Patent application number | Description | Published |
20080310621 | PRIVACY ENHANCED COMPARISON OF DATA SHEETS - A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an encryption operation for each of the data sets, the encryption operation comprising generating a commutatively encrypted data set of the respective data set, wherein the commutatively encrypted data sets are generated by successively applying a keyed commutative encryption function on the respective data set with the private encryption key of the respective data set itself and with the private encryption keys of the other data sets; and comparing the commutatively encrypted data sets. | 12-18-2008 |
20090254747 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING E-TOKEN BASED ACCESS CONTROL FOR VIRTUAL WORLD SPACES - A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list. | 10-08-2009 |
20090254968 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR VIRTUAL WORLD ACCESS CONTROL MANAGEMENT - A method for virtual world (VW) access control management includes intercepting a policy object from a VW network in response to a request from a VW client system to access a VW space, the policy object intercepted by a proxy server located outside of the network. The method also includes selecting an identity based upon the policy object, which provides credentials required in the policy object as a condition of granting access to the network, generating proof from the selected identity, and transmitting the proof to a verifier avatar located inside the network, the verifier avatar logically mapped to, and controlled by, a verification system located outside of the network. The method further includes receiving, at the verification system, the proof from the verifier avatar. In response to successful validation of the proof, the verification avatar places an avatar of the client system on a list of avatars having access to the space. | 10-08-2009 |
20100023889 | PROVIDING AN AD-HOC 3D GUI WITHIN A VIRTUAL WORLD TO A NON-VIRTUAL WORLD APPLICATION - A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting. | 01-28-2010 |
20110013771 | ASSERTION MESSAGE SIGNATURES - The invention relates to a method for providing an assertion message ( | 01-20-2011 |
20110029885 | Confidential Presentations in Virtual Worlds - Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation. | 02-03-2011 |
Patent application number | Description | Published |
20090248844 | Hybrid Profile Management for Electronic Social Networks - In the context of electronic social networking platforms, ‘hybrid profile’ management allows a user u to create and locally manage ‘pseudo-profiles’ reflecting the profile information of real-world contacts who are not actual members of the networking platform. The first-degree electronic social network of a given user u thus includes both the profiles of other regular network users who have agreed to be direct contacts to u as well as these pseudo-profiles. | 10-01-2009 |
20100058443 | Confidential Presentations in Virtual World Infrastructure - Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture. | 03-04-2010 |
20100088340 | ACCESS TO ELECTRONIC SOCIAL NETWORKS - A method comprising, defining a social network U={u, u′, . . . }, defining a set of relationships between users O | 04-08-2010 |
20100100926 | INTERACTIVE SELECTION OF IDENTITY INFORMATOIN SATISFYING POLICY CONSTRAINTS - A system and method for verifying an attribute includes providing a compound policy by a relying party. The compound policy has one or more claims and/or sub-claims expressing conditions on attributes and constants. Identity providers are associated with aspects of the compound policy by mapping attributes of the compound policy with attributes of the identity providers. A selection of at least one identity provider that satisfies the compound policy is enabled. At least one attribute of the user is verified by at least one identity provider in accordance with the selection. | 04-22-2010 |
20100228590 | CONTEXT-AWARE ELECTRONIC SOCIAL NETWORKING - A computer-implemented method for performing context-aware social networking within an electronic social network is provided. The method includes dynamically obtaining context information corresponding to at least one of past, present and future events associated with each user of a plurality of users within the electronic social network, storing the obtained context information, defining one or more context patterns of interest using the stored context information, and detecting a context pattern of interest from the one or more context patterns of interest for a first user of the plurality of users and formulating one or more recommendations or executing user-defined actions or predefined actions by the electronic social network for the first user using the detected context pattern of interest and the context information of at least a second user of the plurality of users. | 09-09-2010 |
20100235886 | AUTOMATED RELATIONSHIP MANAGEMENT FOR ELECTRONIC SOCIAL NETWORKS - A computer-implemented method of automatically managing relationships between a plurality of users within an electronic social network. The method includes monitoring interactions between the plurality of users in relationships within the electronic social network over time, and obtaining interaction information associated with the monitored interactions, and automatically updating and managing access privileges of users based on the obtained interaction information, to access profile information of respective users. The method ensures automated, adequate and dynamically changing representation of relationships in an ESN system, thereby greatly increasing the value of the ESN system to the user and ways to pro-actively maintain and improve existing relationships or prevent them from decaying. | 09-16-2010 |
20120240199 | CONFIDENTIAL PRESENTATIONS IN VIRTUAL WORLD INFRASTRUCTURE - Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture. | 09-20-2012 |
20120297003 | NEGOTIABLE INFORMATION ACCESS IN ELECTRONIC SOCIAL NETWORKS - A method for implementing an electronically-based negotiation session between users within an ESN. The method includes sending a message including a request portion and a response portion from a first user to a second user in a round of successive rounds, and in response to receiving the message from the first user, sending a message from the second user to the first user in a subsequent round, the message from the second user including a response portion responsive to the request portion of the message from the first user and a request portion. When a new round is performed, evaluating whether an agreement exists by checking messages previously exchanged, and exchanging subsequent messages, when any rounds remain and the session has not been terminated, and granting access and exchanging data between the users, executing actions, and setting policies as negotiated, when the session has been terminated and an agreement exists. | 11-22-2012 |
20140337754 | ENABLEMENT OF PERFORMANCE OF A TRANSACTION - A method and system for enabling performance of a transaction. A client computer displays a first representation of a transaction policy depicting transaction policy options for fulfilling the transaction policy. After a user selects a first transaction policy option, the client computer displays a second representation of the transaction policy, depicting at least one mechanism pertaining to the first transaction policy option for satisfying the requirements of the first transaction policy option. After the user selects a first mechanism, the client computer displays evidence options for each requirement of the first transaction policy option. After the user selects an evidence option for each requirement of the first transaction policy option, the client computer sends to a server transaction enablement information that includes evidence dictated by the selected evidence options to enable the server to perform the transaction. | 11-13-2014 |