Aspects of the present invention provides for the identification of avatar-based unsolicited advertising in a virtual universe. Using an embodiment of the present invention, an advertising and/or an offering for sale of virtual and real goods and services masquerading as a computer controlled avatar may be identified by analyzing multimedia characteristics of the avatar and rejected, if so desired.
A computer avatar is a personalized graphic file or a rendering of personalized graphic files within a geometric frame that represents a computer user. There are basically two types of avatars: those used at websites, such as on Web exchange boards, and those used in gaming and virtual worlds. While Web users typically have two-dimensional graphic files as avatars, in virtual worlds, the avatar is typically a three-dimensional rendering of multiple graphic files layered on a geometric frame with controllable parts. A virtual world is an animated three-dimensional world created with computer-graphics imagery (CGI) and other rendering software. One of the hallmarks of a virtual world is that a user can interact within the environment by virtue of an avatar, or a computerized character that represents the user. The avatar manipulates and interacts with objects in the virtual world typically by mouse movements and keystrokes issued by the user. In simple terms, the avatar is a remote controlled character or proxy of the user. Avatars in a virtual world or virtual universe (VU) allow for a wide range of business and social experiences, and such experiences are becoming more important as business and social transactions are becoming common in VUs. In fact, the characteristics of an avatar play important social, business, and other related roles in VUs, such as a Second Life® virtual world. (Second Life is a registered trademark of Linden Research, Inc., commonly referred to as Linden Lab.) Second Life is a privately owned three-dimensional (3-D) virtual world, made publicly available in 2003 by Linden Lab, and is created entirely by its membership. Members assume an identity and take up residence in Second Life, creating a customized avatar or personage to represent themselves. The avatar moves about in the virtual world using mouse control and intuitive keyboard buttons. The Second Life client program provides users (referred to as residents) with tools to view, navigate, and modify the virtual world and participate in its virtual economy. Social and business interactions are important in Second Life, and these interactions include resident interactions in both personal and business meetings.
As the population of VUs increases, and as the density and intensity of personal activities and commercial transactions increase, greater emphasis will be placed on advertising. Just as in the real world, innovative and intrusive advertising activities will be launched and widely distributed. Unlike the real world, advertising in VUs is much less constrained by the limiting laws of physics and economics. Surprising new advertising campaigns and mechanisms may be deployed. One advertising mechanism marries unsolicited personal messaging (“spam”) with the concept of automated computer controlled advertising avatars that roam around the VU looking to communicate with potential human-controlled avatars.
In some systems, advertisement avatars are automated. However, automated avatars can create problems within a VU if abused, much the same as spam email can cause problems in an email communication system, a.k.a., “avatar-based VU spam”. Avatar-based VU spam has the potential to literally impede or block a user's motion in a VU, has the potential to impede lifelike transactions (e.g., business, romance) to devalue a user's virtual property and to block the avatar's line of sight.
Therefore, there exists a need for a solution that solves at least one of the deficiencies of the related art.
In general, aspects of the present invention provide for the identification of spam avatars, also called offering avatars, used for offering unsolicited advertising purposes, and, specifically, to the identification of spam avatars based upon the avatar's characteristics through analyses such as multimedia analysis.
One embodiment of the present invention is a method in a virtual universe (VU) system for identifying spam avatars, the VU system having one or more avatars that each have multimedia characteristics, the method may comprise retrieving from an avatar its multimedia characteristics, identifying the similarities of the retrieved multimedia characteristics with multimedia characteristics of known spam avatars and identifying the avatar as a spam avatar based upon the similarities.
One embodiment of the method of the present invention further may comprise calculating a spam score based upon the similarities and identifying an avatar as a spam avatar based upon the calculated spam score. It may further comprise comparing the calculated spam score with a spam score threshold wherein the avatar is identified as a spam avatar if the calculated spam score is equal to or greater than the calculated spam score.
The method may further comprise monitoring an avatar's movement wherein the movement is positional movement or wherein the movement is bodily movement. The multimedia characteristic of the avatar may be a graphic and the multimedia characteristic of a known spam avatar may be a graphic of a known spam avatar trademark.
