appropriate sales people. -Programming's many options let incoming calls to be tagged as needed.
Examples: -The callers telephone number is matched against telephone numbers of past callers, or databases describing most telephone numbers nationwide such as by company size. Preferred callers are routed to staff with better sales skills, who may also be better trained in the callers type needs. Northern Telecom already routes calls in
Canada to bilinguals according to the callers region. In the US we can match calls coming from particular regions such as California or the South, with staff conversant in the callers dialects and mental outlook. This is proven to facilitate rapport.
Tech Support Telephony (UIP)
Calls from customers with a history buying upgrades of the software are routed to better trained staff. Calls from difficult customers, or regions like New York are routed to staff with "hard phone skills". Verbal and data communication may also be routed according to the user’s registration number, keyed in the beginning.
Difficult callers can also be kept at the end of the waiting que longer. -Results from extensive research on Telephony User Information Programming is available. Other systems developed by Steven Kays are being used by the Baby Bells and NTT.
VISUAL ANALYZER %~:
VOICE MAIL":
VOICE MODULATOR":
Telephony Q:
DID: direct in dial telephone number
Dead Air: no music while on hold VOCODER: (type of "synth" where person speaks into system), benefits: voice sounds prettier (give voice fuller sound, give some reverb, remove some reverb, make it sound more gravely (sound is broken into bits)).
Though more difficult the voice's attack' can be modulated too.
FILER: (potentiometer and tuned coil) filters out unwanted frequencies. But by itself will make voice sound like something is missing. This is part of vocoder.
NOISE CANCELER: blocks unwanted frequencies, and or blocks out excessively high decibels.
Lingo Q: -caller: -receiver: -while on hold --put on hold -call routing, according to: CID;isystem's database on CID; routing call within office during same call
CONCLUDES THIS FILE: FEATURES INTRO / IMI * 5 FILE MAIN FEATURES File: Features Intro / IMI 26
Dec 2006 Version
OUR MAIN FEATURES FILE
For Updates & More Visit www.LicenseItToday.com. Tel (+1) 707-428-5000.
Introduction: This important file explains our features to a moderate level.
Later more details can be read in our main features file. Features can also be viewed as parts or functions. * Later see table of contents for older and less used features.
THE FEATURES:
ACCESS = Gain access via a wide range of means to our electronic inventions.
Methods include giving passwords, or having one's fingerprint analyzed. Like the word "access" suggests, it offers forms of
Access include: Passwords, admission, having a license to use or produce an invention, connecting, contact.
Having a license. Even visual scans of fingerprints, could be considered. For details on this and most of our other features, kindly visit the detailed features section listed in the table of contents.
ADAPTING TM = Invention determines what is needed, and then automatically adapts itself. A common example is when it adapts to the user’s needs. It can also be called
Tailoring or User Information
Programming. Details in UIP below. Then more info in the detailed features section=.
ANALYZER = An important feature. Like the word "analyzer" suggests, it thinks about what is needed, and reacts. In other words it is a system that attempts to match the human brain in making decisions.
Decisions are made from a choice of preprogrammed possible reactions. It makes the needed analysis as designed. Using fuzzy logic, it takes on the needed functions of software, as would be needed to handle the applicable tasks called for.
For Techies: Forms of Analysis: estimate, predict, figure out, inspect, interpret, investigate, judge, resolve, scrutinize, %test, think through [the menu options], dissect, divide, audit, canvas, formulate, [try to connect] associations [between digitized files representing real life matters], explore.
See our Artificial Intelligence related files.
ANIMAL *= Inventions adapted for pets in a wide range of ways.
Read Later: Things our features can do for animals including pets: Analyze them, and their. behavior. FTrack them. Their behavior modified via: communicating with them; interacting; educating them; keep animal away from certain zones. See our folders for: pet inventions, behavior analyzers, tracking devices, etc.
ART / ARTIST = Optional software can alter images. Tailor pictures to your taste. A useful multimedia tool. Can automatically edit images as programmed, or system can help guide user in altering images.
Systems Visual analyzer with wide powers, determines the characteristics of the image to be altered. Later read more details in the detailed features section.
ASSOCIATION / ASSOCIATE / ASSOCIATED / MATCH =
Like a human brain, it makes associations between multiple situations. A form of artificial intelligence relying on fuzzy logic. Look at it like a clever system that can find commonalities and connections between any two or more things. How do you use the terms in your vocabulary? That can be how we also define this useful features.
READ Later: Functions like how a human or *animal draws associations between multiple things, people, actions, characteristics [experienced by five senses (sensor)].
Associative Memories [Al]: Example steps: At Home: I.=Owner's dog barks too loud ortoo long while owner is home, while UIP system and dog are at home. 2. adapt draws auto-associative memory, by matching what its sound analyzer hears. 3. adapt (UIP) slightly punishes dog. Out in Public: I.
System senses it's outside the home. 2. adapt (UIP)'s around analyzer determines some dog has barked. 3. Via hetero-associative memory it realizes there's a dog. 4. Via associative memory it determines it's the owner's dog. 5. adapt (UIP) responds to owner's dog barking differently than when at home.
BA / BEHAVIOR ANALYZER /*BVA = Behavior Analyzer. This important feature uses multiple means in determining the behavior of who or what it is kindly observing. This information is available to the system that wishes to adapt a function for the user’s tastes. See the detailed features section.
BALANCE / BALANCER TM = Inventive way in which audio speakers balance their volumes so you feel you're still in the middle (sweet spot) as you move around.
C = See "Computer"
CAMERA / LENS = The system's electronic eye and visual recorder.
Read Later: Tracks and analyzes changes in its visual fields. It's visual analyzer feeds information to: behavior analyzer; notifier; other' analyzers; activator of function when designated [visual] occurrence has happened. Lens adjusts itself to best capture visual activity, e.g.: for distance, tracking moving object.
CART / CARTRIDGE = Just imagine a cartridge that gives needed functions just by popping it into an invention. It can be software and or an automatic license.
For Tech ies: Any flour electronic invention numbers / functions are [also] [un]pluggable.
Connect/unconnected/activate an invention as needed. Cartridges are a[type of] anode in the unity of inventions' system. Cartridges can be inserted/connected into the [inventions] [sub] system. Can contain useful software / databases / features.
Customization: Use cartridges customized to the designated function; and or the cartridge has the customizing features built in. Can require access [passwords / licensing privileges to activate].
CHARACTER *= Animated graphics used in software.
Read Later: Characters portray: "moods", personalities, facial expressions, facial / body movement. See: -f"Edits" "Images"; See "S" for other details. A'game entity [normally not a live person themselves in flesh].
CHARACTERISTIC = Facets that differentiate something. How do you use the word "characteristic"?
Read Later: The distinguishing traits or marks [from other inventions, 'game entity traits], idiosyncratic traits are more distinguishable, what comprises the entity's or inventions character, feature, disposition, unique [mood, editing, form of education or guidance.
CLAP *= Clapper. Activate electronic features by your making sounds. Each combination of sounds from hand claps or verbal sounds/speech controls a different function.
Read Later: Allows user to control invention without touching. E.g.: via clapping or verbal commands -> mic > sound recognition system -> c(computer- in center of system) -> activates function. Also: voice recognition recognizes human speech (follows spoken word's commands).
COMMUNICATE = Imagine people and or electronic inventions communicating with each other.
Read Later: When any two or more people, other organisms, and or devices communicate with each other in any way. Modes of communication include: OSC (outgoing sound communicator) might speak words to a human, Electronic Transmissions, Signals, Something experienced by any of a person's or animal's five sensed (sounds or flashing light-see Pet-Communicate sub-part), Notifier, etc.
Normally some reaction is expected in the counterpart of the communication, as there could be a purpose to communicating.
COMPOSE = What sounds might you like to compose? Or would you like an invention that has learned your tastes, to then synthesize something for your tastes? Do you prefer having more or less than normal level=s of bass or treble? It can even talk to you like a favorite actor. Electronic Music Composition:
The product can. also be used to create interesting music or sounds.
+ COMPUTER / C= Computer. Central processing unit of this system and its inventions.
CONTENT ANALYZER / CA =
System determines the nature of a substance. Think of a substance you would like to have analyzed for its contents. Remember the world has a wide variety of ways to analyze just about any type of contents. They range from X-Rays to soil test equipment. They also include our Sound
Analyzers (SA) and Visual Analyzers (VA). Also: our Smell Analyzers, Motion Analyzers and *Taste Analyzers.
READ Later Rest of this Central Description: 1] Physical content analyzer:
CAT Scanners, X-Rays, Scales*. 2) Database content analyzer: Types of databases analyzed include: ba-db (database); track-db (database). adapt (UIP)-DB development is a type of'Content Analyzer. Applications: develop adaptation (UIP)-db (database) or adapt (UIP)-tailor.
COORDINATOR = This feature coordinates different parts and aspects inside the electronic system.
Human beings naturally coordinate themselves, like their eyes, posture, hands and brain as they read about interesting inventions herein. Feature examples: 1. If a music synthesizer's volume goes up, it may refrain from allowing the bass to get too strong, to avoid damaging the speakers. 2.
Windows close automatically when it gets cold, but if a flowerpot or something is accidentally left on the windowsill below where the window is coming down; the window will only close far enough as not to cause damage. 3. It determines which functions are more valuable for the person, and tailors accordingly.
CUSTOMIZE = Same as Tailor, Adapt, and adapt (UIP) (User Information
Programming). The terms Adapt and Tailor are better than Customize. The latter is used as the term can shorten the text descriptions, because they require fewer accompanying words, e.g. "customize" is shorter than "adapt to the user" or "tailors it for...". Don't get stuck on the word "customize", stick with the "Adapt" concept.
D TM = Figurative Drawitig. See the Figurative Drawing file that explains the easy codes used in our drawings. Drawings were frequently called Diagrams up to 2006.
Read Later: The term Diagram: May also be represented by "dia" or "diag" or "diagram". Also see "Tel" part. * Telephony is the old and rarely used abbreviation for "D". The old definition for D was telephony. [Since "D" for diagram is easily verifiable due to context, e.g.: it normally was followed by a colon and then diagram with parts lined together with the symbol.] Please see "T" for the definition of telephony.
DANCE *= Things are triggered by how you move your body. A motion sensor interprets how you move. Imagine having sensors on your body's appendages; then a computer could see what was moved.
Read Later: Sensor guides user in proper body movement for physical therapy, or for learning golf swings, etc. Movement of body / device% generates sounds. Includes Yamaha's Miburi, which copies KN.
DB = Database. Stores needed information: as short or long-term memory files.
Database is important in the systems' analysis functions.
DESIGNATED = What has been selected. Refers to a scenario falling within a specified range. It's used much like the definition of "designate" in any dictionary. -Examples: --Seek & react uses designate to seek some occurrence or state of being within a[pre] defined parameter. -"Access" allows designated passwords -"Behavior analyzer": designated behavioral profiles -"Education": system seeks designated information user needs to study (from internet). -"Visual analyzer" seeks certain images -The software program's parameters need element(s) within bounds of designated characteristics. -Diagram: input - electronic signals ->c (computer)- (designation criteria analyzer) = next step: after designation criteria are met following action can occur.
DIAGRAM = See "D" for Figurative Drawing.
DISTANCER TM = Signals or system responds whenever any two or more parts: separate or touch or alters in certain algorithmic domains of time or space. Notifies when certain algorithmic functions have been met, eg: separated by certain distance; for longer than specific time spans.
See +Positioning System, and +PSZone.
EDIT / EDITOR = Alters text and graphics as desired. Can be done automatically as programmed. Sample alterations: insertions or omissions; highlighting; rearranging.
Read Later: -Benefits of Editing: tailors data; Helps artist and education process. -Toggle Multiple Cut and Pastes. Cut and paste the memory of several different elements, without memory loss after a pasting. Toggle between pasting/activating multiple elements. Toggling controlled by edit, educate,
ADAPT (UIP) Tailoring. A separate function controllable by human user.
EDUC I EDUCATION / EDUCATE = Teaches the user what is designated. Can teach user how to utilize and benefit from features. Software based training.
Read Later: Educational: also used as optional learning program or experience. Teaches skills (via separate software tutorial mode). Overlaps ',Guide functions. -Educational: can also be used as a learning program or experience. Teaches skills (software has tutorial mode). (Helps) replace human instructor. EGH [Educational Gets Harder] is subset of "Educ".
EGH *= Education Gets Harder: Compensates users for their improved performance. System remembers user’s performance and makes itself more or less challenging accordingly. See IGH (Therapy Gets Harder) and
Education files for details.
ENTERTAIN / ENTERTAINMENT *= Users can also derives pleasure from invention.
ENVIRONMENTAL PROTECTION / E.P. = Our system hopeful can monitor itself and or the environment. It may adjust itself for greater EP. Analyzer uses sensors to determine what's happening. It seeks and reacts to designated situations.
EXERCISE ** ='Guides and allows user to use invention in a novel way for exercise and good health.
Also might function as helpful companion, guide, or rule setter in physical exercise. *Score's person's movements.
Read Later: Also might function as helpful companion, guide, or rule setter in physical exercise. Drawing: I ->
-For Techies [OTD (Other Technical Details)]: u (user) moves from body posture/point I to 2 while user is interacting with product both in I and 2; 3 person continues exercise (123456...); system is good for person moving about in at least a minor fashion, though not necessarily requiring strenuous physical activity. -"Billing": bills. *See: Access' Features for Motion and BA (Behavior
Analyzer) (behavior analyzer): type motion= matches needed behavioral profile to gain "access". -Type motions ("scored" (via "sensors")): "Dance"; Vibration (KN); PS-Zone;
Access' "Motion"; How object (made (by u) to "Float".
EXPERIENCE = Person experiences part or all of system by their physical senses. The joy of the experience is one of the inventions many benefits.
GAME = Common definition of game. Videogames. Arcade, computer, electronic, mobile and wireless gaming.
A(so potentially playable on [mobile and wireless] computers, NintendoTM,
PlaystationTM, XboxTM, and or our designated invention [hardware]. Inventions have additional 'game related functions. See our many game invention variations in the games folder.
GPS / PS (Positioning System) = Global Positioning System. Studies any movement of one or more objects/parts in relation to any physical or time grid. Movement is correlated with other databases. See GPS (Positioning System).
Read Later: Receive guidance for what you do and where you go. For example, our GPS Controlled
Headlights: notifies what's coming up, eg; curve in road. Tells users which way to turn. Or communicate any information as programmed. Light/sound/vibration can be emitted in any way [to driverlpassenger(s)/back seat drivers].
GUIDE TM / GUIDANCE = Acts as the user’s personalized guide. Helps users learn how to use the invention, by tailoring the guidance to the user’s interests. Helps users in way they will better understand, especially in areas they need more help.
READ Later: -Examples: 1] Suggest how best to use system to match user’s particular requirements, traits or preferences. 21
Educates how to use system. 31 Knows when and how to prompt person so they can better use and or learn system.
Tailors itself to user’s unique needs: each user and situation or task is different. -Suggests how users might proceed [when stuck or having other trouble (with system)]. -System guides / prompts users for when / how (w5 (what, where, why, when and how)) they can be "educated".
ICON = An image on a computer screen. It represents one or more features that can be activated when clicked.
IMAGE = A graphical depiction on screen. Artist and edit can alter images. Alcon is a type of image.
INTERACT / INTERACTIVE / INTERACTION % = Interactivity. Interactive system.
How system responds to person. Useful interface offers multiple ways to utilize inventions features.
READ Later Rest of this Central Description: Systems advanced alternatives can approach virtual reality.
Tailors itself to better interface with user(s) so as to: be easier, or more exciting to use, or better help accomplish user’s desired task.
Interactive modes of Activation: Activates a signal via one of the following methods without touching a button. User activates via remote mode, eg: user makes vocal sound, clapper, activates a distancer), touches a computer screen.
Interface covers: How person and system interface seek and react to each other, focusing on the system's functions. Manner in which user interfaces with system. How system "reacts" to "user" / how "user" "reacts" to system.
K = Keyboard. Person inputs any type of information via whatever electronic means. This feature (also viewed as part) can be replaced with Remote Control part. *"Interactive" Images: for computers or interactive screens: Can use "interactive" keys or icons (on screen).
KN = One of our inventions in this or previous patent filings conceived by Mr.
* Invention shows that we have the same or similar invention. invention is a subset of N (one of our inventions).
N Inventions in this or earlier filing, and or other's inventions and nonpatentable products.
LICENSE / LICENSEE / LICENSOR = Having access to designated features.
*'Billing: User/'Licensee is normally billed for payment, based on access related criteria. Payment [can be considered Royalty]. Tracks licensee [usage level (in designated zones/market regions)].
LOCATOR / LOCATE *= Locate what you seek, and it can be found. Uses GPS and other positioning systems to identify where something is based on its tag.
READ Later: Shows object's location (or person its attached to): Correlates an object's location in relation to that of other set objects, eg: other positioning devices, (fixed) location sensors. Shows location. Systems receiver (A) identifies the location of its related electronic devices (B) which can be separated.
M MFH = Mainframe computer is connected to system.
MATCH: See "Associate"
MIC / MICROPHONE = Microphone records sounds onto microchip or tape. Such sounds can be studied by around analyzer and fused as designated. -Microphone adjusts itself to the direction and distance and type sound, to maximize record ability.
MORNING * = Morning alarm system. Be notified in creative ways.
Also functions as a creative morning alarm.
Read Later: Uniquely wakens up the user such as via morning alarm, next can require them to act in some manner to bring them to full wakefulness, eg: by requiring some intricate task [on their personal computer] to deactivate alarm. A common piece of hardware for the software is the popular
P.C. Can alert one at any time, and might require a novel way to deactivate in a special border & timing.
Drawing: tds/uk/remote =c (computer)= alarm.
MQ *= System asks person questions, enabling itself to be better adjusted to person's needs. Is an instructoriai'guide)for user; with help menus. MQ's analyzer studies behavior of user so as to better enable itself to gain information designated as being helpful for user interface.
This is a sub-feature of the Adapt feature.
MM / MULTI-MEDIA = Exciting audiovisual effects. Great for the inventions interface. Enhances the user’s experience of the inventions many features. Sounds, graphics, typeface and other images are tailored to interest the user.
MULTI-USER = Invention adapts differently to each user, which is why it's called Multi-User. Each user can achieve a different benefit and experience, as those features, which are needed, will be offered differently on an as needed basis.
READ Later Rest of this Central Description: System is programmed to differentiate between multiple (u) users, and tailor itself to each different user’s needs. Each u (user / person) is differentiated from others via their: physical characteristics, ABA (Behavior Analyzer), access code.
N= Inventions in this or earlier filing; and or other's inventions and nonpatentable products.
NOTIFIER /NR= User is notified when something happens. They are alerted to the occurrence of any designated event. Determines the nature and degree of urgency, and how best to alert the user.
READ Later Rest of this Central Description: U (user) is nr (notified) via: sounds, lights, information on computer display, vibration (of device touching body).
Tailor or users designate what: occurrences cause the notifier to reacts, and 'W5 (what, where, why, when and how) are notified.
ORDER & TIMING / O&T TM = It analyzes patterns in the order for how events occur. Different patterns are interpreted separately from other patterns. For example a slow beat of drums differs from a fast beat. Each pattern triggers a different event. The world of events is filled with such patterns. These patterns along with what the system may pick up by way of its available sensors help it analyze what is happening, so it can react accordingly. .
OSC TM = Outgoing Sound Communicator. Audio function. Systems speakers communicate with users in words or sounds. System tailors its communication to the user’s listening abilities and preferences, e.g. offers higher volume when the Sound Analyzer determines there is background noise.
OTD * = Other Technical Details. What can maybe be read later. Usually for those interested in the technological aspects. This term is simply a header used for the parts. "For
Techies" can be the same as "OTD".
Later read more about it in the introduction.
PD TM = Positioning Device. The element whose location is being identified.
GPS is one way to track positioning. Portable unit(s), which broadcasts their location to PS (Positioning System). See: PS.
PORTABLE *= Portable. The separate portable version can be half the weight, and twice as compact, and shock resistant as non-portable variations. Can be used as a Walk About invention.
For Techies: Drawing: c (computer) = battery = protective casing around product = handle
WA strap: use the product while walking about, since the strap will hold itself in place on user’s: upper leg, upper, lower arm, waist (use by just turning head down), necklace, or shoulder strap; bp. 5E090 Wireless terminals connect to central system.
PREDICT TM / PREDICTION = Software predicts what will happen or how user will act. Its analysis of past action patterns, allows it to project future likely patterns. The more information it has about past patterns the better it will predict. Anticipating likely future occurences better enables the adaptive system to manage future situations.
READ Later:
In other words, likely occurrences, or behavior of others are anticipated, better enabling system to respond to or handle predicted situations. -For example feature can predict: 1. what type of guidance user needs to become better educated with the feature's abilities. 2. Profitability from licensed inventions. 3. Ability for this patent application to maybe stop an infringer from using our ideas, e.g.: this application might show ten, one hundred, a thousand or more examples for how we describe our invention in our link structure. -Prediction works via analyzing: border & timing; behavior; adapt-db (database); (scored) -rpatterns; other algorithms.
Prediction algorithm: Step 1] collects historical information. Step 2] identifies (past) patterns, especially searching for parameters as designated. Step 3] determines present and or future (known) events or parameters.
Step 4] Fills in the missing elements of step 3 with multiple predictions for each slot. Step 5] each filled in anticipated scenario from step 4 is analyzed and scored for the likelihood of its occurrence (as in steps 2). Step 6] each prediction is scored for likelihood. Step 7] prediction may opt to use the prediction(s) with highest score(s). 8] Designated functions are altered accordingly.
Likely behavior of others (in real life) is anticipated, better enabling designer of (kn) system to make their system respond to or handle predicted situations.
PR / PROGRAM = Program: User and or manufacturer program the product's computer software.
PS % = Positioning System. A general term covering many of our features. It uses Locators to identify something's position. Locators rely on positioning device like a mobile GPS unit to read where something is located. Then this information can be sent wirelessly to the greater positioning system.
PS-ZONE TM / ZONE = Studies moving things within a zone. Permission to use an invention can be zone restricted. For example one may have licensing rights for a wireless invention in Munich and Silicon
Valley's Palo Alto.
Read Later: analyzes the location of positioning devices, especially in terms of when and what (w5 (what, where, why, when and how)) they are doing in the designated zones. Limits or allows access to designated functions according to the zone of user and or what's attached to the positioning device.
Q / QUESTION / QUESTIONNAIRE = System asks questions to get needed information. System asking person questions better enables adapting it to the user’s needs. User can ask system questions, such as via a software help menu.
READ Later:
User / System asks questions to each other. See U (user asks system questions) & mq (manufacturer asks user questions to adapt it) functions for details.
R = Remote Control. User can control the system either via remote control, or keyboard.
REACT / REACTION = Subset of "Seeks & Reacts".
REMOTE = See "R".
ROUTE / ROUTER = Imagine a phone call getting routed through an international phone network. Users can also be routed within a system so they can access its desired features.
Packets of data are sent where designated within the system.
Read Later: Software Routing Method. System analyzes user’s needs and routes them to the designated points, eg: on information highway, or to designated files or programs within system.
S / SCREEN = Display Screen. There is a touchscreen variant too.
Read Later: Machine displays data on display ("S") screen. Display screen may also be "interactive" touchscreen (screen can function as keyboard "uk").
SCORE / SCORES / SCORING = Imagine a soccer or tennis game. The software keeps score. It scores just about any event that can be quantified. Example scores: 1. Users can score how well an invention adapted for their needs. 2. The system can score the likely chance that a user is actually hacking into the system based on their behavior profile. More.
Read Later: Invention can score numerical quantifications of a product; user’s performance; or status of situation. Definition overlaps function of "Status". System reacts according to how good a score is, for example it may consider something with a high score more important.
SEEK / SOUGHT = Subset of "Seek & React "
SEEK & REACTS / S&R = System seeks designated occurrences, which intern triggers an automatic reaction. There are two steps: First the software seeks a designated occurrence, then it responds accordingly.
It's like having a friendly butler to handle matters as things come up.
SENSOR(S) = Uses any available sensor to determine what has or is happening.
Sensors can  score for the presence of certain chemicals. The motion sensor catches movement in the area. Thermometers and other meteorological equipment are also sensors. Many more sensors exist.
SA / SOUND ANALYZER / SR / SOUND RECOGNIZER = Imagine having your ears in remote locations. And imagine your ears could interpret what happened for you while you are away. This is what the sound analyzer does. There are many benefits, for example: the system can react to an event based on what sounds it hears, such as turning on the lights when it hears your hands clap.
Read Later;
In other words it analyzes sound. Database memorizes tens of thousands of possible sounds. Analyzes type sound by frequency, volume and or direction and distance of sound source. Type sound generates a feature that initiates corresponding function.
Tagged Cascade Effect 7J08: System hones in on a frequency (sound), then cancels other sounds making tagged sound clearer. System reacts when the tagged action occurs. Hones in on anything effecting man's five senses. content analyzer, edit, seek & react, tailor, visual analyzer.
SEARCH & REPLACE* = Imagine a text editor's search and replace feature. More specific examples include: 1. A child reading a storybook online has their favorite color green inserted into the text to replace red, when descriptions of toys and other inventions come up; 2. Features in this system driven by software, can have its code edited; resulting in its being better adapted to the user’s needs.
Read Later: Aspects of database or other software elements are altered.
People who happen to have dyslexia can have text edited so it is easier for them to read. Each person probably has different reading difficulties such as with specific characters_
So system adapts accordingly.
Kindly see our Search & Replace file that was in the introduction.
Edit or Tailor alters how sections of computer, DNA or chemical code are
Searched & Replaced. The suggested formula is tailored to the designated need.
SOUND VISUAL ANALYZER / SOUND VISUAL RECONGINZER %* = Imagine a laser beam bouncing on a screen based on the music's rhythms. It converts sounds to visual effects. Or conversely it can convert visual effects to sounds.
STATUS = Would you like an automated attended to tell you the status of a current situation? It is cheaper than hiring a live person. The feature determines the status of something based on what scores have come in. For example: This invention can see if a factory in Viet Nam is infringing on its inventions and to what degree by scoring the volume of its exports. Export figures can be obtained from customs houses in
Europe, or even from investigators in the local country.
SW = Software Program(s). This can control what features are offered to the user, and how they are adapted. One can license software that is inserted like a cartridge.
SYNTH / SYNTHESIZER = Sound synthesizer. Received sounds are altered. "PP" & or "MP" selects the synthesizing program and how it processes sounds; microphone ("mic").
Sounds like music and verbal communication are "adapted to listeners based on their hearing preferences.
Useful feature in composing music, etc.
T / TEL = Telecommunications in its various forms are available. Mobile phones (called "cell phones" in the
US). Telephones, Internet. System and its features can stay connected wirelessly or via fixed lines.
TAG = Would you like to know what is happening to something when you are away?
Tag it, and have it tracked wirelessly by your system. Details in the FTrack feature file.
TAILOR T"' = See the Adapt feature, and discover how our inventions will tailor themselves to they adapt to the user’s needs.
TDS = Time Date Stamp. Program memorizes, labels, and identifies timing of desired occurrences. It registers what happened.
TGH / Therapy Gets Harder *= Use can be psychologically therapeutic. Therapy machine helping people. Also, compensates for user’s state of mind and or current personal info, and or condition, based on: what user keys in, are how well they scored in the previous physical therapy session.
TILT TM ='Remote Control Joystick. Otherwise confidential.
TR = Transmission: sending / receiving via: air waves / wire.
Read Later: Eg: radio waves, infrared light, copper/optical cable, tel line (whether wireless/wire). Drawing: * electronic product/feature = transmitter/receiver = transmitter/receiver =* electronic product/part. "Billing": bills for time used /"accessed", eg: like tel bill. This LTR feature can also be referred to by the term communication(s)' when used in the electronic context.LTR is a needed component, eg: for 4E020 Registrar.
The equal sign in our drawings (diagrams) shows where the transmission blinks can be.
TRACK / TRACKER = Tracking System. Tracks. System tags then tracks designated: person, file, and type activity. Can develop adapt-Database on what it is designed to monitor / study as studied element changes or moves. Software driven. Example: an intelligent monitor that tracks what files a person accessed in a computer; or other types of activity done by person. GPS follows where and how a person or vehicle travels on planet. Tracks a person as they try to gain "access", and what they do after.
TRAITS = Characteristics. Usually used as characteristics of a user, especially their preferences.
What they want a system to do for them. See User Information Programming (adapt) on how it tailors systems to the traits of the users and or situations.
U = See User UIP = See Adapt UK T"' = User Keys In Infonnation. This combines the U(user) with the K (keyboard) feature. Or just call this feature "K" or "R" (remote control) as a user is needed to use either access method.
U / USER = User can be a person using the system. Sometimes another invention connects to our system, in which case the outside (less central to the overall design) can be considered a user as well. Usually it is the entity licensed to use the inventions and their features.
VA / VISUAL ANALYZER / VISUAL RECOGNIZER. The camera can analyze what is seen.
Its interpretation of the image is sent to the automated system that can react according to what has been seen.
Read Later: Studies image thru its camera. "Analyzes" images. System determines what images are present, then system responds to images as programmed. It's tailored to Strack designated images. Visually Seek
Designated Images. A visual version of the Tagged Cascade Effect 7J08 invention.
VR **%= Virtual Realty. Future use with virtual reality technology possible.
User puts on goggles and or gloves and or body suits that let them virtually experience what a situation feels like.
WA = Walk About Portable version of the invention. Communicates wirelessly with rest of system and/or other systems. User interacts with it also as a portable way to access desired features (in main system).
Can have optional headphones.
W5 TM (WHAT, WHERE, WHY, WHEN AND HOW) = What are the five most commonly asked basic questions in the world? This feature asks I. What happened. 2. Whe=re did it occur. 3. Why did it happen? 4. When? 5. How?
ZONE T"' = See PS-Zone.
FOR MORE INFO ON FEATURES SEE:
Table of Contents. Files with more details on the features include: Features
Appendix (often includes important but less central specifications and diagrams), plus many files devoted specifically to each feature.
Then follow the optional links to other parts of this and connected patent applications. For updates and other information visit our site www.LicenseItToday.com
(D CONCLUDES CENTRAL SECTION OF THE FEATURES / PARTS FILE
SECTION FOR COMMON FEATURES IN GREATER DETAIL
READ THESE CENTRAL DESCRIPTIONS LATER
File: Access \ Introduction
ACCESS FEATURE
Accesses Table of Contents:
Introduction
Behavior Analyzer for Access. Files: BA+, BA, BA-Auto, BA-SC, BA-Tailor, BA1M1, BA-Pat, BA*.
Common Features
Images Needed for Gaining Access
Patents and Keywords
Miscellaneous : Access *
Gain access to electronic product's function with the correct password or creative input. Use Our
Masterminded Patent Application To Improve Your Security Control Ideas! Learn about our quick and easy licenses. Call (+1) 707-428-5000 www.LicenseltToday.com
There are many ways of giving access. Jump in and read how.
Forms of Access include: Passwords, admission, ability to approach /'interact, connection, contact, introduction - greater levels need greater passwords, perrnit, intrude, infiltrate, license, seize magic words for entry, correct password / keyword, abracadabra, secret sign [Rimage].
Permission to: achieve, buy, catch, collect, earn, gain, get, have, promote, secure, take, win [a 'game], recognition, parlay, pick [from menu], succeed to do something,
Any action a user can make and which is picked up by a sensor and intern converted to signals, such as: standing one meter from a heat sensor for 10 seconds, or blinking one's left eye twice. -Any occurrence can become an access procedure, whether in life form; or life form that effects a "sensor"; or electronically generated occurrence. Eg: any "R" or "K" or "Artist" invention is also utilized for generating (in unique a manner) signals, which are subsequently interpreted as passwords.
Examples of ways listed in Access'
Features (Parts). -(The term Passwords includes: Accessor's Changeable / Common Behavior
Profiles) +p--The untrained illicit observer may not realize there are actual signal occurring functions designed to gain "access", and even if it was noted, it may be difficult to log such actions by accessor short of having a motion camera. Required actions from accessor especially focus on those less readily capable by observers and hackers. Examples: body movement or behavior or work actions that may seem somewhat ordinary or which don't catch special attention. Password procedures may seem as slightly quirky behavior by observers, but possibly special notice couldn't be made if the procedures are camouflaged - see "Hide Access Procedure". -The largest Features (Parts) of "access" (as of 9.96) were analysis of images drawn, and analyzing behavior of accessor. Details of most access Features expound therein as well. -"Morning alarm" introduction: This is only one of the many applications for "access". "Morning alarms" are systems created to uniquely waken up the users, and then to require them to acting some manner to bring them to full wakefulness, eg: by doing some intricate task on their personal computer. If necessary, "Morning alarm" can be ignored only to better understand the general natures of "access". 3C292 Magical Building Blocks: Each combination has designated results. See 3CE file. -A1-290-1 2 1001 Finger Print Reader: Analyzes a person's behavior by their fingerprint. Also matches couples with compatible fingerprints. Related to existing "C" systems based on horoscope, blood type. Similar products exist at least in idea form, see "Popular Science" new products section for an issue in '94 - 4/96. * The UIP (user information programming) of user can change from data collected via "tracking" sys. % "Camera" = "Track", % "Sensor" = "Track". Tracking by "C" originated signals (eg: what u (user) is doing on el (electronic) sys (u=k=c)) is favored tracking mode, and cheaper to produce. -"Router": locates then= retrieves needed data= for this part.
ACCESS For Medical, & Biological Research: ** = Gain access to electronic product's controls with a correctly keyed in combination.
Each subject (patient/element being studied/user (human/animal/virus/%bacteria/ loplant)) has a separate code. -Each subject has its own way of triggering the code. Examples: -human keys in code -characteristics of subject are determined (via sensors / uip), these characteristics hence trigger one or more applicable codes. --Drawing #1: 1 characteristic (changes / identifies identity of subject) = 2 sensor = tr (transmits) (transmits) = 3 analyzer (uip) = c (memory). --Drawing #2: D 1= tr (transmits) (transmits) = signals (electrical / commands to control or change (electronic) device which is designed to = effect / alter the subject = 4 change(s) in subject = sensed via (D 1) sensor = D 1. 4: characteristic, egh = (physical state or change (chemical, color, temperature / type and or quantity of viruses present)). 4 function of viruses:~ speed of multiplying / deactivation / movement (speed / where to and from) /
4= characteristic of larger organism subject hosting smaller virus subject(s) 4 = chemical state of subject (larger host / viruses) ~: Ph / blood contents / temperature / sweat contents
This and other password generations can be utilized for training animals. Invention can cross borders of language, culture, age, intelligence, physical handicap, and sometimes even (mammalian/farm/pet) animals. 2B090 Sound Art: Convert sounds into interesting (two dimensional) shapes and colors. Program how a sound is converted into an infinite array of possible graphics. Images also dance live to the user’s tune of sound generated. -correct moving image= access: u (user) is able to see how their sounds are generating the required (images), allowing better sound control: Visual representation of sounds is easier for U (user) to gauge and make any needed corrections. -see 2B090 for details.
PATENTS: key word search of US abstracts 1.74-1.97 www.qpat: -(sound music) and (interact dance convert alter move) and (image picture color)
A1-540 Touch Card: Matches peoples finger prints with their credit and identification cards. -Checks the right person is using their card by matching fingerprints.
Applications: credit cards, ID card systems. -Can take fingerprints of those registered with (inter)national agencies, then you might also type a code, which helps "C", find your fingerprint more readily and as a safety precaution too.
It accepts those who are sending their payments in time. -use when using credit cards or other cards or other situations/products -eye in machine can ask person to put their finger there and compares print with its memory.
File: Access \ Ac-BA +
COMPUTER HACKER BEI-IAVIORAL ANALYZER & TRACKER
This file covers ac-ba (Access- Behavior feature) elements labeled with "+", then edited from there.
Abstract: The unique Hacking Behavior Analyzer catches hackers. It analyzes how a hacker's behavior deviates from what's expected from the legitimate password holder.
This software invention is a defense against internal and external infiltrators with the [correct] [access requirements (passwords)].
When issued, each password is scored for the level of security clearance permitted in each subject category. The built-in flexibility of the software saves security's man hours by occasionally allowing minor transgression into designated files deemed slightly sensitive and of possible use to the legitimate password.
Hackers are flagged [tagged] and so notified to the security system when the user accesses information [well] out of their password's normally permitted usage. The level of permitted flexibility to transgress is built into the password. It can be the live or automated security guard that determines how to handle!'react such a flagged password user.
Passwords later associated with minor deviant behavior (by the password user) result in a towering of the password's security clearance. More serious deviation results in revocation until the password holder can pass diverse tests to authenticate themselves.
Customization: Greater tracking is made upon user’s whose scores suggest there more likely to be illegitimate. System can reacts by offering traps that suggest user is getting information they need - as system tailors what they are fed. Links can be made to other tailored [patent applications] iriventions/features.
Manner in which our features interact with [illegitimate] user is designed to: tailor user’s needs / entrapment/ tracking. -Data user gets/transfers is tagged [so that it continues to be tailored to the user / what is perceived as the user’s belief for what the [stolen] accessed feature possesses. This data can become legally authorized software like virus [which leaves a trail] that can hopefully later be deactivated if/when time is right [hacker apprehended along with their accomplices]. This patent application need have no mercy for deceitful entrepreneurs.
Additional examples of deviant behaviors of password users include: -the password's behavior (user utilizing specific password) in non sensitive areas is found to be deviant (very difficult for outside infiltrators to hide). In other words, the behavior pattern does not match up with their past behavior patterns. -Caller ID doesn recognize callers location. -Outside infiltrators may wish to reduce their risk of the system noticing a simultaneous use of the same password. They may seek access at odd hours. Hence unusual access times when the correct user is usually not on the system, drop the password's score for legitimate usage patterns. In other words the number of "suspicious points" is accumulated by this behavior. -System scores hundreds of other subtle deviant behaviors.
Hacker Behavior Analyzer can be compatible with numerous existing security systems, to both protect valuable information, and free security personnel for their less automatable tasks. The hacker's inability to necessarily know that a required behavior pattern exists, let alone function within its intricate patterns, makes this patent pending software an essential safe guard.
End File: Ac-Ba +
File: Access \ Ac-Ba "ACCESS - BEHAVIORAL ANALYZER"
Introduction: System determines user’s identity by their personality profile, in other words their pattern of behavior on an electronic device such as a computer can be analyzed. System replaces a human sentry, which can permit access and determine if user’s behavior is appropriate. Also uses fuzzy logic.
Learn about our quick and easy licenses to access inventions for your use.
Call (+l ) 707-428-5000 www.LicenseitToday.com
The Behavior Analyzer Function: The software can automatically block information from the accessor. The differing behavior profile of each accessor, results in a scoring for how pertinent sensitive files are to the accessor, enabling the system to block information deemed less pertinent.
The Sensitivity Rating Function analyzes the system's files according to how it was initially categorized by security personnel. Files are categorized by subject, level of sensitivity, etc. This automatized screening system can also analyze contents via: key word analysis, and how the information is being utilized such as by whom and for what purposes. The Sensitivity Rating Function tracks changes in the file's content or usage to automatically determine if an increase or decrease in the level of security is needed. +Do: Take material from U IP.
The task at hand previously required excessive man hours. However, since no automated system is perfect, any of the system's security features can be programmed much like before, or overridden by the designated system operator.
Values: +-makes the access sys more mysterious for hackers. More hurdles. -Requires considerably more knowledge about: legitimate holder of password, how company operates. Nacker must also play act well above and beyond what they would normally prefer doing by pretending to use password legitimately. Limits the scope of potential hackers to those closer to understanding both the correct behaviors and access' scoring system. Yet none of the above is good enough if scoring system is tight enough. +-potentially less cumbersome or annoying for legitimate users. Fewer access entry hurdles have to be consciously driven by user to continue access, if sys monitors their behavior. +-Employers can more readily disguise their wish to limit access of (previously) legitimate accessors by stating: sys down failure, or the "ba" sys didn't work properly (due to incorrect uip=db). + Censorship: Limit what accessors can read or "interact" with, eg: parents limiting the "entertainment" and "games" children experience, by their subject content. Other types of "restrictors": --By limiting sensitive material to area accessor is interested= accessor becomes less suspicious that material they view has been "edited" for them: Eg, customers, investigators, stockholders and journalists seeking to study organization's materials: cut out subjects that are sensitive / what journalist via their password may "seek". ++ Inversely:
Manner in which uip-tailor functions can also be a form of access control, in that functions and material not presented are also a form of uip-tailoring. ba (behavior analyzer) can either "seek" what accessor Needs or is permitted To View; both being similai. -In other words: access=ba can "seek" /"edit" information for accessor. This is a form of UIP-Tailor. Saves user’s time. -Also uses internet's sw (software) that "seeks" "designated" news / other material that appears later on www. -BA knows what accessor wants to "experience" W5 = uip-tailor. -See: "artist's" "cut & paste"; "edit"; "seek"; key word "seeking"; ++"uiptailor".
"Education": correct behavior taught to accessor= thereafter such (correct) behavior required.
Needed "education" determined by accessors behavior. --Morning alarm: "designated" "reactions" from u (user) are "educated"= so in future u: more readily responds to alarm (in positive manner); teaches them new skills.
Tamper Alert: System "seeks" unusual / unauthorized (re) programming of sw.
-morning alarm: legitimate user can't readily deactivate alarm so they can continue sleeping. Eg: reprogramming not allowed during wake up time period.
Multi-User: Each accessor has differing access procedures, and safety protocols, and "access' ba". --morning alarm: each user required to deactivate alarm in their own uiptailored way.
OSC (outgoing sound communicator) is used to elicit "designated" responses (behavior) from "accessor".
Additional Applications: See *"Game". Likely hackers= trigger (closer) monitoring= from "tracker". + Learning from behavior of previous hackers: The system protected by "access" is statistically more likely to get future hacking behavior= related in style to previous hacker activity. -The behavior of previous hackers= is watched more carefully by "track". In other words: score is tighter for such behavior /"routing"= if its seen again.
How "Artist's Writing Instrument" is used = access-ba. deactivate morning alarm:
Material that is deemed restricted (for "designated" password) can't be: copied, transferred, printed, *viewed, *"experienced"=wo (without) higher level authority.
A computer system's table of contents has sensitive information blocked from "designated" accessors.
Behavioral characteristics and trouser's security clearance'score can be integrated with a [private cos or credit rating agency or government] data base of people: -employer helps determine.safety in issuing security clearance designated users. -employer's info shared with the data base service can: --help determine employer's and database's analyzer in determining trouser's new/changed security rating score. --help data base bureau's data bank, like Dunn & Bradstreet which sells credit info, but also collects it from the same clients.
Spell Checker: the same people often make identical spelling errors. Helps determine if correct party is the accessor.
The language interface requested by user can also be useful in matching the correct user. Eg: A French accessors password states their language of preference; and notification will be made should a'Spanish or
Russian interface ever be made [and then actually utilized [for 5 minutes - need to maybe give allowance for the curiosity seeker]].
Issue is there are two Features to KN, one scoring accessors, the other scoring the information. 3E061 Motion Tutor:Guides users to improve their movements, eg: the correct level of movement gains access. System assumes user’s movements will either change or improve over time.
END AC-BA FILE
File: Access \ Ac-BA-Auto
FILE AC-BA-AUTO 6B240 Driver identity System: driver with key can only activate car if their body weight matches car's memory. Owner programs car for one or more driver weight settings, or changes in weight. -integrates with any other sensor or related password function needed to activate a device/vehicle. EG: ova, sa, finger print sensor. notifies U (user) of weight gain/*loss; motivating them into better health.
U ip/Bad/increased/any weight/health-condition might have device suggest user walk (more) (to [nearby] destinations instead of driving). -physical dimensions (eg: body weight on driver's seat matches car's "C" memory): uip, access. -"PR": 1] Car owner can easily program a change should they wish to add or delete a driver. Eg: stop allowing your son to use car during school hours (access = timing device). *- should driver's weight be changing and edge closer to the set permissible parameter, a warning sound and or "S" or light goes on to notify them of a needed change. *- changes can also be made via keying in special difficult to crack secret code -The system measures driver via one or more of the following: approximate weight range, and or general physical appearance (eye, hair, skin color, height while sitting, etc) match car's "C". "Visual Analyzer" if weight is the measuring device, it will limit the degree to which a person can experiment by adding additional weights. That is the weight can't keep going up a little at a time with the ignition then starting. Real driver(s) must be in normal sitting position to activate car, thereafter their weight change by moving, etc does not effect car's ignition system. --should u gain or lose weight, theyl need bypass password / key to reconfigure ("pr") their new weight or other changed physical feature. -security is designed for up to 20 or more drivers. * For Techies: All; "S"; "C"; pp; mp; uk; user behavior; alerter; ose; va; cart; access; uip. -access = human breath "analyzer" (each person's breath possibly being different). Exists: can't activate car if alcohol on breath. US Patents: 5519260 using driver's license number. 6G241 GPS Tracker: analyzes travel patterns, and reacts accordingly.
Designated patterns can be good/bad/other. Vehicle/device is deactivated in designated azones / w5 criteria. [details of this feature in zones]. -Only certain u/passwords can enter designated azones. Applications:car rentals; employee use of vehicles/devices.
CONCLUDES FILE AC-BA-AUTO File: Access \ Ac-BA-SC + "ACCESS' BA = SCORE"
Introduction: All accessible multi-media have ascore rating. Media are
Desired files and functions (type behavior needed to deactivate "morning alarm"). Their scores must match the scores of Accessors if access is to be granted. Any number of criteria can be used to develop a score, with more or less or no weight given to possible criteria. Bad behavior can be similar to what access controller thinks is that of a hacker, hence a lower score is given.
How multi-media is scored: -Multi-Media = what user wants or needs, namely: desired files and or (kn) functions. -Media's level of sensitivity to: hackers (damage to company); inconvenience: loss of access due to= access controller's distrust= resulting in inconvenience; number of people who need information (the greater the number the wider the score tolerance?) -Pertinence to accessor and or their department and or their function (for certain time frame, or via usage of certain password). -Media's usage: media's frequency of usage by (all / "designated") passwords.
The greater the level of importance or applicability= maybe the less strict scoring sys would be. UIP-Tailor. -"Coordinator": the score for one form of media (when its changed) can effect the score of other related media. -Sophistication: eg, a secretary's password accessing PhD level material is cause for suspect. -"Morning alarms "Notification" system: its level of pertinence to user’s needs. Eg: how effective is it in waking user, based on user’s uip-db (ba).
How accessors are scored: -Time spent: the (percent of) time accessor might be utilizing certain files and or subject groups. Are they under utilizing something= in which case maybe a hacker is simply going for what they want. Are they over utilizing something? Hours of operation (after accessors normal working hours)? -"Routing": are accessors steps through sys normal? -"track" and "score" "analyzes" accessors behavior. -Normality of user defined: 1] Based on user’s previous history, with greater weight placed on more recent activity. 2] What other legitimate accessors are doing; maybe less important. 3] UIP-DB of user’s behavior created by user / sys /"questionnaire" I"access controller". 4] Employee job function's domains. -Accessor's "Caller ID". Is their originating telephone number in system's records? Accessor required to have caller ID active if they seek access. +-Peculiarities of user’s hardware: special (secret) Configurations in sw (software) or hardware better label accessor correctly. Accessors (are required to) have "tags" on their hardware
software. -H: invention "Sensors" = Analyze = match (behavioral / bodily) profile of accessor. See other Features of "Access".
-Typing pattern on keyboard - See invention in A or B directory. +--How "R" is utilized, eg: way joystick is moved. -Sys "analyzes" why accessor is doing W5= then conclusions are analyzed by access controller. -Lie detectors, and (ba) "questionnaires" accessor must answer correctly. +-Accessor's activities outside password realm: sys not only "analyzes" what accessor is doing within (its / main) accessed system. BA (behavior analyzer) also "tracks": other "accessed" systems; W5 accessor does what they do %; +?--system must connect ("coordinate") accessors functions when they are on / off (main) access system. Eg: other "track" systems are connected, and these log when accessor enters / leaves office / computer room; (digitized) reports / results they submit, sys/supervisor analyzes if they are pertinent and or have reasonable quality (something harder for a hacker to do) +-Accessor's history prior to gaining (any type of) access to said system.
Their: criminal record, behavior as somewhat determinable by their curriculum vitae; facial analyzers %; intuitive reports written by others at work place (about their behavior / deviance / potential to hack). -Accessor's errors: the more frequently accessor attempts access into files where accessors legitimacy is concerned, the lower the accessors score becomes. The greater the breach, the greater their drop in score. Eg: system allows three errors a day, maxing at five consecutive days. -How accessor "reacts" (to system's "prompts" / "questions") -"EGH" (Education Gets Harder): Is accessors learning curve normal? Based on media user "interacted" with previously. Eg: the portions of tutorial programs accessed should normally not go from very sophisticated, then months later to less sophisticated too often. -"Morning alarm": user’s wakefulness before* and after the alarm; their behavior= as matched against the notification mode.
Subject group "designation": Media is scored also by its type of subject category. Also, accessor is scored for how likely there a hacker by the subject matter they address. -How often does the accessor access material in our outside their permitted subject area? For material which can be "tagged" under multiple subject categories, how important is the actual subject category in the material this would be measured by the frequency of the "designated" terms used in classifying the material's category.
In other words: Frequency of "designated" key words (found via saw's search function) of files, or functions (their labels, command codes, instructions, "q"). -Accessor is assigned a list of key words, these and their related words (found via saw's thesaurus) can be used in scoring. -The system may (not) seek a limited frequency of these terms used in the material (files) accessor "seeks"= and uses.
The one or more "tags" assigned to each set of data (within a file), file, directory, group of directories, other groupings: web sights, particular "mainframe" computers. Multiple labels give a value representing different scoring systems, each scoring system is applicable for same file. In other words, each file can be rated differently according to what rating system is used.
How material was used: Who I W5 used the files -> "edits" the label= of said files; updating of files can "edit" the file's label(s); if hackers accessed material previously, or "access controller" determines a higher / lower security rating is needed. -"Morning alarm": it's levels of: effectiveness, "entertainment", "education", user friendliness. + Subject categories that may have tighter scores: -finances; company's planning department (new products, future trends); anything that can financially help hacker, and or hurt owner of system being protected by access; file on the access system, eg: information on how hackers are caught; information risking the organization or country's or world's peace; information on criminal behavior (of potential hackers), eg: police records; any other information commonly protected as stated in encryption software articles and patents. -"Morning alarm": those with more difficulty in waking.
Composite factors: W5 composite of factors used in determining "accessibility": -Any one or multiple factors determine= "access": one or multiple scores; the type score most applicable carries greater weight; system "merges" multiple "scores". -Fuzzy logic: when accessor does not quite meet the needed scoreof file or system: The "access controller" can be stricter; or for better user friendliness, more flexible. All dependant on one or multiple variables. -type (deviant) behavior(s)= "results" in= "designated" scoring system(s). Eg: sys "analyzes" 7 positive, 3 deviant behaviors=scoring system for the 3 negative behavior "tags"= goes into operation. + different scoring systems applicable (Irrespective of accessors behavior).
Diverse screening systems can be an additional safe guard, since accessor may not know the "order & timing" of the access system's requirements at any moment. What can trigger differing scoring systems: time of day, month, year; stock prices; excess number of accessors logged into system (a way to reduce congestion); accessor behavior; legitimate accessors behavior ("group behavior"), eg: their "order & timing" or subject matter or w/ (with) that they are "interacting"; type "hints" or "prompts" used; at the mercy of (human) access controller. --Roulette: random process= w/ (with) almost no detectable pattern for selecting= the scoring or other access protocol. -Example: u accesses two out of three files, which match his "score" and the third file is beyond his range by 30%= sys may permit access. Reasoning behind this: the score matching of other files helps determine legitimacy of accessor; system can narrow the level of tolerance for deviant scores for each file if other factors are taken into account as well.
-Composite of factors especially useful when: access is during same session (as the behavior being analyzed), * or near each other, * or when accessor is known to be at facility / work site / "access" gateway. Known via: "track", having "accessed" into building. -Compares UIP-DB of accessor with= "scores" of what's accessed.
Multiple scoring systems operating within same system. -Differing external factors. Examples: If hackers are a higher percentage of accessors after working hours, scoring system becomes stricter then; There's some crisis in the organization or system; System is overloaded with accessors, hence needs to limit access to those with highest seniority or scores. -Hacker is thought to (possibly) be in system. The perceived interests of the hacker (eg: via the subjects they seek)= analyzed= "designated" scoring system enacted. -Something like a computer virus is thought to be in system. This virus needs an anti-viral or related sw (software) program. -"Designated" scoring / screening system enacted according to circumstances. "Seek & React". -"Morning alarm": requires different access mode for morning wake up applications.
Changes in "Score" of accessor (one who (seeks to) gain access: + System can automatically (slowly) alter accessors type score. In other words: as user’s behavior changes= the needed behavior profile to gain access changes slowly over time. --In other words [third re-explanation]: Due to the inconvenience in needing to have access controller frequently alter user’s password= as accessors functions change= uip="analyzer" can (automatically) "edit" the accessors "score". -Scores tied to accessors password(s) changes with their natural changes in the work place (as their job / company / economy changes). UIP-Tailor. -one or more scoring criteria can be utilized. Criteria can change by the password / accessors (changed) behavior. If one criteria isn't suitable W5= then another is (automatically) adopted.
Negative accumulated scoring shortens lifetime of password: ' + passwords can have limited active life= measured by amount password was used while there was a (semi) negative score for the accessor / material they accessed. +--also measured by: calendar or usage time; "group behavior"; suspicion that hackers have penetrated (in past); other scoring criteria. -User must keep password alive by just activating (part of) password if they aren't using; after disuse, access controller needs to be "interacted" with= reactivate ("edited") password. Unwatched / unused passwords more prone to hacking (without notice by sys or accessor), eg: "scores" can be changed by hacker, legitimate hacker may not note unusual activity on their password account.
Miscellaneous: -when needed= accessors functions can have differing passwords, better allowing sys to permit user’s behavior, which may alter from accessors normal role. -D1: accessors (changeable) "score" = k (keyboard entry) = c (computer) (access sw) / "Correlator" (compares scores of accessor w= file "sought") = material (file). -D2: accessor = [password w= score / cart] = access controller = c (compares scores ("coordinates")) = elements (to be) accessed. -can have one or multiple password(s) "designated" for applicable functions. -can only utilize passwords a maximum or minimum number of times = tds (time date stamper) / Score (of (type) usage). -Irregular usage? Sudden excessive usage= might drop the score. -files can be "tagged" / "designated" by: 1] actual files; 21 directories; 3] subject groupings. +-(Access') scoring system also scores itself for: ability to keep out hackers; user friendliness; how good it's uip-tailoring; user happiness. Also uses "questionnaires" answered by accessors in determining final scores; these ask accessors their: intuitive suspicion; user friendliness; how to alter scoring; W5 of scoring needs adjustment. System "merges" / "analyzes" answers (w/ (human) access controller). -System sorts through different factors to= "designate" which are better / worse / applicable for lowering or raising score.
Drawing: [ "Access" = "BA" = "Score" ] = "ANALYZER" = Compares scores of password over time. "CHANGE ACCESS PROCESS" = -One of the causes are when sys questions legitimacy of accessor= serving as excuse for user to go through (security checks and) process of getting new password (=via automation). -"Morning alarm": new interesting ways of waking each day, versus repetitive actions. "GAME" = *Scores accessors performance. "Morning alarm": "HIDE ACCESS PROCESS" = * 1] Fact that "scoring" system is in operation. 2] "Questionnaire". "HINT" = Hints to accessor that their behavior might need alteration to get / maintain access. "Prompts" suggests: alternative files, W5 for behavioral functions. "Morning alarm": when user stalls "MOOD" = Accessor's level of: (happy) "entertainment". Their "mood" is used as score. Mood determined via: key word searches of what accessor inputted /*"experienced". "Morning alarm": uplifts user’s mood. "MOTION" = Level of motion's deviance from the best path /%"route"= is scored. -Deviance types / levels. Too: big or small; fast or slow;irregularity (of: speed, shape). -"Morning alarm": requires user’s physical action, eg: run treadmill, physically get out of bed.
"NOTIFIER" = The degree of urgency= as measured by score= results in different type of signal generated from notifier. -"Morning alarm": user is jolted more greatly when: there exceeding the time limits to act; that day is "designated" as more important.
S "ORDER & TIMING" _ -Timing: scores are given to different time parameters / durations. -Order: The ordering of events comprises a string of blocks.
Placement of blocks can be measured by the block(s) preceding and following I the *number in place as measured from the front or back. -"Morning alarm": creates the "designated" "mood", eg: jan: ing "mood" created by OSC (outgoing sound communicator) to awaken user frorh sleepiness= followed by more civil requirements if user has actually arisen, so there also mentally more awake. "PROMPT" = User's score / their uip-db much determines type of prompt theyl get. "PS-ZON E" = -bulls' eye: Like concentric circles, the closer to the bulls eye representing the best location, the higher the score. -beehive: different sporadic spots might be the best locations. --in which case the central cells have highest ratings, the neighbor cells may have 50% of the best cell's rating, the next tier out having 25%, and next out zero, and next out, minus 10%, and so forth. Different central cells can have differing scores. -outer ring donut: higher scores for "designated" distance from centrally measured point. -altitude: measured in mm or km -angle: eg: 45 degrees from centrally measured point. This can be combined with "designated" distance. -depth: must be below or covered by something (of designated substance / thickness; or be covered and of certain distance from the covering). Eg: "seeking" buried material. -multiple zones: two or more "designated" zones must be active / activated / occupied: simultaneously / in designated "order & timing" (path accessor physically walks). --each "k" (key) can represent a zone. The "order & timing" of their being activated= creates a pattern. "Key" is a very broad area of applications. See: "compose", "route", "track". "QUESTION" ="MQ". "Morning alarm": creates "mood" /"entertainment" to awak OF = ACCESSOR'S
ACTIONS: What Influence Improvement:
Accessor is working with material versus stealing: -Hackers want to take material, and are often less interested in doing other things beyond sabotage: Is action simple stcaling? If accessor is "editing" material, there more likely to be legitimate. -Is material being shared w/ other password holders, if so W5? Sharing can be form of "interaction" /"editing". -Accessor is bringing in (legitimate (pertinent, virus free, non-sabotage type material) and "merging" information w/ system's db.
