Abstract:
A digital content encryption method and system based on user identification are disclosed. By mainly using the good identification recognition mechanism (such as SIM card) in the communication equipments and cooperating with multi-purpose executive equipments(such as play equipment), the communication equipments' characteristics are properly utilized. The communication equipment is the communication determination part, and can execute (such as playing) the digital content in the third part storage card at the same time.
Abstract:
The present invention provides systems and methods for powered video game playing cards, powered voter authentication cards, powered financial transaction cards, and methods for administering the use of each. The cards generally include a thin, flexible substrate and a battery disposed within the substrate. A dynamic token value generator and/or biometric sensor is disposed within the substrate and is powered by the battery. An electronic display is mounted on the substrate for displaying a token value generated by the dynamic token value generator. The token value is configured to be used in conjunction with a back-end token value secure identification system to provide access to secure electronic information or capabilities.
Abstract:
A method and a system (10) which is capable of being implemented as a children's' toy. The system (10) is operable to interface an add-on device (20a) or a story to an interactive environment hosted by the system (10). The system (10) includes a response engine (30) which is operable to receive notification (225) from add-on devices introduced to the system (10). The response engine is operable to generate challenges (235) to the add-on devices (20a) wherein the challenges include watermarks embedded therein. The response engine (30) is operable to receive corresponding responses sent from the add-on devices (20a) in response to the challenges (235). Moreover, the response engine (30) is further operable to analyze the corresponding responses to determine whether or not the add-on devices (20a) are able to extract the watermarks correctly from the challenges (235) in generating the corresponding responses. The system (10) is thereby selectively capable of accepting the new devices (20a) to the system (10), thereby preventing counterfeit or copy products being used with the system (10).
Abstract:
In order to encourage people who are playing an electronic games machine (12) also to take exercise, and to encourage users of exercise machines (76) who simultaneously play a games machine to exercise at a particular rate, an interrupter system (34) is added to an existing connection (18,20,22) between the games machine and its controller (14) so as to provide a modified connection. Operation of the exercise machine is detected, and the interrupter system is used selectively to enable and interrupt the modified connection between the game controller and the games machine to enable and interrupt normal operation of the games machine in dependence upon the detected operation of the exercise machine. The normal operation of the games machine may be interrupted if the rate of operation of the exercise machine is detected as being below a predetermined threshold and/or above a predetermined threshold. Accordingly, a parent can arrange it such that their child cannot play normally on a games machine unless the child also exercises on the exercise machine. Also, a user of an exercise machine and games machine can be encouraged to exercise in a particular manner, otherwise their game will be interrupted.
Abstract:
Die Erfindung betrifft Verfahren zur eindeutigen persönlichen Zuordnung mindestens einer autonomen Speichereinheit (10) zu mindestens einem Spieler in einer Spielstandsspeichervorrichtung (20) zur Speicherung mindestens eines Spielzustandes eines Spieles, insbesondere eines Computer-, eines Netzwerkspieles oder eines Trading Card Games. Das Verfahren ist dadurch gekennzeichnet, dass einem durch den Spieler erzeugten und/oder betreuten, diesen eindeutig charakterisierenden und in der mindestens einen autonomen Speichereinheit gespeicherten Spielzustand, insbesondere einer Eigenschaftsmenge einer durch den Spieler erzeugten und/oder geführten Spielfigur und/oder einer Menge von durch den Spieler erzeugten und/oder verwalteten Spielsituationen innerhalb der von der Spielstandsspeichervorrichtung erfassten Spielergemeinschaft, in einer das Agieren des Spielers eindeutig bezeichnenden Weise ein eindeutiges und in der Spielumgebung wirksames Identifizierungsmerkmal zugeordnet wird. Zwischen der mindestens autonomen Speichereinheit und einer die mindestens eine autonome Speichereinheit verwaltenden Spielleiterspeichereinheit (30) wird hierzu ein registrierender Datenaustausch ausgeführt, wobei als Resultat des Datenaustausches ein mit dem gespeicherten Spielzustand verknüpfter, den Spieler kennzeichnender erster Registerdatensatz (40) in der Spielleiterspeichereinheit (30) und ein zum ersten Registerdatensatz vergleichbarer und mit dem gespeicherten Spielzustand verknüpfter zweiter Registerdatensatz (41) in der autonomen Speichereinheit erzeugt, abgespeichert und verarbeitet.
Abstract:
A device and method for protection of legitimate software against used software and counterfeit software in recording media. The device includes a disk set in a main unit. A specific title code is used, and if this title code has been registered, the main unit shifts to a normal operation. If the code has not been registered, verification software is initiated, PG detection is performed, and when a PG pattern and verification data match, the code is registered in the COCT. If matching does not occur, the disk is processed as illegitimate software.
Abstract:
A computer-implemented method is provided to automatically apply predefined privileges for identified and tracked users in a space having one or more media sources The method includes an operation to define and save to memory, a user profile The user profile may include data that identifies and tracks a user with a depth-sensing camera Alternatively, privileges defining levels of access to particular media for the user profile are defined and saved The method also includes an operation to capture image and depth data from the depth-sensing camera of a scene within the space In yet another operation, the user is tracked and identified within the scene from the image and depth data Alternatively, defined privileges automatically apply to media sources so that the user is granted access to selected content from the one or more media sources when identified and tracked within the scene.