One embodiment of the present invention is a system for identifying spam avatars based upon multimedia characteristics in a VU of the present invention may have a VU processing unit, a multimedia characteristics analysis unit, a memory unit that stores multimedia characteristics of known spam avatars, and a communications channel for allowing the VU processing unit, the memory unit and the multimedia characteristics analysis unit to exchange data. The spam avatar identification system may retrieve multimedia characteristics from an avatar, may retrieve the multimedia characteristics of known spam avatars from the memory unit, may identify similarities between the multimedia characteristics from the avatar and the multimedia characteristics of the known spam avatars, and may identify the avatar as a spam avatar based upon the similarities.
Another embodiment of the system of present invention may have a graphics recognition unit, an audio recognition unit, a video recognition unit, a speech to text conversion unit, an OCR/text look-up unit, a behavior/movement recognition unit, and an analysis unit that recognize the multimedia characteristics of the avatar.
Another embodiment of the present invention is a computer program product embodied in a computer readable medium for operating in a system comprising a network I/O, a CPU, and one or more databases, for implementing a method in a virtual universe (VU) system for identifying spam avatars, the VU system having one or more avatars that each have multimedia characteristics, the VU system having memory that stores multimedia characteristics of known spam avatars, wherein at least one of the avatars is a spam avatar, the method for identifying spam avatars comprising retrieving from an avatar its multimedia characteristics, identifying the similarities of the retrieved multimedia characteristics with multimedia characteristics of known spam avatars, and identifying the avatar as a spam avatar based upon the similarities.
Another embodiment is a method for deploying a computer infrastructure in a virtual universe (VU) for managing spam avatars, the VU having one or more avatars, at least one of the avatars being a spam avatar and at least one of the avatars having multimedia characteristics, the method comprising integrating computer-readable code into a computing system, wherein the code in combination with the computing system is capable of performing a process of identifying spam avatars, the process comprising retrieving the multimedia characteristics from one of the one or more avatars having multimedia characteristics, comparing the retrieved multimedia characteristics with multimedia characteristics of known spam avatars, identifying similarities between the retrieved multimedia characteristics with the multimedia characteristics of known spam avatars and determining whether the one of the one or more avatars is a spam avatar based upon the identified similarities.
Another embodiment of the system in a virtual universe (VU) for identifying spam avatar of the present invention, the VU system having one or more avatars that each have multimedia characteristics, wherein at least of the one or more avatars is not a spam avatar, the spam identifying system having memory that stores multimedia characteristics of known spam avatars and that stores a spam avatar identification table, and wherein the spam identification system has a VU processing unit for periodically distributing the spam identification table to the one or more avatars that is not a spam avatar.
These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
The drawings are not necessarily to scale. The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
Aspects of the present invention provide a solution for identifying spam avatars used for offering unsolicited advertising purposes based upon the multimedia characteristics of the spam avatars. It may provide the ability to quickly identify such spam avatars. Any of the components of the present invention could be deployed, managed, serviced, etc. by a service provider who offers to identify spam avatars used for offering unsolicited advertising purposes based upon the multimedia characteristics of the spam avatar.
A data processing system 100, such as system 102 shown in
Network adapters (network adapter 138) may also be coupled to the system 200 to enable the data processing system (as shown in
The present invention comprises a system and method of detecting, analyzing, and managing unsolicited advertisements to VU users through unsolicited communication made by human and computer controlled advertising avatars. Both the residents and owners of VUs would benefit from methods to reduce VU avatar spam such as described herein.
Residents (such as in Second Life) are represented in the environment by an avatar. The basic avatar is humanoid in shape that may be customized in a variety of ways:
The result can either be faithful to the original humanoid avatar, or can result in a completely non-humanoid representation of the character. These customizations can be packaged up into a single outfit, with common applications of outfits.
As noted above, the VU environment provides an opportunity for commercial vendors to market their wares and conduct other commerce with others who are resident in the VU via avatars. Many times, the commercial vendor will customize its avatar so that the avatar has readily distinguishable visual or audio characteristics. The purpose, of course, is to attract the attention of other avatars (potential customers) or to send unsolicited information about a product or service and so on (“advertisement”) so that the commercial vendor's avatar (“offering avatar” or “spam avatar”), and ultimately the commercial vendor, may receive business as a result of the advertisement from one or more recipients of the advertisement (“receiving avatars”). Like all other types of unsolicited marketing via any communication means (e.g., telephone, fax, email, text messaging, etc.), it may be unwanted by one or more of the receiving avatars.