-accessor erases or junks all / part of files accessed. To reduce detection, they might simply download material= then "cut & paste" what is wanted on their system? -accessor re-accesses same portion of file again (if they didn't save or transfer it earlier).
Psycho-Sociologically nonnal: Form of user "interacting" w= other accessors (is (sociologically) normal): -One employee (leader) accesses= then followed later by others (subordinates). -(Most of the) mistakes accessor makes are of a less intelligent nature that smart hackers couldn't make, eg: guessing at publicly known software functions- until they get it right. --BA can't "correlate" any abnormal patterns of accessor= with its (uip) db (database) of abnormal behavior.
Eg: unsteadiness in using mouse /joystick ("tilt").
-accessor "interacts" with (answers)= behavioral "questionnaires" / "educational" (tests). Especially when accessors score drops. Subject material also "seeks" from accessor= information about their identity= which ties with= access controller's uip-db of legitimate accessor. -miscellaneous: (frivolous) material sought by accessor= isn't of type sought by the more mentally ill. -"Morning alarm": form of user’s actions w/ computer system, or other coworkers is normal= otherwise implies not functioning at "designated" levels. System might be more tolerant during other parts of day if "morning alarm" is the main desired function.
Legitimate accessors (helping) catch hackers:
Different people are learning from each other, possibly implying the parties really know each other; its also hoped that legitimate parties in the "interaction" have other (intuitive) ways of sensing hackers= that "access" might otherwise not have. Eg: One password human user= "educates" another accessor= while there on the system, as evidenced by "track". -system "prompts" accessors to "interact"= in manner the legitimate accessors
I access= can catch hackers.
Legitimate hackers might be "educated" in catching hackers (w/o risking (too much of) how "access" functions. -If legitimate accessor is suspicious of another accessor: Confidentially anyone can "tag" potential hackers= resulting in: their lower "score" / system "tracking" such entity more cautiously / access controller confronting = accessor directly / cutting off access (if access has other reasons to believe the human suspicion could be correct). -"Morning alarm": co-workers "score" other user’s functioning. Eg: tardiness, speed of action.
Miscellaneous good behavioral characteristics:
Accessor's frivolous activity: Accessor is "drawing", or playing computer "games" (when they should be working), or accessing portions of internet outside access' domain. Its important system finds accessors being frivolous since hackers are on a serious mission or afraid to get caught wasting time doing such. Other activity by accessor would in most likelihood not be what a hacker would (risk) "seeking" or doing: -Accessing of information that is (readily) public knowledge.
-"location" of accessor is from good "zone", eg: good postal code or prefix of tel number, or where there is less crime, or fewer college students (more apt to be hackers?) -good interpretations (via "analyzer") of behaviors= receive a positive "tag" /"score".
What Elements Influence Worsening of Scores
Worse score is anything that is opposite or *different from desirable behavior. -Asking the system to do or give something that is not possible (w/ or w/o the best password)= can be indicative. Hackers might be less able to gain "access" to "educational" material on how to use system= since: such instructions require (additional) access procedures; access to such might be suspect. -(communications / access) software used by accessor is different from: what is standard / know / assigned (to employees). -difficulty in pinning down who accessor might really be: eg: their caller ID doesn match up; their behavior doesn match password. -accessor is running a (large) "bill" payable by owner of accessed system. -accessor uses protection to help hide accessors true identity, eg: accesses via strange tel numbers, or from outside office. -takes psychiatric related drugs -when material is transferred to or accessor "interacts" w password which: is w/ (with) lower score; outside company; or to unknown location; or sys doesn know what happened to material. -when accessor seeks to "interact" w= other accessors= who don't choose to respond /*"interact" in full manner (as requested by initiator). -accessor doesn care about negative effects of their actions: they mess up files (they've=accessed). -Hours: if accessor rarely comes to work before 9 am but as can be usual stays occasionally until 10 pm= score is tighter on access at 8:30 am then at 10 pm. -material accessed was questionably for accessor= then sys= can't "track"= material any longer. -"Track": material movement is "tracked" via: identifying "tags" "hidden" in material; keyword searches (for "designated" aspects of material (less likely to be subsequently "edited" by accessor)). E-Mail (between password holders). -Loss of traceability drops accessors score. + Accessors might be instructed / required to keep data w/in system. Trying to bypass this rule is very bad (without permission from access controller).
Miscellaneous Good & Bad Behaviors:
Accessor's behavior outside the system= which "access" is protecting / carefully monitoring: -Does accessor give indications they are hacking another company's system (as well)= as determined via "track". -Other DB: Criminal records; accessors school or university records.
Accessor's importation from outside domain protected by (main) access: -files or software from outside domain protected by access.
-connecting to other systems or ("interactive") products. "Multimedia": Sys seeks unusual behavioral elements of user in following parameters: How accessor (re) programs sw; types of mm options u selects, eg: color and "osc" option selections. "Entertainment": Accessor must make access (gate point) happy to "designated" level. -Methods: "Game": letting opponent win; stating correct words; "drawing" "entertaining" "images"; "interacting" w/ (with) "interactive images" in "designated" manner.
Interaction can occur at entertainment's
Electron ic Meeting Place'. "Interactive": Sys "analyzes" for unusual "interactive" behavior from "user". "K" / "R" = User "interacts" via = "Access' BA" "Locator" /"PS-Zone" / "Portable" / "PD": User's unusual or un-programmed locations are used in "scoring" if "accessor" is permitted continued usage of system. --See KN (invention) (pre-1996?), especially PS-Zone.
What accessor "interacts" with or has outside of the main system: -What's on accessors computer: System "analyzes" (all) the files of accessors computer, whether accessor does or doesn choose to permit them to be accessed by access controller. These other files helps develop uip-db of accessor. -What accessor does on world wide web: web sights accessed /*created; type Email sent and received. -is accessor receiving tel / fax / other telephony (at work) (of nature not related to sensitive material)? "Tracks" incoming/outgoing calls based on: CID of other parties; key word analysis studies word content.
Grammar or spelling checked: System compares the accessors language proficiency (tested earlier) with= their actual ability on system. Eg: checks if accessor is or isn't a native speaker of the language used, hackers might more likely be native speakers using a non-native speaker's password.
Familiarity of system= to accessor: The more familiar the better. Eg:
Accessor's behavioral speed in gaining access. Hackers are more likely to be unfamiliar with non -publicly available facets of the access process or related software. -"Morning alarm": lack of familiarity is sign of not being fully functional.
Exists: "Tracking" of airline passengers based on their behavior profiles, eg their: country of birth, travel history. Consider comments about how terrorists can outsmart the system. 1G22 Reward Generator: Reward Generated By Usage Level.
END ACCESS BEHAVIOR SCORE SUB-PART
File: Access \ Ac-BA-Tailor
FILE ACCESS-BA = ADAPTION (CUSTOMIZATION): * Intro: Below is copied and improved from UIP section of the file IMI&8 before the document was upgraded.
Tailor is also called User Information Programming, Adapt, or Customize.
For Techies: Drawing: data input = analyzer = memory (M, cart, recognizes multi-user) = analyzer = data output = function. -5A-810-042003 Advisor: compiles and analyzes user’s information.
-For Techies: fd-hdd; both pp and mp program how they want the system to collect, retrieve and analyze the data in database; uk; tds (when and how elements occurred); educ /a; M%; score (score information can be processed for the UIP database; and UIP can help generate desired scores); cart(software cartridge) (for additional data for the database; and or software's for processing the database); uq (pi database is used to help generate answers about, eg: about user’s past preferences and or activities); mp (the database and or software can help prompt questions, eg: to expand the database, guide the user in the right question if the system first gets the right information); access (limits access to sensitive information within all or part of the database to people with the right password). -Article in "Scientific American", p.64, April 1995. Article title: "Machines that learn from hints". Its about:
Machine learning improves significantly by taking advantage of information available from intelligent hints; discusses the algorithm process in general terms; gives differing examples, eg: computers judging how much credit to give to credit card applications based on other similar peoples past histories. -UIP formerly titled "Pl". -For Techies Part #1: Electronic device obtains information about the user by one or more of the following: remembering user’s previous performance, eg: their abilities and or difficulties on this, or related devices (which transmit uip data to other units via wire, or %wireless); asking questions from user, or "M"; user takes one or more test(s), the type and quantity are determined by the desired application of product; another person or device (M) gives information about user; etc. Device recognizes more than one user by multi-user, eg: their codes used to gain access into device. Personal information is stored in memory and used by device to more intelligently tailor itself to user’s particular needs. The manner in which invention tailors itself to user’s needs can alter according to: small or big changes in uip database, pp.
-FOR TECHIES Part #2: D (UIP) "Billing"; User can take their cart (their personalized uip for all identical or related products) from machine to machine, eg: % existing card used to both activate and select desired preferences in car stereo systems; different cart (cartridge for software) effects user’s uip differently with the correlated changes in functions; type "character" changes according to uip (if a display ("S") is used); date; uip data can be viewed on display ("S") and or printed out; uip is used to increase the user satisfaction quotient, eg: entertain, (possibly by: way in which function operates, sounds, lights, words are used to better create the type of electronic effect uip indicates is more likely to increase user’s positive reaction to using product [test studies are conducted to see the reactions of people in test case studies of 50 - 1000 people]); "C"; % uip can support interactive (by giving the additiona) data needed to better tailor invention to user; % data obtained for uip's memory from microphone ("mic") (voice recognizer); mouse; mp; multi-user; uip's database guides system's functions (determines the type, manner, timing, whether or not to notify, mq, osc, synth; pp; u ip database influences printer's print out parameters, score, speech, vc, manner in which it functions as a semi-toy, it prompts - accepts - processes uq; tds; uk. Data is also obtained via: "uk", "cart", "tel", "mo", scanner; UIP can be programmed/understood with the help of: psychologists, sociologists, marketing experts; U's city (tel area code/zip code) / caller id / location based on pd effect how system interfaces w/ (with) U.
-Drawing: data input/output=tr/arc=c -o-C85 Electronic translator speaks out desired words/phrases. Fuji/Xerox 29
Aug 92 NK. Drawing: C85="tel" %-o-C112 Computer predicts human error. Input UIP (working conditions of person). System predicts errors there likely to make. 30 Sept 92 YD. -utilizes fuzzy logic -Sys analyzes ups actions -> database (behavior). Eg, Ubiquitous computing: u carries (tiny) "c" that communicate with other "c" embedded in: appliances, t, cars, walls, K a y s'
N. Eg: Xerox's Park Tab, and other products mentioned in "Popular Science" Feb 95 from p.47. 2D-021 Sys reacts to external products according to w5 they are:
Eg: Incoming-Call Identifier - Screener / External Element Identifier.
Calls from desired tel numbers have a different ring. Hereby caller knows whether to pick up the call or not. -(Designating different type connections /(incoming) calls related to another of our ideas?): sys responds differently depending on which other N/sys/existing product wants to "interact" with it. --sys knows identity of other part/sys via its: "access" / code / tel #/ uip (behavioral characteristics of N, or U: how it moves / functions / responds (to stimuli from central "C" or "M") / visual analyzer / sound analyzer. -If user walks over to device, the callers tel number and or name... appears on screen ("S"). -Drawing: Central Product / Sys = c (computer) = sensor / analyzer / uip analyzer / caller ID sys part = tr/arc =
External Product / Sys. -For Techies: ACCESS *; BVA ; CID ; CAMERA (LENS) ; CART (type uip or senses or data sought);
CLAP ; INFORMATION RETRIEVAL ; K(keyboard) ; M; MIC; MOUSE ; MP ; MULTI-USER ;
NOTIFIER (when desired contact has been made with part or organism); pr (software program) ; PS (location of external product is a determining factor in deciding if any/type connection/contact is to be made); R (remote control) ; ROUTER (routes external product by their type nature); S (screen) (shows status); *SCORE ;
SOUND ANALYZER ; tds (time date stamper) *; TRANSFERRING INTER-SYSTEM
TELEPHONY ; UIP *; UK (user at keyboard) ; VISUAL ANALYZER %; VOICE MAIL.. -A sensor that connects to u (human body, eg: finger wrap; animal*) to read electromagnetic signals generated by the skin. Proprietary software interprets those signals and translates them into actions. Being researched by company: Other 90% Technologies Inc., Sausalito - See Wall St. Journal 1995 (maybe 6.95) article titled: Mind
Games: Soon Youil Be zapping Bad Guys Without Lifting a Finger. Finger wrap version will sell for $100-
-4E020 Content Date Stamper: Registers and organizes previous occurrences. -See "Brain". % US Pat # pertaining to helping U (user) develop new N, eg: for "D" directory
KN: 5153830 Method and apparatus for providing assistance with respect to the development, selection and evaluation of ideas and concepts. -US PatNo's: search str in Bib 9.94: (adaptor adapts) and user*: 5324021%; 5208898 Adaptive knowledge inference method and system; 5313532% Recognition of patterns in images; 5212821 % Machine-based learning system; 5092354% Cosmetic kit: make-up; 4700295 Forecasts bank traffic and scheduling work; 5321626 battery performance / forecasting system; inventory control: 5237496 & 5287267 & 5128861; 5136502 "analyzing" health care liabilities; agricultural forecast 4837146; compatibility forecasting 4711632; 4197854 patient danger forecasting; game playing involving forecasting
--search str: 1] (adjust or.adjusts) and user* - barely skimmed; 2] forecast (did only'Bib 6.94 disk).
UIP-Tailor and UIP-Suggest:
UIP-Tailor = SW: For: (automatically) suggesting how sys can better tailor itself to ups needs / helps get product ideas / helping User brainstorm.
Introduction to formulae generation systems:
Software used in developing / analyzing / evaluating formulae for food, chemistry, indicators, etc. -uip of desired function is matched= w/ (with) uip of differing elements / ingredients / chemicals / food elements = resulting in formulae of ingredients that may (best) achieve desired goal. --the characteristics of goal are tied= via uip = to characteristics of available / known ingredients or * (KN) sys. + Important Features: UIP-Tailor, 7G050, PR, Track-Analyze (analyzes for what is best to track = db),
Brainstorming SW, 2E010 20 30 40 50 Recipe Softwares.
General Examples: 1] develop an nr (notifier) for desired application = alerting presence of salts / acids / hazardous elements = in/for: liquids / powders / surface contact. 2] Other applications for 7G050. 3] SW (software) sys may simply help u by offering suggested possibilities: formulae / equipment / sources of information (reference material, on-line sources) / type experiments. 4] UIP-Tailor = UIP-DB: adjusts to ups needs. Gives ideas to U (user) = from which U (user) can choose = then sys reacts accordingly by offering such tailored functions. -Example: u using information highway software often requires more than two minutes before u requires M (mainframe computer) to act = resulting in SW (Tsoft.ware) asking u if they still want to stay connected = frustrating u by requiring them to respond to such petty questions. It may also be problematic for u to locate where in the software they should go to stop such prompts, but if sys were to offer such a suggestion as, would you like the default mode to give you 10 minutes before such prompt (after sys has determined ("status") 80 percent of the past 50 interactions between u and mth (mainframe hookup) were at least 10 minutes w/o (without) activity). --Result: sys tailors itself to u, by first giving u a choice in matter - maybe u couldn't want the change to occur w/o (without) their acknowledgement. Manufacturer determines to what degree uip-tailor will suggest or bypass former and simply alter itself to ups need. 5] Constitution needed in plastic resins / metals / product casing ("cm", "ep") or Features, for = tolerating designated levels of: stretching, bending, pulling = within designated environments of varying (extreme): temperatures, light, abuse, excessive wear, time period of element's use (age of N). 7G050 related.
6] Patent search strategy for idea suggestion generation sys: software* and (formulae* or recipe* or ingredient*) 7] Pharmaceutical: developing ingredients for drugs; ideas for research. -KN: medical prognosis sys that studies all the characteristics of illness in deterrnining type of illness = 2E suggests possible medications. -Suggesting possible combinations for drug to solve designated illness / problem: file for each aspect in situation (uip-db) matched w/ (with) = files of existing / potential future drugs or chemicals. 8] Brainstorming: Software simultaneously designed to help researchers increase their (sociologically, psychologically related) creativity: KN 9] Nutritional recipe generators based on needs.
Indicator Examples: 7G050
I] Indicator type Suggester: Researcher anticipates they will be coming into contact w/ (with) 7G050 related: diverse (hazardous) chemicals / harsh environments -> Those chemicals / environments are keyed into computer -> c (computer) "analyzes" for type indicators that may nr (notify) more than one of these (unrelated) chemicals / environments [sw tries to find indicators that can be compatible in seeking diverse chemicals / environments] -> suggestions are made to u -> u may next need to do additional research via: this same SW (software) / other references sources / do experiments testing out the sw's hypotheses / stated facts. 2] Body protection device Suggester: Researcher keys in that they wilt be working with three differing chemicals (of differing acidity) -> SW (software) suggests which 7G050 type gloves to use for all / each situation / occurrence / type activity (eg: working with sharp objects in such liquids requires thicker gloves) ->
Designated gloves can be identified by glove's manufacturer / model number / generic type. Sys may also suggest other protective gear used in hazardous situations, eg: aprons, body suits, masks, goggles, gas masks, shoes, (replaceable) filters for HVAC [Heating, Ventilation, Air Conditioning sys]. -sw used on case by case, day by day basis, or planning future tong term projects, or + designing new research laboratories, eg: type surfaces (paints, flooring, counter top materials, air filters....). 3] UIP: Characteristics of u (user) are "analyzed"-> sys makes suggestion:
User will be having likely designated occurrences (outlined in 7G050) = SW (software) suggests: types of protection (protective gear); methods of (cautious) research (protocols) already determined to be safe via reference manuals on the subject or
SW (software) (db). "PR": SW (software) (re)programs itseif = as controlled by UIP; programmer can help guide / control
FOR TECHIES Drawing: User = This N (invention) Sys (sw suggesting formulae) c (computer)
ACCESS ; ANALYZER ; BILL ; cart(software cartridge) ; EDIT ; EDUC ; MULTIUSER ; pr (software program) ; Q (asks questions) ; ROUTER ;+SCORE (given to each aspect = attached to each element of goal & potential ingredients); SENSOR (7G050); STATUS ; tds (time date stamper) (scores time delay in getting nr (notifier) effect); TRACK (history of previous (chemical/food) experiments conducted by: u, organizational body, db, m); User (researcher, student ="educ"); UIP .
D (Drawing) Overview - How Features might fit:
For Techies: Drawing: User / Other (KN) Sys = This N (invention) Sys (software used in developing /
analyzing / evaluating formulae for food, chemistry, etc.) - c (computer)
PS (positioning system) - R (remote control) - Tilt:
Zones - Monitoring:
Zones - Utilization:
Access: u (user) needs to usually continue to develop formulae that match those u (user) developed w/ (with) sys before. Villains w/o (without) most proper knowledge can be noticed (nr).
Access allows for normal percentages of cases w/ (with) negative results (caused by human error). -4E020 Registrar: -4E030 Image Input Access Sys: + Indicators: 7G: hazards, novelties, el (electronic) monitoring of events: formulae for developing needed indicators developed.
Technical:
How files in db (database) = match / compare up w/ (with) / relate / score w/ (with) = data provided to begin search by: u (user) / another sys. Steps in Examples:
Salt Avoidance Recipe Generator Steps:
Suggestions on replacing salt in bean soup: 1] User may normally prefer the saltiness taste to equate at 0.5% of soup volume to be real salt. 2] This preferred percentage is determined via: what u (user) K (keyboard) / nr (notifier) placed in soup. 3] User K (keyboard) 2 liters of soup will be made, and lists volumes of ingredients making up 2 liters *(both before combining, then after coming (and evaporation) - though latter can somewhat be calculated by sys).
Example: 1 liter water, .4 liter kidney beans, .3 liter potato. 4] User lets system to recommend other ingredients (if no real salt were actually to be used). 5] Systems db (database) "analyzes"/shows (s/printer) other non salt ingredients shown to statistically satisfy a large percentage of population (in ups zone) who are on salt restrictive diets. "Score" for each of those ingredients on salt replacement value. 6] Those ingredients that came up in previous step are next "scored" for their compatibility w/ existing ingredients u already (fairly) decided to keep in soup. Each food ingredient in db (database) has many sub-files, each sub-file being the type application / situation / type food such ingredient may be used in = and the corresponding "score". Example: carrots get high score for soups in general, yet a higher score in sub-sub-file: western vegetable or meat soups, but lower score in sub-sub-file in Japanese miso bean type soup. 7] The differing "scores" are= "coordinated" / "analyzed" -> suggested ingredients are grouped into differing sets / files of ingredients. Compatibility ingredients with each other in designated sets (including ingredients required by u) based on db (database) of past statistical taste studies for how such combinations (may) satisfied people.
8] S (screen) / Printer shows = Suggested recipes = to U. The order in which they are shown might be those w/ (with) higher "scores" for the set, or by other means, eg: cost, "score" for how all the ingredients are commonly available in ups zone's supermarkets, uip - db (database) for what u(user) liked in the past, etc.
Indicator Development Idea Generator Steps: S W(software) will suggest what u (user) can use / do / replace / alter in their (research) plan / strategy / process. 1] All type materials in situation are entered into= computer, eg: type hazardous materials (acid, pH level, 7G050 chemicals listed). Eg: type + gloves, type + containers holding chemicals, + acids and where they are, where acids might spill, environmental effects (temperature, time span (in which acids will be in contact), other circumstances. 2] The files for characteristics for each of these elements is either known by sys (uip-db). If the db (database) exists it was compiled by: "analysis" of research material, surveys of chemists %, developed by u (user) (or their company) for future applications (by other researchers of the company). -Each element has different files, according to the circumstance of its usage. "Analyzer" determines which subfiles are applicable via, eg: label of file, % key word search, "status"*, uip. 3] Files are matched. Examples: only 2% of glove/container types are suitable for working with acids = next
SW (software) determines three best gloves/containers for said acid, listing best first. 4] If u (user) is unable/unwilling to make changes in glove / container, sys can suggest differing acids, or time period during which work should be completed. 5] If all suggestions by u are good, sys can "score" what u planned to do / still give other better / good but worse options / precautions (whether using products or not, and if so, how they should be used) = S/Printer. 6] While research is taking place ="sensor" = "analyzer" = NR: when sys determines there is or could be (based on score) a situation needing special attention (danger, loss of money, inability for u to get desired results).
Large Diagram Begins Here: The following Diagram Insert #I' is for the large diagram below it, titled:'D-# 1'. The For Techies: D below ' D#I' is a subset of the latter. All
Features converge in the central computer in 'D #1'.
Diagram Insert #1': For +D-#I
Type suggestions made by sys to achieve needs stated by u (user) (so suggested future N (invention) or sys functions as needed in future situation / environment and able to handle designated occurrences as envisioned bysys/u.
Suggestions are made by sys: for one or more of following: nr (notifier) type
- 7G050. Protective gear type suggested: against (chemical 7G050) hazards. PVC Resin / metal constitution.
Formulae: pharmaceutical, food recipes, pvc resins.Other Formulae. Likely scenarios: --how to prepare for: fire and other natural disaster drills / preparedness. --accidents: (chemical) accidents; vehicle; building (collapse); -Desired effects: any (el) %KN, any (el) %N, as prescribed by UIP-Tailor
-1J0.10 Body Movement NR: how sys can adapt to different: sized people / applications.
-2E010 20 30 40 50 Recipe Soft.wares: -3E020 GPS Record Keeper: what records might want to be kept, which zones are important, drawing boundaries between zones (based on uip of situation). -3E060 Interactive Morning Alarm: what Q (asks questions) sys should ask = matched w/ (with) uip of u (user) / what u has to do later that day [sys puts u into mood for predicted occurrences/work] -3E061 Body Motion Instructor: -3E1 50 "PS-Zone": which zones=are important, drawing boundaries between zones (based on uip of situation). -3E151 GPS Circumstance correlator and Controller: which zones are important, drawing boundaries between zones (based on uip of situation). -3E180 GPS Locator: suggests wher.e to begin looking or what needs to be found and how. -3E190 GPS Billing Systems: which zones are important, drawing boundaries between zones (based on uip of situation). -3E040 & 41 Tel Noise Canceler: what environmental sounds might be semicanceled (at the risk of impairing listener on other end from part of speaker's natural voice). -3E210 Indoor GPS Extender: where / how extender could be used / placed. -4E010 Alternator: which activities offer greater battery power build up -4E030 Image Input Access Sys: what images sys may use to trigger designated functions (access). -5E020 Magic Wand: -3G410 Tel Ring Delayer: -4G 190 Insulated Scoring Ball: how to play / develop new "games". -4G200 Fruit Encapsulator: how to adjust itself to cut in ideal manner. Other methods for peeling, cutting, processing, cooking, canning the foods. -5G061 Dyslexia SW: how u (user) may wean himself off the software; how sw (software) may help u (user) eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer. -5G070 Speed Reading SW: how u may wean himself off the software; how sw (software) may help u -eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer.
Drawing #1:
For Techies: Drawing: User =(-+- See: Diagram Insert #1') - c (computer)
ACCESS: Access restriction strategies suggested: db (database) of past hacker / villain activity = matched w/
(with) = db (database) of known / existing / available remedie.s or traps = suggested "access" control strategies = [security manager's suggestions = K (keyboard) = access - analyzer - sys]: sys analyzes any input from security mgr during the multiple steps via which sw (software) w= mgr together brainstorm for strategies.
ANALYZER ; BILL ; CART (software cartridge) ; EDIT ; EDUC ; MULTI-USER ; NR (notifier) ; PR;
PS-Zone ; Q (asks questions) ; ROUTER ; SCORE ; SENSOR ; SOUND ANALYZER ;
STATUS ; tds (time date stamper) ; T(tel) ; TILT ; TRACK ; UIP; VISUAL ANALYZER ; VR*; WA (walk about) .
UIP-Tailor & UIP-Suggest: see suggestion sw (software) (being) developed from 2E files.
+ Five senses are altered to match user’s tastes: Senses: images (see "edit"); sounds (see sa); "vibration"; odor releasers (see smell "analyzer" details mixed throughout files; *taste (see A dir KN) + "Game" application: UIP Game Effect "Editor": User is requested to experience different effects like sounds and type images. The U's response is "scored" and intern the gamers effects are tailored to get a more desirable response from the players. Each gamers aspects have multiple "editable" choices, and sys utilizes those best matching player's preferences. -images: see "edit" = images; colors; textures of skin or objects; size -sounds: sys "synthesizes" sounds (in its memory); sa scores sounds. -"scoring": to match ups tastes: human body "sensors" are placed on player (skin) to gauge reaction levels; u (user) personally K (keyboard) in their (multiple choice) preference of effects. -What's scored: user’s "mood" reactions "scored" / "analyzed": pleasure; excitement; passion; fear; relaxation (between episodes, type of break for player, so they don't over exert and tire= in tern playing game longer). -How sys utilizes player's preferences: User asked which of 12 effects elicits greatest: passion. Then when passionate encounters occur in game, that "edited"/"synth" version is utilized. -User generated effects: players can program / create / record (mic) sound effects into the game itself. -Related to A or B* dir KN (invention) where games are sold via vending machines and tailored to buyers. "Synthesized" music / sounds altered.
End of ACCESS-BA = UIP
File: Access \ Ac-BAIMI
COMMON FEATURES FOR ACCESS'S BEHAVIOR ANALYZER: FILE AC-BA-IMI "ANALYZER"% = System "analyzes" the (criminal I access related) behavior characteristics of "accessor". Methods include "analysis" via: uip; "analyzer"; *"access"; frequencies of user’s voice ("sa"), eg: voice lie detectors. Cheaper systems can simply seek high frequencies representing stress. -sa: "mic" -> "analyzer" (system analyzes person's voice) -> system responds according to PR (software program) /*U's control. -Drawing: Voice = "Sound Analyzer" ("mic" = sound to signal converter) / **M = c (computer) = function (application) / osc "Coordinates" between different behavioral characteristics (of accessor). -Coordinator - Score: Score: sys coordinates/juggles different
Features/files behaviors according to "accessor's" "score" =* coordinator-importance / coordinator/corrector; the score of occunence influences how coordinator coordinates that occurrence w= designated protocols/sw of sys. "ARTIST" =(Method in which) images generated = BA.
See: Artists image analysis systems. Manner in which images are generated / something is "edited" = is unique like finger prints= as determined via ba. The level and types of narrow scoring on "drawing" is unlimited. -"Character" = "Image": 1] Designed to portray "designated" mood. 2] Accessor= selects a"character"= which is connected with= diverse characteristics: behaviors; levels of access; moods. -"Morning alarm": create required "images" in "designated" "order & timing". "BEHAVIOR ANALYZER" IN GENERAL = + SEE LARGE FILE TITLED C:\K\BA -User's Behavior includes. Their: feel, style, commonality of actions over time, rhythm of movement, preferred movements, and thought patterns (as "analyzed" by their key words). -"Morning alarm's" "Work motivator". "CHANGE ACCESS PROCESS" _ (Behavioral) parameters for gaining access can be changed / "edited" (according to w5 / uip (how accessor behaved, eg: they were determined to be a hacker) / creating additional hurdles). -These parameters change (gradually) as uip "analyzes" accessors (work) functions are changing accordingly. + "Score": Access procedures= become more or less strict / are altered= according to accessor's= behavior.
Customizes by [giving greater/lesser tolerance for deviation from expected behavior /'access requirements of user]. "EDIT" = BA=UIP-Tailor determines what ("entertainment") u (user) (subject) should experience. The type experience "designated"= is designed to fit (uip-tailor) accessor= via use of "edit". -H: "edited" "images"= entices hacker-- into "trap". Material most compelling to hacker is more likely to pull them in. -forin accessor= selects material to be "edited"= studied by ba. % data "edited" for "morning" application. "GAME" = Games: How user plays computer games: where in game player takes their character, like to the secret cave or by touching highest apple on third tree. See "Game"="Access". --How a user plays a game determines access: 1] sys studies ups moves via = uip, eg: u (user) prefers using rook in chess game, and u might accentuate their playing styles accordingly (if access denied). 2] access provided if/when u wins/loses game (in / within designated number of moves. 3] U's (designated) piece arrives at designated square / point 1 stage in "game". -"morning alarm": play game correctly or to win and deactivate alarm. + "GROUP BEHAVIOR" = How accessors behave within the context of their organization. The greater the positive level of their "interaction" with fellow members (seen by their password / "track")= the better the accessors' scores. System judges for normal behavioral modes (based on organization's / department's / employee's history or "program"). Large systems are representatives of major sociological "interactive" systems: access-ba must seek out the dangerous deviants (much like how people intuitively judge other's honesty in real life outside a computer system).
Examples: -each password is labeled w: seniority; their relationship with other employees and degree and type of importance / closeness to each other; newness to company (hackers more likely to be new infiltrators). Every accessor is tied to: password, their history, and normal behavioral profiles. See access=score.
What accessor does w/ what was accessed:
To whom do they transfer the files? Does accessor have traits that can be harmful or the opposite? The traits of accessor include both group and non-group oriented behaviors. "Morning alarm's" "Work motivator": requires "designated" group behavior. "HIDE ACCESS PROCESS" _+ Hacker that knows about "access-ba" and avoids its "traps". What hacker may attempt doing= and how access can try to deal with them anyway: -steering free of files that it knows definitely will set off "nr". Hacker may want such files but stays with safer files. -blends in activity that makes hacker appear more normal, eg:
accesses files "designated" for the password there using. -see "Trap's" mirror section. -this is a difficult area, and one which requires closer analysis, and or may be "routed" to the human version of access controller for closer inspection.
HTNT" = -UIP-Tailor: what passwords are / when (w5) they should be entered. -Helping accessors w/ (with) scores only a little out of line: "Prompts" u to alter their behavior= if ba= finds accessors score is improper. -"Morning Alarm": what actions user requires. "MANEUVER" = How accessor: "motions"; "merges"; + "routes" himself through system or main access process; functions as scored by= "order and timing"; "repeat". -each facet of maneuvering= has a different "score"= later merged with accessor's= other scores. -movement patterns needed for: "r", "draws"% "MERGE" = Scores that are mergeable: -those tabulated over time (w preferential weight given to the latter). -one or more scores= generated via any method= are merged. -other accessors in "group behavior"= to which accessor is "tagged". If other accessors behaviors are changing= each accessors scoring system can change accordingly, eg: via the averaging of this and or other group's scores.
Miscellaneous: -material accessor "merges"= W5 -> score -examples ofwhat's mergeable. Accessor's: "artist", "group behavior", "mood", "motion", ps-zone, "scientific signals", "sensor", "track", "visual analyzer", "uip-db", W5 of accessors other behaviors. -Manner in which files are merged= based on= ba. "MOOD" =
Sys matches its characteristics with that of whatit determines user’s behavior is like. "Hint": the mood created gives cues /"prompts" for u (user) to answer "questions" (needed to help determine accessors authenticity). -This is an example of a subset of "Mood". And this "mood" is a subset of "Access"" = "BA", which is a subset of "Access". -Manner of hints are "editable" (according to "order* & timing" as guide / accessors behavior).
OSC (outgoing sound communicator) = ("Prompt"): Systems' OSC (outgoing sound communicator) matches / mimics the user’s voice so as to solicit the desired response (emotion/feel rapport/make them want to act in certain manner (purchasing / work productivity, behavioral modification). Psychologists established which type of voice / sound frequencies are most apt to achieve the desired effect according to: circumstances (UIP /
U's state of mind (at a particular time)). *TDS: osc's sound modulation might be effected by the time of the day (U may need more energizing in early A.M.). -In similar manner, sys generates a "mood"= matching user’s behavioral profile.
H "Trap": hacker is made to believe they are a legitimate accessor via many methods including "mood", "hint". "Designating" what is best "mood": develop uip=db of accessors behavior.
Creating the desired "mood": "Edit" (effects the visual appearance / wording utilized); See "osc" above. -% odor release = smell analyzer; vibration emitted = vibration analyzer.
Drawing: Accessor's (behavior) = c (computer) (designated mood generated for accessor according to: ups behavior / below Features) - Access =
W5 // CHANGE ACCESS PROCESS // HIDE ACCESS PROCESS
HINT !I NOTIFIER II ORDER & TIMING (how "edited" material is shown to accessor) J/ PROMPT // SCORE. "MORNING ALARM" = Manner in which user does access process= deactivates the morning alarm. +See: "Morning". Has much information. "Morning alarm" introduction: This is only one of the many applications for "access". "Morning alarms" are systems created to uniquely waken up the users, and then to require them to act in some manner to bring them to full, wakefulness. If necessary,
"Morning alarm" can be ignored only to better understand the general natures of "access". "MOTION" = Human movement about premises:
Parking lot outside working hours: -"visual analyzer" /[motion]sensor = "tracks" license plate numbers. -hackers might park elsewhere and walk to premises. Hence sys is more suspicious when someone enters building= w/o (without) triggering entrance "sensor"= signifying accessor= drove onto parking lot= thru "sensor" gateway. The number of cars in lot should match number of people / users in building / on system. -see KN: sys "tracking" employees whereabouts (in a building)
Motion / Vibration: Access' "Motion": type motion= matches needed behavioral profile. Form of User causing "vibration". -"Motion Sounder": "sensor" "seeks" unusual (body) movement. "ORDER & TIMING" = the "order and or timing" in which the user utilized different software programs is tracked. "PS-ZONE" = Score judges= point of access= by u. "QUESTION" = "MQ". UIP generated questions: -System "prompts" "accessor" to "react" to questions or occurrences. -Occurrences - General: Without knowledge= accessor might not recognize / know the presence of "occurrence", and or= what the needed "reaction"= by accessor is. -Type occurrences = Any sw (software) change / potential "prompt" that accessor should keep their eye out for. --Eg: any "interactive image" creatable by "artist" / "artist's" "edit"; any occurrence= that can be "sought" by= "seek & react"; any text or "image" that directs / "hints" accessor to: another "location" in "c" (sw, file) / physical "location". -"Questions" posed to "accessor":
User is required to answer questions about their history, or what and why they accessed system previously.
Sys generates questions which require correct (near correct) responses to gain / maintain access. Randomly selected authentication challenges. -DB uses file of questions= chosen at random= then "seeks"= correct "reaction" (answer).
--Exists: access system that shows what accessor previously did.
Drawing: Questions come from =sys studying u (user) = creating / delineating information in question / true-false statements = which u must respond to. "Morning alarm's" "Work motivator": requires "order & timing" of computer work by user.
Answers are customized. "REPEAT" = One of the many manners ofjudging if accessor is who they claim to be. Files accessor accesses and or the * order in which there accessed is normally repeated. "SCIENTIFIC SIGNALS" = Body signals of accessor studied= and matched w/ (with) accessors earlier signals. "SENSOR" = Body Movement: way u (user) moves its body / objects on "s" or in hand = access "analyzes" its uip-db to see if there is a match. Other movements: drawing, walking around. "SMELL ANALYZER" = "SOUND ANALYZER" = Voice command systems judge peoples stress levels= lowering score for: higher stressed / tieing behavior, since this can signify presence of hacker. -system takes into account: differences in stress levels for male and female voices (password shows sex); deadlines accessors must meet; accessors general level of stress is compared w= stress level at time of access. "TEL" _ "TRACK" 1] U's behavior monitored to see if their behavior matches system's profile of their behavior: uip-db. 2] Identifying villains: Similar to immunological Anti-body recognizer. Commonalities of villains "analyzed" -> uip-db of villain; next time someone tries to gain access w/ (with) designated degree of common characteristics (from previous episodes) sys hones in on them. 3A205 Tampered Alert. Villain usually is unawares they've been identified by sys. 3] Sys monitors U's activities. Hidden (computerized) codes: embedded in stolen data: easier to "track" where these codes go; eases court prosecution. 2E251 Intelligent Monitor [Sys "tracks"="analyzes" ups behavior] = ba (behavior analyzer) = Conclusions
(Score) utilized by "analyzer" / UIP-DB.
Miscellaneous: -information used to monitor and determine who user is and W5 they are doing. "Track": System identifies via a third party's list of potentially bad people. This list includes those who are suspected, indicted or convicted of: any crime, hacking, deception, etc. The main "access-ba" system can also funnel information about accessors to this 3rd parry list. This system is quite certainly illegal as of this time. "TRANSMITTER" = Magnetic Device "VISUAL ANALYZER" = fingerprints; face; pictures. "UIP" = Learning about Accessor: Info learned about User is fed into UIP.
Existing UIP data may be: considered more or less important than the BVA's analysis (at that time of U's interfacing) according to
PR. System may adjust to U's fluctuating moods. Also see: "Questions"; ba; sa; uip=db; "track". -results from behavior "analyzed" are compared to a reference level (for applicable access=ba function / uip). Eg: US Pat
"UIP-DB" = "Score": "seeks" what elements needed= for compilation= then organizes data in usable form= for UIP-Tailor. --Notes: Seeks: via "questionnaires", "ba", "track".
Organization of db's files: collected information on user can be inserted into one or multiple files according to which files can use the information. Then UIP-Tailor seeks which files they need to better tailor. Or more work can be required for UIP-Tailor to find the needed information. Example: "Access' BA's Score" - db compiles data to show how accessor is rated= intern if accessors changing rating stays good= uip-tailor / "access controller" permit access. -if system determines this user’s usage of a sophisticated electronic system matched their normal behavioral profile, by utilization of certain (confidential) files or functions and not others. -see Access' BA's "Question".
People User knows: u (user) reads or hears voices / information =
then u responds accordingly = and if correctly u (user) has access.
Examples: -_User must recognize designated voices (such as their co-worker's or mothers) and only respond to their commands. After such voices, questions must be answered to the satisfaction as if they were being critiqued by said voice. Hackers may not know which is the correct voice, nor attach the voice with the needed answers. These voices may not have tags such as boss or wife. --u hears three voices, and one is their wife's/co-worker's = u selects the familiar voice and access continues. Voice induces u to work harder or have better moral (tgh) / induces humor, eg: says work harder', get to it', snake lots of money honey...', you lazy bum'. --"order& timing" of such peoples actions need to be made correctly. -_accessor might not know what sys will ask him. Sys may have received input from others (knowing accessor) w/o (without) accessors knowledge (about their input). Such information might not be made available to anyone except under designated circumstances such as time (w5). See "Hide". "UIP-TAILOR" = Manner of use / access controls product: correct behavior not only permits access= but it can control products as well. This is a merging of the fields of access and R. Results in= uip-tailor adjusts to accessors behavior. "W5" = Access at right time: designated temperature, weather, certain news in mass media, when another "designated" u (user) also has "access".
End of Access - Behavior Analyzer Features 4L
File: Access \ Ac-BAPAT
ACCESS BEHAVIOR ANALYZER RELATED PATENTS
This section is a copy of what was sent to files: Ac-ba, educ, score, ba.
-Pat search strategy: (behavior* or psycholog*) and (software* or computer* or %program*)
BA / Access=BA / Educ (ba) / Score (ba) / Track / *Game =
US Patents: -4571682 System and method for skill enhancement and behaviior modification = "education" /"ba" -Miscellaneous *: 3944796 5533093 4569526="game"=4666160 5349539 5493185 5473537="scientific signals" 5111413 5485600 48182345434788=gps5524176 5260867 = 0 (computer) used by accessor
-4751642 "Interactive" sports simulations (vr) system with physiological "sensing" ("scientific signals") and psychological conditioning ("mood" / motivation I "educating") -4796194 Real world modeling and control process = seeks deviant behaviior on factory floor + 5123045 Comprehensive "software" protection "system". Patent works with I/O behavior. -5507649 = "images" are "designated" to= match accessors behavior. Eg: children receive different images from adults. 54831 12 1 5377258 = Method and apparatus for an automated and interactive behavioral "guidance" system: "interacts"= w/ (with) user via= T (tel) / mfh (mainframe hookup) / r; "educ"; uip-db; "questionnare"; sa (patent's voice stress analyzer); requires user’s "reaction"; access' password = patent's PIN; "Trap": motivating hackers -this patent number mentioned elsewhere in KN (invention) filing.
DI: ["Access" = "BA"] - 5377258 =
"ACCESSOR" lI "ANALYZER" II "ARTIST" !I "BEHAVIORAL ANALYZER" // "CHANGE
ACCESS
PROCESS" // "EDIT" // "GROUP BEHAVIOR" (how employees "interact" w/ (with) each other / system) !/ "HIDE ACCESS PROCESS" // "HINT" // "KEYS" /1 "LIGHT SENSOR" // "MERGE" // "MOOD" (motivating accessors) If "MOTION" 11 "MANEOUVER" II "NOTIFIER" Il "ORDER & TIMING" (patent's mention of time duration) Il "PROMPT" // "PS-ZONE" II "QUESTIONARRE" lI "REPEAT" // "SCIENTIFIC SIGNALS" /I "SCORE" /1 "SEEK & REACT" // "SENSOR" II "SMELL ANALYZER" lI "SOUND
ANALYZER" !I "TEL" 11 "TRACK" Il "VISUAL ANALYZER" // "UIP" II "UIP=DB" I/ "W5". 5515270 Technique for correlating purchasing behavior of a consumer to advertisements:
How functions described in abstract of patent are replaced with KN (invention)
Features: -buyer behavior can be replaced with: how accessor functions in other manners described -advertisements and promotions consumer has been exposed to can be replaced with: "promts"; "hints"; "guidance"%; material accessor was exposed to or "interacted" with (on system); -monitored replaced with: "track"; "analyzed"; "ba" -montitored together replaced with: "merge" -readable record: uip-db -subsequent behavior replaced w: "track"; "order & timing"% -consumer = "accessor" -information combined to analyze*: uip-db; "analyze" -cash register: "billing" -consumer* inserts this record: "cart" / password / uip-db -promotion type classified: ba (behavior analyzer) of advertisement; organized by subject; uip-db -only portion fo collected data needs to be analyzed: portions are "tagged"
Search Strategy: (score or scoring or scores or measur*) and (behavior* or psycholog* or personalit*)
Scoring of behaviors / Predicting behaviors (for uip-db) / "Track": -4971561 Apparatus and method for learning about the relationships and ... -5424945 System for evaluating a psychological effect of a document
File: Access \ Ac-BA *
File: ACCESS-BEAHAVIOR ANALYZER *
Repetitive information: Any (set of signals) "analyzed" by "BA" from which ba arrives at a conclusion can achieve "access". The conclusion from ba acts as a type of gate - one must do something or act in some manner to gain "access". This is a very broad area. -Example: "BA" determines if u/ viewer had good/undesirable behavior (w/in parameters of system's ba of u) > level of access afforded matches accordingly. Eg: limits kids watching excessive TV (violence).
Patent search str (strategy). Abstract 1974-7/96: (password* or access*) not accesso* and (behavior* or personalit*). -str: (behavior* or psych* or personalit*) and (software* or computer* or access or accesses or accessing or password or security or guard*) -US Patents: 4854877 5343871 5465729 5470235-Child behavior improvement system 5250946 4741320 4013294="game" 5469506 4533244. -Pat search strategy: (behavior* or psycholog*) and (access or accesses or accessing or password*) and (software* or program* or computer* or electr*)
Existing systems used to analyze a person's psychological profile can be utilized, requiring similarly correct responses.
Any "designated" signals generated by accessors behavior = "access" / nr / track. Manner in which any passwords are triggered = needed passwords = can be generated or altered according to: UIP or BA.
OTHER: * Each accessor has differing hurdles to pass= and gain access. Needed passwords (are uip-tailored) to each accessor= better helping accessor remember password(s). "Changing Passwords": Needed passwords may need to be altered ("edited") each time in different manner within the profiles of accessors = ba.
Below is altered version of TM124's "BA" Section. Adapted to Access = BA: * introduction: most of the original IMI20's BA was moved'to Access' BA's
Parts Section.
* Product's "access" functions +might be (slightly) altered according to U's determined (via: BVA/UIP) behavior. *-The OSC's sound quality (might be) is so excellent / similar in vocal characteristics to u/listener it sounds like the real person speaking to U. The sounds also have such color, they: make the
U's ears feel like they can visualize the speaker / function (whether there is or isn't an S). --Sys "analyzes" type (sound, behavioral) files targeted person better matches = then communicates w them to create maximum psychological impact (sales, "mood") as determined via "analyzer" / K / pr. D: mic = bva / uip = c = osc.
For techies: D: Organism being studied (human, *animal, other) = This N Sys
ACCESS (sys upon "access" monitors (2E251) organism); ANALYZER (); AP=Access (% scientific, % psychological, % medical, % business research projects); BRAIN (); C(); CAMERA (2E251 Intelligent
Monitor="track"); CART (sw, db, differing cart for type organism or ap); EDUC (); GPS (); K (); M (db, brain); MIC (sound analyzer); *MO (); *MOUSE (); MQ (); MULTI-USER (differing "accessors" (u), organisms being studied); NR (w5 required parameters have/haven't* been met (via "score" = "analyzer"));
OSC (); PR (); PS (); Q Q; R(); SCORE (); SENSOR (motion); SOUND ANALYZER ();
SOUND
VISUAL ANALYZER* Q; * SPEECH (); STATUS (); SYNTH ("analyzes" for sounds that better influence organisms (per pr/u/k)); TDS 0; T* (); U (researcher /* organism being studied); UIP (uip of organism /*u (studies/tests objectivity of researchers)); UQ O; VISUAL ANALYZER O; VR* O;
WA (use outdoors). -Sub-Parts: BA-UIP; BA-BVA; BA-Tag: tags (then tracks) designated people according to certain profiles.
Other: * "Router": locates then= retrieves needed data= for this part. A code (access, el +water mark') encoded in sw/data* limits how sys / program can be: utilized (to operate device) /"edited" / copied. See: "Access", "Edit . Billr"
Drawing #1: Improvement on US Patent: "Accessor" 5377258 Method and apparatus for an automated and interactive behavioral guidance system: "trap"; "hint"; u receives motivational messages (osc) to improve behavioral patterns; includes client db (uip); voice stress "analyzer"; client response required j=
= ACCESS Q!I ANALYZER Q 1/ EDIT ="Seek & React" = (sys edits out less needed input from: determination if accessor is legitimate) // NR (penalizes u when u acts poorly (undesirable behavior) = electric shock to body / "entertainment" sys N usage is limited (see KN)) // OSC (penalizes via harsh sounds = synth) // PR () // PS-Zone (u trained where its safe / u is not needed for work, eg: home, coffee room, recreation room, tv room) II Q (to build uip-db = needed by sys to train u) // R() //
SCORE (how well ups (user’s) behavior is altering) I/ STATUS (of ups behavior) /1 TDS (w5 u behaved -> builds up UIP-DB) !{ TRACK ()
UIP Q.
[UIP = DB collection] !"Question" to determine authenticity =
Example of source that "analyzes" behavior: "Who do you think you are?", a CDRom published by Harper
Collins Interactive. Also read its book version and bibliography, and speak with the developers of this and related books (as found in Library of Congress or Bowker's "Books in Print" subject section) for type formats depended on each KN application. +"REMOTE": Manner of User's usage of "remote" control device is a pattern that falls within or out of "designated" behavioral patterns. The pattern of movement might be "educated" to user, and or "ba" may pick up on ups (fairly) unique movements, like analyzing a person's movement to generate their signature. + Correct utilization of "Remote" -> "Password". See "Remote" part's details.
Examples: -"Tilt" (joystick); "Dance". Laser switch, Clapper, Interactive Projected
Display, Remote Control Mouse, etc. -Each squeeze generates signals to control device. Eg: 4G010 -See 3C-290 Bouncy: How object is played with. -Activate, deactivate any electronic device and or control its operations without touching the main unit (unit's buttons).
Interactive Lock: Correct dialogue activates lock. Applications: students pass test before being able to activate desired systems like tv's and stereos; different and changing information can be required from special people seeking access into premises. 3A-891-042005
Magic Air Pen: Remote pen's movements are transmitted to computer. Make strokes in the air or on any flat surface. Each different stroke creates a different signal. (PD) 3A-790-042004 -Camera "Sensor": Changes in what's seen can represent changes in behavior or other (needed / likely) occurrences. % Light Sensor: Senses changes in light measured by: presence or lack of light, or more precisely the amount of light; frequency of light, eg: color; duration and or time in which light was generated.
Breath Sensor: Blow your breath into sensor in desire combinations. Works with smell sensor, not allowing eg: garlic or alcohol breaths; or can only be activated if system can differentiate between different people, eg: chewing certain type of gum or food. Judges also for pressure from mouth and or wind speed.
Laser Switch: Activate any function by only blocking the switch's laser light with your finger. 3A-7 5 1-042003 5A-460-042004 5A-710
The term -media- is for files or desired functions.
Below is altered version of IMI8c10's "BA" Section. Adapted to Access = BA:
D2: "Analyzes" = W5 of Accessor's Actions = 1] 4A09 Behavior Analyzer: (future product) Judges region [GPS] of speaker, and maybe social stature - all based on word choice, accent (sa), etc. Can seek all the possible questions to behavior and type psychology of speaker currently able to be done by human ear (as in over "T" conversation).
2] 5AI090 Sounds & Music & Verbalized Words and Creature Sounds "Analyzer": it observes changes in behavior according to such being emitted by "accessor" and or caused by what accessor is doing (to (any) system). "Sa". 3] 5A1100 Smell Analyzer: observes changes in behavior upon emissions of any smell (smoke, flowers, sex smells, etc) or matter being studied. 4] 5A 1110 Sight Analyzer: what does "accessor" see and how they respond to visions from displays, pictures. "Images" created via= "edit". 5] Manner of changes in accessors keyboard behavior = access:
A 1-320 Activity Identification Software: senses fingers on keyboard and blips if you aren't writing. It senses when you are lacking in creativity, clarity, confidence by manner of key stroke rhythms. Mix with Therapy =
Machine, Taro Machine. -"Tilt": controls sys' functions. If "tilt" not used (correctly) it nr too. 6] A3-13 EMOTION WATCHER: tells you how unrelaxed you are by how: product (ball, top, doll, coin, etc) spins in container, on CRT. Can output words, suggestions, slogans. Checks p by: u touching a pad measuring your temp; sensing stress in voice (product exists) whenever speaking (and hence operates whenever machine's 7] A2-170 HANDWRITING ANALYZER: sw studies what p writes onto special display ("S") or paper (then read via optical reader). 8%] This aspect repeats other information:
A2-610 BEHAVIOR SCALER: like "mainframe" detecting if person is lying by stress... in voice, detect how: a] sexual another person feels. Even try it on yourself to see it works. Know if you should pursue another for a hot date. b] reliable and or constant and or organized and or committed and or ability to follow o lead 9] R132-1 Behavior - Medical Symptom Analyzer: System correlates patient's behavioral with their medical symptoms. Patient's graph for changing emotional state is matched with body symptom graphs, giving researchers additional needed analysis. Invention is the software's merging of data. 10] R132-1-5 Biofeedback - Body function analyzer: User can look at their medical analyzers and see how they are/were performing (psychologically) intern user gets to know themselves better, intern user is better able to (intuitively) psych themselves up in the desirable manner. Use with sporting equipment. Portable version with wireless transmission. Also can develop database of user’s physical profile.
Notes for D2 Diagram's above parts: This focuses primarily on the type of behavior access-ba= analyzes= accessor as exhibiting (in response to any stimuli= created by sys). The person or other entity mentioned is the "accessor". The desired functions of accessor are what is controlled by access. These parts were copied and altered from IMI&9 in 9.96. See full description of these parts in IMI&'s BA.
Access = Fingerprint: A1-290 Finger Print Reader: Analyzes a person's behavior by their finger print. Also matches couples with compatible finger prints. Related to existing "C" systems based on horoscope, blood type.
-finger Match(ing): dating service matching behavioral types associated with genetic finger printing. Genetic
Finger Match(ing)
If security lacks the funds, they can pretend to have such a hacker behavior analyzer by giving out false cues to [all] users, eg: occasionally asking designated questions, according to user’s behavior; although such inforination is not [always] [fully] analyzed.
END AC-BA*
File: Access \ Ac-Features
ACCESS FEATURES - File: Ac-Features
Examples for Access features organized by category. "ACCESS CONTROLLER" ="Access"' Gate Controller is notified about the good or unusual status of any accessors functions. The form of notification is via "notifier", eg: an alert signal. Any one of multiple people or systems can be notified via one of multiple modes. What decides the type access permitted. This can be a (fairly) automatic algorithm and or human officer who (helps) "designate" the level of access permitted.
The "Access Controller" function sat or with the gateway point (where access is or can be given or denied). -Access controller can be: (senior) employee; security guard(works on computer and * physical entrance way to building or system); police; government intelligence system or employee; anti-hacker entity; one who controls "tracking" system (against hackers). -Automatic mode drawing (diagram): locks all / part of the files / system to "designated" (multi) user; triggers "nr" -> (human) access controller. -Drawing: Accessor -> Access' gate (Access' controller = k/(ba)analyzer/"score") = Electronic system that can be accessed.
System checks how good it is itself: Access=BA: analyzes=access controller because: it may be fraudulent / dysfunctional/ a poor screener of hackers / causing excessive problems for legitimate accessors. -BA analyzes the score access=ba gets in: catching hackers; being inconvenient for legitimate accessors. "ACCESSOR" = Accessor. One who seeks to gain access. -Legitimate user with privilege for accessing system; or the opposite can be a criminal, namely a computer hacker.
User: Anyone trying to utilize a function or feature of (electronic) device or system. See library and patent literatureon: encryption, passwords, security control (of el systems). This anyone can be:
Person: One with required security or usage clearance; "Bill": one who has credit line; employee; friend; family (over certain age); one who has won usage credits (via "game" or "bill"); owner of system. -A person with / lacking needed skill / training / password can(inadvertently) (not) cause damage, including: use of medical equipment, other expensive or dangerous machinery (in chemical laboratories), damaging other's research test results. -
a>.:..aw,..>.s,..vtc66655FdCCtit48YUkYEYYYA6'6$syYEYvbYfY>~.I
Animal: Keeping animals in and or out (at "designated" times). Eg: training animals to behave in certain ways by= having Xba determine desired behavior= and if so= allowing access.
See: KN's animal "tracking" and "analyzing" systems; systems to motivate and or control organism's behaviors.
- Another electronic system: "Computer" on WWW; "M". A system or KN utilized to gain access. The other system may be designed to work in conjunction w/ another system that requires access procedures in order for them to "interact", eg: computers on a network.
Hacker: there unwanted, but may try disguising selves as a legitimate user. Spies: they may seek sensitive or confidential information. Their usage might cause greater wear & tear on system. One who seeks to sabotage the: system itself, another system tied to system they try hacking, or sabotaging something or someone not tied to system= but can be attacked after getting something (information or function) from hacked system.
It's a person who is or should be incarcerated. Someone posing as someone else; hence sys' access "analyzer" needs to be very good /cautious / meticulous / detailed in its access procedure requirements. Another system can be utilized to hack. -Anyone who can't correctly (re)create password is probably a hacker= hence probably treated like one.
System(s) may consider allowing accessor to subsequently prove they aren't a hacker via generating correct passwords. "Access = BA" identifies not only hackers but (similarly) also any "designated" type of -incompetent employees / mentally ill people / terrorists /legitimate accessors who (might be too curious wondering beyond their "designated" "locations" on sys) I access controller ("tracks" W5 it monitors= punishes), since it can't always be trusted either. -Determines such type accessors based on their: performance or work results "score"; errors they make; psychotic behavior; keyword searches.
Drawing #l : Accessor = Seeking Access to utilize / control /"program"/ "edit"
- C: Access functions:
ARTIST BEHAVIORAL ANALYZER () II INFRA-RED SENSOR KEYS () I/ LIGHT SENSOR Q II
MERGE O II MOTION O I/ MANEUVERO lI PS-ZONE Q/I REPEAT O lI SCIENTIFIC SIGNALS
SMELLANALYZER () II SOUND ANALYZER () // TEL () // TRANSMITTER Q/NISUAL
ANALYZER () lI W5 O II CHANGE ACCESS PROCESS HIDEACCESS PROCESS O Il HINT O !/ NOTIFIER (}
ORDER & TIMING ()// PROIVIPT () !I SCORE ().
Drawing 42: Accessor = Seeking Access to utilize / control /"program"/ "edit" - C: BILL* ();
CART (retrieve info from cart); EDIT (); EDUC (); MULTI-USER (); NR (); OSC (); PR (); PS-Zone (); Q (); R(); ROUTER (); SCORE (); SENSOR (); SOUND ANALYZER (); STATUS Q; TDS ();
T(); TRACK 0; UIP (); VISUAL ANALYZER(); VR (); WA (). "ARTIST" = Method in which images generated permit "access".+ See main "Artist" section, especially it's "access" sub-section. 3D-010 Tilt Alarm: Tilt alarm in correct position to deactivate. Required angles can change daily, requiring user to discover the right position by looking at optional display which shows angle at which device needs to be deactivate.
-Applications: deactivate morning alarms, burglar alarms, gain entry, or lock or unlock anything else practical. -Drawing: alarm = [activator/deactivator] = "tilt" -For Techies: "Access" (failure to deactivate alarm / turn on
System(s) correctly -> alerts security personnel).6.96-Like 5A480 Laser Lock, both require designated motions. -play "game's" joystick (tilt) to win game, hence gain "access" or other desired function. + Required motions: Generating the path / algorithm / image of actions. Eg: they can be those u made at some previous task within narrow time parameter, eg: how they controlled a vehicle; joystick from earlier "game" they played; replicating (joystick)motion made by character seen on "S" (nearby). --if the actions are not made or repeated, accessor can generate a (moving) picture / "image" of the scenario.
Or, simply k/generating the SW (Software) codes for the scenario in the correct "order &timing". These codes mentioned are those generated after the accessor correctly hurdled the obstacles to gaining access. -pat search strategy: (tilt*) and (password* or activate* or access*).
R45 Dynamic Signature Verification': Write in your password. System identifies user’s handwriting style too. [Communication Intelligence Corp, Redwood Shores, CA / Riley Design
Associates, San Mateo, CA 4.94 PS]
For Techies: ACCESS: (also permits access with (additional) one or more of following: visual analyzer (user’s face, finger print), other" access" modes, (in tern serving as additional test barriers to entry));
ARTIST:(behavioral analyzer studies images made); CAMERA:(); CART:();
K:(stylus; r*); MFH:(database for visual and behavioral analyzers); MULTI-USER:(); NOTIFIER:(status, score, alerts when access denied);
OSC:(); PR:(); PRINTER*:(); Q*:(); S:(); SCORE**:(tds); UIP:() 4C210 "Artist" Access: Duplicates 4E030 Image Input Access, but this is older
KN #, hence kept for priority date.<1 (signature analysis aspect is 1, excludes pictures), 3 or 4>User must electronically draw needed picture to deactivate alarm ;or draw picture onto paper and have scanner check if image is near enough to the needed picture (machine is the final judge)-display can show the picture needed to be created--system's judge compensates for differences from needed and actually submitted text (given by human). --very similar to 4E030-may be any text (signature) can be given by person, system just analyzes it for: complexity; and or how well the brain is alert(by using database with psychological analyzer), etc. -sys judges for uip (calligraphy analysis) ="analyzing" (visual analyzer) identity-similar and compatible w/ "Sound Lock" Invention in C Directory, 4C190Smell Lock. Existing Invention which analyzes finger prints / eye's iris for "access" -patentability?: signature analysis by computer exists, thumbprint analysis* [o-Sys displays an image, u must draw as closely as possible. I fits within right parameters, System(s) analyzes user is fine physically. Eg: they are in space, and oxygen deprivation is judged. Or draw picture fast enough - KN, within certain time pattern. --for drunk drivers. If drunk, user can't type combination quickly enough to enter car. -Above (for this sub-section) mostly from Mark Rossi Mar 1995,703-739-0220.]
Drawing: System(s) prompts u u responds (writes/draws/"artist") =sensitive pad = analyzer = access.
Changeable password elements. "Order & Timing" of: image generation. Correct "artist" functions deactivate "Morning alarm". "CHANGE PASSWORDS" =+ For added security, system requires differing passwords for user.
These newly needed passwords are those that accessor knows or can guess, but difficult for hackers to determine. Subset of "Generate Passwords". -Value in changing passwords: u may not force themselves to change their password on a timely basis; keeps out: hackers, those who may have copied or. illegitimately gained passwords otherwise, users who have expired or exceeded their "access" privileges; makes accessors appreciate more highly: need for security, value in accessing. --.May require accessor be more on their toes / alert / kept up to date (on business or sys) since changes in passwords can be related to what and how and w5 accessor does their work - hence newly generated passwords can be uip-tailor related. -Methods of gaining access change according to any (random /"designated") criteria, making additional hurdles, eg: should an illicit person gain the password. Altering responses to access' questions based on cue when such alterations should be made. -"Hint" / Cue determines how passwords are to be altered. Eg: 1]if u receives tel call (from machine) stating word topple' = u (user) knows variation version #35 of password is used until = next such incoming tel call. 2) uip generated cues based on: what u did earlier, their history / hobbies / what u should know based on their work. If statement is correct / of certain topic designated variation of password is valid. -Other cues: day or week or month; weather (yesterday's high temperature reading); stock quote for particular company; type music played (listen for second word in song (which could even be one of needed passwords)); + pat 5442342 User inputs wrong answers based on cues, eg: days of week. 8.95
Hughes pat awarded. -Patents: 5365587 self-modifying access code for altering capabilities. + Camouflaging passwords accessor entered / How system alters passwords: Drawing: How u/sys = changes/"edits" inputted password(s).
See "edit": any text / signals entered (kn, "artist", password)into system can be altered as "designated".
Examples: -reverse the signature or images drawn. See "access=artist". -Altering typed or spoken responses: "edit"-Reverse the order / "order & timing". -skip sections: first/middle/last digit(s)/words/sections. -speak in different tone ="va"-utilize "synth" to alter inputted soundsrespond in different languages (with different meaning, or(near) identical translation). -Combination / Order altered. Eg: changes typed password while substituting flashing lights for inaudible sound, and doubles waiting time between typing password and touchless access process. -Fingerprint of different fingers / people. One or multiple people enter their prints / other images in altering "order &timing".
Multi-step Alteration - Scrambler: system's hw (hardware) or sw(automatically) alters inputted passwords after entry. Password only effective after altered as designated (within designated time / w5):
-Makes harder for those w/o (without) this scrambler (accessing System(s) from remote location). -Alteration made more complexicated: each ups passwords scrambled differently; + password= entered into sys/k= shows up on s/printer/etc= as being different ("edited") from what was entered.
Purpose: fool onlookers / hackers (who see history of accessors activities namely what passwords they entered). -altered differently in different circumstances (w5 of password entry): minimizes ability for hacker to get code for how password was altered. Multiple step alteration: System(s) alters, then re-alters password numbers of times prior to concluding altering process. -Access needed to change or do anything. Eg: password "edit": Alteration mode has barriers to access from hackers, eg: can't access from remote location; has minimized points of access from anywhere. Presence of alterator hidden. -Pat search strategy - USPTO Bib disk -6/96: ((change* or changing or alter*) near9 (access* or accesses* or accessing or password* or verifl")) and (computer* or electr* or software*) not alternative-User must meet one or more differing (creative) criteria prior to gaining access. Each criteria can change, eg: being are requirement / duration of criteria's activity / which u of several should meet which criteria(s) / rhythm in which criteria is met. Any one of the criteria's can be the controlling factor for other criteria. -"Edit": ups signals may need altering as "designated". Such editing may be w/in System(s) or "cart" (carried by User (as a key)).+ Causes of change in needed passwords: "ba" "scores" accessors behavior (during accessed session) as falling out of (their)typical usage patterns. System "prompts" accessor during this/later access procedure for differing password. -"Access" = "Visual analyzer": need to change "designated" aspect of image.
Eg: third line from left of right index finger needs to be erased or otherwise "edited": to achieve 95thdesired function. "Access Controller" or legitimate accessor can alter needed" passwords" for themselves or other users.
Limitations may include: Accessor can't alter passwords for those his senior (w/higher access privileges); other accessors can override initial change of password via: additional more powerful passwords /after "designated" time period or other criteria. "Morning alarm": different tasks required each (part of) day=make it both more challenging / uip-tailored to user’s needs or situation. "GENERATE PASSWORDS" = System(s) generates password / access instructions / type hints. See "Change Passwords". -sys studies uip-db / behavior (ba) and gives password more readily remembered and difficult for others to guess. --examples: "maneuver": "route" u walks from their private office to access point must be redrawn by u to gain access: a]*from' location can change, hence System(s) "tracks" u (where ever there (in building)). -Pat 5398285 generating passwords using public key cryptography.
One or Multiple sources generate password: If any one System(s) /person is incorrect / uncooperative = access denied. The order in which parties cooperate may be essential. Option: the effect each source has on password generation is geometric, eg: it puts a twist / alters /"edits" / re-"pr" what sources before / after enter = to create password. Things that cause "change=password" can also be used to "generate passwords". -Size of password generating devices: 1] might be large enough so as not to escape detection by building's entrance security guards and scanners. *2] smal l enough so u can h ide it from others apt to steal it. -Drawing: accessor = uip - score - analyzer = access - c. -Destructibility of password generating device: difficult to dismantle / upon dismantling designed inoperable thereafter. Reasons: limits hacking / dismantling for theft or study of parts. "NR" activated by destruction. -UIP / BA = utilized / "analyzed" to= "generate password"(changes). + Passwords System(s) generates (usually) easy for accessors to remember and hard for others to guess.
Hopefully replaces need to write down password or process. But the passwords if they are needed to be written down, are those that can more readily be written down in abbreviated or other disguised way so others who find it can't readily understand / utilize the information. Eg, laser lock requires hand motion in hexagon. User writes word laser inside a hexagon. --sys may keep passwords in such manner as well= with a decoder down the line to possibly interpret w5 necessary. +--uip-tailor chooses easy to remember passwords for accessors human memory. --Nature of behavioral process accessing is such that it can be easier to remember than other types of locks, eg Laser lock: move hand in shape of hexagon = blocking multiple laser lights in designated order.
Changeable password elements. "Order & Timing" of: how passwords are generated. "HIDE ACCESS PROCESS" = Makes it more difficult for unwanted people to either: know an access procedure is being utilized, and or for them to document it. See: "generating passwords" and how generation process kept secret; "changing passwords": camouflaging passwords.+ Hackers may not realize accessor is accessing: -Examples: When accessor: "Maneuvers": hackers may not realize what accessor is doing is actually accessing. Reason - access process doesn look like access process. "Motion"; "ps-zone"; "repeat"; "ba"; "artist"; Touchless passwords: smell; motion; transmitter from u; Order &Timing: Mix password entry process with non access modes, eg: multiple access procedures interspersed with more normal activity, eg: maintain connection to System(s) for maximum 3 minutes until all 4 passwords entered. Repeating Past
Patterns To Gain Access: Less likely u will write down password. -US Pat: 54997421 Protects confidentiality of passwords. -Need a password to get your password. Upon entry (by u or sys)to this "c" file, u must know w5 to find disguised password(s)designated for differing functions. -password entered by u differs from what shown on "S": Differentiating factors include: slightly altered picture; showing letters typed by finger to be one key away, eg: u typed'2' but "s" shows '3'. Additionally, the password transmitted from ups point may first get scrambled to be what showed up on "s". Later down the password access process, System(s) can rescramble password to: originally typed / other code. "Edit". See "Changing o..a......sES,..~~ ra~z~~~a;~.~~~~
Passwords"-* 6B790 Barrier hides hands keying password: put hand into compartment or glove from which they can key in codes (eg: one per finger) in order to keep codes confidential. For cash machines requiring: personal identification numbers; entry into house, office, etc. -depending on applications and quality of technology, system can" hand cuff" one hand of an individual who was attempting an illegal activity; held until police come (system calls for police) and releases person upon correct code by police and or other source. Discourages hackers and others attempting illegal activities.
Replaces needs for guards saving thousands of dollars per location. -hand cuffing may be illegal-cash machines are probably used by most people in the wealthy countries-the handcuffing might occur, and then simultaneously the majority of the machine's exposed parts might have its strong screen come down. There might not be enough time for the handcuffed person to think about grabbing a weapon to strike the computer ("C"), since theyl be in shock about their hand being trapped and will focus on getting their hand out. Just the presence of this on some machines can greatly reduce cash machine theft. -obvious? can also catch villains by emitting red ink onto them(washable)-Pat search strategy - USPTO Bib disk -6/96: (hide or hides or hiding or hidden) nearl l(camouflag* or access*or accesses* or accessing or password* or verif*) and (computer*or electr* or software*)-Certain files can be kept closed or virtually unreadable (even to system's chief operator) except when an "access" criteria has been met, eg: time in future.
Examples of such files: those used to generate future passwords; information about legitimate accessors such as those needed to analyze if their behavior matches.+ "Sensors" can't be easily replaced:" Sensors" that sense / "track" access procedures can have their own methods to keep hackers from getting their own related sensors to gain access. Eg: the correct "sensors" can have additional needed codes transmitted w/ accessors created signals; or correct sensors can encrypt / "edit" the codes generated by accessor.
Hiding Presence of Password From Accessor:+ Passwords can be something even "accessor's" are unaware of. Passwords can be something they may habitually be doing anyway. By not giving them the password, "hide" is strengthened. -Such password generations= need to study (ba)= accessors. 25, -Example passwords: --subjects they commonly access or are authorized to access=access' caution "analyzer" is triggered when behavior is out of the ordinary. --typing in one's name--accessors location: ps-zone--typing style / rhythm / speed. See typing style analyzer
--normal "order & timing" of accessors actions. --finger print: u thinks they simply need to press button (and warm it up)-sa: accessor thinks System(s) needs to be verbally controlled (without realizing voice must be of "designated" peoples). -other benefits: makes users feel more comfortable in not necessarily needing passwords (they must remember or even know were required).+ "Hint": System(s) can ask u questions w/o accessor realizing correct answers are the password.
Passwords can't be transferred out of computer: system= "keyword" search= "seeks" access process digits= then blocks / nr when= such is being "transmitted" (via modem). . Drawing:
Accessor's (behavior) (presence of password hidden from accessors knowledge) = C ("Analyzes" if correct parameters were met) -
Access = ARTIST BEHAVIORAL ANALYZER 0// INFRA-RED SENSOR O Il MERGE O !I
MOTION
Q/1 MANEUVER PS-ZONE () // REPEAT ()// SCIENTIFIC SIGNALS () !! SMELL ANALYZER
SOUND ANALYZERO // TEL TRANSMITTER O // VISUAL ANALYZER W5 () //HIDE ACCESS
PROCESS () // HINT () /! NOTIFIER () // ORDER &TIMING () // PROMPT SCORE (). "HINT" = what passwords are / when (w5) they should be entered. -Sys hints what passwords are / when (w5) they should be entered. US Pat 5425102 Password hints; 5345549
Multimedia based security systems give cue based on strong personal recall ability. *5454091-(accessor receives / requests hint) = (for) need password= to get hints foi= subsequently needed passwords(s).
Manner of hints are "editable" (according to "order* & timing" as guide).+
How System(s) determines how to "hint" ="uip-tailor": see:" generating passwords", and other access sections; what accessor previously (see "repeat") used to develop questions'for'accessor to answer to gain access; access' bars hint. -"Morning alarm": "INFRA-RED SENSOR" / Heat "Sensor" = Infra-red Sensor: Senses body heat of
User and or any number of people required (nearby). Limits ability of hackers to pretend to be at access point. Infrared: body heat / tight. -movement(s) of people must be in designated pattern. See" artist's" image generation mode for "access".
US patents: + 5406261 Computer security apparatus: accessorizes wireless infrared transmitter. pat search strategy ofUSPTO bib disk -6/96: infrared* and(access* or accesses* or password*)-Any signals generated=by accessors (infra-red related) behavior= "access". Changeable password elements. "Order &
Timing" of: emissions.+ Indoor / outdoor weather meters must "score" weather at" designated" levels, eg: room thermometer would limit hacker during non working hours when temperatures might be less controlled.+ "Designated" objects: shapes / size / type of heat emitting elements: appendage: accessors right index finger / hand; pet(dog) in vicinity; any other four legged creature; (cold blooded)animals seeking to access water gate (keeping out human scuba divers seeking (natural resources)); (sun) light reflector; heat emitting objects (heat from power generated source or solar power); pens / pencils / computer stylus / "R"; 101 insect scrawling in jar (in random fashion / collected at or * moving toward food source); their temperature can be above / below (via cooling agent) room temperature w/in "designated" parameters. --password generation objects: create objects via clay, plastic molding...
Insert any needed temperature effecting agents (into slot). -BA / Motion "analyzer": studies W5 objects are presented: in moving manner; "laser lock" type motions. "Drawing" "images": "artist's"="images" generated on "interactive" s by finger / other object. Use of finger nail or other room temperature objects (don't) access (according to W5). --"sensor" seeks image drawn via: heat / pressure "sensors" on tablet; laser movement "sensor" - see "laser lock". -infra-red / (sun) light = "sensors": way in which light shines into room needed to gain access. Eg: light angle(s); level of warmth emitted from light (above room temperature); what is lighted W5.
--"order & timing": light must have occurred over set duration prior to access"Morning alarm": user’s body movement= getting out of bed /doing "designated" task. "KEYS" = R113 <*origin date?>Intelligent hotel room key goes beyond old magnetic card keys, has circuit chip. Can be programmed re data pertaining to user, billing, etc. 18
Dec 92 X. -For Techies: ACCESS **:; CAMERA: is activated at check in/out point; CART*:;
CLAP: for additional codes (to gain "access"); Display("S"): touch-screen (uk for access); %GAME **:; "M":; PP/MP:; MQ/UQ *:; MULTI-USER*:; NOTIFIER:; OSC:; PRINTER *:; REMOTE("R") ("R"):; SCORE:; TDS *: time of each action; TEL:; UIP*:; UK. -Keys: metallic key; magnetic entry card; "cart" (w needed software / passwords, pat 5475839); other standard / bank(combination) locks. 9G190 "Cart" only functions when the sensor on it receives correct stimuli, eg: fingerprint of designated persons; "access". + Cart is a key for access. Enter whatever changeable codes desired into the cart. Cart can be a microchip placed into a(metallic / magnetic strip) key; whereby cartons codes are needed to gain access, as well as other characteristics of the key. The key portion can be any type of possible or KN type key or %access procedure's object (triggering hard object). Cart might be invisible, eg: key can get copied but don't function; it could be buried or hidden by material by which key is composed. --Repeated explanation: cart also acts like a key to sys' lock: eg: (reprogrammable) card key (w/ password code). cart - key =access.
Cart can be microchip built into key.~
-"Cart" = "Access's" "Infra-Red" Object (Key). -"Access": need (recent) fingerprint / bar code = scanner /"sensor" / "camera" [for reading images] "analyzer"
UIP-DB = Lock (U is given or denied "access").
Drawing: Accessor's ("Cart" / Object (whose movement or presence triggers "sensor" / behavior) () = C ("Analyzes" if correct(movement) parameters were met) - Access =ARTIST (its movement) // BEHAVIORAL
ANALYZER () // INFRA-REDSENSOR () //. LIGHT SENSOR () // MOTION () // MANEUVER
ZONE () // REPEAT () II %SCIENTIFIC SIGNALS () l/ SMELL ANALYZER(object emits odors) // SOUND
ANALYZER () II VISUAL ANALYZER(studies shape of object or shape of its movement paths) II
W5(moved) // CHANGE ACCESS PROCESS O /I HIDE ACCESS PROCESS O //HINT () l/
NOTIFIER Il
ORDER & TIMING // PROMPT (when to insert key) // SCORE (key used to generate correct score, eg: key ="tilt"). Changeable password elements. "Order & Timing": which "keys"/ "carts" were utilized. "LASER" = +p <3> 5A480 Laser Lock: Activated by tripping laser lights in designated patterns. See
KN's Laser Harp & Tel as signal generators. -Safer from others learning the combination person is keying in. Multiple lasers activated in designated order by u making motion of certain shapes.*-Eg: run finger through light back and forth three times, wait three seconds, then ruri them two times more, wait three seconds [or longer - can have variable minimum waiting times, with flexible maximum waiting times] then easily {quickly} swing back and forth twelve times.*-system locks for certain duration without allowing any access if attempted entrance code is [wrong] or very different from correct code. Helping to eliminate illegal entry.*-applications: put on back of any electronic device (computer,
door handle of car, of specially designed door handle of building*-electronic guard/lock device*-has multiple lasers to increase complexity of cracking codes*-Easy to change combination. . -this function like most other User Behavior Process Functions is such that it can be difficult for casual outside observer to see combination being programmed in, as with other combination locks. -doesn require security cards, keys, etc which can be lost or stolen. -upon gaining access, user has choice of not requiring combination for reentry (if their combination) allows them this privilege. Useful with car and building doors. -lock activation, deactivation feature can be turned on when motion sensor senses an oncoming person (eg: infra-red sensor in combination with sensors for changes in vibration, sound, camera image). -4C020 (sound lock) = 5A-480 (laser lock's old KN #)--the remote control device to unlock car door exists, yet may not stop this patent.
For Techies: #1: +access; access: each type access (made) -> database ->uip; access = r (tr/rc fq); artist: manner in which Frequency to (gain)access is tr is done in artistic / creative manner: "compose" sounds / lights / other
Frequency - %(sys's (behavioral) "analyzer"(helps) determine entity (trying to gain access), according to type creative work, eg: similar to determining real composers /painters by characteristics in their work; balance: u must create/ hear sounds in certain (non perfect) balance; access=bva (sys seeks certain audio Frequency / words / rhythms / decibels); c=access; camera: visual analyzer (determines u (via uip / matching current lens' input w/ database of u)); cart: c(cart)=access; cart=(magnetic) card / S
W(Software) (w ups encrypted codes); clap; date: access only possible w/in certain times / different times require differing methods for gaining access; display: System(s) offers u one or more choices for ups selection from larger menu -> correct selection by u -> access; *educ: u learns skills while learning access methods: answers to history / math / science / security /organization's (protocol) questions; gps: access only possible w/ in limited geographical zones / when u (their portable gps)traveled a limited (path / zone / manner / bar) to the access(check in) point; k=access, manner in which elements typed(speed, rhythm, stop and goes); locator:
System(s) finds/follows/studies u according to ups whereabouts based on what "access" (codes/modes) u used/uses, eg: u is in north wing of building because access check points are passed to get in or out of wing; or user is in sw's 40th database, and in tern uip on u is developed accordingly. -Exists: IR? for controlling locks, probably via ultra-sound too(well known). -M ="ACCESS" (4C-020):M's database matches needed data / code / process / etc before "access" permitted. artist=access=m. balance=access=m. bva=access=n. c=access=m'. camera=access=m. cart=c=access=m. clap=access=m. composition=access=m. date=access=m. display=access=m. distancer=access=m. educ=access=n. gps=access=m. k=access=m. mic=access=m. mo=access=m. mp=access=m. mq=access=m. multi-user=access=m. notifier=access=m. *osc=access=m. pd/locator/pp/pr/ps/r/score/sensor/soundanalyzer/speech/status/*synth/tds/t*/ui p/uq/visual-analyzer =Access =
MFH. -MIC = ACCESS (4C-020): ACCESS / ARTIST (control images via" speech")/
BVA (certain ups voices and or vocal patterns, eg: sing particular tune) / C CART (sound database, sw)/ CLAP /COMPOSITION /
DATE (w5 of incoming sound)/ S / DISTANCER (u must be at certain distance from "mic" to activate access.
Space from u to ="sensor" (thermal / distancer / vibration sensor / other sensors judging presence of user (s)) "analyzer" -c)/ EDUC / K(control "mic") / M (sound database; sound analyzer) /
MIC / MO /MOUSE / MP /
MQ / MULTI-USER / NOTIFIER / OSC / PP / Q/ R / RC /SCORE / SENSOR /+ SOUND
ANALYZER: sound database; ups sound=sound analyzer=access (analyzer)=controls designated function (open gates; permits u full or partial function w/in some designated System(s) (sw) / SPEECH / SP
TEL / STATUS I STEREO /SYNTH / TDS / T/ TR / User / UIP / UK / UQ / VISUAL ANALYZER / VR *= MIC
Light Sensor: Senses changes in light measured by: presence or lack of light, or more precisely the amount of light; frequency of light, eg: color; duration and or time in which light was generated. -Flashing lights. Drawing: access point = alters in designated patterns / colors = from el light "tr" = c-r = u. Morse code. pat search strategy of USPTO bib disk -6/96: (laser* or light*) and (access* or accesses* or password*)-light / laser may need to be of "designated" distance: if two or more light frequencies are used, System(s) knows distance of light source, or may know via other "sensor" / methods (where access renters password at remote location (ps-zone)). -Any signals generated by accessors (laser /light) related)behavior ="access":. Changeable password elements. "Order & Timing" of: which laser lights are tripped / activated / deactivated / altered (its light bent) / w5. "MANEUVER" = Maneuvering through any of the needed steps / stages necessary to conclude access process. The "order &*timing" process are the essentials, what's actually keyed in at "designated" points being the subset. Maneuvering through images / computer screens and programs: U maneuvers through images on computer's screen, going into deeper layers until they've selected designated image which is the password.
The manner of ups moving cursor thrbugh the jungle of images, and avoidance of traps permits access.
Sample "routing" style required of "accessor":1] click on icon of flower -> u moves an animated character over to third flower to smell it-> u opens bee hive -> u directs bee to 8th flower for pollination -> resulting see planted in planter box #10,303 -> character clicks on 75th apple from tree of planted seed -> further "access" hurdles -> "access" provided.2] click on deactivate music box' -> however music box opens ->u plays 29th song -> song plays while its wording shown -> u must click on designated word / phrase / melody (at right time) ->further hurdles -> further "access" hurdles -> "access" provided +Style of computer's response / terrain in which u must maneuver can be different / changed according to w5 / "multi-user": +-u must know / intuit how to respond / behave. +-uip: System(s) knows enough about designated correct u to adjust /make hints / design path for maneuvering= so u knows how to maneuver through barriers. Based on uip-tailor, similar to" generating passwords"=uiptailor).+-differences between correct and incorrect maneuvering can be minor or major, eg: flower smelled is still the 3rd one but changes from red to pink (while other flowers changed from pink to red), resulting in confusion for hacker, eg: changing of designated soft.ware codes.
Miscellaneous: "maneuvering" is a quick process ("mouse" around) + "Change Access Procedure" = Adding on additional steps: -scenery / type maneuvering change constantly. Example of "Change Access
Process", and generating passwords. +-As in semi "game" / "entertaining" "interaction": each subsequent access attempt requires the correct addition to the previously known steps. +--What new step(s) may be: --- Errors might be tolerated in each new stage added onto previously known maneuvering; but next access attempt requires unto "repeat" previously learned "access procedures". Or may be accessor decides what each next stage will be, and simply needs to remember (example of accessor being the password generator (in "change access process"). ---Sys "hints"= allowing accessor- five attempts at intuiting correct access procedure. -- "Repeating" what u did or experienced in past= tied to correct choice(s). --see: access' repeating section; "artist's" "draw"; "track" ="repeat"; "track" - "ba" = generating "hints" for ups subsequent steps. -external events: time of year; events in world or organization. "VR": manner in which u moves -> access. See KN (maybe under "vr"). +"Crawler": Automatic maneuvering system: Something is designed to trigger the maneuvering process (in event its too cumbersome for accessor). Examples: a software pr activated by u; cart; clicking of designated icon (only available at designated locations / times). See "artist's" "crawler": this has a function of its own (can be triggered by u/sys). -Password needed to activate the automatic maneuvering. User may need to maneuver part of the course = type of password, then =automatic maneuvering process. "Order & timing": User must created designated images ("artist")in sequence. -Sequence here is defined as the manner in which each: 1]step/stroke in image generation is implemented; 2] sequence in which (total / partial) images are inputted / released by u. pat search strategy of USPTO bib disk -6/96: (move or movement or moving or moves or maneuver*) nearS (access* or accesses* or password*)-Any signals generated by accessors maneuvering behavior ="access".
Changeable password elements. "Order & Timing" of: how accessor must "maneuver"+ See "maneuvering" via "game's" character. Manner in which'accessor acts is the needed pattern for gaining" access". -See "Artist" _ "Maneuver". -U= needs to know= where to find what "prompt" seeks= (to have "merged")= for "access". Where or how to look (for other element(s) needing to be merged: how to "maneuver" / play "game" / which files to check. "MERGE" = +p Need to merge any multiple files. Namely, accessor merges two or more elements in designated "order & timing".
-Accessor may need to match (icon or file) (w "mouse" via dragging across s) any (past occurring and recorded event's filed signals / element / file / text with something else: Examples:Voices: multiple voices somehow related (by birth, work);typical functions or responses said voice or person would make, or how they would respond to any real / imagined scenario(something like a "game" playing). -the synergy from a merging = "access" / "artist's" "crawler". -the order subset of "order & timing" can be a form of inerging:
Changeable password elements. "Order & Timing" of: what is "merged" w5. -see: "Artist's" "Merge"; "Artist's" "Synergy"%
Drawing: "Merging" of Access procedures = C ("Analyzes" if correct parameters were met) - Access (Offered / Denied) = ARTIST () // BEHAVIORAL ANALYZER () // INFRA-RED SENSOR () Il KEYS () /I LIGHT
SENSOR O11 MERGE Q I/ MOTION MANEUV ERO /1 PS-ZONE O // REPEAT O // SCIENTIFIC
SIGNALS O // SMELL ANALYZER O /I SOUND ANALYZER O // TEL (transmits signals of password procedures / CID / "merge" wi other passwords) //TR.ANSMITTER O // VISUAL
ANALYZER O // W5 0 // %
CHANGE ACCESSPROCESS () // HIDE ACCESS PROCESS HINT NOTIFIER //ORDER &
TIMING // PROMPT () // SCORE (). "MOTION" = Manner of accessors movement gains access. Motions include: "exercise", "distancer", "ps-zone", "dance"-}-, "vibration" analyzers. this overlaps: Access' BA: type motion= matches needed behavioral profile_ "NOTIFIER" =+ "Access"="Notifier" is a subset of "Seek & React": Legitimate/
Illicit users of (kn)
System(s) cause a "reaction". Reactions include: turning system off/ on; punishing u (denying them future access for set time duration or other via other w5 "reaction" mode). -Notifier functions as an alarm or the "reaction" itself is a notifier (catching the attention (of security (personnel)). -See KN's Tamper Alert: "Nr" activated when anything has been illegally accessed. -Accessor= generates password / "access" / behavioral pattern(s)=permit "designated" "access" / "designated"
Inr"
"ORDER & TIMING" = When; Time duration: What; in what order access process' methods were enacted.
Pauses in enactment. 6B370: Press keys designated length of time per key:+-"access": must press key designated length of time. --or activate code (on and off w/ designated number of pressings. Can expand to include: certain time each pressing should be made with needed pause time between pressing). + User must know w5 to enter designated data, w/ or w/o (without) prompts.
Entering data in designated rhythm. --Eg: hold key 1.5 seconds and wait 3.1 seconds between keystrokes. The order of KN access modes alters each month[multiple access procedures].
Multiple Access Procedures: User required to use one or more access "kn" procedures.
-Accessors required to respond quickly: Illegitimate accessor SW (Software) difficulty in reading I locating "prompt" -> respond to c sw's prompts fast enough can't gain access, this makes it more difficult for computer hackers to gain access when/where (w5*)they are less initiated into sys' functions; those trying to gain access (then failing on initial trials) are more closely tagged(2E251 Intelligent monitor) during any subsequent access attempts they may attempt. 5G070 Speed Reading Software. -Patents: 5451934 time delay features * 6B370 Measures time(s) door chime / k was pressed. Signifies frequency, etc of those who are not that close who sought contactor entry. system additionally might register all times door was opened if U Pr. Each type of door entry signifies different type person. -applications: "Track": was person or employee honest about what occurred, record keeping, security, evidence (eg: when something was delivered, when employees came and or left, etc )limits u access by amount or type. "Access" restricted to time(s) of day/year possibly in combination with other hurdles. -Accessor= generates "order & timing" related behavioral pattern(s)= permit "designated" "access". -Other elements determining timing of access: Gravity from moon or planets (see astrologers); astrological charts designating which days are good / bad for any criteria (accessor, company, love). "Designated" hours, days (birth dates of known people). -See: around analyzer's border & timing. "PROMPT" = What prompts U: to begin access procedure. "Hint" issue-set of "Prompt". -any required type signals (from u or sys). Such signals can be "access" signals (which simply need to be "repeated" / "edited" again). -Drawing: prompt= accessor generates behavioral pattern(s)= permit" designated" "access". -may need "access" to get to (next) needed "prompt"= then enter access.+ prompts can be disguised: to look like something other than a prompt, eg: egg / "crawler" / "game" (for "maneuvering") labeled number five= inside SW (Software) window number three. -activate prompt= then it is ready to= accept password. -"Morning alarm": clues user= should they not know how to "react" or function. "PS-ZONE" = "PS-Zone" 3EI50 : u must be in limited localities to gainaccess.
US Pat search strategy: location* near5 (access* or accesses*or accessing or password*) -US Pat: 5243652 Location-sensitive remote database access control. -Accessor= generates "motion" / ps-zone behavioral pattern(s)=permit "designated" "access". Changeable password elements. "Order & Timing" of: which zones are entered / activatable
"REPEAT" =<+> Access via Repeating Past Patterns:+l] Repeated action: User repeats an action they committed earlier. -Required motions: can be those u made at some previous task within narrow time parameter, eg: how they controlled a vehicle; joystick from earlier "game" they played; replicating (joystick)motion made by character seen on "S" (nearby). -U hears something they said during last ("c") session, repeated back to them when they next gain access. This existing System(s) shows if there was tampering.
+2] Copying: User sees something and uses it as a cue for the needed access process. Examples:-Password is shown on "s", u simply must reverse its order, or ignore last and first three digits.* Pat search str (strategy): access* and (repeat* or repetitive). Nothing-comprehensible found. + Patent: 5247497 Security systems based on recording unique identifier for subsequent playback.
Information provided by User to system when they last entered is played back so User knows if someone else gained access previously. Assignee: Octel [big co]. --improvements: -U = This Invention System(s) (Patent: 5247497) - C = ACCESS () // ANALYZER () // EDIT () // NR (u nr when (w5) u didn't check to see what their unique identifier' (5247497 type input) was during their last session, System(s) is of no use if u doesn check, and best if u checks each time) // OSC () // PR () // PSZone (sys "tracks" w5 u moved and or what they did(uip, gps) -> plays back this information when u reaccesses sys) /I Q () // R() // ROUTER () // SCORE (ups previous score or "status" or "TDS" (previous usage) can be a unique identifier(password) - this automation helps the less creative / lazy u) !/ STATUS () //
TDS O lI TO /I TRACK O // UIP O. -Pat search strategy - USPTO Bib disk --6/96: (repeating* or repeat*) near5 (access* or accesses* or accessing or password*)Accessor- generates repeated behavioral pattern(s)= permit"=designated" "access".
Changeable password elements. "Order & Timing" of: how accessor should "repeat" aspects of previous activity (w5)"Morning alarm": do it to deactivate alarm. "SCIENTIFIC SIGNALS" a Body signals. Body signals: System(s) gauges bodily signals unique to individual.
Examples: body's natural electrically generated signals; skin chemistry; heart beat pattern; heart beat speed (u works on treadmill to get heart to designated speed = and u sees their rate on "s" and when achieve, it requests access at this time. -Drawing: u = sensor = medical "score" "analyzer" = access. -Pat search strategy - USPTO Bib disk ---6/96: (signal* near5 body) and (access* or accesses* or accessing or password*). -Accessor= generates scientific pattern(s) = permit "designated" access". -Animal / Organism monitoring KN must "sense" designated criteria= access (for animal).
Changeable password elements. "Order & Timing" of: scientificsignals."Morning alarm": body signals must imply (full) wakefulness. User is up to psych up themselves to then= alter their body signals. "SCORE" =Limits amount of access. Eg: kids can't watch TV over 30hours/week on week nights.
B370 Measures time(s) door chime was pressed.. -Scores w5 of person's hacking activity to better enable court prosecutor's request for stiffer sentencing. -UIP: 1] Studies if ups actual behavior matches how System(s) thinks u would behave. 2] Identifies then "tracks" villains. 3]"Analyzes" contents and restricts accordingly, eg: limiting programs for children. -"Edit": Limits functions available based on ups "status" /"score". -9G220 Channel Scanner Skips Stations Having Commercials:(access/uip determines what (w5) u needs to view (access),communications/data that can selected include: t, mo data, a/v material, db, m access, usage of r functions. System(s) blocks: commercials, aspects of data (which are coded as restricted to certain access coded u)='Bill"-Accessor- generates "score" pattern(s)= permit "designated" "access"
-"Track": system records who gained access (w5). Each person[or department] has different code. "track" = ba = access. -criteria #A, K: correct rhythm of typing necessary; criteria #B: correct password needed; criteria #C: (entry) data must be tr by the second of three people. Access sys's ="analyzer" = randomly determines which of the three A/B/C allows access (on a month by month basis for a u by u basis) -> access procedure for isolated situation: 2nd u k password (w/o regard to rhythm) -> 2nd u types letters in certain rhythm. "SENSOR - MISCELLANEOUS / CHEMICAL" = Chemical "Analyzing" systems / "sensors" / probers% that sense the presence of any designated object w/ "designated" chemical constitution. Eg: salt; gold; water; any chemical "Smell Sensor" senses; any chemical compound(s) given in designated "order &timing". + Liquid or solid chemical produced by company and competing w/similar chemicals sold by others. Eg: bring your Coca Cola but not Pepsi into exhibit at carnival and get free entry.
Needs good applications if patentable. + Applications: -Particular sports shoes (with unique: colors, or chemical constitutions on portion of shoe). -Particular sauces: eg, Kikkoman's but not other brands of soy sauce or other
Asian sauces. -Labels on products w/ designated chemicals. Labels attached to product. Eg:
Floppy disks; "cart". -Passwords can be built into part of product. Only users of legitimate brands gain "access". Each product (model number) may have designated passwords. -Number of "accesses" might be limited. There would be some counter / "score" / wearing off (of chemical) per usage (for access). -Additional Applications for giving preferred treatment to user’s of one's products: Access to (free): water; soda dispensers; physical access to permit entry into a gated area or building or zone= w/ desired products / services; "stereo"; "osc"; information; kn function; or anything else that can be limited /quantified / restricted to certain people (such as via "access"). -at end or (running) race, only those w/ Nike tennis shoes can get free Coca
Cola, and with this soda, they get access to next function. -Electronic system only functions when fed or given such label supplies or parts. This may fringe on U.S. laws, hence discounts or other preferences can apply. -Presence of correct protective clothing, eg: gloves required. See KN's 7G forms of shielded protection, counter tops, proper containers, etc. -Other valuable applications should exist!-Those w/ or w/o excessive radiation prohibited access. -7G Indicators KN: any chemical that can be "sought" via "indicator"= qualifies as a triggering agent for= "access". -Exists: bar code readers for "billing"; magnetic strips on flat keys for "access" and credit cards; microchips built into keys for "access", eg: on Cadillac cars. -
-Patentability: System(s) "seeks" elements not commonly "sought" after for "access"; access process doesn usually require carrying of an extra object, eg: key (since the presence of (main) element is enough to gain "access").
Changeable password elements. "Order & Timing" of: which chemicals are needed.
This is a subset of: Access"'Sensor Miscellaneous", and KN's7G Chemical
Indicators = "Seek & React". "SMELL ANALYZER" =+p 4C190 Smell Lock: Unlocks only in presence of certain smell, eg; wearing of cologne. If person's special cologne recipe is secret, this will be a difficult lock to break, and it will be difficult to even detect that a smell lock is the type of lock being used. User might wear colognes unrecognizable to human noses, in tern fooling observers seeking a way to gain illegal access into any electronic system, eg: computers, walkways, safes. Smell lock couples with additional safety measures, eg: passwords. +p-some smells are not detectable to human nose, hence wearing such smells, which are noticeable by "sensor", increases security. Smells can be masked by combining w/ other smells (perfumes) not(always) needed for "access". similar and compatible w/ "Sound Lock" Invention in C Directory, 4C210Artist
Access. -uses existing smell technology-Drawing: perfume -> chemical "sensor" = analyzer = access. -Smells generated from: particular candles (scent from wick /elements in wax); cologne / perfume; hair spray; other cosmetics; insect repellant; body odor (advanced System(s) identifies each ups unique body odor); lack of certain odors (having just taken shower); weather conditions (smells just after rain), hence "access" limited to weather conditions (or weather conditions require differing access process). -different combinations of access processes required for differing days / situations / type access desired. -Hazardous situations: access might only be / also be offered only at times of hazardous chemical release (such as to escape through controlled doorways). eg: chemical spill / radioactive release where (air) sensor picks up on it. Reasons: u doesn have time to fumble with passwords. Cautions built against those seeking go gain access by inducing disasters, eg: accessor is photographed / not allowed out until security clearance. -Smell "Analyzer". See 4C190 Smell Lock: Unlocks only in presence of certain smell, eg; wearing of cologne. -Pat search strategy - USPTO Bib disk -6/96: (smell* or odor* or cologne* or perfume*) and (access* or accesses* or accessing or password*)-Accessor= generates smell pattern(s)= permit "designated" "access". -user must blow (via mouth or fan or natural wind) air / cologne in designated "order & timing". This patterning process might tolerate drafts or odors in between the blowing / transmission times (due to less controllable air flows). -Needed "changes for access process" can be: using more / less cologne *; mixing cologne's; not wearing cologne at "designated" times (w5 access is desired). -Smell types. Particular kinds of: flowers; foods; spices; mildew or rot from certain elements; ink (fluids); elements kept in capsules and (plugged into "sensor"= resulting in less loss of odor for subsequent usage); minute odors from woods, plastics, metals, stones; liquids (w/ other elements); wax; other chemicals; hazardous chemicals (those mentioned in KN's file 7G).
-Smell can be replaced w/ particular types of weather: humidity; atmospheric pressure; level of ionization; pollution; altitude; longitude; latitude.
Changeable password elements. "Order & Timing" of: w5 odorsare dispensed.
Odor may only be released when the previous access procedure was conducted= intern this odor triggers "order & timing's subsequent needed password. -Punishment: wrong access procedure can release an odor whichcauses: system shut down / inability to reattempt access (W5)(during set duration) I nr / unbearable odor, eg: skunk's. -This an other password generations can be utilized for training animals. --Eg: animal's actions cause an odor= animal then gets food. Poor behavior from animal causes wrong odor and no food or electric shock or piercing sound.* Not important! "Morning alarm": are body odors slightly different in morning? If so this can be utilized to determine wakefulness.
Applicable to animals being researched? "SOUND ANALYZER" = Synthesizer: Password is the setting needed to alter ups synthesizer: need "synth" set in designated ways to make sounds audible / comprehensible to (human) ear. + 5A500 Sound Lock: Activate lock by emitting special inaudible sounds from tiny pocket device. +-Key attached to the sound transmitter. +-sounds may be inaudible to human ear, lock opens. Helps prevent people or other's monitoring systems from knowing a sound lock is being utilized. Access"'Hide". The audible / easily recordable portion of sound might not be the sound needed to gainaccess, misleading hackers, while the presence of this sound functions to let accessor know the sound mode was activated (w/in certain time period from when important sound was transmitted by'osc).
--there are frequencies which cannot be easily recorded by equipment (illegal copies of sounds for unlocking).
Its more difficult to copy and or know about copying if the transmitter sends sound in frequencies not audible by human ear-the volume might be set at certain level, to further complicate accurate copying / needed access procedures. -changeable password elements. "Order & Timing" of designated: sounds; pauses; volume; pitch; bass; w5 sounds emitted. -others nearby may not know how the lock is opened, adding tosecurity. -4E020 Content & Date Verifier: of (any said) occurrences, eg:"tracks" occurrences; "analyzes" occurrences (for uip)"Speech": voice recognizing System(s) seeks certain sounds "sa".
-Patents: 5450524 Password verification system based on a difference of scores ("scores") of type sounds (SA); 5499318audible uttering and timing of uttering. -type sound(s). Different: regional accents; languages; person's voice; any other sound distinguishable from other sounds such as by their frequency, duration, pattern, volume, pitch, distance from microphone.
-Pat search strategy - USPTO Bib disk -6196: (verbal* or sound* or music* or audi* or voice) nearl5 (access*or accesses* or accessing or password*).-US Patents: 5517558 Voicecontrolled account access. 5426450Hands-free hardware keyboard. 550303 Accessing information -AT&T 5335313 Voice-actuated, speaker-dependent control system for hospital bed. 5309504. -sounds can be used to create "artist's" images -> gain "access": Manner of sound generation (by u) determines type image. Accessor= generates sound pattern(s)= permit "designated" "access".
Changeable password elements. "Order & Timing" of: w5 sounds are emitted. -"Morning alarm": UIP-DB stores the sound types of user when they are wakeful = this database compared against= those vocal sounds emitted by user in morning. User needs to bring themselves to wakefulness = to reach the "designated" "mood" in user’s voice= as "analyzed" by "sound analyzer". "TEL" = also see file: Parts-Telecommunications for further explanations parts codes used. Eg: for telephony, information highway related applications of "access". "CID": can only gain access from designate tel numbers. If caller not from designated tel #: User designated as suspicious. Access is limited, eg: by time parameters; subject matter; additional passwords needed.
System(s) calls back u on the tel # u should be calling from, and expects a busy signal. Access may select not to even answer / respond fully to calls from unknown tel numbers. -Pat 5280581 System(s) calls back accessor.% Misc: 3E040 3E041 Telephone Noise
Canceler: (sound sources identified by their tr (access/uip code transmitted) are processed/handled differently as pr; system better hones into/away sounds w/ or w/o such tagging transmitters)-3GO10 T Ring Delayer: (only for calls coming from particular CID)-4E020 Registered Electronic Media Communication: (]](registered) material is "analyzed" for uip/key words and this analyzed material is then = tagged (uip) = intern such tagging helps in matching whatever (u who is being evaluated (for their access/uip) w/ the (registered) material. 2] "Analysis" helps control/guide the 2E251 Intelligent Monitor.)-"Morning alarm": user’s port connects to "mainframe" computer. "TRANSMITTER" = Transmitter from u (as u walks by "sensor");Magnetic Device.
R127 [ Commuter's train ticket credit card: circuit emits frequency read by device in ticket gate. JR (Japan
Railway) ]. Also copied to "Access", "PS", "Score", "Track".
Magnetic Device: The presence of a magnet touching, or not touching within a few mm or cm, activates and or deactivates. Differing type magnets or other devices emitting other electrical forces give different commands according to the activator. An activator may have the ability to transmit one or more different type signals.
Accessor must exert designated strength, eg: type magnet and or distance there placed from" sensor's" magnet. Changing distance ("distancer") creates needed patterns = Access' "order & timing". -copied from IMI&8 "R" part. -Accessor's (portable) magnet / object may also need to meet following parameters by having/being: a size (fits into slot);include a microchip with built in password; (standard) key; attached to another kn (invention) password generating device. "Transmitter"= Accessor's "Key". -Drawing: similar or opposite magnets = "sensor" = "scores" degree of pulling or pushing = access.
-Radiation: radiation needed to gain access. Values: such key can't easily get taken out of building / area since it needs to be housed in a large enough lead container readily noticed, plus security at entrance checks / scans all packages / people. --Drawing: mild radiation = Geiger counter "sensor" = access. -Pat search strategy - USPTO Bib disk -6/96: magnet* near9 (access* or accesses* or accessing or password* orverif*) and (computer* or electr* or software*)4C020 Transmission Lock: * <1 (good argument), 1, 4, 4>
Activate lock via any type of transmission. The exact frequency and the combinations of on and off activate the desired functions. Combinations can lock or unlock, turn on lights, call security. Example frequencies: light, sound, or any other airwave. -activation via vibration(s) - the level of vibration (impact /movement) and or the code determine "access". The code' is determined by: time period of each vibration mode / time period between each mode / level of vibration intensity / number and type of modes / in combination with other factors, eg: other "fq"(sound/light) / key / combination / password / other "access" entry factor. -the more different factors, the more difficult to gain entry /crack the code (for "access") / "access". -(instead of magnetic...) any frequencies which cannot be easily recorded by equipment (illegal copies of sounds for unlocking) -its more difficult to copy and or know about copying if the transmitter sends sound in frequencies not audible by human ear-the volume might be set at certain level, to further complicate accurate copying-transmission can be of any other electromagnetic airwaves Laser Lock:
Activated by tripping laser lights. <3> 21 4C020 <- 5A-48Q-042004. Laser lock details found in "access" main file. -Accessor= generates transmitter signal pattern(s)= permit" designated" "access".
Changeable password elements. "Order & Timing" of: w5transmissions are transmitted. "TRAP" =+"Maneuver" ="Traps" (Punishment for having wrong password): Trap types: images beckoning ("prompts") accessors yet results in: -deactivation of desired function. This part in this way might not be used. -gives enough information / acts (almost) like how the hacker may think
System(s) should work.+ Booby Traps: fools "accessor" into believing they gained access: initial password typed in (whether correct or not)results in
System(s) stating /implying such was correct answer:-yet u trips up on some later step (while falsely thinking they have one of the correct passwords). -sys "tracks" (compiles enough information on hacker) to punish them: identify hacker (who or where they are /
W5 they access);"notify" security; ba on hacker to better catch them upon any subsequent attempts they may commit in hacking.+ "Bluffing" - leading accessors on: some sensitive information may need to be given to continue fooling hacker into believing they've not been identified as a hacker. Depending on the level of access system's sophistication= the "designation" between sensitive and non-sensitive and "trapping" information given=wifl better allow access System(s) to accomplish its aims: "trap" accessor; stop reattempts at hacking. -Files used for "bluffing": "designated" files need to be triggered to open when hackers are deemed present.
These files must be accessible in a realistic manner, eg: u keys in (again)(same) password. Files for "bluffing" may be altered from the real ones via: "editing" / search and replace / manual alteration.
--they hopefully don't contain (enough) information for accessor to figure out how to (W5): gain access and not be considered a hacker; learn about "bluffing's" presence / characteristics; commit sabotage against anyone or thing, even if its not sensitive to owner of the system being hacked. -keeping hacker from thinking there being led on: any foolish(password) action by accessor can't necessarily be tolerated.
Types of "trapping" information or elements given to accessor: tel numbers for accessors to call= which have
CID (requirement to gain access)= then identify hacker; other sources or places hacker can visit (by "computer" w/ their CID) (on W W W). -sw (with computer viruses (that might best be deactivated by controller of access gate way), hacker contacting this human controller can give way to identifying who hacker is (if hacker is unaware the virus is actually a booby trap). Accessed system/ Virus can have information / contact points to disable it. -hacker's system is labeled for all future "interfacing" with other computers, so other systems know hacker's system was once used by a hacker. --Eg: 1] hacker's CID tel number is registered in <black list>tel number db.
This is an example of how booby trapping occurs w/o (without) hacker's awareness. 2] portion of SW (Software) or hw is (permanently /secretly) "edited". Such as portions used for helping computer System(s) to: identify itself; gain access; use modem; "interact" with new data / SW (Software) (on internet / m).Misc: identifying > "tracking" = hackers / nr / "trapping" hackers. -value: fear of (further) punishment helps ward off hacker's subsequent hacking attempts; legitimate u w/o correct access procedure are (more) forced to speak w/ their supervisors (before damage is done in some manner (releasing of sensitive information; damage to system or what it is effecting (by incorrect usage)).+
Hacker's or their colleagues' subsequent attempts at hacking:-"track" ="ba" are more on the look out for similar accessors again. Chances are likely hacker's have some common behavioral pattern (UIP)= that is common in each access (attempt). --if UIP-DB on hacker's behavior is lacking= System(s) may continue to allow hacker to be fooled into believing there gaining access=while UIP builds up its db on hacker(s).Other "traps" and punishments: Any other known way of "restricting" / punishing human hackers / equipment used by hackers, w/ or w/o hacker's knowledge. -See patent database: Key Words - (password* or access or accesses or accessing) and (track* or punish* or trap* or fool*).+ Building a better defense against hackers: UIP on likely hackers: develops db=ba (what behaviors to seek)against future (different) hackers. Learns what is more sensitive and sought after by hackers, intern requiring extra defenses. In other words: Access"'anaiyzer" identifying weaknesses in their defenses (so
System(s) can (automatically) repair itself).
Drawing: "Trap" = C ("Booby Traps" appear in below listed parts /below parts are used to beckon hackers / the parts are uip-tailored to beckon hackers) - Access =ARTIST () //
BEHAVIORAL ANALYZER () //
INFRA-RED SENSOR () // KEYS () // LIGHT SENSOR () // MERGE () // MOTION () //
MANEUVER() /I
PS-ZONE () /J REPEAT () // SCIENTIFIC SIGNALS () // SMELLANALYZER () /I SOUND
ANALYZER ()
/I TEL O /I TRANSMITTER O /NISUAL ANALYZER CHANGE ACCESS PROCESS HIDE
ACCESSPROCESS HINT NOTIFIER () f! ORDER & TIMING Q//PROMPT () // SCORE (Accessor made to believe they had a high enough score or "status"). "BA": level of crime or damage conducted by hacker= according to("analyzer")= results in a corresponding level of punishment= to hacker. Mirror: accessor is (partially) allowed to see themselves as access controller sees them. System= next analyzes how accessor changes its behavior / access process. Those changes are more carefully "analyzed" for what accessor might be trying to camouflage about themselves, eg: their bad traits= that system is trying to "track". "Tracking" hacker= after they've been identified:-"Tags" are placed in the material hacker downloads. As this material is moved ("routed") around (their / main system / W W W)="track" follows it= to: others collaborating w/ hacker / hacker's whereabouts / better understand hacker's behavior. "Guides"= "hackers"= into their "designated"= "trap". Morning Alarm: if user turns off system / deactivates alarm * in/on-authorized manner= punishments can include: loss of files /other functions alarm System(s) is tied to. See information on other ways user is punished / motivated= so they get into and stay in a state of wakefulness. "VISUAL ANALYZER" = fingerprints; face; pictures. This part is very related to: Access"'artist", and "image" input for gaining access.+ Eye blinking: pattern of blinking -> codes. Possibly only for unique eyes of each person (iris). Blinks Morse codes. Another example of body movement gaining access. --needed eye color can be achieved by wearing colored contact lenses.+
Accessor must wear/present particular (coordinated) colors for access (entry, usage). Other "artist's" "image" examples: company logo emblazoned on attire; picture ID clipped on shirt. These are examples of needed "images" / visual "coordination" needed for access via va. -see "Artist's" R24-1 Image Coordinating Software-Fingerprints. Also:
Different genetic fingerprints = typed /scanned in; photographs (faces, bar codes, scenery). Lines also from: palm and any other body part. -"Visual Analyzer" for externally shown 3-dimensional objects: U's unique face; any picture or object they = show "camera". Objects might need to be turned / angled up to 360 degrees (at designated speed, such as by putting it on a speed set turntable). -"Visual Analyzer" for images on flat / 3-D surface: -Image generation: ("Printer") prints a different image each time, based on its changing password creation System(s) = images scanned = c= access. --Multiple sources generating password: User might also be asked to make all / part of the image generation, so image's output effected by the symbiotic help of each source. The geometric effect SW (Software) may have on each source's input on each other causes a result nearly incomprehensible from what any one source entered increasing difficulty in identifying each source's input. ---Drawing: each source (c (password generator sw) / u) = enters images/ data / S W(Software) / etc = "analyzer" = c integrates inputted elements -alters according to source(s) / c integrator = final password developed (double checked for accuracy / functionality / security clearances) > password given / printed / stated / tr to other. -Previously generated / used passwords need designated alteration("editing") for subsequent access.
-Images include: bar codes; abstract designs / paintings; single or multicolor; coloring in shades / solid blocks or (tiny) dots as in periodicals' full color printings.R174 Computer ("C") checks person's fingerprint before allowing" access" 2 Aug 93 NK-moved to "access" 6.96R195 Fingerprint operated entry system. 25 Jan 93
NK-moved to "access" 6.962E251 Remote Controlled Camera: (sys monitors people according to their access/uip (code)).5G061 Dyslexia Software: (speed at which info given determinedly ups access: either u gets info faster (inhibits uninitiated computer hackers) / SW (Software) slows down when c/security guards need more time to "analyze" the "access" level of u (who is being questioned (by c); 5G070 Speed Reading
Software)--form in which u sends / receives. Pat search strategy - USPTO Bib disk -6/96: (photo* or finger* or (bar near2 cod) or image* or imaging* or vision* or visual* or pictur* or (bar near2 code)) near9 (access*or accesses* or accessing or password* or verif*) and (computer*or electr* or software*)Accessor= generates image pattem(s)= permit "designated""access". Changeable password elements. "Order & Timing" of: w5 images given. see: + "Visual analyzer", and "Artist" = "VA". Other "artist's" "images" needed for gaining access:. any product of nature with its visual characteristics. System(s) can require characteristic common to the species or scientific category of product, eg: any cat's hand or piece of gold, or be more particular eg: front right paw of specific cat, or 22 carat gold in "designated" shape. Seeks: color, texture, (overall)weight) of objects. Access requirements alter according to reasonable criteria, eg: plants change their condition (dormancy)at certain times of year; hands are colder in winter (eg: for infra-red "sensor"); % since there are no Oak trees in Hawaii, leaves must be flown in and hence will lose some of their color in the interim.