For the purpose of this invention, the term “offering avatar” or “spam avatar” refers to the avatar advertising a service or product. The terms “offering avatar” and “spam avatar” may be used interchangeably in this document. Furthermore, the term “receiving avatar” refers to an avatar that receives unsolicited information about a product or service.
A simple avatar system 300 for implementing the present invention is shown in
As noted above, there is a need for the receiving avatars to have the ability to identify the spam avatars so that the receiving avatars may block the unsolicited communications from the spam avatars should the receiving avatars so desire.
Receiving avatars may choose which solicitations to accept or reject. For instance, a receiving avatar may choose to accept all solicitations from all spam avatars, to accept solicitations from particular spam avatars and to reject all solicitations from all other spam avatars, or to reject all solicitations from all spam avatars.
One embodiment of the system and method of the present invention identifies VU spam via characteristics analysis wherein the characteristics are multimedia characteristics. In general, multimedia may include a combination of text, audio, animation, video, and interactivity content forms. It may include other forms, such as movement activities, as well.
Text, of course, is the representation of language in a textual medium through the use of signs or symbols and can be stored with the avatar in a text file, in such formats as MIME, ASCII and having the .txt filename extension. A text file can be provided as input to a text parser which translates specific sequences of characters as commands or values so that the text can be identified or recognized. An avatar may have a text file or other text describing the avatar—such as the avatar's name, its owner, its purpose, etc.—which may provide an indication as to whether the avatar is a spam or offering avatar.
Audio can be stored with the avatar in the form of various audio file formats, such as uncompressed formats such as a WAV file or a lossy compressed file format such as MP3. Audio recognition systems, such as voice recognition system, can distinguish sound patterns from other sound patterns. A spam avatar may have a distinguishing audio file associated with it which may indicate that it is a spam avatar. Examples of distinguishing audio characteristics include known jingles, known distinguishable spokesmen's voice characteristics, or even word patterns such as, “We can help you reduce your debt!”, etc.
Still image characteristics may also assist in automatically determining whether an avatar is a spam avatar. For example, the spam avatar may visually look like known commercial figures such as, for example, Colonel Sanders™ or Ronald McDonald™. (Colonel Sanders and Ronald McDonald may be trademarks or registered trademarks of KFC Corporation and McDonald's Corporation, respectively, in the United States and elsewhere.) Or an image may be a known distinguishable trademark symbol such as The Golden Arches®. (The Golden Arches is a registered trademark of McDonald's Corporation.)
Animation creates an illusion of movement such as an avatar walking around, jumping up and down, shaking hands, etc., in the virtual universe. An avatar may display particular, known animation characteristics that may help indicate that that the avatar is a spam avatar. An example of an animation characteristic of a potential spam avatar may be that the avatar walks up to other avatars and offers to shake hands with each of the avatars. This could be coupled with a known word/voice pattern such as, “Hi! How are you? I can help you save money (lose weight, get a better insurance rate, etc).”
The interactivity characteristics of an avatar may assist in determining whether the avatar is a spam avatar. For example, a non-interactive avatar, i.e., when an avatar's action or message is not related to previous actions or messages conveyed to or by him, may or may not indicate that the avatar is a spam avatar. Or, a reactive avatar, i.e., when an avatar's actions or messages are related only to one immediately previous action or message, may or may not indicate that the avatar is a spam avatar. Finally, an interactive avatar, i.e., when an avatar's actions or messages are related to a number of previous actions or messages and have a relationship between them, may or may not indicate that the avatar is a spam avatar. Interactivity is similar to the degree of responsiveness, and is examined as a communication process in which each message is related to the previous messages exchanged, and to the relation of those messages to the messages preceding them. An example of an interactivity characteristic that could be used to identify a computer operated offering or spam avatar could be that the avatar is only responsive to its own questions regarding its own products or services—not to unrelated responses. Similarly, a relative lack of distinct interactivity characteristics may reveal a spam avatar, given the human controlling a spam avatar or a programmed spam avatar is likely to be focused on a smaller set of tasks. As computer related spam avatars become more sophisticated however, corresponding detection schemes will need to become more sophisticated.