Objects can be placed in certain manner by (non- visual analyzer) "sensor". Examples: -people: any body part. -animals: any body part. -plants: any body part: leaves (their veins, outer shape, color(changes by time of year access sought), branches*-organisms: any type cell or "scientific signal" they generate. -chemicals: needed formulae: percentages of differing chemicals/ (total) quantity of any parts. Access = chemical content"analyzer". "W5" = Access at right time: designated temperature, weather, certain news in mass media, when another "designated" u also has "access". See Accesses "Order & Timing" subset. -Accessor= generates W5 behavioral pattern(s)= permit" designated" "access".
CONCLUDES THIS ACCESS-IMI FILE (Parts)
File: Access \ Ac-Image
File: Ac-Image. Image Input Access System. $$$P 4E-030 Image Input "Access" System:
The user or one who wishes to gain access into a system must make certain pictures to gain access. The accessor must create an image with a computer mouse, or via other means; which must match the diagram in the computer's memory. This image acts like a password.
-The system has a designated tolerance for images that differ from the one in its memory; the accessor may draw the picture in a somewhat different manner each time. This form of tolerance can for example seek a square or triangle of any approximate size. -Thermage permits'access to any privilege described in the "access" part.
Applications include: (de)activate alarm; additional verification of u (user) (person trying to gain access (via matching images / uip-ba (signature analysis N))); slows down u (user) whom sys suspects are hackers / villains; gain access into~: entry way; use of product (c, some el (electronic) sys); use of game; higher levels of usage within sys; banking: electronic funds transfer; gaining access into building or C.
Image types needed for access: -straight lines connected at angles; (u)closed shapes drawn with lines, eg: circles, triangles, squares, rectangles, pentagons, hexagrams, polygrams...; (lines of) dots at designated locations
-the type'image required often will be those for which the system's analyzer can build a reasonable tolerance for differentiation [should such'images be inputted by the accessors hand and not via other means like a picture, thumbprint, etc]. -make similar or related or unique picture, system may give (prompts) ideas for picture, eg: ones which instill the idea of waking up like running to catch bus. -type diagram examples: additional add on elements are made to previous diagrams - to better assist user in remembering needed diagrams; diagrams can be from sets of things such as vehicles (first car, next bus, next airplane), or shapes of provinces or states, or words (middle names of one's family); zig zag lines, eg: spider's web or child's drawings (required length of (straight) lines with certain angles needed at points lines bend / intersect. +-Altering type images / methods / mannerisms needed to gain access, in order to avoid hackers getting a nonchanging password type image or method. Sys determines (from hacker's point of view) haphazardly w5 needed images are changed (according to circumstances). --For Techies: Drawing: User = This N (invention) Sys (what helps in the determination ("analyzer") for type images needed =% type images given (entered); type prompts and or other challenges can be more difficult to hack / crack depending on, eg: circumstances (see Features following) / perceived security risk (type u (user) type application sought by U)) - c (computer) =
ACCESS ; AP (type application of N); A RTIST (if "artist" type N (invention) is connected to main N; ups drawing ability (uip, score)); ba (behavior analyzer) ; CART (entered into sys by u); EDIT (analyzing inputted images by u); EDUC (if sys needs to teach u); K (keyboard) (if only keyboard is available/functioning, then available images are reduced; or entire sys can shut down in this case due to higher security risks); MOUSE & R (remote control) & K (keyboard) & Tilt & Tbandwidth (type mouse being used, its limitations being taken into account); MULTI-USER ; PR (software program)
ROUTER (where on information highway / web u (user) came in from); SCORE (ups previous performance); SPEECH (sound analyzer); STATUS ; tds (time date stamper) (occurrence of past / current activity of u); TILT ; TRACK ;
User (who they are); UIP ; UQ (type questions u asked I errors they made, helps create a perceived security risk of U). +-3D: User may need to enter / create I respond to 3-D images (onto "interactive" "S"). "VR". --user may need to interact with the 3D image, such as knowing where in the 3D maze or terrain the "secret door" or "key" or that day's password is located. ---accessor may need the first password to get into the terrain. ---too many errors in seeking to locate access in this terrain invalidate that user’s first password. -Color: the color shown on S (screen) may change, even though the color code used (via K) is the same.
Purpose: fool hackers sharing information with each other of getting data from their notes which mention which colors are used/needed/responded to / altered W5. -Size: simply change size w (with) (most) other aspects of image remaining the same. -U / Sys may know / suggest when (w5) needed images are to be changed. -Drawing: u (user) = K (keyboard) = visual analyzer = access (analyzer, score (security risk)).
Prompting may simply help u remember nature of desired image, w/o (without) giving all data on the images. , -U knows additional 11 subject matter and or 2] manner in which depicted subject is to be drawn. Eg: prompt states citrus' = u (user) via #1 recalls its an orange (not the tree or leaf), via #2 that the image should be drawn with thin or thick lines (caused by pressure level / manner of stylus/R. (5E020)) and whether the fruit should be filled in with shading / various colors or just the outline to be drawn. -Prompts: For Techies: Drawing: User = This N (invention) Sys (type prompts given u determined via) - c (computer) =
ACCESS ; ANALYZER ; CART (software cartridge) ; EDUC ; mth (mainframe hookup)
MULTI-USER ;
PR (software program) ; PS-Zone ; Q (asks questions) ; SCORE (u previous performance / prompts during previous sessions); %SOUND ANALYZER ; STATUS ; TDS (time of day, length or level of security clearance for designated type access/task); UIP ; VISUAL ANALYZER. -Perhaps only the entity seeking "access" knows what to write (clues/prompts may help a computer hacker). -very similar to 4C210 -compliments other "access" features: ups finger print or eye ball image scanning->c (correlates against memory); cart; password; transmitter worn by u (user) (user) (seeking entrance). -use system to "score" ups behavior/ability: uip; bva (this is part of bva); ups ability for specific tasks, roughly replicating any existing psychological/*sociological testing system (on paper) which studies ups behavior; "visual analyzer". --done via help of "visual analyzer" (of images made by u to gain access, or during work session on C), "uip-D 1: u=(stylus/finger)=s (touch screen)=c-access = osc/printer/m/cart -copied to better N (invention) file 1.95 -ForTechies: access; "morning": deactivates alarm upon ups correct input (level of similarity controlled by pr).
-uses any existing electronic "analyzers" which analyze human signatures / images. Also see listed patent numbers. US Patent office is working on a visual analyzing system for their patent database.
PATENTS: -Patent search strategy: #1: securit* and (signature* or draw or draws or drawing or (image* near5 creat*)). #2: (security or (gain adj access) and password*
KW: access -US Patent Numbers: 5319797 5222138 4903991 4908861 4991205 + 5111512 Method for signature verification - 1992 patent. Access is given with correct signature. 4850018 4869946 4758718 4799258 4816653 4851937 4876717 4326098 4023139 -especially patents listed / related to "visual analyzer" and "access"; and to some degree "ba" versus patents of other Features for this KN.
Claims include: helps solve the problem that peoples signatures are often commonly available. -the needed diagrams can change over time and or after designated number of usages. + Generating images via: "C" "mouse"; 5E020; c (computer) input tablet using stylus or finger or other stick; "Artist"; R; % "Sound to Visual Converter"; manner in which one walks about near the motion "sensor" "access". -UIP / BA: these are also used in determining whether access is permitted. Sys "analyzes" past and current images generated by User and studies them via U1P-BA or U S Pat No 5111512 in judging how close / dissimilar the recently entered images / signals are from needed criterion. + "Artist": all the (existing) diverse ways one can input / alter / "edit" the images / drawings, which were generated / started by person (u, one seeking "access") or sys (via its prompts) can be utilized. -Additional examples: -Patent search for this "artist" sub-section: (artist* or draw* or (creat* near3 image*) or (creat* near3 picture*)). KW: create can be replaced w: alter, design, edit, make, develop)
For Techies: Drawing: User = This N (invention) Sys ("Access" gained / effected / "analyzed" based on functions for any of following) -- c (computer) -IJ010 Body Movement NR:
-3E150 PS-Zone: -3G010 T (tel) Ring Delayer: ("analyzes" w5 u (user) answers the tel, eg: if u is often not answering for some time, then maybe u is somewhere too far from where they should be, or is busy w (with) something else, or is poor employee (lazy)) -4E010 Alternator: (sys must have designated level of) -5E020 Remote Control Stick: (generates images, eg: abstract versions of
C=stylus) -5G061 Dyslexia SW: -7G050 PVC Notifiers: (presence of certain chemicals (also) needed for "access") 7G052 Flexed Level Notifier:
For'1'echies: Drawing: User / Other Sys = This N Sys (Access: (Type) input to gain access) - c (computer) 173
PS - R (remote control) - Tilt:
Remote Control
Access
Exercise
Analyzers
Indicators -Sensors: hazards, novelties, monitoring of events: designated chemical needs to be: inserted, / placed into/onto sys; causing nr (notifier) to change. 3E152 Positional Image Generator: Changes in position of moving objects are registered by system which intern generates an image or "track" for said changes -> when such images match "access's" criteria, "access" is granted. In other words their pattern of movement via zones / tilt generates a pattern as perceived by "sensor" -> C. Moving or stationary images are generated by location of elements in subject that can generate signals in "Visual Analyzer". -position of each element generated by: 1] light / color / heat generated from portion / all of targeted object. / 2] tr (transmits) (transmitters (on surface / appendages / inside) targeted object. / 3] "distancer". / 4] locator:
KN (invention) finds objects. -Drawing: signals coming from (moving/stationary) object(s) = "analyzer" = image generator / "track" (score, intelligent monitor 2E25 1, uip-db development). -this part is similar to many other sub-Features.
Password/"score" needed so= image generation is in= desired color= to gain access. -1 C310 Software Multi-color Adventure Pen: The device decides when to change color into another matching color. In pen or software format.
US Patent Search Str: (access or accesses or accessing) and/adj15 ((gain adj9 access*) or enter* or password secur* or protect or authoriz* -US Patents: 5491752 Increases difficulty of password guessing attacks. --Pat search str: Worked w/ US Pat Database ' Bib' 4.96 Disk.
Encrypted: encrypted with state of the art. -ups activities: access processes, files, etc. -password systems / pr, or the fact that one exists. -Miscellaneous: "Track", "Score", "UIP" (uip-db) -password itself encrypted = and only decrypted by access point's "analyzer" = to determine if access permitted.
+ See "Artist" image generating modes: any of these can create the necessary image(s) / processes to gain "access".
US Pat 5486122 Autonomous wearable computing device and method of artistic expression using "game":
Educational devices using process-oriented educational methods are disclosed to prepare children for keyboarding. The device include sets of gloves and indicia applied to fingers of gloves to provide pictorial representations of the keyboard.
Accessor selects "images" that are "edited" as "designated"; or "edits" them= then gains "access". -Same "edited" form can't be used more than twice in a row. ='images" undergo ongoing "editing"= accessor needs to know at which point in the evolutionary process= access is viable.
Hypervideo (exists): users click on (moving) images/'icons, and get routed video clips / information (tailored to their needs). Object Tracking software (exists) make (moving) images clickable. --Access applications: user must know in what chain or border & timing, in which they need to click images, as [they] reroute themselves in the program to gain access. Clickable images can change [in tailored fashion], eg: user only clicks on what they recognize, eg: faces of people / objects they are [intimately] familiar with, or which have some [semi]-logical reason to be clicked on, eg: story line [based on user’s Xba].
END File: Ac-Image
File: Access \ Ac-Pat Sch&
ACCESS PATENTS AND PATENT SEARCHES
Key words for patent search strategies: access*, computer*, entry, (gain* or keyless) adj3 (access* or entry), password*, interactiv* -toy*, fun, play*, child*, kid*, image*, imaging, create, creating -str: (achiev* or obtain* or accomplish* or get [or gets or getting] or gain* or keyless) adj3 (access* or entry) -str: password* and (access* or entry) -str: security* and access* -str: (draw* or create or creating) adj9 (access or accessing) -US Patent 5368308: Stream of recorded sounds broken into segments then reordered = needed to gain "access".
12.95 Bib Disk US Patents = Access: Search strategy on USPTO's Bibliography CD dated 9.94: password many related N, only scanned the list, eg: 5323465 Access control; 5289540
Computer file protection system;
5276314 Identity verification system resistant to compromise by observation of it use; 5206905; 5115508; 5111185%; 5097506. -US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry system into car 5319364 507402 ="c" 5450524 5206905
Improvement on patents:
Sub-Parts: -Access-Restrict: Different u have differing levels of access to full range of inforrnation / functions =(based on their password). -Access-Track: follows target upon entering (mode) (until which time the one accessing is deemed a low security risk. -Imi Part'Burglar, is subset of'Access.
Pat search str: password* US Pat Numbers about sys generating passwords (pat search str: password adj15 generat*): 5513263 5509070 5491752 5469564 +5442342 5428349 5416840 5365574 -+ Main at search strategy for all of "Access": (access* or accesses* or accessing or password* or verifl") and (computer* or electr* or software*)
File: Access \ Ac-Pa
ACCESS PATENTS AND PATENT SEARCHES -kw (key words for search): access*, computer*, entry, (gain* or keyless) adj3 (access* or entry), password*, interactiv* --toy*, fun, play*, child*, kid*, image*, imaging, create, creating -str: (achiev* or obtain* or accomplish* or get [or gets or getting1 or gain* or keyless) adj3 (access* or entry) -str: password* and (access* or entry) -str: security* and access* -str: (draw* or create or creating) adj9 (access or accessing) -US Patent 5368308: Stream of recorded sounds broken into segments then reordered = needed to gain "access". 12.95 Bib Disk US Patents = Access: -Search strategy on USPTO's Bibliography CD dated 9.94: password - many related N, only scanned the list, eg: 5323465 Access control; 5289540 Computer file protection system; 5276314
Identity verification system resistant to compromise by observation of it use; 5206905; 5115508; 5111185%;
-US Patents: 5420925 5418842 5396609 5373557 5345579 Passive keyless entry system into car 5319364 507402 = "c" 5450524 5206905
Improvement on patents:
Sub-Features: Access-Restrict: Different u(user) have differing levels of access to full range of information / functions =(based on their password). * Access-Track: follows target upon entering (mode) (until which time the one accessing is deemed a low security risk. lmt Part'Burglar, is subset of'Access.
Pat search str: password* -US PatNumbers about sys generating passwords (pat search str: password adj15 generat*): 5513263 5509070 5491752 5469564 +5442342 5428349 5416840 5365574 + Main at search strategy for all of "Access": (access* or accesses* or accessing or password* or verif*) and (computer* or electr* or soft.ware*)
File: Access \ Ac&
ACCESS' Miscellaneous information: File k\ac&
Miscellaneous forms of actions permitting "access": -Forms of motion by U. See KN's Yamaha Miburi and related KN. -Form of User causing "vibration". -Way something is assembled or taken apart: 3A205 Tamperer Alert. Rubrics cube. -Motion access procedures: Correct movement of hand or joystick. Motion type 41 -> motion type #2.... -> access. See KN's Miburi from Yamaha and related KN. -Vibration Sensor: Senses vibration, eg: if person is walking or sitting on sensor; or senses vibration signals coming from elsewhere.
Miscellaneous: includes known (c) systems which restrict "access" of people / other systems to: use, work w (with) particular el (electronic) N.
General Diagram for "Access":
D 1: 1 UK (user at keyboard) = 2 C(computer) = 3 tr (transmits) = 4 M/5 function. D 1's For Techies:
Details+1: Passwording: gain access via keying in alpha-numeric combination; key insertion; via remote ("R", password tr (transmits) from R); fingerprints, passwords, key cards, uip, another C(computer) (their sw), clap* 25: access can be changed via pp, mp, cart, u (user) with higher (overriding access, eg: supervisor, C (computer) sys itself); character; 24 tds (time date stamper) (scores w5: when, *how, *what, o0owhy, who gained "access" into system - [may also be used for uip [database], 4E020
Content & Date Verifier); 25 "S"; 23 %distancer activates/deactivates lock; 123 access lock can be a physical (lock & key) / (programmable C (computer) chip) card key / software barrier = (who can "access" 4E020
Content & Date Verifier / 2E251
Intelligent Monitor); 245 "C", 4E020 Content 8a Date Verifier, 2E251
Intelligent Monitor; 245 %interactive (activates/deactivates access, 2E251). 13: signals for activation/deactivation of access can be received and or activated via: microphone ("mic") (sound signals activate/deactivate access/2E251); tel ("T"); mo; tr; %fs (correct image eg: signature); remote 2: *tilt (2E251 activated by N's movement); *distancer (eg: clapper); 245 mp; 24 mq (machine asks user questions) (prior to activation/deactivation; for uip database upgrade); 24 multi-user (individual requires own password or other activator/deactivator to gain access); 245* notifier (who, what, when, %where, why gained access, and or is using system); 25 OSC (outgoing sound communicator) (if password or other activator / deactivator effected desired function, eg: gained access); 24 * uip (access draws on pi's database to mq (machine asks user questions) prior to allowing user access to user; 24 questions for access change according to user’s uip (mq an action user made on system in one of [important] previous activities); 24 pp; 24%score 2 the necessity for the access feature is normally trivial, but assists in marketing, and helps organize differences between multi-user; uip.
I the type code used in the password (a series of sounds, lights, letter or number combinations, etc) activates and or deactivates the corresponding function reserved for individuals equipped with the password. 24tds of user’s past access is used develop his uip. Excessive or insufficient usage can exclude him the uses from some/all functions, trigger "notifier", and inform the user’s supervisor via tel ("T"), mo, e-mail. 24 the type of uq can consequently (according to system's uip, mp, pp) affect/control the type of password/manner needed to activate/deactivate; 5 speaker.
For Techies: drawing This invention Part (Access) _ -E020 Remote Control Stick with Switch: (functions of any R (remote control) controlled by access/uip) -5E080 System self analyzes best synthesis for acoustics of room/hall: (matches uip/access of u; u (user) may not hear/read certain OSC (outgoing sound communicator) (sounds/data)) -5E090 Wireless Music Band: (access limits usage of certain portable el (electronic) N) -7G050 & 7G051 PVC Perforation Alerter & 7G052 Flexed Level Notifier: (type access determines: type of pvc needed (for extra/less protection: to save money/trouble); which types of occurrences (chemical contact, perforations) need nr (notifier) to u/sys/monitor) "ACCESS": (4E030 Image Input Access Sys):
For Techies: D: User = This invention Sys (access: such actions (gain) "access") - C(computer) -1J010 Body MovementNR; Yamaha Miburi. -1J080 Ice NR: 7G (colors must change) = visual analyzer (c) = access -2E010 20 30 40 50 Recipe Softwares: u (user) must request / read via sw (software) certain recipes =(track) _ gains access -3E010 Mobile Tel Location Notifier: nr (notifier) functions only for those w (with) "access"; u must be in designated zone (at certain radius) prior to "access"
-3E020 GPS Record Keeper: -3 E 150 "PS-Zone": -3E210 Indoor GPS Extender:
-4E030 Image Input Access Sys: -5E020 Magic Wand: KN -3G010 Tel Ring Delayer: KN -3E060 Interactive Morning Alarm: KN: answer / ask right Q (asks questions) = access -3E061 Body Motion Instructor: "educ" teaches u (user) how to move = future access. -4E020 Registrar: uip of u (user) must match db (database) = then access -5G061 Dyslexia SW: "edit" changes according to ups type access -5G070 Speed Reading SW: ups reading speed must match = speed designated by = access.
See around analyzer for: R54-1 Voice Recognizer Differentiates Between
Multiple Speakers ACCESS = Passing of tests scored for level of accuracy. -Forms of access: Access is achieved when the system receives the right electronic signals such as: in the correct border & timing, and duration of correct signal types. --License: having a proper license for which royalties paid are up to date.
Not exceeding the terms (limits) of the license, per the license.agreement. License rights include: geographical territories (azones); usage of designated Features, functions, and inventions; time periods; licensee's proper behavior (as observed by tracker and behavior analyzer). More details of our license agreement on our posted website, or *those commonly used for intellectual property. frequency signals from: remote control device. -other correct human or machine generated actions: that can be picked up electronically by sensors for: --sound (of user’s or animal's or device's unique voice or sound). Differing sounds from such sources permit differing types of access. --visual images (for finger prints, eye's retina, other body elements). Images studied by visual analyzer. --temperature: of human appendage such as finger or palm, or other [heated or cooled] device, or room temperature w/in designated range. i
Changing Access Levels Granted to:Users: -analyzer: stops access upon suspicious activity. Eg: computer hacking - attempted access into files or functions for which system has not offered access, score and 'uip alter access level, when (behavior patterns) of user are in/out of designated (behavioral) patterns. -Access granted to all or portions of functions available: W5: each multiuser has own time frame (TDS) to gain access. Differing desired functions can have their own access time/type parameters. -forms of access can periodically be fully or partially changed.
Differing scores: The type of  score achieved functions as the gateway to designated functions associated with such  score. -What type scores offer: Time length of access, or quality of function.
Higher scores can activate more or fewer functions. Differing. scores can activate designated functions with no one possible  score allowing access to accessible functions.
Notifier activated if system gives a high  score chance that accessor is illegitimate. _* Diagram: user = access = computer = results for user --"Explicit Knowledge": Documented info accessible at any time by anyone with or without a password". This is left available as system in programmed. -From *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
End of File: Ac&
File: Adapt / Intro & Tailor INTRODUCTION - ADAPTING INVENTIONS TO PERCIEVED NEEDS
Also Called - User Information Programming
Adapt Table Of Contents For Multiple Files
Introduction & Tailor
Adaptive Inventions tli!r!=. i:,{:.=.
Sub Parts r =
Expand
Link
Article
Patents
Code Sequences for software & DNA
Other Adaptations * I
Learn that it is quicker and easier to license from us, than trying to circumvent this revolutionary patent application. This application has so many ways of adapting. Call (+1) 707-428www.LicenseItToday.com.
Adaptation tailors a system's features for the unique needs of specific users.
The entire patent application shows examples'andirelated information.
ADAPT = User Information Programming TM. Also called Tailoring TM, or Adapting adapt adapts the system to the situation. A common example is how it tailors itself to the user’s unique needs.
System uses stored information about the user, which it then customizes its functions. Improves product performance. In other words; it self optimizes its functions, to tailor itself to the situation at hand. It is often an inventions optional bonus feature. adapt is a central theme found in our inventions! -adapt is a form of adaptive Interface: The electronic interface automatically and dynamically adapts to the needs and competence of the user: -Adaptive functions include how adapt can: acclimate, accommodate, accustom, alter, change, comply, conform, revise / harmonize / familiarize with user’s needs, tailor, attune, coordinate and integrate matters for user’s greater benefit, adjust, collect and adopt info about what's to be tailored. -Includes: Player Information Programming TM and Player Modeling TM for video games.
Adaptation Process Is Open Minded:
The 100,000+ invention variations made it able satisfy a wider range of needs than nearly all other related patent applications.
Ties with main inventor's conceiving 1987's best selling book "Closing of the
American iviind" about higher academia stifles creative thinking. Despite the fact that this may historically be the world's largest patent application with extensive support for its claims, we expect to be challenged by the patent system, just like the main inventor was at some of the world's top universities.
A more polished and refined version of this application is coming forth.
The work stems from top inventors including our Eastem Europe's largest known electronic research program in 1990's, plus his research into methods for increasing peoples creative intelligence.
Tailor / UIP-Tailor
This Patent Application Gives Thousands Of Examples For Tailor
System tailors its functions to the unique needs of specific users. Each user can have their unique profile stored in UIP-Database, which includes their: needs, preferences, and behavioral traits. Tailor then matches the database, with a menu of function choices.
Integrates and Often Overlaps These Part Functions: Edit, Educate, EGH (Educ Gets Harder), 'Guide,
Interact, Predict, Seek & React, IGH (Therapy Gets Harder), UIP-Emergence (2G180), UIP Tailor.
Tailor titled UIP-Tailor, as it's a subset of'UIP. -tailors sys for "designated" users. Matches characteristics of user’s db= w characteristics db covering all/some of sys [abilities of sys]. Sys / U* "analyzes" for best ways to tailor sys for u = then selects best/better options = u may select better options and brainstorm further on subject w sys / sys automatically implements its tailoring (wo "editing" from u / other sys). Extensive examples in KN files. -Access' BA also selects what asers want: access=ba can "seek" / "edit" information for accessor. This is a form of UIPTailor. Saves user’s time. --also uses internet's sw that "seeks" "designated" news / other material that appears later on W W W. --BA knows what accessor wants to "experience" W5 = uip-tailor. --See: "artist's" "cut & paste"; "edit"; "seek"; key word "seeking"; "uiptailor". + "Predict" which is a subset of
UIP-Tailor. "Guide": "Game's" "Guide" which guides player according to player's UIP-DB. -See File 2E - Idea Generation Software in directory "I" - effective pre
Edit or Tailor alters how sections of computer code are Searched &
Replaced.
Tailor-Simultaneous: Time related [and tailored] events [if not simultaneous] and how they can be tailored. Each function/benefit being tailored can take into account the traits for traits from the other elements [being tailored]. [Don't] create [some/much] synergy between each [tailorable] trait.
Examples: -Effects in Entertainment, frames, Etc: Simultaneously tailored effects reflect the traits of the other effects.
E.G. While opening a shipped invention in a wooden case, smell some fresh wood while hearing the box cranked open. The toy robot popping out interacts with the box as it makes the rest of the way out, like the traits of a butterfly coming free from its cocoon. A/V effects from car races. Mother's A/V reaction to baby crying or wetting diapers. See 'Game Parts section for Effects.
-Multi-Users: Functions benefiting one multi-user, can be compromised to help others: Features [[address the lowest common denominator (for 80%)] of the users (so they can better understand [and be educated]). -Environment: it reflects mood of entertainment. -it causes reactions: Ambient light or darkness having an effect on reaction from virtual objects.
File: Adapt / Adapt Inventions
ADAPTIVE INVENTIONS
OPTIONAL WAYS FOR USING ADAPTATION IN OUR INVENTIONS. * 5A810* Advisor: compiles user’s information: birth date and time (astrology); takes picture of palm (or asks user to identify type lines they have on palm or computer); taro cards (more optional). * For the hobbyists into Numerology: numerology (takes the important numbers in person's life, eg: drivers license number, "T" numbers, address number, etc and sees the significance in them, eg: "8" means strength and "1 " or "10" mean beginning. All the numbers in a tel number are added together, then the multiple digit final number is treated like a multiple digit numbers whereby all the digits are again added together, for example - tel number 222-2222 = 14 = 5) Numerology has been popular with mankind since ancient times. -device can be in non-vending type machine too, for home use: people can consult it each day for decision making. -marketing: the(simultaneous) use of multiple measuring systems (analyzing user info) could be argued in advertising as being more efficient. -system can give equal weight to each method of predicting future and analyzing person's current and past situation(s). And or, user or manufacturer may give greater weight to some modes than others. Naturally, system must learn to compensate for times one method gives conflicting/opposite advice/'predictions/'guiding/suggestions of another 'analyzer/user (info programming) - but in such cases, system might simply give no comment on area the two methods analyzed. * Voice Recognizing Vending Machine:
Function #1: user states/'keys in what and or how [w5] they want something provided, eg: temperature of food or beverage served
Function #2: recognizes particular person using device, and [doesn let others it doesn recognize use the machine] adapts accordingly.
Other: Also for vending machines. *4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" / "analyzes" occurrences (for uip (db improvement), intelligent monitor 2E251) "Entertainment" / Program (sw) Screener: 9G-220: sys screens/selects (such/designated unwanted/wanted o ccurren c es/m o d es%/program s%)
Guides / *'Educates users [for how to improve their 'game skills/functions!'scores].
R53 Computer Tailoring: Computer interacts with users at a level corresponding to their level of computer expertise. ['egh]. System also adjusts by: adapting to strengths/weakness/interests in different subjects/type of computer applications [it deems user is more interested in].
Users select from [three] different levels of operating instructions. Relates to products from Fujitsu Ltd, 10601, Marunouchi, Chiyoda-ku, Tokyo 100 03-3216-3211 NK] -uses R52, eg: R52-1 + UIP access **:(); artist *:(); camera:(); cart *:(); composition *:(); entertain:(); "m":(); morning **:(); multi-user*:(); notifier:(); osc:(); pr:(); printer *:(); ps:(); q*:(); r:(); s:(); score:(tds); synth:(); tel:(tr); uip:(); wa:(). -any el kn sys ="interacts" w/ = according to ups level of expertise (in using product / field of knowledge, eg: medicine, art, other application for product). tailors 'game/'game entities skills to 'game [main] entity's skills.
R122 (User) Error Prediction: Compares database -Computer ("C") predicts human error. [Studies user’s UIP first.] 15B:
Computerized typewriter gives verbal warnings when user is about to erase something from memory. [ Related to: 15A:
Central Research Institute of
Electric Power Industry, 30 Sept 92 YD; 15B* Toshiba 7 Feb 93 YD]
For Techies: ACCESS **:(); loARTIST:(); CAMERA:("visual analyzer" (notifies) unusual movements)/studies movement behavior for UIP; CART *:O; CLAP:O; loCOMPOSITION *:O; Display ("S"):O; "M":O; MOI2NING *:O; PD:(develop uip); PP/MP:O; MQ/UQ *:O; MULTIUSER*:(user/observer (analyzing for other's potential mishaps)); NOTIFIER:(); OSC:(); PRINTER *:();
REMOTE ("R"):O;
SCORE:(); TDS *:(); TEL:(); UIP *:(); UK:(); WA:(). -used also in: heuristic [A.I.] [predictions] analysis. scores chances of error in how predictor may be wrong [in how Salgame entity will act/be weak]. * A9-01 AFTER LIFE SOFTWARE: Entertainment.
Before a person dies, they can deeply analyze themselves in terms of how they would respond to their children's, spouses, former employees, etc questions. The intelligent computer will be able to make rough estimates as to how the person might have answered. o has a clock in which the person being copied can leave certain statements, reminders (eg: take care of your health, stop drinking too much, keep studying, etc), new aspects to their will, etc. Keeps user plugged in and curious. o rich people would be willing to put their money into this because: they can't take their money with them, want to leave an impression (the desire in most of us), want to care for their loved ones, its novel, its the next best thing to being with the loved one after death. -More details in IM125 file. 3J010: Tailored Reading: Suggested information is given to User (user) in forms of: world wide web / internet / America On-line / Compuserve / cable entertainment and or information (Viacom [company]). 3J020: Ads / Descriptions / Behaviors / Communications of User (user) are analyzed and sys matches
User (user) with what Sys thinks User (user) (may) want: (Classified) Ad insertions made by User (user) = analyzed = sys suggests one of following which matches User: -existing services / companies -direct mail lists; contacts who may buy and or use services / products offered by U.
-shows competing ads (from other companies) -D: compares ("analyzes") key words of User (user) (its ads / co / product / service descriptions) w/ adslservices/co descriptions (in db / business directory / on-line services). -can focus (only) on material that is "registered" (KN) -Sys finds specialists for activities U (user) is engaged in and for which U (user) may be less qualified. Sys studies work history / test "scores" of employees from U (user) and = matches with curriculum vitae of others outside U's company. Sys "scores" importance of function and if its worth bother of getting outside expertise.
Sys offers contact information on outside experts. Sys might be offered free by service / sw company (that makes money only on experts utilized). This serves as a back-up for management who knows their employees may be too afraid to hire outside experts in the event that the outsiders are better and can take away jobs from insiders. 3J030: Targeting Ads:
UIP of audience compiled = then ads only go to those w/in designated UIP guideline. -Mediums: on-line, WWW, printed publications, cable entertainment (television ads). -"Access" of different viewers using same/*similar system can be different intern, ads targeted will differ. "Access" code may come from the password to activate sys (cable tv / on-line) and or remote control device and or UIP generated by sys w5 (when, how) U (user) accesses program / sys. -Similar systems are probably known. 3J040: Life Form Matcher:
Characteristics of environment are matched with the ideal growing conditions of each plant or other organism in the database. Environment's characteristics are inputted by U (user) (from known information) / sys analyzes characteristics.
-(Plant) Characteristics of environment include: (average) daily temperature fluctuations / humidity precipitation / soil moisture (retention) I type soil (nutrients, problematic elements, eg: poor Ph, undesirable chemicals) / air or water pollution / light levels / depth of soil / common (insects / bacterial / virai pests) / (legal availability of) insecticides / etc . Covers each minute of year. -D: uip of plant db = matched w/ = uip of location = "score" shows how well matches are made = a percentage of 0% to highest score of 100% is shown / chart / bar graph / printed explanations. -shows ideal age of p lants for moving / transplanting. -any (other) life form can replace plant, eg: animals, insects, microorganisms. In which case other functions are (also important): cages I food needed or given. -Cost versus benefit "analyzer": benefit and cost value proportions for different types of foods given / how valuable the life form is (to reduce costs, cutting corners which can be poor for plant or other life form, might be worth it). -how to maximize productivity: harvesting of plants or organisms or maximizing (healthy) reproduction (offspring). 3J050: Life Form Doctor: Adjustment Suggester:
-related to Life Form Matcher - above KN. -when organisms are already in the environment / U (user) wants designated organisms = sys suggests how environment can be altered to improve growth or health. -"analyzes" solutions to illnesses / diseases that have or may hit organisms.
Eg: stopping epidemic; software doctor. -suggested activities for organism: exercises for unhealthy humans or mammals; changed diet; medication; temperature; light levels; other therapies. --(disease's / situation's / environments) characteristics = analyzed /k = uip = suggestions. --uses related / KN '(medical) diagnosis' / "analyzing" systems (sw). -sys "tracks" changes in organism / environment = "nr" / makes suggestions (on needed changes (from earlier suggestions, eg: more medication, chemicals, light)). + 3J060: Formula Adjuster: System adjusts formulas based on User Information
Programming.
Applications include: food recipes, clothing styles for (human) clothing tailors. (residential) architecture, etc.
Applications: -Recipes: System can also adjust for multiple people, by picking food formulas that can best average most peoples tastes. Non essential ingredients area adjusted, eg: for omlettes there can be more or less cheese, but the egg isn't adjusted. --Food provider matches U (user) with other db (via Dialog (co)) that helps food provider determine uip on u. -Pizza Delivery: if user previously ordered pepperoni on pizza, and next they want sausage instead, chances are
U (user) prefers the spicier variety of sausage and or other pizza ingredients (eg: more red pepper, oregano, pepper....). Or, U (user) fills out uip type of questionnaire. Questions include: favorite ingredients, foods, questions in other (UIP) KN. Large tour groups can have their people fill out questionnaires = future food providers provide (ala cartons) targeting average tastes of group's UIP. -Restaurant Guide Company's Service: U (user) (customers) fill out questionnaire. SW matches = U (user) w/ restaurant's whose ingredient / style (ambiance, type furnishings) UIP matches = U. Or, the middle-man restaurant guide company = suggests how restaurant alter recipe / menu for
U(user)== via U's "access" (card number U (user) shows when ordering). -KN uses "CID" - Caller ID to know what pizza User previously ordered (Exists). Other functions are improvement of this. -Region of client calling in (known by first three digits of local tel number) shows up on caller ID; then system determines regional tastes and or lifestyles. -Image' based software systems (which tailor color matching for the user, such as suggested home decoration colors, fabrics and furniture designs.
System is a form of UIP Database collection/tailoring. Diagram: UIP of User (customer) = used by sys to suggest = alterations to (main) menu's recipe. + 3J070: Sound Adjuster: KN? See music or SA file.
Each musical piece to be played has UiP "score" which can be matched with the
UIP of desired mood.
Examples:
I] co stock going up, so build on the momentum and play Tsaichovsky's 1812 overture. 2] It's Friday and employees are less serious, so play classical versus pop music. 3] People are semi-brain dead, so play Bach which is cerebral and creatively more inspiring (according to questionnaires - see KN). -Applications: office background music; music while people are on telephone hold; public areas: train stations, restaurants, hotel lobby's or rooms. -D: UIP of situation (system "analyzes" / person k data in) = UIP of situation/environment determined = C matches UIP of situation w/ UIP of Music (from music db) = controller = selects wh ich (pre-recorded / to be composed (see KN composition N) musical pieces are played and in what order (order has effect as any Disk
Jockey knows = this effect matches UIP-targeted objective) = "stereo" / osc. %-selected visual images (also) displayed on "S" = match U's UIP. See KN. %suggested attire worn by employees match = designated situation: customers / type work (hazards, 7G KN). 3J080: UIP Time Correlator:
Matches which occurrences (emanating from U's sys, w5) get greater (desired) effects and when. In tern sys adjusts itself by putting out more of the elements (applications, functions, effects, results, information, osc) during the better times.
Applications: -when to play designated music / show designated visuals on S. Above KN.
Example: when which music has greater effect on productivity (as measured by average typing speeds of all employees hooded into M). -when to place which ads to targeted audiences. Above KN. +3J090: Personality Profile Matching:
Sys gives each user tasks and or questions. Based upon response, system gets better understanding of each user/'game player/'entity than more standardized (multiple choice) questions.
Things measured: -creativity (see KN paper "Inter-cultural Engineering"). -manner of expressing oneself: -temperament: anger; stress level (how much stimuli a person can take / likes) -> resulting in one of many possible behavioral reactions (such as how User will predictably act / react in designated circumstances). -see: "score"; UIP -percent of time User spends doing different tasks (especially those that are connected to an electronic "tracking" sys), eg: cruising info highway for girls; data processing; computer games; sending / reading electronically transmitted letters / data; financial. -uses any current / future (electronic / sw) behavioral analyzing system / process. -human controller of sys k what they desire from sys = sys decides what needs to be measured to achieve this goal = sys determines what data is needed (via human or M psychologist) / gets data via any means (UIP, M) _
UIP-Analyzer = output: suggestions
Applications: -how User is predicted to act / react in designated circumstances. -developing UIP in sys to better interface w/ u. -suggesting how one person can better communicate with / work with / sell to / teach: designated User / customers / (work) associates / students. -becomes a db (database) for UIP. -see UIP; *pr; KN (using UIP); other 3J file UIP SW inventions -dating service -matching User (job prospects) with new work openings / tasks: getting those who can do the job best; matching skills and personal needs/characteristics of person with task/job -avoid problems: poor matches of people; reducing risks (not allowing people w/ poor skills or behavioral patterns to (take on risky tasks, eg: chemical handling, make important business decisions if they appear to be drug addicts or emotionally unstable, air pilot selection). -sw for increasing creativity: see KN's Inter Cultural Engineering paper. -conflict resolution: sys suggests how to better speak with antagonists; how to present constructive proposals, eg: should it be more emotional or intellectual, or is there a greater need for trust in one or more of the parties.
UIP - how its developed: -"scores" are developed per User / group of users (company / dept) / task /(geographical) region / interest / application (of program or data) ="analyzer" = output. -see UIP
How SW responds: -it thinks of all the possible results for each action proposed by the sw, eg: like computerized chess games with
Gary Kasparov fighting IBM's computer in Feb 1996. 4J030 Experience your future personality: System studies your current personality and guesses/'predicts approximately what they/'game players will be like in the future. UIP, BA, SW. -hear what you'1l sound like -visualize what youth look like -understand how your personality will change -guess how others will respond to you differently according to how you change and the world changes -guess how youth be living your life differently. Considers: living at home (appliances, chores, entertainment); "interacting" (electronically) with = family; work (electronic modernization, automization); etc. -D: +db (uip, data compiled from experts in predicting future (worldly) changes) / sa / tds (tracks how User changes over time - during / before User started using sys) / "visual analyzer" / analyzer+= c-osc = u.
Database of worldly known knowledge available firom specialists for understanding User now and estimating likely corresponding changes:
--Voice & Visual appearance (face, body) / Behavior of U: physical and behavioral doctors and audiologists are used to create db; there consulted for how mankind (of designated existing behavioral / medical / genetic / family characteristics; ba) change over time. "track". --Where world is headed. + Future products/inventions: see KN+. Futurologists also consulted for current and future characteristics (*ba, *analyzer) in int'1: economics, business, politics, laws, culture, family relationships, etc. -How sw thinks: Different db = are compared ("analyzed") = w/ User (their uipdb). -> This in tern creates a set of parameters (how User is expected to be in future). -> Next: How world will react to the changing User / How
User will react to changing world. [In other words: S W"analyzes" concurrently how different changing factors influence each other, and how they are effected in tern effects how they effect other elements. This is sw algorithm] -Example: John's a United Parcel Service delivery man in year #1. By year #10 hell use his back less due to estimated future technological changes (people deliver fewer products / automization of delivery), hence less likely hell suffer from back aches and live longer due to his more positive outlook on life. Due to John's other characteristics (his inventiveness as measured by "ba's",personality/creativity test) hell in future have more energy to invent new ideas (rather than be tired from exhaustive work, draining his creative thinking ability). In tern John will desire to buy more new products for his home, and or then get a new job dealing with a more creative sphere (eg: advertising (John has right personality for this). John likely to get married and have 2.5 kids (2.1 of which will go to college in the same country), 1.2 of which will stay within 100 km of John's home when
John is 65 years old... John has less stress (than 80% of others in year #20 because he's more adaptive to technological progress in society, this giving him a better income (bigger house, more products, less into family values...)... -Idea generation sw used. Including, KN: 2E0I 0 2E020 2E030 2E040 2E050, "analyzer".
Patents: 5410634 Self-optimizing method and machine.
See 7,107 Shopping assistance: suggests what user may want to buy. A shopping agent. Useful on places like EBay.com and Amazon.com
Keeping personal identity confidential: UIP's database can have restricted access (only for the user).
Some portions of the UIP can be made public, eg: for a search engine or remotely related (marketing / info matching) system. User's accessing public/private networks/search engines can designate certain sections/files of their UIP database for (limited) public use (as applicable to the needed function).
Tailoring Pop Up Interfaces: the type and manner of pop up relates to uip.
Software interface matches user’s needs.
Following Developed While Focusing On Game Aspect Inventions:
Paste Then Tailor: Build up UIP-Database by pasting from other sources what one finds.
Find digitized/digitizable material, then copy and paste into UIP-Database.
UserJSystem searches/'seeks elements that [don't] appeal to them/others/'designated applications. Seeking can be for UIP [narrow parameters] types of: colors, objects, inventions, people, terrains, events [historically based] [and their video clips]. seek can find what's liked via any searchable method: browsers [google.com] how they are today and tomorrow; Rimage and audio searches via studio recognizer and visual recognizer. -Applications: UIP for one or multiple entities; creating a menu for data one/system can select from when in
UIP-Input mode; %creating audio/visual stories from assembled pieces.
File: Adapt / Adapt Sub Parts
ADAPT'S FEATURES
Sub-Features For Adapt With Specific Benefits
UIP-BA / Behavior Analyzer: Studies the behavior of users. System reacts accordingly. Concludes with a behavior profile of target, then can reacts accordingly. UIP-BA or BA can also be synonymous with UIP [in other words, interchange BA for UIP often is OK]. -Behavior Analyzer reacts to situation: --System adapts to user / their mood'. Different'moods of user (help influence) result in different command codes in controlling system. --tailors itself to user’s behavior. --System determines the behavior /'mood of speaker, then reacts designated. The behavior of the user= is determined via therearound analyzer. Different behaviors result in differing reactions. -saves time for human or less efficient computer studying. -can process much in given time -occurs automatically -U / customer can over-ride sw; and or reprogram UIP sw -sw also operates on any (common) foundations, eg: Windows 95, windows, DOS,
Unisys, MAC, others and their future versions. + UIP-DB: Database system compiles the needed database which includes characteristics of: user(s), environment, other connected systems, and system(s) hosting UIP. --The development and or utilization of database on ups characteristics: identifies/develops differences between users (multi-user) intern allowing sys to better tailor itself (U[P-Tailor).
UIP-Tailor uses the UIP-DB.
Examples: "Access' BA", "Track", "Artist": preferred ways u likes "images" "edited". Extensive examples in
KN files. --SW (Software) Diagram: "seeks" what elements needed= for compilation= then organizes data (via fuzzy logic) into usable form= for UIP-Tailor. ---Notes: Seeks: via "questionnaires", "ba", "track". Organization of
DB's files: collected information on user can be inserted into one or multiple files according to which files can use the information. Then UIP-Tailor seeks which files they need to better tailor. Or more work can be required for UIP-Tailor to find the needed information. Example: "Access' BA's Score" -db compiles data to show how accessor is rated= intem if accessors changing rating stays good= uip-tailor /"access controller" permit access.
--See'Content Analyzer's Database Analyzer which overlaps UIP-DB.
Embed UIP in a browser: where it can be gathered, and made [partiy] available [to those with access].
U[P-Edit: System edits material according to user’s needs or characteristics.
Edited material includes: text, (portions of) images, (portions of) sound tracks, computer code, etc. --Omits material to match user’s DB (database); UIP-Tailor - alters text, (*"entertainment") of material (9G220). "Edit". *"Router" is a subset of "Edit". See Artist.
Hypervideo (exists): users click on (moving) images/'icons, and get routed video clips / information (tailored to their needs). Object Tracking software (exists) make (moving) images clickable. UIP Applications: tailors itself to user by providing designated images/info via proper w5.
UIP-Gets-Harder: The type of access into a system adjusts according to the user’s situation. EG: access to info related to another project user is working on in the system might be required for more classified information. There could be three levels of system access clearance for a user: Level One: all data available;
Level Two: access requires UIP-Access' approval. Level Three: No access allowed. -User's characteristics (signals, UIP) "analyzed" to: determine whether to allow: "Access" (entry, level/type usage permitted u), Parts To See: +"Access', BA".
Games: proper actions achieves points, more olives. --Tracked method of playing 'game correctly is a needed password [for any type access into real world (invention)]. Winning might not be via obvious manner of what looks like getting the most points [way to keep hackers from figuring out how to play/lose game to gain access]. 'Game tailored for player so no two 'game identical, and the tailoring is such that only legitimate player may know how to play/'react/answer uipdatabase's question, eg: pet your dog or cat, sitting near 99 other cats and dogs; then interact with pet to do 1, 2, 3 steps... + UIP-Guide /'Guide: UIP knows how to best show user what they need. -Guides user to gain more benefit from the available functions. tailors itself to come close in replacing one on one tutoring and help: focusing on the needs for specific user(s), versus generalized forms of help. See 'Guide.
UIP input: System analyzes user’s behavior/tastes, then files it for future reference to tailor itself.
User or any person inputs their traits, desires. Also see file once called "UIP Input *Ga"
UIP-Link: UIP LINK = Optional ways of dealing with situation when a function isn't working OK.
Compensates by suggesting alternative functions and pathways. See UIP-Link
File.
UIP-Match Making: -Invention connects and scores the uip characteristics for two or more entities (users, companies. -Exists?: web interface suggests what's the best product at close location to user. System then makes the (tel) connection. From French inventor with patent pending invention. -Our invention matches the characteristics of the user’s tastes with available products, services, styles, and other designated characteristics. -Providers can also access (user’s i other cos) uip db, to target clients / other designated parties.
-Computers (with their hardware and software characteristics) might seek proper matching with other electronic hardware and or software. Applications: 1. scoring compatibility between one or more softwares and or hardwares. Improves current compatibility checkers; such as by the  score system gives to the compatibility of designated aspects (uip shows/guides) of the matches. 2. notifies when (non)compatibility (appears) may / does occur (for designated aspects or functions) (of the sw/hw). -Drawing: u (uip database) =(internet) connection = computer / ISP = uip database of user/provider/what's needed (by user).
UIP-MQ = Machine Asks Questions to user:
Machine asks user questions to obtain information so system can better serve user. Answers used to develop "UIP-DB". --Drawing: sensor/analyzer/software analyzer = tr = c = display/prompts user allowing them to respond (via uk) (if they wish). OTD: Sample Situations: personal information; information on game participants and environmental elements; prompts user for needed information; etc. One use can be for system to better function by adapting to user’s needs and or tastes. This feature can also store more information about the user for the "pi" database.
Product's self analysis: system asks user questions about any mechanical failures. --See "Brain"; "Access' BA". "Edit": determines type questions. -Asks user if characteristic(s) discovered by UIP Info Input are correct [via (window) menu (with visual examples)]
UIP-Router: Via (software), user is directed to the designated programs or functions. --"Routes" u to applicable programs based on UIP.
UIP Seeks Reaction: UIP knows "what buttons to push in another, to get the desired reaction." Inn dther words: UIP hones in on an entity's or inventions characteristics predicted to elicit the designated reaction. See 2G330. ++ UIP-Tailor: See Tailor Sub-Part file. And how it's amply demonstrated throughout pateent application.
UIP-Track *: System recognizes and is less apt to lose person/user being tracked. UIP-Track differs the target from the environment by user’s characteristics. EG: existing computer camera' follows person in room based on facial recognition. --"Tracks" u by following signals = characteristics of person; Intelligent
Monitor 2E251; "access"; "visual analyzer"; "sound analyzer". Tracks user for UIP-Database's compilation of info.
UIP-VA: VISUAL ANALYZER: Search for designated images, which is edited' as programmed.
System learns/tailors' itself to know what images they should: track, edit', locate for user; eg: though user doesn consciously know exactly what they are shopping for online, system learns the user prefers designated characteristics based on what user: bought or offered through the machine's question (UIP-MQ) process. ='analyzer" / user = (automatically) assigns desired uip-based code of characteristics to designated image(s) such codes are utilized by (CAD) to manipulate/process/edit the images tied to the codes = results in outputted images/text/suggestions/technical data as u requested/wants (uip) = these outputted data (can) have codes of characteristics = so such output can be altered (like requested earlier).
CONCLUDES THIS ADAPT SUB-PARTS FILE
File: Adapt / Adapat Expand
EXPANDING ON USER INFORMATION PROGRAMMING
BROADENING UIP - OVER VIEW: EXPLORING MORE OPTIONS FOR ADAPTING INVENTIONS.
Imagine about any type of product, real or imaginary. Everyone has different needs. What are they, and how can a conceptual product be tailored?
INPUTS: Whose Info/Needs are used/tailored to benefit the user and or others.
Databases (that system compiles) about user’s characteristics: -User: (typical) individuals who get products to better do what they want, by allowing system(s) to receive info about their behaviors, needs, etc. Common aspect UIP. -Friends:
Entities who associate with / know user: providing their views of user / desires from user -Environment: culture (culturally bound thought patters, like communicating, or matching preferable interfaces matched to particular mentalities); (natural) terrain; weather (road conditions); --automated systems giving info for (user’s) system to adapt / utilize with situation, and or the environment tied to the situation. -Institutional / Authorities: school, government, law enforcement, safety officials -Employers: work functions tailored for employee (employee's interest to discover new things about their work, improves comprehension, focus, productivity, Q&A (quality and assurance). -Parents -Health professionals / systems: sensors mguide user for health improvement, eg: see our motion tutor mguide, related to existing golf swing instructor relying on RFID (PS). -User Themselves: person, group or company giving / receiving (Xba related) data. -Marketers/businesses -System to System Interaction:
Characteristics of alien/other products / systems / software: UIP receives their (characteristic) input via digital (packet attached to alien product; or UIP analyzes alien product and related info to develop a UIP information base.
-Robotic / Virtual Reality:
Robots who learn how to interact with people/users/systems for the latter' benefits,and or robot's. Robot can take on all (UIP related) (behavior) characteristics of a (designated) human.
How one robotic/vr system interacts with other (similar) model.
Analyzers: Content Analyzer; around Analyzer; Visual Analyzer; Scoring;
Sensors
Seek & React: the seek aspect, allows the benefits aspects.
Tag BENEFITS / Purposes of Tailoring: goals; matches user’s needs: -Buy / use more something: user better gets what they want (qualified matching); increases sales; reduces shopping / marketing time/energy/costs.
Guiding /'Educating users: guides users where user and or others (employers/marketers/parents) want them to go/experience/interface
Editing:
React: Automated Responses; Responding to emergencies; Access. -Nurtures better (personal/business) relationships
Entertainment: another way UIP can "hit the sweet spot" of the user.
Games
GPS
Interact
Predict
OSC: synthesizer -TGH and EGH
File: Adapt ! Adapt Article
Adaptive Technology Article: Mixes info from others with inventor's.
Adaptive Technology (is also used for handicapped enabled hardware/software) and Intuitive Computing.
Adapt (UIP) Examples: 1. Black & White - Computer 'game. Uses an Al (Artificial Intelligence) to make the game more interesting. The Al can be trained to perform actions based/'tailored on user’s goals/tastes. 2. Expanding upon Microsoft Office - The microsoft office assistant analyzes how the user is interacting with the office software. If the user is randomly pressing keys and buttons it will offer assistance.
If the user starts writing a letter it will offer help formatting the letter. 3. Technology is not where it needs to be to provide a truely adaptive experience. Most designers focus on making the software intuitive for the end user and offer tools to manually tailor the application to the users taste.
INTUITIVE COMPUTING (UIP)
Intuitive computing is much of what User Information Programming does. With intuitive computing users collaborate their activities with an intelligent digital assistant that models the user [via behavior analyzer]. It suggests or carries out actions it predicts will satisfy that intent. Intuitive computing systems can be tagged and tracked to individual users, travel with them, and analyze' their needs. They can actively monitor the physical environment; learn front past experience; seek out and utilize distributed information and computational resources; use innovative algorithms to compute the most promising courses of action in the face of complex, incomplete, or contradictory inputs; and employ powerful yet natural spoken language and graphical interfaces.
The term "intuitive" (predict] applies both to user intuition regarding system behavior and to two forms of system "intuition": inference/prediction of user intent, and selection of prom Tsing actions to satisfy that intent. There mutually supportive, in the sense that the modeling and support of user intent makes systems dramatically easier to use, allowing them to interact with human beings in a way that more satisfyingly resembles the ways in which human beings act alone, and or with others and the environment.
Though it may employ resources spread across the Internet, an intuitive computing system can have an interactive iocus that can also travel with the user or mobile invention, much like today's PDAs. It can, however, have multiple physical components, some embedded in personal wear or even the body. Using multisensory (sensors) input, including sound (SA) and vision (VA), the system can monitor the physical environment and the user’s focus of attention. It can then combine this environmental information with past experience, commonsense knowledge, and task-specific knowledge to drive a sophisticated model of user intent and feasibility, allowing it to resolve ambiguous requests, to propose appropriate actions, and to anticipate future needs.
It manages an=unlimited variety of tasks. It can augment human memory, answer questions, and gather and organize information for upcoming activities. It can notify' users, educate' and guide' them. Both proactively and on demand, it can negotiate with systems associated with other human beings, with organizations, and with objects in the surrounding environment. As a servant, it's available when needed; and can be ignored by the user. While intuitive computing tasks can be short-term and highly constrained, others can be much more open-ended, and capable of consuming arbitrary amounts of computational and other resources. The algorithms to perform these tasks can also employ: =both heuristic and traditionally rigorous techniques, with the choice among them driven by intrinsic problem complexity, resource availability, and the nature (completeness, consistency, accuracy) of the input data. Challenging functions include: choosing the most promising actions in the absence of complete knowledge of external state and consequences, balancing resource requirements against quality of results, allocating available resources among competing goals and obligations, managing and mining large amounts of current and past sensory information (from databases' (compiled by UIP)), and selecting the order of access' to outside information sources.
In an internetworked world (where the parts are highly interconnected in unlimitedly potential ways), an intuitive computing system can communicate extensively with other invention parts, and information sources around the Internet. For cost efficiency, e.g. battery preservation, and saving computing power (in an invention part), it can offioad expensive computations when feasible. It can offload to nearby servers whenever possible.
When resources are plentiful, the system can speculatively gather and organize information in anticipation of future needs. When resources are scarce, it can use its knowledge of user focus and its model of user intent, to allocate what resources it has to the tasks its computations determine can best (most likely) meet user needs.
Diagram: Data collection (database, tracking)/ UIP (intuitive computing) = service provided = user.
INVENTION'S CHALLENGES
Artificial Intelligence, Natural Language, and Knowledge Representation: planning for the future based on uncertain or incomplete knowledge; natural language understanding for multiple speakers (users') in noisy environments; modeling of intent in general contexts; knowledge acquisition and representation (collecting information for UIP's database'); learning and inference; intelligent agency: deciding what to do and how to do it (W5), balancing conflicting goals and obligations against each other, and against available resources; integration of symbolic and spatial knowledge bases (databases'). -Computer Vision (VA'), Robotics, and Virtual Reality (VR'): object recognition in general environments; recognition of spatial location/context and user/human activity; connection of visual perception to primitives useful in natural language and planning; tracking' and exploitation of user attention and focus; real-time integration of augmented reality with vision and eye tracking
Computer Systems: generation of secure mobile components with embedded resource (computation, communication, data, energy) and quality of service (response time, throughput, accuracy) requirements; application partitioning and relocation mechanisms; optimization techniques to distribute these components to maximize performance and minimize cost; compile (time) prediction' and run-time monitoring of data access' patterns for locality optimization and usage prediction'; attention- and intention-driven scheduling and dynamic component offloading; naming (tracking'), discovery, and routing' for wide-area agents and resources, using peer-to-peer and mobile ad hoc techniques; high-performance, low-energy processing and communications for mobile platforms
Theory of Computation: algorithmic task decomposition and flexible serialization/ parallelization; anticipatory computing via exact and approximation algorithms, and stochastic modeling of human/machine behavior and environments; approximation algorithms (including progressive approximations); complexity studies to clarify the demarcation line between exactly solvable subtasks and those to be approached approximately or heuristically; computing with uncertainty (regarding input, environments, and payoffs); cryptographic security (access'); data mining (of database')/warehousing/classification/clustering; query-order theory to improve information access' patterns.
Following is a list of the patents ordered by how relevant they seemed to be to UIP. So far I haven't found anything enough like it. I put I s by the patents that seemed to be fairly similar, 2s by the ones that had some theme in common and 8s or 9s by the ones that seemed like they MIGHT have a little to do with certain aspects of it, but possible little to no relevancy. Here's what I did: I started out by searching by keywords and trying to read each patent that seemed similar to try to tell how close it was to yours, then following the links on those patents to "references cited" (other patents) but that seemed to take too long, and skipped around too much. I ended up searching by keywords then browsing to weed out the ones that didn't fit (like human protease inhibitor stuff) and ordering the ones that seemed to relate. I was going to go through and read over the ones that seemed to match better and give a percentage of how much they matched, and follow the reference links inside the patent to determine if any of those were relevant as well.
The following patent numbers are just from a preliminary search of "database"
AND "tailor". It came up with over 2,300 hits, and Iave finished weeding out and ordering the most relevant patents. I was going to read them over and give a better idea ofjust how much'they relate or if some of them didn't fit as well as I thought at first glance etc. Other search combinations came up with over 30,000 hits. So this seemed like the best one to start with.
CONCLUDES THIS UIP ARTICLE FILE
File: Adapt / Adapt Sequences ADAPTING THE SEQUENCES OF SOMETHING LIKE:
ADAPTATIVE CODE SEQUENCES IN SOFTWARE, DNA, ETC.
CLAIM:
OUR SYSTEM ALSO ADAPTS TO NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER
BIOLOGICAL MOLECULAR STRUCTURES:
Adapting to the need for tackling germs on a case by case basis. Adapter guides user by giving them a chemical formulae designed to neutralize dangers from specific germs and their sequences. For example the bacteria (P.gingivalis). Chemical indicators notify if and when items placed into the solution have been cleaned enough. The same features used to adapt the situation with this sequence apply to electronic software codes as weii.
More details on chemical sequences throughout the application including, our chemical indicators, content analyzers,.etc.
ADAPTING TO NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER BIOLOGICAL MOLECULAR
STRUCTURES:
Content Analyzer: it seeks and reacts to designated situations including: chemical combinations, and/or behavioral traits (see behavior analyzer). -Can Seek: changes in situation and/or designated circumstances (compositions [at certain temperatures and/or quantities (percent of solution)].
Notifies user/(reaction) system 'W5 triggering event occurs.
Set combination of chemicals/solutions is required to access / trigger an event. A form of password is achieved when the correct nucleotides and/or amino acids are found in designated [percentage of solution] / other criteria.
Engineer nucleotides and/or amino acids so they adapt to needed circumstances Components of a nucleotides and/or amino acids, and or an entire nucleotides and/or amino acids chain can be [automatically] altered/'edited to adapt. -(Video) 'Game:"Adapting nucleotides and/or amino acids can be a strategy game.
CHEMICAL ELEMENT CAN BE A ALTERNATIVE FEATURES:
Each (known) nucleotides and/or amino acid sequences has the option/alternative of being one of this pat application's features (inventions) (based on characteristics from being synergized with something else such as other (parts of) nucleotides and/or amino acid sequences. -As with any part of this pat application, the stronger the knowledge with other sections of this pate application, the easier it will be to understand/use its features.
Software is used to analyze /'coordinate nucleotides and/or amino acid sequences [based on what the content analyzer's 'guidance/'reaction]. -Shrink or expand nucleotides and/or amino acid sequences and their inventive features in this pat application.
Benefits from altering [editing] nucleotides and/or amino acid sequences include: -Bioengineered medicines and/or foods. Non organic/natural life/chemical forms can be tracked so they are properly used. EG: place tags in/near the nucleotides and/or amino acid sequences.
Interactive molecules can function like features [synergizing] each other.
Common features [also for non] nucleotides and/or amino acid sequences like access also have [purely] chemical / nucleotides and/or amino acid sequences (whose characteristics are sought and reacted to) features,
-A correct sequence is needed to trigger/gain 'access/'notify = in order to achieve the designated (chemical) reaction. -(Auto) safety air bags (any anti infringer method in application) can be instituted [quickly]: Figurative drawing: --(Infringing) event occurs = person / system identifies [via sentence structure analysis] event analyzer [editor] adapts to event by =(activating) its links that are associated (with possible infringement predicted) = (user) files patent application (with system's help) = patent granted =[predicted] infringer is stopped (this protects the operator of this system (functioning like an air bag)).
FIGURATIVE DRAWING (diagram) of nucleotides and/or amino acid sequence example:
Drawing # 1: 1 User's Need Determined -> 2'Keyboard Input => 3'Computers Analyzer -> 4
Changes the constitution (sequence) (to adapt) -> 5 Container holding nucleotides and/or amino acid sequences. --Notes on above diagram:
---1: what a user or system needs adapted; their needs can be scored /'tracked for changes to the (sequences) in nucleotides and/or amino acid sequences. ---2: remote control / reaction controls what #3 does. ---3: adapts situation / nucleotides and/or amino acid sequences ---4: altered nucleotides and/or amino acid sequences (based on how sequences are/were edited) (by adaptation). ---5: can be moved (carefully) via (BWA) in the research laboratory. Any accidents / spills are monitored/'tracked by sensors, with notifications made when needed.
Drawing #2:
Designated need (determined by keyboard input / sensors analyzer) - computer = mechanical (arms) device moves/combines/alters the nucleotides and/or amino acids (along with chemicals that can change their feature / characteristics / character / (%video game) reagent features).
BRIDGING NUCLEOTIDES, AMINO ACID SEQUENCES & OTHER BIOLOGICAL MOLECULAR
STRUCTURES:
Adapt available resources like software codes or chemicals to achieve adapted results.
Splicing and or connecting chemicals and/or (our) software code has many similarities (and we predict more so in future).
Achieving adapted sequences / software codes = can be done by having an analyzer output a formulae / guidance for how this sequence can be created 'W5.
SEQUENCE CODE WRITTEN BY OUR (CHEMICAL/ELECTRONIC) BEHAVIOR ANALYZER,
ACCESS, CONTENT ANALYZER & OTHER FEATURES:
Adapt designates a need = then guides the technician / automated editing software programming device = to write up a sequence / software program adapt predicts will achieve the need to Access through the body's brain membrane needed medicines. Steps: l.Analyzer instructs molecule #1 = to mix with molecule #2 and #3 = creating chemical #1  = which has the characteristics of getting through the brain membrane. #1 is a chemical behavior analyzer that can find #2 and #3. The latter can't gain access to the brain without the other (#2 and #3). But #2 & #3 can't find each other as they lack the behavior analyzer themselves, but their sensors are good enough to determine a #1 when they are close enough. 2. As only chemicals #2 and #3 are needed in the brain, and #1 must be removed for #2 & #3 to function as desired; chemical #4 is later released at the right time and situation ['w5] by the analyzer = to dislodge #1 already behind the brain barrier. The medical problem (need to change the brain characteristics causing brain problems, eg; epilepsy or cancer) was solved via this adaptation. As each person/situation is different, the prescription/'guidance adapted to all the circumstances, eg: other drugs person is taking, their age, weight, and/or what might (not) cause ill feelings (nausea).
OUR SEQUENCES & TABLES:
Our feature lists function as our creative tables.
Features show sequences (chain of events / diagrams) that can represent chemical features.
Our system is easier (for lay people) to understand compared to the traditional format in which sequences are currently required by patent offices.
EXISTING US PATENTS: 6,974,706 Application of biosensors for diagnosis [analysis] and treatment [dilatation] of disease. The subject invention also provides a method for screening [access] those analytes/biomarkers [tags] likely to be present in exhaled breath. 20020007249 Personal computer breath analyzer for health-related behavior modification [behavior analyzer) and method (Doesn't mention amino acids, but relates to above patent -
7,129,554 Nanosensors:
Electrical devices comprised of nanoscopic wires are described, along with methods of their manufacture and use. The nanoscopic wires can be nanotubes, preferably single-walled carbon nanotubes. They can be arranged in crossbar arrays using chemically patterned surfaces for direction, via chemical vapor deposition. -Our features: sensors, arrangements mentioned can be in an adapted fashion. 7,062,092 System, method, and computer software product for gain adjustment (adaptation) in ([biological] microarray) scanner (analyzer).
PHENOLPHTHALEIN - A Ph Chemical Notifier (Indicator):
Turns pink ph becomes above 10.
When doing a titration phenolphthalein could be used. Measure the concentration of a solution (its acidity) to predict how fast it will eat through an (un)known or little known substance.
Phenolphthalein can be used as a device to  score that acidity, with this info one can determine an additional way of knowing what the substance it is eating away at (content analyzer). Characteristics of a substance include how fast an acid of certain formulae will eat away at something (a prescribed number of millimeters).
Killing microorganisms - Harmful to humans/animals, eg: Bacteria
Adapted system seeks and/or guides (user) with its generated formulae to achieve the desired acidity or base associated with a chemical that kills (seeks reacts) (specific) bugs:
Bacteria (P.gingivalis) its sequence: tcc aat gaa ttt gct ect att ttc gaa tga aat ttt tcc aat ttt cct tga. 2: Inserted into chemical formulae designed to kill it e.g. citric acid at a concentration of 0.1 normal. This results in formulae going clear (hence it is safe(r). --When ('w5) Hydrogen Peroxide / *Sodium hydroxide solution which is base enough (to show pink from indicator), user knows that it is a good solution to place the bacteria element into, e.g. dentures.
Visual analyzer determines from an indicator that a chemical solution's status has scored high enough to be adapted to the need for killing the designated (tagged) bug.
Entire patent application ([can] with its explanations) be one or more sequences and/or software codes. There are well over one million possible combinations we wish to submit to the patent office however, current patent office regulations would require us to spend well over US12,000,000.00 just in per page filing fees.
Traditional sequence filers are exempt from paying $12 per page after the first 430 pages (first 30 pages free, plus 400 extra per page fees). Hence readers need to read our condensed version herein. It could be more condensed but we put in the extra years and page fees to assist with comprehension. The information needed is linked to from this patent application.
Adapt's Sequencing system can use: Content analyzers, plus zOrder & Timing.
They apply to how elements from atoms up to complex molecules and (software for) electronic features are organized. Even the proper placement and order of the features can involve sequencing.
CONCLUDES THIS ADAPTATIVE SEQUENCING SECTION
File: Adapt / Adapt *
ADAPT * (Maybe Less Important Specifications. For Techies.)
2D-021 SYSTEM REACTS TO EXTERNAL PRODUCTS according where (w5) they are:
Eg: Incoming-Call Identifier - Screener / External Element Identifier.
Calls from desired tel numbers have a different ring. Hereby caller knows whether to pick up the call or not. -(Designating different type connections / (incoming) calls related to another of our ideas?): sys responds differently depending on which other N/sys/existing product wants to "interact" with it. --sys knows identity of other part/sys via its: "access" / code / tel #/ uip (behavioral characteristics of N, or U: how it moves / functions / responds (to stimuli from central "C" or "M") / visual analyzer / sound analyzer. -If user walks over to device, the callers tel number and or name... appears on screen ("S"). -D: Central Product / Sys = C= sensor / analyzer / uip analyzer / caller ID sys part = tr/rc = External Product /
Sys. -OTD: ACCESS *(); BVA (); CID (); CAMERA (LENS) (); CART (type uip or senses or data sought);
CLAP (); INFORMATION RETRIEVAL (); K(); M Q; MIC (); MOUSE Q; MP (); MULTIUSER ();
NOTIFIER (when desired contact has been made with part or organism); PR (); PS (location of external product is a determining factor in deciding if any/type connection/contact is to be made); R(); ROUTER (routes external product by their type nature); S (shows status); *SCORE ();
SOUND ANALYZER (); TDS *(); TRANSFERRING INTER-SYSTEM TELEPHONY (); UIP *(); UK 0; VISUAL ANALYZER
VOICE MAIL ().
-A sensor that connects to u (human body, eg: finger wrap; animal*) to read electromagnetic signals generated by the skin. Proprietary software interprets those signals and translates them into actions. Being researched by company: Other 90% Technologies Inc., Sausalito - See Wall St. Journal 1995 (maybe 6.95) article titled: Mind
Games: Soon Youil Be zapping Bad Guys Without Lifting a Finger. Finger wrap version will sell for $100-
-4E020 Content Date Stamper: Registers and organizes previous occurrences. -See "Brain". % US Pat # pertaining to helping u develop new N, eg: for "D" directory KN: 5153830 Method and apparatus for providing assistance with respect to the development, selection and evaluation of ideas and concepts. -US Pat No's: search str in Bib 9.94: (adaptor adapts) and user*: 5324021%; 5208898 Adaptive knowledge inference method and system; 5313532% Recognition of patterns in images; 5212821 !o Machine-based learning system; 5092354% Cosmetic kit: make-up; 4700295 Forecasts bank traffic and scheduling work; 5321626 battery performance / forecasting system; inventory control: 5237496 & 5287267 & 5128861; 5136502 "analyzing" health care liabilities; agricultural forecast 4837146; compatibility forecasting 4711632; 4197854 patient danger forecasting; game playing involving forecasting
--search str: 1] (adjust or adjusts) and user* - barely skimmed; 2] forecast (did only Bib 6.94 disk).
Tailor and 'Guide: Tailor = SW: For: (automatically) suggesting how sys can better tailor itself to ups needs / helps get product ideas / helping U brainstorm.
Introduction to formulae generation systems: Software used in developing / analyzing / evaluating formulae for food, chemistry, indicators, etc. -uip of desired function is matched= w uip of differing elements / ingredients / chemicals / food elements = resulting in fonnulae of ingredients that may (best) achieve desired goal. --the characteristics of goal are tied= via uip = to characteristics of available / known ingredients or * (KN) sys. + Important parts: UIP-Tailor, 7G050, PR, Track-Analyze (analyzes for what is best to track = db),
Brainstorming SW, 2E010 20 30 40 50 Recipe Softwares.
General Examples: 1] develop an nr for desired application = alerting presence of salts / acids / hazardous elements = in/for: liquids / powders / surface contact. 2] Other applications for 7G050. 3] SW sys may simply help u by offering suggested possibilities: formulae / equipment / sources of information (reference material, on-line sources) / type experiments. 4] UIP-Tailor = UIP-DB: adjusts to ups needs: Gives ideas to u = from which u can choose = then sys reacts accordingly by offering such tailored functions. -Example: u using information highway software often requires more than two minutes before u requires M (mainframe computer) to act = resulting in sw asking u if they still want to stay connected = frustrating u by requiring them to respond to such petty questions. It may also be problematic for u to locate where in the software they should go to stop such prompts, but if sys were to offer such a suggestion as, would you like the default mode to give you 10 minutes before such prompt (after sys has determined ("status") 80 percent of the past 50 interactions between u and m were at least 10 minutes wo activity). --Result: sys tailors itself to u, by first giving u a choice in matter - maybe u couldn't want the change to occur wo their acknowledgement. Manufacturer determines to what degree uip-tailor will suggest or bypass former and simply alter itself to ups need. 5] Constitution needed in plastic resins / metals / product casing ("cm", "cp") or parts, for = tolerating designated levels of: stretching, bending, pulling = within designated environments of varying (extreme): temperatures, light, abuse, excessive wear, time period of element's use (age of N). 7G050 related. 6] Patent search strategy for idea suggestion generation sys: software* and (formulae* or recipe* or ingredient*) 7] Pharmaceutical: developing ingredients for drugs; ideas for research. -KN: medical prognosis sys that studies all the characteristics of illness in determining type of illness = 2E suggests possible medications. -Suggesting possible combinations for drug to solve designated illness / problem: file for each aspect in situation (uip-db) matched w = files of existing / potential future drugs or chemicals. 8] Brainstorming: Software simultaneously designed to help researchers increase their (sociologically, psychologically related) creativity: KN 91 Nutritional recipe generators based on needs.
Indicator Examples: 7G050 i] Indicator type 'Guide [also called suggested']: Researcher anticipates they will be coming into contact w 7G050 related: diverse (hazardous) chemicals / harsh environments -> Those chemicals / environments are keyed into computer -> C "analyzes" for type indicators that may nr more than one of these (unrelated) chemicals / environments [sw tries to find indicators that can be compatible in seeking diverse chemicals / environments] -> suggestions are made to u -> u may next need to do additional research via: this same sw / other references sources / do experiments testing out the sw's hypotheses / stated facts. 2] Body protection device suggester: Researcher keys in that they will be working with three differing chemicals (of differing acidity) -> sw suggests which 7G050 type gloves to use for all / each situation / occurrence / type activity (eg: working with sharp objects in such liquids requires thicker gloves) -> Designated gloves can be identified by glove's manufacturer / model number / generic type. Sys may also suggest other protective gear used in hazardous situations, eg: aprons, body suits, masks, goggles, gas masks, shoes, (replaceable) filters for HVAC [Heating, Ventilation, Air Conditioning sys]. -sw used on case by case, day by day basis, or planning future long term projects, or + designing new research laboratories, eg: type surfaces (paints, flooring, counter top materials, air filters....). 3] UIP: Characteristics of u are "analyzed" -> sys makes suggestion: U will be having likely designated occurrences (outlined in 7G050) = sw suggests: types of protection (protective gear); methods of (cautious) research (protocols) already determined to be safe via reference manuals on the subject or sw (db).
-"PR": sw (re)programs itself = as controlled by UIP; programmer can help guide / control sw.
For Techies: U= This N Sys (sw suggesting formulae) ~ C
ACCESS Q; ANALYZER (); BILL (); CART (); EDIT 0; EDUC (); MULTI-USER (); PR Q;
ROUTER (); +SCORE (given to each aspect = attached to each element of: goal & potential ingredients);
SENSOR (7G050); STATUS (); TDS (scores time delay in getting NR effect); TRACK (history of previous (chemical/food) experiments conducted by: u, organizational body, db, m); U (researcher, student= "educ");
UIP ().
D Overview - How parts might fit:
For Techies: U/ Other (KN) Sys = This N Sys (software used in developing / analyzing / evaluating formulae for food, chemistry, etc.) - C=
For Techies: PS - R - Tilt; Zones - Monitoring; Zones - Utilization; Access: u needs to usually continue to develop formulae that match those u developed w sys before. Villains wo most proper knowledge can be noticed (nr). Access allows for normal percentages of cases w negative results (caused by human error). 4E020
Registrar. 4E030 Image. Input Access Sys. + Indicators: 7G: hazards, novelties, el monitoring of events: formulae for developing needed indicators developed.
Technical: How files in db = match / compare up w / relate / score w= data provided to begin search by: u another sys.
Salt Avoidance Recipe Generator Steps: Suggestions on replacing salt in bean soup: 1] User may normally.prefer the saltiness taste to equate at 0.5% of soup volume to be real salt. 2] This preferred percentage is determined via: what u k / nr placed in soup. 3] U k 2 liters of soup will be made, and lists volumes of ingredients making up 2 liters *(both before combining, then after coming (and evaporation) - though latter can somewhat be calculated by sys). Example: I liter water, .4 liter kidney beans, .3 liter potato. 4] U lets system to recommend other ingredients (if no real salt were actually to be used). 5] Systems db "analyzes"/shows (s/printer) other non salt ingredients shown to statistically satisfy a large percentage of population (in ups zone) who are on salt restrictive diets. "Score" for each of those ingredients on salt replacement value. 6] Those ingredients that came up in previous step are next "scored" for their compatibility w/ existing ingredients u already (fairly) decided to keep in soup. Each food ingredient in db has many sub-files, each sub-file being the type application / situation / type food such ingredient may be used in = and the corresponding "score". Example: carrots get high score for soups in general, yet a higher score in subsub-file: western vegetable or meat soups, but lower score in sub-sub-file in
Japanese miso bean type soup. 7] The differing "scores" are= "coordinated" / "analyzed" -> suggested ingredients are grouped into differing sets / files of ingredients. Compatibility of ingredients with each other in designated sets (including ingredients required by u) based on db of past statistical taste studies for how such combinations (may) satisfied people.
8] S / Printer shows = Suggested recipes = to U. The order in which they are shown might be those w higher "scores" for the set, or by other means, eg: cost, "score" for how all the ingredients are commonly available in ups zone's supermarkets, uip - db for what u liked in the past, etc.
Indicator Development Idea Generator Steps: SW will suggest what u can use / do / replace / alter in their (research) plan / strategy / process. 1] All type materials in situation are entered into= computer, eg: type hazardous materials (acid, pH level, 7G050 chemicals listed). Eg: type + gloves, type + containers holding chemicals, + acids and where they are, where acids might spill, environmental effects (temperature, time span (in which acids will be in contact), other circumstances. 2] The files for characteristics for each of these elements is either known by sys (uip-db). If the db exists it was compiled by: "analysis" of research material, surveys of chemists %, developed by u (or their company) for future applications (by other researchers of the company). -Each element has different files, according to the circumstance of its usage. "Analyzer" determines which subfiles are applicable via, eg: label of file, % key word search, "status"*, uip. 31 Files are matched. Examples: only 2% of glove/container types are suitable for working with acids = next sw determines three best gloves/containers for said acid, listing best first. 4] If u is unable/unwilling to make changes in glove / container, sys can suggest differing acids, or time period during which work should be completed. 5] If all suggestions by u are good, sys can "score" what u planned to do / still give other better / good but worse options / precautions (whether using products or not, and if so, how they should be used) = S/Printer. 6] While research is taking place = "sensor" ="analyzer" = NR: when sys determines there is or could be (based on score) a situation needing special attention (danger, loss of money, inability for u to get desired results).
Large Diagram Begins Here: The following Diagram Insert #]' is for the large diagram below it, titled:'D-#]'.
The OTD D below 'D #I' is a subset of the latter. All parts converge in the central computer in 'D #1'.
Diagram Insert #I': For +D-#1
Type suggestions made by sys to achieve needs stated by u (so suggested future
N or sys functions as needed in future situation / environment and able to handle designated occurrences as envisioned by sys / u.
Suggestions are made by sys: for one or more of following: NR type - 7G050.
Protective gear type suggested: against (chemical 7G050) hazards. PVC Resin / metal constitution. Formulas: pharmaceutical, food recipes, pvc resins. Other Formulas. -Likely scenarios: how to prepare for: fire and other natural disaster drills / preparedness. Accidents: (chemical) accidents; vehicle; building (collapse). Desired effects: any (el) %KN, any (el) %N, as prescribed by UIPTailor. * OTHER: IJ010 Body Movement Notifier: how sys can adapt to different: sized people / applications. 2E010 20 30 40 50 Recipe Softwares: 3E020 GPS Record Keeper: what records might want to be kept, which zones are important, drawing boundaries between zones (based on uip of situation). 3E060 Interactive Morning
Alarm: what q sys should ask = matched w uip of u/ what u has to do later that day [sys puts u into mood for predicted occurrences/work]. 3E061 Body Motion Instructor. 3E150 "PS-Zone": which zones are important, drawing boundaries between zones (based on uip of situation). 3E151 GPS
Circumstance Correlator and
Controller: which zones are important, drawing boundaries between zones (based on uip of situation). 3E180
GPS Locator: suggests where to begin looking or what needs to be found and how. 3E190 GPS Billing Systems: which zones are important, draWing boundaries between zones (based on uip of situation). 3E040 & 41 Tel
Noise Canceler: what environmental sounds might be semi-canceled (at the risk of impairing listener on other end from part of speaker's natural voice). 3E210 Indoor GPS Extender: where / how extender could be used / placed. 4E010 Alternator: which activities offer greater battery power build up. 4E030 Image Input Access Sys: what images sys may use to trigger designated functions (access). 5E020 Magic
Wand. 3G010 Tel Ring
Delayer. 4G190 Insulated Scoring Ball: how to play / develop new "games". 4G200 Fruit Encapsulator: how to adjust itself to cut in ideal manner. Other methods for peeling, cutting, processing, cooking, canning the foods. 5G061 Dyslexia SW: how u may wean himself off the software; how sw may help u eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer. 5G070 Speed Reading SW: how u may wean himself off the software; how sw may help u -eg: tests u first -> "scores" -> analyzes -> suggests -> s/printer.
D# 1: U=(+ See: ' Diagram Insert # 1') - C=
ACCESS: Access restriction strategies suggested: db of past hacker / villain activity = matched w = db of known / existing / available remedies or traps = suggested "access" control strategies =[security manager's suggestions = k = access - analyzer - sys]: sys analyzes any input from security mgr during the multiple steps via which sw w= mgr together brainstorm for strategies. ANALYZER (); BILL ();
CART (); EDIT ();
EDUC (); MULTI-USER (); NR (); PR (); PS-Zone (); Q(); ROUTER (); SCORE ();
SENSOR ();
SOUND ANALYZER (); STATUS (); TDS (); T(); TILT 0; TRACK (); UIP (); VISUAL
ANALYZER ();
OTHER: UIP-Tailor & UIP-Suggest: see suggestion sw (being) developed from 2E files. + Five senses are altered to match user’s tastes:
Senses: images (see "edit"); sounds (see sa); "vibration"; odor releasers (see smell "analyzer" details mixed throughout files; *taste (see A dir KN). "Synthesized" music / sounds altered.
Related to A or B* dir KN where games are sold via vending machines and tailored to buyers.
+ "Game" application: UIP Game Effect "Editor": U is requested to experience different effects like sounds and type images. The U's response is "scored" and intern the gamers effects are tailored to get a more desirable response from the players. Each gamers aspects has multiple "editable" choices, and sys utilizes those best matching player's preferences. -images: see "edit" = images; colors; textures of skin or objects; size
-sounds: sys "synthesizes" sounds (in its memory); sa scores sounds. -"scoring": to match ups tastes: human body "sensors" are placed on player (skin) to gauge reaction levels; u personally k in their (multiple choice) preference of effects. -What's scored: user’s "mood" reactions "scored" / "analyzed": pleasure; excitement; passion; fear; relaxation (between episodes, type of break for player, so they don't over exert and tire= in tern playing game longer). -How sys utilizes player's preferences: User asked which of 12 effects elicits greatest: passion. Then when passionate encounters occur in game, that "edited"/"synth" version is utilized. -User generated effects: players can program / create / record (mic) sound effects into the game itself. 3E061 Motion Tutor: Guides users to improve their movements according to the user’s needs.
Diagram #1: ["Tracker" / "analyzes" = U's behavior / db (description of U)] =
C (sw = develops sw / programs which are tailored to (u)) = (desired/desirable) function(s). -Developing UIP: UIP (of U / other element being matched) compiled from any source including: questionnaires (answered by U / service providers); monitoring organizations (Dunn & Bradstreet, TRW); any
KN monitoring /"tracking" / "scoring" system(s); UIP.
D (Diagram): data input = analyzer = memory (M, cart, recognizes multi-user) = analyzer = data output = function -5A-810-042003 Advisor: compiles and analyzes user’s information. -OTD: fd-hdd; both pp and mp program how they want the system to collect, retrieve and analyze the data in database; uk; tds (when and how elements occurred); educ%; M%; score (score information can be processed for the UIP database; and UIP can help generate desired scores); cart (for additional data for the database; and or software for processing the database); uq (pi database is used to help generate answers about, eg: about user’s past preferences and or activities); mp (the database and or software can help prompt questions, eg: to expand the database, guide the user in the right question if the system first gets the right information); access (limits access to sensitive information within all or part of the database to people with the right password). -Article in "Scientific American", p.64, April 1995. Article title: "Machines that learn from hints". Its about:
Machine learning improves significantly by taking advantage of information available from intelligent hints; discusses the algorithm process in general terms; gives differing examples, eg: computers judging how much credit to give to credit card applications based on other similar peoples past histories. -UIP formerly titled "PI". -U or Computer (Administrator) can select which UIP mode will be used / desired. -Brainmaker 2 - (Professional version), p.76. [Existing N functions: Gives PC human abilities such as finding patters in your data and learning from the past.]: UIP-track.
For Techies: Part #1: Electronic device obtains information about the user by one or more of the following: remembering user’s previous performance, eg: their abilities and or difficulties on this, or related devices (which transmit uip data to other units via wire, or %wireless); asking questions from user, or "M"; user takes one or more test(s), the type and quantity are determined by the desired application of product; another person or device (M) gives information about user; etc. Device recognizes more than one user by multi-user, eg: their codes used to gain access into device. Personal information is stored in memory and used by device to more intelligently tailor itself to user’s particular needs. The manner in which invention tailors itself to user’s needs can alter according to: small or big changes in uip database, pp.
For Techies: Part #2: D (UIP) = "Billing"; User can take their cart (their personalized uip for all identical or related products) from machine to machine, eg: % existing card used to both activate and select desired preferences in car stereo systems; different cart effects user’s uip differently with the correlated changes in functions; type "character" changes according to uip (if a display ("S") is used); date; uip data can be viewed on display ("S") and or printed out; uip is used to increase the user satisfaction quotient, eg: entertain, (Apossibly by: way in which function operates, sounds, lights, words are used to better create the type of electronic effect uip indicates is more likely to increase user’s positive reaction to using product [test studies are conducted to see the reactions of people in test case studies of 50 - 1000 people]); "C"; % uip can support interactive (by giving the additional data needed to better tailor invention to user; % data obtained for uip's memory from microphone ("mic") (voice recognizer); mouse; mp; multi-user; uip's database guides system's functions (determines the type, manner, timing, whether or not to notify, mq, osc, synth; pp; uip database influences printer's print out parameters, score, speech, vc, manner in which it functions a semi-toy, it prompts - accepts - processes uq; tds; uk. Data is also obtained via: "uk", "cart", "tel", "mo", scanner; UIP can be programmed/understood with the help of: psychologists, sociologists, marketing experts; U's city (tel area code/zip code) / caller id / location based on pd effect how system interfaces w U.
For Techies: D: data input/output=tr/rc=c. C85 Electronic translator speaks out desired words/phrases.
Fuji/Xerox 29 Aug 92 NK_ D: C85="tel". %-o-Cl 12 Computer predicts human error. Input UIP (working conditions of person). System predicts errors there likely to make. 30 Sept
-utilizes fuzzy logic -UIP was formerly titled PI (Personal Information). -Sys analyzes ups actions -> database (behavior). Eg, Ubiquitous computing: u carries (tiny) "c" that communicate with other "c" embedded in: appliances, t, cars, walls, Kays' N.
Eg: Xerox's Parc Tab, and other products mentioned in "Popular Science" Feb 95 from p.47. -Marketing Enhancement Systems: UIP suggests /'guides users to alternative products or services.system judges may suit (part of) their needs. -Publications Related: "Collaborative Filtering": comparing peoples behavior and preferences with those of other people (fusers) who match a similar profile to predict what additional info might be relevant to that person. From *' Net
Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999 ='Datamining": open-ended queries of customer data and other info sources; and to automate the process of predictive models of consumer behavior.
- ? "Dialogue Marketing": adjusts info delivered to the customer based on realtime interaction between the customer and the co. Predictive modeling and datamining techniques to enable a more tailored "dialogue" with fusers (customers) in (real) time. -Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
-"Experience Communities": Aggregated pools of knowledge based on the collective experience of many
-Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
-"Flex Pricing": System tailors prices to demand and supply (automatically). -Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
+ Predictive Modeling" From *"Net Future - The 7 Cybertrends", Chuck Martin,
McGraw Hill (c)1999 -"Preemptive Marketing": tailors marketing, eg: Eliminates future consumer decision points that might lead to loss of business. -Also see *"Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill
-"Pulicasting": 'User tailors which information or features they receive / or are able to utilize; but also creates such content / features / services. -Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)
-"Relationship Age": Systems communicate with fusers for [free] exchange of info/data to better perform tailoring functions.
Aiso see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)1999
-"The Shadow You": Electronic re-creation of the essence (behavior profile) of abuser's behavior. The database on fuser(s) for (purposes of tailoring). -Also see "Net Future - The 7 Cybertrends", Chuck Martin, McGraw Hill (c)
Search Key Words For Searches On Related Patents Include: "data base", adjust, tailor(s), tailored, adjust(s/ing/ed/ment(s)), alter(s/ing/ed), "(system/software/invention) learns", "self learning". What search strategies, and other terms?
TAILOR FEATURES - SOTTO N 4J030 FUTURE LIFE - FIND MISSING PEOPLE:
This may be helpful in finding missing children or fugitives. There already exists age progression art which predicts what someone would look like after a certain period, but what about what they sound like, act like, etc.? This can enhance such an age progression description. Tracks,
Predicts.
6B-590 COLOR CODE - READING PRODUCT LABELS:
This can be used for reading food/drug labels. Suppose I need something that is sugar free, for example. I could read the entire label to see if it contained sugar or not, or there could be a color associated with this; I program my scanner to check if the label has this color and, if it does, know that it fits this criteria. Visual analyzer, bar code reader,  score.
3J070: AUDIO ADJUSTER - FITNESS:
This can be used for exercise classes or individual exercise sessions. If you have ever taken an aerobics class, you know that the instructor uses different music for warm up, high intensity and then cool down stages of the class. Suppose a device. automatically sensed whether a group or person needed to increase heart rate, slow down, needed a change of pace, etc. and used music tailored for these situations. Entertainment, 'Guide,
Exercise.
MISCELLANEOUS:
Check Forgery: Have a pen that a bank issues with a checkbook. If a check amount is suspiciously large, or the check is suspicious for any other reason, the bank can check and see if it was signed with the accompanying pen or not; if not, it was probably stolen; they can call the customer and see if, in fact, it was his signature or not.
Scientific Use: Scientists may be able to use this to identify chemical compounds by seeing if they are exactly the same color as some known compound.
Agriculture: A plant is a certain color when ripe. Perhaps the scanner can determine when it his ripe, as well as when it is diseased. Plants that are not a ripe, healthy color will trigger the scanner.
Education: Like the fitness example, the device could tell is a student or class was tired, nervous, distracted, etc. and play music that was appropriate for their needs. It can be used for both classes and when studying at home: Relies on: motion sensor, behavior analyzer.
Insomnia/drowsiness: Perhaps this device could play tailored music that enables people to sleep more soundly when they are sleeping, the feel wide awake when they get up.
Addictions: Like the above example, perhaps this device can lower cravings for nicotine, caffeine, alcohol or sleeping pills by enabling people to feel more wide awake or relaxed as need be via tailored: music/sounds, exercise, entertainment, education.
System tailors its functions to the unique needs of specific users. Each user can have their unique profile stored in adapt-Database, which includes their: needs, preferences, and behavioral traits. Tailor then matches the database, with a menu of function choices. The function chosen is the one that best meets the user’s preferences. = -adapt-Input develops the adapt-Database by: 1. analyzing user behavior, 2.
Allowing user to input their preferences, 3. Linking to other databases with user’s preferences. -Integrates: Edit, Educate, EGH (Educ Gets Harder), 'Guide, Interact,
Predict, Seek & React, IGH (Therapy Gets Harder), adapt-Emergence (2G180), adapt Tailor.
-Tagged Cascade Effect 7J08: System hones in on a frequency (sound), then cancels other sounds making tagged sound clearer. System reacts when the tagged action occurs. Hones in on anything effecting man's five senses. content analyzer, edit, seek & react, around recognizer, tailor, visual analyzer. -See many huge adapt files..!
CONCLUDES THIS ADAPT* FILE
CONCLUDES THIS ADAPT CENTRAL DESCRIPTION SECTION
File: Features Intro / Analyzer ANALYZER
Like the word "analyzer" suggests, it attempts to match the human brain in making decisions. Decisions are made from a choice of preprogrammed possible reactions. Using fuzzy logic, it takes on the needed functions of software, as would be needed to handle the applicable tasks called for.
System tries to think like a human brain (where (w5) feasible), sys (system) tries to know its limitations. Uses the best knowledge in the field. Analyzer customizes itself. Uses the best knowledge in the field (from sensors, UIP, etc).
Figurative Drawings
D1: I signals -> 2 data from particular input (item being analyzed) -> 3 put into file(s)] = 4 tr/rc = 5 c (6 existing files )= 7 matched/8 compared w 9 inputted files = 10 similarities and 11 differences noted = 12 type/level of differences 13 determined/14 "analyzed" = 15 conclusion made = 16 signal = 17 action made by 18 sys / 19 s or printer shows conclusion. -D 1 Notes: 1: optional part of data flow; sounds = 2 sound analyzer; lights; body movement =(2 sensors); visions = visual analyzer. 2: communication w other el products; c. 3: sw; different files are pre. or automatically labeled according to type situation according to circumstances/occurrences (1). 6: files developed earlier by manufacturer (mp), or ups pr. 7& 8: similarities/differences noted/analyzed via: key words/paragraphs%, visual analyzer, SW (software) number crunching. 9: data from 1, 2, 3, 4, 5. 13 & 14: sw analysis. 15: SW (software) analysis. 16: computer code labels the type situation sw has determined to be the case, eg: favorable, unfavorable, and or what action is needed to be taken (due to the "status" of situation). -D2: input -> c (analyzer (sw)) -> results / function (altered according to how sys may want to adapt according to determination(s)/conclusions made by analyzer). -D3: Read Later D C (SW Analyzer) =
ACCESS (determines w5 can access into any given sys (c, m, any portion thereof, eg: particular files or software programs/features)/ BILL / CART (differing SW (software) for type analysis needed)/
COMPOSITION / DATE / S / EDUC (sw determines ups level of sophistication (w sys/sw) = intern simplifies/complexities the SW (software) interface (and available functions / steps needed to achieve desired aim (via pr/k)))/ K (keyboard) / LOCATOR / M (uses M's database(s) for (additional) information from which to (better) determine analysis)/ MQ (sys asks (intelligent) questions to better collect needed data for better analysis; development of uip)/ MULTI-USER (analyzes (tasks/things/occurrence) differently according to type/uip of u; development of uip)/ NOTIFIER (u alerted when analyzer determines u (user) (may) need to know (status))/ OSC / PR (how analyzer is to function / what its to seek and how process information / for w5)/
PS (determines location of object(s), processes information accordingly (as pr))/ Q (decides what questions to ask u (user) according to circumstances, eg: what u (user) wants or is doing (w5), ups status*)/ *R / SCORE (new scores matched with earlier developed files for analysis; creates new files for new scores, development of uip)/ SENSOR (compares files for inputted signals w (with) what is wanted/needed/expected/is standard/has historically occurred before (uip/m/database))/ SOUND ANALYZER (compares inputted sounds w previously stored sound files)/ SPEECH (sound analyzer)/ STATUS / SYNTH (sys synth (automatically) according to: pr/uip/u's k)/ TDS (effects score, development of uip)/ T (telephony sw applications)/ UIP (compares files)/
VISUAL ANALYZER (compares files, 2E251 Intelligent Monitor)/ VR* (compares files). -in some (simpler) circumstances, the analyzer functions wo software, eg: simple turning on/off according to situation. % Read Later This N Part: -2E251 Intelligent Monitor: ; 3E040 3E041 -3G010 T Ring Delayer: -5E080 System self analyzes best synthesis for acoustics of room/hall: -7G050 7G051 PVC Change Alerter: ; 7G052 related kn. -9G220 Channel Scanner Skips certain stations... -"Analyzer" and how it matches and compares files and determines conclusions also explained in UIP (UIP Tailor, UIP-Suggestion).
Fuzzy logic. AP = Applications: the related product applications, and specifications, for the listed application(s) are obvious. -4E020 Registrar. -"Router": locates then= retrieves needed data= for this part. -Related existing SW (software) from "TDSW":
Brainmaker 2 - (Professional version), p.76. [Existing N functions: Gives PC human abilities such as finding patters in your data and learning from the past.]: UIP, "track". -ProTEM - Business Process Improvement.
Takes on the functions of software as would be needed to handle the applicable tasks called for by invention disclosure.
* ANALYZER - READ LATER SECTION MAYBE _
Diagram 1: 1 signals -> 2 data from particular input (item being analyzed) -> 3 data put into file(s) = 4 tr/rc = 5 c (6 existing files ) = 7 older files are = 8 matched and compared w (with) 9 newer inputted files = 10 similarities and 11 differences between files noted = 12 type/level of differences 13 determined/14 "analyzed" _ conclusion made = 16 signal = 17 function/action made by 18 sys (system) / 19 s or printer or notifier shows conclusion. --Diagram 1's Notes: 1: optional part of data flow; sounds = 2 sound analyzer; lights; body movement =(2 sensors); visions = visual analyzer. 2: communication w other el products; c. 3: sw; different files are pre. or automatically labeled according to type situation according to circumstances/occurrences (1). 6: files developed earlier by manufacturer (mp), or ups pr. 7 & 8: similarities/differences noted/analyzed via: key words/paragraphs%, visual analyzer, SW (software) number crunching. 9: data from 1, 2, 3, 4, 5. 13 & 14: sw analysis. 15: SW (software) analysis. 16: computer code labels the type situation sw has determined to be the case, eg: favorable, unfavorable, and or what action is needed to be taken (due to the "status" of situation). drawing 2: input -> c (analyzer (sw)) -> results / function (altered according to how sys may want to adapt according to determination(s)/conclusions made by analyzer). drawing 3: C (SW Analyzer) = ACCESS (determines W5 (what, where, when, why and how) can access into any given sys (system) (c, m, any portion thereof, eg: particular files or software programs/features)/ BILL /
CART (differing sw for type analysis needed)/ /COMPOSITION / DATE / S / EDUC (sw determines ups level of sophistication (w sys/sw) = intern simplifies/complexities the SW (software) interface (and available functions / steps needed to achieve desired aim (via pr/k)))/ K / LOCATOR / M (uses M's database(s) for (additional) information from which to (better) determine analysis)/ MQ (sys asks (intelligent) questions to better collect needed data for better analysis; development of UIP)/ MULTIUSER (analyzes (tasks/things/occurrence) differently according to type/uip of u; development of uip)/ NOTIFIER (u alerted when analyzer determines u (user) (may) need to know (status))/ OSC / PR (how analyzer is to function / what its to seek and how process information / for w5)/ PS (determines location of object(s), processes information accordingly (as pr))/ Q (decides what questions to ask u according to circumstances, eg: what u (user) wants or is doing (w5), ups status*)/ *R / SCORE (new scores matched with earlier developed files for analysis; creates new files for new scores, development of uip)/ SENSOR (compares files for inputted signals w (with) what is wanted/needed/expected/is standard/has historically occurred before (uip/m/database))/ SOUND ANALYZER (compares inputted sounds w (with) previously stored sound files)/ SPEECH (sound analyzer)/ STATUS /
SYNTH (sys synth (automatically) according to: pr/uip/u's k)/ TDS (effects score, development of uip)/ T(tell)
(telephony sw applications)/UIP (compares files)/ VISUAL ANALYZER (compares files, 2E251 Intelligent
Monitor)/ VR* (compares files). -in some (simpler) circumstances, the analyzer functions wo software, eg: simple turning on/off according to situation
END OF THIS ANALYZER FILE
File: Art\Ar Intro & General ART FEATURE
Table of Contents for Artist Section:
AR Intro & General
AR IMIS
AR IMI
AR Write
AR Cause
AR Crawl
AR Educ
ARMerge
AR ReadHelp
AR ReadHelp*
AR Dys-Ed
AR Dys-IMI
AR Dysl AR Dys App
Artist Misc*
Use Our Masterminded Patent Application To Improve Your Artistic and Editing
Ideas! Learn about our quick and easy licenses. Call (+] ) 707-428-5000 www.LicenseltToday.com
Tailor pictures to your taste. Systems Visual analyzer with wide powers, determines the characteristics of the image to be altered.
For Techies: Edit pictures. User alters pictures or text. System alters images for user (in tailored form).
Functions: accentuates images; automatically edits as programmed (so as to best tailor itself); improves visibility, readability, excitement, user’s interest in (multi media) presentation; images are made to interact w/
(with) user or other images on screen; cut & paste software function; user draws images; visual analyzer studies images created by user or other source.
The Following Are Electronia Art Generation Elements: -# 1 OTD: D = *5A-110-042003 Master Artist: make masterpieces similar to the masterpieces or choose your own. Select painting desired, and electronic device will help guide user in any one of many methods. Incorporate different parts via selections and or drawing. *SA-120-042006 Camera Editor: Take photographs, which you can then edit on the related computer system (camera and editing aspects can be on same or different pieces of equipment). *5A-130-042004 Color Sticks For Computer Drawing Pad: Simplifies computer graphics system for children.
Child inserts plastic piece for the desired color. *3A-110 Antenna Art 3A-580 Air Pad *"Sound Analyzer", and "Sound-Vision": used to convert sounds into visions. *"Composition": sound effect composition might work in parallel or in synergy with "Artist" * "Remote" 3A-790 Magic Air Pen *5A-620 Virtual Reality Invention Laboratory.
-OTD #2: display; fd-hdd; pp; mp; uk; mouse; toy; basic; printer; M%; osc; speech; md; cart (image creating software options); cp; uq (eg: how to operate software); mq (eg: how user wants to generate their art); U1P (system generates graphics according to past images user preferred; such user preference can be inferred with some margin of error based on the graphic editors selected earlier and or the types of images user made in the past - this "pi" system might be an optional mode, and valuable considering that it might be too complex for some users to select the graphic image editors that he might like most); character; motion sounder% (activates images according to how a device is moved, while simultaneously making a sound corresponding to the type motion); multi-user; cc; notifier; tilt (graphic image editor is effected by how the part and or device is tilted); air pad. -El meeting place:
Improvement on US Patent 5347306: "C" - Animated electronic meeting place for: business / "education"
"interactive" meetings / "games" / "entertainment"
ACCESS (needed for each participant (u) to join) 1/ ANALYZER (how / w5 sys functions as desired (according to uip-tailor/pr/k)) // EDIT (actions/statements/responses from u) // NR (when u is asked to respond or should notice designated occurrence(s)) // OSC (verbal communication) // PR (how each u
"interacts" w/ each other / sys) Q (answered differently according to u) // R (ups control / communication device) // ROUTER (each participant / their communications, routed differently to others = according to: who (u) the sending / receiving u are / w5 of situation) // SCORE (of each u) //
STATUS (of: each u / their actions) // TDS () // T (how each u "interacts" w: other u/ m) // TRACK (progress/changes of each u) // [
UIP / "Multi-user" = (each u = experiences / handles sys differently = according to ups unique uip-tailored sw) ] // "artist" // "composition" // "educ": each u = "interacts" = learns from or teaches other = u (in different manner = uip) // "cart"
Introduction: Each / Most Artist KN also have a sw version - D: U = mouse / r / k = c-- image generating sw = s / printer / [tr = another c] / access.
Fidelity Catalogue's Product Improvements: Many Non-electronic * See catalog for details on existing products: The catalog containing
Fidelity's products was received on Dec 31, 1994. It's cover has black marble background with pictures of taxi, and applique film system. Catalog dated "Winter 1995". [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'1 Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725]
Portable Drawing Board: Sliding guides; corner clamps. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Intel Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p.3]
Rotary Cutters: cuts pads, foam, etc. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'I Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p.3]
Clip Compass: draws circles by gripping (any) writing instrument. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'1 Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p.9]
Electric Eraser: for lead / ink. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'] Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p12]
Tracing / Overlay papers. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Intel Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p.13]
Waterproof paper: Use in copiers. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'I Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p. 13, 141
Non Reproducible Blue Grid (Paper). [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Intel Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p.14] "Access"
Graphic Arts (Masking) Tape [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On File), 5601
Int'1 Parkway, Minneapolis, MN 5540. 800 326-7555 Fax 800 842-2725; p.151 3C292 "Images" of Magical Building Blocks: Each combination has designated results.
Person generates and edit images. It can be compatible with existing multimedia ("MM") hardware and or software. -D: 1 uk = 2 base ("C") = 3 tr = 4"S"15 function/6 M -OTD: 2 access; I air pad; 12567cart; 1245cc; 4character; 4color; 2%composition; 2date; 4images are "displayed", stored in 2memory, 234 projected onto walls (via color lights), 5converted into printed pictures and or Scinema or 5video; educ; %egh; entertain; 2fd-hdd; 124float; 5fs (send/receive images in black & white/color = separate computer/e-mail/fs/special computer=printer located in other location; game; 23%gps; 2interactive; md; 12microphone=4=5/speaker/osc/play back/stereo; 4mo; 25%morning (user must generate specific images to deactivate the alarm: generate similar / related / unique image. System may inspire ideas for image(s), eg: one which evokes the idea of waking up, like running to catch bus; I mouse; 2mp; 2mq; 2multiuser; 5**notifier; 5*osc; 26pi; 1245portable; 2pp; 5printer; 124rcp; iremote; 2score; 5speach; 2tds tgh; toy; l vc; 5visual analyzer; 5 vr (create images desired for your virtual reality experience before I during use, eg: have a virtual reality-type experience painting. This can inspire individual creativity); 25 camera takes pictures, allowing user to memorize and modify, eg: size, color, slicing, adding shapes; 26 user needs visual ideas, so they uk: w5 of situation requiring a visual piece / uip of person & or co & or situation; %wa. -See "Brain": sys adapts images for u. -OTD: U = "Artist" Sys - C
ACCESS (limits functions, each movement of r / r stick 5E020 is interpreted ("analyzed") according to password); OSC (each "Ra's movement can tie in w corresponding type sound); PR (u designates which movements of "R" represent which type of marks/functions 5E020); Q (U asks how they can draw differently / program their R differently (from what's stated in N description)); S (interactive touch screen; color monitor); %SCORE (drawing aptitude); (Motion),SENSOR (of R/%U); TDS (); UIP (DB: image data bank); %VISUAL ANALYZER Q. -"Router": locates then= retrieves needed data= for this part, eg: images (from image data bank (db) (on m)). -A code (access, el +water mark') encoded in sw/data* limits how sys / program can be: utilized (to operate device) / "edited" / copied. See: "Access", "Edit". -"Bill"
END THIS ART FILE ARTIST - SUB-FEATURES SIMPLIFIED:
"COLOR" = Any color(s). Any "edited" colors match.
"CRAWLER" = Externally controlled image creating mode crawls across screen.
"CRAWLER'S VIRUS" = Crawler attacks other's functions. "Game's" opponent player's functions represented visually. Crawler "edits" opponent's functions inturn effecting their abilities:
"CUT & PASTE" = Standard computer terminology plus more. "DRAW" = Create image. "EDIT" = Alters images in complex algorithms. Eg: "crawl"; makes colors or shapes compatible; "cut & paste".
"GUIDE" = Suggests how user might proceded in creating images. "IMAGE" = Picture. "INTERACTIVE IMAGES"
"MULTI-COLORER" = Same as crawler except user controls how crawler moves. "MULTI-USER" = Each user "edits",each other's "images"_
"SW" ("Artist") software; program.
"WRITING INSTRUMENT" = Mouse, stylus, "tilt".
File: Art \ Ar-IMI
ARTIST - COMMON FUNCTIONS FOR EACH ARTIST KN:
Intro: Each "artist" function theme below includes different variations detailed in the grouping of related "artist" inventions. "ANALYZER"
Sys has a mind of its own. How it will automatically: "Edit", "Draw", "Crawl". "Designating" "images" for labeling / "coordinatirig". % "Tracks" / "Scores" the "artist" occurrences / functions. "BEHAVIOR ANALYZER" =
US Patent: 5507649 = "images" are "designated" to= match accessors behavior. Eg: children receive different images from adults.
* "COLOR" = Any color(s). -Color Selector: (Printed) guide shows numerical code for numerous colors. Software version too. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Int'1 Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; all of p. 4, p. 5, top p. 6] --each numerical code used by "color" = "analyzer" for: color "coordinating" or other "editing"; "mood" and ba (how each color effects viewers). "colors" are changeable / refillable: (Refillable) Ink Marker
Systems. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Int'] Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; p. 6, 7, 8, 10]
Access: Hurdles to gain "access": type color(s) used W5. "COORDINATOR"
Any "edited" colors / images match. Modes of coordinating colors and images are similar.
Color Coordination:
Color choice process (for "Crawler"): + Colors compatible: The colors used blend (well - as pr), eg: green matches / blends with blue, creating blue-green in between; red and blue blend to make purple... +--the manner of color changes pre-"analyze" how colors blend together --The colors used blend well, eg: yellow blends with blue, creating green in between; red and blue blend to make purple... --the order of color changes consider how colors coordinate and blend together -device uses single colors, and or blends desired colors as user selects. + Compatibility of colors may imply that: they are of a related subject, function, u, application. "Coordinator" "designates" colors accordingly. +--Character's Rimage portrays (compatibility / type) of subject matter. See: 'Guide's ='Character. + How colors selected: 1] sys= "analyzes" color compatibility charts. 2] Second color utilized has color pigments that are the same / similar / compatible w (with) first color and compatible with second color. Applies to three or more colors too= whereby all colors added into other colors must be compatible w (with) every other color. 3] UIP tailoring according to: ups or customer's tastes; target audience's behavioral parameters. 4] See "designator". +-Style of outputted coordinated colors = uip= depends on "designated" color desires. Applications: greater or lesser color coordination or contrast (to catch peoples attention or create relaxed "mood" for "entertainment" or "educ" or "tgh").
Image Coordinator:
Imaging Compatibility: changes made to be (non) coordinating.
Sys "edits"/"cuts & pastes"; adjusts/coordinates existing/future sizes of shapes w (with) colors (to give desired / ["crawler" generated] appearance). R24-1 Image Coordinating Software.
4-4- R24-1 Image Coordinating Software: "Analyzes" for compatible colors / image texture / shapes / color intensity.
Analyzes and rates how well chosen colors are coordinated.
Generates compatible colors in output modes of "multi-colorer" and "crawler". Applications: analyzing photographs, graphic art software (limited color choices influenced by type printer or compatible software). -"edits" non-compatible colors/shapes -> eg: colors/shapes become compatible algorythmicly: --#l changing designated colors/shapes. Designated colors: those least compatible; using ups uip color preference chart, omitting colors closer to disliked spectrum (all together); colors needed to effect desirable results via "ba" / "uip", eg: uses yellow or red to catch peoples attention (in emergency / for "nr"). --#2 changing all colors/shapes -> eg: bringing them closer in line compatibility wise-> by adding / omitting coloring agents. -ARTIST:(system will select color(s) according to colors to which it must I match /[2: pr (program) / uip = SW (software) knows w5 to color coordinate, then does so (automatically)]. -user selects one or more colors, then sw offers (available) choices of compatible colors. -C SW D: color determinator (sensor, sensor = lens, color's "c" codes) = "analyzer" = s / printer -OTD D: This N Sys (image coordinator)
ACCESS (person must wear particular (coordinated) colors for access (entry, usage)) - copied to "access" 7.96; ANALYZER ; +ARTIST (sys fills in colors (after certain areas are done; adjusts/coordinates existing/future sizes of shapes w (with) colors (to give desired appearance as defined by graphic arts schools);
CAMERA (inputting of images ("cut 8c paste")-> processed ("edited" by this sys); CART (type coordinating sw); COMPOSITION ((automatically) merges graphic w audio composition); S;
EDUC (learn coordination, art, read up on past painters; guides/teaches u (user) if/when/w5 (colors) match); M (sophisticated sw, colors, coordinating analyzers); MULTI-USER (how each u likes their sw); pr (program) ; SCORE (how well coordinated: color, shapes, texture (2D or 3D*)); SENSOR (for colors); **SOUND
ANALYZER ; STATUS (sys judges its ability to do the necessary/requested task /judges what it did; shows numeric possibility of error); UIP ; +VISUAL ANALYZER. -2E251 Intelligent Monitor: uses sys (system) to better notice w5 sys (system)
studying/fol lowing. -R numbering Sys: because this KN has an extra digit (R24-1), its strictly a KN and doesn include existing N, yet the R24 of
R24-1 relates to existing N which is remotely tied to R24-1. -image's texture, defined: comprised of many/small/big dots of single/multi-color; substance image looks like (fabric, stone, shiny (metallic, plastic), rough (wood), cardboard, paper, (live) vegetable matter. -5G061 Dyslexia Software. -sw's ("guide") icons can be "edited" between different shapes: squared / rounded (circle/oval) / triangular (perimeters) w "color" w/in changed as "designated". + "access": ups "cart"/sw= must have designated shapes/colors= to gain "access". ln other words: shapes in= pr= of u (user) must have correct "image" parameters for= "access". Patentable? --level of ups sw= "analyzed" for compatibility= level of "access" given determined by closeness of compatibility. --accessors aware of this sys= may change their type images= within range of image that gave them some access.
R24 Paint mixer makes ranges of colors. -[Rock Paint Co 3-1-47 Himejima, Nishi-Yodogawa-ku, Osaka 555 06 473 1551 15 Feb 92 NK] -D: cart (cartridge) - c- container for different elements for painting =
mixer = paint transfers to dispenser = dispenser (brush/spray/**drops paint(inserts paint into containers user can remove and use as (fresh) paint) = paints surface = surface. -paints different shapes, textures, thicknesses of paint, etc. according to programming (pr) / user instructions. -system analyzes the texture/surface onto which it will paint, and in tern determines the best chemical mix to (stick and stay on for desired period of time) and thickness and number of coats needed. surface analyzer (scrapes surface = tests in its lab; "camera" = "visual analyzer"; user "k" type surface and any other information (whether indoor / outdoor; temperature parameters year round...) -OTD:
ACCESS **:(ranges of colors possible restricted as well as any access); CAMERA:(studies (existing color of environment) to determine best color to mix); CART *:(pr; inks; paints; chemicals; scents [mix w (with) paint]); COMPOSITION *:(automatically paints according to signals from sound analyzer - D: sound = sound analyzer = R-24 = painted surface); ENTERTAIN:; MFH:;
MULTI-USER*:; NOTIFIER:; OSC:; PR:; Color PRINTER *:; PS:; Q*:; R:; S:; SCORE:(tds); SYNTH:;
TEL:(tr); UIP *:(color combination according to uip of target audience/user and or according to desired effect (according to uip of target audience, eg: maybe best color to increase productivity in blue jean factory workers in Thailand are light burgundy painted walls)); WA:.
3C-210 Color Selector: (older KN?) -Point device at anything, and its colors are altered or dissected, eg: something green can be divided into yellow and blue; or changed altogether, eg: to white, pink or brown...
(D) Drawing: "Artist" (Color Coordinator or Selector) / Artists "Edit"
R24-1 Image Coordinating Soflware/ (Colored) "Image" output = C ((Color) "Analyzer") = "CRAWLER" (effects manner of coordinated color output) // "CUT &
PASTE" (each section can have colors coordinated differently, in other words the method and style outputted differ according to the section (all visible simultaneously on same s)) // "DRAW" (manner of drawing triggers differing "color" generating/coordinating modes) // "EDIT" (liow coordinated) "GUIDE" /I "IMAGE" // "MULTI-COLORER" !I "MULTI-USER" // "SW" !/ "WRITING INSTRUMENT" .