Combinations of these multimedia characteristics (such as voice, animation, interactivity, movement, etc.) can be examined together which may further assist in determining spam avatar characteristics.
Once spam avatars are identified, it is important that there is a record of the spam avatar for reference by receiving avatars and the VU. Referring again to
Receiving avatars may choose which solicitations to accept or reject. For instance, a receiving avatar may choose to accept all solicitations from all spam avatars, to accept solicitations from particular spam avatars and to reject all solicitations from all other spam avatars, or to reject all solicitations from all spam avatars.
VU Memory 306 may further have a report table 318 for storing information about an identified offering or spam avatar. For example, if an avatar is identified as a spam avatar, the UUID of the potential advertising asset, the UUID of the avatar associated with the asset, and any other information is added to report table 318, for later processing. An example of other information can include details of the multimedia characteristics that the avatar or asset characteristics were determined to be similar to, and a score can be calculated by a scoring system to convey probability of a match to be discussed further hereinbelow.
Multimedia characteristics of the spam avatar can be retrieved and analyzed using a system such as one of the type shown in
As discussed in the context of
VU 401 further may have a multimedia characteristics analysis unit 405 that may retrieve, or obtain, and may analyze an avatar's characteristics, such as the multimedia characteristics of the avatar. For example, in
Multimedia characteristics analysis unit 405 may have an analysis unit 402 for providing analysis of information obtained from an avatar. Multimedia characteristics analysis unit 405 may also have a speech to text conversion unit 408 that may convert speech of an avatar to text so that the speech (possibly in the form of statements, instructions, queries, offers, etc.) may be parsed and programmatically understood. Multimedia characteristics analysis unit 405 may also have an OCR (optical character recognition)/text look-up unit 410 that may retrieve text from speech to text conversion unit 408 or otherwise and may look up the text. OCR/text look-up unit 410 may also retrieve text characters in the form of graphics that are recognized by an OCR portion and converted to text for look-up. Such text may indicate the avatars name, company name or slogan, owner name or provide other information about the avatar. Information derived from speech to text conversion unit 408 and OCR/text look-up unit 410 may be passed to analysis unit 402 for providing analysis of the information. Multimedia characteristics analysis unit 405 may also have an audio recognition unit 406 that may retrieve audio files from an avatar for analysis. The audio files may be in any suitable file format, such as, for example, .wav or .mp3. Multimedia characteristics analysis unit 405 may also have a graphics recognition unit 412 that may retrieve graphics files from avatars. Graphics, or image, files may be in any suitable format such as, for example, JPEG (Joint Photographic Experts Group), TIFF (tagged image file format), GIF (graphics interchange format), or PDF (portable document format). Multimedia characteristics analysis unit 405 may also have a video recognition unit 414 that may retrieve video files from avatars. Video files may be of any suitable format such as MPEG-2, MPEG-4 or WMV, for example. Multimedia characteristics analysis unit 405 may also have a behavior/movement recognition unit 418 that may recognize behavior and movements of an avatar. A movement of an avatar can be considered to be any change in position of any part of the avatar (e.g., a hand gesture), of the entire avatar (e.g., movement of the avatar from one region in the VU to another) or a combination of the two. Behavior may be considered to be actions or reactions of the avatar, usually in relation to the environment. Behavior and movement characteristics, especially when coupled with audio (voice) characteristics, may indicate a spam avatar.
Analysis unit 402 may communicate with speech to text conversion unit 408, OCR/text look-up unit 410, audio recognition unit 406, graphics recognition unit 412, video recognition unit 414 and behavior/movement recognition unit 418. Analysis unit 402 may receive or retrieve information about an avatar from these units 408, 410, 406, 412, 414, and 418.
Analysis unit 402 may communicate with multimedia characteristics of known spam avatars table 404 of VU memory 306. This communication may be done by the analysis unit 402, the VU processing unit 305 or another unit within spam avatar identification system 403. Analysis unit 402 may retrieve multimedia files from multimedia characteristics of known spam avatars table 404 to compare against information that it may have received from text conversion unit 408, text look-up unit 410, audio recognition unit 406, graphics recognition unit 412, video recognition unit 414 or behavior/movement recognition unit 418. Analysis unit 402 may compare files of a single type, for example, audio files or even files having different formats, for example .wav file format files and .mp3 format files. Analysis unit 402 may also compare combinations of file types. For example, analysis unit 402 may compare a combination of a video file and an audio file combination received from video recognition unit 414 and audio recognition unit 406 with a video file and audio file combination of a known spam avatar received from multimedia characteristics of known spam avatars table 404 of VU memory 306. Analysis unit 402 may work with recognition units 408, 410, 406, 412, 414 and 418 to compare and analyze the multimedia files.