Hurdles to gain "access". W5: Manner in which following are coordinated: images; user’s behavior ("ba"); colors; shapes; W5 u accessed sys. + Sizing / Color / Shaping%: "Edited" as needed for compatibility. Eg: size of tree doesn exceed house size by two, and its fruit is double the size of door's front door knob.
Sys can alter shape of tree and or its fruit in differing fashion. *D: "cuts & pastes"= then "edits" accordingly.
End "Coordinator" = "Artist"
+ "CRAWLER" = Externally controlled image creating mode crawls across screen. Also functions like an organism crawling across images leaving altered visual effects in its wake. Differs from multi-colorer whose movement is controlled by u. -%crawler can be in form of cart / S W(software) (inserted into function / mode / sys (system) / sw / c) / icon or "interactive image". -D Algorithms: previous image's characteristics (fl) X crawler (f2) -> f3 X any other variables (time, additional input given crawler (by u)) -> synergized function (f4) -> altered image(s) -> time pause > last image can be re-"edited" (into something new / repeating related algorithm) --each 'f = function: has hidden codes. These codes are hidden in that they don't (necessarily) relate exactly to the image shown; but influence: subsequent "crawler"-type events.
Read Later (D) Drawing: u (user) = This "Artist" System - C(computer)
COLOR (chooses what colors appear when and how (w5)) // DRAW (crawler itself decides how it will draw / "edit" // GUIDE (u may "guide" crawler. Though crawler may choose to ignore requests from u.) // MULTI-COLORER (what crawler does too) // MULTI-USER (each crawler can be considered a u (user) in this circumstance=
resulting in each crawler "editing" images each crawler generated, or each crawler can alter other (living) crawlers)
WRITING INSTRUMENT (crawler takes form of any writing instrument). -See additions to "Crawler". Was in file: k\ar\IMI& in 7.96.
Hurdles to gain "access". W5 Crawler is utilized via one or more of following: -U attaches their key or other related element to the correct crawler which takes them through the hurdles, though u (user) may be required to take "designated" actions controlling crawler and or anything in its environs W5. -Crawler must be reprogrammed as "designated"= then taken on (one of) the path routes it's designed for according (according to type application / access= desired). -W5 how u (user) controls or reacts or creates crawler (virus*) in any manner: "game", "artist", "access" = "order & timing"+, "crawler"="cart". -see "game", "game" = "crawl" "crawler" knows W5 (what, where, when, why and how) to get u (user) to desired point of access, saving u from keying in unnecessary strokes / information. Like an electronic bookmark: u selects which bookmark they want crawler to take them to.
+ "CRAWLER'S VIRUS" = Crawler attacks other's functions. "Game's" opponent player's functions represented visually.
Crawler "edits" opponent's functions intern effecting their abilities. -An algorithmic function that alters function of whatever its designed to attack/effect; Virus is a subset of'Crawler'. -Also functions like crawler however the altered results also include functionings correlated to the attacked images. -See "Crawler". * Read Later (D) Drawing: u (user) = This "Artist" System Changes the abilities of other player's abilities in below manners - C(computer) =
GUIDE (how they can control their players/crawlers) !/ MULTI-USER
// SW ((partially) disables their ("artist") sw) // WRITING
INSTRUMENT (what it can/can't do).
"Access": How attacks hackers: Crawler seeks (via "analyzer")
W5 hackers are present in sys= attacks / disables hacker's: sys or (sw) portion thereof that technically allows u access, eg: erases needed SW (software) codes for pr (program) to get into sys during that or future attempts at access.
"CUT & PASTE" = Standard computer terminology plus more.
Cut out spaces into which images inserted: these images are: drawn in / previously drawn images /"camera's" photos / other (downloaded) images; fragment cutting / pasting shows up (randomly) over (pr) sequence of time.
+ VA (visual analyzer) seeks "designated" images= then "cuts & pastes"= as "designated" (by "edit"). SW's search and replace.
Applications: -creating collages; + compiling images w associated text of needed subject matter:
Asian feature faces; (portions of) password icons (w "designated" function). -"entertainment". + sys gives user a menu of images to choose from= to "cut & paste" as u (user) desires.
-Puzzle "Game": cut & paste omits sections of image / screen = u must guess what's missing.
Read Later D: u (user) = Artist" (Systems "Cut & Paste") -- C-- What is "Cut & Pastable" =
COLOR (colors but not necessarily the shapes or text) /I CRAWLER // EDIT // GUIDE // SW // WRITING INSTRUMENT. -"score" shows W5 / how often elements were used / viewed / "cut & pasted" before by "designated" u (user) for designated applications.
+ "Artist" automatically jazzes up what's cut & pasted: select "edit" mode.
+ Any function can be labeled w/ an "image": Anything representable as an "image" is cut & pastable. Any KN (invention) function (shown on its s). Eg: U requests VA (visual analyzer) to seek= then "edit"= all icons with features (parts) which are over 80% green, blue and or blue-green.
What's cut & pastable (w or wo "image" (parts) / other elements): any KN part, eg: "score"; desired uip elements (desired functions, portions of db influencing what uip determines as being desirable functions); parts (visual presentation or function) of icons. -"Artist" / KN Function type gained or lost: "draw", "edit", "writing instrument" ability.
Hurdles to gain "access". W5: "Merge" = "Artist's" = "Cut &
Paste".
-Lines where "cut & paste" cut determined by: how sw shows where images start and end as "designated". Eg: VA (visual analyzer) seeks: faces
hair or background), precut (blocked) images are cut in entirety.
"DESIGNATOR"
Colors, shapes or other images are utilized or "edited" to achieve "designated" result. System automatically determines via any kn "designation" criteria what needs to stand out / be "edited". Results in greater help to u: "nr"; what needs attention; "status"; intuitively user may know what "designated" changes mean, saving time from having to read text, look up meaning or have s cluttered. "Editing" mode selects: color, "coordinator's" (compatibility level), "crawP'. -form of Seek & "React": Though nothing may need monitoring or "tracking", or be occurring by accident or chance; sys (system) or u (user) wants "images" / (corresponding) %functions altered as "designated".
Patentability issues: how designation works automatically coupled w (with) the benefits.
Need for "designated" result determined by: "nr"; "uip";
"score"; "tds": shows deadline coming up; "analyzer"; "sensor" is triggered; creating designated "moods" for: "entertainment", "educ", "tgh", "mm".
Applications:
What needs "designation": -designing anything (house or N plans): certain colors/shapes are needed (to catch attention) wo creating an overall unpleasant shape/color/other (how u would use N= determined via ba) coordinated scheme; this coordination is such that the important colors stand out to the degree desired as well. --Eg: have orange [stop] button while rest product is in white or grey, but not dark burgundy (btirying the orange). -(automatically) gives same / related colors/images to each type of function (sw icon). Results in ups eye being more readily able to classify "images". --"designates" color according to "score" of function color is tied to. -"nr": gives "designated" changes to: catch attention. Eg: red is most serious crisis in department A, while lighter shades (pinks) are less serious in same department. Orange and lighter shades for department B of company. --"Nr" induced changes may only be temporary or in effect until problem solved. + Who did / is / needs to do what, why, where, wfien and or how (on sys): ("game") Who and W5 (was in ps-zone) -influences "mood" generation: according to W5. -Chemical indicators: SW (software) shows "status", "nr", w5 -"CID" / Text /"C" file names or icons: Know w5 /"score" of value about subject / caller. -Shows if something doesn belong where it is. Eg: customer's file in wrong sw directory; wrong chemical utilized= causing possible hazard / 7G indicators. -number of times someone "accessed" (which sections) of sys and
-how well material u (user) is seeking / reading / experiencing= matches their UIP. For seeing titles of internet articles. "Score" occurs via key word / subject matching as w/ Yahoo sw. -M / DB: "designated" u browses world wide web, and he or sys "scores" value of sights (creating bookmarks of "designated colors") for others 1 themselves in future "access" of such sights. Magellan internet sw's rating system. --"Scored" data used accordingly for developing UIP-DB. Colors let others quickly see how well sights were rated (by previous person / sys). --material "routed" to pertinent subject category files= on U's c
VA (visual analyzer) seeks -> "reacts": -"cuts & pastes": va seeks "designated" "images"= then: "edits" as "designated". Example: va seeks thru db (database) for "images" of masks= "cuts & pastes" the masks found= onto pumpkins= then changes and "coordinates" coloring into shades of orange and black for Halloween = --Next ->*: u (user) can next select preferred newly generated "images"= and: print them (onto stickers) / use them for labels for icons or "crawlers" or "game" characters. -Designated images attract characters / small "images" which look different according to what character is there for: --Labels subject: va seeks negative "images"= then places "game"=character "image"= next to negative image. This nr character is different according to what it is nr / "designating". * Eg: Character is a: dog when labeling security or "access" issues; baby when labeling toys or thing for babies; red stop sign when labeling most important cautions. --Character represents additional information of interest= as pertaining to what images character is near or pointing to. --designated images altered otherwise: to get attention, eg:
circled / color or size changed. -"Sound to Visual Converter" - Old KN. Eg: bar codes conver "Routes" designated images to: files organized by: subject category, "score", "status", "uip"; u (user) needing image (according to uip). --(sys seeks and tr (transmits) designated (uip-tailor, "visual analyzer") images) -SCORE (how closely each image (sys can "analyze") comes within desired image's paradigm) -> sys (system) "reacts" w/: greater or lesser "editing". -Image db (database) Searcher: VA (visual analyzer) scans db (database) / world wide web for "designated" images ("routes" it and any attached text / page / web sight text / other images) to= "designated" file.
D: "Artist" / "Image" output = C ("Analyzer" seeks following (according to W5 (what, where, when, why and how) criteria)->) "COORDINATOR" (what is or isn't (poorly) compatible) // "CRAWLER" "CRAWLER'S VIRUS" // What was "CUT & PASTED" (according to W5) // "DESIGNATOR" (what / W5 altered according to "designator" / "edit") // "IMAGE" // What was created by "MULTI-COLORER" (according to W5) // "MULTI-USER" II "SW" // "SYNERGY" -> -> "Reacts" as "designated": "Edits" / Alters information or codes or images. (D) Drawing: S"'Images" / W5 / "Score" / u (user) / What part is/was (not) in operation =
Artists "Designator" - C =
ACCESS ; ANALYZER ; BILL ; CART ; EDIT ; EDUC ;
MULTI-USER ; NR; OSC ; PR ; PS-Zone ; Q; R
ROUTER ; SCORE ; SENSOR ; SOUND ANALYZER ;
STATUS ; TDS ; T(tell) ; TILT ; TRACK ; U; UIP;
VISUAL ANALYZER ; VR*; WA (walk about).
Misc: -Functions automatically, or u given menu of best choices ("guidance"), and or occurs while u (user) "draws". Related to:
"edit", "coordinator".
"Access" = "Designated" images: -Hurdles to gain "access". W5 needed "access"' passwords its images are created (password generation): "Designator" creates the needed password (or image representing password)= according to "designated" uses u needs. -Attacking hackers: Hackers' password images / sys are attacked ("edited") as "designated". sys (system) may also stop / make difficult for hacker's computer to subsequently gain access via: making it difficult for them to (re) create needed images for gaining access. --"VA" / "BA" "analyzes" how potential hacker's images (passwords) differ from "designated" criteria. -Each application (according to W5) needs differing "designated" images (passwords).
"DRAW" = Create image.
Paint; move computer mouse to draw image; "tilt"; brush on; selecting and utilizing "color"; * normally excludes taking picture via camera; crawl'; %"camera" takes pictures (then sys "edits"); color sticks utilized; multi-colorer; (sw) pen or brush; paint; rub (finger on "interactive" screen); "dance"; move "R" in fashion to create /*"edit" image.
Read Later D: u (user) = This "Artist" System: "Draw" - C=
COLOR /I CRAWLER (what crawler does) // EDIT ("artist" = "edits"= what was drawn) // GUIDE (helps u (user) draw) // MULTI-COLORER (way of "drawing") // MULTI-USER !/ SW (determines how ups use of "writing instrument" comes out) // WRITING INSTRUMENT (tool for drawing).
Hurdles to gain "access". W5: the needed shapes / colors are drawn; at what speeds images are being drawn (mouse's (average) speed) or time (duration) from start to complete.
"EDIT" / "EDITING" / "EDITION" _
Alters images in complex algorithms. Examples: "crawl"; makes colors or shapes compatible; "cut & paste". -Edit modes: "Cut & Paste" (sw, algorithmic function); % any change in function or effect can be controlled by u (user) / "crawler"
other non-user controlled modes. "Multi-colorer". -D: U (artist) -> "mouse" -> c ("edit") -> image output.
* 5A120 Camera "Editor": Take photographs which you can then edit on the related "C" system. -camera takes a picture which is shown on "C" system. This gives spark to the artist (studies show a majority of "semi-artists" are more inspired when they have such a scene to work with - it is more difficult to create art from nothing)
- add animated characters (user can find it easier to create them if they choose from 1. existing characters, 2. faces, bodies, hair colors, etc then "stick and paste" on "C". Characters can even be moving. -characters can communicate in written or "osc" form
+ "Visual analyzer": +- Seeks and alters "designated" images: seeks designated images / aspects thereof-> they are altered ("edited") as designated -> output: altered image(s). --seeks "images" via: "camera"; "db" of"images" (in m / c). -Camera's images are alterable as in "Guide": 5A110 Master
Artist. -"access": u (user) must "edit" images in "designated" manner.
Read Later D: u (user) ="edit" System - C(computer) _
COLOR (how colors altered) // CRAWLER // GUIDE (suggests how u may edit) // MULTI-COLORER (u may edit the pr (program) controlling how "colors" are outputted) // MULTI-USER (each u edits each other's images (in their own fashion or via own crawler)) S W(controls edit).
R57 "My Magic Diary" creates drawings from preprogrammed images to store along with phone numbers. Helps user remember people. [Casio, PS (positioning system) 10.931 -OTD:
ACCESS**:; BA;
CAMERA:(take digital picture of targeted person, and insert with "k" info about person); CART*:(database; sw); COMPOSITION **:(vocalized recording: user’s info/music matching each person);
ENTERTAIN:; K:; MFH:(uip->behavioral analyzer);
MORNING:((at alarm time) see pictures/images of people/events/etc (for things to do for that day; can be part of massive training program for many people); MULTI-USER*:; NOTIFIER:(alarm calendar: functions like "moming" at other times too); OSC:;
PR:; PRINTER*:; PS (positioning system) (see R58-10); Q*:; S:; SCORE:(# times user contacted such person; tds); SYNTH:; TEL:(tr; automatically dials tel number (when user places system by tel's receiver / system connected to tel via tr (wire))); UIP*:;
R57-1 Facial Image Generator: User selects adjective words to alter type face on software. Merges multiple characteristics.
Characteristic selection process requires less screen space.
Example, user selects: nose (big); -hair (blond); sense of humor; fat; intelligent; intern creating single preprogrammed image including all factors. u (user) saved from having to see all possible facial choices first. From Casio: "My Magic Diary" creates drawings from limited preprogrammed images to store along with phone numbers. Helps user remember people. -facial'images can be generated in connection to any type of image / information.
-ARTIST:(user’s keying in their view of person's uip (personality traits) effects facial images created: cut and pasteable elements effected; entire face can alter; eg: user says devilish->the first choices for eyes are narrow / strange ones; or sloppy/poor hygiene->slightly messy appearance (hair, clothing)). -characteristics to use for behavioral selection listed in personal ads (seeking lovers), as found in newspapers world-wide, eg: height (tall, short), face shape (long, wide...), eyes (big...), dishonest, devilish, body build type, age, thickness of eyebrows or nose or lips or biceps... -D: K (keyboard) = SW ( software) menu = selected choices merged = displays image (face) = image merged with: tel / address / written description of person / notes / *uip / *access -utilizes 57-2 -D: This N (invention) Sys (facial image generator)
ACCESS / ANALYZER / ARTIST / BVA ((t) voice -> bva = this n draws face (typical possible images from such voices, also utilizes any uip available, eg: via cal ler ID) = uip/m)/ C/
CAMERA (stores -> converts images (when behavior of person (is expected to change))/ CART (how alter images)/ CLAP (control sys)/ S / EDUC (learn relationship between facial images with behavior types: studies conErm relationships, though this is not politically correct, eg: people who are overweight, or slur their words are less likely to control themselves)/ M (database of potential images matched with all available information on targeted person, uip)/ MIC (voice analyzer)/ MQ / MULTI-USER / NOTIFIER (when trouble is expected (from person being watched/studied), eg: they look like they are about to act in desirable/undesirable manner. uip = nr)/ osc (outgoing sound communicator) /
PR (artist)/ Q (menu of choices, how to use)/ R(remote control) / SCORE (likelihood images generated (more by sys than u) are correct, based on database/analyzer (of past experience related systems had with such trials and errors, and as studied, coholuded upon, then inputted into c (by humans/c))/ *SENSOR / SOUND ANALYZER (t, mic). -type face generated= corresponds w/ "designated" subject matter or "mood".
613180 Photo Paints: draw onto pictures (color or black and white) with colors of your choice. Do while camera is in still motion, then with mouse or pen draw and or move around pieces.
Involves taking of picture before and or after (memory required) -developed pictures can receive wanted colors by applying special inks right on top of special or standard prints. -developed pictures entered into computer ("C") for future editing -add color onto black and white photos -replace all of certain colors with desired color
-SW version of: Correction Tape Dispenser: can be typed / written on. "Cut & Paste" on the tape. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Intel Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; p.9] -"Restricter": some "images" are pr (program) to be (fully) "editable" while others aren't (at all). -"Edition" = image after having been "edited".
End "Edit" = "Artist"
EDUCATE =
Guides users to draw better.
* 3E061 Motion Tutor: Guides users to improve their drawing movements, eg: guides how their arms move.
+"GUIDE" / "GUIDANCE" = Art Instructor. Suggests how user might proceed in generating "images". Useful for large sector of population.
Fill in colors in designated locations. System guides / prompts u for when / how (w5) they can create art.
Subset of: "Educ".
-Answer's user’s "Questions", so u (user) may better achieve
"designated" desires.
Instructs u (user) how to learn use of each "artist" system element.
Read Later (D) Drawing: U = This "Artist"="Guide" - C
COLOR (color choices / how colors are "edited") /I CRAWLER (how its controlled within crawler's limitations or temperament) //
DRAW (how to draw (within "designated" desires)) // EDIT (how utilize edit) // MULTI-COLORER // MULTI-USER // SW (controls "guide") // WRITING INSTRUMENT.
5A I 10 Master Artist: make master pieces similar to masterpieces. Select painting desired, and electronic device will help guide user in any one of many methods. Incorporate different parts via selections and or drawing.
Guiding methods: -outlines each color area, remaining left blank, allowing user to ad their color choice(s) and different shades. User might select from suggested choices, the first choice made then influences the option available subsequently (color coordination) -outline drawer: when making the outlines, the mouse or joystick is completely restricted, or gets a bit more difficult to maneuver when it goes a bit far off required lines - hence guides artist. And or, a light goes on showing level at which they are on course, eg a green and red light, and maybe even a yellow light. "C" or user may designate which lines they are attempting to draw so "C" knows how to help guide it -abstract art and related: make wild brush marks, and only those that fall within the programmed parameters make it into the art piece. Eg: ink is like metallic powder which only sticks to where the magnetic areas are found
Guidance: tgh, educ. "Restricter": "Guides" u (user) with restricter. Form of difficulty in maneuvering is one form of guidance.
Technical: artist can see their creations directly being made onto screen or paper. Later printer might transfer screen image to printer. Prints in color; black and white (with different shades of black)
-H-Non Electronic version: mechanical device might guide the pen/brush/pencil/etc. w/ or without artists hand actually being used at time. Artist selects colors. Writing instrument can be stable while paper moves, or visa versa -"tilt": controls sys' functions, its r= paint brush. -Filling in colors (for "Crawler"): "Coordinator". --develops/colors (preexisting) shapes (as in filling up a coloring book): 2D / 3D / circles / squares / dots / balls prisms / dots -> changing into 2D or 3D images. --5A110 Master Artist:
+ UIP ="Guide": sys (system) suggests forms of art generation. Sys knows UIP data via: "va" past "images" u created; menu of preferences chosen by u: "image" types ("colors", shapes, *sizes, type "coordination" (compatibility). --. D: "Image" output = C ("Guide" / UIP-"analyzer"-"va" / asks
U Q / ups art generation "ba") = "COORDINATOR" // "CRAWLER" // "CRAWLER'S VIRUS" // "CUT & PASTE" // "DESIGNATOR" // "DRAW" // "EDIT" // "GUIDE" !/ "IMAGE" /! "MULTI-COLORER" // "MULTI-USER" "SW" // "SYNERGY" I/ "WRITING INSTRUMENT".
Hurdles to gain "access". -Sys teaches u (user) how to develop / use password (images). -Hacker "reaction": upon sys (system) "analyzing" presence of hacker, it will (suggest) a "guidance" tutorial that gives (partially) correct / incorrect information to trick hacker.
Art Instructor: "coordinator" = good art /"images". -see KN's: Music instructor %; + Dyslexia's Writing Instructor; + "Educ".
"IMAGE" = Picture and or its colors.
Graphic(s); something drawn (by u); % sw icon; line(s) / dots / other graphic fragments ((made to) compris(ing) more complex image). Images can be made "interactive" for touch screens.
Chief definition excludes text, but can be made to include text depending on embodiment of invention. -Comprised of "colors" / shapes that can be= "edited". * Read Later D: u (user) = "image" -- C(computer) =
COLOR // CRAWLER II DRAW // EDIT // GUIDE !I
MULTI-COLORER // MULTI-USER // SW (forms/stores/edits images) I/ WRITING INSTRUMENT.
"INTERACTIVE IMAGES" _
+ "Interactive" "Images" for computers or interactive screens: u / sys can create "interactive" touch screens w/ its needed "images". Generated images (icons) have functions triggered according to how they are touched / activated. Interactive images can be made for and utilized by any KN's S, and control "designated" functions. For 1D-010 Adaptive Design System.
Each "interactive"="image" is like a key or key stroke w/in "K" or "R". Design and or control any product's functions by pr interactive image's functions / image (how it looks and feels).
Programming interactive images simplified: Process becomes more of an "entertaining" designing process. u (user) (who may not be programmer) can generate interactive images by "drawing" ("cutting & pasting" subset images= representing features (parts) of entire function scenario).
UIP: Menu of function options based on UIP-DB. Manner in which functions are carried out effected by UIP-Tailor.
"NR" / "Score" /"Status" : Are built into interactive images or corresponding images. Their differing / changing values= represented by "designated" "images".
Image types: Multi-faceted icons comprise numerous (unfoldable)
parts each being a representation. "Designated" images= represent correlated functions. Shaped in icons or other images commonly shown on (touch) screens= for representing: functions / directory and files (text, "image", pr) / data / web sights. --Other images as used by: Microsoft, Lotus, IBM, Apple,
Barlund, Octel, AT&T, "Billing" (banking) institutions,
Surveillance and access control ("Access", and "Track") related companies; "MM" companies. Other companies and research laboratories in and or dealing with: ACCESS ; ANALYZER ;
BILL ; , cart (cartridge) ; EDIT ; EDUC ; NR; OSC ; pr (program) ;
PS-Zone ; Q; R; ROUTER ; SCORE ; SENSOR ;
SOUND ANALYZER ; STATUS ; TDS ; T; TILT ; TRACK
UIP ; VISUAL ANALYZER ; VR; WA (walk about) . -Icons are two / three / four / five+ dimensional. "Designated" parts can only unfold / be present (seen / functional) when icon or part is manipulated: turned / moved (to another ps-zone w/in sw (file)); be handled according to any ("access") W5 criteria. "Interactive Image" Synonymous Terms: -Icon = "interactive image" or "K" or "R". Icon / its parts tie to= "designated" functions. -Function = What u (user) / sys (system) desires (to happen). Functions are tied to icons.
Futuristic: Three dimensional "images"= move hand / instrument to (nearly) touch the interactive image. Eg: "interact" with front / side / back of image= each side having different "r" characteristics. Also: for simpler "interactive" touch screens. 30- Applications:
D: u (user) / "Designated" functions = ("interactive images") - C =
ACCESS: Need special icons: U (re-creates / needs) (uip-tailored / specially designed) interactive images.
Only u knows how to alter these icons. Icons (and non "interactive images) can only be activated ! created 1"accessed" w: right hw 1 SW (software)
cart / access.
BILL: design icons "designated" to the billing structure I type client / uip-client.
CART: u knows which cart (cartridge) is being used by corresponding "edited" icons. Carts can change icons / have or activate needed icons. + "image" = "access"' password. "Interactive Images" = click on image then ->: -get definition / explanations / answers to "Questions" / "Educational" session. -osc states related information -information given in "designated" language "MERG E" =
By combining multiple elements= system integrates / syngerizes them= creating a new "image" (barely) distinguishable from the original elements. Elements include: "images" and or their parts or functions. -System "analyzes" for a compromising where the middle of a road ' is taken. A type of balance between different directions, eg: if three files are merged, it takes 33% from each, giving preference to those elements causing the least conflict or poor compatibility with the other two files.
* (D) Drawing: "Artist" / Altered "Image" output = C ("Merge") _ "COORDINATOR" // "CRAWLER" // "CRAWLER'S VIRUS" // %"CUT & PASTE" // "DESIGNATOR" (what's designated is altered by the merge function / designator functions as a form of "merge" function) // "DRAW" // "EDIT" // "GUIDE" // "IMAGE" // "INTERACTIVE IMAGES" !/ "MULTI-COLORER" // "MULTI-USER" // "SW" /I "SYNERGY" // "WRITING TNSTRUMENT".
+ "MULTI-COLORER" = Same as crawler except user controls how crawler moves. -U has no/minimal control over output of color/images, but u controls where the output is made (where pen/mouse is moved).
Differs from crawler which moves on its own. +-see "Crawler" for all its functions with potential for u (user) to control where "writing instrument" flows its ink(s).
Read Later D: U =This "Artist"="Multi-colorer" - C(computer) _
COLOR // CRAWLER // DRAW (color output = multi-colorer)
EDIT // GUIDE // MULTI-USER // SW // WRITING
INSTRUMENT (color output = multi-colorer). -functions in any sw/hw "writing instrument".
Hurdles to gain "access". W5: -U's Multi-color (a type "crawler") needs to function according to "designated" criteria. -(Nearby / Sys) observers of accessor see / "analyze" function of ups multi-color= "react" W5 (what, where, when, why and how) u has: exceeded "access" / been determined as a hacker (due to wrong colors being emitted W5).
"MULTI-USER" = Group "interactive" art generation. Each user "edits" each other's "images". See "game". Each party generates own art whereby they can ad [or delete] portions of other's "images" (simultaneously). 613030 Multiple Artist: Done on same or connected computers. -Teachers, editors, and people down the creative production line can make future changes as well -Done via: modem, tel ("T") (regular or cellular), etc. -Each separate person's contribution may be tagged by: different color, or can be separated by any user (just single person's work might be brought up onto display ("S"), or a person's contribution may also be separated by the time or time period in which it was entered. Can also be separated according to type of item entered, eg: explain what was keyed in then have it delete all material afterwards, etc.
Read Later D: u (user) = This "Artist" System - C
COLOR // CRAWLER I/ DRAW // EDIT // GUIDE (guides each u to "interact" / preserve (sections of) other's "images") // MULTI-COLORER // MULTI-USER // SW (software). + Same sys can uip-tailor same icon for different users: ("interactive") "images" apply to all / "designated" /"multi-users". "Designated" functions of interactive images apply. Eg: same basic icon has five variations for each u= w differing visual representation / function. U can pr (program) icon to be so differentiated. -each ups needed (image) passwords differ. "REASONS TO DRAW" = Miscellaneous. + Gain "access". + "interactive images" -Generate desired "images". -"game" function (of player; to win): Creating images such as those of characters and tools. Create those images most likely to help player win, eg: biggest, brightest, placed in "designated" location (ps-zone) (in relation to environments factors (enemy's attacking / defending points or modes). -"educ"* (improve drawing / sw abilities); -"tgh" (creative therapy): % "Access": correct ups "reaction"= ba determines u= is a legitimate user. -increase ups creativity: see intercultural Engineering paper, and referrals to the paper. -make art
-"MM": other multimedia -utilize for applications in: "entertainment", "osc" mixed w/ images, "tgh", other KN (invention) utilizing (changeable) "images". * Other: help sys' uip better understand u (user) being studied ("ba"); create needed images/designs/image of kn; % compose: designs made are interpreted into sounds ("visual to sound converter"). (KN) product's design: external casing; images used in its sw. -"Entertain" (artist playing).
-Dyslexia Software 5006 1. -Any sw's needed imaging, eg: 'User "interface"'; icons; "Status": ups status= correlates w= how "images" they see= are shown on "screen". --Types of status "designated": length of ups usage of system; level of "access"; subject material u (user) is viewing/" interacting" w. --Values in showing status: shows people ("nr") who walk by ups status= such as for ups level of access; "Educ": shows instructors their student's "status" / "scores"; motivates u to do better= and get= better "scores" (from "educ" / "game" pr). -H---The changing image represent the status of the user. In other words, the Image Effects U's Behavior: (Subtle) differences in altered images influence u. Eg: they work harder to get better images due to its scoring; u (user) is more cautious (instinctively when colors are more yellow, red or orange).
Color change = "nr". UIP influences "editing"= eliciting better "response" from U / %sys (image -> va -> "response"). --"Access": level of ups access "scored" by type "images" appearing (on S / stored on files after they've been accessed). --"VA" treats u/sys w (with) "designated" images differently. Sys can treat u differently by their status or score, but via "va" is simply another algorithmic method. "RESTRICTER"
+2D100 Movement Restricter: Writing instrument movement controlled (via magnets or pr): Different levels of resistance and ease in drawing can facilitate creative inspiration for abstract art. -D: pen (magnet) = writing surface = magnets (below surface) -crawler virus infects writing instrument: crawler's' virus= having "accessed"= writing instrument= effects how instrument alters/creates images. The crawler / its virus function like the magnets in effecting how writing instruments moves / writes / functions in other aspects. + When (W5).pen movement ability changed: u (user) (in "game") goes up a hill or other difficult terrain; tds: time is running out; battery running out; "game": player was weakened by opponent; ("nr" for) "c" or sys (system) slowing down; type text or pr or color or image or UIP related material; "drawing" "designated" types of art such as one's signature may require a one to one ratio. --when multiple factors influencing movement occur (simultaneously) pen controlled by: averaged power, lowest or highest influencing factor(s). + Type effects: like "multi-colorer"= pen's movement's "reaction"= has (unpredictable) resulting ("images"). U can pr the preferred ratio between movement and interpretation.
Different "colors" emitted according to: the interpretation ratio
-sw I hardware (mechanical / el) versions (unattached to pc
Construction of writing instrument: "Mouse": the ball's stickiness changes (by break touching ball w differing degrees of pressure (like car's breaks). -physical movement by user is altered according to program. -different pens (operable simultaneously ("multi-user")) have movement interpreted differently. -ratio between physical movement of pen w (with) how its interpreted: ratio between (ups) moving pen= w how it translates on S has algorithm. --Eg: standard can be move 1 cm and S interprets at 1 mm movement, while slow down can have I cm physical movement and .2mm S movement, or pen can be empowered to show on S as moving Imm to p+ 4J050 Mouse Restricter:
Ease in moving mouse is restricted as a guidance system. Mouse's movements are harder to maneuver when it enters into undesirable area.
Hurdles to gain "access". W5 "Restricter" (can) function: -Passwords may alter how "restricter" "restricts"= (changing what can be accessed W5).
-Results / function of "restricter" determine W5 can be "accessed". "STATUS"
+ "Edition" shows status of situation: type subject matter / nr / "routing" shown by how images are "edited". Value: requires less text explanation cluttering- screen. See: IMI's "Score", "Status".
Examples of what "editions" represent: -amount of shadow shows how much additional information in db is available on the "interactive image"; color shows subject; multiple colors like blue and green or blue-green (mixed) show a combination of status' eg: subjects. -direction of shadow can show on which side or area (of s) u (user) can find: applicable information, icons, files. -possible functions of "interactive image". "Status" (D) Drawing: "Artist" / "Image" output / "Status" (of "artist" feature / how icon interpreted by (u)) = C = "COORDINATOR" Il "CRAWLER" II "CRAWLER'S VIRUS" 1/ "CUT & PASTE" /I "DESIGNATOR" II "DRAW" // "EDIT" /! "GUIDE" // "IMAGE" !I "INTERACTIVE IMAGES" // "MULTI-COLORER" /1 "MULTI-USER"
/I "SYNERGY" Il "WRITING INSTRUMENT".
"Status" D: U = / "Screen" / "status" (Anything that can be "designated" by these functions can have a corresponding "edition"; W5 part is being used)- C(computer) =
ACCESS (W5 is accessing); ANALYZER ; BILL (if function is being billed and at what rate (w5)); CART (which cart is used);
EDIT ; EDUC (what information can be learned (*W5)); MULTI-USER (who's using system W5); + NR (what needs attention w5);
OSC* ; pr (program) (w5 can be programmed); PS-Zone ; Q; R(remote control) ;
ROUTER ;+ SCORE ; SENSOR ; SOUND ANALYZER ; STATUS
TDS ; T; TILT ; TRACK ; UIP ; VISUAL
ANALYZER ; VR. "SW" = ("Artist") software; program. "sw"; "pr"; "cart"; "editing" program; crawl'; crawlers' virus; %multi-colorer.
Read Later D: u (user) = C(computer) = SW Controls / "Guides" 10 COLOR //
CRAWLER // DRAW // EDIT // GUIDE //
MULTI-COLORER // MULTI-USER // SW (software) // WRITTNG INSTRUMENT. -"designated" "sw" = "cart" / "access".
"SYNERGY" =
Synergistic effects of "Artist" parts:
Multiple parts can work together to create results different from what would be created had they functioned (more) alone. Eg:
Writing instruments: -Movement Restricter. Restricts: (automatic) edit mode by: slowing down / reducing available editable options, eg: "coordinator", "crawler", "cut & paste". -Multi-colorer: W5 (what, where, when, why and how) u (user) "cuts & pastes" determines resulting "color" / how images are "coordinated". -Crawler: "cuts & pastes" / "coordinates" along its wake. -Color sticks: insert into any writing instrument or edit mode.
Stick becomes primary or secondary... color (in color coordination schemes). Effects colors in newly created "cut & pasted" images. * Bouncy: controls how edit functions. ='synergy" = "access"
"TILT" = See "Writing Instrument".
Each angle of "tilt" correlates w (with) associated functions: type color; thickness or darkness of color. "USER" = Artist; drawer; user; tilt = "writing instrument". % person being effected/shown created images; % u being analyzed by "ba"; % u(user) trying to gain "access"; % observer (of images (being created)). -see "tilt" = "access".
+ Magic pen: KN. Can "draw" while in bed, bathtub, etc. +--shocks from moving automobile are not transferred to "writing instrument" / "mouse"= "sensors" judge "vibration" level from outside sys= and compensate when interpreting / "sensing" how "writing instrument" is "drawn".
"VISUAL ANALYZER" _ (With the absence of correlated codes) "VA" analyzes "images" (created by "artist")= and "reacts" as "designated". -Values: can save the need to write / generate additional codes (for what color is / stands for) - this saves human labor time in entering or creating the information, and space on computer, assuming the "image" /"color" are already there anyway. +-Patentability issues: when color or images represent = something= the VA (visual analyzer) is another (though less efficient) way of sys' knowing / tabulating ("artist's generations) wo the codes. +--"Access": Additionally this may serve as an "access" hinderance for hackers wo the codes nor "designated" "va". A new way to store c data. --suggests what subjects are missing via "va": subjects labeled by "images". -see "VA" = "Access"
"WRITING INSTRUMENT" = Mouse, stylus, "tilt". "Mouse"; "R"; (El) pen or brush; "Computer's" cursor; % "Crawler"; "Tilt".
5A130 Color Sticks For Computer Drawing Pad: Simplifies "C" graphics system for children. Child inserts plastic piece for the desired color. -Insert one of many colored crayon shaped plastic pieces activating the desired color.
-select the color stick you want, insert a third of the way into the slot, and move around this joy stick to create the shapes you want. For a different color, select another fun stick! *-use many colors in your picture *-can print out pictures *-base of device has other programmable functions -design with joy stick also [joystick might take color "inserts"] --system identifies the type stick via: small differences in shape at the connection point; or light, electrical, etc frequency emitted at the time it is plugged in. 0-one stick might have ability to create several or all colors. the color selector might be from a key board; or switches on the joy stick. This is simpler, yet maybe removed from the saleable idea of one color has one stick. -OTD: "S"; "C"; pp; mp; uk; mouse; interactive%; educ; toy; basic; entertain; exercise of creative skills; portable; sst; printer; "M"; bp; sp; alerter; osc; egh; score; tgh; md; cart (colors, graphic possibilities, how movements can be interpreted and altered, etc); ep; uq; pi%; character; clap. %-"Tilt": differing parts mentioned can also act like a r -"cart": item one might insert for getting additional colors / "artist" functions.
Manual version of"Writing Instrument" (for "Crawler"): -the ink flow-through parts of device can be: switched / replaced. This helps if a pure alternative color is wanted quickly; wear and tear; for cleaning... -this has both mechanical and or electronic versions
Read Later (D) Drawing: U="writing instrument" - C
COLOR // CRAWLER // DRAW // EDIT // GUIDE //
MULTI-COLORER // MULTI-USER /I SW .
Ink flow for sw / manual versions: + ink (looks like it) flows out through one/multiple sources (simultaneously). Changes in color happens (gradually).
+ ink flows out through (one) source. Changes in color can happen gradually/abruptly. Point of flowing out on SW (software) version is represented by an image: cursor / pen / brush / spray (can/nozzle) / finger /*tail / computer mouse [fully depicted on sJ /(rolling) ball / animated character (from its writing instrument) -* can have two or more ink heads working simultaneously, each with own or separate "brain" that decides when and how colors change. This allows creating of interesting rainbows. Colors can change at same or different times. --each side of pen has different color at one time -can have image of two or more ink heads working simultaneously, each with own or separate "brain" that decides when and how colors change. This allows creating of interesting rainbows.
Colors can change at same or different times. +3C-290 Bouncy:
How object is played with triggers corresponding signals.
Multiple "sensors" are activatable simultaneously according to the extent of pressure and or area(s) of object were manipulated. -How manipulated: Roll it. Buttons / Joystick ("Tilt"): press or rotate or bend or twist. All these actioris trigger art creation. In multiple shapes and sizes, eg: ball, rectangular prism, cube. Squeeze or twist: triggering signals according to what tiny "sensor(s)" where simultaneously activated (under the cushioning. Drop or throw: different levels of impact create corresponding signals. -Interpretation of manipulations: Differing (simultaneous) signal generations W5= corresponding result. Consecutive triggering of (same) sensors such as via bouncing can have differing effects (subsequent near time triggers). -SW Versions: ' Bouncy object is on s= u (user) manipulates it= w "writing instrument". --(standard) mouse: activates bouncy to behave (automatically) upon u triggering desired behavior's icon. Bouncy can function like a "crawler". -"Game": move character by manipulating bouncy (shaped as doll).
-Patentability issues: Similar to: "VR", remote control of robots. Maybe applications and unique signal creating modes are the patentability:issues. -like a puppet bouncy can be used to control any "R" listed control function. Examples: move a 3D doll. -Device transmits via wire or air waves -Insert different items, eg: plastic sticks, and move about when inserted. -D: Manipulate any object's "sensors"= in any way= and its resulting signals= are interpreted as "designated". related to 5A-130; reference to this KN made in "R". (related description probably included earlier). --According to type item inserted, different graphics created.
Receiving device identifies the inserted items by their: bar codes, "C" magnetic tape, shape... People can buy such additional pieces separately from the main unit. --Insertions might also have software inside it, or come with a separate software disk insertible into main unit -Ap: graphics generation, toy, acts also as standard "C" mouse; paper weight; decorative piece; can be in shape of interesting objects: doll, animal, creative machine, car, plane... -OTD: new type of Rubics cube; game; is "R" control device which also activates other household appliances and entertainment systems; "R"; "S"; "C"; pp; mp; uk; mouse; date; tds; interactive; educ; toy; all; game; entertainment; portable; printer; "M"; can be a small "C" by itself, with own "S"; bp; osc; vc; score; tgh; egh; md; cart; cp; uq; mq; access (for the fun of it); uip; character.
% 3C-310-083009 Disk Art:
Spinning disk lets user dab on colors to create wonderful art color shows. -Done manually with real ink -on "C" using mouse to dab the color.. --can also have spinning object (two or three dimensional) that get ink as they spin around. The three dimensional objects might also spin on their own access - like planets in universe.
--can have all (non spinning) types of movements creating colors -computer version lets people merge colors too...
OTD: "S"; "C"; mp; pp; mouse; toy; printer; "M"; score; egh; character. -sw version. -disk can start and stop at pr (program) times/speeds= enabling u to dab paint= so there's less than complete circle painted (like dashes). crawler' stays motionless altering image on disk= while disk= moves.
* R39-10 Finger Art: press fingers along screen to generate desired effect (images; commands (touch control screen): certain sections of screen can be for commands, other sections for other purposes: "s", touching to create images, etc) -bring up past images, then edit/alter via standard graphic modest: cut and paste; in/decrease size(s) -D: user = touches/keys in = s = c = printer/*osc/desired function -OTD:
ARTIST:; CAMERA:; CART*:; COMPOSITION *:;
ENTERTAIN:; K:(r*); MFH:; MORNING**:; MULTI-USER*:;
NOTIFIER:; OSC:; PR:; PRINTER*:; PS:; Q*:;
S:; SCORE:(tds); SYNTH:; TEL:(tr); UIP*:; WA:. -SW version of Revolving Receptacle: holds everything, eg: pens. U clicks= via "mouse"= desired writing instrument / "editing" mode. [Fidelity Products Co (Mail Order Co's Winter 95 Catalog - On
File), 5601 Intel Parkway, Minneapolis, MN 5540. 800 326-7555
Fax 800 842-2725; p. 9]
Hurdles to gain "access". W5 "Writing instrument" (can) function = "access".
Additional ways to play artist:
-"Restricter": electric cord of actual 3D tool can be represented by how far tool can reach around on S (as "designated" / so as not to negatively effect certain (important) elements. Tools wo cords are more mobile / w(with) fewer "restrictions". + Vacuums / Fans: Clean up unwanted (loose lying) scraps / elements w= vacuums. p77, 63. Especially for sub-images that aren't firmly fixed w/in larger image. Eg: va determines that loose leaves or paper or dirt on lawn can be blown away or sucked up wo damaging rest of image, and results in rest of (lawn) below becoming visible. (Then sucked up images can be: collected / "merged" for "cutting & pasting" elsewhere. + wheel barrow / pick up trucks = "cut and paste" (taking and dumping)= then u (user) must "edit" from there in more careful manner. p68. Paths traveled may leave interesting marks / "trackable" mark so u knows what was "cut & pasted" W5 (by age of track marks). -textile clothing / helmets (worn by "character" = *"game") protects them from: colors / "images" /"crawlers" (going astray (hence lose fewer points)). -heaters: makes (semi) frozen "images" / "crawlers" more mobile
I functional (up to its full ("access") abilities). p77 -screws / nails: the stronger the longer / W5 images are "*cut & +pastable". -concrete mixers: pour into (3D) molds created previously by U= making new "images". p79 -thermometers: shows "status" / "score" of images. p83 -tape measures / calculators: size of images (for "coordinator"). p83 -(metal) detectors = va's seeker: seeks "designated" images. -engines: empower of tool associated w (with) type engine used. p88 + Brush: "sensors"= on image input tablet (kn)= s brush strokes. % Also: brush may have material (chemicals / electro charging elements / small hard objects / tough bristles / wire) whose presence is more readily sensed by "sensor".
File: Art\ Ar-Write
ART-WItITE PART:
Software for teaching dyslexics and young writers how to write.
Image input writing tablet: -What user writes is represented on the "screen" after it was quickly "edited". -in other words: as u writes certain letters= ocr (optical character recognition) automatically "edits" "designated" characters. Enables writer to better read their material / see how dyslexics will read their material. + Writing instructor:
Teaches people to write correctly. Alerts for dyslexic or poor handwriting.
Saves from having to pay teachers to read material for corrections. -D: u (user) = "writing instrument" (stylus = image input tablet) = VA (visual analyzer) (optical character recognition) / "guide" = nr: whenever u (user) writes a non-standard letter, word, %phrase. -D: "Artist" /"lmage" output = C(computer) ("Visual Analyzer"/Optical character recognition / Dyslexic sw) +"COORDINATOR" (compares past w= present (written/read) errors -> UIP-Tailor
I"guide") // "DESIGNATOR" II "DRAW" (writing "images") // "EDIT" (what's written= is "edited") lI "IMAGE" // "INTERACTIVE IMAGES" // %"MULTI-COLORER" // "MULTI-USER" (has different "educ" program) "SW" /! "WRITING INSTRUMENT". -UIP-Tailor: System tailors itself in teaching student to write according to their poor abilities. In other words: this system "visually analyzes" student's errors= then develops UIP-DB= for
UIP-Tailor, so SW (software) tailors itself to user. -BA: handwriting "analyzer": [KN from A, B or C Dir] -> gives behavioral prognosis (possibly related to reading/writing problems). -Type handwriting taught in any language. For learning: non-dyslexic writing; good calligraphy; -See: + "Artist's" "Guide", "Artist's" "Restrictor".
Other troubles sw teaches: left hand writers who need to make their writing look as if it were from the right hand. +NR: Software shows how letters should have been written by superimposing the correct form in an alternative color over what was written. -ln other words: How sys (shows needed) correct(sions): in a different color= sys semi super imposes where the pen should have gone= wh ile showing what was "drawn".
-poor handwriting style defined as: if u presses too hard or too lightly (in uneven manner) = nr W5 (what, where, when, why and how) was done incorrectly; written letters too big/small/unevenly written; illegible (though VA (visual analyzer) might be able to read); too quickly written (hence illegible). -NR prompts slow writers / readers to go faster. "Score" beeps when u (user) is too slow. Rewards user when their writing is good via positive "mood" in forms of: osc, text.
US Patent Search Strategies: -str: (software* or program*) and (teach* or educat* or learn* or instruct*) and (write* or writing* or draw* or point*). -* US Patents: 4138719 4972496 5365598 -5486122 Autonomous wearable computing device and method of artistic expression using "game":
Educational devices using process-oriented educational methods are disclosed to prepare children for interactive/'adaptive keyboarding. The device includes sets of gloves and indicia applied C to fingers of gloves to provide pictorial representations of the keyboard.
File: Art \ Ar-Cause
PART: ART - CAUSE
What Is "Designated" As Needing "Editing" & Why:
Miscellaneous things that are "edited": + Numbering: Some numbers dyslexics may have trouble with: number (digits, eg: 3 versus 8,2 versus 7, 6 versus 9, 5 versus 6, 1 versus 11. .--Eg: left portion of 8 would be bolder than right side, and likewised for bottom of 2, and bottom left of 6; the digits of 11 would be seperated a bit more than usual and maybe each digit is made to look slightly different. Commas might be boldened, coupled with greater spacing between each set of three digits. -Time pieces: clock's tiine face: digital or dial [mark shows/reminds u, which side is right and left, * which top and bottom], numbers are "edited", or not used at all. --Other alterations: shapes of face or dial; their colors or textures. Make easy for children and dyslexics and sight impared. Each hour can have different shade in background. See KN's smell clock in 5J. + Color blind: helps teach color blind people to better identify between colors. Examples: text versus background colors are those giving reader difficulty; "games"/exercises test/remind u that red lights at stop lights are above the yellow, with green on the bottom; street stop signs are shown in colors other than red, so as to be more effected by their shape, and common locations on corners. --degrees of shaded differences (as experienced by color blind subject) are altered (over time).
UIP [User Information Programming]: System identifies what needs altering after having "analyzed" user’s previous behavior pattern, such as their errors on computer. This is an example of what portions of software that may be too difficult to develop for its earlier release versions. -"Edit" / "Route" locates certain terms of special interest to user based on
UIP = intern sys will highlight such chapters (w/in text's menu) / paragraphs / sentences / words / letters / image(s). -system decides (based on uip) which words are important for u, eg: "cherry tree" is marked in cherry red while remaining text is all one other single color (white, or grey, etc.), because reader operates an orchard or likes cherries. + User selects words they need help with: U develops file(s) comprised of text they have special problems with (above and beyond how their sw handles images). Eg: common word processing sw has ability for u to include new words for their spell checker, but this file is used as a seeker= then edits.
"Education": Difficult images are used more frequently= giving reader more training and experience. Via sw's thesaurus= words are replaced with other similar words (even if it can be slightly awkward). Alternatively, difficult images are replaced with easier images (if user is being over whelmed).
"Designating" which words need "editing":
System decides what needs altering to help each user according to their own problems. Software searches for designated letters/words (according to UIP / PP), then alters targeted "images" accordingly. -UIP: if system determines u is making certain mistakes it will "edit" "images" as "designated". --.Examples for how sys determines ups difficulties / "score": sw's spell check shows they incorrectly replace certain letters such as <Better> becomes <Detter> (when they type = K); UIP questionnaire / sw test: determines type problems U has.
Speed reading sw (KN) shows reader is slower at certain points which are what are (already "designated" as likely dyslexic) problems. -Possibly all difficult letters throughout text may not get edited to ease the dyslexic's reading ability. Only elements highlighted for whatever reason have chance of getting additional contrasting / highlighting for the dyslexic.
END MAIN PART OF ART-CAUSE
File: Art \ Ar-Crawl ART'S "CRAWLER" FEATURE
+<4, 4, 4, 3$(if hw n)> AR5-1 C310 Software Multi-colorer:
Device decides when to change color. Multiple triggers cause the automatic color changes. Screen color changes can also signify status of situation, eg: level of access' security clearance. One's "entertainment" abilities change according to extemal criteria: gamers characters; "composing"; "tgh". -In pen or "artist" software versions.
+ Causes: Externally generated causes for color changing: -"Score": U's "score" correlates w color mode. Type scores: "game"; grade given to their (previous) "educ" examination. --U's score color enables other players to know U's "status" which can include additional powers / "game's" character's abilities. Game characters of differing colors can gain or lose a notch in their color hierarchy if they are able to touch each other, eg: lower color gains a notch while higher drops a notch or dies. -"Access": ups access status correlates w color (on "s"). -whether u is a customer / employee / vendor / student.
Their level of value: height in organization / volumes sold or bought. -Punishment: sys punishes hackers by changing color accordingly for designated time thereafter hacker's computer is turned on. % Also applies to c of hacker in distant location. Poor "scores". -Danger levels: eg: yellow is more used when u is dealing w dangerous (ups location w/in "c" is where chemical / research accidents are more prone); sensitivity of information (level of secrets have corresponding color codes). -Subject matter: of db; type sw utilized. -D: U= This N Sys (causes for color changing) - C
ACCESS () // EDIT (type editing mode used by u/sys) // NR (type of nr = type color sliown) // PS-Zone (zone of applicable people/elements) =// *Q (type q u asks) // R (whether r is or isn't being used / of if activated) // ROUTER (how something is being routed) // SCORE () // STATUS ()
I/ TDS (timing of occurrence results in corresponding color) // T (whether "T" is/was used: if info was obtained from internet)
TRACK (type activity of tracked person/object/element/process) /I UIP (whether activated or not / if uip was used to achieve current scenario (q, information). Customized the artistic features.). -user programs or manufacturer programs the time interval between each color (interval can be in: writing time, time ink is sticking out ready to be used, amount of ink used, etc.); or decided by random (with a minimum and maximum period for each color) -time pr (date): user programs or manufacturer programs the time interval between each color (interval can be in: writing time, time ink is sticking out ready to be used, amount of ink used, etc.); or decided by random (with a minimum and maximum period for each color)
Subject matter: different types of information / db / functions have corresponding colors. Quickly lets u and onlookers know that general nature of subject matter. "S" can have multiple colors, each section/color designating differing subject.
-identity of communicator: person / company / department / country / male or female / age / level of seniority or influence or value. -suggestions for u: System "analyzes" possible interest (uip) for u to "route" himself into other subject matter, eg: additional ideas that are related to what u is working on; u should type more quickly (see KN: ups typing speed "analyzer" and= "nr"); time left for user to use system ("tds"). -know the day / time of day buy the color. -"game": winning/losing points results in changing of abilities/colors.
Effect (color) changes have / (Color) changes signify: "Game": Functions change. characters' weapons / weapons' type emissions change color and function accordingly. Each play / their character needs to adjust to the changes (quickly), requiring agility. Player can has one or more characters.
Examples: 1] Attacking Mode: red bullets kill then-> bullets change to blue and can only name other players -> requiring shooters to change their shooting and overall play/movement/offensive/defensive patterns accordingly; each player may have differing colors, changing at different times. If color changes occur wo prompting, player might avoid being far from defensive cover while there in offensive (red bullet) mode. -other attacking modes onto other characters/players: (temporarily): immobilizing others; changing their allegiances to attacker; activating (booby) traps; activating dormant attackers helping player. 21 PS-Zone - type barriers change: what it protects against; changing distance attacker needs to be from target to attack; location of barriers; buffer surrounding character where ever it is (though buffer might not be effective in designated zones (ps-zones). (Attacking) powers of characters change in designated zones. Color of zone can change. Character or their weapons change color resulting in= effect each zone has on. it. 3] Character's movement modes:
"Entertainment" D: U = This N Sys (Effect externally controlled changes have on designated functions) - C
ARTIST () /I BALANCER (degree to which sounds are from left or right side) //
CAMERA (direction camera is pointing) // CART (each cart has differing pr to effect changes) //
COMPOSITION / DANCE = (ups ability to compose altered, eg: each k/ sw icon changes its sound generating abilities) // DB-UIP = (sys brings up data as designated, eg: names of famous people; points in history of world or u; related facts) // + EDIT (u watches= sys alter images) // EXERCISE ()1/ GAME () // MD / MOOD () I/ MOTION SOUNDER
Q// MULTI-USER *
MM / MULTIMEDIA () // NOTIFIER () // OSC PS Q 1/ R() // SCORE () // STATUS ()
I/ SYNTH
TGHTILT()//TOY()/lUIP()//WA().
Image selector: "va"/"camera" brings up images on s for u. Images (periodically) flash up (inspiring ups creativity; giving related ideas). Examples:
-u is drawing (many) circular objects while in the "artists's" advertising idea writing sw program= then sw selects related images= eg: bubbles, balls, balloons, lady painting balls, girl in polka dotted dresses (with balls flashing)... -u drawing any images= then sys scans ups room in random fashion= showing images onto s.
"Edit". U ("interacts" w / "entertained" by) = sys alter images/sounds/(flashing) lights/other effects via: -u/sys pulls down scroll' over / clicks on image= which is subsequently altered according to designated pr. -all or portions (always) changing -how designated element(s) or portions are altered by: color; changing size of all/separate pieces/sections of screen; replacing portions; switching portions; slicing (merging slices w slicings from other images); empty gaps created (allowing u to insert images / draw within). -synth: changes according to uip preferred synthesizing mode(s). + Crawlers: crawler' alters image as it moves across image.
Image altering point moves about image in forms of: scrollers; -shapes of crawlers: big/small dots/blocks/other shapes; donuts; broom type images/icons; -how crawler moves: packmen (from late 1970's video games); falling / sliding objects/snow; toy vehicle's track marks; trucks dumping images at designated location(s); snake; any other mammaUreptile/bird/fish/insect/micro-organism/other moving organism; how plant grows (excessively); shadows or prints made by anything (KN image (generator)); "tilt"; "dance" -Influence original image has on subsequently= altered image(s): crawler extracts designated elements from original image, eg: changes circular elements to polygrams, blues to greens, dots to larger blobs, changes only shell / perimeter / center of original images. --both crawler's function and characteristic of image feeding into crawler both independently / simultaneously / synergistically= effect altering process. -Crawlers merging: --one crawler can= crawl upon= another crawler resulting in: a newly generated crawler / merging of all or some of crawler functions (to an exponential power) / canceling out of any touched/untouched crawler --like magnets they can +tend (via fuzzy logic) to attract / repel each other (in terms of chances theyl merge / touch). Other aspects effect abilities / chances of crawlers to "interact": type pr / ups moving around sw / moving of crawler (by sys / u). -Computer viruses: crawlers' crawl throughout designated pr / digital images / s, on designated computers / systems (of targeted systems). Examples: ---used in "games": attacking opponents' territories/functions/crawlers/attacking abilities/drawing abilities. Eg: aj player #1's crawler goes across / penetrates / destroys player #3's wall ("access" point) allowing player #1/#2 to more readily enter ("access") = intern doing designated damage (limited by crawler's functions). b] knock out opponent's "game's" computer system's designated functions. c] means of mobility (moving about pr / cursor): drawing / movement of crawler / speed of "game". ---"Access": crawler viruses' may: crack passwords; lock out those w correct passwords by accessing and in process change password against former legitimate users ---Box holding virus: player can open pandora's box for corresponding desired virus, though virus can attack opener if opening player isn't cautious or if opener has bad luck (due to crawler's being controlled by external circumstances). Crawler might have abilities to open these pandora boxes and be negatively effected as well. ---crawler is shown in color / osc mode how virus effects target, eg: targeted computer turns red (shuts down), or turns blue (slows down / limited functioning abilities). ---crawler can also function like other existing (harmful) viruses (but in playful "game" mode). Patent search str: virus* and (imag* or pictur* or visual*) and (computer* or software* or electr*) not (blood* or cell* or organ* or medic* or liv* or life) --Used only under legal circumstances Use this patent application filing as additional.grounds to punish malicious computer hackers! -Crawler D: U= This N Sys (each type crawler' (and its variable functions) controls / is controlled by) .~- C
CAMERA ((panning lens) sends images to screen) // CART () ll COMPOSITION ()
DANCE () // EDIT
GAME (crawler effects game functions, eg: attack modes / how player's territory designated or protected) II
MOTION SOUNDER (sounding device alters according to crawler) // MULTI-USER (each u generates/receives different type crawler) // MM / MULTIMEDIA () // NOTIFIER (how it notifies) // OSC (how it sounds) // PS-Zone (each zone effected differently according to type crawler and in what mode its in)
R () // SCORE () // STATUS () // SYNTH () // TILT () // TOY () // UIP () // WA
-pen / other writing instrument: functions like crawler'
Was 1 C-311: "C" version: The color of commands automatically changes color without prompting. This can be fun and valuable for the artist that likes making spontaneous, abstract art. It ads a new dimension to the making of art. -Can develop sw images of many types (to draw), eg: ball point, felt tip, lead for mechanical pencil, chalk, pastel, certain types of existing durable paint-like brushes, etc
Misc: -* NR: user is notified when color changes via: a light, click of mechanical parts, or sound; or sees color change
-manual version also: too expensive since market wants lower priced unit. -This can be fun and valuable for the artist that likes making spontaneous, abstract art. It ads a new dimension to the making of art. -Can be electronic device which changes the color of ink (ball point, felt tip
--* lead for mechanical pencil, chalk, pastel *-certain types of existing durable paint-like brushes -related to: 1 C-31 1. user is notified when color changes via: a light, click of inechan ical parts, or sound -user can also request when a color is to change -device uses single colors, and or blends desired colors as user selects
D l: SW Version D: 1 u -> 2 c(cart) = 3 sw = 4 pen / 5 altering images / printer / m / uip = 6 ink / 7 creating images.