Analysis unit 402, together with units 408, 410, 406, 412, 414, and 418 is able to identify spam avatars from retrieved multimedia characteristics from avatars from the VU 401. Analysis unit 402 is further able to identify the magnitude of the similarities and/or dissimilarities of the comparison between retrieved multimedia characteristics of the existing avatar and the retrieved multimedia characteristics of the known spam avatar. The comparison information may be passed to scoring system 420 so that a spam score for that particular existing avatar can be tabulated by scoring system 420. Spam scores may then be recorded by scoring system 420 in spam avatar identification table 308 for later use.
If the avatar has a concept of audio assets, the entirety or a random selection of the audio clip can be passed through audio (or audio pattern) recognition unit 406 for similarity to known jingles, radio commercials, and other audio that connote an advertisement. Additionally, speech to text conversion can be processed by speech to text conversion unit 408 and passed to OCR/text look-up unit 410. Behavioral/movement recognition may be performed by behavioral/movement recognition unit 418. If the avatar has a concept of video textures, then random graphic snapshots of the video can be processed the same way as discussed above. This may be done by video recognition unit 414 and graphics recognition unit 412. The audio component of the video can be processed the same manner. This may be done by audio recognition unit 406.
Analysis unit 402 may assist to provide analysis capability to units 408, 410, 406, 412, 414 and 418 and to retrieve multimedia files for analysis from multimedia characteristics of known spam avatars table 404. Depending upon the magnitude of the similarity, a spam score may be assigned to the examined avatar by scoring system 420 and may be stored in spam avatar identification table 308.
At 508, it is determined whether the avatar is a spam avatar and, if the avatar is a spam avatar, the UUID of the potential advertising asset, the UUID of the avatar associated with the asset, and any other information is added to a report table 318, for later processing at step 514. The process ends at 516. If it is determined that the avatar is not a spam avatar, the process ends at 516.
An example of an embodiment of the present invention for determining whether an examined avatar is a spam avatar is shown in
As discussed above, the UUID of the avatar, the score of the test, and other information such as date and time of test and index of questions or methods used in the test is added to a report table, for later processing. Rapid discrimination of spam avatars from other avatars may have a number of other applications including:
It should be understood that the present invention is typically computer-implemented via hardware and/or software. As such, client systems and/or servers will include computerized components as known in the art. Such components typically include (among others) a processing unit, a memory, a bus, input/output (I/O) interfaces, external devices, etc.
While shown and described herein as a system and method for identifying spam avatar in a virtual universe through multimedia analysis, it is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a computer-readable/useable medium that includes computer program code to enable a system to identify spam avatar in a virtual universe through multimedia analysis. To this extent, the computer-readable/useable medium includes program code that implements each of the various process steps of the invention. It is understood that the terms computer-readable medium or computer useable medium comprises one or more of any type of physical embodiment of the program code. In particular, the computer-readable/useable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computing device, such as memory and/or storage system (e.g., a fixed disk, a read-only memory, a random access memory, a cache memory, etc.), and/or as a data signal (e.g., a propagated signal) traveling over a network (e.g., during a wired/wireless electronic distribution of the program code).
In another embodiment, the invention provides a computer-implemented method for identifying spam avatar in a virtual universe through multimedia analysis. In this case, a computerized infrastructure can be provided and one or more systems for performing the process steps of the invention can be obtained (e.g., created, purchased, used, modified, etc.) and deployed to the computerized infrastructure. To this extent, the deployment of a system can comprise one or more of (1) installing program code on a computing device, such as computer system from a computer-readable medium; (2) adding one or more computing devices to the computer infrastructure; and (3) incorporating and/or modifying one or more existing systems of the computer infrastructure to enable the computerized infrastructure to perform the process steps of the invention.
As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions intended to cause a computing device having an information processing capability to perform a particular function either directly before or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form. To this extent, program code can be embodied as one or more of: an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.
In another embodiment, the invention provides a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis. That is, a service provider, such as a Solution Integrator, could offer to deploy a computer infrastructure in a virtual universe (VU) for identifying an advertising and/or an offering for sale of virtual and real goods and services masquerading as a computer controlled avatar by analyzing multimedia characteristics of the avatar. In this case, the service provider can create, maintain, support, etc., the computer infrastructure by integrating computer-readable code into a computing system, wherein the code in combination with the computing system is capable of performing the process steps of the invention for one or more customers. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
The foregoing description of various aspects of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible. Such modifications and variations that may be apparent to a person skilled in the art are intended to be included within the scope of the invention as defined by the accompanying claims.
This patent document is a continuation of, and claims the benefit of, co-pending and co-owned U.S. patent application Ser. No. 12/342,943, filed Dec. 23, 2008, the entire contents of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5852672 | Lu | Dec 1998 | A |
6091777 | Guetz et al. | Jul 2000 | A |
6198850 | Banton | Mar 2001 | B1 |
6418424 | Hoffberg et al. | Jul 2002 | B1 |
6457008 | Rhee et al. | Sep 2002 | B1 |
6757008 | Smith | Jun 2004 | B1 |
6879266 | Dye et al. | Apr 2005 | B1 |
6907571 | Slotznick | Jun 2005 | B2 |
6909429 | Gottesman et al. | Jun 2005 | B2 |
7030905 | Carlbom et al. | Apr 2006 | B2 |
7062088 | Clauson | Jun 2006 | B1 |
7072398 | Ma | Jul 2006 | B2 |
7088846 | Han et al. | Aug 2006 | B2 |
7110950 | Basso et al. | Sep 2006 | B2 |
7143083 | Carlbom et al. | Nov 2006 | B2 |
7190285 | Dye et al. | Mar 2007 | B2 |
7263472 | Porikli | Aug 2007 | B2 |
7366671 | Basso et al. | Apr 2008 | B2 |
7444003 | Laumeyer et al. | Oct 2008 | B2 |
7542588 | Ekin et al. | Jun 2009 | B2 |
7598977 | Ryall et al. | Oct 2009 | B2 |
7721107 | Golle | May 2010 | B2 |
7760908 | Curtner et al. | Jul 2010 | B2 |
7761456 | Cram et al. | Jul 2010 | B1 |
7801328 | Au et al. | Sep 2010 | B2 |
7868912 | Venetainer et al. | Jan 2011 | B2 |
7961946 | Hammadou | Jun 2011 | B2 |
8131012 | Eaton et al. | Mar 2012 | B2 |
8416847 | Roman | Apr 2013 | B2 |
8537219 | Desimone et al. | Sep 2013 | B2 |
8553778 | Desimone et al. | Oct 2013 | B2 |
8656476 | Dawson et al. | Feb 2014 | B2 |
8687702 | Schmit | Apr 2014 | B2 |
9338132 | Dawson et al. | May 2016 | B2 |
9697535 | Dawson et al. | Jul 2017 | B2 |
20020105529 | Bowser et al. | Aug 2002 | A1 |
20030023595 | Carlbom et al. | Jan 2003 | A1 |
20030025599 | Monroe | Feb 2003 | A1 |
20030063670 | Masukura et al. | Apr 2003 | A1 |
20030074397 | Morin et al. | Apr 2003 | A1 |
20030081685 | Montgomery | May 2003 | A1 |
20040194129 | Carlbom et al. | Sep 2004 | A1 |
20050021649 | Goodman | Jan 2005 | A1 |
20050097179 | Orme | May 2005 | A1 |
20050108340 | Gleeson | May 2005 | A1 |
20060036695 | Rolnik | Feb 2006 | A1 |
20060056518 | Conklin | Mar 2006 | A1 |
20060062478 | Cetin et al. | Mar 2006 | A1 |
20060136219 | Wang | Jun 2006 | A1 |
20060168041 | Mishra | Jul 2006 | A1 |
20060187305 | Trivedi et al. | Aug 2006 | A1 |
20060279630 | Aggarwal et al. | Dec 2006 | A1 |
20070032221 | Badt | Feb 2007 | A1 |
20070078699 | Scott et al. | Apr 2007 | A1 |
20070079379 | Sprosts et al. | Apr 2007 | A1 |
20070083929 | Sprosts et al. | Apr 2007 | A1 |
20070190990 | Yin | Aug 2007 | A1 |
20070220607 | Sprosts et al. | Sep 2007 | A1 |
20070257986 | Ivanov et al. | Nov 2007 | A1 |
20080022384 | Yee et al. | Jan 2008 | A1 |
20080037880 | Lai | Feb 2008 | A1 |
20080097946 | Oliver et al. | Apr 2008 | A1 |
20080104180 | Gabe | May 2008 | A1 |
20080120558 | Nathan et al. | May 2008 | A1 |
20080195713 | Benschop et al. | Aug 2008 | A1 |
20080204450 | Dawson | Aug 2008 | A1 |
20080208674 | Hamilton | Aug 2008 | A1 |
20080208749 | Wallace et al. | Aug 2008 | A1 |
20080215995 | Wolf | Sep 2008 | A1 |
20080235582 | Zalewski et al. | Sep 2008 | A1 |
20080252723 | Park | Oct 2008 | A1 |
20080263446 | Altberg et al. | Oct 2008 | A1 |
20080303811 | Van Luchene | Dec 2008 | A1 |
20090055484 | Vuong et al. | Feb 2009 | A1 |
20090106318 | Mantripragada | Apr 2009 | A1 |
20090132361 | Titus | May 2009 | A1 |
20090144829 | Grigsby | Jun 2009 | A1 |
20090210505 | Thomas et al. | Aug 2009 | A1 |
20090282075 | Dawson et al. | Nov 2009 | A1 |
20090287566 | McAfee | Nov 2009 | A1 |
20100162403 | Dawson et al. | Jun 2010 | A1 |
20100162404 | Dawson et al. | Jun 2010 | A1 |
20100239016 | Deimone et al. | Sep 2010 | A1 |
20100306853 | Dawson et al. | Dec 2010 | A1 |
20100332468 | Cantrell | Dec 2010 | A1 |
20110041181 | Niccolini et al. | Feb 2011 | A1 |
20110096149 | Au et al. | Apr 2011 | A1 |
20140137229 | Dawson et al. | May 2014 | A1 |
Number | Date | Country |
---|---|---|
2006106632 | Apr 2006 | JP |
Entry |
---|
Johnson, U.S. Appl. No. 14/161,841, Office Action, dated Apr. 27, 2015, 29 pgs. |
Johnson, U.S. Appl. No. 14/161,841, Office Action, dated Aug. 29, 2014, 41 pgs. |
Johnson, U.S. Appl. No. 14/161,841, Final Office Action, dated Oct. 2, 2014, 25 pgs. |
Johnson, U.S. Appl. No. 14/161,841, Final Office Action, dated Nov. 5, 2015, 33 pgs. |
Johnson, U.S. Appl. No. 14/161,841, Notice of Allowance, dated Feb. 11, 2016, 10 pgs. |
Sorkowitz, Daniel M., U.S. Appl. No. 12/115,706, Examiner's Answer, dated Aug. 21, 2017, 9 pgs. |
Huang, U.S. Appl. No. 12/342,943, Office Action dated May 12, 2011, 32 pages. |
Sorkowitz, U.S. Appl. No. 12/115,706, Office Action dated Nov. 10, 2014, 16 pages. |
Huang, U.S. Appl. No. 12/342,943, Notice of Allowance dated Jul. 9, 2015, 17 pages. |
Huang, U.S. Appl. No. 12/343,125, Office Action dated Sep. 19, 2011, 41 pages. |
Sorkowitz, U.S. Appl. No. 12/115,706, Office Action dated Jun. 19, 2014, 17 pages. |
Huang, U.S. Appl. No. 12/343,125, Notice of Allowance dated Jul. 6, 2015, 18 pages. |
Sorkowitz, U.S. Appl. No. 12/115,706, Office Action dated Apr. 9, 2015, 34 pages. |
Carlton Johnson, USPTO Office Action, U.S. Appl. No. 12/473,817, dated Oct. 23, 2012, 21 pages. |
U.S. Appl. No. 12/342,943, Office Action, dated Jan. 8, 2015, 30 pages. |
U.S. Appl. No. 12/343,125, Office Action, dated Jan. 9, 2015, 30 pages. |
Huang, Tsan-Yu J, U.S. Appl. No. 12/342,943, Notice of Allowance, dated Mar. 3, 2017, 28 pgs. |
Ziliani et al., “Effective Integration of Object Tracking in a Video Coding Scheme for Multisensor Surveillance Systems”, International Conference on Image Processing, Rochester, NY, Sep. 22-25, 2002, vol. 1, pp. 521-524. |
Dimitrova et al., “Motion Recovery for Video Content Classification”, ACM Transactions on Information Systems, vol. 1, No. 4, Oct. 1995, pp. 408-439. |
Ying-Li Tian, “Event detection, query, and retrieval for video surveillance”, Artificial Intelligence for Maximizing Content Based Image Retrieval, Chapter XV, Publication Date Nov. 26, 2008 pp. 342-370. |
Luciano Da Fontoura Costa et al., “Shape Analysis and Classification”, Published in 2001 by CRC Press, 3 pages. |
Maytham H. Safar et al., “Shape Analysis and Retrieval of Multimedia Objects”, Copyright 2003 by Kluwer Academic Publishers, 3 pages. |
Brigitte Chiarizia, PCT Communication Relating to the Results of the Partial International Search, International Application No. PCT/EP2010/052636, International Filing Date Mar. 2, 2010, 2 pages. |
Brigitte Chiarizia, PCT Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration, International Application No. PCT/EP2010/052636, International Filing Date Mar. 2, 2010, 5 pages. |
Daniel M. Sorkowitz, USPTO Office Action, U.S. Appl. No. 12/115,706, Notification dated Dec. 30, 2010, 23 pages. |
Daniel M. Sorkowitz, USPTO Final Office Action, U.S. Appl. No. 12/115,706, Notification dated Apr. 5, 2011, 16 pages. |
Huang, Tsan-Yu J, U.S. Appl. No. 12/343,125, Notice of Allowance, dated Mar. 1, 2017, 27 pgs. |
Sorkowitz, Daniel, U.S. Appl. No. 12/115,706, Final Office Action, dated Nov. 28, 2016, 21 pgs. |
Huang, Tsan-Yu, U.S. Appl. No. 12/343,125, Notice of Allowance, dated Jul. 15, 2015, 6 pgs. |
Sorkowitz, U.S. Appl. No. 12/115,706, Office Action dated Jul. 14, 2016, 39 pages. |
Carlton Johnson, USPTO Notice of Allowance and Fee(s) Due, U.S. Appl. No. 12/473,817, dated Oct. 8, 2013, 26 pages. |
Carlton Johnson, USPTO Office Action, U.S. Appl. No. 12/473,817, dated Aug. 16, 2013, 26 pages. |
Carlton Johnson, USPTO Final Office Action, U.S. Appl. No. 12/473,817, Notification dated Feb. 25, 2013, 28 pages. |
Carlton Johnson, USPTO Final Office Action, U.S. Appl. No. 12/473,817, dated Jul. 3, 2012, 16 pages. |
Tsan-Yu J. Huang, USPTO Final Office Action, U.S. Appl. No. 12/342,943, dated Aug. 18, 2011, 27 pages. |
Tsan-Yu J. Huang, USPTO Office Action, U.S. Appl. No. 12/343,125, dated May 12, 2011, 37 pages. |
Carlton Johnson, USPTO Office Action, U.S. Appl. No. 12/473,817, dated Dec. 8, 2011, 21 pages. |
Huang, Jay, U.S. Appl. No. 15/584,221, Office Action, dated Jan. 17, 2020, 47 pgs. |
Jay Huang, USPTO Final Office Action, U.S. Appl. No. 15/584,221, Notification dated Jul. 20, 2020, 14 pages. |
Huang, Jay, U.S. Appl. No. 15/584,221, Notice of Allowance, END920080054US2, dated Oct. 9, 2020, 13 pgs. |
Number | Date | Country | |
---|---|---|---|
20170235948 A1 | Aug 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12342943 | Dec 2008 | US |
Child | 15584270 | US |