D2: SW (Software=C) D2: 1C310 Software Multi-colorer = +ACCESS ()/ +ARTIST ()/ CAMERA (c imports (and alters) images from (attached) camera / digital data of images on disk or via tr (from m/cartlsw))/+CART (sw: imaging abilities; database of images)/ *COMPOSITION (images (created) -> converted to sounds (ose). Sounds (created/imported via tr or cart) -> converted to images. Images/sounds can be altered at any step in the flow processes.)! DATE (tags files; date is one of the elements that influences sw's analyzer (w5 colors change (automatically)))/ S ("interactive" touch screen; c=s=sw adjusts to type s in usage, eg: better visibility)/ EDUC (increases creativity; see paper titled "Intercultural Engineering" and other material on increasing creativity; helps u loosen up (their creativity); helps user try new things / helps user feel experimental / helps user let go / lets user enjoy surprises; helps u try to control their thought process less; merging of sw/graphic modes. Creates an interesting transcending beyond the predictable' mode sparking creativity.)/ K(control sys/pen)! M((image) database)/ MIC ()/ MO ()/ MOUSE (pen)! MQ ()/ MULTI-USER (preferred style (uip) of u lets sw better tailor to each's preferences)/ NOTIFIER (pr amount of time before color changes or other occupance happens; if quality of work may be of poor quality and or difficulty in printing out; lacks enough ink of particular color in cartridge before u: tries to print / expands image)/ OSC (nr)/ PR (artistic style, eg: u prefers water color / oil / Rembrandt / classic / collage ! abstract mode(s))/ Q (help menu)/ R (pen: while in bathtub/car)/ *SCORE (quality of art = visual analyzer; for test purposes; for psychological testing or uip)/ SENSOR (level of pen's (stylus, pressure on key pad (k)) pressure)/ SOUND ANALYZER ()/ SPEECH ()/ STATUS (# images (in database/completed))/ *SYNTH ()/
TDS ()/ U (artist, observer%)/ UIP (data collection; personalization)/ VISUAL
ANALYZER ()/ VR* (draw while in vr mode)/ W5 (uip; personalization of sys (uip)).
-Footnotes: display ("S"); "C"; pp; mp; uk; interactive; each color when used triggers a different sound, blended colors blend the sounds; educ; toy; all; entertainment; art exercise; portable; bp; vc; egh; score; tgh; md; cart (colors, sounds, functions...); cp; uq; character; according to type sound the color generated changes.
- US Patents - 12.95 bib disk: -str: (pen or pens or pencil*) and ink* and color*
% US Pat: 5412021 5411344 5376958 5368405 5352051 5306092 3552867 -str USPTO's WWW 1977-6/96: (image* or pictur* or color*) and (software* or cornputer*) and (chang* or random*) and (draw* or point* or brush* or gam*) not (data or document* or simulat*) -Image(s) that can change color(s). All or designated parts of: drawings / "camera's" pictures / text. Sys can effect colors on all of or part of: "s", printings from "printer", data transferred to: floppy disk / another "c" or
Writing instrument: -width(s) changeable for: crawler'; what is being drawn/changed. -US Pat 5325110 Multi-control point tool for computer drawing.
Benefits from changing colors: -others (co-workers) know the level of access given u, hence easier to catch hackers w excessive access.
The color change triggering effect also causes following occurrences: -"OSC": diverse sounds. Different sounds connect to differing triggering factors.
+"Crawler": "Cut & pasted" element becomes a "Crawler": Alters what or W5 it touches or "interact(ed)" w. -This is one method for creating "crawlers". U selects from menu of possible crawlers= cuts & pastes= then may "edit" "crawler"= to function as desired (by u).
END - PART: ART'S "CRAWLER"
File: Art \ Ar-Educ TEACHING PEOPLE TO READ (NEW VOCABULARIES)
File ar-educ
Software for teaching the young to read: Helps guide readers into more and more difficult text. The purpose being a gradual introduction to more complex text, saving the teacher's time. (Patent searches on application for young children not conducted.). Also see "Education", and Encapsulation, and
Speed reading.
Our soft.ware scores the user’s perfomance, and adjusts itself to the user’s improved reading skills they've picked up by using the software. For example, it will stop accentuating certain new words the reader has learned.
+ Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house adjacents the word Shouse'. Picture can be same size as (large size) text; or number next to word matches number next to picture elsewhere on screen or printed material. -system learns number of times user has come across such words (on the sys). --system or human teacher allots # times of viewing text balanced with complexity of word. -Weaning: After designated occurrences of said word / concept, pictures may no longer appear (weaning reader off assistance).
D: (Young) reader = "Artist" / "Image" output = C ("Analyzer") "COORDINATOR" () // "CUT & PASTE" () lI "DESIGNATOR" () // "DRAW" "EDIT" () // + "EDUC" Il "GUIDE" () // "IMAGE" () /I "INTERACTIVE IMAGES" (} Il "MULTI-USER" (} // "SW" () II "SYNERGY" /I "WRITING INSTRUMENT" ().
Pat search strategy: -kw: dictionary, word's defintion -str: (software* or program*) and ((definition* or learn* or educat* or teach*) near9 and read*)
US Patents: Programmable question and answer device 4118876 *; 4579533 Method of teaching a subject including use of a dictionary +; 5180307 5218537 3999307 5421731 Method for teaching reading and spelling 4083120 4138719
File: Art \ Ar ReadHelp Intro PART: ART'S READING HELP SOFTWARE 5G061 Reading Assistance Software: This file is a subset of the file titled: "Artist - Edit". <3, 3, 4-pat-swversion, 1.5-mk, 3>
General Information: + New words receive special "editing" attention: -What's designated: Sys seeks words which are "designated" according to: subject; newness (to u, field of study (new idea)); difficulty u has had in past occurrences as "analyzed" by (testis) "score"; what u or his supervisors determine he should learn / "interact" with (for more experience, "educating" himself (in its multiple uses and contexts)). What "educ" /"router" / "mood" / nr: "analyzes" needs learning / attention.
-Wean user off this editing after they've seen word designated number of times. The more characters in word / type subject determines number of times u reads it in "edited" form, w/ eye catching modes diminishing each time they've read or written it. -However, the level of special attention can be varied, or non-existent. -User can at any time point click on the problematic word or "encapsulated" paragraph and view corresponding picture. In such case, the sys (might) continue to show picture for such word certain # times more. -this learning to read application is simply an example of how sys tags (UIPdb, matches) certain material (words), next "edits"/alters it accordingly. SW search and replace. sw has (invisible on s) slot in which image can appear / change. -click on image to get: osc verbalizing what picture or text represent; video program; any other system triggering one of ups five bodily senses (see kn).
+ Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house adjacents the word Shouse'. Picture can be same size as (large size) text; or number next to word matches number next to picture elsewhere on screen or printed material. -system learns number of times user has come across such words (on the sys). --system or human teacher allots # times of viewing text balanced with complexity of word. -Weaning: After designated occurrences of said word / concept, pictures may no longer appear (weaning reader off assistance).
Weaning:
Weaning User off of the reading assistance system. Like leaming to bike first with training wheels, then they slowly removing the extra help.
-the accentuating modes of designated text, might be reduced over time. This reduction can apply to all / most difficult words. --"Designated" words w/ good "scores" showing reader doesn have (much) trouble can be weaned more quickly. -weaning off process is controlled: automatically or by u/ by guardian (doctor) or teacher or uip*. -if user is having a bad day [difficulty reading], they can alter the degree I type of differentiation sys makes for (previously / newly) designated text / other problems. -(In normal text) images might be boldened or underlined, herein the same can be done, with additional changes to its shadows, etc. Replaces other "editing" modes.
Sporadic Changes. Problematic letters are sporadically designated differently from remaining letters/words/text. Examples: every third problematic letter so handled; special handling handled via random (sw) process.
-same type problem might be designated differently in different=times/situations. Eg: confusions between letters b and d can be green versus red; and at other times white versus black. -TDS: differing days problematic letters are represented in differing colors.
Value: user doesn expect difficult letters to always be so represented, eg: for reading newspaper, etc. where such assistance baggage' may not exist. --sys helps wean u off of the assistance sw. -helping wean u off of this n: any difficult letters/words might simply have differing typeface or color, so there are two modes, normal appearance and second appearance which isn't different vis a vis the other difficult letters/words. Helps u to be extra careful when coming upon potential problem. -the window size [via which text is read] can be made as small or big as desired, while any of other features can show up within this window on S. 5G060.
Exists:
Dyslexic's Software: All it does is highlight one word or sentence at a time.
If reader has trouble, it will verbally (osc) announce it. Existing product called: Click-Reader from CAST for US20. -if word is in larger print (headline)/italics, it will read material in louder voice. -Click-Reader: Reading template for any text and pictures. Includes customizable auditory supports for decoding, visual tracking, and organization. -manufactured by: CAST - Center for Applied Special Technologies. 508-5318555. 39 Cross St., Peabody,
-Related patent: US Patent No 4875432: color on "score" board changes when the score is tied in (volleyball) "game". -(The level of "score" / "status" effects the type of color change found on
S/ Nr of any product / sys; eg: 7G)
Software showing nature of situation simply by way it's edited, saving screen space from excessive text. -Also see the seperate file + "Artist's" "Status". -Nature of problems represented in how images altered: type of dyslexic or young reader's problem shown by type "edition".
"Score": -"Educ": system can have timer and or other electronic analyses for how user’s reading skills are improving, eg: ability to read or write correctly; speed of reading. --system may force/suggest user to speed up reading / increase window size when their "score" improves. -How "scores": when u deemed (not) to have made error= sys= nr.
US Patents: Search Strategy: dyslexi*. Up to 8.96. Searched db via key word of full patent text.
Understanding user’s problems.
D: "Scoring" -> UIP DB Development - UIP-Tailors SW= for reader. What's scored and (W5): "Scoring" levels / types of user’s (eye / cognitive /reading) difficulties; "BA"; "educ's" "score"; "status". Related patents follow: 4556069 RE34015. 4706686-4421122 4408616 4407299 5474081 4528989 4706686 4889422 2838681 3842822 5067806 3952728 -Following are comparatively maybe less pertinent: 4216781 5048947 5331969 3893450 4030211 4735498 4102564 4211018 5260196
Teaching methods:
Ways of "editing" / helping (+dyslexic) readers: "Educ" / "EGH" / "TGH".
Related US patents follow: 4379699 4979902 536093? 5336093 5543867 3906644 4007273 4764973 5114346 4123853 4090311 4770635 5366377 4354843 4643679 4747682 3955564 4007548 4708567 4961640 5328373 5451163 4940346 3828316-Character adressing in a word oriented computer system. -Following are comparatively maybe less pertinent: 4136361 4661074 5145377 5312257 5421729 4351831 4346085 4346084 4479241 4456598 4430330 4636494 5253799 4498080 5315668 4021611 4089126 4498869 5360438 5302132 5387104 4592731
END MAIN PART OF ART'S READING HELP SOFTWARE
File: Art\Ar\ReadHelp*
LESS PERTINENT INFO TO UNDERSTANDING INVENTION
Introduction: Search and Replace / "Edit": -User programs (pr) how software will make the desired alterations (nr). -Software searches then alters particular words causing problems.
Editing is customized.
There is a plastic version of this electronic software driven invention. This plastic version can be of plastic, or its functions represented in software as well. Details:
Software/Plastic versions of Guiding window 5G060: -Examples: see just one or more letters, words, sentences, paragraphs at a time. -window can have clear and or changeable colored see through plastic. Certain colors backgrounds can enhance reading and or increase comfort
-certain shapes and or letters in the cut-out areas can be shown, if helpful_
Eg: user has trouble differentiating between "b" and "d", so the top of cut out (blank) area has one or more "b" letters and the bottom has one or more "d" letters. User can refer to them whenever they need to better remember their distinctions. *-construction of plastic and or cardboard. Square's window size created by adjust from one to three of the sides.
System Analyzes Reader's Speed Via: -eyeball "analyzer": watch eye movement, each movement represents: a letter, syllable, word, word group; mathematically calculates via (triangular) configuration what eye is seeing, via its position to the shown text (s). -reader hits key as they progress by: *letter, word, sentence, paragraph*. -user scrolls text
Patents & Patentability:
Software signal processing is the patentable issue to some degree. -Simple version (Mechanical): placed over printed text. Can scan by hand over written text by hand or el. By hand version less patentable? -Pat Search: need to check the modem capabilities of devices available for assisting the partially sighted to read.
PATENT SEARCH Strategy & some related US patent numbers: 5G061 Dyslexia Software: Q. Str: dyslexia* or dyslexic* -Str APS 69' to 6.92: dyslexia or dyslexic: --US PatNo's: +538880 Shows material little at a time? so reader moves eyes minimally. --83'-86': + 4379699 improves reading efficiency, increases light contrast.
However my invention changes color in respect of adjacent letters. Whereas the existing patent increases intensity of letters vis a vis the environment. --+ 4979902 Dyslexia reading device 1990: restricts field of vision. However this may not stop my sw version of vision restriction. 5421729 Color coded catalog and sales method %; 5420653
Method and apparatus for amelioration of visual stress and dyslexia *.
Miscellaneous: -new sw codes are used for "edited" "images". Both the sending and receiving ends may have abbreviated forms of interpreting these differently altered "images" to speed transmission via: modem; cart. -sw version: info given electronically: scanned / on-line / cart (floppy disks, cd) -> sw converts text -> s/ printer. -Software uses simple version (5G060) too. Combine with product 5G070.
-this invention number was cut out from and a subset of 5G060, then changed to
-Software version too. D: sw = c= display (desired effects and 2D (or 3D) images). Has same and more functions than the mechanical version.
Diagram of plastic version: -Dl: flat (on electronic) version:
The graphics printed onto the card is on the outer perimeter. The inner perimeter is the see thru area. The bars across the middle show a possible position at which the window is partially closed with colored opaque material (can maybe still readily read thru it). The sliding door (comes from the bottom). -colors used in the opaque shutter / any window (1) cover; plus the colors for the outer perimeter can be chosen by psychologists/dyslexia experts/u, according to the color(s) (combinations) that show best results / preferred
Second related diagram:
Notes: The diagram has big square, with smaller square within - labefed 1. 1=cut out window; letters b & d are printed onto outer (non-cut) area, above/below/to side of (reading) window. -Epilepsy and Parkinson's have similar symptoms to Dyslexia. Hence these products mentioned as helping any one of these problems can be applied to helping the other illnesses. Eg: via altering the way in which they focus their minds.
OTD D: This N Sys (dyslectic's sw) - C
ACCESS ("behavior analyzer" studies (reading behavior) intern: only allows those w (dyslectic/unusual) reading style to gain access); ANALYZER (sys adjusts its modifications according to ups needs/behaviors/uip/pr); CART (reading text, sw, multi-media effects, uip, access); EDUC (improves reading, study habits, speed reading); M (text, uip, access*); MULTI-USER (each ups differing reading needs met);
NOTIFIER (when reader not reading fast enough / as needed); OSC (); PR (how
SCORE (speed, tests memory retention of read material); SENSOR (ups reading speed); STATUS (); SYNTH (adjust osc according to: uip, behavioral analyzer, pr, text); TDS (reading speed, score); T (mo); UIP (sys studies reader's (reading) style, eg: speed, comprehension = offering better training / assistance programs (sw));
VISUAL ANALYZER (reader's eye movements).
OTD D2: This N Sys () - C =
ACCESS (password shows needed sw / current uip and score of u); ANALYZER (tailoring uip to how data best presented); ARTIST (); BALANCE (osc adjusts sounds according to ups uip for any type hearing problem/needed assistance, eg: sound always louder in ups left ear); CAMERA (scanner); CART (art, tutorial sw); EDUC (tgh); K (joy stick); M (uip db); MO (); MOUSE (); MQ (); MULTI-USER (); NR (); OSC Q;
PR (); PS (); Q(); R(); SCORE (studies level of situation (dyslectic problem, ups interest in material, marketability of material) via: asking (dyslectic) u questions to determine: memory retention, speed of reading), uses existing dyslectic / reading tests (sw)); SPEECH (); STATUS (compares ups scores over time, graphs ups improvement curve; analyzer = suggests future types of actions/sw u can use to better achieve desired aims);
TDS (); U(dyslectic, general target audience of non impaired people); UIP (reading / personal (interest) habits); UQ ().
O- System tutors artists in improving their image making: -D: Artist = Analyzer = C = U (human artist). U draws onto C / material scanned by C / cart (of art work) / tr from other C = C = sought after parameters (as pr) are selected = compared w parameters of tutorial sw (pr) score/analyzer = suggestions made = visual examples / written commentary / score sheet / suggested books to read (selected via matching of book's UIP w artists uip (at that scoring time)). -This an old KN? -similar to music instructor, yet this is more on the visual mode.
Circumstances of developing this invention include: Mr. W.S., Sr. is interested in the subject and has a large electronic manufacturing plant. The SW version grew out of the hardware product version. Inventor is healthy and not dyslexic.
Track: ups position in material (text) "tracked" (via sys similar to Speed
Reading SW: 5G070)
Customize (UIP-Tailor): Sys converts text / "entertainment" / sw so its material is converted / processed according to uip. Eg: scan [digital] newspaper and be better able to read the text; get periodicals/letters from email then convert; better play video "games".
% Virtual Reality: VR: walk around and have all elements converted as wanted. "Camera" = "visual analyzer" = converts as programmed.
* Shapes are altered. Image shape "editing-ar": readers w difficulty seeing / *reading particular shapes, eg: polygons are "edited" into curved shapes (circles). -in event there are both readable and difficult shapes in same screen / file= sw converts only difficult shapes into ones compatible w= existing shapes. --details in "Artist's" IMI sub-section "Edit". Within "Edit" see sub-section
Image Coordinating SW".
OTD D: U="Artist" - 5G061 Dyslexia SW (designated images of functions/"guide"/wording) "edited" for dyslexic) - C =
COLOR (adjusts coloring to reader's preferences) lI CRAWLER () // DRAW () /I
EDIT () // GUIDE () lI %MULTI-USER () // S W() // WRITING INSTRUMENT (stylus inputted words -> optical character recognition sw -> digitizes text into letters -> "edits" as "designated").
-text used in diverse type softwares are altered as well: word processing, spread sheets, CAD, telephony sw, sw utilized in (simple) LCD (s) for= any n/kn.
-Following is somewhat repeated information: SW causes sections of "screen" to have greater contrast / differential (image) elements based on: uip, pr, kw. Certain words, images, words pertaining to nr are specially and automatically give special graphic attention (as in this 5G061) when special attention could be of use.
Examples:
% See "Synth" for adapting sounds for those with auditory problems. Sounds are altered in manners akin to how visual text is "edited".
What can be "Edited": -"routing": when u moves to different file/sw sys recalls what u was last experiencing/reading (uip-db, kw) and helps save ups time by accentuating materials in next file that may match ups interest (in any manner).
Examples: U was reading about eye surgery in Chicago, then opens file of telephone numbers, menus/tel #'s pertaining to eye surgery are accentuated, then those #'s in Chicago are accentuated even more (more bold or brighter lettering or are highlighted). Naturally sys doesn know all possible interests in u, and only saves ups eye scanning time, since u may read highlighted material first thinking that has greater chance of being what he wants.
-converts certain words into other languages, eg: the Japanese are often upset that English words (written in katakana) are replacing theirs, in which case such English terms are changed to Japanese (kanji or hiragana) text. -wording showing up on "entertainment" programs: films, television, sw, "games". -vision apparatus (electronic goggles / binoculars*): U able to read text they see in real world while: driving, walking. VR*. -SW: text converted for programmer, while they are doing programming text. Eg: authoring language sw has their text / commands / prompts / etc. converted (for easier readability). -anything that can be represented, eg: "status", "score", "notifier" is edited. Eg: type problem, level of seriousness. -reader's speed (speed reading sw kn). "Scores" speed. -type text or "entertainment", eg: only certain material in "entertainment" mode is edited.
The user controls how this software works. Examples: U (user) controls the level of contrast/added on assistance baggage' accorded (problematic) words / text. Eg: contrast level of b versus d versus all other letters.
Other ways text appears and or is transmittable:
All written text is made available to users via e-mail, conversion of printed matter via scanner, disks. SW functions w/ special hardware or home personal computers. (Large) color monitors would help, but aren't required. Works with all languages, including Japanese, Chinese, Arabic, other
European languages.
Making the same "edited" text easy or less unusual to read for non-dyslexics: -shadows created by letters can be such that the light source for right half comes from right, and left side has own light source= resulting in right side having shadows going to left side.
Letters chosen (by writer) simply need to have letters like "b" on right side (of s) and "d" on left side.
Dyslexics accustomed to the shadow form of "editing" will more quickly.
Glasses or Contacts: -same text read without eye wear by regular readers, shows up as normal text.
Eye wear changes images.
Allows different type readers to view same text. "Multi-user": those w differing (degrees of) problems. -Specially colored eye contact lenses might be used for color blind / dyslexic people to help alleviate their problems. Research needed. D: contact lens =). U= eye = ) = viewing area [altered by lens]. Or change color of: "C" "S"; eye glasses; shades over eye glasses; light bulb; colored surface surrounding the "C" "S" (since this color contrast may effect different people differently such as men who get squirmy whenever they see red or green due to their being color blind.
% Readers may have lenses which also allow u to see fairly normally objects not on s, so u need not wear special anything just for s viewing. Unlikely to work. See eye doctor.
+ User carries something like a compass which tells them at all times which side is left which is right, however this can also be done simply by carrying a card (printed on both sides) and viable as long as reader knows what is the top and bottom of card. Some dyslexics forget their left from right sides. Use this idea w sys. Standard compass useful too.
-D: "Visual analyzer": optical character reader /.some character recognition = once designated text/images are recognized (via uip-db) = then make assignment of alteration to designated text via: color / typeface / etc = CRT
Display (S) / (Color) printer. -sw rejects repair - if character can't be read by machine - sys will highlight that text.
-System only shows user what they want to see. In other words: "visual analyzer" (only / especially) shows u images / data what u (most) wants. S = gives preference to the images to the degree their "score" is higher.
UIP-KW:
Certain words/letters are altered in their color in terms of -what word represents, eg: word cherry is shown in red, while'over ripe' cherry can have a darker hue. Over ripe cherries of certain varieties / from certain parts of world might have a purplish hue as well. -uip-analyzer determines via (color) db the appropriate color(s), sounds (osc, recorded sounds), etc = which match the letter, word, paragraph, page, chapter. -applicable images can be inserted near the designated terms / concepts, so images are on same page or near designated words. -Designation for which terms receive images determined via: ups request (k); sw; application of program (uip). -Designation/selection/creation of applicable images via: "image analyzer" = "artist" = uip. -Applications: same text / "entertainment" for differing audiences, kids/adults can be "edited" to match their uip. Images, colors, even the text itself (9G220 Channel Skipping, "editor") can be altered as well.
User / "edited" (instruction/nr) "image" output = This N Sys (dyslexic conversion sw) - C
ACCESS (); ANALYZER (); BILL (); CART (); EDIT Q; EDUC (); MULTI-USER ("edited" differently for each u); NR (); OSC (); PR (); PS-Zone (); Q Q; R(); ROUTER (); SCORE ();
SENSOR (); SOUND
ANALYZER (); STATUS (); TDS (); T(); TILT (); TRACK Q; UIP ().
Additional Applications:
Key boards' lettering. "K". The "edited" keyboard can be via: changing the "image" on each key; the key board is represented on the "screen" (shows what and how (w5) user is typing / "drawing". --"Computer's" (plastic) keyboard (k) (ink) can also have their letters altered and or they might be on the "Screen". Either letters painted onto k / key pad is an interactive screen / each key has a small (LCD) screen which is programmable.
"Game": players have to guess which letterings are incorrectly "edited".
Incorrect "editing": mirror images (as a dyslexic may interpret what they view wo assistance). "Score" according to number of times player catches mistakes in what they see.
Additional uses of multiple colors: Differing color(s) helps (re)train people/u who are: color blind; sight impaired; reading impaired (in some other manner); have eye sight problems; have eye to cerebral cognition difficulties (physical or psychological impairments).
Labeling what's important: "Artist's" ="Designator": labels what needs most attention (via va) = w a tag. * System reads out what user is reading.
OSC ="image": each letter read / typed makes "designated" sounds. --Sys knows letter*/word/line/paragraph u is reading at moment. In tern, sys will read out those words (that cause reader problems via pr/uip). -see related existing patent mentioned in this Dyslexia filing.
% lettering in four dimension can be any one or more features in addition to the three dimensional "editing". * Braille: sight impaired readers suffering from some type of related confusion - those words / letters can have other factors better distinguishing themselves, eg: higher or thicker bumps or have additional bump(s) nearby specially alerting u/reader (nr).
% Material being read can be experienced in a wide array of ways: Different letters / words / images have differing corresponding: sounds / smells / tastes / audio modes (osc, "speech"). -as reader reads / experiences material, the other modes may help user. -just use your imagination!
Makes users more interested in reading and in computers in general.
File: Art \ Ar-Dys-Ed
PART: ART'S "EDITING" MODES
Introduction: since people with dyslexia need new ways to have the images inputted into their brain, system alters images in most effective manner according to user’s preferences, or other needs. Following are only limited possible examples:
+ Letters portrayed in three dimension: -each letter can be shown in three dimension, eg: the letter "b" has light shed on it from the left, and "d" has light shown from the right (or opposite lighting). The other form in which 3-D takes place is to show the sides of the letters, as if they were wooden blocks. --Shadows or sides also shown from: top or bottom, or front or back, or other angles. -shades or sides: can be of different colors as "designated" according to: which letters / words / type problem of reader. U can "program" how shades appear, like any other "artist" element. --Size of shades / angle of shading can be increased / decreased for changing emphasis. -Each reader has different difficulties, eg: some in deciphering "b" and "d".
Also some can better read the same difficulty after they've been "edited" in a fashion better suited to them, eg: some prefer red or green sides. -"b" and "d" have different coloring; difficult letters are all highlighted/colored differently from the remaining text. -Weaning: those people who can improve their reading can then slowly have the designations of the difficult letters/words be made less and less distinct so gradually all text is the same. On difficult days the distinctions can be made again.
Redesigning specific "letters" and words:
Section(s) of letters that better differentiate themselves may utilize special typeface that exaggerates the differences. Since language's lettering is simply an invention in and of itself, there's no reason to slightly or completely re-represent each letter in a different type "image". -the straight lines in b and d can be emphasized, plus maybe the (upper) part of the curve which meets the bar. -n versus m, the middle line in m is emphasized. -n versus u, or m versus w. -c versus letter o - the open space in c is wider, while the right side of o may be thicker. -e versus c, the line in e is put into bold lettering. Or the capital E versus
-g versus p - p's bar and g's line going down emphasized, q's bar emphasized. -p versus q altered in manner similar to b versus d. -b versus h - bottom of curve on b emphasized, while open bottom of h made wider and more emphasized. -i versus I - dot emphasized, maybe stock of i bolder, while ] letter extra tall, and i extra short. -u versus o - open part of u opened up like h versus b.
-s versus z - s made more curvaceous - its start and ending lines are extra curvy, z made more squat and hence zagged. -q and p versus b and d - what is above or below is emphasized w extra thickness. -saw versus was, or dan versus and, whle versus with, or its versus ist - can be differentiated by having: first and last and or *middle letters of different letters from each other. Purpose better help reader to ground themselves into what's on the right versus left. -etc.
Color / Special-effects Compatibility: system (automatically) "analyzes" which effects/colors are appropriate for each situation, eg: red vis a vis green has more contrast than grey versus white; * other effects are utilized when necessary (according to uip). -presence of certain shapes / textures which are in / near / between lines of text may psychologically help readers. Readers / instructors select which effects are desired. -Type "edition" shows type difficulty: depending on type problem, each "edition" can be different so reader knows what type problem is by type "edition", eg: text changed to red perimeter implies different problem / *meaning from blue letter or text w blue shadows. -User "programs" system: User can select what they want edited by selecting from menu the type color codes wanted or not wanted. In other words: User can "program" system (not) to seek= then alter certain color group problems.
Encapsulation:
What's encapsulated: Small or big sections of (problematic) text are found in any encapsulated shape / background / other "edited" format. -Shapes: Squares, circles, spheres, cubes, triangular prisms, tubes, etc. -Dividing text into smaller bite size pieces: each paragraph placed in different squares, purpose being to break up large pieces of text which commonly scares young or dyslexic readers. -Each encapsulation can function as "interactive image". I --tlip / spin encapsulation to see additional definitions or functions of interactive image. -Spin the ball / cube: text written on sphere (which need turning (by mouse)) to proceed to additional text.
OSC sounds while its moved.
H-See KN's software that sounds when pages are turned. --."Game": spin and land on whatever "image": this is part of game, eg: spin the bottle, or whenever a (random gambling) choice is needed.
Additional sample effects: -Lines of tiny cubes in designated color(s) lined between tines, or around perimeter of"s" or printed page.
--each line or word is of different color: helps stop blurring of text. Within each word, each letter can have (slight) variation in color. --SW's images can also be shown in between lines, with or without a special colored backing for these implanted images. --makes user feel more secure in the swirls of print. May serve as some type of psychological grounding or prompting or motivating or "mood" enhancer. -picture representing ("designated") words appear adjacent to text. Picture / word is the interactive image.
Programmer "programs" in pictures via: "drawing" / "cut & paste" (w= "camera"). Doubt is patentable. --motion of picture depicts message as well. Eg: what it's pointing towards; facial expression of its character designating "mood". -any accentuation can be flashing or moving to better catch attention. Flash speed can be so user barely sees it going on/off, and on 75% of time, off 25% of time. -Marker: text is on one side of cube, and shadows / lines / markers emanate from difficult text to other side of cube.
Additional "Editing" modes of letters / words: -making them bigger/smaller. -thickness altered, eg: the curve portions of letters b & d. -typeface altered (valuable on non color screens, and weaning of sys).
H- See "Artist's" "Status": Edition shows nature of situation, saving from needing extra text cluttering screen.
Background behind text: -certain color backgrounds enhance readability, eg: via color contrast or not triggering psychological symptoms.
See dyslexia medical studies. -(background) images controlled by: uip / pr / what came w cart/el text. Eg: read jungle fiction and see/hear lions roar and monkeys swinging from trees. Background has "edited": "colors" / texture / text / sounds% * Background effects altered for uip / application. -OTD D: U = This N Sys () ~ C NR (); OSC (synth); VR% (); WA (); enhances "mood"= for "designated" tasks (conducted by u).
Speed reading sw (training) version: marker shows where reader should be at as there reading text. When cursor lights upon difficult sections, it marks "designated" images accordingly. This assistance only when marker has arrived, helps induce slow readers to speed up, to gain benefit of the "editing" function.
See 5G060.
PART: ART'S "EDITMG" MODES
File: Art \ Ar-Dys-IMI
"ART'S" GLOSSARY OF TERMS
Any concept (part) w/in each below group is normally interchangeable. Deeper definitions divulged in other files.
Accentuate: part of text is made more visible or altered more than remaining text,leg via: color, typeface, size, boldening (made into bold lettering), highlight. "Edit".
Causes for editing: What needs editing and why. Alters sections of text according to the software's criteria.
Examples: words difficult for dyslexics, hew words. See "Designate" in *main
IMI and "Artist". System studies user’s behavior and determines how what text creates more problem - see UIP [User Information
Programming].
Customize: images are tailored to designated purposes. Can be an automated image/'text editing system controlled /partly guided (along with user’s input) by customization.
Designated text altered: SW search and replace; portions of text altered to improve readability / comprehension; desired accentuations made.
Dyslexic: Reading / Sight impaired. % Readers and viewers who stand to gain via any type of "editing".
Dyslexic program: "Editing" (sw / pr); %sw; %pr.
Edit: Accentuate text. Convert image to help reader read. Examples makes differences in letters <b> and <d> stand out more.
Educate: Software teaches people to read: dyslexics, young readers, for new secondary languages. Teaches speed reading.
Help Read: improve reading ability, help the dyslexic, improve readability or visibility. "Educ". Assist user in %understanding material.
Image: Any element viewable on screen: text, pictures.
Letters / Characters: Any letter or digit in alphabet or mathematical representation, or %"image". Letters can be "edited" into any new letter, which may look similar or completely different from the original (English) language letter. Eg: b -> a triangle of similar size, d -> square.
New words: Software accentuates new words, such as unusually long terms, or ones young reader has not read before through the software. Can be a vocabulary builder: those pertaining to a new subject matter user is learning. Used with "Education" program.
Read: View material; experience material/program (with text or images*) focusing more on the visual aspects. % "Interact" with visually presented material.
Text: (Part of) text, letter, word, material, foparagraph, ("interactive") "image" - see "Artist".
Weaning: This software can be designed as a crutch which later teaches users to read on their own.
File: Art\ Ar-Dysl
Reading Assistance Software
File: Ar-DI. 5G061 Reading Assistance Software: This file is a subset of the file titled: "Artist - Edit". <3, 3, 4-pat-sw-version, 1.5-mk, 3>
-t- New words receive special "editing" attention: -What's designated: Sys seeks words which are "designated" according to: subject; newness (to u, field of study (new idea)); difficulty u has had in past occurrences as "analyzed" by (testis) "score"; what u or his supervisors determine he should learn / "interact" with (for more experience, "educating" himself (in its multiple uses and contexts)). What "educ" / "router" /"mood" / nr: "analyzes" needs learning / attention. -Wean user off this editing after they've seen word designated number of times. The more characters in word / type subject determines number of times u reads it in "edited" form, w/ eye catching modes diminishing each time they've read or written it. -However, the level of special attention can be varied, or non-existent. -User can at any time point click on the problematic word or "encapsulated" paragraph and view corresponding picture. In such case, the sys (might) continue to show picture for such word certain # times more. -this learning to read application is simply an example of how sys tags (UIPdb, matches) certain material (words), next "edits"/alters it accordingly. SW search and replace. sw has (invisible on s) slot in which image can appear / change.
-click on image to get: osc verbalizing what picture or text represent; video program; any other system triggering one of ups five bodily senses (see kn).
+ Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house adjacents the word Shouse'. Picture can be same size as (large size) text; or number next to word matches number next to picture elsewhere on screen or printed material. -system learns number of times user has come across such words (on the sys). --system or human teacher allots # times of viewing text balanced with complexity of word. -Weaning: After designated occurrences of said word / concept, pictures may no longer appear (weaning reader off assistance).
Weaning User off of the reading assistance system. Like learning to bike first with training wheels, then they slowly removing the extra help. -the accentuating modes of designated text, might be reduced over time. This reduction can apply to all / most difficult words. --"Designated" words w/ good "scores" showing reader doesn have (much) trouble can be weaned more quickly. -weaning off process is controlled: automatically or by u / by guardian (doctor) or teacher or uip*. -if user is having a bad day [difficulty reading], they can alter the degree / type of differentiation sys makes for (previously / newly) designated text / other problems. -(In normal text) images might be boldened or underlined, herein the same can be done, with additional changes to its shadows, etc. Replaces other "editing" modes.
Sporadic Changes. Problematic letters are sporadically designated differently from remaining letters/words/text. Examples: every third problematic letter so handled; special handling handled via random (sw) process. -same type problem might be designated differently in different times/situations. Eg: confusions between letters b and d can be green versus red; and at other times white versus black. -TDS: differing days problematic letters are represented in differing colors.
Value: user doesn expect difficult letters to always be so represented, eg: for reading newspaper, etc. where such assistance baggage' may not exist. --sys helps wean u off of the assistance sw. -helping wean u offofthis n: any difficult letters/words might simply have differing typeface or color, so there are two modes, normal appearance and second appearance which isn't different vis a vis the other difficult letters/words. Helps u to be extra careful when coming upon potential problem. -the window size [via which text is read] can be made as small or big as desired, while any of other features can show up within this window on S. 5G060.
Exists:
Dyslexic's Software: All it does is highlight one word or sentence at a time.
If reader has trouble, it will verbally (osc) announce it. Existing product called: Click-Reader from CAST for US20. -if word is in larger print (headline)/italics, it will read material in louder voice. -Click-Reader: Reading template for any text and pictures. Includes customizable auditory supports for decoding, visual tracking, and organization. -manufactured by: CAST - Center for Applied Special Technologies. 508-5318555. 39 Cross St., Peabody,
-Related patent: US Patent No 4875432: color on "score" board changes when the score is tied in (volleyball) "game". (The level of "score" / "status" effects the type of color change found on S / Nr of any product / sys; eg: 7G)
Software showing nature of situation simply by way it's edited, saving screen space from excessive text. -Also see the seperate file +"Artist's" "Status". -Nature of problems represented in how images altered: type of dyslexic or young reader's problem shown by type "edition".
"Score": -"Educ": system can have timer and or other electronic analyses for how user’s reading skills are improving, eg: ability to read or write correctly; speed of reading. --system may force/suggest user to speed up reading / increase window size when their "score" improves. -How "scores": when u deemed (not) to have made error= sys= nr.
US Patents
-Search Strategy: dyslexi*. Up to 8.96. Searched db via key word of full patent text.
Understanding user’s problems.
D: "Scoring" -> UIP DB Development - UIP-Tailors SW= for reader. What's scored and (W5): "Scoring" levels / types of user’s (eye / cognitive /reading) difficulties; "BA"; "educ's" "score"; "status". Related patents follow: 4556069 RE34015. 4706686 4421122 4408616 4407299 5474081 4528989 4706686 4889422 2838681 3842822 5067806 3952728 -Following are comparatively maybe less pertinent: 4216781 5048947 5331969 3893450 4030211 4735498 4102564 4211018 5260196
Teaching methods:
Ways of "editing" / helping (+dyslexic) readers: "Educ" /"EGH" / "TGH".
Related US patents follow: 4379699 4979902 536093? 5336093 5543867 3906644 4007273 4764973 5114346 4123853 4090311 4770635 5366377 4354843 4643679 4747682 3955564 4007548 4708567 4961640 5328373 5451163 4940346 3828316-Character adressing in a word oriented computer system. -Following are comparatively maybe less pertinent: 4136361 4661074 5145377 5312257 5421729 4351831 4346085 4346084 4479241 4456598 4430330 4636494 5253799 4498080 5315668 4021611 4089126 4498869 5360438 5302132 5387104 4592731
File: Art \ Ar-Dys2 5G061 Reading Assistance Software. File Ar-D2. +New words receive special "editing" attention: -What's designated: Sys seeks words which are "designated" according to: subject; newness (to u, field of study (new idea)); difficulty u has had in past occurrences as "analyzed" by (testis) "score"; what u or his supervisors determine he should learn / "interact" with (for more experience, "educating" himself (in its multiple uses and contexts)). What "educ" / "router" /"mood" / nr: "analyzes" needs learning / attention. -Wean user off this editing after they've seen word designated number of times. The more characters in word / type subject determines number of times u reads it in "edited" form, w/ eye catching modes diminishing each time they've read or written it. -However, the level of special attention can be varied, or non-existent. -User can at any time point click on the problematic word or "encapsulated" paragraph and view corresponding picture. In such case, the sys (might) continue to show picture for such word certain # times more. -this learning to read application is simply an example of how sys tags (UIPdb, matches) certain material (words), next "edits"/alters it accordingly. SW search and replace. sw has (invisible on s) slot in which image can appear / change. -click on image to get: osc verbalizing what picture or text represent; video program; any other system triggering one of ups five bodily senses (see kn).
+ Teaching the young to read:
Text has applicable images next to certain words. Eg: picture for house adjacents the word Shouse'. Picture can be same size as (large size) text; or number next to word matches number next to picture elsewhere on screen or printed material. -system learns number of times user has come across such words (on the sys).
--system or human teacher allots # times of viewing text balanced with complexity of word. -Weaning: After designated occurrences of said word / concept, pictures may no longer appear (weaning reader off assistance).
Weaning:
Weaning User off of the reading assistance system. Like learning to bike first with training wheels, then they slowly removing the extra help. -the accentuating modes of designated text, might be reduced over time. This reduction can apply to all / most difficult words. --"Designated" words w/ good "scores" showing reader doesn have (much) trouble can be weaned more quickly. -weaning off process is controlled: automatically or by u / by guardian (doctor) or teacher or uip*. -if user is having a bad day [difficulty reading], they can alter the degree / type of differentiation sys makes for (previously / newly) designated text / other problems. -(In normal text) images might be boldened or underlined, herein the same can be done, with additional changes to its shadows, etc. Replaces other "editing" modes.
Sporadic Changes. Problematic letters are sporadically designated differently from remaining letters/words/text. Examples: every third problematic letter so handled; special handling handled via random (sw) process. -same type problem might b'e designated differently in different times/situations. Eg: confusions between letters b and d can be green versus red; and at other times white versus black. -TDS: differing days problematic letters are represented in differing colors.
Value: user doesn expect difficult letters to always be so represented, eg: for reading newspaper, etc. where such assistance baggage' may not exist. --sys helps wean u off of the assistance sw. -helping wean u off of this n: any difficult letters/words might simply have differing typeface or color, so there are two modes, normal appearance and second appearance which isn't different vis a vis the other difficult letters/words. Helps u to be extra careful when coming upon potential problem. -the window size [via which text is read] can be made as small or big as desired, while any of other features can show up within this window on S. 5G060.
Exists:
Dyslexic's Software: All it does is highlight one word or sentence at a time.
If reader has trouble, it will verbally (osc) announce it. Existing product called: Click-Reader from CAST for US20. -if word is in larger print (headline)/italics, it will read material in louder voice. -Click-Reader: Reading template for any text and pictures. Includes customizable auditory supports for decoding, visual tracking, and organization.
-manufactured by: CAST - Center for Applied Special Technologies. 508-5318555. 39 Cross St., Peabody,
-Related patent: US Patent No 4875432: color on "score" board changes when the score is tied in (volleyball) "game". -(The level of "score" / "status" effects the type of color change found on
S/ Nr of any product / sys; eg: 7G)
Software showing nature of situation simply by way it's edited, saving screen space from excessive text. -Also see the seperate file + "Artist's" "Status". -Nature of problems represented in how images altered: type of dyslexic or young reader's problem shown by
- type "edition".
"Score": -"Educ": system can have timer and or other electronic analyses for how user’s reading skills are improving, eg: ability to read or write correctly; speed of reading. --system may force/suggest user to,speed up reading / increase window size when their "score" improves. -How "scores": when u deemed (not) to have made error= sys= nr.
US Patents
-Search Strategy: dyslexi*. Up to 8.96. Searched db via key word of full patent text.
Understanding user’s problems.
D: "Scoring'-> UIP DB Development - UIP-Tailors SW= for reader. What's scored and (W5): "Scoring" levels / types of user’s (eye / cognitive /reading) difficulties; "BA"; "educ's" "score"; "status". Related patents follow: 4556069 RE34015. 4706686 4421122 4408616 4407299 5474081 4528989 4706686 4889422 2838681 3842822 5067806 3952728 -Following are comparatively maybe less pertinent: 4216781 5048947 5331969 3893450 4030211 4735498 4102564 4211018 5260196
Teaching methods:
Ways of "editing" / helping (+dyslexic) readers: "Educ" /"EGH" / "TGH".
Related US patents follow: 4379699 4979902 536093? 5336093 5543867 3906644 4007273 4764973 5114346 4123853 4090311 4770635 5366377 4354843 4643679 4747682 3955564 4007548 4708567 4961640 5328373 5451163 4940346 3828316-Character adressing in a word oriented computer system. -Following are comparatively maybe less pertinent:
4136361 4661074 5145377 5312257 5421729 4351831 4346085 4346084 4479241 4456598 4430330 4636494 5253799 4498080 531'5668 4021611 4089126 4498869 5360438 5302132 5387104 4592731
File: Art\ Ar-Dys-App ADDITIONAL APPLICATIONS TO DYSLEXIA READING INVENTION
File ar-dys-app. + "Educating" people in learning to read difficult words. -What are "analyzed" as being difficult words: all words likely to be new or over set number letters are "designated" as likely to be needing special attention; those words non dyslexics and dyslexics often have trouble with= according to db. See <new words> section. --a new way to introduce new words. Eg: for people learning new languages. --user can click mouse on this differentiated word and software will show its meaning. The type defiinition given can be designated according to: ---uip; context of the word; native language of user; user’s intelligence, skills or technical ability or experience... -User can select (from menu) subject categories / root words / type word help needed. -"Designated" words can be "interactive images" which when clicked: give (Webster/Britannica) definition; show (moving) "images" depicting (definition / application to u (uip)) / "route" u as "designated" (to related files (by subject)) / osc gives examples for how concept sounds.
Letter sizing: with enough space between lines, more difficult "images" can be made (larger). % If made smaller: its to make the mind concentrate on the smaller images (w different coloring to help identify). --the longer the word the (bigger) the typeface: for kids.
"Edited" text can be shown in following contexts:
Cross word puzzles; "games"; mm (multi-media); text that is below movies or
Karaoke; books; (journal) articles; W W W; advertising; labels on products (on / off / power / volume % other k); "nr" / printed caution signs (used in facilities frequented by dyslexics), the writing can be so nondyslexics understand as well / aren't too put off; Any type of (sw / pr) instructions (booklet / "guide"); "interactive images"; library (sw) catalogue systems (for dyslexics).
Non-SW "image" generation: Stenciling: have cut outs from plastic sheets through which letters are (spray) painted. Rub off letters. Pre-cut glued on lettering. Stickers w printing.
-A two stage stenciling process can be used to created different colored / textured effects. Example: shadows or sections needing special accentuation.
Focuses User's Attention: Teaches people to focus; acts.like training wheels for bicycle learners, user sees a little at a time, increasing the amount shown, so they don't get overwhelmed.
Accentuating text is a form of focusing on what the eye should better catch. Encapsulation limits the overwhelming effect. -Important words, sentences, paragraphs, chapters, headings can be designated to show: (type of) importance [according to color code].
File: Art \ Artist Misc *
ARTIST MISCELLANEOUS FILE *
-See KN: R24-1 Image Coordinating Software; 3C210 Color Selector -Diagram: user = mouse / r = c - image generating or editing software = screen or printer.
Designator: Colors, shapes or other images are utilized or "edited" to achieve "designated" result. System automatically determines via any invention "designation" criteria what needs to stand out / be "edited". Results in greater help to u: "nr"; what needs attention
-In other words: Change graphical appearance. Altering is any means to manipulate images, eg: cut & paste; crawling; (u) drawing.
- Image - term defined: any graphical design, or graphical interface, that can be drawn or edited by artist. -"Interactive" "Images" - term defined: for computers or interactive screens: u / sys can create "interactive" touch screens w/ its needed "images". Generated images (icons) have functions triggered according to how they are touched / activated. Software icon (related). -Diagram: U / "Designated" functions = ("interactive images") - C = designated [kn] function. -Reasons to draw: entertainment; function in 'game; creating presentation packaged in mmm or printed material.
Status: "Editing" shows status of situation: type subject matter/ nr / "routing" shown by how images are "edited". Value: requires less text explanation cluttering screen. See: IMI's "Score", "Status". -(Artists') "WRITING INSTRUMENT" = Mouse, stylus, "tilt". "Mouse"; "R"; (EI) pen or brush; "Computer's" cursor; % "Crawler"; "Tilt". -How (tailored) "images" are "edited" and or "drawn" (by user/'tailor): -Any alteration / generation can be part of the "artist" process. Can create some related "artist" effect:. Eg: even a stapler gun leaves a mark (shown in differing color), and whatever is stapled is a "cut & paste" because this is the most common function of the tool. "Mouse" controls below icon tools' movements /"editing".
-Image generation modes related to tools and functions as found in "Tool Crib of the North" sales catalog 4966
August 1996. Page numbers mentioned are only one of possible multiple examples in catalogue. -Jig saw = cut portion of "cut and paste". -carving sets / router (not "router") -sanders / (wider) drills: getting deeper in "designated" areas brings up corresponding layered colors. Pathways of tool are shown. -flashlights: what is shined upon has "edited" color -screwdrivers leave mark that something was "cut & pasted" previously. -Labeling each tool as an icon: the actual instruments can be represented as icons on s= so user can click on them to begin desired "artist" function. -Cut / sand off sections of wood (images) "editing" -Polishers / Sanders: the texture changes accordingly (w or wo (drastic) color changes) -"Color" sprayers. p39 -dust collectors p39 -Glues / Vices / (Pony spring) Clamps = (temporarily W5) "cut & paste". -Work benches= have tools on the bench (for "artist"). A work bench can be a file / icon w/ sub-parts (subicons). -Lawn and garden chain saws: more mobile and can more easily cut where desired. p59
Each / Most Artist KN also have an sw version - D: U = mouse / r k= c - image generating sw = s/ printer / [tr = another c] / access.
CONCLUDES THIS CENTRAL DISCRIPTION SECTION FOR ARTIST
File: Features Intro / BA BEHAVIOR ANALYZER IN GENERAL
Use Our Masterminded Patent Application To Improve Your Ideas In Adapting To
Client Needs By Better
Understanding Them! Learn about our quick and easy licenses. Call (+1) 707-428www.LicenseItToday.com
(Most of the ABA part is filed under the Access part)
Intro. Also look under: UIP-Tailor, UIP-DB development. Applications for ABA include: UIP, UIP-Info,
Games, many more!
BEHAVIOR ANALYZER'S'REACTION =
It uses multiple means in determining the behavior of who or what it is kindly observing. This information is available to the system thaf wishes to adapt a function for the user’s tastes.
System adapts to user’s mood. Different'moods of user= (help influence) result in different command codes in controlling system. A form of UIP-Tailor adjusting to user’s behavior.
READ LATER: -System determines the behavior /'mood of speaker='reacting as designated.
The behavior of the user= is determined via therearound analyzer. Different behaviors result in differing reactions.
Program the degree to which system alters itself= by =the'scored shift= in user’s behavior.
Examples:
3A280 Interactive Alarm: At designated time alarm is triggered, person must use their voice to vocalize sound to stop the alarming. Thereupon depending on person's voice tone machine reacts in accompaniment.
Machine's microphone and "brain" knows how to respond. USA.
Purposes: causes sleeper to interact with machine, which gets their brain working, and into awakened interactive mode for the world. An interesting marketable novelty, gift for your friend(s) who need help waking up in the morning. -Alarm waits certain time period before beginning alarm again (allows time to deactivate alarm) -Option: if word is sounded, machine restates person's word in different way psychologically designed to help waken them up. Interactive Alarm can respond differently each time/day creating curiosity about the "unknown" reaction of alarm to their voice (the suspense further helps waking up). Initial outgoing sound in morning can also change.
Read Later D: U's created sounds (voice /'clap / machine generated (osc)) =
This N Sys [sa/access] - C (computer)
BA [] // cart (cartridge) [] // MULTI-USER [different sounds from different u] // NR [when command is triggered= u notified (by osc/beep)] // OSC [controlled by U's voice] // pr (program) [adjust what sounds cause reactions] // SCORE [type sounds for its characteristics or importance or degree...] // SEEKS & REACTS [to sounds] // SENSOR [] // SOUND ANALYZER [] // TDS T[I // TRACK [w5 sounds made] // UIP [] //
Notifies 'game player when to do something according to w5 / UIP.
A3-13 EMOTION WATCHER: tells you how unrelaxed you are by how: product (ball, top, doll, coin, etc) spins in container, on CRT. Can output words, suggestions, slogans. Checks p by: u (user) touching a pad measuring your temp; sensing stress in voice (product exists) whenever speaking (and hence operates whenever machine's on). Mood Test(er). Mix with therapy machine product idea (notarized 13 Dec 91). Portable option as well, w/ all functions built in. -LeveVtypePscore of ups 'mood/stress can be shown in any manner: Inr, screen, educational, artistic 'images= changing by type'mood. -analyzes how u reacts to their  score. -measures 'game player's scored performance
Changes in: (degree / color / type of) lighting or sound; synth; how system interacts w (with) u; any other alterable function, such as those listed in: U[P-Tailor, R, K,'React...
BEHAVIOR 'SCORER=
-Determines the types and degrees of person's behavior= according to what the system is programmed to 'seek= and analyze.
+ R132- I Behavior - Medical Symptom Analyzer: System correlates patient's behavioral with their medical symptoms. Patient's graph for changing emotional state is matched with body symptom graphs, giving researchers additional needed analysis. Invention is the software's merging of data. The system assists psychiatrists and others in correlating mental w/ physical symptoms. -patentability: Steven's guess is a facet of this might exist in market place.
Patentability might cover those other areas not existing. -Applications: correlating mental state w: diet; heart rate; metabolic activity; genetics; pollutants or poisons(internalized into body); etc. General research. Identifying medical ailments by the deviant / changed behaviors. -sys correlates user’s body symptoms and signals (eg cardiograph) with subject's behavior (w5 they do). D: organism -> sensors = c. -"questionnaire" filled out by user = uip-db= which is used by the ba. Medical symptoms are compared against= this ba. -OTD D: This N sys (system) _
ACCESS ; ANALYZER ; ARTIST ; C; CART (type analysis); S; EDUC (learn medicine, use in medical internships or classes); M (database of medical symptoms which tie up to possible medical ailments (listed first in order of greatest likelihood listed ailment is the actual diagnosis); MIC (hears body parts); MULTI-USER (remembers data/analysis/uip for different patients); NOTIFIER (when serious medical conditions are found= predicts future occurrences); OSC ; PR (how analyze patient); Q (mq to improve "analysis"; doctor asks questions, eg: what doctor should do, prescribe, how cure, how use sys to better/further analyze patient); R;
SCORE (medical symptoms noticed/being studied); SENSOR ; SOUND ANALYZER (body symptoms, eg:
coughs, breathing, heart beat, other oral functioning); SPEECH ; STATUS (medical condition (changing));
TDS (w5 of each medical occurrence); T; UIP (behavioral and medical conditions being analyzed); VISUAL
ANALYZER (analyzes medical images); WA (walk about) (portable body monitoring device (any type as needed). + All types of medical equipment that can study patient, then turn results into digital signals and intern create the data to match with this sys, R132-1. -utilizes R132-1-5, a subset
-Pat search strategy: (behavior* or psycholog* or psychiatric* or personalit*) and (medic* or scien* or physiolog*) and (soRware* or computer*) -US Patents: --4751642 Interactive sports simulations system with physiological sensing and psychological conditioning.
Replace patent's psychophysiological manipulation' w: predicting user’s behavior / "mood" in "designated" circumstances. --4852578,4818234 --4951197 Weight loss management system = "ba": for causes in eating disorders / changes in behavior caused by type diet. -info gained is for: UIP-Info; building stronger 'game entities/players; guiding user while educating them.
A2-170 HANDWRITING ANALYZER: sw studies what p writes onto special display ("S") or paper (then read via optical reader). Available in 28 languages. M seeks the characters and its deviations that it can identify, plus other general tendencies whether characters are or aren't identifiable.
Pen writing preferred (best are fountain pens) for paper version. Manufacturer programs machine to seek classical styles commonly accepted for their implications. -u asked to write something w/ "tilt"=pen which is= "analyzed" "Tilt": controls sys' functions -copied to 5E020 in 8.95.
A2-610 BEHAVIOR SCALER: like system detecting if person is lying by stress... in voice, detect how: a] sexual another person feels. Even try it on yourself to see it works. Know if you should pursue another for a hot date. b] reliable and or constant and or organized and or committed and or ability to follow o lead
Op: gives readout of user’s many other possible behavioral characteristics via po, dd, crt; input user’s face & it will po/show on crt what they will look like at pp future date, or that of their children...
TD: JK(until science has advanced enough to validate results) -Portable option: Small and portable - keep in bag or pocket and look at later to determine analysis, just turn on switch to listen in for pre-programmed time length. And or use keeps hand on switch as to when they want to or not to receive input for analysis, eg: determined by timing of important statements, whereas minor talking might be less important for analysis.
4A09 Behavior Analyzer: (future product) Judges region of speaker, and maybe social stature - all based on word choice, accent, etc. Can seek all the possible questions to behavior and type psychology of speaker currently able to be done by human ear (as in over "T" conversation). 5A1080 Food - Behavior Change Analyzer: observes behavior changes in animals, insects, bacteria, viruses, people - according to types foods, when served (and still available), where served and served under what conditions. Observes changes in tastes made to standard foods, eg: more salt... -4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" / "analyzes" occurrences (for uip (db improvement), intelligent monitor 2E251)
5A1090 Sounds & Music & Verbalized Words and Creature Sounds Analyzer: it observes changes in behavior according to such being emitted by itself, or observes what happens when organisms make such changes amongst themselves. It also notes to volume of sound made. 4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" / "analyzes" occurrences (for uip (db improvement), intelligent monitor 2E25 1)
A 1-290 Finger Print Reader: Analyzes a person's behavior by their fingerprint. Also matches couples with compatible fingerprints. Related to existing "C" systems based on horoscope, blood type. -finger Match(ing): dating service matching behavioral types associated with genetic finger printing. Genetic
Finger Match(ing)
EXTERNAL EFFECT ON BEHAVIOR = 5A I 100 Smell Analyzer: observes changes in behavior upon emissions of any smell (smoke, flowers, sex smells, etc) or matter being studied. -4E020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" / "analyzes" occurrences (for uip (db improvement), intelligent monitor 2E251) 5A1110 Sight Analyzer: what do creatures see and how they respond to visions from displays, pictures, other animals (friendly/unfriendly put in cages near them. 411020 Content & Date Verifier: of (any said) occurrences, eg: "tracks" /"analyzes" occurrences (for uip (db improvement), intelligent monitor 2E251)
HOW ABA HELPS USER =
A 1-320 Activity Identification Software: senses fingers on keyboard and blips if you aren't writing. It senses when you are lacking in creativity, clarity, confidence by manner of keystroke rhythms. Mix with Therapy
Machine, Taro Machine. -"Tilt": controls sys' functions. If "tilt" not used (correctly) it nr (notifier) too.
++ R132-1-5 Biofeedback - Body function analyzer: System is a self analyzer, teaching users why they are acting and feeling the way they are. Portable wireless version also. -User can look at their medical analyzers and see how they are/were performing (psychologically) intern user gets to know themselves better.
What user learns: W5 effects their behavior: -learn how to (intuitively) psych them up in the desirable manner. -Ideal mind / body = symptoms / signals. Use with sporting equipment. -Diet: effect on their human: "mood": optimism, depression; behavior (determined via ba); sports ability: body coordination, thinking style; thinking: studies, test scores, memory, creativity; safety: reduction in human error or poor quality control (when working w/ hazardous chemicals or other dangerous jobs); quality of getting along with other people (ba, "score"). -Sports: tennis player who is winning (statistics show at that point they are historically (uip) 62% of winning entire game/set) = should have heart beat (within set parameters) based on their uip heartbeats in other situations/times, 71 Jo of time. If user isn't winning, but their heart beat is in this winner's heart beat pattern, then chances - of user winning increases by 8% (since user has confidence/right attitude/energy/feel). System can teach player via R132 and or other behavioral analyzer systems to see their behavior analyzed = shows on s / notifier = in tern user gets better at controlling themselves (internally: psyches themselves up to speed up/relax/up or down creativity/etc)
Miscellaneous: Portable version with wireless transmission. Also can develop database of user’s physical profile. -Usage of cardiograph is one example: level of excitement / physical activity = determined by c (analyzer)-behavior analyzer = notifier (R131/R131-10) -this system used as component for "behavioral analyzer" system(s) -uip: determined/s for applicable user (human/animal) (by species/task/situation/environment) what heart beat represents which behavioral mode (how user feels/what they think) (with designated percent chance of validity)
-D: *behavioral analyzer/sensor=tr=c (analyzer/behavioral analyzer/uip/*mfh) = develops uip (for behavior analyzer)/notifier (R31,R131-10) /s.
+-attach sys to sports equipment: treadmills, muscle building equipment, waterproof Walkman for swimmers (wa), pedometers, etc. -utilizes R132-1.
Analyzes 'game entities/player's type actions/behaviors for: what they are doing w5 and scored by quality/effectiveness, etc.
B.A. PREDICT = -Having analyzed the different determinants / causes for the user’s [current / foreseen] personality or'moods= via the ba='predict can estimate the likely future scenarios / how systems can be better tailored for user / designated systems / functions.
General Behavior Analyzer Info:
Phone Behavior Detectors: Used by tel call centers, e.g.: insurance claims offices that will ping designated verbalized statements by callers; and in tern have reduced fraud [by 25%).
Algorithms can sense: irritation, duplicity, delight, sexual arousal. Archived records store and match keyed in data by call taker, and can store for long time [for UIP-Input]. System responds [seek & react] to designated key words, then transfers [routes] caller to boss/etc. See Wired Magazine, June 2005, page 44.
PATENTS: key word search ofUS abstracts 1.74-2.97 www.qpat: -Set 1: (psycholog* personalit*) and (study* studies analyz*) --US Patents via main key words: 4354844 Behavioral and psych test instrument 5414644 3971034 stress measurer, much like a lie detector *5209494 biofeedback game. -Set 1 and (computer software) --US Patents via Set I and computer SW (software) kw: 5414644 4459114 +5596994 Automated and interactive behavioral & medical guidance system 4699153 assesses verbal psychobiological correlates 4751642 4751642 Interactive sports simulation system w/ physiological sensing & psy conditioning. *4007430 rhythmic biofeedback 5486999 categorizes health care utilization -USPTO Classifications: 2.97 searched 434/236* --434/238 US Patents: 5338202 5040988 5573405-Behavior monitoring & training device * 5573404 5511981 5399092 --434/322 US Patents: 4627818 psych testing method* 5551880-employee success prediction system + 5465982-method and apparatus for disclosing a target pattern = ba-db
Key Words maybe: biofeedback (handwriting adj analysis); behavior - problem word, brings up eg: behavior of chemicals... -Str: (human near/5 behavior) and (study* studies analyz*)
--US Patents: 5227874 measures effectiveness of stimuli on decision making, eg: ads on viewers.
Methods include "analysis" via: uip; "analyzer"; *"access"; frequencies of user’s voice, eg: voice lie detectors.
Cheaper systems can simply seek high frequencies representing stress. + SEE: "Access"' = "Behavior Analyzer", eg: it's "Group Behavior". "BA" there has more details than this file. -"mic" -> "analyzer" (system analyzes person's voice) -> system responds according to pr (program) /*U's control. -D: Voice = "Sound Analyzer" ("mic" = sound to signal converter) / **M = C (computer) = function (application) / osc
Applications: #1: system's osc (outgoing sound communicator) matches / mimic's the user’s voice so as to solicit the desired response (emotion/feel rapporh/make them want to act in certain manner (purchasing / work productivity, behavioral modification). Psychologists established which type of voice / sound frequencies are most apt to achieve the desired effect according to: circumstances (UIP / U's state of mind (at a particular time)). *TDS: osc's sound modulation might be effected by the time of the day (U may need more energizing in early A.M.). %#2 Info learned about U is fed into UIP. Existing UIP data may be: considered more or less important than the BVA's analysis (at that time of U's interfacing) according to PR. System may adjust to U's fluctuating moods. %#3 Proiiuct's functions +might be (slightly) altered according to U's determined (via: BVAIUIP) behavior. -This being a new part, references to this part will not have used this abbreviation, though descriptions will have discussed this part's concept, which can be looked up in detail herein. *-The OSC's sound quality (might be) is so excellent / similar in vocal characteristics to u/listener it sounds like the real person speaking to U. The sounds also have such color, they: make the
U's ears feel like they can visualize the speaker / function (whether there is or isn't an S). --Sys "analyzes" type (sound, behavioral) files targeted person better matches = then communicates w them to create maximum psychological impact (sales, "mood") as determined via "analyzer" / K / pr. D: mic = bva / uip = c = osc. -C43 Lie Detector: Judge via person's voice's stress (on the tel), if they are honest or not. (Useful for UIP) (D)
Drawing: C43=tel-c-remote -See "Brain": sys' part adapts according to circumstances. -OT.D D: Organism being studied (human, *animal, other) = This N sys (system)
ACCESS (sys upon "access" monitors (2E251) organism); ANALYZER ; AP (% scientific, fo psychological, % medical, % business research projects); BRAIN ; C(computer) ; CAMERA (2E251
Intelligent Monitor);
CART (sw, db, differing cart for type organism or ap); EDUC ; GPS ;
K(keyboard) ; M(db, brain); MIC (sound analyzer); *MO ;*MOUSE ; MQ ; MULTI-USER (differing researchers (u), organisms being studied); NR (w5 required parameters have/haven't* been met (via "score" ="analyzer")); OSC; pr (program)
PS (positioning system) ; Q; R(remote control) ; SCORE ; SENSOR (motion);
SOUND ANALYZER ;
SOUND VISUAL ANALYZER* ;*SPEECH ; STATUS ; SYNTH ("analyzes" for sounds that better influence organisms (per pr/u/k)); TDS ; T* ; u (user) (researcher / * organism being studied); UIP (uip of organism /*u (studies/tests objectivity of researchers)); UQ ; VISUAL ANALYZER
VR* ; WA (walk about) (use outdoors). -Sub-Parts: BA-UIP; BA-BVA; BA-Tag: tags (then tracks) designated people according to certain profiles. 12.95 Bib Disk US Patents = BA -US Pat # 5121434 Speech analyzer and synthesizer using vocal tract simulation. -interactive sports simulations system for providing an actual physical trial of the sports performance to be enacted. -4751642 Interactive sports simulations system with physiological sensing and psychological conditioning. 5481265 4741320 5546943 4013294 4818234 4899106
Audiovisual means for simulating actual sports environment, sensors for measuring the performance and physiological performance of athlete... '
-search str bib 9.94: behavior* analyz*: Analysis and treatment% of swallowing dysfunction 5143087. "Edit": ba (behavior analyzer) determines what u (subject) should experience. -[Sys "tracks"="analyzes" ups behavior] = ba (behavior analyzer) =
Conclusions (Score) utilized by "analyzer" /
UIP-DB. -"Router": locates then= retrieves needed data= for this part. -A code (access, el +water'mark') encoded in sw/data* limits how sys / program can be: utilized (to operate device) / "edited" / copied. See: "Access", "Edit". -"Bill" -results from behavior "analyzed" are compared to a reference level (as in a db or uip). Eg: US Pat 5461231
-behavior* psycholog*, sociolog*, movement [moves, moving, move] -animal*, human*, person*, people* -study*, studies, analyz*, monitors, monitoring str: (behavior* psycholog*, sociolog*, movement [moves, moving, move]) and (animal*, human*, person*, people*) and (study*, studies, analyz*, monitors, monitoring)
US Patents: 5465115 Video traffic monitor for retail establishments & the like; 5433612 Electronic accountability system - "tracks" u (user) and equipment = "ps-zone" / "track" /."uip" (develops uip-db); 5428392; 5426425 Intelligent locator system = track / ba (behavior analyzer) / ps; 5424745 Detection method and system = track / ba / ps; 5386990; + 5250941 Customer activity monitor / 5245314 Location monitoring system = ps / ps-zone / track / ba.
Improvement on US Patent:
5377258 Method and apparatus for an automated and interactive behavioral guidance system: u receives motivational messages (osc) to improve behavioral patterns; includes client db (uip); voice stress "analyzer"; client response required]
OTD (Other Technical Details) Read Later. Drawing: u (user) = This N sys (system) (BA / 5377258) - C
ACCESS // ANALYZER // EDIT (sys edits out less needed input from: u, uip-db) // NR (penalizes u when . u acts poorly (undesirable behavior) = electric shock to body / "entertainment" sys N usage is limited (see KN)) // OSC (penalizes via harsh sounds = synth) II PR Il PS-Zone (u trained where its safe / u is not needed for work, eg: home, coffee room, recreation room, tv room) // Q (to build uip-db = needed by sys to train u) // R // SCORE (how well ups behavior is altering) II STATUS (of ups behavior) //
TDS (w5 u behaved -> builds up UIP-DB) II TRACK // UIP.
-Example of source that "analyzes" behavior: "Who do you think you are?", a CDRom published by Harper
Collins Interactive. Also read its book version and bibliography, and speak with the developers of this and related books (as found in Library of Congress or Bowker's "Books in Print" subject section) for type formats depended on each KN application. -BVA is a subset of both ba (behavior analyzer) and "Sound Analyzer". "Access = BA": identifies not only hackers but (similarly) also any "designated" type of: -incompetent employees / mentally ill people / terrorists / legitimate accessors who (might be too curious wondering beyond their "designated" "locations" on sys) / access controller ("tracks" W5 (what, where, when, why and how) it monitors= punishes), since it can't always be trusted either. -Determines such type accessors based on their: performance or work results "score"; errors they make; psychotic behavior; key word searches. "Morning alarm" (and its "Work motivator"): system awakens and improves user’s wakeful "mood" according to their behavior.
See 7J02 Language Trainer & Voice Analyzer: Teaches language learners to pronounce new words. Predicts how user will [incorrectly] speak, and guides accordingly. It's in own file.
End of this BA - General
File: Features Intro / BA*
BEHAVIOR ANALYZER - MISCELLANEOUS SECTION *
BA REACTION, BA SCORER, EXTERNAL EFFECT ON BEHAVIOR, HELPS USER, UIP-Tailor
BA RISK'ANALYZER: determines the predicted chance designated occurrence(s)= Plascore.
Examples of what's scored:
Access' Behavior Analyzer: determines chances user is an illegitimate user. -User's skills ability'scored. -User's chance of making an error, or not performing up to designated score.
HOW'SCORES OF USERS ARE MADE. See: uip; uip-db; analyzer; access' ba; user’s (and their boss' and coworkers and tracking systems) filing out or inputting into computerized interactive forms/questionnaires that develop a personality profile of user; -user’s past performance (uip-db) scored (as in a graph) -PLACE CONNECTION NOTE: in Access' ba (behavior analyzer) - for above, below to reaction. analyzer calculates the reaction of user in each typical case scenario= via running possibly existing business scenario type softwares, possibly used by businessmen trying to brainstorm business strategies and or to learn how business runs and the effects of business decision making...
INSECT BEHAVIOR ANALYZER: Electronically monitor insect behavior for research benefits. What 15' behaviors might be monitored, and how? Possible methods: Visual Analyzer follows movement patterns and sends in digital reports. Can use other types of creative sensors.
BEHAVIORS ANALYZED: The personality / psycho-sociological elements, histories, risks analyzed. The person's: -creativity [see article on enhancing creativity] -value to company: skills; reliability; speed of work; their work history -social skills: ability for them to get along w/ friends; peers; co-workers; teachers... -psychological profile -sociological profile
See 3E061 Motion Tutor: Guides users to improve their movements.
END THIS FILE BA&
File: Features Intro / Balancer
BALANCER 8B110 Automatic Speaker Balancing System: The volumes from each speaker adjust according to where you are. Adjusts as you move.
PERSONALIZED SPEAKER BALANCE: Sound system automatically compensates for person's location in room. When they are closer to one speaker, the farther speaker gets louder.
For home, car, etc. speakers. -Multi-User: senses where the "averaged" center of all people is and adjusts speaker balance accordingly -system identifies location of people via: motion "sensor", and or laser tripping device, etc. -identify location of people also by: the portable transmitters they are wearing or carrying; can be attached to a "R" control device which also has many other functions; sensors on seats, egt in automobiles -Extra fancy choice: If there are more than one persons in the room, and one likes high base while the other prefers it low; they system can make some compensation by adjusting according to each person's locality in their room. Each wears a different transmitting device; or program room so that it stays thus permanently. The option of this working on a transmitter basis is not required.
OTD: "R" Control; = "S"; = "C"; - mp; = pp; = uk> = toy; ' all; = "mic"; = synth> ==portable> = "M"; = bp; = osc; vc; = score.
R198 Stereo turns to face the listener's REMOTE ("R") control transmitter. [eg: give N# for our balancer). 22 Feb 93 NK
Sound Follower & Balancer: As person walks, the speakers near them are activated. *-Ap: **-games; **-getting information while walking down hallways; **speakers may be portable, as well as microphones "*-couples as paging system in large buildings; -television scream's position adjusts to best position by where person(s) are.
-system identifies person's, animal's location via movement sensors; then can announce statements via speakers nearest their location *-same product might also be used to broadcast via the speakers according to product's central control (not based on positioning of human(s) -related to product I C-291
O-Walk About: +-According to user’s location, the speakers balance their sounds accordingly. -user’s transmitter (PS); or systems motion detector determine locality of person(s) and decides which speakers need more or less sound. --ifthere are more than one people, then system balances sounds according to the rough center of the multiple people -ap: television, radio, any other music or sound generating device 0-The following was product number 1 C-050: Sound Walk About: continue to hear the sound of what you are listening to regardless of where you go in the house or other premise. -when on speaker tel, you can continue to speak to person throughout your room/premise since the covered area has multiple microphone and speakers
-when watching television or listening to sound system, you can hear almost equally as well regardless of where you go. Even different tv screens can automatically go on when you enter a different location. (Ecologically minded people don't want multiple tv's on at same time). -person walking around has transmitter identifying their location and or transmitting their outgoing voice via their microphone. -related to productNo 1 C-110 -OTD: remote control of balancer; pp; mp; date (at certain times the balancer is programmed to over-ride where people are and has a set balance that is needed); interactive%; basic; vc; score%; md; cp; mq; access; UIP; clap; distancer. -BALANCE: ACCESS (sys works only for certain u (user) (who have access))/
C(computer) / CART (sw for controlling balancer)/ CLAP (control)/ DISTANCER / K/ LOCATOR / MP / MQ /
MULTI-USER (each person (u) has different preferred settings for balance and other (stereo) settings)/ NOTIFIER / R(remote control) / SENSOR (ups location)/ SPEECH / SP TEL (speakers for T(tell) are balanced)/ STEREO (balance)/
SYNTH (according to ups location in area, sounds are synthesized differently (to compensate) (for street noise, acoustic structure of area, other need as pp)/ UIP (sys determines w5 balance works)/ UQ / VISUAL
ANALYZER (determines location of one or more users)/ VR* / W5 (pp how balance works) = BALANCE.
For two or more people, system uses the middle point in the (approximate) center. Also titled "Balancer". See
--C93 Stereo turns to face the listener's remote ("R") control transmitter. 22
Feb 93. D: remote ("R") = C93 (osc/speakers) -D: I remote ("R") = 2 tr/3 "sensor" = 4 "C" = 5 signal converter = 6 amplifier = 7 speakers/8 display/9 other function -OTD: 4* mode of balance shown on display ("S"); 4** cart (software cartridge) controls type of balance; * entertain; 4 uk; 4 pp & mp controls balance; 4* multi-user (each user has different setting for how they want the balance to work for them, eg: user keys in code or certain button signifying the program is to run according to their previously entered pp); 7 8 9*speech; 3 senses people via: pressure sensitive panels in chairs, *heat sensors; for one or more user’s their remote ("R") designates their location, since "sensor" judges distance and location of the remote ("R") (via changes in light/radio frequency wave length, GPS); 1 can also manually control which speakers are louder via buttons (arrow keys: < or > going up, down /sideways). User(s)' location also identifiable by user(s)' "remote": user can "uk" desired function/how 7 8 9 adapt to user. 8: "C" or
TV/Cable scream adjusts/angles itself, to give user better view. 9: *telephone nearest user’s tr/remote rings. -according to PD (GPS) location, osc (outgoing sound communicator) automatically balance accordingly.
Manually set the balance for two or more speakers in one or more rooms -includes sound functions found in virtual reality (vr). Other examples: as listener changes distance from speaker(s) oso might be modulated to depict yelling (with beckoning that listener come back closer for more "interacti ve"/wh ispering.
-R's K control how speakers are balanced, eg: sliding knob pushes to left or right / arrows (2 to 4(going.in all 4 directions: N (invention) S W E)) control speakers (in similar manner as on most stereos). Supplements other described ways of controlling balancer. D: K(keyboard) ((arrow) button(s)/sliding knob/ = r = tr (transmits) _
C(computer) (sound source (player/*recorder) = osc (speakers (2 or more)))
US Patents = Balancer -str: balanc*, audi*, speakers. ++ US Patents: 5287102 "Whenever the pointer is located between the left most and right most icons, the volume is balanced substantially equally between the two speakers" I.B.M. = "Balancer" -see KN's own pat application.
OTHER ELEMENTS ADJUSTED FOR PERSON'S LOCATION: S's angle, **blowing of wind from HVAC [Heating Ventilation Air Conditioner], *lighting (so that glare is reduced allowing user to read "S" comfortably. -See "Brain": sys' part adapts according to circumstances. -US Patent No: 3.497,622 Balanced Remote Control, 1980. This is very similar to main section of this "balancer" part. -"Tilt": controls sys' functions, eg: turn end of stick to left to the degree the left speaker is to increase/*decrease/alter (via synth) its (designated portion of) sound frequencies.
END OF THIS BALANCE SECTION.
File: Features Intro / Basic*
BASIC *
READ THIS LATER
Optionally applies to [all] electronic central descriptions of our functions listed in the functions section; and under invention numbers, *plus their links.
OTD: #1+: every electronic hardware product has a "C" (computer) in its diagram. This "C" is labeled 'C1' within this "basic" Part. *#2: languages for software program, button labels, printed instructions: English,
Japanese, Russian, German, Spanish, French, Italian, Mandarin Chinese. (Connects to Cl: #2=C]). #3: Easy and cost effective to repair. *#4: Automatically switches to the applicable electrical currency: 100/110, or 220 volts. (#4=C1). #5: Long lasting design: one year warranty; designed to take shock (can be dropped 8 cm to hard floor without damage); semi-water proof; one version of product operates in temperatures between -10 C to +45 C. #6: Beeps a sound of one or more sounds upon activation or turning of crucial feature(s), eg: on/off switch. Different beep signals when: all systems are in working order, at the time user turns on system, sound for each separate key, etc. (D) Drawing: Status of system = tr (transmits) = osc. (#6=C1). *#7: Has the other hardware and software functions and buttons common to the related products. (#7=Cl). #8: For consumer and or commercial and or peaceful and friendly scientific applications only! Is good for mankind. Ecologically friendly. #9: Memorizes all previously entered programming signals after being turned off. For example: previous settings for: volume control; way in which machine should respond or function in different situations.
User easily re-programs ("pp") to make alterations. (#9=C]). The old Part used before 1994 for this was "me". *#10: Product design, and the included "mp" & "pp" functions, are designed with the intent to hopefully be interesting, and as easy to learn and use. #10=C1. *#11: Specification tries to keep manufacturing costs down. *#12: One or more variations have sleek miniaturized product design. *#13:
Malfunction Alerter signals W5 (especially: why) a likely technical failure has occurred. Sensor= analyzer = osc/display/printer. (#13=C1). * 14#: Outer product casing & colors designed to maximize potential purchases based on buyer psychology. * 15#: Meets the other many common sense requirements of western manufacturers and users. 16#: Option:
Battery Powered ("BP"). (BP=CI). Automatically recharges batteries (located in back bottom of device) when plugged into electric wall socket. Automatically powers system if other electrical energy source fails. Display can be made to show amount of energy in battery; warns 30 minutes or more before battery goes out via sound or light or notice on display ("S") or %notifier. %uses standard functions for saving energy (device partially or fully shuts down after 10 or more minutes of non use, product design requires less energy for most functions, system may save energy in same manner whether it is drawing from standard or battery's electric current). 4E010 Motion Powered Re-Chargeable Batteries. --Solar powered option: product is connected to solar panels, or has the panel(s) located on product where it is most likely to receive maximum sun exposure; * portable solar panels; battery as back-up (rechargeable and non-rechargeable battery options). Solar panels/electrical outlet = charger/analyzer/display = battery. *17#: designed to be less obstructive in possible electronic interference with other products, such as: air travel safety, computers, other wireless products, etc. #18: Waterproof system (buttons keep out water using special diaphragms). #19: Designed to take normal wear and tear (semi-shock proof). #20: Transmissions ("tr") via one or more units in the system ("remote") can be via: wireless/wire. #21:
Product can be cased in: cc/cm/cp/cr. #22: Standard, and more expensive upscale models of the standard system can be developed. *#23 "Billing". #24: +R28-1 Repair software analyzing system: Studies product's history.
END OF THIS BASIC SECTION
File: Features Intro / Billing
BILLING
This function creatively determines ways in which to charge users fees:
Fees can be charged digitally, and or come in the form of license fees paid as royalties. Royalty rates can be flat percentages of (wholesale) pricing (with or without a monthly minimum).
Applications - additional: Study ups behavior = UIP; "track". 3E190 GPS Billing Systems: See "PS" Part's "Track" sub-section.
Customized billing based on:  score for type function/service rendered [higher scores designate'more expensive function]; volume or promotional discounts; surcharges [based on user’s profile (Xba)]; country currency; delinquency [penalties]; tax surcharges; services/functions offered but not utilized [as determined by analyzer / tracker].
EXLUSIVE LICENSES: Access can restrict usage to, or away from designated users and or markets (the
Japanese - South Korean region). Bills paid by [primary] licensee (authorized user).
6B220 MONEY METER- ROYALTY GENERATOR:
Device shows through window the amount and rate at which the internal meter is clicking away, paying for the [parking] meter. Saves from having to collect coins, have coins, dealing with broken meters, running to and back to car. Pay only for invention features/services/what you use, some people might over stay because they are over paid. From economic point of view, people might get their business done more quickly were they not planning to spend a set predetermined amount of time doing something since "the clock is ticking". -cities might have lower rates per minute for shorter term parkers; limit total parking time (shown on display ("S"), and such display ("S") will only go off after driver has driven the required number of meters, not reinserting more money into meter) -signs can state at what rate driver should be setting their meter -for people traveling to cities outside their state, the home state (or wherever meter is registered) gets the money, yet perhaps an equal number of people are traveling out of their state so all balances out. -if product is cheap enough, all car owners can get such devices at the time they get their car safety check as required by law -saves space on sidewalks, can take away the parking meters -device can flash, etc if car is illegally parked, eg: over time limit, ran out of money -color code(s): depending on type place and restrictions of parking as programmed by driver, color(s) show up for easy identification by parking meter police inspectors -drivers with unpaid traffic tickets can't put more money into their parking meters. Pay for meters at gas stations, etc. [Money deducted automatically from person's checking account] -o-account is deducted automatically for traffic violations: car's device transmits coded message of license number and province of issue, police grabs info on speeding cars, or receivers might be done by computers working without a human; parking violations: police simply key into their system car's license or other number which automatically creates a deduction from account -car owners get periodic statements explaining type deductions made -car owner might have special combination via which to activate certain features, eg: parking, etc. Reduces ability for unauthorized usage. -"Tracker".
BILL - READ LATER SECTION MAYBE =
Functions / Services / Information utilized: -OTD (D) Drawing: U = This N sys (system) sub-part (what's can be made available; pay for these) - C (computer) =
ACCESS ; ANALYZER (have "brain" achieved desired purposes, or "analyze" designated subject matter; like hiring an automated thinker); cart (software cartridge); EDIT ; EDUC ; MULTIUSER (allowing multiple u); nr (notifier) (pay for this service); OSC; PR (pay for ability to reprogram); PS-Zone ; Q; R; ROUTER
SCORE ; SENSOR ; SOUND ANALYZER ; STATUS ; TDS ; T; TILT ; TRACK ; U; UIP ;
VISUAL
ANALYZER ; VR*; WA.
Limiting "Access": based on amount u (user) can / may I did / promises to pay. -OTD D: U = This N Sys (level of "access" permitted = determined via; type/leve] of usage to date) - C (computer) =
ACCESS (type/* level of usage to date); ANALYZER (type/* level of usage to date); CART (type cart used);
EDIT ; MULTI-USER (who u (user) is); nr (notifier) (u warned upon excessive usage); PR ; PS-Zone ; Q (type /*level of usage to date); ROUTER ; SCORE (level of usage to date);
SENSOR ; SOUND
ANALYZER ; STATUS (level of usage to date); TDS (level of usage to date); T;
TILT ; TRACK ; U; UIP (type /*level of usage to date); VISUAL ANALYZER . * Modes of transmission: (tr) to U/(U's) Sys or N: C = C; U's C= M; T; "modem"; RF; infrared*; wire; OSC;
S; "game", "educ", "entertain". Mode of "interactive". -OTD D: U = This N sys (system) sub-part ((what determines / how / type) mode
ACCESS ; ANALYZER ; cart (software cartridge); EDIT ; EDUC ; MULTI-USER ; nr (notifier) ; PR;
PS-Zone ; Q; R(remote control) ; ROUTER ; SCORE ; SENSOR ; SOUND ANALYZER ;
STATUS ;
TDS ; T; TILT ; TRACK ; U; UIP; VISUAL ANALYZER ; VR* ; WA.
Miscellaneous: bills in any (major / hard currency). Credit checks usable.
Credit cards and other financial instruments, eg: bank checking accounts may be verified, prior to offering service / credit. U w (with) good credit can still be blocked if / when they are (perceived = via: uip-db, +"access", security personnel) villains, hackers, or other undesirable elements (of society) (needing to be restricted (for the benefit of society / (local) economy). -Gen D: u (user) / sys (seeking to gain "access" / to utilize) - C(computer) (cart, access) = M = What's desired (by U): function / service / db (information). -See article: "Copyright wrong? A fight brews over who gets to own the future", US News & World Report",
Sept 18, 1995, page 99.
-patent search strategy for this general part: (bill or billing or bills or (credit adj card*) and (information* or (electronic* near5 service*) or internet or (information adj highway*) or web*)
-billing programs and fee schedules offered to u based on ups previous history (what services / functions were used (w5); all customers can qualify for any billing rate applicable, but those offered may be different, since seller will maximize likely chances of their increasing profit /*revenue.
Faults and how overcome - additional: -Problems: illegitimate "access", credit fraud, inability to pay. Solutions: "track", credit rating reports developed* / ordered, uip for targeting likely problein makers. -Excessive expense: discounts given to charitable and educational and younger* aged u (user) (w limited services for such targeted audiences, and limited time).
Charging users utilizing information / functions / (el) services. Limiting "Access": based on amount u can / may / did / promises to pay. Limits: Functions / Services / Information utilized.
-R127 [Commuter's train ticket credit card: circuit emits frequency read by device in ticket gate. JR (Japan
Railway) ]. Also copied to "Access", "PS", "Score", "Track".
END OF BILLING'S THIS SECTION
File: Features Intro / Brain *
BRAIN * (Artificial Intelligence)
This Older Function Is Now Changed Mostly To: Computer, Analyzer, *'Coordinator, Etc Functions
Artificial Intelligence - Software that tries to emulate a human's brain functions as best as possible, including inventors, and bright and/or creative people we researched in the past decades around the world.
(C, SW, Analyzer, UIP, Access) = Any of brain section in this file:
Synonymous with "Computer" part; similar to "Peter".
System tries to think like a human brain (where (w5) feasible), system tries to know/learn (memory, analyzer) its limitations. Uses the best state of the art in the field. Fuzzy logic.
DIAGRAM #1: 1 uk = 2 c = 3 tr (transmits) = 4 M/5 function. D]'s Read Later:
Explanation for previous diagrams' parts is based on the number in the diagram. Commas below aren't usually used to separate the part numbers, eg: "25" is the same as "2, 5" 25: access/analyzer/uip can be changed via pp, mp, cart, u with higher (overriding access/analyzer/uip, eg: supervisor, C(computer) sys itself); character; 24 tds (×time date stamper) (scores w5: when, *how, *what, %why, who gained "access" into system - [may also be used for uip [database], 4E020 Content & Date
Verifier]; 25 "S"; 23 %distancer activates/deactivates lock; 245 "C", 4E020
Content & Date Verifier, 2E251
Intelligent Monitor; 245 %interactive (activates/deactivates access/analyzer/uip, 2E251).
13: signals for activation/deactivation of Analyzer/U1P/Aocess can be received and or activated via: microphone ("mic") (sound signals activate/deactivate access/2E25 1); tel ("T"); mo; tr; %fs (correct image eg: signature); remote ("R"). 2: *tilt (2E251 activated by N's movement); *distancer (eg: clapper); 245 mp; 24 mq (prior to activation/deactivation; for uip database upgrade, Analyzer/UIP/access); 24 multi-user (Analyzer/UIP/access; individual requires own password or other activator/deactivator to gain access); 245* notifier (who, what, when, %where, why gained access, and or is using system, and or
Analyzer/U1P/osc); 25 osc (if
Analyzer/UIP/password or other activator / deactivator effected desired function, eg: gained access); 24 uip (Analyzer/UIP/access draws on UIP's database to mq prior to
Analyzer/UIP/allowing user access to user; 24 questions for Analyzer/UIP/access - change according to user’s uip (mq an action user made on system in one of [important] previous activities); 24 pp; 24%score (2E251). 2 the necessity for any AnalyzerlUlP/access features might occasionally be trivial, but may at minimum assist in marketing, and helps organize differences between multi-user; uip. 24tds of user’s past access is used develop/alter Analyzer/UIP/access.
Excessive or insufficient usage (as determined by: Analyzer/UIP/Access) can exclude/limit u (user) from some/all functions, trigger "notifier", and inform the user’s supervisor via tel ("T"), mo, e-mail; helps in billing u; nr (notifier) sent (to supervisor, security) for unusual quantity / type activity. 24 the type of uq can consequently (according to system's uip, mp, pp) affect/control
Analyzer/UIP/password/manner needed to activate/deactivate; 5 speaker. -includes known (c) systems which "Analyze"/UIP/restrict "access" of people / other systems to: use, work w (with) particular el N.
Read Later (D) Drawing: This N (invention) -2E251 Remote Controlled Camera: (sys monitors people according to their access/"Analyzer"/UIP/(code)).
-3E040 3E041 Telephone Noise Canceler: (sound sources identified by their tr (transmits) (analyzer/access/uip code transmitted) are processed/handled differently as pr; system better hones into/away sounds w (with) or wo such tagging transmitters) -3G010 T(tell) Ring....(only for calls coming from particular CID, "Analyzer",
UIP) -4E020 Registrar -E020 form of remote control -5E080 analyzes for better acoustics -5E090 Wireless Music Band: (access limits usage of certain portable el N) -5G061 Dyslexia Software: (speed at which info given determined by ups
UIP/access: either u gets info faster (inhibits uninitiated computer hackers) / SW (software) slows down when c/security guards need more time to "analyze" the "access" level of u (who is being questioned (by c); 5G070 Speed
Reading Software) -7G050 &= 7G051 PVC Perforation Alerter & 7G052 Flexed Level Notifier: (type "Analyzer"/UIP/access determines: type of pvc needed (for extralless protection: to save money/trouble); which types of occurrences (chemical contact, perforations) need nr (notifier) to u/sys/monitor)
-9G220 Channel Scanner Skips Stations Having Commercials: (analyzer/access/uip determines what (w5) u (user) needs to view (access), communications/data that can selected include: t, mo data, a/v material, db, m access, usage of R(remote control) functions. sys (system) blocks: commercials, aspects of data (which are coded as restricted to certain access coded u) -"Bill"
% Read Later This N Part (Brain, Analyzer, UIP, Access): -2E251 Intelligent Monitor: ; 3E040 3E041 Telephone Noise Canceler: -3G010 T(tell) Ring Delayer: (w5 sys delays ring (on a caller by caller basis)) -5E080 System self analyzes best synthesis for acoustics of room/hall: -7G050 7G051 PVC Perforations Alerter: ; 7G052 Flexed Level Notifier: -9G220 Channel Scanner Skips Stations Having Commercials:
%-o-C112 Computer predicts human error. Input UIP (working conditions of person). System predicts errors there likely to make. 30 Sept 92 YD. -utilizes fuzzy logic -Sys analyzes ups actions -> database (behavior). Eg, Ubiquitous computing: u(user) carries (tiny) "c" that communicate with other "c" embedded in: appliances, t, cars, walls, KN. Eg:
Xerox's Parc Tab, and other products mentioned in "Popular Science" Feb 95 from p.47. 2D-021 Sys reacts to external products according to "analyzer"/uip/"access"/w5:
Eg: Incoming-Call Identifier - Screener / External Element Identifier. Calls from desired tel numbers have a different ring. Hereby caller knows whether to pick up the call or not. (Designating different type connections / (incoming) calls related to another of our ideas?): sys (system) responds differently depending on which other
N/sys/existing product wants to "interact" with it. --sys knows identity of other part/sys via its: "access" / code / tel #/ uip (behavioral characteristics of N, or'U: how it moves / functions / responds (to stimulate from central "C" or "M") / visual analyzer / sound analyzer. -D: Central Product / Sys = C = sensor / analyzer / uip analyzer / caller ID sys part = tr/rc = External Product /
Sys. -OTD: NOTIFIER (when desired contact has been made with part or organism); PS (location of external product is a determining factor in deciding if any/type connection/contact is to be made); R; ROUTER (routes external product by their type nature); S (shows status). =-UIP=Analyzer: A sensor that connects tq u (user) (human body, eg: finger wrap; animal*) to read electromagnetic signals generated by the skin. Proprietary software interprets those signals and translates them into actions. Being researched by company: Other 90% Technologies Inc.,
Sausalito - See Wall St. Journal 1995 (maybe 6.95) article titled: Mind Games: Soon Youil Be zapping Bad Guys
Without Lifting a Finger.
Finger wrap will sell for $100-$200.
OTD D: This sub-N (monitor) / C -3E020 GPS Record Keeper: when object goes in / out of range / desired uip = monitor (begins) "analysis". -3E151 GPS Circumstance Correlator and Controller: when object goes in / out of range / desired uip = monitor (begins) "analysis". -5E040 Recording prompted upon presence of certain sounds: when object goes in / out of range / desired uip = monitor (begins) "analysis".
% See 4E020 Content & Date Verifier: Sub-N of "Brain". % 9G220 CHANNEL SCANNER SKIPS PARTICULAR INFO: Sub-N -This main sub-N is for skipping tv commercials. -Dissemination of codes from 3rd company source, continually broadcasts signals guiding entertainment system to avoid channels which are in commercial mode at any one time. Charge
-system codes type data/shows by: status /"analyzer"/uip/"access". In tern, sys (system) knows (better) what (w5) to focus on / "analyze". -OTD: D (This N) =
ACCESS (to monitoring organization / u (user) / prevent non subscribers from using service); ANALYZER (uip); BILL; CART (sw of uip, pre-recorded entertainment); M (monitoring service); MIC (voice); MULTIUSER (each u wants differing stations to enjoy); NOTIFIER (connection w (with) monitoring service terminated or if problem); OSC (w5 advertising starts/stops; W5 (what, where, vhen, why and how) desired programs are (about to be) broadcast); PR (uip; synth; osc; stereo); PS (broadcast shown in room u (user) is in at time); Q (how use sys); S; SCORE (ups past usage pattern, eg: w5 for type entertainment; T(tell) (mo; ups sys / this N= monitor service's c); +UIP ; VISUAL ANALYZER ;= WA . % Other (far out) applications: u nr (notifier) when services are cheaper due to drop in usage by other users. -utility users of: electricity; (long distance / cellular / expensive) telecommunications (t); satellite usage; M usage (database, number crunching, etc); gas (cooking, heating) *. --u nr (notifier) when services are being less used, hence charges drop at these (unexpected) times, or prices rise at unexpected surges in usage. -System determines via its "analyzer"/uip/"access" the content of material --especially useful when material / broadcaster / service provider doesn supply codes / access which helps ups selection sys (system) select for their tastes/needs. -"analyzer"/uip/"access": ups situation changes by the hour (for business), hence ups needed info changes accordingly ="analyzer" determines what needs selecting = this N.
END OF "BRAIN *" SECTION
File: Features Intro / Camera*
CAMERA *
3A930 INTERACTIVE MICROSCOPE: when I) colors, or shapes change beyond certain point, or 2) certain color(s) begins to take prominence in a microscopic growth - triggers alarm -the brain of system memorizes the (timed picture) point of reference from which it should notify the user of change -UP approximate level of change wanted before being notified -motion "sensor" {might have clock which date stamps & memorizes when certain movements were made, and possibly visually store such occurrences, eg: small organism gives birth, or moves across screen} -has date, time calendar, which can also date stamp each picture -built in alarm designed to go off at certain time (based on clock only) and or if something changes significantly enough in image -saves man hours -microscope applicator: injector will inject, spray or drop in chemical(s), food, etc into area(s) being observed by microscope.
Injection occurs at appointed hour on its clock and or when certain changes have taken place -at desired timing/occurrence(s), invention can (on microscope slide): cut; or connect two parts/regions; agitate, etc via: laser, cutting instruments, needles,shaking device, etc. These functions can be handled via a small joystick type device; comm&er type mouse which shows on screen what needs to be altered and theft device handles rest on its own. -display shows what was done and how and how effected, and kept in memory -computer with its software, which operates one or many microscopes simultaneously, can record new general scientific tendencies and chart riumerous graphs and tables from collected data -software has [all] functions common to {many} any database or scientific softwares. 413020 Content & Date Verifier: of (any said) occurrences 6B110 CAMERA ALERTER: Signals cameraman when technical difficulties are occurring during filming.
For still or motion cameras. -when excessive movement(s) occur, device will emit light, [sound] via externally broadcast means (noncamera people might know about problem), and or through eye viewer (seen by cameraman). Purpose: redo tape while actors, set, etc are still in place; perhaps cameraman was not so aware (or director isn't yet aware of cameraman's poor abilities). -catches: low light; when item being photographed moved to quickly (cameraman simply ignores this warning when the blur from excessive speeds is wanted)
-signals to cameramen whenever any normal technical filming problem occurs: poor light; bad sound frequencies (too high pitched) -for still and motion cameras of all types
OTD:
Signals whenever these problems occur: certain colors that are not well reproduced (or reproducible) onto film;
Codes: all; "S"; "C"; pp; mp; uk; date; educ; "mic"; synth; portable; sst; "M"; bp; alerter; osc; vc; score; teach; cart; cp; for still & motion cameras.
6B100 REMOTE ("R") CONTROL: control the rolling of film; direction of camera (camera might show what it is catching on a tv screen - allowing user to better direct camera); light; speed; etc. -control with wire for on/off exists 6B160 KEY CHAIN CAMERA: portable or regular camera attached to key chain. Has auto focus and exceptional ability to take pictures in all light conditions, especially dark and work with infrared flash (can't be seen when flashed by humans). Takes picture fairly quietly. -purpose: picture people attacking user, or criminals at large; special occasions when you really wish you had a camera -may shoot in black and white if quality of photo is easier in this mode 0 -might hold 20 to 36 pictures; or only 8 or so if this will allow camera to be much smaller -has feature which will take all except last two (or so) pictures in quick sequence automatically (camera will refocus between each shot)
6B170 ELECTRONIC POSE: prior to taking picture on still or video camera, device entertains and or cheers up and or makes people being photographed more relaxed and or photogenic. by: -flashing lights and or sounds -display shows moving or stationary: character(s), faces, -doll pops out, with or without sound and surprise -audio states things or makes sounds -device is built into or separate from camera, video camera
* 3C-440-083005 CAMERA'S ENTERTAINER: Creates surprises for better pictures.
Examples: something pops out one second before the cameras flash; has 1,000 different possible audio messages. Similar to KN (invention) from A or B dir. -Tripod'Entertainer: puts kids, adults into good moods for photo taking.
*.-Costumes: - each of three legs made to look' like that of a creature's eg: dragon, pig, chicken, angel, madam, witch, elephant, goat, dog, cat, fish, etc. *.-attach electronic entertainment, eg: flashing lights, with or without sounds (OK for still life) - sounds can even be of laughter, etc. -4A-41 product number is merged herein -Only the below is wanted for the patent application. The above helps explain the basics.
Device can move, even in unexpected ways to create interesting reactions for photo. There is just a second or more from the time the device pops out something unexpected to the time the camera takes the shot. -the device may have many different options of creating excitement, thereby allowing several different picture takings. + the "surprise generating device" may also be part of cameras, even the disposable kind -the surprising device reduces the chance of shock to the camera, so there might be at least a second between surprise and camera shot =
Possible types of surprises: +-something pops out and dangles + a verbal announcement, sound or music is created which can be humorous, shocking, etc. -surprises can also be a sound which is selected from a memory of 10,000 possible sounds, words, and interesting unexpected phrases.
OTD: "R"; "S"; pp; mp; uk; mouse; date (activation of surprises); interactive; toy; entertainment; portable; sst; bp; osc; vc; score; tgh; md; cart; cm; character.
3C-490-083005 THREE DIMENSIONAL CAMERA: Computerized system analyzes shape and reproduces image into plastic. Special camera memorizes each section's distance from lens. Pictures are taken from multiple angles. System merges all data to compose dimensions of object. Data is for analysis and or transmitted to the reproducing device. Example applications: Copying sculpture, machine parts; easily redesign objects with accuracy.
3 DIMENSIONAL, ETC: Camera shows the heights and depths for all elements in the photographed frame.
This information is merged with a real life photograph. Each distance factor (from the camera, etc) is coded by: a different color/shade; or, small numbers throughout the photograph showing the distance(s); or additional photographs which exemplify distances...
OTD: "S"; "C"; pp; mp; uk; mouse; educ%; toy%; basic; (microphone and synthesizer: convert sounds into corresponding images and then onto objects, eg: sing in a deep voice and make string sculpture, sing in a high voice and create image of laughing monkey)%; printer; au; t; c; ose; speech%; vc%; egh%; score; cart; tr; mo; cm; uq; mq; access; pi%; character; clap%; distancer (used to generate images)%; multi-user; remote%; notifier; air pad; visual analyzer (compares final product with what "C" said device should look like).
-Sys allows for self-guiding in three-dimensional world. Applications: "locator"; judging distance ("distancer") of object/villain/their speed; understanding relationship between designated elements (object/person) w (with) environment.
* 2E-100 GENERAL DATA ON VIEW FINDERS (N 2E100 to 2E130): for moving pictures (video, cinematography), still life (color, black/white; with images onto film and or stored in memory). -D 1: 1 camera lens = 2 camera = 3 image conversion/computer = 4 image transmission = 5 view finder -D2: 7 "printer"/8 "mfh" = 3 computer ("C") = 6 "UK"/9 "osc"
Notes on D1: 12 3 for: any type offilm, eg: video, cinematography, still motion photography; 3: huge memory
OTD for general data: I access; 1-7 air pad; artist; 9 balance; basic; 3 cart (software cartridge) (image editing, information processing/organizing (type menus)/transmission modes)); cc; au; ch; 5 7 character; composition; 3 date; 5 display ("S"); educ; entertain; 3 "C"; float; 7 fs; game; interactive; 3 locator; md; 8 mflh (for live broadcast, editing possibilities, storage in "MFH" of images); 8 "mic"; 3 mo; 3 9 motion sounder; 3 mouse; 3 6 mp; 3 5 6 mq*; 3 multi-user; 3 6 notifier; 9 osc; 3 8 uip; portable; 3 6 pp; 7 printer; rcp; 6 remote ("R"); 3 6 score; 3 sound analyzer; 3 9 speech; 3 sp tel*; 3 stereo; 3 connects w/ any video display/retrieval/recording system; toy; tr; uk; uq; vc; visual analyzer; 3 4 5 6 8 9 wa.
Additional Applications for fit' [this new general product category section 2E100 - 2E130]: any one or more of the following applications/products in its' fields may be used separately and or together; with or without fit':
$ 2E110 CAMERA LIGHT ANALYZER: Determines from which direction additional light is needed.
Suggests ideal type light sources to integrate with existing lighting, via use of its light frequency analyzer. This invention doesn cover how this could be done. -(Camera's /"Lens"') Lighting Analyzer/Demonstrator: the source from which more light might be needed and or how much more light (watts needed). Mk? Cost to produce? -D: light "sensor" = "analyzer" = computer ("C" / "camera") = display/other output -OTD: u k / sys "analyzes" colors visible via "camera" lens -> in tern the necessary light / other factors necessary for desired effect (known via: uip; pr; q; analyzer) are made known -> to u / sys (system) -> sys / u adjusts sys accordingly -> improved imaging (onto film / memory=c / "printer" / projection (onto wall) / slides). -for semi-professionals, yet top professionals don't need it. -camera gizmos been around since 1800's -To make more patentable: Sys or u says one side of human face needs more light, because it's a face, it adjusts suggested light needed (eg, because reader read idea in article). U says they do/don't want light evenly balanced. -Patent search strategy: -(guide* or tutor* or analyz*) and direction* and light*
-guide* and direction* and light* and,angle* -problems needing to be overcome: sys knowing how to suggest (via "analyzer") in which direction additional/less lighting is needed.
* 2E-120 AIR PAD VIEW FINDER: Exists -Watch yourselves when making videos by looking into the viewfinder while filming. Good for indoors or outdoors. --the viewfinder can be with wires; wireless version transmits from camera to view finder via: cellular tel ("T") technology -Watch what is happening in another room, or part of the world. An advanced version of AT&T's Video Tel
-also view TVNCR on system -D: camera = computer ("C") = transmission = display ("S")
* 2E-130 IMAGE-DATA PRINT OUT: Conveying of images to non-film medium: =print out, fax/tv teleconference transmissions/receptions of the view.
Application: show images to directors at a different location - helps get quick approvals from ~directors/customers while things are in place. --transmission(s) via tel lines, wire, radio frequency, cellular tel lines -sender = visual/%audio signals = computer ("C") and software = alter the images = print/transmit.
The receiver of the transmission may tell the filmer what they want by altering the image *this way. --effective for situations for which time is crucial, eg: live tv news casting -Date Marker: "TDS" each screen ("S") and or segment of shots taken.
* 2E250 VCR CAMERA: An improvement of Sony's miniaturized camera. 1 Camera = 2 base/3 recorder =4 tr/5 editing/6 play back/ 7 other.
OTD: 2 image converter; 2tr air pad (viewer/control camera); artist (edit images recorded, eg: add graphics); basic; 2 cart (editing); cc; 2clap; 2composition (combine edited visual effects with composed/edited/synthesized audio); cp; 2date; 2display; 2 distancer (activates/deactivates camera/system); entertain; 2 "C"; 123 float; I camera works (under water 5000 meters below sea level, and in all weather conditions); 2fs (fs out images made); %game; 7 satellite; 2gps (system will state/show the location in which view was made, help analyze correlations between location and audio/visual data collected for/from such locations); satellite controls w5 images are shot/recorded/"tr"; interactive (camera shoots in certain instances: when 3"visual analyzer" is triggered in any way like a motion being sensed, type of image made is automatically 3routed/edited according to how "visual analyzer" analyzed image); 2"locator" seeks desired object/situation needing to be shot, and directs camera; md; 7 mfh; 2microphone; 2mouse (editing AN); 2mp; 2mq; 7notifier; 7 osc; portable; 2pp; 7 printer (prints images copied; 2remote; 2sound analyzer;
speaker; 7 %stereo (enjoy images made with tv/vcrNTR/stereo system; Ttilt; 2uk; 2uq; 2vc; 2visual analyzer; %vr; %wa.
R30 VCR RECORDS SUPER-SLOW MOTION. Captures 500 frames per second in real time. -[Nac Inc 2 May 92 NK] -visual recording system can also be "Camera" (still photo onto film / digital memory) -2E251 Intelligent Monitor: allows more precise "analysis" for changes in smaller time periods. Converts images into digital format.
OTD:
This N (Intelligent Monitor 2E251, Slow motion recorder) = ARTIST *:; CAMERA:;
CART *:;
COMPOSITION *:(visual display (s) matches the osc (outgoing sound communicator) (by tempo; theme (eg: upbeat music has upbeat images)); ENTERTAIN:; MFH:; MORNING **:; MULTI-USER*:;
NOTIFIER:(visual analyzer = C(computer) = notifier); OSC:; PR:; PRINTER *:(desired photos (from sequence)); PS:(camera tracks pd); Q*:; R:; S:; SCORE:(visual analyzer = c = score; *ids); SYNTH:;
TEL:(tr); UIP *:
+ R30-1 SELF ADJUSTING CAMERA MONITOR: Automated camera recording system alters itself according to occurrence. Occurrences include: existing security system detects possible trouble; visual analyzer detects interesting changes in unmanned research laboratory. Camera intern: increases number shots per minute (so can be played slow motion later), or activates microphone, or goes into zoom or wide angle, or turns itself on/off. -ACCESS **:(visual analyzer effects control of system (on/off)), eg: security application, capture people when sys (system) analyzes there appears to be a villain; o-additional situations (triggering "camera" sys responses): access code denied (yet person tries physical / c entry anyway); security system alerted (to possible villain), eg: see "access"; uip shows situation, eg: one or more of w5 plus other uip data occurring (simultaneously) (increases chances) that situation might want to be photographed (for security, research applications); visual analyzer = detects particular changes in lab experiment. -"camera" responses (to such situations): increases number shots taken per minute / increases recording speed; zoom; wide angle; "mic" w= "camera" activated; sound analyzer activated/controlled; security/observer nr (notifier) to situation. -D: situation (triggering sys (R30-I ) to react) = sensor = c (analyzer) = recording (a/v) / nr (notifier) (notifier) / m (uip)
R47 MINIATURE CAMERA [Hoya-Schott Corp, 2-7-8, Nakaochiai, Shinjuku-ku, Tokyo 161 03-3952-5011 1
Aug 92 NK] -D: camera = tr (transmits) (wire/wireless) = C (computer) / standard film using mechanism = "M"
-lens follows (points to) desired object(s) according to cameras pr/uip.
Images obtained used to develop uip. -OTD:
ACCESS **:; CAMERA:; CART *:; S:; ENTERTAIN:(see other people at party); "M":.
PS:(guides which camera needs to capture which object/person and at which angle lens should be pointed (due to tr (transmits) from pd)); this identical N (invention) probably in C(computer) dir (better
PP/MP:; Q*:; MULTI-USER*:; NOTIF[ER:(alerts to unusual activity as system intelligently determines via changes in pixels which in tern correspond to certain images designed to trigger an alarm), this is the KN "visual analyzer" code; OSC:; PRINTER *:; R:; SCORE:; SYNTH:; TDS *:(each scene); TEL:(tr); UIP *:.
R82 DIGITAL STILL CAMERA has built-in transmitter: pictures taken transmittable via tel lines. [Olympus
Optical Co: 2-3-I, Nishi-Shinjuku, Shinjuku-ku, Tokyo 163-09. Tel 03-3340-2121
NK 16 May 94] -2E251 Intelligent Monitor
R118 SYSTEM RECORDS VIEW BEHIND VEHICLES for truck drivers, eliminates blind spot. [Clarion, 17
Feb 93 YD, Before 92 - MF] -OTD:
CAMERA:; CART *:; CLAP: (for desired view/controlling "camera"); Display ("S"):; PD:; PP/MP:;
MQ/UQ *:; MULTI-USER*:; NOTIFIER:; OSC:; PRINTER *:; REMOTE ("R"):; SCORE:;
STEREO:;
UIP *: ("scores" past near accidents of driver); UK:; WA (walk about) (to improve driving perfon-nance / training).
A4-71 C T1NY PORTABLE CAMERA. Keep for emergency photos. Smaller size permits easy portability w/ some loss in quality.
Applications: catch hit and run drivers; thieves; give to police officers
Captures visual images and translates them into two or three-dimensional images in electronic media (digital) / film (video/color negative type). (D) Drawing: camera=tr/rc=c=tr/rc=viewer/r Many optional features, examples: Camera can zoom / pan as directed by c/system/user/"remote". Viewer lets user see what camera sees. Light/flash (direction of light can be controlled). Auto-focus. %-Location of PD (Positioning Device) / person (based on signals they generate: heat, vibrations, visual movement detected by cameras "sensor" directs angle of cameras lens. -Camera angle controlled via r, pr (program) on sight, and or from * remote location. -OTD: % visual analyzer =uip/notifier. + "Track", "Track" = "Visual Analyzer". -o-C86 Electronic Camera records still & moving images. Ricoh 3 Oct 92 NK & 8
Mar 93. D: R(remote control) = C86 -4E020 Content Date Stamper: Registers and organizes previous occurrences.
-Advanced Photo System (APS) (primarily for portable cameras) described in "Popular Science" 6/96, p.86.
Digital cameras.
"Camera - Control" IMI. Each of its imi belongs in another bigger imi. Camera is wo brain by itself, hence don't expand herein. Focus: w5 camera focuses; expanded in "va". track: expanded in track
VA: camera sees then responds accordingly; expanded in VA 2E110 CAMERA LIGHT ANALYZER: Determines from which direction additional light is needed. Suggests ideal type light sources to integrate with existing lighting, via use of its light frequency analyzer. This invention doesn cover how this,could be done. -for semi-professionals, yet top professionals don't need it. -camera gizmos been around since 1800's -To make more patentable: sys (system) or u says one side of human face needs more light, because it's a face, it adjusts suggested light needed (eg, because reader read idea in article). U says they do/don't want light evenly balanced. -<3, 3, 2, 3-mk>
2E251 REMOTE CONTROL CAMERA: Camera=functions are controlled as dictated by distant computer.
Computer records according to what its visual analyzer is seeking: what, when, how, why. Examples of when recording takes place: cells in petri dish divide; particular people enter or exit (system determines person via their transmitter or other means); there is any type of threat or disaster.
This is an application of the visual analyzer which is another invention.
-Remote control camera itself is not new. --Exists: c controls camera, eg: when: every 30 seconds, or when joystick moves. When there are no more parts coming down assembly line, sys stops itself. C (computer) moves camera under a preprogrammed manner, eg: panning every so often - probably not adapting to environmental changes. --Maybe exists: probably minor pixels change on frame-to-frame due to electrical static. But sys ignores such.
It searches for big changes. Then sys follows the big change's movement. But might not have improved above. --Maybe Patentable: sys identifies (particular) person (via uip (access, color, height, w5), then camera follows.
Then sys automatically goes to top 3rd part of person. Sys knows to go to top of image. ---nr when bottom of Petri dish is filled. ---point camera into nuclear plant, point at unusual area (hot), camera (infrared) then moves its head to other important areas (thereafter, which might intern be effected). -2E210 Image searcher: camera seeks particular images, intern shoots, follows, pans, etc accordingly (to pr).
DEMANDE OU BREVET VOLUMINEUX LA PRESENTE PARTIE DE CETTE DEMANDE OU CE BREVET COMPREND
PLUS D'UN TOME.
CECI EST LE TOME 1 DE 5
CONTENANT LES PAGES 1 A 313 NOTE : Pour les tomes additionels, veuillez contacter le Bureau canadien des brevets JUMBO APPLICATIONS/PATENTS THIS SECTION OF THE APPLICATION/PATENT CONTAINS MORE THAN ONE
VOLUME THIS IS VOLUME 1 OF 5
CONTAINING PAGES 1 TO 313 NOTE: For additional volumes, please contact the Canadian Patent Office
NOM DU FICHIER / FILE NAME:
NOTE POUR LE TOME / VOLUME NOTE: